612 results on '"Consensus protocol"'
Search Results
102. Blockchain Technology: Possibility of Application for Library Networks in India
- Author
-
Arnepalli, Kaladhar and Rao, K. Somasekhara
- Published
- 2021
- Full Text
- View/download PDF
103. Adrestus: Secure, scalable blockchain technology in a decentralized ledger via zones
- Author
-
Panagiotis Drakatos, Eleni Koutrouli, and Aphrodite Tsalgatidou
- Subjects
Blockchain ,Consensus protocol ,Byzantine fault tolerance ,Scalability ,Distributed systems ,Aggregated signatures ,Information technology ,T58.5-58.64 - Abstract
Nowadays, an increasing number of blockchain architectures provide well-promising protocols for pseudonymous online payments via proposed cryptocurrencies. Most of them suffer from a number of extensibility and scalability issues, as their capacity regarding the number of transactions they are capable of processing per second is limited. Security is also a challenge for this kind of architectures. This paper presents the design and implementation of the Adrestus system, a blockchain-based transaction system with a novel consensus mechanism that is able to tolerate Byzantine faults and is designed to scale without compromising system security. One of the main components of the Adrestus design is a consistent hashing mechanism for the efficient assignment of transactions on parallel regions, called zones, and for solving load balancing problems. We claim that the Adrestus blockchain system scales linearly without compromising system security and achieves its goals without introducing the unnecessary overhead and by eliminating energy and computational waste. Preliminary theoretical simulations and results reflect that Adrestus exceeds the average throughput of the most well-known cryptocurrencies like Bitcoin, and thus, it achieves a higher performance. In this paper, we present this proposed approach along with simulation results and examine the conditions for the proposed fault-tolerant system to meet safety and liveness.
- Published
- 2022
- Full Text
- View/download PDF
104. Innovative Application of Blockchain Technology for Digital Recipe Copyright Protection
- Author
-
Linlu Zhang, Shuxian Liu, Chengji Ma, and Tingting Su
- Subjects
blockchain ,text similarity ,consensus protocol ,digital recipes ,SimHash ,Technology ,Engineering (General). Civil engineering (General) ,TA1-2040 ,Biology (General) ,QH301-705.5 ,Physics ,QC1-999 ,Chemistry ,QD1-999 - Abstract
With the advent of the digital age, traditional lifestyle activities, such as reading books, referencing recipes, and enjoying music, have progressively transitioned from offline to online. However, numerous issues plague the conventional approach to digital copyright protection. This is especially true in the realm of recipe protection, where the rights and interests of original creators are inadequately safeguarded due to the widespread dissemination of a large number of recipes on the Internet. This primarily stems from the high costs of gathering evidence, incomplete coverage of evidence collection, and the inability to identify and halt infringement activities in a timely manner during the process of traditional digital copyright protection. Therefore, this study designs and implements a blockchain-based digital recipe copyright protection scheme to address the issues of insufficient legal evidence and cumbersome processes in traditional digital copyright protection. First, we enhance standard short text similarity calculation method SimHash, boosting the accuracy of text similarity detection. We then utilize the decentralization, immutability, time-stamping, traceability, and smart contract features of blockchain technology for data privacy protection. We employ the Interplanetary File System (IPFS) to store raw data, thereby ensuring user privacy and security. Lastly, we improve the proxy voting node selection in the existing delegated proof of stake (DPOS) consensus mechanism. According thorough evaluation and empirical analysis, the scheme effectively improves the accuracy of text similarity detection. Simultaneously, the enhanced DPOS mechanism effectively rewards nodes with excellent performance and penalizes nodes exhibiting malicious behavior. In this study, we successfully designed and implemented an innovative digital recipe copyright protection scheme. This scheme effectively enhances the accuracy of text similarity detection; ensures the privacy and security of user data; and, through an enhanced DPOS mechanism, rewards well-performing nodes while penalizing those exhibiting malicious behavior.
- Published
- 2023
- Full Text
- View/download PDF
105. Blockchain and Machine Learning Inspired Secure Smart Home Communication Network
- Author
-
Subhita Menon, Divya Anand, Kavita, Sahil Verma, Manider Kaur, N. Z. Jhanjhi, Rania M. Ghoniem, and Sayan Kumar Ray
- Subjects
blockchain ,consensus protocol ,dragonfly algorithm ,Levenberg model ,smart contract ,Chemical technology ,TP1-1185 - Abstract
With the increasing growth rate of smart home devices and their interconnectivity via the Internet of Things (IoT), security threats to the communication network have become a concern. This paper proposes a learning engine for a smart home communication network that utilizes blockchain-based secure communication and a cloud-based data evaluation layer to segregate and rank data on the basis of three broad categories of Transactions (T), namely Smart T, Mod T, and Avoid T. The learning engine utilizes a neural network for the training and classification of the categories that helps the blockchain layer with improvisation in the decision-making process. The contributions of this paper include the application of a secure blockchain layer for user authentication and the generation of a ledger for the communication network; the utilization of the cloud-based data evaluation layer; the enhancement of an SI-based algorithm for training; and the utilization of a neural engine for the precise training and classification of categories. The proposed algorithm outperformed the Fused Real-Time Sequential Deep Extreme Learning Machine (RTS-DELM) system, the data fusion technique, and artificial intelligence Internet of Things technology in providing electronic information engineering and analyzing optimization schemes in terms of the computation complexity, false authentication rate, and qualitative parameters with a lower average computation complexity; in addition, it ensures a secure, efficient smart home communication network to enhance the lifestyle of human beings.
- Published
- 2023
- Full Text
- View/download PDF
106. Accurate Power Sharing and Voltage Restoration in DC Microgrids With Heterogeneous Communication Time Delays.
- Author
-
Nguyen, Duy-Long and Lee, Hong-Hee
- Subjects
- *
MICROGRIDS , *VOLTAGE , *SHARING - Abstract
In order to realize power sharing and voltage restoration in islanded microgrids, consensus-based control schemes (CBCSs) have been extensively studied recently due to their flexibility and reliability. Nevertheless, due to heterogeneous communication time delays, it is impossible to achieve accurate power sharing and voltage restoration with the conventional CBCS. In this article, we propose an enhanced CBCS, in which average microgrid voltage and per unit power estimators have been developed based on standard proportional-integral (PI) consensus algorithms and scattering transformations. Thanks to the proposed estimator, the adverse impact of time delays on stability and accuracy is removed, and accurate power sharing and voltage restoration are always achieved regardless of heterogeneous time delays. The effectiveness and feasibility of the control scheme have been theoretically analyzed and validated via simulations and experiments. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
107. Consensus of Switched Nonlinear Multiagent Systems Subject to Cyber Attacks.
- Author
-
Li, Sheng, Zou, Wencheng, Guo, Jian, and Xiang, Zhengrong
- Abstract
In this article, the output consensus problem is investigated for a class of switched nonlinear multiagent systems, where denial-of-service attacks and faults are considered in communication channels and agents’ actuators, respectively. The cyber attacks can damage the communication channels, which will cause the consensus performance degradation or even failure to achieve consensus. Compared with the existing results on consensus of multiagent systems under cyber attacks, the agents’ dynamics in this article are described by higher order heterogeneous switched nonlinear systems. The cyber attacks, actuator faults, asynchronous switchings, and the high complexity of the system make the existing consensus algorithms ineffective. A novel control scheme for the output consensus of the multiagent system subject to cyber attacks is proposed. By the graph theory, switched system theory and Lyapunov function method, sufficient conditions are presented to check whether the consensus objective can be achieved. Finally, the effectiveness of the proposed scheme is illustrated by two numerical simulations. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
108. Distributed Economic Dispatch Control Method with Frequency Regulator for Smart Grid under Time-Varying Directed Topology.
- Author
-
Ji, Lianghao, Meng, Weiqi, Yang, Shasha, and Li, Huaqing
- Abstract
The paper studies a new distributed control method to solve the economic dispatch problem (EDP) under directed topology based on consensus protocol. Electrical equipment is closely related to frequency, and the frequency of each generator varies independently during operation. Therefore, it hinders the realization of economic dispatch. To solve the problem, we combine a frequency regulator with a consensus protocol, which eliminates the effect of frequency variation on the designed consensus algorithm. Meanwhile, considering the problem of excessive communication cost and low computational efficiency in large-scale power systems, an event-triggered mechanism is introduced into the designed algorithm. Furthermore, in order to overcome the unexpected loss of communication links, the time-varying topology mechanism is employed to develop the distributed economic dispatch (DED) algorithm to improve the robustness. Then, the stability of the above algorithm is proved by graph theory and convergence analysis. Finally, several simulations illustrate that our proposed methods are effective. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
109. μDFL: A Secure Microchained Decentralized Federated Learning Fabric Atop IoT Networks.
- Author
-
Xu, Ronghua and Chen, Yu
- Abstract
Federated Learning (FL) has been recognized as a privacy-preserving machine learning (ML) technology that enables collaborative training and learning of a global ML model based on the aggregation of distributed local model updates. However, security and privacy guarantees could be compromised due to malicious participants and the centralized aggregation manner. Possessing attractive features like decentralization, immutability and auditability, Blockchain is promising to enable a tamper-proof and trust-free framework to enhance performance and security in IoT based FL systems. However, directly integrating blockchains into the large scale IoT-based FL scenarios still faces many limitations, such as high computation and storage demands, low transactions throughput, poor scalability and challenges in privacy preservation. This paper proposes $\mu $ DFL, a novel hierarchical IoT network fabric for decentralized federated learning (DFL) atop of a lightweight blockchain called microchain. Following the hierarchical infrastructure of FL, participants in $\mu $ DFL are fragmented into multiple small scale microchains. Each microchain network relies on a hybrid Proof of Credit (PoC) block generation and Voting-based Chain Finality (VCF) consensus protocol to ensure efficiency and privacy-preservation at the network of edge. Meanwhile, microchains are federated vie a high-level inter-chain network, which adopts an efficient Byzantine Fault Tolerance (BFT) consensus protocol to achieve scalability and security. A proof-of-concept prototype is implemented, and the experimental results verify the feasibility of the proposed $\mu $ DFL solution in cross-devices FL settings with efficiency, security and privacy guarantees. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
110. A Hierarchical and Location-Aware Consensus Protocol for IoT-Blockchain Applications.
- Author
-
Guo, Hao, Li, Wanxin, and Nejad, Mark
- Abstract
Blockchain-based IoT systems can manage IoT devices and achieve a high level of data integrity, security, and provenance. However, incorporating existing consensus protocols in many IoT systems limits scalability and leads to high computational cost and consensus latency. In addition, location-centric characteristics of many IoT applications paired with limited storage and computing power of IoT devices bring about more limitations, primarily due to the location-agnostic designs in blockchains. We propose a hierarchical and location-aware consensus protocol (LH-Raft) for IoT-blockchain applications inspired by the original Raft protocol to address these limitations. The proposed LH-Raft protocol forms local consensus candidate groups based on nodes’ reputation and distance to elect the leaders in each sub-layer blockchain. It utilizes a threshold signature scheme to reach global consensus and the local and global log replication to maintain consistency for blockchain transactions. To evaluate the performance of LH-Raft, we first conduct an extensive numerical analysis based on the proposed reputation mechanism and the candidate group formation model. We then compare the performance of LH-Raft against the classical Raft protocol from both theoretical and experimental perspectives. We evaluate the proposed threshold signature scheme using Hyperledger Ursa cryptography library to measure various consensus nodes’ signing and verification time. Experimental results show that the proposed LH-Raft protocol is scalable for large IoT applications and significantly reduces the communication cost, consensus latency, and agreement time for consensus processing. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
111. A Hierarchy Byzantine Fault Tolerance Consensus Protocol Based on Node Reputation.
- Author
-
Wang, Xixi and Guan, Yepeng
- Subjects
- *
FAULT tolerance (Engineering) , *REPUTATION , *BLOCKCHAINS , *REWARD (Psychology) , *CRYPTOCURRENCIES , *SMART cities , *COMPUTER network security - Abstract
A blockchain has been applied in many areas, such as cryptocurrency, smart cities and digital finance. The consensus protocol is the core part of the blockchain network, which addresses the problem of transaction consistency among the involved participants. However, the scalability, efficiency and security of the consensus protocol are greatly restricted with the increasing number of nodes. A Hierarchy Byzantine Fault Tolerance consensus protocol (HBFT) based on node reputation has been proposed. The two-layer hierarchy structure is designed to improve the scalability by assigning nodes to different layers. Each node only needs to exchange messages within its group, which deducts the communication complexity between nodes. Specifically, a reputation model is proposed to distinguish normal nodes from malicious ones by a punish and reward mechanism. It is applied to ensure that the malicious node merely existing in the bottom layer and the communication complexity in the high layer can be further lowered. Finally, a random selection mechanism is applied in the selection of the leader node. The mechanism can ensure the security of the blockchain network with the characteristics of unpredictability and randomicity. Some experimental results demonstrated that the proposed consensus protocol has excellent performance in comparison to some state-of-the-art models. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
112. An Approach for Blockchain Pool Mining Employing the Consensus Protocol Robust against Block Withholding and Selfish Mining Attacks.
