Blockchain: A Comparative Study of Consensus Algorithms PoW, PoS, PoA, PoV

Full Text (PDF, 679KB), PP.46-57

Views: 0 Downloads: 0

Author(s)

Shahriar Fahim 1 SM Katibur Rahman 1 Sharfuddin Mahmood 1,*

1. American International University- Bangladesh, Department of Computer Science, Dhaka-1229, Bangladesh

* Corresponding author.

DOI: https://doi.org/10.5815/ijmsc.2023.03.04

Received: 10 Apr. 2023 / Revised: 31 May 2023 / Accepted: 23 Jun. 2023 / Published: 8 Aug. 2023

Index Terms

Blockchain, Consensus algorithms, Blockchain Scalability

Abstract

Since the inception of Blockchain, the computer database has been evolving into innovative technologies. Recent technologies emerge, the use of Blockchain is also flourishing. All the technologies from Blockchain use a mutual algorithm to operate. The consensus algorithm is the process that assures mutual agreements and stores information in the decentralized database of the network. Blockchain’s biggest drawback is the exposure to scalability. However, using the correct consensus for the relevant work can ensure efficiency in data storage, transaction finality, and data integrity. In this paper, a comparison study has been made among the following consensus algorithms: Proof of Work (PoW), Proof of Stake (PoS), Proof of Authority (PoA), and Proof of Vote (PoV). This study aims to provide readers with elementary knowledge about blockchain, more specifically its consensus protocols. It covers their origins, how they operate, and their strengths and weaknesses. We have made a significant study of these consensus protocols and uncovered some of their advantages and disadvantages in relation to characteristics details such as security, energy efficiency, scalability, and IoT (Internet of Things) compatibility. This information will assist future researchers to understand the characteristics of our selected consensus algorithms.

Cite This Paper

Shahriar Fahim, SM Katibur Rahman, Sharfuddin Mahmood, "Blockchain: A Comparative Study of Consensus Algorithms PoW, PoS, PoA, PoV", International Journal of Mathematical Sciences and Computing(IJMSC), Vol.9, No.3, pp. 46-57, 2023. DOI:10.5815/ijmsc.2023.03.04

