ArticlePublisher preview available

Performance analysis of mining pool with power-saving, fault and mining competition

Authors:
To read the full-text of this research, you can request a copy directly from the authors.

Abstract and Figures

Blockchain has emerged as a disruptive technology with potential applications in various industries. Although the proof-of-work (PoW) blockchain systems have worked so successfully, the mining pools in PoW-based blockchain systems have certain drawbacks: high-power expenditure, mining competition and fault. It is essential to implement the power-saving and evaluate the performance of the mining pool with these characteristics in PoW-based blockchain systems. In this paper, we consider a queueing system with sleep–wakeup, working breakdown and impatient strategies that are suitable to express well power-saving, fault and mining competition in the mining process. By using a z-transform approach, the closed-form expressions about various performance measures such as the mean number of blocks and the mean confirmation time of block are obtained. Furthermore, we analyze the power consumption by constructing the linear function based on the performance measures and analyze the improvement of power-saving by comparing the power consumption of a queueing model without various strategies. In order to mitigate the negative effect stemming from the mining competition, we formulate the Nash bargaining game to induce the cooperation and obtain the Nash solution and the corresponding mining pool’s optimal computation power.
This content is subject to copyright. Terms and conditions apply.
Vol:.(1234567890)
The Journal of Supercomputing (2024) 80:20518–20545
https://doi.org/10.1007/s11227-024-06236-0
1 3
Performance analysis ofmining pool withpower‑saving,
fault andmining competition
KaimingYang1,2· JianCao1,3
Accepted: 14 April 2024 / Published online: 3 June 2024
© The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature
2024
Abstract
Blockchain has emerged as a disruptive technology with potential applications in
various industries. Although the proof-of-work (PoW) blockchain systems have
worked so successfully, the mining pools in PoW-based blockchain systems have
certain drawbacks: high-power expenditure, mining competition and fault. It is
essential to implement the power-saving and evaluate the performance of the min-
ing pool with these characteristics in PoW-based blockchain systems. In this paper,
we consider a queueing system with sleep–wakeup, working breakdown and impa-
tient strategies that are suitable to express well power-saving, fault and mining com-
petition in the mining process. By using a z-transform approach, the closed-form
expressions about various performance measures such as the mean number of blocks
and the mean confirmation time of block are obtained. Furthermore, we analyze the
power consumption by constructing the linear function based on the performance
measures and analyze the improvement of power-saving by comparing the power
consumption of a queueing model without various strategies. In order to mitigate
the negative effect stemming from the mining competition, we formulate the Nash
bargaining game to induce the cooperation and obtain the Nash solution and the cor-
responding mining pool’s optimal computation power.
Keywords Blockchain· Performance· Queueing· Power-saving· Mining
competition· Fault
* Jian Cao
jiancao@bupt.edu.cn
1 School ofScience, Beijing Univeristy ofPosts andTelecommunications, Beijing100876, China
2 Key Laboratory ofMathematics andInformation Networks, Beijing University ofPosts
andTelecommunications, Ministry ofEducation, Beijing, China
3 School ofApplied Mathematics, Nanjing University ofFinance andEconomics, Nanjing, China
Content courtesy of Springer Nature, terms of use apply. Rights reserved.
ResearchGate has not been able to resolve any citations for this publication.
Article
Full-text available
With the development of advanced information and communication technology, the traditional centralized service model alone no longer meets the increasing demand of data exchange in intelligent transportation systems (ITS). While Internet of Vehicles (IoV) has been introduced to achieve more advanced ITS, there are still some unsettled issues such as flexibility and fault tolerance. The conventional centralized approach for ITS is vulnerable to the single point of failure, and lack of flexibility due to its dependence on a trusted third party (TTP). The emergence of blockchain technology provides a potential direction to address these problems. However, due to varying vehicle densities, it is challenging to select the best blockchain parameters to satisfy the application requirements. In this paper, we propose a multi-channel blockchain scheme that can use the best parameters in accordance with the vehicle density. The proposed scheme first defines multiple blockchain channels where each channel is optimized for a certain vehicle density level. Then, the system selects the best channel according to the vehicle density, and the application requirements on the transaction throughput and latency. We use extensive simulations to show that the proposed blockchain scheme achieves a significantly better performance as compared with existing baselines.
Article
Full-text available
In order to enable emerging vehicular Internet of Things (IoT) applications, including fully autonomous driving, more efforts should be done in collecting driving experiences in different road situations. This requires the exchange of information between vehicles as each vehicle has very limited experience. Due to the decentralized feature of vehicular environment, an efficient management of collaborative behaviors among the vehicles becomes particularly important. Blockchain has been attracting great interest recently because it provides a way to reach consensus in decentralized systems. However, existing blockchain systems assume high communication capabilities for vehicles, which is difficult to achieve in a decentralized vehicular environment. Existing studies also assume the existence of networking infrastructure, such as roadside units (RSU). In this paper, we propose a scheme to empower blockchain in vehicular environments without depending on the existing networking infrastructure. The proposed scheme uses a distributed clustering approach to select some vehicles as edge nodes, and the edge nodes maintain the blockchain used to record transactions in a decentralized way. The proposed scheme employs a distributed approach that guides vehicle clustering with the consideration of multiple metrics based on a fuzzy logic algorithm. By using the edge nodes, the proposed scheme solves the communication problem of maintaining a blockchain in a totally decentralized vehicular environment. We use computer simulations to clarify the performance of the proposed scheme in terms of communication performance by comparing it with existing baselines.
Article
Full-text available
Blockchain has been envisioned to be a disruptive technology with potential for applications in various industries. As more and more different blockchain platforms have emerged, it is essential to assess their performance in different use cases and scenarios. In this paper, we conduct a systematic survey on the blockchain performance evaluation by categorizing all reviewed solutions into two general categories, namely, empirical analysis and analytical modelling. In the empirical analysis, we comparatively review the current empirical blockchain evaluation methodologies, including benchmarking, monitoring, experimental analysis and simulation. In analytical modelling, we investigate the stochastic models applied to performance evaluation of mainstream blockchain consensus algorithms. Through contrasting, comparison and grouping different methods together, we extract important criteria that can be used for selecting the most suitable evaluation technique for optimizing the performance of blockchain systems based on their identified bottlenecks. Finally, we conclude the survey by presenting a list of possible directions for future research.
Article
Full-text available
We analyze the time-dependent behavior of various types of infinite-server queueing systems, where, within each system we consider, jobs interact with one another in ways that induce batch departures from the system. One example of such a queue was introduced in the recent paper of Frolkova and Mandjes (Stochastic Models, 2019) in order to model a type of one-sided communication between two users in the Bitcoin network: here we show that a time-dependent version of the distributional Little’s law can be used to study the time-dependent behavior of this model, as well as a related model where blocks are communicated to a user at a rate that is allowed to vary with time. We also show that the time-dependent behavior of analogous infinite-server queueing systems with batch arrivals and exponentially distributed services can be analyzed just as thoroughly.
Article
Full-text available
In this paper, we develop a more general framework of block-structured Markov processes in the queueing study of blockchain systems, which can provide analysis both for the stationary performance measures and for the sojourn time of any transaction or block. In addition, an original aim of this paper is to generalize the two-stage batch-service queueing model studied in Li et al. (Blockchain queue theory. In: International conference on computational social networks. Springer: New York; 2018. p. 25–40) both “from exponential to phase-type” service times and “from Poisson to MAP” transaction arrivals. Note that the MAP transaction arrivals and the two stages of PH service times make our blockchain queue more suitable to various practical conditions of blockchain systems with crucial factors, for example, the mining processes, the block generations, the blockchain building and so forth. For such a more general blockchain queueing model, we focus on two basic research aspects: (1) using the matrix-geometric solution, we frst obtain a sufcient stable condition of the blockchain system. Then, we provide simple expressions for the average stationary number of transactions in the queueing waiting room and the average stationary number of transactions in the block. (2) However, on comparing with Li et al. (2018), analysis of the transaction–confrmation time becomes very difcult and challenging due to the complicated blockchain structure. To overcome the difculties, we develop a computational technique of the frst passage times by means of both the PH distributions of infnite sizes and the RG factorizations. Finally, we hope that the methodology and results given in this paper will open a new avenue to queueing analysis of more general blockchain systems in practice and can motivate a series of promising future research on development of blockchain technologies.
Article
The longest-chain and Greedy Heaviest Observed Subtree (GHOST) protocols are the two most famous chain-selection protocols to address forking in Proof-of-Work (PoW) blockchain systems. Inclusive protocol was proposed to lower the loss of miners who produce stale blocks and increase the blockchain throughput. This paper aims to make an analytical-model-based quantitative comparison of their capabilities against selfish mining attack. Analytical models have been developed for the longest-chain protocol but less to the GHOST protocol. However, the blockchain dynamics and evolution are different when adopting different chain-selection protocols. Therefore, the corresponding analytical models and/or the formulas of calculating metrics (such as miner profitability and system throughput) may be different. To address these challenges, this paper first develops a novel Markov model and the formulas of evaluation metrics, in order to analyze a GHOST-based blockchain system under selfish mining attack. Then extensive experiments are conducted for comparison and we observe that: (i) The GHOST protocol is more resistant to selfish mining attack than the longest-chain protocol from the aspect of relative revenue of selfish miners. (ii) Inclusive protocol can promote the security (evaluated in terms of miner profitability) improvement of the system which has little total computational power or a high forking probability. Additionally, the longest-chain protocol is more sensitive to inclusive protocol than GHOST protocol. (iii) It is hard for each of the two common-used difficulty adjustment algorithms to achieve higher system throughput and security.
Article
Internet of Things (IoT) applications have penetrated into all aspects of human life. Millions of IoT users and devices, online services and applications combine to create a complex and heterogeneous network, which complicates digital identity management. Distributed identity is a promising paradigm to solve IoT identity problems and allows users to have soverignty over their private data. However, existing state-of-the-art methods are unsuitable for IoT due to continuing issues regarding resource limitations for IoT devices, security and privacy issues, and lack of a systematic proof system. Accordingly, in this paper, we propose SmartDID, a novel blockchain-based distributed identity aimed at establishing a self-sovereign identity and providing strong privacy preservation. First, we configure IoT devices as light nodes and design a Sybil-resistant, unlinkable and supervisable distributed identity that does not rely on central identity providers. We further develop a dual-credential model based on commitment and zero-knowledge proofs to protect the privacy of sensitive attributes, on-chain identity data and linkage of credentials. Moreover, we combine the basic credential proofs to prove the knowledge of solutions to more complex problems and create a systematic proof system. We go on to provide the security analysis of SmartDID. Experimental analysis shows that our scheme achieves better performance in terms of both credential generation and proof generation when compared with CanDID.
Article
The past few years have witnessed an exponential growth of diverse Internet of Things (IoT) devices as well as compelling applications ranging from industrial production, intelligent transport, warehouse logistics to medical care. Dramatic advances in IoT technology not only bring enormous economic opportunities but also challenges (e.g., privacy and security vulnerabilities). Recently, with the appearance of blockchain technology, the integration of IoT and blockchain (BCoT) is considered a promising solution to address these issues. Blockchain technology provides a secure and scalable framework to improve the data management of IoT devices. However, the huge computation and energy consumption in the blockchain consensus process prevents it from being directly applied as a generic platform for IoT. In this paper, we propose a cloud mining pool-aided BCoT architecture. The IoT devices can rent the computation resource from the cloud services dynamically. Then, the individual cloud miners are grouped into several 'mining pools' to share block rewards to earn a steady profit and reduce the income variance. Based on this architecture, we study the mining pool selection problem and analyze the colony behaviors of IoT devices. We propose a centralized evolutionary game-based pool selection algorithm. In addition, considering the non-cooperative relationship among multiple miners, we also propose a lightweight distributed reinforcement learning algorithm, named the 'WoLF-PHC' algorithm.
Article
Authorization or access control limits the actions a user may perform on a computer system, based on predetermined access control policies, thus preventing access by illegitimate actors. Access control for the Internet of Things (IoT) should be tailored to take inherent IoT network scale and device resource constraints into consideration. However, common authorization systems in IoT employ conventional schemes, which suffer from overheads and centralization. Recent research trends suggest that blockchain has the potential to tackle the issues of access control in IoT. However, proposed solutions overlook the importance of building dynamic and flexible access control mechanisms. In this paper, we design a decentralized attribute-based access control mechanism with an auxiliary Trust and Reputation System (TRS) for IoT authorization. Our system progressively quantifies the trust and reputation scores of each node in the network and incorporates the scores into the access control mechanism to achieve dynamic and flexible access control. We design our system to run on a public blockchain, but we separate the storage of sensitive information, such as user’s attributes, to private sidechains for privacy preservation. We implement our solution in a public Rinkeby Ethereum test-network interconnected with a lab-scale testbed. Our evaluations consider various performance metrics to highlight the applicability of our solution for IoT contexts.
Article
Deploying blockchain in IoT is an effective way to address traditional security issues. However, existing approaches have two major limitations: since the blockchain itself is subject to attacks, including selfish mining, double spending, and distributed denial of service attacks, IoT smart devices are also vulnerable once hackers successfully invade blockchain systems; due to the heterogeneity and resource limitations of IoT devices, the deployment of the existing blockchain systems in the IoT scenario cannot reflect strong adaptability and meet IoT service requirements. In this article, we introduce Spacechain, a secure and high-performance blockchain system with three-dimensional ledger architecture, to enable blockchain open in IoT. Specifically, we first design a three-dimensional architecture with novel data structures to deal with the heterogeneity and scalability of IoT networks. Then, we propose the Three-Dimensional Greedy Heaviest-Observed Sub-Tree (3D-GHOST) consensus mechanism for Spacechain to improve security and network performance. Additionally, we conduct detailed security analysis and extensive experimental verification to demonstrate the performance of Spacechain.