Computer Science ›› 2023, Vol. 50 ›› Issue (6): 322-329.doi: 10.11896/jsjkx.220500171

• Computer Network • Previous Articles     Next Articles

Raft Consensus Algorithm Based on Credit Evaluation Model

LIU Wei1,2,3, GUO Lingbei1,2, XIA Yujie1,2, SHE Wei1,2,3, TIAN Zhao1,2   

  1. 1 School of Cyber Science and Engineering,Zhengzhou University,Zhengzhou 450000,China
    2 Zhengzhou Key Laboratory of Blockchain and Data Intelligence,Zhengzhou 450000,China
    3 Henan Collaborative Innovation Center for Internet Medical and Health Services,Zhengzhou University,Zhengzhou 450000,China
  • Received:2022-05-18 Revised:2022-10-11 Online:2023-06-15 Published:2023-06-06
  • About author:LIU Wei,born in 1981,Ph.D,associate professor,is a member of China Computer Federation.His main research interests include blockchain,wireless mesh work and information security.TIAN Zhao,born in 1985,Ph.D,lectu-rer.His main research interests include information security,blockchain and intelligent transportation.
  • Supported by:
    Program for Science &Technology Innovation Talents in Universities of Henan Province(21HASTIT031),Major Public Welfare Project of Henan Province(201300210300),Training Plan for Young Backbone Teachers of Colleges and Universities in Henan(2019GGJS018),Key R & D and Promotion Project in Henan Province(212102310039,212102310554) and Zhengzhou University Education and Teaching Reform Research and Practice Project(2021ZZUJGLX168).

Abstract: In the Internet of Vehicles,the sharing and interaction of traffic information is required between vehicle nodes.How-ever,at present,there are still problems such as the difficulty in efficiently updating traffic data information between vehicle nodes and the dissemination of false information by malicious vehicle nodes.Aiming at the above problems,this paper proposes a Raft consensus algorithm based on credit evaluation model(CE-Raft).First,the credit evaluation model is constructed,and Byzantine vehicle nodes are detected and eliminated based on the isolated forest anomaly detection algorithm,and then an honest node number table is generated.Then the leader election is performed,and the honest node is elected as the leader by modifying the voting process of the follower node.Finally,log replication is performed,the leader node send an information synchronization request according to the honest node number table to ensure that the correct message reaches a consensus among the nodes.Experimental results show that the CE-Raft algorithm can effectively exclude Byzantine nodes,improve the prediction accuracy of honest nodes,and has lower latency and higher throughput,so that the Internet of Vehicles can still complete data sharing safely and efficiently in the presence of malicious nodes.

Key words: Blockchain, Raft, Isolated forest, Byzantine fault tolerance

CLC Number: 

  • TP302
[1]LI X H,ZHONG C,CHEN Y,et al.Overview of Internet of Vehicles Security [J].Journal of Information Security,2019,4(3):17-33.
[2]CHENG G,GUO D.Research on the current situation and development of the Internet of Vehicles [J].Mobile Communication,2011,35(17):23-26.
[3]HUANG Z Z,ZHANG X D,ZHAO J H.Design of Knowledge Sharing Mechanism Based on Blockchain [J].Journal of Chongqing University of Technology(Natural Sciences),2021,35(9):143-151.
[4]YUAN Y,WANG F Y.Development Status and Prospect of Blockchain Technology [J].Acta Automatica Sinica,2016,42(4):481-494.
[5]ZHANG L,LUO M,LI J,et al.Blockchain based secure datasharing system for Internet of vehicles:A position paper[J].Vehicular Communications,2019,16:85-93.
[6]KANG J,XIONG Z,NIYATO D,et al.Toward secure blockchain-enabled internet of vehicles:Optimizing consensus ma-nagement using reputation and contract theory[J].IEEE Tran-sactions on Vehicular Technology,2019,68(3):2906-2920.
[7]LI Z J,ZHANG G A,CHEN W W.Security CommunicationStrategy of Internet of Vehicles Based on Blockchain[J].Computer Engineering,2021,47(10):43-51.
[8]CHEN W W,CAO L,SHAO C H.An efficient anonymous authentication scheme for the Internet of Vehicles based on blockchain technology [J].Computer Applications,2020,40(10):2992-2999.
[9]HASROUNY H,SAMHAT A E,BASSIL C,et al.VANet security challenges and solutions:A survey[J].Vehicular Communications,2017,7:7-20.
[10]PARKINSON S,WARD P,WILSON K,et al.Cyber threats facing autonomous and connected vehicles:Future challenges[J].IEEE Transactions on Intelligent Transportation Systems,2017,18(11):2898-2915.
[11]ZHANG Y,ZHANG K,CAO J Y.Internet of Vehicles Driven by Edge Intelligence [J].Journal of the Internet of Things,2018,2(4):40-48.
[12]CHOWDHURY M,GAWANDE A,WANG L.Secure information sharing among autonomous vehicles in NDN[C]//2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation(IoTDI).IEEE,2017:15-26.
[13]LIU F,WANG Y F,YANG J,et al.A High-Threshold Signature Protocol Integrating DKG and BLS Based on Blockchain[J].Computer Science,2021,48(11):46-53.
[14]HUANG D.Electronic Evidence Authentication and Encryption Scheme Combining Blockchain and ring Signature [J].Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition),2022,34(1):16-23.
[15]ZHU X M,LIU B,BAI X,et al.Research on Wireless Blockchain Security of CSMA/CA Network Protocol [J].Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition),2022,34(1):6-15.
[16]XIONG X,LI L X,GAO J,et al.Research progress of blockchain in the field of Internet of Vehicles data sharing[J].Computer Science and Exploration,2022,16(5):1008-1024.
[17]ZHONG Z S.An Improved PoS Consensus Algorithm Based on Blockchain [J].Journal of Chongqing Technology and Business University(Natural Science Edition),2021,38(4):36-41.
[18]LIU F,YANG J,LI Z B,et al.A Secure Multi-Party Computation Protocol Based on Blockchain for Universal Data Privacy Protection [J].Computer Research and Development,2021,58(2):281-290.
[19]GE L,JI X S,JIANG T,et al.IoT information sharing security mechanism based on blockchain technology [J].Computer Applications,2019,39(2):458-463.
[20]WANG Z,LI T,WANG H,et al.{CRaft}:An Erasure-coding-supported Version of Raft for Reducing Storage Cost and Network Cost[C]//18th USENIX Conference on File and Storage Technologies(FAST 20).2020:297-308.
[21]TAN D,HU J,WANG J.VBBFT-Raft:an understandable block-chain consensus protocol with high performance[C]//2019 IEEE 7th International Conference on Computer Science and Network Technology(ICCSNT).IEEE,2019:111-115.
[22]WANG R,ZHANG L,ZHOU H,et al.A byzantine fault tolerance raft algorithm combines with BLS signature[J].Journal of Applied Sciences,2020,38(1):93-104.
[23]TIAN S,LIU Y,ZHANG Y,et al.A Byzantine Fault-Tolerant Raft Algorithm Combined with Schnorr Signature[C]//2021 15th International Conference on Ubiquitous Information Ma-nagement and Communication(IMCOM).IEEE,2021:1-5.
[24]CHEN Y,LIU P,ZHANG W.Raft consensus algorithm based on credit model in consortium blockchain[J].Wuhan University Journal of Natural Sciences,2020,25(2):146-154.
[25]ZHOU S,YING B.VG-Raft:An Improved Byzantine Fault To-lerant Algorithm Based on Raft Algorithm[C]//2021 IEEE 21st International Conference on Communication Technology(ICCT).IEEE,2021:882-886.
[26]WANG L,BAI Y,JIANG Q,et al.Beh-Raft-Chain:A behavior-based fast blockchain protocol for complex networks[J].IEEE Transactions on Network Science and Engineering,2020,8(2):1154-1166.
[27]HUANG D Y,LI L,CHEN B,et al.RBFT:Byzantine FaultTolerant Consensus Mechanism Based on Raft Cluster [J].Journal of Communications,2021,42(3):209-219.
[28]GAO W,MU W,HUANG S,et al.Improved Byzantine Fault-Tolerant Algorithm Based on Alliance Chain[J].Wireless Communications and Mobile Computing,2021,2021:1-10.
[1] YANG Jian, WANG Kaixuan. Tripartite Evolutionary Game Analysis of Medical Data Sharing Under Blockchain Architecture [J]. Computer Science, 2023, 50(6A): 221000080-7.
[2] TAN Pengliu, WANG Runshu, ZENG Wenhao, WANG Shikun, ZOU Wenshi. Overview of Blockchain Consensus Algorithms [J]. Computer Science, 2023, 50(6A): 220400200-12.
[3] HUANG Baohua, PENG Li, ZHAO Weihong, CHEN Ningjiang. Practical Byzantine Consensus Algorithm Based on Verifiable Random Functions [J]. Computer Science, 2023, 50(6A): 220300064-6.
[4] LIN Feilong, YUE Yuedong, ZHENG Jianhui, CHEN Zhongyu, LI Minglu. Blockchain-based Identity Authentication and Authorization Mechanism [J]. Computer Science, 2023, 50(6A): 220700158-9.
[5] PAN Lu, LUO Tao, NIU Xinzheng. Restart and Recovery Algorithm Based on Distributed Cluster Nodes [J]. Computer Science, 2023, 50(6A): 220300205-6.
[6] XIAO Jian, YANG Min. Multi-factor Blockchain Private Key Protection Scheme Based on Secret Sharing [J]. Computer Science, 2023, 50(6): 307-312.
[7] ZHANG Shue, TIAN Chengwei, LI Baogang. Review of Identity Authentication Research Based on Blockchain Technology [J]. Computer Science, 2023, 50(5): 329-347.
[8] LIU Zerun, ZHENG Hong, QIU Junjie. Smart Contract Vulnerability Detection Based on Abstract Syntax Tree Pruning [J]. Computer Science, 2023, 50(4): 317-322.
[9] LI Bei, WU Hao, HE Xiaowei, WANG Bin, XU Ergang. Survey of Storage Scalability in Blockchain Systems [J]. Computer Science, 2023, 50(1): 318-333.
[10] CHEN Yan, LIN Bing, CHEN Xiaona, CHEN Xing. Blockchain-based Trusted Service-oriented Architecture [J]. Computer Science, 2023, 50(1): 342-350.
[11] WANG Zi-kai, ZHU Jian, ZHANG Bo-jun, HU Kai. Research and Implementation of Parallel Method in Blockchain and Smart Contract [J]. Computer Science, 2022, 49(9): 312-317.
[12] FU Li-yu, LU Ge-hao, WU Yi-ming, LUO Ya-ling. Overview of Research and Development of Blockchain Technology [J]. Computer Science, 2022, 49(6A): 447-461.
[13] GAO Jian-bo, ZHANG Jia-shuo, LI Qing-shan, CHEN Zhong. RegLang:A Smart Contract Programming Language for Regulation [J]. Computer Science, 2022, 49(6A): 462-468.
[14] MAO Dian-hui, HUANG Hui-yu, ZHAO Shuang. Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance [J]. Computer Science, 2022, 49(6A): 523-530.
[15] CHEN Yan-bing, ZHONG Chao-ran, ZHOU Chao-ran, XUE Ling-yan, HUANG Hai-ping. Design of Cross-domain Authentication Scheme Based on Medical Consortium Chain [J]. Computer Science, 2022, 49(6A): 537-543.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!