Computer Science ›› 2019, Vol. 46 ›› Issue (12): 155-164.doi: 10.11896/jsjkx.190300041

Special Issue: Block Chain Technology

• Information Security • Previous Articles     Next Articles

Double Blockchain Based Station Dynamic Loop Information Monitoring System

FAN Jian-feng1,2, LI Yi1, WU Wen-yuan1, FENG Yong1   

  1. (Chongqing Key Laboratory of Automated Reasoning and Cognition,Chongqing Institute of Green andIntelligent Technology,Chinese Academy of Sciences,Chongqing 400714,China)1;
    (University of Chinese Academy of Sciences,Beijing 100093,China)2
  • Received:2019-03-13 Online:2019-12-15 Published:2019-12-17

Abstract: The power and environment monitoring system of base station realizes the functions of the whole network base station power and environment monitoring and real-time alarm by constructing the base station intelligent monitoring unit on the underlying intelligent and non-intelligent devices.Therefore,the stability and safe operation of the po-wer and environment monitoring system is a prerequisite.However,as the number of base stations increases,the system in the central server architecture mode will show problems such as increased load and traffic overload,and the many-to-one mode is prone to DoS.Security issues such as attacks and data breaches.In addition,in multi-user mode,the existing system mode cannot achieve fine-grained access control.Aiming at the above problems,combined with the unique advantages of blockchain technology in distributed architecture,this paper proposed a double blockchain power and environment monitoring system of base station architecture based on improved PBFT consensus algorithm to solve the centralization,security,expansion and other.of the existing system problems.Specifically,the system is a hierarchical architecture information system,and each layer maintains a blockchain.the system is a dual-chain blockchain system that is maintained and shared by multiple nodes.One is responsible for the flow of cross-domain information in the form of a league chain,and the control of the authority,the other is responsible for the access control of the base station device and the flow of the base station transaction information in the form of a private chain.And achieves fine-grained access control of the device through PKI system and the key management system,and the improves block header to store the permission information.Finally,the results show that compared with the existing traditional system,the system of this paper proposed has certain advantages of multi-center service,anti-DoS attack,user-based fine-grained rights management,high degree of information encryption and good scalability through the qualitative analysis.

Key words: Access control, Blockchain, Distributed system security, PBFT consensus, Power and environment monitoring system of base station

CLC Number: 

  • TP315
[1]CHEN G.The Software Design and Implementation of VPN Base Remote Monitoring System for Base Station[D].Chengdu:University of Eledronic Sicence and Technology of China,2017.(in Chinese)
陈刚.基于VPN的基站远程监控系统软件设计与实现[D].成都:电子科技大学,2017.
[2]LUO C.ZTE E-Guard:Forerunner of security industry[J].China Public Security,2013(19):93-94.(in Chinese)
罗超.中兴力维:安防行业化的先行者[J].中国公共安全,2013(19):93-94.
[3]YAN B Y,WANG L G,LI H.Application and technology innovation of China tower moving ring monitoring system [J].China New Telecommunications,2018,20(12):142-143.(in Chinese)
闫佰义,王联冠,李洪.中国铁塔动环监控系统的应用及技术创新[J].中国新通信,2018,20(12):142-143.
[4]NAKAMOTO S.Bitcoin:A peer-to-peer electronic cash system[M].Consulted,2008:24-26.
[5]DONET J A D,PÉREZ-SOLA C,HERRERA-JOANCOMARTÍ J.The bitcoin P2P network[C]//International Conference on Financial Cryptography and Data Security.Berlin:Springer,2014:87-102.
[6]STALLINGS W.Cryptography and network security:principles and practice[M].Upper Saddle River,NJ:Pearson,2017:743.
[7]MATTILA J.The blockchain phenomenon-the disruptive potential of distributed consensus architectures[R].ETLA Working Papers,2016.
[8]PETERS G W,PANAYI E.Understanding modern banking ledgers through blockchain technologies:Future of transaction processing and smart contracts on the internet of money[C]//Banking Beyond Banks and Money.Cham:Springer,2016:239-278.
[9]CHRISTIAN D,SEIDEL J,WATTENHOFER R.Bitcoin meets strong consistency[C]//Proceedings of the 17th International Conference on Distributed Computing and Networking.ACM,2016.
[10]EVANS D.Economic aspects of bitcoin and other decentralized public-ledger currency platforms[OL].http://www.law.uchicago.edu/Lawecon/index.html.
[11]WOOD G.Ethereum:A secure decentralised generalised transaction ledger[J].Ethereum Project Yellow Paper,2014(151):1-32.
[12]FABRIC-HYPERLEDGER H,HYPERLEDGER W G[OL].https://www.hyperledger.org/projects/fabric.
[13]RIVEST R.The MD5 message-digest algorithm[R].1992.
[14]EASTLAKE D,HANSEN T.US secure hash algorithms [OL].https://www.rfceditor.org/rfc/pdfrfc/rfc4634.txt.pdf.
[15]RIVEST R L,SHAMIR A,ADLEMAN L M.A method for obtaining digital signatures and public-key crypto systems.Communications of the ACM,1983,26(1):96-99.
[16]JOHNSON D,MENEZES A,VANSTONE S.The elliptic curve digital signature algorithm[J].International Journal of Information Security,2001,1(1):36-63.
[17]KRAVITZ D W.Digital signature algorithm[M].Washingto,USA:World Heritage Encyclopedia,1993.
[18]CASTRO M,LISKOV B.Practical Byzantine fault tolerance [C]//Proceedings of the Third Symposium on Operating Systems Design and Implementation.1999:173-186.
[19]DORRI A,KANHERE S S,JURDAK R,et al.Blockchain for IoT security and privacy:The case study of a smart home[C]//2017 IEEE International Conference on Pervasive Computing and Communications Workshops.IEEE,2017.
[20]EASTLAKE D,HANSEN T.US secure hash algorithms (SHA and HMAC-SHA) [OL].https://www.rfceditor.org/rfc/pdfrfc/rfc4634.txt.pdf.
[21]GAN J,LI Q,CHEN Z,et al.Improvement research of Blockchain Practical Byzantine FaultTolerance Consensus Algorithm[J].Journal of Computer Applications,2019(9):1-10.
甘俊,李强,陈子豪,等.区块链实用拜占庭容错共识算法的改进研究[J].计算机应用,2019(9):1-10.
[22]SANDHU,RAVI S.Role-based access control[J].Advances in Computers,1998,46:237-286.
[23]MYERS M,ANKNEY R,MALPANI A,et al.X.509 Internet public key infrastructure online certificate status protocol-OCSP:RFC 6960[R].1999.
[1] GUO Peng-jun, ZHANG Jing-zhou, YANG Yuan-fan, YANG Shen-xiang. Study on Wireless Communication Network Architecture and Access Control Algorithm in Aircraft [J]. Computer Science, 2022, 49(9): 268-274.
[2] WANG Zi-kai, ZHU Jian, ZHANG Bo-jun, HU Kai. Research and Implementation of Parallel Method in Blockchain and Smart Contract [J]. Computer Science, 2022, 49(9): 312-317.
[3] FU Li-yu, LU Ge-hao, WU Yi-ming, LUO Ya-ling. Overview of Research and Development of Blockchain Technology [J]. Computer Science, 2022, 49(6A): 447-461.
[4] GAO Jian-bo, ZHANG Jia-shuo, LI Qing-shan, CHEN Zhong. RegLang:A Smart Contract Programming Language for Regulation [J]. Computer Science, 2022, 49(6A): 462-468.
[5] MAO Dian-hui, HUANG Hui-yu, ZHAO Shuang. Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance [J]. Computer Science, 2022, 49(6A): 523-530.
[6] ZHOU Hang, JIANG He, ZHAO Yan, XIE Xiang-peng. Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit [J]. Computer Science, 2022, 49(6A): 771-776.
[7] LI Bo, XIANG Hai-yun, ZHANG Yu-xiang, LIAO Hao-de. Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios [J]. Computer Science, 2022, 49(6A): 723-728.
[8] WANG Si-ming, TAN Bei-hai, YU Rong. Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence [J]. Computer Science, 2022, 49(6): 32-38.
[9] SUN Hao, MAO Han-yu, ZHANG Yan-feng, YU Ge, XU Shi-cheng, HE Guang-yu. Development and Application of Blockchain Cross-chain Technology [J]. Computer Science, 2022, 49(5): 287-295.
[10] YANG Zhen, HUANG Song, ZHENG Chang-you. Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE [J]. Computer Science, 2022, 49(5): 325-332.
[11] REN Chang, ZHAO Hong, JIANG Hua. Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism [J]. Computer Science, 2022, 49(5): 333-340.
[12] FENG Liao-liao, DING Yan, LIU Kun-lin, MA Ke-lin, CHANG Jun-sheng. Research Advance on BFT Consensus Algorithms [J]. Computer Science, 2022, 49(4): 329-339.
[13] YANG Xin-yu, PENG Chang-gen, YANG Hui, DING Hong-fa. Rational PBFT Consensus Algorithm with Evolutionary Game [J]. Computer Science, 2022, 49(3): 360-370.
[14] WANG Xin, ZHOU Ze-bao, YU Yun, CHEN Yu-xu, REN Hao-wen, JIANG Yi-bo, SUN Ling-yun. Reliable Incentive Mechanism for Federated Learning of Electric Metering Data [J]. Computer Science, 2022, 49(3): 31-38.
[15] ZHANG Ying-li, MA Jia-li, LIU Zi-ang, LIU Xin, ZHOU Rui. Overview of Vulnerability Detection Methods for Ethereum Solidity Smart Contracts [J]. Computer Science, 2022, 49(3): 52-61.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!