Utilizing Transaction Prioritization to Enhance Confirmation Speed in the IOTA Network
- URL: http://arxiv.org/abs/2501.16763v2
- Date: Fri, 14 Feb 2025 18:57:34 GMT
- Title: Utilizing Transaction Prioritization to Enhance Confirmation Speed in the IOTA Network
- Authors: Seyyed Ali Aghamiri, Reza Sharifnia, Ahmad Khonsari,
- Abstract summary: We propose an optimization framework designed to integrate a priority level for critical or high-priority IoT transactions within the IOTA network.<n>The experimental results show that higher-priority transactions in the proposed algorithm reach final confirmation in less time compared to the original IOTA system.
- Score: 1.5340244519478985
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: With the rapid advancement of blockchain technology, a significant trend is the adoption of Directed Acyclic Graphs (DAGs) as an alternative to traditional chain-based architectures for organizing ledger records. Systems like IOTA, which are specially designed for the Internet of Things (IoT), leverage DAG-based architectures to achieve greater scalability by enabling multiple attachment points in the ledger for new transactions while allowing these transactions to be added to the network without incurring any fees. To determine these attachment points, many tip selection algorithms commonly employ specific strategies on the DAG ledger. Transaction prioritization is not considered in the IOTA network, which becomes especially important when network bandwidth is limited. In this paper, we propose an optimization framework designed to integrate a priority level for critical or high-priority IoT transactions within the IOTA network. We evaluate our system using fully based on the official IOTA GitHub repository, which employs the currently operational IOTA node software (Hornet version), as part of the Chrysalis update (1.5). The experimental results show that higher-priority transactions in the proposed algorithm reach final confirmation in less time compared to the original IOTA system.
Related papers
- Advanced DAG-Based Ranking (ADR) Protocol for Blockchain Scalability [2.6649708444847677]
This paper proposes the Advanced DAG-based Ranking protocol to enhance blockchain scalability and throughput.<n>It follows a three-step approach to secure the network against double-spending and enhance performance.<n> Simulation results demonstrate that ADR significantly improves transaction throughput and network liveness compared to existing DAG-based blockchains.
arXiv Detail & Related papers (2025-08-06T01:27:33Z) - Graph Attention Network-based Block Propagation with Optimal AoI and Reputation in Web 3.0 [59.94605620983965]
We design a Graph Attention Network (GAT)-based reliable block propagation optimization framework for blockchain-enabled Web 3.0.
To achieve the reliability of block propagation, we introduce a reputation mechanism based on the subjective logic model.
Considering that the GAT possesses the excellent ability to process graph-structured data, we utilize the GAT with reinforcement learning to obtain the optimal block propagation trajectory.
arXiv Detail & Related papers (2024-03-20T01:58:38Z) - A Tip for IOTA Privacy: IOTA Light Node Deanonymization via Tip Selection [2.9904113489777826]
IOTA is a distributed ledger technology that uses a Directed Acyclic Graph structure called the Tangle.
In this paper, we demonstrate that tip selection can be exploited to compromise users' privacy.
We show that these types of attacks are not only viable in the current IOTA environment but also in IOTA 2.0 and the privacy improvement being studied.
arXiv Detail & Related papers (2024-03-17T11:12:46Z) - Principled Architecture-aware Scaling of Hyperparameters [69.98414153320894]
Training a high-quality deep neural network requires choosing suitable hyperparameters, which is a non-trivial and expensive process.
In this work, we precisely characterize the dependence of initializations and maximal learning rates on the network architecture.
We demonstrate that network rankings can be easily changed by better training networks in benchmarks.
arXiv Detail & Related papers (2024-02-27T11:52:49Z) - Heterogeneity- and homophily-induced vulnerability of a P2P network formation model: the IOTA auto-peering protocol [0.9075435445935834]
IOTA is a distributed ledger technology that relies on a peer-to-peer (P2P) network for communications.
This paper's goal is to detect potential vulnerabilities and evaluate the resilience of the P2P network generated using IOTA auto-peering algorithm against eclipse attacks.
arXiv Detail & Related papers (2024-01-23T10:30:14Z) - Over-The-Air Federated Learning: Status Quo, Open Challenges, and Future
Directions [78.5371215066019]
Over-the-air federated learning (OTA-FL) enables users at the network edge to share spectrum resources and achieves efficient and low-latency global model aggregation.
This paper provides a holistic review of progress in OTA-FL and points to potential future research directions.
arXiv Detail & Related papers (2023-07-03T12:44:52Z) - RIS-assisted UAV Communications for IoT with Wireless Power Transfer
Using Deep Reinforcement Learning [75.677197535939]
We propose a simultaneous wireless power transfer and information transmission scheme for IoT devices with support from unmanned aerial vehicle (UAV) communications.
In a first phase, IoT devices harvest energy from the UAV through wireless power transfer; and then in a second phase, the UAV collects data from the IoT devices through information transmission.
We formulate a Markov decision process and propose two deep reinforcement learning algorithms to solve the optimization problem of maximizing the total network sum-rate.
arXiv Detail & Related papers (2021-08-05T23:55:44Z) - Secure and Efficient Federated Learning Through Layering and Sharding
Blockchain [15.197940168865271]
This paper proposes ChainFL, a novel two-layer blockchain-driven Federated Learning system.
It splits the Internet network into multiple shards within the subchain layer, effectively reducing the scale of information exchange.
It also employs a Direct Acyclic Graph (DAG)-based mainchain as the mainchain layer, enabling parallel and asynchronous cross-shard validation.
arXiv Detail & Related papers (2021-04-27T12:19:07Z) - Towards On-Device Federated Learning: A Direct Acyclic Graph-based
Blockchain Approach [2.9202274421296943]
This paper introduces a framework for empowering Federated Learning using Direct Acyclic Graph (DAG)-based blockchain systematically (DAG-FL)
Two algorithms DAG-FL Controlling and DAG-FL Updating are designed running on different nodes to elaborate the operation of DAG-FL consensus mechanism.
arXiv Detail & Related papers (2021-04-27T10:29:38Z) - Optimizing Resource-Efficiency for Federated Edge Intelligence in IoT
Networks [96.24723959137218]
We study an edge intelligence-based IoT network in which a set of edge servers learn a shared model using federated learning (FL)
We propose a novel framework, called federated edge intelligence (FEI), that allows edge servers to evaluate the required number of data samples according to the energy cost of the IoT network.
We prove that our proposed algorithm does not cause any data leakage nor disclose any topological information of the IoT network.
arXiv Detail & Related papers (2020-11-25T12:51:59Z) - High-Capacity Expert Binary Networks [56.87581500474093]
Network binarization is a promising hardware-aware direction for creating efficient deep models.
Despite its memory and computational advantages, reducing the accuracy gap between binary models and their real-valued counterparts remains an unsolved challenging research problem.
We propose Expert Binary Convolution, which, for the first time, tailors conditional computing to binary networks by learning to select one data-specific expert binary filter at a time conditioned on input features.
arXiv Detail & Related papers (2020-10-07T17:58:10Z) - Blockchain in the Internet of Things: Architectures and Implementation [17.375245776804885]
We propose and evaluate a new approach based on the incorporation of security into current IoT scenarios.
The proposed method has been fully implemented and validated on two different real-life IoT scenarios.
The source code of our implementation is publicly available in the testnet.
arXiv Detail & Related papers (2020-04-13T08:19:37Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.