Netinfo Security ›› 2023, Vol. 23 ›› Issue (1): 84-92.doi: 10.3969/j.issn.1671-1122.2023.01.010

Previous Articles     Next Articles

Evaluation Method for Cross-Chain Security Strength Access

FENG Yiting1, MA Zhaofeng1(), XU Danheng2, DUAN Pengfei1   

  1. 1. School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing 100876, China
    2. Hangzhou Ancun Network Technology Co., Ltd., Hangzhou 311100, China
  • Received:2022-09-06 Online:2023-01-10 Published:2023-01-19
  • Contact: MA Zhaofeng E-mail:mzf@bupt.edu.cn

Abstract:

In view of the current security issues of various blockchain cross-chain systems, this paper proposed a set of cross-chain blockchain security strength evaluation methods, and divided security issues into four types: cross-chain trust issues, cross-chain consensus issues, cross-chain security issues, and cross-chain network issues. At the same time, according to their evaluation characteristics, the combination of the analytic hierarchy process and the fuzzy comprehensive evaluation method was used to construct an evaluation matrix to refine the weight coefficients, conducted quantitative and qualitative evaluations of the system and calculated the membership degree, and analyzed the system security according to the result. It is meaningful for cross-chain platforms or systems to evaluate their own security and make advancement. Through the security strength evaluation on the cross-chain system, the result is that the system is better than normal, with a score of 78.27, and still have some improvement. This method has a certain effect on the security evaluation of cross-chain blockchain system.

Key words: blockchain security, cross-chain evaluation, evaluation method

CLC Number: