You are on page 1of 10

17070 IEEE INTERNET OF THINGS JOURNAL, VOL. 9, NO.

18, 15 SEPTEMBER 2022

Sharding-Hashgraph: A High-Performance
Blockchain-Based Framework for Industrial
Internet of Things With Hashgraph Mechanism
Ningjie Gao , Ru Huo , Shuo Wang, Tao Huang , Senior Member, IEEE, and Yunjie Liu

Abstract—In recent years, with the development and and the development of productive forces of human soci-
widespread use of blockchain, many projects have introduced ety has achieved a qualitative leap [1], [2]. In recent years,
blockchain technology to solve the increasingly serious security ICT-enabling technologies represented by big data, artificial
problems of the Industrial Internet of Things (IIoT). However,
due to the conflict between the operational performance and secu- intelligence, cloud computing, and the Internet of Things have
rity of the blockchain system, the conflict between transparency begun to penetrate social production activities. In order to meet
and privacy, and the compatibility issues with a large number the demands of ubiquitous network connections and industrial
of IIoT devices running together, the mainstream blockchain network stability, IIoT has introduced technologies, such as
system cannot be applied to IIoT scenarios. In order to solve industrial PON, industrial SDN, edge computing, and identifier
these problems, in this article, we propose an IIoT distributed
data system based on blockchain technology. We provide a novel resolution. These technologies are used to realize the access
system architecture for different IIoT devices to deploy high- and interaction of massive heterogeneous data in IIoT. With the
performance blockchain systems in many scenarios, such as application of IIoT in many fields, security attacks and failures
smart factory networks. To improve the performance of the have caused huge troubles in IIoT networks around the world,
blockchain network, we adopt the sharding hashgraph consensus seriously affecting the income of IIoT [3]. Therefore, the cur-
mechanism and introduce a node evaluation mechanism based
on the state of the node, which is applied to divide a large rent industrial network is far from meeting the requirements
number of nodes into many shards dynamically. We abstract of IIoT in terms of security and scalability of deployment [4].
the node sharding problem as a joint optimization problem and In recent years, with the emergence of blockchain technol-
use deep reinforcement learning to solve it. Finally, we com- ogy and its widespread application in the field of data security,
pared with asynchronous Byzantine consensus algorithms, such the idea of combining blockchain technology with the IIoT has
as HoneybadgerBFT and BEAT, which validated the performance
of this system architecture. received considerable attention [5], [6]. By using the functions
of the anti-tampering and decentralized consensus mechanism
Index Terms—Asynchronous Byzantine fault tolerance, in the blockchain, we can solve the challenges mentioned
blockchain, Industrial Internet of Things (IIoT), sharding.
above of the IIoT system [7]. The core of the blockchain is
a novel data structure. Through this data structure, we can
I. I NTRODUCTION achieve data privacy and security.
ITH the development and progress of enabling tech- There have been some studies on the application of
W nologies, such as the Internet of Things, 5G, and
artificial intelligence, the Industrial Internet of Things (IIoT)
blockchain technology in the IIoT. For example, Sarah and
Rafidah proposed a decentralized reputation management
has opened the prelude to the fourth industrial revolution, system based on blockchain technology [8], which uses the
blockchain to determine the reputation of IIoT devices for
Manuscript received 30 August 2021; revised 30 October 2021; accepted task offloading. However, the project uses PoET as the con-
4 November 2021. Date of publication 10 November 2021; date of current sensus mechanism of the blockchain, which will lead to
version 7 September 2022. This work was supported in part by the MIIT of reduced security. Mohammed uses blockchain to realize the
China 2020 (Identification Resources Search System for Industrial Internet of
Things) and in part by the National Key Research and Development Program secure transmission of IIoT data, but they did not consider
of China under Grant 2018YFB1800502. (Corresponding author: Ru Huo.) data privacy issues [9], such as access control issues among
Ningjie Gao is with the State Key Laboratory of Networking and multiple users in the system. In addition, they all use chain-
Switching Technology, Beijing University of Posts and Telecommunications,
Beijing 100876, China. like blockchains in IIoT software systems, which will make
Ru Huo is with the Information Department, Beijing University of many low-power devices in industrial scenarios unable to oper-
Technology, Beijing 100124, China, and also with Purple Mountain ate normally. At the same time, the introduction of blockchain
Laboratories, Nanjing 211111, China (e-mail: huoru@bjut.edu.cn).
Shuo Wang and Tao Huang are with the State Key Laboratory of innovation into the IIoT will encounter many other problems.
Networking and Switching Technology, Beijing University of Posts and We summarized three main issues as follows.
Telecommunications, Beijing 100876, China, and also with Purple Mountain 1) Tradeoff Between Security and Device Power
Laboratories, Nanjing 211111, China.
Yunjie Liu is with the State Key Laboratory of Networking and Consumption: As we all know, introducing the blockchain
Switching Technology, Beijing University of Posts and Telecommunications, and consensus mechanisms into the Internet can significantly
Beijing 100876, China, also with the Information Department, Beijing improve the security of the Internet. Blockchain exploits a
University of Technology, Beijing 100124, China, and also with Purple
Mountain Laboratories, Nanjing 211111, China. variety of different consensus mechanisms to defend against
Digital Object Identifier 10.1109/JIOT.2021.3126895 malicious attacks. As a typical application of the consensus
2327-4662 
c 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: Wuhan University. Downloaded on November 22,2023 at 02:38:23 UTC from IEEE Xplore. Restrictions apply.
GAO et al.: SHARDING-HASHGRAPH: HIGH-PERFORMANCE BLOCKCHAIN-BASED FRAMEWORK 17071

