Next Article in Journal
Yet Another Discriminant Analysis (YADA): A Probabilistic Model for Machine Learning Applications
Next Article in Special Issue
Concurrency Conflict Modeling for Asynchronous Processing in Blockchain-Based Transactive Energy Systems
Previous Article in Journal
Disconnected Stationary Solutions in 3D Kolmogorov Flow and Their Relation to Chaotic Dynamics
Previous Article in Special Issue
S&SEM: A Secure and Speed-Up Election Mechanism for PoS-Based Blockchain Network
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Addressing the Cost Optimization Issue for IOTA Based on Lyapunov Optimization Theory †

1
School of Computer Information Management, Inner Mongolia University of Finance and Economics, Hohhot 010070, China
2
School of Artificial Intelligence, Beijing Normal University, Beijing 100875, China
*
Author to whom correspondence should be addressed.
This paper is an extended version of our paper published in 2022 18th International Conference on Mobility, Sensing and Networking (MSN), Guangzhou, China, 14–16 December 2022; pp. 295–303.
Mathematics 2024, 12(21), 3391; https://doi.org/10.3390/math12213391
Submission received: 5 October 2024 / Revised: 27 October 2024 / Accepted: 28 October 2024 / Published: 30 October 2024

Abstract

:
IOTA is an emerging decentralized computing paradigm for developing blockchain-based Internet of Things (IoT) applications. It has the advantages of zero transaction fees, incremental scalability, and high-performance transaction rates. Despite its well-understood benefits, IOTA nodes need to withstand considerable resource costs to generate the distributed ledger. The main reason for this is that IOTA abandons the original blockchain reward mechanism and does not charge transaction fees. Therefore, in this paper we address the cost optimization issue for IOTA based on Lyapunov optimization theory. We take the first step in investigating the cost optimization problem of IOTA and exploring a new optimization scheme using Lyapunov optimization theory. Our proposed scheme enables IOTA to minimize the total cost of IOTA nodes through a computational optimization algorithm. Then, an optimized transaction rate control algorithm can be designed based on the large deviation theory to reduce orphan tangles that waste computational costs. In addition, we define and deduce the effective width of the tangle to monitor the total throughput and reduce the time spent on cost optimization to avoid unnecessary waste of resources. Lastly, a comprehensive theoretical analysis and simulation experiments demonstrate that the proposed strategy is both efficient and practical.
MSC:
68R10; 68U99; 68V15; 68W01; 68W15; 68W40

1. Introduction

The Internet of Things (IoT) is gradually developing as an emerging global Internet-based information architecture that facilitates the exchange of goods and services [1,2,3,4]. In a traditional IoT model, service providers typically rely on centralized servers to execute tasks. However, this service model suffers from several challenges, including centralization and security issues. Therefore, the emergence of blockchain technology brings opportunities to address the challenges of IoT. IoT applications combined with blockchain technology [5,6,7,8,9,10,11] have tremendously promoted development in many fields, for example, smart cities, the fintech revolution, and decentralized machine networks; however, due to the rapid development of IoT, the traditional single-chain blockchain structure makes it difficult to meet the micropayment requirements, scalability, and high concurrency of IoT. Thus, recent studies have developed DAG-based (i.e., directed acyclic graph structure) distributed ledger technologies such as IOTA [12,13], Obyte [14], and Nano [15]. Among thees, IOTA is the most representative platform specially tailored for IoT. IOTA is a new public chain system specially designed for IoT. It provides a trust layer for any device connected to the global internet, and is mainly used for micropayments, data security transfer, and data anchoring between devices. IOTA can effectively solve the problems of centralization, low concurrency, and high transaction fees in IoT.
Unlike the miners in Bitcoin, Ethereum, or other blockchain applications, IOTA nodes must contribute their computational resources to maintain IOTA network stability for free. This is because the miners can obtain both mining rewards and transaction fees, while in IOTA these kinds of incentives are not available. With the IOTA network continuing to expand, this mechanism inevitably leads to increased costs and pressures for nodes. Therefore, widespread adoption and promotion of IOTA applications is hindered by this inherent cost constraint.
Unfortunately, there has been little research into cost optimization of IOTA. Because maximizing utility is proportional to minimizing cost, solutions must be approached indirectly through existing methods. Jay et al. [16] provided a way to maximize IOTA utility. Their idea is to analyze the critical factors underlying IOTA’s utility and to find the public item. The, they explored the relationship among these factors to achieve the purpose of maximizing the IOTA utility. However, their approach to extracting the public items is too arbitrarily. To address this issue, the design challenges of our proposed solution mainly come from three dimensions. First, an efficient scheme optimizing the computational costs of all IOTA nodes needs to be devised in order to reduce expenditure. Based on the desired scheme, the critical factors can be directly evaluated and the optimal transaction approval rate (i.e., threshold) of IOTA nodes determined in real time to reduce computational costs. Second, the desired scheme can eliminate orphan tangles, which are valid yet rejected ledgers from the IOTA network. Orphan tangles can waste a lot of computing resources and cause network congestion, imposing a performance penalty on IOTA. Third, to reduce the cost optimization frequency and avoid unnecessary wastage of resources, it is necessary to prejudge whether optimization is required each time. Thus, we are motivated to develop a scheme to reduce the cost consumption of IOTA nodes.
Our contributions. This paper presents the first study of IOTA’s cost optimization. We propose a scheme for effectively reducing the tangle generation cost of IOTA nodes while maintaining their strong robustness. Specifically, we first design a thorough optimization algorithm using Lyapunov optimization theory, resulting in an approach that can balance transaction traffic and IOTA node tolerance. In addition, we consider the situation of resource wastage caused by frequent unnecessary optimization. In particular, we appoint a committee elected from IOTA nodes to ensure the correctness of the effective width of the tangle in each time slot. In short, our contributions are listed as follows:
  • We introduce Tangless, an efficient transaction cost optimization scheme for IOTA. By leveraging full-fledged optimization theories, Tangless ensures the robustness of the IOTA network with optimal costs for each node.
  • We design a computational optimization algorithm based on Lyapunov optimization theory. Our design can effectively reduce the cost of IOTA nodes by introducing a Lyapunov-based optimization framework.
  • We develop a transaction rate control algorithm using large deviation theory to reduce orphan transactions in the IOTA network. This algorithm helps to maintain a balance between transaction traffic and IOTA node tolerance, effectively addressing network congestion.
  • To the best of our knowledge, we are the first to define and determine the effective width of the tangle, which can help to tackle the issue of cost optimization. Notably, the proposed approach can help to predict the throughput that the IOTA system can tolerate, thereby avoiding unnecessary optimization in the next time slot.
  • In this paper, we offer a thorough theoretical analysis and conduct simulation experiments to validate the effectiveness of our proposed scheme.
The remainder of this paper is organized as follows: Section 2 describes the related work; Section 3 introduces the preliminaries; Section 4 presents the system overview; Section 5 presents the design of Tangless; the evaluation is shown in Section 6; finally, we conclude the paper in Section 7.

2. Related Work

In 2015, the IOTA Foundation launched the IOTA project to address the high transaction fees, concurrency, and scalability of blockchains in IoT. The distributed ledger of IOTA is named the tangle. Subsequently, Serguei Popov [17] explained the main working principle of the tangle ledger in a white paper. With the in-depth application of IOTA in IoT, many types of research have been carried out on IOTA [18,19]. In this work, we mainly focus on cost optimization and transaction rate control.
Cost optimization. Cost optimization of blockchains is a current research hotspot [20,21]. However, the existing research primarily focuses on blockchains with a single-chain structure while IOTA is based on a DAG structure. Because IOTA does not adopt a mining incentive mechanism and does not charge transaction fees, nodes cannot receive direct economic incentives for participating in the consensus, while still being exposed to many computational costs. One outstanding challenges is to reduce the overall cost of nodes. In [16], a method for maximizing IOTA utility based on some assumptions was provided by Jay et al. In their analysis, the authors extracted public items from the factors affecting the IOTA utility for optimization. Then, they directly added these items to build the maximum utility equation. However, this approach is too far-fetched to be practical, and the solution lacks credibility. In [22], Helmer et al. focused solely on the energy consumption of IOTA. Thus, it remains necessary to find an effective way to reduce the computational cost of IOTA nodes.
Rate control. Proof-of-Work (PoW) was the first consensus mechanism in the blockchain framework. PoW decides whether a miner has the right to form a block [23]. In the IOTA platform, PoW usually exists as a rate control mechanism, and its computational effort is much lighter than that performed by typical blockchains [24]. If the rate of issuing transactions has a good match with the approving ones, then the tangle continues to grow steadily; however, a sudden surge of new incoming transactions will lead to the transaction queue in each IOTA node being overly backlogged. This can easily lead to network congestion. In addition, time-sensitive transactions may be delayed, potentially causing huge losses. The literature [24] indicates that basic PoW cannot dynamically adjust network traffic on account of the constant difficulty value. Additionally, proposed solutions using adaptive PoW based on the mana value of a node fail to prevent unfairness. Mana is a reputation value, which represents the total funds transferred within a transaction. Wesolowski [25] introduced a sustainable verifiable delay function (VDF) that can resist parallel-accelerated computing; however, due to its complex nature, VDF is not a suitable replacement for PoW. Considering these observations, there is an urgent need for a more effective rate control method.

