Next Article in Journal
Ground-Level Surface Reconstruction and Soil Volume Estimation in Construction Sites Using Marching Cubes Method
Previous Article in Journal
Non-Invasive Painting Pigment Classification Through Supervised Machine Learning
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

RE-BPFT: An Improved PBFT Consensus Algorithm for Consortium Blockchain Based on Node Credibility and ID3-Based Classification

1
School of Computer and Electronic Information, Guangxi University, Nanning 530005, China
2
School of Information Science and Technology, Hainan Normal University, Haikou 571158, China
*
Author to whom correspondence should be addressed.
Appl. Sci. 2025, 15(13), 7591; https://doi.org/10.3390/app15137591
Submission received: 28 April 2025 / Revised: 21 June 2025 / Accepted: 27 June 2025 / Published: 7 July 2025

Abstract

Practical Byzantine Fault Tolerance (PBFT) has been widely used in consortium blockchain systems; however, it suffers from performance degradation and susceptibility to Byzantine faults in complex environments. To overcome these limitations, this paper proposes RE-BPFT, an enhanced consensus algorithm that integrates a nuanced node credibility model considering direct interactions, indirect reputations, and historical behavior. Additionally, we adopt an optimized ID3 decision-tree method for node classification, dynamically identifying high-performing, trustworthy, ordinary, and malicious nodes based on real-time data. To address issues related to centralization risk in leader selection, we introduce a weighted random primary node election mechanism. We implemented a prototype of the RE-BPFT algorithm in Python and conducted extensive evaluations across diverse network scales and transaction scenarios. Experimental results indicate that RE-BPFT markedly reduces consensus latency and communication costs while achieving higher throughput and better scalability than classical PBFT, RBFT, and PPoR algorithms. Thus, RE-BPFT demonstrates significant advantages for large-scale and high-demand consortium blockchain use cases, particularly in areas like digital traceability and forensic data management. The insights gained from this study offer valuable improvements for ensuring node reliability, consensus performance, and overall system resilience.

1. Introduction

With blockchain technology maturing rapidly, consortium blockchains have emerged as a compelling hybrid solution, combining strengths from both public and private blockchain models [1]. They achieve decentralization, transparent data governance, and immutability while offering substantial benefits in privacy preservation, precise access control, and efficient resource sharing. Consequently, consortium blockchains are receiving increased attention across a diverse range of sectors.
This widespread adoption is evidenced by impactful real-world applications. For instance, in the realm of humanitarian aid, the United Nations World Food Programme’s “Building Blocks” project utilizes a consortium blockchain to securely and efficiently distribute cash assistance to refugees, significantly reducing transaction costs and enhancing transparency [2]. Similarly, driven by stringent regulations such as the U.S. Drug Supply Chain Security Act (DSCSA), the pharmaceutical industry has established consortia like MediLedger to ensure the traceability and verification of prescription drugs, combating counterfeiting and improving patient safety. In the energy sector, major players like Shell and BP have backed the VAKT platform, which leverages a consortium blockchain to streamline post-trade processing for physical energy commodities, increasing efficiency and reducing the risk of errors [3]. These examples highlight the technology’s growing role in financial institutions, governmental sectors, and academia [4].
At the heart of consortium blockchain functionality are consensus algorithms, which are essential for maintaining data consistency, system reliability, and overall security [5]. The choice and performance of these consensus mechanisms significantly impact the practical effectiveness of consortium blockchains, particularly in domains demanding high reliability, such as financial services, e-government platforms, and supply chain management systems [6]. Efficient and secure consensus processes directly influence operational continuity and user confidence.
Practical Byzantine Fault Tolerance (PBFT) has become a widely adopted consensus protocol for consortium blockchains due to its deterministic nature, rapid finality, low computational demands, and energy efficiency. PBFT ensures consensus and data verification through iterative interactions among known network nodes, making it particularly suitable for stable network environments [7]. However, the original PBFT protocol exhibits critical limitations. Firstly, as the network scales, PBFT suffers from exponential growth in message complexity and communication overhead, drastically increasing consensus latency and hindering performance in large-scale deployments. Secondly, PBFT inherently lacks an effective mechanism to dynamically evaluate and manage node credibility, making it vulnerable to malicious or underperforming nodes. This deficiency reduces proactive governance and node incentivization, compromising both performance and system security [8]. Lastly, the conventional PBFT employs a simplistic round-robin mechanism for selecting primary nodes, inadvertently causing primary node centralization risks. Prolonged dominance by a small subset of nodes can introduce security vulnerabilities and limit adaptive network management [9].
Considering these inherent limitations, there is a clear need to enhance the existing PBFT algorithm. Therefore, this study aims to tackle three crucial research questions:
  • What kind of node reputation evaluation and classification mechanism can effectively and dynamically manage node behaviors, thus boosting overall system performance and security?
  • How can the primary node selection process be refined to mitigate risks of centralization and enhance resilience against Byzantine failures?
  • What methods can practically reduce communication complexity and consensus latency when applying PBFT algorithms in large-scale networks?
To overcome these limitations, we propose an enhanced consensus algorithm called RE-BPFT, which integrates a sophisticated node reputation evaluation framework. This model comprehensively captures multiple aspects of node behavior, including direct interactions, indirect feedback, and historical performance, and leverages the ID3 decision tree approach to dynamically classify nodes based on their reliability. Moreover, we introduce a reputation-based, weighted-random mechanism for electing primary nodes, significantly reducing centralization risks and improving fault tolerance.
The main contributions of our work can be summarized as follows:
  • Development of a multi-faceted node reputation evaluation model enabling dynamic assessment and effective management of nodes.
  • Application of an optimized ID3 decision tree algorithm for precise and automated node classification.
  • Introduction of a novel weighted-random primary node election strategy to prevent centralization issues and enhance network robustness.
  • Empirical validation through extensive experiments demonstrating RE-BPFT’s superior performance over traditional algorithms (PBFT, RBFT, and PPoR) in terms of reduced communication overhead, lower consensus latency, and increased throughput.
The remainder of this paper is structured as follows. In Section 2, we critically review existing literature related to consensus mechanisms and node reputation models. Section 3 elaborates on the design principles and implementation details of our proposed RE-BPFT algorithm, highlighting both the reputation evaluation framework and the node classification methodology. Section 4 presents comprehensive experimental results, thoroughly analyzing the performance of RE-BPFT under varying conditions. Finally, Section 5 summarizes our findings and outlines potential directions for future research.

