The Evolution and Optimization Strategies of a PBFT Consensus Algorithm for Consortium Blockchains
Abstract
:1. Introduction
- (1)
- Strategies for reducing communication overhead, and leveraging hierarchical networking and message compression;
- (2)
- Flexible architecture designs that support dynamic node admission and reputation evaluation;
- (3)
- Optimized view-change mechanisms based on a multi-leader node selection approach;
- (4)
- Hybrid consensus models incorporating token staking and penalty mechanisms. Finally, the study constructs a comparative matrix of optimization pathways and a scenario-based applicability framework, providing a structured reference for future research.
2. Introduction to Blockchain
2.1. Blockchain Technology
- (1)
- The information encapsulation layer of the block header
- (2)
- The data storage layer of the block structure
- (3)
- The collaborative layer of the security mechanism
2.2. The Classification of Blockchain
2.3. Blockchain-Related Surveys
2.4. The Blockchain Economic Incentive Mechanism
3. An Introduction to Mainstream Consensus Algorithms
3.1. The Mainstream Consensus Algorithms of Public Blockchains
3.1.1. POW
3.1.2. PoS
3.2. The Mainstream Consensus Algorithms of Private Blockchains
3.2.1. Paxos
3.2.2. Raft
3.3. The Mainstream Consensus Algorithms Used in Consortium Blockchains
3.3.1. DPoS
3.3.2. Kafka
3.3.3. PBFT
- (1)
- PBFT consensus protocol
- (1)
- Request phase: the client sends a request to the master node to start the consensus process. The master node is responsible for coordinating the subsequent steps.
- (2)
- Pre-prepare phase: The master node broadcasts a pre-prepare message containing the request digest and a unique sequence number. Upon receiving the message, replica nodes verify its authenticity and log it locally, ensuring data consistency across the network.
- (3)
- Prepare phase: The replica node sends prepare messages to acknowledge the receipt of the pre-prepare message, including the request summary, sequence number, and formal acknowledgment. The next step is triggered when the node has accumulated a sufficient number of prepare messages.
- (4)
- Commit phase: The replica node sends a commit message to inform other nodes that the request has been validated and approved. This message includes the request summary, sequence number, and acknowledgment to reinforce consensus. Once the node receives a sufficient number of commit messages, it can execute the request.
- (5)
- Reply phase: the replica node sends a reply message to the client with the execution result. The client confirms a successful execution upon receiving enough reply messages.
- (2)
- View change protocol
- (1)
- Normal Consensus Phase
- (2)
- View Change Phase
- The leader selection mechanism in the PBFT algorithm is relatively arbitrary, which can result in unstable leader performance or an increased risk of attacks from malicious nodes, thereby leading to frequent view changes that impact the system’s overall performance.
- The PBFT consensus algorithm utilizes a three-phase communication model. While it ensures the security of consensus, the communication overhead significantly increases in large-scale networks, which reduces the overall efficiency of the system.
- The PBFT consensus algorithm lacks an effective reward and punishment mechanism, which hinders the ability to incentivize honest nodes to participate in the consensus process. Additionally, it lacks effective means to penalize malicious nodes, thus limiting the system’s robustness when defending against attacks.
- The PBFT algorithm requires a fixed number of consensus nodes during the consensus process, meaning that nodes cannot be dynamically added or removed within the consensus network.
4. Analysis of the Improved PBFT Consensus Algorithm
4.1. The Hierarchical Group Consensus Algorithm
4.2. Select High-Quality Nodes for Participation in Consensus
4.3. Improvements to Multi-Leader Consensus Algorithms
4.4. An Optimized Consensus Algorithm Based on an Optimistic Mechanism
- (1)
- Advantageous Byzantine Error: The primary node may alter a correct message received from the client to one that is beneficial to itself before broadcasting it to the network. For example, it may modify message m into m’.
- (2)
- Consistency Byzantine Error: The primary node might send different messages (m and m’) with the same sequence number (n) to different nodes, or assign the same sequence number to different client request messages (m and m’). This inconsistency can cause problems during view changes, where nodes present conflicting information, undermining the security of the consensus. In the traditional two-phase PBFT protocol, security issues in the network arise only when the primary node encounters a consistency error. A specific example of such an issue is as follows:
5. Discussion and Future Directions
5.1. The Hierarchical Clustering Mechanism
5.2. Multi-Leadership Structure
5.3. The Optimistic Consensus Algorithm
6. Conclusions
Funding
Data Availability Statement
Conflicts of Interest
References
- Zheng, Z.; Xie, S.; Dai, H.N.; Chen, X.; Wang, H. Blockchain challenges and opportunities: A survey. Int. J. Web Grid Serv. 2018, 14, 352–375. [Google Scholar]
- Iansiti, M.; Lakhani, K.R. The truth about blockchain. Harv. Bus. Rev. 2017, 95, 118–127. [Google Scholar]
- Ye, S.; Sun, Y.; Zhang, J.; Chen, J.; Xu, B.; Zhao, S.; Liu, H. A new coupled dynamic model to study the vibration and lubrication characteristics of slipper/swash-plate interface in an axial piston pump. Proc. Inst. Mech. Eng. Part J J. Eng. Tribol. 2025, 13506501241308942. [Google Scholar]
- Ye, S.; Lin, Q.; Zheng, C.; Zhao, S.; Liu, H. Dynamic modeling and vibration response analysis of an internal gear pump. Proc. Inst. Mech. Eng. Part C J. Mech. Eng. Sci. 2024, 09544062241303386. [Google Scholar]
- Fernández-Caramés, T.M.; Fraga-Lamas, P. A Review on the Use of Blockchain for the Internet of Things. IEEE Access 2018, 6, 32979–33001. [Google Scholar]
- Neetu, S.; Rajesh, R. Scalable and Cost-Efficient PoA Consensus-Based Blockchain Solution for Vaccination Record Management. Wirel. Pers. Commun. Int. J. 2024, 135, 1177–1207. [Google Scholar]
- Young-Eisendrath, P.; Dawson, T. The Cambridge Companion to Kafka. J. Hist. Behav. Sci. 2008.
