Computer Engineering and Applications ›› 2024, Vol. 60 ›› Issue (5): 17-29.DOI: 10.3778/j.issn.1002-8331.2307-0218
• Research Hotspots and Reviews • Previous Articles Next Articles
NI Xueli, MA Zhuo, WANG Qun
Online:
2024-03-01
Published:
2024-03-01
倪雪莉,马卓,王群
NI Xueli, MA Zhuo, WANG Qun. Research on Blockchain P2P Network and Its Security[J]. Computer Engineering and Applications, 2024, 60(5): 17-29.
倪雪莉, 马卓, 王群. 区块链P2P网络及安全研究[J]. 计算机工程与应用, 2024, 60(5): 17-29.
Add to citation manager EndNote|Ris|BibTeX
URL: http://cea.ceaj.org/EN/10.3778/j.issn.1002-8331.2307-0218
[1] NASIR M H, ARSHAD J, KHAN M M, et al. Scalable blockchains—a systematic review[J]. Future Generation Computer Systems, 2022, 126(1): 136-162. [2] QASSE I A, TALIB M A, NASIR Q M. Inter blockchain communication: a survey[C]//Proceedings of the ArabWIC 6th Annual International Conference Research Trac, Rabat Morocco, March 7-9, 2019. New York: ACM Press, 2019: 1-6. [3] 王群, 李馥娟, 倪雪莉, 等. 区块链共识算法及应用研究[J]. 计算机科学与探索, 2022, 16(6): 1214-1242. WANG Q, LI F J, NI X L, et al. Survey on blockchain consensus algorithms and application[J]. Journal of Frontiers of Computer Science and Technology, 2022, 16(6): 1214-1242. [4] BRITANNICA. P2P[EB/OL]. [2023-05-06]. https://www.britannica.com/technology/P2P. [5] Federal Trade Commission. Peer-to-Peer file sharing: a guide for business[EB/OL]. [2023-05-07]. https://www.ftc.gov/business-guidance/resources/peer-peer-file-sharing-guide-business. [6] BERNS A. Network scaffolding for efficient stabilization of the chord overlay network[J]. arXiv:2109.14126,2021. [7] STOICA I, MORRIS R, KARGER D, et al. Chord: a scalable peer-to-peer lookup protocol for Internet applications[J]. ACM SIGCOMM Computer Communication Review, 2001, 31(4): 149-160. [8] MAYMOUNKOV P, MAZIERES D. Kademlia: a peer-to-peer information system based on the XOR metric[C]//Proceedings of the First International Workshop (IPTPS 2002), Cambridge, March 7-8, 2002. Berlin, Heidelberg: Springer, 2002: 53-65. [9] STEINER M, EN-NAJJARY T, BIERSACK E W. A global view of kad[C]//Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement, San Diego, October 24-26, 2007. New York: ACM Press, 2007: 117-122. [10] ASSANZADEH-NAZARABADI Y, TAHERI-BOSHROOYEH S, OTOUM S, et al. DHT-based communications survey: architectures and use cases[J]. arXiv:2109.10787,2021. [11] XU Z, TANG C, ZHANG Z. Building topology-aware overlays using global soft-state[C]//Proceedings of the 23rd International Conference on Distributed Computing Systems, Providence, May 19-22, 2003. Piscataway: IEEE, 2003: 500-508. [12] KUSHWAHA R, KULKARNI S, SINGH Y N. Generalized distance metric for different DHT routing algorithms in peer-to-peer networks[J]. arXiv:2303.13965,2023. [13] 邱彤庆, 陈贵海. 一种令P2P覆盖网络拓扑相关的通用方法[J]. 软件学报, 2007, 18(2): 381-390. QIU T Q, CHEN G H. A generic approach to making P2P overlay network topology-aware[J]. Journal of Software, 2007, 18(2): 381-390. [14] JIANG S, GUO L, ZHANG X D, et al. LightFlood: minimizing redundant messages and maximizing scope of peer-to-peer search[J]. IEEE Transactions on Parallel and Distributed Systems, 2008, 19(5): 601-614. [15] JACOBS T, PANDURANGAN G. Stochastic analysis of a churn-tolerant structured peer-to-peer scheme[J]. Peer to Peer Networking & Applications, 2013, 6: 1-14. [16] STUTZBACH D, REJAIE R. Understanding churn in peer-to-peer networks[C]//Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, Rio de Janeriro, Brazi, October 25-27, 2006. New York: ACM Press, 2006: 189-202. [17] TANG W Z, KIFFER L, FANTI G, et al. Strategic latency reduction in blockchain peer-to-peer networks[J]. arXiv:2205.06837,2022. [18] REN Y Y, ZENG Z W, WANG T, et al. A trust-based minimum cost and quality aware data collection scheme in P2P network[J]. Peer-to-Peer Networking and Applications, 2020, 13: 2300-2323. [19] HOU W J, JIANG Y X, LEI W X, et al. A P2P network based edge computing smart grid model for efficient resources coordination[J]. Peer-to-Peer Networking and Applications, 2020, 13: 1026-1037. [20] FRAHAT R T, MONOWAR M M, BUHARI S M. Secure and scalable trust management model for IoT P2P network[C]//Proceedings of the 2nd International Conference on Computer Applications & Information Security (ICCAIS), Riyadh, Saudi Arabia, May 01-03, 2019. Piscataway: IEEE, 2019: 1-6. [21] KLEPPMANN M. Distributed systems[EB/OL]. [2023-05-03]. https://www.cl.cam.ac.uk/teaching/2021/ConcDisSys/dist-sys-slides.pdf. [22] The bitcoin network[EB/OL]. [2023-05-03]. https://learn.saylor.org/mod/book/view.php?id=36307&chapterid=18897. [23] BUNZ B, KIFFER L, LUU L, et al. FlyClient: super-light clients for cryptocurrencies[C]//Proceedings of the IEEE Symposium on Security and Privacy (SP), San Francisco, May 18-21, 2020. Piscataway: IEEE, 2020: 928-946. [24] EYAL I. The miner’s dilemma[J]. arXiv:1411.7099,2014. [25] LUU L, VELNER Y, TEUTSCH J, et al. SMARTPOOL: practical decentralized pooled mining[C]//Proceedings of the 26th USENIX Security Symposium, Vancouver, August 16-18, 2017. Berkeley: USENIX Association, 2017: 1409-1426. [26] NAKAMOTO S. Bitcoin: a peer-to-peer electronic cash system[EB/OL]. (2018-06-10)[2023-06-13]. https://bitcoin.org/bitcoin.pdf. [27] Decentralized identity[EB/OL].[2023-06-15]. https://ethereum.org/en/decentralized-identity/. [28] ANDROULAKI E, BARGER A, BORTNIKOV V, et al. Hyperledger Fabric: a distributed operating system for permissioned blockchains[J]. arXiv:1801.10228,2018. [29] ANTONOPOULOS A M. Mastering bitcoin: programming the open blockchain[M]. CA: O'Reilly Media, Inc, 2017. [30] DEMERS A, GREENE D, HOUSER C, et al. Epidemic algorithms for replicated database maintenance[J]. ACM SIGOPS Operating Systems Review, 1988, 22(1): 8-32. [31] LAKSHMAN A, MALIK P. Cassandra: a decentralized structured storage system[J]. ACM SIGOPS Operating Systems Review, 2010, 44(2): 35-40. [32] GitHub. Leveldb[EB/OL]. [2023-06-20]. https://github.com/google/leveldb. [33] LIOYD W. Distributed Hash tables & chord[EB/OL]. [2023-06-26]. https://www.cs.princeton.edu/courses/archive/fall22/cos418/docs/L9-dht-chord.pdf. [34] SAHIN O D, AGRAWAL D, ABBADI E. Techniques for efficient routing and load balancing in content-addressable networks[C]//Proceedings of the Fifth IEEE International Conference on Peer-to-Peer Computing, Konstanz, December 31-September 02, 2005. Piscataway: IEEE, 2005: 67-74. [35] DUONG H T. A Survey of three DHT systems: CAN, pastry, and chord[ENB/OL]. [2026-06-26]. https://www.sci.utah.edu/~duong/papers/chord.pdf. [36] GAO Y, SHI J Q, WANG X B, et al. Topology measurement and analysis on ethereum P2P network[C]//Proceedings of the IEEE Symposium on Computers and Communications (ISCC), Barcelona, June 29-July 03, 2019. Piscataway: IEEE, 2019: 1-6. [37] KIFFER L, SALMAN A, LEVIN