The PBFT consensus algorithm commonly used in the consortium chain has the disadvantages of three-stage consensus process, resulting in high communication costs. This paper proposes an enhanced PBFT algorithm that utilizes a credit mechanism to select master nodes that can improve system availability. The three-stage consensus process of PBFT is optimized, and the master node collects the confirmation messages broadcast by the whole network during the confirmation stage, effectively reducing communication overhead. At the same time, the block height synchronization mechanism is used to ensure the high consistency of consensus node blocks, restore the block height of failed nodes, and achieve fast consensus. Empirical results show that the improved P-PBFT consensus algorithm effectively reduces resource consumption and latency.
Storage scalability has become one of the bottlenecks of blockchain development. This paper proposes a blockchain storage scaling model based on redundant residual system (RRNS). The model divides the blockchain into high security blocks and low security blocks, and adopts different storage strategies for them. Among them, low security blocks are stored in the form of whole network storage (all nodes need to be saved), and high security blocks are partitioned by RRNS based segmentation algorithm and stored in a distributed form. In addition, the redundant residue system(RRNS)is used to detect and correct errors to prevent malicious node attacks, thereby improving data stability and integrity. The experimental results and security analysis show that the proposed model not only has security and fault tolerance, but also guarantees the integrity of data, effectively reduces the storage consumption of nodes, and enhances the storage of the blockchain system Scalability.
KEYWORDS: Data privacy, Data transmission, Computer security, Network security, Sensors, Data communications, Data modeling, Information security, Target detection, Sensor networks
Wireless Body Area Network (WBAN) is radio frequency-based wireless network technology. It is currently widely used in sports, medical health and other fields. WBAN often transmits the user's body monitoring data, such as heart rate, pulse, blood pressure and other personal privacy data. These sensitive data are bound to face a serious risk of data leakage or malicious tampering. In order to solve the privacy security of user data in WBAN environment, this paper proposes an improved privacy protection strategy. This strategy selects a portion of the region so that the phantom nodes are evenly distributed around the source nodes, and the adjacent packet space has a certain angle, in addition to increasing the diversity of the path from the source node to the base station by selecting the peer node. The simulation results show that the strategy can provide better privacy data protection without adding too many child nodes, and extend the security time.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.