3. Preliminaries

IOTA and Tangle. Maintaining the growth of the IOTA tangle requires all IOTA nodes to reach consensus. Unapproved transactions (terminal transactions) in the tangle are called tips. Incoming transactions approving at least two tips can attach to the tangle. Figure 1 shows the structure of the tangle [1], with the the Genesis transaction on the left and the tips on the right.
In the early days of IOTA, the Coordinator was introduced to prevent malicious nodes from harming the developing IOTA network. Both IOTA 1.0 Ledger and IOTA 1.5 Chrysalis relied on the Coordinator to reach a consensus. However, if the Coordinator failed, the IOTA network would be paralyzed; thus, it was considered only a temporary solution. The plan was to remove the Coordinator in the future IOTA 2.0 update. IOTA 2.0 proposed Coordicide [24] (i.e., killing the Coordinator) to replace the Coordinator. This paper analyzes the cost optimization and transaction rate control in Coordicide (IOTA 2.0).
Lyapunov optimization. In 1892, Lyapunov published the famous paper The general problem of the stability of motion and established a general theory of the study of motion stability [26]. Lyapunov stability theory starts from each equilibrium state of the dynamic system, and studies the local stability near it. Over the past hundred years, Lyapunov theory has been widely developed in mechanics, information science, and many other fields. The fundamental idea of Lyapunov optimization is to decompose a long-term optimization objective with long-term constraints into each time slot [27]. The target can then be directly optimized without breaking the agreement that the current time slot needs to follow. Many prior parameters do not require Lyapunov optimization, which has good adaptability to the real-time control of dynamic systems while ensuring relatively low computational complexity.
Supposing a system with n queues, we can use a vector to represent the whole queue. Let I ( t ) ( I 1 ( t ) , I i ( t ) , I n ( t ) ) , where I ( t ) is a queue backlog vector; then, the Lyapunov function is expressed as L ( I ( t ) ) 1 2 i = 1 n w i I i ( t ) 2 n N . To simplify the calculation, w i = 1 is taken for any i. The function L ( I ( t ) ) is always non-negative, and is equal to zero if and only if all components of I ( t ) are zero; ( I ( t ) ) = L ( I ( t + 1 ) ) L ( I ( t ) ) , called the Lyapunov drift, represents the increment of all queue backlogs from time slot t to time slot ( t + 1 ) . In this paper, we optimize the resource costs of IOTA nodes based on the Lyapunov optimization framework.
Large deviation theory. Large deviation theory is a critical branch of probability theory and limit theory. It helps to estimate the probability of making mistakes in hypothesis testing of a stochastic system, the escape probability of a stochastic system, and the probability of deviations from the deterministic orbit [28]. This theory has found wide application in fields such as information and finance, and is gaining increasing attention. The principle of large deviations can be described as follows.
Let ( X n , n N ) be a sequence of random variables that take values in R d ; say that X n satisfies a large deviation principle in R d with rate function H if H is a rate function and if, for any measurable set, B R d , inf x B o H ( x ) lim inf n 1 n l o g P ( X n B ) lim sup n 1 n l o g P ( X n B ) inf x B ˜ H ( x ) , where B o denotes the interior of B and  B ˜ its closure. In this paper, the tolerable number of effective delayed transactions and the minimum transaction approval rate of a node are deduced using large deviation theory.

4. System Overview

Figure 2 illustrates the system structure of IOTA, containing four types of entities: IoT devices, clients, IOTA nodes, and the committee [1]. When messages arrive at IoT devices, they are delivered to clients immediately. The messages, called transactions, are then packaged by clients and sent to IOTA nodes. Generating transactions involves cooperation between clients and nodes. Specifically, when a node receives a tip-selected request from the client, it selects two terminal transactions to approve and complete the calculation of a cryptographic puzzle. The result is then returned to the client. Upon receiving the results, the client packages the transaction and sends it to the node for verification. If the transaction is legitimate, the node updates its local ledger and broadcasts it to other IOTA nodes through the P2P protocol to complete the consensus processes.
In this work, we propose Tangless, a scheme for IOTA that optimizes node costs and controls transaction rates. To ensure smooth implementation of Tangless, we appoint a committee elected from IOTA nodes to conduct macro-level control.
Tangless is a crucial component in IOTA nodes that operates within the nodes. It consists of a Cost Optimization Module and a Verification and Rate Control Module. The main workflow, as highlighted in red in Figure 2, is as follows: upon initiation, the IOTA system gradually stabilizes as the number of joining nodes meets the system’s requirements. We can denote this time slot as t. At this point, each IOTA node initializes Tangless for the first time. Specifically, with the tangle updating in time slot t, the node transfers the relevant data from the tangle to the Cost Optimization Module for optimization. We employ the computational optimization algorithm to derive the threshold of transaction approval rate a i ( t ) . Subsequently, a i ( t ) is transmitted to the Verification and Rate Control Module. In this module, we take the first step towards calculating the threshold for the minimum transaction approval rate a i * ( t ) using large deviation theory. Then, based on the threshold of the transaction approval rate obtained from the cost optimization algorithm, we determine the optimal approval rate of each node. This rate is greater than a i * ( t ) but close to a i ( t ) . Additionally, the new difficulty of Tangless in each node can be calculated using the optimized transaction rate control algorithm. Based on these results, we implement the optimal approval rate for each node for time slot t + 1 . The proposed Tangless scheme can effectively minimize the resource costs of IOTA nodes and reduce the generation of orphan tangles.
Next, the committee members sum the optimal approval rate of each node to obtain the throughput of the tangle in time slot t. Specifically, the committee regards the current throughput as the initial value of the effective width of the tangle. Through numerical analysis, the committee calculates the quality of the approval parameter. This parameter is an indicator of the service quality provided by the current IOTA system. If the number and status of nodes fluctuate within the allowable range, this parameter will not change; however, if many nodes join or exit the IOTA network, then the parameter must be redetermined. Therefore, the committee members first need to pay attention to network changes. The committee then calculates the effective width of the tangle in subsequent time slots and compares the result with the throughput in the corresponding time slot. If the throughput is higher, then it is necessary to trigger Tangless again.
Remarks. In our design, the task of calculating the effective width of the tangle is carried out by a group of IOTA nodes, which act as a committee to carry out the final macro-level control when detecting the throughput. Each IOTA node has the potential to be chosen as a committee member. Similar to the election mechanism in [29,30], we assume that more than 2 3 of the active IOTA nodes in the committee are honest. The trustworthiness of an IOTA node depends on the confidence value of its issuing transactions. The confidence level of a transaction is usually used to describe the validity of a message. The confidence level is mainly obtained by running the tip selection algorithm multiple times. The specific approach is to run the tip selection algorithm multiple times on conflicting transactions and select the transaction with the highest confidence value as the valid one. Additionally, we assume that the IOTA system will distinguish time-sensitive transactions, similar to blockchains [31]. Time-sensitive transactions are marked by clients when messages are sent. This enables us to determine which transactions should be prioritized for reception and approval when the throughput temporarily exceeds the effective width of the tangle.

5. Design of Tangless

This section presents our design of Tangless in detail. We first provide the computational optimization algorithm used in Tangless. Then, we propose the optimized transaction rate control algorithm based on the cost optimization of nodes. Moreover, we further introduce the effective width of the tangle, which is compared with the throughput to determine whether to optimize the next time slot.

5.1. Computational Optimization Algorithm

Reducing the expenditure of generating the tangle is the first step of Tangless. However, achieving this goal is challenging for two main reasons. First, the IOTA nodes issuing and approving transactions are unknown and dynamic, leading to unpredictable and unstable transaction queues. Second, long-term real-time optimization problems are generally complex and intertwined with various constraints, making traditional analysis methods ineffective [32]. To overcome the above challenges, we decouple the multi-objective optimization problem to achieve low computational complexity and make decisions without specific information. We leverage the Lyapunov optimization theory to embed transaction-related queues and constraints into the optimization framework, allowing us to solve the complex long-term cost optimization problem.
In what follows, suppose that the IOTA nodes issuing and approving transactions obey a Poisson distribution. Assume n nodes in IOTA, which are numbered with i, i { 1 , 2 , , n } . Finally, suppose that IOTA operates in the time interval [ 0 , T ) , which is divided into d time slots of equal length, and that each time slot is marked with t, t { 1 , 2 , , d } .

5.1.1. Modeling

For each node, we are interested in the difference between the number of new arriving transactions and the number of transaction approvals in each time slot t. Here, r i ( t ) indicates the number of new transactions arriving at node i, which are first buffered in node i’s backlog queue ε i ( t ) , where they await approval; a i ( t ) represents the number of transactions approved by node i. Both satisfy the independent identically distributed condition. Therefore, we can derive the following equation to formally demonstrate the evolution of each node i’s queue backlog:
ε i ( t + 1 ) = m a x [ ε i ( t ) a i ( t ) + r i ( t ) , 0 ] i , t
with ε i ( 0 ) = 0 i n .
Next, we need to add temporal consideration to the queuing game to meet the latency demand. Let h i ( t ) represent the average time spent by node i from the arrival of a transaction to the approval of the transaction. In light of L i t t l e s l a w , the average approving delay constraint can be expressed as h i ( t ) = lim d 1 d t = 0 d 1 E { ε i ( t ) } lim d 1 d t = 0 d 1 E { a i ( t ) } H . We define H as the maximum delayed approval time of each transaction, which can be determined by the committee according to the network conditions. Meanwhile, regardless of the hardware cost and loss of each node, the average cost of approving two terminal transactions is a, the average cost of verifying a transaction is b, the average cost of updating the local ledger one time is c, the average cost of solving a puzzle is f, and the average cost of broadcasting the tangle one time is g. Thus, the consumption cost of node i in time slot t is
D i ( t ) = ( a + c + f + g ) · a i ( t ) + b · y i ( t ) ,
where y i ( t ) = a ( t ) a i ( t ) and a ( t ) = i = 1 n a i ( t ) .
Taking all of the above into consideration, we mathematically devise the node cost optimization goal as Problem 1:
M i n i m i z e : lim sup d 1 d t = 0 d 1 E { i = 1 n D i ( t ) }
S u b j e c t t o : lim sup d t = 0 d 1 E { ε i ( t ) } d < i , t
h i ( t ) H i , t
D i ( t ) 0 i , t .
Notably, the transaction approvals of each time slot are entangled; thus, we cannot achieve the optimal solution of Problem 1 through simple combinatorial optimization.

5.1.2. Lyapunov Optimization

We expect the whole IOTA system to be stable and the tangle to grow steadily. As such, Problem 1 can be addressed using Lyapunov optimization theory. According to [27], we know that if ε i ( t ) is non-negative and if Equation (3b) holds, then E { ε i ( t ) } is strongly stable. Similarly, F i ( t ) denotes the cumulative backlog of transactions for which node i cannot meet the delay requirements in time slot t. Thus, we can convert Equation (3c) into the stability constraint of the virtual queue F i ( t ) , for which the expression is
F i ( t + 1 ) = m a x [ F i ( t ) a i ( t ) · h i ( t ) + ε i ( t ) , 0 ] i , t ,
with F i ( 0 ) = 0 i n . Similar to ε i ( t ) , F i ( t ) satisfies the delay demand constraint in Equation (3c) and is stable [27]. Therefore, Problem 1 can be turned into Problem 2:
M i n i m i z e : lim sup d 1 d t = 0 d 1 E { i = 1 n D i ( t ) }
S u b j e c t t o : lim sup d t = 0 d 1 E { ε i ( t ) } d < i , t
lim sup d t = 0 d 1 E { F i ( t ) } d < i , t
D i ( t ) 0 i , t .
We can analyze the evolution of queues using the Lyapunov optimization framework; see Table 1 for the specific parameter definitions.
Let I ( t ) [ ε ( t ) , F ( t ) ] . To simplify the calculation, w i = 1 is taken for any i. Thus, the Lyapunov function of our scheme is expressed as follows:
L ( I ( t ) ) 1 2 i = 1 n ε i ( t ) 2 + 1 2 i = 1 n F i ( t ) 2 n N .
If L ( I ( t ) ) is reduced to a sufficiently small value, we can maintain the backlog of each queue at a low level to meet the queue stability; thus, we introduce the Lyapunov drift under a single-slot condition to achieve this goal. This measures the increase in the backlog of all queues from time slot t to time slot t + 1 :
( I ( t ) ) E { L ( I ( t + 1 ) ) L ( I ( t ) ) I ( t ) } .
We can also understand this drift as the expected change of the Lyapunov function on a time slot. Because new transactions may become lost or invalid during network transmission, we can find a compromise between queue backlog and node cost by introducing and tuning the V value to minimize the drift and cost; here, V is an adjustable variable that describes the relative weight between queue stability and IOTA network cost minimization. In this work, we add a penalty function related to the value of V to both sides of Equation (7) to minimize the total cost of Equation (5a) and ensure the stability of the actual and virtual queues. According to this, the expression of the drift-plus-penalty of Lyapunov optimization is as follows:
D D ( I ( t ) ) = ( I ( t ) ) + V · E { D ( t ) ) } i , t ,
where V > 0 . Therefore, we turn Problem 2 into Problem 3:
M i n i m i z e : E { ( I ( t ) ) + V · D ( t ) } S u b j e c t t o : ( 5 b ) ( 5 d ) .
From a mathematical standpoint, D D ( I ( t ) ) can be explicitly derived (please refer to Lemma 1).
Lemma 1.
The drift-plus-penalty D D ( I ( t ) ) satisfies
D D ( I ( t ) ) A + i = 1 n E { ε i ( t ) · r i ( t ) ε i ( t ) · a i ( t ) + 1 2 ε i ( t ) 2 I ( t ) } + i = 1 n E { F i ( t ) [ ε i ( t ) a i ( t ) · H ] I ( t ) } + V · E { i = 1 n D i ( t ) I ( t ) } ,
where A 1 2 i = 1 n E { r i ( t ) 2 + a i ( t ) 2 + [ a i ( t ) · H ] 2 I ( t ) } .
Proof. 
According to Equation (6), we can write
L ( I ( t + 1 ) ) L ( I ( t ) ) = 1 2 i = 1 n ε i ( t + 1 ) 2 1 2 i = 1 n ε i ( t ) 2 + 1 2 i = 1 n F i ( t + 1 ) 2 1 2 i = 1 n F i ( t ) 2 .
Next, 1 2 i = 1 n ε i ( t + 1 ) 2 1 2 i = 1 n ε i ( t ) 2 describes the detailed derivation process as an example. The derivation of other terms is similar. It is worth noting that
ε i ( t + 1 ) 2 = ( m a x [ ε i ( t ) a i ( t ) + r i ( t ) , 0 ] ) 2 ( m a x [ ε i ( t ) a i ( t ) , 0 ] + r i ( t ) ) 2 ε i ( t ) 2 + a i ( t ) 2 + r i ( t ) 2 + 2 ε i ( t ) [ r i ( t ) a i ( t ) ] 2 a i ( t ) · r i ( t ) ε i ( t ) 2 + a i ( t ) 2 + r i ( t ) 2 + 2 ε i ( t ) [ r i ( t ) a i ( t ) ] .
The second line in Equation (12) is proved below.
If ε i ( t ) a i ( t ) + r i ( t ) 0 , then
ε i ( t + 1 ) = ε i ( t ) a i ( t ) + r i ( t ) .
Thus, we can know ε i ( t + 1 ) 2 = ( ε i ( t ) a i ( t ) + r i ( t ) ) 2 .
If ε i ( t ) a i ( t ) + r i ( t ) 0 , then
ε i ( t + 1 ) = 0 > ε i ( t ) a i ( t ) + r i ( t ) .
As we can know ε i ( t + 1 ) 2 = 0 < ( ε i ( t ) a i ( t ) + r i ( t ) ) 2 , we obtain
1 2 i = 1 n ε i ( t + 1 ) 2 1 2 i = 1 n ε i ( t ) 2 1 2 i = 1 n [ r i ( t ) 2 + a i ( t ) 2 + 2 ε i ( t ) [ r i ( t ) a i ( t ) ] ] .
Similarly, we have
1 2 i = 1 n F i ( t + 1 ) 2 1 2 i = 1 n F i ( t ) 2 1 2 i = 1 n [ ( ε i ( t ) ) 2 + [ a i ( t ) · H ] 2 + 2 F i ( t ) [ ε i ( t ) a i ( t ) · H ] .
After scaling and simplification, we obtain
D D ( I ( t ) ) 1 2 i = 1 n E { r i ( t ) 2 + a i ( t ) 2 + 2 ε i ( t ) [ r i ( t ) a i ( t ) ] I ( t ) } + 1 2 i = 1 n E { [ a i ( t ) · H ] 2 + ( ε i ( t ) ) 2 + 2 F i ( t ) [ ε i ( t ) a i ( t ) · H ] I ( t ) } + V · E { i = 1 n D i ( t ) I ( t ) } .
For any i and t, both r i ( t ) and a i ( t ) have upper bounds. We extract these parameters as A 1 , that is, A 1 = 1 2 i = 1 n E { a i ( t ) 2 + r i ( t ) 2 + [ a i ( t ) · H ] 2 I ( t ) } . Consequently, when A A 1 , Lemma 1 holds.    □
Next, the approximate optimal solution of Problem 3 is solved through the drift-plus-penalty of Lyapunov optimization. Substituting Equation (2) into Equation (10), we have
D D ( I ( t ) ) A + i = 1 n E { ε i ( t ) · r i ( t ) ε i ( t ) · a i ( t ) + 1 2 ε i ( t ) 2 I ( t ) } + i = 1 n E { F i ( t ) [ ε i ( t ) a i ( t ) · H ] I ( t ) } + V i = 1 n · E { ( a + c + f + g ) · a i ( t ) + b · [ a ( t ) a i ( t ) ] ) I ( t ) } .
According to the opportunistic minimization of expectation [33], we minimize the above expectation by minimizing the function inside the expectation. Therefore, we can realize Equation (18) by calculating the minimum of the following expression. Let
B = 1 2 a i ( t ) 2 + 1 2 r i ( t ) 2 + 1 2 [ a i ( t ) · H ] 2 + ε i ( t ) [ r i ( t ) a i ( t ) ] + 1 2 ε i ( t ) 2 + F i ( t ) [ ε i ( t ) a i ( t ) · H ] + V [ ( a + c + f + g b ) · a i ( t ) + b · a ( t ) ] .
We can achieve the approximate solution to Problem 3 by solving the minimum value of B. In time slot t, the values of ε i ( t ) and F i ( t ) are fixed. In Equation (19), B is a quadratic convex function for a i ( t ) and has a minimum value in its definition domain. Thus, Problem 3 can be turned into Problem 4:
M i n i m i z e : B S u b j e c t t o : ( 5 b ) ( 5 d ) .
We can find the partial derivative of B to a i ( t ) in time slot t as follows:
B a i ( t ) = a i ( t ) + H 2 · a i ( t ) ε i ( t ) H · F i ( t ) + V ( a + c + f + g ) .
Let B a i ( t ) = 0 . Then, we obtain
a i ( t ) = ε i ( t ) + H · F i ( t ) V ( a + c + f + g ) 1 + H 2 .
When the transaction approval rate of node i satisfies Equation (22), B has a minimum value. Algorithm 1 shows the details of the computational optimization algorithm [1]. In this way, the threshold for the transaction approval rate can be obtained to reduce the tangle generating expenditure.
Algorithm 1 Computational optimization algorithm.
  • Input: Time slot, t; number of new transactions received in time slot t, r i ( t ) ; number of transaction approvals in time slot t, a i ( t ) ; transaction backlog queue in time slot t, ε i ( t ) ; cumulative backlog of new transactions for which node i cannot meet the delayed demand in time slot t, F i ( t ) ; resource cost of node i in time slot t, D i ( t ) ; maximum delayed approval time of a transaction, H.
  • Output:  N o n e .
  •  Initialize all parameters;
  •  for t = 0 to d 1 //d is the number of time slots.
  •        for i = 1 to n//n is the number of nodes.
  •              Obtain a i ( t ) and r i ( t ) ;
  •               ε i ( t + 1 ) = m a x [ ε i ( t ) a i ( t ) + r i ( t ) , 0 ] ;
  •               F i ( t + 1 ) = m a x [ F i ( t ) a i ( t ) · H
  •                               + ε i ( t ) , 0 ] ;
  •              Get D i ( t ) by Equation (2);
  •        Solve D D ( I ( t ) ) by Equation (10);
  •        //Determine the optimal control decision.
  •         a * ( t ) = a r g m i n D D ( I ( t ) ) ;
  •        for i = 1 to n
  •              Update ε i ( t ) and F i ( t ) ;
  •  Return;

