An Efficient and Compacted DAG-Based Blockchain Protocol For Industrial Internet of Things
An Efficient and Compacted DAG-Based Blockchain Protocol For Industrial Internet of Things
6, JUNE 2020
Abstract—Industrial Internet of Things (IIoT) has been Internet, allowing IIoT users to control their devices remotely
widely used in many fields. Meanwhile, blockchain is con- and share their resources efficiently. Nowadays, the IIoT has
sidered promising to address the issues of the IIoT. How- been utilized in many fields, including manufacturing, energy
ever, the current blockchains have a limited throughput. In
this article, we devise an efficient and secure blockchain trading, healthcare, vehicles, etc. [1]. However, there are some
protocol compacted directed acyclic graph (CoDAG) based ongoing challenges in the IIoT. First, security is a major
on a compacted directed acyclic graph, where blocks are problem, where the IIoT system may be easily attacked, and
organized in levels and width. New-generated blocks in the data may be tampered by malicious third parties. In [2], the
CoDAG will be placed appropriately and point to those in the
authors pointed out that the current IIoT system is vulnerable to
previous level, making it a well-connected channel. Trans-
actions in the network will be confirmed in a deterministic resist the distributed-denial-of-service attack. Meanwhile, the
period, and the CoDAG keeps a simple data structure at traditional IIoT system relies on centralized servers to maintain
the same time. We also illustrate the attack strategies by the network, which is threatened by the weak connectivity and
adversary, and it is proved that our protocols are resistant to cracked security [3]. Second, people are concerned about the
these attacks. Furthermore, we design a CoDAG-based IIoT privacy, since their data are exposed to network operators and
architecture to improve the efficiency of the IIoT system.
Experimental results show that the CoDAG achieves 164× other users. Third, the traditional IIoT architecture relies on
Bitcoin’s throughput and 77× Ethererum’s throughput. centralized servers to handle the data computation and storage,
and it will hit a bottleneck as the number of IIoT users explodes.
Index Terms—Blockchain, compacted directed acyclic
graph (CoDAG), industrial Internet of Things (IIoT).
In these years, blockchain has been regarded as a promising
solution to the issues of IIoT [4]–[6]. Blockchain is a decentral-
I. INTRODUCTION ized ledger for distributed parties in the network. Different from
the traditional system, blockchain provides consensus among
ECENTLY, the industrial Internet of Things (IIoT)
R has been considered a promising technology and has
attracted lots of attention. With the development of network
distributed participants without any centralized authority. Trans-
actions in the network are organized in blocks, and they are
immutable and auditable. Distributed nodes share the ledger,
communication, the IIoT devices, including sensors, smart
making blockchain a reliable and trustworthy system in the
objects, etc., will communicate and interact with others via the
distributed environment. Nowadays, blockchain technology has
been employed in the IIoT, and many blockchain-based IIoT
Manuscript received May 31, 2019; revised July 11, 2019; accepted applications have emerged [7]–[12]. Generally, the blockchain-
July 18, 2019. Date of publication July 25, 2019; date of current
version February 28, 2020. This work was supported in part by the based IIoT system has lots of advantages, including the
National Key R&D Program of China under Grant 2018YFB1800302 following.
and Grant 2018YFB0803405, in part by the National Natural Science 1) Blockchain provides reliable services to guarantee the
Foundation of China under Grant No. 61772345, Grant 61625203, and
Grant 61832013, in part by the China National Funds for Distinguished security and robustness of the IIoT.
Young Scientists under Grant 61825204, in part by Beijing Outstand- 2) Blockchain protects the sensitive data in the IIoT, since
ing Young Scientist Project, and in part by the Tencent “Rhinoceros only the user with a matched private key gets access to
Birds”—Scientific Research Foundation for Young Teachers of Shenzhen
University. Paper TII-19-2220. (Corresponding author: Shu Yang.) the data.
L. Cui, S. Yang, and Z. Chen are with the College of Computer Science 3) Users are incentivized to maintain the IIoT network, since
and Software Engineering, Shenzhen University, Shenzhen 518060, blockchain rewards those who make contributions to the
China (e-mail:, [email protected]; [email protected]; 18102720
[email protected]). system.
