Abstract
Blockchain technology is a very
useful and effective technology and capable to perform complex processes.
Furthermore, computing processes can be complex and needs high-level security.
It is used to make processes optimized as well as it also supports each process
to increase the speed. The project is evaluating the network latency and
checking the impact on blockchain-based transactions. The block time in the
network can be effective for businesses and many industries in the world and it
can reduce the workability of the business processes. Blockchain technology provides
many services in blockchain transactions, and improve the processes through
increased security. Furthermore, in distributed leader technologies, it is hypothesized
that blockchain would serve as a catalyst for global disruptions, and those
blockchain-based applications in many industries such as the supply chain; the
medical and legal fields are now being developed and implemented. This research
study discussing the impact of network latency in which different techniques
such as PoWare discussed. The divergences between these latest blocks open the
transactions in question to the possibility that the blockchain fork will not
be used. We concentrate on evaluating block detection accuracy and the breach
of the six confirmed blockchain agreement.
Introduction
There
are special properties in Blockchain. When data is used in a committed
blockchain contract, it is in practice unchanged. The unchangeable sequence of
past transactions authenticated by cryptography does not replicate stored data.
Cryptographic tools also promote data privacy, offers open public access to
blockchain data and fair protection empower each participant to access and
exploit a blockchain in the same way. The communications between nodes in the
network gain trust in the blockchain. Blockchain network users depend instead
on the blockchain network itself to render transfers easy for trustworthy third
parties who can monitor and exploit the mechanism and are a single point of
failure. Blockchain opposed both data protection and scalability.
There
are no privileged users, and each member may access the details on the
Blockchain through the network. The secrecy is limited.Through increasing
network latency, the block convergence of blockchain can quickly be broken
down. Ideally, nodes can listen as easily as possible to freshly mined blocks.
Faster delivery to a new block's network encourages other nodes to verify it
faster, encouraging the blockchain to update for the new
block that is validated. The blockchain would thus stabilize in shorter
timeframes to a globally converged state. However, as network latency
decreases, the blockchain is far more likely to form forks because various
nodes remove several new blocks. The diversity of new blocks will lead to
honest nodes becoming confused about which fork is the longest chain,
destabilizing global consensus.
The
disparity between these new blocks opens the subsequent transactions to the
possibility of a not adopted blockchain fork. Nodes with lower latency can gain
disproportionate control over greedy mining when situations with variable
network latency are present in various nodes. Modern technologies designed for
high-latency communications in the network context, blockchain protection might
become vulnerable by delaying communication between blockchain maintainers[1].The important thing
is that the Blockchain consensus algorithm only guarantees probabilistic
accuracy. Solid continuity may bring three essential benefits to
cryptocurrencies. Second, any mining company immediately agree on the validity
of blocks without wasting computer resources to fix discrepancies (forks).
Secondly, consumers do not wait until lengthy times are confident a requested
transaction will be committed; the transaction can be deemed as validated as
soon as it occurs inside the blockchain. Third, good durability offers
protection for the future: when a block is added to the blockchain, it remains
for always. While the consistency of cryptocurrencies has been proposed,
current proposals abandon blockchain de-centralization and/or implement fresh
and non-intuitive security assumptions or refuse to show efficiency and
scalability experimentally[2].
Literature
Review
According to Vukolić[3], Across the thousands of nodes, the
utility of the globe has been particularly demonstrated by the Bitcoin
cryptocurrency. It is also necessary for various other processes and
perspectives. Due to such kinds of
various terms, digital transactions are changing the world forever. In the
initiating time of Bitcoin, its performance was probably lower, and later on,
it has become faster. The consequences fabric was introduced particularly for
the probabilistic proof of work. This particular term and process are known as
the blockchain which was not considered as the major issue. The study of Vukolić, (2015) is particularly contrasted the PoW
based blockchain with the BFT state replication machine that analyze the
PoW-based blockchains that state the condition of machine replication[3].
As indicated in the
study ofKuzlu [4],this study is particularly focusing
on the most important and famous source of the blockchain frameworks, which is
particularly known as the Hyper ledger fabrics. The particular study examines
the effect of the workload of the network for the performance platform of the
blockchain. In this study, the platform of the Hyperledger Fabric is evaluated
particularly in specific terms of the throughput. It includes latency,
scalability, and successful transactions. The specifications of the blockchain,
also include the time responses per transactions. It also includes the scale
scalability of the participants in specific manners. He researchedto
investigate the performance of a different version of Hypeledger fabric that
evaluates specific terms of throughput[4].