5.2. Optimized Transaction Rate Control Algorithm

IOTA generates many orphan tangles due to network delay, resulting in wasted computational costs and potentially causing network congestion. Therefore, in this subsection we propose an optimized transaction rate control algorithm based on large deviation theory [28] to eliminate orphan tangles. To this end, we introduce two concepts: the number of tolerable delayed transactions and the minimum transaction approval rate.

5.2.1. Number of Tolerable Delayed Transactions

The queue backlog of new incoming transactions is studied to calculate the loss probability of arrival transactions P and its corresponding decay rate H ( q ) . Furthermore, critical factors are found to prevent the loss of arrival transactions and reduce orphan tangles.
Generally, each IOTA node has the computing power to validate transactions and maintain the tangle. Thus, the stability of F i ( t ) can satisfy the waiting delay requirements of incoming transactions. However, a small probability of events violating the above waiting delay still exists. Thus, we determine the cumulative backlog of tolerable delayed transactions of node i ( i { 1 , 2 , , n } ) by leveraging the large deviation theory, that is, the number of tolerable delayed transactions. In Section 5.1, r i ( t ) and a i ( t ) are the issuing rate of new transactions and the approval rate of the transactions of node i, respectively (taking time slots as the time unit). In light of the occurrence of small-probability events, this needs to satisfy r i ( t ) > a i ( t ) > 0 . To maintain the stability of the queue, r i ( t ) a i ( t ) < a i ( t ) · H is required, that is, r i ( t ) < a i ( t ) ( 1 + H ) . Let h represent the average time between an arriving transaction and its approval. Based on [17], we suppose that H = 2 h to ensure that the number of terminal transactions in the tangle for each time slot tends to a constant value. According to Equation (4), we can derive another expression for F i ( t ) :
F t = ε t a t · H t
in which ε t and a t indicate the actual length of ε i ( t ) for node i and the actual transaction approval quantity of node i in time slot t, respectively. Notably, F t can be negative in this part. Let β i represent the number of delayed transactions that node i can tolerate. As our main concern is the maximum number of transactions unapproved in time, we concentrate on X = sup t 0 F t , which denotes the maximum value of F t . As this is also the crux of analyzing the robustness of IOTA, it is imperative to analyze the probability of Y > β i . β i is defined as follows.
Definition 1 (The number of tolerable delayed transactions ( β i )).
If the number of issuing transactions from node i is greater than the number of transaction approvals by the node in time slot t, node i can still accept the number of transactions for which the latency requirement could not be satisfied.
Due to the above definition, we know that larger β i means that node i can tolerate more delayed transactions, in other words, node i can endure more delayed transactions as β i increases. When the difference between the number of delayed and approved transactions for node i is at its highest, delayed transactions overflow easily; therefore, the value of X can be analyzed to determine whether there is an overflow of delayed transactions. If  X > β i , then the incoming transactions overflow due to delay, and vice versa. Thus, we study probability P ( X > β i ) by discussing the relationship between X and F t to solve the overflow degree of delayed transactions reaching node i.
Leveraging Cramer’s theorem [28,34,35], we deduce the delayed transactions overflow probability of node i. Let β i = s q ( s > 0 , q > 0 ) . When s , P ( X > β i ) can be expressed as P ( X > β i ) e s H ( q ) ; thus, we have
lim s 1 s l o g P ( X s > q ) = H ( q )
where
H ( q ) = inf d 0 t Λ * ( q d )
and
Λ * ( x ) = sup β i R { β i x Λ ( β i ) } .
Here, Λ * ( · ) is the Fenchel–Legendre transform of Λ ( · ) . The logarithmic moment generating function of F t is
Λ ( β i ) = lim d 1 d l o g E e β i F t .
Next, let Λ ε ( · ) and Λ a ( · ) express the logarithmic moment generating function of ε t and a t · H , respectively. According to Equation (27), we obtain
Λ ( β i ) = Λ ε ( β i ) + Λ a ( β i ) .
In light of [36] and combined with Equation (28), we can deduce that
Λ ε ( β i ) = [ r i ( t ) a i ( t ) ] · ( e β i 1 ) ,
Λ a ( β i ) = a i ( t ) · H · ( e β i 1 ) .
According to Equations (26) and (29), we have
Λ ε * ( β i ) = x l o g x r i ( t ) a i ( t ) + r i ( t ) a i ( t ) x x 0 o . w .
Similarly, according to Equations (26) and (30), we have
Λ a * ( β i ) = x l o g x a i ( t ) · H + a i ( t ) · H x x 0 o . w .
To solve Λ * ( x ) , we need to deform the function. According to [34], it is known that Λ * ( x ) = Λ ε * ( r ) + Λ a * ( r x ) . Let G = Λ ε * ( r ) + Λ a * ( r x ) = sup β i R { β i r [ r i ( t ) a i ( t ) ] · ( e β i 1 ) } + sup β i R { β i ( r x ) a i ( t ) · H · ( e β i 1 ) } . Substituting r and r x into Equations (31) and (32), we have G = r l o g r r i ( t ) a i ( t ) + ( r x ) l o g r x a i ( t ) · H 2 r + x + [ r i ( t ) a i ( t ) ] + a i ( t ) · H . We calculate the first and second derivatives of G, that is, G r = l o g r r i ( t ) a i ( t ) + l o g r x a i ( t ) · H and 2 G r 2 = 1 r + 1 r x , respectively. When r > x 0 , we can know 2 G r 2 > 0 . This indicates that G has a minimum. Letting G r = 0 , we have r = x + x 2 + 4 [ r i ( t ) a i ( t ) ] · a i ( t ) · H 2 , which we can put into G to obtain the minimization of G:
G m i n = Λ m i n * ( x ) = [ r i ( t ) a i ( t ) ] + a i ( t ) · H x 2 + 4 [ r i ( t ) a i ( t ) ] a i ( t ) · H + 1 2 ( x 2 + 4 [ r i ( t ) a i ( t ) ] a i ( t ) · H + x ) · l o g x 2 + 4 [ r i ( t ) a i ( t ) ] a i ( t ) · H + x 2 [ r i ( t ) a i ( t ) ] + 1 2 ( x 2 + 4 [ r i ( t ) a i ( t ) ] a i ( t ) · H x ) · l o g x 2 + 4 [ r i ( t ) a i ( t ) ] a i ( t ) · H x 2 a i ( t ) · H .
Let x = q d . After transformation, we obtain d = q x ; thus, A = d Λ * ( q d ) = q x Λ m i n * ( x ) . When d = q a i ( t ) · H [ r i ( t ) a i ( t ) ] , where a i ( t ) · H > r i ( t ) a i ( t ) , A has the minimum value. Combining this with Equation (25), we can derive H ( q ) as follows:
H ( q ) = q l o g a i ( t ) · H r i ( t ) a i ( t )
in which H ( q ) is recognized as the exponential decay rate function of P ( X > β i ) . Notably, H ( q ) is an important index reflecting the loss of delayed transactions. Next, we present another definition.
Definition 2 (Number of effective tolerable delayed transactions ( β i * )).
If the number of issuing transactions from node i is greater than the number of transactions approved by the node in time slot t, node i can still accept the minimum number of transactions for which the latency requirement could not be satisfied.
This value should satisfy the condition that the probability of the maximum difference between the number of delayed and approved transactions be less than or equal to the given threshold θ ( 0 , 1 ] . This requirement can be mathematically described as β i * ( θ ) = m i n { β i : P ( X > β i ) θ } . Given a i ( t ) · H > r i ( t ) a i ( t ) > 0 , θ ( 0 , 1 ] , and  s > > 1 , we can derive β i * as follows:
β i * = l o g θ l o g a i ( t ) · H r i ( t ) a i ( t ) .
Proof. 
Inspired by Equation (24), when s , we can estimate P ( X > β i ) by e s H ( q ) . Through calculating P ( X > β i ) θ , we can obtain H ( q ) l o g ( θ ) s . Then, by substitution into Equation (34), we obtain q s l o g θ l o g a i ( t ) · H r i ( t ) a i ( t ) . Taking β i * = m i n { q s } , Equation (35) holds.    □
Although large q offers high efficiency in accepting more delayed transactions, it leads to long delays in transactions and takes up a great deal of storage space. We can also consider another factor affecting H ( q ) , which is the transaction approval rate. In this case, we should answer the fundamental question of how much computational power an IOTA node needs to approve tips. To address the problem, we introduce the following definition.
Definition 3 (Minimum transaction approval rate ( a i * )).
This rate refers to the minimum value of the transaction approval rate of node i to ensure that the loss probability of delayed transactions is less than or equal to the given threshold θ ( 0 , 1 ] .
We can know a i * ( θ ) = m i n { a i ( t ) : P ( X > β i ) θ } . For  a i ( t ) · H > r i ( t ) a i ( t ) > 0 , β i > 0 , and  θ ( 0 , 1 ] , we have
a i * = [ r i ( t ) a i ( t ) ] e l o g ( θ ) β i H .
The proof is similar to Equation (35), and is not repeated here. The related algorithm is shown in Algorithm 2.
Algorithm 2 Minimum transaction approval rate.
  • Input: Time slot, t; number of new transactions received in time slot t, r i ( t ) ; number of transaction approvals in time slot t, a i ( t ) ; maximum delayed approval time of a transaction, H; number of effective and tolerable delayed transactions, β i * ; given threshold, θ .
  • Output:  a i * .
  •  Determine H and θ by the committee;
  •  Obtain r i ( t ) and a i ( t ) ;
  • β i * = l o g θ l o g a i ( t ) · H r i ( t ) a i ( t ) ;
  • a i * = [ r i ( t ) a i ( t ) ] e l o g ( θ ) β i * H ;
  •  Return a i * ;
Next, we consider how to determine the cost of computational optimization. In light of the above analysis, the optimal transaction approval rate in real time should be close or equal to the threshold in Equation (22) and greater than the value of Equation (36). Under such circumstances, we can effectively reduce the cost of IOTA nodes while reducing the existence of orphan tangles.

5.2.2. Rate Control

Based on the analysis in the previous subsection, the transaction rate control problem can be transformed into the problem of adjusting the PoW difficulty of Tangless in IOTA, which is related to F t and r i ( t ) . Here, F t indicates the cumulative backlog of new transactions for which node i cannot meet the approval demand in time slot t. By monitoring the change in the F t value in each time slot, we propose a method for colculating the difficulty of Tangless. While each node in IOTA has a different calculation power, the node must provide greater than β i * space for tolerable delayed transactions in order to reduce overflow. We expect that β i * F t for stable growth of the tangle; thus, we discuss the change in F t . Specifically,  F t > 0 indicates that the current difficulty of Tangless is too high, while  F t = 0 shows that the number of new transaction arrivals of a node and the number of transaction approvals of the node match in time slot t, which is the optimum operating state of the IOTA node. Therefore, we do not need to adjust the difficulty of Tangless. If  F t < 0 , then the network load is small. Let d i ( t ) represent the difficulty of Tangless in node i in time slot t. The expression is
d i ( t ) = d 0 F t r i ( t ) i , t ,
where d 0 is the basic difficulty value. We set ρ t = F t r i ( t ) , which we call the variation in the difficulty of node i in every time slot. When ρ t = 0 , the rate control of Tangless will degenerate the fixed PoW, which is the same as IOTA 1.5 . Algorithm 3 shows the details of the rate control algorithm of Tangless. The algorithm balances transaction traffic and IOTA node tolerance to reduce the generation of orphan tangles, decrease waste of computing resources, and hinder network congestion.
Algorithm 3 Optimized transaction rate control algorithm.
  • Input: Time slot, t; number of time slots, d; number of new transactions received in time slot t, r i ( t ) ; number of transaction approvals after optimization in time slot t, a i * ( t ) ; basic difficulty value of Tangless rate control, d 0 ; difficulty value of Tangless rate control in time slot t, d i ( t ) ; transaction backlog queue in time slot t, ε i ( t ) ; cumulative backlog of new transactions for which IOTA node i cannot meet the delayed demand t, F i ( t ) ; maximum transaction delay time, H; number of effective and tolerable delayed transactions, β i * .
  • Output: Difficulty of node i in each time slot, d i ( ) .
  •  Initialize all parameters;
  •  Determine a i * ( t ) by Equations (22) and (36);
  •  for t = 1 to d
  •        if t > 0
  •               ε i ( t ) = m a x [ ε i ( t 1 ) a i * ( t ) + r i ( t ) , 0 ] ;
  •        else
  •               ε i ( t ) = m a x [ a i * ( t ) + r i ( t ) , 0 ] ;
  •         F i ( t ) = ε i ( t ) a i * ( t ) · H ;
  •        if F i ( t ) > 0
  •              if F i ( t ) β i *
  •                     d i ( t ) = d 0 F i ( t ) r i ( t ) ;
  •                    if d i ( t ) < d 0
  •                           d i ( t ) = d 0 ;
  •              Else suspend receiving transactions until
  •                     F i ( t ) β i * ;
  •        else if F i ( t ) < 0
  •               d i ( t ) = d 0 F i ( t ) r i ( t ) ;
  •  Return d i ( ) ;

