This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Graph Attention Network-based Block Propagation with Optimal AoB and Reputation in Web 3.0

Jiana Liao*, Jinbo Wen*, Jiawen Kang, Changyan Yi, Yang Zhang, Yutao Jiao,
Dusit Niyato, Fellow, IEEE, Dong In Kim, Fellow, IEEE, and Shengli Xie, Fellow, IEEE
J. Liao, J. Kang, and S. Xie are with the School of Automation, Guangdong University of Technology, China (e-mails: [email protected]; [email protected]; [email protected]). J. Wen, C. Yi, and Y. Zhang are with the College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, China (e-mails: [email protected]; [email protected]; [email protected]). Y. Jiao is with the College of Communications Engineering, Army Engineering University of PLA, China (e-mail: [email protected]). D. Niyato is with the School of Computer Science and Engineering, Nanyang Technological University, Singapore (e-mail: [email protected]). D. I. Kim is with the Department of Electrical and Computer Engineering, Sungkyunkwan University, Suwon 16419, South Korea (e-mail: [email protected]). * means equal contribution. (Corresponding authors: Jiawen Kang, Yutao Jiao.)
Abstract

Web 3.0 is recognized as a pioneering paradigm that empowers users to securely oversee data without reliance on a centralized authority. Blockchains, as a core technology to realize Web 3.0, can facilitate decentralized and transparent data management. Nevertheless, the evolution of blockchain-enabled Web 3.0 is still in its nascent phase, grappling with challenges such as ensuring efficiency and reliability to enhance block propagation performance. In this paper, we design a Graph Attention Network (GAT)-based reliable block propagation optimization framework for blockchain-enabled Web 3.0. We first innovatively apply a data-freshness metric called age of block to measure block propagation efficiency in public blockchains. To achieve the reliability of block propagation, we introduce a reputation mechanism based on the subjective logic model, including the local and recommended opinions to calculate the miner reputation value. Moreover, considering that the GAT possesses the excellent ability to process graph-structured data, we utilize the GAT with reinforcement learning to obtain the optimal block propagation trajectory. Numerical results demonstrate that the proposed scheme exhibits the most outstanding block propagation efficiency and reliability compared with traditional routing mechanisms.

Index Terms:
Web 3.0, block propagation, age of block, reputation, graph attention network.

I Introduction

Driven by the increasing interest in cryptocurrencies and the advancement of blockchain technologies, Web 3.0 is emerging to enable users to securely manage data without a centralized authority[1]. Since the advent of the World Wide Web, there have been three generations of the Web. Specifically, Web 1.0 was featured by static web pages and limited user engagement[1]. Web 2.0 is a paradigm shift in how the internet is used, which is characterized by interactivity and social connectivity[1]. Unlike Web 2.0 and Web 1.0, Web 3.0 is envisioned as the blockchain-based Internet, which holds the potential to revolutionize the modern Internet in two critical aspects. Firstly, Web 3.0 transcends being merely a readable and writable network, which empowers users to assert dominion over their data and assets[2]. Secondly, Web 3.0 embodies a nascent economic system collaboratively constructed and shared by both end-users and creators[2].

With the incredible ability to empower secure, transparent, and tamper-proof data transactions through decentralized ledgers, blockchains have attracted significant attention from both academia and industry[3]. Based on consensus mechanisms and encryption technologies, blockchains possess the ability to facilitate the creation of cryptocurrencies and drive the development of decentralized applications and smart contracts, assuming a pivotal role across various domains, such as decentralized finance[4], Metaverse[5], and Internet of Vehicles[6]. In Web 3.0, a significant volume of transactions involving digital products, such as Non-Fungible Tokens, transpires among users, which poses challenges to data security. To this end, blockchain-enabled Web 3.0 emerges as a necessary strategy to ensure secure storage and efficient management of these transactions[2]. Furthermore, the blockchain-enabled Web 3.0 facilitates decentralized data exchange and sharing, which enables participants to circumvent the dominance of tech giants and gain control over user-generated content[7]. Therefore, blockchains are widely regarded as fundamental and indispensable technologies for the progress of Web 3.0.

Although Web 3.0 is more accessible and intelligent than previous generations, it still faces some challenges for future popularization and development. One of the main challenges is improving blockchain performance[2]. For one thing, in public blockchains, a new block is randomly broadcast in the miner network for validation, which may lead to large overall propagation time[8]. When block propagation time in the miner network becomes excessively prolonged, it can lead to an excessive number of forks and insufficient signature collections, ultimately resulting in the failure of transaction verification[8, 3]. Additionally, prolonged propagation delay may significantly extend the block generation interval. For another thing, during the block propagation process, malicious miners can easily access blockchains and issue attacks, such as Sybil attacks, double-spending attacks, and selfish mining, which results in financial losses and privacy breaches, substantially eroding blockchain reliability. Therefore, to effectively improve blockchain performance, reliably optimizing block propagation is critical[3]. Some efforts have been conducted to optimize block propagation[3, 7, 2, 8]. However, they do not consider how to measure the block propagation efficiency in public blockchains and how to quantify the reliability of miners in the block propagation process for enabling reliable block propagation optimization.

To address the above challenges, in this paper, we design a Graph Attention Network (GAT)-based reliable block propagation optimization framework for blockchain-enabled Web 3.0. Specifically, since Age of Information (AoI) as a well-established metric can capture information freshness[9], we apply the Age of Block (AoB), which is similar to AoI, to measure block propagation efficiency in public blockchains. Then, to achieve reliable block propagation optimization, we propose a miner reputation mechanism based on the subjective logic model[10], including the local and recommended opinions to measure miner reliability in public blockchains. Furthermore, we utilize the GAT with Reinforcement Learning (RL) to extract the relational presentation between each miner and its adjacent miner in a graph-structured miner network, thereby facilitating the formulation of the miner selection process. By integrating the aforementioned methods, the framework can ultimately derive the optimal block propagation trajectory. The contributions of this paper are summarized as follows:

  • We adopt the AoB as a data-freshness metric to measure block propagation efficiency in public blockchains, which has a specific consideration of the block consensus mechanism. For example, the proposed AoB innovatively provides a comprehensive examination of the procedures of getdata message arrival time interval, block waiting time, and block propagation time. Moreover, unlike [11], we infer the specific formulas considering the characteristics of block propagation in public blockchains.

  • To ensure the reliability of block propagation, we propose a miner reputation mechanism based on the subjective logic model, where the subjective logic model as a widely adopted mathematical tool utilizes the local and recommended miner opinions to effectively calculate miner reputation values in the miner network. Moreover, the miner reputation mechanism has been specifically designed in both local and recommended opinions to improve the reputation calculation.

  • To achieve reliable block propagation optimization, we propose a GAT-based block propagation optimization model to delve into more intricate aspects during the block consensus process than existing consensus mechanisms, in which we design a novel GAT-based architecture with RL to minimize the overall AoB of block propagation given the reputation constraint, thereby obtaining the optimal block propagation trajectory. Moreover, considering the consensus mechanism of public blockchains (i.e., Proof of Work), the optimization conducted by the GAT model is based on a specific number of miners.

  • Compared with Greedy and Gossip mechanisms, our model exhibits outstanding performance and achieves the most efficient and reliable block propagation. For example, when the number of miners is set to 4949, the overall AoB of our model is 2.4%22.6%2.4\%-22.6\% lower than that of Greedy and Gossip mechanisms. Moreover, the total value of miner reputations of our model is 7.4%34.77%7.4\%-34.77\% higher than that of Greedy and Gossip mechanisms.

Refer to caption
Figure 1: A GAT-based reliable block propagation optimization framework for blockchain-enabled Web 3.0.

The remainder of the paper is organized as follows: Section II reviews related literature. In Section III, we propose the system model including the block propagation mechanism and the proposed framework. In Section IV, we formulate the problem of minimizing the overall AoB of block propagation with the given reputation constraint. In Section V, we introduce the GAT with the encoder-decoder architecture. In Section VI, we introduce RL with a rollout baseline to train the network. Section VII presents the numerical results of the proposed schemes. Finally, the paper concludes with Section VIII.

II Related Work

TABLE I: Mathematical Notations
Notation Definition
Γi\Gamma_{i} Block propagation time between miner (i1)(i-1) and miner ii
XiX_{i} Time elapsed from miner (i1)(i-1) sending a getdata message to miner ii sending a getdata message
DiD_{i} Time elapsed from miner ii sending a getdata message at time tit_{i} to successfully receive the block at tit_{i}^{{}^{\prime}}
WiW_{i} Block waiting time, as a part of the system time DiD_{i}
Δ\Delta Average AoB over the time range (0, δ\delta)
αijtk\alpha_{i\to j}^{t_{k}} Number of positive interactions between miners
βijtk\beta_{i\to j}^{t_{k}} Number of negative interactions between miners
TijtkT_{i\to j}^{t_{k}} Trust of the local reputation of miner ii to miner jj in the time slot tkt_{k}
FijtkF_{i\to j}^{t_{k}} Distrust of the local reputation of miner ii to miner jj in the time slot tkt_{k}
UijtkU_{i\to j}^{t_{k}} Uncertainty of the local reputation of miner ii to miner jj in the time slot tkt_{k}
RijfinalR_{i\to j}^{final} Final reputation value of miner ii to miner jj
𝜽\bm{\theta} Network parameters of the proposed GAT model
𝒒iy(r)\bm{q}_{iy}^{(r)} Query embedding of miner ii in the yy-th head of the rr-th GAT layer
𝒌iy(r)\bm{k}_{iy}^{(r)} Key embedding of miner ii in the yy-th head of the rr-th GAT layer
𝒗iy(r)\bm{v}_{iy}^{(r)} Value embedding of miner ii in the yy-th head of the rr-th GAT layer
𝒖ijy(r)\bm{u}_{ijy}^{(r)} Compatibility embedding from miner ii to miner jj in the multi-head attention layer of the GAT model

II-A Blockchain-enabled Web 3.0

Web 3.0, also regarded as the semantic web, represents the cutting edge of web development, driven by Artificial Intelligence (AI), Internet of Things, and blockchain technologies. Nowadays, the intertwining of blockchain technologies with Web 3.0 forms a symbiotic relationship, giving rise to blockchain-enabled Web 3.0, which is effective for the transparent, traceable, and decentralized recording of on-chain content. Therefore, research aimed at enhancing blockchain performance in Web 3.0 holds unique significance, serving as a key motivation for our work. Some efforts have been conducted to achieve blockchain-enabled Web 3.0[2, 7, 12]. For example, the authors in[2] introduced a Web 3.0 framework powered by quantum blockchain technologies and discussed potential challenges and applications of integrating quantum blockchain in Web 3.0[2]. The authors in [7] proposed a semantic exchange framework leveraging blockchain technologies and discussed the relationship between semantic communication and blockchain for Web 3.0[7]. The authors in[12] developed an innovative architecture for Web 3.0, integrating AI and blockchain to establish a metaverse-based framework that aims to tackle the existing privacy and security challenges of the current Web 2.0 while improving user experience and data control. Moreover, the authors emphasized the importance of blockchain technologies in the construction of Web 3.0[12]. However, the majority of existing works do not delve into the optimization of blockchain performance as a means to enhance Web 3.0 performance. Therefore, it is important to optimize blockchain performance for Web 3.0, especially optimizing block propagation.

