Recent advances in consensus protocols for blockchain: a survey

As the core of a blockchain system, the consensus mechanism not only helps to maintain the consistency of node data, but also gets involved in the issuance of tokens and prevention of attacks. Since the first blockchain system was born, it has been continuously improved with the development of blockchain technology and evolved into multiple new branches. Starting with the basic introduction of consensus and the classic Byzantine Generals Problem in distributed computing area, this survey utilizes a thorough classification to explain current consensus protocols in the blockchain system, presents the characteristics of mainstream protocols (PoW, PoS, DPoS, PBFT, etc.) and analyzes the strengths and weaknesses of them. Then we evaluate the performance qualitatively and quantitatively. In the end, we highlight several research directions for developing more practical consensus protocols for the future.

[1]  Chen Wang,et al.  Classifying transportation mode and speed from trajectory data via deep multi-scale learning , 2019, Comput. Networks.

[2]  Roberto Baldoni,et al.  PBFT vs Proof-of-Authority: Applying the CAP Theorem to Permissioned Blockchain , 2018, ITASEC.

[3]  Lei Zhang,et al.  Blockchain-Enabled Wireless Internet of Things: Performance Analysis and Optimal Communication Node Deployment , 2019, IEEE Internet of Things Journal.

[4]  Danda B. Rawat,et al.  Wireless Network Virtualization by Leveraging Blockchain Technology and Machine Learning , 2019, WiseML@WiSec.

[5]  Chen Wang,et al.  Trajectory-based multi-dimensional outlier detection in wireless sensor networks using Hidden Markov Models , 2014, Wirel. Networks.

[6]  Yang Xu,et al.  A Blockchain-Based Nonrepudiation Network Computing Service Scheme for Industrial IoT , 2019, IEEE Transactions on Industrial Informatics.

[7]  Aron Laszka,et al.  When Bitcoin Mining Pools Run Dry - A Game-Theoretic Analysis of the Long-Term Impact of Attacks Between Mining Pools , 2015, Financial Cryptography Workshops.

[8]  Qiang Ni,et al.  Cognitive computing and wireless communications on the edge for healthcare service robots , 2020, Comput. Commun..

[9]  Wei Cai,et al.  Proof-of-Play: A Novel Consensus Model for Blockchain-based Peer-to-Peer Gaming System , 2019, BSCI.

[10]  Tong Shen,et al.  Proof of Sincerity: A New Lightweight Consensus Approach for Mobile Blockchains , 2019, 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[11]  Cong Wang,et al.  Proof of Contribution: A Modification of Proof of Work to Increase Mining Efficiency , 2018, 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC).

[12]  Sunny King,et al.  PPCoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake , 2012 .

[13]  Chen Wang,et al.  SURF: A connectivity-based space filling curve construction algorithm in high genus 3D surface WSNs , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).

[14]  Chen Wang,et al.  ILLIA: Enabling $k$ -Anonymity-Based Privacy Preserving Against Location Injection Attacks in Continuous LBS Queries , 2018, IEEE Internet of Things Journal.

[15]  Nicolas Houy,et al.  It Will Cost You Nothing to 'Kill' a Proof-of-Stake Crypto-Currency , 2014 .

[16]  David Schwartz,et al.  The Ripple Protocol Consensus Algorithm , 2014 .

[17]  Elaine Shi,et al.  The Honey Badger of BFT Protocols , 2016, CCS.

[18]  Butler W. Lampson,et al.  How to Build a Highly Available System Using Consensus , 1996, WDAG.

[19]  Chen Wang,et al.  SEND: A Situation-Aware Emergency Navigation Algorithm with Sensor Networks , 2017, IEEE Transactions on Mobile Computing.

[20]  John Tromp,et al.  Cuckoo Cycle: A Memory Bound Graph-Theoretic Proof-of-Work , 2015, Financial Cryptography Workshops.

[21]  Zibin Zheng,et al.  An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends , 2017, 2017 IEEE International Congress on Big Data (BigData Congress).

[22]  Elaine Shi,et al.  The Sleepy Model of Consensus , 2017, ASIACRYPT.

[23]  Elaine Shi,et al.  Thunderella: Blockchains with Optimistic Instant Confirmation , 2018, IACR Cryptol. ePrint Arch..

[24]  Chen Wang,et al.  CANS: Towards Congestion-Adaptive and Small Stretch Emergency Navigation with Wireless Sensor Networks , 2016, IEEE Transactions on Mobile Computing.

[25]  Jie Fan,et al.  Research on the Technologies of Byzantine System: Research on the Technologies of Byzantine System , 2014 .

[26]  Aggelos Kiayias,et al.  Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic Availability , 2018, IACR Cryptol. ePrint Arch..

[27]  Leslie Lamport,et al.  The Byzantine Generals Problem , 1982, TOPL.

[28]  Yueshen Xu,et al.  QoS Prediction for Service Recommendation with Deep Feature Learning in Edge Computing Environment , 2019, Mob. Networks Appl..

[29]  Yueshen Xu,et al.  Network Location-Aware Service Recommendation with Random Walk in Cyber-Physical Systems , 2017, Sensors.

[30]  Aggelos Kiayias,et al.  Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol , 2017, CRYPTO.

[31]  Juan Benet,et al.  IPFS - Content Addressed, Versioned, P2P File System , 2014, ArXiv.

[32]  Elaine Shi,et al.  Permacoin: Repurposing Bitcoin Work for Data Preservation , 2014, 2014 IEEE Symposium on Security and Privacy.

[33]  Yu Wang,et al.  Mitigating Interference via Power Control for Two-Tier Femtocell Networks: A Hierarchical Game Approach , 2019, IEEE Transactions on Vehicular Technology.

[34]  Qian He,et al.  Blockchain and Deep Reinforcement Learning Empowered Intelligent 5G Beyond , 2019, IEEE Network.

[35]  Leslie Lamport,et al.  Proving the Correctness of Multiprocess Programs , 1977, IEEE Transactions on Software Engineering.

[36]  Fan Jie Research on the Technologies of Byzantine System , 2013 .

[37]  Andrew S. Tanenbaum,et al.  Distributed systems: Principles and Paradigms , 2001 .

[38]  Eric Wustrow,et al.  DDoSCoin: Cryptocurrency with a Malicious Proof-of-Work , 2016, WOOT.

[39]  Silvio Micali,et al.  Algorand: Scaling Byzantine Agreements for Cryptocurrencies , 2017, IACR Cryptol. ePrint Arch..

[40]  Iddo Bentov,et al.  Proof of Activity: Extending Bitcoin's Proof of Work via Proof of Stake [Extended Abstract]y , 2014, PERV.

[41]  Lin Chen,et al.  On Security Analysis of Proof-of-Elapsed-Time (PoET) , 2017, SSS.

[42]  Yu Wang,et al.  Delay-Constrained Utility Maximization for Video Ads Push in Mobile Opportunistic D2D Networks , 2018, IEEE Internet of Things Journal.

[43]  Fabian Schuh,et al.  BITSHARES 2.0: FINANCIAL SMART CONTRACT PLATFORM , 2015 .

[44]  Fred B. Schneider,et al.  Implementing fault-tolerant services using the state machine approach: a tutorial , 1990, CSUR.

[45]  Yonggang Wen,et al.  A Survey on Consensus Mechanisms and Mining Strategy Management in Blockchain Networks , 2018, IEEE Access.

[46]  Yucong Duan,et al.  Toward service selection for workflow reconfiguration: An interface-based computing solution , 2018, Future Gener. Comput. Syst..

[47]  Leandro Navarro-Moldes,et al.  Towards Blockchain-enabled Wireless Mesh Networks , 2018, CRYBLOCK@MobiSys.

[48]  Honghao Gao,et al.  Applying Probabilistic Model Checking to Financial Production Risk Evaluation and Control: A Case Study of Alibaba’s Yu’e Bao , 2018, IEEE Transactions on Computational Social Systems.

[49]  Kyungbaek Kim,et al.  A Survey about Consensus Algorithms Used in Blockchain , 2018, J. Inf. Process. Syst..

[50]  Xiaolong Xu,et al.  Efficient computation offloading for Internet of Vehicles in edge computing-assisted 5G networks , 2019, The Journal of Supercomputing.

[51]  Warren He,et al.  Proof of Luck: an Efficient Blockchain Consensus Protocol , 2016, SysTEX@Middleware.

[52]  A.W.G. de Vries Bitcoin's Growing Energy Problem , 2018 .

[53]  Moni Naor,et al.  Pricing via Processing or Combatting Junk Mail , 1992, CRYPTO.

[54]  Aggelos Kiayias,et al.  Ouroboros Praos: An Adaptively-Secure, Semi-synchronous Proof-of-Stake Blockchain , 2018, EUROCRYPT.

[55]  Geyong Min,et al.  Energy-Aware Dual-Path Geographic Routing to Bypass Routing Holes in Wireless Sensor Networks , 2018, IEEE Transactions on Mobile Computing.

[56]  Elaine Shi,et al.  Snow White: Provably Secure Proofs of Stake , 2016, IACR Cryptol. ePrint Arch..

[57]  Chen Wang,et al.  Slide: Towards Fast and Accurate Mobile Fingerprinting for Wi-Fi Indoor Positioning Systems , 2018, IEEE Sensors Journal.

[58]  Adam Back,et al.  Hashcash - A Denial of Service Counter-Measure , 2002 .