Y. Pan is with the Department of Computer Science, Georgia State Bitcoin [13] was the first blockchain protocol, where blocks in
University, Atlanta, GA 30302 USA (e-mail:, [email protected]). the network are organized in a linear chain. The author proposed
M. Xu and K. Xu are with the Beijing National Research Center for
Information Science and Technology and the Department of Computer the proof-of-work (PoW) mechanism (also called Nakamoto
Science and Technology, Tsinghua University, Beijing 100084, China consensus) for distributed nodes to achieve consensus. More
(e-mail:, [email protected]; [email protected]). specifically, miners will compete to solve the cryptographical
Color versions of one or more of the figures in this article are available
online at http://ieeexplore.ieee.org. puzzles, and the winners are allowed to propose new blocks and
Digital Object Identifier 10.1109/TII.2019.2931157 get the corresponding rewards. Distributed miners in Bitcoin
1551-3203 © 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: UNIVERSIDADE ESTADUAL DO CEARA. Downloaded on December 14,2021 at 14:16:31 UTC from IEEE Xplore. Restrictions apply.
CUI et al.: EFFICIENT AND COMPACTED DAG-BASED BLOCKCHAIN PROTOCOL FOR INDUSTRIAL INTERNET OF THINGS 4135
share the ledger, such that the transaction information cannot be and protocols to provide the fast consensus speed. For those
tampered by any third party. IIoT devices that have greater computing power, they will act
In a blockchain-based IIoT system, lots of IIoT devices, as miners to maintain the distributed ledger, and their rewards
transactions, and sensitive resources and data are emerging will be the greatest. For the lightweight devices that have better
every moment; thus, a faster transaction processing and bandwidth, they will act as gateways to maintain the encrypted
consensus speed among the IIoT devices should be provided. communication channels and make transactions with others.
Nevertheless, the current throughput of blockchain is quite And other nodes with limited computing power and bandwidth
low. For example, Bitcoin only achieves seven transactions only need to provide the transaction payments and receive the
per second (tps), and Ethererum [14] only achieves 15 tps corresponding computational results. In this architecture, we
[15], and they cannot meet the transaction demand of the IIoT. will make full use of the resources in the IIoT, and the distributed
To improve the throughput of blockchain, different solutions IIoT devices can achieve fast consensus by using the CoDAG
were proposed, including modification on the linear chain protocols.
structure (e.g., Bitcoin-NG [16] and GHOST [17]), consensus To evaluate its performance, we implement a CoDAG proto-
mechanism (e.g., Algorand [18]), etc. Among them, solutions type, which is divided into data layer, chain layer, RPC/Console
based on the directed acyclic graph (DAG) structure [19]–[23] layer, and decentralized application (Dapp) layer. Among them,
allow multiple blocks to append the network concurrently; the chain layer is the most critical module, which is responsible
thus, they achieve the balance between asynchronization and for maintaining the network communication, data structure,
consensus speed. For the traditional DAG-based schemes miner management, and consensus algorithms. We evaluate our
(e.g., IOTA [19]), however, with more blocks appending the implementation in a real network environment, and the experi-
network, new-generated transactions will not be confirmed in a mental results show that CoDAG scales in width and blocksize.
deterministic period, and its security will decline accordingly. When the blocksize is 2 MB and the width is 15, the throughput
Although researchers developed other DAG-based schemes of the CoDAG is 1151 tps, which is 164× Bitcoin’s throughput
(e.g., Byteball [20], Spectre [21], Phantom [22], and Conflux and 77× Ethererum’s throughput, respectively. Meanwhile, we
[23]), their data structures are complicated, which will cause study the effect of different values of level formation time (the
additional and excessive computation to maintain the ledger. required duration when a level is full), and simulation results
Meanwhile, we point out that the current blockchain-based tell us that due to limited computing power and link delay,
IIoT architecture is irrational and inefficient. In the current the throughput of the CoDAG will stop growing if the level
system, every IIoT device is acting as a miner and making formation time is too small. Furthermore, we investigate the
computational contribution to the network. However, due to the block utilization (the proportion of valid blocks in the network),
limited battery, bandwidth, storage, and computing power, the and it will converge to 90% with the development of the network.
IIoT devices cannot provide enough computational services for The main contributions of this article are as follows:
the blockchain maintenance. Besides, many resources of IIoT 1) We devise an efficient and secure blockchain protocol
devices are wasted in the computation process, which will lead CoDAG to meet the transaction demand of the IIoT.
to inefficiency of the IIoT system. Hence, a new architecture 2) We design a compacted DAG structure with level and
for the IIoT should be developed to make the blockchain-based width and propose algorithms to maintain the network.