II-B Graph Attention Network

In recent years, GAT as a subtype of graph neural networks, has garnered considerable attention, including molecules, social networks, product recommendations, computer programs, and more[13]. GAT is a class of deep learning models specially designed for processing graph-structured data, known for their exceptional adaptability and efficiency across various applications[14]. For example, the authors in [14] proposed a novel residual edge-graph attention network that combines edge and node information to address combinatorial optimization problems[14]. The authors in[15] employed a foundational three-layer GAT network to capture spatial structural information based on the dynamic aggregation in the road network. Furthermore, when compared with the graph convolutional network, the GAT model significantly enhances the reliability of traffic flow prediction[15]. The authors in[16] introduced a performance prediction model for multipath routing, utilizing the GAT, which models the function and structure of data to predict the network stability and throughput[16]. However, the majority of the existing works do not take into account the utilization of GAT to capture the miner network information, such as the relationship between adjacent miners, thereby optimizing block propagation.

II-C Block Propagation Optimization

Block propagation optimization has been a prominent research topic for improving blockchain performance. There are numerous researchers investigating this issue, and their efforts can be broadly categorized into three main directions: 1) Optimizing block verification: the authors in[17] proposed a block verification mechanism based on zero-knowledge proof and smart contracts, which improves both the speed of data block verification and privacy protection[17]. The authors in[18] introduced a secure verification scheme for real-time office documents leveraging blockchain technologies, thereby enhancing the efficiency and security in block verification[18]. 2) Optimizing blockchain network topology: the authors in[19] proposed a two-layer blockchain topology to overcome transaction time issues and scalability for market procurement of reactive power[19]. The authors in[20] employed the software-defined networking paradigm to optimize the control of the peer-to-peer network topology in public blockchains, resulting in a significant reduction in node resource consumption[20]. 3) Optimizing the propagation behavior of miners: the authors in[21] introduced a method for preventing block withholding attacks, which utilizes a credit model, a punishment mechanism, and the behavior reward to evaluate the contribution of miners[21]. However, few works have been conducted on combining block propagation efficiency and miner reliability based on the GAT when optimizing block propagation. In Web 3.0, efficient and reliable blockchain technology can significantly promote further development in this ecosystem, giving users a better experience. Therefore, it is still challenging to leverage the GAT to achieve efficient and reliable block propagation optimization.

Motivated by the aforementioned research gaps, we propose a GAT-based reliable block propagation optimization framework for the performance enhancement of blockchain-enabled Web 3.0, in which we apply the AoB to quantify block propagation efficiency and propose a miner reputation mechanism to ensure the reliability of block propagation.

III GAT-based Reliable Block Propagation Optimization Framework for Web 3.0

In this section, we first briefly introduce the block propagation mechanism in public blockchains[22]. Then, we provide a comprehensive description of the proposed GAT-based reliable block propagation optimization framework for blockchain-enabled Web 3.0, as illustrated in Fig. 1.

III-A Block Propagation Mechanism

For the block propagation in public blockchains, we introduce the block propagation mechanism which is similar to the traditional gossip protocol[22, 23]. However, for the optimization of specific block propagation trajectories, the introduced block propagation mechanism directs the propagation of a new block to a single miner, departing from the flooding propagation characteristic of the gossip. The detailed process is depicted in Part A of Fig. 1. To prevent redundant transmissions to miners that have already received the new block, the new block is not forwarded directly[22]. Instead, a miner would send an inv message containing the hash value of the new block to its adjacent miner before propagating the block. If the adjacent miner has never received the block, the adjacent miner will issue a getdata message to request the new block [22, 24], and the getdata message is then queued until the block has been received and the difficulty check has been done[22]. To speed up block propagation, the adjacent miner sending the getdata message also sends an inv message to its adjacent miner. Additionally, the block verification process is divided into two phases, i.e., the block difficulty check and transaction validation [22]. Once the block difficulty check is completed, the block is sent out without further transaction validation, aiming to minimize processing time [22].

III-B Framework Design

As shown in Fig. 1, the proposed GAT-based reliable block propagation optimization framework for blockchain-enabled Web 3.0 is structured into three layers, i.e., a physical layer, a data layer, and a network layer. Specifically, the first layer, functioning as the foundation of the proposed framework, is the physical layer, which exists in various applications in Web 3.0, such as decentralized autonomous organizations and decentralized marketplaces for digital products[1]. The second layer is the data layer, where blockchains provide secure and reliable data management for Web 3.0 applications[2]. The final layer is the network layer, which is exacted from the blockchains of the data layer. Especially, the network layer introduces the proposed framework design for achieving block propagation optimization, including four parts. Part A presents a block propagation protocol that shows how a new block propagates between miners in the miner network[22]. Part B introduces the AoB utilized to measure the block propagation efficiency in public blockchains. Part C focuses on the miner reputation mechanism, which utilizes the subjective logic model to calculate miner reputations for ensuring reliable block propagation[10]. Part D shows the GAT, which works directly on graph-structured data and possesses the excellent ability to capture the relationships between miners in the miner network[25]. The proposed framework aims to achieve efficient and reliable block propagation optimization, thereby enhancing the overall performance of Web 3.0 systems.

IV Problem Formulation for Efficient and Reliable Block Propagation

In this section, we first introduce the AoB to quantify block propagation efficiency in public blockchains. Then, we propose a miner reputation mechanism based on the subjective logic model. In this paper, we consider that there is a set ={1,,i,,j,,M}\mathcal{M}=\left\{1,\ldots,i,\ldots,j,\ldots,M\right\} of MM miners with the nature of random mobility in the miner network, and the block propagation process can be considered an M/M/1 system following a first-come-first-served policy.

IV-A Age of Block for Block Propagation

Since AoI as an effective data-freshness metric, has been widely utilized in remote system status, which is denoted as the elapsed time from the generation of the latest received status update[26]. In this paper, we utilize the AoB to quantify block propagation efficiency motivated by [26, 11], which is denoted as the time elapsed from a getdata message sent by a miner to its successful receipt of the new block, consisting of procedures of getdata message arrival time interval, block waiting time, and block propagation time[11]. We denote tit_{i} as the time that miner ii sends a getdata message and tit_{i}^{{}^{\prime}} as the time that miner ii successfully receives the block. Thus, the instantaneous AoB of block propagation between adjacent miners at any time tt is expressed as [26]

Δ(t)=ttI(t),\Delta(t)=t-t_{I(t)}, (1)

where I(t)=max{i|tit,i}I(t)=\max\{i|t_{i}^{{}^{\prime}}\leq t,i\in\mathcal{M}\} represents the index of the miner that recently received the block. Based on (1), the overall AoB over the time range (0,δ)(0,\delta) is given by

Δδ=0δΔ(t)dt,\Delta_{\delta}=\int_{0}^{\delta}\Delta(t)\mathrm{d}t, (2)

and the average AoB over the time range (0,δ)(0,{\delta}) is expressed as

Δ=1δ0δΔ(t)dt.{\Delta}=\frac{1}{\delta}\int_{0}^{\delta}\Delta(t)\mathrm{d}t. (3)

Now, we show the characterization of the average AoB of block propagation between adjacent miners in public blockchains. We define the ii-th time interval, denoted by XiX_{i}, as the time elapsed from miner (i1)(i-1) sending the getdata message to miner ii sending the getdata message, which is given by

Xi=titi1.X_{i}=t_{i}-t_{i-1}. (4)

We consider XiX_{i} as an exponentially distributed random variable[26], i.e., XiExp(μ)X_{i}\sim Exp(\mu), where 𝔼[Xi]=1/μ\mathbb{E}[X_{i}]=1/\mu and μ\mu represents the average getdata delivery ratio of miners. Then, we denote the system time of miner ii as DiD_{i}, equaling the elapsed time from miner ii sending a getdata message at time tit_{i} to successfully receive the block at tit_{i}^{{}^{\prime}}, which is given by

Di=titi,D_{i}=t_{i}^{{}^{\prime}}-t_{i}, (5)

where system time DiD_{i} consists of block waiting time WiW_{i} of miner ii and block propagation time PiP_{i} from miner (i1)(i-1) to miner ii. As shown in Fig. 2, QiQ_{i} signifies the geometric area of a trapezoidal configuration, arising from the difference between two isosceles right-angled triangles. Based on (4) and (5), QiQ_{i} can be expressed as[26]

Qi=0.5(Di+Xi)20.5Di2=XiDi+0.5Xi2.Q_{i}=0.5{(D_{i}+X_{i})}^{2}-0.5{D_{i}}^{2}=X_{i}D_{i}+0.5{X_{i}}^{2}. (6)

Therefore, the AoB of block propagation between miner (i1)(i-1) and miner ii in public blockchains is given by[26]

Δi=𝔼[Qi]𝔼[Xi]=𝔼[XiDi]+0.5𝔼[Xi2]𝔼[Xi].\Delta_{i}=\frac{\mathbb{E}[Q_{i}]}{\mathbb{E}[X_{i}]}=\frac{\mathbb{E}[X_{i}D_{i}]+0.5\mathbb{E}[X_{i}^{2}]}{\mathbb{E}[X_{i}]}. (7)

Considering the system time DiD_{i} of miner ii, we divide the system time DiD_{i} into block waiting time WiW_{i} and block propagation time PiP_{i}, which is denoted as

Di=Wi+Pi.D_{i}=W_{i}+P_{i}. (8)

Since PiP_{i} is independent of time interval XiX_{i}, we can obtain

𝔼[XiDi]=𝔼[Xi(Wi+Pi)],\mathbb{E}[X_{i}D_{i}]=\mathbb{E}[X_{i}(W_{i}+P_{i})], (9)
𝔼[DiXi]=𝔼[WiXi]+𝔼[Pi]𝔼[Xi].\mathbb{E}[D_{i}X_{i}]=\mathbb{E}[W_{i}X_{i}]+\mathbb{E}[P_{i}]\mathbb{E}[X_{i}]. (10)

According to [26], we can express the block waiting time of miner ii as Wi=(Di1Xi)+W_{i}=(D_{i-1}-X_{i})^{+}. Given specific interarrival time Xi=xX_{i}=x, the expected block waiting time is [26]

𝔼[Wi|Xi=x]=𝔼[(Dx)+]=x(tx)fD(t)dt,\mathbb{E}[W_{i}|X_{i}=x]=\mathbb{E}[(D-x)^{+}]=\int_{x}^{\infty}(t-x)f_{D}(t)\mathrm{d}t, (11)

where fD(t)f_{D}(t) is the Probability Density Function (PDF) of system time DD. It is shown that the exponential distribution is a reasonable model for block propagation time[27], i.e., PiExp(1/Γi)P_{i}\sim Exp(1/\Gamma_{i}), where Γi\Gamma_{i} is the block propagation time between miner (i1)(i-1) and miner ii, which is calculated using the Shannon formula as follows [10]:

Γi=Bblockblog2(1+ρsc0di1,iεN0b),\Gamma_{i}=\frac{B_{block}}{b\log_{2}\Big{(}1+\frac{\rho_{s}c^{0}d_{i-1,i}^{-\varepsilon}}{N_{0}b}\Big{)}}, (12)

where BblockB_{block}, bb, ρs\rho_{s}, di1,i{d_{i-1,i}}, c0c^{0}, ε\varepsilon, and N0N_{0} represent the block size, the channel bandwidth between adjacent miners, the transmit power of miners, the distance between miner (i1)(i-1) and miner ii, the unit channel power gain, the path-loss coefficient, and the noise power density, respectively. For the system time DiD_{i} of miner ii, fDi(t)f_{D_{i}}(t) is given by[26]

fDi(t)=(1Γiμ)e(μ1Γi)t,t0.f_{D_{i}}(t)=\bigg{(}\frac{1}{\Gamma_{i}}-\mu\bigg{)}e^{(\mu-\frac{1}{\Gamma_{i}})t},\>t\geq 0. (13)

Furthermore, using iterated expectation and the exponential (μ)(\mu) PDF of XiX_{i}[26], 𝔼[WiXi]\mathbb{E}[W_{i}X_{i}] can be denoted as

𝔼[WiXi]\displaystyle\mathbb{E}[W_{i}X_{i}] =0x𝔼[Wi|Xi=x]fXi(x)dx\displaystyle=\int_{0}^{\infty}x\mathbb{E}[W_{i}|X_{i}=x]f_{X_{i}}(x)\mathrm{d}x (14)
=μ(1Γi)3(1Γi)2μ.\displaystyle=\frac{\mu}{({\frac{1}{\Gamma_{i}}})^{3}-({\frac{1}{\Gamma_{i}}})^{2}\mu}.

Therefore, based on (7), the AoB between miner (i1)(i-1) and miner ii can be given by

Δi=Γi+1μ+μΓi31μΓi.\displaystyle\Delta_{i}={\Gamma_{i}}+\frac{1}{\mu}+\frac{\mu\Gamma_{i}^{3}}{1-\mu\Gamma_{i}}. (15)

(15) demonstrates that low overall AoB means the comprehensive reduction of the time of block propagation process, including the getdata message arrival time interval, the block waiting time, and the block propagation time, which indicates the enhanced block propagation efficiency. Furthermore, the PDF of a block to be mined can be given by[28]

f(t;μ)=μeμt.f(t;\mu)=\mu e^{-\mu t}. (16)

Based on (16), we can obtain the block fork probability, which is a function of block propagation time and the average getdata delivery ratio of miners, given by [28]

F(t)=P(XiΓ)=0Γf(t)dt=1eμΓ,F(t)=P(X_{i}\leq{\Gamma})=\int_{0}^{{\Gamma}}f(t)\mathrm{d}t=1-e^{-\mu{{\Gamma}}}, (17)

where Γ\Gamma is the overall block propagation time. Thus, combining (17) and (26), it can be inferred that a low overall AoB can reduce the block fork probability when μ\mu is a fixed value.

IV-B Reliable Block Propagation based on the Subjective Logic Model

The subjective logic model, which utilizes logic and recommended opinions to express subjective beliefs, is a comprehensive model of subjective beliefs evaluation. Moreover, the miner interactions in the blockchain can be considered as a form of group behavior, which can be calculated by direct and indirect opinions[10]. Therefore, for a better fusion of probabilistic information, we utilize the subjective logic model as an effective tool to quantify the reliability of miners in the blockchain network.

Based on the subjective logic model, the subjective logic divides miner reputations into three levels, i.e., trust, distrust, and uncertainty[29, 10]. For the miner jj, its compositive reputation opinions consist of the indirect reputation opinions of other adjacent miners and the direct reputation opinions of miner ii that directly interact with the miner jj. Especially, the direct reputation opinions of miner ii are considered to be local reputation opinions, and the indirect reputation opinions of other adjacent miners are considered to be recommended reputation opinions[29].

IV-B1 Local opinions for subjective logic

We divide the effective interaction period with multiple block consensuses into a series of time windows as {t1,,tk,,tK}\{t_{1},\ldots,t_{k},\ldots,t_{K}\}. In the subjective logic model, the local reputation opinions of miner ii to miner jj in the time slot tkt_{k} are represented as a tuple vector Φijtk:={Tijtk,Fijtk,Uijtk}\Phi_{i\to j}^{t_{k}}:=\{T_{i\to j}^{t_{k}},F_{i\to j}^{t_{k}},U_{i\to j}^{t_{k}}\}[10], where TijtkT_{i\to j}^{t_{k}}, FijtkF_{i\to j}^{t_{k}}, and UijtkU_{i\to j}^{t_{k}} represent trust, distrust, and uncertainty, respectively. Here TijtkT_{i\to j}^{t_{k}}, FijtkF_{i\to j}^{t_{k}}, and Uijtk[0,1]U_{i\to j}^{t_{k}}\in[0,1] and Tijtk+Fijtk+Uijtk=1T_{i\rightarrow j}^{t_{k}}+F_{i\rightarrow j}^{t_{k}}+U_{i\rightarrow j}^{t_{k}}=1. Without loss of generality, we consider that the positive interaction of miner ii with miner jj includes miner jj timely sending getdata messages to miner ii or being willing to forward the new block to its suitable adjacent miners, and the interactions between miner ii and miner jj result in the positive mapping of trust and the negative mapping of distrust. Therefore, we can obtain Φijtk\Phi_{i\to j}^{t_{k}} as

{Tijtk=(1Uijtk)αijtk(αijtk+βijtk),Fijtk=(1Uijtk)βijtk(αijtk+βijtk),Uijtk=1qijtk,\begin{cases}T_{i\to j}^{t_{k}}=\left(1-U_{i\to j}^{t_{k}}\right)\frac{\alpha_{i\to j}^{t_{k}}}{(\alpha_{i\to j}^{t_{k}}+\beta_{i\to j}^{t_{k}})},\\ F_{i\to j}^{t_{k}}=\left(1-U_{i\to j}^{t_{k}}\right)\frac{\beta_{i\to j}^{t_{k}}}{(\alpha_{i\to j}^{t_{k}}+\beta_{i\to j}^{t_{k}})},\\ U_{i\to j}^{t_{k}}=1-q_{i\to j}^{t_{k}},\end{cases} (18)

where αijtk\alpha_{i\to j}^{t_{k}}, βijtk\beta_{i\to j}^{t_{k}}, and qijtkq_{i\to j}^{t_{k}} denote the number of positive miner interactions, the number of negative miner interactions, and the probability of successful block transmission, in the time window tkt_{k}, respectively. Note that a large value of qijtkq_{i\to j}^{t_{k}} indicates the good quality of the communication link between miner ii and miner jj during block propagation. Therefore, the uncertainty of block propagation UijtkU_{i\to j}^{t_{k}} is associated with qijtkq_{i\to j}^{t_{k}}. Specifically, if there exist certain factors that prevent the block from propagating properly between adjacent miners during the block propagation process, the failure probability of block transmission will increase, leading to the higher UijtkU_{i\to j}^{t_{k}}. Based on the above analysis, the local reputation value of miner ii to miner jj in the time slot tkt_{k} is expressed as[29, 10]

Rijtk=Tijtk+ηUijtk,R_{i\to j}^{t_{k}}=T_{i\to j}^{t_{k}}+\eta U_{i\to j}^{t_{k}}, (19)

where η[0,1]\eta\in[0,1] represents the degree of uncertainty effect on miner reputations[29]. To improve the reliability of block propagation, we further explore the miner reputation during block propagation by considering two aspects, i.e., the impact of positive and negative interactions and the freshness of interactions between adjacent miners, which can more accurately quantify the reliability of miners[10].

  • Interaction effects: To curb the negative interactions between adjacent miners during block propagation, greater weight should be assigned to βijtk\beta_{i\to j}^{t_{k}}. We introduce ξ(1,)\xi\in(1,\infty) as the weight of negative interactions. A larger value of ξ\xi indicates that the influence of a negative interaction on the miner’s reputation is more significant compared to that of a positive interaction. Therefore, (18) are modified to

    {Tijtk=(1Uijtk)αijtk(αijtk+ξβijtk),Fijtk=(1Uijtk)ξβijtk(αijtk+ξβijtk),Uijtk=1qijtk.\begin{cases}T_{i\to j}^{t_{k}}=\left(1-U_{i\to j}^{t_{k}}\right)\frac{\alpha_{i\to j}^{t_{k}}}{(\alpha_{i\to j}^{t_{k}}+\xi\beta_{i\to j}^{t_{k}})},\\ F_{i\to j}^{t_{k}}=\left(1-U_{i\to j}^{t_{k}}\right)\frac{\xi\beta_{i\to j}^{t_{k}}}{(\alpha_{i\to j}^{t_{k}}+\xi\beta_{i\to j}^{t_{k}})},\\ U_{i\to j}^{t_{k}}=1-q_{i\to j}^{t_{k}}.\end{cases} (20)
  • Interaction freshness: Since recent interactions, characterized by high freshness, have a greater impact on the miner reputation compared to past interactions, to reflect the impact of interaction freshness on the miner reputation, we introduce an interaction freshness function as f(t)=λlntf(t)=\lambda\cdot\ln t, where λ(0,1)\lambda\in(0,1) represents a temporal enhancement factor reflecting the influence weight of interaction freshness and the local reputation opinion of miner ii to miner jj can be obtained as

    {Tijlocal=k=1Kf(tk)Tijtkk=1Kf(tk),Fijlocal=k=1Kf(tk)Fijtkk=1Kf(tk),Uijlocal=k=1Kf(tk)Uijtkk=1Kf(tk).\begin{cases}T_{i\to j}^{local}=\frac{\sum_{k=1}^{K}f(t_{k})T_{i\to j}^{t_{k}}}{\sum_{k=1}^{K}f(t_{k})},\\ F_{i\to j}^{local}=\frac{\sum_{k=1}^{K}f(t_{k})F_{i\to j}^{t_{k}}}{\sum_{k=1}^{K}f(t_{k})},\\ U_{i\to j}^{local}=\frac{\sum_{k=1}^{K}f(t_{k})U_{i\to j}^{t_{k}}}{\sum_{k=1}^{K}f(t_{k})}.\end{cases} (21)

    Therefore, the local reputation of miner ii to miner jj RijlocalR_{i\to j}^{local}, representing the expected belief of miner ii that miner jj is reliable and willing to forward the block to its suitable adjacent miners during the block propagation process, is given by[30]

    Rijlocal=Tijlocal+ηUijlocal.R_{i\to j}^{local}=T_{i\to j}^{local}+\eta U_{i\to j}^{local}. (22)

IV-B2 Recommended opinions for subjective logic

In the miner network, each miner has its own set of interacting peers. It is obvious that frequent interactions between adjacent miners can enhance the degree of their recommended opinions. The reason is that frequent interactions indicate a high level of mutual recognition and great pre-existing knowledge of each other between adjacent miners. We consider a set 𝒮={1,,s,,S}\mathcal{S}=\{1,\ldots,s,\ldots,S\}\subset\mathcal{M} of SS recommenders and apply an interaction frequency metric within miners and their recommenders[10].

Especially, considering that miners who engage in more positive interactions should obtain a larger proportion of recommendations, we introduce γrec(1,)\gamma^{rec}\in(1,\infty) as an enhancement factor reflecting the influence weight of positive interactions on recommendations. Moreover, for recommender ss and miner jj, the interaction frequency is defined as the ratio of the interactions between recommender ss and miner jj to the average value of interactions between recommender ss and miners, which is denoted as IFsj=Hsj/H¯sIF_{s\to j}=H_{s\to j}/\overline{H}_{s}, where Hsj=γrecαsj+βsjH_{s\to j}=\gamma^{rec}\alpha_{s\to j}+\beta_{s\to j} and H¯s=(1M)j=1MHsj\overline{H}_{s}=\left(\frac{1}{M}\right)\sum_{j=1}^{M}H_{s\to j} [30]. Furthermore, the weight of recommended opinions of recommender ss is defined as ωsj=δsjIFsj\omega_{s\to j}=\delta_{s\to j}\cdot IF_{s\to j}, where δsj\delta_{s\to j} is a pre-defined coefficient for the calculation of the recommended reputation. Therefore, the recommended reputation opinion of recommender ss to miner jj can be obtained as

{Tsjrec=s𝒮ωsjTsjlocals𝒮ωsj,Fsjrec=s𝒮ωsjFsjlocals𝒮ωsj,Usjrec=s𝒮ωsjUsjlocals𝒮ωsj.\begin{cases}T_{s\to j}^{rec}=\frac{\sum_{s\in\mathcal{S}}\omega_{s\to j}T_{s\to j}^{local}}{\sum_{s\in\mathcal{S}}\omega_{s\to j}},\\ F_{s\to j}^{rec}=\frac{\sum_{s\in\mathcal{S}}\omega_{s\to j}F_{s\to j}^{local}}{\sum_{s\in\mathcal{S}}\omega_{s\to j}},\\ U_{s\to j}^{rec}=\frac{\sum_{s\in\mathcal{S}}\omega_{s\to j}U_{s\to j}^{local}}{\sum_{s\in\mathcal{S}}\omega_{s\to j}}.\end{cases} (23)

IV-B3 Final reputation for subjective logic

For calculating final miner reputations, it is important to consider the weights of local reputation opinions reasonably and recommended reputation opinions, thereby ensuring the final reputation of miners is more accurate and trustworthy. Based on the above analysis, the final reputation opinion of miner ii to miner jj is composed of a tuple vector Φijfinal:={Tijfinal,Fijfinal,Uijfinal}\Phi_{i\to j}^{final}:=\{T_{i\to j}^{final},F_{i\to j}^{final},U_{i\to j}^{final}\}, which is given by

{Tijfinal=TijlocalUsjrec+TsjrecUijlocalUijlocal+UsjrecUsjrecUijlocal,Fijfinal=FijlocalUsjrec+FsjrecUijlocalUijlocal+UsjrecUsjrecUijlocal,Uijfinal=UsjrecUijlocalUijlocal+UsjrecUsjrecUijlocal.\begin{cases}T_{i\to j}^{final}=\frac{T_{i\to j}^{local}U_{s\to j}^{rec}+T_{s\to j}^{rec}U_{i\to j}^{local}}{U_{i\to j}^{local}+U_{s\to j}^{rec}-U_{s\to j}^{rec}U_{i\to j}^{local}},\\ F_{i\to j}^{final}=\frac{F_{i\to j}^{local}U_{s\to j}^{rec}+F_{s\to j}^{rec}U_{i\to j}^{local}}{U_{i\to j}^{local}+U_{s\to j}^{rec}-U_{s\to j}^{rec}U_{i\to j}^{local}},\\ U_{i\to j}^{final}=\frac{U_{s\to j}^{rec}U_{i\to j}^{local}}{U_{i\to j}^{local}+U_{s\to j}^{rec}-U_{s\to j}^{rec}U_{i\to j}^{local}}.&\end{cases} (24)

Based on (19), the final reputation value of miner ii to miner jj is expressed as

Rijfinal=Tijfinal+ηUijfinal.R_{i\to j}^{final}=T_{i\to j}^{final}+\eta U_{i\to j}^{final}. (25)

V Graph Attention Network-based Block Propagation Model

Refer to caption
Figure 2: The encoder and decoder architectures in the GAT-based block propagation optimization model.

V-A Problem Formulation

In this paper, we focus on achieving reliable block propagation optimization in public blockchains by obtaining the solution path of optimal block propagation 𝝅=(π1,,πm)\bm{\pi}=\left(\pi_{1},\ldots,\pi_{m}\right), where πt{1,,m}\pi_{t}\in\{1,\ldots,m\}\subseteq\mathcal{M} and πtπt,tt\pi_{t}\neq\pi_{t^{\prime}},\forall t\neq t^{\prime}. Note that 𝝅\bm{\pi} is the miner set of the optimal block propagation trajectory and π1\pi_{1} represents the miner that obtains the bookkeeping right of this block consensus.

Based on the consensus mechanism of public blockchains (i.e., Proof of Work), we define m=M×rratiom=\lfloor{M\times r^{ratio}}\rfloor as the number of miners that participate in block validation, where \lfloor\cdot\rfloor denotes the floor function and rratior^{ratio} represents the proportion of the overall number of miners. Therefore, the problem of block propagation optimization is to minimize the overall AoB of block propagation with the given reputation constraint, which can be formulated as

min𝝅i=2m(Δi=Γi+1μ+μΓi31μΓi)s.t.Rπlπl+1final>σ,l{1,,m1},\begin{split}&\min_{\bm{\pi}}\>\sum_{i=2}^{m}\Big{(}\Delta_{i}=\Gamma_{i}+\frac{1}{\mu}+\frac{\mu\Gamma_{i}^{3}}{1-\mu\Gamma_{i}}\Big{)}\\ &\>\>\mathrm{s.t.}\>R_{\pi_{l}\rightarrow\pi_{l+1}}^{final}>\sigma,l\in\{1,\ldots,m-1\},\end{split} (26)

where σ(0,1)\sigma\in(0,1) is a miner reputation threshold for ensuring block propagation. Considering Γi<(1/μ)\Gamma_{i}<(1/\mu)[26], it is easy to prove that the AoB Δi\Delta_{i} will increase as block propagation time Γi\Gamma_{i} increases. Moreover, it is obvious that Γi\Gamma_{i} is a monotonic function concerning the distance did_{i} between miner (i1)(i-1) and miner ii according to (12). Motivated by the above analysis, we propose a GAT-based block propagation optimization model to solve the optimization problem, described in Section V.

In this section, we propose a GAT-based block propagation optimization model for blockchain-enabled Web 3.0, which minimizes the average AoB of block propagation between adjacent miners with the specific reputation constraint, thereby obtaining the optimal block propagation trajectory.

In public blockchains, the miner network can be regarded as a graph network[3]. As a powerful tool that is specifically designed for processing graph-structured data[25], we apply the GAT to find the optimal block propagation trajectory, where GAT utilizes attention mechanisms to capture the relationships between miners, enhancing the extraction of relational representations among each miner. As shown in Fig. 2, the GAT architecture of the proposed framework consists of encoder and decoder components. More precisely, the encoder is used to extract the structural characteristics of the miner network, and the decoder systematically generates the miner sequence of the optimal block propagation trajectory.

For the problem of block propagation optimization, GG as an input instance can be considered as a fully connected graph G=(,)G=(\mathcal{M},\mathcal{E}), representing the public blockchain network composed of miners, where \mathcal{E} is the edge set of the miner network. Considering that miner jj is an adjacent miner of miner ii, we define 𝒇i\bm{f}_{i} and 𝒇j\bm{f}_{j} as the location features of miner ii and miner jj, respectively. Specifically, the location feature 𝒇i\bm{f}_{i} of miner ii is a dfd_{f}-dimensional feature, where df=2d_{f}=2 is composed of horizontal and vertical coordinates of miner ii in the input instance GG. Thus, the distance between adjacent miners can be calculated by[14]

Dis(i,j)=𝒇i𝒇j2,ij,i,j,Dis(i,j)=\left||\bm{f}_{i}-\bm{f}_{j}|\right|_{2},\>i\neq j,\>\forall i,j\in\mathcal{M}, (27)

where ||||2\left||\cdot|\right|_{2} denotes the L2L2 norm to calculate the 2D2D Euclidean distance. For network parameters 𝜽\bm{\theta} and the input instance GG, the corresponding solution probability p𝜽(𝝅|G)p_{\bm{\theta}}\left(\bm{\pi}|G\right) is given by

p𝜽(𝝅|G)=t=1mp𝜽(πt|G,𝝅1:t1).p_{\bm{\theta}}\left({\bm{\pi}}|G\right)=\prod_{t=1}^{m}{p_{\bm{\theta}}\left({\pi}_{t}|G,{{\bm{\pi}}_{1:t-1}}\right)}. (28)

Therefore, the overall route length of block propagation is given by[25]

L(𝝅|G)=t=1m1𝒇πt𝒇πt+12.L(\bm{\pi}|G)=\sum_{t=1}^{m-1}\left|\left|\bm{f}_{\pi_{t}}-\bm{f}_{\pi_{t+1}}\right|\right|_{2}. (29)

The function L(𝝅|G)L(\bm{\pi}|G) will be utilized to train the network in Section VI. Next, we introduce the encoder-decoder architecture constructed for the GAT-based block propagation optimization model.