mechanism, the proof-of-work (POW) consensus mechanism one shard. The nodes in each shard only contribute to
forces the blockchain nodes to run a high-complexity crypto- the consensus of events in their nodes.
graphic algorithm, proving workload and reaching consensus. 3) We designed and built a proof-of-concept demo for the
However, for low-power devices in industrial scenarios, IIOT scenario. Through comparison with other consen-
it is difficult for them to run a typical POW consensus sus algorithms, such as BEAT and HoneybadgerBFT
mechanism. At the same time, choosing some lightweight under the same network configuration, the verifica-
consensus mechanisms will reduce the security of the system. tion results show that the IIoT system we proposed is
Therefore, how to balance the device power consumption efficient.
requirement and security requirements of the IIoT system is The remainder of this article is organized as follows.
the first problem [10]. Section II briefly introduces the progress of related research.
Section III introduces the architecture of our IIoT system,
2) Conflict Between Transparency and Privacy:
including the system and mechanism design. In Section IV,
Blockchain is a distributed, immutable ledger. Most
we introduced the detailed design of the blockchain system
blockchain ledgers are also transparent, and all users can
used in this article. Section V introduced the simulation setup
access any data on the ledgers. However, for many scenarios
and test results. Section VI is the summary of this article and
of the IIoT, such transparency is unacceptable because much
the prospect of future work.
data in the scenarios involve key links in industrial production
and transaction processes. These data need to be protected
and can only be accessed by the specified people. Therefore, II. R ELATED W ORKS
how to ensure the security and privacy of data is the second In this section, we present the main definition and technical
problem we will encounter. framework of IIoT and blockchain.
3) Performance of the Blockchain is Difficult to Meet
Actual Needs: The IIoT environment usually has many device A. Industrial Internet of Things
access and high concurrent data circulation, which requires the With the development of next-generation network technolo-
blockchain system to have good scalability and high through- gies, IoT, 5G, Cloud computing, Edge/Fog computing, and
put. Unfortunately, most of the existing blockchains have other advanced network and communication technologies are
poor scalability and low throughput, derived from their secu- used to accelerate the process of industrial-technological inno-
rity consensus mechanism based on complex cryptography. In vation [1], [11]. The concept of IIoT has also emerged and
addition, the chain structure of the blockchain cannot make full has been widely concerned by the industry. IIoT is gener-
use of a large number of devices in the IIoT scene, such as ally defined as a communication network with high reliability,
low-power sensors. Therefore, how to improve the through- low latency, and high controllability that provides ubiquitous
put of the blockchain to meet the needs of high concurrent interconnection for intelligent industrial objects [12].
transactions in IIoT is the third problem we need to solve. It includes the new industrial network architecture based
These three issues prompted us to design a high- on cloud computing or fog/edge computing, and the next-
performance, scalable, and secure blockchain-based IIoT generation wireless sensor network (WSN), M2M communi-
system. To improve the compatibility of the system, we cation, industrial SDN, industrial Ethernet, and deterministic
proposed a hierarchical blockchain data management archi- networking (DetNet) and other technologies. In recent years,
tecture, which can realize the access of different industrial global firms have concentrated on their technological compe-
equipment. We adopted the sharding-hashgraph consensus tency in developing and supplying software and platform for
mechanism to improve the throughput and consensus effi- IIoT. In general, IIoT can be described with a three-tier archi-
ciency of the blockchain network. In addition, we introduced tecture, as shown in Fig. 1 [13]. Basic IIoT architecture is
an evaluation mechanism based on the state of the node. composed of edge tier, platform tier, and enterprise tier.
We abstracted the sharding problem as a joint optimization IIOT devices do not belong to the three-tier architecture
problem and we used deep reinforcement learning to solve of the IIoT. These devices are connected to the edge layer
the problem. Our unique contributions to the article are as and generate data streams for processing at the edge layer.
follows. The edge tier deals with the protocol compatibility issues
1) We propose a high-performance, scalable, and secure of IT/OT and connects to the field-level production network,
blockchain system architecture for IIoT, which has a then provides computing support for the underlying intelli-
layered architecture for different IIoT devices (such as gent devices by using distributed edge resources. The platform
power-constrained devices). In addition, we provide a layer includes various data and operation services of the IIoT
node evaluation mechanism based on the state of the and supporting value increment of industrial data. Operation
node and an efficient access control scheme. domains include specific services for manufacturing which can
2) We use the blockchain of the Hashgraph structure as the automate production by issuing control tasks, such as mon-
underlying structure instead of using the chain-structured itoring and diagnostics, prognostics, and optimization. The
blockchain to build our software system. In order to fur- enterprise tier includes open capabilities for enterprise-level
ther improve the performance of the system, we have industrial applications and third-party applications, integrat-
introduced a sharding mechanism in hashgraph, which ing and encapsulating the atomic capabilities provided by the
is applied to divide the geographically close nodes into platform tier and the edge tier.