IIoT system more efficient. 3) We illustrate two basic attack strategies and a “hybrid”
In this article, we design an efficient and compacted DAG- strategy in CoDAG and prove that our CoDAG is resistant
based blockchain protocol CoDAG. Unlike the previous DAG- to them.
based solutions, we devise a compacted DAG structure with 4) We propose a CoDAG-based IIoT architecture, where the
level and width. Blocks in the CoDAG are organized in levels, CoDAG is utilized as the backbone protocols and data
and each level has a fixed width, which means the maximum structure, and the IIoT devices are divided into different
value of new-generated blocks in a round. Blocks in the cur- roles.
rent level will point to those in the previous level, such that The rest of this article is organized as follows. Section II will
the CoDAG will develop into a well-connected channel. We introduce related work of IIoT and blockchain. Section III will
design algorithms and protocols to place the new-generated present the data structure of the CoDAG and the CoDAG-based
blocks at a proper level, making sure that the CoDAG has IIoT architecture. Then, the protocols of the CoDAG and
the consistency and liveness property of blockchain. Compared well-connected channel will be studied in Sections IV and V.
with previous DAG-based schemes, transactions in the CoDAG Section VI will describe the CoDAG implementation framework
will be confirmed in a deterministic period that relies on the in detail. Simulation results will be shown in Section VII.
puzzle difficulty. Meanwhile, the CoDAG keeps a simple data Finally, Section VIII will conclude this article.
structure by modifying the existing DAG structure slightly
without introducing any additional data structure. Moreover, II. RELATED WORK
we demonstrate two basic attack strategies by adversaries and a
“hybrid” attack strategy that combines the previous strategies, A. Blockchain-Based IIoT Applications
and it is proved that our CoDAG is resistant to them. Due to the philosophy of decentralization, blockchain pro-
Furthermore, we design a CoDAG-based IIoT architecture, vides secure and reliable services for the IIoT. In the blockchain-
where the IIoT devices are divided into miner, gateway, and based IIoT system, data are stored in the distributed ledger,
node, and the CoDAG is utilized as the backbone data structure and the data computation process does not rely on any
Authorized licensed use limited to: UNIVERSIDADE ESTADUAL DO CEARA. Downloaded on December 14,2021 at 14:16:31 UTC from IEEE Xplore. Restrictions apply.
4136 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 16, NO. 6, JUNE 2020
centralized server. Besides, data privacy is guaranteed in the the consensus system (e.g., lightning network [35] and pegged
blockchain-based IIoT system, making sure that the sensitive sidechain [36]); and 2) on-chain model that improves and
industrial data will not be stolen by competitors. Additionally, modifies the traditional linear chain structure (e.g., Bitcoin-NG
the IIoT devices sharing their resources (e.g., data storage [16], GHOST [17], and IOTA [19]). For the off-chain models,
and computing) will be rewarded, which will encourage IIoT the lightning network [35] improves the throughput of Bitcoin
users to contribute to the network. These years have witnessed by building the micropayment channels between nodes. And
the emergence of many blockchain-based IIoT applications in pegged sidechains [36] are allowed to communicate with the
academia, and blockchain has been deployed in many industrial main chain through a two-way peg with desired flexibility.
fields, including energy trading, smart factory, logistics, etc. Similarly, other off-chain models rely on the trustworthy third
[24]. In [8], [25], and [26], blockchain technology is applied in parties, and they compromise decentralization. For the on-chain
energy trading and enhances the trading security and privacy. In models, on the one hand, the linear-based solutions, including
[9], blockchain combines the healthcare, making the sensitive Bitcoin-NG [16] and GHOST [17], are developed to improve the
medical data immutable and traceable. In [27], the authors efficiency, fairness, and usability of Bitcoin. However, in [33],
proposed a decentralized IIoT architecture based on blockchain it is proved that the linear-based structure is constrained by the
and introduced a whitelist mechanism for a smart factory. Liu maximum network delay in order to guarantee the security of
et al. [28] developed a blockchain-based anonymous reputation blockchain.
system and enhanced the retail marketing. And Huang et al. On the other hand, the DAG-based solutions [19]–[23] enjoy a
[29] devised a credit-based PoW mechanism and provided good throughput performance. Unlike the linear-based models,
a data authority management for the blockchain-based IIoT DAG-based solutions allow multiple blocks to attach to the
system. tail of the DAG structure simultaneously. Among them, IOTA
However, we note that the current blockchain-based IIoT sys- [19] provides the fast consensus service for distributed nodes,
tem utilizes the traditional blockchain platforms (e.g., Bitcoin, where the new-generated blocks will confirm and point to two
smart contracts, etc.), and they cannot provide fast consensus invalidated blocks existed in the network. Meanwhile, there are
for distributed nodes in the IIoT system. Besides, the current no miners in IOTA; thus, the users can make transactions without
blockchain-based IIoT system is not efficient enough, since any service charge. However, the transaction confirmation time
lots of computation resources are wasted. Therefore, in this and security of IOTA are not guaranteed as more blocks join the
article, we will discuss the throughput limitation of traditional network. Besides, the blocks in IOTA is not full ordered, such
blockchains and design a new blockchain protocol CoDAG and that there may exist some conflicting transactions, which will
a new blockchain-based IIoT architecture. not be successfully validated due to the absence of liveness. To
solve the issues in IOTA, some improved DAG-based solutions
were developed. Byteball [20] maintains the chain by a portion
B. Throughput of Current Blockchain of reputable witnesses elected by others and establishes a full
In a distributed environment, in order to achieve consensus order between blocks. However, it compromises decentraliza-
among nodes, many protocols were proposed, which can be cat- tion, since the ledger is maintained by a finite number of
egorized into permissioned protocol, permissionless protocol, designated nodes. In the academic area, the DAGlabs proposed
and hybrid protocol. For permissioned protocols (e.g., PBFT two protocols called Spectre [21] and Phantom [22]. Spectre
[30], Paxos [31]), only a finite number of designated nodes [21] adopts a voting mechanism that every block will submit its
with permission are selected to maintain the ledger, and its vote to a pair of previous blocks and try to determine the block
consensus speed will be very fast. Nowadays, permissioned order according to the majority of votes. Although Spectre has
protocols are applied in Hyperledger fabric [32], which allows a high throughput and fast transaction confirmation speed, it
users to develop their Dapp and achieve fast consensus in the still cannot be extended to support the full linear order over
distributed system. However, in permissioned protocols, only all blocks. To solve the order issue of Spectre, the DAGlabs
the designated parties are allowed to join the network, which devised Phantom [22] to support the full order of blockchain
will lead to centralization. For permissionless protocols, the maintained by honest nodes. However, Phantom compromises
Nakamoto consensus [13] is the first blockchain protocol applied the transaction speed and confirmation time. Conflux [23]
in Bitcoin, and nodes can dynamically join or leave the network. introduces the parent edge and reference edge and maintains
The Nakamoto consensus has two properties of blockchain [33], the pivot chain to keep the full order of blockchain, but its
[34]: 1) consistency: distributed miners in the network have the confirmation time is still nondeterministic.
consistent view of the chain; and 2) liveness: a new-submitted Moreover, Pass and Shi designed the hybrid protocol [37]
transaction will appear in the ledger of all miners. However, the that combines the permissioned and permissionless protocols
throughput of Bitcoin is only 7 tps, which cannot keep up with and devised Thunderella [38] to support instant transactions.
the demand in the IIoT world. However, the performance of hybrid protocol is limited, since
Many improved permissionless protocols were designed to the permissionless protocol is still employed as the backbone
improve the throughput of blockchain, which can be categorized consensus in the hybrid protocol.
into the following: 1) off-chain model that builds additional As a summary, a comparison between different consensus
chains outside the main chain and reduces the participants in protocols is presented in Table I.
Authorized licensed use limited to: UNIVERSIDADE ESTADUAL DO CEARA. Downloaded on December 14,2021 at 14:16:31 UTC from IEEE Xplore. Restrictions apply.
CUI et al.: EFFICIENT AND COMPACTED DAG-BASED BLOCKCHAIN PROTOCOL FOR INDUSTRIAL INTERNET OF THINGS 4137
TABLE I
COMPARISON BETWEEN DIFFERENT CONSENSUS PROTOCOLS
TABLE II
NOTATION LIST
Authorized licensed use limited to: UNIVERSIDADE ESTADUAL DO CEARA. Downloaded on December 14,2021 at 14:16:31 UTC from IEEE Xplore. Restrictions apply.
