International Core Journal of Engineering 2020-26 | Page 32
information in the response cycle in time into the blockchain.
Each block is connected end to end, and the hash value
stored in the next block is used to ensure the accuracy and
untouchability of the previous block. At the same time, for
the sake of information security and requirements security,
various security algorithms are used to ensure the secrecy of
information in blockchain network. However, a single
algorithm is often difficult to meet the needs of demand
response business, so it needs to be used in combination.
Table 1 shows the security levels of different mechanisms.
energy consumption. But the drawback of the DPoS
mechanism is that the votes of each node are not very
motivated. The vast majority of shareholders (90%+) never
participated in the voting.
4) PBFT(Practical Byzantine Fault Tolerance)漡PBFT is
also a common proof of consensus. It is different from the
previous three. PBFT is based on computation and no token
reward. Everyone in the chain votes, and less than (N-1) /
three nodes have the right to publicize information when
they object. His advantage is that the algorithm has strict
mathematical proof of its reliability and (n-1)/3 fault-
tolerance. His disadvantage is that the system will not be
able to provide services when one third or more of the
bookkeepers stop working.
TABLE I. COMPARISON OF VARIOUS SECURITY MECHANISMS
Algorithm
Symmetric
encryption
Public key
encryption
Digital
signature
Key
agreement
Unidirectional
hash
Message
validation
confidentiality consistency integrity key
management
● ○ ○ ●
● ○ ○ ●
○ ● ● ○
● Optional ○ ●
○ ○ ● ○
○ ● ● ○
Polkadot technology is a new type of blockchain
technology proposed by Ethereum, which exposes
blockchains without any third party authorization. The
original idea of the design is similar to that of the side chain
technology which is popularized in Ethereum. Similarly,
another blockchain besides the main chain is constructed,
which is docked with the external system or main chain of
another blockchain, and finally funds or data can be
transferred [10] . Polkadot technology regards many different
blockchains as main chains and keeps their original
consistency, while other blockchains corresponding to these
chains inherit their effective functions. In other words, the
main chain only retains the original workload certification
mechanism to confirm the consistency of its network-wide
distributed accounting, and the data size is recorded by the
other chain. The main chain is named as parallel chain, and
the other chain is named relay chain. A parallel chain can
correspond to multiple relay chains, and a relay chain can
also correspond to multiple parallel links. The combination
of each relay chain and parallel chain can be regarded as an
independent blockchain. This not only ensures data and
evidence isolation, but also ensures a unified management
and collaboration among multiple parallel chains, deepens
the joint development of a variety of services and improves
the practicality of data sharing. The specific implementation
structure is shown in Figure 3.
B. Multi agent mutual trust
Multi-agent mutual trust is a very important link in
blockchain. The key point of consensus mechanism is to let
multiple nodes maintain the same database. It decides to let
one node write and not be changed by other nodes. The
main consensus mechanisms are as follows:
1) PoW(Proof of Work): PoW is the first generation
consensus mechanism and the foundation of bitcoin. His
idea is to "pay for work" and decide on the reward
(encrypted currency such as bitcoin) based on the amount of
work each node has to do. The labor of each node refers to
the computing service provided for the network (computing
time x), and the process of providing this service is called
"mining". The shortcomings of the PoW mechanism are also
obvious, because the calculation is provided by computer
hardware (CPU, GPU, etc.), "digging" will consume a lot of
electricity, which is a direct consumption of energy and
contrary to the pursuit of human’s concept of energy-saving,
clean, environmental protection. At the same time, users
also develop from individual mining to large pools and
mines. This runs counter to the direction of centralization,
and threatens the network security gradually.
Aggregate trader A
Aggregate trader B
Aggregate trader C
Miner
supervisor
2) PoS(Proof of Stake): PoS has no mining process, just
need to write in the share allocation ratio of creation block,
and then through transfer, trading and other means,
dispersed to the user's hands gradually, and through the
"interest" way to add money, to achieve the node reward.
PoW is combined with PoS. But the PoS mechanism is also
flawed, pure PoS mechanism of encrypted currency, can
only be issued through IPO, which leads to a "minority"
(usually developers) access to a large number of very low-
cost encrypted currency, in front of the interests, it is
difficult to guarantee that they will not sell a lot. Therefore,
the credit base of the PoS mechanism is not strong enough.
Broadcast transaction
Verifying main cluster
account
distributed
generation A
distributed
generation B
Cross chain record
distributed
generation C
Transaction user
cluster
Parallel chain
Parallel chain
region
3) DPoS(Delegated Proof of Stake):The realization of
DPoS is similar to that of an uncontrolled company issuing
shares, generating profits and distributing them to
shareholders. The advantage of this mechanism is lower
Parallel chain
bridging
(queue and I/O)
Virtual parallel chain
Fig. 3. Multi agent mutual trust in demand response mechanism
10