5.3. Effective Width of the Tangle

With new transactions coming in continuously, it is important to control the throughput to ensure that it always fluctuate around the number of approved transactions that the IOTA network can tolerate. In the previous subsection, we determined the rate of each IOTA node. Algorithm 3 is an improvement of adaptive PoW [24] and is directed against each single IOTA node. In this subsection, we study the change in the transaction throughput of the IOTA system from a macro-level perspective to ensure the stable growth of the tangle, reduce cost optimization frequency, and avoid unnecessary waste of resources.
Monitoring whether the throughput is within the tolerance range of IOTA is proposed mainly to save on IOTA system costs. Specifically, incoming transaction rates that are too fast will place some new transactions at risk of being abandoned due to network congestion. If many terminal transactions are not approved timely, it can produce some orphan tangles. Either situation leads to considerable wastes in the IOTA system. We use the proposed Tangless scheme to address the above issues. Importantly, if nodes were to implement Tangless in every time slot, this would incur a great deal of cost, as the time complexity of the related algorithm is O ( n d ) . To solve the issue from an overall perspective, we propose a definition for the effective width of the tangle. We first compare the effective width with the corresponding throughput, then decide whether to implement Tangless for the next step, thereby avoiding resource wastage caused by unnecessarily frequent optimization.
Note that the effective width of the tangle is determined by the committee rather than by all IOTA nodes. By studying the matching degree between the effective width of the tangle and the throughput, we determine whether to necessarily implement the next round of cost optimization and transaction rate control. If the difference between them is within the tolerance of the IOTA system, this indicates that the growth of the tangle is stable. If the throughput is much greater than the effective width of the tangle, that is, beyond the tolerance of the IOTA system, it indicates that the current throughput needs adjustment and that we need to trigger Tangless again. Thus, the definition of the effective width of the tangle is as follows.
Definition 4 (Effective Width of the tangle).
The number of approved transactions per unit of time.
In communication, the effective bandwidth theory can describe the performance of burst traffic in a unified form. A popular method is log moment generating function transformation [34,37], which can be used to solve the effective bandwidth in a communication network. In our work, we regard incoming transactions as data transmitted by the IOTA network and the effective width of the tangle as the effective bandwidth. Thus, the effective width of the tangle can be calculated through the transformation of the log moment generating function. This approach allows us to study the actions to be taken by IOTA in the case of a sudden change in transaction volume.
Consider the case where new transactions are constantly attached to the tangle from moment 0. Let A ( 0 , t ] be the total number of new transaction arrivals in the interval between ( 0 , t ] ( t n ) and A ( 0 , t ] = Δ A 1 + + Δ A t . Suppose that Δ A i ( i = 1 , 2 , t ) denote the number of new transaction arrivals in the i-th unit, and are i.i.d. According to [34,38,39], we can conclude that the effective width of the tangle is
α ( γ ) = 1 γ t log E e γ A ( 0 , t ] ,
where is the log moment generating function of A ( 0 , t ] and γ is some given tail decay parameter (sometimes called an approval quality parameter), with γ > 0 .
Assume that r ¯ is the average rate at which new transactions arrive (assuming that all nodes have the same computing power), which is assumed to obey a Poisson distribution and to satisfy r ¯ Δ A 1 + Δ A 2 + + Δ A t t and r ¯ > 0 ; then, α ( γ ) can also be expressed as follows:
α ( γ ) = 1 γ log ( k = 0 r ¯ k e r ¯ k ! e γ k ) .
Proof. 
According to Equation (38), we can obtain
α ( γ ) = 1 γ t log E ( e γ Δ A 1 · e γ Δ A 2 · · e γ Δ A t ) = 1 γ t log ( E ( e γ Δ A t ) ) t = = 1 γ log E ( e γ Δ A t ) .
Based on the expectation of a Poisson distribution, we know that
E ( e γ Δ A t ) = k = 0 r ¯ k e r ¯ k ! e γ k .
Thus, we have
α ( γ ) = 1 γ log ( k = 0 r ¯ k e r ¯ k ! e γ k ) .
   □
Assuming r ¯ = 10 , this shows that α ( γ ) is increasing with γ , as shown in Figure 3. According to [34], we can see that α ( γ ) lies between the mean rate E ( Δ A t ) and the peak rate, which is ess. sup. Δ A t = i n f { x : P ( Δ A t x ) = 1 } . Here, we can consider x as the number of active nodes in the IOTA network.
Notably, the approval quality parameter is determined and maintained by the committee. Specifically, after optimizing the costs of IOTA nodes, we need to sum the thresholds of the transaction approval rates of all nodes to obtain the transaction throughput in time slot t. Next, the committee members adjust the parameter γ of α ( γ ) according to the throughput using the numerical analysis method and determine γ . Significantly, if we know the approval quality parameter, then we can deduce the effective width of the tangle in subsequent time slots. Therefore, in the next time slot, we can first calculate the value of α ( γ ) compare it with the current throughput, then decide whether to continue to optimize the costs of IOTA nodes.
As long as the number of IOTA nodes and the nodes’ status both remain unchanged, the approval quality parameter will remain unchanged. Thus, we can obtain the throughput that the network can tolerate. Nevertheless, if Tangless is started in each time slot, resources will be wasted and the efficiencies of nodes will be too low. Motivated by this observation, if the effective width of the tangle does not match the actual throughput in the next time slot (for example, if the fluctuation exceeds 5 % ), then we can start Tangless again. The details of the comparison algorithm are provided in Algorithm 4. The time complexity of this algorithm is less than O ( n d ) .
Algorithm 4 Throughput adjustment algorithm.
  • Input: Time slot, t; number of IOTA nodes, n; optimal approval rate, r i ; effective width of the tangle, α ( γ ) ; throughput, t h r o u .
  • Output: The result of the adjustment;
  •  Start and initialize the IOTA system. Suppose IOTA enters the stable state in time slot t;
  • s u m = 0 ;
  •  Again:
  •  //In time slot t;
  •  For ( i = 1 , i n , i + + )
  •        Run Algorithm 1 to get the threshold of transaction
  •        approval rate;
  •        Run Algorithm 2 to get the minimum transaction
  •        approval rate;
  •        Determine the optimal approval rate r i of each node;
  •         s u m = s u m + r i ;
  • t h r o u = s u m ; //Actual throughput
  • α ( γ ) = t h r o u ;
  •  According to t h r o u , γ can be determined by the committee;
  •  //In time slot t + 1 ;
  •  Calculate α ( γ ) according to Equation (39);
  •  Get t h r o u in the current time slot;
  •  If α ( γ ) ! = t h r o u ( 1 ± 0.05 )
  •  // 0.05 is the tolerance fluctuation range of the system throughput.
  •        goto Again;
  •  Else continue;
  •  Return;
In this work, we assume that all approved transactions are terminal transactions. The transaction attachment strategy (i.e., the tip selection algorithm) can solve and ensure this situation; however, this is not discussed in our paper.
In light of the above observations, we are also motivated to calculate the expected time for the first approval of the transaction. Let h ˜ represent the average time that a node needs to perform the calculations required to issue a transaction. We assume that all devices have approximately the same computing power, with λ representing the rate of that Poisson process; for simplicity, we assume that this rate remains constant in time. According to [17], we suppose that when any node issues a transaction, the state before h ˜ time units is observed instead of the tangle’s current state, that is, the transaction connected to the tangle at time t ˜ is only visible to the network until t ˜ + h ˜ . At a given time t ˜ , there are approximately λ h ˜ “hidden tips” and r ˜ “exposed tips”, meaning that L = r ˜ + λ h ˜ . Among these, “hidden tips” are not visible at time t ˜ , as they connect to the tangle in the time interval [ t ˜ h ˜ , t ˜ ] ) , while“exposed tips” are still tips at time t ˜ , having attached to the tangle before time t ˜ h ˜ . According to stationarity, we can assume that there are λ h ˜ tips in the tangle at time t ˜ h ˜ and no longer tips until time t ˜ . Now, when a new transaction arrives, the probability of a tip being approved is r ˜ / ( r ˜ + λ h ˜ ) ; thus, the average number of selected tips is 2 r ˜ / ( r ˜ + λ h ˜ ) . In the steady state, the average number of selected tips should equal 1, meaning that L = 2 λ h ˜ . The expected time of the first approvals is about h ˜ + L / ( 2 λ ) = 2 h ˜ . When the load is high, the maximum number of tips that can be approved is α ( γ ) at time t ˜ . Thus, the expected time of the first approved transaction should be no more than h ˜ + α ( γ ) / ( 2 λ ) .

