1 |
GILL P , SCHAPIRA M , GOLDBERG S . A survey of interdomain routing policies. ACM SIGCOMM Computer Communication Review, 2013, 44 (1): 28- 34.
doi: 10.1145/2567561.2567566
|
2 |
XIANG Q, ZHANG J X, GAO K, et al. Toward optimal software-defined interdomain routing[C]//Proceedings of the IEEE Conference on Computer Communications. Washington D.C., USA: IEEE Press, 2020: 1529-1538.
|
3 |
|
4 |
|
5 |
|
6 |
|
7 |
|
8 |
|
9 |
HARI A, LAKSHMAN T V. The Internet blockchain: a distributed, tamper-resistant transaction framework for the Internet[C]//Proceedings of the 15th ACM Workshop on Hot Topics in Networks. New York, USA: ACM Press, 2016: 204-210.
|
10 |
YUE J R, QIN Y J, GAO S, et al. A privacy-preserving route leak protection mechanism based on blockchain[C]//Proceedings of the IEEE International Conference on Information Communication and Software Engineering (ICICSE). Wahington D.C., USA: IEEE Press, 2021: 264-269.
|
11 |
刘志辉, 孙斌, 谷利泽, 等. 一种防范BGP地址前缀劫持的源认证方案. 软件学报, 2012, 23 (7): 1908- 1923.
|
|
LIU Z H , SUN B , GU L Z , et al. Origin authentication scheme against BGP address prefix hijacking. Journal of Software, 2012, 23 (7): 1908- 1923.
|
12 |
HE G B , SU W , GAO S , et al. ROAchain: securing route origin authorization with blockchain for inter-domain routing. IEEE Transactions on Network and Service Management, 2021, 18 (2): 1690- 1705.
doi: 10.1109/TNSM.2020.3015557
|
13 |
陈迪, 邱菡, 朱俊虎, 等. 基于区块链的域间路由策略符合性验证方法. 软件学报, 2023, 34 (9): 4336- 4350.
|
|
CHEN D , QIU H , ZHU J H , et al. Blockchain-based validation method for inter-domain routing policy compliance. Journal of Software, 2023, 34 (9): 4336- 4350.
|
14 |
LIU Y P , ZHANG S , ZHU H J , et al. A novel routing verification approach based on blockchain for inter-domain routing in smart metropolitan area networks. Journal of Parallel and Distributed Computing, 2020, 142, 77- 89.
doi: 10.1016/j.jpdc.2020.04.005
|
15 |
CHEN D , BA Y , QIU H , et al. ISRchain: achieving efficient interdomain secure routing with blockchain. Computers & Electrical Engineering, 2020, 83, 106584.
|
16 |
魏双, 吴旭, 张震. 工业物联网中基于区块链的跨域信任认证机制[J]. 小型微型计算机系统. 2024, 45(4): 975-983.
|
|
WEI S, WU X, ZHANG Z. Blockchain-based cross-domain trust authentication mechanism in industrial Internet of things. Journal of Chinese Computer Systems[J]. 2024, 45(4): 975-983. (in Chinese)
|
17 |
陈迪, 邱菡, 朱俊虎, 等. 区块链技术在域间路由安全领域的应用研究. 软件学报, 2020, 31 (1): 208- 227.
|
|
CHEN D , QIU H , ZHU J H , et al. Research on blockchain-based interdomain security solutions. Journal of Software, 2020, 31 (1): 208- 227.
|
18 |
MASTILAK L , HELEBRANDT P , GALINSKI M , et al. Secure inter-domain routing based on blockchain: a comprehensive survey. Sensors, 2022, 22 (4): 1437.
doi: 10.3390/s22041437
|
19 |
LUCKIE M, HUFFAKER B, DHAMDHERE A, et al. AS relationships, customer cones, and validation[C]//Proceedings of the 2013 Conference on Internet Measurement Conference. New York, USA: ACM Press, 2013: 243-256.
|
20 |
GAO L X, REXFORD J. Stable Internet routing without global coordination[C]//Proceedings of the 2000 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems. Washington D.C., USA: IEEE Press, 2001: 681-692.
|
21 |
GIOTSAS V, ZHOU S. Valley-free violation in Internet routing—analysis based on BGP community data[C]//Proceedings of the IEEE International Conference on Communications (ICC). Washington D.C., USA: IEEE Press, 2012: 1193-1197.
|
22 |
|
23 |
GAO L . On inferring autonomous system relationships in the Internet. IEEE/ACM Transactions on Networking, 2001, 9 (6): 733- 745.
