Improved PBFT Algorithm Based on Comprehensive Evaluation Model
Abstract
:1. Introduction
2. Preliminaries
2.1. Protocol Overview of PBFT
- Request phase: The client sends a request to the primary node.
- Pre-prepare phase: The primary node receives requests from the client, then packages the transactions sequentially into blocks and broadcasts them to all replicas.
- Prepare phase: After receiving the pre-prepare message, all replicas broadcast each other to verify the validity of the message.
- Commit phase: Similar to the prepare phase, in the commit phase, each node will perform the all node broadcast mode to verify the validity of the message again.
- Reply phase: The committed node sends the consensus result to the client. If the client receives more than f valid reply messages from all nodes, the system reaches a consensus.
2.2. Entropy Weight Method
2.3. TOPSIS Method
2.4. Borda Count
3. TB-PBFT Algorithm
3.1. Grouping Strategy Based on UAV Cluster
3.2. Comprehensive Evaluation Model
3.2.1. Construction of the Evaluation Index
3.2.2. Design of The Comprehensive Evaluation Model
- (1)
- Determine the index weight of nodes. For a blockchain system, the smaller the information entropy of the evaluation index of node behavior, the greater its weight in the evaluation of node behavior. In contrast, if the information entropy of the index is greater, its weight will be smaller. In the consortium blockchain, nodes are strictly screened before entering the system. Therefore, most nodes in the system are excellent and honest nodes. If some nodes have poor performance according to the evaluation index, such as malicious behavior, the weight of the index obtained by the entropy weight method is larger.
- (2)
- Construction of the preference matrix. TOPSIS is an effective evaluation method in multi-objective decision analysis, that can objectively rank evaluation objects scientifically and reasonably. However, TOPSIS does not consider the weight of each index, which will lead to a certain research deviation between the evaluation results and the objective actual values. In this study, on the basis of the above method, we obtain the EM-TOPSIS model by combining the entropy weight method with the TOPSIS method. For voter k, the weight calculated according to the entropy weight method is multiplied by the normalized matrix to obtain the weighted decision-making evaluation matrix . Then, the matrix is used as an evaluation matrix, and the nodes are sorted according to relative proximity by the TOPSIS method. The preference matrix is established according to the preference order of voters.
- (3)
- Comprehensive score of nodes. The Borda count is a voting mechanism combining ranking order. The preference matrix of voter k is obtained from the EM-TOPSIS model, and the cumulative score of all voters on each node is calculated through the Borda count. Finally, the nodes are comprehensively ranked according to the cumulative scores.
3.3. Primary Node Selection
3.4. Consensus Process of the TB-PBFT Algorithm
4. Evaluation
4.1. Communication Complexity Analysis
- The communication complexity of the PBFT algorithm:
- The communication complexity of the TB-PBFT algorithm:
4.2. Fault Tolerance Analysis
4.2.1. The Maximum Number of Byzantine Fault Tolerances Analysis
4.2.2. Consensus Success Rate Analysis
4.3. Scalability and Dynamics
4.4. Comparisons of TB-PBFT with Other BFT-Type Consensus Algorithms
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System. White Paper, 2008. Available online: http://www.bitcoin.org/bitcoin.pdf (accessed on 31 October 2008).
- Michael, M.; Mills, S. The missing links in the chains mutual distributed ledger (aka Blockchain) standards. Soc. Sci. Electron. Publ. 2016, 8, 11–15. [Google Scholar]
- Diffie, W.; Hellman, M. New directions in cryptography. In Democratizing Cryptography: The Work of Whitfield Diffie and Martin Hellman; IEEE Transactions on Information Theory; Association for Computing Machinery: New York, NY, USA, 2006; Volume 22, pp. 644–654. [Google Scholar]
- Zheng, Z.; Xie, S.; Dai, H.; Chen, X.; Wang, H. An overview of blockchain technology: Architecture, consensus, and future trends. In Proceedings of the IEEE International Congress on Big Data (Big Data Congress), Honolulu, HI, USA, 25-30 June 2017; pp. 557–564. [Google Scholar]
- Gilbert, S.; Lynch, N. Brewer’s conjecture and the feasibility of consistent, available, partition-tolerant web services. ACM SIGACT News 2002, 33, 51–59. [Google Scholar] [CrossRef] [Green Version]
- Sunny, K.; Scott, N. PPcoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake. Available online: https://bitcoin.peryaudo.org/vendor/peercoin-paper.pdf (accessed on 28 December 2021).