- Author
-
Mihaljević, Miodrag J., Wang, Lianhai, Xu, Shujiang, and Todorović, Milan
- Subjects
- *
BLOCKCHAINS , *MINES & mineral resources , *RESOURCE allocation , *POWER resources , *ENERGY consumption - Abstract
This paper proposes an approach for pool mining in public blockchain systems based on the employment of a recently reported consensus protocol with the puzzle based on a symmetric encryption that provides an energy–space trade-off and reduces energy consumption. The proposed architecture employs a pseudo-symmetric allocation of the resources for the blockchain consensus protocol and provides protection against certain malicious actions of the pool members, as well as a miner's opportunity for selecting the resources required for participation in the consensus protocol. Given that the considered consensus protocol employs two resources, the proposed architecture uses this two-dimensional nature to provide resistance against block withholding and selfish mining attacks, as well as a reduction in energy spending as a trade-off with the employment of certain memory resources. The high resistance of the proposed pool mining approach against the considered attacks appears to be a consequence of the success probability of the pool in comparison with the success probability of malicious miners. Assuming appropriate selection of the puzzle hardness, the probability that malicious miners can solve the puzzle without the support of the pool manager can be arbitrarily small. Implementation of the proposed approach on a modified Ethereum platform and experimental evaluation issues have also been reported. The conceptual novelty of the proposed pool mining approach is the following: Instead of separation of the blockchain consensus protocol and control of pool miners honest work, this paper proposes an approach where honest work of miners and pool managers is provided by a dedicated application of the considered consensus protocol. Advantages of the proposal in comparison with the previously reported ones include the following: (i) high resistance against block withholding and selfish mining attacks without an additional security procedure; (ii) reduction in the energy required, and at the same time preservationthe security of the consensus protocol; (iii) flexibility of the pool miners regarding selection of the resources that should be employed providing a trade-off between required energy and memory resources. The proposed architecture was implemented employing a dedicated modification of the Ethereum platform and the performed experiments confirmed the feasibility and effectiveness of the proposal. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
113. A Parking Sharing Network Over Blockchain With Proof-of-Planned-Behavior Consensus Protocol.
- Author
-
Lin, Feilong, Xia, Shengnan, Qi, Jiahao, Tang, Changbing, Zheng, Zhonglong, and Yu, Xinghuo
- Subjects
- *
AUTOMOBILE parking , *PLANNED behavior theory , *BLOCKCHAINS , *PARKS , *CITY traffic , *PARKING facilities , *TRUST - Abstract
Parking problem has become a bottle neck of urban traffic management. On one hand, there is no effective way to get timely information of available parking lots. On the other hand, owners of private parking spaces are less willing to share their spare lots. To deal with the parking problem, a new parking sharing network named ParkChain is firstly proposed using blockchain to build a decentralized but trustworthy network. Herein, ParkChain provides a distributed autonomous infrastructure for both vehicle drivers and park granters, which can promote the extensive parking resource sharing and relieve the parking problem. A new blockchain consensus protocol named Proof-of-Planned-Behavior (PoPB) is proposed. It builds the model of the autonomous consensus process based on the theory of planned behavior (TPB), derives a computable threshold for qualification of block data authorizers, and then develops a dynamic authorizer group mechanism for creditability and decentrality considerations. Furthermore, various smart contracts are developed to carry out the parking services transparently. Finally, the prototype has been successfully implemented in a university campus setting to demonstrate the effectiveness of ParkChain. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
114. Consensus for Second-Order Multiagent Systems Under Two Types of Sampling Mechanisms: A Time-Varying Gain Observer Method.
- Author
-
Li, Bin, Jia, Xinchun, Chi, Xiaobo, You, Xiu, and Gao, Shuangshuang
- Abstract
This article considers the consensus of second-order multiagent systems (MASs) under a directed communication topology. By introducing time-varying gains into observers, two types of novel continuous-discrete-time observers are presented to estimate state information of agents under two sampling mechanisms, respectively, namely: 1) a synchronous nonuniform sampling (SNS) mechanism and 2) an asynchronous nonuniform sampling (ANS) mechanism. A new design method of the time-varying gain observer is proposed, in that it can allow for one to select a consensus protocol with lower cost observers to attain the consensus task. Only sampled position information needs to be transmitted in designing consensus protocols for the MSAs, and neither velocity information nor control input information is required. Under the SNS mechanism, a consensus condition is obtained and it is shown that the introduction of time-varying gains in the observers indeed can improve their convergence. Under the ANS mechanism, the corresponding consensus protocol allows the sampling and transmission of different agents to be asynchronous and aperiodic, which means that each agent may sample and transmit its information in line with its own sampling requirements. Furthermore, each sampling period can be arbitrarily selected within a certain range while ensuring the consensus of the MASs. Finally, numerical examples are given to illustrate the effectiveness of the obtained results. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
115. Dynamic Event-Triggered Consensus of General Linear Multi-Agent Systems With Adaptive Strategy.
- Author
-
Liu, Kaien and Ji, Zhijian
- Abstract
Consensus of multi-agent systems (MASs) with general linear dynamics is investigated. In order to reduce communication frequency and avoid dependence on global information, adaptive event-triggered strategy is applied. A kind of dynamic event-triggered strategy, which is more flexible in giving event-trigger threshold, is proposed. An event-trigger condition based on continuous relative measurement is first designed. Then, the event-trigger condition is improved to only utilize event-triggered information. Sufficient criteria are derived to guarantee consensus. Moreover, it is proved that the designed event-trigger conditions can exclude Zeno behavior. Numerical simulation is performed to verify the effectiveness of the obtained results. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
116. On Proof-of-Accuracy Consensus Protocols.
- Author
-
Aponte-Novoa, Fredy Andres and Villanueva-Polanco, Ricardo
- Subjects
- *
BLOCKCHAINS , *TRUST , *PARTICIPATION - Abstract
Consensus protocols are a fundamental part of any blockchain; although several protocols have been in operation for several years, they still have drawbacks. For instance, some may be susceptible to a 51% attack, also known as a majority attack, which may suppose a high risk to the trustworthiness of the blockchains. Although this attack is theoretically possible, executing it in practice is often regarded as arduous because of the premise that, with sufficiently active members, it is not 'straightforward' to have much computing power. Since it represents a possible vulnerability, the community has made efforts to solve this and other blockchain problems, which has resulted in the birth of alternative consensus protocols, e.g., the proof of accuracy protocol. This paper presents a detailed proposal of a proof-of-accuracy protocol. It aims to democratize the miners' participation within a blockchain, control the miners' computing power, and mitigate the majority attacks. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
117. Event-Triggered Bipartite Consensus for Fuzzy Multiagent Systems Under Markovian Switching Signed Topology.
- Author
-
Yu, Jiafeng, Ahn, Choon Ki, and Shi, Peng
- Subjects
MULTIAGENT systems ,FUZZY systems ,GAUGE invariance ,TOPOLOGY ,BIPARTITE graphs ,DIRECTED graphs - Abstract
In this article, we study the problems of bipartite and cooperative consensus with a strictly dissipative performance for fuzzy multiagent systems (MASs) in a unified framework. First, we prove that bipartite consensus over a structurally balanced signed graph is equivalent to cooperative consensus over the corresponding unsigned graph by leveraging the gauge transformation for a class of nonlinear MASs. Then, a polynomial fuzzy model is constructed to describe the nonlinear MAS formed by one leader and followers. For mitigating communication and computational load, a mode-dependent event-triggered transmission strategy is proposed. By establishing the switching topologies through Markovian process, a new sampled-data event-triggered consensus protocol is designed. With a mode-dependent Lyapunov–Krasovskii function, a novel relaxed dissipative criterion is obtained. The criterion guarantees that all agents can achieve both event-triggered cooperative consensus and event-triggered bipartite consensus with the same magnitude but opposite signs for MASs over structurally balanced signed directed graphs and Markovian switching topologies. Moreover, the event-triggered parameters and consensus control gains can be numerically solved via the sum-of-squares method. Simulation results are given to show the effectiveness of the proposed design method. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
