Practical Byzantine Fault Tolerance algorithm (PBFT) can improve efficiency on the basis of the original algorithm, but there are still some issues such as high algorithm complexity, arbitrary decision of primary node...
详细信息
consensus protocols are a key feature in decentralized systems where multiple unreliable nodes operate, e.g., in Blockchain technologies with many worldwide applications such as supply chain management, cryptocurrenci...
详细信息
ISBN:
(纸本)9781665441315
consensus protocols are a key feature in decentralized systems where multiple unreliable nodes operate, e.g., in Blockchain technologies with many worldwide applications such as supply chain management, cryptocurrencies and information sharing. ISRaft is a consensus protocol built upon Raft, a previously developed protocol that is used for replicated state machines when a group of nodes is required to achieve a consensus related to the state of the machine. This paper therefore proposes an alternative version of the ISRaft consensus protocol to allow communication among nodes in a secured fashion while maintaining the security features of the original ISRaft algorithm even in the presence of adversarial nodes. The proposed model utilizes a trust parameter to enforce cooperation, i.e., a trust value is assigned to each node to prevent malicious activities over time. This is a practical solution for autonomous units with resource-constrained devices where a regular encrypted communication method can negatively affect the system performance.
A marketing strategy, which is a comprehensive plan, describes an organization's approach to promoting and selling its products and services, including target audience identification, brand message, and promotiona...
详细信息
ISBN:
(纸本)9798350310900
A marketing strategy, which is a comprehensive plan, describes an organization's approach to promoting and selling its products and services, including target audience identification, brand message, and promotional techniques. Proximity marketing is a type of marketing strategy that uses wireless technologies to target customers based on their geographic location or proximity to a specific store or location. Businesses regularly use it to get customers to their physical locations, increase sales, and raise awareness of their brands. Using wireless technologies like Bluetooth and Wi-Fi, targeted messages are sent to customers' mobile devices when they are near a physical store in a sort of location-based marketing. Concerns around data security and privacy are one of the potential issues with proximity marketing. Customers can feel that their data is not under their control or that it is being collected and used without their consent. Businesses can take steps to address these worries, such as providing customers with the choice to opt-in or opt-out of receiving marketing messages and being explicit and honest about data collection and use. Even when customers explicitly accept the gathering and usage of their data, they may nevertheless feel uneasy about it. So we suggest a Control algorithm (CA) inspired by the concept of the consensus algorithm in the blockchain, which would give people control over their data rather than businesses, in order to solve these concerns. And this can support the development of customer and business confidence.
Aiming at the problems of the existing DPoS(Delegated Proof of Stake) consensus algorithm, such as low enthusiasm of voting nodes and difficulties in dealing with malicious nodes, we improve the traditional DPoS conse...
详细信息
Aiming at the problems of the existing DPoS(Delegated Proof of Stake) consensus algorithm, such as low enthusiasm of voting nodes and difficulties in dealing with malicious nodes, we improve the traditional DPoS consensus algorithm and propose a reputation-based delegated proof of stake consensus algorithm, called Reputation-DPoS. In our Reputation-DPoS, the reputation model is introduced. By evaluating the behavior of nodes, nodes are divided into different trusted states, and high-quality nodes in the network are selected as consensus nodes to reduce security risks and improve efficiency. Besides, incentive methods of reputation and token are used to improve the enthusiasm of nodes to participate in voting. Simulation results show that our Reputation-DPoS can reduce the probability of malicious nodes being selected and optimize the state of nodes in DPoS. Nodes with good behavior will get more votes and rewards, which will motivate nodes and improve the security of the system. Insert here your abstract text. (C) 2021 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license (https://***/licenses/by-nc-nd/4.0) Peer-review under responsibility of the scientific committee of the International Conference on Identification, Information and Knowledge in the internet of Things, 2020.
The blockchain is a decentralized distributed accounting system. With the development of the blockchain technology and its wide application, the core of the decentralization-consensus algorithm has attracted the atten...
详细信息
ISBN:
(纸本)9781450377430
The blockchain is a decentralized distributed accounting system. With the development of the blockchain technology and its wide application, the core of the decentralization-consensus algorithm has attracted the attention of researchers. However, the previous POW mining consensus algorithm is a low-efficiency and high-cost consensus mechanism. In this paper, we propose an MPC-DPOS election consensus algorithm, which is improved by integrating the logic ring-based election algorithm and the Yao's millionaire algorithm into the basic DPOS algorithm to address secure multi-party computation problem. Specifically, the MPC-DPOS algorithm first selects the 101 candidate nodes from the many nodes of the blockchain system into a logical ring in the first stage, which will participate in the next election process of the proxy nodes to generate new blocks. In addition, since the weights are compared while the shares are not known, Yao's millionaire algorithm is added in the second election process, and the agent nodes are selected to generate new blocks finally. Extensive experiments show that the proposed MPC-DPOS election consensus algorithm achieves state-of-the-art performance with the respect to safety and adaptability to meet the high efficiency and low-cost requirements of commercial applications.
