Reputation-Driven Dynamic Node Consensus and Reliability Sharding Model in IoT Blockchain
Abstract
:1. Introduction
- (1)
- To quantify node behavior, we propose a reputation evaluation scheme for node behavior, and design RDSCM based on this scheme;
- (2)
- RE-PBFT is proposed, based on the evaluation scheme, including the primary node election scheme and abnormal node determination and elimination scheme, which not only reduces the abnormal nodes but also reduces the possibility of an abnormal node becoming the main node;
- (3)
- The necessary conditions that sharding should meet are proposed and proved. Based on the evaluation scheme, NCRS is proposed to make the existing malicious nodes evenly distributed among all shardings and reduce the situation that the sharding is taken over by malicious nodes.
- (4)
- The idea of sorted sharding and consensus sharding is proposed. Each consensus sharding produces a prepared block separately, which is processed by sorted sharding and linked to the blockchain.
2. Related Work
2.1. IoT Blockchain
2.2. Blockchain Consensus
2.3. Sharding Technology
3. System Model
3.1. RE-PBFT
3.1.1. Reputation Introduction of RE-PBFT
3.1.2. Master Node Election of RE-PBFT
- Key generation function: RSA digital signature algorithm is used to generate a pair of public and private keys, the public key is PK, the private key is SK;
- The random number generating function: The random number β is obtained from the given input and the private key of the node through Equation (3), where Vrf_hash() is the hash function and α is the input.
- Proof value-generating function: Prove β is the correct output of the input α. First, obtain the zero-knowledge proof result π of the input α through Equation (4). Then, any node can obtain whether β is the correct output by taking π as the input of formula (4).
- Verification function: After Equation (5) proves that the output β is obtained from the input α, the result of Equation (6) is calculated, True means that the verification is passed, while False means that the verification is not passed.
3.1.3. Node Eliminate of RE-PBFT
3.2. Node Cross Reconfiguration Sharding Scheme (NCRS)
3.2.1. Limited Number of Shards
3.2.2. Details of NCRS
Algorithm 1: Node cross reconstruction sharding scheme based on reputation. |
Input: Number of Iterations Count, Initialization: Random Shard, , Current Iterations CL = 0; While : Then CL++ Crossover the shards, get a new shard distribution newShard; Calculate the fitness value newRes; If then End Output Shard |
4. Experiment and Result Analysis
4.1. Experimental Environment
4.2. Reputation Replacement Test
4.3. Comparison of the Average Reputation of Each Shard
4.4. Local Outlier Factor (LOF) Experiment
4.5. Reputation Sharding Test Results
4.6. Throughput Test for RDSCM
5. Conclusions
6. Future Work
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Al-Fuqaha, A.; Guizani, M.; Mohammadi, M.; Aledhari, M.; Ayyash, M. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications. IEEE Commun. Surv. Tutor. 2015, 17, 2347–2376. [Google Scholar] [CrossRef]
- Ali, M.S.; Vecchio, M.; Pincheira, M.; Dolui, K.; Antonelli, F.; Rehmani, M.H. Applications of Blockchains in the Internet of Things: A Comprehensive Survey. IEEE Commun. Surv. Tutor. 2019, 21, 1676–1717. [Google Scholar] [CrossRef]
- Kumar, S.; Pundir, A.K. Integration of IoT and Blockchain Technology for Enhancing Supply Chain Performance: A Review. In Proceedings of the 2020 11th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), Vancouver, BC, Canada, 4–7 November 2020; pp. 396–401. [Google Scholar]
- Mazhar, N.; Salleh, R.; Zeeshan, M.; Hameed, M.M. Role of Device Identification and Manufacturer Usage Description in IoT Security: A Survey. IEEE Access 2021, 9, 41757–41786. [Google Scholar] [CrossRef]
- Liang, X.; Kim, Y. A Survey on Security Attacks and Solutions in the IoT Network. In Proceedings of the 2021 IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC), Online, 27–30 January 2021; pp. 853–859. [Google Scholar]
- Khor, J.H.; Sidorov, M.; Woon, P.Y. Public Blockchains for Resource-Constrained IoT Devices—A State-of-the-Art Survey. IEEE Internet Things J. 2021, 8, 11960–11982. [Google Scholar] [CrossRef]
- Nakamoto, S.J.C. Bitcoin: A Peer-to-Peer Electronic Cash System. Available online: https://bitcoin.org/bitcoin.pdf (accessed on 10 January 2022).