2. Related Work and Background

2.1. Consortium Blockchain Technology Overview

Blockchain technology, first introduced by Nakamoto in 2008 to support Bitcoin transactions [10], has evolved substantially with innovations like Ethereum’s smart contracts. This evolution has propelled blockchain applications beyond financial services, reaching sectors such as healthcare, supply chains, the Internet of Things (IoT), and public transportation [11]. Although public blockchains excel in decentralization and transparency, challenges in scalability, data privacy, and regulatory compliance have driven greater interest in consortium blockchains [12]. These specialized networks limit participation to selected organizations and authorized nodes, thus offering enhanced security controls, better privacy measures, and improved operational efficiency.
In practice, consortium blockchains have already shown impressive capabilities across multiple industries. For instance, financial platforms such as R3’s Corda effectively streamline inter-bank transactions and asset exchanges, enhancing security and reducing operational friction [13]. In supply chain contexts, Hyperledger Fabric has significantly improved transparency and built stronger trust among participants, resulting in increased overall efficiency [14]. Within the IoT ecosystem, Le et al. introduced BIFF, a blockchain solution emphasizing data privacy and efficient IoT management [15]. Moreover, Trofimov et al. demonstrated the feasibility of a decentralized public transportation management system based on consortium blockchain technology, utilizing smart contracts for real-time vehicle status monitoring, thereby improving safety and operational effectiveness [16].
Consequently, given their distinct advantages in security, privacy, and regulatory compliance, consortium blockchains have emerged as pivotal for broadening blockchain technology adoption across diverse sectors.

2.2. PBFT Algorithm and Its Improvements

Practical Byzantine Fault Tolerance (PBFT) is a prominent consensus mechanism widely adopted in consortium blockchain environments due to its deterministic nature, quick finality, low computational overhead, and minimal energy consumption [17]. Despite these strengths, the original PBFT protocol faces critical issues, such as excessive communication complexity, limited scalability, inadequate evaluation of node reputation, and potential centralization stemming from simplistic leader rotation schemes. In response to these shortcomings, researchers have proposed various enhancements to PBFT in recent literature. To clearly illustrate the differences among these improvements, a detailed comparative analysis is presented in Table 1.
This table clearly outlines the main innovations and corresponding advantages and disadvantages of each improved PBFT algorithm variant, providing a structured basis for the further development proposed by this research.

2.3. ID3 Decision Tree Algorithm

The ID3 (Iterative Dichotomiser 3) algorithm, proposed by Quinlan, is a widely used supervised learning approach for classification and decision-making tasks [26]. The algorithm constructs decision trees using a top-down, greedy strategy based on information entropy and information gain. It recursively partitions the dataset by selecting attributes that maximize information gain, thereby effectively minimizing decision tree complexity and enabling efficient classification. Two key metrics underpin the ID3 algorithm: information entropy and information gain. Information entropy quantifies uncertainty in a dataset and is mathematically defined as follows:
E n t r o p y   D = i = 1 m p i × log 2 p i  
where D represents the dataset, m indicates the number of distinct classes, and p i denotes the probability of class i within dataset D .
Information gain measures entropy reduction following dataset partitioning based on an attribute A , expressed as
Gain D , A = Entropy D v Values A D v D × Entropy D v  
Here, V a l u e s ( A ) is the set of all possible values for attribute A , and D v denotes the subset of dataset D where attribute A equals value v .
The ID3 algorithm exhibits several advantages, such as simplicity, interpretability, and ease of implementation, making it widely applicable in practical classification scenarios. However, it also presents limitations, including susceptibility to overfitting, especially with limited datasets having numerous attributes; necessity for discretization of continuous data; and sensitivity to noisy data, potentially reducing classification accuracy.
Due to its interpretability and efficiency, the ID3 algorithm is increasingly integrated into blockchain consensus frameworks. Particularly in consortium blockchain systems, ID3 has been effectively utilized for dynamic node reputation assessment and precise node classification, contributing significantly to enhancing consensus reliability and automation [27].