D, et al. Under the hood of the ethereum gossip protocol[C]//Proceedings of the Financial Cryptography and Data Security, Virtual Event, March 1-5, 2021. Berlin, Heidelberg: Springer, 2021: 437-456. [38] PUNATHUMKANDI S, SUNDARAM V M, PRABHAVATHY. A deep dive into hyperledger[EB/OL]. [2023-06-27]. https://www.researchgate.net/publication/347825518_ A_deep_dive_into_Hyperledger. [39] Hyperledger Iroha[EB/OL]. (2022-10-15)[2023-06-27]. https://wiki.hyperledger. org/display/iroha. [40] CACHIN C. Architecture of the hyperledger Blockchain fabric[EB/OL]. (2016-01-01)[2023-06-16]. https://www.zurich.ibm.com/dccl/papers/cachin_dccl.pdf. [41] Spf13. Viper[EB/OL]. [2023-06-22]. https://github.com/spf13/viper. [42] WASHBOURNE L. A survey of P2P network security[J]. arXiv:1504.01358,2015. [43] WANG T T, ZHAO C H, YANG Q, et al. Ethna: analyzing the underlying peer-to-peer network of ethereum blockchain[J]. IEEE Transactions on Network Science and Engineering, 2021, 3(1): 2131-2146. [44] SUN X, TORRES R, RAO S. Preventing DDoS attacks on internet servers exploiting P2P systems[J]. Computer Networks, 2010, 54(15): 2756-2774. [45] 诸葛程晨, 王群, 刘家银, 等. 零信任网络综述[J]. 计算机工程与应用, 2022, 58(22): 12-29. ZHUGE C C, WNAG Q, LIU J Y, et al. Survey of zero trust network[J]. Computer Engineering and Applications, 2022, 58(22): 12-29. [46] 胡甜媛, 李泽成, 李必信, 等. 智能合约的合约安全和隐私安全研究综述[J]. 计算机学报, 2021, 44(12): 2485-2514. HU T Y, LI Z C, LI B X, et al. Contractual security and privacy security of smart contract: a system mapping study[J]. Chinese Journal of Computers, 2021, 44(12): 2485-2514. [47] 赵季红, 蔡田杰, 曲桦, 等. SDN中应用网络分区的控制器部署策略[J]. 计算机工程, 2019, 45(1): 73-77. ZHAO J H, CAI T J, QU H, et al. Controller deployment strategy for applying network partition in SDN[J]. Computer Engineering, 2019, 45(1): 73-77. [48] KUPERBERG M. Towards an analysis of network partitioning prevention for distributed ledgers and blockchains[C]//Proceedings of the IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS), Oxford, August 03-06, 2020. Piscataway: IEEE, 2020: 94-99. [49] 王群, 李馥娟, 倪雪莉, 等. 区块链隐私保护机制研究[J]. 计算机工程, 2023, 49(4): 1-13. WANG Q, LI F J, NI X L, et al. Research on blockchain privacy protection mechanism[J]. Computer Engineering, 2023, 49(4): 1-13. [50] 张思亮, 凌捷, 陈家辉. 可追踪的区块链账本隐私保护方案[J]. 计算机工程与应用, 2020, 56(23): 31-37. ZHANG S L, LING J, CHEN J H. Traceable blockchain ledger privacy protection scheme[J]. Computer Engineering and Applications, 2020, 56(23): 31-37. [51] BERNABE J B, CANOVAS J L, HERNANDEZ-RAMOS J L, et al. Privacy-preserving solutions for blockchain: review and challenges[J]. IEEE Access, 2019, 7: 164908-164940. [52] LI P, WEI F, ZHENG Y, et al. Privacy preservation in permissionless blockchain: a survey[J]. Digital Communications and Networks, 2021, 7(3): 295-307. [53] NAFTALY H, MINSK Y. Discriminating defense against DDoS attacks; a novel approach[J]. arXiv:2201.12439,2022. [54] TAPSELL J, AKRAM R N, MARKANTONAKIS K. An evaluation of the security of the Bitcoin Peer-to-Peer Network[J]. arXiv:1805.10259,2018. [55] GUNTURN R. Survey of sybil attacks in social networks[J]. arXiv:1504.05522,2015. [56] 魏松杰, 吕伟龙, 李莎莎. 区块链公链应用的典型安全问题综述[J]. 软件学报, 2022, 33(1): 324-355. WEI S J, LYU W L, LI S S. Overview on typical security problems in public blockchain applications[J]. Journal of Software, 2022, 33(1): 324-355. [57] LOPEZ-FUENTES F A, EUGUI-DE-ALBA I, ORTIZ-RUIZ O M. Evaluating P2P networks against eclipse attacks[J]. Procedia Technology, 2012, 3(2): 61-68. [58] EYAL I, SIRER E G. Majority is not enough: bitcoin mining is vulnerable[J]. Communications of the ACM, 2018, 61(7): 95-102. [59] SELIMI M, KABBINALE A R, ALI A, et al. towards blockchain-enabled wireless mesh networks[J]. arXiv:1804.00561,2018. |
