2EZBFT for Decentralized Oracle Consensus with Distant Smart Terminals
Abstract
1. Introduction
- (1)
- (2)
- (3)
- We implement a discrete-event simulator and present a comparative evaluation against representative flat BFT protocols.
2. Related Works
3. Two-Layer EaZy BFT Overview
3.1. Design of 2-Layer EaZy BFT
- Phase 1: Intra-group Synchronization (Algorithm 1): Each group independently generates a consensus value . This phase includes a cross-verification commitment step to prevent double-value attacks.
- Phase 2: Inter-group Linear Consensus (Algorithm 2): All group leaders who have completed intra-group synchronization submit their results to the primary leader , who aggregates and verifies all group consensus values. All valid group leaders then participate in a linear voting and signature aggregation process to finalize the global consensus.
- Oracle Data Characteristics: Oracle data from external sources (e.g., price feeds, weather data) typically have objective truth, making simple aggregation (median/majority) sufficient for conflict resolution
- Cryptographic Proof: The aggregated commitment on contains signatures from a majority of nodes, providing non-repudiation without requiring interactive voting
- Linear Complexity: Eliminates the message complexity of traditional PBFT within groups
Algorithm 1: Phase 1: intra-group synchronization. |
Algorithm 2: Phase 2: inter-group consensus (normal operation). |
Algorithm 3: Intra-group view change (Byzantine group leader detection). |
Algorithm 4: Global view change (Byzantine primary leader detection). |
Algorithm 5: Hierarchical view management and recovery protocol. |
3.2. Security and Performance Analysis
3.2.1. Security Analysis
Safety (Agreement)
Liveness (Termination)
Byzantine Fault Tolerance
- Concentrated Attack Strategy: The adversary concentrates all Byzantine nodes into a single group to corrupt its intra-group consensus. According to Lemma 1 (Intra-group Safety), compromising a group of size k requires controlling nodes, where . If the adversary’s total number of nodes , this attack cannot succeed.
- Distributed Attack Strategy: The adversary distributes Byzantine nodes across different groups and attempts to make them all group leaders to corrupt the global consensus. According to Theorem 1 (Global Safety), corrupting the global consensus requires controlling group leaders, where . If the adversary’s total number of nodes , they cannot break the global consensus even if all F nodes become group leaders.
3.2.2. Complexity Analysis
- Communication Rounds: 2EZBFT requires 7 rounds of communication in the normal case (3 for intra-group and 4 for inter-group consensus). While this is higher than the 3 rounds typical of flat BFT protocols, these rounds involve significantly fewer messages and are structured to minimize network congestion, as analyzed below.
- Message Complexity: The total number of messages per consensus instance is .
- -
- Phase 1 (Intra-group): In each of the g groups, nodes send data to the leader ( messages), the leader broadcasts a proposal ( messages), and nodes send signatures back ( messages). This totals messages.
- -
- Phase 2 (Inter-group): Group leaders send proposals to the primary ( messages), the primary broadcasts a global proposal ( messages), leaders send votes back ( messages), and the primary broadcasts the final result ( messages). This is approximately messages.
- -
- Total: The complexity is . Since , the overall message complexity is dominated by the intra-group communication, resulting in .
3.2.3. Formal Latency Analysis
4. Experimental Evaluation
4.1. Simulation Environment
4.1.1. Benchmark Algorithms
- PBFT: The foundational BFT consensus algorithm with quadratic message complexity (), representing traditional flat BFT approaches and serving as a baseline for performance comparison.
- Zyzzyva: An optimistic BFT algorithm that achieves linear complexity () under normal conditions but reverts to PBFT-like behavior under faults, allowing us to evaluate both optimistic and pessimistic execution paths.
- HotStuff: A modern, leader-based BFT protocol with linear communication complexity and streamlined view changes, representing the current flat BFT design.
4.1.2. Hardware and Software
4.1.3. Network Model
4.1.4. Node Configuration and Scalability
4.2. Simulation Implementation
4.2.1. Simulator Architecture
4.2.2. Workload Model and Scaling Modes
4.2.3. Protocol Implementation
- PBFT: Implements the complete three-phase protocol (pre-prepare, prepare, commit) with quadratic message complexity;
- Zyzzyva: Models optimistic execution with fallback to PBFT under faults;
- HotStuff: Implements the linear three-phase chain (prepare, pre-commit, commit, decide);
- 2EZBFT: Executes the two-layer protocol as described in Algorithms 1 and 2.
