论文标题
区块链通过时空镜头进行分叉的主动防御分析
Active Defense Analysis of Blockchain Forking through the Spatial-Temporal Lens
论文作者
论文摘要
分叉违反了区块链的安全性和性能,因为它是分布式共识的症状,激发了人们对分析和解决它的广泛兴趣。最先进的作品可以分为两种:基于实验和基于模型的。但是,由于派生的观察结果是特定于方案的,前者的排他性缺乏。因此,抽象揭示清晰的分叉定律是有问题的。此外,在后者中建立的模型无空间性,这完全忽略了以下事实:在给定拓扑结构下,分叉本质上是不良结果。此外,很少有正在进行的研究屈服于主动的防御机制,但只能被动地承认,这阻碍了预防分叉的预防,并且无法阻止源头。在本文中,我们通过对空间临时维度进行区块链分叉的主动防御分析来填补空白。我们的作品以以下两个特征为特征:1)双维。我们考虑了除时间特征以外的区块链覆盖网络的空间性,基于该网络特征,提出了一个空间 - 周期性模型,以用于区块链中的信息传播; 2)主动防御。我们暗示,缩小了远程链接因子,这表明链接的远程连接能力可以完全从根本上减少分叉。据我们所知,我们是第一个从时空的角度检查分叉的人,以便主动提出对策。进行坚实的理论推导和广泛的模拟,以证明我们分析的有效性和有效性是合理的。
Forking breaches the security and performance of blockchain as it is symptomatic of distributed consensus, spurring wide interest in analyzing and resolving it. The state-of-the-art works can be categorized into two kinds: experiment-based and model-based. However, the former falls short in exclusiveness since the derived observations are scenario-specific. Hence, it is problematic to abstractly reveal the crystal-clear forking laws. Besides, the models established in the latter are spatiality-free, which totally overlook the fact that forking is essentially an undesirable result under a given topology. Moreover, few of the ongoing studies have yielded to the active defense mechanisms but only recognized forking passively, which impedes forking prevention and cannot deter it at the source. In this paper, we fill the gap by carrying out the active defense analysis of blockchain forking from the spatial-temporal dimension. Our work is featured by the following two traits: 1) dual dimensions. We consider the spatiality of blockchain overlay network besides temporal characteristics, based on which, a spatial-temporal model for information propagation in blockchain is proposed; 2) active defense. We hint that shrinking the long-range link factor, which indicates the remote connection ability of a link, can cut down forking completely fundamentally. To the best of our knowledge, we are the first to inspect forking from the spatial-temporal perspective, so as to present countermeasures proactively. Solid theoretical derivations and extensive simulations are conducted to justify the validity and effectiveness of our analysis.