Authorized licensed use limited to: Wuhan University. Downloaded on November 22,2023 at 02:38:23 UTC from IEEE Xplore. Restrictions apply.
17072 IEEE INTERNET OF THINGS JOURNAL, VOL. 9, NO. 18, 15 SEPTEMBER 2022

directed acyclic graph. Typical applications include Tangle and


Hashgraph.
Hashgraph is an asynchronous Byzantine consensus algo-
rithm (ABFT), ensuring that it can maintain a stable operation
in harsh network environments. Since the ABFT protocol is
designed to run in a harsh network environment, most ABFT
consensus algorithms cannot have better performance in a
healthy network environment, but HoneyBadgerBFT [17] and
BEAT [18] are two exceptions.
HoneyBadgerBFT and BEAT use either Bracha’s broadcast
or one based on erasure codes to broadcast transactions and
then optimize a binary Byzantine agreement (BBA) protocol to
cast votes and reach an agreement. Their networks proceed in
rounds, wherein each round, n broadcast instances are executed
alongside n BBA instances, the latter of which only con-
Fig. 1. Typical three-tier architecture of the IIoT.
clude when sufficiently many broadcast instances have been
completed to ensure progress. Although HoneyBadgerBFT
and BEAT successfully reduce communication complexity and
The fusion of AI and big data has expanded the digiti- broadcast overhead and perform better than the PBFT consen-
zation scope of IIoT. The ability of collecting, analyzing, sus algorithm in a small-scale environment, the performance
and processing production data can enrich the functions of of the ABFT consensus algorithm can be further improved by
industrial applications and improve the efficiency of opera- performing broadcast and voting at the same time. In addition,
tion and management [14]. Moreover, many technologies are hashgraph uses its unique broadcast mechanism and voting
also applied in various scenarios. For example, in manufactur- mechanism to have huge performance advantages. In order
ing, 3-D printing technology realizes fast and low-cost product to build a high-performance industrial Internet blockchain
customization functions. In the factory network, SDN, edge system, this article will optimize the ABFT consensus protocol
computing and other technologies can be used to transform based on Hashgraph to enhance the throughput and scalability
the internal network of the factory to observe and schedule of the blockchain.
the entire network uniformly.
IIoT can realize the transformation and upgrading of tradi- III. S YSTEM A RCHITECTURE AND OVERVIEW
tional industries, such as aerospace, manufacturing, medical, In this section, we outline the blockchain-based IIoT dis-
oil, and natural gas development, bringing profound changes. tributed data management system proposed in this article.
We will introduce the detailed system design from three
B. Blockchain parts: 1) the system architecture; 2) the composite evaluation
mechanism of the node status; and 3) the privacy protec-
As a revolutionary technology in network security,
tion mechanism. We first introduced the system architecture
blockchain is widely regarded as a promising technology
designed for the IIoT research.
to solve the security issues and data privacy issues of the
IIoT [15]. The main function of the blockchain is to enable a
group of entities that do not trust each other to reach a con- A. Architecture of IIoT Distributed Data Management System
sensus on a set of shared events, data, and states, and to be The system is built on the blockchain of the Hashgraph
supported by complex cryptographic technology and consen- structure, and each entity is a node in the blockchain-based
sus models [16]. Blockchain can be divided into two types IIoT system. From the functional division, it can be divided
according to the structure: 1) the blockchain with chain struc- into two categories: 1) sensor network and 2) sharding-
ture and 2) the other is the blockchain with DAG structure. As hashgraph network. As shown in Fig. 3, The components of
shown in Fig. 2, Bitcoin is a typical blockchain system with the sensor network refer to those power-constrained devices
a chain structure. like IoT devices, and their representative devices are vari-
The chain structure of the blockchain has higher require- ous types of sensors. Because their power, storage capacity,
ments for the network environment. For example, the classic and computing capacity are limited, they do not participate
PBFT consensus algorithm requires the network to be an asyn- in the operation of the blockchain system and do not store
chronous or semisynchronous network, which cannot adapt blockchain information. Their function is to collect and upload
to an overly complex and harsh network environment. In data. The sharding-hashgraph network is a blockchain network
addition, the complex security encryption mechanism of the with hashgraph as the bottom layer, the nodes in the network
chain structure is power intensive and is not suitable for are full nodes. The full node is a large-scale device that has the
power-constrained IoT devices. ability to carry blockchain programs and store large amounts
In order to enable the blockchain network to have higher of data. Each full node is responsible for a group of lightweight
throughput and better scalability, the industry has proposed IIoT devices (sensor network) in a certain area, receiving all
a new blockchain architecture based on the structure of a data uploaded by the sensor network and storing these data.

