# An Accelerating Approach for Blockchain Information Transmission Based on NDN

^{1}

^{2}

^{3}

^{4}

^{5}

^{*}

## Abstract

**:**

## 1. Introduction

## 2. Theoretical Support

## 3. System Model

## 4. Findings: The Accelerating Strategy

#### 4.1. Secondary Nodes

#### 4.2. The Selection Algorithm of the Secondary Nodes

#### 4.3. Information Acceleration Transmission Strategy

- Generate a topology according to the real network data. After the topology is successfully generated, the FIB table of each node is generated according to the best route routing strategy, and then run the blockchain system on each node;
- Traverse the entire network according to the FIB table, and record the data interaction path between any node i and node j.
- According to the traversal result, delete nodes and data links which do not interact with any other nodes in the network, and established a new topology network.
- Calculate the importance of each node according to the new network topology. The calculation equation refers to Equation (2) and Equation (3).
- After calculating the degree of each node, obtain a p according to the network state, and substitute the p value and the degree of each node into Equations (2) and (3) to calculate the value of importance for each node. Substitute the p value into Equations (4) and (7) to calculate the value of ${L}_{j}$.
- According to the ${L}_{j}$, an appropriate number of nodes are selected as secondary nodes to assist the blockchain network to accelerate information transmission.

Algorithms 1. Pseudocode of the specific transmission strategy. |

INPUT: network topology information |

OUTPUT: secondary nodes |

1: function Information acceleration transmission strategy |

2: Generate FIB table according to the BestRoute policy |

3: Traversing the topology path according to the FIB table |

4: For path r |

5: If (Path r is an unrelated path) |

6: Delete path r |

7: end |

8: Generate the new topology network |

9: Calculate the importance of every node in the new topology network according to Equation (2) and Equation (3) |

10: Set the value of P |

11: Calculate the ${P}_{j}$ and ${L}_{j}$ according to Equation (4) and Equation (7) |

12: Select the appropriate number of nodes as secondary nodes based on the value of ${L}_{j}$ |

