Computer Science ›› 2023, Vol. 50 ›› Issue (6): 322-329.doi: 10.11896/jsjkx.220500171
• Computer Network • Previous Articles Next Articles
LIU Wei1,2,3, GUO Lingbei1,2, XIA Yujie1,2, SHE Wei1,2,3, TIAN Zhao1,2
CLC Number:
[1]LI X H,ZHONG C,CHEN Y,et al.Overview of Internet of Vehicles Security [J].Journal of Information Security,2019,4(3):17-33. [2]CHENG G,GUO D.Research on the current situation and development of the Internet of Vehicles [J].Mobile Communication,2011,35(17):23-26. [3]HUANG Z Z,ZHANG X D,ZHAO J H.Design of Knowledge Sharing Mechanism Based on Blockchain [J].Journal of Chongqing University of Technology(Natural Sciences),2021,35(9):143-151. [4]YUAN Y,WANG F Y.Development Status and Prospect of Blockchain Technology [J].Acta Automatica Sinica,2016,42(4):481-494. [5]ZHANG L,LUO M,LI J,et al.Blockchain based secure datasharing system for Internet of vehicles:A position paper[J].Vehicular Communications,2019,16:85-93. [6]KANG J,XIONG Z,NIYATO D,et al.Toward secure blockchain-enabled internet of vehicles:Optimizing consensus ma-nagement using reputation and contract theory[J].IEEE Tran-sactions on Vehicular Technology,2019,68(3):2906-2920. [7]LI Z J,ZHANG G A,CHEN W W.Security CommunicationStrategy of Internet of Vehicles Based on Blockchain[J].Computer Engineering,2021,47(10):43-51. [8]CHEN W W,CAO L,SHAO C H.An efficient anonymous authentication scheme for the Internet of Vehicles based on blockchain technology [J].Computer Applications,2020,40(10):2992-2999. [9]HASROUNY H,SAMHAT A E,BASSIL C,et al.VANet security challenges and solutions:A survey[J].Vehicular Communications,2017,7:7-20. [10]PARKINSON S,WARD P,WILSON K,et al.Cyber threats facing autonomous and connected vehicles:Future challenges[J].IEEE Transactions on Intelligent Transportation Systems,2017,18(11):2898-2915. [11]ZHANG Y,ZHANG K,CAO J Y.Internet of Vehicles Driven by Edge Intelligence [J].Journal of the Internet of Things,2018,2(4):40-48. [12]CHOWDHURY M,GAWANDE A,WANG L.Secure information sharing among autonomous vehicles in NDN[C]//2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation(IoTDI).IEEE,2017:15-26. [13]LIU F,WANG Y F,YANG J,et al.A High-Threshold Signature Protocol Integrating DKG and BLS Based on Blockchain[J].Computer Science,2021,48(11):46-53. [14]HUANG D.Electronic Evidence Authentication and Encryption Scheme Combining Blockchain and ring Signature [J].Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition),2022,34(1):16-23. [15]ZHU X M,LIU B,BAI X,et al.Research on Wireless Blockchain Security of CSMA/CA Network Protocol [J].Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition),2022,34(1):6-15. [16]XIONG X,LI L X,GAO J,et al.Research progress of blockchain in the field of Internet of Vehicles data sharing[J].Computer Science and Exploration,2022,16(5):1008-1024. [17]ZHONG Z S.An Improved PoS Consensus Algorithm Based on Blockchain [J].Journal of Chongqing Technology and Business University(Natural Science Edition),2021,38(4):36-41. [18]LIU F,YANG J,LI Z B,et al.A Secure Multi-Party Computation Protocol Based on Blockchain for Universal Data Privacy Protection [J].Computer Research and Development,2021,58(2):281-290. [19]GE L,JI X S,JIANG T,et al.IoT information sharing security mechanism based on blockchain technology [J].Computer Applications,2019,39(2):458-463. [20]WANG Z,LI T,WANG H,et al.{CRaft}:An Erasure-coding-supported Version of Raft for Reducing Storage Cost and Network Cost[C]//18th USENIX Conference on File and Storage Technologies(FAST 20).2020:297-308. [21]TAN D,HU J,WANG J.VBBFT-Raft:an understandable block-chain consensus protocol with high performance[C]//2019 IEEE 7th International Conference on Computer Science and Network Technology(ICCSNT).IEEE,2019:111-115. [22]WANG R,ZHANG L,ZHOU H,et al.A byzantine fault tolerance raft algorithm combines with BLS signature[J].Journal of Applied Sciences,2020,38(1):93-104. [23]TIAN S,LIU Y,ZHANG Y,et al.A Byzantine Fault-Tolerant Raft Algorithm Combined with Schnorr Signature[C]//2021 15th International Conference on Ubiquitous Information Ma-nagement and Communication(IMCOM).IEEE,2021:1-5. [24]CHEN Y,LIU P,ZHANG W.Raft consensus algorithm based on credit model in consortium blockchain[J].Wuhan University Journal of Natural Sciences,2020,25(2):146-154. [25]ZHOU S,YING B.VG-Raft:An Improved Byzantine Fault To-lerant Algorithm Based on Raft Algorithm[C]//2021 IEEE 21st International Conference on Communication Technology(ICCT).IEEE,2021:882-886. [26]WANG L,BAI Y,JIANG Q,et al.Beh-Raft-Chain:A behavior-based fast blockchain protocol for complex networks[J].IEEE Transactions on Network Science and Engineering,2020,8(2):1154-1166. [27]HUANG D Y,LI L,CHEN B,et al.RBFT:Byzantine FaultTolerant Consensus Mechanism Based on Raft Cluster [J].Journal of Communications,2021,42(3):209-219. [28]GAO W,MU W,HUANG S,et al.Improved Byzantine Fault-Tolerant Algorithm Based on Alliance Chain[J].Wireless Communications and Mobile Computing,2021,2021:1-10. |
[1] | YANG Jian, WANG Kaixuan. Tripartite Evolutionary Game Analysis of Medical Data Sharing Under Blockchain Architecture [J]. Computer Science, 2023, 50(6A): 221000080-7. |
[2] | TAN Pengliu, WANG Runshu, ZENG Wenhao, WANG Shikun, ZOU Wenshi. Overview of Blockchain Consensus Algorithms [J]. Computer Science, 2023, 50(6A): 220400200-12. |
[3] | HUANG Baohua, PENG Li, ZHAO Weihong, CHEN Ningjiang. Practical Byzantine Consensus Algorithm Based on Verifiable Random Functions [J]. Computer Science, 2023, 50(6A): 220300064-6. |
[4] | LIN Feilong, YUE Yuedong, ZHENG Jianhui, CHEN Zhongyu, LI Minglu. Blockchain-based Identity Authentication and Authorization Mechanism [J]. Computer Science, 2023, 50(6A): 220700158-9. |
[5] | PAN Lu, LUO Tao, NIU Xinzheng. Restart and Recovery Algorithm Based on Distributed Cluster Nodes [J]. Computer Science, 2023, 50(6A): 220300205-6. |
[6] | XIAO Jian, YANG Min. Multi-factor Blockchain Private Key Protection Scheme Based on Secret Sharing [J]. Computer Science, 2023, 50(6): 307-312. |
[7] | ZHANG Shue, TIAN Chengwei, LI Baogang. Review of Identity Authentication Research Based on Blockchain Technology [J]. Computer Science, 2023, 50(5): 329-347. |
[8] | LIU Zerun, ZHENG Hong, QIU Junjie. Smart Contract Vulnerability Detection Based on Abstract Syntax Tree Pruning [J]. Computer Science, 2023, 50(4): 317-322. |
[9] | LI Bei, WU Hao, HE Xiaowei, WANG Bin, XU Ergang. Survey of Storage Scalability in Blockchain Systems [J]. Computer Science, 2023, 50(1): 318-333. |
[10] | CHEN Yan, LIN Bing, CHEN Xiaona, CHEN Xing. Blockchain-based Trusted Service-oriented Architecture [J]. Computer Science, 2023, 50(1): 342-350. |
[11] | WANG Zi-kai, ZHU Jian, ZHANG Bo-jun, HU Kai. Research and Implementation of Parallel Method in Blockchain and Smart Contract [J]. Computer Science, 2022, 49(9): 312-317. |
[12] | FU Li-yu, LU Ge-hao, WU Yi-ming, LUO Ya-ling. Overview of Research and Development of Blockchain Technology [J]. Computer Science, 2022, 49(6A): 447-461. |
[13] | GAO Jian-bo, ZHANG Jia-shuo, LI Qing-shan, CHEN Zhong. RegLang:A Smart Contract Programming Language for Regulation [J]. Computer Science, 2022, 49(6A): 462-468. |
[14] | MAO Dian-hui, HUANG Hui-yu, ZHAO Shuang. Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance [J]. Computer Science, 2022, 49(6A): 523-530. |
[15] | CHEN Yan-bing, ZHONG Chao-ran, ZHOU Chao-ran, XUE Ling-yan, HUANG Hai-ping. Design of Cross-domain Authentication Scheme Based on Medical Consortium Chain [J]. Computer Science, 2022, 49(6A): 537-543. |
|