V-B Encoder

Unlike the typical transformer architecture[31], we embed miner features into the context of the graph in the encoder[25]. The miner features are fed into a dhd_{h}- dimensional hidden layer, where dh=128d_{h}=128. In the hidden layer, performing a learnable linear projection using parameters 𝑾h\bm{W}^{h} and 𝒃h\bm{b}^{h}, the initial dhd_{h}-dimensional miner embeddings 𝒉i(0)\bm{h}_{i}^{(0)} is calculated by[25]

𝒉i(0)=𝑾h𝒇i+𝒃h.\bm{h}_{i}^{(0)}=\bm{W}^{h}{\bm{f}_{i}}+\bm{b}^{h}. (30)

where 𝑾hdh×dx\bm{W}^{h}\in\mathbb{R}^{d_{h}\times d_{x}} and 𝒃hdh\bm{b}^{h}\in\mathbb{R}^{d_{h}}. After obtaining the embedding 𝒉i(0)\bm{h}_{i}^{(0)}, it is sent to the graph attention layer and updated with NN GAT layers. We denote 𝒉i(r)\bm{h}_{i}^{(r)} as the miner embeddings calculated by GAT layer r{1,,N}r\in\{1,\ldots,N\}. Specifically, 𝒉¯(graph)\bar{\bm{{h}}}^{(graph)} is denoted as the graph embedding, which is the aggregated embedding of the input graph as the average of final miner embeddings, given by[25]

𝒉¯(graph)=1Mi=1M𝒉i(N).\bar{\bm{h}}^{(graph)}=\frac{1}{M}\sum_{i=1}^{M}\bm{h}_{i}^{(N)}. (31)

Finally, the encoder outputs the final miner embeddings 𝒉i(N)\bm{h}_{i}^{(N)}, as well as the graph embedding 𝒉¯(graph)\bar{\bm{h}}^{(graph)} to the decoder.

Then, we introduce the major architecture of the proposed graph attention layer in detail.

V-B1 Multi-Head Attention (MHA) layer

The MHA layer is beneficial to learning information from different aspects than only a single-head attention mechanism[32]. Inspired by [31, 33, 34], we utilize the MHA layer to model the relevance between miners on the graph. In the MHA layer, the value111 In attention mechanisms, a query represents the focused content, a key serves as a reference, and a value corresponds to the actual information associated with the key[31]. of a miner is the compatibility of the query and the key from its neighbors[31]. We denote the number of attention heads as y{1,,Y}y\in\{1,\ldots,Y\} and consider a sequence of query 𝑸={𝒒1(r),,𝒒i(r),,𝒒M(r)}\bm{Q}=\{\bm{q}_{1}^{(r)},\ldots,\bm{q}_{i}^{(r)},\ldots,\bm{q}_{M}^{(r)}\}, key 𝑲={𝒌1(r),,𝒌i(r),,𝒌M(r)}\bm{K}=\{\bm{k}_{1}^{(r)},\ldots,\bm{k}_{i}^{(r)},\ldots,\bm{k}_{M}^{(r)}\}, and value 𝑽={𝒗1(r),,𝒗i(r),,𝒗M(r)}\bm{V}=\{\bm{v}_{1}^{(r)},\ldots,\bm{v}_{i}^{(r)},\ldots,\bm{v}_{M}^{(r)}\}[35]. For miner ii, 𝒒i(r)\bm{q}_{i}^{(r)}, 𝒌i(r)\bm{k}_{i}^{(r)}, and 𝒗i(r)\bm{v}_{i}^{(r)} are calculated by projecting the embedding 𝒉i(r1)\bm{h}_{i}^{(r-1)}, which are given by

𝒒i(r)=𝑾Q𝒉i(r1),\bm{q}_{i}^{(r)}=\bm{W}^{Q}\bm{h}_{i}^{(r-1)}, (32)
𝒌i(r)=𝑾K𝒉i(r1),\bm{k}_{i}^{(r)}=\bm{W}^{K}\bm{h}_{i}^{(r-1)}, (33)
𝒗i(r)=𝑾V𝒉i(r1),\bm{v}_{i}^{(r)}=\bm{W}^{V}\bm{h}_{i}^{(r-1)}, (34)

where each attention head yy obtains parameters 𝑾Qdk×dh\bm{W}^{Q}\in\mathbb{R}^{d_{k}\times d_{h}}, 𝑾Kdk×dh\bm{W}^{K}\in\mathbb{R}^{d_{k}\times d_{h}}, and 𝑾Vdv×dh\bm{W}^{V}\in\mathbb{R}^{d_{v}\times d_{h}}.

Based on (32), (33), and (34), we compute the compatibility 𝒖ij(r)\bm{u}_{ij}^{(r)}\in\mathbb{R} by combining the query 𝒒i(r)\bm{q}_{i}^{(r)} with the key 𝒌j(r)\bm{k}_{j}^{(r)} of miner jj as the dot-product function[31]

𝒖ij(r)={(𝒒i(r))T𝒌j(r)dkif miner i is adjacent to miner j,otherwise,\bm{u}_{ij}^{(r)}=\begin{cases}\frac{\left(\bm{q}_{i}^{(r)}\right)^{T}\bm{k}_{j}^{(r)}}{\sqrt{d_{k}}}&\text{if miner $i$ is adjacent to miner $j$,}\\ -\infty&\text{otherwise,}\end{cases} (35)

where the compatibility of non-adjacent miners is considered as -\infty, which is effective in preventing block propagation between non-adjacent miners. Then, based on the compatibilities 𝒖ij(r)\bm{u}_{ij}^{(r)}, the attention weight 𝒂ij(r)[0,1]\bm{a}_{ij}^{(r)}\in[0,1] is given by[25]

𝒂ij(r)=softmax(𝒖ij(r))=e𝒖ij(r)j=1Je𝒖ij(r),\bm{a}_{ij}^{(r)}=softmax\left(\bm{u}_{ij}^{(r)}\right)=\frac{e^{\bm{u}_{ij}^{(r)}}}{\sum_{j=1}^{J}e^{\bm{u}_{ij}^{(r)}}}, (36)

where {1,,j,,J}\{1,\ldots,j,\ldots,J\}\subset\mathcal{M} is the adjacent miner set of miner ii. Then, based on (34) and (36), the result vector 𝒉i(r)\bm{h}_{i}^{\prime}(r), combining 𝒂ij(r)\bm{a}_{ij}^{(r)} with 𝒗j(r)\bm{v}_{j}^{(r)}, is expressed as[25]

𝒉i=(r)j=1J𝒂ij(r)𝒗j(r),\bm{h}_{i}^{\prime}{}^{(r)}=\sum_{j=1}^{J}\bm{a}_{ij}^{(r)}\bm{v}_{j}^{(r)}, (37)

Finally, in the MHA layer, miners are allowed to receive different types of information from their neighbors to transform the parameters 𝑸\bm{Q}, 𝑲\bm{K}, and 𝑽\bm{V} into different and learnable projections[14]. Specifically, we use Y=8Y=8 heads and dk=dv=dh/Y=16d_{k}=d_{v}=d_{h}/Y=16. Besides, we define 𝑾yO(r)dh×dv\bm{W}_{y}^{O^{(r)}}\in\mathbb{R}^{d_{h}\times d_{v}}, and the final value of the MHA layer for miner ii in the graph attention layer rr is projected to a single dhd_{h}-dimensional vector, given by

MHAi(r)(𝒉1(r),,𝒉M(r))=y=1Y𝑾yO(r)𝒉iy.(r)\\ {MHA}_{i}^{(r)}\left(\bm{h}_{1}^{(r)},\ldots,\bm{h}_{M}^{(r)}\right)=\sum_{y=1}^{Y}\bm{W}_{y}^{O^{(r)}}\bm{h}_{iy}^{\prime}{}^{(r)}. (38)

V-B2 Batch Normalization (BN) layer

In the BN layer, we introduce learnable parameters 𝒘batch\bm{w}^{batch} and 𝒃batch\bm{b}^{batch} as the dhd_{h}-dimensional affine parameters, and BN¯(r)(𝒉i(r))\overline{BN}^{(r)}(\bm{h}_{i}^{(r)}) is denoted as batch normalization without affine transformation. Besides, we use \odot to represent the element-wise product. Therefore, BN(r)(𝒉i(r))BN^{(r)}(\bm{h}_{i}^{(r)}) is expressed as[25]

BN(r)(𝒉i(r))=𝒘batchBN¯(r)(𝒉i(r))+𝒃batch.BN^{(r)}(\bm{h}_{i}^{(r)})=\bm{w}^{batch}\odot\overline{BN}^{(r)}\left(\bm{h}_{i}^{(r)}\right)+\bm{b}^{batch}. (39)

V-B3 Feed-Forward (FF) layer

In the FF layer, we use a dFd_{F}-dimensional hidden sublayer, where dF=512d_{F}=512, with the parameters 𝑾f2\bm{W}^{f2} and 𝒃f2\bm{b}^{f2} and a ReLuReLu activation with the parameters 𝑾f1\bm{W}^{f1} and 𝒃f1\bm{b}^{f1} to construct the FF layer:

FF(r)(𝒉^i(r))=𝑾f2ReLu(𝑾f1𝒉^i(r)+𝒃f1)+𝒃f2,FF^{(r)}\left(\hat{\bm{h}}_{i}^{(r)}\right)=\bm{W}^{f2}\cdot ReLu\left(\bm{W}^{f1}\hat{\bm{{h}}}_{i}^{(r)}+\bm{b}^{f1}\right)+\bm{b}^{f2}, (40)

where the input of the FF layer 𝒉^i(r)\hat{\bm{h}}_{i}^{(r)} is the output of the BN layer after the MHA layer, as calculated in (41).

V-B4 Graph attention network layer

Based on the proposed three key layers, i.e., the MHA layer, the BN layer, and the FF layer, the GAT layer is given by[32]

𝒉^i(r)\displaystyle\bm{\hat{h}}_{i}^{(r)} =BN(r)(𝒉i(r1)+MHAi(r)(𝒉1(r1),,𝒉M(r1))),\displaystyle=BN^{(r)}\left(\bm{h}_{i}^{(r-1)}+MHA_{i}^{(r)}\left(\bm{h}_{1}^{(r-1)},\ldots,\bm{h}_{M}^{(r-1)}\right)\right), (41)
𝒉i(r)\displaystyle\bm{h}_{i}^{(r)} =BN(r)(𝒉^i(r)+FF(r)(𝒉^i(r))),\displaystyle=BN^{(r)}\left(\bm{\hat{h}}_{i}^{(r)}+FF^{(r)}\left(\bm{\hat{h}}_{i}^{(r)}\right)\right), (42)

where the layers are connected by a skip-connection[25]. Then, the result of (42) in layer NN will be input to (31) to generate the aggregated 𝒉¯(graph)\bar{\bm{h}}^{(graph)}.

V-C Decoder

The decoding step for block propagation is sequential. For each decoder step t{1,,m}t\in\{1,\ldots,m\}, the current miner that would propagate the block selects its adjacent miner to append to the end of the sequential solution. We construct a special context vector 𝒉(d)\bm{h}^{(d)} to represent the decoding context[25], which is composed of the outputs of the encoder and decoder up to time tt. According to [31], 𝒉(d)\bm{h}^{(d)} is given by

𝒉(d)={[𝒉¯(graph),𝒗1,𝒗2]ift=1,[𝒉¯(graph),𝒗2,𝒉π1(N)]ift=2,[𝒉¯(graph),𝒉πt2(N),𝒉πt1(N)]ift>2.\bm{h}^{(d)}=\begin{cases}\left[\bar{\bm{h}}^{(graph)},\bm{v}^{1},\bm{v}^{2}\right]&\quad\text{if}\quad{t}=1,\\ \left[\bar{\bm{h}}^{(graph)},\bm{v}^{2},\bm{h}_{{\pi}_{1}}^{(N)}\right]&\quad\text{if}\quad{t}=2,\\ \left[\bar{\bm{h}}^{(graph)},\bm{h}_{{\pi}_{t-2}}^{(N)},\bm{h}_{{\pi}_{t-1}}^{(N)}\right]&\quad\text{if}\quad{t}>2.\end{cases} (43)

Here, [,,,][\cdot,\cdot,\cdot,] is the horizontal concatenation operator. For each time tt, we utilize the graph embedding 𝒉¯(graph)\bar{\bm{h}}^{(graph)} as a part of the context vector 𝒉(d)\bm{h}^{(d)}, for the reason that the graph embedding is designed for taking the complete graph structure into account. For t=1t=1, we introduce learnable dhd_{h}-dimensional parameters 𝒗1\bm{v}^{1} and 𝒗2\bm{v}^{2} as input placeholders. For t=2t=2, the placeholder 𝒗1\bm{v}_{1} would be replaced by the embedding 𝒉π1(N)\bm{h}_{\pi_{1}}^{(N)}. For t>2t>2, the placeholder 𝒗2\bm{v}_{2} and the embedding 𝒉π1(N)\bm{h}_{\pi_{1}}^{(N)} would be replaced by the embeddings 𝒉πt1(N)\bm{h}_{\pi_{t-1}}^{(N)} and 𝒉πt2(N)\bm{h}_{\pi_{t-2}}^{(N)} of miners πt1\pi_{t-1} and πt2\pi_{t-2}, to achieve the local optimum of AoB, and eventually achieve the optimization objective of minimizing overall AoB. Note that the result vector 𝒉(d)\bm{h}^{(d)} is (3dh)(3\cdot d_{h})-dimension to align with the miner embeddings 𝒉πt(N)\bm{h}_{\pi_{t}}^{(N)}.

Input: Basic physical parameters {Bblock,ρs,c0,ε,W,N0}\small\{B_{block},\rho_{s},c^{0},\varepsilon,W,N_{0}\small\}, batch size BB, number of epochs EE, steps per epoch TT, significance of the paired t-test αgat\alpha^{gat}, miner reputation threshold σ\sigma, number of miners MM.
1 for i=1,,M{i}=1,\ldots,M do
2       Record the miner interactions αtk\alpha^{t_{k}} and βtk\beta^{t_{k}}.
3      Calculate the miner reputation RijfinalR_{i\to j}^{final}.
4
5Initialize 𝜽\bm{\theta}, 𝜽BL\bm{\theta}^{BL} \leftarrow 𝜽\bm{\theta}.
6for epoch=1,,Eepoch=1,\ldots,E do
7       for step=1,,Tstep=1,\ldots,T do
8             xix_{i}\leftarrow RandomInstance( )[25], i{1,,B}\forall{i}\in\{1,\ldots,B\}.
9            for i=1,,M{i}=1,\ldots,M do
10                   if RijfinalR_{i\to j}^{final} ¡ σ\sigma then
11                         Mask miner ii to avoid the low-reputation miners.
12                  
13            
14            𝝅i\bm{\pi}_{i}\leftarrow SampleRollout(Gi,𝒑𝜽G_{i},\bm{p}_{\bm{\theta}})[25], i{1,,B}\forall{i}\in\{1,\ldots,B\}.
15            𝝅iBL\bm{\pi}_{i}^{BL}\leftarrow GreedyRollout(Gi,p𝜽BLG_{i},p_{\bm{\theta}}^{BL})[25], i{1,,B}\forall{i}\in\{1,\ldots,B\}.
16            i=1B(L(𝝅𝒊|𝑮))L(𝝅𝒊𝐁𝐋|𝑮)))𝜽logp𝜽(𝝅𝒊)\nabla\mathcal{L}\leftarrow\sum_{i=1}^{B}\left(L(\bm{\pi_{i}|G)})-L(\bm{\pi_{i}^{\mathrm{BL}}|G)})\right)\nabla_{\bm{\theta}}\log p_{\bm{\theta}}(\bm{\pi_{i}}).
17            𝜽\bm{\theta}\leftarrow Adam(𝜽,\bm{\theta},\nabla\mathcal{L}).
18      
19      if OneSidedPairedTTest(p𝛉,p𝛉BLp_{\bm{\theta}},p_{\bm{\theta}}^{BL}) ¡ αgat\alpha^{gat}[25] then
20             𝜽BL𝜽\bm{\theta}^{BL}\leftarrow\bm{\theta}.
21      
22
23Feed the miners with their reputations into the trained network.
24Calculate the minimized overall AoB and the total value of miner reputations.
Output: The optimal block propagation trajectory, the minimized overall AoB, and the total value of miner reputations.
Algorithm 1 Reinforcement Learning-based Graph Attention Network for Block Propagation Optimization

In the decoder, we compute compatibility using an MHA layer similar to the encoder. Firstly, the aggregated query 𝒒(d)\bm{q}^{(d)} is calculated by the context embedding 𝒉(d)\bm{h}^{(d)} while the keys 𝒌i\bm{k}_{i} and the values 𝒗i\bm{v}_{i} are calculated by the miner embeddings 𝒉i(N)\bm{h}_{i}^{(N)}[25]:

𝒒(d)\displaystyle\bm{q}^{(d)} =𝑾Q𝒉(d),\displaystyle=\bm{W}^{Q}\bm{h}^{(d)}, (44)
𝒌i\displaystyle\bm{k}_{i} =𝑾K𝒉i(N),\displaystyle=\bm{W}^{K}\bm{h}_{i}^{(N)}, (45)
𝒗i\displaystyle\bm{v}_{i} =𝑾V𝒉i(N).\displaystyle=\bm{W}^{V}\bm{h}_{i}^{(N)}. (46)

Based on (44), we can use the single query 𝒒(d)\bm{q}^{(d)} to compute its compatibility with all miners. If miners have already received the block at time tt, we will set the compatibility to -\infty, masking miners that have already received blocks to avoid selecting them repeatedly. Therefore, the uj(d)u_{j}^{(d)} is given by[25]

uj(d)={𝒒(d)T𝒌jdkifjπt,t<t,otherwise,u_{j}^{(d)}=\begin{cases}\frac{\bm{q}^{(d)T}\bm{k}_{j}}{\sqrt{d_{k}}}&\quad\text{if}\quad j\neq\pi_{t^{\prime}},\forall t^{\prime}<t,\\ -\infty&\quad\text{otherwise},\end{cases} (47)

where 𝒒(d)T{\bm{q}^{(d)T}} denotes the transpose of 𝒒(d){\bm{q}^{(d)}}. Then, we update the final context embedding 𝒉(d)\bm{h}^{(d)} and miner embeddings 𝒉i(N)\bm{h}_{i}^{(N)} based on (36), (37), and (38). By using a single-head attention layer, which means that we set Y=1Y=1, the compatibilities uj(d)u_{j}^{(d)} is calculated by[25]

uj(d)={Ctanh(𝐪(d)T𝐤jdk)ifjπt,t<t,otherwise,u_{j}^{(d)}=\begin{cases}C\cdot\tanh\Big{(}\frac{\mathbf{q}^{(d)T}\mathbf{k}_{j}}{\sqrt{d_{k}}}\Big{)}&\text{if}\quad j\neq\pi_{t^{\prime}},\forall t^{\prime}<t,\\ -\infty&\text{otherwise,}\end{cases} (48)

where we clip the function tanh()\tanh(\cdot) within [C,C][-C,C] and C=10C=10[25]. In the last step, by using the softmax, the probability of miner ii chosen to propagate the block is given by[25]

pi=p𝜽(πt=i|G,𝝅1:t1)=euj(d)Σj=1Jeuj(d).p_{i}=p_{\bm{\theta}}(\pi_{t}=i|G,\bm{\pi}_{1:t-1})=\frac{e^{u_{j}^{(d)}}}{\Sigma_{j=1}^{J}e^{u_{j}^{(d)}}}. (49)

Finally, we can obtain the solution path of the optimal block propagation trajectory based on (28).

Refer to caption
(a) Channel bandwidth b=180kHzb=180kHz.
Refer to caption
(b) Channel bandwidth b=22MHzb=22MHz.
Refer to caption
(c) Channel bandwidth b=100MHzb=100MHz.
Figure 3: The overall AoB of block propagation corresponding to different numbers of miners in different channel bandwidths.

VI Model Training

In this section, we first propose an algorithm to solve the block propagation optimization problem, as shown in Algorithm 1. In the beginning, we record the miner transaction in a period tkt_{k} to calculate the miner reputation RijfinalR_{i\to j}^{final}, and then we train the GAT model. Based on (29), the loss of the model is the expectation of the cost L(𝝅|G)L(\bm{\pi}|G)[25], given by

(𝜽|G)=𝔼p𝜽(𝝅|G)[L(𝝅|G)].\mathcal{L}(\bm{\theta}|G)=\mathbb{E}_{p_{\bm{\theta}}(\bm{\pi}|G)}[L(\bm{\pi}|G)]. (50)

We optimize (𝜽|G)\mathcal{L}(\bm{\theta}|G) based on the gradient descent, employing a gradient estimator with baseline b(G)b(G), which is given by[25]

(𝜽|G)=𝔼p𝜽(𝝅|G)[(L(𝝅|G)b(G))logp𝜽(𝝅|G)],\nabla\mathcal{L}(\bm{\theta}|G)=\mathbb{E}_{p_{\bm{\theta}}(\bm{\pi}|G)}\left[\left(L(\bm{\pi}|G)-b(G)\right)\nabla\log p_{\bm{\theta}}(\bm{\pi}|G)\right], (51)

where b(G)b(G) denotes the baseline utilized in the network for effective training. Fundamentally, a baseline serves the purpose of estimating the complexity of a given instance GG, allowing for a correlation with the cost L(𝝅|G)L(\bm{\pi}|G) to evaluate the advantage of the model-selected solution 𝝅\bm{\pi}. Therefore, we incorporate the rollout baseline into our training process.

