Computer Science ›› 2022, Vol. 49 ›› Issue (12): 362-367.doi: 10.11896/jsjkx.211100282

• Information Security • Previous Articles     Next Articles

Consensus Optimization Algorithm for Proof of Importance Based on Dynamic Grouping

WANG Dong1,2, XIAO Bing-bing1,2, JIN Chen-guang1, LI Zheng1,2, LI Xiao-ruo1, ZHU Bing-nan1   

  1. 1 School of Software,Henan University,Kaifeng,Henan 475001,China
    2 Henan International Joint Laboratory of Intelligent Network Theory and Key Technology,Kaifeng,Henan 475001,China
  • Received:2021-11-29 Revised:2022-05-27 Published:2022-12-14
  • About author:WANG Dong,born in 1977,Ph.D,professor,is a member of China Computer Federation.Her main research interests include blockchain and its applications.XIAO Bing-bing,born in 1997,postgraduate.Her main research interests include blockchain consensus algorithms and applications.
  • Supported by:
    National Natural Science Foundation of China(61872125),Henan Natural Science Foundation(192102210271), Research and Demonstration of Domestic Operating System Based on Kunpeng Platform(201300210400) and Major Science and Technology Special Projects in Henan Province in 2020.

Abstract: Proof of stake consensus algorithm(PoS) has the advantage of not requiring arithmetic power.However,the higher the equity of the node,the higher the probability of obtaining the bookkeeping rights,resulting in a very deterministic bookkeeping node and makes it easy for the rich to get richer.Once the node with the highest equity fails to book the block properly,the rest of the nodes still have to compete for the bookkeeping rights again.The probability of system stagnation increases dramatically at this point.To address these two shortcomings,a consensus optimization algorithm for proof of importance based on dynamic grouping(DPoI) is proposed.The algorithm introduces an importance assessment scheme,which calculates the importance score iValue of nodes in each round based on node activity,transaction share,time to find random numbers and reputation.Then,the nodes with similar iValue are dynamically grouped using Fibonacci series.Within the group,the DPoS voting strategy ranking is borrowed to act as an alternative node,thus forming a disaster recovery scheme to effectively avoid system stagnation.Finally,a binary exponential backoff algorithm is designed to quickly remove malicious nodes from the system,thus effectively enhancing the security and stability of the blockchain system.Experimental results show that the speed of DPoI block-out is about 6 times faster than PoI,which significantly improves the block-out speed.When the percentage of malicious nodes reaches 70%,the binaryexponential backoff algorithm can still effectively reject malicious nodes,and the reliability of the system is fully guaranteed.

Key words: Blockchain, Dynamic grouping, Proof of Importance, Credit, DPoS

CLC Number: 

