Skip to main content
Top
Published in: Complex & Intelligent Systems 2/2023

Open Access 20-09-2022 | Original Article

Primary node election based on probabilistic linguistic term set with confidence interval in the PBFT consensus mechanism for blockchain

Authors: Mingyue Xie, Jun Liu, Shuyu Chen, Guangxia Xu, Mingwei Lin

Published in: Complex & Intelligent Systems | Issue 2/2023

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This study proposes a primary node election method based on probabilistic linguistic term set (PLTS) for the practical Byzantine fault tolerance (PBFT) consensus mechanism to effectively enhance the efficiency of reaching consensus. Specifically, a novel concept of the probabilistic linguistic term set with a confidence interval (PLTS-CI) is presented to express the uncertain complex voting information of nodes during primary node election. Then, a novel score function based on the exponential semantic value and confidence approximation value for the PLTS-CI, called Score-ESCA, is used to solve the problems of comparing different nodes with various voting attitudes. This method helps select the node with the highest score by utilizing complex decision attitudes, making it an accurate primary node election solution. Furthermore, the feasibility of our proposed method is proved by both theoretical analysis and experimental evaluations.
Notes

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Introduction

Due to the rapid development of blockchain technology, various applications of this technology have emerged, such as health care [1, 2], e-commerce [3], smart manufacturing [4], electricity trading [5], and energy management [6, 7]. Blockchain is collectively maintained and stored by network nodes, constituting a shared distributed trusted database [810]. The great advantages of blockchain are anonymous, decentralized, traceable, and tamper-resistant [1118].
The consensus mechanism, the efficiency of which is used to measure the performance of blockchain systems [1923], is of importance to the blockchain. Additionally, its properties are critically important in determining the node for releasing a new proposal in a distributed system. This enables all the nodes to reach a consensus on the transaction data [2426]. Existing consensus mechanisms include proof of work (PoW) [27], proof of stake (PoS) [28], delegated PoS (DPoS) [29], practical Byzantine fault tolerance (PBFT) [30] and RAFT [31]. A comparison of the above consensus mechanisms is shown in Table 1.
Table 1
Comparison of several consensus mechanisms
Consensus mechanism
Energy consumption
Response time
Degree of decentralization
Consistency
Fault tolerance rate (%)
PoW
High
Minute
Completely
Weak
50
PoS
Low
Minute
Completely
Weak
50
DPoS
Low
Second
Incompletely
Weak
50
PBFT
Low
Second
Incompletely
Strong
33
RAFT
Low
Second
Incompletely
Strong
50
The PBFT consensus mechanism has shown great potential in enhancing the consensus reaching efficiency due to the existence of the primary node [32, 33]. It is worth noting that the primary node plays a critical role in generating blocks in turn in the PBFT consensus mechanism. Only one primary node exists in each round of consensus, and its identity is confirmed before the consensus process [23, 34]. The primary node has the authority to sort and broadcast transactions [3537]. Hence, the election of the primary node poses threats to a distributed blockchain system. For instance, a vulnerable primary node is prohibited from sending broadcast messages by an attacker, or the primary node may be an elected malicious node [38, 39]. These cases will cause the consensus process of the blockchain network to stall.
As the quantity of blockchain nodes increases, the security challenges of the PBFT consensus mechanism become more important [4042]. Some studies have aimed to overcome these security threats. Lao et al. [43] proposed a location-based and scalable PBFT consensus mechanism, called Geographic-PBFT, for IoT-blockchain applications. Li et al. [21] proposed a double-layer PBFT protocol that can accommodate more faulty nodes. However, these methods focus only on optimizing the scalability when nodes communicate frequently. The consensus security issues caused by a malicious primary node are not considered or ignored. As the primary node is chosen based on the time at which it joins the network [44], the probability of a malicious node being elected as the primary node is relatively high. Consequently, the fault tolerance of blockchain will be compromised. Xu et al. [45] proposed a concurrent PBFT consensus method, called C-PBFT. After classifying the peers in the supply chain into several clusters, the trusted primary node is elected by reputation assessment. Wang et al. [46] proposed an improved credit-based PBFT consensus algorithm (CPBFT), in which the probability of a primary election is affected by the past behavior. Therefore, the cost of the iterative calculation of credit values and consensus stage of a primary node is relatively large. Li et al. [47] proposed that the primary node of the PBFT consensus mechanism be elected according to a voting strategy. This can reduce the probability of a malicious node being elected as the primary node. However, primary node election among nodes does not reflect actual complex decision situations when expressing voting attitudes.
Therefore, the fuzzy set theory was introduced as a tool to cope with uncertainty in the decision-making process by considering many different perspectives [48]. Karaşan et al. [48] utilized the hesitant fuzzy Z-numbers to consider both the preciseness of the data and the hesitancy of the experts when evaluating the risks of blockchain technology. Thus, this paper focuses on blockchain risk evaluation rather than node selection. Xu et al. [49] proposed a selection method for agent nodes in the DPoS consensus mechanism based on vague set, similar to how human elections are held. However, there still may be a situation in which the rankings of the nodes are indistinguishable. Liu et al. [50] pointed out that probabilistic linguistic term set (PLTS) that can be seen as a representation of uncertain voting information to select delegates in the DPoS consensus mechanism. However, the primary node election involves multiple factors, also called attributes, which usually have different importance weights. These improvements consider only a single attribute of nodes one-sidedly, ignoring other aspects of complex voting attitudes and sensitive information about human emotions. Therefore, based on the difficulty of primary node election, the security of the PBFT consensus mechanism still cannot be guaranteed effectively.
Throughout the paper, we focus on primary node election in the PBFT consensus mechanism. To represent more complicated voting attitudes, a novel PLTS with a confidence interval (PLTS-CI) is proposed to deal with the uncertain voting information in the PBFT consensus mechanism. Then the primary node election process is formulated as a multiple attribute decision-making (MADM) problem to find the most suitable primary node by synthetically evaluating the values of multiple attributes of all nodes. The proposed consensus mechanism can select a credible primary node according to the voting before the implementation of consensus, which reduces the probability of malicious nodes participating in block generation in the blockchain. With the operation of multiple rounds of consensus, a node with a score in the blockchain that is always high can be quickly identified as the primary node. Similarly, the nodes that always have low scores can be identified as malicious nodes and removed, making the blockchain more stable. Therefore, the probability of malicious nodes being elected as the primary node is greatly reduced, and the security of the proposed consensus mechanism is more effectively guaranteed than in previous literature. In summary, the major contributions of this article are as follows:
1.
The new concept of PLTS-CI is proposed to express the uncertain complex voting preference information of nodes.
 
2.
By analyzing the subscript deviation of PLTS-CI, a novel exponential semantic value of the linguistic term is defined.
 
3.
A confidence approximation value in PLTS-CI is proposed to enhance the degree of evaluation certainty of the decision-makers.
 
4.
The proposed score function based on exponential semantic value and confidence approximation value in PLTS-CI (Score-ESCA) can better distinguish the PLTS-CIs used to indicate the evaluation of nodes.
 
5.
Furthermore, the Score-ESCA method is adopted for an improved technique for order preference by similarity to ideal solution (TOPSIS) method for primary node election in the PBFT consensus mechanism.
 
The rest of this paper is organized as follows: the basic definitions relevant to the PBFT consensus mechanism, linguistic term set, PLTS, and framework of MADM are reviewed in the next section. Following section puts forward the novel concept of PLTS-CI, then a novel score function called Score-ESCA is developed. The primary node election process is formalized as a probabilistic linguistic MADM. The next section presents a primary node election example using our methodology. Theoretical analysis and experimental analysis are given to prove the advantages of our proposed method in the next section. Finally, the last section gives the conclusions of this paper.

Preliminaries

In this section, we briefly review the basic knowledge of the PBFT, linguistic term set (LTS), PLTS, and framework of MADM.

PBFT consensus mechanism

PBFT is a state machine replication mechanism that correctly survives Byzantine faults in asynchronous networks [51]. The client and consensus nodes work together to complete the consensus process. The consensus nodes are divided into one primary node and several replica nodes:
1.
Primary node: Before the consensus process begins, the primary node is responsible for receiving a certain number of transactions from the client and multicasting them sequentially to other replica nodes. In particular, the primary node is voted on by valid consensus nodes.
 
2.
Replica nodes: Replica nodes execute in the order specified by the primary node, and the consistent content of blocks is guaranteed by ensuring that requests are executed in a consistent order.
 
In the PBFT consensus mechanism, the client will issue a request to the primary node. After the primary and replica nodes agree upon the request, it is decided whether the request can be executed or not. As shown in Fig. 1, the specific consensus process consists of the following steps:
Step 1: before implementing the PBFT consensus mechanism, all consensus nodes are equally likely to be elected as the primary node. Then, a view-new message is sent to synchronize the data of all nodes after initializing the primary node.
Step 2: the client sends a request to activate the service operation on the primary node. After the request validation succeeds, the primary node broadcasts the request and sends pre-prepare messages to all replicas.
Step 3: after a valid replica node verifies the correctness of the message, it broadcasts the prepare message to all nodes and enters the prepare stage.
Step 4: the replica node collects the prepare messages for the request. When more than 2f requests are counted (f is the number of tolerable Byzantine nodes), the node enters the commit phase and broadcasts the commit message.
Step 5: the node counts the number of received commit messages. When more than 2f commit messages are counted, this means that most of the nodes have reached a consensus. The node then writes the data, caches the last request of the client, and reports it back to the client.
Step 6: if the client receives f + 1 identical reply messages, it means that the request initiated by the client has reached network consensus. Otherwise, the client needs to determine whether to resend the request to the primary node.

Additive linguistic term sets

The LTS is a set of linguistic variables whose terms are in a natural language. Decision-makers can use the LTS to elaborate their views on a subject. It consists of two parts: a linguistic description operator and semantics. The LTS is the modeling basis of the PLTS. An additive LTS can be defined as follows [52]:
$$ S = \left\{ {s_{\rho } \left| {\rho = 0,1, \ldots ,\delta } \right.} \right\}, $$
where sρ denotes a linguistic variable. In particular, δ is a positive integer and δ + 1 denotes the cardinality of S. S has the following characteristics:
1.
If α > β, then sα > sβ;
 
2.
The negation operator is defined as follows: neg(sα) = sβ, where α + β = δ;
 
3.
The maximum operator is defined as follows: if sα  ≥ sβ, then max (sα, sβ) = sα;
 
4.
The minimum operator is defined as follows: if sβ  ≥ sα, then min (sα, sβ) = sα;
 
Example 2.1
Let us suppose that some decision-makers evaluate the memory of a node, and their attitudes vary from “very high” to “very low”, then an LTS S1 can be described as follows:
$$ \begin{gathered} S_{1} = \left\{ {s_{0} } \right. = \prime \prime {\text{very low}}\prime \prime , \, s_{1} = \prime \prime {\text{low}}\prime \prime , \, s_{2} = \prime \prime {\text{slightly low}}\prime \prime , \, \hfill \\ s_{3} = \prime \prime {\text{medium}}\prime \prime , \hfill \\ \left. { \, s_{4} = \prime \prime {\text{slightly high}}\prime \prime , \, s_{5} = \prime \prime {\text{high}}\prime \prime , \, s_{6} = \prime \prime {\text{very high}}\prime \prime } \right\}, \hfill \\ \end{gathered} $$
where δ = 6 and the cardinality of S1 is 7.

Probabilistic linguistic term set

Pang et al. [53] proposed a PLTS comprising several linguistic terms with probabilities. The PLTS embodies the fuzziness and hesitation regarding decision information and contains the probability information of decision information [54]. The mathematical expression of a PLTS can be given as follows:
Definition 2.1
[53]. Let S = {sρρ = 0, 1, …, δ} be an LTS, then a PLTS is defined as
$$ L(p) = \left\{ {L^{(k)} \left( {p^{(k)} } \right)\left| { \, L^{(k)} \in S, \, p^{(k)} \ge 0, \, k = 1,2, \ldots ,\# L(p)} \right., \, \sum\limits_{k = 1}^{\# L(p)} {p^{(k)} \le 1} } \right\}, $$
where L(k)(p(k)) represents the linguistic term L(k) attached to the matching probability p(k). #L(p) denotes the number of different linguistic terms in L(p).
Example 2.2
Let S = {s0, s1, s2, s3, s4, s5, s6} be an LTS, then L1(p) = {s1(0.3), s3(0.2), s4(0.4)} and L2(p) = {s0(0.3), s5(0.7)} are two PLTSs.
Due to the complexity or specialization of the evaluation problem and the fuzziness of human cognition, the evaluation information that decision-makers usually provide is incomplete. The sum of the probabilities of all possible linguistic terms in a PLTS is less than 1. To eliminate this partial ignorance, the normalization of the PLTS can be performed as follows.
Definition 2.2
[53]. Let L(p) be a PLTS such that \(\sum\nolimits_{k = 1}^{\# L(p)} {p^{(k)} < 1}\), then its normalization can be defined as:
$$ \dot{L}(p) = \left\{ {L^{(k)} \left( {\dot{p}^{(k)} } \right)\left| { \, k = 1,2, \ldots ,\# L(p)} \right.} \right\}, $$
where \(\dot{p}^{(k)} = {{p^{(k)} } \mathord{\left/ {\vphantom {{p^{(k)} } {\sum\nolimits_{k = 1}^{\# L(p)} {p^{(k)} } }}} \right. \kern-\nulldelimiterspace} {\sum\nolimits_{k = 1}^{\# L(p)} {p^{(k)} } }}\), for all k = 1, 2, …, #L(p).
In addition, the numbers of linguistic terms in different PLTSs are usually different, which increases the complexity of the decision calculation. Thus, we usually extend PLTSs with fewer linguistic terms to ensure that different PLTSs have equal numbers of elements.
Definition 2.3
[53]. Let Li(p) = {Li(k)(pi(k)) | k = 1, 2, …, #Li(p)} be two PLTSs, where i = 1, 2. If #L1(p) > #L2(p), then we append #L1(p)–#L2(p) linguistic terms to L2(p). The added linguistic term is the smallest term in L2(p), and its linguistic probability is zero.
The normalization of L1(p) and L2(p) can be divided into two steps:
1.
If \(\sum\nolimits_{k = 1}^{\# L(p)} {p^{(k)} < 1}\), then it can be normalized to \(\dot{L}_{i} (p)\) according to Definition 2.2, i = 1, 2.
 
