Professional Documents
Culture Documents
Sharding-Hashgraph: A High-Performance
Blockchain-Based Framework for Industrial
Internet of Things With Hashgraph Mechanism
Ningjie Gao , Ru Huo , Shuo Wang, Tao Huang , Senior Member, IEEE, and Yunjie Liu
Abstract—In recent years, with the development and and the development of productive forces of human soci-
widespread use of blockchain, many projects have introduced ety has achieved a qualitative leap [1], [2]. In recent years,
blockchain technology to solve the increasingly serious security ICT-enabling technologies represented by big data, artificial
problems of the Industrial Internet of Things (IIoT). However,
due to the conflict between the operational performance and secu- intelligence, cloud computing, and the Internet of Things have
rity of the blockchain system, the conflict between transparency begun to penetrate social production activities. In order to meet
and privacy, and the compatibility issues with a large number the demands of ubiquitous network connections and industrial
of IIoT devices running together, the mainstream blockchain network stability, IIoT has introduced technologies, such as
system cannot be applied to IIoT scenarios. In order to solve industrial PON, industrial SDN, edge computing, and identifier
these problems, in this article, we propose an IIoT distributed
data system based on blockchain technology. We provide a novel resolution. These technologies are used to realize the access
system architecture for different IIoT devices to deploy high- and interaction of massive heterogeneous data in IIoT. With the
performance blockchain systems in many scenarios, such as application of IIoT in many fields, security attacks and failures
smart factory networks. To improve the performance of the have caused huge troubles in IIoT networks around the world,
blockchain network, we adopt the sharding hashgraph consensus seriously affecting the income of IIoT [3]. Therefore, the cur-
mechanism and introduce a node evaluation mechanism based
on the state of the node, which is applied to divide a large rent industrial network is far from meeting the requirements
number of nodes into many shards dynamically. We abstract of IIoT in terms of security and scalability of deployment [4].
the node sharding problem as a joint optimization problem and In recent years, with the emergence of blockchain technol-
use deep reinforcement learning to solve it. Finally, we com- ogy and its widespread application in the field of data security,
pared with asynchronous Byzantine consensus algorithms, such the idea of combining blockchain technology with the IIoT has
as HoneybadgerBFT and BEAT, which validated the performance
of this system architecture. received considerable attention [5], [6]. By using the functions
of the anti-tampering and decentralized consensus mechanism
Index Terms—Asynchronous Byzantine fault tolerance, in the blockchain, we can solve the challenges mentioned
blockchain, Industrial Internet of Things (IIoT), sharding.
above of the IIoT system [7]. The core of the blockchain is
a novel data structure. Through this data structure, we can
I. I NTRODUCTION achieve data privacy and security.
ITH the development and progress of enabling tech- There have been some studies on the application of
W nologies, such as the Internet of Things, 5G, and
artificial intelligence, the Industrial Internet of Things (IIoT)
blockchain technology in the IIoT. For example, Sarah and
Rafidah proposed a decentralized reputation management
has opened the prelude to the fourth industrial revolution, system based on blockchain technology [8], which uses the
blockchain to determine the reputation of IIoT devices for
Manuscript received 30 August 2021; revised 30 October 2021; accepted task offloading. However, the project uses PoET as the con-
4 November 2021. Date of publication 10 November 2021; date of current sensus mechanism of the blockchain, which will lead to
version 7 September 2022. This work was supported in part by the MIIT of reduced security. Mohammed uses blockchain to realize the
China 2020 (Identification Resources Search System for Industrial Internet of
Things) and in part by the National Key Research and Development Program secure transmission of IIoT data, but they did not consider
of China under Grant 2018YFB1800502. (Corresponding author: Ru Huo.) data privacy issues [9], such as access control issues among
Ningjie Gao is with the State Key Laboratory of Networking and multiple users in the system. In addition, they all use chain-
Switching Technology, Beijing University of Posts and Telecommunications,
Beijing 100876, China. like blockchains in IIoT software systems, which will make
Ru Huo is with the Information Department, Beijing University of many low-power devices in industrial scenarios unable to oper-
Technology, Beijing 100124, China, and also with Purple Mountain ate normally. At the same time, the introduction of blockchain
Laboratories, Nanjing 211111, China (e-mail: huoru@bjut.edu.cn).
Shuo Wang and Tao Huang are with the State Key Laboratory of innovation into the IIoT will encounter many other problems.
Networking and Switching Technology, Beijing University of Posts and We summarized three main issues as follows.
Telecommunications, Beijing 100876, China, and also with Purple Mountain 1) Tradeoff Between Security and Device Power
Laboratories, Nanjing 211111, China.
Yunjie Liu is with the State Key Laboratory of Networking and Consumption: As we all know, introducing the blockchain
Switching Technology, Beijing University of Posts and Telecommunications, and consensus mechanisms into the Internet can significantly
Beijing 100876, China, also with the Information Department, Beijing improve the security of the Internet. Blockchain exploits a
University of Technology, Beijing 100124, China, and also with Purple
Mountain Laboratories, Nanjing 211111, China. variety of different consensus mechanisms to defend against
Digital Object Identifier 10.1109/JIOT.2021.3126895 malicious attacks. As a typical application of the consensus
2327-4662
c 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: Wuhan University. Downloaded on November 22,2023 at 02:38:23 UTC from IEEE Xplore. Restrictions apply.
GAO et al.: SHARDING-HASHGRAPH: HIGH-PERFORMANCE BLOCKCHAIN-BASED FRAMEWORK 17071
mechanism, the proof-of-work (POW) consensus mechanism one shard. The nodes in each shard only contribute to
forces the blockchain nodes to run a high-complexity crypto- the consensus of events in their nodes.
graphic algorithm, proving workload and reaching consensus. 3) We designed and built a proof-of-concept demo for the
However, for low-power devices in industrial scenarios, IIOT scenario. Through comparison with other consen-
it is difficult for them to run a typical POW consensus sus algorithms, such as BEAT and HoneybadgerBFT
mechanism. At the same time, choosing some lightweight under the same network configuration, the verifica-
consensus mechanisms will reduce the security of the system. tion results show that the IIoT system we proposed is
Therefore, how to balance the device power consumption efficient.
requirement and security requirements of the IIoT system is The remainder of this article is organized as follows.
the first problem [10]. Section II briefly introduces the progress of related research.
Section III introduces the architecture of our IIoT system,
2) Conflict Between Transparency and Privacy:
including the system and mechanism design. In Section IV,
Blockchain is a distributed, immutable ledger. Most
we introduced the detailed design of the blockchain system
blockchain ledgers are also transparent, and all users can
used in this article. Section V introduced the simulation setup
access any data on the ledgers. However, for many scenarios
and test results. Section VI is the summary of this article and
of the IIoT, such transparency is unacceptable because much
the prospect of future work.
data in the scenarios involve key links in industrial production
and transaction processes. These data need to be protected
and can only be accessed by the specified people. Therefore, II. R ELATED W ORKS
how to ensure the security and privacy of data is the second In this section, we present the main definition and technical
problem we will encounter. framework of IIoT and blockchain.
3) Performance of the Blockchain is Difficult to Meet
Actual Needs: The IIoT environment usually has many device A. Industrial Internet of Things
access and high concurrent data circulation, which requires the With the development of next-generation network technolo-
blockchain system to have good scalability and high through- gies, IoT, 5G, Cloud computing, Edge/Fog computing, and
put. Unfortunately, most of the existing blockchains have other advanced network and communication technologies are
poor scalability and low throughput, derived from their secu- used to accelerate the process of industrial-technological inno-
rity consensus mechanism based on complex cryptography. In vation [1], [11]. The concept of IIoT has also emerged and
addition, the chain structure of the blockchain cannot make full has been widely concerned by the industry. IIoT is gener-
use of a large number of devices in the IIoT scene, such as ally defined as a communication network with high reliability,
low-power sensors. Therefore, how to improve the through- low latency, and high controllability that provides ubiquitous
put of the blockchain to meet the needs of high concurrent interconnection for intelligent industrial objects [12].
transactions in IIoT is the third problem we need to solve. It includes the new industrial network architecture based
These three issues prompted us to design a high- on cloud computing or fog/edge computing, and the next-
performance, scalable, and secure blockchain-based IIoT generation wireless sensor network (WSN), M2M communi-
system. To improve the compatibility of the system, we cation, industrial SDN, industrial Ethernet, and deterministic
proposed a hierarchical blockchain data management archi- networking (DetNet) and other technologies. In recent years,
tecture, which can realize the access of different industrial global firms have concentrated on their technological compe-
equipment. We adopted the sharding-hashgraph consensus tency in developing and supplying software and platform for
mechanism to improve the throughput and consensus effi- IIoT. In general, IIoT can be described with a three-tier archi-
ciency of the blockchain network. In addition, we introduced tecture, as shown in Fig. 1 [13]. Basic IIoT architecture is
an evaluation mechanism based on the state of the node. composed of edge tier, platform tier, and enterprise tier.
We abstracted the sharding problem as a joint optimization IIOT devices do not belong to the three-tier architecture
problem and we used deep reinforcement learning to solve of the IIoT. These devices are connected to the edge layer
the problem. Our unique contributions to the article are as and generate data streams for processing at the edge layer.
follows. The edge tier deals with the protocol compatibility issues
1) We propose a high-performance, scalable, and secure of IT/OT and connects to the field-level production network,
blockchain system architecture for IIoT, which has a then provides computing support for the underlying intelli-
layered architecture for different IIoT devices (such as gent devices by using distributed edge resources. The platform
power-constrained devices). In addition, we provide a layer includes various data and operation services of the IIoT
node evaluation mechanism based on the state of the and supporting value increment of industrial data. Operation
node and an efficient access control scheme. domains include specific services for manufacturing which can
2) We use the blockchain of the Hashgraph structure as the automate production by issuing control tasks, such as mon-
underlying structure instead of using the chain-structured itoring and diagnostics, prognostics, and optimization. The
blockchain to build our software system. In order to fur- enterprise tier includes open capabilities for enterprise-level
ther improve the performance of the system, we have industrial applications and third-party applications, integrat-
introduced a sharding mechanism in hashgraph, which ing and encapsulating the atomic capabilities provided by the
is applied to divide the geographically close nodes into platform tier and the edge tier.
Authorized licensed use limited to: Wuhan University. Downloaded on November 22,2023 at 02:38:23 UTC from IEEE Xplore. Restrictions apply.
17072 IEEE INTERNET OF THINGS JOURNAL, VOL. 9, NO. 18, 15 SEPTEMBER 2022
Authorized licensed use limited to: Wuhan University. Downloaded on November 22,2023 at 02:38:23 UTC from IEEE Xplore. Restrictions apply.
GAO et al.: SHARDING-HASHGRAPH: HIGH-PERFORMANCE BLOCKCHAIN-BASED FRAMEWORK 17073
text and the corresponding operation authority into an event, i,j i,j
and uploads it to the blockchain network. After the consensus where α and β represent the number of confirmed (achieved
is completed, the data are stored locally or uploaded to the consensus) and discarded messages within the time ty range.
cloud network. q represents the number of processing completion messages.
Therefore, the direct reputation evaluation of node i to node
j is
B. Node Status Comprehensive Evaluation Mechanism t t t t
Ri,jy = τi,jy − si,jy + aui,jy (3)
In order to improve the scalability and consensus
performance (throughput, latency, etc.) of the hashgraph where a is a value of 0–1, which represents the influence
network, we need to divide the blockchain network into coefficient of uncertainty on direct reputation.
multiple shards. This article proposes a comprehensive evalu- In order to control the influencing factors of credit evalua-
ation mechanism based on node status, dividing the hashgraph tion more flexibly and dynamically, we set different weights
network into multiple shards with good performance. for positive interactions and negative interactions. The formula
This mechanism comprehensively considers the node’s geo- can be rewritten as
⎧ ty
graphic location, credit score, network status, CPU resources ⎪
⎪ τ
ty
=
ty ζ αy
⎪
⎪ q t ty
and divides all nodes in the network into multiple shards. The ⎨ i,j i,j y
ζ αi +ηβi
ty
nodes in each shard are geographically close, the network sta- t t ηβ (4)
⎪ si,jy = qi,jy ty y ty
tus is generally good, and the credit rating is similar. The ⎪
⎪ ζ αi +ηβi
⎪
⎩ uty = 1 − qty
introduction of a comprehensive evaluation mechanism for i,j i,j
Authorized licensed use limited to: Wuhan University. Downloaded on November 22,2023 at 02:38:23 UTC from IEEE Xplore. Restrictions apply.
17074 IEEE INTERNET OF THINGS JOURNAL, VOL. 9, NO. 18, 15 SEPTEMBER 2022
where ζ and η represent the different weights, and the sum of The method of protecting data confidentiality in a trans-
ζ and η is 1. parent system is encryption. There are two main types of
Since the reputation evaluation of a node may become less encryption algorithms, namely symmetric key encryption and
reliable over time, in order to describe the state of the node asymmetric key encryption (public-private key pair encryp-
more truthfully, we introduce the influence of time on the rep- tion). Considering the security of the encryption algorithm,
utation: θy , where y belongs to [1, y]. Therefore, the reputation we choose asymmetric key encryption. In addition, due to
evaluation formula of a node can be rewritten as the complexity of asymmetric keys and the massive amount
⎧ Y ty of data in the IIOT scenario, this mechanism chooses not to
⎪
⎪ ty y=1 θy τi,j
⎪
⎪ τ = upload all the data to the blockchain system but only encrypts
⎪
⎪
i,j Y
θy
⎨ Y y=1 ty the required data and uploads it to the blockchain network.
ty y=1 θy si,j
si,j = Y (5) If node A wants to access the data of node B, the data
⎪
⎪ y=1 θy
⎪
⎪ t transaction between the two parties will be completed through
⎪
⎪ t
Y
θy ui,j
y
⎩ ui,jy = y=1Y . a smart contract. A data transaction is divided into three steps,
y=1 θy
and the data transmission process is shown in Fig. 4. First,
Since node j not only interacts with node i, it is necessary the smart contract sends the public key of node A to node B.
to introduce the reputation opinions of other nodes on node j After receiving it, node B uses the public key of node A to
when comprehensively evaluating the reputation of j. ωx rep- encrypt the target data and upload it to the hashgraph network.
resents the evaluation weight of node x to node j’s reputation. After the upload is complete, node A obtains the data from the
So, we can rewrite the formula as a summation form hashgraph network and uses the corresponding private key to
⎧ X ty decrypt it to realize the encrypted transmission of the data.
⎪
⎪ τ x=1 ωx τx,j
final = Without any central credit server and the third party to
⎪ j
⎪
⎪
X
ω
⎨ X x=1 xty obtain the original data, this privacy protection scheme uses
x=1 ωx sx,j
final
sj = X (6) the public/private key of each node to realize the encrypted
⎪
⎪ ω
⎪
⎪ final X x=1 xty transmission of data. Therefore, it effectively ensures data pri-
⎪
⎩u x=1 ωx ux,j
j = X . vacy in the transparent system. In addition, if necessary, each
x=1 ωx
node can flexibly update its own key pair.
After obtaining the reputation evaluation of node i, this
mechanism can combine the geographic location, credit,
network performance, and CPU resources of the node to IV. B LOCKCHAIN S YSTEM D ESIGN
divide the network into multiple shards and use DQN to make In this section, we introduce the detailed design of the
decisions during the sharding process. blockchain system used in this article.
Authorized licensed use limited to: Wuhan University. Downloaded on November 22,2023 at 02:38:23 UTC from IEEE Xplore. Restrictions apply.
GAO et al.: SHARDING-HASHGRAPH: HIGH-PERFORMANCE BLOCKCHAIN-BASED FRAMEWORK 17075
Authorized licensed use limited to: Wuhan University. Downloaded on November 22,2023 at 02:38:23 UTC from IEEE Xplore. Restrictions apply.
17076 IEEE INTERNET OF THINGS JOURNAL, VOL. 9, NO. 18, 15 SEPTEMBER 2022
TABLE I
P ERFORMANCE C OMPARISON B ETWEEN H ASHGRAPH C ONSENSUS
A LGORITHM AND PBFT C ONSENSUS A LGORITHM
A. Implementation Details
Hashgraph system data transmission uses two encryption
methods: 1) digital signature and 2) hash function. In this test,
the system uses RSA with a 3072-bit key for digital signatures
and uses SHA384 as the hash function. All data communica-
tion is through TLS1.2 communication protocol, using Diffie
Hellman with ephemeral keys and AES256-GCM.
Hashgraph mechanism uses gossip protocol for data broad-
Fig. 6. Hashgraph system uses a virtual voting mechanism to identify famous
witness.
casting. In this system, each node can execute ten random syn-
chronization processes in parallel. In addition, each package
completed event can contain up to 1024 transactions.
an absolute majority of yes votes are collected, then it will be
a famous witness. As shown in Fig. 6, B4 counts whether B2 B. Evaluation and Comparison
is a famous witness. The top B4 can see A3, B3, C3, and D3. We use Amazon EC2 to evaluate the performance of the
The collected votes are four yes, so B2 is a famous witness. If hashgraph system under the following settings.
this round of witnesses cannot make a decision, the next round 1) Each Hashgraph node has four virtual CPUs.
of witnesses will count the votes until a definite conclusion is 2) The running memory of each Hashgraph node is a
reached. random value between 4 and 32 GB.
The core of the Hashgraph consensus protocol is divide 3) The network performance of each Hashgraph node is a
rounds, Decision Fame, and find order. In order to reach a random value between 1 and 2 Gb/s.
consensus, each node performs the following operations on 4) All Hashgraph instances are evenly distributed in two
its hashgraph: regions.
Divide Rounds: According to the definition and execution In order to better reflect the performance of the sharding-
process, hashgraph is divided into several rounds. In addition, hashgraph system, we deployed a batch of new amazon EC2
each node votes on each event and selects witnesses for each nodes, gave these nodes the same performance as other nodes
round. (random in the same range), and deployed Honey on these
Decision Fame: The hashgraph protocol runs an election for nodes Badger BFT agreement and BEAT0 consensus agree-
each witness, and each node votes on the witness to select a ment. These protocols are all ABFT consensus protocols, and
famous witness for each round. they implement universal state machine replication.
Find Order: Once all well-known witnesses have been iden- The latency mentioned in this section refers to the average
tified in a certain round, the acceptance round and consensus delay from when the client submits a transaction to the node
timestamp can be determined for other common events in for the first time until the node knows the consensus order and
this round. According to the acceptance round and consensus timestamp of the transaction.
timestamp, all events of the round can be sorted. In order to prove the superiority of the ABFT consensus
After all events in this round are sequenced, the consensus algorithm, we deployed the PBFT consensus mechanism on
is achieved in this round. these nodes and conducted a simple comparison experiment.
As shown in Table I, HoneyBadgerBFT has the same level of
V. S IMULATION R ESULTS AND D ISCUSSION throughput as PBFT when the number of nodes is small, but
In this section, we evaluate how the sharding-Hashgraph as the number of nodes increases, the throughput of the PBFT
system affects the performance of the blockchain network. algorithm drops rapidly, and HoneBadgeryBFT has a larger
Then, we discuss the simulation results performance gap with PBFT. It proves the advantages of the
Authorized licensed use limited to: Wuhan University. Downloaded on November 22,2023 at 02:38:23 UTC from IEEE Xplore. Restrictions apply.
GAO et al.: SHARDING-HASHGRAPH: HIGH-PERFORMANCE BLOCKCHAIN-BASED FRAMEWORK 17077
Fig. 10. Hashgraph system with sharding mechanism has good geographic
scalability.
Fig. 8. Superiority of the sharding-hashgraph system.
Authorized licensed use limited to: Wuhan University. Downloaded on November 22,2023 at 02:38:23 UTC from IEEE Xplore. Restrictions apply.
17078 IEEE INTERNET OF THINGS JOURNAL, VOL. 9, NO. 18, 15 SEPTEMBER 2022
a significant increase in system scalability and a significant [6] L. D. Xu, Y. Lu, and L. Li, “Embedding blockchain technology into
reduction in system consensus delay. IoT for security: A survey,” IEEE Internet Things J., vol. 8, no. 13,
pp. 10452–10473, Jul. 2021.
Fig. 10 demonstrates the performance gap between [7] H.-N. Dai, Z. Zheng, and Y. Zhang, “Blockchain for Internet of Things:
sharding-hashgraph and the hashgraph system without shard- A survey,” IEEE Internet Things J., vol. 6, no. 5, pp. 8076–8094,
ing from another perspective. It can be seen that the geograph- Oct. 2019.
[8] S. Iqbal, R. M. Noor, A. W. Malik, and A. U. Rahman, “Blockchain-
ical distribution of hashgraph system nodes will also lead to enabled adaptive-learning-based resource-sharing framework for IIoT
a substantial increase in system latency. When the nodes are environment,” IEEE Internet Things J., vol. 8, no. 19, pp. 14746–14755,
distributed in two different areas, the system delay is almost Oct. 2021.
[9] M. H. S. Mohammed, “A hybrid framework for securing data trans-
doubled. However, the sharding-hashgraph system stabilizes mission in Internet of Things (IoTs) environment using blockchain
the system consensus delay at a low level. By introducing the approach,” in Proc. IEEE Int. IOT Electron. Mechatronics Conf.
sharding mechanism, the hashgraph network can be divided (IEMTRONICS), 2021, pp. 1–10.
[10] H. Yao, T. Mai, J. Wang, Z. Ji, C. Jiang, and Y. Qian, “Resource trading
into multiple shards according to geographic distribution. The in blockchain-based Industrial Internet of Things,” IEEE Trans. Ind.
nodes in each shard are nodes in the same area, thereby sig- Informat., vol. 15, no. 6, pp. 3602–3609, Jun. 2019.
nificantly reducing the impact of the distribution of nodes in [11] Y. Zhang, Y. Qian, D. Wu, M. S. Hossain, A. Ghoneim, and M. Chen,
“Emotion-aware multimedia systems security,” IEEE Trans. Multimedia,
different areas on the system delay. vol. 21, no. 3, pp. 617–624, Mar. 2019.
[12] X. Li, D. Li, J. Wan, C. Liu, and M. Imran, “Adaptive transmission
optimization in SDN-based Industrial Internet of Things with edge
VI. C ONCLUSION computing,” IEEE Internet Things J., vol. 5, no. 3, pp. 1351–1360,
Jun. 2018.
In this article, we proposed an IIoT distributed data man- [13] W. Khan, M. Rehman, H. Zangoti, M. Afzal, N. Armi, and
agement system based on blockchain technology and related K. Salah, “Industrial Internet of Things: Recent advances,
enabling technologies and open challenges,” Comput. Electr.
core mechanisms. In order to solve the problems of much IIoT Eng., vol. 81, Jan. 2020, Art. no. 106522. [Online]. Available:
access equipment, equipment power consumption, and data https://www.sciencedirect.com/science/article/pii/S0045790618329550
processing capabilities, this article proposed a novel system [14] J. C. Chen and V. S. Gabriel, “Revolution of 3D printing technology and
application of six sigma methodologies to optimize the output quality
architecture, which divides the system into two layers: 1) the characteristics,” in Proc. IEEE Int. Conf. Ind. Technol. (ICIT), 2016,
sensor network and 2) the blockchain network, which can pp. 904–909.
be used in intelligent deploy high-performance blockchain [15] X. Xu et al., “Mitigating conflicting transactions in hyperledger fabric-
permissioned blockchain for delay-sensitive IoT applications,” IEEE
systems in scenarios, such as factories. In order to improve Internet Things J., vol. 8, no. 13, pp. 10596–10607, Jul. 2021.
the performance of the blockchain network, we adopted the [16] Z. Zheng, S. Xie, H. Dai, X. Chen, and H. Wang, “An overview
sharding-hashgraph mechanism and introduced a comprehen- of blockchain technology: Architecture, consensus, and future trends,”
in Proc. IEEE Int. Congr. Big Data (BigData Congress), 2017,
sive evaluation mechanism based on the node status to shard a pp. 557–564.
large number of nodes dynamically. Simulation and compari- [17] A. Miller, Y. Xia, K. Croman, E. Shi, and D. Song, “The honey badger
son results showed that the IIoT distributed data management of BFT protocols,” in Proc. ACM SIGSAC Conf. Comput. Commun.
