Rui Qiao, Shi Dong*
CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2505-2527, 2023, DOI:10.32604/cmc.2023.043476
- 29 November 2023
Abstract Effectively identifying and preventing the threat of Byzantine nodes to the security of distributed systems is a
challenge in applying consortium chains. Therefore, this paper proposes a new consortium chain generation model,
deeply analyzes the vulnerability of the consortium chain consensus based on the behavior of the nodes, and points
out the effects of Byzantine node proportion and node state verification on the consensus process and system
security. Furthermore, the normalized verification node aggregation index that represents the consensus ability of
the consortium organization and the trust evaluation function of the verification node set is… More >