4138 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 16, NO. 6, JUNE 2020
Authorized licensed use limited to: UNIVERSIDADE ESTADUAL DO CEARA. Downloaded on December 14,2021 at 14:16:31 UTC from IEEE Xplore. Restrictions apply.
CUI et al.: EFFICIENT AND COMPACTED DAG-BASED BLOCKCHAIN PROTOCOL FOR INDUSTRIAL INTERNET OF THINGS 4139
Authorized licensed use limited to: UNIVERSIDADE ESTADUAL DO CEARA. Downloaded on December 14,2021 at 14:16:31 UTC from IEEE Xplore. Restrictions apply.
4140 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 16, NO. 6, JUNE 2020
We first prove that in any level k > l, for the two honest nodes
vi and vj , then Cv i ,a = Cv j ,a and Cv i ,b = Cv j ,b ; for the two
adversary nodes wi and wj , Cw i ,a = Cw j ,a and Cw i ,b = Cw j ,b .
We prove it through induction. In level l + 1, all honest nodes
will point to a and avoid pointing to b; thus, their connectivity
to a is 1 and connectivity to b is 0; all adversary nodes will
point to b and avoid pointing to a; thus, their connectivity to
a is 0, and connectivity to b is 1. For a level k > l, suppose
the nodes in the level satisfy the assumption, and there are
P honest nodes and Q adversary nodes, any honest node v k
satisfies Cv k ,a = X and Cv k ,b = Y , and any adversary node
wk satisfies Cw k ,a = X and Cw k ,b = Y . Then, in level k + 1,
for any honest node v k +1 , Cv k + 1 ,a = X ∗ P + X ∗ (K − P )
and Cv k + 1 ,b = Y ∗ P + Y ∗ (K − P ); for any adversary node
wk +1 , Cw k + 1 ,a = X ∗ Q + X ∗ (K − Q) and Cw k + 1 ,b = Y ∗
Q + Y ∗ (K − Q).
Then, we prove the above Lemma. For a level k > l, R(k) =
∀v k Rv k is the totalreverse connectivity of all honest nodes in
level k, and R̂(k) = ∀v k Rw k is the total reverse connectivity
of all adversary nodes. Suppose R̂(k )
R(k ) ≥ should be satisfied
to make the adversary party catch up with the honest party. In
level k + 1, we will have R(k) = R(k + 1) ∗ P + R̂(k + 1) ∗
(K − Q) and R̂(k) = R̂(k + 1) ∗ Q + R(k + 1) ∗ (K − P )
indicating that all honest nodes will point to honest nodes first,
and all adversary nodes will point to adversary nodes first. Based
on the above equations, we can infer that R̂(k +1) ∗P +P −K
R(k +1) ≥ Q +Q ∗−∗K .
Because P and Q follow two independent Poisson distribu-
tions, the expectation value E( R̂(k +1) ∗E (P )+E (P )−K
R(k +1) ) ≥ E (Q )+E (Q )∗−∗K ≥
∗ E( QP
) = ∗ pq , where E( QP
) is the ratio of the computing
power of the honest party to the computing power of the
adversary party. Fig. 3. Two attack strategies in the CoDAG. (a) Adversary builds an
alternate channel. (b) Adversary competes in the original channel.
An example. Suppose there is an adversary trying to conduct
a malicious behavior (e.g., double-spending attack [39], [40]).
Similar to Bitcoin, the attacker needs to append the blocks TABLE III
that contains his own forged transaction records to the network POSSIBILITY OF CANDIDATE IDENTITY DEPRIVATION
and control the candidate identity of the CoDAG, such that the
following new-generated blocks will verify and point to those
adversary candidates.
We will compute the possibility of the candidate identity
deprivation of node v in different values of q and z (shown in
Table III).
We can see that given a fixed value of q, when the value
of z grows, the possibility of the candidate identity deprivation
will decrease exponentially. Therefore, as the network develops,
our CoDAG protocol is secure to resist the candidate identity
deprivation.