13: Set these nodes as the secondary nodes |

## 5. Simulation Results and Discussions

#### 5.1. NDN Network and TCP/IP Network without Acceleration Strategy

#### 5.2. NDN Network with Acceleration Strategy

## 6. Conclusions

## Author Contributions

## Funding

## Data Availability Statement

## Conflicts of Interest

## References

- Belotti, M.; Bozic, N.; Pujolle, G.; Secci, S. A Vademecum on blockchain technologies: When, which, and how. IEEE Commun. Surv. Tutor.
**2019**, 21, 3796–3838. [Google Scholar] [CrossRef][Green Version] - Gai, K.; Guo, J.; Zhu, L.; Yu, S. Blockchain meets cloud computing: A survey. IEEE Commun. Surv. Tutor.
**2020**, 22, 2009–2030. [Google Scholar] [CrossRef] - Liu, j.; Huo, R.; Li, C.; Zou, G.; Huang, T.; Liu, Y. Information transmission mechanism of blockchain technology based on named-data networking. J. Commun.
**2018**, 39, 24–33. [Google Scholar] [CrossRef] - Zhong, G.; Javaid, H.; Saadat, H.; Xu, L.; Hu, C.; Brebner, G. FastProxy: Hardware and software acceleration of stratum mining proxy. In Proceedings of the 2019 Crypto Valley Conference on Blockchain Technology (CVCBT), Rotkreuz, Switzerland, 24–26 June 2019; pp. 73–76. [Google Scholar] [CrossRef]
- Roy, S.; Morais, F.J.A.; Salimitari, M.; Chatterjee, M. Cache attacks on blockchain based information centric networks. In Proceedings of the 20th International Conference on Distributed Computing and Networking, Association for Computing Machinery (ACM), Bangalore, India, 4–7 January 2019; pp. 134–142. [Google Scholar] [CrossRef]
- Jin, T.; Zhang, X.; Liu, Y.; Lei, K. BlockNDN: A bitcoin blockchain decentralized system over named data networking. In Proceedings of the 2017 9th International Conference on Ubiquitous and Future Networks (ICUFN), Milan, Italy, 4–7 July 2017; pp. 75–80. [Google Scholar] [CrossRef]
- Guo, J.; Wang, M.; Chen, B.; Yu, S.; Zhang, H.; Zhang, Y. Enabling blockchain applications over named data networking. In Proceedings of the ICC 2019—2019 IEEE International Conference on Communications (ICC), Shanghai, China, 20–24 May 2019; pp. 1–6. [Google Scholar] [CrossRef]
- Majed, A.-Q.; Wang, X.; Yi, B. Name lookup in named data networking: A review. Information
**2019**, 10, 85. [Google Scholar] [CrossRef][Green Version] - Kapetanidou, I.A.; Sarros, C.-A.; Tsaoussidis, V. Reputation-based trust approaches in named data networking. Future Internet
**2019**, 11, 241. [Google Scholar] [CrossRef][Green Version] - Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System. 2019. Available online: https://bitcoin.org/bitcoin.pdf (accessed on 11 February 2012).
- Kim, Y.; Kim, K.-H.; Kim, J.-H. Power trading blockchain using hyperledger fabric. In Proceedings of the 2020 International Conference on Information Networking (ICOIN), Barcelona, Spain, 7–10 January 2020; pp. 821–824. [Google Scholar] [CrossRef]
- Luo, Y.; Chen, Y.; Chen, Q.; Liang, Q. A New election algorithm for DPos consensus mechanism in blockchain. In Proceedings of the 2018 7th International Conference on Digital Home (ICDH), Guilin, China, 30 November–1 December 2018; pp. 116–120. [Google Scholar] [CrossRef]
- Qiu, C.; Yao, H.; Yu, R.; Jiang, C.; Guo, S. A Service-oriented permissioned blockchain for the internet of things. IEEE Trans. Serv. Comput.
**2019**, 13, 203–215. [Google Scholar] [CrossRef] - Zhang, L.; Afanasyev, A.; Burke, J.; Jacobson, V.; Claffy, K.; Crowley, P.; Papadopoulos, C.; Wang, L.; Zhang, B. Named data networking. ACM SIGCOMM Comput. Commun. Rev.
**2014**, 44, 66–73. [Google Scholar] [CrossRef] - Mun, J.H.; Lim, H. On sharing an FIB table in named data networking. Appl. Sci.
**2019**, 9, 3178. [Google Scholar] [CrossRef][Green Version] - Tariq, A.; Rehman, R.A.; Kim, B.-S. Forwarding strategies in NDN-based wireless networks: A survey. IEEE Commun. Surv. Tutor.
**2019**, 22, 68–95. [Google Scholar] [CrossRef] - Wang, J.; Zheng, V.W.; Liu, Z.; Chang, K.C.-C. Topological recurrent neural network for diffusion prediction. In Proceedings of the 2017 IEEE International Conference on Data Mining (ICDM), New Orleans, LA, USA, 18–21 November 2017; pp. 475–484. [Google Scholar] [CrossRef][Green Version]

**Figure 2.**The secondary nodes are generally connected to more nodes, have higher transmission capacity and communication weight and undertake more frequent data packet forwarding tasks.

**Figure 6.**Performance comparison of AITS and original algorithm under different network scales. (

**a**) in a simple network, (

**b**) in a complex network, (

**c**) in a large-scale network.

Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |

© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).

## Share and Cite

**MDPI and ACS Style**

Yang, Z.-P.; Hua, L.; Gao, N.-J.; Huo, R.; Liu, J.; Huang, T. An Accelerating Approach for Blockchain Information Transmission Based on NDN. *Future Internet* **2021**, *13*, 47.
https://doi.org/10.3390/fi13020047

**AMA Style**

Yang Z-P, Hua L, Gao N-J, Huo R, Liu J, Huang T. An Accelerating Approach for Blockchain Information Transmission Based on NDN. *Future Internet*. 2021; 13(2):47.
https://doi.org/10.3390/fi13020047

**Chicago/Turabian Style**

Yang, Zhi-Peng, Lu Hua, Ning-Jie Gao, Ru Huo, Jiang Liu, and Tao Huang. 2021. "An Accelerating Approach for Blockchain Information Transmission Based on NDN" *Future Internet* 13, no. 2: 47.
https://doi.org/10.3390/fi13020047