Computer Science ›› 2019, Vol. 46 ›› Issue (12): 155-164.doi: 10.11896/jsjkx.190300041

• Information Security • Previous Articles     Next Articles

Double Blockchain Based Station Dynamic Loop Information Monitoring System

FAN Jian-feng1,2, LI Yi1, WU Wen-yuan1, FENG Yong1   

  1. (Chongqing Key Laboratory of Automated Reasoning and Cognition,Chongqing Institute of Green andIntelligent Technology,Chinese Academy of Sciences,Chongqing 400714,China)1;
    (University of Chinese Academy of Sciences,Beijing 100093,China)2
  • Received:2019-03-13 Online:2019-12-15 Published:2019-12-17

Abstract: The power and environment monitoring system of base station realizes the functions of the whole network base station power and environment monitoring and real-time alarm by constructing the base station intelligent monitoring unit on the underlying intelligent and non-intelligent devices.Therefore,the stability and safe operation of the po-wer and environment monitoring system is a prerequisite.However,as the number of base stations increases,the system in the central server architecture mode will show problems such as increased load and traffic overload,and the many-to-one mode is prone to DoS.Security issues such as attacks and data breaches.In addition,in multi-user mode,the existing system mode cannot achieve fine-grained access control.Aiming at the above problems,combined with the unique advantages of blockchain technology in distributed architecture,this paper proposed a double blockchain power and environment monitoring system of base station architecture based on improved PBFT consensus algorithm to solve the centralization,security,expansion and other.of the existing system problems.Specifically,the system is a hierarchical architecture information system,and each layer maintains a blockchain.the system is a dual-chain blockchain system that is maintained and shared by multiple nodes.One is responsible for the flow of cross-domain information in the form of a league chain,and the control of the authority,the other is responsible for the access control of the base station device and the flow of the base station transaction information in the form of a private chain.And achieves fine-grained access control of the device through PKI system and the key management system,and the improves block header to store the permission information.Finally,the results show that compared with the existing traditional system,the system of this paper proposed has certain advantages of multi-center service,anti-DoS attack,user-based fine-grained rights management,high degree of information encryption and good scalability through the qualitative analysis.

Key words: Power and environment monitoring system of base station, Blockchain, Distributed system security, PBFT consensus, Access control

CLC Number: 