- Singh, S.; Hosen, A.S.M.S.; Yoon, B. Blockchain Security Attacks, Challenges, and Solutions for the Future Distributed IoT Network. IEEE Access 2021, 9, 13938–13959. [Google Scholar] [CrossRef]
- Meng, T.; Zhao, Y.; Wolter, K.; Xu, C.Z. On Consortium Blockchain Consistency: A Queueing Network Model Approach. IEEE Trans. Parallel Distrib. Syst. 2021, 32, 1369–1382. [Google Scholar] [CrossRef]
- Zhuang, P.; Zamir, T.; Liang, H. Blockchain for Cybersecurity in Smart Grid: A Comprehensive Survey. IEEE Trans. Ind. Inform. 2021, 17, 3–19. [Google Scholar] [CrossRef]
- Asheralieva, A.; Niyato, D. Reputation-Based Coalition Formation for Secure Self-Organized and Scalable Sharding in IoT Blockchains with Mobile Edge Computing. IEEE Internet Things J. 2020, 7, 11830–11850. [Google Scholar] [CrossRef]
- Sadawi, A.A.; Hassan, M.S.; Ndiaye, M. A Survey on the Integration of Blockchain With IoT to Enhance Performance and Eliminate Challenges. IEEE Access 2021, 9, 54478–54497. [Google Scholar] [CrossRef]
- Riccia, L.; Maesab, D.; Favenzac, A.; Ferro, E.J.I.A. Blockchains for COVID-19 contact tracing and vaccine support: A systematic review. IEEE Access 2021, 9, 37936–37950. [Google Scholar] [CrossRef]
- Yun, J.; Goh, Y.; Chung, J.M. DQN-Based Optimization Framework for Secure Sharded Blockchain Systems. IEEE Internet Things J. 2021, 8, 708–722. [Google Scholar] [CrossRef]
- IBFT. Available online: https://github.com/jpmorganchase/quorum (accessed on 10 January 2022).
- Bentov, I.; Lee, C.; Mizrahi, A.; Rosenfeld, M. Proof of Activity: Extending Bitcoin’s Proof of Work via Proof of Stake. ACM SIGMETRICS Perform. Eval. Rev. 2014, 42, 34–37. [Google Scholar] [CrossRef]
- Poet 1.0 Specification. Available online: https://sawtooth.hyperledger.org/docs/core/releases/1.0/architecture/poet.html (accessed on 26 September 2018).
- Castro, M.; Liskov, B. Practical Byzantine Fault Tolerance. OSDI 2002, 99, 173–186. [Google Scholar]
- Tama, B.A.; Kweka, B.J.; Park, Y.; Rhee, K. A critical review of blockchain and its current applications. In Proceedings of the 2017 International Conference on Electrical Engineering and Computer Science (ICECOS), Palembang, Indonesia, 22–23 August 2017; pp. 109–113. [Google Scholar]
- Choi, B.G.; Jeong, E.; Kim, S.W. Multiple Security Certification System between Blockchain Based Terminal and Internet of Things Device: Implication for Open Innovation. J. Open Innov. Technol. Mark. Complex. 2019, 5, 87. [Google Scholar] [CrossRef] [Green Version]
- Ali, O.; Jaradat, A.; Kulakli, A.; Abuhalimeh, A. A Comparative Study: Blockchain Technology Utilization Benefits, Challenges and Functionalities. IEEE Access 2021, 9, 12730–12749. [Google Scholar] [CrossRef]
- Chakraborty, S.; Aich, S.; Kim, H. A Secure Healthcare System Design Framework using Blockchain Technology. In Proceedings of the 2019 21st International Conference on Advanced Communication Technology (ICACT), Pyeongchang, Korea, 17–20 February 2019; pp. 260–264. [Google Scholar]
- Guo, J.; Ding, X.; Wu, W. A Blockchain-Enabled Ecosystem for Distributed Electricity Trading in Smart City. IEEE Internet Things J. 2021, 8, 2040–2050. [Google Scholar] [CrossRef]
- Yu, K.; Tan, L.; Aloqaily, M.; Yang, H.; Jararweh, Y. Blockchain-Enhanced Data Sharing With Traceable and Direct Revocation in IIoT. IEEE Trans. Ind. Inform. 2021, 17, 7669–7678. [Google Scholar] [CrossRef]
- Miller, D. Blockchain and the Internet of Things in the Industrial Sector. IT Prof. 2018, 20, 15–18. [Google Scholar] [CrossRef]
- Li, G.; Fang, C.-C. Promoting Information-Resource Sharing within the Enterprise: A Perspective of Blockchain Consensus Perception. J. Open Innov. Technol. Mark. Complex. 2021, 7, 177. [Google Scholar] [CrossRef]
- Salah, K.; Rehman, M.H.; Nizamuddin, N.; Al-Fuqaha, A.J.I.A. Blockchain for AI: Review and Open Research Challenges. IEEE Access 2018, 7, 10127–10149. [Google Scholar] [CrossRef]
- Bach, L.M.; Mihaljevic, B.; Zagar, M. Comparative analysis of blockchain consensus algorithms. In Proceedings of the 2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), Opatija, Croatia, 21–25 May 2018; pp. 1545–1550. [Google Scholar]
- Ongaro, D.; Ousterhout, J. In search of an understandable consensus algorithm. In Proceedings of the 2014 {USENIX} Annual Technical Conference, Philadelphia, PA, USA, 19–20 June 2014. [Google Scholar]
- Lamport, L. The Part-Time Parliament; Concurrency: Chicago, IL, USA, 2019. [Google Scholar]
- Jun, M. Blockchain government-A next form of infrastructure for the twenty-first century. J. Open Innov. Technol. Mark. Complex. 2018, 4, 7. [Google Scholar] [CrossRef] [Green Version]
- Setyowati, M.S.; Utami, N.D.; Saragih, A.H.; Hendrawan, A. Blockchain Technology Application for Value-Added Tax Systems. J. Open Innov. Technol. Mark. Complex. 2020, 6, 156. [Google Scholar] [CrossRef]
- Bai, F.; Shen, T.; Yu, Z.; Zeng, K.; Gong, B. Trustworthy Blockchain-Empowered Collaborative Edge Computing-as-a-Service Scheduling and Data Sharing in the IIoE. IEEE Internet Things J. 2021, 8, 6437–6453. [Google Scholar] [CrossRef]
- Luu, L.; Narayanan, V.; Zheng, C.; Baweja, K.; Saxena, P. A Secure Sharding Protocol For Open Blockchains. In Proceedings of the 2016 ACM SIGSAC Conference, Vienna, Austria, 24–28 October 2018. [Google Scholar]
- Zamani, M.; Movahedi, M.; Raykova, M. RapidChain: Scaling Blockchain via Full Sharding. In Proceedings of the 2018 ACM SIGSAC Conference, Toronto, ON, Canada, 15–19 October 2018. [Google Scholar]
- Yu, G.; Wu, B.; Niu, X. Improved Blockchain Consensus Mechanism Based on PBFT Algorithm. In Proceedings of the 2020 2nd International Conference on Advances in Computer Technology, Information Science and Communications (CTISC), Suzhou, China, 20–22 March 2020; pp. 14–21. [Google Scholar]
- Li, W.; Feng, C.; Zhang, L.; Xu, H.; Cao, B.; Imran, M.A. A Scalable Multi-Layer PBFT Consensus for Blockchain. IEEE Trans. Parallel Distrib. Syst. 2021, 32, 1146–1160. [Google Scholar] [CrossRef]
- Hu, M.; Shen, T.; Men, J.; Yu, Z.; Liu, Y. CRSM: An Effective Blockchain Consensus Resource Slicing Model for Real-Time Distributed Energy Trading. IEEE Access 2020, 8, 206876–206887. [Google Scholar] [CrossRef]
- Khatoon, A.J.E. A Blockchain-Based Smart Contract System for Healthcare Management. Electronics 2020, 9, 94. [Google Scholar] [CrossRef] [Green Version]
- Micali, S.; Rabin, M.; Vadhan, S. Verifiable random functions. In Proceedings of Symposium on Foundations of Computer Science. In Proceedings of the 40th Annual Symposium on Foundations of Computer Science, New York, NY, USA, 17–19 October 1999. [Google Scholar]
- Breunig, M.M.; Kriegel, H.P.; Ng, R.T.; Sander, J. LOF: Identifying Density-Based Local Outliers. In Proceedings of the Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, Dallas, TX, USA, 15–18 May 2000. [Google Scholar]
- Hao, X.; Yu, L.; Zhiqiang, L.; Zhen, L.; Dawu, G. Dynamic Practical Byzantine Fault Tolerance. In Proceedings of the 2018 IEEE Conference on Communications and Network Security, Beijing, China, 30 May–1 June 2018; pp. 1–8. [Google Scholar]
- Jiang, Y.; Lian, Z. High Performance and Scalable Byzantine Fault Tolerance. In Proceedings of the 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), Chengdu, China, 15–17 March 2019. [Google Scholar]
- Sakho, S.; Zhang, J.; Essaf, F.; Badiss, K.; Kiprop, J.K. Research on an improved practical byzantine fault tolerance algorithm. In Proceedings of the 2020 2nd International Conference on Advances in Computer Technology, Information Science and Communications (CTISC), Suzhou, China, 20–22 March 2020. [Google Scholar]
- Wu, Y.; Song, P.; Wang, F. Hybrid Consensus Algorithm Optimization: A Mathematical Method Based on POS and PBFT and Its Application in Blockchain. Math. Probl. Eng. 2020, 2020, 7270624. [Google Scholar] [CrossRef]
- Li, Y.; Qiao, L.; Lv, Z. Consortium Blockchain Consensus Algorithm Based on PBFT. Peer-to-Peer Netw. Appl. 2021, 48, 133–141. [Google Scholar] [CrossRef]
Name | Scalability | Throughput | Latency | IoT Suitability |
---|---|---|---|---|
PoET | high | high | low | no |
PoA | high | low | high | no |
IBFT | low | high | low | yes |
PBFT | low | high | low | yes |
Name | Parameter | Note |
---|---|---|
CPU | 2.4 GHz | Single-core and single thread |
RAM | 2 GB | DDR4 |
ROM | 20 GB | Mechanical drive 7200 r/min |
Scheme | Disadvantage | Advantage |
---|---|---|
Participation degree [41] | The participation table needs to be maintained locally, which consumes storage space; Unable to handle indirect malicious behavior nodes; | Continuous evil nodes can be quickly determined; |
Health status [42] | The participation table needs to be maintained locally, which consumes storage space; Unable to handle indirect malicious behavior nodes; | Continuous evil nodes can be quickly determined; |
Vote [43] | It consumes a lot of communication resources and may be used by malicious nodes, resulting in network congestion; | Not need to store other data, saving storage resources; It can accurately identify malicious nodes; |
RE-PBFT | The participation table needs to be maintained locally, which consumes storage space; | It can solve the problem of evil behavior in different scenarios, and vote only when it is determined that there are nodes that need to be eliminated, which will not cause waste of communication resources; |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Jiang, N.; Bai, F.; Huang, L.; An, Z.; Shen, T. Reputation-Driven Dynamic Node Consensus and Reliability Sharding Model in IoT Blockchain. Algorithms 2022, 15, 28. https://doi.org/10.3390/a15020028
Jiang N, Bai F, Huang L, An Z, Shen T. Reputation-Driven Dynamic Node Consensus and Reliability Sharding Model in IoT Blockchain. Algorithms. 2022; 15(2):28. https://doi.org/10.3390/a15020028
Chicago/Turabian StyleJiang, Nianqi, Fenhua Bai, Lin Huang, Zhengyuan An, and Tao Shen. 2022. "Reputation-Driven Dynamic Node Consensus and Reliability Sharding Model in IoT Blockchain" Algorithms 15, no. 2: 28. https://doi.org/10.3390/a15020028
APA StyleJiang, N., Bai, F., Huang, L., An, Z., & Shen, T. (2022). Reputation-Driven Dynamic Node Consensus and Reliability Sharding Model in IoT Blockchain. Algorithms, 15(2), 28. https://doi.org/10.3390/a15020028