Abstract
With the rapid development of blockchain technology, P2P networks are facing increasing security threats, among which Eclipse attacks, as a type of network isolation attack, have seriously affected the normal operation of the network and the integrity of data. To address this challenge, this study implements node authentication and dynamic reputation evaluation by leveraging a dynamic hash computation mechanism that integrates challenge strings, node identifiers, and the latest active time, ensuring the uniqueness of node identities and the authenticity of operations. Based on a dynamic hash chain behavior evaluation mechanism, node behaviors are quantified across three dimensions: integrity, consistency, and temporal consistency, enabling precise identification of anomalous nodes. Furthermore, a network prevention repository framework is proposed, which dynamically adjusts the trust index of nodes by combining historical behavior with real-time data, effectively detecting and defending against stealthy Eclipse attacks. In addition, extensive testing on both Bitcoin and Ethereum platforms has shown that the method proposed in this study not only can effectively coexist on these two platforms, but also significantly improves the security and stability of the network, effectively reducing the occurrence of Eclipse attacks.
| Original language | English |
|---|---|
| Pages (from-to) | 23524-23535 |
| Number of pages | 12 |
| Journal | IEEE Internet of Things Journal |
| Volume | 12 |
| Issue number | 13 |
| DOIs | |
| State | Published - 2025 |
| Externally published | Yes |
Keywords
- Blockchain
- dynamic hash calculations
- eclipse attacks
- hash trust index
- network prevention warehouses
Fingerprint
Dive into the research topics of 'HASHL: Dynamic Hash Verification for Detecting and Preventing Eclipse Attacks'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver