2021
DOI: 10.1145/3395331
|View full text |Cite
|
Sign up to set email alerts
|

Concurrent Practical Byzantine Fault Tolerance for Integration of Blockchain and Supply Chain

Abstract: Currently, the integration of the supply chain and blockchain is promising, as blockchain successfully eliminates the bullwhip effect in the supply chain. Generally, concurrent Practical Byzantine Fault Tolerance (PBFT) consensus method, named C-PBFT, is powerful to deal with the consensus inefficiencies, caused by the fast node expansion in the supply chain. However, due to the tremendous complicated transactions in the supply chain, it remains challenging to select the credible primary peers in the concurren… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
31
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 71 publications
(34 citation statements)
references
References 29 publications
0
31
0
Order By: Relevance
“…Several more examples of such studies are presented in [36,37]. In [38], it is proposed to use the concurrent PBFT consensus mechanism to solve the problem of the fast node expansion in the supply chain. At the same time, the authors propose to classify peers in the supply chain into several clusters using transaction analysis.…”
Section: E Practical Byzantine Fault Tolerancementioning
confidence: 99%
“…Several more examples of such studies are presented in [36,37]. In [38], it is proposed to use the concurrent PBFT consensus mechanism to solve the problem of the fast node expansion in the supply chain. At the same time, the authors propose to classify peers in the supply chain into several clusters using transaction analysis.…”
Section: E Practical Byzantine Fault Tolerancementioning
confidence: 99%
“…Sometimes, the hackers send a large number of instructions and data to the terminal of the mobile device, which makes the communication network appear to be blocked negatively. Due to data transmission via the wireless network, the hackers analyze the frequency so that they can complete wiretapping work [42]. In severe cases, communication data will be tampered by hackers, causing a negative phenomenon of data loss.…”
Section: Secure Risk Of Data Transmissionmentioning
confidence: 99%
“…Yu et al [28] considered that when multiple mobile users offload repetitive computing tasks to the edge of the network, they developed a cache-enhanced service offloading strategy based on sharing computing results to reduce the delay in task processing. As the subject of machine learning becomes more and more popular, researchers have also begun to study how to apply machine learning to edge IoT systems [29][30][31]. Liu et al [28] grouped users according to priority.…”
Section: Related Workmentioning
confidence: 99%