3. Improved RE-BPFT Blockchain Consensus Algorithm

3.1. Node Credit Calculation

The node credit evaluation metrics designed in this paper are divided into three categories: direct credit value, indirect credit value, and historical credit value. The direct credit value is related to the node’s voting behavior and consensus completion status; the indirect credit value is related to the node’s status in various groups and its credit ranking; while the historical credit value is related to the node’s accumulated credit value.
Definition 1.
Consensus credit C c o n . Used to evaluate the degree of consensus completion by a node. The consensus credit i of node C c o n i  is calculated by the following formula:
C con i = N u m c i T N u m c i + ε
Here,   N u m c i   denotes how many times node i has successfully reached consensus, while T N u m c i   represents the total consensus rounds in which node i participated. The parameter ε Varepsilon ε is introduced as an infinitesimally small positive value to avoid division by zero. The capability of nodes to successfully achieve consensus serves as the primary criterion for evaluating node reliability. Consequently, successful consensus participation significantly affects the node’s credibility assessment, being assigned the greatest importance among evaluation metrics. Simply put, nodes gain higher credibility scores as they achieve consensus successfully more frequently. This mechanism allows nodes within the master node group to sustain their positions over extended periods while simultaneously motivating nodes in the consensus group to enhance their performance and seek advancement to the master node group, thus enabling their participation in subsequent master node elections.
Definition 2.
Voting credit C v o t . This metric evaluates how effectively a node completes voting tasks. The voting credit C v o t i for node i  is computed using the formula below:
C vot i = N u m v i T N u m v i + ε
Here, N u m v i indicates the count of successful voting completions by node i , while T N u m v i  represents the total voting rounds node  i participated in. Notably, a higher number of successful voting completions results in a greater voting credit score. Such a credit mechanism effectively motivates nodes in the consensus group to proactively engage in voting, thereby boosting their credibility and creating opportunities to advance into the master node group. Similarly, observer nodes can also leverage active participation in voting processes to join the consensus group, gaining enhanced privileges within the network.
Definition 3.
Direct credit value C d i r . This metric assesses the behavioral performance of a node during the consensus activities. Specifically, the primary actions influencing this evaluation are the node’s participation in achieving consensus and engaging in voting procedures. Thus, the direct credit value of a node is obtained by calculating a weighted combination of its consensus credit and voting credit scores. The direct credit value C d i r i     for node i  is formulated as follows:
C dir i = λ × C con i + μ × C vot i
where λ is the weight of consensus credit, μ is the weight of voting credit, which should be flexibly set according to system policies. These two weights satisfy λ + μ = 1 .
Definition 4.
Activity credit C a c t . Used to calculate the activity level of node i  during the consensus process, assigning higher weights to recently participated behaviors. It combines the node’s performance across different rounds with a time decay factor through weighted averaging to compute the node’s activity credit. The activity credit C a c t i of node i  is calculated by the following formula:
C act i = r = 1 R γ × G M i ( r ) + ( 1 γ ) × G C i ( r ) × e λ ( R r ) r = 1 R e λ ( R r )
Here, R represents the total number of consensus rounds the current system is in, r denotes the index from historical round 1 to round R . G M i ( r ) indicates whether node i serves as the primary node in round r (1 if yes, 0 otherwise); G C i ( r ) shows whether node i is a consensus node in round r (1 if yes, 0 otherwise). γ represents the weight coefficient for the primary node’s participation, reflecting its importance in consensus, with a value range of (0.5, 1). e λ ( R r ) is the time decay factor, which attenuates participation behavior in round r , giving higher weight to recent actions.
Definition 5.
Incentive credit value C i n c . The incentive credit evaluation aims to motivate low-credit nodes to work actively, hence it correlates with node credit rankings. The incentive credit value C i n c i     of node i is calculated by the following formula:
C inc i = C min + ( C max C min ) × 1 e a × C rank i 1 n 1
Here, n is the total number of nodes currently participating in consensus, C r a n k i represents the ranking of node i , with a value range of [ 1 ,   n ] . a is the exponential decay factor, controlling the rate of incentive reduction. The parameter a can be adjusted based on the total number of nodes, system volatility, or the desired incentive curve. This formula ensures excellent boundary controllability. Specifically, when node i ranks first in credit ( C r a n k i = 1 ) in the current round, the exponential term becomes e 0 = 1 , resulting in C i n c i C m i n ; when the node ranks last ( C r a n k i = n ), the exponential term approaches 0, leading to C i n c i C max . Thus, the formula guarantees that the incentive value always stays within the preset interval and provides explicit control over boundary behaviors.
Definition 6.
Indirect credit value C i d i r . The indirect credit value indirectly assesses a node’s behavior in consensus activities by rewarding nodes with consistent high performance over time and encouraging nodes with lower credit scores to enhance their involvement. This metric is calculated as a weighted combination of active credit and incentive credit values. Specifically, the indirect credit value C i d i r i of node i is determined by the formula below:
C idir i = α × C act i + β × C inc i
In this formula, α denotes the weight assigned to active credit, and β denotes the weight assigned to incentive credit, with the constraint that α + β = 1 .
Definition 7.
Historical credit value C h i s . The historical credit value measures the consistency and stability of a node’s long-term behavior, employing a moving average strategy. The indirect credit value C h i s i of node i is calculated by the following formula:
C his i = 1 T × t = 1 T C i ( t )
where C i ( t ) represents the comprehensive score in round t , and T is the sliding window size.
Definition 8.
Comprehensive credit value C . The comprehensive credit value represents an integrated assessment of a node’s performance by considering direct, indirect, and historical behaviors. Its main purpose is to provide credit rewards to consistently reliable nodes while imposing credit deductions on nodes demonstrating malicious or detrimental actions. Specifically, this comprehensive metric combines direct credit, indirect credit, and historical credit values, each assigned distinct weights. The comprehensive credit value C i for node i is calculated as follows:
C i = β 1 × C dir i + β 2 × C idir i + β 3 × C his i , N o r m a l   N o d e 1 2 × C his i , M a l i c i o u s   N o d e
where β 1 controls the influence of a node’s immediate behavior in the comprehensive score, β 2 reflects the importance of trend-based participation behavior, β 3 measures the contribution ratio of long-term stability, and β 1 , β 2 , β 3 satisfies β 1 + β 2 + β 3 = 1 . For example, in dynamic network environments that require higher participation, β 1 ,   β 2 ,   β 3 can be set to strengthen the selection priority of “immediate response” nodes, while in government scenarios emphasizing long-term trust and stability, the weight of β 3 can be increased.
Definition 9.
Credit value normalization. After calculating the comprehensive credit value, data normalization is applied to confine it within the range of [ 0 , 1 ] . The normalization result is
C ^ i = C i min T ( C ) max T ( C ) min T ( C ) + ε
Here, m a x T   ( C ) represents the maximum comprehensive credit value of nodes in each consensus round, m i n T   ( C ) represents the minimum comprehensive credit value, and ε is a tiny constant to prevent division by zero.
Typically, by dynamically adjusting the values of   λ ,   μ ,   α ,   β and η , the direct credit value, indirect credit value, and historical credit value can be regulated. Additionally, it must be noted that each weight must satisfy   λ + μ + α + β + η = 1 and   λ + μ > α + β , where λ is the maximum weight. The explanation of each credit evaluation index is shown in Table 2 and Table 3.