2.
If #L1(p) ≠ #L2(p), then we can ensure that the two PLTSs have equal numbers of linguistic terms by using Definition 2.3.
 
Example 2.3
According to Definition 2.2, we can transform L1(p) = {s1(0.3), s3(0.2), s4(0.4)} in Example 2.2 to a normalized PLTS as \(\dot{L}_{1} (p)\) = {s1(0.33), s3(0.22), s4(0.44)}. Since #L1(p) > #L2(p), we have \(\dot{L}_{2} (p)\) = {s0(0.3), s5(0.7), s0(0)}.

Multiple attribute decision-making analysis

The goal of an MADM problem is to rank several selected alternatives [5557]. The basic framework of the MADM analysis process can be summarized as follows:
1.
Let N = {N1, N2, …, Nm} be a finite alternative set and A = {A1, A2, …, An} be an attribute set. The weight of Aj (j = 1, 2, …, n) is represented by wj ∈ [0,1].
 
2.
Let the PLTS Lij(p) denotes the linguistic evaluation information for the alternative Ni with attribute Aj by using the LTS S = { sρρ = 0, 1, …, δ}. L = [Lij(p)]m×n is a decision matrix, as shown in Eq. (1), where Lij(p) = {Lij(k)(pij(k)) | Lij(k) ∈ S, k = 1, 2, …, #Lij(p)}:
$$ L = \left[ {L_{ij} (p)} \right]_{m \times n} = \begin{array}{*{20}c} {N_{1} } \\ {N_{2} } \\ \vdots \\ {N_{m} } \\ \end{array} \mathop {\left[ {\begin{array}{*{20}c} {L_{11} (p)} & {L_{12} (p)} & \cdots & {L_{1n} (p)} \\ {L_{21} (p)} & {L_{22} (p)} & \cdots & {L_{2n} (p)} \\ \vdots & \vdots & \ddots & \vdots \\ {L_{m1} (p)} & {L_{m2} (p)} & \cdots & {L_{mn} (p)} \\ \end{array} } \right]}\limits^{{\begin{array}{*{20}c} { \, A_{1} } & { \, A_{2} } & { \, \cdots \, } & {A_{n} \, } \\ \end{array} }} . $$
(1)
 
3.
Rank the alternatives N1, N2, …, Nm by processing the above decision matrix.
 

Primary node election based on PLTS-CI

In this section, the novel concept of the PLTS-CI is proposed. Afterward, to compare several PLTS-CIs, a novel score function called Score-ESCA is presented. Then, an attribute weights calculation method based on the relationship among the decision data is improved, based on which; an improved TOPSIS method for primary node election based on Score-ESCA for MADM is developed.

The concept of the PLTS-CI

In this subsection, the primary node election process of the PBFT consensus mechanism in blockchain is formalized as a decision-making problem that can be described by the PLTS-CI.
In the PBFT consensus mechanism, the consensus nodes are computers in the blockchain network, which are responsible for the transactions ordering and block composition [5860]. The PLTS is an important tool for representing complex decision information that can express the evaluation information of nodes. The primary node election process of the PBFT consensus mechanism is considered a decision-making process. In particular, linguistic terms are regarded as the voting options by the decision-makers to express the evaluation information of different alternative nodes.
However, for complex blockchain network scenarios, nodes equipped with similar hardware configurations do not necessarily receive the same evaluation information. For instance, although the memory of the current node may be evaluated as “very high”, the decision-makers still may be unable to give a completely specific decision as this linguistic term may not satisfy the decision-makers. Therefore, the confidence degree of the decision-makers regarding the linguistic terms is an important part of the evaluation information. However, in many cases, it has shown great limitations in providing a firm assessment of linguistic terms for decision-makers. Hence, the confidence interval is introduced to express the evaluation confidence information of decision-makers. For example, when a decision-maker considers the memory of a node to be “high”, the evaluation information can be expressed as (s5, [0.5, 0.6]) by using the linguistic terms in Example 2.1. Note that the confidence interval value [0.5, 0.6] represents the confidence degree of the decision-maker that the voting attitude of the node memory is “high”.
Therefore, to better express the decision-making information of decision-makers, the probabilistic linguistic term set with a confidence interval (PLTS-CI) is defined. This linguistic term set not only contains multiple linguistic terms with probability information but also gives the evaluation confidence information in the form of interval values. We obtain the following definition.
Definition 3.1
Let S = {sρρ = 0, 1, …, δ} be an LTS, then a PLTS-CI can be defined as:
$$ Q\left( {pI} \right) = \left\{ {Q^{(k)} \left( {p^{(k)} ,\left[ {I_{k}^{L} ,I_{k}^{R} ]} \right]} \right)\left| {Q^{(k)} \in S} \right.,k = 1, \, 2, \ldots ,\# Q\left( {pI} \right),p^{(k)} \ge 0,\sum\limits_{k = 1}^{{\# Q\left( {pI} \right)}} {p^{(k)} } \le 1} \right\}, $$
(2)
where \(\left[ {I_{k}^{L} ,I_{k}^{R} } \right]\) denotes the confidence interval of linguistic term Q(k), and \(\left[ {I_{k}^{L} ,I_{k}^{R} } \right]\) is a nonempty subinterval on [0, 1]. In particular, \(I_{k}^{L}\) and \(I_{k}^{R}\) denote the lower limit and upper limit of the linguistic confidence interval respectively. \(Q^{(k)} \left( {p^{(k)} ,\left[ {I_{k}^{L} ,I_{k}^{R} ]} \right]} \right)\) represents the linguistic term Q(k) attached to the matching probability p(k) and confidence interval \(\left[ {I_{k}^{L} ,I_{k}^{R} } \right]\). #Q(pI) denotes the number of different linguistic terms in Q(pI).

The score function of the PLTS-CI

In this subsection, the exponential semantic value and confidence approximation value for considering the emotional sensitivities and confidence degree of decision-makers are developed respectively, based on which a novel Score-ESCA function to measure whether a node can be elected as a primary node is proposed.
In the PLTS-CI, the influence of human emotion on linguistic terms and the confidence degree of the decision-makers using the linguistic terms describe the evaluation information of the nodes. Therefore, the linguistic terms of the decision-makers are critically important in expressing the decision information when electing the primary node. To intuitively reflect the impact of emotional sensitivity on linguistic terms, an exponential semantic value is defined as follows:
The LTS is the source of the information expression of the primary node evaluation decision among n alternative nodes in the PBFT consensus mechanism. Valid voting can give opinions regarding the node Ni (i = 1, 2, …, m) under consideration. Let S = {sρρ = 0, 1, …, δ} be an additive LTS; S is used to describe the evaluation information of node Ni. In addition, sδ/2 represents the middle linguistic term used to describe Ni, and the rest of the linguistic terms are evenly distributed on either side of it. Thus, if experts' psychological distances between any adjacent linguistic terms in the LTS are equal, then the differences in their corresponding semantic values are also equal. For example, S1 in Example 2.1 aims to determine whether Ni can be elected as the primary node. The evaluations “s4 = slightly high”, “s5 = high” and “s6 = very high” are three adjacent linguistic terms. When human emotion is not a factor, the semantic value difference between “s4 = slightly high” and “s5 = high” is equal to the semantic value difference between “s5 = high” and “s6 = very high”.
However, the emotions of decision-makers can greatly affect the linguistic terms in decision problems. In practical decision-making, the higher the value of the linguistic subscripts is, the higher the psychological sensitivity of humans. When expressing the evaluation information of a node, the larger the substandard value of the linguistic term is, the more sensitive the psychology of the decision-makers is. For example, when evaluating the pros and cons of nodes, “slightly high” and “high” are two adjacent levels. “High” and “very high” are also two adjacent levels. Intuitively, the difference between the latter pair is greater than the difference between the former pair. Thus, the semantic value difference between the latter should be greater than that between the former.
To consider experts' psychology, some linguistic scale functions (LSFs) [6163] have been proposed to transform each linguistic term into its corresponding semantic value. Let S = {sρρ = 0, 1, …, δ} be an LTS, vρ be the semantic value of linguistic term sρ; then the LSF is defined as a mapping function F: sρ → vρ, where 0 ≤ F(sρ) ≤ 1. The relationship between the linguistic term and its corresponding semantic value can be expressed by using a directly proportional function defined as:
$$ F\left( {s_{\rho } } \right) = {\rho \mathord{\left/ {\vphantom {\rho \delta }} \right. \kern-\nulldelimiterspace} \delta }. $$
The exponential function is a monotonically increasing function. When the value of the independent variable increases isometrically, the value of the dependent variable increases at an unequal distance. This is similar to human emotion when evaluating the merits of node Ni. When the evaluation information of node Ni is closer to the best rank, human psychology is more sensitive, which means it is more difficult to recognize this evaluation. As the linguistic term approaches “very high”, the semantic value difference between the two adjacent linguistic terms increases. Therefore, we propose a novel exponential semantic value for PLTS-CIs to reflect human psychological behavior, as shown in Eq. (3). The relationship between the linguistic term and its corresponding semantic value is shown in Fig. 2.
Definition 3.2
Let \(Q\left( {pI} \right) = \left\{ {Q^{(k)} \left( {p^{(k)} ,\left[ {I_{k}^{L} ,I_{k}^{R} ]} \right]} \right)} \right\}\) be a PLTS-CI, then the exponential semantic value is defined as:
$$ D\left( {s_{\rho } } \right) = 2^{{\frac{\rho }{\delta }}} - 1. $$
(3)
It has the following characteristics:
(1)
ρ ∈ [0, δ], D(sρ) ∈ [0, 1].
 
Proof.
ρ ∈ [0, δ], we have ρ/δ ∈ [0, 1]. We can obtain D(sρ) ∈ [0, 1] from \(2^{{\frac{\rho }{\delta }}}\) ∈ [1, 2].
(2)
The exponential semantic value D(sρ) is monotonically increasing in the domain.
 
Proof.
\(D\left( {s_{\rho } } \right)^{\prime } = \ln 2 \cdot \frac{1}{\delta } \cdot 2^{{\frac{\rho }{\delta }}}\) and ρ/δ ∈ [0, 1], then \(D\left( {s_{\rho } } \right)^{\prime } > 0\). Thus, D(sρ) is a monotonically increasing function.
The confidence degree of decision-makers is another factor affecting the primary node election. Therefore, we propose a confidence approximation value to convert the confidence interval values into real values, as shown in Eq. (4).
Definition 3.3
Let \(Q\left( {pI} \right) = \left\{ {Q^{(k)} \left( {p^{(k)} ,\left[ {I_{k}^{L} ,I_{k}^{R} ]} \right]} \right)} \right\}\) be a PLTS-CI, then the confidence approximation value is defined as:
$$ C\left( {Q^{\left( k \right)} } \right) = 1 - \sqrt {\frac{{\left( {1 - I_{k}^{L} } \right)^{2} + \left( {1 - I_{k}^{R} } \right)^{2} }}{2}} . $$
(4)
It has the following characteristic:
(1)
If \(\left[ {I_{k}^{L} ,I_{k}^{R} } \right]\) is a nonempty subinterval on [0, 1], then C(Q(k)) ∈ [0,1].
 
Proof.
If \(\left[ {I_{k}^{L} ,I_{k}^{R} } \right]\) is a nonempty subinterval on [0,1], then \(\left( {\left( {1 - I_{k}^{L} } \right)^{2} + \left( {1 - I_{k}^{R} } \right)^{2} } \right) \in \left[ {0,2} \right]\). We can easily obtain C(Q(k)) ∈ [0,1].
The value of confidence is evaluated by the Euclidean distance between the interval value \(\left[ {I_{k}^{L} ,I_{k}^{R} } \right]\) and [1, 1]. For a linguistic term Q(k), if C(Q(k)) is closer to 1, then the evaluation information of the linguistic term is more effective and the decision results are more reliable.
In this paper, to compare several PLTS-CIs, a novel score function for PLTS-CIs, called Score-ESCA, is defined based on the exponential semantic value in Eq. (3) and the confidence approximation value in Eq. (4), as shown in Eq. (5).
Definition 3.4
Let \(Q\left( {pI} \right) = \left\{ {Q^{(k)} \left( {p^{(k)} ,\left[ {I_{k}^{L} ,I_{k}^{R} ]} \right]} \right)} \right\}\) be a PLTS-CI. Then, the score of Q(pI) is:
$$ E(Q(pI)) = \frac{{\sum\nolimits_{k = 1}^{\# Q(pI)} {D\left( {s_{i} } \right)C\left( {Q^{k} } \right)p^{(k)} } }}{{\sum\nolimits_{k = 1}^{\# Q(pI)} {p^{(k)} } }}, $$
(5)
where si is the linguistic term corresponding to Q(k) in the PLTS-CI Q(pI).
Next, a comparison method for PLTS-CIs based on the exponential semantic value and confidence approximation value is presented.
Definition 3.5
Let \(Q\left( {pI} \right) = \left\{ {Q^{(k)} \left( {p^{(k)} ,\left[ {I_{k}^{L} ,I_{k}^{R} ]} \right]} \right)} \right\}\) be a PLTS-CI, and let Q1(pI) and Q2(pI) be two PLTS-CIs. Then the comparison between the PLTS-CIs can be given as follows:
1.
If E(Q1(pI)) > E(Q2(pI)), then Q1(pI) is superior to Q2(pI), denoted by Q1(pI) > Q2(pI).
 
2.
If E(Q1(pI)) < E(Q2(pI)), then Q1(pI) is inferior to Q2(pI), denoted by Q1(pI) < Q2(pI).
 
3.
If E(Q1(pI)) = E(Q2(pI)), then there is no difference between Q1(pI) and Q2(pI), denoted by Q1(pI) ~ Q2(pI).
 

Attribute weights calculation based on Score-ESCA

To select a primary node in the PBFT consensus mechanism, it is assumed that the decision-makers evaluate n attributes of m nodes. Thus, the finite alternative set is N = {N1, N2, …, Nm}, and the attribute set is A = {A1, A2, …, An}. The weight of each attribute is an important part of the integration of ideas, which directly affects the final decision. However, the attribute weights of n nodes w = (w1, w2, , wn) are completely unknown. Hence, we will discuss the weight-determining method based on Score-ESCA for each attribute.
Definition 3.6
Let \(Q\left( {pI} \right) = \left\{ {Q^{(k)} \left( {p^{(k)} ,\left[ {I_{k}^{L} ,I_{k}^{R} ]} \right]} \right)} \right\}\) be a PLTS-CI, and let Q = [Qij(pI)]m×n be a decision matrix based on PLTS-CIs, where Qij(pI) is a PLTS-CI. Then, the optimal weight w = (w1, w2, , wn) can be obtained as:
$$ w_{j} = \frac{{\sum\nolimits_{i = 1}^{m} {\sum\nolimits_{q \ne i} {\sqrt {\frac{1}{{\# Q_{ij} (pI)}}\sum\nolimits_{k = 1}^{{\# Q_{ij} (pI)}} {\left( {y_{ij} \left( {Q^{\left( k \right)} } \right)p_{ij}^{(k)} - y_{qj} \left( {Q^{\left( k \right)} } \right)p_{qj}^{(k)} } \right)^{2} } } } } }}{{\sum\nolimits_{j = 1}^{n} {\sum\nolimits_{i = 1}^{m} {\sum\nolimits_{q \ne i} {\sqrt {\frac{1}{{\# Q_{ij} (pI)}}\sum\nolimits_{k = 1}^{{\# Q_{ij} (pI)}} {\left( {y_{ij} \left( {Q^{\left( k \right)} } \right)p_{ij}^{(k)} - y_{qj} \left( {Q^{\left( k \right)} } \right)p_{qj}^{(k)} } \right)^{2} } } } } } }},\;j = { 1},{ 2}, \ldots ,n, $$
(6)
where
$$ y\left( {Q^{\left( k \right)} } \right) = D\left( {s_{\rho } } \right)C\left( {Q^{\left( k \right)} } \right) $$
and sρ is the linguistic term corresponding to Q(k) in the PLTS-CI Q(pI).
The positive ideal solution (PIS) and negative ideal solution (NIS) among the alternatives can be calculated as:
Definition 3.7
Let Q = [Qij(pI)]m×n be a probabilistic linguistic decision matrix based on PLTS-CIs, where \(Q_{ij} \left( {pI} \right) = \left\{ {Q_{ij}^{(k)} (p_{ij}^{(k)} , \, [I_{{r^{(k)} }}^{L} ,I_{{r^{(k)} }}^{R} ])} \right\}\). Then, Q(pI)+  = (Q1(pI)+, Q2(pI)+, …, Qn(pI)+) is the PIS of the alternatives, where Qj(pI)+  = {(Qj(k))+ | k = 1, 2, …, #Qij(pI)} and \((Q_{j}^{(k)} )^{ + } = \mathop {\max }\limits_{i} \left\{ {p_{ij}^{(k)} y_{ij} \left( {Q^{\left( k \right)} } \right)} \right\}\), k = 1, 2, …, #Qij(pI), j = 1, 2, … , n.
Definition 3.8
Let Q = [Qij(pI)]m×n be a probabilistic linguistic decision matrix based on PLTS-CI, where \(Q_{ij} \left( {pI} \right) = \left\{ {Q_{ij}^{(k)} (p_{ij}^{(k)} , \, [I_{{r^{(k)} }}^{L} ,I_{{r^{(k)} }}^{R} ])} \right\}\). Then, Q(pI) = (Q1(pI), Q2(pI), …, Qn(pI)) is the NIS of the alternatives, where Qj(pI) = {(Qj(k)) | k = 1, 2, …, #Qij(pI)} and \((Q_{j}^{(k)} )^{ - } = \mathop {\min }\limits_{i} \left\{ {p_{ij}^{(k)} y_{ij} \left( {Q^{\left( k \right)} } \right)} \right\}\), k = 1, 2, …, #Qij(pI), j = 1, 2, …, n.

TOPSIS method based on Score-ESCA

The TOPSIS method is one of the most widely used methods in MADM and is a kind of ranking method used to approximate an ideal solution. The PIS and NIS among the alternatives are first obtained. Then, to calculate the closeness coefficient of each alternative node, the distance between each alternative and the PIS and NIS are calculated. Finally, the alternative set is sorted and selected according to the closeness coefficient.
According to the above discussion and analysis in “The score function of the PLTS-CI”, an improved TOPSIS method based on Score-ESCA for MADM is proposed to process the primary node election problem in the PBFT consensus mechanism. Its implementation process is shown in Algorithm 1.
Algorithm 1
Input: the original linguistic decision matrices containing voting information.
Output: the ranking of alternative nodes.
Step 1: using the voting information of original linguistic decision matrices, a normalized multiple attribute decision matrix of alternative nodes is constructed.
Example 3.1.
If the evaluation with confidence interval given by the five experts for the memory of the node are (s1, [0.3,0.5]), (s3, [0.4,0.5]), (s4, [0.6,0.7]), (s3, [0.2,0.3]), (s6, [0.7,0.9]) respectively using the LTS S1 in Example 2.1. Then the normalized evaluation obtained by this attribute of the node by PLTS-CI in the normalized multiple attribute decision matrix is denoted as:
Q(pI) = {s3(0.4, [0.4,0.5]), s6(0.2, [0.7,0.9]), s4(0.2, [0.6,0.7]), s1(0.2, [0.3,0.5])}.
Step 2: the attribute weight set \(w=(w_1,\, w_2, ..., w_n)\) is calculated by Eq. (6).
Step 3: the PIS and NIS are obtained by applying Definition 3.7 and 3.8.
Step 4: the distance between alternative node Ni and the PIS is calculated as:
$$ d\left( {N_{i} ,Q\left( {pI} \right)^{ + } } \right) = \sum\limits_{j = 1}^{n} {w_{j} \sqrt {\frac{1}{{\# Q_{ij} (pI)}}\sum\limits_{k = 1}^{{\# Q_{ij} (pI)}} {\left( {y_{ij} \left( {Q^{\left( k \right)} } \right)p_{ij}^{(k)} - \left( {y_{j} \left( {Q^{\left( k \right)} } \right)p_{j}^{(k)} } \right)^{ + } } \right)^{2} } } } . $$
(7)
The smaller the value d(Ni, Q(pI)+) is, the better the alternative node Ni will be. Then, we obtain
$$ d_{{\mathop {\min }\limits_{i} }} \left( {N_{i} ,Q\left( {pI} \right)^{ + } } \right) = \mathop {\min }\limits_{i} d\left( {N_{i} ,Q\left( {pI} \right)^{ + } } \right),\;i = { 1},{ 2}, \ldots ,m. $$
(8)
Step 5: the distance between alternative node Ni and the NIS is calculated as:
$$ d\left( {N_{i} ,Q\left( {pI} \right)^{ - } } \right) = \sum\limits_{j = 1}^{n} {w_{j} \sqrt {\frac{1}{{\# Q_{ij} (pI)}}\sum\limits_{k = 1}^{{\# Q_{ij} (pI)}} {\left( {y_{ij} \left( {Q^{\left( k \right)} } \right)p_{ij}^{(k)} - \left( {y_{j} \left( {Q^{\left( k \right)} } \right)p_{j}^{(k)} } \right)^{ - } } \right)^{2} } } } . $$
(9)
The larger the value d(Ni, Q(pI)) is, the better the alternative node Ni will be. Then, we obtain
$$ d_{{\mathop {\max }\limits_{i} }} \left( {N_{i} ,Q\left( {pI} \right)^{ - } } \right) = \mathop {\max }\limits_{i} d\left( {N_{i} ,Q\left( {pI} \right)^{ - } } \right),\;i = { 1},{ 2}, \ldots ,m. $$
(10)
Step 6: the closeness coefficient CI(Ni) for all alternative nodes Ni (i = 1, 2, …, m) is calculated as:
$$ CI\left( {N_{i} } \right) = \frac{{d\left( {N_{i} ,Q\left( {pI} \right)^{ - } } \right)}}{{d_{{\mathop {\max }\limits_{i} }} \left( {N_{i} ,Q\left( {pI} \right)^{ - } } \right)}} - \frac{{d\left( {N_{i} ,Q\left( {pI} \right)^{ + } } \right)}}{{d_{{\mathop {\min }\limits_{i} }} \left( {N_{i} ,Q\left( {pI} \right)^{ + } } \right)}}. $$
(11)
Step 7: the alternative nodes Ni (i = 1, 2, …, m) are ranked by their closeness coefficient.

Decision-making process for primary node election

In this section, we utilize the method to solve a real primary node election problem in the PBFT consensus mechanism.

Decision problem description

Any node in the blockchain can be the primary node in the PBFT consensus mechanism. If the primary node is maliciously attacked, it may cause the view to change frequently, posing a security risk to the system [47]. Different decision-makers may make different subjective judgments according to the attributes of the node. To select the most appropriate node from among multiple nodes, four typical attributes are employed: (1) A1: bandwidth; (2) A2: I/O; (3) A3: CPU; and (4) A4: memory [6466]. Suppose that the attribute weights are completely unknown. The voting nodes use the LTS S = {s0, s1, s2, s3, s4, s5, s6} to describe the above four attributes. For attribute A1, the linguistic terms are s0 = “very small”, s1 = “small”, s2 = “slightly small”, s3 = “medium”, s4 = “slightly large”, s5 = “large”, and s6 = “very large”. For the attributes (A2, A3, A4), the linguistic terms are s0 = “very low”, s1 = “low”, s2 = “slightly low”, s3 = “medium”, s4 = “slightly high”, s5 = “high”, and s6 = “very high”. Specially, the expert who give no opinion will be considered a “medium” vote. Furthermore, there are nine alternative nodes to be considered as the primary node at present. To the best of our knowledge, evaluation information in most of the literature comes from the decision-making of invited experts [5355, 57, 67, 68]. Therefore, before implementing the PBFT consensus mechanism, seven experts are invited to evaluate the four qualitative criteria of the nine nodes. It is assumed that the opinions given by the experts are trustworthy and authoritative. The original linguistic decision matrices are shown in Tables 2, 3, 4, 5, 6, 7 and 8.
Table 2
The decision matrix with confidence interval values according to the first voting node
 
A1
A2
A3
A4
N1
s2, [0.9,1]
s0, [0.7,1]
s3, [0.3,0.4]
s0, [0.6,0.9]
N2
s2, [0.3,0.6]
s6, [0.2,0.3]
s6, [0.6,0.7]
s6, [0.8,0.9]
N3
s5, [0.6,0.8]
s0, [0.5,0.6]
s2, [0.7,0.8]
s4, [0.6,0.8]
N4
s1, [0.6,0.8]
s3, [0.1,0.2]
s0, [0.1,0.4]
s3, [0.6,0.7]
N5
s0, [0.6,0.7]
s0, [0.4,0.7]
s5, [0.1,0.4]
s0, [0.3,0.6]
N6
s2, [0.6,0.7]
s1, [0.4,0.7]
s4, [0.1,0.3]
s6, [0.7,1]
N7
s5, [0.2,0.3]
s3, [0.8,1]
s5, [0.1,0.4]
s0, [0.9,1]
N8
s4, [0.7,0.8]
s6, [0.9,1]
s0, [0.1,0.4]
s2, [0.8,1]
N9
s0, [0.7,1]
s3, [0.2,0.5]
s4, [0.4,0.6]
s1, [0.6,0.7]
Table 3
The decision matrix with confidence interval values according to the second voting node
 
A1
A2
A3
A4
N1
s1, [0.6,0.8]
s4, [0.2,0.3]
s0, [0.1,0.2]
s0, [0.3,0.4]
N2
s4, [0.6,0.8]
s4, [0.6,0.7]
s0, [0.1,0.3]
s5, [0.2,0.3]
N3
s0, [0.8,1]
s3, [0.3,0.5]
s6, [0.4,0.7]
s2, [0.1,0.4]
N4
s4, [0.4,0.7]
s0, [0.8,1]
s1, [0.5,0.8]
s0, [0.9,1]
N5
s3, [0.9,1]
s3, [0.7,0.9]
s5, [0.9,1]
s0, [0.2,0.5]
N6
s1, [0.3,0.6]
s3, [0.9,1]
s0, [0.4,0.7]
s4, [0.6,0.7]
N7
s4, [0.8,0.9]
s3, [0.5,0.8]
s6, [0.9,1]
s0, [0.4,0.7]
N8
s6, [0.1,0.4]
s0, [0.4,0.7]
s1, [0.9,1]
s5, [0.2,0.4]
N9
s1, [0.8,1]
s0, [0.7,0.8]
s0, [0.4,0.5]
s4, [0.2,0.5]
Table 4
The decision matrix with confidence interval values according to the third voting node
 