  • TP309
[1]YUAN Y,WANG F Y.Blockchain:thestate of the art and future trends[J].Acta Automatica Sinica,2016,42(4):481-494.
[2]XIE P,SHI W G.Digital cryptocurrency research:a literature review[J].Financial Research,2015,415(1):1-15.
[3]YUAN Y,NI X C,ZENG S,et al.The development status and outlook of blockchain consensus algorithm[J].Journal of Automation,2018,44(11):2011-2022.
[4]XU F,YANG G W,JU D P.Design of Distributed Storage System on Peer-to-Peer Structure based on Peer-to-Peer [J].Journal of Software,2004,15(2):268-277.
[5]NAKAMOTO S.Bitcoin:A Peer-to-Peer Electronic Cash System[EB/OL].https://blog.csdn.net/yingkee/article/details/53888910.
[6]CHO H.ASIC-Resistance of Multi-Hash Proof-of-Work Mechanisms for Blockchain Consensus Protocols[J].IEEE Access,2018,6:66210-66222.
[7]VUKOLI M.The Quest for Scalable Blockchain Fabric:Proof-of-Work vs.BFT Replication[C]//International Workshop on Open Problems in Network Security.Springer International Publishing,2016.
[8]WANG J.Research on resource management mechanisms in P2P systems [D].Hefei:University of Science and Technology of China,2007.
[9]LI D Q.Denial of Service Attacks [M].Beijing:Electronic Industry Press,2007.
[10]July 2015 flood attack[EB/OL].Bitcoin Wiki.https://en.bitcoin.it/wiki/July_2015_flood_attack.
[11]LI W,ANDREINA S,BOHLI J M,et al.Securing Proof-of-Stake Blockchain Protocols[C]//European Symposium on Research in Computer Security International Workshop on Data Privacy Management Cryptocurrencies and BlockchainTechno-logy.2017.
[12]HANKE T.Asicboost-a speedup for bitcoin mining[J].arXiv:1604.00575,2016.
[13]HOU Y N.It Will Cost You Nothing to ‘Kill’ a Proof-of-Stake Crypto-Currency[J].Social Science Electronic Publishing,2014,34(2):1038-1044.
[14]POELSTRA A.Distributed consensus from proof of stake is impossible[EB/OL].https://download.wpsoftware.net/bitcoin/pos.pdf.
[15]BUTERIN V.On stake[EB/OL].https://blog.ethereum.org/2014/07/05/stake/.
[16]BEIKVERDI A.NEM technical reference[EB/OL].https://nem.io/wp-content/themes/nem/files/NEM_techRef.pdf.
[17]FANG W,ZHANG W,PAN T,et al.Cyber Security in Blockchain:Threats and Countermeasures[J].Journal of Cyber Secu-rity,2018,3(2):87-104.
[18]ZHOUC Z.The Fibonacci-Lucas sequence and its applications [M].Changsha:Hunan Science and Technology Press,1993.
[19]YANG J,PAUDEL A,GOOI H B,et al.A Proof-of-Stake Public Blockchain-Based Pricing Scheme for Peer-to-Peer Energy Trading[J].Applied Energy,2021,298:117154.
[20]LARIMER D.Delegated Proof-of-Stake(DPOS)[EB/OL].https://bitshares.org/technology/delegated-proof-of-stake-con-sensus/2014.
[1] WANG Zi-kai, ZHU Jian, ZHANG Bo-jun, HU Kai. Research and Implementation of Parallel Method in Blockchain and Smart Contract [J]. Computer Science, 2022, 49(9): 312-317.
[2] ZHOU Hang, JIANG He, ZHAO Yan, XIE Xiang-peng. Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit [J]. Computer Science, 2022, 49(6A): 771-776.
[3] LI Bo, XIANG Hai-yun, ZHANG Yu-xiang, LIAO Hao-de. Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios [J]. Computer Science, 2022, 49(6A): 723-728.
[4] FU Li-yu, LU Ge-hao, WU Yi-ming, LUO Ya-ling. Overview of Research and Development of Blockchain Technology [J]. Computer Science, 2022, 49(6A): 447-461.
[5] GAO Jian-bo, ZHANG Jia-shuo, LI Qing-shan, CHEN Zhong. RegLang:A Smart Contract Programming Language for Regulation [J]. Computer Science, 2022, 49(6A): 462-468.
[6] MAO Dian-hui, HUANG Hui-yu, ZHAO Shuang. Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance [J]. Computer Science, 2022, 49(6A): 523-530.
[7] WANG Si-ming, TAN Bei-hai, YU Rong. Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence [J]. Computer Science, 2022, 49(6): 32-38.
[8] SUN Hao, MAO Han-yu, ZHANG Yan-feng, YU Ge, XU Shi-cheng, HE Guang-yu. Development and Application of Blockchain Cross-chain Technology [J]. Computer Science, 2022, 49(5): 287-295.
[9] YANG Zhen, HUANG Song, ZHENG Chang-you. Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE [J]. Computer Science, 2022, 49(5): 325-332.
[10] REN Chang, ZHAO Hong, JIANG Hua. Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism [J]. Computer Science, 2022, 49(5): 333-340.
[11] CHU An-qi, DING Zhi-jun. Application of Gray Wolf Optimization Algorithm on Synchronous Processing of Sample Equalization and Feature Selection in Credit Evaluation [J]. Computer Science, 2022, 49(4): 134-139.
[12] FENG Liao-liao, DING Yan, LIU Kun-lin, MA Ke-lin, CHANG Jun-sheng. Research Advance on BFT Consensus Algorithms [J]. Computer Science, 2022, 49(4): 329-339.
[13] WANG Xin, ZHOU Ze-bao, YU Yun, CHEN Yu-xu, REN Hao-wen, JIANG Yi-bo, SUN Ling-yun. Reliable Incentive Mechanism for Federated Learning of Electric Metering Data [J]. Computer Science, 2022, 49(3): 31-38.
[14] ZHANG Ying-li, MA Jia-li, LIU Zi-ang, LIU Xin, ZHOU Rui. Overview of Vulnerability Detection Methods for Ethereum Solidity Smart Contracts [J]. Computer Science, 2022, 49(3): 52-61.
[15] YANG Xin-yu, PENG Chang-gen, YANG Hui, DING Hong-fa. Rational PBFT Consensus Algorithm with Evolutionary Game [J]. Computer Science, 2022, 49(3): 360-370.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!