• Title/Summary/Keyword: Consensus Protocols

Search Result 40, Processing Time 0.019 seconds

Performance Analysis of Blockchain Consensus Protocols-A Review

  • Amina Yaqoob;Alma Shamas;Jawad Ibrahim
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.181-192
    • /
    • 2023
  • Blockchain system brought innovation in the area of accounting, credit monitoring and trade secrets. Consensus algorithm that considered the central component of blockchain, significantly influences performance and security of blockchain system. In this paper we presented four consensus protocols specifically as Proof of Work (PoW), Proof of Stake (PoS), Delegated Proof of Stake (DPoS) and Practical Byzantine Fault-Tolerance (PBFT), we also reviewed different security threats that affect the performance of Consensus Protocols and precisely enlist their counter measures. Further we evaluated the performance of these Consensus Protocols in tabular form based on different parameters. At the end we discussed a comprehensive comparison of Consensus protocols in terms of Throughput, Latency and Scalability. We presume that our results can be beneficial to blockchain system and token economists, practitioners and researchers.

Korean Brain Tumor Society Consensus Review for the Practical Recommendations on Glioma Management in Korea

  • Chul-Kee Park;Jong Hee Chang
    • Journal of Korean Neurosurgical Society
    • /
    • v.66 no.3
    • /
    • pp.308-315
    • /
    • 2023
  • Recent updates in genomic-integrated glioma classification have caused confusion in current clinical practice, as management protocols and health insurance systems are based on evidence from previous diagnostic classifications. The Korean Brain Tumor Society conducted an electronic questionnaire for society members, asking for their ideas on risk group categorization and preferred treatment for each individual diagnosis listed in the new World Health Organization (WHO) classification of gliomas. Additionally, the current off-label drug use (OLDU) protocols for glioma management approved by the Health Insurance Review and Assessment Service (HIRA) in Korea were investigated. A total of 24 responses were collected from 20 major institutes in Korea. A consensus was reached on the dichotomic definition of risk groups for glioma prognosis, using age, performance status, and extent of resection. In selecting management protocols, there was general consistency in decisions according to the WHO grade and the risk group, regardless of the individual diagnosis. As of December 2022, there were 22 OLDU protocols available for the management of gliomas in Korea. The consensus and available options described in this report will be temporarily helpful until there is an accumulation of evidence for effective management under the new classification system for gliomas.

Inverse Optimal Design of Formation/Velocity Consensus Protocol for Mobile Robots Based on LQ Inverse Optimal Second-order Consensus (LQ-역최적 2차 일치제어에 기반한 이동로봇에 대한 대형·속도일치 프로토콜의 역최적 설계)

  • Lee, Jae Young;Choi, Yoon Ho
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.21 no.5
    • /
    • pp.434-441
    • /
    • 2015
  • In this paper, we propose an inverse optimal distributed protocol for the formation and velocity consensus of nonholonomic mobile robots. The communication among mobile robots is described by a simple undirected graph, and the mobile robots' kinematics are considered. The group of mobile robots driven by the proposed protocols asymptotically achieves the desired formation and group velocity in an inverse optimal fashion. The design of the protocols is based on dynamic feedback linearization and the proposed linear quadratic (LQ) inverse optimal second-order consensus protocol. A numerical simulation is given to verify the effectiveness of the proposed scheme.

Quorum Consensus Method based on Ghost using Simplified Metadata (단순화된 메타데이타를 이용한 고스트 기반 정족수 동의 기법의 개선)

  • Cho, Song-Yean;Kim, Tai-Yun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.27 no.1
    • /
    • pp.34-43
    • /
    • 2000
  • Replicated data that is used for fault tolerant distributed system requires replica control protocol to maintain data consistency. The one of replica control protocols is quorum consensus method which accesses replicated data by getting majority approval. If site failure or communication link failure occurs and any one can't get quorum consensus, it degrades the availability of data managed by quorum consensus protocol. So it needs for ghost to replace the failed site. Because ghost is not full replica but process which has state information using meta data, it is important to simplify meta data. In order to maintain availability and simplify meta data, we propose a method to use cohort set as ghost's meta data. The proposed method makes it possible to organize meta data in 2N+logN bits and to have higher availability than quorum consensus only with cohort set and dynamic linear voting protocol. Using Markov model we calculate proposed method's availability to analyze availability and compare it with existing protocols.

  • PDF

Research on Finite-Time Consensus of Multi-Agent Systems

  • Chen, Lijun;Zhang, Yu;Li, Yuping;Xia, Linlin
    • Journal of Information Processing Systems
    • /
    • v.15 no.2
    • /
    • pp.251-260
    • /
    • 2019
  • In order to ensure second-order multi-agent systems (MAS) realizing consensus more quickly in a limited time, a new protocol is proposed. In this new protocol, the gradient algorithm of the overall cost function is introduced in the original protocol to enhance the connection between adjacent agents and improve the moving speed of each agent in the MAS. Utilizing Lyapunov stability theory, graph theory and homogeneity theory, sufficient conditions and detailed proof for achieving a finite-time consensus of the MAS are given. Finally, MAS with three following agents and one leading agent is simulated. Moreover, the simulation results indicated that this new protocol could make the system more stable, more robust and convergence faster when compared with other protocols.

Blockchain-based lightweight consensus algorithm (L-PBFT) for building trust networks in IoT environment (IoT 환경에서 신뢰 네트워크 구축을 위한 블록체인 기반의 경량 합의 알고리즘(L-PBFT))

  • Park, Jung-Oh
    • Journal of Industrial Convergence
    • /
    • v.20 no.6
    • /
    • pp.37-45
    • /
    • 2022
  • With the development of the Internet of Things (IoT), related network infrastructures require new technologies to protect against threats such as external hacking. This study proposes an L-PBFT consensus algorithm that can protect IoT networks based on a blockchain consensus algorithm. We designed a blockchain (private) model suitable for small networks, tested processing performance for ultra-small/low-power IoT devices, and verified stability. As a result of performance analysis, L-PBFT proved that at least the number of nodes complies with the operation of the consensus algorithm(minimum 14%, maximum 29%) and establishes a trust network(separation of secure channels) different from existing security protocols. This study is a 4th industry convergence research and will be a foundation technology that will help develop IoT device security products in the future.

Blockchain for Securing Smart Grids

  • Aldabbagh, Ghadah;Bamasag, Omaimah;Almasari, Lola;Alsaidalani, Rabab;Redwan, Afnan;Alsaggaf, Amaal
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.255-263
    • /
    • 2021
  • Smart grid is a fully-automated, bi-directional, power transmission network based on the physical grid system, which combines sensor measurement, computer, information communication, and automatic control technology. Blockchain technology, with its security features, can be integrated with Smart Grids to provide secure and efficient power management and transmission. This paper dicusses the deployment of Blockchain technology in Smart Grid. It presents application areas and protocols in which blockchain can be applied to in securing smart grid. One application of each area is explored in detail, such as efficient peer-to-peer transaction, lower platform costs, faster processes, greater flexibility in power generation to transmission, distribution and power consumption in different energy storage systems, current barriers obstructing the implementation of blockchain applications with some level of maturity in financial services but concepts only in energy and other sectors. Wide range of energy applications suggesting a suitable blockchain architecture in smart grid operations, a sample block structure and the potential blockchain technicalities employed in it. Also, added with efficient data aggregation schemes based on the blockchain technology to overcome the challenges related to privacy and security in the smart grid. Later on, consensus algorithms and protocols are discussed. Monitoring of the usage and statistics of energy distribution systems that can also be used to remotely control energy flow to a particular area. Further, the discussion on the blockchain-based frameworks that helps in the diagnosis and maintenance of smart grid equipment. We have also discussed several commercial implementations of blockchain in the smart grid. Finally, various challenges have been discussed for integrating these technologies. Overall, it can be said at the present point in time that blockchain technology certainly shows a lot of potentials from a customer perspective too and should be further developed by market participants. The approaches seen thus far may have a disruptive effect in the future and might require additional regulatory intervention in an already tightly regulated energy market. If blockchains are to deliver benefits for consumers (whether as consumers or prosumers of energy), a strong focus on consumer issues will be needed.

A Study on Security Enhancement for the Use and Improvement of Blockchain Technology (보안성 강화를 위한 블록체인기술의 활용과 개선방안 연구)

  • Seung Jae Yoo
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.63-68
    • /
    • 2023
  • In this study, in relation to blockchain protocol and network security, we study the configuration of blockchain and encryption key management methods on smart contracts so that we can have a strong level of response to MITM attacks and DoS/DDoS attacks. It is expected that the use of blockchain technology with enhanced security can be activated through respond to data security threats such as MITM through encryption communication protocols and enhanced authentication, node load balancing and distributed DDoS attack response, secure coding and vulnerability scanning, strengthen smart contract security with secure consensus algorithms, access control and authentication through enhanced user authentication and authorization, strengthen the security of cores and nodes, and monitoring system to update other blockchain protocols and enhance security.

Protocol for management of odontogenic keratocysts considering recurrence according to treatment methods

  • Titinchi, Fadi
    • Journal of the Korean Association of Oral and Maxillofacial Surgeons
    • /
    • v.46 no.5
    • /
    • pp.358-360
    • /
    • 2020
  • The management of odontogenic keratocysts (OKC) remains a hotly debated topic in oral and maxillofacial surgery. Despite numerous studies and systematic reviews on treatment options, there is a lack of consensus and no accepted protocol on the management of OKC. Hence, the aim of this study was to briefly summarize all large systematic reviews in the literature on the management of OKC and formulate an evidence-based management protocol. Data from five large systematic reviews were combined to calculate the mean recurrence rate for each technique. Decompression followed by enucleation along with adjuvant methods such as application of Carnoy's solution and peripheral ostectomy can result in very low recurrence and is an acceptable first line treatment. The surgical approach should be determined by lesion size, patient age, proximity to vital structures, accessibility, soft tissue/cortical perforation, and if the lesion is recurrent.