计算机科学 ›› 2019, Vol. 46 ›› Issue (12): 155-164.doi: 10.11896/jsjkx.190300041

所属专题: 区块链技术

• 信息安全 • 上一篇    下一篇

基于双区块链的基站动环信息监控系统

樊建峰1,2, 李轶1, 吴文渊1, 冯勇1   

  1. (中国科学院重庆绿色智能技术研究院自动推理与认知重庆市重点实验室 重庆400714)1;
    (中国科学院大学 北京100093)2
  • 收稿日期:2019-03-13 出版日期:2019-12-15 发布日期:2019-12-17
  • 通讯作者: 李轶(1980-),男,副研究员,硕士生导师,CCF会员,主要研究方向为程序验证、符号计算、信息安全,E-mail:zm_liyi@163.com。
  • 作者简介:樊建峰(1993-),男,硕士生,CCF会员,主要研究方向为信息安全、区块链,E-mail:fanjianfeng17@mails.ucas.edu.cn;吴文渊(1976-),男,研究员,硕士生导师,主要研究方向为同伦计算、信息安全;冯勇(1965-),男,研究员,博士生导师,主要研究方向为数值混合计算。
  • 基金资助:
    本文受国家自然科学基金项目(61572024),重庆市自然科学基金(cstc2019jcyj-msxmx0638),重庆市院士牵头科技创新引导专项(cstc2017zdcy-yszxX0011,cstc2018jcyj-yszxX0002)资助。

Double Blockchain Based Station Dynamic Loop Information Monitoring System

FAN Jian-feng1,2, LI Yi1, WU Wen-yuan1, FENG Yong1   

  1. (Chongqing Key Laboratory of Automated Reasoning and Cognition,Chongqing Institute of Green andIntelligent Technology,Chinese Academy of Sciences,Chongqing 400714,China)1;
    (University of Chinese Academy of Sciences,Beijing 100093,China)2
  • Received:2019-03-13 Online:2019-12-15 Published:2019-12-17

摘要: 基站动环监控系统通过将基站智能监控单元构建在底层被监控的智能和非智能设备之上,实现全网基站动环信息的监控、实时告警等功能。因此,动环监控系统的稳定是安全运行的前提。但随着基站数量的增加,现阶段中心服务器架构模式下的系统会显现出负载增加、流量过载等问题,且多对一的模式下容易出现DoS攻击、数据泄露等安全问题;另外,在多用户模式下,现有的系统模式无法达到对细粒度访问权限的控制。针对上述问题,结合区块链技术在分布式架构上独特的优势,文中提出一种基于改进型PBFT共识算法的双区块链基站动环监控系统架构,来解决现有动环监控系统中心化、安全、扩展等问题。具体地,该系统是一种层次型架构的信息系统,且各层次各维护一条区块链,是一个多节点共同维护与共享的双链区块链系统。其中,一条以联盟链的形式负责跨域信息的流转和权限的控制,另一条以私有链的形式负责基站设备访问权限的控制以及基站事务信息的流转。同时,基于PKI系统和密钥管理系统的支持,以及改进型区块头对权限信息的存储,达到对设备的细粒度访问权限的控制。最后,定性分析的结果表明了,相较于现有的传统动环监控系统,文中系统具有多中心服务、抗DoS攻击、基于用户的细粒度权限管理、信息的加密完备程度高和扩展性好等特点。

关键词: PBFT共识算法, 分布式系统安全, 基站动环监控系统, 区块链, 权限控制

Abstract: The power and environment monitoring system of base station realizes the functions of the whole network base station power and environment monitoring and real-time alarm by constructing the base station intelligent monitoring unit on the underlying intelligent and non-intelligent devices.Therefore,the stability and safe operation of the po-wer and environment monitoring system is a prerequisite.However,as the number of base stations increases,the system in the central server architecture mode will show problems such as increased load and traffic overload,and the many-to-one mode is prone to DoS.Security issues such as attacks and data breaches.In addition,in multi-user mode,the existing system mode cannot achieve fine-grained access control.Aiming at the above problems,combined with the unique advantages of blockchain technology in distributed architecture,this paper proposed a double blockchain power and environment monitoring system of base station architecture based on improved PBFT consensus algorithm to solve the centralization,security,expansion and other.of the existing system problems.Specifically,the system is a hierarchical architecture information system,and each layer maintains a blockchain.the system is a dual-chain blockchain system that is maintained and shared by multiple nodes.One is responsible for the flow of cross-domain information in the form of a league chain,and the control of the authority,the other is responsible for the access control of the base station device and the flow of the base station transaction information in the form of a private chain.And achieves fine-grained access control of the device through PKI system and the key management system,and the improves block header to store the permission information.Finally,the results show that compared with the existing traditional system,the system of this paper proposed has certain advantages of multi-center service,anti-DoS attack,user-based fine-grained rights management,high degree of information encryption and good scalability through the qualitative analysis.

Key words: Access control, Blockchain, Distributed system security, PBFT consensus, Power and environment monitoring system of base station

中图分类号: 

  • TP315
[1]CHEN G.The Software Design and Implementation of VPN Base Remote Monitoring System for Base Station[D].Chengdu:University of Eledronic Sicence and Technology of China,2017.(in Chinese)
陈刚.基于VPN的基站远程监控系统软件设计与实现[D].成都:电子科技大学,2017.
[2]LUO C.ZTE E-Guard:Forerunner of security industry[J].China Public Security,2013(19):93-94.(in Chinese)
罗超.中兴力维:安防行业化的先行者[J].中国公共安全,2013(19):93-94.
[3]YAN B Y,WANG L G,LI H.Application and technology innovation of China tower moving ring monitoring system [J].China New Telecommunications,2018,20(12):142-143.(in Chinese)
闫佰义,王联冠,李洪.中国铁塔动环监控系统的应用及技术创新[J].中国新通信,2018,20(12):142-143.
[4]NAKAMOTO S.Bitcoin:A peer-to-peer electronic cash system[M].Consulted,2008:24-26.
[5]DONET J A D,PÉREZ-SOLA C,HERRERA-JOANCOMARTÍ J.The bitcoin P2P network[C]//International Conference on Financial Cryptography and Data Security.Berlin:Springer,2014:87-102.
[6]STALLINGS W.Cryptography and network security:principles and practice[M].Upper Saddle River,NJ:Pearson,2017:743.
[7]MATTILA J.The blockchain phenomenon-the disruptive potential of distributed consensus architectures[R].ETLA Working Papers,2016.
[8]PETERS G W,PANAYI E.Understanding modern banking ledgers through blockchain technologies:Future of transaction processing and smart contracts on the internet of money[C]//Banking Beyond Banks and Money.Cham:Springer,2016:239-278.
[9]CHRISTIAN D,SEIDEL J,WATTENHOFER R.Bitcoin meets strong consistency[C]//Proceedings of the 17th International Conference on Distributed Computing and Networking.ACM,2016.
[10]EVANS D.Economic aspects of bitcoin and other decentralized public-ledger currency platforms[OL].http://www.law.uchicago.edu/Lawecon/index.html.
[11]WOOD G.Ethereum:A secure decentralised generalised transaction ledger[J].Ethereum Project Yellow Paper,2014(151):1-32.
[12]FABRIC-HYPERLEDGER H,HYPERLEDGER W G[OL].https://www.hyperledger.org/projects/fabric.
[13]RIVEST R.The MD5 message-digest algorithm[R].1992.
[14]EASTLAKE D,HANSEN T.US secure hash algorithms [OL].https://www.rfceditor.org/rfc/pdfrfc/rfc4634.txt.pdf.
[15]RIVEST R L,SHAMIR A,ADLEMAN L M.A method for obtaining digital signatures and public-key crypto systems.Communications of the ACM,1983,26(1):96-99.
[16]JOHNSON D,MENEZES A,VANSTONE S.The elliptic curve digital signature algorithm[J].International Journal of Information Security,2001,1(1):36-63.
[17]KRAVITZ D W.Digital signature algorithm[M].Washingto,USA:World Heritage Encyclopedia,1993.
[18]CASTRO M,LISKOV B.Practical Byzantine fault tolerance [C]//Proceedings of the Third Symposium on Operating Systems Design and Implementation.1999:173-186.
[19]DORRI A,KANHERE S S,JURDAK R,et al.Blockchain for IoT security and privacy:The case study of a smart home[C]//2017 IEEE International Conference on Pervasive Computing and Communications Workshops.IEEE,2017.
[20]EASTLAKE D,HANSEN T.US secure hash algorithms (SHA and HMAC-SHA) [OL].https://www.rfceditor.org/rfc/pdfrfc/rfc4634.txt.pdf.