- Xu, G.; Liu, Y.; Khan, P.W. Improvement of the DPoS consensus mechanism in blockchain based on vague sets. IEEE Trans. Ind. Inform. 2019, 16, 4252–4259. [Google Scholar] [CrossRef]
- Underwood, S. Blockchain beyond Bitcoin. Commun. ACM 2016, 59, 15–17. [Google Scholar] [CrossRef]
- Zhang, C.; Chen, J.; Li, J.; Peng, Y.; Mao, Z. Large language models for human–robot interaction: A review. Biomim. Intell. Robot. 2023, 3, 100131. [Google Scholar] [CrossRef]
- Peng, Y.; Sakai, Y.; Funabora, Y.; Yokoe, K.; Aoyama, T.; Doki, S. Funabot-Sleeve: A Wearable Device Employing McKibben Artificial Muscles for Haptic Sensation in the Forearm. IEEE Robot. Autom. Lett. 2025, 10, 1944–1951. [Google Scholar] [CrossRef]
- Li, H.; Lu, R.; Zhou, L.; Yang, B.; Shen, X. An Efficient Merkle-Tree-Based Authentication Scheme for Smart Grid. IEEE Syst. J. 2014, 8, 655–663. [Google Scholar]
- Ferdous, M.S.; Chowdhury MJ, M.; Hoque, M.A. A survey of consensus algorithms in public blockchain systems for crypto-currencies. J. Netw. Comput. Appl. 2021, 182, 103035. [Google Scholar]
- Yang, R.; Wakefield, R.; Lyu, S.; Jayasuriya, S.; Han, F.; Yi, X.; Yang, X.; Amarasinghe, G.; Chen, S. Public and private blockchain in construction business process and information integration. Autom. Constr. 2020, 118, 103276. [Google Scholar]
- Dib, O.; Brousmiche, K.L.; Durand, A.; Thea, E.; Hamida, E.B. Consortium blockchains: Overview, applications and challenges. Int. J. Adv. Telecommun. 2018, 11, 51–64. [Google Scholar]
- Mao, Z.; Kobayashi, R.; Nabae, H.; Suzumori, K. Multimodal strain sensing system for shape recognition of tensegrity structures by combining traditional regression and deep learning approaches. IEEE Robot. Autom. Lett. 2024, 9, 10050–10056. [Google Scholar]
- Bai, X.; Peng, Y.; Li, D.; Liu, Z.; Mao, Z. Novel soft robotic finger model driven by electrohydrodynamic (EHD) pump. J. Zhejiang Univ.-Sci. A 2024, 25, 596–604. [Google Scholar] [CrossRef]
- Mao, Z.; Bai, X.; Peng, Y.; Shen, Y. Design, modeling, and characteristics of ring-shaped robot actuated by functional fluid. J. Intell. Mater. Syst. Struct. 2024, 35, 1459–1470. [Google Scholar]
- Zhonghua, C.; Goyal, S.B.; Rajawat, A.S. Smart contracts attribute-based access control model for security & privacy of IoT system using blockchain and edge computing. J. Supercomput. 2024, 80, 1396–1425. [Google Scholar]
- Peng, Y.; Yang, X.; Li, D.; Ma, Z.; Liu, Z.; Bai, X.; Mao, Z. Predicting flow status of a flexible rectifier using cognitive computing. Expert Syst. Appl. 2025, 264, 125878. [Google Scholar]
- Lasla, N.; Alsahan, L.; Abdallah, M.; Younis, M. Green-PoW: An Energy-Efficient Blockchain Proof-of-Work Consensus Algorithm. Comput. Netw. 2020, 214, 109118. [Google Scholar]
- Lan, Y.; Liu, Y.; Li, B. Proof of Learning (PoLe): Empowering Machine Learning with Consensus Building on Blockchains. Proc. AAAI Conf. Artif. Intell. 2020, 35, 16063–16066. [Google Scholar]
- Chen, J.; Gan, W.; Hu, M.; Chen, C.-M. On the Construction of a Post-Quantum Blockchain for Smart City. J. Inf. Secur. Appl. 2020, 58, 102780. [Google Scholar]
- Kara, M.; Laouid, A.; AlShaikh, M.; Hammoudeh, M.; Bounceur, A.; Euler, R.; Amamra, A.; Laouid, B. A Compute and Wait in PoW (CW-PoW) Consensus Algorithm for Preserving Energy Consumption. Appl. Sci. 2021, 15, 6750. [Google Scholar]
- Dhurandher, S.K.; Singh, J.; Nicopolitidis, P.; Kumar, R.; Gupta, G. A Blockchain-based Secure Routing Protocol for Opportunistic Networks. J. Ambient. Intell. Humaniz. Comput. 2021, 13, 2191–2203. [Google Scholar]
- Xu, R.; Chen, Y. Fed-DDM: A Federated Ledgers Based Framework for Hierarchical Decentralized Data Marketplaces. In Proceedings of the 2021 International Conference on Computer Communications and Networks (ICCCN), Athens, Greece, 19–22 July 2021. [Google Scholar]
- Gunanidhi, G.S.; Krishnaveni, R. Improved Security Blockchain for IoT Based Healthcare Monitoring System. In Proceedings of the Second International Conference on Artificial Intelligence and Smart Energy (ICAIS), Coimbatore, India, 23–25 February 2022. [Google Scholar]
- Saini, V.; Purohit, C.S.; Kumar, R.; Al-Sumaiti, A. Proof of Work Consensus Based Peer to Peer Energy Trading in the Indian Residential Community. Energies 2023, 16, 1253. [Google Scholar] [CrossRef]
- Tang, Y.; Yan, J.; Chakraborty, C.; Sun, Y. Hedera: A Permissionless and Scalable Hybrid Blockchain Consensus Algorithm in Multiaccess Edge Computing for IoT. IEEE Internet Things J. 2023, 10, 21187–21202. [Google Scholar]
- Islam, M.R.; Rashid, M.; Rahman, M.A.; Mohamad, M.; Embong, A.H. A Comprehensive Analysis of Blockchain-based Cryptocurrency Mining Impact on Energy Consumption. Int. J. Adv. Comput. Sci. Appl. 2022, 13, 590–598. [Google Scholar]
- Motepalli, S.; Jacobsen, H.-A. Reward Mechanism for Blockchains Using Evolutionary Game Theory. In Proceedings of the 2021 3rd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS), Paris, France, 27–30 September 2021. [Google Scholar]
- Xu, C.; Qu, Y.; Luan, T.; Eklund, P.W.; Xiang, Y.; Gao, L. A Lightweight and Attack-Proof Bidirectional Blockchain Paradigm for Internet of Things. IEEE Internet Things J. 2022, 9, 4371–4384. [Google Scholar]
- Bhudia, A.; Cartwright, A.; Cartwright, E.; Hurley-Smith, D.; Hernandez-Castro, J. Game Theoretic Modelling of A Ransom and Extortion Attack on Ethereum Validators. In Proceedings of the 18th International Conference on Availability, Reliability and Security, Benevento, Italy, 29 August–1 September 2023. [Google Scholar]
- Rashid, M.; Rasool, I.; Zafar, N.; Afzaal, H. Formal Modeling and Verification of Validator Voluntarily Exit in Ethereum 2.0 Beacon Chain. In Proceedings of the 2023 2nd International Conference On Emerging Trends in Electrical, Control, and Telecommunication Engineering (ETECTE), Lahore, Pakistan, 27–29 November 2023. [Google Scholar]
- Grandjean, D.; Heimbach, L. Roger Wattenhofer; Ethereum Proof-of-Stake Consensus Layer: Participation and Decentralization. In Proceedings of the International Conference on Financial Cryptography and Data Securit, Willemstad, Curaçao, 4–8 March 2023. [Google Scholar]
