ABSTRACT
Proof of stake consensus algorithm (PoS) has the advantage of not requiring arithmetic power, however, the higher the stake, the more likely the node will get the right to account. As a result, the accounting nodes are highly deterministic and the rich get richer, once the node with the highest equity fails to account for the block properly. The rest of the nodes have to compete again for accounting rights, and the probability of system stagnation will increase sharply. To address these two shortcomings, a consensus algorithm based on dynamic delegation of proof of importance (DPoI) is proposed.The algorithm introduces an importance assessment scheme that calculates the importance ivlaue (iValue) of nodes in each round based on nodes aValue, iTrade, Ltime and Credit.Finally, the Fibonacci series is used to divide nodes with similar iValue into a group, and the group draws on the DPoS voting strategy ranking to act as alternative nodes, thus forming a disaster recovery scheme to effectively avoid system stagnation, which effectively enhances the security and stability of the blockchain system. The experimental results show that the speed of DPoI block out is about 6 times faster than PoI, which significantly improves the block out speed.
- [1]Yong Yuan,and Feiyue.Wang, 2016. Blockchain: the state of the art and future trends. Acta Automatica Sinica.Google Scholar
- [2]Mingxiao D. Xiaofeng M. Zhe, Z. Xiangwei, W. and Qijun, C.2017.A review on consensus algorithm of blockchain,(2017)2567-2572.Google Scholar
- [3]Yong Yuan., NI, X.C., ZENG, S.,2018. et al.:The development status and outlook of blockchain consensus algorithm[J]. Journal of Automation,(2018) 044(011):2011-2022Google Scholar
- [4]Xu,F., Yang,G.W., Ju,D.P.,2004. Design of Distributed Storage System on Peer-to-Peer Structure based on Peer-to-Peer [J]. Journal of Software,(2004), 15(002):268-277Google Scholar
- [5]Nakamoto S, 2009. :Bitcoin: A Peer-to-Peer Electronic Cash System.Google Scholar
- [6]Shao Q.F. Jin C. Q. and Zhang Z. ect, 2018. Blockchain technology: architecture and progress[J]. Chinese Journal of Computers.Google Scholar
- [7]Castro M. Liskov B., 2002. Practical Byzantine Fault Tolerance and Proactive Recovery[J]. Acm Transactions on Computer Systems, (2002), 20(4): 398-461.Google ScholarDigital Library
- [8]Garay J., Kiayias A., Leonardos N.,2015. The Bitcoin Backbone Protocol: Analysis and Applications[J]. Springer Berlin Heidelberg.Google Scholar
- [9]Eyal I., The Miner’s Dilemma[J]. Computer Science, (2014)89-103.Google Scholar
- [10]Li D.Q., 2007. Denial of Service Attacks [M]. Electronic Industry Press,(2007)Google Scholar
- [11]July 2015 flood attack In: Bitcoin Wiki.x.https://en.bitcoin.it/wiki/July_2015_flood_attack.Google Scholar
- [12]Sapirshtein A., Sompolinsky Y. and Zohar A, 2016.Optimal selfish mining strategies in bitcoin. In: Proc. of the Financial Crypto.Google Scholar
- [13]Zhou C.Z.,1993. The Fibonacci-Lucas sequence and its applications [M]. Hunan Science and Technology Press.Google Scholar
- [14]Larimer D.,2018.Delegated proof-of-stake consensus.Google Scholar
Recommendations
Overview of Blockchain Consensus Mechanism
BDE '20: Proceedings of the 2020 2nd International Conference on Big Data EngineeringThe advent of the Bitcoin system has brought another boom in the Internet era. In a very short time, many Blockchain systems come into being successively, whose decentration, consensus mechanisms, intelligent contract, and other characteristics make them ...
Proof-of-Activity Consensus Algorithm Based on K-Medoids Clustering
AbstractK-medoids cluster-based Proof of Action consensus algorithm (KPoA) is proposed by us in order to mainly decrease the computing power wast and Malicious information dissemination in Proof of Activity consensus algorithm (PoA). In PoA, ...
Proof of Activity Consensus Algorithm Based on Credit Reward Mechanism
Web Information Systems and ApplicationsAbstractProof of Activity (PoA) is a key algorithm to reach consensus among nodes. In current PoA, N online representative nodes are only used to create one transaction block, and the probability of creating a block by malicious nodes cannot be controlled,...
Comments