A secure and highly efficient blockchain PBFT consensus algorithm for microgrid power trading
Zhongyuan Yao,
No information about this author
Yonghao Fang,
No information about this author
Heng Pan
No information about this author
et al.
Scientific Reports,
Journal Year:
2024,
Volume and Issue:
14(1)
Published: April 9, 2024
Abstract
There
are
a
series
of
challenges
in
microgrid
transactions,
and
blockchain
technology
holds
the
promise
addressing
these
challenges.
However,
with
increasing
number
users
existing
systems
may
struggle
to
meet
growing
demands
for
transactions.
Therefore,
this
paper
proposes
an
efficient
secure
consensus
algorithm
designed
large-scale
electricity
The
begins
by
utilizing
Spectral
clustering
partition
network
into
different
lower-level
set
based
on
transaction
characteristics
nodes.
Subsequently,
dual-layer
process
is
employed
enhance
efficiency
consensus.
Additionally,
we
have
leader
election
strategy
promptly
identify
leaders
excellent
performance.
Finally,
introduced
authentication
method
that
combines
zero-knowledge
proofs
key
sharing
further
mitigate
risk
malicious
nodes
participating
Theoretical
analysis
indicates
our
proposed
algorithm,
incorporating
multiple
layers
security
measures,
effectively
withstands
attacks
such
as
denial
service.
Simulation
experiment
results
demonstrate
outperforms
similar
algorithms
significantly
terms
communication
overhead,
latency,
throughput.
Language: Английский
Distribution network insulator detection based on improved ant colony algorithm and deep learning for UAV
Yimin Zhou,
No information about this author
Dong Zhang,
No information about this author
Xingming Ma
No information about this author
et al.
iScience,
Journal Year:
2024,
Volume and Issue:
27(6), P. 110119 - 110119
Published: May 27, 2024
Under
the
background
of
accelerating
speed
urban
and
rural
construction,
geographical
environment
overhead
transmission
lines
has
also
changed
greatly.
Using
unmanned
aerial
vehicle
(UAV)
to
realize
intelligent
line
inspection
can
significantly
shorten
time
improve
efficiency.
In
this
paper,
power
UAVs
is
studied
from
two
levels:
path
planning
UAV
control,
insulator
identified
through
actual
image
recognition.
At
level,
improved
swarm
intelligence
algorithm
used
conduct
simulation
experiments
on
flight
find
a
safe
effective
route.
Insulator
identification
defect
location
are
trained
dataset
collected
by
deep
learning
technology
achieve
accurate
efficiency
inspection,
which
great
application
prospects
in
engineering.
Language: Английский
Improving byzantine fault tolerance based on stake evaluation and consistent hashing
Peer-to-Peer Networking and Applications,
Journal Year:
2024,
Volume and Issue:
17(4), P. 1963 - 1975
Published: April 11, 2024
Language: Английский
Improving Byzantine Fault Tolerance Based on Stake Evaluation and Consistent Hashing
Research Square (Research Square),
Journal Year:
2023,
Volume and Issue:
unknown
Published: Nov. 2, 2023
Abstract
In
the
context
of
distributed
systems,
Byzantine
fault
tolerance
plays
a
critical
role
in
ensuring
normal
operation
system,
particularly
when
facing
with
malicious
nodes.
However,
challenges
remain
enhancing
security
and
reliability
fault-tolerant
systems.
This
paper
addresses
these
by
improving
approach
based
on
stake
evaluation
improved
consistency
hashing.
We
propose
method
that
leverages
node
stakes
to
enhance
system
allocating
different
trust
values.
Additionally,
we
introduce
improvements
hashing
technique,
enabling
its
effective
environment.
By
introducing
redundant
nodes
hash
ring
mitigate
impact
nodes,
scalability.
Experimental
results
demonstrate
significant
improvement
performance
using
this
approach.
These
findings
suggest
our
holds
considerable
potential
for
widespread
application
field
tolerance,
supporting
development
more
reliable
blockchain
Language: Английский
Power Terminal Identity Authentication Scheme for Disaster Recovery Environment
Published: Sept. 22, 2023
In
order
to
ensure
the
trusted
access
of
power
collection
terminals
in
a
disaster
recovery
environment,
this
paper
proposes
cross-domain
authentication
scheme
based
on
blockchain.
Firstly,
an
improved
PBFT
algorithm
reputation
value
election
is
designed,
which
increases
calculation
node
and
improves
dynamic
addition
removal
consensus
nodes
master
failure
conditions.
Then,
model
for
blockchain
constructed.
The
certificate
format
protocol
are
security
efficiency
analyzed.
analysis
results
show
that
has
properties
such
as
resistance
distributed
attacks,
communication
overhead
lower
than
traditional
algorithm.
Language: Английский