Reference

[1]Lasla, N., Alsahan, L., Abdallah, M. and Younis, M., 2020. Green-PoW: An Energy-Efficient Blockchain Proof-of-Work Consensus Algorithm. arXiv preprint arXiv:2007.04086.
[2]Meneghetti, A., Sala, M. and Taufer, D., 2020. A survey on pow-based consensus. Annals of Emerging Technologies in Computing (AETiC), Print ISSN, pp.2516-0281.
[3]Alrubei, S., Ball, E. and Rigelsford, J., HDPoA: Honesty-based distributed proof of authority via scalable work consensus protocol for IoT-blockchain applications. Available at SSRN 3999127.
[4]Parinya Ekparinya, P., Gramoli, V. and Jourjon, G., 1902. The Attack of the Clones against Proof-of-Authority.
[5]Kejiao, L, Hui, L. Hanxu, H. Kedan, L. and Yongle Chen,” Proof of Vote: A High-Performance Consensus Protocol Based on Vote Mechanism & Consortium Blockchain,” 2017.
[6]Yuefei Gao, Shin Kawai, Hajime Nobuhara, "Scalable Blockchain Protocol Based on Proof of Stake and Sharding, " in 2019, Volume 23, Issue 5, Pages856-863.
[7]C. T. Nguyen, D. T. Hoang, D. N. Nguyen, D. Niyato, H. T. Nguyen and E. Dutkiewicz, "Proof-of-Stake Consensus Mechanisms for Future Blockchain Networks: Fundamentals, Applications, and Opportunities," in IEEE Access, vol. 7, pp. 85727-85745, 2019, doi: 10.1109/ACCESS.2019.2925010.
[8]Qu, Q., Xu, R., Chen, Y., Blasch, E. and Aved, A., 2021. Enable Fair Proof-of-Work (PoW) Consensus for Blockchains in IoT by Miner Twins (MinT). Future Internet, 13(11), p.291.
[9]Shahriar Hazari, S. and Mahmoud, Q.H., 2020. Improving transaction speed and scalability of blockchain systems via parallel proof of work. Future Internet, 12(8), p.125.
[10]Wan, S., Li, M., Liu, G. and Wang, C., 2020. Recent advances in consensus protocols for blockchain: a survey. Wireless networks, 26(8), pp.5579-5593.
[11]Supreet, Y., Vasudev, P., Pavitra, H., Naravani, M. and Narayan, D.G., 2020, August. Performance Evaluation of Consensus Algorithms in Private Blockchain Networks. In 2020 International Conference on Advances in Computing, Communication & Materials (ICACCM) (pp. 449-453). IEEE.
[12]Khatoon, A., Verma, P., Southernwood, J., Massey, B. and Corcoran, P., 2019. Blockchain in energy efficiency: Potential applications and benefits. Energies, 12(17), p.3317.
[13]Kaur, M., Khan, M.Z., Gupta, S., Noorwali, A., Chakraborty, C. and Pani, S.K., 2021. MBCP: Performance analysis of large-scale mainstream blockchain consensus protocols. IEEE Access, 9, pp.80931-80944.
[14]Giang-TruongNguyen, Kyungbaek Kim, Journal of Information Processing Systems Vol. 14, No. 1, pp. 101-128, Feb. 2018.
[15]F. Yang, W. Zhou, Q. Wu, R. Long, N. N. Xiong, and M. Zhou, "Delegated Proof of Stake with Downgrade: A Secure and Efficient Blockchain Consensus Algorithm with Downgrade Mechanism," in IEEE Access, vol. 7, pp. 118541-118555, 2019, doi: 10.1109/ACCESS.2019.2935149.
[16]Joshi, S., 2021. Feasibility of proof of authority as a consensus protocol model. arXiv preprint arXiv:2109.02480.
[17]A Avasthi, A. and Saxena, A., 2018. Two-hop blockchain model: resonating between proof of work (PoW) and proof of authority (PoA). International Journal of Information Systems & Management Science, 1(1).
[18]Mehrdad, S., Mainak C. 2018 An Overview of Blockchain and Consensus Protocols for IoT Networks. arXiv preprint arXiv:1809.05613
[19]Subhi A., Edward B. and Jonathan R., 2022. HDPoA: Honesty-based Distributed Proof of Authority via Scalable Work Consensus Protocol for IoT-Blockchain Applications. IEEE Access, DOI: 10.1109/CyberSA52016.2021.9478257
[20]A. Juels, J. Brainard, "Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks", Network and Distributed System Security Symposium, 1999, Available: https://www.ndss-symposium.org/ndss1999/cryptographic-defense-against-connection-depletion-attacks
[21]F. Bravo-Marquez, S. Reeves, and M. Ugarte, “Proof-of-learning:a blockchain consensus mechanism based on machine learning competitions,” in 2019 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPCON). IEEE, 2019, pp.119–124.
[22]Oliva, G.A., Hassan, A.E. and Jiang, Z.M., 2020. An exploratory study of smart contracts in the Ethereum blockchain platform. Empirical Software Engineering, 25, pp.1864-1904.
[23]The Scalability Trilemma in Blockchain. Accessed: Sep. 1, 2019. [Online]. Available: https://medium.com/@aakash_13214/the-scalability-trilemmain-blockchain-75fb57f646df
[24]Vujičić, D., Jagodić, D. and Ranđić, S., 2018, March. Blockchain technology, bitcoin, and Ethereum: A brief overview. In 2018 17th international symposium infoteh-jahorina (infoteh) (pp. 1-6). IEEE.
[25]Curran, K. and Honan, J., 2007. Fighting the Problem of Unsolicited E-Mail Using a Hashcash Proof-of-Work Approach. In Business Data Communications and Networking: A Research Perspective (pp. 346-374). IGI Global.
[26]Navjeet k. 2015. A Survey on Online Banking System Attacks and its Countermeasures. IJCSNS VOL.15 No.3
[27]Galibus, Tatiana; Krasnoproshin, Viktor V.; de Oliveira Albuquerque, Robson; Pignaton de Freitas, Edison (2016). [SpringerBriefs in Computer Science] Elements of Cloud Storage Security, 10.1007/978-3-319-44962-3(), –. doi:10.1007/978-3-319-44962-3
[28]Bhattacharya, S; Kumar, C R S (2017). [IEEE 2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET) - CHENNAI, India (2017.2.16-2017.2.18)] 2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET) - Ransomware: The CryptoVirus subverting cloud security., (), 1–6. doi:10.1109/ICAMMAET.2017.8186691
[29]Bell D., Jane G., 1992. Distributed Database Systems. Workinham, England: Addison Wesley.
[30]Janno S., 2017. Proof-of-Stake. Research seminar in cryptography, 2017 - courses.cs.ut.ee
[31]Ahmed M., Olov S., Karl A., 2019. A Survey of Blockchain from the Perspectives of Applications, Challenges, and Opportunities. IEEE doi: 10.1109/ACCESS.2019.2936094
[32]Mahmood Z., 2020. Connected Vehicles in the Internet of Things (Concepts, Technologies and Frameworks for the IoV) ||., 10.1007/978-3-030-36167-9(), –. doi:10.1007/978-3-030-36167-9
[33]Hafid, A., Hafid, S., Samih M., 2020. Scaling Blockchains: A Comprehensive Survey. IEEE Access, 8(), 125244–125262. doi:10.1109/ACCESS.2020.3007251
[34]Johannes S., Hans B., Gilbert F., Robert K., 2021. Recent Developments in Blockchain Technology and their Impact onEnergy Consumption. Informatik Spektrum, (), doi:10.1007/s00287-020-01321-z
[35]S Huh, S Cho, S Kim. 2017. Managing IoT devices using blockchain platform. IEEE 19th International Conference on Advanced Communication Technology (ICACT) - Pyeongchang, Kwangwoon Do, South Korea (2017.2.19-2017.2.22)] -. (), 464–467. doi:10.23919/ICACT.2017.7890132
[36]SS Dash, S Das, BK Panigrahi. 2021. Advances in Intelligent Systems and Computing. Volume 1172 (Proceedings of ICICA 2019) ||., 10.1007/978-981-15-5566-4(), –. doi:10.1007/978-981-15-5566-4
[37]Jonathan K., Hovav S., 2017. || Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol. [Lecture Notes in Computer Science] Advances in Cryptology – CRYPTO 2017 Volume 10401 10.1007/978-3-319-63688-7(Chapter 12), 357–388. doi:10.1007/978-3-319-63688-7_12