Research Article
Research on IoT Forensics System Based on Blockchain Technology
Table 3
Comparison of PoW, PoS, DpoS, and PBFT consensus mechanisms.
| Parameter | PoW [38] | PoS [39] | DPoS [40] | PBFT [41] |
| Degree of centralization | Fully decentralized | Fully decentralized | Partially decentralized | Partially decentralized | Node access license | Not needed | Not needed | Not needed | Needed | Number of access nodes | Unlimited | Unlimited | Unlimited | Limited | Block time | Longer | Longer | Shorter | Shorter | Main resource occupation | Computing power | Equity, token | Equity, token | Bandwidth | Application scenario | Public chain | Public chain | Public chain | Alliance chain | Whether to fork | Easy to fork | Easy to fork | Not easy to fork | No fork | Final consistency | No finality | No finality | No finality | Finality | Security guarantee | More than 1/2 of computing power is credible | More than 1/2 stake is credible | More than 1/2 of equity is credible | More than 2/3 of nodes are trusted |
|
|