- Asif, R.; Hassan, S.R. Shaping the Future of Ethereum: Exploring Energy Consumption in Proof-of-Work and Proof-of-Stake Consensus. Front. Blockchain 2023, 6, 1151724. [Google Scholar]
- Ge, L.; Wang, J.; Zhang, G. Survey of Consensus Algorithms for Proof of Stake in Blockchain. Secur. Commun. Netw. 2022, 2022, 2812526. [Google Scholar] [CrossRef]
- Li, L. Mitigating Challenges in Ethereum’s Proof-of-Stake Consensus: Evaluating The Impact of EigenLayer and Lido. arXiv 2024, arXiv:2410.23422. [Google Scholar]
- Neu, J.; Tas, E.N.; Tse, D.C. Two More Attacks on Proof-of-Stake GHOST/Ethereum. In Proceedings of the 2022 ACM Workshop On Developments in Consensus, Los Angeles, CA, USA, 7 November 2022. [Google Scholar]
- Lin, Z.; Zhang, Q.; Tian, Z.; Yu, P.; Ye, Z.; Zhuang, H.; Lan, J. Slam2: Simultaneous localization and multimode mapping for indoor dynamic environments. Pattern Recognit. 2025, 158, 111054. [Google Scholar] [CrossRef]
- Howard, H.; Mortier, R. Paxos vs Raft: Have We Reached Consensus On Distributed Consensus? In Proceedings of the 7th Workshop on Principles and Practice of Consistency for Distributed Data, Heraklion, Greece, 27 April 2020. [Google Scholar]
- Haridi, S.; Kroll, L.; Carbone, P. Lecture Notes On Leader-based Sequence Paxos—An Understandable Sequence Consensus Algorithm. arXiv 2020, arXiv:2008.13456. [Google Scholar]
- Sheff, I.; Wang, X.; van Renesse, R.; Myers, A.C. Heterogeneous Paxos: Technical Report. arXiv 2020, arXiv:2011.08253. [Google Scholar]
- Goel, A.; Sakallah, K. Towards An Automatic Proof of Lamport’s Paxos. In Proceedings of the 2021 Formal Methods in Computer Aided Design (FMCAD), Vienna, Austria, 2–6 October 2021. [Google Scholar]
- Xing, W.; Wu, T.; Wang, X. Automated alarm method for abnormal data in power grid reports based on Paxos algorithm. In Proceedings of the Third International Conference on Computer Technology, Information Engineering, and Electron Materials (CTIEEM 2023), Zhengzhou, China, 17–19 November 2023. [Google Scholar]
- Howard, H.; Mortier, R. Relaxed Paxos: Quorum Intersection Revisited (Again). In Proceedings of the 9th Workshop on Principles and Practice of Consistency for Distributed Data, New York, NY, USA, 5–8 April 2022. [Google Scholar]
- Tennage, P.; Basescu, C.; Kogias, E.K.; Syta, E.; Jovanovic, P.; Ford, B. Baxos: Backing Off for Robust and Efficient Consensus. arXiv 2022, arXiv:2204.10934. [Google Scholar]
- Desjardins, A.; Kogias, E.K. Mandator and Sporades: Robust Wide-Area Consensus with Efficient Request Dissemination. arXiv 2022, arXiv:2209.06152. [Google Scholar]
- Hidayat, S.A.; Juniardi, W.; Khatami, A.; Sari, R.F. Performance Comparison and Analysis of Paxos, Raft and PBFT Using NS3. In Proceedings of the 2022 IEEE International Conference on Internet of Things and Intelligence Systems (IoTaIS), Bali, Indonesia, 24–26 November 2022. [Google Scholar]
- Gabbay, M.J.; Zanolini, L. A Declarative Approach to Specifying Distributed Algorithms Using Three-valued Modal Logic. arXiv 2025, arXiv:2502.00892. [Google Scholar]
- Sakic, E.; Kellerer, W. Response Time and Availability Study of RAFT Consensus in Distributed SDN Control Plane. IEEE Trans. Netw. Serv. Manag. 2017, 15, 304–318. [Google Scholar] [CrossRef]
- Wang, Y.; Li, S.; Xu, L.; Xu, L. Improved Raft Consensus Algorithm in High Real-Time and Highly Adversarial Environment. In Web Information Systems and Applications, Proceedings of the 18th International Conference, WISA 2021, Kaifeng, China, 24–26 September 2021, Proceedings 18; Springer International Publishing: Cham, Switzerland, 2021. [Google Scholar]
- Fu, W.; Wei, X.; Tong, S. An Improved Blockchain Consensus Algorithm Based on Raft. Arab. J. Sci. Eng. 2021, 46, 8137–8149. [Google Scholar] [CrossRef]
- Surjandari, I.; Yusuf, H.; Laoh, E.; Maulida, R. Designing A Permissioned Blockchain Network for The Halal Industry Using Hyperledger Fabric with Multiple Channels and The Raft Consensus Mechanism. J. Big Data 2021, 8, 1–16. [Google Scholar] [CrossRef]
- Xu, X.; Hou, L.; Li, Y.; Geng, Y. Weighted RAFT: An Improved Blockchain Consensus Mechanism for Internet of Things Application. In Proceedings of the 2021 7th International Conference on Computer and Communications (ICCC), Chengdu, China, 10–13 December 2021. [Google Scholar]
- Du, N.; Yan, D.; Liang, Z.; Huang, Y.; Liu, T.; Zhong, C. Research on Optimization of Efficient and Scalable Mutli-Raft Consensus Algorithm for Supply Chain Finance. In Proceedings of the 2022 IEEE International Conference on Sensing, Diagnostics, Prognostics, and Control (SDPC), Chongqing, China, 5–7 August 2022. [Google Scholar]
- Hou, L.; Xu, X.; Zheng, K.; Wang, X. An Intelligent Transaction Migration Scheme for RAFT-based Private Blockchain in Internet of Things Applications. IEEE Commun. Lett. 2021, 25, 2753–2757. [Google Scholar]
- Luo, H.; Yang, X.; Yu, H.; Sun, G.; Lei, B.; Guizani, M. Performance Analysis and Comparison of Nonideal Wireless PBFT and RAFT Consensus Networks in 6G Communications. IEEE Internet Things J. 2023, 11, 9752–9765. [Google Scholar]
- Li, Y.; Fan, Y.; Zhang, L.; Crowcroft, J. RAFT Consensus Reliability in Wireless Networks: Probabilistic Analysis. IEEE Internet Things J. 2023, 10, 12839–12853. [Google Scholar]
- Battisti, J.H.F.; Batista, V.E.; Koslovski, G.P.; Pillon, M.A.; Miers, C.; Marques, M.A.; Simplício, M.A.; Kreutz, D. Performance Analysis of The Raft Consensus Algorithm on Hyperledger Fabric and Ethereum on Cloud. In Proceedings of the 2023 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Naples, Italy, 4–6 December 2023. [Google Scholar]
- Alexandridis, A.; Al-Sumaidaee, G.; Alkhudary, R.; Zilic, Z. Making Case for Using RAFT in Healthcare Through Hyperledger Fabric. In Proceedings of the 2021 IEEE International Conference On Big Data (Big Data), Orlando, FL, USA, 15–18 December 2021. [Google Scholar]
- Mišić, J.; Mišić, V.B.; Chang, X. Toward Decentralization in DPoS Systems: Election, Voting, and Leader Selection Using Virtual Stake. IEEE Trans. Netw. Serv. Manag. 2024, 21, 1777–1790. [Google Scholar]
- Hu, Q.; Yan, B.; Han, Y.; Yu, J. An Improved Delegated Proof of Stake Consensus Algorithm. Procedia Comput. Sci. 2021, 187, 341–346. [Google Scholar]
- Wei, Y.; Liang, L.; Zhou, B.; Feng, X. A Modified Blockchain DPoS Consensus Algorithm Based on Anomaly Detection and Reward-Punishment. In Proceedings of the 2021 13th International Conference on Communication Software and Networks (ICCSN), Chongqing, China, 4–7 June 2021. [Google Scholar]
- Chen, Y.; Liu, F. Improvement of DPoS Consensus Mechanism in Collaborative Governance of Network Public Opinion. In Proceedings of the 2021 4th International Conference on Advanced Electronic Materials, Computers and Software Engineering (AEMCSE), Changsha, China, 26–28 March 2021. [Google Scholar]
- Wang, D.; Zhang, X. Secure Ride-Sharing Services Based on A Consortium Blockchain. IEEE Internet Things J. 2021, 8, 2976–2991. [Google Scholar]
- Liu, J.; Xie, M.; Chen, S.; Ma, C.; Gong, Q. An Improved DPoS Consensus Mechanism in Blockchain Based on PLTS for The Smart Autonomous Multi-robot System. Inf. Sci. 2021, 575, 528–541. [Google Scholar]
- Wang, Y.; Che, T.; Zhao, X.; Zhou, T.; Zhang, K.; Hu, X. A Blockchain-Based Privacy Information Security Sharing Scheme in Industrial Internet of Things. Sensors 2022, 22, 3426. [Google Scholar] [CrossRef]
- Haque, E.U.; Shah, A.; Iqbal, J.; Ullah, S.S.; Alroobaea, R.; Hussain, S. A Scalable Blockchain Based Framework for Efficient IoT Data Management Using Lightweight Consensus. Sci. Rep. 2024, 14, 7841. [Google Scholar]
- Liao, S.; Wu, J.; Bashir, A.; Yang, W.; Li, J.; Tariq, U. Digital Twin Consensus for Blockchain-Enabled Intelligent Transportation Systems in Smart Cities. IEEE Trans. Intell. Transp. Syst. 2022, 23, 22619–22629. [Google Scholar] [CrossRef]
- Wang, P.; Zhao, Y.; Obaidat, M.; Wei, Z.; Qi, H.; Lin, C.; Xiao, Y.; Zhang, Q. Blockchain-Enhanced Federated Learning Market with Social Internet of Things. IEEE J. Sel. Areas Commun. 2022, 40, 3405–3421. [Google Scholar] [CrossRef]
- Liu, Y.; Xu, G. Fixed Degree of Decentralization DPoS Consensus Mechanism in Blockchain Based on Adjacency Vote and the Average Fuzziness of Vague Value. Comput. Netw. 2021, 199, 108432. [Google Scholar] [CrossRef]
- Androulaki, E.; Barger, A.; Bortnikov, V.; Cachin, C.; Christidis, K.; De Caro, A.; Enyeart, D.; Ferris, C.; Laventman, G.; Manevich, Y.; et al. Hyperledger fabric: A distributed operating system for permissioned blockchains. arXiv 2018, arXiv:1801.10228. [Google Scholar]
- Le Noac’h, P.; Costan, A.; Bougé, L. A Performance Evaluation of Apache Kafka in Support of Big Data Streaming Applications. In Proceedings of the 2017 IEEE International Conference on Big Data (Big Data), Boston, MA, USA, 11–14 December 2017. [Google Scholar]
- Klaokliang, N.; Teawtim, P.; Aimtongkham, P.; So-In, C.; Niruntasukrat, A. A Novel IoT Authorization Architecture on Hyperledger Fabric With Optimal Consensus Using Genetic Algorithm. In Proceedings of the 2018 Seventh ICT International Student Project Conference (ICT-ISPC), Nakhon Pathom, Thailand, 11–13 July 2018. [Google Scholar]
- Hiraman, B.R.; Viresh, M.C.; Abhijeet, C.K. A Study of Apache Kafka in Big Data Stream Processing. In Proceedings of the 2018 International Conference on Information, Communication, Engineering and Technology (ICICET), Pune, India, 29–31 August 2018. [Google Scholar]
- Petrescu, M.; Petrescu, R. Log Replication in Raft Vs Kafka. Stud. Univ. Babeș-Bolyai Inform. 2020, 65, 10–24193. [Google Scholar] [CrossRef]
- Yang, G.; Lee, K.; Lee, K.; Yoo, Y.; Lee, H.; Yoo, C. Resource Analysis of Blockchain Consensus Algorithms in Hyperledger Fabric. IEEE Access 2022, 10, 74902–74920. [Google Scholar] [CrossRef]
- Castro, M.; Liskov, B. Practical byzantine fault tolerance. OsDI 1999, 99, 173–186. [Google Scholar]
- Wu, X.; Wang, Z.; Li, X.; Chen, L. DBPBFT: A hierarchical PBFT consensus algorithm with dual blockchain for IoT. Future Gener. Comput. Syst. 2025, 162, 107429. [Google Scholar] [CrossRef]
- Wang, Y.; Xing, X.; Li, P.; Chen, L. LT-DBFT: A Hierarchical Blockchain Consensus Using Location and Trust in IoT. IEEE Internet Things J. 2025. [Google Scholar] [CrossRef]
- Abbessi, W.; Ouni, S.; Othmen, R.B.; Wang, G. Random cluster parallel PBFT global consensus for consistent blockchain distributed ledger. Clust. Comput. 2025, 28, 187. [Google Scholar] [CrossRef]
- Jia, G.; Shen, Z.; Sun, H.; Xin, J.; Wang, D. RWA-BFT: Reputation-Weighted Asynchronous BFT for Large-Scale IoT. Sensors 2025, 25, 413. [Google Scholar] [CrossRef] [PubMed]
- Zhang, H.; Zhao, Y. SatBFT: An Efficient and Scalable Consensus Protocol for Blockchain-Enabled Space-Air-Ground Integrated Network. IEEE Trans. Cogn. Commun. Netw. 2025. [Google Scholar] [CrossRef]
- Zheng, J.; Zhang, Y. TRBFT: An Efficient Blockchain Consensus for Edge Computing-Enabled IoT Systems. IEEE Internet Things J. 2025. [Google Scholar]
- Chen, W.; Li, X.; Wang, G.; Li, L.; Shen, J.; Li, E. HML-BFT: Hybrid multi-layer BFT consensus with reputation model for large-scale blockchain. Peer-to-Peer Netw. Appl. 2025, 18, 1–14. [Google Scholar]
- Ding, K.; Gerhard, D.; Fan, L. AML-Based Multi-Dimensional Co-Evolution Approach Supported by Blockchain: Architecture Design and Case Study on Intelligent Production Lines for Industry 4.0. Information 2025, 16, 243. [Google Scholar] [CrossRef]
- Elomda, B.M.; Abdelbary, T.A.A.; Hassan, H.A.; Hamza, K.S.; Kharma, Q. An Enhanced Multi-Layer Blockchain Security Model for Improved Latency and Scalability. Information 2025, 16, 241. [Google Scholar] [CrossRef]
- Alabdulatif, A. Blockchain-Based Privacy-Preserving Authentication and Access Control Model for E-Health Users. Information 2025, 16, 219. [Google Scholar] [CrossRef]
- Liu, S.; Wang, X.; Hui, L.; Wu, W. Blockchain-Based Decentralized Federated Learning Method in Edge Computing Environment. Appl. Sci. 2023, 13, 1677. [Google Scholar] [CrossRef]
- Liu, S.; Zhang, R.; Liu, C.; Shi, D. P-PBFT: An improved blockchain algorithm to support large-scale pharmaceutical traceability. Comput. Biol. Med. 2023, 154, 106590. [Google Scholar]
- Wang, Y.; Zhong, M.; Cheng, T. Research on PBFT consensus algorithm for grouping based on feature trust. Sci. Rep. 2022, 12, 12515. [Google Scholar] [CrossRef]
- Liu, S.; Zhang, R.; Liu, C.; Xu, C.; Wang, J. An improved PBFT consensus algorithm based on grouping and credit grading. Sci. Rep. 2023, 13, 13030. [Google Scholar]
- Liu, S.; Zhang, R.; Liu, C.; Xu, C.; Zhou, J.; Wang, J. Improvement of the PBFT algorithm based on grouping and reputation value voting. Int. J. Digit. Crime Forensics (IJDCF) 2022, 14, 1–15. [Google Scholar]
- Suliyanti, W.N.; Sari, R.F. Blockchain-Based Double-Layer Byzantine Fault Tolerance for Scalability Enhancement for Building Information Modeling Information Exchange. Big Data Cogn. Comput. 2023, 7, 90. [Google Scholar] [CrossRef]
- Zhong, W.; Feng, W.; Huang, M.; Feng, S. ST-PBFT: An Optimized PBFT Consensus Algorithm for Intellectual Property Transaction Scenarios. Electronics 2023, 12, 325. [Google Scholar] [CrossRef]
- Liu, J.; Feng, W.; Huang, M.; Feng, S.; Zhang, Y. Grouped Multilayer Practical Byzantine Fault Tolerance Algorithm: A Practical Byzantine Fault Tolerance Consensus Algorithm Optimized for Digital Asset Trading Scenarios. Sensors 2023, 23, 8903. [Google Scholar] [CrossRef]
- Liu, W.; Zhang, X.; Feng, W.; Huang, M.; Xu, Y. Optimization of PBFT algorithm based on QoS-aware trust service evaluation. Sensors 2022, 22, 4590. [Google Scholar] [CrossRef]
- Xu, G.; Bai, H.; Xing, J.; Luo, T.; Xiong, N.N.; Cheng, X.; Liu, S.; Zheng, X. SG-PBFT: A secure and highly efficient distributed blockchain PBFT consensus algorithm for intelligent Internet of vehicles. J. Parallel Distrib. Comput. 2022, 164, 1–11. [Google Scholar]
- Gao, S.; Yu, T.; Zhu, J.; Cai, W. T-PBFT: An EigenTrust-based practical Byzantine fault tolerance consensus algorithm. China Commun. 2019, 16, 111–123. [Google Scholar]
- Liu, X.; Fan, X.; Niu, B.; Zheng, X. 5G-Practical Byzantine Fault Tolerance: An Improved PBFT Consensus Algorithm for the 5G Network. Information 2025, 16, 202. [Google Scholar] [CrossRef]
- Riahi, K.; Abouaissa, A.; Idoumghar, L. APBFT: An Adaptive PBFT Consensus for Private Blockchains. In Proceedings of the GLOBECOM 2022—2022 IEEE Global Communications Conference, Rio de Janeiro, Brazil, 4–8 December 2022; pp. 1788–1793. [Google Scholar]
- Wang, X.; Zhang, H.; Zhang, J.; Ge, Y.; Cui, K.; Peng, Z.; Li, Z.; Wang, L. An Improved Practical Byzantine Fault-Tolerant Algorithm Based on XGBoost Grouping for Consortium Chains. Comput. Mater. Contin. 2025, 82, 1295–1311. [Google Scholar]
- Zeng, Z.; Wen, B.; Du, W.; Zhang, F.; Zhou, W. PBFT Consensus Algorithm Optimization Scheme Based on Vague Sets and Credit Rating. In Proceedings of the 2023 6th International Conference on Software Engineering and Computer Science (CSECS), Chengdu, China, 22–24 December 2023; pp. 1–5. [Google Scholar]
- Aublin, P.L.; Mokhtar, S.B.; Quema, V. RBFT: Redundant Byzantine Fault Tolerance. In Proceedings of the 2013 IEEE 33rd International Conference on Distributed Computing Systems, Philadelphia, PA, USA, 8–11 July 2013. [Google Scholar]
- Alqahtani, S.; Demirbas, M. BigBFT: A Multileader Byzantine Fault Tolerance Protocol for High Throughput. In Proceedings of the 2021 IEEE International Performance, Computing, and Communications Conference (IPCCC), Austin, TX, USA, 29–31 October 2021. [Google Scholar]
- Avarikioti, Z.; Heimbach, L.; Schmid, R.; Vanbever, L.; Wattenhofer, R.; Wintermeyer, P. FnF-BFT: Exploring Performance Limits of BFT Protocols. arXiv 2020, arXiv:2009.02235. [Google Scholar]
- Qushtom, H.; Mišić, J.; Mišić, V.B.; Chang, X. A Two-Stage PBFT Architecture With Trust and Reward Incentive Mechanism. IEEE Internet Things J. 2023, 10, 11440–11452. [Google Scholar]
- Lao, L.; Dai, X.; Xiao, B.; Guo, S. G-PBFT: A Location-based and Scalable Consensus Protocol for IoT-Blockchain Applications. In Proceedings of the 2020 IEEE International Parallel and Distributed Processing Symposium (IPDPS), New Orleans, LA, USA, 18–22 May 2020; pp. 664–673. [Google Scholar]
- Gan, B.; Wang, Y.; Wu, Q.; Zhou, Y.; Jiang, L. EIoT-PBFT: A multi-stage consensus algorithm for IoT edge computing based on PBFT. Microprocess. Microsyst. 2022, 95, 104713. [Google Scholar]
- Tian, Z.; Zhao, D.; Lin, Z.; Zhao, W.; Flynn, D.; Jiang, Y.; Tian, D.; Zhang, Y.; Sun, Y. Efficient and balanced exploration-driven decision making for autonomous racing using local information. IEEE Trans. Intell. Veh. 2024, 1–17. [Google Scholar] [CrossRef]
- Mao, Z.; Hosoya, N.; Maeda, S. Flexible electrohydrodynamic fluid-driven valveless water pump via immiscible interface. Cyborg Bionic Syst. 2024, 5, 0091. [Google Scholar]
Consensus Algorithm | Degree of Decentralization | Representative Applications | |
---|---|---|---|
Public Blockchain | PoW, PoS, DPoS | Fully Decentralized | BTC, ETH |
Private Blockchain | Paxos, Raft | Centralized | Viewstamped, Replication (VR) |
Consortium Blockchain | PBFT, BFT, Kafka | Partially Decentralized | Hyperledger Fabric, FISCO-BCOS. |
Consensus Mechanism | Validator Reward Method | Punishment Mechanism | Application Scenarios | Advantages | Disadvantages |
---|---|---|---|---|---|
PoW (Proof of Work) | Miners solve cryptographic puzzles to compete for block rewards + transaction fees | No direct penalties, but high computational costs | Public blockchains (e.g., Bitcoin) | High security, decentralization | High energy consumption |
PoS (Proof of Stake) | Rewards come from holding tokens, receiving block rewards + transaction fees | Slashing (penalizing malicious behavior) | Ethereum 2.0, etc. | Low energy consumption, Sybil attack resistance | May lead to wealth centralization |
DPoS (Delegated Proof of Stake) | Elected nodes receive block rewards + transaction fees | Delegates can be replaced through voting | EOS, etc. | High efficiency, low energy consumption | Potential centralization of power |
PBFT (Practical Byzantine Fault Tolerance) | No economic incentives | No economic penalties | Consortium chains (e.g., Hyperledger Fabric) | Low latency, high throughput | Lacks incentives, susceptible to malicious nodes |
Paxos | No economic rewards | No economic penalties | Distributed databases, cloud computing | Strong consistency, suitable for fault-tolerant environments | Low efficiency, high complexity |
Raft | No economic rewards | No economic penalties | Distributed storage, cloud computing | Simple to implement, easy to understand and deploy | Limited applicability, not suitable for large-scale blockchain networks |
Author | Year | Improvement Method | Core Mechanism | Limitations | Reward/Penalty Mechanism |
---|---|---|---|---|---|
Noureddine Lasla [21] | 2020 | Green-PoW | Allocates subsequent block priorities to mining runners-up, reducing redundant computation. | May lead to long-term benefits for runner-up nodes, affecting fairness. | Provides higher priority to mining runners-up as a reward. |
Yixiao Lan [22] | 2020 | Learning Proof (PoLe) | Uses mining power to optimize neural network parameters, synchronizing blockchain and machine learning tasks. | Increases computational complexity, potentially affecting the decentralization of PoW. | No explicitly defined incentive mechanism. |
Jiahui Chen [23] | 2020 | Post-Quantum PoW Variant | Integrates quantum-resistant cryptographic algorithms (e.g., hash/lattice-based), ensuring blockchain security in smart cities. | Quantum-secure algorithms have a high computational overhead, potentially affecting mining efficiency. | No specially designed incentive mechanism. |
Mostefa Kara [24] | 2021 | Compute-and-Wait PoW (CW-PoW) | A multi-round proof verification mechanism that reduces redundant computation through a “compute-wait” protocol. | Increase block confirmation delay, reducing transaction speed. | Reduced rewards for high-energy consumption nodes to encourage efficient computing. |
Sanjay Kumar Dhurandher [25] | 2021 | BDRP Secure Routing Protocol | Combines PoW to validate node behavior in opportunistic networks, ensuring a decentralized routing security. | Limited by the dynamic nature of opportunistic networks. | May provide higher transaction priority for nodes that comply with the routing protocol. |
Ronghua Xu [26] | 2021 | Fed-DDM Joint Ledger Framework | Scalable PoW to synchronize multiple private sub-ledgers, supporting a layered data ecosystem. | Increasing computational and communication overhead, potentially affecting the overall efficiency. | May provide additional rewards to nodes that successfully synchronize ledgers. |
G. S. Gunanidhi [27] | 2022 | Enhanced PoW (E-PoW) | Optimizes PoW parameters to meet the demands of medical IoT systems. | Limiting applicability, and medical data privacy remains a challenge. | No clear reward or penalty mechanism. |
V. Saini [28] | 2023 | PoW Energy Trading Verification | Directly uses PoW to verify peer-to-peer energy transactions, ensuring transaction integrity. | May conflict with the low-carbon goals of energy trading systems. | Provides additional PoW rewards to energy contributors. |
Yu Tang [29] | 2023 | Hedera Consensus Algorithm | Combines PoW with edge computing to optimize multi-access edge computing (MEC) network resource allocation. | Relies on the computing power of MEC devices, | Provides computational rewards to MEC resource contributors. |
Author | Year | Improvement Method | Core Mechanism | Limitations | Reward/Penalty Mechanism |
---|---|---|---|---|---|
Shashank Motepalli [31] | 2021 | Evolutionary Game Reward Mechanism | Dynamically adjusts staking rewards to incentivize honest participation. | Requires continuous monitoring and adjustment. | Adjusts staking rewards dynamically based on participant behavior. |
Chenhao Xu [32] | 2022 | Lightweight Anti-Attack Blockchain | Threshold signatures + dynamic committees to reduce communication overhead. | Threshold signature computation may still introduce delays. | No explicitly defined incentive mechanism. |
Lina Ge [37] | 2022 | PoS Classification and Optimization Framework | Categorizes by security and scalability, providing selection criteria for various scenarios. | The framework does not introduce new security mechanisms. | No reward or penalty mechanism. |
Joachim Neu [39] | 2022 | GHOST Attack Defense | Defends against long-range attacks and validator collusion. | May require additional overhead for detecting and preventing attacks. | No explicitly defined incentive mechanism. |
Dominic Grandjean [35] | 2023 | Ethereum Decentralization Analysis | Quantifies the distribution of validation nodes and staking concentration. | Focuses on analysis rather than introducing a solution to decentralization issues. | No reward or penalty mechanism. |
Alpesh Bhudia [33] | 2023 | Ransomware Attack Game Theory Model | Models revenue matrices to reduce the success rate of ransomware attacks. | Effectiveness depend on accurate threat modeling. | No explicitly defined incentive mechanism. |
Muhammad Rashid [34] | 2023 | Validator Exit Verification Tool | Uses TLA+ modeling for exit processes to ensure state consistency. | TLA+ modeling requires high computational effort | No reward or penalty mechanism. |
Li Li [38] | 2024 | EigenLayer and Lido Optimization | Restaking and liquidity tokens to lower staking thresholds. | Increased risk of liquidity fragmentation and potential security vulnerabilities in restaking mechanisms. | Provides liquidity incentives and lower staking requirements. |
Author | Year | Improvement Method | Core Mechanism | Limitations |
---|---|---|---|---|
Heidi Howard [41] | 2020 | Paxos and Raft Comparison Framework | Compares the fault tolerance mechanisms, message complexity, and leader election strategies of Paxos and Raft. | Provides theoretical analysis but does not introduce new optimizations or solutions. |
Seif Haridi [42] | 2020 | Structured Sequence Paxos Lecture | Modularly decomposes the principles of Paxos, reducing the learning threshold with code examples. | Focuses on education rather than improving Paxos itself. |
Isaac Sheff [43] | 2020 | Heterogeneous Paxos | Achieves consensus with three message rounds, supporting hybrid node roles and network models. | Increased complexity due to role differentiation may lead to a higher implementation overhead. |
Aman Goel [44] | 2021 | Paxos Automated Formal Proof | Verifies protocol correctness using an automatic theorem proving tool based on structural invariants. | Requires high computational resources for formal verification, limiting its practical adoption. |
Heidi Howard [46] | 2022 | Relaxed Paxos | Eases quorum requirements, and a two-phase model reduces synchronization overhead. | Looser quorum constraints may lead to weaker fault tolerance |
Pasindu Tennage [47] | 2022 | Baxos (Leaderless Multi-Paxos) | Introduces a random backoff mechanism to avoid single points of failure, enhancing resilience to adversarial attacks. | May introduce additional latency due to randomized backoff strategy. |
Pasindu Tennage [47] | 2022 | Mandator and Sporades | Combines Multi-Paxos with modular state machine replication to optimize wide-area network request propagation. | Complexity increases, requiring more resources for deployment and maintenance |
Siswandi Agung [49] | 2022 | Paxos/Raft/PBFT Performance Comparison | Uses the NS3 simulator to quantify latency, throughput, and fault tolerance, guiding protocol selection. | Provides performance analysis but does not propose optimizations. |
Murdoch Gabbay [50] | 2025 | Declarative Paxos Specification Framework | Abstracts Paxos behavior using three-valued modal logic, supporting mathematical rigor and verifiability. | The abstraction may limit its practical usability in real-world distributed systems. |
Author | Year | Improvement Method | Core Mechanism | Limitations |
---|---|---|---|---|
Yuchen Wang [52] | 2021 | Real-time adversarial environment optimization | Dynamic leader reconfiguration to enhance fault tolerance and real-time performance. | Frequent leader reconfiguration may introduce instability and additional overhead. |
Wei Fu [53] | 2021 | Hyperledger integration | Log replication optimization to improve blockchain throughput. | Log replication efficiency depends on network conditions and node synchronization speed. |
Isti Surjandari [54] | 2021 | Halal supply chain blockchain | Multi-channel Raft to enhance transaction traceability. | Multi-channel implementation increases system complexity and may require additional infrastructure. |
Lu Hou [57] | 2021 | IoT transaction migration framework | MEC integration to reduce latency while maintaining Byzantine fault tolerance. | MEC-based architecture may have scalability limitations due to edge device constraints. |
Xiaojun Xu [55] | 2021 | IoT weighted Raft | Gateway-based weighted election to prevent Sybil attacks. | Requires an effective weighting mechanism, which could introduce centralization risks. |
Anastasios Alexandridis [61] | 2021 | Medical data management | Privacy standard adaptation and optimization of log storage efficiency. | Privacy adaptations may introduce trade-offs between security and accessibility. |
Na Du [56] | 2022 | Supply chain finance Multi-Raft | Weighted node election to balance consortium blockchain load. | Weighted election may favor certain nodes, leading to potential centralization. |
Haoxiang Luo [58] | 2023 | 6G wireless Raft performance analysis | Quantifying the impact of channel loss on consensus delay. | Performance analysis does not provide solutions to mitigate channel loss effects. |
Yuetai Li [59] | 2023 | Wireless network reliability model | Probability model analysis of node mobility and connection disruption. | Theoretical model; real-world validation is required to confirm reliability predictions. |
Author | Year | Improvement Method | Core Mechanism | Limitations |
---|---|---|---|---|
Qian Hu [63] | 2021 | Dynamic Validator Selection Optimization | The dynamic election of validation nodes to reduce the risk of Sybil attacks. | Frequent validator changes may introduce instability and increase communication overhead. |
Di Wang [66] | 2021 | Consortium Blockchain Carpool Data Protection | Privacy-preserving transaction validation, adapted for urban transportation scenarios. | Privacy mechanisms may add computational overhead, affecting system efficiency. |
Yong Liu [72] | 2021 | Adjacent Voting Decentralization Enhancement | Adjacent voting combined with fuzzy value analysis to improve fair participation. | Fuzzy value analysis may introduce ambiguity, impacting decision reliability. |
Yuetong Chen [65] | 2021 | Network Public Opinion Collaborative Governance | Embedding fairness constraints to ensure the credibility of decision-making. | Enforcing fairness constraints may introduce subjectivity in governance rules. |
Yaxing Wei [64] | 2021 | Anomaly Detection Reward and Punishment Mechanism | Anomaly detection combined with reward and punishment mechanisms to achieve self-regulation. | Effectiveness depends on the accuracy of anomaly detection algorithms. |
Jun Liu [67] | 2021 | Multi-Robot System Coordination Protocol | DPoS based on PLTS, optimized for delay-sensitive scenarios. | Requires effective delegation strategies to prevent centralization risks. |
Yue Wang [68] | 2022 | Industrial IoT Privacy Sharing | DPoS combined with zero-knowledge proofs to protect IIoT data. | Zero-knowledge proofs can introduce computational overhead, impacting performance. |
Siyi Liao [70] | 2022 | Digital Twin Intelligent Traffic | The integration of DPoS with digital twin to achieve real-time consensus. | Digital twin modeling requires significant computational resources for real-time updates. |
Pengfei Wang [71] | 2022 | Federated Learning Market Incentives | Social IoT framework to incentivize data contribution and model integrity. | Effectiveness depends on user participation and incentive distribution fairness. |
Ehtisham Ul Haque [69] | 2024 | Lightweight IoT Data Management | Resource-optimized consensus to reduce the overhead on edge devices. | May sacrifice some security guarantees to achieve lower computational overhead. |
Author | Year | Improvement Method | Core Mechanism | Limitations |
---|---|---|---|---|
Paul Le Noac’h [74] | 2017 | Big Data Stream Performance Evaluation | Latency and throughput benchmarking, identifying real-time processing bottlenecks. | Focuses on evaluation rather than proposing optimization strategies. |
Nuttapong Klaokliang [75] | 2018 | Blockchain Authorization Architecture Optimization | A combination of Kafka and genetic algorithms to optimize IoT consensus efficiency. | Focuses on evaluation rather than proposing optimization strategies. |
Bhole Rahul Hiraman [76] | 2018 | Stream Processing Pipeline Performance Analysis | Verifying Kafka’s reliability in high-volume data streams. | Focuses on verification rather than introducing improvements. |
MANUELA PETRESCU [77] | 2020 | Comparison of Kafka and Raft Log Replication | A comparison of fault tolerance mechanisms and leader election strategies. | Provides comparative insights but does not propose new solutions. |
Gyeongsik Yang [78] | 2022 | Blockchain Consensus Resource Analysis | The quantification of Kafka’s resource overhead in Hyperledger. | Focuses on resource usage analysis without optimization strategies. |
Optimization Scheme | Core Mechanism | Advantages | Disadvantage | Application Scenario |
---|---|---|---|---|
The Hierarchical Group Consensus Algorithm | Adopting an intra-group consensus with external confirmation | Reducing communication complexity | Requires an additional intra-group management mechanism | Large-scale network |
Select High-Quality Nodes for Participation in Consensus | Selecting only high-reputation nodes for consensus participation | Mitigating the impact of malicious nodes | May lead to a trend toward centralization | Supply chain management |
Improvements to Multi-Leader Consensus Algorithms | Multiple leaders processing consensus in parallel | Alleviating the bottleneck of the primary node | Requires additional coordination, increasing protocol complexity | High-throughput blockchain |
Optimized Consensus Algorithm Based on Optimistic Mechanism | Enhancing honesty through a staking mechanism and a reward-penalty system | Preventing Sybil attacks | Requires additional economic model design | Finance and traceability systems |
Algorithm | Grouping Method | Fault Tolerance | Network Model | Reward/Penalty Mechanism |
---|---|---|---|---|
P-PBFT [91] | Grouping based on response speed between nodes | N/2 | Semi-Synchronous Network | No explicitly defined incentive mechanism. |
GPBFT [92] | Grouping based on EigenTrust values | N/2 | Semi-Synchronous Network | May incentivize high-trust nodes by prioritizing their participation. |
CBFT [93] | Grouping based on node response speed within a grid structure | N/2 | Semi-Synchronous Network | No explicitly defined incentive mechanism. |
CE-PBFT [94] | Grouping using K-means clustering | N/2 | Semi-Synchronous Network | No explicitly defined incentive mechanism. |
DLBFT [95] | Based on the Consistent Hashing Principle | N | Semi-Synchronous Network | Uses load-balancing rewards for efficient participation. |
ST-PBFT [96] | Performance of BIM Information Exchange | N | Semi-Synchronous Network | No explicitly defined incentive mechanism. |
Algorithm | Reward and Punishment Mechanism | Number of Consensus Nodes | Network Model |
---|---|---|---|
QTPBFT [98] | QoS-aware global evaluation mechanism for trust services | N − ⌊(n − 1)/3⌋ | Semi-Synchronous Network |
SG-PBFT [99] | Reputation-based scoring mechanism | N/2 | Semi-Synchronous Network |
T-PBFT [100] | EigenTrust-based evaluation mechanism | N × d/100 | Semi-Synchronous Network |
5G-PBFT [101] | Node reputation model | N/2 | Semi-Synchronous Network |
APBFT [102] | Reputation credit mechanism | N/3 | Semi-Synchronous Network |
Algorithm | Multi-Leader Selection Mechanism | Number of Consensus Nodes | Network Model | Reward/Penalty Mechanism |
---|---|---|---|---|
VC-BFT [104] | Vague sets and credit rating | N | Semi-Synchronous Network | Slash malicious nodes, reward honest participation. |
RBFT [105] | Monitoring Mechanism and Protocol Instance Change Mechanism | N | Semi-Synchronous Network | Penalize redundant faults, incentivize consistency. |
BigBFT [106] | Dynamic Coordinator Node Selection Mechanism | N | Semi-Synchronous Network | Dynamic stake weighting for active nodes. |
FnF-BFT [107] | Hash Space Partitioning Mechanism | N | Semi-Synchronous Network | Credit-based penalties, rewards for fast response. |
Algorithm | Application Scenario or Incentive Mechanism | Number of Consensus Nodes | Network Model | Reward/Penalty Mechanism |
---|---|---|---|---|
TSPBFT [108] | PoS and PBFT Integration Mechanism | N | Semi-Synchronous Network | PoS-based staking rewards and penalties for misbehavior |
G-PBFT [109] | IoT-Based Blockchain Application Scenarios | N | Semi-Synchronous Network | No explicitly defined incentive mechanism |
EIoT-PBFT [110] | Characteristics of Cognitive IoT | N | Semi-Synchronous Network | Potentially uses IoT-specific penalties for malicious nodes |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Yuan, F.; Huang, X.; Zheng, L.; Wang, L.; Wang, Y.; Yan, X.; Gu, S.; Peng, Y. The Evolution and Optimization Strategies of a PBFT Consensus Algorithm for Consortium Blockchains. Information 2025, 16, 268. https://doi.org/10.3390/info16040268
Yuan F, Huang X, Zheng L, Wang L, Wang Y, Yan X, Gu S, Peng Y. The Evolution and Optimization Strategies of a PBFT Consensus Algorithm for Consortium Blockchains. Information. 2025; 16(4):268. https://doi.org/10.3390/info16040268
Chicago/Turabian StyleYuan, Fujiang, Xia Huang, Long Zheng, Lusheng Wang, Yuxin Wang, Xinming Yan, Shaojie Gu, and Yanhong Peng. 2025. "The Evolution and Optimization Strategies of a PBFT Consensus Algorithm for Consortium Blockchains" Information 16, no. 4: 268. https://doi.org/10.3390/info16040268
APA StyleYuan, F., Huang, X., Zheng, L., Wang, L., Wang, Y., Yan, X., Gu, S., & Peng, Y. (2025). The Evolution and Optimization Strategies of a PBFT Consensus Algorithm for Consortium Blockchains. Information, 16(4), 268. https://doi.org/10.3390/info16040268