{"id":"https://openalex.org/W4292223684","doi":"https://doi.org/10.1016/j.jksuci.2022.08.017","title":"Weighted Byzantine Fault Tolerance consensus algorithm for enhancing consortium blockchain efficiency and security","display_name":"Weighted Byzantine Fault Tolerance consensus algorithm for enhancing consortium blockchain efficiency and security","publication_year":2022,"publication_date":"2022-08-18","ids":{"openalex":"https://openalex.org/W4292223684","doi":"https://doi.org/10.1016/j.jksuci.2022.08.017"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.jksuci.2022.08.017","pdf_url":null,"source":{"id":"https://openalex.org/S2764955546","display_name":"Journal of King Saud University - Computer and Information Sciences","issn_l":"1319-1578","issn":["1319-1578","2213-1248"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1016/j.jksuci.2022.08.017","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5047002005","display_name":"Hongwu Qin","orcid":"https://orcid.org/0000-0001-5330-5711"},"institutions":[{"id":"https://openalex.org/I68986083","display_name":"Northwest Normal University","ror":"https://ror.org/00gx3j908","country_code":"CN","type":"education","lineage":["https://openalex.org/I68986083"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hongwu Qin","raw_affiliation_strings":["Northwest Normal University, Lanzhou 730070, China"],"affiliations":[{"raw_affiliation_string":"Northwest Normal University, Lanzhou 730070, China","institution_ids":["https://openalex.org/I68986083"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102952819","display_name":"Yuntao Cheng","orcid":"https://orcid.org/0009-0003-7403-6751"},"institutions":[{"id":"https://openalex.org/I68986083","display_name":"Northwest Normal University","ror":"https://ror.org/00gx3j908","country_code":"CN","type":"education","lineage":["https://openalex.org/I68986083"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuntao Cheng","raw_affiliation_strings":["Northwest Normal University, Lanzhou 730070, China"],"affiliations":[{"raw_affiliation_string":"Northwest Normal University, Lanzhou 730070, China","institution_ids":["https://openalex.org/I68986083"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091461961","display_name":"Xiuqin Ma","orcid":"https://orcid.org/0000-0003-1569-460X"},"institutions":[{"id":"https://openalex.org/I68986083","display_name":"Northwest Normal University","ror":"https://ror.org/00gx3j908","country_code":"CN","type":"education","lineage":["https://openalex.org/I68986083"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiuqin Ma","raw_affiliation_strings":["Northwest Normal University, Lanzhou 730070, China"],"affiliations":[{"raw_affiliation_string":"Northwest Normal University, Lanzhou 730070, China","institution_ids":["https://openalex.org/I68986083"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100740268","display_name":"Li Fei","orcid":"https://orcid.org/0000-0001-7427-0730"},"institutions":[{"id":"https://openalex.org/I68986083","display_name":"Northwest Normal University","ror":"https://ror.org/00gx3j908","country_code":"CN","type":"education","lineage":["https://openalex.org/I68986083"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fei Li","raw_affiliation_strings":["Northwest Normal University, Lanzhou 730070, China"],"affiliations":[{"raw_affiliation_string":"Northwest Normal University, Lanzhou 730070, China","institution_ids":["https://openalex.org/I68986083"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5019489166","display_name":"Jemal Abawajy","orcid":"https://orcid.org/0000-0001-8962-1222"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jemal Abawajy","raw_affiliation_strings":["Cyber Security Research and Innovation Centre, Deakin University, Geelong, VIC 3220, Australia"],"affiliations":[{"raw_affiliation_string":"Cyber Security Research and Innovation Centre, Deakin University, Geelong, VIC 3220, Australia","institution_ids":["https://openalex.org/I149704539"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5047002005"],"corresponding_institution_ids":["https://openalex.org/I68986083"],"apc_list":{"value":1350,"currency":"USD","value_usd":1350,"provenance":"doaj"},"apc_paid":{"value":1350,"currency":"USD","value_usd":1350,"provenance":"doaj"},"fwci":7.759,"has_fulltext":false,"cited_by_count":19,"citation_normalized_percentile":{"value":0.99998,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":"34","issue":"10","first_page":"8370","last_page":"8379"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9492,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/consensus-algorithm","display_name":"Consensus algorithm","score":0.6862577},{"id":"https://openalex.org/keywords/quantum-byzantine-agreement","display_name":"Quantum Byzantine agreement","score":0.4518069},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability","score":0.4327052}],"concepts":[{"id":"https://openalex.org/C168021876","wikidata":"https://www.wikidata.org/wiki/Q1353446","display_name":"Byzantine fault tolerance","level":3,"score":0.95175934},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.7588059},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7438869},{"id":"https://openalex.org/C2780513914","wikidata":"https://www.wikidata.org/wiki/Q18210350","display_name":"Bottleneck","level":2,"score":0.70846635},{"id":"https://openalex.org/C2983222225","wikidata":"https://www.wikidata.org/wiki/Q2994424","display_name":"Consensus algorithm","level":2,"score":0.6862577},{"id":"https://openalex.org/C63540848","wikidata":"https://www.wikidata.org/wiki/Q3140932","display_name":"Fault tolerance","level":2,"score":0.5940647},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.51606625},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4867525},{"id":"https://openalex.org/C17532199","wikidata":"https://www.wikidata.org/wiki/Q17083590","display_name":"Quantum Byzantine agreement","level":4,"score":0.4518069},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4502999},{"id":"https://openalex.org/C107107730","wikidata":"https://www.wikidata.org/wiki/Q2994424","display_name":"Consensus","level":3,"score":0.43480885},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.4327052},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.26320586},{"id":"https://openalex.org/C41550386","wikidata":"https://www.wikidata.org/wiki/Q529909","display_name":"Multi-agent system","level":2,"score":0.12489998},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.107267916},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.090936065},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.07342735},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.jksuci.2022.08.017","pdf_url":null,"source":{"id":"https://openalex.org/S2764955546","display_name":"Journal of King Saud University - Computer and Information Sciences","issn_l":"1319-1578","issn":["1319-1578","2213-1248"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.jksuci.2022.08.017","pdf_url":null,"source":{"id":"https://openalex.org/S2764955546","display_name":"Journal of King Saud University - Computer and Information Sciences","issn_l":"1319-1578","issn":["1319-1578","2213-1248"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"score":0.5,"id":"https://metadata.un.org/sdg/12","display_name":"Responsible consumption and production"}],"grants":[{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"62162055"},{"funder":"https://openalex.org/F4320322769","funder_display_name":"Natural Science Foundation of Jiangsu Province","award_id":"21JR7RA115"},{"funder":"https://openalex.org/F4320322880","funder_display_name":"Natural Science Foundation of Gansu Province","award_id":null}],"datasets":[],"versions":[],"referenced_works_count":22,"referenced_works":["https://openalex.org/W2126087831","https://openalex.org/W2531399364","https://openalex.org/W2885743763","https://openalex.org/W2905867785","https://openalex.org/W2910972514","https://openalex.org/W2914452207","https://openalex.org/W2947972344","https://openalex.org/W2961950085","https://openalex.org/W2967604605","https://openalex.org/W2982614372","https://openalex.org/W2988375719","https://openalex.org/W3009619496","https://openalex.org/W3016687266","https://openalex.org/W3026487645","https://openalex.org/W3091788338","https://openalex.org/W3097022228","https://openalex.org/W3103243855","https://openalex.org/W3132230373","https://openalex.org/W3200003121","https://openalex.org/W4231687553","https://openalex.org/W4241773428","https://openalex.org/W4245158672"],"related_works":["https://openalex.org/W4313071224","https://openalex.org/W3132443168","https://openalex.org/W3101414869","https://openalex.org/W3046732854","https://openalex.org/W2998562842","https://openalex.org/W2900842005","https://openalex.org/W2891414023","https://openalex.org/W2546731809","https://openalex.org/W2535240814","https://openalex.org/W2517375438"],"abstract_inverted_index":{"In":[0,44],"blockchain,":[1],"the":[2,11,14,17,21,83,90,97,104],"consensus":[3,23,53,63,70,79,140],"algorithm":[4,64],"is":[5],"a":[6,49,74],"core":[7],"component":[8],"that":[9,65,128],"governs":[10],"trust":[12],"among":[13],"participants":[15],"in":[16,135],"blockchain":[18,52,86],"activities.":[19],"However,":[20],"exiting":[22],"algorithms":[24],"suffer":[25],"from":[26],"performance":[27,105],"bottleneck":[28],"such":[29],"as":[30,57],"low":[31],"throughput,":[32,139],"high":[33],"delay,":[34],"unstable":[35],"performance,":[36],"sustainability":[37],"issues":[38],"and":[39,69,95,109,118,133,142],"vulnerability":[40],"to":[41,56],"targeted":[42],"attacks.":[43],"this":[45],"paper,":[46],"we":[47],"propose":[48],"new":[50],"consortium":[51],"algorithm,":[54],"referred":[55],"Weighted":[58],"Byzantine":[59,114,120],"Fault":[60,115],"Tolerance":[61,116],"(WBFT)":[62],"improves":[66],"system":[67,87,138],"throughput":[68],"delay.":[71],"We":[72,102],"introduce":[73],"dynamic":[75],"weighting":[76],"mechanism":[77],"for":[78],"nodes,":[80],"which":[81],"enhances":[82],"security":[84],"of":[85,92,99,106,137],"by":[88],"weakening":[89],"influence":[91],"malicious":[93,100],"nodes":[94],"reduces":[96],"probability":[98],"behavior.":[101],"validate":[103],"WBFT":[107,129],"experimentally":[108],"compare":[110],"it":[111],"against":[112],"Practical":[113],"(PBFT)":[117],"Reputation-Based":[119],"Fault-Tolerance":[121],"(RBFT)":[122],"based":[123],"approaches.":[124],"The":[125],"results":[126],"show":[127],"substantially":[130],"outperforms":[131],"PBFT":[132],"RBFT":[134],"terms":[136],"delay":[141],"security.":[143]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4292223684","counts_by_year":[{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":2}],"updated_date":"2024-12-11T05:52:00.045767","created_date":"2022-08-18"}