Blockchain efficient Byzantine fault tolerance consensus algorithm for IIoT

被引:0
作者
Li, Fengqi [1 ,2 ]
Song, Qingqing [1 ]
Xu, Hui [1 ]
Du, Xuefeng [3 ]
Gao, Jialong [4 ]
Tong, Ning [1 ,2 ]
Wang, Deguang [1 ,2 ]
机构
[1] School of Software, Dalian Jiaotong University, Dalian
[2] Key Laboratory of Blockchain Technology and Application in Dalian City, Dalian
[3] School of Mechanical Engineering, Dalian Jiaotong University, Dalian
[4] School of Computer and Communication Engineering, Dalian Jiaotong University, Dalian
来源
Tongxin Xuebao/Journal on Communications | 2024年 / 45卷 / 05期
关键词
consensus algorithm; credit score model; dynamic double layer; IIoT; PBFT;
D O I
10.11959/j.issn.1000-436x.2024090
中图分类号
学科分类号
摘要
Considering the malicious risks associated with diverse terminals in the industrial Internet of things (IIoT), a practical Byzantine fault tolerant (PBFT) efficient consensus algorithm based on credit score and dynamic double layer (CD-PBFT) was proposed to meet the requirements of high efficiency and security fault tolerance in the consensus process. The participation of good nodes in the consensus and the removal of faulty nodes were ensured by the credit score model. The parallelism of transaction verification and read write operations was achieved through the implementation of a double layer architecture. Nodes with high credit were randomly selected as the master node by the adaptive master node algorithm, ensuring its security. Experimental results show that CD-PBFT not only can maintain the safety and liveness of the consensus algorithm but also can reduce network delay by 34.8% and increase throughput by 25.2% compared with PBFT, which meets the double requirements of efficiency and security fault tolerance. © 2024 Editorial Board of Journal on Communications. All rights reserved.
引用
收藏
页码:165 / 177
页数:12
相关论文
共 24 条
  • [1] MERMER G B, ZEYDAN E, ARSLAN S S., An overview of blockchain technologies: principles, opportunities and challenges, Proceedings of the 2018 26th Signal Processing and Communications Applications Conference (SIU), pp. 1-4, (2018)
  • [2] SHAO Q F, JIN C Q, ZHANG Z, Et al., Blockchain: architecture and research progress, Chinese Journal of Computers, 41, 5, pp. 969-988, (2018)
  • [3] XU M X, YUAN C, WANG Y J, Et al., Mimic blockchain:solution to the security of blockchain, Journal of Software, 30, 6, pp. 1681-1691, (2019)
  • [4] ZHANG F, DING Y., Research on the application of Internet of things and block chain technology in improving supply chain financial risk management, Proceedings of the 2021 International Conference on Computer, Blockchain and Financial Development (CBFD), pp. 347-350, (2021)
  • [5] CHEN X Y, LIU S, ZHU W T, Et al., Transition to the intelligent services ecosystem: integration of block chain and Internet of things in supply chain management, Proceedings of the 2020 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA), pp. 1166-1170, (2020)
  • [6] WU D, ANSARI N., A trust-evaluation-enhanced blockchain-secured industrial IoT system, IEEE Internet of Things Journal, 8, 7, pp. 5510-5517, (2021)
  • [7] LUCAS B, PAEZ R V., Consensus algorithm for a private blockchain, Proceedings of the 2019 IEEE 9th International Conference on Electronics Information and Emergency Communication (ICEIEC), pp. 264-271, (2019)
  • [8] ONGARO D, OUSTERHOUT J., In search of an understandable consensus algorithm, Proceedings of the 2014 USENIX Annual Technical Conference (USENIX ATC 14), pp. 305-319, (2014)
  • [9] JIANG Z Y, CAO Z X, KRISHNAMACHARI B, Et al., SENATE: a per-missionless Byzantine consensus protocol in wireless networks for real-time Internet-of-things applications, IEEE Internet of Things Journal, 7, 7, pp. 6576-6588, (2020)
  • [10] DOUCEUR J R., The sybil attack, International Workshop on Peer-to-Peer Systems, pp. 251-260, (2002)