拜占庭攻击下基于以太坊的智慧工厂安全防御策略
针对拜占庭攻击下智慧工厂的防御问题,本文提出了一种基于以太坊的安全机制.首先,本文提出一种基于参考圆的层级信息流动机制.在该机制下,系统将节点分为普通节点与关键节点,占多数的普通节点通过对占少数的关键节点的作恶概率进行评估,降低恶意关键节点作恶的成功率.其次,本文提出信誉驱动的贝叶斯推理方法作为普通节点评估恶意关键节点行为的凭据,通过综合考虑节点的信誉与节点间的物理距离等因素,提高评估准确率.最后,本文使用协作机械臂作为仿真场景验证所提出方法的可用性与有效性....
Saved in:
Published in | 控制理论与应用 Vol. 41; no. 8; pp. 1325 - 1334 |
---|---|
Main Authors | , , , , |
Format | Journal Article |
Language | Chinese |
Published |
中关村实验室,北京 100080%东南大学计算机科学与工程学院,江苏南京 211189
01.08.2024
北京航空航天大学自动化科学与电气工程学院,北京 100083 |
Subjects | |
Online Access | Get full text |
ISSN | 1000-8152 |
DOI | 10.7641/CTA.2023.20673 |
Cover
Loading…
Abstract | 针对拜占庭攻击下智慧工厂的防御问题,本文提出了一种基于以太坊的安全机制.首先,本文提出一种基于参考圆的层级信息流动机制.在该机制下,系统将节点分为普通节点与关键节点,占多数的普通节点通过对占少数的关键节点的作恶概率进行评估,降低恶意关键节点作恶的成功率.其次,本文提出信誉驱动的贝叶斯推理方法作为普通节点评估恶意关键节点行为的凭据,通过综合考虑节点的信誉与节点间的物理距离等因素,提高评估准确率.最后,本文使用协作机械臂作为仿真场景验证所提出方法的可用性与有效性. |
---|---|
AbstractList | 针对拜占庭攻击下智慧工厂的防御问题,本文提出了一种基于以太坊的安全机制.首先,本文提出一种基于参考圆的层级信息流动机制.在该机制下,系统将节点分为普通节点与关键节点,占多数的普通节点通过对占少数的关键节点的作恶概率进行评估,降低恶意关键节点作恶的成功率.其次,本文提出信誉驱动的贝叶斯推理方法作为普通节点评估恶意关键节点行为的凭据,通过综合考虑节点的信誉与节点间的物理距离等因素,提高评估准确率.最后,本文使用协作机械臂作为仿真场景验证所提出方法的可用性与有效性. |
Abstract_FL | This paper proposes an Ethereum-based security strategy to defend the Byzantine attack in the smart factories.Firstly,a reference circle-based hierarchical information flow mechanism is proposed,where the nodes in the smart factory are divided into the many common nodes and the few key nodes.The common nodes evaluate the possibility of the key nodes to behave maliciously,by which attacks from the key nodes are more likely to be unsuccessful.Secondly,a reputation-driven Bayesian inference method where the reputation of nodes,the physical distance between nodes are considered to improve the efficiency of evaluation of malicious behaviors.Finally,a series of simulation experiments are carried out using robotic arms and the simulation results are presented to verify the availability and effectiveness of the proposed method. |
Author | 张春阳 王爽 高庆 杨宪棋 吕金虎 |
AuthorAffiliation | 北京航空航天大学自动化科学与电气工程学院,北京 100083;中关村实验室,北京 100080%东南大学计算机科学与工程学院,江苏南京 211189 |
AuthorAffiliation_xml | – name: 北京航空航天大学自动化科学与电气工程学院,北京 100083;中关村实验室,北京 100080%东南大学计算机科学与工程学院,江苏南京 211189 |
Author_FL | WANG Shuang Lü Jin-hu ZHANG Chun-yang GAO Qing YANG Xian-qi |
Author_FL_xml | – sequence: 1 fullname: YANG Xian-qi – sequence: 2 fullname: GAO Qing – sequence: 3 fullname: Lü Jin-hu – sequence: 4 fullname: ZHANG Chun-yang – sequence: 5 fullname: WANG Shuang |
