AI Chat Paper
Note: Please note that the following content is generated by AMiner AI. SciOpen does not take any responsibility related to this content.
{{lang === 'zh_CN' ? '文章概述' : 'Summary'}}
{{lang === 'en_US' ? '中' : 'Eng'}}
Chat more with AI
PDF (1.7 MB)
Collect
Submit Manuscript AI Chat Paper
Show Outline
Outline
Show full outline
Hide outline
Outline
Show full outline
Hide outline
Open Access

Jamming-Resilient Consensus for Wireless Blockchain Networks

School of Computer Science and Technology, Shandong University, Qingdao 266237, China
School of Cyber Science and Engineering, Wuhan University, Wuhan 430072, China
Show Author Information

Abstract

As the device complexity keeps increasing, the blockchain networks have been celebrated as the cornerstone of numerous prominent platforms owing to their ability to provide distributed and immutable ledgers and data-driven autonomous organizations. The distributed consensus algorithm is the core component that directly dictates the performance and properties of blockchain networks. However, the inherent characteristics of the shared wireless medium, such as fading, interference, and openness, pose significant challenges to achieving consensus within these networks, especially in the presence of malicious jamming attacks. To cope with the severe consensus problem, in this paper, we present a distributed jamming-resilient consensus algorithm for blockchain networks in wireless environments, where the adversary can jam the communication channel by injecting jamming signals. Based on a non-binary slight jamming model, we propose a distributed four-stage algorithm to achieve consensus in the wireless blockchain network, including leader election, leader broadcast, leader aggregation, and leader announcement stages. With high probability, we prove that our jamming-resilient algorithm can ensure the validity, agreement, termination, and total order properties of consensus with the time complexity of O(n). Both theoretical analyses and empirical simulations are conducted to verify the consistency and efficiency of our algorithm.

References

[1]
S. Nakamoto, Bitcoin: A peer-to-peer electronic cash system, https://bitcoin.org/bitcoin.pdf, 2008.
[2]

T. T. A. Dinh, R. Liu, M. Zhang, G. Chen, B. C. Ooi, and J. Wang, Untangling blockchain: A data processing view of blockchain systems, IEEE Trans. Knowl. Data Eng., vol. 30, no. 7, pp. 1366–1385, 2018.

[3]

F. Tschorsch and B. Scheuermann, Bitcoin and beyond: A technical survey on decentralized digital currencies, IEEE Commun. Surv. Tutorials, vol. 18, no. 3, pp. 2084–2123, 2016.

[4]
Q. Xu, Y. Zou, D. Yu, M. Xu, S. Shen, and F. Li, Consensus in wireless blockchain system, in Proc. Wireless Algorithms, Systems, and Applications, Qingdao, China, 2020, pp. 568–579.
[5]

B. Huang, L. Peng, W. Zhao, and N. Chen, Workload-based randomization Byzantine fault tolerance consensus protocol, High Confid. Comput., vol. 2, no. 3, p. 100070, 2022.

[6]

M. Xu, S. Liu, D. Yu, X. Cheng, S. Guo, and J. Yu, CloudChain: A cloud blockchain using shared memory consensus and RDMA, IEEE Trans. Comput., vol. 71, no. 12, pp. 3242–3253, 2022.

[7]

Y. Zou, M. Xu, J. Yu, F. Zhao, and X. Cheng, A fast consensus for permissioned wireless blockchains, IEEE Internet Things J., vol. 10, no. 14, pp. 12102–12111, 2023.

[8]

L. Yang, Y. Zou, M. Xu, Y. Xu, D. Yu, and X. Cheng, Distributed consensus for blockchains in Internet-of-Things networks, Tsinghua Science and Technology, vol. 27, no. 5, pp. 817–831, 2022.

[9]

E. Bayraktaroglu, C. King, X. Liu, G. Noubir, R. Rajaraman, and B. Thapa, Performance of IEEE 802.11 under jamming, Mobile Netw. Appl., vol. 18, pp. 678–696, 2013.

[10]
Y. Xiao, N. Zhang, W. Lou, and Y. T. Hou, Modeling the impact of network connectivity on consensus security of proof-of-work blockchain, in Proc. IEEE INFOCOM 2020 - IEEE Conf. Computer Communications, Toronto, Canada, 2020, pp. 1–10.
[11]

H. Xu, L. Zhang, Y. Liu, and B. Cao, RAFT based wireless blockchain networks in the presence of malicious jamming, IEEE Wirel. Commun. Lett., vol. 9, no. 6, pp. 817–821, 2020.

[12]

H. Pirayesh, P. Kheirkhah Sangdeh, and H. Zeng, Securing ZigBee communications against constant jamming attack using neural network, IEEE Internet Things J., vol. 8, no. 6, pp. 4957–4968, 2021.

[13]
B. Awerbuch, A. Richa, and C. Scheideler, A jamming-resistant MAC protocol for single-hop wireless networks, in Proc. Twenty-Seventh ACM Symp. on Principles of Distributed Computing, Toronto, Canada, 2008, pp. 45–54.
[14]

Z. Han, J. Ma, C. Xu, and G. Zhang, UltraJam: Ultrasonic adaptive jammer based on nonlinearity effect of microphone circuits, High Confid. Comput., vol. 3, no. 3, p. 100129, 2023.

[15]
A. Richa, C. Scheideler, S. Schmid, and J. Zhang, Self-stabilizing leader election for single-hop wireless networks despite jamming, in Proc. Twelfth ACM Int. Symp. on Mobile Ad Hoc Networking and Computing, Paris, France, 2011, pp. 1–10.
[16]
S. King and S. Nadal, PPCoin: Peer-to-peer crypto-currency with proof-of-stake, https://peercoin.net/assets/paper/peercoin-paper.pdf, 2012.
[17]

Y. Zou, M. Xu, D. Yu, L. Chen, S. Guo, and X. Xing, Implementation of abstract MAC layer under jamming, Tsinghua Science and Technology, vol. 27, no. 2, pp. 257–269, 2022.

[18]
S. De Angelis, L. Aniello, R. Baldoni, F. Lombardi, A. Margheri, and V. Sassone, PBFT vs proof-of-authority: Applying the CAP theorem to permissioned blockchain, in Proc. 2nd Italian Conference on Cyber Security, ITASEC 2018, Milan, Italy, 2018, pp. 1–11.
[19]
D. Yu, Q. S. Hua, Y. Wang, and F. C. M. Lau, An O(logn) distributed approximation algorithm for local broadcasting in unstructured wireless networks, in Proc. IEEE 8th Int. Conf. Distributed Computing in Sensor Systems, Hangzhou, China, 2012, pp. 132–139.
[20]

A. Richa, C. Scheideler, S. Schmid, and J. Zhang, Competitive throughput in multi-hop wireless networks despite adaptive jamming, Distrib. Comput., vol. 26, no. 3, pp. 159–171, 2013.

[21]
A. Ogierman, A. Richa, C. Scheideler, S. Schmid, and J. Zhang, Competitive MAC under adversarial SINR, in Proc. IEEE INFOCOM 2014 - IEEE Conf. Computer Communications, Toronto, Canada, 2014, pp. 2751–2759.
[22]
Y. Zou, D. Yu, L. Wu, J. Yu, Y. Wu, Q. S. Hua, and F. C. M. Lau, Fast distributed backbone construction despite strong adversarial jamming, in Proc. IEEE INFOCOM 2019 - IEEE Conf. Computer Communications, Paris, France, 2019, pp. 1027–1035.
[23]

X. Lu, J. Jie, Z. Lin, L. Xiao, J. Li, and Y. Zhang, Reinforcement learning based energy efficient robot relay for unmanned aerial vehicles against smart jamming, Sci. China Inf. Sci., vol. 65, no. 1, p. 112304, 2021.

[24]

C. Zhao, Q. Wang, X. Liu, C. Li, and L. Shi, Reinforcement learning based a non-zero-sum game for secure transmission against smart jamming, Digit. Signal Process., vol. 112, p. 103002, 2021.

[25]
Y. Bai, S. Amin, X. Wang, and L. Jin, Securing signal-free intersections against strategic jamming attacks: A macroscopic approach, in Proc. IEEE 61st Conf. Decision and Control, Cancun, Mexico, 2022, pp. 1–17.
[26]
Y. Liang, J. Ren, and T. Li, Secure and efficient OFDM system design under disguised jamming, in Proc. Int. Conf. Computing, Networking and Communications (ICNC), Big Island, HI, USA, 2020, pp. 394–399.
[27]

L. Zhou, C. Zhang, Q. Zeng, X. Liu, and H. Wu, Optimal low-hit-zone frequency-hopping sequence sets with wide-gap for FHMA systems under follower jamming, IEEE Commun. Lett., vol. 26, no. 5, pp. 969–973, 2022.

[28]

C. Dwork, N. Lynch, and L. Stockmeyer, Consensus in the presence of partial synchrony, J. ACM, vol. 35, no. 2, pp. 288–323, 1988.

[29]

D. Yu, L. Ning, Y. Zou, J. Yu, X. Cheng, and F. C. M. Lau, Distributed spanner construction with physical interference: Constant stretch and linear sparseness, IEEE/ACM Trans. Networking, vol. 25, no. 4, pp. 2138–2151, 2017.

[30]
D. Yu, Y. Zhang, Y. Huang, H. Jin, J. Yu, and Q. S. Hua, Exact implementation of abstract MAC layer via carrier sensing, in Proc. IEEE INFOCOM 2018 - IEEE Conf. Computer Communications, Honolulu, HI, USA, 2018, pp. 1196–1204.
[31]

D. Yu, Y. Zou, J. Yu, X. Cheng, Q. S. Hua, H. Jin, and F. C. M. Lau, Stable local broadcast in multihop wireless networks under SINR, IEEE/ACM Trans. Networking, vol. 26, no. 3, pp. 1278–1291, 2018.

[32]

Y. Zou, M. Xu, H. Sheng, X. Xing, Y. Xu, and Y. Zhang, Crowd density computation and diffusion via Internet of Things, IEEE Internet Things J., vol. 7, no. 9, pp. 8111–8121, 2020.

[33]

M. M. Halldórsson, S. Holzer, E. A. Markatou, and N. Lynch, Leader election in SINR model with arbitrary power control, Theor. Comput. Sci., vol. 811, pp. 21–28, 2020.

[34]

L. Yang, Y. Zou, D. Yu, and J. Yu, Distributed Age-of-Information optimization in edge computing for Internet of Vehicles, J. Syst. Archit., vol. 144, p. 103000, 2023.

[35]
R. Motwani and P. Raghavan, Randomized Algorithms. Cambridge, UK: Cambridge University Press, 1995.
Tsinghua Science and Technology
Pages 262-278
Cite this article:
Zou Y, Hou M, Yang L, et al. Jamming-Resilient Consensus for Wireless Blockchain Networks. Tsinghua Science and Technology, 2025, 30(1): 262-278. https://doi.org/10.26599/TST.2023.9010160

99

Views

7

Downloads

0

Crossref

0

Web of Science

0

Scopus

0

CSCD

Altmetrics

Received: 21 October 2023
Revised: 03 December 2023
Accepted: 20 December 2023
Published: 11 September 2024
© The Author(s) 2025.

The articles published in this open access journal are distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/).

Return