4.2.4. Fault Injection and Load Testing
4.2.5. Metrics Collection and Validation
4.3. Simulation Results
4.3.1. Performance vs. Network Size
- Throughput (Figure 3): As shown in Figure 3, the throughput of flat architectures like PBFT, Zyzzyva, and HotStuff degrades as the network size grows due to increased communication overhead. In contrast, 2EZBFT’s throughput scales positively, as its hierarchical structure effectively partitions the network and allows for parallel processing within groups. This demonstrates its suitability for large-scale deployments.
- Latency (Figure 4 and Figure 5): We measured latency under both low- and high-load conditions (using closed-loop clients). Under low load, 2EZBFT exhibits a modestly higher base latency because it performs seven communication rounds (three intra-group + four inter-group), whereas flat BFTs completes in three rounds. Under high load, however, flat protocols accumulate substantial queuing delay at the primary (and along all-to-all broadcasts), as the leader’s processing/broadcast capacity saturates; their latency grows super-linearly with N. In contrast, 2EZBFT partitions the offered load across groups so that most messages queue within small committees and only aggregated results traverse the inter-group layer, keeping queuing delay bounded and the latency curve flatter as N increased.
Why Do Low-Load and High-Load Latency Behave Differently?
- Round count dominates at low load. When the system is far from saturation, propagation delay per round (≈) dominates and queuing is negligible. 2EZBFT uses seven rounds (Section 4), so its base latency is roughly that of a three-round flat BFT in the same network.
- Queuing dominates at high load. As the offered load approaches component capacity, queuing delay grows super-linearly with concurrent messages M (Section 3.2.3). In flat BFTs, one leader and all-to-all broadcasts create large , causing sharp latency inflation once the primary becomes the bottleneck. 2EZBFT confines heavy traffic to groups of size k and sends only aggregated artifacts across g leaders, so the heavy-traffic terms scale with k and g rather than N; thus the queuing component remains much smaller even though 2EZBFT has more rounds.
4.3.2. Impact of Byzantine Faults on 2EZBFT
- Group Leader Faults (Figure 7): We simulated the failure of group leaders in a network with and . Figure 7 shows that latency increases more significantly with each faulty leader, as this triggers intra-group view changes. However, the system remains operational and recovers, demonstrating the effectiveness of the view change protocol.
- Primary Leader Fault (Figure 8): The most severe scenario involves the failure of the primary leader. Figure 8 illustrates the latency impact of a primary leader failure compared to normal operation across various group structures. A failure incurs a substantial but fixed-time penalty for the global view change, after which the system swiftly elects a new primary leader and resumes operation.
4.3.3. Impact of Group Structure on 2EZBFT
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Castro, M.; Liskov, B. Practical Byzantine Fault Tolerance. In Proceedings of the 3rd USENIX Symposium on Operating Systems Design and Implementation (OSDI), New Orleans, LA, USA, 22–25 February 1999. [Google Scholar]
- Kotla, R.; Alvisi, L.; Dahlin, M.; Clement, A.; Wong, E. Zyzzyva: Speculative Byzantine Fault Tolerance. In Proceedings of the ACM Symposium on Operating Systems Principles (SOSP), Stevenson, WA, USA, 14–17 October 2007. [Google Scholar]
- Yin, M.; Malkhi, D.; Reiter, M.K.; Gueta, G.G.; Abraham, I. HotStuff: BFT Consensus in the Lens of Blockchain. In Proceedings of the ACM Symposium on Principles of Distributed Computing (PODC), Toronto, ON, Canada, 29 July–2 August 2019. [Google Scholar]
- Bessani, A.; Sousa, J.; Alchieri, E.E.P. State Machine Replication for the Masses with BFT-SMaRt. In Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Atlanta, GA, USA, 23–26 June 2014. [Google Scholar]