3.2. Node Classification

Decision trees exhibit strong interpretability, adaptability, automatic feature selection, robustness, and computational efficiency in machine learning, making them well-suited for node classification tasks within consortium blockchain environments. Among various decision tree algorithms, the ID3 algorithm is commonly employed for solving classification problems in machine learning and data mining. It builds decision trees by recursively choosing optimal features to divide datasets. Central to the ID3 algorithm is its use of information gain, derived from entropy—a measure of uncertainty in datasets—as the primary feature-selection criterion. By continuously choosing features that maximize information gain, the algorithm quickly reduces the uncertainty within the data.
Incorporating the ID3 decision tree algorithm into node classification processes for consortium blockchain consensus significantly enhances model interpretability. The algorithm clearly visualizes decision-making rules, facilitating the transparency and explainability of the classification process, which is especially beneficial in consortium blockchain applications that require traceability. Furthermore, ID3 efficiently manages discrete feature sets, which commonly appear in consortium blockchain consensus systems. It can also handle datasets containing missing values, thereby enabling effective classification despite incomplete node information. Finally, the algorithm’s low computational overhead and rapid execution capabilities make ID3 particularly advantageous for classifying nodes in consortium blockchain consensus scenarios.
Thus, the ID3 decision tree algorithm possesses distinct advantages over alternative node classification approaches employed in blockchain consensus algorithms. Unlike the K-Nearest Neighbors (KNN) method, ID3 effectively processes discrete attributes and generates decision trees with superior interpretability. In comparison to Support Vector Machines (SVM), ID3 has significantly lower computational demands, while SVM necessitates complicated parameter adjustments and kernel function selections. Additionally, compared with neural network methods, ID3 does not require extensive training datasets or iterative training cycles, making it easier to deploy and more intuitive to interpret. Utilizing the ID3 decision tree algorithm for node classification in consortium blockchain consensus systems offers substantial benefits, including excellent interpretability, efficient handling of discrete features and missing data, and rapid computational performance. These advantages contribute positively to the security and reliability of consensus mechanisms.
Within the enhanced RE-PBFT consensus approach, this paper integrates a decision tree-based classification algorithm. After every consensus round, nodes are categorized into “excellent”, “good”, “average”, or “malicious” classes according to their comprehensive credit values. Initially, the consortium blockchain aggregates and organizes node attribute information. Subsequently, a primary node election is conducted via a view-change mechanism, concurrently validating nodes throughout this process. Finally, nodes exhibiting problematic behaviors are identified and removed. Excluded Byzantine nodes lose their eligibility to participate in subsequent consensus rounds, and their readmission requires explicit approval from consortium blockchain administrators. To further improve node classification discrimination and reinforce security control in dynamic consortium blockchain environments, this research systematically refines the information entropy and information gain calculations inherent in the traditional ID3 algorithm. The detailed implementation process is presented in Algorithm 1.
Algorithm 1: ID3 Decision Tree-Based Consortium Blockchain Node Classification Algorithm
Input :   Node   set   D = { d 1   , d 2   , , d n   } ,   Information   gain   threshold   T i g ,   Initial   reputation   value   C i n i t    
Output: Classified node sets: Excellent node set D e x c e l l e n t , Good node set D g o o d , Normal node set D o r d i n a r y , Malicious node set D M a l i c i o u s
1. Initialize node attribute sets: Reputation score C r e d i t i , Continuous consensus count C o n s e c u t i v e i , Downtime countDowntime D o w n t i m e i , Communication error count E r r o r i , Node activity level A c t i v i t y i
2. Create decision tree training dataset D a t a s e t
3. for each node d i D  do
4.     Calculate node d i s   reputation   score   C r e d i t i , continuous consensus count C o n s e c u t i v e i , downtime count D o w n t i m e i , communication error count E r r o r i , activity level A c t i v i t y i
5.     Extract node features and add to D a t a s e t
6. end for
7. Calculate information entropy I E ( S ) of each attribute based on dataset D a t a s e t
8. Calculate information gain I G ( S , T ) of each attribute according to formula
9. if maximum information gain I G m a x T i g  then
10. Partition dataset using attribute with maximum information gain to construct decision tree
11. Predict the category of each node based on the decision tree model
12.     if the node category is ‘Excellent’ then
13.         add the node to D e x c e l l e n t
14.     else if the node category is ‘Good’ then
15.         add the node to D g o o d  
16.     else if the node category is ‘Average’ then
17.         add the node to D o r d i n a r y
18.     else
19.         add the node to D M a l i c i o u s
20.     end if
21. else
22.     Output warning: “Unable to effectively classify, insufficient information gain”
23. end if
24. Return the classified node set ( D e x c e l l e n t   , D g o o d   , D o r d i n a r y   , D M a l i c i o u s   )
The decision tree construction process begins by calculating the information entropy, which measures the uniformity of sample categorization within a dataset. Suppose the probabilities that samples in the current training set belong to the categories of excellent, good, ordinary, and malicious nodes are denoted as P1, P2, P3, and P4, respectively; the entropy of category information derived from the training dataset is expressed as shown in Formula (12).
I E ( S ) = i = 1 n ( w i × P i + ϵ ) log 2 ( w i × P i + ϵ )
Here, n represents the number of categories, w i denotes the importance weight of the i-th category node in the system, and w i   = 1 . ϵ is a smoothing factor to prevent log 0 , typically set to ϵ = 10 6 . The introduction of category weight w i and smoothing factor ϵ addresses the imbalance in information entropy calculation under scenarios like rare malicious nodes, thereby enhancing the sensitivity of malicious node identification.
Next, the algorithm calculates the information gain, reflecting how much uncertainty in the data is reduced. Within the training dataset, an attribute feature vector T is selected to divide the sample set. The chosen attribute vector T includes five distinct features: the node’s comprehensive credit score, number of consecutive consensus attempts, number of downtime events, number of faulty communication occurrences, and the overall activity level of the node. The method for computing the information gain obtained from splitting the sample set S based on attribute feature vector T is illustrated in Formula (13).
I G ( S , T ) = I E ( S ) v = 1 m | S v | | S | I E ( S v ) α × | T v | | T |
Here, S represents the current sample set, S v denotes the subset corresponding to the v -th value of attribute T , and | S v | and | S | are the sample counts of the subset and the full set, respectively. Information gain measures the change in uncertainty of the sample set before and after attribute partitioning. To avoid bias toward multi-value attributes, this paper introduces a structural penalty term in the information gain calculation, enhancing the algorithm’s robustness in handling high-dimensional discrete features.

3.3. Consensus Protocol

RE-PBFT retains all phases of PBFT while eliminating communication between network nodes, thereby reducing bandwidth usage. The algorithm selects normal or higher-tier nodes as consensus participants to ensure system reliability and security. The consensus protocol flow is illustrated in Figure 1.
In the request phase, client C sends a consensus request message < R E Q U E S T , M , t , C I D , S i g n C > to the current primary node P N . The message includes the pending state machine operation M , current timestamp t , and client identifier C I D . After validating the request, the primary node proceeds to the next phase.
In the pre-prepare phase, the primary node assigns a unique sequence number N to the client request and computes its digest D I G E S T = H a s h ( M ) . Simultaneously, it calculates a credit value C R E D I T P N based on the node reputation scoring model, then generates a hash: O U T C O M E = H a s h ( C R E D I T P N ) . The primary node then constructs and broadcasts a pre-prepare message to all consensus nodes: < P R E - P R E P A R E , V , N , D I G E S T , O U T C O M E , C R E D I T P N , M > , where V is the current view number and M contains the client request. Recording OUTCOME enables traceability and consistency verification of consensus behavior in subsequent phases.
During the preparation phase, after receiving the pre-prepare message from the primary node, the consensus nodes first verify the integrity and consistency of the message, including the view number, digest, reputation score, etc. If the verification passes, the consensus node generates a prepare message and broadcasts it to other consensus nodes. The message format is < P R E P A R E , V , N , D I G E S T , i , C R E D I T i   > , where i is the identifier of the sending consensus node, and CREDIT i is its current reputation score. After receiving the PREPARE messages from other consensus nodes, if the number of valid PREPARE messages exceeds 2 f (where f is the maximum number of Byzantine nodes tolerated by the system), the primary node considers the preparation phase successful and proceeds to the commit phase. If the number is insufficient, the primary node triggers the View Change protocol, transferring its authority to the newly elected node with the highest reputation, and broadcasts a failure message: < V I E W C H A N G E , V + 1 , r e a s o n > . The original primary node is then demoted to a regular node, losing its leadership in subsequent consensus rounds.
During the commit phase, after the preparation phase is completed, the primary node performs a consistency check on all received prepare messages. If all messages are consistent, it generates a commit message and broadcasts: < C O M M I T , V , N , D I G E S T , C O N F I R M > . Upon receiving the COMMIT message, the consensus nodes perform final confirmation and submit the new block generated by the request to their local ledger. Subsequently, the primary node sends the transaction processing result to the client, indicating the completion of the current consensus round. If more than f consensus nodes submit prepare messages inconsistent with the primary node during this phase, the system determines that consensus has not been reached and triggers the demotion and penalty mechanism:
(1)
All consensus nodes with inconsistencies will have their reputation scores deducted;
(2)
If the number of dissenting nodes f + 1 the current primary node will also be demoted, and the consensus process will be restarted.

