The Internet of Things (IoT) has been making people's lives more efficient and more comfortable in the past years, and it is expected to get even better. This improvement may benefit from the use of blockchain to ...
详细信息
The Internet of Things (IoT) has been making people's lives more efficient and more comfortable in the past years, and it is expected to get even better. This improvement may benefit from the use of blockchain to enhance security, scalability, reliability and auditability. Recently, different blockchain architectures were proposed to provide a solution that is better suited for IoT scenarios. One of them, called appendable-block blockchains, proposed a data structure that allows to include transactions in blocks that were already inserted in the blockchain. This approach allows appendable-block blockchains to manage large amounts of data produced by IoT devices through decoupled and appendable data structures. Nevertheless, consensus algorithms can impact throughput and latency in scenarios with large amount of produced transactions, since IoT devices can produce data very quickly (milliseconds) while these data might take some time to be included in a block (seconds). Consequently, it is important to understand the behaviour of different consensus algorithms over appendabble-block blockchain in these type of scenarios. Therefore, we adapted the appendable-block blockchain to use and compare the impact of different consensus algorithms: Practical Byzantine Fault Tolerance (PBFT), witness-based, delegated Byzantine Fault Tolerance (dBFT) and Proof-of-Work (PoW). The results show that both dBFT and PBFT can achieve fast consensus (< 150ms) in the context of appendable-block blockchains. We also present a discussion regarding attacks in each consensus algorithm to help one to choose the best solution (considering performance and security issues) for each scenario.
Data security is today regarded as one of the most difficult duties that IT professionals must fight for. And today, consumers are more concerned about their data, and they begin to wonder why the rules that attempted...
详细信息
ISBN:
(纸本)9781665457194
Data security is today regarded as one of the most difficult duties that IT professionals must fight for. And today, consumers are more concerned about their data, and they begin to wonder why the rules that attempted to protect their data, particularly in the proximity marketing arena, have failed. Users' information is shared without their awareness among market participants. Many systems have emerged through regulation to safeguard users and the market, the most well-known of which is Opt-in/Opt-out, which asks users for permission to use and share personal information with a third party. In addition, they have the opportunity to revoke their permission at any moment. In practice, however, this approach is ineffectual because opting out does not prohibit corporations from exploiting the data. In this work, we propose a novel invention that combines Optin/Opt-out with consensus algorithms in a decentralized way to provide a more secure environment for the user, giving the user the primary control to grant the company access to his data or a real withdrawal consent at any time.
To enhance the high-reliability operation capability of reconfigurable battery energy storage systems, a distributed cooperative control method of reconfigurable battery energy storage based on consensus algorithms is...
详细信息
ISBN:
(纸本)9798350377477;9798350377460
To enhance the high-reliability operation capability of reconfigurable battery energy storage systems, a distributed cooperative control method of reconfigurable battery energy storage based on consensus algorithms is proposed in this paper, which can improve the frequency and power characteristics of the system. Firstly, the mathematical model of virtual synchronous generator(VSG) control, the structure of reconfigurable battery energy storage system, and the parallel VSG distributed architecture are introduced;Secondly, combined with the mathematical model of VSG control, the overall scheme of frequency recovery and power output reasonable distribution of VSG parallel system is designed;Then, according to the structural characteristics of reconfigurable battery energy storage, a battery pack reconfiguration strategy is proposed, which can meet the power output demand through the free combination of battery packs;Finally, a simulation model is built in Matlab/Simulink environment, and the simulation results verify the correctness and effectiveness of the proposed method.
The blockchain technology attracted great scientific and applied interest in the last six-seven years. It successfully applies in different areas like fintech, smart cities, IoT, health care, banking, retail, oil indu...
详细信息
ISBN:
(纸本)9789811976629;9789811976636
The blockchain technology attracted great scientific and applied interest in the last six-seven years. It successfully applies in different areas like fintech, smart cities, IoT, health care, banking, retail, oil industries, and many others. Regardless of the blockchain type (permissioned or permissionless), the data that must be stored in the blockchain network. The algorithm, which is used to "decide" whether to approve (confirm) or not storing the data in the network is the consensus algorithm. It is very important component of the proper blockchain functioning. The author is pursuing two goals with this research. The first one is to make a thorough retrieval of articles from different publishers, based on few keywords, and check if there are any specific trends of research interests in the recent years around these keywords. The second goal is to identify some classifications criteria-like types (public, private, hybrid, and federated), like layers (two layers and multi-layer), etc., and finally, to classify the existing Distributed Ledger Technology (DLT) consensus algorithms with focus on blockchain, based on the architecture and on the access type.
Leader-based Byzantine fault-tolerant consensus algorithms suffer from vulnerabilities during routine view changes as they often follow a predefined schedule to passively rotate leadership among servers. However, the ...
详细信息
ISBN:
(纸本)9781450399425
Leader-based Byzantine fault-tolerant consensus algorithms suffer from vulnerabilities during routine view changes as they often follow a predefined schedule to passively rotate leadership among servers. However, the rotation becomes problematic under failures. In particular, when a scheduled server has crashed, the rotation still blindly assigns leadership to that server, causing performance degradation. This problem is exacerbated with further pronounced performance degradation when leadership rotation becomes more frequent. To address this problem, we propose a reputation-bounded active view-change protocol. Each server maintains a reputation state, calculated based on its behavior history, that reflects the likeli-hood of its correctness. During view changes, servers with a higher reputation are more likely to be elected, suppressing Byzantine faults while increasing the presence of correct leaders.
In recent years, Blockchain has become a disruptivetechnology to protect the integrity of information, especially inopen and collaborative information systems. Its main advantageis the possibility to reach consensus o...
详细信息
In recent years, Blockchain has become a disruptivetechnology to protect the integrity of information, especially inopen and collaborative information systems. Its main advantageis the possibility to reach consensus on the new data blocks tobe added to the chain, even with anonymous actors. The mostcommon consensus mechanism is Proof of Work, but it has beenproven to be very inefficient in terms of energy spent by themembers of the blockchain. In the literature there are many othertechniques that pretend to become the new popular ***, the number of this techniques is growing too fast toreally be able to differentiate among all the options. In this work,a new characterization of consensus algorithm is proposed, thatcan be used to find families of mechanism using cluster-basedclassification. Using the Ward Method and Spearmans RankCorrelation analysis, new clusters of consensus mechanisms wereidentified. The results describe the behavioral patterns not seenbefore in the literature. In addition, some open problems ofcurrent consensus algorithms are discussed.
Traditional protective relay voting schemes utilize simple logic to achieve confidence in relay trip actions. However, the smart grid is rapidly evolving and there are new needs for a next-generation relay voting sche...
详细信息
ISBN:
(纸本)9781728186481
Traditional protective relay voting schemes utilize simple logic to achieve confidence in relay trip actions. However, the smart grid is rapidly evolving and there are new needs for a next-generation relay voting scheme. In such new schemes, aspects such as inter-relay relationships and out-of-band data can be included. In this work, we explore the use of consensus algorithms and how they can be utilized for groups of relays to vote on system protection actions and also reach consensus on the values of variables in the system. A proposed design is explored with a simple case study with two different scenarios, including simulation in PowerWorld Simulator, to demonstrate the consensus algorithm benefits and future directions are discussed.
The Internet of Things (IoT) is transforming many sectors of society by enabling communication between smart devices, but it faces challenges in maintaining integrity in data recording. Traditional Blockchain technolo...
详细信息
ISBN:
(纸本)9798400717406
The Internet of Things (IoT) is transforming many sectors of society by enabling communication between smart devices, but it faces challenges in maintaining integrity in data recording. Traditional Blockchain technologies, such as those based on Proof of Work (PoW), are unsuitable for IoT due to their high demands on computational resources. There are proposals to use multiple consensus algorithms in the same blockchain solution to improve performance and integrity. However, choosing the best algorithms or combinations for each IoT scenario is an open challenge. This work presents a strategy to select consensus algorithms and optimize blockchain performance in IoT-based environments. The proposed strategy was simulated in a blockchain implemented atop a Directed Acyclic Graph (DAG) designed for IoT environments. This blockchain integrates multiple consensus algorithms - Proof of Authority (PoA), Proof of Stake (PoS), Proof of Work (PoW), Practical Byzantine Fault Tolerance (PBFT), and Raft - each selected for its performance and security advantages. A comparative evaluation of different combinations is presented. The results show the performance and adaptability of the proposed strategy in various scenarios.
Blockchain is a distributed public ledger that keeps track of all transactions that have ever taken place in the system. As a distributed ledger, a consensus mechanism is required to ensure all the transaction functio...
详细信息
Blockchain is a distributed public ledger that keeps track of all transactions that have ever taken place in the system. As a distributed ledger, a consensus mechanism is required to ensure all the transaction functions properly. In order to reach a consensus, it is critical to emphasize the importance of performance and efficiency. The use of the right consensus algorithm will significantly improve the efficiency of a blockchain application. This paper reviewed several types of consensus algorithms used in blockchain and discusses the idea of a new consensus algorithm that can improve the performance of consortium blockchain.
The basic properties of blockchain, such as decentralization, security, and immutability, show promising potential for IoT applications. The main feature-decentralization of blockchain technology-depends on the consen...
详细信息
The basic properties of blockchain, such as decentralization, security, and immutability, show promising potential for IoT applications. The main feature-decentralization of blockchain technology-depends on the consensus. However, consensus algorithms are mostly designed to work in extensive computational and communication environments for network security and immutability, which is not desirable for resource-restricted IoT applications. Many solutions are proposed to address this issue with modified consensus algorithms based on the legacy consensus, such as the PoW, PoS, and BFT, and new non-linear data structures, such as DAG. A systematic classification and analysis of various techniques in the field will be beneficial for both researchers and industrial practitioners. Most existing relevant surveys provide classifications intuitively based on the domain knowledge, which are infeasible to reveal the intrinsic and complicated relationships among the relevant basic concepts and techniques. In this paper, a powerful tool of systematic knowledge classification and explanation is introduced to structure the survey on blockchain consensus algorithms for resource-constrained IoT systems. More specifically, an ontology was developed for a consensus algorithm apropos of IoT adaptability. The developed ontology is subdivided into two parts-CONB and CONIoT-representing the classification of generic consensus algorithms and the ones that are particularly proposed for IoT, respectively. Guided by this ontology, an in depth discussion and analysis are provided on the major consensus algorithms and their IoT compliance based on design and implementation targets. Open research challenges and future research directions are provided.
暂无评论