Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for identifying clone block in edge computing system based on block chain

An identification method and edge computing technology, applied in the field of the Internet of Things, can solve problems such as undetectable cloned blocks

Pending Publication Date: 2021-01-12
QUFU NORMAL UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since cloned blocks have the same block hash as legitimate blocks, traditional cryptography-based authentication mechanisms cannot detect cloned blocks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for identifying clone block in edge computing system based on block chain
  • Method for identifying clone block in edge computing system based on block chain
  • Method for identifying clone block in edge computing system based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present invention. Rather, they are merely examples of apparatuses and methods consistent with aspects of the invention as recited in the appended claims.

[0037] The terminology used in the present invention is for the purpose of describing particular embodiments only and is not intended to limit the invention. As used herein and in the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term "and / or" as use...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for identifying a clone block in an edge computing system based on a block chain, wherein the method comprises the steps: extracting identity declaration information ofa legal block and an unknown block, comparing the identity declaration information, calculating relevancy, identifying whether the unknown block is the clone block or not, and if the unknown block isthe clone block, combining the identity information of the legal block and the unknown block into a training set; and training the training set by using a neural network algorithm to generate an identification model, and identifying the identity information of the new unknown block by using the model. In addition, the invention also provides a system for identifying the clone block in the edge computing system based on the block chain. According to the method and the system, the time delay is reduced, the identification precision is improved, and the attack problem of the clone block is solved.

Description

technical field [0001] The invention relates to the field of the Internet of Things, in particular to a method for identifying cloned blocks in a blockchain-based edge computing system. Background technique [0002] With the development of the Internet of Things, the number of mobile terminal devices is increasing rapidly. Due to high transmission latency and bandwidth constraints, IoT devices are also demanding more and more computing power. Edge computing processes data close to end users, which can reduce system latency. Blockchain technology provides a new research direction for the security of edge computing. A series of security issues have also emerged in blockchain-based mobile edge computing systems. [0003] In order to build a security architecture system for blockchain-based edge computing, Xiong et al. proposed a prototype of a system supporting mobile edge computing. Gai et al. proposed a blockchain-based edge Internet model and an edge blockchain model. M...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/06G06N3/04G06K9/62
CPCH04L63/1483H04L63/1441H04L9/0643H04L63/08G06N3/045G06F18/214
Inventor 李光顺任新荣吴俊华于海莉曹佳彬
Owner QUFU NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products