3.4. View Change Protocol

To ensure system continuity and consistency when primary node P N fails, this paper designs a view change protocol incorporating a reputation scoring mechanism. The view change process is triggered when any of the following abnormal conditions occurs in the primary node:
(1)
Fails to receive at least 2 f + 1 valid PREPARE messages within timeout period T 1 ;
(2)
Fails to successfully package and broadcast new block ( T 2 > T 1 ) within maximum tolerance time T 2 .
To prevent Byzantine primary nodes from repeatedly disrupting consensus, the system adopts a reputation-weighted primary node election strategy during view changes. Specifically, the system selects highly reputable and active nodes from the “excellent node set” excel as candidate primary nodes. The new primary node election no longer uses simple modulo rotation logic but introduces weighted randomness to prevent “oligarch nodes” from dominating the system long-term. The improved primary node selection formula is as follows:
p r i m = a r g m a x i e x c e l c r e d i t i r a n d i
where credit i represents the current reputation score of candidate node i , and r a n d i ( 0 , 1 ) is a pseudo-random factor generated based on system seed. This strategy introduces a degree of randomness while maintaining reputation priority, effectively mitigating the issue of high-reputation nodes monopolizing the primary node role. The detailed algorithm is presented in Algorithm 2.
Algorithm 2: Consensus Protocol Algorithm
Input: Client request message m s g , view number v , node set N , system fault tolerance node count f
Output: Client response result, node ledger update
1. The client sends a consensus request m s g (containing operation, timestamp, client identifier) to the primary node P N //Client request phase
2. The primary node P N  assigns a number to m s g and calculates the digest d D i g e s t ( m s g )
3. Calculate the primary node’s reputation value c r e d i t P N and generate the hash digest O U T C O M E H a s h ( c r e d i t P N × r a n d P N )
4. Construct the pre-prepare message M p r e p r e p a r e ( v , d , m s g , O U T C O M E )
5.  P N broadcasts M p r e p r e p a r e to all consensus nodes
6. for each consensus node n i N  do//Consensus node preparation phase
7.       Verify   M p r e p r e p a r e (validate v , d ,   O U T C O M E )
8.     if verification passes then
9.       Calculate local reputation value c r e d i t i ,   construct   M p r e p a r e ( v , d , O U T C O M E , c r e d i t i )
10.       Broadcast   M p r e p a r e to other consensus nodes
11.    end if
12. end for
13.  Master   node   P N   collects   M p r e p a r e   message   set   S p r e p a r e Master node collects prepare messages
14. If  | S p r e p a r e | 2 f + 1  then
15.       if   all   M p r e p a r e contents are consistent then
16.        Construct   confirmation   message   M c o m m i t ( v , d )
17.        P N   broadcasts   M c o m m i t to consensus nodes
18.   else
19.          Mark   conflicting   nodes   and   execute   penalty   c r e d i t i
20.           if   number   of   dissenting   nodes   f + 1  then
21.               P N is demoted; triggers view change
22.         end if
23.    end if
24. else
25.      Insufficient   preparation   messages ,   P N was demoted, triggering view change
26.     Elect   new   primary   node   from   excellent   nodes   based   on   c r e d i t × r a n d
27. end if
28. for each   consensus   node   n i N  do//Block commit phase
29.      if   received   valid   and   consistent   M c o m m i t  then
30.           Commit new block to local ledger
31.   end if
32. end for
33.  Primary   node   P N returns transaction processing result to client, ending consensus process//Client feedback phase

4. Experimental Verification and Analysis

To evaluate the performance of the proposed improved RE-PBFT consensus algorithm, a consortium blockchain system was constructed and simulated using Python 3.9 on a computer equipped with an Intel Core i5-10400 processor, 16 GB RAM, and Windows 10 operating system. The experiment compared RE-PBFT against classical PBFT [17], RBFT [28], and PPoR [29] across three key performance metrics: communication overhead, system throughput, and transaction latency. To reflect realistic transaction behaviors in large-scale consortium blockchain applications, particularly traceability scenarios, the experiment simulated transaction data across multiple business phases. Scalability tests were conducted by increasing the number of nodes in the system from 10 to 60. All nodes were initially assigned a trust value of 70. After system startup, clients submitted a total of 200 transaction request sets to the network. Each experimental configuration was repeated 20 times, and the average results were recorded as the final performance data. Detailed hardware and software experimental settings are provided in Table 4.
In this experiment, the system’s throughput was determined by counting the transactions successfully completed. The metric “transactions per second” (TPS) was used to quantify throughput performance. By gradually increasing concurrent transaction volumes and recording the number of transactions processed successfully per unit of time, the system’s overall throughput was measured. Transaction latency was assessed by logging the interval between transaction initiation and final execution confirmation. Various transaction concurrency scenarios were simulated, and the execution time for each transaction was captured, enabling the calculation of average transaction latency. To examine the communication overhead, we recorded the number and size of messages exchanged between nodes during the consensus process. Node communications were monitored throughout the experiment, with message counts logged and analyzed, providing insight into the communication overhead incurred by the system.

4.1. Consensus Latency

Consensus Latency (CL) is a critical performance metric for consensus mechanisms, typically representing the time required for a blockchain network to confirm a transaction after its initiation. A lower CL indicates higher consensus efficiency in a blockchain system. We define the period from the selection of consensus nodes to the completion of transaction confirmation as C L . The calculation formula for C L is as follows:
C L = T c T r
Here, T c denotes confirmation time, and T r represents initiation time. To comprehensively evaluate the CL of different consensus mechanisms, we measured the CL under varying node counts with transaction sizes of 1, 10, 50, and 100 KB. For clearer experimental presentation, single transactions of different sizes were used to measure CL. Figure 2 displays the CL of PBFT, RBFT, and PPoR under different experimental conditions. When the number of consensus nodes and transaction size were identical, RE-PBFT demonstrated significantly lower latency than PBFT and RBFT, outperforming PPoR as well. As shown in Figure 2, while the node count increased from 10 to 60, RE-PBFT consistently maintained a low latency level, whereas PBFT’s Consensus Latency (CL) rose sharply with the growing number of nodes. The graph reveals that when the network node count exceeded 30, both PBFT and RBFT exhibited notable upward trends in CL, while RE-PBFT’s CL increased more gradually, showing relative stability and stronger scalability. For instance, with a transaction size of 100 KB and 60 nodes, PBFT’s CL reached 164.2 ms, whereas RE-PBFT’s CL was only 71.6 ms—a reduction of approximately 56.4%, highlighting its exceptional latency control capability. Moreover, as transaction size grew from 1 KB to 100 KB, PBFT’s CL increased significantly, while RE-PBFT consistently maintained the lowest latency across all transaction sizes, demonstrating superior handling capacity for large transactions. In conclusion, RE-PBFT efficiently achieves consensus even in complex environments with numerous nodes and large transaction data, proving its superior latency performance and scalability in large-scale blockchain systems.
Figure 3 shows the box plot of consensus latency obtained from 20 independent experiments conducted by four consensus algorithms in a consortium blockchain scenario with a transaction size of 100 KB and node counts ranging from 10 to 60. As observed, the latency of the PBFT algorithm increases most significantly with the growth of node count, exhibiting a wide distribution range and certain volatility. RBFT shows improvement over PBFT in terms of overall latency and volatility but still demonstrates some instability. The PPoR algorithm maintains good stability and low latency under most node scales. The proposed RE-PBFT algorithm achieves the lowest mean latency and smallest fluctuation range across all node scales, demonstrating superior consensus efficiency and stability. Overall, RE-PBFT exhibits stronger performance robustness and scalability compared with other algorithms when handling large-scale transaction loads and node growth.