doi: 10.1109/90.974527
|
24 |
|
25 |
|
26 |
KUERBIS B , MUELLER M . Internet routing registries, data governance, and security. Journal of Cyber Policy, 2017, 2 (1): 64- 81.
doi: 10.1080/23738871.2017.1295092
|
27 |
|
28 |
KENT S , LYNN C , SEO K . Secure Border Gateway Protocol (S-BGP). IEEE Journal on Selected Areas in Communications, 2002, 18 (4): 582- 592.
|
29 |
|
30 |
|
31 |
WHITE R . Securing BGP through secure origin BGP (soBGP). Business Communications Review, 2003, 33 (5): 47- 53.
|
32 |
UMEDA N , KIMURA T , YANAI N . The juice is worth the squeeze: analysis of autonomous system provider authorization in partial deployment. IEEE Open Journal of the Communications Society, 2023, 4, 269- 306.
doi: 10.1109/OJCOMS.2022.3233833
|
33 |
|
34 |
|
35 |
HLAVACEK T, HERZBERG A, SHULMAN H, et al. Practical experience: methodologies for measuring route origin validation[C]//Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). Washington D.C., USA: IEEE Press, 2018: 634-641.
|
36 |
DONNET B , BONAVENTURE O . On BGP communities. ACM SIGCOMM Computer Communication Review, 2008, 38 (2): 55- 59.
doi: 10.1145/1355734.1355743
|
37 |
SPADACCINO P, BRUZZESE S, CUOMO F, et al. Analysis and emulation of BGP hijacking events[C]//Proceedings of the 2023 IEEE/IFIP Network Operations and Management Symposium. Washington D.C., USA: IEEE Press, 2023: 1-4.
|
38 |
ZHANG C W, MIAO C C, AN C Q, et al. Metis: detecting fake AS-PATHs based on link prediction[C]//Proceedings of the IEEE Symposium on Computers and Communications (ISCC). Washington D.C., USA: IEEE Press, 2023: 656-662.
|
39 |
GOLDBERG S , SCHAPIRA M , HUMMON P , et al. How secure are secure interdomain routing protocols. ACM SIGCOMM Computer Communication Review, 2010, 40 (4): 87- 98.
doi: 10.1145/1851275.1851195
|
40 |
张亮, 刘百祥, 张如意, 等. 区块链技术综述. 计算机工程, 2019, 45 (5): 1- 12.
doi: 10.19678/j.issn.1000-3428.0053554
|
|
ZHANG L , LIU B X , ZHANG R Y , et al. Overview of blockchain technology. Computer Engineering, 2019, 45 (5): 1- 12.
doi: 10.19678/j.issn.1000-3428.0053554
|
41 |
SAAD M , ANWAR A , AHMAD A , et al. RouteChain: towards blockchain-based secure and efficient BGP routing. Computer Networks, 2022, 217, 109362.
doi: 10.1016/j.comnet.2022.109362
|
42 |
YANG Q , MA L , TU S S , et al. Towards blockchain-based secure BGP routing, challenges and future research directions. Computers, Materials & Continua, 2024, 79 (2): 2035- 2062.
|
43 |
|
44 |
ZHAO M C , ZHOU W C , GURNEY A J T , et al. Private and verifiable interdomain routing decisions. IEEE/ACM Transactions on Networking, 2015, 24 (2): 1011- 1024.
|
45 |
SAKHO S, ZHANG J B, ESSAF F, et al. Research on an improved practical Byzantine fault tolerance algorithm[C]//Proceedings of the 2nd International Conference on Advances in Computer Technology, Information Science and Communications (CTISC). Washington D.C., USA: IEEE Press, 2020: 176-181.
|
46 |
GALMES M F, AUMATELL R C, CABELLOS-APARICIO A, et al. Preventing route leaks using a decentralized approach[C]// Proceedings of 2020 IFIP Networking Conference. Washington D.C., USA: IEEE Press, 2020: 509-513.
|
47 |
|
48 |
ZENG M , LI D D , ZHANG P , et al. Federated route leak detection in inter-domain routing with privacy guarantee. ACM Transactions on Internet Technology, 2023, 23 (1): 1- 22.
|
49 |
|
50 |
|
51 |
MANIMURGAN S, ANITHA T, DIVYA G, et al. A survey on blockchain technology for network security applications[C]//Proceedings of the 2nd International Conference on Computing and Information Technology (ICCIT). Washington D.C., USA: IEEE Press, 2022: 440-445.
