scholarly journals Enable Fair Proof-of-Work (PoW) Consensus for Blockchains in IoT by Miner Twins (MinT)

Author(s):  
Qian Qu ◽  
Ronghua Xu ◽  
Yu Chen ◽  
Erik Blasch ◽  
Alexander Aved

Blockchain technology has been recognized as a promising solution to enhance the security and privacy of Internet of Things (IoT) and Edge Computing scenarios. Taking advantage of the Proof-of-Work (PoW) consensus protocol, which solves a computation intensive hashing puzzle, Blockchain assures the security of the system by establishing a digital ledger. However, the computation intensive PoW favors members possessing more computing power. In the IoT paradigm, fairness in the highly heterogeneous network edge environments must consider devices with various constraints on computation power. Inspired by the advanced features of Digital Twins (DT), an emerging concept that mirrors the lifespan and operational characteristics of physical objects, we propose a novel Miner-Twins (MinT) architecture to enable a fair PoW consensus mechanism for blockchains in IoT environments. MinT adopts an edge-fog-cloud hierarchy. All physical miners of the blockchain are deployed as microservices on distributed edge devices, while fog/cloud servers maintain digital twins that periodically update miners’ running status. By timely monitoring miner’s footage that is mirrored by twins, a lightweight Singular Spectrum Analysis (SSA) based detection achieves to identify individual misbehaved miners that violate fair mining. Moreover, we also design a novel Proof-of-Behavior (PoB) consensus algorithm to detect byzantine miners that collude to compromise a fair mining network. A preliminary study is conducted on a proof-of-concept prototype implementation, and experimental evaluation shows the feasibility and effectiveness of proposed MinT scheme under a distributed byzantine network environment.

2021 ◽  
Vol 13 (11) ◽  
pp. 291
Author(s):  
Qian Qu ◽  
Ronghua Xu ◽  
Yu Chen ◽  
Erik Blasch ◽  
Alexander Aved

Blockchain technology has been recognized as a promising solution to enhance the security and privacy of Internet of Things (IoT) and Edge Computing scenarios. Taking advantage of the Proof-of-Work (PoW) consensus protocol, which solves a computation intensive hashing puzzle, Blockchain ensures the security of the system by establishing a digital ledger. However, the computation intensive PoW favors members possessing more computing power. In the IoT paradigm, fairness in the highly heterogeneous network edge environments must consider devices with various constraints on computation power. Inspired by the advanced features of Digital Twins (DT), an emerging concept that mirrors the lifespan and operational characteristics of physical objects, we propose a novel Miner Twins (MinT) architecture to enable a fair PoW consensus mechanism for blockchains in IoT environments. MinT adopts an edge-fog-cloud hierarchy. All physical miners of the blockchain are deployed as microservices on distributed edge devices, while fog/cloud servers maintain digital twins that periodically update miners’ running status. By timely monitoring of a miner’s footprint that is mirrored by twins, a lightweight Singular Spectrum Analysis (SSA)-based detection achieves the identification of individual misbehaved miners that violate fair mining. Moreover, we also design a novel Proof-of-Behavior (PoB) consensus algorithm to detect dishonest miners that collude to control a fair mining network. A preliminary study is conducted on a proof-of-concept prototype implementation, and experimental evaluation shows the feasibility and effectiveness of the proposed MinT scheme under a distributed byzantine network environment.


Entropy ◽  
2019 ◽  
Vol 21 (9) ◽  
pp. 887 ◽  
Author(s):  
Xin Sun ◽  
Mirek Sopek ◽  
Quanlong Wang ◽  
Piotr Kulicki

While Blockchain technology is universally considered as a significant technology for the near future, some of its pillars are under a threat of another thriving technology, Quantum Computing. In this paper, we propose important safeguard measures against this threat by developing a framework of a quantum-secured, permissioned blockchain called Logicontract (LC). LC adopts a digital signature scheme based on Quantum Key Distribution (QKD) mechanisms and a vote-based consensus algorithm to achieve consensus on the blockchain. The main contribution of this paper is in the development of: (1) unconditionally secure signature scheme for LC which makes it immune to the attack of quantum computers; (2) scalable consensus protocol used by LC; (3) logic-based scripting language for the creation of smart contracts on LC; (4) quantum-resistant lottery protocol which illustrates the power and usage of LC.


Blockchain refers to a distributed ledger technology that represents an innovation in recording and sharing information without the need for a trusted third party. Blockchain technology offers new tools for security and privacy concerns. Marching towards digitization and analytics, this technology emerges as a promising solution for authentication and authorization issues. It sounds so amazing that this technology that originated with cryptocurrencies could not only be applied in digital contracts, financial and public records, and property ownership but also in medicine, education, science and so on. The use case of this technology springs up in every possible direction. This article first analyses the need for this breakthrough technology and explains how this technology works. This work presents a review on various types of blockchain, the consensus mechanisms used, their advantages and limitations. It provides an overview on the various use cases of this technology. This work mainly focuses on its application in Healthcare. The goal of this article is to analyze the usage of Blockchain technology in various fields of Healthcare such as Electronic Health Record, Health Insurance, Biomedical Research, Drug Supply, Medical Education, Remote Patient Monitoring, Interoperability, Location Sharing etc., It investigates the current research trends and finds the gaps and limitations of these approaches. Moreover, it proposes some enhancements to fill in the gaps in the present approach. This work also analyses the importance of Wearable Internet of Things (IoT) devices in HealthCare and the integration of these devices with Blockchain. Finally, this work concludes by comparing Blockchain 3.0 with previous versions.


Author(s):  
Rajalakshmi Krishnamurthi ◽  
Tuhina Shree

Blockchain is the world's most trusted service. It serves as a ledger that allows transaction to take place in a decentralized manner. There are so many applications based on blockchain technology, including those covering numerous fields like financial services, non-financial services, internet of things (IoT), and so on. Blockchain combines a distributed database and decentralized ledger without the need of verification by central authority. This chapter surveys the different consensus algorithms, blockchain challenges, and their scope. There are still many challenges of this technology, such as scalability and security problems, waiting to be overcome. The consensus algorithms of blockchain are proof of work (POW), proof of stake (POS), ripple protocol consensus algorithm (RPCA), delegated proof of stake (dPOS), stellar consensus protocol (SCP), and proof of importance (POI). This chapter discusses the core concept of blockchain and some mining techniques, consensus problems, and consensus algorithms and comparison algorithms on the basis of performance.


2020 ◽  
Vol 12 (8) ◽  
pp. 122
Author(s):  
Baocheng Wang ◽  
Zetao Li ◽  
Haibin Li

As the core of blockchain technology, the consensus algorithm plays an important role in determining the security, data consistency, and efficiency of blockchain systems. The existing mainstream consensus algorithm is experiencing difficulties satisfying the needs of efficiency, security, and decentralization in real-world scenarios. This paper proposes a hybrid consensus algorithm based on modified Proof-of-Probability and Delegated Proof-of-Stake. In this method, the work of block generation and validation is, respectively, completed by the nodes using the modified Proof-of-Probability consensus algorithm and Delegated Proof-of-Stake consensus algorithm. When a transaction occurs, the system sends several target hash values to the whole network. Each modified Proof-of-Probability node has a different sorting algorithm, so they have different mining priorities. Every time a hash is decrypted by a modified Proof-of-Probability node, the modulo operation is done to the value of nonce, which is then compared with the expected value given by the supernode selected by the Delegated Proof-of-Stake nodes. If they are not the same, the Proof-of-Probability node enters the waiting time and the other Proof-of-Probability nodes continue to mine. By adopting two consensus algorithms, the malicious nodes must control more than 51% of the nodes that adopt the two consensus algorithms, at the same time, to effectively attack the system, that is, they must have more than 51% of the computing power and more than 51% of the tokens. This not only increases the cost of malicious attacks, but also reduces waste of computing power. In addition, the efficiency of the DPoS algorithm makes up for the deficiency of the PoP algorithm in system efficiency, and the mining behavior based on probability in the PoP algorithm also significantly weakens the ability of supernodes in the DPoS algorithm to conduct monopoly behavior or other malicious behaviors. In a word, the combination of the two algorithms makes the system perform better in terms of security, system efficiency, and decentralization.


Author(s):  
Rajalakshmi Krishnamurthi ◽  
Tuhina Shree

Blockchain is the world's most trusted service. It serves as a ledger that allows transaction to take place in a decentralized manner. There are so many applications based on blockchain technology, including those covering numerous fields like financial services, non-financial services, internet of things (IoT), and so on. Blockchain combines a distributed database and decentralized ledger without the need of verification by central authority. This chapter surveys the different consensus algorithms, blockchain challenges, and their scope. There are still many challenges of this technology, such as scalability and security problems, waiting to be overcome. The consensus algorithms of blockchain are proof of work (POW), proof of stake (POS), ripple protocol consensus algorithm (RPCA), delegated proof of stake (dPOS), stellar consensus protocol (SCP), and proof of importance (POI). This chapter discusses the core concept of blockchain and some mining techniques, consensus problems, and consensus algorithms and comparison algorithms on the basis of performance.