Authorized licensed use limited to: Wuhan University. Downloaded on November 22,2023 at 02:38:23 UTC from IEEE Xplore. Restrictions apply.
GAO et al.: SHARDING-HASHGRAPH: HIGH-PERFORMANCE BLOCKCHAIN-BASED FRAMEWORK 17073

Fig. 2. Typical chain-structured blockchain and an example block.

node status can improve the internal throughput and consen-


sus delay of a single shard, thereby improving the overall
performance of the system.
To accurately evaluate the node’s credit status, this article
proposes a node credit cross-evaluation mechanism.
For a time range with a series of time slots
(t0 , . . . , ty , . . . , tN ), the reputation evaluation of node i
on node j within time ty can be represented by a vector
t
 t t t

γi,jy = τi,jy , si,jy , ui,jy (1)
where τ , s, and u stand for the degree of trust, degree of
suspicion, and uncertainty, respectively. The three components
add up to 1. Therefore, we can get the following formula:
Fig. 3. IIoT data management system architecture based on blockchain. ⎧ ty

⎪ τ
ty
= (1 −
ty
)
αy

⎪ u i,j α +β ty
t
⎨ i,j i
y
ty
i
ty ty βy (2)
The full node encrypts the data content that needs security ⎪ s = (1 − u )

⎪ t
i,j i,j α ty +β ty
protection through an encryption algorithm, packs the cipher- ⎪
⎩ u y = 1 − qty
i i

text and the corresponding operation authority into an event, i,j i,j
and uploads it to the blockchain network. After the consensus where α and β represent the number of confirmed (achieved
is completed, the data are stored locally or uploaded to the consensus) and discarded messages within the time ty range.
cloud network. q represents the number of processing completion messages.
Therefore, the direct reputation evaluation of node i to node
j is
B. Node Status Comprehensive Evaluation Mechanism t t t t
Ri,jy = τi,jy − si,jy + aui,jy (3)
In order to improve the scalability and consensus
performance (throughput, latency, etc.) of the hashgraph where a is a value of 0–1, which represents the influence
network, we need to divide the blockchain network into coefficient of uncertainty on direct reputation.
multiple shards. This article proposes a comprehensive evalu- In order to control the influencing factors of credit evalua-
ation mechanism based on node status, dividing the hashgraph tion more flexibly and dynamically, we set different weights
network into multiple shards with good performance. for positive interactions and negative interactions. The formula
This mechanism comprehensively considers the node’s geo- can be rewritten as
⎧ ty
graphic location, credit score, network status, CPU resources ⎪
⎪ τ
ty
=
ty ζ αy

⎪ q t ty
and divides all nodes in the network into multiple shards. The ⎨ i,j i,j y
ζ αi +ηβi
ty
nodes in each shard are geographically close, the network sta- t t ηβ (4)
⎪ si,jy = qi,jy ty y ty
tus is generally good, and the credit rating is similar. The ⎪
⎪ ζ αi +ηβi

⎩ uty = 1 − qty
introduction of a comprehensive evaluation mechanism for i,j i,j

Authorized licensed use limited to: Wuhan University. Downloaded on November 22,2023 at 02:38:23 UTC from IEEE Xplore. Restrictions apply.
17074 IEEE INTERNET OF THINGS JOURNAL, VOL. 9, NO. 18, 15 SEPTEMBER 2022

Fig. 4. Privacy protection and access control mechanism of hashgraph system.

where ζ and η represent the different weights, and the sum of The method of protecting data confidentiality in a trans-
ζ and η is 1. parent system is encryption. There are two main types of
Since the reputation evaluation of a node may become less encryption algorithms, namely symmetric key encryption and
reliable over time, in order to describe the state of the node asymmetric key encryption (public-private key pair encryp-
more truthfully, we introduce the influence of time on the rep- tion). Considering the security of the encryption algorithm,
utation: θy , where y belongs to [1, y]. Therefore, the reputation we choose asymmetric key encryption. In addition, due to
evaluation formula of a node can be rewritten as the complexity of asymmetric keys and the massive amount
⎧ Y ty of data in the IIOT scenario, this mechanism chooses not to

⎪ ty y=1 θy τi,j

⎪ τ =  upload all the data to the blockchain system but only encrypts


i,j Y
θy
⎨ Y y=1 ty the required data and uploads it to the blockchain network.
ty y=1 θy si,j
si,j = Y (5) If node A wants to access the data of node B, the data

⎪ y=1 θy

⎪  t transaction between the two parties will be completed through

⎪ t
Y
θy ui,j
y
⎩ ui,jy = y=1Y . a smart contract. A data transaction is divided into three steps,
y=1 θy
and the data transmission process is shown in Fig. 4. First,
Since node j not only interacts with node i, it is necessary the smart contract sends the public key of node A to node B.
to introduce the reputation opinions of other nodes on node j After receiving it, node B uses the public key of node A to
when comprehensively evaluating the reputation of j. ωx rep- encrypt the target data and upload it to the hashgraph network.
resents the evaluation weight of node x to node j’s reputation. After the upload is complete, node A obtains the data from the
So, we can rewrite the formula as a summation form hashgraph network and uses the corresponding private key to
⎧ X ty decrypt it to realize the encrypted transmission of the data.

⎪ τ x=1 ωx τx,j
final =  Without any central credit server and the third party to
⎪ j


X
ω
⎨ X x=1 xty obtain the original data, this privacy protection scheme uses
x=1 ωx sx,j
final
sj = X (6) the public/private key of each node to realize the encrypted

⎪ ω

⎪ final X x=1 xty transmission of data. Therefore, it effectively ensures data pri-

⎩u x=1 ωx ux,j
j =  X . vacy in the transparent system. In addition, if necessary, each
x=1 ωx
node can flexibly update its own key pair.
After obtaining the reputation evaluation of node i, this
mechanism can combine the geographic location, credit,
network performance, and CPU resources of the node to IV. B LOCKCHAIN S YSTEM D ESIGN
divide the network into multiple shards and use DQN to make In this section, we introduce the detailed design of the
decisions during the sharding process. blockchain system used in this article.

C. Privacy Protection and Access Control Mechanism A. Sharding-Hashgraph Mechanism


Due to the transparency of the blockchain, all industrial data We designed a sharding-Hashgraph mechanism to improve
stored in the blockchain will be public. However, for the IIoT, the throughput and scalability of the blockchain system. We
much data are private and require access control. Therefore, will give a detailed introduction to the hashgraph mechanism.
we propose a privacy protection method to support the access The hashgraph protocol uses the gossip propagation pro-
control of sensor data in the hashgraph system. tocol for communication. In the hashgraph network, node A

Authorized licensed use limited to: Wuhan University. Downloaded on November 22,2023 at 02:38:23 UTC from IEEE Xplore. Restrictions apply.
GAO et al.: SHARDING-HASHGRAPH: HIGH-PERFORMANCE BLOCKCHAIN-BASED FRAMEWORK 17075

mechanism can increase the concurrency of transaction pro-


cessing and verification, thereby improving the throughput of
the entire network.
This article shards the full node based on its geographic
location, credit, and network performance. The scales of the
fragments are different, and they are redistributed regularly.
The nodes in each shard only contribute to the consensus
of events in their own nodes and do not participate in the
consensus of other shards.
The core of the Hashgraph consensus protocol is the vir-
tual voting mechanism. In this article, we have improved the
original virtual voting mechanism and introduced node vot-
ing weight based on the comprehensive state of the node to
improve the consensus security and consensus performance of
the system.

B. Weight-Based Virtual Voting Mechanism


Fig. 5. Hashgraph system can determine the ancestor hash of an event
through the hash signature. In order to propose a virtual voting mechanism based on
weights, the following definitions are given.
Node Voting Weight: The shard is performed according to
randomly selects another node, such as node B, and then node the geographic location, credit, and network performance of
A sends what node A knows but node B does not know to the complete node. The size of the shard is different, and it is
node B, and vice versa. Node A will repeat this process ran- redistributed regularly. The nodes in each shard only contribute
domly for any other nodes and the same for all other nodes. to the consensus of events in their own nodes and only store
Eventually, the information is propagated to each node through the cross-shard events without consensus. Each node has its
the network. own voting weight, and votes are calculated according to the
Fig. 5 describes the data storage structure of Hashgraph- node status when counting the votes.
event. The node creates an event when it receives other Absolute Majority: More than 2/3 of the node weight in the
people’s gossip synchronization. The event is a tuple consist- network.
ing of the hash value of the two-parent events, the transaction Strongly Visible: When event B can find the weights of
content, the timestamp, and the signature of the rest of the nodes that cross the absolute majority in all paths of event
tuple. A, then event B is strongly visible to event A.
The hashgraph node only accepts events with a valid sig- Round: When each node synchronizes a new event, it
nature and hash value that references its existing events. For immediately calculates whether to create a new round.
example, in Fig. 5, node C receives A3 and can use the sig- Witness: The first event created by each node in each round
nature of the event to verify that A3 was created by node A is the witness event.
when node B synchronized with it. Node C can request A3’s Famous Witness: If a witness in round R can be seen by an
ancestor event and it uses the hash contained in the event to absolute majority of witnesses in round R + 1 (visible witnesses
verify it. have an absolute majority weight), then it is a famous witness.
In general, Hashgraph is an asynchronous distributed con- How to Start a New Round: The system divides rounds
sensus architecture, following the Byzantine failure model, according to the time horizon. Once there is an event where
with high security (consensus probability of 1) and high two-thirds of the witnesses (not including myself) can be seen,
throughput. However, Hashgraph has higher requirements for it is the beginning of a new round from that event.
blockchain network nodes. In order to ensure the stable Event Creation Round: If event A is strongly visible to more
operation of the blockchain system, nodes loaded with the than 2/3 of the witnesses whose creation round is x, then the
Hashgraph protocol generally require a large amount of stor- creation round of event A is x + 1, otherwise it is the largest
age space and sufficient CPU resources. In addition, the round among the ancestor events of event A.
scalability of the hashgraph protocol is also relatively poor. Event Acceptance Round: If all well-known witnesses in
In order to further improve the scalability of the blockchain round R (creation round) can see a common event, then the
network, this article introduces a sharding mechanism. The acceptance round of the event is round R.
core of the sharding mechanism is to divide a blockchain Virtual Voting Mechanism: Witnesses in each round will
network with many nodes into several subnetworks, and each vote for the previous round, such as A3, B3, C3, and D3 will
subnetwork contains a part of nodes, which is a “shard.” At vote for B2. The voting rule is to vote yes if it is visible;
the same time, transactions in the network will also be divided otherwise, vote no. These voting results will be counted in
into different “shards” for processing. Each node only needs later rounds.
to process a small part of the incoming transactions, and dif- Counting Votes: The counting of votes for round x will start
ferent nodes can process transactions in parallel. The sharding at round x+2, and only strong visible votes will be counted. If

Authorized licensed use limited to: Wuhan University. Downloaded on November 22,2023 at 02:38:23 UTC from IEEE Xplore. Restrictions apply.
17076 IEEE INTERNET OF THINGS JOURNAL, VOL. 9, NO. 18, 15 SEPTEMBER 2022

TABLE I
P ERFORMANCE C OMPARISON B ETWEEN H ASHGRAPH C ONSENSUS
A LGORITHM AND PBFT C ONSENSUS A LGORITHM

A. Implementation Details
Hashgraph system data transmission uses two encryption
methods: 1) digital signature and 2) hash function. In this test,
the system uses RSA with a 3072-bit key for digital signatures
and uses SHA384 as the hash function. All data communica-
tion is through TLS1.2 communication protocol, using Diffie
Hellman with ephemeral keys and AES256-GCM.
Hashgraph mechanism uses gossip protocol for data broad-
Fig. 6. Hashgraph system uses a virtual voting mechanism to identify famous
witness.
casting. In this system, each node can execute ten random syn-
chronization processes in parallel. In addition, each package
completed event can contain up to 1024 transactions.
an absolute majority of yes votes are collected, then it will be
a famous witness. As shown in Fig. 6, B4 counts whether B2 B. Evaluation and Comparison
is a famous witness. The top B4 can see A3, B3, C3, and D3. We use Amazon EC2 to evaluate the performance of the
The collected votes are four yes, so B2 is a famous witness. If hashgraph system under the following settings.
this round of witnesses cannot make a decision, the next round 1) Each Hashgraph node has four virtual CPUs.
of witnesses will count the votes until a definite conclusion is 2) The running memory of each Hashgraph node is a
reached. random value between 4 and 32 GB.
The core of the Hashgraph consensus protocol is divide 3) The network performance of each Hashgraph node is a
rounds, Decision Fame, and find order. In order to reach a random value between 1 and 2 Gb/s.
consensus, each node performs the following operations on 4) All Hashgraph instances are evenly distributed in two
its hashgraph: regions.
Divide Rounds: According to the definition and execution In order to better reflect the performance of the sharding-
process, hashgraph is divided into several rounds. In addition, hashgraph system, we deployed a batch of new amazon EC2
each node votes on each event and selects witnesses for each nodes, gave these nodes the same performance as other nodes
round. (random in the same range), and deployed Honey on these
Decision Fame: The hashgraph protocol runs an election for nodes Badger BFT agreement and BEAT0 consensus agree-
each witness, and each node votes on the witness to select a ment. These protocols are all ABFT consensus protocols, and
famous witness for each round. they implement universal state machine replication.
Find Order: Once all well-known witnesses have been iden- The latency mentioned in this section refers to the average
tified in a certain round, the acceptance round and consensus delay from when the client submits a transaction to the node
timestamp can be determined for other common events in for the first time until the node knows the consensus order and
this round. According to the acceptance round and consensus timestamp of the transaction.
timestamp, all events of the round can be sorted. In order to prove the superiority of the ABFT consensus
After all events in this round are sequenced, the consensus algorithm, we deployed the PBFT consensus mechanism on
is achieved in this round. these nodes and conducted a simple comparison experiment.
As shown in Table I, HoneyBadgerBFT has the same level of
V. S IMULATION R ESULTS AND D ISCUSSION throughput as PBFT when the number of nodes is small, but
In this section, we evaluate how the sharding-Hashgraph as the number of nodes increases, the throughput of the PBFT
system affects the performance of the blockchain network. algorithm drops rapidly, and HoneBadgeryBFT has a larger
Then, we discuss the simulation results performance gap with PBFT. It proves the advantages of the

Authorized licensed use limited to: Wuhan University. Downloaded on November 22,2023 at 02:38:23 UTC from IEEE Xplore. Restrictions apply.
GAO et al.: SHARDING-HASHGRAPH: HIGH-PERFORMANCE BLOCKCHAIN-BASED FRAMEWORK 17077

Fig. 9. Hashgraph system with sharding mechanism has a better performance


than the hashgraph system without the introduction of the sharding mecha-
nism.
Fig. 7. Impact of event size on system latency.

Fig. 10. Hashgraph system with sharding mechanism has good geographic
scalability.
Fig. 8. Superiority of the sharding-hashgraph system.

