DOI QR코드

DOI QR Code

A Novel Multi-link Integrated Factor Algorithm Considering Node Trust Degree for Blockchain-based Communication

  • Li, Jiao (School of Management, Northwestern Polytechnical University) ;
  • Liang, Gongqian (School of Management, Northwestern Polytechnical University) ;
  • Liu, Tianshi (School of Computer Science, Xi'an Shiyou University)
  • Received : 2016.11.01
  • Accepted : 2017.04.17
  • Published : 2017.08.31

Abstract

A blockchain is an underlying technology and basic infrastructure of the Bitcoin system. At present, blockchains and their applications are developing rapidly. However, the basic research of blockchain technology is still in the early stages. The efficiency and reliability of blockchain communication is one of the research problems that urgently need to be studied and addressed. Existing algorithms may be less feasible for blockchain-based communication because they only consider a single communication factor (node communication capability or node trust degree) and only focus on a single communication performance parameter(communication time or communication reliability). In this paper, to shorten the validation time of blockchain transactions and improve the reliability of blockchain-based communication, we first establish a multi-link concurrent communication model based on trust degree, and then we propose a novel integrated factor communication tree algorithm (IFT). This algorithm comprehensively considers the node communication link number and the node trust degree and selects several nodes with powerful communication capacity and high trust as the communication sources to improve the concurrency and communication efficiency. Simulation results indicate that the IFT algorithm outperforms existing algorithms. A blockchain communication routing scheme based on the IFT algorithm can increase communication efficiency by ensuring communication reliability.

Keywords

References

  1. Godsi P, "Bitcoin: bubble or blockchain," in Proc. of 9th KES International Conference on Agent and Multi-Agent Systems: Technologies and Applications, pp. 191-203, May 29, 2015.
  2. Kraft D, "Difficulty control for blockchain-based consensus systems," Peer-to-Peer Networking and Applications, vol. 9, no. 2, pp. 397-413, March, 2016. https://doi.org/10.1007/s12083-015-0347-x
  3. Swan M, "Blockchain thinking: the brain as a decentralized autonomous corporation," IEEE Technology and Society Magazine, vol. 34, no. 4, pp. 41-52, December, 2015. https://doi.org/10.1109/MTS.2015.2494358
  4. Eldred M, "Blockchain thinking and euphoric Hubris," IEEE Technology and Society Magazine, vol. 35, no. 1, pp. 39, March, 2016. https://doi.org/10.1109/MTS.2016.2535040
  5. Zyskind G, Nathan O and Pentland A S, "Decentralizing privacy: using blockchain to protect personal data," in Proc. of 2015 IEEE Security and Privacy Workshops, pp. 180-184, May 21-22, 2015.
  6. Wilson D and Ateniese G, "From pretty good to great: enhancing PGP using Bitcoin and the blockchain," in Proc. of 9th International Conference on Network and System Security, pp. 368-375, November 3-5, 2015.
  7. Kypriotaki K N, Zamani E D and Giaglis G M, "From Bitcoin to decentralized autonomous corporations: extending the application scope of decentralized peer-to-peer networksand blockchains," in Proc. of 17th International Conference on Enterprise Information Systems, pp. 284-290, April 27-30, 2015.
  8. George H, "Might the Blockchain Outlive Bitcoin?" IT Professional, vol. 18, no. 2, pp. 12-16, March-April, 2016. https://doi.org/10.1109/MITP.2016.21
  9. Nakamoto S, "Bitcoin: A Peer-to-Peer Electronic Cash System," 2008
  10. Pai V, Kumar K, Tamilmani K, Sambamurthy V and Mohr A E, "Chainsaw: eliminating trees from overlay multicast," in Proc. of 4th International Workshop on Peer-to-Peer Systems, pp. 127-140, February 24-25, 2005.
  11. Biskupski B, Schiely M, Felber P and Meier R, "Tree-based analysis of mesh overlays for peer-to-peer streaming," in Proc. of 8th IFIP WG 6.1 International Conference on Distributed Applications and Interoperable Systems, pp. 126-139, June 4-6, 2008.
  12. Mokhtarian K and Jacobsen H A, "Minimum-Delay multicast algorithms for mesh overlays," IEEE/ACM Transactions on Networking, vol. 23, no. 3, pp. 973-986, June, 2015. https://doi.org/10.1109/TNET.2014.2310735
  13. Kim K, Mehrotra S and Venkatasubramanian N, "Efficient and reliable application layer multicast for flash dissemination," IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 10, pp. 2571-2582, October, 2014. https://doi.org/10.1109/TPDS.2013.280
  14. Liu T S, Li J, Cao Q N. "Study on a network communication optimization algorithm of P2P mode," in Proc. of Artificial Intelligence and Computational Intelligence, pp. 212-217, November, 7-8, 2009.
  15. Liu T S, Yang K Y, Li J, "Study on a concurrent communication tree algorithm of P2P multi-link mode," in Proc. of International Conference on Multimedia Technology, pp. 2034-2038, October 29-31, 2010.
  16. Liu T S, Zhang LM, Cheng G J, Li J and Yang K Y, "FIN multicast optimization algorithm in P2P communication," Application Research of Computers, vol. 30, no. 5, pp. 1464-1466&1491, May, 2013.
  17. Tan Z H, Wang XW and Wang X Y, "A novel iterative and dynamic trust computing model for large scaled P2P networks," Mobile Information Systems, no. 4, pp. 1-12, April, 2016.
  18. Jia M J, Wang H Q, Ye B and Wang Y, "A dynamic grouping-based trust model for mobile P2P networks", in Proc. of 2016 IEEE International Conference on Services Computing, pp. 848-851, June 27, 2016.
  19. Liao J and Li Z, "A novel dynamic trust model for P2P network," Open Automation and Control Systems Journal, vol. 7, no. 1, pp. 893-901, August, 2015. https://doi.org/10.2174/1874444301507010893
  20. Wang Q J, Wang J R, Yu J and Yu M, "Trust-aware query routing in P2P social networks," International Journal of Communication Systems, vol. 25, no. 10, pp. 1260-1280, October, 2012. https://doi.org/10.1002/dac.1320
  21. Shen Y, Feng J, Ma W J, Jiang L and Yin M., "Overlay multicast update strategy based on perturbation theory," KSII Transactions on Internet and Information Systems, vol. 11, no. 1, pp. 171-192, January, 2017. https://doi.org/10.3837/tiis.2017.01.009
  22. Alekseev S and Schafer J, "Evaluation of a topological distance algorithm for construction of a P2P multicast hybrid overlay tree," International Journal of Computer Networks and Communications, vol. 8, no. 1, pp. 1-12, January, 2016.
  23. Wei W, Yang X L, Shen P Y and Zhou B., "Holes detection in anisotropic sensornets: topological methods," International Journal of Distributed Sensor Networks, vol. 8, no. 10, October 23, 2012.
  24. Wei W and Qi Y., "Information potential fields navigation in wireless Ad-Hoc sensor networks," Sensors, vol. 11, no. 5, pp. 4794-4807, May, 2011. https://doi.org/10.3390/s110504794
  25. Wei W, Xu Q, Wang L, Hei X H, Shen P, Shi W and Shan L., "GI/Geom/1 queue based on communication model for mesh networks," International Journal of Communication Systems, vol. 27, no. 11, pp. 3013-3029, November, 2014. https://doi.org/10.1002/dac.2522
  26. Li J and Liu T S, "Study on a P2P communication tree algorithm based on multi-link," Northwest University Journal: Natural Science, vol. 40, no. 6, pp. 970-974, November, 2010.
  27. Selvaraj C and Anand S, "A survey on security issues of reputation management systems for peer-to-peer networks," Computer science review, vol. 6, no. 4, pp. 145-160, July, 2012. https://doi.org/10.1016/j.cosrev.2012.04.001
  28. Duarte J, Siegel S and Young L, "Trust and credit: the role of appearance in peer-to-peer lending," Review of Financial Studies, vol. 25, no. 8, pp. 2455-2484, August, 2012. https://doi.org/10.1093/rfs/hhs071
  29. Huang G M, Hu M, Zhou Y, Liu P S, and Zhang Y C, "A distributed trust model based on reputation management of peers for P2P VoD services," KSII Transactions on Internet and Information Systems, vol. 6, no. 9, pp. 2285-2301, September, 2012. https://doi.org/10.3837/tiis.2012.09.018
  30. Sanchez D, Martinez S and Domingo-Ferrer J, "Co-utile P2P ridesharing via decentralization and reputation management," Transportation Research Part C: Emerging Technologies, vol. 73, pp. 147-166, December, 2016. https://doi.org/10.1016/j.trc.2016.10.017
  31. Song H B and Maite B P. "Model-centric nonlinear equalizer for coherent long-haul fiber-optic communication systems," in Proc. of IEEE Global Telecommunications Conference, pp. 2394-2399, December 9-13, 2013.
  32. Song H B, Maite B P, Xie T J and Wilson Stephen G, "Combined constrained code and LDPC code for long-haul fiber-optic communication systems," in Proc. of IEEE Global Telecommunications Conference, pp. 2984-2989, December 3-7, 2012.
  33. Li J, Liang G Q, Liu T S and Li X J, "P2P multicast algorithm considering node service priority," Application Research of Computers, vol. 34, no. 4, pp. 1176-1179, April, 2017.

Cited by

  1. A Trusted Routing Scheme Using Blockchain and Reinforcement Learning for Wireless Sensor Networks vol.19, pp.4, 2017, https://doi.org/10.3390/s19040970
  2. Identification of Counterfeit Android Malware Apps using Hyperledger Fabric Blockchain vol.20, pp.2, 2019, https://doi.org/10.7472/jksii.2019.20.2.61
  3. Consortium Blockchain based Forgery Android APK Discrimination DApp using Hyperledger Composer vol.20, pp.5, 2017, https://doi.org/10.7472/jksii.2019.20.5.9
  4. Assessing the authenticity of subjective information in the blockchain: a survey and open issues vol.24, pp.2, 2017, https://doi.org/10.1007/s11280-020-00854-3