[1] | ZHANG Miao, LI Shaowen, WU Yuting, TU Lijing, ZHANG Lei, YANG Shangxiong. Research on Optimization of Reward and Punishment Mechanism of PBFT [J]. Computer Engineering and Applications, 2024, 60(7): 266-273. |
[2] | LI Yang, WANG Jingyu, LIU Lixin. Fair Verifiable Search Encryption Scheme Based on Blockchain [J]. Computer Engineering and Applications, 2024, 60(6): 301-311. |
[3] | CAI Yuanhai, SONG Fuyuan, LI Kai, CHEN Yanyu, FU Zhangjie. Blockchain Transaction Legitimacy Discrimination with High Recognition Accuracy [J]. Computer Engineering and Applications, 2024, 60(5): 271-280. |
[4] | ZHANG Mingquan, YANG Tian, DUO Chunhong. Access Authentication Method of Power Distribution Internet of Things Based on Improved PBFT [J]. Computer Engineering and Applications, 2024, 60(2): 279-287. |
[5] | LI Guangzhu, LI Leixiao, GAO Haoyu. Cross-Chain Technology Development and Application Research [J]. Computer Engineering and Applications, 2024, 60(2): 32-45. |
[6] | WANG Chundong, GUO Ruyue. Trust Management Solution for Internet of Vehicles Based on Logistic Regression and Blockchain [J]. Computer Engineering and Applications, 2024, 60(1): 281-288. |
[7] | LI Fujuan, MA Zhuo, WANG Qun. Survey on Identity Management in Blockchain Systems [J]. Computer Engineering and Applications, 2024, 60(1): 57-73. |
[8] | ZHANG Tianxiang, LI Leixiao, LIU Dongjiang, GAO Haoyu. Survey on Application and Research of Blockchain Incentive Mechanism in Internet of Vehicles [J]. Computer Engineering and Applications, 2023, 59(9): 59-74. |
[9] | ZHAI Sheping, TONG Tong, BAI Xifang. Blockchain-Based Attribute Proxy Re-Encryption Data Sharing Scheme [J]. Computer Engineering and Applications, 2023, 59(8): 270-279. |
[10] | WEI Zizuan, WANG Xin, YU Dan, MA Yao, CHEN Yongle. Defense Mechanism to Solve Eclipse Attack of POW Consensus [J]. Computer Engineering and Applications, 2023, 59(8): 280-287. |
[11] | WANG Xiaoguang, YIN Meng. Research on Two-Stage Pricing of Shipping Supply Chain Under Blockchain Platform [J]. Computer Engineering and Applications, 2023, 59(7): 319-327. |
[12] | JIANG Chengyang, PANG Jun, JIA Dayu, YU Minghe, XIN Junchang, LIU Chen. Research on Blockchain Expansion Combining Community Detection and Local Reconstruction Code [J]. Computer Engineering and Applications, 2023, 59(5): 297-304. |
[13] | LI Xiangyang, LIU Yang, YAN Zhiquan, LIU Xinlei, CAO Haohao, WANG Yaoqi. Research and Implementation of Intellectual Property Trading Platform Based on Blockchain [J]. Computer Engineering and Applications, 2023, 59(3): 308-316. |
[14] | WEI Kexin, LI Leixiao, GAO Haoyu, XIONG Xiao. Review and Prospect of Blockchain Access Control Technology in Internet of Vehicles [J]. Computer Engineering and Applications, 2023, 59(24): 26-45. |
[15] | LIU Xin, WANG Haiwen, SUN Zhijian, YANG Dawei, PANG Mingjiang. Research on Tracing Major Public Opinion Events Based on Double-Layer Blockchain [J]. Computer Engineering and Applications, 2023, 59(23): 263-272. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||