Applied Artificial Intelligence,
Journal Year:
2024,
Volume and Issue:
39(1)
Published: Dec. 17, 2024
The
secure
transmission
of
communication
data
between
different
devices
still
faces
numerous
potential
challenges,
such
as
tampering,
integrity,
network
attacks,
and
the
risks
information
leakage
or
forgery.
This
approach
aims
to
handle
distributed
trust
issues
federated
learning
users
update
states
rapidly.
By
modeling
multi-source
through
learning,
model
parameters
reputation
values
participating
are
stored
on
blockchain.
method
incorporates
factors
experience,
familiarity,
timeliness
more
quickly
gather
reliable
about
nodes
assess
their
behavior.
Simulation
results
MNIST
dataset
show
that
when
proportion
selfish
is
below
50%,
convergence
time
increases
with
nodes.
Compared
advanced
algorithms,
proposed
saves
approximately
6%
interaction
time.
As
number
transactions
significantly
increases,
system's
TPS
(Transactions
Per
Second)
decreases,
an
average
only
3079.35
maximum
4000.
scheme
can
filter
out
high-quality
sources
during
real-time
dynamic
exchange,
enhancing
accuracy
training
ensuring
privacy
security.
Electronics,
Journal Year:
2025,
Volume and Issue:
14(8), P. 1665 - 1665
Published: April 20, 2025
Aiming
at
the
problems
of
significant
communication
overheads,
low
reliability
primary
nodes,
and
insufficient
dynamic
adaptability
traditional
consensus
algorithms
in
intellectual
property
transaction
scenarios,
an
Improved
Practical
Byzantine
Fault
Tolerant
(IPBFT)
algorithm
based
on
Chord
entropy
weight
method
is
proposed.
Firstly,
employed
to
map
nodes
onto
a
hash
ring,
enabling
grouping.
Secondly,
entropy-based
reputation
model
constructed,
quantifying
evaluation
node
behaviors
calculating
overall
value.
A
three-level
classification
mechanism
used
dynamically
select
supervisory
thereby
reducing
probability
being
elected.
Then,
three-phase
monitoring
strategy
for
developed,
which
includes
collection,
review,
blackout.
This
improves
Raft
process,
enhancing
detection
fault
tolerance
against
malicious
leaders.
Finally,
grouped
dual-layer
architecture
The
lower
layer
uses
improved
efficient
within
groups,
while
upper
PBFT
cross-group
global
consistency
verification.
Experimental
findings
demonstrate
that
IPBFT
able
balance
security,
scalability,
efficiency
network
environment,
providing
better
solution
transactions.
Applied Sciences,
Journal Year:
2025,
Volume and Issue:
15(10), P. 5400 - 5400
Published: May 12, 2025
Blockchain
technology
uses
a
consensus
mechanism
to
create
and
finalize
blocks.
The
affects
the
total
performance
parameters
of
blockchain
network,
such
as
throughput.
In
this
paper,
we
present
“Nazfast”,
simplified
proof
stake—Byzantine
fault
tolerance
based
presented
is
completed
in
multiple
folds.
For
block
producer
validation
committee
selection,
used
secure
speeded-up
election
mechanism,
S&Sem,
Nazfast.
designed
for
fast
finalization
malicious
environment.
simulation
result
shows
that
approximately
achieved
three
finalizations
1
s
with
almost
similar
latency.
We
reduced
fixed
number
validators
improve
higher
throughput
among
other
same
family.
Because
validators,
safety
are
at
risk,
so
Sea
Shield
overall
safety.
This
another
save
nodes’
details
when
they
join/unjoin
network
validators.
By
using
all
parts
together,
our
system
protected
from
28-plus
different
attacks,
maintain
high
decentralization
by
S&Sem.
Finally,
also
enhance
incentive
liveness
network.
Advances in computational intelligence and robotics book series,
Journal Year:
2025,
Volume and Issue:
unknown, P. 439 - 460
Published: Feb. 28, 2025
This
chapter
first
suggests
a
security
mechanism
to
prohibit
block
data
tampering
in
internet
of
things
(IoT)
by
combining
consortium
blockchain
blocks
with
Edwards25519
(Ed25519)
signatures.
Secondly,
the
study
that
is
being
suggested
makes
use
an
artificial
bee
colonizer
(ABC)
technique
maintain
unpredictability
Ed25519
signatures
while
finding
best
answer
and
maximizing
range
intricate
problems.
The
optimizer
system
uses
advanced
deep
learning
(ADL)
technology
as
model
monitor
assess
things.
authors
have
evaluated
solution
terms
performance
overhead
security.
most
damaging
applications,
like
obfuscation,
selfish
mining,
blocking,
ignoring,
blind
heuristic
attacks,
can
be
prevented
system,
according
tests
been
done
on
it.
defends
against
these
attacks
using
test
Scyther.
It
also
monitors
metrics,
such
network
throughput
rate,
entropy,
scalability,
which
indicate
how
well
performs
comparison
other
systems.
Blockchains,
Journal Year:
2024,
Volume and Issue:
2(3), P. 334 - 365
Published: Sept. 14, 2024
Blockchain
has
emerged
as
a
solution
for
ensuring
accurate
and
truthful
environmental
variable
monitoring
needed
the
management
of
pollutants
natural
resources.
The
immutability
property
blockchain
helps
protect
measured
data
on
pollution
resources
to
enable
reporting
effective
control
polluting
agents.
However,
specifics
what
measure,
how
use
blockchain,
highlighting
which
frameworks
have
been
adopted
need
be
explored
fill
research
gaps.
Therefore,
we
review
existing
works
managing
variables
in
this
paper.
Specifically,
examine
applications
greenhouse
gas
emissions,
solid
plastic
waste,
food
security,
water
usage,
circular
economy
identify
motivates
adoption
features
sought,
used
consensus
algorithms,
supporting
technologies
complement
sensing
reporting.
We
conclude
by
identifying
practical
that
provide
implementation
details
rapid
remaining
challenges
merit
future
research.
Electronics,
Journal Year:
2024,
Volume and Issue:
13(10), P. 1809 - 1809
Published: May 7, 2024
In
response
to
the
problems
of
random
selection
primary
nodes,
high
communication
complexity,
and
low
consensus
efficiency
in
current
mechanism
for
intellectual
property
transactions,
a
Practical
Byzantine
Fault
Tolerance
(PBFT)
algorithm
based
on
Affinity-Propagation
(AP)
clustering
algorithm,
termed
AP-PBFT,
is
proposed.
Firstly,
election
strategy
leader
node
constructed
reputation
mechanism;
reward
punishment
designed
achieve
dynamic
adjustment
value
nodes
PBFT
process,
number
votes
among
introduced
determine
node’s
collaboration
with
guarantee
precise
ordering
nodes.
Secondly,
values
are
selected
as
cluster
centers
run
AP
groups
knowledge
transaction
responsibility
availability.
Finally,
three-stage
process
optimized,
task
decomposed
into
two
layers:
intra-consensus
group
inter-leader
group,
reducing
complexity
data
blockchain.
Experimental
findings
indicate
significant
performance
improvement
over
throughput,
simulation
environment
multiple
types
transactions
including
different
large-scale
scenarios,
such
purchases,
sales,
licenses,
transfers.
Electronics,
Journal Year:
2024,
Volume and Issue:
13(10), P. 1942 - 1942
Published: May 15, 2024
Currently,
in
the
blockchain-based
distributed
microgrid
trading
system,
there
are
some
problems,
such
as
low
throughput,
high
delay,
and
a
communication
overhead.
To
this
end,
an
improved
Practical
Byzantine
Fault
Tolerance
(PBFT)
algorithm
(CE-PBFT)
suitable
for
power
is
proposed.
First,
node
credit
value
calculation
model
introduced,
nodes
divided
into
consensus,
supervisory,
propagation
according
to
their
values,
forming
hierarchical
network
structure
ensure
efficiency
reliability
of
consensus.
Secondly,
consensus
process
optimized
by
adopting
segmented
mechanism.
This
approach
calculates
rounds
selects
methods
node-type
switching
based
on
these
calculations,
reaching
dynamic
changes
states
effectively
reducing
overhead
Finally,
experiments
show
that
compared
with
IMPBFT
PBFT
algorithms,
CE-PBFT
has
better
performance
overhead,
22%
higher
average
throughput
15%
lower
delay
than
118%
87%
algorithm.
Computers, materials & continua/Computers, materials & continua (Print),
Journal Year:
2024,
Volume and Issue:
80(1), P. 1491 - 1519
Published: Jan. 1, 2024
Blockchain
has
been
widely
used
in
finance,
the
Internet
of
Things
(IoT),
supply
chains,
and
other
scenarios
as
a
revolutionary
technology.
Consensus
protocol
plays
vital
role
blockchain,
which
helps
all
participants
to
maintain
storage
state
consistently.
However,
with
improvement
network
environment
complexity
system
scale,
blockchain
development
is
limited
by
performance,
security,
scalability
consensus
protocol.
To
address
this
problem,
paper
introduces
collaborative
filtering
mechanism
commonly
recommendation
into
Practical
Byzantine
Fault
Tolerance
(PBFT)
proposes
fault-tolerant
(BFT)
based
on
(CRBFT).
Specifically,
an
improved
method
designed
use
similarity
between
node's
opinions
those
recommender
basis
for
determining
whether
adopt
opinions.
This
can
amplify
voice
good
nodes,
weaken
impact
cunning
malicious
nodes
trust
value
calculation,
make
calculated
results
more
accurate.
In
addition,
are
given
voting
power
according
their
value,
weight
random
election
algorithm
implemented
reduce
risk
attack.
The
experimental
show
that
CRBFT
effectively
eliminate
various
improve
performance
systems
complex
environments,
feasibility
also
proven
theoretical
analysis.