Skip to main content
Erschienen in: Wireless Networks 8/2020

25.11.2019

Recent advances in consensus protocols for blockchain: a survey

verfasst von: Shaohua Wan, Meijun Li, Gaoyang Liu, Chen Wang

Erschienen in: Wireless Networks | Ausgabe 8/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

As the core of a blockchain system, the consensus mechanism not only helps to maintain the consistency of node data, but also gets involved in the issuance of tokens and prevention of attacks. Since the first blockchain system was born, it has been continuously improved with the development of blockchain technology and evolved into multiple new branches. Starting with the basic introduction of consensus and the classic Byzantine Generals Problem in distributed computing area, this survey utilizes a thorough classification to explain current consensus protocols in the blockchain system, presents the characteristics of mainstream protocols (PoW, PoS, DPoS, PBFT, etc.) and analyzes the strengths and weaknesses of them. Then we evaluate the performance qualitatively and quantitatively. In the end, we highlight several research directions for developing more practical consensus protocols for the future.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
Global computing power distribution [Online], available: https://​btc.​com/​stats/​pool, October 14, 2019.
 
2
Energy consumption statistics [Online], available: https://​digiconomist.​net/​bitcoin-energy-consumption, October 14, 2019.
 
3
Primecoin Website [Online], available: http:// primecoin.io/, October 14, 2019.
 
Literatur
1.
Zurück zum Zitat Zhang, R., Xie, P., Wang, C., Liu, G., & Wan, S. (2019). Classifying transportation mode and speed from trajectory data via deep multi-scale learning. Computer Networks, 162, 106861.CrossRef Zhang, R., Xie, P., Wang, C., Liu, G., & Wan, S. (2019). Classifying transportation mode and speed from trajectory data via deep multi-scale learning. Computer Networks, 162, 106861.CrossRef
2.
Zurück zum Zitat Adhikari, A., Rawat, D.B., & Song, M. (2019). Wireless network virtualization by leveraging blockchain technology and machine learning. In: Proceedings of ACM workshop on wireless security and machine learning (pp. 61–66). Adhikari, A., Rawat, D.B., & Song, M. (2019). Wireless network virtualization by leveraging blockchain technology and machine learning. In: Proceedings of ACM workshop on wireless security and machine learning (pp. 61–66).
3.
Zurück zum Zitat Back, A. (2002). Hashcash - a denial of service counter-measure. In: Proceedings of USENIX annual technical conference. Back, A. (2002). Hashcash - a denial of service counter-measure. In: Proceedings of USENIX annual technical conference.
4.
Zurück zum Zitat Badertscher, C., Gaži, P., Kiayias, A., Russell, A., & Zikas, V. (2018). Ouroboros genesis: Composable proof-of-stake blockchains with dynamic availability. In: Proceedings of ACM SIGSAC conference on computer and communications security (pp. 913–930). Badertscher, C., Gaži, P., Kiayias, A., Russell, A., & Zikas, V. (2018). Ouroboros genesis: Composable proof-of-stake blockchains with dynamic availability. In: Proceedings of ACM SIGSAC conference on computer and communications security (pp. 913–930).
5.
Zurück zum Zitat Benet, J. (2014). IPFS - content addressed, versioned, p2p file system. Eprint Arxiv. Benet, J. (2014). IPFS - content addressed, versioned, p2p file system. Eprint Arxiv.
6.
Zurück zum Zitat Bentov, I., Lee, C., Mizrahi, A., & Rosenfeld, M. (2014). Proof of activity: Extending bitcoin’s proof of work via proof of stake. ACM SIGMETRICS Performance Evaluation Review, 42(3), 34–37.CrossRef Bentov, I., Lee, C., Mizrahi, A., & Rosenfeld, M. (2014). Proof of activity: Extending bitcoin’s proof of work via proof of stake. ACM SIGMETRICS Performance Evaluation Review, 42(3), 34–37.CrossRef
9.
Zurück zum Zitat Cachin, C. (2016). Architecture of the hyperledger blockchain fabric. In: Proceedings of workshop on distributed cryptocurrencies and consensus ledgers (Vol. 310, p. 4). Cachin, C. (2016). Architecture of the hyperledger blockchain fabric. In: Proceedings of workshop on distributed cryptocurrencies and consensus ledgers (Vol. 310, p. 4).
11.
Zurück zum Zitat Chen, K., Wang, C., Yin, Z., Jiang, H., & Tan, G. (2018). Slide: Towards fast and accurate mobile fingerprinting for wifi indoor positioning systems. IEEE Sensors Journal, 18(3), 1213–1223.CrossRef Chen, K., Wang, C., Yin, Z., Jiang, H., & Tan, G. (2018). Slide: Towards fast and accurate mobile fingerprinting for wifi indoor positioning systems. IEEE Sensors Journal, 18(3), 1213–1223.CrossRef
12.
Zurück zum Zitat Chen, L., Xu, L., Shah, N., Gao, Z., Lu, Y., & Shi, W. (2017). On security analysis of proof-of-elapsed-time (poet). In: Proceedings of international symposium on stabilization, safety, and security of distributed systems (pp. 282–297). Chen, L., Xu, L., Shah, N., Gao, Z., Lu, Y., & Shi, W. (2017). On security analysis of proof-of-elapsed-time (poet). In: Proceedings of international symposium on stabilization, safety, and security of distributed systems (pp. 282–297).
14.
Zurück zum Zitat Crosby, M., & Kalyanaraman, V. (2016). Blockchain technology: Beyond bitcoin. Applied Innovation, 2(6–10), 71. Crosby, M., & Kalyanaraman, V. (2016). Blockchain technology: Beyond bitcoin. Applied Innovation, 2(6–10), 71.
16.
Zurück zum Zitat Dai, Y., Xu, D., Maharjan, S., Chen, Z., He, Q., & Zhang, Y. (2019). Blockchain and deep reinforcement learning empowered intelligent 5g beyond. IEEE Network, 33(3), 10–17.CrossRef Dai, Y., Xu, D., Maharjan, S., Chen, Z., He, Q., & Zhang, Y. (2019). Blockchain and deep reinforcement learning empowered intelligent 5g beyond. IEEE Network, 33(3), 10–17.CrossRef
18.
Zurück zum Zitat David, B., Gaži, P., Kiayias, A., & Russell, A. (2018). Ouroboros praos: An adaptively-secure, semi-synchronous proof-of-stake blockchain. In: Proceedings of annual international conference on the theory and applications of cryptographic techniques (pp. 66–98). David, B., Gaži, P., Kiayias, A., & Russell, A. (2018). Ouroboros praos: An adaptively-secure, semi-synchronous proof-of-stake blockchain. In: Proceedings of annual international conference on the theory and applications of cryptographic techniques (pp. 66–98).
19.
Zurück zum Zitat De Angelis, S., Aniello, L., Baldoni, R., Lombardi, F., Margheri, A., & Sassone, V. (2018). Pbft vs proof-of-authority: Applying the cap theorem to permissioned blockchain. De Angelis, S., Aniello, L., Baldoni, R., Lombardi, F., Margheri, A., & Sassone, V. (2018). Pbft vs proof-of-authority: Applying the cap theorem to permissioned blockchain.
20.
Zurück zum Zitat De Vries, A. (2018). Bitcoin’s growing energy problem. Joule, 2(5), 801–805.CrossRef De Vries, A. (2018). Bitcoin’s growing energy problem. Joule, 2(5), 801–805.CrossRef
21.
Zurück zum Zitat Dwork, C., & Naor, M. (1993). Pricing via processing or combatting junk mail. In: Proceedings of international cryptology conference on advances in cryptology (pp. 139–147). Dwork, C., & Naor, M. (1993). Pricing via processing or combatting junk mail. In: Proceedings of international cryptology conference on advances in cryptology (pp. 139–147).
22.
Zurück zum Zitat Fan, J., Yi, L. T., & Shu, J. W. (2013). Research on the technologies of Byzantine system. Journal of Software, 24(6), 1346–1360.CrossRef Fan, J., Yi, L. T., & Shu, J. W. (2013). Research on the technologies of Byzantine system. Journal of Software, 24(6), 1346–1360.CrossRef
23.
Zurück zum Zitat Gao, H., Huang, W., Yang, X., Duan, Y., & Yin, Y. (2018). Toward service selection for workflow reconfiguration: An interface-based computing solution. Future Generation Computer Systems, 87, 298–311.CrossRef Gao, H., Huang, W., Yang, X., Duan, Y., & Yin, Y. (2018). Toward service selection for workflow reconfiguration: An interface-based computing solution. Future Generation Computer Systems, 87, 298–311.CrossRef
24.
Zurück zum Zitat Gao, H., Mao, S., Huang, W., & Yang, X. (2018). Applying probabilistic model checking to financial production risk evaluation and control: A case study of alibaba’s yu’e bao. IEEE Transactions on Computational Social Systems, 5(3), 785–795.CrossRef Gao, H., Mao, S., Huang, W., & Yang, X. (2018). Applying probabilistic model checking to financial production risk evaluation and control: A case study of alibaba’s yu’e bao. IEEE Transactions on Computational Social Systems, 5(3), 785–795.CrossRef
25.
Zurück zum Zitat Gilad, Y., Hemo, R., Micali, S., Vlachos, G., & Zeldovich, N. (2017). Algorand: Scaling Byzantine agreements for cryptocurrencies. In: Proceedings of 26th symposium on operating systems principles (pp. 51–68). Gilad, Y., Hemo, R., Micali, S., Vlachos, G., & Zeldovich, N. (2017). Algorand: Scaling Byzantine agreements for cryptocurrencies. In: Proceedings of 26th symposium on operating systems principles (pp. 51–68).
26.
Zurück zum Zitat Houy, N. (2014). It will cost you nothing to ’kill’ a proof-of-stake crypto-currency (Vol. 34, no. 2). New York: Social Science Electronic Publishing. Houy, N. (2014). It will cost you nothing to ’kill’ a proof-of-stake crypto-currency (Vol. 34, no. 2). New York: Social Science Electronic Publishing.
27.
Zurück zum Zitat Huang, H., Yin, H., Min, G., Zhang, J., Wu, Y., & Zhang, X. (2018). Energy-aware dual-path geographic routing to bypass routing holes in wireless sensor networks. IEEE Transactions on Mobile Computing, 17(6), 1339–1352.CrossRef Huang, H., Yin, H., Min, G., Zhang, J., Wu, Y., & Zhang, X. (2018). Energy-aware dual-path geographic routing to bypass routing holes in wireless sensor networks. IEEE Transactions on Mobile Computing, 17(6), 1339–1352.CrossRef
28.
Zurück zum Zitat Kiayias, A., Russell, A., David, B., & Oliynykov, R. (2017). Ouroboros: A provably secure proof-of-stake blockchain protocol. In: Proceedings of annual international cryptology conference (pp. 357–388). Kiayias, A., Russell, A., David, B., & Oliynykov, R. (2017). Ouroboros: A provably secure proof-of-stake blockchain protocol. In: Proceedings of annual international cryptology conference (pp. 357–388).
30.
Zurück zum Zitat Lamport, L. (1977). Proving the correctness of multiprocess programs. IEEE Transactions on Software Engineering, 2, 125–143.MathSciNetMATHCrossRef Lamport, L. (1977). Proving the correctness of multiprocess programs. IEEE Transactions on Software Engineering, 2, 125–143.MathSciNetMATHCrossRef
31.
32.
Zurück zum Zitat Lampson, B.W. (1996). How to build a highly available system using consensus. In: Proceedings of international workshop on distributed algorithms (pp. 1–17). Lampson, B.W. (1996). How to build a highly available system using consensus. In: Proceedings of international workshop on distributed algorithms (pp. 1–17).
33.
Zurück zum Zitat Larimer, D., & Kasper L, S.F. (2015) Bitshares 2.0: Financial smart contract platform. Larimer, D., & Kasper L, S.F. (2015) Bitshares 2.0: Financial smart contract platform.
34.
Zurück zum Zitat Laszka, A., Johnson, B., & Grossklags, J. (2015). When bitcoin mining pools run dry. In: Proceedings of international conference on financial cryptography and data security (pp. 63–77). Laszka, A., Johnson, B., & Grossklags, J. (2015). When bitcoin mining pools run dry. In: Proceedings of international conference on financial cryptography and data security (pp. 63–77).