4.2. Throughput Testing

A series of comparative experiments was conducted to evaluate the throughput performance of RE-PBFT against the traditional PBFT, RBFT, and PPoR algorithms, considering different node scales. Throughput, defined as the number of consensus requests a system can handle within a specific timeframe, indicates the processing capability of the consensus algorithm and overall system capacity. Higher throughput suggests greater efficiency in handling requests or transactions. In these tests, node counts in the consortium blockchain were incrementally raised from 10 to 60. For each scenario, the average throughput of all four algorithms was collected and analyzed.
Figure 4 illustrates the throughput variations of PBFT, RBFT, PPoR, and the proposed RE-PBFT as the number of nodes in the network increases. The x-axis values in Figure 4 represent the number of network nodes, while the y-axis values denote the network throughput. The results indicate that under identical experimental conditions, RE-PBFT demonstrates overall superior throughput compared with the other three algorithms. With an initial node count of 10, RE-PBFT achieves a throughput of 850 TPS, slightly higher than PPoR (840 TPS) and significantly surpassing PBFT (820 TPS) and RBFT (830 TPS). As the number of nodes increases from 10 to 60, all algorithms exhibit a declining throughput trend, albeit with varying degrees of reduction. Among them, PBFT experiences the fastest throughput drop, decreasing from 820 to 300 TPS, making it the weakest performer. In contrast, RE-PBFT demonstrates strong stability throughout the node expansion process, with the smallest throughput decline, ultimately maintaining 380 TPS—slightly higher than PPoR (370 TPS) and notably superior to RBFT (320 TPS) and PBFT (300 TPS).
The experimental results demonstrate that RE-PBFT not only achieves higher throughput when fewer nodes are involved but also exhibits outstanding scalability as the number of nodes increases. These findings imply that the RE-PBFT algorithm offers superior concurrent processing and consensus efficiency, making it highly suitable for large-scale blockchain environments that require high throughput. The notable throughput improvements of RE-PBFT can be attributed primarily to the optimized reputation evaluation strategy, which reduces unnecessary message exchanges and improves verification efficiency. Additionally, simplifications within the enhanced consensus mechanism contribute to quicker consensus decisions, further elevating throughput performance.

4.3. Communication Overhead Testing

In terms of communication load, this section presents comparative experimental results for PBFT, RBFT, PPoR, and the proposed RE-PBFT algorithm. Through multiple experiments under varying operational scenarios, communication overhead was evaluated. By adjusting node numbers within the consortium blockchain, network traffic generated during the consensus process was measured. Communication overhead—the resource and cost expenditure associated with message transmissions and inter-node communications—was employed as a crucial indicator for consensus algorithm efficiency. A lower communication overhead indicates a more efficient consensus protocol, reducing network load and resource usage. Specifically, message counts transmitted throughout the algorithm execution were recorded and compared across the different consensus methods.
Figure 5 illustrates the trend of communication overhead changes for four consensus algorithms as the number of system nodes gradually increases. The x-axis represents the number of nodes in the network, while the y-axis denotes the communication overhead. Experimental results demonstrate that RE-PBFT consistently exhibits significantly lower communication overhead than other comparative algorithms across all node counts, reflecting higher communication efficiency. When the number of nodes is small (e.g., 10 or 20), the communication overhead differences among algorithms are minimal. However, as the node count increases, PBFT and RBFT show rapid upward trends in communication overhead, with PBFT displaying the most pronounced growth. At 60 nodes, PBFT’s communication overhead reaches 6480 instances, whereas RE-PBFT requires only 1880 instances—a reduction of approximately 70.99%. Similarly, RBFT and PPoR exhibit communication overheads of 4900 and 3550, respectively, at 60 nodes, compared with which RE-PBFT reduces communication load by 61.63% and 47.04%. These data indicate that RE-PBFT effectively decreases the frequency of message exchanges between nodes, significantly lowering system communication costs while maintaining consensus efficiency, with particularly notable advantages in large-scale network environments.
The improved communication efficiency observed in RE-PBFT largely arises from refinements to the underlying consensus protocol, reducing communication redundancy in practical operations. Minimizing communication load is essential for large-scale consortium blockchain deployments, as it alleviates network congestion, reduces bandwidth demands, and enhances overall resource efficiency. All experimental data verify RE-PBFT’s advantage in communication load performance. The reduced communication requirements make RE-PBFT especially suitable for applications emphasizing efficient network resource utilization.
Overall experimental outcomes highlight that RE-PBFT demonstrates strong adaptability and reliability, particularly in highly dynamic network conditions or in scenarios requiring stringent system reliability, such as traceability applications in large-scale consortium environments. The node credit assessment mechanism incorporated within RE-PBFT comprehensively integrates factors like node performance, consensus participation stability, and node behavior, dynamically reflecting node trustworthiness. Consequently, RE-PBFT adeptly accommodates frequent changes in node states and sustains efficient consensus operations in fluctuating network conditions. Furthermore, the introduced node credit evaluation framework and decision tree classification algorithm effectively mitigate risks associated with Byzantine nodes, significantly bolstering system reliability and security.

5. Conclusions

In this research, we introduced RE-PBFT, an enhanced consensus protocol designed with a sophisticated node credit assessment framework and an optimized decision-tree classification method. The algorithm dynamically evaluates node behaviors, accurately identifying and selecting trustworthy nodes to prevent Byzantine failures. This strategy significantly cuts down the number of messages and associated communication costs required to reach a consensus. Experimental results indicate that the proposed RE-PBFT method notably surpasses existing algorithms such as PBFT, RBFT, and PPoR, delivering substantial improvements in system throughput, reducing transaction latency, and decreasing communication overhead.
Although RE-PBFT exhibits strong resilience against Byzantine node behaviors, its capability to address other fault scenarios, such as crash faults or latency-related issues, remains limited. Therefore, future studies will explore additional strategies to handle diverse fault conditions, aiming to further enhance the robustness and fault tolerance of the system. Moreover, ongoing refinement of the proposed algorithm and its practical application across broader scenarios will be pursued to ensure more reliable and efficient distributed consensus.