6. Evaluation

In this section, we demonstrate the effectiveness of Tangless by contrasting it with adaptive PoW [24] to demonstrate the resulting improvement. Specifically, we first compare the resource costs of nodes obtained by non-optimization and Lyapunov optimization, then prove the effectiveness of the optimized transaction rate control algorithm. Our scheme was implemented in Python 3.10.2 on a laptop with an 11th-Gen Intel(R) Core(TM) i 7 - 11390 H processor and 16 GB RAM.
Our experimental simulations, we used the following parameter settings: the IOTA network had n nodes, with n = 100 , d = 100 , a + c + f + g = 0.04 , b = 0.01 , H = 1 , and v = 0.5 . We randomly selected three nodes for analysis, and r i ( t ) followed a Poisson distribution. Non-optimized ε queues and non-optimized F queues are shown in Figure 4a,c, while optimized ε queues and optimized F queues are shown in Figure 4b,d. The results indicate that the optimized queues change steadily with time. In particular, the accumulated backlog of new transactions fluctuates in a small range after optimization, as shown in Figure 4d [1]. Under the same conditions, the optimized cost of nodes (solid line) is lower than the cost without optimization (dashed line), as shown in Figure 5. According to these results, the computational optimization algorithm of Tangless reduces the resource costs of nodes (see Table 2).
In addition, we focused on evaluating Tangless’ optimized transaction rate control algorithm. First, the influence of relevant parameters was verified using the decay rate H ( q ) of P ( X > β i ) . From large deviation theory, we know that increasing the factors of q or a i ( t ) · H [ r i ( t ) a i ( t ) ] can increase the decay rate H ( q ) . The change in the decay rate H ( q ) with q and a i ( t ) · H [ r i ( t ) a i ( t ) ] is illustrated in Figure 6 [1]. The figure indicates that H ( q ) increases linearly with q, while it increases logarithmically with a i ( t ) · H [ r i ( t ) a i ( t ) ] . Hence, orphan tangles can be further hindered by adjusting the factors of H ( q ) . Then, we can determine the range of F t based on the obtained β i * value and the threshold of the transaction approval rate in order to control the transaction rate.
In [24], Serguei Popov et al. proposed the adaptive PoW algorithm to control the transaction rate. However, the adaptive PoW is linked to the mana of nodes, which can lead to some unfairness. In this paper, we ran the optimized transaction rate control algorithm of our Tangless scheme and the adaptive PoW algorithm on a single node to prove the effectiveness of Tangless. Let r i ( t ) follow the Poisson distribution, and let its expected value be 90, with a i ( t ) as the rate of the IOTA system approving transactions within [ 70 , 110 ] . The other parameter settings are d = 1000 , t = 1000 ms, m a n a = 0.1 , and d i f f i c u l t y = 10 (i.e., basic difficulty).
The comparative analysis is carried out from two aspects. First, we compare some parameters of the adaptive PoW algorithm before and after cost optimization. Second, we compare some parameters of Algorithm 3 before and after cost optimization. Specifically, Figure 7 shows the difficulty contrast of adaptive PoW, while Figure 8 indicates the difficulty contrast of Algorithm 3. It can be seen that the change frequency of the adaptive PoW difficulty value decreases, while the change frequency of the difficulty value of our proposed algorithm increases. In addition, Figure 9 and Figure 10 express the contrast of the backlogs of ε i ( t ) and F t before and after cost optimization, respectively. After cost optimization, ε i ( t ) and F t obviously tend to be stable. Moreover, Figure 10 illustrates the optimal transaction approval rate. It can be observed that the range of this rate’s change is smaller than before optimization, indicating the role of Algorithm 3. Overall, the trend of the optimal transaction approval rate is consistent with the corresponding parameters. These results further prove that Tangless keeps the IOTA system stable while optimizing resource costs. Tangless can dynamically adjust the PoW difficulty depending on the change in transaction flow to match the actual network situation in the next time slot. In light of the above, our proposed Tangless scheme can be considered effective (see Figure 11).

7. Conclusions

In this paper, we develop a new optimization scheme called Tangless based on Lyapunov optimization theory. First, we design a computational optimization algorithm to reduce the expenditure costs of IOTA nodes. Next, we use large deviation theory to provide an optimized transaction rate control algorithm for eliminating orphan tangles that waste computational costs. Finally, we define and deduce the effective width of the tangle, which can help to monitor the total throughput and reduce the frequency of cost optimization, thereby avoiding unnecessary waste of resources. Tangless can lay a solid technical foundation for promising blockchain-based IoT applications. Our simulation results demonstrate the effectiveness of the proposed Tangless scheme.

Author Contributions

Conceptualization, Y.C.; Methodology, Y.C.; Validation, B.S.; Investigation, Z.Q. and Y.L.; Resources, B.S.; Writing—original draft, Y.C.; Visualization, Y.W.; Supervision, Y.C. All authors have read and agreed to the published version of the manuscript.

Funding

This research was sponsored by the Natural Science Foundation of Inner Mongolia under Grants 2024LHMS06013 and 2024MS07012, the Regional Digital Economy and Digital Governance Research Center under Grants szzl202401, the Research Project on Education and Teaching Reform at Inner Mongolia University of Finance and Economics under Grants JXZD2405, the Fundamental Research Funds for the Central Universities of Inner Mongolia Autonomous Region under Grants NCYWT23034 and NCYWT23043, and the Special Research Project on the Five Major Tasks of the Inner Mongolia Autonomous Region by the Inner Mongolia University of Finance and Economics under Grants NCXWD2419.

Data Availability Statement

The original contributions presented in the study are included in the article, further inquiries can be directed to the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Chen, Y.; Guo, Y.; Bie, R. Tangless: Optimizing Cost and Transaction Rate in IOTA by Using Lyapunov Optimizations Theory. In Proceedings of the 2022 18th International Conference on Mobility, Sensing and Networking (MSN), Guangzhou, China, 14–16 December 2022. [Google Scholar]
  2. Xie, H.; Guo, Y.; Jia, X. Privacy-preserving location-based data queries in fog-enhanced sensor networks. IEEE Internet Things J. 2021, 9, 12285–12299. [Google Scholar] [CrossRef]
  3. Guo, Y.; Xi, Y.; Wang, H.; Wang, M.; Wang, C.; Jia, X. FedEDB: Building a Federated and Encrypted Data Store Via Consortium Blockchains. IEEE Trans. Knowl. Data Eng. 2023, 36, 6210–6224. [Google Scholar] [CrossRef]
  4. Zhang, C.; Xie, Q.; Wang, M.; Guo, Y.; Jia, X. Optimal Compression for Encrypted Key-Value Store in Cloud Systems. IEEE Trans. Comput. 2024, 73, 928–941. [Google Scholar] [CrossRef]
  5. Wu, J.; Jiang, S. On Increasing Scalability and Liquidation of Lightning Networks for Blockchains. IEEE Trans. Netw. Sci. Eng. 2022, 9, 2589–2600. [Google Scholar] [CrossRef]
  6. Adewuyi, A.A.; Cheng, H.; Shi, Q.; Cao, J.; MacDermott, Á.; Wang, X. CTRUST: A dynamic trust model for collaborative applications in the Internet of Things. IEEE Internet Things J. 2019, 6, 5432–5445. [Google Scholar] [CrossRef]
  7. Guo, Y.; Zhang, C.; Wang, C.; Jia, X. Towards Public Verifiable and Forward-Privacy Encrypted Search by Using Blockchain. IEEE Trans. Dependable Secur. Comput. 2022, 20, 2111–2126. [Google Scholar] [CrossRef]
  8. Guo, Y.; Xie, H.; Miao, Y.; Wang, C.; Jia, X. Fedcrowd: A federated and privacy-preserving crowdsourcing platform on blockchain. IEEE Trans. Serv. Comput. 2020, 15, 2060–2073. [Google Scholar] [CrossRef]
  9. Wang, M.; Guo, Y.; Zhang, C.; Wang, C.; Huang, H.; Jia, X. MedShare: A privacy-preserving medical data sharing system by using blockchain. IEEE Trans. Serv. Comput. 2021, 16, 438–451. [Google Scholar] [CrossRef]
  10. Li, C.; Qu, X.; Guo, Y. TFCrowd: A blockchain-based crowdsourcing framework with enhanced trustworthiness and fairness. EURASIP J. Wirel. Commun. Netw. 2021, 2021, 168. [Google Scholar] [CrossRef]
  11. Wang, S.; Zhang, Y.; Guo, Y. A Blockchain-Empowered Arbitrable Multimedia Data Auditing Scheme in IoT Cloud Computing. Mathematics 2022, 10, 1005. [Google Scholar] [CrossRef]
  12. IOTA Foundation. IOTA Project. Available online: https://www.iota.org (accessed on 1 October 2024).
  13. Chen, Y.; Guo, Y.; Wang, Y.; Bie, R. Toward Prevention of Parasite Chain Attack in IOTA Blockchain Networks by Using Evolutionary Game Model. Mathematics 2022, 10, 1108. [Google Scholar] [CrossRef]
  14. Churyumov, A. Byteball: A Decentralized System for Storage and Transfer of Value. 2016. Available online: https://chainwhy.com/upload/zb_users/upload/2018/05/201805071525666705388923.pdf (accessed on 1 October 2016).
  15. LeMahieu, C. Nano: A feeless distributed cryptocurrency network. Nano 2018, 4. Available online: https://media.abnnewswire.net/media/cs/whitepaper/rpt/91948-whitepaper.pdf (accessed on 24 March 2018).
  16. Jay, M.; Mollard, A.; Sun, Y.; Zheng, R.; Amigo, I.; Reiffers-Masson, A.; Ruano Rincón, S. Utility maximisation in the Coordinator-less IOTA Tangle. In International Symposium on Ubiquitous Networking; Springer: Cham, Switzerland, 2021; pp. 93–104. [Google Scholar]
  17. Popov, S. The Tangle. 2018. Available online: https://cryptoverze.s3.us-east-2.amazonaws.com/wp-content/uploads/2018/11/10012054/IOTA-MIOTA-Whitepaper.pdf (accessed on 1 October 2018).
  18. Soltani, R.; Zaman, M.; Upadhyay, D.; Jain, A.; Sampalli, S. Using IOTA Tangle and Machine Learning for a Defensive Model-Based Approach against Replication Attacks on Wireless Sensor Networks. IEEE Access 2024, 12, 148605–148624. [Google Scholar] [CrossRef]
  19. Ferenczi, A.; Bădică, C. Optimization of IOTA Tangle Cumulative Weight Calculation Using Depth-First and Iterative Deepening Search Algorithms. Vietnam J. Comput. Sci. 2024, 11, 301–321. [Google Scholar] [CrossRef]
  20. Hu, W.; Fan, Z.; Gao, Y. Research on smart contract optimization method on blockchain. IT Prof. 2019, 21, 33–38. [Google Scholar] [CrossRef]
  21. Cao, B.; Wang, X.; Zhang, W.; Song, H.; Lv, Z. A many-objective optimization model of industrial internet of things based on private blockchain. IEEE Netw. 2020, 34, 78–83. [Google Scholar] [CrossRef]
  22. Helmer, L.; Penzkofer, A. Report on the energy consumption of the IOTA 2.0 prototype network (GoShimmer 0.8.3) under different testing scenarios. arXiv 2022, arXiv:2210.13996. [Google Scholar]
  23. Nakamoto, S.; Bitcoin, A. A Peer-to-Peer Electronic Cash System. Bitcoin 2008, 4, 2. Available online: https://bitcoin.org/bitcoin.pdf (accessed on 1 October 2024).
  24. Popov, S.; Moog, H.; Camargo, D.; Capossele, A.; Dimitrov, V.; Gal, A.; Greve, A.; Kusmierz, B.; Mueller, S.; Penzkofer, A.; et al. The Coordicide. IOTA Found. 2020, 12, 1–30. [Google Scholar]
  25. Wesolowski, B. Efficient verifiable delay functions. In Annual International Conference on the Theory and Applications of Cryptographic Techniques; Springer: Cham, Switzerland, 2019; pp. 379–407. [Google Scholar]
  26. Lyapunov, A.M. The general problem of the stability of motion. Int. J. Control 1992, 55, 531–534. [Google Scholar] [CrossRef]
