Abstract
We describe a two-layer architecture suitable for wide area IoT systems that use blockchain technology. The lower layer is comprised of several clusters in which nodes are interconnected with a number of virtual overlays which allow multiple consensus rounds that validate incoming data blocks to proceed concurrently and without contention. Validated data blocks are then ordered by the upper layer cluster, a virtual cluster formed by nodes from lower layer clusters (one from each cluster), and linked in the replicated blockchain ledger. In each cluster, a modified Practical Byzantine Fault Tolerance (PBFT) protocol is used to achieve consensus. The use of layered architecture, virtual overlays, and multiple-leader capability lead to increased resiliency to consensus leader misbehavior as well as performance improvement over traditional PBFT, which are confirmed through a discrete time Markov chain (DTMC) model linked to an M/G/1 queuing model in a wide range of parameter values.
Similar content being viewed by others
References
Yazdinejad A, Srivastava G, Parizi RM, Dehghantanha A, Karimipour H, Karizno SR (2020) Slpow: Secure and low latency proof of work protocol for blockchain in green iot networks. In: 2020 IEEE 91st Vehicular Technology Conference (VTC2020-Spring), pp. 1–. https://doi.org/10.1109/VTC2020-Spring48590.2020.9129462
Dai HN, Zheng Z, Zhang Y (2019) Blockchain for internet of things: A survey. IEEE Internet Things J 6(5):8076–8094. https://doi.org/10.1109/JIOT.2019.2920987
Bano S, Sonnino A, Al-Bassam M, Azouvi S, McCorry P, Meiklejohn S, Danezis G (2017) Consensus in the age of blockchains
Zheng Z, Xie S, Dai H, Chen X, Wang H (2017) An overview of blockchain technology: Architecture, consensus, and future trends. In: 2017 IEEE International Congress on Big Data (BigData Congress), pp. 557–564
Castro M, Liskov B (1999) Practical Byzantine fault tolerance. In: OSDI: Symposium on Operating Systems Design and Implementation. New Orleans, LA
Aublin PL, Guerraoui R, Knežević N, Quéma V, Vukolić M ()2015 The next 700 bft protocols. ACM Trans Comput Syst 32(4). https://doi.org/10.1145/2658994
Veronese GS, Correia M, Bessani AN, Lung LC (2010) Ebawa: Efficient byzantine agreement for wide-area networks
Mišić J, Mišić VB, Chang X, Qushtom H (2020) PBFT-based ordering service for IoT domains. In: IEEE Transactions on Vehicular Technology (TVT)
Qushtom H, Mišić J, Mišić V (2022) Efficient multi-tier, multiple entry PBFT consensus algorithm for IoT systems. In: IEEE ICC 2022. Seoul, South Korea
Zhang M, Zhou Y, Quan W, Zhu J, Zheng R, Wu Q (2020) Online learning for iot optimization: A frank-wolfe adam-based algorithm. IEEE Internet Things J 7(9):8228–8237. https://doi.org/10.1109/JIOT.2020.2984011
Fazio P, Tropea M, Voznak M, De Rango F (2020) On packet marking and markov modeling for ip traceback: A deep probabilistic and stochastic analysis. Comput Netw 182(107):464. https://doi.org/10.1016/j.comnet.2020.107464
Liu G, Quan W, Cheng N, Zhang H, Yu S (2019) Efficient ddos attacks mitigation for stateful forwarding in internet of things. J Netw Comput Appl 130:1–13. https://doi.org/10.1016/j.jnca.2019.01.006
Malina L, Smekal D, Ricci S, Hajny J, Cíbik P, Hrabovsky J (2021) Hardware-accelerated cryptography for software-defined networks with p4. In: Maimut D, Oprina AG, Sauveron D (eds) Innovative Security Solutions for Information Technology and Communications. Springer International Publishing, Cham, pp 271–287
Hauser F, Häberle M, Schmidt M, Menth M (2020) P4-ipsec: Site-to-site and host-to-site vpn with ipsec in p4-based sdn. IEEE Access 8:139,567–139,586. https://doi.org/10.1109/ACCESS.2020.3012738
Liu G, Quan W, Cheng N, Gao D, Lu N, Zhang H, Shen X (2021) Softwarized iot network immunity against eavesdropping with programmable data planes. IEEE Internet Things J 8(8):6578–6590. https://doi.org/10.1109/JIOT.2020.3048842
Amir Y, Coan B, Kirsch J, Lane J (2010) Prime: Byzantine replication under attack. IEEE Trans Dependable Secure Comput 8(4):564–577
Miller A, Xia Y, Croman K, Shi E, Song D (2016) The honey badger of BFT protocols. In: Proc. 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 31–42
Kotla R, Alvisi L, Dahlin M, Clement A, Wong E (2010) Zyzzyva: Speculative Byzantine fault tolerance. ACM Trans Comput Syst 27(4)
Veronese GS, Correia M, Bessani AN, Lung LC (2009) Spin one’s wheels? Byzantine fault tolerance with a spinning primary. In: 2009 28th IEEE International Symposium on Reliable Distributed Systems, pp. 135–144. IEEE
Gueta GG, Abraham I, Grossman S, Malkhi D, Pinkas B, Reiter M, Seredinschi DA, Tamir O, Tomescu A (2019) SBFT: a scalable and decentralized trust infrastructure. In: 2019 49th Annual IEEE/IFIP international conference on dependable systems and networks (DSN), pp. 568–580. IEEE
Abraham I, Gueta G, Malkhi D (2018) Hot-stuff the linear, optimal-resilience, one-message BFT devil. arXiv preprint arXiv:1803.05069
Baudet M, Ching A, Chursin A, Danezis G, Garillot F, Li Z, Malkhi D, Naor O, Perelman D, Sonnino A (2019) State machine replication in the libra blockchain. white paper, Cryptorating – cryptocurrency rating agency. https://github.com/Cryptorating
Buchman E (2016) Tendermint: Byzantine fault tolerance in the age of blockchains. Ph.D. thesis, The University of Guelph, Ontario, Canada
Mišić J, Mišić VB, Chang X (2020) Comparison of single- and multiple entry point PBFT for IoT blockchain systems. In: 2020 IEEE 92nd Vehicular Technology Conference (VTC2020-Fall), pp. 1–6. https://doi.org/10.1109/VTC2020-Fall49728.2020.9348782
Qushtom H, Mišić J, Mišić V (2021) Multiple leader PBFT based blockchain architecture for IoT domains. In: 2021 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE) (IEEE CCECE 2021). virtual, Canada
Majkowski J, Palacio FC (2006) Dynamic txop configuration for qos enhancement in ieee 802.11e wireless lan. In: 2006 International Conference on Software in Telecommunications and Computer Networks, pp. 66–70. https://doi.org/10.1109/SOFTCOM.2006.329721
Takagi H (1991) Queueing Analysis: Vacation and priority systems (pt. 1). QUEUEING ANALYSIS. North-Holland
Mišić J, Mišić VB, Chang X, Qushtom H (2021) Adapting PBFT for use with blockchain-enabled IoT systems. IEEE Trans Veh Technol 70(1):33–48. https://doi.org/10.1109/TVT.2020.3048291
Acknowledgements
The work of J. Mišić, and V. B. Mišić was supported by the Natural Sciences and Engineering Research Council of Canada (NSERC) through their respective Discovery Grants.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Competing interest
The authors have no other competing interests, financial or otherwise.
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Qushtom, H., Mišić, J., Mišić, V.B. et al. A high performance two-layer consensus architecture for blockchain-based IoT systems. Peer-to-Peer Netw. Appl. 15, 2444–2456 (2022). https://doi.org/10.1007/s12083-022-01363-y
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-022-01363-y