Author Contributions

Conceptualization, X.W. and J.D.; methodology, J.D.; software, J.T.; validation, X.W., J.D. and Y.L.; formal analysis, J.D.; investigation, Y.L.; resources, X.W.; data curation, J.T.; writing—original draft preparation, J.D.; writing—review and editing, J.D.; visualization, Y.L.; supervision, X.W.; project administration, X.W.; funding acquisition, X.W. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the National Natural Science Foundation of China (62462029, 62062006), and the Natural Science Basis Research Plan in Hainan Province of China (625RC758).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The raw data supporting the conclusions of this article will be made available by the authors on request.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Chen, X.; He, S.; Sun, L.; Zheng, Y.; Wu, C.Q. A Survey of Consortium Blockchain and Its Applications. Cryptography 2024, 8, 12. [Google Scholar] [CrossRef]
  2. World Food Programme. WFP Building Blocks | WFP Innovation. Available online: https://innovation.wfp.org/project/building-blocks (accessed on 14 June 2024).
  3. VAKT. VAKT: The Post-Trade Processing Platform for Physical Energy Commodities. Available online: https://www.vakt.com/ (accessed on 14 June 2024).
  4. Xu, G.; Bai, H.; Lu, W.; Xu, S. A Survey on Consensus Algorithms for Consortium Blockchain. Cybersecurity 2023, 6, 15. [Google Scholar]
  5. Yuan, F.; Huang, X.; Zheng, L.; Wang, L.; Wang, Y.; Yan, X.; Gu, S.; Peng, Y. The Evolution and Optimization Strategies of a PBFT Consensus Algorithm for Consortium Blockchains. Information 2025, 16, 268. [Google Scholar] [CrossRef]
  6. Khan, I.; Ali, Q.E.; Hadi, H.J.; Ahmad, N.; Ali, G.; Cao, Y.; Alshara, M.A. Securing Blockchain-Based Supply Chain Management: Textual Data Encryption and Access Control. Technologies 2024, 12, 110. [Google Scholar] [CrossRef]
  7. Castro, M.; Liskov, B. Practical Byzantine Fault Tolerance and Proactive Recovery. ACM Trans. Comput. Syst. 2002, 20, 398–461. [Google Scholar] [CrossRef]
  8. Wu, X.; Jiang, W.; Song, M.; Jia, Z.; Qin, J. An Efficient Sharding Consensus Algorithm for Consortium Chains. Sci. Rep. 2023, 13, 20. [Google Scholar] [CrossRef]
  9. Liu, X.; Zhu, J. An Improved Practical Byzantine Fault Tolerance Algorithm for Aggregating Node Preferences. Sci. Rep. 2024, 14, 31200. [Google Scholar] [CrossRef]
  10. Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System. 2008. pp. 1–9. Available online: https://bitcoin.org/bitcoin.pdf (accessed on 15 September 2022).
  11. Wu, H.; Yao, Q.; Liu, Z.; Huang, B.; Zhuang, Y.; Tang, H.; Liu, E. Blockchain for Finance: A Survey. IET Blockchain 2024, 4, 101–123. [Google Scholar] [CrossRef]
  12. Shakila, M.; Rama, A.; Christy, S.; Kanakala, A.; Lau, C.Y. Hyperledger Fabric and Beyond: A Comprehensive Review of Blockchain Innovations in Supply Chain. AIP Conf. Proc. 2024, 3161, 020306. [Google Scholar]
  13. Han, H.; Shiwakoti, R.K.; Chen, W. Unlocking Enterprise Blockchain Adoption: A R3 Corda Case Study. J. Gen. Manag. 2024, 50, 03063070241292701. [Google Scholar] [CrossRef]
  14. Androulaki, E.; Barger, A.; Bortnikov, V.; Cachin, C.; Christidis, K.; De Caro, A.; Enyeart, D.; Ferris, C.; Laventman, G.; Manevich, Y.; et al. Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains. Proc. EuroSys 2018, 30, 1–15. [Google Scholar]
  15. Le, D.-P.; Meng, H.; Su, L.; Yeo, S.L.; Thing, V. BIFF: A Blockchain-Based IoT Forensics Framework with Identity Privacy. In Proceedings of the TENCON 2018—IEEE Region 10 Conference, Jeju, Republic of Korea, 28–31 October 2018; pp. 2372–2377. [Google Scholar]
  16. Trofimov, S.; Voskov, L.; Komarov, M. Decentralized Public Transport Management System Based on Blockchain Technology. Appl. Sci. 2025, 15, 1348. [Google Scholar] [CrossRef]
  17. Castro, M.; Liskov, B. Practical Byzantine Fault Tolerance. In Proceedings of the Third Symposium on Operating Systems Design and Implementation, New Orleans, LA, USA, 22–25 February 1999. [Google Scholar]
  18. Ren, X.; Tong, X.; Zhang, W. Improved PBFT Consensus Algorithm Based on Node Role Division. J. Comput. Commun. 2023, 11, 20–38. [Google Scholar] [CrossRef]
  19. Liu, S.; Zhang, R.; Liu, C.; Xu, C.; Wang, J. An Improved PBFT Consensus Algorithm Based on Grouping and Credit Grading. Sci. Rep. 2023, 13, 13030. [Google Scholar] [CrossRef]
  20. Hussain, M.; Mehmood, A.; Khan, M.A.; Lloret, J.; Maple, C. Performance Optimized Leader Selection Consensus Algorithm for Consortium Blockchain Using Trust Values of Nodes. In Proceedings of the International Conference on Cooperative Design, Visualization and Engineering, Hangzhou, China, 22–25 October 2023; pp. 253–264. [Google Scholar]
  21. Gao, S.; Yang, G.; Li, M.; Zhang, L. A Secure and Highly Efficient Blockchain PBFT Consensus Algorithm for Microgrid Electricity Transactions. PeerJ Comput. Sci. 2023, 9, e1100. [Google Scholar]
  22. Chen, Y.; Li, X.; Zhang, H. An Improved Algorithm for Practical Byzantine Fault Tolerance to Large-Scale Consortium Chain. Inf. Process. Manag. 2022, 59, 102884. [Google Scholar] [CrossRef]
  23. Hussain, F.; Abbas, S.G.; Fatima, A.; Masood, T.; Khan, M.A. Reputation-Based Leader Selection Consensus Algorithm with Voting Mechanism for Consortium Blockchain. Computers 2023, 12, 20. [Google Scholar]
  24. Xu, G.; Wang, Y.; Leng, J. Improved PBFT Algorithm Based on Vague Sets. Secur. Commun. Netw. 2022, 2022, 6144664. [Google Scholar] [CrossRef]
  25. Abishu, H.N.; Seid, A.M.; Yacob, Y.H.; Ayall, T.; Sun, G.; Liu, G. Consensus Mechanism for Blockchain-Enabled Vehicle-to-Vehicle Energy Trading in the Internet of Electric Vehicles. IEEE Trans. Veh. Technol. 2021, 71, 946–960. [Google Scholar] [CrossRef]
  26. Quinlan, J.R. Induction of Decision Trees. Mach. Learn. 1986, 1, 81–106. [Google Scholar] [CrossRef]
  27. Yu, J.; Qiao, Z.; Tang, W.; Wang, D.; Cao, X. Blockchain-Based ID3 Decision Tree Classification in Distributed Networks. Intell. Autom. Soft Comput. 2021, 29, 713–728. [Google Scholar] [CrossRef]
  28. Lei, K.; Zhang, Q.; Xu, L.; Qi, Z. Reputation-based Byzantine Fault-Tolerance for Consortium Blockchain. In Proceedings of the 2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS), Singapore, 11–13 December 2018. [Google Scholar]
