Journal of Computer Applications ›› 2025, Vol. 45 ›› Issue (12): 3939-3946.DOI: 10.11772/j.issn.1001-9081.2024111678
• Network and communications • Previous Articles Next Articles
Gongli LI1,2, Xiaodi CHEN1, Lu LI1
Received:2024-11-27
Revised:2025-01-24
Accepted:2025-02-11
Online:2025-02-14
Published:2025-12-10
Contact:
Xiaodi CHEN
About author:LI Gongli, born in 1981, Ph. D., associate professor. Her research interests include modern cryptography.Supported by:李功丽1,2, 陈晓迪1, 李露1
通讯作者:
陈晓迪
作者简介:李功丽(1981—),女,河南信阳人,副教授,博士,CCF会员,主要研究方向:现代密码学基金资助:CLC Number:
Gongli LI, Xiaodi CHEN, Lu LI. Low-latency neighbor selection scheme for blockchain networks based on multi-stage propagation[J]. Journal of Computer Applications, 2025, 45(12): 3939-3946.
李功丽, 陈晓迪, 李露. 基于多阶段传播的区块链网络低延迟邻居选择方案[J]. 《计算机应用》唯一官方网站, 2025, 45(12): 3939-3946.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2024111678
| 符号 | 描述 |
|---|---|
| i,j | 区块链网络中的节点 |
| Ni | 节点i的Outbound节点集 |
| λ | 区块节点邻近度的索引,λ∈[0,7] |
| 节点i的Outbound节点数 | |
| 节点Outbound集的邻近节点数 | |
| Di | 节点i的度 |
| Dth | 延迟阈值 |
| W | 网络传播跳跃波数 |
| Ni1 | 节点i的强传播Outbound节点集 |
| Ni2 | 节点i的弱传播Outbound节点集 |
| 节点i强、弱传播Outbound节点数 | |
| φi | 节点i的传播能力 |
| θ | 节点i的工作Outbound节点集,θ∈{Ni1,Ni2} |
| Tij | 邻居节点j将区块传播到节点i所花费的时间 |
Tab. 1 Symbols used in algorithm
| 符号 | 描述 |
|---|---|
| i,j | 区块链网络中的节点 |
| Ni | 节点i的Outbound节点集 |
| λ | 区块节点邻近度的索引,λ∈[0,7] |
| 节点i的Outbound节点数 | |
| 节点Outbound集的邻近节点数 | |
| Di | 节点i的度 |
| Dth | 延迟阈值 |
| W | 网络传播跳跃波数 |
| Ni1 | 节点i的强传播Outbound节点集 |
| Ni2 | 节点i的弱传播Outbound节点集 |
| 节点i强、弱传播Outbound节点数 | |
| φi | 节点i的传播能力 |
| θ | 节点i的工作Outbound节点集,θ∈{Ni1,Ni2} |
| Tij | 邻居节点j将区块传播到节点i所花费的时间 |
| 网络拓扑 | 分叉率/% | 传播开销/GB |
|---|---|---|
| Default | 1.61 | 4.81 |
| GDS | 1.34 | 3.62 |
| TDS | 1.12 | 2.86 |
| NSMP | 0.77 | 1.95 |
Tab. 2 Comparison of fork rate and propagation overhead of network topologies
| 网络拓扑 | 分叉率/% | 传播开销/GB |
|---|---|---|
| Default | 1.61 | 4.81 |
| GDS | 1.34 | 3.62 |
| TDS | 1.12 | 2.86 |
| NSMP | 0.77 | 1.95 |
| [1] | NAKAMOTO S. Bitcoin: a peer-to-peer electronic cash system [EB/OL]. [2024-10-10].. |
| [2] | KARAME G O, ANDROULAKI E. Two bitcoins at the price of one? double-spending attacks on fast payments in bitcoin[EB/OL]. [2024-10-10].. |
| [3] | SAAD M, ANWAR A, RAVI S, et al. Revisiting Nakamoto consensus in asynchronous networks: a comprehensive analysis of bitcoin safety and chain quality[J]. IEEE/ACM Transactions on Networking, 2024, 32(1): 844-858. |
| [4] | JIN M, CHEN X, LIN S J. Reducing the bandwidth of block propagation in bitcoin network with erasure coding[J]. IEEE Access, 2019, 7: 175606-175613. |
| [5] | REIJSBERGEN D, SRIDHAR S, MONNOT B, et al. Transaction fees on a honeymoon: Ethereum’s EIP-1559 one month later [C]// Proceedings of the 2021 IEEE International Conference on Blockchain. Piscataway: IEEE, 2021: 196-204. |
| [6] | 刘子煜,张娟,王成章. 基于区块链技术的电子合同安全云存储系统[J]. 自动化技术与应用, 2024, 43(9): 105-108. |
| LIU Z Y, ZHANG J, WANG C Z. Secure cloud storage system of electronic contract based on blockchain technology[J]. Techniques of Automation and Applications, 2024, 43(9): 105-108. | |
| [7] | 王惠,王峥. 工业物联网中基于区块链的属性基签密方案[J]. 计算机工程与设计, 2024, 45(10): 2888-2896. |
| WANG H, WANG Z. Attribute based signcryption scheme based on blockchain in industrial internet of things[J]. Computer Engineering and Design, 2024, 45(10): 2888-2896. | |
| [8] | 郝玉香,孙慧珠,张洁. 区块链专利技术驱动产业创新[J]. 中国科技信息, 2024(21): 135-137. |
| HAO Y X, SUN H Z, ZHANG J. Blockchain patent technology drives industrial innovation [J]. China Science and Technology Information, 2024(21): 135-137. | |
| [9] | 陈晶,杨浩,何琨,等. 区块链扩展技术现状与展望[J]. 软件学报, 2024, 35(2): 828-851. |
| CHEN J, YANG H, HE K, et al. Current situation and prospect of blockchain scaling technology [J]. Journal of Software, 2024, 35(2): 828-851. | |
| [10] | 邵怡敏,赵凡,王轶,等. 基于区块链技术及应用的可视化研究综述[J]. 计算机应用, 2023, 43(10): 3038-3046. |
| SHAO Y M, ZHAO F, WANG Y, et al. Survey of visualization research based on blockchain technology and application[J]. Journal of Computer Applications, 2023, 43(10): 3038-3046. | |
| [11] | EYAL I, SIRER E G. Majority is not enough: bitcoin mining is vulnerable[J]. Communications of the ACM, 2018, 61(7): 95-102. |
| [12] | EYAL I. The miner’s dilemma[C]// Proceedings of the 2015 IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2015: 89-103. |
| [13] | KWON Y, KIM D, SON Y, et al. Be selfish and avoid dilemmas: Fork After Withholding (FAW) attacks on bitcoin[C]// Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, 2017: 195-209. |
| [14] | AOKI Y, SHUDO K. Proximity neighbor selection in blockchain networks[C]// Proceedings of the 2019 IEEE International Conference on Blockchain. Piscataway: IEEE, 2019: 52-58. |
| [15] | WANG K, KIM H S. FastChain: scaling blockchain system with informed neighbor selection [C]// Proceedings of the 2019 IEEE International Conference on Blockchain. Piscataway: IEEE, 2019: 376-383. |
| [16] | SUDHAN A, NENE M J. Peer selection techniques for enhanced transaction propagation in bitcoin peer-to-peer network [C]// Proceedings of the 2nd International Conference on Intelligent Computing and Control Systems. Piscataway: IEEE, 2018: 679-684. |
| [17] | PARK S, IM S, SEOL Y, et al. Nodes in the bitcoin network: comparative measurement study and survey[J]. IEEE Access, 2019, 7: 57009-57022. |
| [18] | BI W, YANG H, ZHENG M. An accelerated method for message propagation in blockchain networks[EB/OL]. [2024-10-10].. |
| [19] | MATSUURA H, GOTO Y, SAO H. New neighbor selection method for blockchain network with multiple regions [J]. IEEE Access, 2022, 10: 105278-105291. |
| [20] | DECKER C, WATTENHOFER R. Information propagation in the bitcoin network [C]// Proceedings of the 2013 IEEE International Conference on Peer-to-Peer Computing. Piscataway: IEEE, 2013: 1-10. |
| [21] | AOKI Y, OTSUKI K, KANEKO T, et al. SimBlock: a blockchain network simulator [C]// Proceedings of the 2019 IEEE Conference on Computer Communications Workshops. Piscataway: IEEE, 2019: 325-329. |
| [22] | FADHIL M, OWENSON G, ADDA M. Locality based approach to improve propagation delay on the bitcoin peer-to-peer network[C]// Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management. Piscataway: IEEE, 2017: 556-559. |
| [23] | SALLAL M F, OWENSON G, ADDA M. Proximity awareness approach to enhance propagation delay on the bitcoin peer-to-peer network[C]// Proceedings of the IEEE 37th International Conference on Distributed Computing Systems. Piscataway: IEEE, 2017: 2411-2416. |
| [24] | 霍如,程祥凤,孙闯,等. 区块链网络拓扑优化和转发策略设计[J].通信学报, 2022, 43(12): 89-100. |
| HUO R, CHENG X F, SUN C, et al. Blockchain network topology optimization and forwarding strategy design [J]. Journal on Communications, 2022, 43(12): 89-100. | |
| [25] | JIANG S, WU J. Taming propagation delay and fork rate in bitcoin mining network [C]// Proceedings of the 2021 IEEE International Conference on Blockchain. Piscataway: IEEE, 2021: 314-320. |
| [1] | Hanlun LI, Jianguo REN. Malware propagation model based on characteristic behavior detection in P2P networks [J]. Journal of Computer Applications, 2022, 42(7): 2125-2131. |
| [2] | ZHOU Jian, JIN Yu, HE Heng, LI Peng. Dynamic cloud data audit model based on nest Merkle Hash tree block chain [J]. Journal of Computer Applications, 2019, 39(12): 3575-3583. |
| [3] | ZHANG Qingfeng, WANG Sheng, LIAO Dan. Nash bargaining based resource allocation in peer-to-peer network [J]. Journal of Computer Applications, 2015, 35(9): 2424-2429. |
| [4] | ZHANG Dongwen, LIU Chenguang, ZHANG Yang. Fork/Join-oriented software refactoring and performance analysis [J]. Journal of Computer Applications, 2015, 35(11): 3172-3177. |
| [5] | DU Peng BAI Guangwei SHEN Hang CAO Lei. Energy-aware P2P data sharing mechanism for heterogeneous mobile terminals [J]. Journal of Computer Applications, 2013, 33(08): 2112-2116. |
| [6] | LI Shao-jing. Reputation incentive mechanism based on dynamic topology [J]. Journal of Computer Applications, 2012, 32(10): 2752-2756. |
| [7] | GUO Yi-fan LI Teng GUO Yu-cui. Trust management model based on value-at-risk evaluation with changing time in P2P network [J]. Journal of Computer Applications, 2012, 32(09): 2613-2616. |
| [8] | FENG Li-ping HAN Qi WANG Hong-bin KANG Su-ming. Effective immune measures on P2P botnets [J]. Journal of Computer Applications, 2012, 32(09): 2617-2619. |
| [9] | WU Xiao-Jun CHEN Ji FANG Pei GUO Hai-liang. Resources searching method for unstructured peer-to-peer networks based on shortcuts between subtrees [J]. Journal of Computer Applications, 2012, 32(07): 1799-1803. |
| [10] | ZHANG Wei-cun KANG Kai CUI Ting-yu. Genetic algorithm with master-slave structure for forklift truck dispatching in bulk cargo logistics [J]. Journal of Computer Applications, 2012, 32(06): 1741-1744. |
| [11] | WANG Xiao-juan ZHOU Zhu-rong. Research of super-node based on leader-follower algorithm [J]. Journal of Computer Applications, 2012, 32(01): 143-146. |
| [12] | HAO Zheng-hong CHEN Xing-shu WANG Hai-zhou HU Xin. Active measurement of PPStream VOD system and client behavior analysis [J]. Journal of Computer Applications, 2011, 31(11): 3068-3071. |
| [13] | Li-qun LIU. Design of CCMP based on split medium access control of centralized wireless local area network [J]. Journal of Computer Applications, 2011, 31(08): 2159-2161. |
| [14] | CHENG Pu CHU Yan-ping DU Ying. Analysis of cooperation model for P2P live streaming in game theoretic framework [J]. Journal of Computer Applications, 2011, 31(05): 1159-1161. |
| [15] | . P2P trust model for resisting collusion and dynamic behavior of node [J]. Journal of Computer Applications, 2011, 31(02): 308-312. |
| Viewed | ||||||
|
Full text |
|
|||||
|
Abstract |
|
|||||