Security, 2016, pp. 31–42.
system proposed in this article has good security, privacy, and [18] S. Duan, M. K. Reiter, and H. Zhang, “BEAT: Asynchronous BFT made
scalability. practical,” in Proc. ACM SIGSAC Conf., 2018, pp. 2028–2041.
The system proposed in this article still has some limita-
tions, such as a large amount of useless information in the
data uploaded by the sensor and limited storage space of the
complete node, which is not conducive to the data manage- Ningjie Gao received the B.S. degree in communi-
ment of the blockchain network. We will explore how to use cation engineering from Beijing University of Posts
blockchain to better manage and utilize industrial data in the and Telecommunications, Beijing, China, in 2018,
where he is currently pursuing the Ph.D. degree
future direction. with the State Key Laboratory of Networking and
Switching Technology.
His current research interests include software-
R EFERENCES defined networking, named data networks, multi-
access computing, blockchain, and reinforcement
[1] J.-Q. Li, F. R. Yu, G. Deng, C. Luo, Z. Ming, and Q. Yan, “Industrial learning.
Internet: A survey on the enabling technologies, applications, and chal-
lenges,” IEEE Commun. Surveys Tuts., vol. 19, no. 3, pp. 1504–1526,
3rd Quart., 2017.
[2] Y. Zhang, R. Wang, M. S. Hossain, M. F. Alhamid, and M. Guizani,
“Heterogeneous information network-based content caching in the Ru Huo received the B.S. degree in electronics and
Internet of Vehicles,” IEEE Trans. Veh. Technol., vol. 68, no. 10, information engineering from Harbin Engineering
pp. 10216–10226, Oct. 2019. University, Harbin, Heilongjiang, China, in 2011,
[3] P. Urien, “Blockchain IoT (BIoT): A new direction for solving Internet and the Ph.D. degree in information and communi-
of Things security and trust issues,” in Proc. 3rd Cloudification Internet cation engineering from Beijing University of Posts
Things (CIoT), 2018, pp. 1–4. and Telecommunications, Beijing, China.
[4] X. Wang, S. Garg, H. Lin, G. Kaddoum, J. Hu, and M. S. Hossain, From September 2015 to September 2016, she
“PPCS: An intelligent privacy-preserving mobile-edge crowdsensing studied with The University of British Columbia,
strategy for Industrial IoT,” IEEE Internet Things J., vol. 8, no. 13, Vancouver, BC, Canada, as a visiting Ph.D. student.
pp. 10288–10298, Jul. 2021. She is currently a Lecturer with Beijing University of
[5] C. Qiu, H. Yao, F. R. Yu, C. Jiang, and S. Guo, “A service-oriented per- Technology, Beijing. Her current research interests
missioned blockchain for the Internet of Things,” IEEE Trans. Services include software-defined networking, information-centric networking, multi-
Comput., vol. 13, no. 2, pp. 203–215, Mar./Apr. 2020. access edge computing, blockchain, IIOT, and resource scheduling.
Authorized licensed use limited to: Wuhan University. Downloaded on November 22,2023 at 02:38:23 UTC from IEEE Xplore. Restrictions apply.
GAO et al.: SHARDING-HASHGRAPH: HIGH-PERFORMANCE BLOCKCHAIN-BASED FRAMEWORK 17079
Shuo Wang received the B.S. degree in commu- Yunjie Liu received the B.S. degree in technical
nication engineering from Zhengzhou University, physics from Peking University, Beijing, China, in
Zhengzhou, China, in July 2013, and the Ph.D. 1968.
degree in information and communication engi- He is currently an Academician with China
neering from Beijing University of Posts and Academy of Engineering, the Chief of the Science
Telecommunications, Beijing, China, in July 2018. and Technology Committee of China Unicom,
He has been a Postdoctoral Researcher with and the Dean of the School of Information and
Beijing University of Posts and Telecommunications Communication Engineering, Beijing University of
since 2018. His research interests include data center Posts and Telecommunications, Beijing. His current
networking and software-defined networking. research interests include next-generation networks,
network architecture, and management.
Authorized licensed use limited to: Wuhan University. Downloaded on November 22,2023 at 02:38:23 UTC from IEEE Xplore. Restrictions apply.