Refer to caption
Figure 4: The total value of miner reputations corresponding to different numbers of miners.
TABLE II: Key Parameters in the Simulation.
Parameters Values
Size of block (Bblock)(B_{block}) 11MB\rm{MB}
Transmit power of the IoT devices (ρs)(\rho_{s}) 2323dBm\rm{dBm}
Noise power density (N0)(N_{0}) 174-174dBm/Hz\rm{dBm/Hz}
Path-loss coefficient (ε)(\varepsilon) 3.383.38
Channel bandwidth between adjacent miners (b)(b) 180180kHz\rm{kHz}, 2222MHz\rm{MHz}, and 100100MHz\rm{MHz}
Unit channel gain (c0)(c^{0}) 30-30dB\rm{dB}

In line with the self-critical training introduced by [36], our approach involves periodic updates of the network parameters 𝜽BL\bm{\theta}^{BL}, which are specifically for the baseline policy. In detail, we conduct a paired t-test with a significance level of αgat=5%\alpha^{gat}=5\% to compare the baseline policy with the newest training policy upon completion of each epoch on the separated testing instances. If the improvement is statistically significant, the baseline parameters 𝜽BL\bm{\theta}^{BL} will be updated by the network parameters 𝜽\bm{\theta}[25]. Conducting evaluations upon completion of each epoch ensures that the current model consistently faces challenges from the best possible model available. Moreover, to eliminate variance, we enforce determinism by greedily selecting actions based on their maximum probabilities. Moreover, by utilizing the greedy rollout as our baseline b(G)b(G), the function L(𝝅|G)b(G)L(\bm{\pi}|G)-b(G) yields a negative value when the sampled solution 𝝅\bm{\pi} surpasses the performance of the greedy rollout based on the paired t-test, thereby resulting in the reinforce of actions, and vice versa[25].

Refer to caption
(a) The block propagation trajectory in 9 miners, which obtains Δ=21.61\Delta=21.61 and total value of miner reputation Rtotal=4.40R_{total}=4.40.
Refer to caption
(b) The block propagation trajectory in 19 miners, which obtains Δ=47.87\Delta=47.87 and total value of miner reputation Rtotal=10.70R_{total}=10.70.
Refer to caption
(c) The block propagation trajectory in 29 miners, which obtains Δ=70.69\Delta=70.69 and total value of miner reputation Rtotal=15.53R_{total}=15.53.
Refer to caption
(d) The block propagation trajectory in 39 miners, which obtains Δ=96.84\Delta=96.84 and total value of miner reputation Rtotal=19.03R_{total}=19.03.
Refer to caption
(e) The block propagation trajectory in 49 miners, which obtains Δ=119.69\Delta=119.69 and total value of miner reputation Rtotal=23.04R_{total}=23.04.
Figure 5: The block propagation trajectories corresponding to different numbers of miners.

Furthermore, concerning the algorithm itself, each rollout incurs an additional forward pass, resulting in a 50%50\% increase in computational requirements[25]. However, given that the baseline policy remains constant throughout an entire epoch, we can streamline the process of sampling data and computing baselines by employing larger batch sizes. This efficiency is possible due to reduced memory requirements, allowing computations to operate in pure inference mode [25]. Note that the computational complexity of Algorithm 1 is O(M)O(M)[37], indicating that Algorithm 1 is efficient. Finally, after training the network, the miners, along with their reputations, are input into the trained network. The network minimizes the overall AoB of block propagation and calculates the total reputation of miners, generating the optimal block propagation trajectory for a specific number of miners as the final output.

VII Numerical Results

In this section, we first compare the proposed GAT model with other conventional routing mechanisms: i) Greedy mechanism. In the simulation settings, the greedy mechanism always calculates the distance between miners and consistently selects the nearest adjacent miner to propagate the block; ii) Gossip mechanism. In the simulation settings, the gossip mechanism only takes into account adjacent miners, and the miner randomly propagates the block to their adjacent miner. At the same time, we separately add the reputation constraints to the three proposed mechanisms. Then, we present the optimal block propagation trajectories under different miner numbers in the proposed GAT model. Finally, we evaluate the impact of baselines and learning rate settings on the performance of the proposed GAT model.

For the parameter settings of the experiment, the parameters 𝜽\bm{\theta} of the GAT network are initialized uniformly within the range (1/df,1/df)\big{(}-1/\sqrt{d_{f}},1/\sqrt{d_{f}}\big{)}, where df=2d_{f}=2 represents the input dimension of miners. Moreover, we use N=3N=3 layers in the encoder, which is a thoughtful balance between the quality of results and computational complexity. We set rratio=3/4r^{ratio}=3/4 to ensure that the block propagates to miners over 50%50\% for validation. Additionally, the training spans 100100 epochs using dynamically generated training data, processing 25002500 batches of 512512 instances per epoch. Note that we run the experiments on NVIDIA GeForce RTX 3080Ti, and the main parameters of this paper are listed in Table II[38, 39, 40, 11, 41].

Refer to caption
(a) Miner numbers M=19M=19.
Refer to caption
(b) Miner numbers M=49M=49.
Figure 6: The network loss corresponding to the training epochs utilizing four learning rate schemes at M=19M=19 and M=49M=49.
Refer to caption
Figure 7: The network loss as a function corresponding to the training epochs utilizing different baselines.

Fig. 3 shows the overall AoB of block propagation corresponding to different numbers of miners in different channel bandwidths utilizing different routing mechanisms. For convenience, we denote ”GAT with Reputation Mechanism” to represent the GAT model with the reputation mechanism, which is the same as the ”Greedy with Reputation Mechanism” and ”Gossip with Reputation Mechanism”. Considering different communication techniques, we conduct simulations with bandwidths of b=180b=180kHz\rm{kHz}[38], b=22b=22MHz\rm{MHz}[39], and b=100b=100MHz\rm{MHz}[40], corresponding to typical channels, WiFi, and 5G, respectively. From Fig. 3, we can observe that, as the channel bandwidth increases, the AoB decreases significantly, highlighting the necessity of improving channel bandwidth. Moreover, we can observe that both the proposed GAT model and the GAT model with the reputation mechanism consistently outperform the other four mechanisms. When M=49M=49, the advantage is particularly pronounced, where the AoB of the GAT model is 2.5%2.5\% lower than that of the Greedy mechanism and 24.4%24.4\% lower than that of the Gossip mechanism, while the AoB of the GAT model with the reputation mechanism is 2.4%2.4\% lower than the Greedy mechanism with the reputation mechanism and 22.6%22.6\% lower than that of the Gossip mechanism with the reputation mechanism. The reason is that the GAT model focuses on minimizing the overall AoB of block propagation by considering the global structure of the miner network, which can obtain the optimal block propagation trajectory, thereby achieving block propagation optimization. In contrast, the Greedy mechanism only focuses on the selection of the current step and ignores the global structure, while the Gossip mechanism randomly selects miners without optimizing AoB, resulting in a much lower effect than other mechanisms.

Fig. 4 depicts the total value of miner reputations corresponding to different numbers of miners under different routing mechanisms, displaying a monotonic rise with an increase in the number of miners. As we can see, the algorithms with the miner reputation mechanism can obtain the propagation trajectory with a high total of value miner reputations, thus effectively ensuring reliability in block propagation. Moreover, the GAT model with the reputation mechanism performs best among other mechanisms and the reputation gap becomes more obvious with a larger number of miners. For example, comparing the Greedy mechanism with the GAT model with the reputation mechanism, the reputation of the GAT model with the reputation mechanism is 7.4%7.4\% higher than that of the Greedy mechanism at M=9M=9, which outstandingly increases to 34.77%34.77\% at M=49M=49. Combining Fig. 3 and Fig. 4, we can conclude that algorithms with the reputation mechanism inevitably improve the reliability of block propagation at the cost of increasing AoB [10]. However, the improvement in the reliability of block propagation with a relatively small increase in AoB is reasonable. Overall, the GAT model with the reputation mechanism stands out as the most exceptional performer among other mechanisms.

In Fig. 5, we present the optimal block propagation trajectory corresponding to different miner numbers M={9,19,29,39,49}M=\{9,19,29,39,49\}. For better distinction, we draw yellow points to denote the low-reputation miners and green points to denote the high-reputation miners, where the reputation values are calculated by the proposed reputation mechanism[30]. Moreover, the blue arrows point to the optimal block propagation trajectories generated by the proposed GAT model. We can observe that the proposed GAT model can obtain optimal block propagation trajectories based on different numbers of miners, which are clearly organized and have no unreasonable costs in AoB for efficiency. At the same time, the block propagation trajectories can perfectly prevent the blocks from propagating to the low-reputation miners, which ensures the reliability of block propagation.

Fig. 6 depicts the network loss corresponding to training epochs with four learning rate schemes for miner numbers M=19M=19 and M=49M=49. As shown in Fig. 6(a), the GAT model with the learning rate lr=103lr=10^{-3} outperforms the GAT model with the learning rate lr=104lr=10^{-4}, with marginal improvement from learning rate decay[25]. However, in Fig. 6(b), the loss of the GAT model with the learning rate lr=103lr=10^{-3} converges slowly and fails to fully converge after 100100 epochs with a larger loss. Conversely, employing a learning rate of lr=103lr=10^{-3} with a decay of 0.96epoch0.96^{\text{epoch}} yields better model performance, and further improvement may be achievable with prolonged training. Furthermore, motivated by the above analysis, we conclude that employing a higher learning rate of lr=103lr=10^{-3} accelerates the initial learning but necessitates decay for convergence[25], especially in the case of a larger number of miners. Moreover, a smaller learning rate of lr=104lr=10^{-4} shows increased stability without the need for decay, albeit with a limited impact on loss reduction.

In Fig. 7, we compare the proposed rollout baseline with two other baseline schemes, i.e., the exponential baseline and the critic baseline222The encoder in critic network is similar to the GAT model, but has differences in the decoder, which has a Multilayer Perceptron characterized by a single hidden layer[36].. Specifically, the exponential baseline has an exponential factor of 0.80.8. The experiments for baseline comparison are conducted under the miner number M=19M=19 and the learning rate lr=103lr=10^{-3}. To demonstrate generalization across different graph data, we employ two seeds. As shown in Fig. 7, the solid line corresponds to seed=1234\text{seed}=1234, and the dash-dot line corresponds to seed=1000\text{seed}=1000. We can see that all three baselines converge effectively, and the rollout baseline exhibits the best performance with reaching the smallest loss, while the exponential and critic baselines perform closely. Moreover, the different seeds perform similarly, ensuring model generalization across diverse graph data[25].

VIII Conclusion

In this paper, we have focused on enhancing the performance of blockchain-enabled Web 3.0, with a particular emphasis on optimizing block propagation in public blockchains. Specifically, we have introduced the AoB as a data-freshness metric to evaluate the efficiency of block propagation. Then, to ensure reliability during block propagation, we have established the miner reputation mechanism based on the subjective logic model, which can calculate miner reputations and prevent the new block from propagating to miners with lower reputations. Moreover, to achieve block propagation optimization, we have proposed a GAT-based reliable block propagation optimization model to minimize the overall AoB of block propagation with the given reputation constraint, thus obtaining the optimal block propagation trajectory. Finally, numerical results have demonstrated that compared with conventional routing mechanisms, the proposed scheme can minimize the overall AoB and ensure that miners have high reputation values during block propagation, contributing to enhanced efficiency and reliability of block propagation in public blockchains.

