Block chain routing hijacking attack protection method and system

The invention discloses a block chain routing hijacking attack protection method and system. The method comprises the following steps that: a block chain node acquires routing equipment on a path between the block chain node and a peer-to-peer block chain node in an address table and a serial number...

Full description

Saved in:
Bibliographic Details
Main Authors ZHOU ZEMIN, WU DONGZHE, SONG JIANG, CHEN CAN, TIAN ZHIHONG, LU YUEMING, LI JIANING, WANG DONGBIN, WANG ZEDONG, ZHI HUI, SHI JINQIAO, YANG TAO, ZHOU DONGCHAO, ZHANG YU
Format Patent
LanguageChinese
English
Published 05.12.2023
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:The invention discloses a block chain routing hijacking attack protection method and system. The method comprises the following steps that: a block chain node acquires routing equipment on a path between the block chain node and a peer-to-peer block chain node in an address table and a serial number of a network autonomous system to which the routing equipment belongs; the block chain node selects a threshold number of peer-to-peer block chain nodes from an address table, and the autonomous system number of any routing device on the path between the block chain node and the peer-to-peer block chain nodes does not appear on all the paths; the blockchain node transmits the blockchain transaction to the selected threshold number of peer blockchain nodes. According to the method, the external connection path of the block chain node can be prevented from being converged to a network autonomous system controlled by an attacker, so that the attacker is prevented from hijacking the transaction flow of the block chain
Bibliography:Application Number: CN202310567552