scholarly journals A Proximal Algorithm for Fork-Choice in Distributed Ledger Technology for Context-Based Clustering on Edge Computing

2020 ◽  
Vol 2 (1) ◽  
pp. 92
Author(s):  
Rahim Rahmani ◽  
Ramin Firouzi ◽  
Sachiko Lim ◽  
Mahbub Alam

The major challenges of operating data-intensive of Distributed Ledger Technology (DLT) are (1) to reach consensus on the main chain as a set of validators cast public votes to decide on which blocks to finalize and (2) scalability on how to increase the number of chains which will be running in parallel. In this paper, we introduce a new proximal algorithm that scales DLT in a large-scale Internet of Things (IoT) devices network. We discuss how the algorithm benefits the integrating DLT in IoT by using edge computing technology, taking the scalability and heterogeneous capability of IoT devices into consideration. IoT devices are clustered dynamically into groups based on proximity context information. A cluster head is used to bridge the IoT devices with the DLT network where a smart contract is deployed. In this way, the security of the IoT is improved and the scalability and latency are solved. We elaborate on our mechanism and discuss issues that should be considered and implemented when using the proposed algorithm, we even show how it behaves with varying parameters like latency or when clustering.

2021 ◽  
Vol 48 (4) ◽  
pp. 3-3
Author(s):  
Ingo Weber

Blockchain is a novel distributed ledger technology. Through its features and smart contract capabilities, a wide range of application areas opened up for blockchain-based innovation [5]. In order to analyse how concrete blockchain systems as well as blockchain applications are used, data must be extracted from these systems. Due to various complexities inherent in blockchain, the question how to interpret such data is non-trivial. Such interpretation should often be shared among parties, e.g., if they collaborate via a blockchain. To this end, we devised an approach codify the interpretation of blockchain data, to extract data from blockchains accordingly, and to output it in suitable formats [1, 2]. This work will be the main topic of the keynote. In addition, application developers and users of blockchain applications may want to estimate the cost of using or operating a blockchain application. In the keynote, I will also discuss our cost estimation method [3, 4]. This method was designed for the Ethereum blockchain platform, where cost also relates to transaction complexity, and therefore also to system throughput.


Author(s):  
Nikita Singh ◽  
Manu Vardhan

Blockchain-based distributed ledger technology (DLT) is transforming the existing operational models of economy, financial transactions and other government machineries so as to allow these to operate in a much more secure and decentralized manner. This research focuses on providing framework for decentralized and secure P2P infrastructure for handling e-stamp and property registration mechanism along with interface for verification of document originality. The proposed efficient consensus mechanism reduces the overhead of broadcasting a new block by more than 50% coupled with saving CPU computation power along with network bandwidth. To ensure that even people at remote locations with constrained resources are able to participate and harness these benefits, a cloud server architecture & web interface for verification of property registered deed is also proposed.


2019 ◽  
Vol 11 (4) ◽  
pp. 100 ◽  
Author(s):  
Maurizio Capra ◽  
Riccardo Peloso ◽  
Guido Masera ◽  
Massimo Ruo Roch ◽  
Maurizio Martina

In today’s world, ruled by a great amount of data and mobile devices, cloud-based systems are spreading all over. Such phenomenon increases the number of connected devices, broadcast bandwidth, and information exchange. These fine-grained interconnected systems, which enable the Internet connectivity for an extremely large number of facilities (far beyond the current number of devices) go by the name of Internet of Things (IoT). In this scenario, mobile devices have an operating time which is proportional to the battery capacity, the number of operations performed per cycle and the amount of exchanged data. Since the transmission of data to a central cloud represents a very energy-hungry operation, new computational paradigms have been implemented. The computation is not completely performed in the cloud, distributing the power load among the nodes of the system, and data are compressed to reduce the transmitted power requirements. In the edge-computing paradigm, part of the computational power is moved toward data collection sources, and, only after a first elaboration, collected data are sent to the central cloud server. Indeed, the “edge” term refers to the extremities of systems represented by IoT devices. This survey paper presents the hardware architectures of typical IoT devices and sums up many of the low power techniques which make them appealing for a large scale of applications. An overview of the newest research topics is discussed, besides a final example of a complete functioning system, embedding all the introduced features.


Author(s):  
A. V. Reshetniak ◽  
V. I. Dravitsa

The article covers the possibilities of comprehensive use of identification technologies and Distributed Ledger Technology (DLT) for increasing the efficiency of electronic services provided through multi-purpose student cards. The main advantages and disadvantages of the existing intellectual document emission systems in the Belarusian education system are assessed, including: centralized (the “Student Card” project) and decentralized (the electronic student card) ones. The proposal to use the DLT-model for issuing multi-purpose electronic student cards combined with bank payment cards has been grounded. Such model makes it possible to implement new functional capabilities when providing electronic services and has a number of advantages over the existing systems of electronic student documents issuance. The article describes how Public Blockchain and Private Blockchain can be used to issue and control intellectual documents, to accelerate the development of the electronic services provided through Smart Contract, and how the Smart Contract technology can be used to promote fair competition among electronic services providers. The methodology of evaluating the electronic services provider rating basing on the weighting factor of “usefulness” or “being in demand” is proposed. The article provides information on the expected effects of the proposed DLT-model implementation, obtained through the comprehensive use of identification technologies and distributed ledger technology.


IEEE Network ◽  
2020 ◽  
Vol 34 (1) ◽  
pp. 47-53 ◽  
Author(s):  
Pietro Danzi ◽  
Anders E. Kalor ◽  
Rene B. Sorensen ◽  
Alexander K. Hagelskjaer ◽  
Lam D. Nguyen ◽  
...  

Pomorstvo ◽  
2020 ◽  
Vol 34 (1) ◽  
pp. 166-177
Author(s):  
Mario Pečarić ◽  
Ivan Peronja ◽  
Mislav Mostarac

The aim of this paper is to find alternative method of executing reimbursement loan, as a form of documentary loan, that is, to investigate new digital technology methods (fintech) to improve the efficiency of the international exchange. Reimbursement loans are often used to credit the trade of overseas goods. The reason of such case is that the shipment of goods by the maritime transport requires a significant amount of time and those trades are often associated with high financial amounts. Since international trade (exchange) is a kind of a generator of society’s progress, it is necessary to explore the possibilities for making international payment cheaper, more efficient and more secure. In this case, we based our research on the implementation of modern technologies, more precisely “blockchain”/DLT (Distributed Ledger Technology) and “smart contracts”. The new reimbursement loan model presented in the paper is based on the aforementioned technologies. It could potentially change not only the documentary lending techniques, but also, eventually, overall financial paradigm. The effectiveness of the application of modern technologies is proven comparing the results of the so called conventional and unconventional reimbursement credit model on a real case involving two companies in Indonesia and Singapore. The paper also tackles on the further implementation of “smart contract” technology and “blockchain”/DLT, thus considering the potential impact of these technologies on overseas trade, credit markets and financial institutions. Finally, the paper argues on the limitations in implementing this new technique (e.g. legal, political and technical challenges).


2020 ◽  
Vol 12 (8) ◽  
pp. 134
Author(s):  
Nikolaos Kapsoulis ◽  
Alexandros Psychas ◽  
Georgios Palaiokrassas ◽  
Achilleas Marinakis ◽  
Antonios Litke ◽  
...  

Private and permissioned blockchains are conceptualized and mostly assembled for fulfilling corporations’ demands and needs in the context of their own premises. This paper presents a complete and sophisticated end-to-end permissioned blockchain application for governance and management of musical rights endorsed by smart contract development. In a music industry use case, this disclosed solution monitors and regulates conflicting musical rights of diverse entities under a popular permissioned distributed ledger technology network. The proposed implementation couples various and distinct business domains across the music industry organizations and non-profit blockchain associations.


