当前位置: X-MOL 学术arXiv.cs.DC › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Consensus in Blockchain Systems with Low Network Throughput: A Systematic Mapping Study
arXiv - CS - Distributed, Parallel, and Cluster Computing Pub Date : 2021-03-04 , DOI: arxiv-2103.02916
Henrik Knudsen, Jakob Svennevik Notland, Peter Halland Haro, Truls Bakkejord Ræder, Jingyue Li

Blockchain technologies originate from cryptocurrencies. Thus, most blockchain technologies assume an environment with a fast and stable network. However, in some blockchain-based systems, e.g., supply chain management (SCM) systems, some Internet of Things (IOT) nodes can only rely on the low-quality network sometimes to achieve consensus. Thus, it is critical to understand the applicability of existing consensus algorithms in such environments. We performed a systematic mapping study to evaluate and compare existing consensus mechanisms' capability to provide integrity and security with varying network properties. Our study identified 25 state-of-the-art consensus algorithms from published and preprint literature. We categorized and compared the consensus algorithms qualitatively based on established performance and integrity metrics and well-known blockchain security issues. Results show that consensus algorithms rely on the synchronous network for correctness cannot provide the expected integrity. Such consensus algorithms may also be vulnerable to distributed-denial-of-service (DDOS) and routing attacks, given limited network throughput. Conversely, asynchronous consensus algorithms, e.g., Honey-BadgerBFT, are deemed more robust against many of these attacks and may provide high integrity in asynchrony events.

中文翻译:

低网络吞吐量的区块链系统共识:系统映射研究

区块链技术源自加密货币。因此,大多数区块链技术都假定环境具有快速且稳定的网络。但是,在某些基于区块链的系统(例如供应链管理(SCM)系统)中,某些物联网(IOT)节点有时只能依靠低质量的网络来达成共识。因此,了解现有共识算法在此类环境中的适用性至关重要。我们进行了系统的映射研究,以评估和比较现有共识机制在网络特性不同的情况下提供完整性和安全性的能力。我们的研究从已出版和预印的文献中确定了25种最新的共识算法。我们基于已建立的性能和完整性指标以及众所周知的区块链安全性问题,对共识算法进行了定性分类和比较。结果表明,共识算法依赖于同步网络的正确性不能提供预期的完整性。在网络吞吐量有限的情况下,此类共识算法也可能容易受到分布式拒绝服务(DDOS)和路由攻击的影响。相反,异步共识算法(例如Honey-BadgerBFT)被认为对这些攻击中的许多攻击更健壮,并且可以在异步事件中提供高度的完整性。在网络吞吐量有限的情况下,此类共识算法也可能容易受到分布式拒绝服务(DDOS)和路由攻击的影响。相反,异步共识算法(例如Honey-BadgerBFT)被认为对这些攻击中的许多攻击更健壮,并且可以在异步事件中提供高度的完整性。在网络吞吐量有限的情况下,此类共识算法也可能容易受到分布式拒绝服务(DDOS)和路由攻击的影响。相反,异步共识算法(例如Honey-BadgerBFT)被认为对这些攻击中的许多攻击更健壮,并且可以在异步事件中提供高度的完整性。
更新日期:2021-03-05
down
wechat
bug