• Title/Summary/Keyword: 블록체인 네트워크 모델

Search Result 48, Processing Time 0.025 seconds

Design of Blockchain Model for Ransomware Prevention (랜섬웨어 방지를 위한 블록체인 활용 모델에 대한 설계)

  • An, Jung-hyun;Kim, Ki-chun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.314-316
    • /
    • 2017
  • Ransomware, a malicious program that requires money and then locks computers and files on network users for financial harvesting, will continue to evolve. Ransomware is a threat in mail systems that send and receive business information. By using Block Chain, Distributed Ledger technology, it is designed to be a safe mail system in which the automatically generated Ramsomware symptom data is directly linked to the security policy in the enterprise.

  • PDF

Anonymous Blockchain Voting Model using the Master Node Network (마스터 노드 네트워크를 사용한 블록체인 익명 투표 모델)

  • Cho, Jae-Han;Lee, Lee-Sub;Choi, Chang-Hoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.5
    • /
    • pp.394-402
    • /
    • 2021
  • Electronic voting systems have been widely used in many countries around the world since the mid-1990s. In recent years, studies have applied blockchain to existing electronic voting systems in order to provide reliability, fairness, and transparency for voters. This approach is highly useful as a technology that promotes decentralized citizen participation. However, the existing electronic voting systems using blockchain have not sufficiently considered anonymity. Lack of anonymity acts as an important constraint in cases of small- and medium-sized voting, which is often required in decentralized citizen participation. In this study, we propose a model that provides anonymity to a voting system using blockchain by applying the concept of the master node in Dash cryptocurrency. First, we define the differences in the requirements of the transfer and voting systems in blockchain. We propose a parallel and autonomous model and algorithm to provide anonymity in the blockchain-that is, a decentralized development environment. In addition, a discussion of security and the environment for the proposed model is described.

A Study on the Production and Consumption Authentication Power Trading System based on Big Data Analysis using Blockchain Network (블록체인 네트워크를 이용한 빅데이터 분석 기반 생산·소비량 인증 전력 거래 시스템에 관한 연구)

  • Kim, Young-Gon;Heo, Keol;Choi, Jung-In
    • Journal of Energy Engineering
    • /
    • v.28 no.4
    • /
    • pp.76-81
    • /
    • 2019
  • This paper is a review of the certification system required for various energy prosumer business models, including P2P energy trading and participation in small demand response programs, which are based on reliable production and consumption certification. One of the most important parameter in energy trading is ensuring the reliability of trading account balancing. Therefore, we studied to use big data pattern analysis based blockchain smart contract between trading partners to make its tradings are more reliable. For this purpose big data analysis system collected from the IoT AMI and a production authentication system using a private blockchain network linked with the AMI is discussed, using the blockchain smart contract are also suggested. Futhermore, energy trading system concept and business models are introduced.

Blockchain-based lightweight consensus algorithm (L-PBFT) for building trust networks in IoT environment (IoT 환경에서 신뢰 네트워크 구축을 위한 블록체인 기반의 경량 합의 알고리즘(L-PBFT))

  • Park, Jung-Oh
    • Journal of Industrial Convergence
    • /
    • v.20 no.6
    • /
    • pp.37-45
    • /
    • 2022
  • With the development of the Internet of Things (IoT), related network infrastructures require new technologies to protect against threats such as external hacking. This study proposes an L-PBFT consensus algorithm that can protect IoT networks based on a blockchain consensus algorithm. We designed a blockchain (private) model suitable for small networks, tested processing performance for ultra-small/low-power IoT devices, and verified stability. As a result of performance analysis, L-PBFT proved that at least the number of nodes complies with the operation of the consensus algorithm(minimum 14%, maximum 29%) and establishes a trust network(separation of secure channels) different from existing security protocols. This study is a 4th industry convergence research and will be a foundation technology that will help develop IoT device security products in the future.

A Study on electing and dismissing delegate node of blockchain network (블록체인 네트워크의 대표노드 선출 및 해임에 관한 연구)

  • Jung, Pilsu;Chun, Woojik;Oh, Hyeongseok;Yune, Daeil;Kang, Sungwon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.10a
    • /
    • pp.641-644
    • /
    • 2019
  • 블록체인은 탈중앙화된 신뢰 기반 분산 데이터베이스로 높은 신뢰성과 보안성을 제공하지만 기존의 블록체인들은 확장성이 떨어진다는 문제를 지닌다. 이 문제를 해결하기 위해 기존의 방법들은 소수의 대표노드들을 선출하여 합의 과정을 간소화 하려 하였다. 그러나 이러한 시도는 대표 노드를 선출하기 위해 지분 기반 투표 방식을 사용하기 때문에 많은 지분을 가진 노드들에게 권한이 집중될 수 있다는 한계를 갖는다. 본 연구는 이러한 한계점을 해결한 대표노드 선출/해임 모델을 소개한다. 제안 방법은 Raft 의 투표 알고리즘을 확장하여 대표노드의 공정한 선출과 대표노드의 부적절한 행위를 예방한다. 제안 방법은 모델 검증을 통해 도달 가능성, 안전성, 활동성이 확인되었다.

Adaptive Consensus Bound PBFT Algorithm Design for Eliminating Interface Factors of Blockchain Consensus (블록체인 합의 방해요인 제거를 위한 Adaptive Consensus Bound PBFT 알고리즘 설계)

  • Kim, Hyoungdae;Yun, Jusik;Goh, Yunyeong;Chung, Jong-Moon
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.17-31
    • /
    • 2020
  • With the rapid development of block chain technology, attempts have been made to put the block chain technology into practical use in various fields such as finance and logistics, and also in the public sector where data integrity is very important. Defense Operations In addition, strengthening security and ensuring complete integrity of the command communication network is crucial for operational operation under the network-centered operational environment (NCOE). For this purpose, it is necessary to construct a command communication network applying the block chain network. However, the block chain technology up to now can not solve the security issues such as the 51% attack. In particular, the Practical Byzantine fault tolerance (PBFT) algorithm which is now widely used in blockchain, does not have a penalty factor for nodes that behave maliciously, and there is a problem of failure to make a consensus even if malicious nodes are more than 33% of all nodes. In this paper, we propose a Adaptive Consensus Bound PBFT (ACB-PBFT) algorithm that incorporates a penalty mechanism for anomalous behavior by combining the Trust model to improve the security of the PBFT, which is the main agreement algorithm of the blockchain.

A Study on the Application of Block Chain Technology on EVMS (EVMS 업무의 블록체인 기술 적용 방안 연구)

  • Kim, Il-Han;Kwon, Sun-Dong
    • Management & Information Systems Review
    • /
    • v.39 no.2
    • /
    • pp.39-60
    • /
    • 2020
  • Block chain technology is one of the core elements for realizing the 4th industrial revolution, and many efforts have been made by government and companies to provide services based on block chain technology. In this study we analyzed the benefits of block chain technology for EVMS and designed EVMS block chain platform with increased data security and work efficiency for project management data, which are important assets in monitoring progress, foreseeing future events, and managing post-completion. We did the case studies on the benefits of block chain technology and then conducted the survey study on security, reliability, and efficiency of block chain technology, targeting 18 block chain experts and project developers. And then, we interviewed EVMS system operator on the compatibility between block chain technology and EVM Systems. The result of the case studies showed that block chain technology can be applied to financial, logistic, medical, and public services to simplify the insurance claim process and to improve reliability by distributing transaction data storage and applying security·encryption features. Also, our research on the characteristics and necessity of block chain technology in EVMS revealed the improvability of security, reliability, and efficiency of management and distribution of EVMS data. Finally, we designed a network model, a block structure, and a consensus algorithm model and combined them to construct a conceptual block chain model for EVM system. This study has the following contribution. First, we reviewed that the block chain technology is suitable for application in the defense sector and proposed a conceptual model. Second, the effect that can be obtained by applying block chain technology to EVMS was derived, and the possibility of improving the existing business process was derived.

A Study on the M2M Energy Trading System Using Proof of Location Blockchain Network (위치증명기반 블록체인 네트워크를 활용한 사물 간 에너지 직거래 시스템에 관한 연구)

  • Kim, Young-Gon;Heo, Keol;Choi, Jung-In
    • Journal of Energy Engineering
    • /
    • v.29 no.3
    • /
    • pp.86-90
    • /
    • 2020
  • This paper examines a blockchain network-based transaction system using location proofing in power direct transactions between networked energy clouds, energy communities, and prosumer machines participating in smart cities. It utilizes location-based blockchain network technology, which enables long-distance travel with recharging by power purchases during autonomous movements, autonomous electric vehicles that can purchase and sell electricity, and solar street lights that can be produced and sold in fixed form. In addition, it is possible to provide optimum power transaction matching and settlement reliability between machines without human intervention in power transactions between electric chargers. It also introduces a business-to-object business model between autonomous machines that exist in multiple and different spaces and through energy clouds that are expected to be scattered with various transaction prices, policies, and incentives.

The Smart Contract based Copyright Protection Model for Wisdom Contents Distribution (지혜콘텐츠 유통에 적합한 스마트계약 기반 저작권 보호 모델)

  • Yun, Sunghyun
    • Journal of Internet of Things and Convergence
    • /
    • v.5 no.2
    • /
    • pp.21-26
    • /
    • 2019
  • Wisdom contents is made by an ordinary person and contains life tips helpful in general. As the existing copyright management systems are designed for the corporate or professional authors, it's not easy to use and requires high cost for the ordinary person to get the copyright. Blockchain based system can notarize the block of transactions without help of trustful third party such as existing copyright protection center. Thus, blockchain based copyright protection model is needed to protect the ordinary author's copyright. In this study, we propose the smart contract based copyright protection model which run on the blockchain network. The proposed model consists of smart contract creation, contents purchase and profit sharing stages. The digital signature scheme is used to get the contract agreed by the seller and the author. The smart contract stores the author information, contents information and the percentage of the share as states. If the contents is sold, the sales tokens are redistributed to the author and the seller according to the share. The proposed model can be applied to the ordinary person's copyright registration and management for Wisdom contents distributed in cafe, blog, YouTube, etc.

IoT Edge Architecture Model to Prevent Blockchain-Based Security Threats (블록체인 기반의 보안 위협을 예방할 수 있는 IoT 엣지 아키텍처 모델)

  • Yoon-Su Jeong
    • Journal of Internet of Things and Convergence
    • /
    • v.10 no.2
    • /
    • pp.77-84
    • /
    • 2024
  • Over the past few years, IoT edges have begun to emerge based on new low-latency communication protocols such as 5G. However, IoT edges, despite their enormous advantages, pose new complementary threats, requiring new security solutions to address them. In this paper, we propose a cloud environment-based IoT edge architecture model that complements IoT systems. The proposed model acts on machine learning to prevent security threats in advance with network traffic data extracted from IoT edge devices. In addition, the proposed model ensures load and security in the access network (edge) by allocating some of the security data at the local node. The proposed model further reduces the load on the access network (edge) and secures the vulnerable part by allocating some functions of data processing and management to the local node among IoT edge environments. The proposed model virtualizes various IoT functions as a name service, and deploys hardware functions and sufficient computational resources to local nodes as needed.