to 0.5 s, and the delay of the hashgraph system with 16


ABFT consensus algorithm in terms of throughput and scala- nodes has increased from 0.1 to 0.5 s. 0.4 rose to 1.7 s.
bility. In addition, the Hashgraph algorithm has very obvious However, it can be seen that whether it is a vertical compar-
performance advantages in any period. ison of latency or a horizontal comparison of throughput, the
Fig. 7 shows the impact of event size on system latency. remaining consensus algorithms, and the sharding-hashgraph
It can be seen that whether it is a Hashgraph system with consensus algorithm have a huge gap in magnitude. This result
four nodes, eight nodes or 16 nodes, as a single transac- comes from the gap in system time complexity: the time com-
tion becomes larger, the system latency will also become plexity of HoneybadgerBFT and BEAT consensus algorithms
significantly higher. This is caused by the data transmission are both O(NlogN) level, while the time complexity of the
mechanism of the hashgraph system. Since the hashgraph sharding-hashgraph system is only 0 (B) level, and B is the
system uses a virtual voting mechanism to reach a consen- size of an event.
sus without frequent interaction between nodes, the delay of Fig. 9 demonstrates the performance gap between the
the system mainly comes from the transmission delay of the sharding-hashgraph and the hashgraph system without shard-
event on the network. The larger the event, the more time it ing. It can be seen that the hashgraph consensus system that
takes to upload and download, and the higher the system delay. does not introduce sharding increases the system delay sig-
Fig. 8 demonstrates the superiority of the sharding- nificantly with the increase of the number of nodes, while
hashgraph system over other ABFT systems. It can be seen the sharding-hashgraph system stabilizes the system delay at
that with the increase in throughput, the delay of each system a low level. By introducing the sharding mechanism, the hash-
has increased to a certain extent. For example, the delay of graph network can be divided into multiple shards, and each
the hashgraph system with four nodes has risen from 0.1 subnetwork has a certain number of nodes, thereby achieving

Authorized licensed use limited to: Wuhan University. Downloaded on November 22,2023 at 02:38:23 UTC from IEEE Xplore. Restrictions apply.
17078 IEEE INTERNET OF THINGS JOURNAL, VOL. 9, NO. 18, 15 SEPTEMBER 2022

a significant increase in system scalability and a significant [6] L. D. Xu, Y. Lu, and L. Li, “Embedding blockchain technology into
reduction in system consensus delay. IoT for security: A survey,” IEEE Internet Things J., vol. 8, no. 13,
pp. 10452–10473, Jul. 2021.
Fig. 10 demonstrates the performance gap between [7] H.-N. Dai, Z. Zheng, and Y. Zhang, “Blockchain for Internet of Things:
sharding-hashgraph and the hashgraph system without shard- A survey,” IEEE Internet Things J., vol. 6, no. 5, pp. 8076–8094,
ing from another perspective. It can be seen that the geograph- Oct. 2019.
[8] S. Iqbal, R. M. Noor, A. W. Malik, and A. U. Rahman, “Blockchain-
ical distribution of hashgraph system nodes will also lead to enabled adaptive-learning-based resource-sharing framework for IIoT
a substantial increase in system latency. When the nodes are environment,” IEEE Internet Things J., vol. 8, no. 19, pp. 14746–14755,
distributed in two different areas, the system delay is almost Oct. 2021.
[9] M. H. S. Mohammed, “A hybrid framework for securing data trans-
doubled. However, the sharding-hashgraph system stabilizes mission in Internet of Things (IoTs) environment using blockchain
the system consensus delay at a low level. By introducing the approach,” in Proc. IEEE Int. IOT Electron. Mechatronics Conf.
sharding mechanism, the hashgraph network can be divided (IEMTRONICS), 2021, pp. 1–10.
[10] H. Yao, T. Mai, J. Wang, Z. Ji, C. Jiang, and Y. Qian, “Resource trading
into multiple shards according to geographic distribution. The in blockchain-based Industrial Internet of Things,” IEEE Trans. Ind.
nodes in each shard are nodes in the same area, thereby sig- Informat., vol. 15, no. 6, pp. 3602–3609, Jun. 2019.
nificantly reducing the impact of the distribution of nodes in [11] Y. Zhang, Y. Qian, D. Wu, M. S. Hossain, A. Ghoneim, and M. Chen,
“Emotion-aware multimedia systems security,” IEEE Trans. Multimedia,
different areas on the system delay. vol. 21, no. 3, pp. 617–624, Mar. 2019.
[12] X. Li, D. Li, J. Wan, C. Liu, and M. Imran, “Adaptive transmission
optimization in SDN-based Industrial Internet of Things with edge
VI. C ONCLUSION computing,” IEEE Internet Things J., vol. 5, no. 3, pp. 1351–1360,
Jun. 2018.
In this article, we proposed an IIoT distributed data man- [13] W. Khan, M. Rehman, H. Zangoti, M. Afzal, N. Armi, and
agement system based on blockchain technology and related K. Salah, “Industrial Internet of Things: Recent advances,
enabling technologies and open challenges,” Comput. Electr.
core mechanisms. In order to solve the problems of much IIoT Eng., vol. 81, Jan. 2020, Art. no. 106522. [Online]. Available:
access equipment, equipment power consumption, and data https://www.sciencedirect.com/science/article/pii/S0045790618329550
processing capabilities, this article proposed a novel system [14] J. C. Chen and V. S. Gabriel, “Revolution of 3D printing technology and
application of six sigma methodologies to optimize the output quality
architecture, which divides the system into two layers: 1) the characteristics,” in Proc. IEEE Int. Conf. Ind. Technol. (ICIT), 2016,
sensor network and 2) the blockchain network, which can pp. 904–909.
be used in intelligent deploy high-performance blockchain [15] X. Xu et al., “Mitigating conflicting transactions in hyperledger fabric-
permissioned blockchain for delay-sensitive IoT applications,” IEEE
systems in scenarios, such as factories. In order to improve Internet Things J., vol. 8, no. 13, pp. 10596–10607, Jul. 2021.
the performance of the blockchain network, we adopted the [16] Z. Zheng, S. Xie, H. Dai, X. Chen, and H. Wang, “An overview
sharding-hashgraph mechanism and introduced a comprehen- of blockchain technology: Architecture, consensus, and future trends,”
in Proc. IEEE Int. Congr. Big Data (BigData Congress), 2017,
sive evaluation mechanism based on the node status to shard a pp. 557–564.
large number of nodes dynamically. Simulation and compari- [17] A. Miller, Y. Xia, K. Croman, E. Shi, and D. Song, “The honey badger
son results showed that the IIoT distributed data management of BFT protocols,” in Proc. ACM SIGSAC Conf. Comput. Commun.
Security, 2016, pp. 31–42.
system proposed in this article has good security, privacy, and [18] S. Duan, M. K. Reiter, and H. Zhang, “BEAT: Asynchronous BFT made
scalability. practical,” in Proc. ACM SIGSAC Conf., 2018, pp. 2028–2041.
The system proposed in this article still has some limita-
tions, such as a large amount of useless information in the
data uploaded by the sensor and limited storage space of the
complete node, which is not conducive to the data manage- Ningjie Gao received the B.S. degree in communi-
ment of the blockchain network. We will explore how to use cation engineering from Beijing University of Posts
blockchain to better manage and utilize industrial data in the and Telecommunications, Beijing, China, in 2018,
where he is currently pursuing the Ph.D. degree
future direction. with the State Key Laboratory of Networking and
Switching Technology.
His current research interests include software-
R EFERENCES defined networking, named data networks, multi-
access computing, blockchain, and reinforcement
[1] J.-Q. Li, F. R. Yu, G. Deng, C. Luo, Z. Ming, and Q. Yan, “Industrial learning.
Internet: A survey on the enabling technologies, applications, and chal-
lenges,” IEEE Commun. Surveys Tuts., vol. 19, no. 3, pp. 1504–1526,
3rd Quart., 2017.
[2] Y. Zhang, R. Wang, M. S. Hossain, M. F. Alhamid, and M. Guizani,
“Heterogeneous information network-based content caching in the Ru Huo received the B.S. degree in electronics and
Internet of Vehicles,” IEEE Trans. Veh. Technol., vol. 68, no. 10, information engineering from Harbin Engineering
pp. 10216–10226, Oct. 2019. University, Harbin, Heilongjiang, China, in 2011,
[3] P. Urien, “Blockchain IoT (BIoT): A new direction for solving Internet and the Ph.D. degree in information and communi-
of Things security and trust issues,” in Proc. 3rd Cloudification Internet cation engineering from Beijing University of Posts
Things (CIoT), 2018, pp. 1–4. and Telecommunications, Beijing, China.
[4] X. Wang, S. Garg, H. Lin, G. Kaddoum, J. Hu, and M. S. Hossain, From September 2015 to September 2016, she
“PPCS: An intelligent privacy-preserving mobile-edge crowdsensing studied with The University of British Columbia,
strategy for Industrial IoT,” IEEE Internet Things J., vol. 8, no. 13, Vancouver, BC, Canada, as a visiting Ph.D. student.
pp. 10288–10298, Jul. 2021. She is currently a Lecturer with Beijing University of
[5] C. Qiu, H. Yao, F. R. Yu, C. Jiang, and S. Guo, “A service-oriented per- Technology, Beijing. Her current research interests
missioned blockchain for the Internet of Things,” IEEE Trans. Services include software-defined networking, information-centric networking, multi-
Comput., vol. 13, no. 2, pp. 203–215, Mar./Apr. 2020. access edge computing, blockchain, IIOT, and resource scheduling.