For future work, we will further explore whether advanced variants of GAT, such as sparse graph attention neural networks and graph sample and aggregate-attention networks, can achieve block propagation optimization more efficiently. In addition, we will deeply investigate the synergy between diffusion models and GAT to better capture the interaction between miners in complex environments, ultimately enhancing the efficiency and generalization ability of the model. Moreover, we will systematically explore how to expand the scale of graph miners to make the GAT model more applicable in real public blockchains.

References

  • [1] C. Chen, L. Zhang, Y. Li, T. Liao, S. Zhao, Z. Zheng, H. Huang, and J. Wu, “When digital economy meets Web 3.0: Applications and challenges,” IEEE Open Journal of the Computer Society, 2022.
  • [2] M. Xu, X. Ren, D. Niyato, J. Kang, C. Qiu, Z. Xiong, X. Wang, and V. C. Leung, “When quantum information technologies meet blockchain in Web 3.0,” IEEE Network, 2023.
  • [3] J. Wen, X. Liu, Z. Xiong, M. Shen, S. Wang, Y. Jiao, J. Kang, and H. Li, “Optimal block propagation and incentive mechanism for blockchain networks in 6G,” in 2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom).   IEEE, 2022, pp. 369–374.
  • [4] S. Werner, D. Perez, L. Gudgeon, A. Klages-Mundt, D. Harz, and W. Knottenbelt, “Sok: Decentralized Finance (DeFi),” in Proceedings of the 4th ACM Conference on Advances in Financial Technologies, 2022, pp. 30–46.
  • [5] J. Kang, J. Wen, D. Ye, B. Lai, T. Wu, Z. Xiong, J. Nie, D. Niyato, Y. Zhang, and S. Xie, “Blockchain-empowered federated learning for healthcare metaverses: User-centric incentive mechanism with optimal data freshness,” IEEE Transactions on Cognitive Communications and Networking, 2023.
  • [6] M. Shen, H. Lu, F. Wang, H. Liu, and L. Zhu, “Secure and efficient blockchain-assisted authentication for edge-integrated Internet-of-Vehicles,” IEEE Transactions on Vehicular Technology, vol. 71, no. 11, pp. 12 250–12 263, 2022.
  • [7] Y. Lin, Z. Gao, Y. Tu, H. Du, D. Niyato, J. Kang, and H. Yang, “A blockchain-based semantic exchange framework for Web 3.0 toward participatory economy,” IEEE Communications Magazine, 2023.
  • [8] S. Jiang and J. Wu, “Taming propagation delay and fork rate in bitcoin mining network,” in 2021 IEEE International Conference on Blockchain (Blockchain).   IEEE, 2021, pp. 314–320.
  • [9] J. Wen, J. Kang, M. Xu, H. Du, Z. Xiong, Y. Zhang, and D. Niyato, “Freshness-aware incentive mechanism for mobile AI-Generated Content (AIGC) networks,” in 2023 IEEE/CIC International Conference on Communications in China (ICCC).   IEEE, 2023, pp. 1–6.
  • [10] Y. Zhong, J. Wen, J. Zhang, J. Kang, Y. Jiang, Y. Zhang, Y. Cheng, and Y. Tong, “Blockchain-assisted twin migration for vehicular metaverses: A game theory approach,” Transactions on Emerging Telecommunications Technologies, p. e4856, 2023.
  • [11] J. Wen, J. Kang, Z. Xiong, Y. Zhang, H. Du, Y. Jiao, and D. Niyato, “Task freshness-aware incentive mechanism for vehicle twin migration in vehicular metaverses,” in 2023 IEEE International Conference on Metaverse Computing, Networking and Applications (MetaCom).   IEEE, 2023, pp. 481–487.
  • [12] X. Zhang, G. Min, T. Li, Z. Ma, X. Cao, and S. Wang, “AI and blockchain empowered metaverse for Web 3.0: Vision, architecture, and future directions,” IEEE Communications Magazine, 2023.
  • [13] P. Veličković, G. Cucurull, A. Casanova, A. Romero, P. Lio, and Y. Bengio, “Graph attention networks,” arXiv preprint arXiv:1710.10903, 2017.
  • [14] K. Lei, P. Guo, Y. Wang, X. Wu, and W. Zhao, “Solve routing problems with a residual edge-graph attention neural network,” Neurocomputing, vol. 508, pp. 79–98, 2022.
  • [15] Q. Zhang, C. Li, F. Su, and Y. Li, “Spatio-temporal residual graph attention network for traffic flow forecasting,” IEEE Internet of Things Journal, 2023.
  • [16] C. Huang, Y. Yang, X. Qiu, B. Song, and K. Huang, “GAT-based optimization for multipath routing,” in 2022 IEEE 13th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON).   IEEE, 2022, pp. 0554–0561.
  • [17] J. Wang, W. Ou, O. Alfarraj, A. Tolba, G.-J. Kim, and Y. Ren, “Block verification mechanism based on Zero-Knowledge Proof in blockchain.” Comput. Syst. Sci. Eng., vol. 45, no. 2, pp. 1805–1819, 2023.
  • [18] X. Zhai, S. Pang, M. Wang, S. Qiao, and Z. Lv, “TVS: a trusted verification scheme for office documents based on blockchain,” Complex & Intelligent Systems, vol. 9, no. 3, pp. 2865–2877, 2023.
  • [19] S. Häselbarth, O. Winkels, and K. Strunz, “Blockchain-based market procurement of reactive power,” IEEE Access, vol. 11, pp. 36 106–36 119, 2023.
  • [20] V. Deshpande, H. Badis, and L. George, “Efficient topology control of blockchain peer to peer network based on SDN paradigm,” Peer-to-Peer Networking and Applications, vol. 15, no. 1, pp. 267–289, 2022.
  • [21] H. Chen, Y. Chen, Z. Xiong, M. Han, Z. He, B. Liu, Z. Wang, and Z. Ma, “Prevention method of block withholding attack based on miners’ mining behavior in blockchain,” Applied Intelligence, vol. 53, no. 9, pp. 9878–9896, 2023.
  • [22] C. Decker and R. Wattenhofer, “Information propagation in the bitcoin network,” in IEEE P2P 2013 Proceedings.   IEEE, 2013, pp. 1–10.
  • [23] P. Chen, Z. Li, X. Ling, and J. Wang, “Accelerated gossip protocol for incentivizing block propagation,” in 2023 IEEE International Conference on Communications Workshops (ICC Workshops).   IEEE, 2023, pp. 170–175.
  • [24] L. Zhang, T. Wang, and S. C. Liew, “Speeding up block propagation in bitcoin network: Uncoded and coded designs,” Computer Networks, vol. 206, p. 108791, 2022.
  • [25] W. Kool, H. Van Hoof, and M. Welling, “Attention, learn to solve routing problems!” arXiv preprint arXiv:1803.08475, 2018.
  • [26] A. Kosta, N. Pappas, V. Angelakis et al., “Age of Information: A new concept, metric, and tool,” Foundations and Trends® in Networking, vol. 12, no. 3, pp. 162–259, 2017.
  • [27] A. Rovira-Sugranes and A. Razi, “Optimizing the Age of Information for blockchain technology with applications to IoT sensors,” IEEE Communications Letters, vol. 24, no. 1, pp. 183–187, 2019.
  • [28] Y. Shahsavari, K. Zhang, and C. Talhi, “A theoretical model for fork analysis in the bitcoin network,” in 2019 IEEE international conference on Blockchain (Blockchain).   IEEE, 2019, pp. 237–244.
  • [29] Y. Jiang, J. Kang, D. Niyato, X. Ge, Z. Xiong, C. Miao, and X. Shen, “Reliable distributed computing for metaverse: A hierarchical game-theoretic approach,” IEEE Transactions on Vehicular Technology, vol. 72, no. 1, pp. 1084–1100, 2022.
  • [30] J. Kang, Z. Xiong, D. Niyato, D. Ye, D. I. Kim, and J. Zhao, “Toward secure blockchain-enabled Internet of Vehicles: Optimizing consensus management using reputation and contract theory,” IEEE Transactions on Vehicular Technology, vol. 68, no. 3, pp. 2906–2920, 2019.
  • [31] A. Vaswani, N. Shazeer, N. Parmar, J. Uszkoreit, L. Jones, A. N. Gomez, Ł. Kaiser, and I. Polosukhin, “Attention is all you need,” Advances in neural information processing systems, vol. 30, 2017.
  • [32] L. Xin, W. Song, Z. Cao, and J. Zhang, “Multi-decoder attention model with embedding glimpse for solving vehicle routing problems,” in Proceedings of the AAAI Conference on Artificial Intelligence, vol. 35, no. 13, 2021, pp. 12 042–12 049.
  • [33] W. Hwang, “Augmenting information propagation models with Graph Neural Networks,” 2021.
  • [34] S. Guo, Y. Xiao, and L. Niu, “GGTAN: Graph Gated Talking-Heads Attention Networks for traveling salesman problem,” in 2020 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT).   IEEE, 2020, pp. 676–681.
  • [35] J. Li, B. Yang, Z.-Y. Dou, X. Wang, M. R. Lyu, and Z. Tu, “Information aggregation for multi-head attention with routing-by-agreement,” arXiv preprint arXiv:1904.03100, 2019.
  • [36] S. J. Rennie, E. Marcheret, Y. Mroueh, J. Ross, and V. Goel, “Self-critical sequence training for image captioning,” in Proceedings of the IEEE conference on computer vision and pattern recognition, 2017, pp. 7008–7024.
  • [37] I. Drori, A. Kharkar, W. R. Sickinger, B. Kates, Q. Ma, S. Ge, E. Dolev, B. Dietrich, D. P. Williamson, and M. Udell, “Learning to solve combinatorial optimization problems on real-world graphs in linear time,” in 2020 19th IEEE International Conference on Machine Learning and Applications (ICMLA).   IEEE, 2020, pp. 19–24.
  • [38] A. Adhikary, X. Lin, and Y.-P. E. Wang, “Performance evaluation of NB-IoT coverage,” in 2016 IEEE 84th Vehicular Technology Conference (VTC-Fall).   IEEE, 2016, pp. 1–5.
  • [39] G. A. Akpakwu, B. J. Silva, G. P. Hancke, and A. M. Abu-Mahfouz, “A survey on 5G networks for the Internet of Things: Communication technologies and challenges,” IEEE access, vol. 6, pp. 3619–3647, 2017.
  • [40] M. H. C. Garcia, A. Molina-Galan, M. Boban, J. Gozalvez, B. Coll-Perales, T. Şahin, and A. Kousaridas, “A tutorial on 5G NR V2X communications,” IEEE Communications Surveys & Tutorials, vol. 23, no. 3, pp. 1972–2026, 2021.
  • [41] Z. Su, W. Feng, J. Tang, Z. Chen, Y. Fu, N. Zhao, and K.-K. Wong, “Energy-efficiency optimization for D2D communications underlaying UAV-assisted industrial IoT networks with swipt,” IEEE Internet of Things Journal, vol. 10, no. 3, pp. 1990–2002, 2022.