|
52 |
徐恪, 凌思通, 李琦, 等. 基于区块链的网络安全体系结构与关键技术研究进展. 计算机学报, 2021, 44 (1): 55- 83.
|
|
XU K , LING S T , LI Q , et al. Research progress of network security architecture and key technologies based on blockchain. Chinese Journal of Computers, 2021, 44 (1): 55- 83.
|
53 |
|
54 |
SYTA E, TAMAS I, VISHER D, et al. Keeping authorities "honest or bust" with decentralized witness cosigning[C]//Proceedings of the IEEE Symposium on Security and Privacy (SP). Washington D.C., USA: IEEE Press, 2016: 526-545.
|
55 |
WILKIE A , SMITH S S . Blockchain: speed, efficiency, decreased costs, and technical challenges. [S. l.]: Emerald Publishing Limited, 2021.
|
56 |
|
57 |
SINGH A , CLICK K , PARIZI R M , et al. Sidechain technologies in blockchain networks: an examination and state-of-the-art review. Journal of Network and Computer Applications, 2020, 149, 102471.
doi: 10.1016/j.jnca.2019.102471
|
58 |
PAPADIS N , TASSIULAS L . Blockchain-based payment channel networks: challenges and recent advances. IEEE Access, 2020 (8): 227596- 227609.
|
59 |
CHOW S S M, LAI Z L, LIU C, et al. Sharding blockchain[C]//Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). Washington D.C., USA: IEEE Press, 2018: 1665.
|
60 |
黄华威, 孔伟, 彭肖文, 等. 区块链分片技术综述. 计算机工程, 2022, 48 (6): 1- 10.
doi: 10.19678/j.issn.1000-3428.0063887
|
|
HUANG H W , KONG W , PENG X W , et al. Survey on blockchain sharding technology. Computer Engineering, 2022, 48 (6): 1- 10.
doi: 10.19678/j.issn.1000-3428.0063887
|
61 |
DELGADO-SEGURA S , PÉREZ-SOLÀ C , HERRERA-JOANCOMARTÍ J , et al. Cryptocurrency networks: a new P2P paradigm. Mobile Information Systems, 2018 (1): 2159082.
|
62 |
DAI Q Y , ZHANG B , DONG S Q . Eclipse attack detection for blockchain network layer based on deep feature extraction. Wireless Communications and Mobile Computing, 2022 (1): 1451813.
|
63 |
SAAD M, COOK V, NGUYEN L, et al. Partitioning attacks on Bitcoin: colliding space, time, and logic[C]// Proceedings of the IEEE 39th International Conference on Distributed Computing Systems (ICDCS). Washington D.C., USA: IEEE Press, 2019: 1175-1187.
|
64 |
NAYAK K, KUMAR S, MILLER A, et al. Stubborn mining: generalizing selfish mining and combining with an eclipse attack[C]//Proceedings of the IEEE European Symposium on Security and Privacy (EuroS & P). Washington D.C., USA: IEEE Press, 2016: 305-320.
|
65 |
DEIRMENTZOGLOU E , PAPAKYRIAKOPOULOS G , PATSAKIS C . A survey on long-range attacks for proof of stake protocols. IEEE Access, 2019, 7, 28712- 28725.
doi: 10.1109/ACCESS.2019.2901858
|
66 |
LI W T , ANDREINA S , BOHLI J M , et al. Securing proof-of-stake blockchain protocols. Berlin, Germany: Springer International Publishing, 2017.
|
67 |
PLATT M , MCBURNEY P . Sybil in the haystack: a comprehensive review of blockchain consensus mechanisms in search of strong sybil attack resistance. Algorithms, 2023, 16 (1): 34.
|
68 |
KHAN S N , LOUKIL F , GHEDIRA-GUEGAN C , et al. Blockchain smart contracts: applications, challenges, and future trends. Peer-to-Peer Networking and Applications, 2021, 14 (5): 2901- 2925.
doi: 10.1007/s12083-021-01127-0
|
69 |
CHU H T , ZHANG P C , DONG H , et al. A survey on smart contract vulnerabilities: data sources, detection and repair. Information and Software Technology, 2023, 159, 107221.
doi: 10.1016/j.infsof.2023.107221
|
70 |
ALKHALIFAH A , NG A , WATTERS P A , et al. A mechanism to detect and prevent ethereum blockchain smart contract reentrancy attacks. Frontiers in Computer Science, 2021, 3, 598780.
|
71 |
OU W , HUANG S Y , ZHENG J J , et al. An overview on cross-chain: mechanism, platforms, challenges and advances. Computer Networks, 2022, 218, 109378.
|