We point out that there are two attack strategies that may
happen in the CoDAG. The first is that the adversary will build will be given to honest nodes. The strategy for an honest node
a completely separate new channel [see Fig. 3(a)]. In this case, is just opposite.
the adversary will point to adversarial nodes in the new channel In the second strategy, each node has K votes. For the honest
rather than the honest node in the original channel, which is the nodes, they will first give their votes to honest nodes and then
same as Bitcoin. randomly give their remaining votes to adversary nodes in
The second is that the adversaries will compete in the original previous level. Contrary to honest party, the adversary nodes will
channel with honest nodes [see Fig. 3(b)]. For an adversary, it first give their votes to adversary nodes and then randomly give
will first point to adversarial nodes, and the remaining pointers their remaining votes to honest nodes. However, in Lemma 2,
Authorized licensed use limited to: UNIVERSIDADE ESTADUAL DO CEARA. Downloaded on December 14,2021 at 14:16:31 UTC from IEEE Xplore. Restrictions apply.
CUI et al.: EFFICIENT AND COMPACTED DAG-BASED BLOCKCHAIN PROTOCOL FOR INDUSTRIAL INTERNET OF THINGS 4141
Authorized licensed use limited to: UNIVERSIDADE ESTADUAL DO CEARA. Downloaded on December 14,2021 at 14:16:31 UTC from IEEE Xplore. Restrictions apply.
4142 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 16, NO. 6, JUNE 2020
TABLE IV
DEFAULT SIMULATION PARAMETERS
VII. EVALUATION
A. Experiment Setup
To evaluate CoDAG’s performance in a real environment,
computing devices with different computing power are de-
ployed, including a server, 5 Mac Minis, and 4 Lenovo laptops,
and they are connected in a LAN-based environment. In a
LAN-based environment, the link delay is very small; thus, the
Fig. 6. Simulation equipment.
information propagation delay of the CoDAG will be negligible.
To emulate a real-world network environment, we manually add
some link propagation delay to the network. More specifically, required duration when a level is full of K blocks. Assume
we use the NetEm [41], which is a network emulation module the level formation time of the system is T ; then, the average
T
to simulate the link delay in a LAN environment. In this article, proposal time of every single block will be K . Therefore, the
the average delay time is set to be 50 ms [42]. In this case, the level formation time will directly influence the block proposal
link latency will be added to the network; thus, we can evaluate time in the network and then influence the throughput of the
our CoDAG prototype in a real network environment. CoDAG. In this article, we will study the relationship between
Additionally, we design a script to produce enough transac- the throughput and different values of level formation time. We
tions with random amounts and addresses. In the CoDAG, every will change the level formation time by altering the mining
miner has a transaction pool to store the transactions that send difficulty of the system. The more mining difficulty is, the more
to it. Initially, we let the trigger node run the script, and the level formation time it will be.
new-generated transactions will be stored in the matched miner Besides, we denote the block utilization as the proportion of
pools according to the transaction addresses and wait to be valid blocks in the network. In our prototype, if the width of a
bundled by the corresponding miners. In this case, miners will level exceeds K, some blocks will become invalid and wait to
try their best to bundle transactions in their pools and append reappend to the network again. Hence, we use block utilization
the block to the network. to measure the percentage of valid blocks of the system,
In our experiments, we will evaluate the CoDAG’s perfor- and investigate the relationship between block utilization and
mance in different values of blocksize and width. The blocksize different values of blocksize and width. The default simulation
will scale from 10 kB to 2 MB, and the width will vary from parameters are listed in Table IV. The simulation topology and
1 to 20. Meanwhile, we define level formation time as the equipment are presented in Fig. 5 and 6 respectively.
Authorized licensed use limited to: UNIVERSIDADE ESTADUAL DO CEARA. Downloaded on December 14,2021 at 14:16:31 UTC from IEEE Xplore. Restrictions apply.
CUI et al.: EFFICIENT AND COMPACTED DAG-BASED BLOCKCHAIN PROTOCOL FOR INDUSTRIAL INTERNET OF THINGS 4143
Fig. 7. Relationship between throughput and width. Fig. 9. Throughput of the CoDAG in different level formation time when
blocksize = 20 kB.
B. Experiment Results
1) Throughput in Different Blocksizes and Widths: Figs. 7 larger values of width and blocksize outperforms the smaller
and 8 present the CoDAG’s throughput in different blocksizes one. Especially, when the blocksize is 2 MB and the width is
and widths. In Fig. 7, we can observe that given a fixed blocksize, 15, the CoDAG achieves the highest throughput of 1151 tps,
as the width grows, the throughput of CoDAG shows an in- which is 164× Bitcoin’s and 77× Ethereum’s. Moreover, we
creasing trend. Meanwhile, given a fixed width, as the blocksize notice that the throughput of the CoDAG soars as the blocksize
grows, the throughput will rise accordingly. For example, when grows from 32 to 256 kB. However, when the blocksize reaches
the blocksize is fixed at 30 kB, the CoDAG with a width of a larger value, the throughput presents a slower growth. The
20 can achieve 394 tps, which is larger than other widths. reason is that, due to the propagation latency, a block with a
Moreover, when the width is fixed at 20, the CoDAG with a larger blocksize will contain excessive transactions that cannot
blocksize of 30 kB is 2.6 times as blocksize = 10 kB and 1.9 be handled in time. Additionally, limited computing power of
times as blocksize = 20 kB, respectively. Besides, the CoDAG miners is also one of the restrictions.
always performs better than Bitcoin and Ethererum. In Fig. 7, 2) Throughput in Different Level Formation Time: Figs. 9
the CoDAG can achieve 394 tps, which is 56× Bitcoin’s and and 10 depict the throughput in different level formation time.
26× Ethererum’s. Meanwhile, we also notice some throughput Generally, we can observe that the CoDAG with a longer level
fluctuations as the width of the CoDAG grows. If blocksize formation time performs worse than smaller ones. In Fig. 9,
is fixed at 30 kB, when the width increases from 13 to 14, when the blocksize is fixed at 20 kB, the CoDAG with 18 s
the throughput of the CoDAG presents a slight decline. The performs worse than 8 and 13 s. Moreover, we notice no
reasons are twofolds: 1) a larger width will bring more block obvious deviation between 8 and 13 s, which means when level
information for distributed nodes to synchronize and lead to formation time declines to a relatively small value, it will have
longer propagation delay; and 2) there is some instability of the a limited effect on CoDAG’s throughput. In theory, less level
transaction generation rate, and the amount of transactions may formation time will lead to faster block generation rate, and the
be instable, and one of our future works is to improve it. throughput will rise accordingly. However, due to the capacity,
Fig. 8 also observes the relationship between throughput in excessive transactions and blocks cannot be computed and ver-
different blocksizes and widths. We can see that the CoDAG with ified by miners in time; thus, the throughput gap is not obvious.
Authorized licensed use limited to: UNIVERSIDADE ESTADUAL DO CEARA. Downloaded on December 14,2021 at 14:16:31 UTC from IEEE Xplore. Restrictions apply.
4144 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 16, NO. 6, JUNE 2020
Authorized licensed use limited to: UNIVERSIDADE ESTADUAL DO CEARA. Downloaded on December 14,2021 at 14:16:31 UTC from IEEE Xplore. Restrictions apply.
CUI et al.: EFFICIENT AND COMPACTED DAG-BASED BLOCKCHAIN PROTOCOL FOR INDUSTRIAL INTERNET OF THINGS 4145
[31] L. Lamport et al., “Paxos made simple,” ACM Sigact News, vol. 32, no. 4, Yi Pan received the B.E. and M.E. degrees
pp. 18–25, 2001. in computer engineering from Tsinghua Univer-
[32] E. Androulaki et al., “Hyperledger fabric: A distributed operating system sity, Beijing, China, in 1982 and 1984, respec-
for permissioned blockchains,” in Proc. 13th EuroSys Conf., 2018, p. 30. tively, and the Ph.D. degree in computer science
[33] R. Pass, L. Seeman, and A. Shelat, “Analysis of the blockchain protocol from the University of Pittsburgh, Pittsburgh, PA,
in asynchronous networks,” in Proc. Annu. Int. Conf. Theory Appl. USA, in 1991.
Cryptograph. Techn., 2017, pp. 643–673. He is currently a Regents’ Professor and
[34] J. Garay, A. Kiayias, and N. Leonardos, “The bitcoin backbone protocol: Chair of Computer Science with Georgia State
Analysis and applications,” in Proc. Annu. Int. Conf. Theory Appl. University, Atlanta, GA, USA. He has served
Cryptograph. Techn., 2015, pp. 281–310. as an Associate Dean and Chair of Biology
[35] J. Poon and T. Dryja, “The bitcoin lightning network: Scalable off-chain Department from 2013 to 2017 and the Chair
instant payments,” 2016. of Computer Science from 2006 to 2013. His profile has been featured
[36] A. Back et al., “Enabling blockchain innovations with pegged sidechains,” as a distinguished alumnus in both Tsinghua Alumni Newsletter and
2014. [Online]. Available: https://blockstream.com/sidechains.pdf University of Pittsburgh CS Alumni Newsletter. He has authored or coau-
[37] R. Pass and E. Shi, “Hybrid consensus: Efficient consensus in the thored more than 250 journal papers with more than 90 papers published
permissionless model,” in Proc. 31st Int. Symp. Distrib. Comput., 2017, in various IEEE journals. In addition, he has authored or coauthored
pp. 39:1–39:16. 194 papers in refereed conferences. He has also coauthored/coedited
[38] R. Pass and E. Shi, “Thunderella: Blockchains with optimistic instant 44 books. His work has been cited more than 10 000 times in Google
confirmation,” in Proc. Proc. Annu. Int. Conf. Theory Appl. Cryptograph. Scholar. His current H-index is 54. He has served as an Editor-in-Chief
Techn., 2018, pp. 3–33. or editorial board member for 20 journals including seven IEEE Transac-
[39] G. O. Karame, E. Androulaki, and S. Capkun, “Double-spending fast tions. He has organized many international conferences and delivered
payments in bitcoin,” in Proc. ACM Conf. Comput. Commun. Secur., 2012, keynote speeches at more than 60 international conferences around the
pp. 906–917. world. His research interests include parallel and cloud computing, big
[40] M. Rosenfeld, “Analysis of hashrate-based double spending,” 2014, data, and bioinformatics.
arXiv:1402.2009. Dr. Pan is the recipient of many awards including an IEEE Trans-
[41] S. Hemminger et al., “Network emulation with NetEm,” in Proc. Linux actions Best Paper Award, IEEE Conference Best Paper Awards, and
Conf. AU, 2005, pp. 18–23. several other conference and journal Best Paper Awards, four IBM
[42] L. T. Nguyen, R. Harris, and J. Jusak, “Analysis of networking and Faculty Awards, two Japan Society for the Promotion of Science Senior
application layer derived metrics for web quality of experience,” in Proc. Invitation Fellowships, the IEEE Outstanding Leadership Award, the
IEEE Consum. Commun. Netw. Conf., 2012, pp. 321–325. IEEE International Conference on BioInformatics and BioEngineering
(BIBE) Outstanding Achievement Award, the National Science Founda-
tion (NSF) Research Opportunity Award, and the Air Force Office of
Laizhong Cui received the B.S. degree in com- Scientific Research (AFOSR) Summer Faculty Research Fellowship.
puter science and technology from Jilin Uni-
versity, Changchun, China, in 2007, and the
Ph.D. degree in computer science and technol-
ogy from Tsinghua University, Beijing, China, in
2012.
He is currently an Associate Professor with
the College of Computer Science and Software
Engineering, Shenzhen University, Shenzhen,
China. He led the projects of the National Key
Research and Development Program of China,
National Natural Science Foundation, and several projects of Guang-
dong Province and Shenzhen City. His research interests include future Mingwei Xu (M’08) received the B.Sc. and Ph.D.
Internet architecture, edge computing, big data, Internet of Things, degrees in computer science and technology
computational intelligence, software-defined networks, and machine from Tsinghua University, Beijing, China.
learning. He is currently a Full Professor with the De-
partment of Computer Science, Tsinghua Uni-
versity. His research interests include computer
network architecture and high-speed router
Shu Yang received the B.Sc. degree from the architecture.
Beijing University of Posts and Telecommunica-
tions, Beijing, China, in 2009, and the Ph.D. de-
gree from Tsinghua University, Beijing, in 2014,
both in computer science and technology.
His research interests include network
architecture and high-performance routers.
Ziteng Chen received the B.Sc. degree in com- Ke Xu received the B.Sc., M.Sc., and Ph.D. de-
munication engineering in 2018 from Shen- grees in computer science and technology from
zhen University, Shenzhen, China, where he is Tsinghua University, Beijing, China, in 1996,
currently working toward the M.Sc. degree in 1998, and 2001 respectively.
computer science and technology. He is with the Department of Computer
His research interests include software- Science and Technology, Tsinghua University,
defined networks and blockchain. Beijing. He is also with the Beijing National
Research Center for Information Science and
Technology, Beijing.
Authorized licensed use limited to: UNIVERSIDADE ESTADUAL DO CEARA. Downloaded on December 14,2021 at 14:16:31 UTC from IEEE Xplore. Restrictions apply.