118. Fully Distributed Adaptive Finite-Time Consensus for Uncertain Nonlinear Multiagent Systems.
- Author
-
Zhao, Le, Liu, Yungang, Li, Fengzhong, and Man, Yongchao
- Abstract
In this article, the adaptive finite-time consensus problem is discussed for uncertain nonlinear multiagent systems. In contrast with the correlative literature, the systems permit multiple uncertainties (not only in control coefficients but also in inherent nonlinearities), and typically the consensus protocol is pursued in a fully distributed fashion (independent from any global information of network topology). This essentially challenges the realization of the finite-time consensus. To overcome the challenge, a new continuous fully distributed protocol is proposed by combining adaptive techniques such that the finite-time consensus of the systems under investigation is achieved. Remarkably, a dynamic high gain, rather than multiple ones in the related literature, is adequate to resist two kinds of uncertainties and to guarantee the fully distributed fashion of the consensus protocol. Moreover, the adaptive finite-time consensus protocol is specified on the scenario of leader-following multiagent systems. Simulation results of three interaction topologies are acquired to illustrate the validity and the wider applicability of the proposed protocol. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
119. Consensus-Based Distributed Reduced-Order Observer Design for LTI Systems.
- Author
-
Wang, Xiaoling, Jiang, Guo-Ping, Su, Housheng, and Zeng, Zhigang
- Abstract
In this article, we refocus on the distributed observer construction of a continuous-time linear time-invariant (LTI) system, which is called the target system, by using a network of observers to measure the output of the target system. Each observer can access only a part of the component information of the output of the target system, but the consensus-based communication among them can make it possible for each observer to estimate the full state vector of the target system asymptotically. The main objective of this article is to simplify the distributed reduced-order observer design for the LTI system on the basis of the consensus communication pattern. For observers interacting on a directed graph, we first address the problem of the distributed reduced-order observer design for the detectable target system and provide sufficient conditions involving the topology information to guarantee the existence of the distributed reduced-order observer. Then, the dependence on the topology information in the sufficient conditions will be eliminated by using the adaptive strategy and so that a completely distributed reduced-order observer can be designed for the target system. Finally, some numerical simulations are proposed to verify the theoretical results. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
120. PoTA: A hybrid consensus protocol to avoid miners' collusion for BaaS platform.
- Author
-
Wang, Kaiyu, Tu, Zhiying, and Ji, Zhenzhou
- Subjects
COLLUSION ,MINERS ,PROCESS capability ,BLOCKCHAINS ,HYBRID zones - Abstract
The emergence of the blockchain-as-a-service (BaaS) platform reduces the application barrier of blockchain technology. However, in BaaS, the transaction processing demand generated by BaaS users is continuous isolating from the transaction processing capability that comes from blockchain miner community. This results in the phenomenon that miner community spontaneously reduces the transaction processing capacity to obtain higher revenue, which is called the miners' collusion. The BaaS platform requires a new consensus protocol that prevent the miners' collusion while remain the security and immutability of blockchain. Based on this challenge, in this article, we propose a hybrid consensus protocol for BaaS called the Proof-of-Transaction Amount (PoTA). First, we theoretically analyze and formally define the miners' collusion. The existence of Nash-equilibrium collusion strategy has been proven. Second, the calculation method of the miner's effective collusion strategy space is provided to help determine whether the BaaS is facing the threat of collusion. Third, by organizing a transaction packaging committee (TPC) based on transaction amount, PoTA successfully avoids single-identity miners who have greater effective collusion strategy space obtaining the authority of transaction packaging. In the meanwhile, we redefine the reference relationship of blocks to enable cross-verification of PoW and PoS consensus. Finally, we prove our protocol can effectively avoid the occurrence of the miners' collusion. Control experiments prove the outperforms security and performance of PoTA in the comparison with PoW, PoS and other hybrid protocols. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
121. Ecpoc: an evolutionary computation-based proof of criteria consensus protocol.
- Author
-
Thang Nguyen, Hoang-Nam Dinh, Van-Thanh Nguyen, Bao Son Do, Thi Tam Nguyen, and Ba-Lam Do
- Subjects
EVOLUTIONARY computation ,BLOCKCHAINS ,METAHEURISTIC algorithms ,EVOLUTIONARY algorithms ,PROOF theory - Abstract
Recently, blockchain technology has been applied in many domains in our life. Blockchain networks typically utilize a consensus protocol to achieve consistency among network nodes in a decentralized environment. Delegated Proof of Stake (DPoS) is a popular mechanism adopted in many networks such as BitShares, EOS, and Cardano because of its speed and scalability advantages. However, votes that come from nodes on a DPoS network tend to support a set of specific nodes that have a greater chance of becoming block producers after voting rounds. Therefore, only a small group of nodes can be selected to become block producers. To address this issue, we propose a new protocol called Evolutionary Computation-based Proof of Criteria (ECPoC), which uses ten criteria to evaluate and select a new block procedure in each round. Next, a set of optimal weights used for maximizing the network's decentralization level is identified through the use of evolutionary computation algorithms. The experimental results show that our consensus significantly enhances the degree of decentralization in the selection process of witness nodes compared to DPoS. As a result, ECPoC facilitates fairness between nodes and creates momentum for blockchain network development. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
122. Efficient Quantum Blockchain With a Consensus Mechanism QDPoS.
- Author
-
Li, Qin, Wu, Jiajie, Quan, Junyu, Shi, Jinjing, and Zhang, Shichao
- Abstract
Quantum blockchain is expected to offer an alternative to classical blockchain to resist malicious attacks laughed by future quantum computers. Although a few quantum blockchain schemes have been constructed, their efficiency is low and unable to meet application requirements due to the fact that they lack of a suitable consensus mechanism. To tackle this issue, a consensus mechanism called quantum delegated proof of stake (QDPoS) is constructed by using quantum voting to provide fast decentralization for the quantum blockchain scheme at first. Then an efficient scheme is proposed for quantum blockchain based on QDPoS, where the classical information is initialized as a part of each single quantum state and these quantum states are entangled to form the chain. Compared with previous methods, the designed quantum blockchain scheme is more complete and carried out with higher efficiency, which greatly contributes to better adapting to the challenges of the quantum era. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
123. A Fully Distributed Robust Secure Consensus Protocol for Linear Multi-Agent Systems.
- Author
-
Wang, Jingyao, Li, Yige, Duan, Zhisheng, and Zeng, Jianping
- Abstract
This brief analyzes the robust secure consensus control problem for linear multi-agent systems under random Denial-of-Service (DoS) attacks and external disturbances. When agents communicate with its neighbors, a malicious attacker randomly carries out DoS attacks to certain communication channels in the network, thereby causing the communication topology to be Markovian switching. Solely depending on the immediate partial information per node rather than global information, a fully distributed robust secure consensus protocol is put forward under DoS attacks and external disturbances by using the Lyapunov function analysis. A simulation case of leader-follower formation is taken to explain the efficiency of the consensus algorithm. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
124. The Criteria for Adapting a Blockchain Consensus Algorithm to IoT Networks
- Author
-
Mohamed Aghroud, Mohamed Oualla, and Lahcen El Bermi
- Subjects
blockchain ,IoT ,consensus algorithm ,consensus protocol ,consensus method ,smart objects ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
The Internet of Things (IoT) is a network of smart objects connected via the Internet, where each object is identified by a unique, accessible, and programmable address, while Blockchain is a technology for storing and transmitting information based on a decentralized system such that the centralized validation of transactions is replaced by a consensus mechanism. The integration of these two technologies requires consensus protocols to overcome the major challenges encountered in IoT systems, including issues related to security, storage capacity limits, computing power, etc. Therefore, different consensus algorithms have been implemented. For this purpose, this paper presents a research study on the criteria that would render a Blockchain consensus algorithm suitable for IoT networks, namely, computing power, latency, storage capacity, and security.
- Published
- 2023
- Full Text
- View/download PDF
125. Blockchain-based anonymous authentication and data aggregation for advanced metering infrastructure in smart grid.
- Author
-
Pei, Tingrui, Hou, Zhiwen, Zhou, Jun, Xiao, Chixin, and Zou, Juan
- Abstract
This paper proposes a blockchain-based scheme, focusing on anonymous identity authentication and data aggregation, for safer and more reliable bidirectional communication between the utility company and power consumers based on Advanced Metering Infrastructure (AMI). Firstly, to cope with the mutual identity authentication between resource-constrained Smart Meters, a lightweight anonymous authentication strategy is designed using Elliptic Curve Cryptography. Meanwhile, a reputation-based consensus protocol is developed to accomplish data aggregation in AMI by using decentralization and non-tampering features of the blockchain. During the communication, in each time slot, the proposed scheme only needs to select a trusted user randomly to undertake the mining node rather than to introduce a third-party in a centralized manner to summarize and record the user-side data into the blockchain. Such scheme can effectively prevent data tampering and also be effective to decrease the processing complexity. The AVISPA tool is adopted to formally evaluate its security. The simulation results show promising performance. The proposed scheme not only can guarantee secure communication but also effectively decrease the computational cost in AMI. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
126. OSCMS: A Decentralized Open-Source Coordination Management System Using a Novel Triple-Blockchain Architecture
- Author
-
Jiakai Chen, Yishi Zhao, and Xiao Chen
- Subjects
blockchain ,open-source community ,decentralized system ,coordination management ,multi-blockchain architecture ,consensus protocol ,Technology ,Engineering (General). Civil engineering (General) ,TA1-2040 ,Biology (General) ,QH301-705.5 ,Physics ,QC1-999 ,Chemistry ,QD1-999 - Abstract
Open-source systems help to manage the rapid development of software, while governing open-source systems properly can effectively promote software and software engineering. However, some significant problems, such as code controls, incentives, interaction and cooperation, automation, transparency and fairness of rights and responsibilities, cannot be properly solved by traditional methodologies. The decentralization, immutability, change in trust mode and smart contract programming of blockchain provide new solutions. In order to solve the problems of traditional centralized open-source governance, this paper proposes a decentralized open-source coordination management system using a novel triple-blockchain architecture. Through the analysis of traditional and blockchain-based research, the business and technical issues that need to be addressed in decentralized open-source governance systems have been emphatically studied. Combined with triple-blockchain architecture, smart contracts, oracles and continuous integration tools, we study the decentralization of open-source businesses and make them more trustworthy, automated and coordinated. An identity authentication mechanism is designed for permission control and inter-community collaboration. A decentralized open-source reputation is proposed for incentive and reference. We also improved the DPoS (Delegated Proof of Stake) consensus under triple-blockchain architecture to reduce repeated elections. By constructing the OSCMS prototype based on the proposed architecture model, many comparative experiments were conducted under different parameters and conditions and showed good feasibility, scalability, reliability and performance. The OSCMS not only solves the shortcomings of previous research but also provides a comprehensive and feasible reference for the decentralized practice of open-source governance.
- Published
- 2023
- Full Text
- View/download PDF
127. An Evaluation of Power Consumption Gain and Security of Flexible Green Pool Mining in Public Blockchain Systems
- Author
-
Miodrag J. Mihaljević, Milan Todorović, and Milica Knežević
- Subjects
blockchain ,consensus protocol ,pool mining ,energy reduction ,security evaluation ,selfish mining ,Mathematics ,QA1-939 - Abstract
This paper proposes a variant of the recently reported pool mining approach and provides a reduction in the energy that is consumed by the blockchain consensus protocol. The novelty of the proposed architecture lies in the employment of an innovative cryptographic puzzle that is based on stream ciphering. This enables flexibility in setting the difficulty parameter of the protocol, and allows for the separation of the energy and memory resources that are required for the puzzle solving. The proposed approach provides high resistance against the following malicious activities of miners in public blockchain systems: (i) the submission of fake work and fictitious computation results; and (ii) some well-known attacks that target the blockchain incentive mechanism. We experimentally evaluate the power consumption of the proposed consensus protocol and compare it with the traditional proof-of-work protocol based on hashing. The obtained results point out the gain that the proposed pool mining provides compared with the traditional types.
- Published
- 2023
- Full Text
- View/download PDF
128. Distributed Antiwindup Consensus Control of Heterogeneous Multiagent Systems Over Markovian Randomly Switching Topologies.
- Author
-
Wang, Jingyao, Wen, Guanghui, and Duan, Zhisheng
- Subjects
- *
MULTIAGENT systems , *DISTRIBUTED algorithms , *TOPOLOGY , *PROBLEM solving - Abstract
The consensus control of multiagent systems (MASs) over randomly switching communication topologies has drawn increasing attention from researchers, since the mean square consensus or the most surely consensus is significant and practical. This manuscript focuses on the output consensus problem for heterogeneous MASs with input saturation constraints over the Markovian randomly switching topologies. The main challenge of solving the concerned problem lies in the interplay among the heterogeneous dynamics, input saturation constraints and the Markovian randomly switching topologies. To overcome such a challenge, a class of distributed adaptive observers is first designed for all agents to deal with the uncertainty caused by the randomly switching topologies. Then, a class of local state observers is presented for estimating each agent’s state information. Based on the above steps, a class of antiwindup controllers is constructed and the control gain matrices are selected using only the dynamics information of each node. Finally, the effectiveness of the consensus protocol is demonstrated. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
129. Consensus of Stochastic Dynamical Multiagent Systems in Directed Networks via PI Protocols.
- Author
-
Gu, Haibo, Liu, Kexin, Lu, Jinhu, and Ren, Zhang
- Subjects
- *
MULTIAGENT systems , *DYNAMICAL systems , *AUTOMATIC control systems , *STOCHASTIC analysis , *SWARM intelligence , *DIRECTED graphs , *SPANNING trees - Abstract
With the rapid development of swarm intelligence, the consensus of multiagent systems (MASs) has attracted substantial attention due to its broad range of applications in the practical world. Inspired by the considerable gap between control theory and engineering practices, this article is aimed at addressing the mean square consensus problems for stochastic dynamical nonlinear MASs in directed networks by designing proportional-integral (PI) protocols. In light of the general algebraic connectivity, consensus underlying PI protocols for a directed strongly connected network is investigated, and due to the $M$ -matrix approaches, consensus with PI protocols for a directed network containing a spanning tree is studied. By constructing appropriate Lyapunov functions, combining with the stochastic analysis technique and LaSalle’s invariant principles, some sufficient conditions are derived under which the stochastic dynamical MASs realize consensus in mean square. Numerical simulations are finally presented to illustrate the validity of the main results. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
130. Free-Will Arbitrary Time Consensus for Multiagent Systems.
- Author
-
Pal, Anil Kumar, Kamal, Shyam, Yu, Xinghuo, Nagar, Shyam Krishna, and Xiong, Xiaogang
- Abstract
In this article, the free-will arbitrary time consensus is formulated for multiagent systems. This consensus protocol is independent of initial conditions and any other system parameters. With such a protocol, the multiagent system is shown to attain consensus as well as average consensus within the prespecified arbitrary time. Agents rendezvous can also be accomplished with the given protocol. Communication imperfections are easily handled with the designed protocol. Robust free-will arbitrary time consensus protocol is also designed. The stability of such nonlinear nonautonomous protocols is established using suitable Lyapunov functions. Simulation examples confirm the theoretical findings. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
131. Couple-Group Consensus of Cooperative–Competitive Heterogeneous Multiagent Systems: A Fully Distributed Event-Triggered and Pinning Control Method.
- Author
-
Li, Kangying, Ji, Lianghao, Yang, Shasha, Li, Huaqing, and Liao, Xiaofeng
- Abstract
This article discusses the couple-group consensus for heterogeneous multiagent systems via event-triggered and pinning control methods. Considering cooperative–competitive interaction among the agents, a novel group consensus protocol is designed. As inducing the time-correlation threshold function, a class of fully distributed event-triggered conditions without depending on any global information is proposed. Utilizing the Lyapunov stability theory, some sufficient conditions are obtained. Under hybrid event triggered and pinning control, pinning control strategies are first introduced. It is shown that under the proposed strategies, all agents can asymptotically achieve pinning couple-group consensus with discontinuous communication in a fully distributed way. Furthermore, the Zeno behavior for each agent is overcome. Finally, the reduction of the systems’ controller update frequency and the correctness of our conclusions are illustrated by some simulations. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
132. Almost Sure Consensus of Multi-Agent Systems: An Intermittent Noise.
- Author
-
Wu, Yongbao, Wang, Yue, Gunasekaran, Nallappan, and Vadivel, R.
- Abstract
In this brief, the almost sure exponential consensus of multi-agent systems is investigated. A consensus protocol is designed with aperiodically intermittent communication noise rather than common continuous communication noise. Based on the consensus protocol, some sufficient conditions are given. Moreover, theoretical results show that the larger the noise control gain is, the larger the convergence rate of exponential convergency becomes in an almost sure sense. Besides, when the consensus protocol with aperiodically intermittent communication noise degenerates into one with periodically intermittent communication noise or one with common continuous communication noise, two corollaries are presented respectively. Then, the main results are used to consider almost sure exponential consensus of oscillator systems, and some simulations are provided. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
133. Improving Blockchains With Client-Assistance.
- Author
-
Liu, Jian and Ren, Kui
- Subjects
- *
BLOCKCHAINS , *DISTRIBUTED databases , *PEER-to-peer architecture (Computer networks) - Abstract
Blockchain is a distributed database shared among disparate parties. It promises to enable new applications and solutions to wide-ranging domains. However, today's blockchains suffer from low throughput and high latency. This impedes widespread adoption of more complex blockchain-based applications. We propose a new direction for the future development of blockchains: pushing utmost work to client-side to make the blockchain-core as simple as possible. To show the feasibility and practicability of this idea, we construct both client-assisted consensus and client-assisted smart contracts. The client-assisted consensus only requires a single round-trip between clients and blockchain nodes; it is leaderless and parallelizable. Our experimental results show that it can process thousands of transactions per second when the number of replicas is 400. The client-assisted smart contract pushes the expensive execution to client-side and ensures the correctness by verifiable computation. It avoids duplicated execution, allows parallel execution and reduces transaction/blockchain sizes. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
134. Scalable Self-Sovereign Identity Architecture.
- Author
-
Misic, Jelena, Misic, Vojislav B., and Chang, Xiaolin
- Subjects
- *
FAULT tolerance (Engineering) , *NETWORK performance , *BLOCKCHAINS - Abstract
We propose a scalable self-sovereign identity (S3I) system architecture that uses a hierarchically structured Byzantine fault tolerance layer of validating authorities and a permissioned blockchain to record and manage user identities. Users and service providers interact with the S3I system through nearby proxy nodes that store copies of the blockchain but do not participate in the consensus protocol. We identify different challenges of such a system and discuss design choices that allow those challenges to be addressed and ultimately resolved, with focus on networking issues such as performance and coverage. We also show preliminary performance evaluation results that confirm the validity of the proposed approach. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
135. A Bilayer Scalable Nakamoto Consensus Protocol for Blockchain Systems.
- Author
-
Jiao, Zhenzhen, Tian, Rui, Shang, Dezhong, Ding, Hui, Zhang, Baoxian, and Li, Cheng
- Subjects
- *
BLOCKCHAINS , *SCALABILITY - Abstract
How to simultaneously achieve high security level, good scalability, and full decentralization is still a big issue in the design of a blockchain system. In this article, we propose Bicomp, a bilayer, scalable Nakamoto consensus protocol that is based purely on decentralized Nakamoto consensus. Bicomp works to generate two types of blocks - microblocks for concurrent in-network transaction serialization and macroblocks for chain formation. A leader is elected at the beginning of each round through Proof of Work-based computation; it puts microblocks mined by different nodes into one macroblock at the end of its tenure. Such bilayer design limits a leader's power and encourages as many nodes as possible to concurrently participate in the transaction serialization process, promoting the sharding nature of the system. Furthermore, several mechanisms are elaborately designed to reduce the transaction overlapping and further limit a leader's power, including a novel transaction diversity-based metric for deciding the branch legality. Security issues and potential attacks to Bicomp are extensively discussed. Experimental results based on 500 nodes all over the world show that Bicomp achieves high throughput performance. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
136. Integration of Fog Computing for Health Record Management Using Blockchain Technology.
- Author
-
Duhayyim, Mesfer A. I., Al-Wesabi, Fahd N., Marzouk, Radwa, Abdalla Musa, Abdalla Ibrahim, Negm, Noha, Hilal, Anwer Mustafa, Hamza, Manar Ahmed, and Rizwanullah, Mohammed
- Abstract
Internet of Medical Things (IoMT) is a breakthrough technology in the transfer of medical data via a communication system. Wearable sensor devices collect patient data and transfer them through mobile internet, that is, the IoMT. Recently, the shift in paradigm from manual data storage to electronic health recording on fog, edge, and cloud computing has been noted. These advanced computing technologies have facilitated medical services with minimum cost and available conditions. However, the IoMT raises a high concern on network security and patient data privacy in the health care system. The main issue is the transmission of health data with high security in the fog computing model. In today's market, the best solution is blockchain technology. This technology provides high-end security and authentication in storing and transferring data. In this research, a blockchain-based fog computing model is proposed for the IoMT. The proposed technique embeds a block chain with the yet another consensus (YAC) protocol building security infrastructure into fog computing for storing and transferring IoMT data in the network. YAC is a consensus protocol that authenticates the input data in the block chain. In this scenario, the patients and their family members are allowed to access the data. The empirical outcome of the proposed technique indicates high reliability and security against dangerous threats. The major advantages of using the blockchain model are high transparency, good traceability, and high processing speed. The technique also exhibits high reliability and efficiency in accessing data with secure transmission. The proposed technique achieves 95% reliability in transferring a large number of files up to 10,000. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
137. Reset Observer-Based Zeno-Free Dynamic Event-Triggered Control Approach to Consensus of Multiagent Systems With Disturbances.
- Author
-
Zhao, Guanglei, Hua, Changchun, and Guan, Xinping
- Abstract
In this article, we investigate the observer-based event-triggered consensus problem of multiagent systems with disturbances. A reset observer consisting of a linear observer and reset element is proposed, the reset element endows the reset observer the ability to improve transient estimation performance compared with traditional linear observers. A hybrid dynamic event-triggering mechanism (ETM) is proposed, in which an internal timer variable is introduced to enforce a lower bound for the triggering intervals such that Zeno-free triggering can be guaranteed even in the presence of disturbances. Then, in order to describe the closed-loop system with both flow dynamics and jump dynamics, a hybrid model is constructed, based on which the Lyapunov-based consensus analysis and dynamic ETM design results are presented. In contrast with linear observer-based consensus protocols and the existing dynamic ETMs, the system performance can be improved and continuous communication between neighboring agents is not needed. Finally, a simulation example is provided to show the effectiveness of the proposed methods. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
138. Reducing Forgery in Land Registry System Using Blockchain Technology
- Author
-
Ramya, U. M., Sindhuja, P., Atsaya, RA, Bavya Dharani, B., Manikanta Varshith Golla, SS, Barbosa, Simone Diniz Junqueira, Series Editor, Filipe, Joaquim, Series Editor, Kotenko, Igor, Series Editor, Sivalingam, Krishna M., Series Editor, Washio, Takashi, Series Editor, Yuan, Junsong, Series Editor, Zhou, Lizhu, Series Editor, Ghosh, Ashish, Series Editor, Luhach, Ashish Kumar, editor, Singh, Dharm, editor, Hsiung, Pao-Ann, editor, Hawari, Kamarul Bin Ghazali, editor, Lingras, Pawan, editor, and Singh, Pradeep Kumar, editor
- Published
- 2019
- Full Text
- View/download PDF
139. An Optimized Multi-Paxos Consensus Protocol for Practical Cloud Storage Applications
- Author
-
Lin, Wenmin, Sheng, Xuan, Qi, Lianyong, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Woeginger, Gerhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Vaidya, Jaideep, editor, Zhang, Xiao, editor, and Li, Jin, editor
- Published
- 2019
- Full Text
- View/download PDF
140. Implementing Arbitrary CRNs Using Strand Displacing Polymerase
- Author
-
Shah, Shalin, Song, Tianqi, Song, Xin, Yang, Ming, Reif, John, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Woeginger, Gerhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Thachuk, Chris, editor, and Liu, Yan, editor
- Published
- 2019
- Full Text
- View/download PDF
141. Goshawk: A Novel Efficient, Robust and Flexible Blockchain Protocol
- Author
-
Wan, Cencen, Tang, Shuyang, Zhang, Yuncong, Pan, Chen, Liu, Zhiqiang, Long, Yu, Liu, Zhen, Yu, Yu, Hutchison, David, Series Editor, Kanade, Takeo, Series Editor, Kittler, Josef, Series Editor, Kleinberg, Jon M., Series Editor, Mattern, Friedemann, Series Editor, Mitchell, John C., Series Editor, Naor, Moni, Series Editor, Pandu Rangan, C., Series Editor, Steffen, Bernhard, Series Editor, Terzopoulos, Demetri, Series Editor, Tygar, Doug, Series Editor, Guo, Fuchun, editor, Huang, Xinyi, editor, and Yung, Moti, editor
- Published
- 2019
- Full Text
- View/download PDF
142. A Performant Protocol for Distributed Health Records Databases
- Author
-
Micael Pedrosa, Rui Lebre, and Carlos Costa
- Subjects
Blockchain ,consensus protocol ,distributed ledger ,distributed databases ,electronic health records ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Electronic Health Records (EHR) have a distributed nature and can be managed by distinct affinity domains. Sharing patient health information across distinct organisations helps to deliver a well-informed diagnosis, improving the quality of healthcare service. The federation of those information systems can take the form of a distributed database where data are partitioned and possibly replicated across distinct computational systems. However, the benefits of having a distributed system, such as consistency, availability, and data protection, are mostly absent. This article proposes a distributed database consensus protocol designed to improve the performance of EHR insertion operations, a particularly critical issue in medical imaging cases due to the data volume. It explores the personal and non-transferable nature of EHR and the proposed methodology reduces the data contention through data isolation, improving the overall retrieval performance and detection of misbehaving parties. Furthermore, the proposal follows the recent European General Data Protection Regulation (GDPR), which states that appropriate mechanisms should be used in order to protect data against accidental loss, destruction, or damage, using appropriate technical or organisational measures.
- Published
- 2021
- Full Text
- View/download PDF
143. A Survey on Privacy-Preserving Blockchain Systems (PPBS) and a Novel PPBS-Based Framework for Smart Agriculture
- Author
-
Quang Nhat Tran, Benjamin P. Turnbull, Hao-Tian Wu, A.J.S. de Silva, Katerina Kormusheva, and Jiankun Hu
- Subjects
Biometrics ,blockchain ,consensus protocol ,internet of things ,privacy ,privacy-preservation ,Electronic computers. Computer science ,QA75.5-76.95 ,Information technology ,T58.5-58.64 - Abstract
Blockchain and smart contracts have seen significant application over the last decade, revolutionising many industries, including cryptocurrency, finance and banking, and supply chain management. In many cases, however, the transparency provided potentially comes at the cost of privacy. Blockchain does have potential uses to increase privacy-preservation. This paper outlines the current state of privacy preservation utilising Blockchain and Smart Contracts, as applied to a number of fields and problem domains. It provides a background of blockchain, outlines the challenges in blockchain as they relate to privacy, and then classifies into areas in which this paradigm can be applied to increase or protect privacy. These areas are cryptocurrency, data management and storage, e-voting, the Internet of Things, and smart agriculture. This work then proposes PPSAF, a new privacy-preserving framework designed explicitly for the issues that are present in smart agriculture. Finally, this work outlines future directions of research in areas combining future technologies, privacy-preservation and blockchain.
- Published
- 2021
- Full Text
- View/download PDF
144. MBCP: Performance Analysis of Large Scale Mainstream Blockchain Consensus Protocols
- Author
-
Manpreet Kaur, Mohammad Zubair Khan, Shikha Gupta, Abdulfattah Noorwali, Chinmay Chakraborty, and Subhendu Kumar Pani
- Subjects
Blockchain ,PoW ,PoS ,DPoS ,PoA ,consensus protocol ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
As Blockchain innovation picks up popularity in many areas, it is frequently hailed as a sound innovation. Because of the decentralization and encryption, many imagine that data put away in a Blockchain is and will consistently be protected. Among various abstraction layers of Blockchain architecture, the consensus layer is the core component behind the performance and security measures of the Blockchain network. Consensus mechanisms are a critical component of a Blockchain system’s long-term stability. Consensus forms the core of blockchain technology. Therefore, a range of consensus protocols has been introduced to maximize Blockchain systems’ efficiency and meet application domains’ individual needs. This research paper describes the layered architecture of Blockchain. A comprehensive review of mainstream consensus protocols mainly Proof of Work (PoW), Proof of Stake (PoS), Delegated Proof of Stake (DPoS), Proof of Activity (PoA) is presented in the paper. These mainstream consensus protocols have been explained and detailed performance analysis of these consensus protocols has been done. We have proposed a performance matrix of these consensus protocols based on different parameters like Degree of decentralization, Latency, Fault Tolerance Rate, Scalability, etc. Consensus protocols being the core of a strong fault-tolerant secured blockchain system, the proposed work intends to help inappropriate protocol selection and further research on strengthening trust and ownership in the technology. Depending upon different parameters like decentralization which is low in POA compared to other protocols, whereas POW is non-scalable, so depending on the priority of a particular performance parameter, the paper will help in the selection of a specific protocol.
- Published
- 2021
- Full Text
- View/download PDF
145. Bitcoin: a new proof-of-work system with reduced variance
- Author
-
Bazzanella, Danilo and Gangemi, Andrea
- Published
- 2023
- Full Text
- View/download PDF
146. A Hybrid Consensus Protocol for Pointwise Exponential Stability with Intermittent Information
- Author
-
Phillips, Sean, Li, Yuchun, and Sanfelice, Ricardo G
- Subjects
Consensus Protocol ,SetStability of Hybrid Systems ,Networked Systems - Abstract
We propose a solution to the problem of achieving consensus of the state of multiple systems connected over a network (over a directed graph) in which communication events are triggered stochastically. Our solution consists of a protocol design that, using intermittent information obtained over the network, asymptotically drive the values of their states to agreement, with stability, globally and with robustness to perturbations. More precisely, we propose a protocol with hybrid dynamics, namely, an algorithm with variables that jump at the communication events and evolve continuously in between such events. We design the protocols by recasting the consensus problem as a set stabilization problem and applying Lyapunov stability tools for hybrid systems. We provide sufficient conditions for exponential stability of the consensus set. Furthermore, we show that under additional conditions this set is also partially pointwise globally exponentially stable. Robustness of consensus to certain classes of perturbations is also established. Numerical examples confirm the main results.
- Published
- 2016
147. Optimal Multi-Tier Clustering of Permissioned Blockchain Systems for IoT.
- Author
-
Misic, Jelena, Misic, Vojislav B., and Chang, Xiaolin
- Subjects
- *
INTERNET of things , *BLOCKCHAINS , *FAULT tolerance (Engineering) , *COMPUTER architecture , *NUMBER systems , *ALGORITHMS - Abstract
In this work we describe and analyze a novel multi-tier architecture for recording Internet of Things (IoT) data. Each tier in the architecture consists of vertically interconnected node clusters that may be operated by different service providers. Blocks of IoT data are accepted by a cluster tier by tier, until they reach the top tier which adds them to the global blockchain and makes them available to client applications. To allow for large geographical coverage and reduce the dependency on any individual node in the cluster, clusters run a multiple entry version of the Practical Byzantine Fault Tolerance (PBFT) consensus algorithm. We describe an analytical model of the system and find the optimal allocation of clusters and nodes within clusters for a given number of tiers and system coverage area. Our results show that the total number of orderers for given system coverage and total load are main predictors of the block linking time, and indicate that minimizing block linking time is easier to achieve with a smaller number of tiers and large number of clusters with a smaller number of orderers per cluster. These observations can be used as guidelines for planning and dimensioning of multi-tier cluster architectures that create and maintain blockchain structures in a given coverage area. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
148. Leader-Following Output Consensus of Heterogeneous Uncertain Linear Multiagent Systems With Dynamic Event-Triggered Strategy.
- Author
-
Yang, Ruohan, Liu, Lu, and Feng, Gang
- Subjects
- *
MULTIAGENT systems , *LINEAR systems , *DYNAMICAL systems , *STATE feedback (Feedback control systems) , *LAPLACIAN matrices , *PSYCHOLOGICAL feedback - Abstract
This article investigates the leader-following output consensus problem of heterogeneous linear multiagent systems, where the nonidentical followers are subject to norm bounded parameter uncertainties. Two novel distributed event-triggered consensus strategies based on state feedback and output feedback, respectively, are proposed to solve the leader-following output consensus problem. A dynamic event-triggering mechanism which involves internal state variables is proposed to determine the next triggering instant. It should be noted that the controllers can be designed without the knowledge of some global graph information, such as the eigenvalues of the Laplacian matrix associated with the corresponding communication graph and the number of agents. In addition, the interevent time can be prolonged and the Zeno behavior can be excluded with the proposed dynamic triggering mechanism. Finally, an example is presented to illustrate the effectiveness of the proposed controllers. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
149. Median-Based Resilient Consensus Over Time-Varying Random Networks.
- Abstract
This brief investigates the resilient consensus control for multiagent systems over a time-varying directed random network. We propose a median-based consensus strategy, which is purely distributed and, as opposed to the Weighted-Mean-Subsequence-Reduced approaches in the existing literature, shared estimate regarding the number of malicious agents in the neighborhood of each cooperative agent is not required. This offers more applicability and flexibility as seeking a shared estimate of surrounding threats is often difficult in practice. In addition to malicious agents, random availability of communication edges is accommodated in the random network framework. Sufficient conditions are derived for reaching almost sure consensus by using a martingale convergence theorem. Finally, the theoretical findings are illustrated by numerical simulations. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
150. Characterizing Trust and Resilience in Distributed Consensus for Cyberphysical Systems.
- Author
-
Yemini, Michal, Nedic, Angelia, Goldsmith, Andrea, and Gil, Stephanie
- Subjects
- *
DISTRIBUTED algorithms , *WIRELESS sensor networks , *STOCHASTIC convergence - Abstract
This work considers the problem of resilient consensus, where stochastic values of trust between agents are available. Specifically, we derive a unified mathematical framework to characterize convergence, deviation of the consensus from the true consensus value, and expected convergence rate, when there exists additional information of trust between agents. We show that under certain conditions on the stochastic trust values and consensus protocol: First, almost sure convergence to a common limit value is possible even when malicious agents constitute more than half of the network connectivity; second, the deviation of the converged limit, from the case where there is no attack, i.e., the true consensus value, can be bounded with probability that approaches 1 exponentially; and third correct classification of malicious and legitimate agents can be attained in finite time almost surely. Furthermore, the expected convergence rate decays exponentially as a function of the quality of the trust observations between agents. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.