Blockchain has received tremendous attention in non-monetary applications including the Internet of Things (IoT) due to its salient features including decentralization, security, auditability, and anonymity. Most conv...
详细信息
ISBN:
(纸本)9781728171586
Blockchain has received tremendous attention in non-monetary applications including the Internet of Things (IoT) due to its salient features including decentralization, security, auditability, and anonymity. Most conventional blockchains rely on computationally expensive validator selection and consensus algorithms, have limited throughput, and high transaction delays. In this paper, we propose tree-chain a scalable fast blockchain instantiation that introduces two levels of randomization among the validators: i) transaction level where the validator of each transaction is selected randomly based on the most significant characters of the hash function output (known as consensus code), and ii) blockchain level where validator is randomly allocated to a particular consensus code based on the hash of their public key. Tree-chain introduces parallel chain branches where each validator commits the corresponding transactions in a unique ledger.
We present an energy-efficient, security-enhanced consensus algorithm to compensate for the security weaknesses that may arise when a node that generates a block is vulnerable in a closed blockchain environment. Conse...
详细信息
ISBN:
(纸本)9781538650417
We present an energy-efficient, security-enhanced consensus algorithm to compensate for the security weaknesses that may arise when a node that generates a block is vulnerable in a closed blockchain environment. consensus algorithms, which are usually used in blockchain environments, use a large amount of hash to create a new block, producing significant energy waste. The consensus algorithm that is proposed in this paper reduces energy waste by generating new blocks in a single operation according to the defined rules of all miner nodes that can generate blocks and converging them into blocks with many identical block values, forming a blockchain.
The traditional Raft consensus algorithm is widely used in private chains due to its crash-tolerant feature, but it cannot solve many problems caused by the malicious behaviour of Byzantine nodes. Based on an in-depth...
详细信息
ISBN:
(纸本)9798331540050;9798331540043
The traditional Raft consensus algorithm is widely used in private chains due to its crash-tolerant feature, but it cannot solve many problems caused by the malicious behaviour of Byzantine nodes. Based on an in-depth analysis of existing research results, this paper proposes a consensus algorithm based on the Raft algorithm with enhanced Byzantine resistance and crash tolerance: Re-Raft (Reliability-Raft), in order to solve the core problems of Byzantine nodes identity forgery and illegal replacement of leaders. A fault heartbeat logging mechanism is introduced to prevent Byzantine nodes from obtaining the majority of votes by broadcasting fault heartbeat logs;and a node reliability assessment algorithm is proposed to accurately assess the reliability of nodes by combining the continuity penalty weights and the time decay factor to reduce communication redundancy triggered by frequent node failures. The experimental results show that compared with the native Raft, the Re-Raft algorithm achieves a significant improvement in Byzantine fault-tolerance capability.
Data protection and privacy is a major concern in the Internet of Things (IoT) ecosystem, and the excessive use of IoT devices may risk the security of the network. Blockchain solutions are used to enhance the trustwo...
详细信息
ISBN:
(纸本)9781450396707
Data protection and privacy is a major concern in the Internet of Things (IoT) ecosystem, and the excessive use of IoT devices may risk the security of the network. Blockchain solutions are used to enhance the trustworthiness and eliminate the need for trusted third parties by providing mechanisms to reach consensus in a network of trustless participants. The consensus algorithms employed by blockchain architectures ensure the integrity of the data stored in the blockchain, the resiliency of the network and manage the security of devices. However, current solutions are compute intensive affecting the performance of the network and consuming much energy. In this work, we introduce a consensus algorithm for offering secure distributed consensus among IoT devices without affecting the performance of the network. The algorithm is inspired by existing solutions, employs decentralised identities, verifiable credentials and a decentralised trust management mechanism to guarantee security, privacy and trustworthiness of transactions. Finally, our algorithm combines technologies for operating in a distributed manner which favors the scalability and allow the effective integration in large scale networks.
Large scale wireless sensor networks require intelligent and reliable distributed information processing mechanisms which can effectively delegate decision at the field level consensus algorithms have been extensively...
详细信息
ISBN:
(纸本)9781509020478
Large scale wireless sensor networks require intelligent and reliable distributed information processing mechanisms which can effectively delegate decision at the field level consensus algorithms have been extensively studied and deployed in many generic multi agent systems framework and are able to provide localized agreement among sensing entities. The paper discusses the evaluation of a local consensus algorithm for a border surveillance system, focused on detection of military terrain vehicles, starting from a system architecture for large scale monitoring systems previously proposed Simulation scenario of a ground local WSN was developed using real data as reference for initial states of the sensor nodes. Performance indicators such as speed of convergence and accuracy of consensus were discussed.
暂无评论