- Gilad, Y.; Hemo, R.; Micali, S.; Vlachos, G.; Zeldovich, N. Algorand: Scaling Byzantine Agreements for Cryptocurrencies. In Proceedings of the ACM Symposium on Operating Systems Principles (SOSP), Shanghai, China, 28–31 October 2017. [Google Scholar]
- Abraham, I.; Gueta, G.; Malkhi, D.; Pinkas, B.; Reiter, M.; Seredinschi, D.A.; Tamir, O.; Tomescu, A. SBFT: A Scalable and Decentralized Trust Infrastructure. In Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Portland, OR, USA, 24–27 June 2019. [Google Scholar]
- Stathakopoulou, C.; David, T.; Vukolic, M. Mir-BFT: High-Throughput BFT for Blockchains. In Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Valencia, Spain, 29 June–2 July 2020. [Google Scholar]
- Danezis, G.; Kokoris-Kogias, E.; Sonnino, A.; Spiegelman, A. Narwhal and Tusk: A DAG-based Mempool and Efficient BFT Consensus. In Proceedings of the IEEE Symposium on Security and Privacy (S&P), Rennes, France, 5–8 April 2021. [Google Scholar]
- Dwork, C.; Lynch, N.; Stockmeyer, L. Consensus in the Presence of Partial Synchrony. J. ACM 1988, 35, 288–323. [Google Scholar] [CrossRef]
- Fischer, M.J.; Lynch, N.A.; Paterson, M.S. Impossibility of Distributed Consensus with One Faulty Process. J. ACM 1985, 32, 374–382. [Google Scholar] [CrossRef]
- IETF CFRG. Verifiable Random Functions (VRFs). RFC 9381, 2023. Available online: https://www.rfc-editor.org/rfc/rfc9381 (accessed on 27 September 2025).
- Boneh, D.; Lynn, B.; Shacham, H. Short Signatures from the Weil Pairing. J. Cryptol. 2004, 17, 297–319. [Google Scholar] [CrossRef]
- Zhang, F.; Cecchetti, E.; Croman, K.; Juels, A.; Shi, E. Town Crier: An Authenticated Data Feed for Smart Contracts. In Proceedings of the ACM Conference on Computer and Communications Security (CCS), Vienna, Austria, 24–28 October 2016. [Google Scholar]
- Chainlink. Chainlink 2.0: Next Steps in the Evolution of Decentralized Oracle Networks. 2021. Available online: https://chain.link/whitepaper (accessed on 27 September 2025).
- Kokoris-Kogias, E.; Jovanovic, P.; Gasser, L.; Gailly, N.; Syta, E.; Ford, B. Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing. In Proceedings of the USENIX Security Symposium, Austin, TX, USA, 10–12 August 2016. [Google Scholar]
- Chainlink Labs. Chainlink CCIP: Cross-Chain Interoperability Protocol. Documentation, 2025. Available online: https://docs.chain.link/ccip (accessed on 27 September 2025).
- UMA Protocol. UMA: Optimistic Oracle for Web3. Docs, 2025. Available online: https://docs.uma.xyz/ (accessed on 27 September 2025).
- API3. API3 Whitepaper v1.0. Docs, 2025. Available online: https://docs.api3.org/dapps/ (accessed on 27 September 2025).
- Kamruzzaman, M. 6G wireless communication assisted security management using cloud edge computing. Expert Syst. 2023, 40, e13061. [Google Scholar] [CrossRef]
- Su, J.; Jiang, M. A Hybrid Entropy and Blockchain Approach for Network Security Defense in SDN-Based IIoT. Chin. J. Electron. 2023, 32, 531–541. [Google Scholar] [CrossRef]
- Zhou, Z.; Onireti, O.; Zhang, L.; Imran, M.A. Slotted ALOHA Based Practical Byzantine Fault Tolerance (PBFT) Blockchain Networks: Performance Analysis and Optimization. Sensors 2024, 24, 7688. [Google Scholar] [CrossRef] [PubMed]
- Chinnasamy, P.; Babu, G.C.; Ayyasamy, R.K.; Amutha, S.; Sinha, K.; Balaram, A. Blockchain 6G-based wireless network security management with optimization using machine learning techniques. Sensors 2024, 24, 6143. [Google Scholar] [CrossRef] [PubMed]
- Di, Y.; Shi, H.; Wang, X.; Ma, R.; Liu, Y. Federated Recommender System Based on Diffusion Augmentation and Guided Denoising. ACM Trans. Inf. Syst. 2025, 43. [Google Scholar] [CrossRef]
- Buchman, E. Tendermint: Byzantine Fault Tolerance in the Age of Blockchains. Master’s Thesis, University of Guelph, Guelph, ON, Canada, 2016. [Google Scholar]
- CometBFT Maintainers. CometBFT: A CometBFT-Based BFT Consensus Engine (Formerly Tendermint Core). Project Documentation, 2025. Available online: https://docs.cometbft.com/ (accessed on 27 September 2025).