Electronics ◽  
2021 ◽  
Vol 10 (4) ◽  
pp. 391
Author(s):  
Dongjun Na ◽  
Sejin Park

As the use of internet of things (IoT) devices increases, the importance of security has increased, because personal and private data such as biometrics, images, photos, and voices can be collected. However, there is a possibility of data leakage or manipulation by monopolizing the authority of the data, since such data are stored in a central server by the centralized structure of IoT devices. Furthermore, such a structure has a potential security problem, caused by an attack on the server due to single point vulnerability. Blockchain’s, through their decentralized structure, effectively solve the single point vulnerability, and their consensus algorithm allows network participants to verify data without any monopolizing. Therefore, blockchain technology becomes an effective solution for solving the security problem of the IoT’s centralized method. However, current blockchain technology is not suitable for IoT devices. Blockchain technology requires large storage space for the endless append-only block storing, and high CPU processing power for performing consensus algorithms, while its opened block access policy exposes private data to the public. In this paper, we propose a decentralized lightweight blockchain, named Fusion Chain, to support IoT devices. First, it solves the storage size issue of the blockchain by using the interplanetary file system (IPFS). Second, it does not require high computational power by using the practical Byzantine fault tolerance (PBFT) consensus algorithm. Third, data privacy is ensured by allowing only authorized users to access data through public key encryption using PKI. Fusion Chain was implemented from scratch written using Node.js and golang. The results show that the proposed Fusion Chain is suitable for IoT devices. According to our experiments, the size of the blockchain dramatically decreased, and only 6% of CPU on an ARM core, and 49 MB of memory, is used on average for the consensus process. It also effectively protects privacy data by using a public key infrastructure (PKI).


2021 ◽  
Vol 58 (1) ◽  
pp. 5315-5324
Author(s):  
Nidhi Raghav, Anoop Bhola

Healthcare is changing fast with better and efficient services for patient care. Electronic health records are electronic saved information related to health in digitally format. With EHR the healthcare data can be easily shared across the different healthcare settings.EHR enhances the Patient care by providing the accuracy and precision of medical records where security and privacy preservation are challenging in the system. In recent years, Blockchain has become viable technology which has invaded different domains. Blockchain has enormous potentialin healthcare because of demand of patient centric system and to connect different systems together. Blockchain is a promising solution for security and preservation of privacy in a healthcare sector. In this paper we have provide a comprehensive review of healthcare systems which are based on blockchain. The main objective of this paper is to reveal about blockchain technology in privacy preservation, security of healthcare and its future research directions. We have recognized and analyze latest research papers and literature to present a challenges and comparison between various published work in the domain of blockchain for healthcare.


2019 ◽  
Author(s):  
Jia Liu ◽  
Zhe Wang ◽  
Dingyong Sun ◽  
Xiying Wang

UNSTRUCTURED The HIV epidemic imposes a heavy burden on societal development. Presently, the protection of susceptible populations is the most feasible method for eliminating the spread of HIV. Governments and other relevant industries are actively attempting to solve the problem. In view of the unavailability of biological vaccines, the best measures that can currently be applied are identification of HIV-infected persons and provision of treatment and behavioral intervention. This paper proposes a HIV digital vaccine strategy based on blockchain technology. In the proposed strategy, a decentralized surveillance network is jointly constructed using HIV high-risk individuals as application nodes and accredited testing agencies as authentication nodes. Following testing at the authentication nodes, the results are uploaded to the blockchain, which results in HIV high-risk individuals being able to determine the HIV infection status of each other in a convenient, anonymous, and credible manner. This reduces the occurrence of high-risk sexual behavior and effectively protects susceptible populations. The proposed strategy is a promising solution to prevent the spread of HIV. The performance of the decentralized surveillance network may lead to the restructuring of current government-funded infectious disease prevention and control modes that are centered on centers for disease control and prevention and hospitals to introduce revolutionary changes in public health systems globally.


2021 ◽  
Vol 13 (11) ◽  
pp. 6348
Author(s):  
Sultan Çetin ◽  
Catherine De Wolf ◽  
Nancy Bocken

Digital technologies are considered to be an essential enabler of the circular economy in various industries. However, to date, very few studies have investigated which digital technologies could enable the circular economy in the built environment. This study specifically focuses on the built environment as one of the largest, most energy- and material-intensive industries globally, and investigates the following question: which digital technologies potentially enable a circular economy in the built environment, and in what ways? The research uses an iterative stepwise method: (1) framework development based on regenerating, narrowing, slowing and closing resource loop principles; (2) expert workshops to understand the usage of digital technologies in a circular built environment; (3) a literature and practice review to further populate the emerging framework with relevant digital technologies; and (4) the final mapping of digital technologies onto the framework. This study develops a novel Circular Digital Built Environment framework. It identifies and maps ten enabling digital technologies to facilitate a circular economy in the built environment. These include: (1) additive/robotic manufacturing, (2) artificial intelligence, (3) big data and analytics, (4) blockchain technology, (5) building information modelling, (6) digital platforms/marketplaces, (7) digital twins, (8) the geographical information system, (9) material passports/databanks, and (10) the internet of things. The framework provides a fruitful starting point for the novel research avenue at the intersection of circular economy, digital technology and the built environment, and gives practitioners inspiration for sustainable innovation in the sector.


Sign in / Sign up

Export Citation Format

Share Document