| 1 | GAO S, LI Z C, XIAO B, et al. Security threats in the data plane of software-defined networks[J]. IEEE Network, 2018, 32(4): 108-113.  10.1109/mnet.2018.1700283 | 
																													
																						| 2 | ANEROUSIS N, CHEMOUIL P, LAZAR A A, et al. The origin and evolution of open programmable networks and SDN[J]. IEEE Communications Surveys and Tutorials, 2021, 23(3): 1956-1971.  10.1109/comst.2021.3060582 | 
																													
																						| 3 | Open Networking Foundation. Software-defined networking: the new norm for networks[R/OL]. (2012-04-13) [2021-07-03]..  10.18411/a-2017-023 | 
																													
																						| 4 | 李兆斌,刘梦甜,魏占祯,等. 软件定义网络可信连接设计与实现[J]. 计算机应用研究, 2019, 36(3):911-917.  10.19734/j.issn.1001-3695.2017.10.0939 | 
																													
																						|  | LI Z B, LIU M T, WEI Z Z, et al. Design and realization of SDN trusted connection[J]. Application Research of Computers, 2019, 36(3): 911-917.  10.19734/j.issn.1001-3695.2017.10.0939 | 
																													
																						| 5 | 陈亮,李峰,任保全,等. 软件定义物联网研究综述[J]. 电子学报, 2021, 49(5): 1019-1032.  10.12263/DZXB.20200561 | 
																													
																						|  | CHEN L, LI F, REN B Q, et al. Software-defined internet of things: a survey[J]. Acta Electronica Sinica, 2021, 49(5): 1019-1032.  10.12263/DZXB.20200561 | 
																													
																						| 6 | 吴海涛,华铭轩,曹帅,等. SDN网络安全研究热点与演进趋势[J]. 通信技术, 2021, 54(6):1492-1501.  10.3969/j.issn.1002-0802.2021.06.032 | 
																													
																						|  | WU H T, HUA M X, CAO S, et al. SDN network security research hotspots and evolution trend[J]. Communications Technology, 2021, 54(6): 1492-1501.  10.3969/j.issn.1002-0802.2021.06.032 | 
																													
																						| 7 | 祝现威,常朝稳.朱智强,等. 基于身份属性的SDN控制转发方法[J]. 通信学报, 2019, 40(11):1-18.  10.11959/j.issn.1000-436x.2019232 | 
																													
																						|  | ZHU X W, CHANG C W, ZHU Z Q, et al. SDN control and forwarding method based on identity attribute[J]. Journal on Communications, 2019, 40(11): 1-18.  10.11959/j.issn.1000-436x.2019232 | 
																													
																						| 8 | 左志斌,常朝稳,祝现威. 一种基于数据平面可编程的软件定义网络报文转发验证机制[J]. 电子与信息学报, 2020, 42(5):1110-1117.  10.11999/JEIT190381 | 
																													
																						|  | ZUO Z B, CHANG C W, ZHU X W. A software-defined networking packet forwarding verification mechanism based on programmable data plane[J]. Journal of Electronics and Information Technology, 2020, 42(5): 1110-1117.  10.11999/JEIT190381 | 
																													
																						| 9 | 王首一,李琦,张云. 轻量级的软件定义网络数据包转发验证[J]. 计算机学报, 2019, 42(1):176-189.  10.11897/SP.J.1016.2019.00176 | 
																													
																						|  | WANG S Y, LI Q, ZHANG Y. LPV: lightweight packet forwarding verification in SDN[J]. Chinese Journal of Computers, 2019, 42(1): 176-189.  10.11897/SP.J.1016.2019.00176 | 
																													
																						| 10 | SASAKI T, PAPPAS C, LEE T, et al. SDNsec: forwarding accountability for the SDN data plane[C]// Proceeding of the 25th International Conference on Computer Communication and Networks. Piscataway: IEEE, 2016: 1-10.  10.1109/icccn.2016.7568569 | 
																													
																						| 11 | 李兆斌,刘泽一,魏占祯,等. 基于哈希链的软件定义网络路径安全[J]. 计算机应用, 2019, 39(5):1368-1373.  10.11772/j.issn.1001-9081.2018091857 | 
																													
																						|  | LI Z B, LIU Z Y, WEI Z Z, et al. Software defined network path security based on Hash chain[J]. Journal of Computer Applications, 2019, 39(5): 1368-1373.  10.11772/j.issn.1001-9081.2018091857 | 
																													
																						| 12 | 秦晰,唐国栋,常朝稳,等. 软件定义网络中基于密码标识的报文转发验证机制[J]. 电子与信息学报, 2018, 40(9):2042-2049.  10.11999/JEIT171226 | 
																													