- Miller, A.; Xia, Y.; Croman, K.; Shi, E.; Song, D. The Honey Badger of BFT Protocols. In Proceedings of the ACM Conference on Computer and Communications Security (CCS), Vienna, Austria, 24–28 October 2016. [Google Scholar]
- Spiegelman, A.; Giridharan, N.; Sonnino, A.; Kokoris-Kogias, L. Bullshark: DAG BFT Protocols Made Practical. In Proceedings of the ACM Symposium on Principles of Distributed Computing (PODC), Los Angeles, CA, USA, 7–11 November 2022. [Google Scholar]
- Pass, R.; Shi, E. Thunderella: Blockchains with Optimistic Instant Confirmation. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), Tel Aviv, Israel, 29 April–3 May 2018. [Google Scholar]
- Park, S.H.; Kim, S.Y.; Kim, S.H.; Lee, I.G. Achieving High Efficiency and High Throughput in Erasure Code-Based Distributed Storage for Blockchain. Sensors 2025, 25, 2161. [Google Scholar] [CrossRef] [PubMed]
Symbol and Variable | Description |
---|---|
Aggregation function (median/majority voting) | |
Boneh–Lynn–Shacham signature scheme functions | |
Consensus value of group | |
Final global consensus value | |
Normalized reading of external variable collected by node from data source | |
Number of Byzantine group leaders | |
Number of Byzantine nodes in group i | |
g | Number of groups |
Cryptographic hash function (e.g., SHA-256) | |
Number of nodes in group | |
Group leader of group | |
Primary leader of group | |
N | Total number of nodes |
Node j in group | |
Proposal value computed by group leader | |
Global proposal, aggregated from all valid group consensus values | |
Public key of node | |
Public key of group leader | |
R | Consensus round number, prevents replay attacks by ensuring freshness |
Signature from node on the commitment message (replaces ) | |
Source certificate signature from node on | |
Signature of group leader authenticating the group’s result package | |
Secret key of node | |
Secret key of group leader | |
Aggregated commitment signature from group on | |
Aggregated source certificate from group , acting as proof of data contribution | |
t | Timestamp |
V | Global view number (for inter-group consensus) |
Group view number (for intra-group consensus in group ) |
Algorithm | Message Complexity | Communication Rounds | Latency | Leader-Validator Pattern |
---|---|---|---|---|
PBFT | 3 | Quadratic | ||
Zyzzyva | 3 (optimistic) | Linear | ||
HotStuff | 3 (pipelined) | Linear | ||
2EZBFT (Ours) | 3 + 4 | Hierarchical Linear |
From/To | Region A | Region B | Region C | Region D |
---|---|---|---|---|
Region A | 5 | 70 | 90 | 210 |
Region B | 70 | 5 | 150 | 120 |
Region C | 90 | 150 | 5 | 250 |
Region D | 210 | 120 | 250 | 5 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Cao, Y.; She, K. 2EZBFT for Decentralized Oracle Consensus with Distant Smart Terminals. Sensors 2025, 25, 6268. https://doi.org/10.3390/s25206268
Cao Y, She K. 2EZBFT for Decentralized Oracle Consensus with Distant Smart Terminals. Sensors. 2025; 25(20):6268. https://doi.org/10.3390/s25206268
Chicago/Turabian StyleCao, Yuke, and Kun She. 2025. "2EZBFT for Decentralized Oracle Consensus with Distant Smart Terminals" Sensors 25, no. 20: 6268. https://doi.org/10.3390/s25206268
APA StyleCao, Y., & She, K. (2025). 2EZBFT for Decentralized Oracle Consensus with Distant Smart Terminals. Sensors, 25(20), 6268. https://doi.org/10.3390/s25206268