  29. Abishu, B.; The, N.B.; Shankar, S. PPoR: A pipelined proof-of-reputation consensus mechanism for enhanced scalability in blockchain. Ann. Telecommun. 2021, 76, 421–432. [Google Scholar]
Figure 1. RE-PBFT Consensus Protocol.
Figure 1. RE-PBFT Consensus Protocol.
Applsci 15 07591 g001
Figure 2. Consensus latency of four consensus algorithms transmitting 1 KB, 10 KB, 50 KB, and 100 KB.
Figure 2. Consensus latency of four consensus algorithms transmitting 1 KB, 10 KB, 50 KB, and 100 KB.
Applsci 15 07591 g002
Figure 3. Consensus Delay Box Diagram for Four Consensus Algorithms.
Figure 3. Consensus Delay Box Diagram for Four Consensus Algorithms.
Applsci 15 07591 g003
Figure 4. Throughput of Four Consensus Algorithms.
Figure 4. Throughput of Four Consensus Algorithms.
Applsci 15 07591 g004
Figure 5. Communication overload of four consensus algorithms.
Figure 5. Communication overload of four consensus algorithms.
Applsci 15 07591 g005
Table 1. Analysis of PBFT algorithms and their improvements.
Table 1. Analysis of PBFT algorithms and their improvements.
ReferenceAlgorithm NameMain ImprovementAdvantagesDisadvantages
Ren et al. [18]Node Role Division PBFTDivision of nodes into specific rolesClear role assignment and improved efficiencyComplex role management
Liu et al. [19]Grouping and Credit PBFTNode grouping and credit gradingEfficient consensus and reduced overheadDifficulty in accurate initial grouping
Hussain et al. [20]Trust-based Leader Selection PBFTLeader selection based on node trustReduced leader centralization risk, enhanced fault toleranceDependence on trust evaluation accuracy
Gao et al. [21]PBFT for MicrogridOptimized PBFT consensus for electricity transactionsHigh efficiency, secure energy transactionsLimited to energy transaction scenarios
Chen et al. [22]Large-Scale Consortium PBFTImproved scalability for large-scale networksBetter scalability, reduced latencyHigher complexity in node management
Hussain et al. [23]Reputation-Voting PBFTReputation-based leader selection with voting mechanismEnhanced fairness and robustnessComplex reputation voting processes
Xu et al. [24]Vague Sets PBFTIntegration of vague sets theoryImproved robustness under uncertaintyIncreased computational complexity
Abishu et al. [25]Proof of Power Reputation (PPoR)Reputation and power-based node selection for V2V energy trading Efficient consensus, reduced latency, fair node selection mechanismComplexity in reputation evaluation
Table 2. Node credit evaluation—primary and secondary indicators.
Table 2. Node credit evaluation—primary and secondary indicators.
Node TypePrimary IndicatorSymbolWeightSecondary IndicatorSymbolWeightDescription
Excellent Node,
Good Node, Ordinary Node
Direct Credit Value C d i r     λ + μ Consensus Credit C c o n λ Measures a node’s ability to successfully complete consensus processes, reflecting its core contribution.
Voting Credit C v o t μ Evaluates a node’s active participation in voting processes, rewarding successful voting behavior.
Indirect Credit Value C i d i r α + β Activity Credit C a c t     α Assesses the node’s engagement by counting participations as master or consensus node, weighted by recent activity.
Incentive Credit C i n c β Provides additional rewards based on node credit rankings to stimulate low-credit nodes to perform better.
Historical Credit Value C h i s     η ---Reflects the node’s long-term behavioral stability by applying a moving average across T consensus rounds.
Malicious NodeHistorical Credit Value 1 2 × C h i s     ----Reduces the historical credit score by half for nodes identified as malicious, penalizing improper behavior.
Table 3. Node Credit Evaluation—Secondary and Tertiary Indicators.
Table 3. Node Credit Evaluation—Secondary and Tertiary Indicators.
Secondary IndicatorTertiary IndicatorSymbolWeightDescription
Consensus CreditNumber of successful consensus rounds N u m C i     -Successful completion count; more completions enhance the node’s consensus credit
Total number of consensus rounds T N u m C i     -Total times participated in consensus rounds for normalization
Voting CreditNumber of successful voting rounds N u m V i     -Count of successful voting rounds completed by the node
Total number of voting rounds T N u m V i     -Total voting participations for normalization
Active CreditNumber of master node participation G M i ( r ) γ Times the node acted as a master node, with higher weight
Number of consensus node participations G C i ( r ) 1 γ Times the node was a consensus node, with lower weight
Incentive CreditCredit Ranking C r a n k i     -Node’s current ranking position among all nodes
Number of nodes n -Total number of nodes participating in consensus
Table 4. Experiment configuration.
Table 4. Experiment configuration.
Experimental SetupConfiguration
Operating SystemWindows 10 64-bit Professional Edition
Experimental PlatformPython 3.9
ProcessorIntel (R) Core (TM) i5-10400
Memory16 GB RAM
Number of Nodes10–60 nodes
Network ModelLocal area network simulating network latency
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Ding, J.; Wu, X.; Tian, J.; Li, Y. RE-BPFT: An Improved PBFT Consensus Algorithm for Consortium Blockchain Based on Node Credibility and ID3-Based Classification. Appl. Sci. 2025, 15, 7591. https://doi.org/10.3390/app15137591

AMA Style

Ding J, Wu X, Tian J, Li Y. RE-BPFT: An Improved PBFT Consensus Algorithm for Consortium Blockchain Based on Node Credibility and ID3-Based Classification. Applied Sciences. 2025; 15(13):7591. https://doi.org/10.3390/app15137591

Chicago/Turabian Style

Ding, Junwen, Xu Wu, Jie Tian, and Yuanpeng Li. 2025. "RE-BPFT: An Improved PBFT Consensus Algorithm for Consortium Blockchain Based on Node Credibility and ID3-Based Classification" Applied Sciences 15, no. 13: 7591. https://doi.org/10.3390/app15137591

APA Style

Ding, J., Wu, X., Tian, J., & Li, Y. (2025). RE-BPFT: An Improved PBFT Consensus Algorithm for Consortium Blockchain Based on Node Credibility and ID3-Based Classification. Applied Sciences, 15(13), 7591. https://doi.org/10.3390/app15137591

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop