The K-DPBFT Algorithm based on Byzantine Fault Tolerance Algorithm

被引:0
作者
Li, Yan [1 ]
Fan, Jiulun [1 ]
Han, Gang [1 ]
机构
[1] Xian Univ Posts & Telecommun, Natl Engn Res Ctr Secured Wireless, Xian 710121, Peoples R China
来源
2024 6TH INTERNATIONAL CONFERENCE ON NATURAL LANGUAGE PROCESSING, ICNLP 2024 | 2024年
基金
中国国家自然科学基金;
关键词
Practical byzantine fault tolerance; Blockchain; DBSCAN algorithm; Consensus algorithm;
D O I
10.1109/ICNLP60986.2024.10692951
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The PBFT algorithm, a classic Byzantine Fault Tolerance consensus mechanism, is designed to mitigate node failures and malicious behavior within distributed systems. However, its effectiveness is hindered when confronted with large-scale networks and heightened latency. In response to these challenges, we proposed the K-DPBFT algorithm, a novel approach based on Byzantine Fault Tolerance principles, aimed at overcoming the aforementioned limitations.The dataset is initially partitioned through multiple iterations, merging clustering results from different partitions. Subsequently, the data is clustered using the DBSCAN algorithm. Finally, two rounds of the PBFT consensus algorithm are conducted to achieve node consensus, aiming to strike a balance between efficiency and performance. Experimental results demonstrate that, in a consensus process involving a significant number of participating nodes, the K-DPBFT algorithm, while possessing Byzantine Fault Tolerance capability, reduces communication interactions by over tenfold compared to the traditional PBFT algorithm. Moreover, the consensus duration is shortened by more than 20%, significantly enhancing consensus efficiency.
引用
收藏
页码:197 / 202
页数:6
相关论文
共 13 条
[1]   A fast clustering algorithm based on pruning unnecessary distance computations in DBSCAN for high-dimensional data [J].
Chen, Yewang ;
Tang, Shengyu ;
Bouguila, Nizar ;
Wang, Cheng ;
Du, Jixiang ;
Li, HaiLin .
PATTERN RECOGNITION, 2018, 83 :375-387
[2]  
[陈子豪 Chen Zihao], 2019, [计算机科学, Computer Science], V46, P101
[3]  
Gervais Arthur., 2016, P 2016 ACM SIGSAC C, P3, DOI [10.1145/2976749.2978341, DOI 10.1145/2976749.2978341]
[4]  
Han L. Z., 2018, Computer Application Research, V35, P1668
[5]   THE BYZANTINE GENERALS PROBLEM [J].
LAMPORT, L ;
SHOSTAK, R ;
PEASE, M .
ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 1982, 4 (03) :382-401
[6]  
Lattanzi Silvio, 2019, PMLR
[7]   Securing Proof-of-Stake Blockchain Protocols [J].
Li, Wenting ;
Andreina, Sebastien ;
Bohli, Jens-Matthias ;
Karame, Ghassan .
DATA PRIVACY MANAGEMENT, CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY, 2017, 10436 :297-315
[8]  
Mao D., 2012, Computer Engineering and Applications, V48
[9]  
Nakamoto Satoshi, 2018, Consulted
[10]   Assessing Blockchain Consensus and Security Mechanisms against the 51% Attack [J].
Sayeed, Sarwar ;
Marco-Gisbert, Hector .
APPLIED SCIENCES-BASEL, 2019, 9 (09)