  • TP315
[1] CHEN G.The Software Design and Implementation of VPN Base Remote Monitoring System for Base Station[D].Chengdu:University of Eledronic Sicence and Technology of China,2017.(in Chinese)陈刚.基于VPN的基站远程监控系统软件设计与实现[D].成都:电子科技大学,2017.
[2] LUO C.ZTE E-Guard:Forerunner of security industry[J].China Public Security,2013(19):93-94.(in Chinese)罗超.中兴力维:安防行业化的先行者[J].中国公共安全,2013(19):93-94.
[3] YAN B Y,WANG L G,LI H.Application and technology innovation of China tower moving ring monitoring system [J].China New Telecommunications,2018,20(12):142-143.(in Chinese)闫佰义,王联冠,李洪.中国铁塔动环监控系统的应用及技术创新[J].中国新通信,2018,20(12):142-143.
[4] NAKAMOTO S.Bitcoin:A peer-to-peer electronic cash system[M].Consulted,2008:24-26.
[5] DONET J A D,PÉREZ-SOLA C,HERRERA-JOANCOMARTÍ J.The bitcoin P2P network[C]//International Conference on Financial Cryptography and Data Security.Berlin:Springer,2014:87-102.
[6] STALLINGS W.Cryptography and network security:principles and practice[M].Upper Saddle River,NJ:Pearson,2017:743.
[7] MATTILA J.The blockchain phenomenon-the disruptive potential of distributed consensus architectures[R].ETLA Working Papers,2016.
[8] PETERS G W,PANAYI E.Understanding modern banking ledgers through blockchain technologies:Future of transaction processing and smart contracts on the internet of money[C]//Banking Beyond Banks and Money.Cham:Springer,2016:239-278.
[9] CHRISTIAN D,SEIDEL J,WATTENHOFER R.Bitcoin meets strong consistency[C]//Proceedings of the 17th International Conference on Distributed Computing and Networking.ACM,2016.
[10] EVANS D.Economic aspects of bitcoin and other decentralized public-ledger currency platforms[OL].http://www.law.uchicago.edu/Lawecon/index.html.
[11] WOOD G.Ethereum:A secure decentralised generalised transaction ledger[J].Ethereum Project Yellow Paper,2014(151):1-32.
[12] FABRIC-HYPERLEDGER H,HYPERLEDGER W G[OL].https://www.hyperledger.org/projects/fabric.
[13] RIVEST R.The MD5 message-digest algorithm[R].1992.
[14] EASTLAKE D,HANSEN T.US secure hash algorithms [OL].https://www.rfceditor.org/rfc/pdfrfc/rfc4634.txt.pdf.
[15] RIVEST R L,SHAMIR A,ADLEMAN L M.A method for obtaining digital signatures and public-key crypto systems.Communications of the ACM,1983,26(1):96-99.
[16] JOHNSON D,MENEZES A,VANSTONE S.The elliptic curve digital signature algorithm[J].International Journal of Information Security,2001,1(1):36-63.
[17] KRAVITZ D W.Digital signature algorithm[M].Washingto,USA:World Heritage Encyclopedia,1993.
[18] CASTRO M,LISKOV B.Practical Byzantine fault tolerance [C]//Proceedings of the Third Symposium on Operating Systems Design and Implementation.1999:173-186.
[19] DORRI A,KANHERE S S,JURDAK R,et al.Blockchain for IoT security and privacy:The case study of a smart home[C]//2017 IEEE International Conference on Pervasive Computing and Communications Workshops.IEEE,2017.
[20] EASTLAKE D,HANSEN T.US secure hash algorithms (SHA and HMAC-SHA) [OL].https://www.rfceditor.org/rfc/pdfrfc/rfc4634.txt.pdf.
[21] GAN J,LI Q,CHEN Z,et al.Improvement research of Blockchain Practical Byzantine FaultTolerance Consensus Algorithm[J].Journal of Computer Applications,2019(9):1-10. 甘俊,李强,陈子豪,等.区块链实用拜占庭容错共识算法的改进研究[J].计算机应用,2019(9):1-10.
[22] SANDHU,RAVI S.Role-based access control[J].Advances in Computers,1998,46:237-286.
[23] MYERS M,ANKNEY R,MALPANI A,et al.X.509 Internet public key infrastructure online certificate status protocol-OCSP:RFC 6960[R].1999.
[1] ZHANG Yan-mei, LOU Yin-cheng. Deep Neural Network Based Ponzi Scheme Contract Detection Method [J]. Computer Science, 2021, 48(1): 273-279.
[2] SHAO Wei-hui, WANG Ning, HAN Chuan-feng, XU Wei-sheng. Integrated Emergency-Defense System Based on Blockchain [J]. Computer Science, 2021, 48(1): 287-294.
[3] LI Ying, YU Ya-xin, ZHANG Hong-yu, LI Zhen-guo. High Trusted Cloud Storage Model Based on TBchain Blockchain [J]. Computer Science, 2020, 47(9): 330-338.
[4] WANG Jing-yu, LIU Si-rui. Research Progress on Risk Access Control [J]. Computer Science, 2020, 47(7): 56-65.
[5] LIU Shuai, GAN Guo-hua, LIU Ming-xi, FANG Yong, WANG Shou-yang. Multi-subblock Incentive Consensus Mechanism Based on Topology and Distribution Mechanism [J]. Computer Science, 2020, 47(7): 268-277.
[6] LU Ge-hao, XIE Li-hong and LI Xi-yu. Comparative Research of Blockchain Consensus Algorithm [J]. Computer Science, 2020, 47(6A): 332-339.
[7] GU Rong-Jie, WU Zhi-ping and SHI Huan. New Approach for Graded and Classified Cloud Data Access Control for Public Security Based on TFR Model [J]. Computer Science, 2020, 47(6A): 400-403.
[8] LIN Xu-dan, BAO Shi-Jian, ZHAO Li-xin and ZHAO Chen-lin. Design and Performance Analysis of Automotive Supply Chain System Based on Hyperledger Fabric [J]. Computer Science, 2020, 47(6A): 546-551.
[9] ZHANG Qi-ming, LU Jian-hua, LI Shou-zhi and XU Jian-dong. Building Innovative Enterprise Customer Service Technology Platform Based on Blockchain [J]. Computer Science, 2020, 47(6A): 639-642.
[10] YE Shao-jie, WANG Xiao-yi, XU Cai-chao, SUN Jian-ling. BitXHub:Side-relay Chain Based Heterogeneous Blockchain Interoperable Platform [J]. Computer Science, 2020, 47(6): 294-302.
[11] PAN Heng, LI Jing feng, MA Jun hu. Role Dynamic Adjustment Algorithm for Resisting Insider Threat [J]. Computer Science, 2020, 47(5): 313-318.
[12] XIE Ying-ying, SHI Jian, HUANG Shuo-kang, LEI Kai. Survey on Internet of Things Based on Named Data Networking Facing 5G [J]. Computer Science, 2020, 47(4): 217-225.
[13] WANG Hui, LIU Yu-xiang, CAO Shun-xiang, ZHOU Ming-ming. Medical Data Storage Mechanism Integrating Blockchain Technology [J]. Computer Science, 2020, 47(4): 285-291.
[14] FENG Tao, JIAO Ying, FANG Jun-li, TIAN Ye. Medical Health Data Security Model Based on Alliance Blockchain [J]. Computer Science, 2020, 47(4): 305-311.
[15] PAN Ji-fei,HUANG De-cai. Blockchain Dynamic Sharding Model Based on Jump Hash and Asynchronous Consensus Group [J]. Computer Science, 2020, 47(3): 273-280.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[2] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[3] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[4] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[5] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[6] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[7] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[8] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[9] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .
[10] WANG Zhen-chao, HOU Huan-huan and LIAN Rui. Path Optimization Scheme for Restraining Degree of Disorder in CMT[J]. Computer Science, 2018, 45(4): 122 -125 .