A1
A2
A3
A4
N1
s4, [0.6,0.9]
s1, [0.3,0.5]
s3, [0.4,0.5]
s6, [0.8,1]
N2
s3, [0.1,0.4]
s0, [0.5,0.6]
s3, [0.9,1]
s3, [0.6,0.7]
N3
s2, [0.6,0.9]
s0, [0.9,1]
s4, [0.6,0.8]
s3, [0.7,0.8]
N4
s0, [0.1,0.3]
s2, [0.9,1]
s2, [0.6,0.9]
s1, [0.9,1]
N5
s6, [0.9,1]
s2, [0.8,1]
s3, [0.5,0.7]
s3, [0.2,0.5]
N6
s1, [0.9,1]
s2, [0.3,0.4]
s0, [0.3,0.5]
s5, [0.5,0.7]
N7
s3, [0.2,0.5]
s3, [0.7,0.8]
s0, [0.4,0.7]
s0, [0.6,0.8]
N8
s3, [0.2,0.3]
s0, [0.1,0.2]
s0, [0.9,1]
s4, [0.4,0.5]
N9
s0, [0.4,0.6]
s4, [0.1,0.4]
s0, [0.6,0.7]
s5, [0.6,0.7]
Table 5
The decision matrix with confidence interval values according to the fourth voting node
 
A1
A2
A3
A4
N1
s3, [0.4,0.7]
s2, [0.2,0.5]
s6, [0.3,0.5]
s1, [0.2,0.5]
N2
s3, [0.8,0.9]
s4, [0.2,0.5]
s4, [0.3,0.4]
s2, [0.1,0.3]
N3
s2, [0.9,1]
s5, [0.4,0.6]
s4, [0.5,0.8]
s3, [0.8,0.9]
N4
s4, [0.7,0.9]
s0, [0.7,0.8]
s5, [0.3,0.5]
s0, [0.6,0.8]
N5
s6, [0.5,0.8]
s4, [0.9,1]
s0, [0.4,0.6]
s0, [0.3,0.4]
N6
s4, [0.4,0.6]
s0, [0.2,0.4]
s4, [0.8,1]
s1, [0.4,0.5]
N7
s3, [0.7,1]
s6, [0.2,0.5]
s3, [0.2,0.5]
s4, [0.7,0.9]
N8
s6, [0.5,0.6]
s1, [0.2,0.3]
s0, [0.8,1]
s3, [0.8,0.9]
N9
s0, [0.5,0.8]
s5, [0.9,1]
s3, [0.4,0.7]
s5, [0.8,0.9]
Table 6
The decision matrix with confidence interval values according to the fifth voting node
 
A1
A2
A3
A4
N1
s0, [0.3,0.4]
s4, [0.3,0.6]
s3, [0.7,1]
s2, [0.4,0.7]
N2
s0, [0.7,0.9]
s2, [0.9,1]
s4, [0.6,0.7]
s4, [0.6,0.9]
N3
s2, [0.9,1]
s4, [0.4,0.5]
s6, [0.8,1]
s0, [0.7,0.8]
N4
s0, [0.2,0.3]
s4, [0.1,0.4]
s6, [0.8,1]
s1, [0.4,0.5]
N5
s4, [0.6,0.8]
s3, [0.3,0.6]
s6, [0.9,1]
s3, [0.1,0.3]
N6
s4, [0.4,0.5]
s3, [0.9,1]
s0, [0.2,0.5]
s6, [0.1,0.3]
N7
s1, [0.2,0.5]
s2, [0.5,0.7]
s2, [0.4,0.7]
s6, [0.3,0.4]
N8
s1, [0.1,0.3]
s5, [0.2,0.5]
s4, [0.9,1]
s2, [0.6,0.8]
N9
s2, [0.1,0.2]
s6, [0.3,0.5]
s3, [0.3,0.5]
s5, [0.2,0.3]
Table 7
The decision matrix with confidence interval values according to the sixth voting node
 
A1
A2
A3
A4
N1
s0, [0.3,0.4]
s4, [0.3,0.6]
s3, [0.7,1]
s2, [0.4,0.7]
N2
s0, [0.7,0.9]
s2, [0.9,1]
s4, [0.6,0.7]
s2, [0.6,0.9]
N3
s2, [0.9,1]
s4, [0.4,0.5]
s6, [0.8,1]
s0, [0.7,0.8]
N4
s0, [0.2,0.3]
s4, [0.1,0.4]
s6, [0.8,1]
s1, [0.4,0.5]
N5
s4, [0.6,0.8]
s3, [0.3,0.6]
s6, [0.9,1]
s3, [0.1,0.3]
N6
s4, [0.4,0.5]
s3, [0.9,1]
s0, [0.2,0.5]
s6, [0.1,0.3]
N7
s1, [0.2,0.5]
s2, [0.5,0.7]
s2, [0.4,0.7]
s6, [0.3,0.4]
N8
s1, [0.1,0.3]
s5, [0.2,0.5]
s4, [0.9,1]
s2, [0.6,0.8]
N9
s2, [0.1,0.2]
s6, [0.3,0.5]
s3, [0.3,0.5]
s5, [0.2,0.3]
Table 8
The decision matrix with confidence interval values according to the seventh voting node
 
A1
A2
A3
A4
N1
s4, [0.8,0.9]
s3, [0.7,0.9]
s0, [0.6,0.8]
s4, [0.4,0.6]
N2
s4, [0.7,0.8]
s3, [0.2,0.3]
s1, [0.1,0.4]
s2, [0.4,0.6]
N3
s6, [0.6,0.9]
s2, [0.1,0.3]
s0, [0.8,1]
s6, [0.5,0.8]
N4
s0, [0.2,0.4]
s0, [0.7,0.9]
s3, [0.5,0.6]
s5, [0.3,0.4]
N5
s0, [0.7,0.8]
s4, [0.6,0.8]
s2, [0.2,0.4]
s3, [0.8,1]
N6
s4, [0.4,0.5]
s2, [0.8,1]
s3, [0.4,0.5]
s6, [0.4,0.5]
N7
s2, [0.7,1]
s2, [0.9,1]
s3, [0.9,1]
s3, [0.6,0.7]
N8
s4, [0.6,0.7]
s1, [0.3,0.4]
s5, [0.8,1]
s0, [0.4,0.6]
N9
s5, [0.4,0.6]
s0, [0.2,0.3]
s0, [0.4,0.7]
s3, [0.3,0.5]

Decision-making process

In this subsection, the novel TOPSIS method based on Score-ESCA is used for primary node election in the PBFT consensus mechanism as follows.
Input: the original linguistic decision matrices in Tables 2, 3, 4, 5, 6, 7 and 8.
Output: the ranking of the nine alternative nodes.
Step 1: using the original linguistic decision matrices in Tables 2, 3, 4, 5, 6, 7 and 8, a normalized decision matrix is shown in Table 9.
Table 9
The normalized decision matrix of voting for primary node election
 
A1
A2
A3
A4
N1
{s4(2/7,[0.7,0.9]), s5(1/7,[0.3,0.4]), s2(1/7,[0.9,1]), s3(1/7,[0.4,0.7]), s1(1/7,[0.6,0.8]), s0(1/7,[0.3,0.4])}
{s4(2/7,[0.25,0.45]), s3(1/7,[0.7,0.9]), s2(1/7,[0.2,0.5]), s1(1/7,[0.3,0.5]), s0(2/7,[0.4,0.7]), s0(0,[1,1])}
{s3(3/7,[0.47,0.63]), s6(1/7,[0.3,0.5]), s0(3/7,[0.33,0.5])s0(0,[1,1]), s0(0,[1,1]), s0(0,[1,1])}
{s6(1/7,[0.8,1]), s2(2/7,[0.65,0.85]), s4(1/7,[0.4,0.6]), s1(1/7,[0.2,0.5]), s0(2/7,[0.45,0.65]), s0(0,[1,1])}
N2
{s4(2/7,[0.65,0.8]), s3(2/7,[0.5,0.73]), s2(1/7,[0.3,0.6]), s0(1/7,[0.7,0.9]), s0(0,[1,1]), s0(0,[1,1])}
{s4(2/7,[0.4,0.6]), s6(1/7,[0.2,0.3]), s2(1/7,[0.9,1]), s1(1/7,[0.8,0.9]), s3(1/7,[0.2,0.3]), s0(1/7,[0.5,0.6])}
{s4(3/7,[0.37,0.57]), s6(1/7,[0.6,0.7]), s3(1/7,[0.9,1]), s1(1/7,[0.1,0.4]), s0(1/7,[0.1,0.3]), s0(0,[1,1])}
{s6(1/7,[0.8,0.9]), s3(1/7,[0.6,0.7]), s5(1/7,[0.2,0.3]), s2(3/7,[0.37,0.6]), s0(1/7,[0.9,1]), s0(0,[1,1])}
N3
{s6(2/7,[0.45,0.7]), s5(1/7,[0.6,0.8]), s0(1/7,[0.8,1]), s2(3/7,[0.8,0.97]), s0(0,[1,1]), s0(0,[1,1])}
{s3(1/7,[0.3,0.5]), s5(1/7,[0.4,0.6]), s4(1/7,[0.4,0.5]), s2(1/7,[0.1,0.3]), s0(3/7,[0.77,0.87]), s0(0,[1,1])}
{s6(2/7,[0.6,0.85]), s4(2/7,[0.55,0.8]), s5(1/7,[0.2,0.4]), s2(1/7,[0.7,0.8]), s0(1/7,[0.8,1]), s0(0,[1,1])}
{s6(1/7,[0.5,0.8]), s4(1/7,[0.6,0.8]), s2(1/7,[0.1,0.4]), s3(3/7,[0.63,0.73]), s0(1/7,[0.7,0.8]), s0(0,[1,1])}
N4
{s4(2/7,[0.55,0.8]), s5(1/7,[0.5,0.6]), s1(1/7,[0.6,0.8]), s0(3/7,[0.17,0.33]), s0(0,[1,1]), s0(0,[1,1])}
{s2(1/7,[0.9,1]), s4(1/7,[0.1,0.4]), s1(1/7,[0.8,1]), s3(1/7,[0.1,0.2]), s0(3/7,[0.73,0.9]), s0(0,[1,1])}
{s6(1/7,[0.8,1]), s5(2/7,[0.35,0.5]), s3(1/7,[0.5,0.6]), s2(1/7,[0.6,0.9]), s1(1/7,[0.5,0.8]), s0(1/7,[0.1,0.4]),}
{s5(1/7,[0.3,0.4]), s3(1/7,[0.6,0.7]), s6(1/7,[0.1,0.2]), s1(2/7,[0.65,0.75]), s0(2/7,[0.75,0.9]), s0(0,[1,1])}
N5
{s6(2/7,[0.7,0.9]), s4(1/7,[0.6,0.8]), s3(1/7,[0.9,1]), s0(3/7,[0.5,0.6]), s0(0,[1,1]), s0(0,[1,1])}
{s4(3/7,[0.57,0.7]), s3(2/7,[0.5,0.75]), s2(1/7,[0.8,1]), s0(1/7,[0.4,0.7]), s0(0,[1,1]), s0(0,[1,1])}
{s6(1/7,[0.9,1]), s5(2/7,[0.5,0.7]), s3(1/7,[0.5,0.7]), s1(1/7,[0.7,0.9]), s2(1/7,[0.2,0.4]), s0(1/7,[0.4,0.6])}
{s3(4/7,[0.325,0.525]), s0(3/7,[0.27,0.5]), s0(0,[1,1]), s0(0,[1,1]), s0(0,[1,1]), s0(0,[1,1])}
N6
{s4(3/7,[0.4,0.53]), s2(1/7,[0.6,0.7]), s1(2/7,[0.6,0.8]), s0(1/7,[0.8,1]), s0(0,[1,1]), s0(0,[1,1])}
{s3(2/7,[0.9,1]), s2(3/7,[0.47,0.63]), s1(1/7,[0.4,0.7]), s0(1/7,[0.2,0.4]), s0(0,[1,1]), s0(0,[1,1])}
{s4(3/7,[0.57,0.73]), s3(1/7,[0.4,0.5]), s0(3/7,[0.3,0.57]), s0(0,[1,1]), s0(0,[1,1]), s0(0,[1,1])}
{s6(3/7,[0.4,0.6]), s5(1/7,[0.5,0.7]), s4(1/7,[0.6,0.7]), s1(1/7,[0.4,0.5]), s0(1/7,[0.9,1]), s0(0,[1,1])}
N7
{s3(3/7,[0.53,0.83]), s4(1/7,[0.8,0.9]), s2(1/7,[0.7,1]), s5(1/7,[0.2,0.3]), s1(1/7,[0.2,0.5]), s1(0,[1,1])}
{s3(3/7,[0.67,0.87]), s6(1/7,[0.2,0.5]), s5(1/7,[0.2,0.5]), s2(2/7,[0.7,0.85]), s2(0,[1,1]), s2(0,[1,1])}
{s6(1/7,[0.9,1]), s5(2/7,[0.1,0.4]), s4(1/7,[0.4,0.7]), s3(1/7,[0.55,0.75]), s2(1/7,[0.4,0.7]), s0(1/7,[0.4,0.7])}
{s3(2/7,[0.55,0.75]), s4(1/7,[0.7,0.9]), s6(1/7,[0.3,0.4]), s0(3/7,[0.63,0.83]), s0(0,[1,1]), s0(0,[1,1])}
N8
{s4(2/7,[0.65,0.75), s6(2/7,[0.3,0.45]), s3(1/7,[0.2,0.3]), s1(1/7,[0.1,0.3]), s0(1/7,[0.6,0.7]), s0(0,[1,1])}
{s6(1/7,[0.9,1]), s5(1/7,[0.2,0.5]), s1(2/7,[0.25,0.35]), s0(3/7,[0.43,0.6]), s0(0,[1,1]), s0(0,[1,1])}
{s4(2/7,[0.6,0.8]), s5(1/7,[0.8,1]), s1(1/7,[0.9,1]), s0(3/7,[0.6,0.8]), s0(0,[1,1]), s0(0,[1,1])}
{s2(3/7,[0.6,0.83]), s3(1/7,[0.8,0.9]), s4(1/7,[0.4,0.5]), s5(1/7,[0.2,0.4]), s0(1/7,[0.4,0.6]), s0(0,[1,1])}
N9
{s6(1/7,[0.9,1]), s5(1/7,[0.4,0.6), s1(1/7,[0.8,1]), s2(1/7,[0.1,0.2]), s0(3/7,[0.53,0.8]), s0(0,[1,1])}
{s5(1/7,[0.9,1), s6(1/7,[0.3,0.5]), s4(1/7,[0.1,0.4]), s3(1/7,[0.2,0.5]), s0(3/7,[0.43,0.57]), s0(0,[1,1])}
{s3(2/7,[0.35,0.6]), s4(1/7,[0.4,0.6]), s2(1/7,[0.7,1]), s0(3/7,[0.47,0.63]), s0(0,[1,1]), s0(0,[1,1])}
{s4(1/7,[0.2,0.5]), s3(1/7,[0.3,0.5]), s1(1/7,[0.6,0.7]), s2(1/7,[0.1,0.2]), s5(3/7,[0.53,0.63]), s1(0,[1,1])}
Step 2: we can calculate the weights of the four attributes A1, A2, A3, and A4 by Eq. (6):
$$ {w_1} = 0.2283, \, {w_2} = 0.2159, \, {w_3} = 0.2623, \, {w_4} = 0.2934. $$
Step 3: the PIS Q(pI)+ and the NIS Q(pI) are computed in Table 9:
\(Q(pI)^{ + } = \left( \begin{gathered} \left\{ {0.2218, \, 0.1059, \, 0.0763, \, 0.0311, \, 0.0119,{ 0}} \right\}, \, \hfill \\\left\{ {0.1584, \, 0.0716, \, 0.0476, \, 0.0372, \, 0.0147, \, 0} \right\}, \hfill \\ \left\{ {0.1994, \, 0.1313, \, 0.0549, \, 0.0376, \, 0.0159, \, 0} \right\}, \, \hfill \\\left\{ {0.2101, \, 0.0885, \, 0.0573, \, 0.0327, \, 0.0245,{ 0}} \right\} \, \hfill \\ \end{gathered} \right)\),
\(Q(pI)^{ - } = \left( \begin{gathered} \left\{ {0.1094, \, 0.0240, \, 0.0119,{ 0}, \, 0, \, 0} \right\}, \,\hfill \\ \left\{ {0.0345, \, 0.0197, \, 0.0092,{ 0}, \, 0, \, 0} \right\}, \hfill \\ \left\{ {0.0545, \, 0.0265, \, 0, \, 0, \, 0, \, 0} \right\}, \, \hfill \\\left\{ {0.0389, \, 0, \, 0, \, 0, \, 0, \, 0} \right\} \, \hfill \\ \end{gathered} \right)\).
Step 4: the distances between the alternative nodes Ni (i = 1, 2, …, 9) and the PIS are computed by Eq. (7):
$$ \begin{gathered} d(N_{1} ,Q(pI)^{ + } ) = 0.0473, \, d(N_{2} ,Q(pI)^{ + } ) = 0.0411, \, \hfill \\d(N_{3} ,Q(pI)^{ + } ) = 0.0293, \hfill \\ d(N_{4} ,Q(pI)^{ + } ) = 0.0562, \, d(N_{5} ,Q(pI)^{ + } ) = 0.0322, \, \hfill \\d(N_{6} ,Q(pI)^{ + } ) = 0.0349, \hfill \\ d(N_{7} ,Q(pI)^{ + } ) = 0.0415, \, d(N_{8} ,Q(pI)^{ + } ) = 0.0438, \, \hfill \\d(N_{9} ,Q(pI)^{ + } ) = 0.0438. \hfill \\ \end{gathered} $$
Then by Eq. (8) we can obtain dmin(Ni, Q(pI)+) = 0.0293.
Step 5: the distances between the alternative nodes Ni (i = 1, 2, …, 9) and the NIS are computed by Eq. (9):
$$ \begin{gathered} d(N_{1} ,Q(pI)^{ - } ) = 0.0247, \, d(N_{2} ,Q(pI)^{ - } ) = 0.0323, \, \hfill \\d(N_{3} ,Q(pI)^{ - } ) = 0.0486, \hfill \\ d(N_{4} ,Q(pI)^{ - } ) = 0.0202, \, d(N_{5} ,Q(pI)^{ - } ) = 0.0453, \, \hfill \\d(N_{6} ,Q(pI)^{ - } ) = 0.0432, \hfill \\ d(N_{7} ,Q(pI)^{ - } ) = 0.0353, \, d(N_{8} ,Q(pI)^{ - } ) = 0.0352, \, \hfill \\d(N_{9} ,Q(pI)^{ - } ) = 0.0331. \hfill \\ \end{gathered} $$
Then by Eq. (10) we can obtain dmax(Ni, Q(pI)) = 0.0486.
Step 6: the closeness coefficients CI(Ni) for the nine alternative nodes Ni are calculated by Eq. (11) as:
$$ \begin{gathered} CI(N_{1} ) = - 1.1032, \, CI(N_{2} ) = - 0.7347, \, CI(N_{3} ) = 0, \hfill \\ CI(N_{4} ) = - 1.4983, \, CI(N_{5} ) = - 0.1649, \, CI(N_{6} ) = - 0.3049, \hfill \\ CI(N_{7} ) = - 0.6891, \, CI(N_{8} ) = - 0.7676, \, CI(N_{9} ) = - 0.8122. \hfill \\ \end{gathered} $$
Step 7: The ranking result of the nine alternative nodes is
$$ N_{3} \succ N_{5} \succ N_{6} \succ N_{7} \succ N_{2} \succ N_{8} \succ N_{9} \succ N_{1} \succ N_{4} . $$
Through the improved PBFT consensus mechanism we proposed, N3 is at the top and should be selected as the primary node.

Comparative analysis

In this section, we compare the proposed node election method with the methods [30, 47, 49, 53] to prove that the election method we proposed has great effectiveness. By comparing these methods with our proposed TOPSIS method and analyzing them, the effectiveness of our method is verified. In the previous section, different methods are used to calculate the same decision data as in Table 9 to acquire the ranking results of the alternative nodes. Finally, all the methods are compared and analyzed.

Comparison with the classical decision method

The classical primary node election method in the PBFT consensus mechanism considers only the number of votes in support [30]. That is, the attribute of the node is recognized as “high” or “large”. To compare the classical PBFT consensus mechanism with our improved PBFT consensus mechanism based on PLTSs, we take the decision data in Table 9 and count the votes toward “for”, “abstention” and “against” decisions. The statistics are presented in Table 10 with reference to the decision matrix.
Table 10
Classical voting results for nine nodes
 
Total votes
For
Abstention
Against
N1
28
9
5
14
N2
28
11
6
11
N3
28
12
4
12
N4
28
9
3
16
N5
28
9
8
11
N6
28
11
3
14
N7
28
10
9
9
N8
28
11
2
15
N9
28
10
4
14
In the classical PBFT consensus mechanism, only the number of votes toward “for” is considered in selecting to be the primary node. The ranking result of the nine alternative nodes can be shown as
$$ N_{3} \succ N_{2} = N_{6} = N_{8} \succ N_{7} = N_{9} \succ N_{1} = N_{4} = N_{5} . $$
We easily find that N3 is the top node, and many nodes will have the same number of votes during the decision-making process.

Comparison with the election strategy

Li et al. [47] proposed a voting-based primary node election strategy in the PBFT consensus mechanism. In the voting period, the primary node is selected from among the alternative nodes. All experts express their choice regarding the alternative nodes, such as support, abstention, and opposition. The votes are denoted by vji ∈ {1, 0, − 1}, where j is a valid voting of the expert. vji = 1 means a supportive vote from expert j for node i, vji = 1 means an opposing vote, and vji = 0 means abstention.
Considering that Li et al. only set up three voting options, to use the decision data in Table 9 in the primary node election strategy, votes for “very high”, “high” and “slightly high” are regarded as “for”. We treat “medium” votes as “abstention”. Votes for “very low”, “low” and “slightly low” are considered “against”.
Therefore, by the election strategy proposed by Li et al., the voting results are as shown in Table 11. According to the proposed voting strategy, the corresponding votes received by each node are added; that is, a supportive vote is recorded as 1 point, an absenting vote is recorded as 0 points, and an opposing vote is recorded as − 1 point. Finally, the nine nodes obtain their respective voting results. The ranking result of the nine alternative nodes can be shown as:
$$ N_{7} \succ N_{3} = N_{2} \succ N_{5} \succ N_{6} \succ N_{8} = N_{9} \succ N_{1} \succ N_{4} . $$
Table 11
Voting results for the nine nodes based on Li et al.’s method
 
Total votes
For
Abstention
Against
Vote result
N1
28
9
5
14
− 5
N2
28
11
6
11
0
N3
28
12
4
12
0
N4
28
9
3
16
− 7
N5
28
9
8
11
− 2
N6
28
11
3
14
− 3
N7
28
10
9
9
1
N8
28
11
2
15
− 4
N9
28
10
4
14
− 4
We easily find that N7 is the top node, and nodes will have with the same number of votes during the decision-making process.

Comparison with the voting method based on vague set

Xu et al. [49] improved the DPoS consensus mechanism in blockchain based on a vague set. Considering the selection of agent nodes in the DPoS consensus mechanism as a decision process, Xu et al. increased the votes against and abstaining for greater similarity to actual situations in the real world.
Similar to the above, to substitute the decision data in Table 9 into the agent nodes election method, votes for “very high”, “high” and “slightly high” are regarded as “for”. Treat “medium” votes as “abstention”. Votes for “very low”, “low” and “slightly low” are considered “against”.
Thus, according to the selection method of agent nodes proposed by Xu et al. [49], the results of the statistics of the nine nodes are as shown in Table 12. Specifically, [tA(Ni), 1 − fA(Ni)] is the vague value of a node Ni. Here, tA(Ni) denotes the proportion of favorable votes, and fA(Ni) denotes the proportion of opposing votes. The fuzzy value of the node is calculated according to the formula:
$$ \mu_{{A^{F} }} = t_{A} (N_{i} ) + \frac{1}{2}[1 + \frac{{t_{A} (N_{i} ) - f_{A} (N_{i} )}}{{t_{A} (N_{i} ) + f_{A} (N_{i} ) + 2\lambda }}][1 - t_{A} (N_{i} ) - f_{A} (N_{i} )]. $$
Table 12
Voting results for the nine nodes based on the vague set
 
Total
For
Abstention
Against
Vague value
Fuzzy value
N1
28
9
5
14
[0.32,0.5]
0.4051
N2
28
11
6
11
[0.39,0.61]
0.4971
N3
28
12
4
12
[0.43,0.57]
0.5007
N4
28
9
3
16
[0.32,0.43]
0.3696
N5
28
9
8
11
[0.32,0.61]
0.4597
N6
28
11
3
14
[0.39,0.5]
0.4984
N7
28
10
9
9
[0.36,0.68]
0.5216
N8
28
11
2
15
[0.39,0.47]
0.4253
N9
28
10
4
14
[0.36,0.5]
0.4266
Therefore, the corresponding vague value and fuzzy value are calculated for each node. The ranking result of the nine alternative nodes can be shown as
$$ N_{7} \succ N_{3} \succ N_{6} \succ N_{2} \succ N_{5} \succ N_{9} \succ N_{8} \succ N_{1} \succ N_{4} . $$
We easily find that N7 is the top node.

Comparison with the extended TOPSIS method

We next use the extended TOPSIS method proposed by Pang et al. [53] to solve our decision problem. Note that the evaluation confidence information of the decision-maker is not considered.
Step 1. The weight values of the four attributes are calculated as follows:
$$ {w_1} = 0.2231, \, {w_2} = 0.2247, \, {w_3} = 0.2269, \, {w_4} = 0.3254. $$
Step 2. We compute the positive ideal solution (PIS) \( Q(pI)^{ + }\) and the negative ideal solution (NIS) \( Q(pI)^{ - }\):
$$ Q(pI)^{ + } = \left( \begin{gathered} \left\{ {1.7143, \, 1.1429, \, 0.7143, \, 0.2857, \, 0.1429, \, 0} \right\}, \, \left\{ {1.7143, \, 0.8571, \, 0.7143, \, 0.5714, \, 0.1429,{ 0}} \right\}, \hfill \\ \left\{ {1.7143, \, 1.1429, \, 0.7143, \, 0.4286, \, 0.2857, \, 0} \right\}, \, \left\{ {2.5714, \, 0.8571, \, 0.5714, \, 0.5714, \, 0.4286, \, 0} \right\} \, \hfill \\ \end{gathered} \right). $$
$$ Q(pI)^{ - } = \left( \begin{gathered} \left\{ {0.8571, \, 0.2857, \, 0.1429, \, 0, \, 0, \, 0} \right\}, \, \left\{ {0.5714, \, 0.4286, \, 0.1429, \, 0, \, 0, \, 0} \right\}, \hfill \\ \left\{ {0.8157, \, 0.4286, \, 0, \, 0, \, 0, \, 0} \right\}, \, \left\{ {0.8571, \, 0, \, 0, \, 0, \, 0, \, 0} \right\} \, \hfill \\ \end{gathered} \right). $$
Step 3. The distances between the alternative nodes Ni (i = 1, 2, …, 9) and the PIS can be shown as:
$$ \begin{gathered} d(N_{1} ,Q(pI)^{ + } ) = 0.4589, \, d(N_{2} ,Q(pI)^{ + } ) = 0.4211, \, \hfill \\d(N_{3} ,Q(pI)^{ + } ) = 0.3535, \hfill \\ d(N_{4} ,Q(pI)^{ + } ) = 0.4771, \, d(N_{5} ,Q(pI)^{ + } ) = 0.3213, \, \hfill \\d(N_{6} ,Q(pI)^{ + } ) = 0.2943, \hfill \\ d(N_{7} ,Q(pI)^{ + } ) = 0.3634, \, d(N_{8} ,Q(pI)^{ + } ) = 0.4281, \, \hfill \\d(N_{9} ,Q(pI)^{ + } ) = 0.3507. \hfill \\ \end{gathered} $$
Step 4. The distances between the alternative nodes Ni (i = 1, 2, …, 9) and the NIS can be shown as:
$$ \begin{gathered} d(N_{1} ,Q(pI)^{ - } ) = 0.2712, \, d(N_{2} ,Q(pI)^{ - } ) = 0.3075, \, \hfill \\d(N_{3} ,Q(pI)^{ - } ) = 0.3836, \hfill \\ d(N_{4} ,Q(pI)^{ - } ) = 0.2478, \, d(N_{5} ,Q(pI)^{ - } ) = 0.3901, \, \hfill \\d(N_{6} ,Q(pI)^{ - } ) = 0.4639, \hfill \\ d(N_{7} ,Q(pI)^{ - } ) = 0.3818, \, d(N_{8} ,Q(pI)^{ - } ) = 0.3139, \, \hfill \\d(N_{9} ,Q(pI)^{ - } ) = 0.3201. \hfill \\ \end{gathered} $$
Step 5. The closeness coefficient CI(Ni) for the nine alternative nodes Ni (i = 1, 2, …, 9) can be calculated as:
$$ \begin{gathered} CI(N_{1} ) = - 0.9747, \, CI(N_{2} ) = - 0.7681, \, CI(N_{3} ) = - 0.3741, \hfill \\ CI(N_{4} ) = - 1.0869, \, CI(N_{5} ) = - 0.2511, \, CI(N_{6} ) = 0, \hfill \\ CI(N_{7} ) = - 0.4118, \, CI(N_{8} ) = - 0.7779, \, CI(N_{9} ) = - 0.5016. \hfill \\ \end{gathered} $$
Step 6. The ranking result of the nine alternative nodes can be shown as:
$$ N_{6} \succ N_{5} \succ N_{3} \succ N_{7} \succ N_{9} \succ N_{2} \succ N_{8} \succ N_{1} \succ N_{4} . $$
As shown in Fig. 3, the storage capacity is of greatest concern for the nodes when selecting a primary node in the PBFT consensus mechanism, and the I/O is least important. The results of the attribute weights obtained by the proposed method are the same as those of the method proposed by Pang et al. [53]. This validates the effectiveness of the proposed TOPSIS method of improvement. In addition, since the decision confidence of the decision-maker is considered during the decision-making process and is expressed in the form of the confidence interval, the classification of the attribute weights calculated by the proposed TOPSIS method is more obvious. The accuracy of the proposed TOPSIS method is verified.

Analysis and experimental discussion

According to the above analysis results, a summary of the ranking results obtained by the five methods is shown in Table 13. From Table 13, it can be seen that our proposed method derives the most suitable primary node N3 since it considers the number of term sets [49, 50] as the expression of the voting options and attribute weights [53, 54]. N3 is ranked first in the classical method [30] of sorting the results and is ranked second by Li et al. [47] and Xu et al. [49]. In the decision method proposed by Pang et al. [53], N3 is ranked third. The specific reasons are analyzed below.
Table 13
Ranking results of various decision-making methods
Methods
Rankings of the methods
Classical method [30]
\(N_{3} \succ N_{2} = N_{6} = N_{8} \succ N_{7} = N_{9} \succ N_{1} = N_{4} = N_{5} .\)
Li et al.’s method [47]
\(N_{7} \succ N_{3} = N_{2} \succ N_{5} \succ N_{6} \succ N_{8} = N_{9} \succ N_{1} \succ N_{4} .\)
Xu et al.’s method [49]
\(N_{7} \succ N_{3} \succ N_{6} \succ N_{2} \succ N_{5} \succ N_{9} \succ N_{8} \succ N_{1} \succ N_{4} .\)
Pang et al.’s method [53]
\(N_{6} \succ N_{5} \succ N_{3} \succ N_{7} \succ N_{9} \succ N_{2} \succ N_{8} \succ N_{1} \succ N_{4} .\)
Our proposed method
\(N_{3} \succ N_{5} \succ N_{6} \succ N_{7} \succ N_{2} \succ N_{8} \succ N_{9} \succ N_{1} \succ N_{4}\)
The number of voting options greatly influences the ranking results of the primary node election. The classical method [30], Li et al. [47], and Xu et al. [49] consider only no more than three fuzzy voting attitudes. The node with the highest number of supporting votes is selected as the primary node in the classical PBFT consensus mechanism [30]. The decision methods proposed by Li et al. [47] and Xu et al. [49] consider only three decision options, namely, favoring, abstaining, and opposing. Compared with the classical primary node selection method, their methods increase the options from a single voting option to multiple voting options, which still has limitations.
The different attribute values of nodes also affect the ranking results. The classical method [30], Li et al. [47], and Xu et al. [49] have the drawback that they cannot consider the weight ratio of the node attributes. From Table 13, the classical method [30] and Li et al. [47] cannot distinguish partial nodes that have the same ordering result. Therefore, the decision result in selecting the primary node by these methods is not accurate.
In addition, Pang et al. [53] consider node attributes and seven voting attitudes. Thus, the sorting result is more accurate than those of the classical method [30], Li et al. [47], and Xu et al. [49], which can perform a multidimensional selection of optimal primary nodes. The differential distribution of linguistic terms also influences the ranking results of the TOPSIS method. However, the semantic value differences between different linguistic terms are the same in the method proposed by Pang et al. [53], which cannot reflect the psychological preferences of decision-makers, resulting in the low accuracy and credibility of the decision results.
Our proposed method uses the linguistic term exponential semantic value and confidence interval to consider both various decision options and node attributes. Considering that the existing linguistic terms are uniformly distributed, we propose modifying the semantic value difference between the adjacent linguistic terms to reflect the difference in the decision-making attitude of nodes. In addition, the concept of the confidence interval is introduced to describe the evaluation information of decision-makers more accurately. Therefore, compared with other primary node election methods [30, 47, 49, 53], it can be verified that our method is more reasonable.
A comparison of the characteristics of the six methods with those of our proposed method is shown in Table 14. Our proposed method can overcome the weaknesses of the classical method and those of Li et al. [47], Xu et al. [49], and Liu et al. [50]. Relative to these previous methods, our proposed method ensures to express the decision-makers' voting information by increasing the number of voting options and attributes adequately and comprehensively by increasing the number of voting options and attributes. Compared to the method proposed by Pang et al. [53], the main characteristics of our proposed method are that it not only flexibly expresses different distributions of the linguistic terms but also considers the psychological behaviors of decision-makers.
Table 14
Characteristics of various decision-making methods
Method
Numbers of linguistic terms
Multi attribute
Features of linguistic terms
The behavior of decision-maker
Classical method [30]
Single
No
No
Li et al.’s method [47]
Three
No
Balanced
No
Xu et al.’s method [49]
Three
No
Balanced
No
Liu et al.’s method [50]
Four
No
Balanced
Weight setting
Pang et al.’s method [53]
Seven
Yes
Balanced
No
Our proposed method
Seven
Yes
Unbalanced
Bounded confidence
To verify the proposed method, a simulation experiment platform is needed that provides specific conditions for the problem to be applied. Hyperledger Fabric is a blockchain development platform that is supported by pluggable modules [69]. It is applied to implement our improved PBFT consensus mechanism. Hyperledger Caliper, an open-source performance benchmark framework, performs performance tests on blockchain-based solutions [70]. The specific experimental environment is shown in Table 15.
Table 15
Experimental environment configuration
Metrics
Parameter configuration
CPU
Intel(R) Core (TM) i5-1135G7
Operating system
Ubuntu 16.04 LTS
Memory
8 G
The Fabric version
v 1.2
The Caliper version
v 0.3.0
First, the consensus reaching rate of our primary node election is verified. As can be seen from Table 13, the nodes Ni (i = 1, 2, …, 9) have a probability of being selected as the primary node. Therefore, the nine nodes are set as a primary node in turn in the PBFT consensus mechanism for experimental verification. Consensus reaching is determined by testing whether the blocks can be generated. We set the number of transactions from 10 to 500, using the Hyperledger Caliper for the performance evaluation. The experimental verification results are shown in Fig. 4.
From the figure, node N3 has the highest probability of generating blocks among the nine nodes. The main reason is that the malicious nodes will deliberately filter transactions in the PBFT consensus mechanism when packaging transactions and storing them in blocks [44, 71]. Since only the primary node is selected differently in our experiment, the block cannot be generated successfully if there exists malicious behavior on the primary node. This means that the success rate of reaching consensus is highest when N3 is chosen as the primary node in our improved PBFT consensus mechanism.
Then the improved Byzantine fault tolerance rate is evaluated. According to the classical PBFT consensus mechanism [51], to ensure that all nodes in the network can reach consensus, the number of nodes n must satisfy n ≥ 3f + 1, where f is the number of Byzantine nodes. In a maximum of 4 Byzantine nodes, a total of 13 nodes are set up in our experiment. And the improved PBFT consensus mechanism in this paper is used for experimental verification of the 6 cases when the number of Byzantine nodes is 0–6 respectively.
Transaction per second (TPS) refers to the ratio of the total number of transactions that are ultimately successfully stored in the blockchain to the elapsed time, which is an important index to measure the concurrency capability of the system. The higher the throughput, the more efficient the consensus mechanism is and the more capable of processing transactions. Since the throughput of the blockchain system is closely related to the performance indicators of the server, including CPU, memory, I/O, etc. [69, 70, 72], throughput is used to measure the correctness of the primary node selection in this paper. The result is shown in Fig. 5.
It can be seen from Fig. 5 that when the number of Byzantine nodes is f ≤ 4, all nodes in the network can reach a consensus. The consensus performance of the blockchain system will be reduced once Byzantine nodes exist in the PBFT consensus mechanism. Experiments have also shown that throughput drops slightly as the total number of Byzantine nodes increases. In addition, when the number of Byzantine nodes is f ≥ 5, the throughput is 0, indicating that the blockchain system cannot reach a consensus at this time. Therefore, our improved PBFT consensus mechanism meets the Byzantine fault tolerance rate of 1/3 of the classical PBFT consensus mechanism.
The experiment also shows that the throughput of the blockchain system with N3 as the primary node is higher when the number of Byzantine nodes is the same. That is, node N3 processes transactions faster than other nodes, and is more efficient in the consensus reaching process. Since the throughput of the blockchain system is closely related to the performance indicators of the server, including CPU, memory, I/O, etc. [69, 70, 72], the performance of node N3 is the best, which is consistent with our election results. Therefore, our proposed method is better and more efficient than the other methods for addressing the problem of primary node election in the PBFT consensus mechanism.
Moreover, the application of the proposed primary node election method to other scenarios is theoretically feasible, such as the replica placement algorithm in the Spark environment. The challenge of the replica placement algorithm is to select an appropriate node from multiple nodes to store replica data, which can effectively improve the performance of data reading in the Spark. A node selection is a comprehensive evaluation process, as many performance attributes of the nodes must be considered. Therefore, similar to the primary node election method in the PBFT consensus mechanism, a node selection in the replica placement algorithm can be formalized as decision-making process. Specifically, assume that one of the nine nodes in the Spark will be selected to store replica data. We first define five attributes to evaluate the performance of nine nodes, which include bandwidth, I/O, CPU, memory, and disk size. Adopting the proposed Score-ESCA method for TOPSIS method in this paper, the multiple experts are invited to express their voting attitude toward nodes concerning different attributes using an LTS. Finally, the comprehensive score values of the nodes are calculated. The node with the highest score value is selected in the replica placement algorithm. From the theoretical perspective, the proposed primary node election method is applicable to other scenarios.

Conclusions

The PLTS is an important means of solving complex decision problems in a fuzzy linguistic environment. In this paper, we formulate the primary node selection method in the PBFT consensus mechanism as an MADM problem by establishing a decision analysis process. To address the MADM problem of primary node selection, we introduce the definition of a PLTS-CI to obtain the group decision information. Subsequently, using the novel exponential semantic value and confidence approximation value, we propose a novel score function, called Score-ESCA. It considers more information about human psychological sensitivity than existing score functions. An improved TOPSIS method for PBFT primary node selection is proposed based on the novel Score-ESCA method. The proposed improved TOPSIS method is applied to solve the problem of PBFT consensus mechanism primary node election. Finally, the proposed method is compared with previous node selection methods to verify its effectiveness. In the future research, we will focus on achieving greater applicability for the proposed method when the subscript symmetric LTS is used.

Acknowledgements

This work was supported by the Chongqing Research Program of Basic Research and Frontier Technology (Grant No. cstc2021jcyj-msxmX0530 and Grant No. cstc2020jcyj-msxmX0804), and the Graduate Scientific Research and Innovation Foundation of Chongqing (Grant No. CYS22457), and the Technology Innovation and Application Development Projects of Chongqing (Grant No. cstc2021jscx-gksbX0032, cstc2021jscx-gksbX0029), and the Key R & D plan of Hainan Province (Grant No. ZDYF2021GXJS006).

Declarations

Conflict of interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
Open AccessThis article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://​creativecommons.​org/​licenses/​by/​4.​0/​.

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Literature
1.
go back to reference Lin C, He DB, Huang XY, Xie X, Choo KKR (2020) Blockchain-based system for secure outsourcing of bilinear pairings. Inf Sci 527:590–601MathSciNetMATH Lin C, He DB, Huang XY, Xie X, Choo KKR (2020) Blockchain-based system for secure outsourcing of bilinear pairings. Inf Sci 527:590–601MathSciNetMATH
2.
go back to reference Wang L, Bai Y, Jiang Q, Leung VCM, Cai W, Li X (2021) Beh-Raft-Chain: a behavior-based fast blockchain protocol for complex networks. IEEE Trans Netw Sci Eng 8(2):1154–1166 Wang L, Bai Y, Jiang Q, Leung VCM, Cai W, Li X (2021) Beh-Raft-Chain: a behavior-based fast blockchain protocol for complex networks. IEEE Trans Netw Sci Eng 8(2):1154–1166
3.
go back to reference Zhou ZL, Wang MM, Yang CN, Fu ZJ, Sun XM, Wu QMJ (2021) Blockchain-based decentralized reputation system in E-commerce environment. Future Gener Comput Syst 124:155–167 Zhou ZL, Wang MM, Yang CN, Fu ZJ, Sun XM, Wu QMJ (2021) Blockchain-based decentralized reputation system in E-commerce environment. Future Gener Comput Syst 124:155–167
4.
go back to reference Leng JW, Ye SD, Zhou M, Zhao LO, Liu Q, Guo W, Cao W, Fu LJ (2021) Blockchain-secured smart manufacturing in industry 4.0: a survey. IEEE Trans Syst Man Cybern Syst 51(1):237–252 Leng JW, Ye SD, Zhou M, Zhao LO, Liu Q, Guo W, Cao W, Fu LJ (2021) Blockchain-secured smart manufacturing in industry 4.0: a survey. IEEE Trans Syst Man Cybern Syst 51(1):237–252
5.
go back to reference Said D (2021) A decentralized electricity trading framework (DETF) for connected EVs: a blockchain and machine learning for profit margin optimization. IEEE Trans Ind Inform 17(10):6594–6602 Said D (2021) A decentralized electricity trading framework (DETF) for connected EVs: a blockchain and machine learning for profit margin optimization. IEEE Trans Ind Inform 17(10):6594–6602
6.
go back to reference Kolahan A, RezaMaadi S, Teymouri Z, Schenonea C (2021) Blockchain-based solution for energy demand-side management of residential buildings. Sustain Cities Soc 75:103316 Kolahan A, RezaMaadi S, Teymouri Z, Schenonea C (2021) Blockchain-based solution for energy demand-side management of residential buildings. Sustain Cities Soc 75:103316
7.
go back to reference Miglani A, Kumar N, Chamola V, Zeadally S (2020) Blockchain for internet of energy management: review, solutions, and challenges. Comput Commun 151:395–418 Miglani A, Kumar N, Chamola V, Zeadally S (2020) Blockchain for internet of energy management: review, solutions, and challenges. Comput Commun 151:395–418
8.
go back to reference Ouyang LW, Yuan Y, Cao YM, Wang FY (2021) A novel framework of collaborative early warning for COVID-19 based on blockchain and smart contracts. Inf Sci 570:124–143MathSciNet Ouyang LW, Yuan Y, Cao YM, Wang FY (2021) A novel framework of collaborative early warning for COVID-19 based on blockchain and smart contracts. Inf Sci 570:124–143MathSciNet
9.
go back to reference Wang J, Liu YX, Niu ST, Song HB, Jing WP, Yuan JW (2021) Blockchain enabled verification for cellular-connected unmanned aircraft system networking. Future Gener Comput Syst 123:233–244 Wang J, Liu YX, Niu ST, Song HB, Jing WP, Yuan JW (2021) Blockchain enabled verification for cellular-connected unmanned aircraft system networking. Future Gener Comput Syst 123:233–244
10.
go back to reference Lin C, He DB, Huang XY, Choo KKR (2021) OBFP: optimized blockchain-based fair payment for outsourcing computations in cloud computing. IEEE Trans Inf Forensics Secur 16:3241–3253 Lin C, He DB, Huang XY, Choo KKR (2021) OBFP: optimized blockchain-based fair payment for outsourcing computations in cloud computing. IEEE Trans Inf Forensics Secur 16:3241–3253
11.
go back to reference Li XQ, Jiang P, Chen T, Luo XP, Wen QY (2020) A survey on the security of blockchain systems. Future Gener Comput Syst 107:841–853 Li XQ, Jiang P, Chen T, Luo XP, Wen QY (2020) A survey on the security of blockchain systems. Future Gener Comput Syst 107:841–853
12.
go back to reference Sammeta N, Parthiban L (2022) Hyperledger blockchain enabled secure medical record management with deep learning-based diagnosis model. Complex Intell Syst 8:625–640 Sammeta N, Parthiban L (2022) Hyperledger blockchain enabled secure medical record management with deep learning-based diagnosis model. Complex Intell Syst 8:625–640
13.
go back to reference Wang H, Ma SL, Guo CN, Wu YL, Dai HN, Wu D (2021) Blockchain-based power energy trading management. ACM Trans Internet Technol 21(2):43:1-43:16 Wang H, Ma SL, Guo CN, Wu YL, Dai HN, Wu D (2021) Blockchain-based power energy trading management. ACM Trans Internet Technol 21(2):43:1-43:16
14.
go back to reference Lao L, Li ZC, Hou SL, Xiao B, Guo ST, Yang YY (2020) A survey of IoT applications in blockchain systems: architecture, consensus, and traffic modeling. ACM Comput Surv 53(1):18:1-18:32 Lao L, Li ZC, Hou SL, Xiao B, Guo ST, Yang YY (2020) A survey of IoT applications in blockchain systems: architecture, consensus, and traffic modeling. ACM Comput Surv 53(1):18:1-18:32
15.
go back to reference Xu GX, Dong JN, Ma C (2021) A certificateless encryption scheme based on blockchain. Peer-to-Peer Netw Appl 15(5):2952–2960 Xu GX, Dong JN, Ma C (2021) A certificateless encryption scheme based on blockchain. Peer-to-Peer Netw Appl 15(5):2952–2960
16.
go back to reference Andola N, Gogoi M, Venkatesan S, Verma S (2019) Vulnerabilities on hyperledger fabric. Pervasive Mob Comput 59:101050 Andola N, Gogoi M, Venkatesan S, Verma S (2019) Vulnerabilities on hyperledger fabric. Pervasive Mob Comput 59:101050
17.
go back to reference Andola N, Yadav VK, Venkatesan S, Verma S (2021) SpyChain: a lightweight blockchain for authentication and anonymous authorization in IoD. Wirel Pers Commun 119(1):343–362 Andola N, Yadav VK, Venkatesan S, Verma S (2021) SpyChain: a lightweight blockchain for authentication and anonymous authorization in IoD. Wirel Pers Commun 119(1):343–362
18.
go back to reference Andola N, Yadav VK, Venkatesan S, Verma S (2021) Anonymity on blockchain based e-cash protocols—a survey. Comput Sci Rev 40:100394MathSciNet Andola N, Yadav VK, Venkatesan S, Verma S (2021) Anonymity on blockchain based e-cash protocols—a survey. Comput Sci Rev 40:100394MathSciNet
19.
go back to reference Xiao Y, Zhang N, Lou WJ, Hou YT (2020) A survey of distributed consensus protocols for blockchain networks. IEEE Commun Surv Tutor 22(2):1432–1465 Xiao Y, Zhang N, Lou WJ, Hou YT (2020) A survey of distributed consensus protocols for blockchain networks. IEEE Commun Surv Tutor 22(2):1432–1465
21.
go back to reference Li WY, Feng CL, Zhang L, Xu H, Cao B, Imran MA (2021) A scalable multi-layer PBFT consensus for blockchain. IEEE Trans Parallel Distrib Syst 32(5):1146–1160 Li WY, Feng CL, Zhang L, Xu H, Cao B, Imran MA (2021) A scalable multi-layer PBFT consensus for blockchain. IEEE Trans Parallel Distrib Syst 32(5):1146–1160
22.
go back to reference Chen SY, Xie MY, Liu J, Zhang YN (2021) Improvement of the DPoS consensus mechanism in blockchain based on PLTS. In: 2021 7th IEEE intl conference on big data security on cloud (BigDataSecurity), pp 32–37 Chen SY, Xie MY, Liu J, Zhang YN (2021) Improvement of the DPoS consensus mechanism in blockchain based on PLTS. In: 2021 7th IEEE intl conference on big data security on cloud (BigDataSecurity), pp 32–37
23.
go back to reference Raghav AN, Venkatesan S, Verma S (2020) PoEWAL: a lightweight consensus mechanism for blockchain in IoT. Pervasive Mob Comput 69:101291 Raghav AN, Venkatesan S, Verma S (2020) PoEWAL: a lightweight consensus mechanism for blockchain in IoT. Pervasive Mob Comput 69:101291
25.
go back to reference Kang JW, Xiong ZX, Niyato D, Ye DD, Kim DI, Zhao J (2019) Toward secure blockchain-enabled internet of vehicles: optimizing consensus management using reputation and contract theory. IEEE Trans Veh Technol 68(3):2906–2920 Kang JW, Xiong ZX, Niyato D, Ye DD, Kim DI, Zhao J (2019) Toward secure blockchain-enabled internet of vehicles: optimizing consensus management using reputation and contract theory. IEEE Trans Veh Technol 68(3):2906–2920
26.
go back to reference Li YZ, Chen C, Liu N, Huang HW, Zheng ZB, Yan Q (2021) A blockchain-based decentralized federated learning framework with committee consensus. IEEE Netw 35(3):234–241 Li YZ, Chen C, Liu N, Huang HW, Zheng ZB, Yan Q (2021) A blockchain-based decentralized federated learning framework with committee consensus. IEEE Netw 35(3):234–241
29.
go back to reference Larimer D (2014) Delegated proof-of-stake (dpos). Bitshare whitepaper Larimer D (2014) Delegated proof-of-stake (dpos). Bitshare whitepaper
30.
go back to reference Castro M, Liskov B (2002) Practical Byzantine fault tolerance and proactive recovery. ACM Trans Comput Syst (TOCS) 20(4):398–461 Castro M, Liskov B (2002) Practical Byzantine fault tolerance and proactive recovery. ACM Trans Comput Syst (TOCS) 20(4):398–461
31.
go back to reference Ongaro D, Ousterhout J (2015) Raft consensus algorithm Ongaro D, Ousterhout J (2015) Raft consensus algorithm
32.
go back to reference Zhan Y, Wang BC, Lu RX, Yu Y (2021) DRBFT: delegated randomization Byzantine fault tolerance consensus protocol for blockchains. Inf Sci 559:8–21MathSciNet Zhan Y, Wang BC, Lu RX, Yu Y (2021) DRBFT: delegated randomization Byzantine fault tolerance consensus protocol for blockchains. Inf Sci 559:8–21MathSciNet
33.
go back to reference Liu J, Li WT, Karame GO, Asokan N (2019) Scalable Byzantine consensus via hardware-assisted secret sharing. IEEE Trans Comput 68(1):139–151MathSciNetMATH Liu J, Li WT, Karame GO, Asokan N (2019) Scalable Byzantine consensus via hardware-assisted secret sharing. IEEE Trans Comput 68(1):139–151MathSciNetMATH
34.
go back to reference Pu YW, Xiang T, Cq Hu, Alrawais A, Yan HY (2020) An efficient blockchain-based privacy preserving scheme for vehicular social networks. Inf Sci 540:308–324MathSciNet Pu YW, Xiang T, Cq Hu, Alrawais A, Yan HY (2020) An efficient blockchain-based privacy preserving scheme for vehicular social networks. Inf Sci 540:308–324MathSciNet
35.
go back to reference Tong W, Dong XW, Shen YL, Zheng JW (2020) BC-RAN: cloud radio access network enabled by blockchain for 5G. Comput Commun 162:179–186 Tong W, Dong XW, Shen YL, Zheng JW (2020) BC-RAN: cloud radio access network enabled by blockchain for 5G. Comput Commun 162:179–186
36.
go back to reference Fan YQ, Wu HY, Paik H (2021) DR-BFT: a consensus algorithm for blockchain-based multi-layer data integrity framework in dynamic edge computing system. Future Gener Comput Syst 124:33–48 Fan YQ, Wu HY, Paik H (2021) DR-BFT: a consensus algorithm for blockchain-based multi-layer data integrity framework in dynamic edge computing system. Future Gener Comput Syst 124:33–48
37.
go back to reference Xu XQ, Sun G, Luo L, Cao HL, Yu HF, Vasilakos AV (2021) Latency performance modeling and analysis for hyperledger fabric blockchain network. Inf Process Manag 58(1):102436 Xu XQ, Sun G, Luo L, Cao HL, Yu HF, Vasilakos AV (2021) Latency performance modeling and analysis for hyperledger fabric blockchain network. Inf Process Manag 58(1):102436
38.
go back to reference Sun G, Dai M, Zhang F, Yu HF, Du XJ, Guizani M (2020) Blockchain-enhanced high-confidence energy sharing in internet of electric vehicles. IEEE Internet Things J 7(9):7868–7882 Sun G, Dai M, Zhang F, Yu HF, Du XJ, Guizani M (2020) Blockchain-enhanced high-confidence energy sharing in internet of electric vehicles. IEEE Internet Things J 7(9):7868–7882
39.
go back to reference Bamakan SMH, Motavali A, Bondarti AB (2020) A survey of blockchain consensus algorithms performance evaluation criteria. Expert Syst Appl 152:113385 Bamakan SMH, Motavali A, Bondarti AB (2020) A survey of blockchain consensus algorithms performance evaluation criteria. Expert Syst Appl 152:113385
40.
go back to reference Hou R, Liu H, Hu Y, Zhao YH (2020) Research on secure transmission and storage of energy IoT information based on blockchain. Peer-to-Peer Netw Appl 13(4):1225–1235 Hou R, Liu H, Hu Y, Zhao YH (2020) Research on secure transmission and storage of energy IoT information based on blockchain. Peer-to-Peer Netw Appl 13(4):1225–1235
41.