According to Yazdinejad[5], the technology is considered as a dispersed
record without any concentrated administration that is particular utilized to
store entire exchanges of transactions, which prompts a lot of information that
increments after some time. The gadgets of IoT are generally obliged in energy,
stockpiling, and calculation. These are probably not utilized for going to have
the option that is required to store all information of blockchain. An Enormous
Amount of information sums will be more articulated along with the expanding
IoT gadgets and blockchain use cases including IoT. It also includes the
current implementation that is required for blockchain and it is also utilized
for friendly IoT. The research is based on the research about different aspects
to get the proof of work. It is considered common gadgets that are based on
energy, stockpiling, and calculations of figure[5].
According to King [6] said that Satoshi Nakamoto's Bitcoin A shared
cryptographic money configuration has been got derived. To give the majority of
the organization security, the evidence of-stake replaces confirmation of-work
is required. By considering such kinds
of the particular design of the verification of-work chiefly, it gives largely
nonessential as well as initial minting in long run. The level of security of
the organization isn't subject to utilization energy in the drawn-out along with
these lines in order giving an energy effective as well as peer to peer cryptocurrencies
that is more competitive than others. On the coinage confirmation, of-stake
depends as well as it is created by every hub through a hashing plan bearing
comparability to Bitcoin's yet over restricted hunt space. The research
provided the procedure for the blockchain transaction settlement. It provides
nonessential monitoring of the work in the long run[6].
According toCrosby[7], The Shared
advanced cash is decentralized by Bitcoin that is considered the most well-known
model utilizes for the innovation of blockchain. The advanced and mostly
innovative cash bitcoin itself is considered exceptionally disputable that is
referred to as the fundamental of the technology of blockchain. It has worked
faultlessly and discovered a wide scope of utilization in both worlds monetary
and non-monetary. It is considered as the primary theory is that the blockchain
is utilized to builds up an arrangement of making a conveyed agreement in the
computerized online world. This is required permits taking an interest
substance to know for sure that a computerized occasion occurred by making an
undeniable record in a public record. It is specifically utilized for opening
the entry that is required for building up popularity which is based on the
adaptable computerized economy from various concentrated ones[7].
Alrubei[8]has
explained for some applications, the individual and organization are
progressively using the Internet of Things (IoT) and its products. In various
kinds of smart devices, this usage implies increments that are associated with
the Internet of Things. It will altogether utilize to build the difficulties
that are identified with these specific devices. It includes interconnectivity
and the executives, information and client protection, and organization,
information, along with the security of devices. Simultaneously, the approaches
blockchain gives a decentralized, permanent, and technology of peer to peer
ledger that could be the correct response for all of these various challenges.
In any case, huge difficulties go with the mix of blockchain into the Internet
of Things. Since the smart devices of IoT may experience the bad effects of
asset and force requirements. Blockchain is related to adaptability and
postpones issues. The research providesa gap for future work and it is
considered to be helpful to resolve future challenges. His work is authentic
and explored a broad scope of utilization of monetary and non-monetary funds[8].
Astarita[9]has
indicated in this study that the particular literature is presented in the
study related to the use of blockchain, which is based upon the frameworks in
transportation. The major principle point that was required to recognize, by
considering the usage of a multi-step technique. It includes momentum research
patterns, fundamental holes in the writing, and conceivable future difficulties.
Initially, a bibliometric examination was done to acquire an expansive diagram
of the subject of interest. In this way, the most persuasive commitments were
analyzed particularly for a top to bottom. It is also concerning the following
two regions: street traffic the board and keen urban areas store network and coordinations.
He showed that practical blockchain is required to implement the IoT that
providesan opportunity to use smart devices and gain experience for the asset’s
requirements[9].
According to Gervais[10]
said the current scalability of the measure has
been presentedin the particular study of Gervais.
It is adopted by Bitcoin that is come with various security systems. The
systems of the bitcoin can not be explained easily. Specifically, this
paper is conducted to present an adversary exploit that is required to
effectively measure propagation that has been
delayed. It also includes the transaction which are required blocks the
specific nodes. It is also required for siderbale amount of time by considering
its causes network partitioning in its particular systems. It includes the
information which is specifically received by the nodes of Bitcoins. It is utilized
to modifies their various views of ledger states. He provided the main theme to
research the new trend of the research that implements different methodology.
It examines the bibliography that is based on the interests of research.