																						|  | QIN X, TANG G D, CHANG C W, et al. Packet forwarding authentication mechanism based on cipher identification in software-defined network[J]. Journal of Electronics and Information Technology, 2018, 40(9): 2042-2049.  10.11999/JEIT171226 | 
																													
																						| 13 | DIFFIE W, HELLMAN M. New directions in cryptography[J]. IEEE Transactions on Information Theory, 1976, 22(6): 644-654.  10.1109/tit.1976.1055638 | 
																													
																						| 14 | RIVEST R L, SHAMIR A, ADLEMAN L. A method for obtaining digital signatures and public-key cryptosystems[J]. Communications of the ACM, 1978, 21(2): 120-126.  10.1145/359340.359342 | 
																													
																						| 15 | 程朝辉. 数字签名技术概览[J]. 信息安全与通信保密, 2020(7):48 - 62.  10.3969/j.issn.1009-8054.2020.07.008 | 
																													
																						|  | CHENG Z H. An overview of digital signature technology[J]. Information Security and Communications Privacy, 2020(7): 48-62.  10.3969/j.issn.1009-8054.2020.07.008 | 
																													
																						| 16 | 李晖,牛少彰. 无线通信安全理论与技术[M]. 北京:北京邮电大学出版社, 2011:128-129. | 
																													
																						|  | LI H, NIU S Z. Wireless Communication Security Theory and Technology[M]. Beijing: Beijing University of Posts and Telecommunications Press, 2011: 128-129. | 
																													
																						| 17 | NAKAMOTO S. Bitcoin: a peer-to-peer electronic cash system[EB/OL]. [2021-07-03]..  10.2139/ssrn.3977007 | 
																													
																						| 18 | CHENG Y, HU X H, ZHANG J G. An improved scheme of proof-of-stake consensus mechanism[C]// Proceedings of the 4th International Conference on Mechanical, Control and Computer Engineering. Piscataway: IEEE, 2019: 826-829.  10.1109/icmcce48743.2019.00189 | 
																													
																						| 19 | 袁勇,王飞跃. 区块链技术发展现状与展望[J]. 自动化学报, 2016, 42(4):481-494.  10.16383/j.aas.2016.c160158 | 
																													
																						|  | YUAN Y, WANG F Y. Blockchain: the state of the art and future trends[J]. Acta Automatica Sinica, 2016, 42(4): 481-494.  10.16383/j.aas.2016.c160158 | 
																													
																						| 20 | 杨武,玄世昌,王巍. 基于区块链技术的数据共享应用发展与挑战(英文)[J]. 广州大学学报(自然科学版), 2020, 19(3):1-25. | 
																													
																						|  | YANG W, XUAN S C, WANG W. Development and challenge of data sharing based on block chain technology[J]. Journal of Guangzhou University (Natural Science Edition), 2020, 19(3): 1-25. | 
																													
																						| 21 | 廖晓峰,张迪. 基于可编辑区块链的数据隐私安全[J]. 广州大学学报(自然科学版), 2021, 20(3):1-8.  10.3969/j.issn.1671-4229.2021.03.001 | 
																													
																						|  | LIAO X F, ZHANG D. Data privacy security based on redactable blockchain[J]. Journal of Guangzhou University (Natural Science Edition), 2021, 20(3): 1-8.  10.3969/j.issn.1671-4229.2021.03.001 | 
																													
																						| 22 | FAN C X, GHAEMI S, KHAZAEI H, et al. Performance evaluation of blockchain systems: a systematic survey[J]. IEEE Access, 2020, 8: 126927-126950.  10.1109/access.2020.3006078 | 
																													
																						| 23 | KING S, NADAL S. PPCoin: peer-to-peer crypto-currency with proof-of-stake[EB/OL]. (2012-08-19) [2021-07-03].. | 
																													
																						| 24 | DZIEMBOWSKI S, FAUST S, KOLMOGOROV V, et al. Proofs of space[C]// Proceedings of the 2015 Annual International Cryptology Conference, LNCS 9216. Berlin: Springer, 2015: 585-605. | 
																													
																						| 25 | MATSUMOTO M, NISHIMURA T. Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator[J]. ACM Transactions on Modeling and Computer Simulation, 1998, 8(1): 3-30.  10.1145/272991.272995 | 
																													
																						| 26 | NETBERG. LEAF/TOR SWITCHES Aurora 420[EB/OL]. [2021-07-03]..  10.1109/ppc40517.2021.9733144 | 
																													
																						| 27 | LOCHTER M, MERKLE J. Elliptic Curve Cryptography (ECC) brainpool standard curves and curve generation [EB/OL]. [2021-07-03]..  10.17487/rfc5639 | 
																													
																						| 28 | BARKER E. Recommendation for key management: part 1 - general: NIST special publication 800-57 part 1, revision 5[EB/OL]. [2021-07-03].. |