Power Terminal Identity Authentication Scheme for Disaster Recovery Environment DOI
L. Chen, Yuanyuan Ma, Tao Zhang

et al.

Published: Sept. 22, 2023

In order to ensure the trusted access of power collection terminals in a disaster recovery environment, this paper proposes cross-domain authentication scheme based on blockchain. Firstly, an improved PBFT algorithm reputation value election is designed, which increases calculation node and improves dynamic addition removal consensus nodes master failure conditions. Then, model for blockchain constructed. The certificate format protocol are security efficiency analyzed. analysis results show that has properties such as resistance distributed attacks, communication overhead lower than traditional algorithm.

Language: Английский

A secure and highly efficient blockchain PBFT consensus algorithm for microgrid power trading DOI Creative Commons
Zhongyuan Yao,

Yonghao Fang,

Heng Pan

et al.

Scientific Reports, Journal Year: 2024, Volume and Issue: 14(1)

Published: April 9, 2024

Abstract There are a series of challenges in microgrid transactions, and blockchain technology holds the promise addressing these challenges. However, with increasing number users existing systems may struggle to meet growing demands for transactions. Therefore, this paper proposes an efficient secure consensus algorithm designed large-scale electricity The begins by utilizing Spectral clustering partition network into different lower-level set based on transaction characteristics nodes. Subsequently, dual-layer process is employed enhance efficiency consensus. Additionally, we have leader election strategy promptly identify leaders excellent performance. Finally, introduced authentication method that combines zero-knowledge proofs key sharing further mitigate risk malicious nodes participating Theoretical analysis indicates our proposed algorithm, incorporating multiple layers security measures, effectively withstands attacks such as denial service. Simulation experiment results demonstrate outperforms similar algorithms significantly terms communication overhead, latency, throughput.

Language: Английский

Citations

4

Distribution network insulator detection based on improved ant colony algorithm and deep learning for UAV DOI Creative Commons
Yimin Zhou, Dong Zhang,

Xingming Ma

et al.

iScience, Journal Year: 2024, Volume and Issue: 27(6), P. 110119 - 110119

Published: May 27, 2024

Under the background of accelerating speed urban and rural construction, geographical environment overhead transmission lines has also changed greatly. Using unmanned aerial vehicle (UAV) to realize intelligent line inspection can significantly shorten time improve efficiency. In this paper, power UAVs is studied from two levels: path planning UAV control, insulator identified through actual image recognition. At level, improved swarm intelligence algorithm used conduct simulation experiments on flight find a safe effective route. Insulator identification defect location are trained dataset collected by deep learning technology achieve accurate efficiency inspection, which great application prospects in engineering.

Language: Английский

Citations

2

Improving byzantine fault tolerance based on stake evaluation and consistent hashing DOI
Guangfu Wu, Xin Lai, Daojing He

et al.

Peer-to-Peer Networking and Applications, Journal Year: 2024, Volume and Issue: 17(4), P. 1963 - 1975

Published: April 11, 2024

Language: Английский

Citations

0

Improving Byzantine Fault Tolerance Based on Stake Evaluation and Consistent Hashing DOI Creative Commons
Guangfu Wu, Xin Lai, Daojing He

et al.

Research Square (Research Square), Journal Year: 2023, Volume and Issue: unknown

Published: Nov. 2, 2023

Abstract In the context of distributed systems, Byzantine fault tolerance plays a critical role in ensuring normal operation system, particularly when facing with malicious nodes. However, challenges remain enhancing security and reliability fault-tolerant systems. This paper addresses these by improving approach based on stake evaluation improved consistency hashing. We propose method that leverages node stakes to enhance system allocating different trust values. Additionally, we introduce improvements hashing technique, enabling its effective environment. By introducing redundant nodes hash ring mitigate impact nodes, scalability. Experimental results demonstrate significant improvement performance using this approach. These findings suggest our holds considerable potential for widespread application field tolerance, supporting development more reliable blockchain

Language: Английский

Citations

0

Power Terminal Identity Authentication Scheme for Disaster Recovery Environment DOI
L. Chen, Yuanyuan Ma, Tao Zhang

et al.

Published: Sept. 22, 2023

In order to ensure the trusted access of power collection terminals in a disaster recovery environment, this paper proposes cross-domain authentication scheme based on blockchain. Firstly, an improved PBFT algorithm reputation value election is designed, which increases calculation node and improves dynamic addition removal consensus nodes master failure conditions. Then, model for blockchain constructed. The certificate format protocol are security efficiency analyzed. analysis results show that has properties such as resistance distributed attacks, communication overhead lower than traditional algorithm.

Language: Английский

Citations

0