A Reputation-Based Approach Using Consortium Blockchain for Cyber Threat Intelligence Sharing
Table 3
The description of four states in POR.
State
Responsibilities
Remark
Leader
Handle all requests from the client. Regularly send heartbeat requests to the follower nodes in the cluster to prevent triggering a new round of elections when the election timer of the follower nodes is out.
Only one exists in network
Follower
Response the request from leader or candidate and redirect requests from the client to the leader node in the cluster.
ā
Candidate
The intermediate state of follower and leader.
Not long-lived in the network.
Supervisor
Evaluates the accuracy of the threat proposal and decide the node as faithful node or unfaithful node based on reputation model.