Author_xml | – sequence: 1 fullname: 杨宪棋 – sequence: 2 fullname: 高庆 – sequence: 3 fullname: 吕金虎 – sequence: 4 fullname: 张春阳 – sequence: 5 fullname: 王爽 |
BookMark | eNotj8tKw0AYhWdRwVq79RncpP7_TJJJlzV4g4Kbui6Ty4gaUjCIxKVYREu7UlFRVDAoQl24URLwaTIJvoUBXZxzdt_HmSO1cBD6hCwgtLip45Ld67QoUFaVyVmN1BEANAsNOkuaUbTjACAC5QbWyXIxulPjR5VOi4tMnWb510g9pHk6ybNEPb-p-_Py9qS4SYvhi_pM1ORYvZ-p4evP9Yf6fiqnV-VlMk9mpAgiv_m_DbK1utKz17Xu5tqG3elqEQJjGlJqoGSurnP0EVxPCEeCQylIpIZHJUNXCsQqvutQcAF1jyMXlu-a7bbHGmTxj3soQinC7f7u4GA_rIz9vaMgiOO4-qyDBZXsF0WrZRI |
ContentType | Journal Article |
Copyright | Copyright © Wanfang Data Co. Ltd. All Rights Reserved. |
Copyright_xml | – notice: Copyright © Wanfang Data Co. Ltd. All Rights Reserved. |
DBID | 2B. 4A8 92I 93N PSX TCJ |
DOI | 10.7641/CTA.2023.20673 |
DatabaseName | Wanfang Data Journals - Hong Kong WANFANG Data Centre Wanfang Data Journals 万方数据期刊 - 香港版 China Online Journals (COJ) China Online Journals (COJ) |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
DocumentTitle_FL | An Ethereum-based security defense strategy against the Byzantine attack in smart factories |
EndPage | 1334 |
ExternalDocumentID | kzllyyy202408003 |
GroupedDBID | -01 -0Y 2B. 4A8 5XA 5XJ 92H 92I 93N ABJNI ACGFS ALMA_UNASSIGNED_HOLDINGS CCEZO CCVFK CUBFJ CW9 PSX TCJ TGT U1G U5S UY8 |
ID | FETCH-LOGICAL-s1033-12251f3c4471e10cdaabf0b220f125d2f31cfa11fa1ecb20c014d717a8ec699d3 |
ISSN | 1000-8152 |
IngestDate | Thu May 29 04:08:30 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 8 |
Keywords | smart factories 智慧工厂 以太坊 Ethereum industrial security 拜占庭攻击 贝叶斯推理 工业安全 Bayesian inference Byzantine attack |
Language | Chinese |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-s1033-12251f3c4471e10cdaabf0b220f125d2f31cfa11fa1ecb20c014d717a8ec699d3 |
PageCount | 10 |
ParticipantIDs | wanfang_journals_kzllyyy202408003 |
PublicationCentury | 2000 |
PublicationDate | 2024-08-01 |
PublicationDateYYYYMMDD | 2024-08-01 |
PublicationDate_xml | – month: 08 year: 2024 text: 2024-08-01 day: 01 |
PublicationDecade | 2020 |
PublicationTitle | 控制理论与应用 |
PublicationTitle_FL | Control Theory & Applications |
PublicationYear | 2024 |
Publisher | 中关村实验室,北京 100080%东南大学计算机科学与工程学院,江苏南京 211189 北京航空航天大学自动化科学与电气工程学院,北京 100083 |
Publisher_xml | – name: 中关村实验室,北京 100080%东南大学计算机科学与工程学院,江苏南京 211189 – name: 北京航空航天大学自动化科学与电气工程学院,北京 100083 |
SSID | ssib001102751 ssib002258297 ssib023646306 ssib057620041 ssib051372463 ssj0042201 ssib023167526 |