- Larimer, D. Delegated proof-of-stake (dpos). Bitshare Whitepaper 2014, 81, 85. [Google Scholar]
- Lamport, L.; Shostak, R.; Pease, M. The byzantine generals problem. ACM Trans. Program. Lang. Syst. 1982, 4, 382–401. [Google Scholar] [CrossRef] [Green Version]
- Castro, M.; Liskov, B. Practical byzantine fault tolerance. In Proceedings of the Third Symposium on Operating Systems Design and Implementation, New Orleans, LA, USA, 22–25 February 1999; Volume 99, pp. 173–186. [Google Scholar]
- Yin, M.; Malkhi, D.; Reiter, M.K. HotStuff: BFT consensus with linearity and responsiveness. In Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing, Toronto, ON, Canada, 29 July–2 August 2019; pp. 347–356. [Google Scholar]
- Kotla, R.; Alvisi, L.; Dahlin, M.; Clement, A.; Wong, E. Zyzzyva: Speculative byzantine fault tolerance. In Proceedings of the Twenty-First ACM SIGOPS Symposium on Operating Systems Principles, Stevenson, WA, USA, 14–17 October 2007; Volume 41, pp. 45–58. [Google Scholar]
- Wang, Q.; Yu, J.; Peng, Z. Security analysis on dBFT protocal of NEO. In International Confernece on Financial Cryptography and Data Security; Springer: Cham, Switzerland, 2020; pp. 20–31. [Google Scholar]
- Kwon, J. Tendermint: Consensus without Mining [EB/OL]. Available online: https://tendermint.com/static/docs/tendermint (accessed on 28 April 2022).
- Gao, S.; Yu, T.; Zhu, J.; Cai, W. T-PBFT: An eigentrust-based practical byzantine fault tolerance consensus algorithm. China Commun. 2019, 16, 111–123. [Google Scholar] [CrossRef]
- Gilad, Y.; Hemo, R.; Micali, S. Algorand: Scaling byzantine agreements for cryptocurrencies. In Proceedings of the 26th Symposium on Operating Systems Principles, Shanghai, China, 28 October 2017; pp. 51–68. [Google Scholar]
- Micali, S.; Rabin, M.; Vadhan, S. Verifiable random functions. In Proceedings of the Symposium on Foundations of Computer Science IEEE Computer Society, Denver, CO, USA, 17–19 October 1999; pp. 120–130. [Google Scholar]
- Veronese, G.S.; Correia, M.; Bessani, A.N.; Lung, L.C.; Verissimo, P. Efficient byzantine fault-tolerance. IEEE Trans. Comput. 2013, 62, 16–30. [Google Scholar] [CrossRef] [Green Version]
- Feng, L.B.; Zhang, H.; Chen, Y. Scalable dynamic multi-agent practical byzantine fault-tolerant consensus in permissioned blockchain. Appl. Sci. 2018, 8, 1919. [Google Scholar] [CrossRef] [Green Version]
- Li, W.; Feng, C.; Zhang, L.; Xu, H.; Cao, B.; Imran, M.A. A scalable multi-layer PBFT consensus for blockchain. IEEE Trans. Parallel Distrib. Syst. 2021, 32, 1146–1160. [Google Scholar] [CrossRef]
- Ni, X.; Zeng, S.; Han, X.; Yuan, Y.; Wang, F.Y. Organizational management using software-defined robots based on smart contracts. In Proceedings of the 2018 IEEE Intelligent Vehicles Symposium (IV), Suzhou, China, 26–30 June 2018; pp. 274–279. [Google Scholar]
- Shuai, W.; Yong, Y.; Wang, X.; Li, J.; Qin, R.; Wang, F.Y. An overview of smart contract: Architecture, applications, and future trends. In Proceedings of the 2018 IEEE Intelligent Vehicles Symposium (IV), Suzhou, China, 26–30 June 2018; pp. 108–113. [Google Scholar]
- Shannon, C.E. A mathematical theory of communication. Bell Syst. Tech. J. 1948, 27, 379–423. [Google Scholar] [CrossRef] [Green Version]
- Tzeng, G.H.; Huang, J.J. Multiple Attribute Decision Making: Methods and Applications; CRC Press: Boca Raton, FL, USA, 2011. [Google Scholar]
- Michael, D. The borda count and agenda manipulation. Soc. Choice Welf. 1998, 15, 289–296. [Google Scholar]
- Qiu, W.H. Management Decision Science and Application of Entropy; Machinery Industry Press: Beijing, China, 2002. [Google Scholar]
- Gardas, B.B.; Heidari, A.; Navimipour, N.J.; Unal, M. A Fuzzy-Based Method for Objects Selection in Blockchain-Enabled Edge-IoT Platforms Using a Hybrid Multi-Criteria Decision-Making Model. Appl. Sci. 2022, 12, 8906. [Google Scholar] [CrossRef]
- Reilly, B. Social choice in the south seas: Electoral innovation and the borda count in the pacific island countries. Int. Political Sci. Rev. 2002, 23, 355–372. [Google Scholar] [CrossRef] [Green Version]
- Fraenkel, J.; Grofman, B. The borda count and its real-world alternatives: Comparing scoring rules in Nauru and Slovenia. Aust. J. Political Sci. 2014, 49, 186–205. [Google Scholar] [CrossRef]
- Kuzmin, A.; Znak, E. Blockchain-base structures for a secure and operate network of semi-autonomous Unmanned Aerial Vehicles. In Proceedings of the 2018 IEEE in Ternational Conference on Service Operations and Logistics, and Informatics (SOLI), Singapore, 31 July–2 August 2018; pp. 32–37. [Google Scholar]
- Mariottini, G.L.; Morbidi, F.; Prattichizzo, D.; Valk, N.V.; Michael, N.; Pappas, G.; Daniilidis, K. Vision-Based Localization for Leader–Follower Formation Control. IEEE Trans. Robot. 2009, 25, 1431–1438. [Google Scholar] [CrossRef]
- Justh, E.W.; Krishnaprasad, P.S. A Simple Control Law for UAV Formation Flying; University of Maryland: College Park, MD, USA, 2002. [Google Scholar]
- Swan, M. Blockchain thinking: The brain as a decentralized autonomous corporation. IEEE Technol. Soc. Mag. 2015, 34, 41–52. [Google Scholar] [CrossRef]
- Tapscott, D. How blockchain will change organizations. Mit Sloan Manag. Rev. 2017, 58, 10–13. [Google Scholar]
- Zhang, J.; Tang, Z.; Deng, B.; Liu, S.; Xiang, Y. A Case Study of Grassroots Water Conservancy Services Evaluation and Obstacle Factors Diagnosis Based on Gray Correlation-TOPSIS Model in Hunan Province, China. Int. J. Environ. Res. Public Health 2023, 20, 174. [Google Scholar] [CrossRef] [PubMed]
- Mohammed, M.A. Benchmarking Methodology for Selection of Optimal COVID-19 Diagnostic Model Based on Entropy and TOPSIS Methods. IEEE Access 2020, 8, 99115–99131. [Google Scholar] [CrossRef]
- Khater, M.M.A. Nonlinear Biological Population Model; Computational and Numerical Investigations. Chaos Solitons Fractals 2022, 162, 112388. [Google Scholar] [CrossRef]
- Khater, M.M.A. Abundant Accurate Solitonic Water and Ionic Liquid Wave Structures of the Nanoparticle Hybrid System. Comput. Appl. Math. 2022, 41, 177. [Google Scholar] [CrossRef]
PBFT | Tendermint | HoneyBadgerBFT | Zyzzyva | HotStuff | TB-PBFT | |
---|---|---|---|---|---|---|
Maximum Byzantine fault tolerance | ||||||
View change probability | High | High | High | High | High | Low |
Communication complexity | ||||||
Scalability | Low | High | Low | Low | High | High |
Degree of decentralization | Low | Low | Low | Low | Low | High |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Jiang, W.; Wu, X.; Song, M.; Qin, J.; Jia, Z. Improved PBFT Algorithm Based on Comprehensive Evaluation Model. Appl. Sci. 2023, 13, 1117. https://doi.org/10.3390/app13021117
Jiang W, Wu X, Song M, Qin J, Jia Z. Improved PBFT Algorithm Based on Comprehensive Evaluation Model. Applied Sciences. 2023; 13(2):1117. https://doi.org/10.3390/app13021117
Chicago/Turabian StyleJiang, Wangxi, Xiaoxiong Wu, Mingyang Song, Jiwei Qin, and Zhenhong Jia. 2023. "Improved PBFT Algorithm Based on Comprehensive Evaluation Model" Applied Sciences 13, no. 2: 1117. https://doi.org/10.3390/app13021117
APA StyleJiang, W., Wu, X., Song, M., Qin, J., & Jia, Z. (2023). Improved PBFT Algorithm Based on Comprehensive Evaluation Model. Applied Sciences, 13(2), 1117. https://doi.org/10.3390/app13021117