Sensors ◽  
2021 ◽  
Vol 21 (5) ◽  
pp. 1834
Author(s):  
Ikram Ullah ◽  
Gerard de Roode ◽  
Nirvana Meratnia ◽  
Paul Havinga

Internet of Things (IoT) has been deployed in a vast number of smart applications with the aim to bring ease and comfort into our lives. However, with the expansion of IoT applications, the number of security and privacy breaches has also increased, which brings into question the resilience of existing security and trust mechanisms. Furthermore, the contemporaneous centralized technology is posing significant challenges viz scalability, transparency and efficiency to wide range of IoT applications such as smart logistics, where millions of IoT devices need to be connected simultaneously. Alternatively, IOTA is a distributed ledger technology that offers resilient security and trust mechanisms and a decentralized architecture to overcome IoT impediments. IOTA has already been implemented in many applications and has clearly demonstrated its significance in real-world applications. Like any other technology, IOTA unfortunately also encounters security vulnerabilities. The purpose of this study is to explore and highlight security vulnerabilities of IOTA and simultaneously demonstrate the value of threat modeling in evaluating security vulnerabilities of distributed ledger technology. IOTA vulnerabilities are scrutinized in terms of feasibility and impact and we have also presented prevention techniques where applicable. To identify IOTA vulnerabilities, we have examined existing literature and online blogs. Literature available on this topic is very limited so far. As far as we know IOTA has barely been addressed in the traditional journals, conferences and books. In total we have identified six vulnerabilities. We used Common Vulnerability Scoring System (CVSS v3.0) to further categorize these vulnerabilities on the basis of their feasibility and impact.


Cybersecurity ◽  
2021 ◽  
Vol 4 (1) ◽  
Author(s):  
Runchen Gao ◽  
Shen Li ◽  
Yuqi Gao ◽  
Rui Guo

AbstractWith the large-scale application of 5G in industrial production, the Internet of Things has become an important technology for various industries to achieve efficiency improvement and digital transformation with the help of the mobile edge computing. In the modern industry, the user often stores data collected by IoT devices in the cloud, but the data at the edge of the network involves a large of the sensitive information, which increases the risk of privacy leakage. In order to address these two challenges, we propose a security strategy in the edge computing. Our security strategy combines the Feistel architecture and short comparable encryption based on sliding window (SCESW). Compared to existing security strategies, our proposed security strategy guarantees its security while significantly reducing the computational overhead. And our GRC algorithm can be successfully deployed on a hardware platform.


Author(s):  
Ashmita Pandey

Abstract: A decentralised, Secure, Peer-to-Peer Multi-Voting System on Ethereum Blockchain is a distributed ledger technology (DLT) that permits virtual votes to be transacted in a peer-to-peer decentralized network. Those transactions are validated and registered through every node of the network, so creating a transparent and immutable series of registered events whose truthfulness is supplied through a consensus protocol. Smart contract automates the execution of agreement that runs routinely as soon as the conditions are satisfied. Smart contract would not need any third parties consequently prevents time loss. By Eliminating the requirement for third parties, consequently, allows numerous processes to be extra efficient and economical. The system is secure, reliable, and anonymous. Smart contract is enforced for the Ethereum network using the Ethereum wallets and also the Solidity language. Users are capable of submit their votes immediately from their Ethereum wallets, and those transaction requests is handled with the consensus of each single Ethereum node. This creates a transparent environment for evoting. A lot of concerning efficiency of the peer-to-peer decentralized electoral system on Ethereum network along with application and the outcomes of implementation are provided in this paper. Keywords: Blockchain, Distributed Ledger Technology (DLT), Consensus Protocol, Smart Contracts, Ethereum, Solidity


Sign in / Sign up

Export Citation Format

Share Document