  27. Neely, M.J. Stochastic network optimization with application to communication and queueing systems. Synth. Lect. Commun. Netw. 2010, 3, 1–211. [Google Scholar]
  28. Dembo, A.; Zeitouni, O. Large Deviation Techniques and Applications. J. R. Stat. Soc. Ser. D 1993, 89, 303–304. [Google Scholar]
  29. Cai, C.; Zheng, Y.; Du, Y.; Qin, Z.; Wang, C. Towards private, robust, and verifiable crowdsensing systems via public blockchains. IEEE Trans. Dependable Secur. Comput. 2019, 18, 1893–1907. [Google Scholar] [CrossRef]
  30. Cai, C.; Weng, J.; Yuan, X.; Wang, C. Enabling reliable keyword search in encrypted decentralized storage with fairness. IEEE Trans. Dependable Secur. Comput. 2018, 18, 131–144. [Google Scholar] [CrossRef]
  31. Lai, W.J.; Hsueh, C.W.; Wu, J.L. A fully decentralized time-lock encryption system on blockchain. In Proceedings of the 2019 IEEE International Conference on Blockchain (Blockchain), Atlanta, GA, USA, 14–17 July 2019; pp. 302–307. [Google Scholar]
  32. Yu, D.; Zou, Y.; Yu, J.; Zhang, Y.; Li, F.; Cheng, X.; Dressler, F.; Lau, F.C. Implementing the abstract MAC layer in dynamic networks. IEEE Trans. Mob. Comput. 2020, 20, 1832–1845. [Google Scholar] [CrossRef]
  33. Lee, J.; Jindal, N. Delay constrained scheduling over fading channels: Optimal policies for monomial energy-cost functions. In Proceedings of the 2009 IEEE International Conference on Communications, Dresden, Germany, 14–18 June 2009; pp. 1–5. [Google Scholar]
  34. Ganesh, A.J. Big Queues; Springer: Berlin/Heidelberg, Germany, 2004. [Google Scholar]
  35. Chen, Y.; Guo, Y.; Chen, J.; Bie, R. Addressing the Tangle Vulnerability: A Preventive Strategy for IOTA by Using Large Deviation Theory. In Proceedings of the GLOBECOM 2022—2022 IEEE Global Communications Conference, Rio de Janeiro, Brazil, 4–8 December 2022. [Google Scholar]
  36. Ross, S.M. Introduction to Probability Models; Academic Press: Cambridge, MA, USA, 2014. [Google Scholar]
  37. Kelly, F.; Yudovina, E. Stochastic Networks; Cambridge University Press: Cambridge, UK, 2014; Volume 2, pp. 133–148. [Google Scholar]
  38. Fidler, M. An End-to-End Probabilistic Network Calculus with Moment Generating Functions. In Proceedings of the 2006 14th IEEE International Workshop on Quality of Service, New Haven, CT, USA, 19–21 June 2006; pp. 261–270. [Google Scholar]
  39. Kelly, F. Notes on Effective Bandwidths. Stoch. Netw. Theory Appl. 1997, 4, 1–29. [Google Scholar]
Figure 1. DAG structure of the tangle.
Figure 1. DAG structure of the tangle.
Mathematics 12 03391 g001
Figure 2. Overview of the system architecture.
Figure 2. Overview of the system architecture.
Mathematics 12 03391 g002
Figure 3. α ( γ ) along with γ changing trend.
Figure 3. α ( γ ) along with γ changing trend.
Mathematics 12 03391 g003
Figure 4. Comparison of queues before and after optimization.
Figure 4. Comparison of queues before and after optimization.
Mathematics 12 03391 g004
Figure 5. The comparison of the cost of nodes before and after optimization.
Figure 5. The comparison of the cost of nodes before and after optimization.
Mathematics 12 03391 g005
Figure 6. H ( q ) (decay rate of P ( X > β i ) ); to simplify the expression, we use diff for a i ( t ) · H [ r i ( t ) a i ( t ) ] .
Figure 6. H ( q ) (decay rate of P ( X > β i ) ); to simplify the expression, we use diff for a i ( t ) · H [ r i ( t ) a i ( t ) ] .
Mathematics 12 03391 g006
Figure 7. Rate control without cost optimization.
Figure 7. Rate control without cost optimization.
Mathematics 12 03391 g007
Figure 8. Rate control of cost optimization.
Figure 8. Rate control of cost optimization.
Mathematics 12 03391 g008
Figure 9. Rate control without cost optimization.
Figure 9. Rate control without cost optimization.
Mathematics 12 03391 g009
Figure 10. Rate control of cost optimization.
Figure 10. Rate control of cost optimization.
Mathematics 12 03391 g010
Figure 11. Rate control of cost optimization.
Figure 11. Rate control of cost optimization.
Mathematics 12 03391 g011
Table 1. Definitions of Lyapunov optimization parameters.
Table 1. Definitions of Lyapunov optimization parameters.
Variable NameDefinition
I ( t ) Queue backlog vector
L ( I ( t ) ) Lyapunov function
( I ( t ) ) Lyapunov drift
D D ( I ( t ) ) Drift-plus-penalty
VNon-negative weight
Table 2. Cost optimization parameters.
Table 2. Cost optimization parameters.
ParameterValue
n100
d100
a + c + f + g 0.04
b0.01
H1
V0.5
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Chen, Y.; Sun, B.; Wang, Y.; Qiu, Z.; Li, Y. Addressing the Cost Optimization Issue for IOTA Based on Lyapunov Optimization Theory. Mathematics 2024, 12, 3391. https://doi.org/10.3390/math12213391

AMA Style

Chen Y, Sun B, Wang Y, Qiu Z, Li Y. Addressing the Cost Optimization Issue for IOTA Based on Lyapunov Optimization Theory. Mathematics. 2024; 12(21):3391. https://doi.org/10.3390/math12213391

Chicago/Turabian Style

Chen, Yinfeng, Baojun Sun, Yaofei Wang, Zhixin Qiu, and Yang Li. 2024. "Addressing the Cost Optimization Issue for IOTA Based on Lyapunov Optimization Theory" Mathematics 12, no. 21: 3391. https://doi.org/10.3390/math12213391

APA Style

Chen, Y., Sun, B., Wang, Y., Qiu, Z., & Li, Y. (2024). Addressing the Cost Optimization Issue for IOTA Based on Lyapunov Optimization Theory. Mathematics, 12(21), 3391. https://doi.org/10.3390/math12213391

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop