Skip to main navigation Skip to search Skip to main content

Improving byzantine fault tolerance based on stake evaluation and consistent hashing

  • Guangfu Wu*
  • , Xin Lai
  • , Daojing He
  • , Sammy Chan
  • , Xiaoyan Fu
  • *Corresponding author for this work
  • Jiangxi University of Science and Technology
  • City University of Hong Kong

Research output: Contribution to journalArticlepeer-review

Abstract

In the context of distributed systems, Byzantine fault tolerance plays a critical role in ensuring the normal operation of the system, particularly when facing with malicious nodes. However, challenges remain in enhancing the security and reliability of Byzantine fault-tolerant systems. This paper addresses these challenges by improving a Byzantine fault-tolerant approach based on stake evaluation and improved consistency hashing. We propose a method that leverages node stakes to enhance system security and reliability by allocating different trust values. Additionally, we introduce improvements to the consistency hashing technique, enabling its effective operation in a Byzantine fault-tolerant environment. By introducing redundant nodes on the hash ring to mitigate the impact of malicious nodes, we enhance system fault tolerance and scalability. Experimental results demonstrate a significant improvement in system security and performance using this approach. These findings suggest that our method holds considerable potential for widespread application in the field of Byzantine fault tolerance, supporting the development of more reliable blockchain systems.

Original languageEnglish
Pages (from-to)1963-1975
Number of pages13
JournalPeer-to-Peer Networking and Applications
Volume17
Issue number4
DOIs
StatePublished - Jul 2024

Keywords

  • Byzantine fault tolerance
  • Consistent hashing
  • Distributed systems
  • Equity assessment
  • Reliability
  • Security

Fingerprint

Dive into the research topics of 'Improving byzantine fault tolerance based on stake evaluation and consistent hashing'. Together they form a unique fingerprint.

Cite this