Score | 2.4297676 |
Snippet | ... |
SourceID | wanfang |
SourceType | Aggregation Database |
StartPage | 1325 |
Title | 拜占庭攻击下基于以太坊的智慧工厂安全防御策略 |
URI | https://d.wanfangdata.com.cn/periodical/kzllyyy202408003 |
Volume | 41 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3Na9RAFA9le9GD-En9pIJzkq2ZmXzMHCe7KUWsF1vorSTZRMGygm0P7VEsosWeVFQUFSyKUA9elC341zRb_C9872V2Ny0e1MMub2d-8-Y372Uzb5L5cJwrbqJ9mRSqmXpB0PRknjVVrmTTdQshEh6qooNvdGdvBjPz3vUFf2GsMVGbtbS6kk5l639cV_I_XoU08Cuukv0Hzw6VQgLI4F_4Bg_D91_5mMUBUxHTLRb7TLWZcVGIDDNtzNIeiyLKCkmAnwrxkKKnEYYphqmYhIgZH7OMx4whTJspEEKmAeORQk2loFKAhVRXaEuBEiWoOAiaUkBWLNZMKxZRVhQzw1Eh0NMBaQaMX4-PSXlslSsoWMFcpkBQqNzSVkSbGgvNRAzQHk7LJbJtqp8YGWJtJLR-BNHMREiu0qKCUY6PNQI3gIDpNMeqoe0qrkOiFtk7QBXGHzRU1h-jCG84ia-68C11dA8ZKJKWKdZBTHVMxIBPa8Ddg78B4VtMh9ZnpnWVUxzOhG-VDq8CHQ7cWAlgh4HxrPljwgRYJCIPm3DAoALXDVx5OERjVteOxWg0iRFELmARx2sqJoyarjEZ0BXQ3VXHONk-EDcbUNw_0ElWu5PZm4Gq9XhcVgvXbfTEZfVs-nDPHAYe9sytOTMF1pdTeGqAHMUgw5mhd9eXltbW1gRtvUfb-I4LGAC6DWfctGdv3BqF-hxfuNdCT-HjKvHBb4E7PPijoQWekxDI0YwCn8tQ1E6CgGE33lmG08M8Iejo9KExqg1fsRnXDjaCVvt1i6R7uxaYzh13jtkR5aSpbg8nnLH1Oyedo7V9Rk85UX_zTfn0fdnb6T_bLR_t7v3YLN_19npbe7vb5ccv5dsn-68f9l_1-hufyu_b5daD8uvjcuPzr5ffyp8f9nde7D_fPu3MT8dzrZmmPTyluczxfEYOBuGFzDyIPnPuZp0kSQs3hWYVMKbpiELyrEg4h0-epcLNXO51Qh4mKs8CrTvyjNPo3uvmE85kkgS-7KSBz5XrpWGusk6gPKmCIhMwupRnncvWAov25ri8eNiP5_4Cc945MvpnXnAaK_dX84sQ8q-kl6z3fwNM57v8 |
linkProvider | EBSCOhost |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=%E6%8B%9C%E5%8D%A0%E5%BA%AD%E6%94%BB%E5%87%BB%E4%B8%8B%E5%9F%BA%E4%BA%8E%E4%BB%A5%E5%A4%AA%E5%9D%8A%E7%9A%84%E6%99%BA%E6%85%A7%E5%B7%A5%E5%8E%82%E5%AE%89%E5%85%A8%E9%98%B2%E5%BE%A1%E7%AD%96%E7%95%A5&rft.jtitle=%E6%8E%A7%E5%88%B6%E7%90%86%E8%AE%BA%E4%B8%8E%E5%BA%94%E7%94%A8&rft.au=%E6%9D%A8%E5%AE%AA%E6%A3%8B&rft.au=%E9%AB%98%E5%BA%86&rft.au=%E5%90%95%E9%87%91%E8%99%8E&rft.au=%E5%BC%A0%E6%98%A5%E9%98%B3&rft.date=2024-08-01&rft.pub=%E4%B8%AD%E5%85%B3%E6%9D%91%E5%AE%9E%E9%AA%8C%E5%AE%A4%2C%E5%8C%97%E4%BA%AC+100080%25%E4%B8%9C%E5%8D%97%E5%A4%A7%E5%AD%A6%E8%AE%A1%E7%AE%97%E6%9C%BA%E7%A7%91%E5%AD%A6%E4%B8%8E%E5%B7%A5%E7%A8%8B%E5%AD%A6%E9%99%A2%2C%E6%B1%9F%E8%8B%8F%E5%8D%97%E4%BA%AC+211189&rft.issn=1000-8152&rft.volume=41&rft.issue=8&rft.spage=1325&rft.epage=1334&rft_id=info:doi/10.7641%2FCTA.2023.20673&rft.externalDocID=kzllyyy202408003 |
thumbnail_s | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=http%3A%2F%2Fwww.wanfangdata.com.cn%2Fimages%2FPeriodicalImages%2Fkzllyyy%2Fkzllyyy.jpg |