Use of Smart Contracts and Distributed Ledger for Automation

2022 ◽  
pp. 645-677
Author(s):  
Abhishek Kumar Gautam ◽  
Nitin Nitin

Blockchain as a service has evolved significantly from where it started as an underlying technology for Bitcoin cryptocurrency when introduced in 2008. Realization of the immense opportunities this technology possesses encouraged the development of several other Blockchain solutions such as Ethereum, which focused more on the unique competencies much beyond just the digital currency. In this chapter, the authors provided insights into the unmatchable capabilities of Blockchain to evade cyber-attacks that can facilitate a much-needed push for the scalable operation of autonomous vehicles by providing a safer and trustable ecosystem through smart contracts. The chapter also discusses the integration of Ethereum Blockchain with Confidential Consortium Framework (CFF) to overcome the shortcomings of Blockchain in terms of speed and volume. Towards the end, they talked about some of the modern technologies such as IoT and AI that can be benefitted by Blockchain.

Author(s):  
Abhishek Kumar Gautam ◽  
Nitin Nitin

Blockchain as a service has evolved significantly from where it started as an underlying technology for Bitcoin cryptocurrency when introduced in 2008. Realization of the immense opportunities this technology possesses encouraged the development of several other Blockchain solutions such as Ethereum, which focused more on the unique competencies much beyond just the digital currency. In this chapter, the authors provided insights into the unmatchable capabilities of Blockchain to evade cyber-attacks that can facilitate a much-needed push for the scalable operation of autonomous vehicles by providing a safer and trustable ecosystem through smart contracts. The chapter also discusses the integration of Ethereum Blockchain with Confidential Consortium Framework (CFF) to overcome the shortcomings of Blockchain in terms of speed and volume. Towards the end, they talked about some of the modern technologies such as IoT and AI that can be benefitted by Blockchain.


Author(s):  
A. Seitenov ◽  
G. Smagulova

Abstract: In the contemporary world, Ethereum is a very reliable financial saving among cryptocurrencies. It is also well known as a blockchain platform for creating and launching its own cryptocurrency. The applications run on Ethereum executed by a platform-specific cryptographic token, ether. During 2014, Ethereum had launched a pre-sale for ether, which had received an overwhelming response. Ether is used broadly for two purposes: it is traded as a digital currency exchange like other cryptocurrencies, and it is used inside Ethereum to run applications and even to monetize work. It should be noticed that the smart contract has brought a significant share of the success to Ethereum. The smart contract is a computer programme that independently performs assigned tasks between network participants without the participation of a third trusted party. Smart contracts and their intranet transactions have facilitated the rapid expansion of the Ethereum network. Smart contracts are widely represented on the market, either as electronic transaction payments or as applications for the implementation of logistics supplies, gambling, and other sectors. These transactions are irreversible and fully tracked online. Whereas the electronic records are available in a public distributed ledger and include data about user addresses, whereas the real names are hidden. The article explains the usage of decentralized accounts and their electronic transactions in the Ethereum network. The results are presented through different application sectors. Additionally, a new method for extracting blockchain records through node cluster via IPFS path is implemented in the research.


Author(s):  
Sara Jeza Alotaibi

Today's era of globalization and digital transformation has produced many modern technologies that have influenced modern societies, blockchain being one. This chapter will set out definitions and criteria related to what blockchain is, its advantages and limitations, and its relation to the modern techniques used in the conclusion of smart contracts; and the impact of this technology on fighting administrative and financial corruption. Within this chapter, the central focus is on a new form of contracts founded as a result of the challenge of aligning the current system of the contract with the application of blockchain technology (i.e., to replace the idea of credit intermediation in dealing [notary, bank, management] with another thought based on a peer-to-peer system to increase contractual security and to establish the principle of self-implementation of the contract without the need to mediate with others).


Author(s):  
Qipeng Liu ◽  
Yilin Mo ◽  
Xiaoyu Mo ◽  
Chen Lv ◽  
Ehsan Mihankhah ◽  
...  

ERA Forum ◽  
2020 ◽  
Vol 21 (2) ◽  
pp. 209-220
Author(s):  
Joshua Ellul ◽  
Jonathan Galea ◽  
Max Ganado ◽  
Stephen Mccarthy ◽  
Gordon J. Pace

Abstract Blockchain, Smart Contracts and other forms of Distributed Ledger Technology provide means to ensure that processes are verifiable, transparent, and tamper-proof. Yet the very same enabling features that bring decentralisation also pose challenges to providing protection for the various users and stakeholders. Most jurisdictions which have implemented regulatory frameworks in this area have focused on regulating the financial aspects of cryptocurrency-based operations. However, they have not addressed technology assurance requirements. In this paper we present a world-first technology regulatory framework.


2020 ◽  
Vol 2020 ◽  
pp. 1-15
Author(s):  
Qiyi He ◽  
Xiaolin Meng ◽  
Rong Qu

CAV (connected and autonomous vehicle) is a crucial part of intelligent transportation systems. CAVs utilize both sensors and communication components to make driving decisions. A large number of companies, research organizations, and governments have researched extensively on the development of CAVs. The increasing number of autonomous and connected functions however means that CAVs are exposed to more cyber security vulnerabilities. Unlike computer cyber security attacks, cyber attacks to CAVs could lead to not only information leakage but also physical damage. According to the UK CAV Cyber Security Principles, preventing CAVs from cyber security attacks need to be considered at the beginning of CAV development. In this paper, a large set of potential cyber attacks are collected and investigated from the aspects of target assets, risks, and consequences. Severity of each type of attacks is then analysed based on clearly defined new set of criteria. The levels of severity for the attacks can be categorized as critical, important, moderate, and minor. Mitigation methods including prevention, reduction, transference, acceptance, and contingency are then suggested. It is found that remote control, fake vision on cameras, hidden objects to LiDAR and Radar, spoofing attack to GNSS, and fake identity in cloud authority are the most dangerous and of the highest vulnerabilities in CAV cyber security.


Sign in / Sign up

Export Citation Format

Share Document