Skip to main content
Erschienen in: Wireless Personal Communications 1/2018

06.02.2018

Data Transmission Scheme Considering Node Failure for Blockchain

verfasst von: Jiao Li

Erschienen in: Wireless Personal Communications | Ausgabe 1/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In recent years, Blockchain technology has attracted considerable attention from the industrial circle. Blockchain is a distributed ledger technology, which must be validated, stored and maintained by all nodes to ensure data security, transparency, and integrity. The communication efficiency of Blockchain is an important factor restricting its application. Existing algorithms can provide data routing schemes for Blockchain but without considering the node failure. On Blockchain, node failure is a common phenomenon due to the nodes’ selfishness and nodes’ mobility. Node failure degrades the network performance or even sometimes makes the network useless. This paper proposes a data transmission scheme considering node failure for finishing validation of block data on Blockchain, which firstly sets response threshold level to detect failure node, and then using greedy idea constructs communication tree to organize all nodes forwarding block data. Based to the multi-link concurrent communication tree model, this scheme maximizes the potential transmitting capacity of nodes and assigns proper tasks to other nodes beside source node, so it can shorten the validation time of Blockchain transaction, and improve resistance to node failure. Theoretical proof and experimental results show the effectiveness and the efficiency of the proposed data transmission scheme.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Godsiff, P. (2015). Bitcoin: Bubble or blockchain (pp. 191–203). Agent and Multi-agent Systems: Technologies and Applications. Godsiff, P. (2015). Bitcoin: Bubble or blockchain (pp. 191–203). Agent and Multi-agent Systems: Technologies and Applications.
2.
Zurück zum Zitat Kraft, D. (2016). Difficulty control for blockchain-based consensus systems. Peer-to-Peer Networking and Applications, 9(2), 397–413.CrossRef Kraft, D. (2016). Difficulty control for blockchain-based consensus systems. Peer-to-Peer Networking and Applications, 9(2), 397–413.CrossRef
3.
Zurück zum Zitat Swan, M. (2015). Blockchain thinking: The brain as a decentralized autonomous corporation. IEEE Technology and Society Magazine, 34(4), 41–52.CrossRef Swan, M. (2015). Blockchain thinking: The brain as a decentralized autonomous corporation. IEEE Technology and Society Magazine, 34(4), 41–52.CrossRef
4.
Zurück zum Zitat Eldred, M. (2016). Blockchain thinking and euphoric hubris. IEEE Technology and Society Magazine, 35(2), 27–27.MathSciNetCrossRef Eldred, M. (2016). Blockchain thinking and euphoric hubris. IEEE Technology and Society Magazine, 35(2), 27–27.MathSciNetCrossRef
5.
Zurück zum Zitat Zyskind, G., Nathan, O., & Pentland, A. S. (2015). Decentralizing privacy: Using blockchain to protect personal data. In IEEE security and privacy workshops (pp. 180–184). Zyskind, G., Nathan, O., & Pentland, A. S. (2015). Decentralizing privacy: Using blockchain to protect personal data. In IEEE security and privacy workshops (pp. 180–184).
6.
Zurück zum Zitat Wilson, D., & Ateniese, G. (2015). From pretty good to great: Enhancing PGP using bitcoin and the blockchain. In International conference on network and system security (pp. 368–375).CrossRef Wilson, D., & Ateniese, G. (2015). From pretty good to great: Enhancing PGP using bitcoin and the blockchain. In International conference on network and system security (pp. 368–375).CrossRef
7.
Zurück zum Zitat Kypriotaki, K., Zamani, E., & Giaglis, G. (2015). From bitcoin to decentralized autonomous corporations. In: International conference on enterprise information systems (pp. 284–290). Kypriotaki, K., Zamani, E., & Giaglis, G. (2015). From bitcoin to decentralized autonomous corporations. In: International conference on enterprise information systems (pp. 284–290).
8.
Zurück zum Zitat Hurlburt, G. (2016). Might the blockchain outlive bitcoin? IEEE Educational Activities Department, 18(2), 12–16. Hurlburt, G. (2016). Might the blockchain outlive bitcoin? IEEE Educational Activities Department, 18(2), 12–16.
11.
Zurück zum Zitat Kumar, S., & Mehfuz, S. (2016). Intelligent probabilistic broadcasting in mobile ad hoc network: A PSO approach. Journal of Reliable Intelligent Environments, 2(2), 1–9.CrossRef Kumar, S., & Mehfuz, S. (2016). Intelligent probabilistic broadcasting in mobile ad hoc network: A PSO approach. Journal of Reliable Intelligent Environments, 2(2), 1–9.CrossRef
12.
Zurück zum Zitat He, M., Zhang, Y. J., & Meng, X. W. (2015). Resource location flooding strategy of unstructured P2P for user requirements. Journal of Software, 26(2), 640–662.MathSciNet He, M., Zhang, Y. J., & Meng, X. W. (2015). Resource location flooding strategy of unstructured P2P for user requirements. Journal of Software, 26(2), 640–662.MathSciNet
14.
Zurück zum Zitat Pai, V., Kumar, K., Tamilmani, K., Sambamurthy, V., & Mohr, A. E. (2005). Chainsaw: Eliminating trees from overlay multicast. In International conference on peer-to-peer systems (pp. 127–140). Pai, V., Kumar, K., Tamilmani, K., Sambamurthy, V., & Mohr, A. E. (2005). Chainsaw: Eliminating trees from overlay multicast. In International conference on peer-to-peer systems (pp. 127–140).
15.
Zurück zum Zitat Biskupski, B., Schiely, M., Felber, P., & Meier, R. (2008). Tree-based analysis of mesh overlays for peer-to-peer streaming. In Ifip Wg 6.1 international conference on distributed applications and interoperable systems (pp. 126–139). Biskupski, B., Schiely, M., Felber, P., & Meier, R. (2008). Tree-based analysis of mesh overlays for peer-to-peer streaming. In Ifip Wg 6.1 international conference on distributed applications and interoperable systems (pp. 126–139).
16.
Zurück zum Zitat Liu, T. S., & Zhao, S. Z. (2007). P2P Distributed Database System. Beijing: Science Press. Liu, T. S., & Zhao, S. Z. (2007). P2P Distributed Database System. Beijing: Science Press.
17.
Zurück zum Zitat Li, J., & Liu, T. S. (2010). Study on a P2P communication tree algorithm based on multi-link. Journal of Northwest University, 40(6), 970–974. Li, J., & Liu, T. S. (2010). Study on a P2P communication tree algorithm based on multi-link. Journal of Northwest University, 40(6), 970–974.
18.
Zurück zum Zitat Li, J., Liang, G. Q., & Liu, T. S. (2017). A novel multi-link integrated factor algorithm considering node trust degree for blockchain-based communication. KSII Transactions on Internet & Information Systems, 11(8), 3766–3788. Li, J., Liang, G. Q., & Liu, T. S. (2017). A novel multi-link integrated factor algorithm considering node trust degree for blockchain-based communication. KSII Transactions on Internet & Information Systems, 11(8), 3766–3788.
19.
Zurück zum Zitat Huang, J., Fan, X., Wan, M., Zhuo, Z., Yang, Y., & Chen, S. (2016). Stable cluster-based routing protocol for mobile ad hoc networks. Journal of Beijing University of Aeronautics & Astronautics, 42(11), 2332–2339. Huang, J., Fan, X., Wan, M., Zhuo, Z., Yang, Y., & Chen, S. (2016). Stable cluster-based routing protocol for mobile ad hoc networks. Journal of Beijing University of Aeronautics & Astronautics, 42(11), 2332–2339.
20.
Zurück zum Zitat Jia, G., Fu, X. D., Gao, T. Y., Chen, B. B., & Fan, H. B. (2014). A survey on the node failure handling of P2P networks. In Control and decision conference (pp. 4077–4082). Jia, G., Fu, X. D., Gao, T. Y., Chen, B. B., & Fan, H. B. (2014). A survey on the node failure handling of P2P networks. In Control and decision conference (pp. 4077–4082).
21.
Zurück zum Zitat Ranga, V., Dave, M., & Verma, A. K. (2014). A hybrid timer based single node failure recovery approach for WSANs. Wireless Personal Communications, 77(3), 2155–2182.CrossRef Ranga, V., Dave, M., & Verma, A. K. (2014). A hybrid timer based single node failure recovery approach for WSANs. Wireless Personal Communications, 77(3), 2155–2182.CrossRef
22.
Zurück zum Zitat Uwitonze, A., Huang, J., Ye, Y., & Cheng, W. (2017). Connectivity restoration in wireless sensor networks via space network coding. Sensors, 17(4), 902.CrossRef Uwitonze, A., Huang, J., Ye, Y., & Cheng, W. (2017). Connectivity restoration in wireless sensor networks via space network coding. Sensors, 17(4), 902.CrossRef
23.
Zurück zum Zitat Boudries, A., Amad, M., & Siarry, P. (2016). Novel approach for replacement of a failure node in wireless sensor network. Telecommunication Systems, 65, 1–10. Boudries, A., Amad, M., & Siarry, P. (2016). Novel approach for replacement of a failure node in wireless sensor network. Telecommunication Systems, 65, 1–10.
24.
Zurück zum Zitat Wang, H., Ding, X., Huang, C., & Wu, X. (2016). Adaptive connectivity restoration from node failure(s) in wireless sensor networks. Sensors, 16(10), 1487.CrossRef Wang, H., Ding, X., Huang, C., & Wu, X. (2016). Adaptive connectivity restoration from node failure(s) in wireless sensor networks. Sensors, 16(10), 1487.CrossRef
25.
Zurück zum Zitat Liu, X., & Medhi, D. (2017). Optimally selecting standby virtual routers for node failures in a virtual network environment. IEEE Transactions on Network and Service Management, 14(2), 275–288.CrossRef Liu, X., & Medhi, D. (2017). Optimally selecting standby virtual routers for node failures in a virtual network environment. IEEE Transactions on Network and Service Management, 14(2), 275–288.CrossRef
26.
Zurück zum Zitat Shahriar, N., Ahmed, R., Chowdhury, S., Khan, A., Boutaba, R., & Mitra, J. (2017). Generalized recovery from node failure in virtual network embedding. IEEE Transactions on Network and Service Management, 14(9), 261–274.CrossRef Shahriar, N., Ahmed, R., Chowdhury, S., Khan, A., Boutaba, R., & Mitra, J. (2017). Generalized recovery from node failure in virtual network embedding. IEEE Transactions on Network and Service Management, 14(9), 261–274.CrossRef
27.
Zurück zum Zitat Abdullah, S., & Yang, K. (2014). An energy efficient message scheduling algorithm considering node failure in IoT environment. Wireless Personal Communications, 79(3), 1815–1835.CrossRef Abdullah, S., & Yang, K. (2014). An energy efficient message scheduling algorithm considering node failure in IoT environment. Wireless Personal Communications, 79(3), 1815–1835.CrossRef
Metadaten
Titel
Data Transmission Scheme Considering Node Failure for Blockchain
verfasst von
Jiao Li
Publikationsdatum
06.02.2018
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 1/2018
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-018-5434-x

Weitere Artikel der Ausgabe 1/2018

Wireless Personal Communications 1/2018 Zur Ausgabe

Neuer Inhalt