35.
Zurück zum Zitat Liu, Y., Hao, L., Liu, Z., Sharif, K., Wang, Y., & Das, S. K. (2019). Mitigating interference via power control for two-tier femtocell networks: A hierarchical game approach. IEEE Transactions on Vehicular Technology, 68(7), 7194–7198.CrossRef Liu, Y., Hao, L., Liu, Z., Sharif, K., Wang, Y., & Das, S. K. (2019). Mitigating interference via power control for two-tier femtocell networks: A hierarchical game approach. IEEE Transactions on Vehicular Technology, 68(7), 7194–7198.CrossRef
36.
Zurück zum Zitat Liu, Y., Quan, W., Wang, T., & Wang, Y. (2018). Delay-constrained utility maximization for video ads push in mobile opportunistic d2d networks. IEEE Internet of Things Journal, 5(5), 4088–4099.CrossRef Liu, Y., Quan, W., Wang, T., & Wang, Y. (2018). Delay-constrained utility maximization for video ads push in mobile opportunistic d2d networks. IEEE Internet of Things Journal, 5(5), 4088–4099.CrossRef
37.
Zurück zum Zitat Miller, A., Juels, A., Shi, E., Parno, B., & Katz, J. (2014). Permacoin: Repurposing bitcoin work for data preservation. In: Proceedings of IEEE symposium on security and privacy. Miller, A., Juels, A., Shi, E., Parno, B., & Katz, J. (2014). Permacoin: Repurposing bitcoin work for data preservation. In: Proceedings of IEEE symposium on security and privacy.
39.
Zurück zum Zitat Milutinovic, M., He, W., Wu, H., & Kanwal, M. (2016). Proof of luck: An efficient blockchain consensus protocol. In: Proceedings of 1st Workshop on system software for trusted execution (p. 2). Milutinovic, M., He, W., Wu, H., & Kanwal, M. (2016). Proof of luck: An efficient blockchain consensus protocol. In: Proceedings of 1st Workshop on system software for trusted execution (p. 2).
41.
Zurück zum Zitat Nguyen, G. T., & Kim, K. (2018). A survey about consensus algorithms used in blockchain. Journal of Information Processing Systems, 14(1), 101–128. Nguyen, G. T., & Kim, K. (2018). A survey about consensus algorithms used in blockchain. Journal of Information Processing Systems, 14(1), 101–128.
43.
Zurück zum Zitat Pass, R., & Shi, E. (2018). Thunderella: Blockchains with optimistic instant confirmation. In: Proceedings of annual international conference on the theory and applications of cryptographic techniques (pp. 3–33). Pass, R., & Shi, E. (2018). Thunderella: Blockchains with optimistic instant confirmation. In: Proceedings of annual international conference on the theory and applications of cryptographic techniques (pp. 3–33).
44.
Zurück zum Zitat Schneider, F. B. (1990). Implementing fault-tolerant services using the state machine approach: A tutorial. ACM Computing Surveys, 22(4), 299–319.CrossRef Schneider, F. B. (1990). Implementing fault-tolerant services using the state machine approach: A tutorial. ACM Computing Surveys, 22(4), 299–319.CrossRef
45.
Zurück zum Zitat Schwartz, D., Youngs, N., Britto, A., et al. (2014). The ripple protocol consensus algorithm. Ripple Labs Inc White Paper (Vol. 5, p. 8). Schwartz, D., Youngs, N., Britto, A., et al. (2014). The ripple protocol consensus algorithm. Ripple Labs Inc White Paper (Vol. 5, p. 8).
46.
Zurück zum Zitat Selimi, M., Kabbinale, A.R., Ali, A., Navarro, L., & Sathiaseelan, A. (2018). Towards blockchain-enabled wireless mesh networks. In: Proceedings of 1st workshop on cryptocurrencies and blockchains for distributed systems (pp. 13–18). Selimi, M., Kabbinale, A.R., Ali, A., Navarro, L., & Sathiaseelan, A. (2018). Towards blockchain-enabled wireless mesh networks. In: Proceedings of 1st workshop on cryptocurrencies and blockchains for distributed systems (pp. 13–18).
47.
Zurück zum Zitat Sun, Y., Zhang, L., Feng, G., Yang, B., Cao, B., & Imran, M. A. (2019). Blockchain-enabled wireless Internet of Things: Performance analysis and optimal communication node deployment. IEEE Internet of Things Journal, 6(3), 5791–5802.CrossRef Sun, Y., Zhang, L., Feng, G., Yang, B., Cao, B., & Imran, M. A. (2019). Blockchain-enabled wireless Internet of Things: Performance analysis and optimal communication node deployment. IEEE Internet of Things Journal, 6(3), 5791–5802.CrossRef
48.
Zurück zum Zitat Tanenbaum, A. S., & Steen, M. V. (2002). Distributed systems: Principles and paradigms. Beijing: Tsinghua University Press.MATH Tanenbaum, A. S., & Steen, M. V. (2002). Distributed systems: Principles and paradigms. Beijing: Tsinghua University Press.MATH
50.
Zurück zum Zitat Tromp, J. (2015). Cuckoo cycle: A memory bound graph-theoretic proof-of-work. In: Proceedings of international conference on financial cryptography and data security (pp. 49–62). Tromp, J. (2015). Cuckoo cycle: A memory bound graph-theoretic proof-of-work. In: Proceedings of international conference on financial cryptography and data security (pp. 49–62).
53.
Zurück zum Zitat Wang, C., & Jiang, H. (2015). Surf: A connectivity-based space filling curve construction algorithm in high genus 3d surface wsns. In: Proceedings of 34th IEEE INFOCOM (pp. 981–989). HongKong Wang, C., & Jiang, H. (2015). Surf: A connectivity-based space filling curve construction algorithm in high genus 3d surface wsns. In: Proceedings of 34th IEEE INFOCOM (pp. 981–989). HongKong
54.
Zurück zum Zitat Wang, C., Lin, H., & Jiang, H. (2014). Trajectory-based multi-dimensional outlier detection in wireless sensor networks using hidden markov models. Wireless Networks, 20(8), 2409–2418.CrossRef Wang, C., Lin, H., & Jiang, H. (2014). Trajectory-based multi-dimensional outlier detection in wireless sensor networks using hidden markov models. Wireless Networks, 20(8), 2409–2418.CrossRef
55.
Zurück zum Zitat Wang, C., Lin, H., & Jiang, H. (2016). CANS: Towards congestion-adaptive and small stretch emergency navigation with wireless sensor networks. IEEE Transactions on Mobile Computing, 15(5), 1077–1089.CrossRef Wang, C., Lin, H., & Jiang, H. (2016). CANS: Towards congestion-adaptive and small stretch emergency navigation with wireless sensor networks. IEEE Transactions on Mobile Computing, 15(5), 1077–1089.CrossRef
56.
Zurück zum Zitat Wang, C., Lin, H., Zhang, R., & Jiang, H. (2017). Send: A situation-aware emergency navigation algorithm with sensor networks. IEEE Transactions on Mobile Computing, 16(4), 1149–1162.CrossRef Wang, C., Lin, H., Zhang, R., & Jiang, H. (2017). Send: A situation-aware emergency navigation algorithm with sensor networks. IEEE Transactions on Mobile Computing, 16(4), 1149–1162.CrossRef
57.
Zurück zum Zitat Wang, W., Hoang, D. T., Hu, P., Xiong, Z., Niyato, D., Wang, P., et al. (2019). A survey on consensus mechanisms and mining strategy management in blockchain networks. IEEE Access, 7, 22328–22370.CrossRef Wang, W., Hoang, D. T., Hu, P., Xiong, Z., Niyato, D., Wang, P., et al. (2019). A survey on consensus mechanisms and mining strategy management in blockchain networks. IEEE Access, 7, 22328–22370.CrossRef
58.
Zurück zum Zitat Wood, G. (2014). Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper (Vol. 151). Wood, G. (2014). Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper (Vol. 151).
59.
Zurück zum Zitat Wustrow, E., & Vandersloot, B. (2016). DDoSCoin: cryptocurrency with a malicious proof-of-work. In: Proceedings of USENIX conference on offensive technologies (pp. 168–177). Wustrow, E., & Vandersloot, B. (2016). DDoSCoin: cryptocurrency with a malicious proof-of-work. In: Proceedings of USENIX conference on offensive technologies (pp. 168–177).
60.
Zurück zum Zitat Xu, Y., Ren, J., Wang, G., Zhang, C., Yang, J., & Zhang, Y. (2019). A blockchain-based non-repudiation network computing service scheme for industrial iot. IEEE Transactions on Industrial Informatics, 15(6), 3632–3641.CrossRef Xu, Y., Ren, J., Wang, G., Zhang, C., Yang, J., & Zhang, Y. (2019). A blockchain-based non-repudiation network computing service scheme for industrial iot. IEEE Transactions on Industrial Informatics, 15(6), 3632–3641.CrossRef
61.
Zurück zum Zitat Xue, T., Yuan, Y., Ahmed, Z., Moniz, K., Cao, G., & Wang, C. (2018). Proof of contribution: A modification of proof of work to increase mining efficiency. In: Proceedings of IEEE 42nd annual computer software and applications conference (COMPSAC) (Vol. 1, pp. 636–644). Xue, T., Yuan, Y., Ahmed, Z., Moniz, K., Cao, G., & Wang, C. (2018). Proof of contribution: A modification of proof of work to increase mining efficiency. In: Proceedings of IEEE 42nd annual computer software and applications conference (COMPSAC) (Vol. 1, pp. 636–644).
63.
Zurück zum Zitat Yin, Y., Yu, F., Xu, Y., Yu, L., & Mu, J. (2017). Network location-aware service recommendation with random walk in cyber-physical systems. Sensors, 17(9), 2059.CrossRef Yin, Y., Yu, F., Xu, Y., Yu, L., & Mu, J. (2017). Network location-aware service recommendation with random walk in cyber-physical systems. Sensors, 17(9), 2059.CrossRef
64.
Zurück zum Zitat Yuen, H.Y., Wu, F., Cai, W., Chan, H.C., Yan, Q., & Leung, V. (2019). Proof-of-play: A novel consensus model for blockchain-based peer-to-peer gaming system. In: Proceedings of ACM international symposium on blockchain and secure critical infrastructure (pp. 19–28). Yuen, H.Y., Wu, F., Cai, W., Chan, H.C., Yan, Q., & Leung, V. (2019). Proof-of-play: A novel consensus model for blockchain-based peer-to-peer gaming system. In: Proceedings of ACM international symposium on blockchain and secure critical infrastructure (pp. 19–28).
65.
Zurück zum Zitat Zaman, M.U., Shen, T., & Min, M. (2019). Proof of sincerity: A new lightweight consensus approach for mobile blockchains. In: Proceedings of 16th IEEE annual consumer communications & networking conference (CCNC) (pp. 1–4). Zaman, M.U., Shen, T., & Min, M. (2019). Proof of sincerity: A new lightweight consensus approach for mobile blockchains. In: Proceedings of 16th IEEE annual consumer communications & networking conference (CCNC) (pp. 1–4).
66.
Zurück zum Zitat Zhao, P., Li, J., Zeng, F., Xiao, F., Wang, C., & Jiang, H. (2018). ILLIA: Enabling k-anonymity-based privacy preserving against location injection attacks in continuous lbs queries. IEEE Internet of Things Journal, 5(2), 1033–1042.CrossRef Zhao, P., Li, J., Zeng, F., Xiao, F., Wang, C., & Jiang, H. (2018). ILLIA: Enabling k-anonymity-based privacy preserving against location injection attacks in continuous lbs queries. IEEE Internet of Things Journal, 5(2), 1033–1042.CrossRef
67.
Zurück zum Zitat Zheng, Z., Xie, S., Dai, H., Chen, X., & Wang, H. (2017). An overview of blockchain technology: Architecture, consensus, and future trends. In: Proceedings of IEEE international congress on big data (BigData Congress) (pp. 557–564). Zheng, Z., Xie, S., Dai, H., Chen, X., & Wang, H. (2017). An overview of blockchain technology: Architecture, consensus, and future trends. In: Proceedings of IEEE international congress on big data (BigData Congress) (pp. 557–564).
Metadaten
Titel
Recent advances in consensus protocols for blockchain: a survey
verfasst von
Shaohua Wan
Meijun Li
Gaoyang Liu
Chen Wang
Publikationsdatum
25.11.2019
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 8/2020
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-019-02195-0

Weitere Artikel der Ausgabe 8/2020

Wireless Networks 8/2020 Zur Ausgabe

Neuer Inhalt