Authorized licensed use limited to: Wuhan University. Downloaded on November 22,2023 at 02:38:23 UTC from IEEE Xplore. Restrictions apply.
GAO et al.: SHARDING-HASHGRAPH: HIGH-PERFORMANCE BLOCKCHAIN-BASED FRAMEWORK 17079

Shuo Wang received the B.S. degree in commu- Yunjie Liu received the B.S. degree in technical
nication engineering from Zhengzhou University, physics from Peking University, Beijing, China, in
Zhengzhou, China, in July 2013, and the Ph.D. 1968.
degree in information and communication engi- He is currently an Academician with China
neering from Beijing University of Posts and Academy of Engineering, the Chief of the Science
Telecommunications, Beijing, China, in July 2018. and Technology Committee of China Unicom,
He has been a Postdoctoral Researcher with and the Dean of the School of Information and
Beijing University of Posts and Telecommunications Communication Engineering, Beijing University of
since 2018. His research interests include data center Posts and Telecommunications, Beijing. His current
networking and software-defined networking. research interests include next-generation networks,
network architecture, and management.

Tao Huang (Senior Member, IEEE) received the


B.S. degree in communication engineering from
Nankai University, Tianjin, China, in 2002, and
the M.S. and Ph.D. degrees in communication and
information system from Beijing University of Posts
and Telecommunications, Beijing, China, in 2004
and 2007, respectively.
He is currently a Professor with Beijing University
of Posts and Telecommunications. His current
research interests include network architecture,
network artificial intelligence, routing and forward-
ing, and network virtualization.

Authorized licensed use limited to: Wuhan University. Downloaded on November 22,2023 at 02:38:23 UTC from IEEE Xplore. Restrictions apply.

You might also like