go back to reference Fan K, Sun SL, Yan Z, Pan Q, Li H, Yang YT (2019) A blockchain-based clock synchronization scheme in IoT. Future Gener Comput Syst 101:524–533 Fan K, Sun SL, Yan Z, Pan Q, Li H, Yang YT (2019) A blockchain-based clock synchronization scheme in IoT. Future Gener Comput Syst 101:524–533
42.
go back to reference Diouf GM, Elbiaze H, Jaafar W (2020) On Byzantine fault tolerance in multi-master Kubernetes clusters. Future Gener Comput Syst 109:407–419 Diouf GM, Elbiaze H, Jaafar W (2020) On Byzantine fault tolerance in multi-master Kubernetes clusters. Future Gener Comput Syst 109:407–419
43.
go back to reference Lao L, Dai XH, Xiao B, Guo ST (2020) G-PBFT: a location-based and scalable consensus protocol for IoT-blockchain applications. In: 2020 IEEE international parallel and distributed processing symposium (IPDPS), pp 664–673 Lao L, Dai XH, Xiao B, Guo ST (2020) G-PBFT: a location-based and scalable consensus protocol for IoT-blockchain applications. In: 2020 IEEE international parallel and distributed processing symposium (IPDPS), pp 664–673
44.
go back to reference Kudva S, Badsha S, Sengupta S, Khalil I, Zomaya A (2021) Towards secure and practical consensus for blockchain based VANET. Inf Sci 545:170–187MathSciNet Kudva S, Badsha S, Sengupta S, Khalil I, Zomaya A (2021) Towards secure and practical consensus for blockchain based VANET. Inf Sci 545:170–187MathSciNet
45.
go back to reference Xu XL, Zhu DW, Yang XX, Wang S, Qi LY, Dou WC (2021) Concurrent practical Byzantine fault tolerance for integration of blockchain and supply chain. ACM Trans Internet Technol 21(1):1–17 Xu XL, Zhu DW, Yang XX, Wang S, Qi LY, Dou WC (2021) Concurrent practical Byzantine fault tolerance for integration of blockchain and supply chain. ACM Trans Internet Technol 21(1):1–17
46.
go back to reference Wang Y, Song Z, Cheng T (2020) Improvement research of PBFT consensus algorithm based on credit. In: International conference on blockchain and trustworthy systems (BlockSys), pp 47–59 Wang Y, Song Z, Cheng T (2020) Improvement research of PBFT consensus algorithm based on credit. In: International conference on blockchain and trustworthy systems (BlockSys), pp 47–59
47.
go back to reference Li CL, Zhang J, Yang XM, Lou YL (2021) Lightweight blockchain consensus mechanism and storage optimization for resource-constrained IoT devices. Inf Process Manag 58(4):102602 Li CL, Zhang J, Yang XM, Lou YL (2021) Lightweight blockchain consensus mechanism and storage optimization for resource-constrained IoT devices. Inf Process Manag 58(4):102602
48.
go back to reference Karaşan A, Kaya İ, Erdoğan M, Çolak M (2021) A multicriteria decision making methodology based on two-dimensional uncertainty by hesitant Z-fuzzy linguistic terms with an application for blockchain risk evaluation. Appl Soft Comput 113:108014 Karaşan A, Kaya İ, Erdoğan M, Çolak M (2021) A multicriteria decision making methodology based on two-dimensional uncertainty by hesitant Z-fuzzy linguistic terms with an application for blockchain risk evaluation. Appl Soft Comput 113:108014
49.
go back to reference Xu GX, Liu Y, Khan PW (2020) Improvement of the DPoS consensus mechanism in blockchain based on vague sets. IEEE Trans Ind Inform 16(6):4252–4259 Xu GX, Liu Y, Khan PW (2020) Improvement of the DPoS consensus mechanism in blockchain based on vague sets. IEEE Trans Ind Inform 16(6):4252–4259
50.
go back to reference Liu J, Xie MY, Chen SY, Ma C, Gong QH (2021) An improved DPoS consensus mechanism in blockchain based on PLTS for the smart autonomous multi-robot system. Inf Sci 575:528–541MathSciNet Liu J, Xie MY, Chen SY, Ma C, Gong QH (2021) An improved DPoS consensus mechanism in blockchain based on PLTS for the smart autonomous multi-robot system. Inf Sci 575:528–541MathSciNet
51.
go back to reference Castro M, Liskov B (1999) Practical Byzantine fault tolerance. In: OSDI, pp 173–186 Castro M, Liskov B (1999) Practical Byzantine fault tolerance. In: OSDI, pp 173–186
52.
go back to reference Herrera-Viedma E, Cordón O, Luque M, Lopez AG, Muñoz AM (2003) A model of fuzzy linguistic IRS based on multi-granular linguistic information. Int J Approx Reason 34:221–239MathSciNetMATH Herrera-Viedma E, Cordón O, Luque M, Lopez AG, Muñoz AM (2003) A model of fuzzy linguistic IRS based on multi-granular linguistic information. Int J Approx Reason 34:221–239MathSciNetMATH
53.
go back to reference Pang Q, Wang H, Xu ZS (2016) Probabilistic linguistic term sets in multi-attribute group decision making. Inf Sci 369:128–143 Pang Q, Wang H, Xu ZS (2016) Probabilistic linguistic term sets in multi-attribute group decision making. Inf Sci 369:128–143
54.
go back to reference Lin MW, Huang C, Xu ZS, Chen RQ (2020) Evaluating IoT platforms using integrated probabilistic linguistic MCDM method. IEEE Internet Things J 7(11):11195–11208 Lin MW, Huang C, Xu ZS, Chen RQ (2020) Evaluating IoT platforms using integrated probabilistic linguistic MCDM method. IEEE Internet Things J 7(11):11195–11208
55.
go back to reference Lin MW, Chen ZY, Xu ZS, Gou XJ, Herrera F (2021) Score function based on concentration degree for probabilistic linguistic term sets: an application to TOPSIS and VIKOR. Inf Sci 551:270–290MathSciNet Lin MW, Chen ZY, Xu ZS, Gou XJ, Herrera F (2021) Score function based on concentration degree for probabilistic linguistic term sets: an application to TOPSIS and VIKOR. Inf Sci 551:270–290MathSciNet
56.
go back to reference Hatefi MA (2021) BRAW: block-wise rating the attribute weights in MADM. Comput Ind Eng 156:107274 Hatefi MA (2021) BRAW: block-wise rating the attribute weights in MADM. Comput Ind Eng 156:107274
57.
go back to reference Lin MW, Huang C, Chen RQ, Fujita H, Wang X (2021) Directional correlation coefficient measures for Pythagorean fuzzy sets: their applications to medical diagnosis and cluster analysis. Complex Intell Syst 7:1025–1043 Lin MW, Huang C, Chen RQ, Fujita H, Wang X (2021) Directional correlation coefficient measures for Pythagorean fuzzy sets: their applications to medical diagnosis and cluster analysis. Complex Intell Syst 7:1025–1043
58.
go back to reference Zhang PY, Zhou MC, Zhao QX, Abusorrah A, Bamasag OO (2021) A performance-optimized consensus mechanism for consortium blockchains consisting of trust-varying nodes. IEEE Trans Netw Sci Eng 8(3):2147–2159 Zhang PY, Zhou MC, Zhao QX, Abusorrah A, Bamasag OO (2021) A performance-optimized consensus mechanism for consortium blockchains consisting of trust-varying nodes. IEEE Trans Netw Sci Eng 8(3):2147–2159
59.
go back to reference de Oliveira MT, Reis LHA, Medeiros DSV, Carrano RC, Olabarriaga SD (2020) Blockchain reputation-based consensus: a scalable and resilient mechanism for distributed mistrusting applications. Comput Netw 179:107367 de Oliveira MT, Reis LHA, Medeiros DSV, Carrano RC, Olabarriaga SD (2020) Blockchain reputation-based consensus: a scalable and resilient mechanism for distributed mistrusting applications. Comput Netw 179:107367
60.
go back to reference Belotti M, Bozic N, Pujolle G, Secci S (2019) A vademecum on blockchain technologies: when, which, and how. IEEE Commun Surv Tutor 21(4):3796–3838 Belotti M, Bozic N, Pujolle G, Secci S (2019) A vademecum on blockchain technologies: when, which, and how. IEEE Commun Surv Tutor 21(4):3796–3838
61.
go back to reference Gou XJ, Xu ZS (2016) Novel basic operational laws for linguistic terms, hesitant fuzzy linguistic term sets and probabilistic linguistic term sets. Inf Sci 372:407–427 Gou XJ, Xu ZS (2016) Novel basic operational laws for linguistic terms, hesitant fuzzy linguistic term sets and probabilistic linguistic term sets. Inf Sci 372:407–427
62.
go back to reference Lin MW, Li XM, Chen LF (2020) Linguistic q-rung orthopair fuzzy sets and their interactional partitioned Heronian mean aggregation operators. Int J Intell Syst 35(2):217–249 Lin MW, Li XM, Chen LF (2020) Linguistic q-rung orthopair fuzzy sets and their interactional partitioned Heronian mean aggregation operators. Int J Intell Syst 35(2):217–249
63.
go back to reference Lin M, Chen Z, Chen R, Fujita H (2021) Evaluation of startup companies using multicriteria decision making based on hesitant fuzzy linguistic information envelopment analysis models. Int J Intell Syst 36:2292–2322 Lin M, Chen Z, Chen R, Fujita H (2021) Evaluation of startup companies using multicriteria decision making based on hesitant fuzzy linguistic information envelopment analysis models. Int J Intell Syst 36:2292–2322
64.
go back to reference Zhang HC, Zhou WD (2022) A two-stage virtual machine abnormal behavior-based anomaly detection mechanism. Clust Comput 25(1):203–214 Zhang HC, Zhou WD (2022) A two-stage virtual machine abnormal behavior-based anomaly detection mechanism. Clust Comput 25(1):203–214
65.
go back to reference Liu J, Chen SY, Zhou Z, Wu TS (2016) An anomaly detection algorithm of cloud platform based on self-organizing maps. Math Probl Eng 4:1–9 Liu J, Chen SY, Zhou Z, Wu TS (2016) An anomaly detection algorithm of cloud platform based on self-organizing maps. Math Probl Eng 4:1–9
66.
go back to reference Kumbhare N, Marathe A, Akoglu A, Siegel HJ (2020) A value-oriented job scheduling approach for power-constrained and oversubscribed HPC systems. IEEE Trans Parallel Distrib Syst 31(6):1419–1433 Kumbhare N, Marathe A, Akoglu A, Siegel HJ (2020) A value-oriented job scheduling approach for power-constrained and oversubscribed HPC systems. IEEE Trans Parallel Distrib Syst 31(6):1419–1433
67.
go back to reference Wu XL, Liao HC, Pedrycz W (2021) Probabilistic linguistic term set with interval uncertainty. IEEE Trans Fuzzy Syst 29(11):3532–3545 Wu XL, Liao HC, Pedrycz W (2021) Probabilistic linguistic term set with interval uncertainty. IEEE Trans Fuzzy Syst 29(11):3532–3545
68.
go back to reference Dong YX, Cheng XT, Xu ZS, Chen WJ, Shi HB, Gong K (2021) Belief interval interpretation of probabilistic linguistic term sets and a visual method for solving the preference problem in multicriteria group decision making. Int J Intell Syst 36(8):4364–4391 Dong YX, Cheng XT, Xu ZS, Chen WJ, Shi HB, Gong K (2021) Belief interval interpretation of probabilistic linguistic term sets and a visual method for solving the preference problem in multicriteria group decision making. Int J Intell Syst 36(8):4364–4391
69.
go back to reference Androulaki E, Barger A, Bortnikov V, Cachin C (2018) Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Proceedings of the thirteenth EuroSys conference, pp 1–15 Androulaki E, Barger A, Bortnikov V, Cachin C (2018) Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Proceedings of the thirteenth EuroSys conference, pp 1–15
70.
go back to reference Kuzlu M, Pipattanasomporn M, Gurses L, Rahman S (2019) Performance analysis of a hyperledger fabric blockchain framework: throughput, latency and scalability. In: Proceedings of the 2019 IEEE international conference on blockchain (Blockchain), pp 536–540 Kuzlu M, Pipattanasomporn M, Gurses L, Rahman S (2019) Performance analysis of a hyperledger fabric blockchain framework: throughput, latency and scalability. In: Proceedings of the 2019 IEEE international conference on blockchain (Blockchain), pp 536–540
71.
go back to reference Xia Q, Dou WS, Guo KW, Liang G, Zuo C, Zhang FJ (2021) Survey on blockchain consensus protocol. J Softw 32(2):277–299 Xia Q, Dou WS, Guo KW, Liang G, Zuo C, Zhang FJ (2021) Survey on blockchain consensus protocol. J Softw 32(2):277–299
72.
go back to reference Huang DY, Li L, Chen B, Wang B (2021) RBFT: a new Byzantine fault-tolerant consensus mechanism based on Raft cluster. J Commun 42(3):209–219 Huang DY, Li L, Chen B, Wang B (2021) RBFT: a new Byzantine fault-tolerant consensus mechanism based on Raft cluster. J Commun 42(3):209–219
Metadata
Title
Primary node election based on probabilistic linguistic term set with confidence interval in the PBFT consensus mechanism for blockchain
Authors
Mingyue Xie
Jun Liu
Shuyu Chen
Guangxia Xu
Mingwei Lin
Publication date
20-09-2022
Publisher
Springer International Publishing
Published in
Complex & Intelligent Systems / Issue 2/2023
Print ISSN: 2199-4536
Electronic ISSN: 2198-6053
DOI
https://doi.org/10.1007/s40747-022-00857-9

Other articles of this Issue 2/2023

Complex & Intelligent Systems 2/2023 Go to the issue

Premium Partner