{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T10:59:21Z","timestamp":1775041161383,"version":"3.50.1"},"reference-count":37,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2020,3,16]],"date-time":"2020-03-16T00:00:00Z","timestamp":1584316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>The inception of Bitcoin as a peer-to-peer payment system, and its underlying blockchain data-structure and protocol, has led to an increased interest in deploying scalable and reliable distributed-ledger systems that build on robust consensus protocols. A critical requirement of such systems is to provide enough fault tolerance in the presence of adversarial attacks or network faults. This is essential to guarantee liveness when the network does not behave as expected and ensure that the underlying nodes agree on a unique order of transactions over a shared state. In comparison with traditional distributed systems, the deployment of a distributed-ledger system should take into account the hidden game theoretical aspects of such protocols, where actors are competing with each other in an environment which is likely to experience various well-motivated malicious and adversarial attacks. Firstly, this paper discusses the fundamental principles of existing consensus protocols in the context of both permissioned and permissionless distributed-ledger systems. The main contribution of this work deals with observations from experimenting with Ripple\u2019s consensus protocol as it is embodied in the XRP Ledger. The main experimental finding suggests that, when a low percentage of malicious nodes is present, the centralization degree of the network can be significantly relaxed ensuring low convergence times. Those findings are of particular importance when engineering a consensus algorithm that would like to balance security with decentralization.<\/jats:p>","DOI":"10.3390\/fi12030053","type":"journal-article","created":{"date-parts":[[2020,3,17]],"date-time":"2020-03-17T09:27:41Z","timestamp":1584437261000},"page":"53","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":34,"title":["Consensus Crash Testing: Exploring Ripple\u2019s Decentralization Degree in Adversarial Environments"],"prefix":"10.3390","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3543-6405","authenticated-orcid":false,"given":"Klitos","family":"Christodoulou","sequence":"first","affiliation":[{"name":"Institute For the Future, University of Nicosia, 2414 Engomi, Cyprus"}]},{"given":"Elias","family":"Iosif","sequence":"additional","affiliation":[{"name":"Institute For the Future, University of Nicosia, 2414 Engomi, Cyprus"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6404-8079","authenticated-orcid":false,"given":"Antonios","family":"Inglezakis","sequence":"additional","affiliation":[{"name":"Institute For the Future, University of Nicosia, 2414 Engomi, Cyprus"}]},{"given":"Marinos","family":"Themistocleous","sequence":"additional","affiliation":[{"name":"Institute For the Future, University of Nicosia, 2414 Engomi, Cyprus"}]}],"member":"1968","published-online":{"date-parts":[[2020,3,16]]},"reference":[{"key":"ref_1","first-page":"99","article-title":"Survey of computing technologies: Distributed, utility, cluster, grid and cloud computing","volume":"6","author":"Sood","year":"2016","journal-title":"J. Netw. Commun. Emerg. Technol."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1109\/2.153253","article-title":"The many faces of consensus in distributed systems","volume":"25","author":"Turek","year":"1992","journal-title":"Computer"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1145\/322186.322188","article-title":"Reaching agreement in the presence of faults","volume":"27","author":"Pease","year":"1980","journal-title":"J. ACM"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"382","DOI":"10.1145\/357172.357176","article-title":"The Byzantine generals problem","volume":"4","author":"Lamport","year":"1982","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"ref_5","first-page":"173","article-title":"Practical Byzantine fault tolerance","volume":"99","author":"Castro","year":"1999","journal-title":"OSDI"},{"key":"ref_6","unstructured":"Clement, A., Wong, E.L., Alvisi, L., Dahlin, M., and Marchetti, M. (2009, January 22\u201324). Making Byzantine Fault Tolerant Systems Tolerate Byzantine Faults. Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2009, Boston, MA, USA."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Bessani, A., Sousa, J., and Alchieri, E.E. (2014, January 23\u201326). State machine replication for the masses with BFT-SMaRt. Proceedings of the 44th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN 2014), Atlanta, GA, USA.","DOI":"10.1109\/DSN.2014.43"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Fischer, M.J. (1983). The consensus problem in unreliable distributed systems (A Brief Survey). Proceedings of the International Conference on Fundamentals of Computation Theory, Springer.","DOI":"10.1007\/3-540-12689-9_99"},{"key":"ref_9","unstructured":"Nakamoto, S. (2019, December 10). Bitcoin: A Peer-to-Peer Electronic Cash System. Available online: https:\/\/bitcoin.org\/bitcoin.pdf."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Kiayias, A., Koutsoupias, E., Kyropoulou, M., and Tselekounis, Y. Blockchain mining games. Proceedings of the 2016 ACM Conference on Economics and Computation.","DOI":"10.1145\/2940716.2940773"},{"key":"ref_11","first-page":"8","article-title":"The ripple protocol consensus algorithm","volume":"Volume 5","author":"Schwartz","year":"2014","journal-title":"Ripple Labs, Inc. White Paper"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Croman, K., Decker, C., Eyal, I., Gencer, A.E., Juels, A., Kosba, A., Miller, A., Saxena, P., Shi, E., and Sirer, E.G. (2016, January 22\u201326). On scaling decentralized blockchains\u2014(A Position Paper). Proceedings of the International Conference on Financial Cryptography and Data Security, Christ Church, Barbados.","DOI":"10.1007\/978-3-662-53357-4_8"},{"key":"ref_13","unstructured":"Schneider, F.B. (1993). Replication Management Using the State-Machine Approach, Distributed Systems, ACM."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Garcia, R., Rodrigues, R., and Pregui\u00e7a, N. (2011, January 19\u201322). Efficient middleware for byzantine fault tolerant database replication. Proceedings of the Sixth Conference on Computer Systems, Prague, Czech Republic.","DOI":"10.1145\/1966445.1966456"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Sousa, J., and Bessani, A. (2012, January 8\u201311). From Byzantine consensus to BFT state machine replication: A latency-optimal transformation. Proceedings of the IEEE Ninth European Dependable Computing Conference, Sibiu, Romania.","DOI":"10.1109\/EDCC.2012.32"},{"key":"ref_16","first-page":"18","article-title":"Paxos made simple","volume":"32","author":"Lamport","year":"2001","journal-title":"ACM Sigact News"},{"key":"ref_17","unstructured":"The Zilliqa Team (2019, December 13). The ZILLIQA Technical Whitepaper. Available online: https:\/\/docs.zilliqa.com\/whitepaper.pdf."},{"key":"ref_18","unstructured":"Eyal, I., Gencer, A.E., Sirer, E.G., and Van Renesse, R. (2016, January 16\u201318). Bitcoin-ng: A scalable blockchain protocol. Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI \u201916), Santa Clara, CA, USA."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Alchieri, E.A., Bessani, A.N., da Silva Fraga, J., and Greve, F. (2008, January 15\u201318). Byzantine consensus with unknown participants. Proceedings of the International Conference On Principles Of Distributed Systems, Luxor, Egypt.","DOI":"10.1007\/978-3-540-92221-6_4"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Xiao, Y., Zhang, N., Lou, W., and Hou, Y.T. (2019). A Survey of Distributed Consensus Protocols for Blockchain Networks. arXiv.","DOI":"10.1002\/9781119519621.ch2"},{"key":"ref_21","unstructured":"Bano, S., Sonnino, A., Al-Bassam, M., Azouvi, S., McCorry, P., Meiklejohn, S., and Danezis, G. (2017). Consensus in the age of blockchains. arXiv."},{"key":"ref_22","unstructured":"Levine, B.N., Shields, C., and Margolin, N.B. (2006). A Survey of Solutions to the Sybil Attack, University of Massachusetts Amherst."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Cachin, C., and Vukoli\u0107, M. (2017). Blockchain consensus protocols in the wild. arXiv.","DOI":"10.1109\/EDCC.2017.36"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Xiao, Y., Zhang, N., Li, J., Lou, W., and Hou, Y.T. (2019). Distributed consensus protocols and algorithms. Blockchain for Distributed Systems Security, Wiley.","DOI":"10.1002\/9781119519621.ch2"},{"key":"ref_25","unstructured":"Androulaki, E., Barger, A., Bortnikov, V., Cachin, C., Christidis, K., De Caro, A., Enyeart, D., Ferris, C., Laventman, G., and Manevich, Y. (2008, January 23\u201326). Hyperledger fabric: A distributed operating system for permissioned blockchains. Proceedings of the Thirteenth EuroSys Conference, Porto, Portugal."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"996","DOI":"10.1109\/71.954640","article-title":"Fault detection for Byzantine quorum systems","volume":"12","author":"Alvisi","year":"2001","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_27","unstructured":"Chase, B., and MacBrough, E. (2018). Analysis of the XRP Ledger consensus protocol. arXiv."},{"key":"ref_28","unstructured":"Mazieres, D. (2015). The Stellar Consensus Protocol: A Federated Model for Internet-Level Consensus, Stellar Development Foundation."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Sankar, L.S., Sindhu, M., and Sethumadhavan, M. (2017, January 6\u20137). Survey of consensus protocols on blockchain applications. Proceedings of the IEEE 4th International Conference on Advanced Computing and Communication Systems (ICACCS), Coimbatore, India.","DOI":"10.1109\/ICACCS.2017.8014672"},{"key":"ref_30","unstructured":"Ongaro, D., and Ousterhout, J.K. (2014, January 19\u201320). In Search of an Understandable Consensus Algorithm. Proceedings of the USENIX Annual Technical Conference (USENIX ATC \u201914), Philadelphia, PA, USA."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/s00446-006-0155-x","article-title":"The consensus problem in unreliable distributed systems (a brief survey)","volume":"19","author":"Lamport","year":"2006","journal-title":"Springer J. Distrib. Comput."},{"key":"ref_32","unstructured":"Stifter, N., Judmayer, A., Schindler, P., Zamyatin, A., and Weippl, E. (2019, December 12). Agreement with Satoshi\u2014On the Formalization of Nakamoto Consensus. Available online: https:\/\/spiral.imperial.ac.uk\/bitstream\/10044\/1\/62946\/5\/2018-400.pdf."},{"key":"ref_33","unstructured":"Luu, L., Narayanan, V., Baweja, K., Zheng, C., Gilbert, S., and Saxena, P. (2019, December 12). Scp: A Computationally-Scalable Byzantine Consensus Protocol for Blockchains. Available online: https:\/\/www.weusecoins.com\/assets\/pdf\/library\/SCP."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Augustine, J., Pandurangan, G., and Robinson, P. (2013, January 22\u201324). Fast byzantine agreement in dynamic networks. Proceedings of the 2013 ACM symposium on Principles of distributed computing, Montreal, QC, Canada.","DOI":"10.1145\/2484239.2484275"},{"key":"ref_35","unstructured":"Kogias, E.K., Jovanovic, P., Gailly, N., Khoffi, I., Gasser, L., and Ford, B. (2016, January 10\u201312). Enhancing bitcoin security and performance with strong consistency via collective signing. Proceedings of the 25th Usenix Security Symposium (Usenix Security 16), Austin, TX, USA."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Decker, C., Seidel, J., and Wattenhofer, R. (2016, January 4\u20137). Bitcoin meets strong consistency. Proceedings of the 17th International Conference on Distributed Computing and Networking, Singapore.","DOI":"10.1145\/2833312.2833321"},{"key":"ref_37","unstructured":"MacBrough, E. (2018). Cobalt: BFT governance in open networks. arXiv."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/12\/3\/53\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T09:07:12Z","timestamp":1760173632000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/12\/3\/53"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,16]]},"references-count":37,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2020,3]]}},"alternative-id":["fi12030053"],"URL":"https:\/\/doi.org\/10.3390\/fi12030053","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,3,16]]}}}