[21]GAN J,LI Q,CHEN Z,et al.Improvement research of Blockchain Practical Byzantine FaultTolerance Consensus Algorithm[J].Journal of Computer Applications,2019(9):1-10.
甘俊,李强,陈子豪,等.区块链实用拜占庭容错共识算法的改进研究[J].计算机应用,2019(9):1-10.
[22]SANDHU,RAVI S.Role-based access control[J].Advances in Computers,1998,46:237-286.
[23]MYERS M,ANKNEY R,MALPANI A,et al.X.509 Internet public key infrastructure online certificate status protocol-OCSP:RFC 6960[R].1999.
[1] 王子凯, 朱健, 张伯钧, 胡凯.
区块链与智能合约并行方法研究与实现
Research and Implementation of Parallel Method in Blockchain and Smart Contract
计算机科学, 2022, 49(9): 312-317. https://doi.org/10.11896/jsjkx.210800102
[2] 周航, 姜河, 赵琰, 解相朋.
适用于各单元共识交易的电力区块链系统优化调度研究
Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit
计算机科学, 2022, 49(6A): 771-776. https://doi.org/10.11896/jsjkx.210600241
[3] 李博, 向海昀, 张宇翔, 廖浩德.
面向食品溯源场景的PBFT优化算法应用研究
Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios
计算机科学, 2022, 49(6A): 723-728. https://doi.org/10.11896/jsjkx.210800018
[4] 傅丽玉, 陆歌皓, 吴义明, 罗娅玲.
区块链技术的研究及其发展综述
Overview of Research and Development of Blockchain Technology
计算机科学, 2022, 49(6A): 447-461. https://doi.org/10.11896/jsjkx.210600214
[5] 高健博, 张家硕, 李青山, 陈钟.
RegLang:一种面向监管的智能合约编程语言
RegLang:A Smart Contract Programming Language for Regulation
计算机科学, 2022, 49(6A): 462-468. https://doi.org/10.11896/jsjkx.210700016
[6] 毛典辉, 黄晖煜, 赵爽.
符合监管合规性的自动合成新闻检测方法研究
Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance
计算机科学, 2022, 49(6A): 523-530. https://doi.org/10.11896/jsjkx.210300083
[7] 王思明, 谭北海, 余荣.
面向6G可信可靠智能的区块链分片与激励机制
Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence
计算机科学, 2022, 49(6): 32-38. https://doi.org/10.11896/jsjkx.220400004
[8] 孙浩, 毛瀚宇, 张岩峰, 于戈, 徐石成, 何光宇.
区块链跨链技术发展及应用
Development and Application of Blockchain Cross-chain Technology
计算机科学, 2022, 49(5): 287-295. https://doi.org/10.11896/jsjkx.210800132
[9] 阳真, 黄松, 郑长友.
基于区块链与改进CP-ABE的众测知识产权保护技术研究
Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE
计算机科学, 2022, 49(5): 325-332. https://doi.org/10.11896/jsjkx.210900075
[10] 任畅, 赵洪, 蒋华.
一种量子安全拜占庭容错共识机制
Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism
计算机科学, 2022, 49(5): 333-340. https://doi.org/10.11896/jsjkx.210400154
[11] 冯了了, 丁滟, 刘坤林, 马科林, 常俊胜.
区块链BFT共识算法研究进展
Research Advance on BFT Consensus Algorithms
计算机科学, 2022, 49(4): 329-339. https://doi.org/10.11896/jsjkx.210700011
[12] 王鑫, 周泽宝, 余芸, 陈禹旭, 任昊文, 蒋一波, 孙凌云.
一种面向电能量数据的联邦学习可靠性激励机制
Reliable Incentive Mechanism for Federated Learning of Electric Metering Data
计算机科学, 2022, 49(3): 31-38. https://doi.org/10.11896/jsjkx.210700195
[13] 张潆藜, 马佳利, 刘子昂, 刘新, 周睿.
以太坊Solidity智能合约漏洞检测方法综述
Overview of Vulnerability Detection Methods for Ethereum Solidity Smart Contracts
计算机科学, 2022, 49(3): 52-61. https://doi.org/10.11896/jsjkx.210700004
[14] 杨昕宇, 彭长根, 杨辉, 丁红发.
基于演化博弈的理性拜占庭容错共识算法
Rational PBFT Consensus Algorithm with Evolutionary Game
计算机科学, 2022, 49(3): 360-370. https://doi.org/10.11896/jsjkx.210900110
[15] 范家幸, 王志伟.
基于门限环签名的分级匿名表决方案
Hierarchical Anonymous Voting Scheme Based on Threshold Ring Signature
计算机科学, 2022, 49(1): 321-327. https://doi.org/10.11896/jsjkx.201000032
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!