Bonneau[11]has
explained in his study that the cryptographic currency [11]most popular in
history, Bitcoin has appeared. Within two years of Bitcoin's quiet 2009 debut,
amid just a cursory study of the system's architecture, it expanded to contain
billions of dollars. Since then, increasing literature, the system's secret but
essential virtues have been established, attacks uncovered, promising solutions
suggested and threats for the future identified. In the meantime, a broad and
diverse open-source group has introduced and adopted several amendments and
extensions. We give the first Bitcoin structural exposure and the underlying
cryptocurrency or 'altcoins.' We define the three key elements of Bitcoin's
architecture which can be isolated from a broad range of information. Thus,
Bitcoin's properties and potential viability are analyzed more thoroughly. The
room for several suggestions is mapped, comparative analyses of alternative
consensus structures, currency allotment mechanisms; machine puzzles, and key
management instruments are presented. To evaluate several data security
proposals, we review anonymity problems in Bitcoin and have an appraisal
structure. Finally, we offer new ideas on what we call disintermediation
protocols, which absolve the need for trustworthy intermediaries in a
fascinating range of applications. We define three general disintermediation
methods and offer a thorough comparison. He explained about current scalability measures that are adopted by Bitcoin.
It demonstrated that it required effective measures propagation that is not
being worked[11].
According to Putri[12],
the highest market share of all digital currencies lies with Bitcoin.
Transaction protection in Bitcoin is protected using the hash-based work proof
(PoW) mechanism of blocks. Bitcoin PoW takes an average of 10 minutes to
complete, and for a single device transaction, six consecutive blocks are
recommended. PoW is a functional protocol validating all incoming data for spam
and DDoS attacks (Distributed Denial of Service). The ego miner is an
infringement on Bitcoin's dignity. It is successful because fair miners have to
spend part of their machine cycle on the blocks not to be in the public chain.
The greedy miner is successful. To achieve better scalability, the network
latency must be minimal, which decreases the amount of time taken to validate
the transaction. The author will calculate the effect of block latency in
Bitcoin time with a selfish attack using NS3 in this analysis. In this study,
the author The test results indicate that the latency variance is applied, and
the lower the MBRT value, the more produced blocks. The average MBRT of each
parameter indicates the reception time required by the number of blocks between
about 15 and 16 minutes. This extends the time limit for the resistance of PoW
while transacting. The egotism of miners and latency are accountable.He explained and explores the first systematic exposition
of Bitcoin and its relevant cryptocurrencies that offer new ideas on
what we call disintermediation protocols, which absolve the need for
trustworthy intermediaries in a fascinating range of applications.
As indicated in the study of Choubey, Mahidhar, Misra, Behera, & Patel [1], there is a need for a highly safe and
privacy-protected transaction environment in a decentralized V2V energy trading
between electric vehicles (EVs). Most blockchain apps have a similar
cryptocurrency infrastructure for safe processing as digital currencies such as
Bitcoin come into play. In this piece, we suggest a blockchain-based approved
electrical trading mechanism to improve the protection and privacy of the
details of the EV customer. We are launching a new "ETcoin"
crypto-currency for electricity trading. All of these matched offers are held
in blockchain with a traded power unit and exchanged Ecoins. Using large-scale
Big Data Analytics, the transaction graph generated by energy trading can be
analyzed. Current works have not dealt with blockchain technology to process
massive energy trading transaction graphs. Analytics was considered for any
blockchain transactions submitted over a pre-defined duration. For the Blockchain
analysis of broad-scale transaction graphs, we suggest an Energy Exchange Rank
(ETR) algorithm. ETR algorithm uses the Weighted Ranking method to measure the
ETR score for each VR over a traded time, which takes into account both the
edge and vertex properties of the graph. Transaction graph analytics on trade
in energy services to prove its activity and to enable the EVs to engage in the
most environmentally friendly way. We used IBMs hyperladen cloth, the composer
with reduced transaction delay, and in-time device templates for each
participant in the system. We applied the blockchain-based Proof of Concept
(POC). For real-time, dataflow processing distributions, transaction graph
analytics are deployed using Apache Spark's open-source GraphX library.
Transactions are modeled as edge triplets on many computers, and the ETR score
is determined to converge with a set of tolerances for any vertex at the same
time. The simulation results show that, as parallel machines grow, the
algorithm converges faster and scaled better. We also evaluated that the total
reward benefit for EVs with optimum, real, and dedicated participation improves
so the scheme is active. They had thoroughly offered new ideas on what we call
disintermediation protocols, which absolve the need for trustworthy
intermediaries in a fascinating range of applications. They explained the
methods to achieve better scalability; the network latency must be minimal,
which decreases the amount of time taken to validate the transaction[1].
According to Conti, E, Lal, & Ruj [13], Bitcoin is a
common cryptocurrency that contains the details in a distributed appended-only
public ledger called a blockchain. Bitcoin's protection primarily depends on
the distributed consensus protocol based on the reward compliant proof-of-work
(PoW) mechanism operated by the miners' Networks. The miners are required to
preserve the blockchain sincerely in substitution for the opportunity.
Bitcoineéconomie has risen at a tremendous pace since its introduction in 2009
and now stands at some 150 trillion dollars. This rapid increase of bitcoin
market valuation motivates adversaries to take advantage of loopholes and
scientists to identify new device flaws, propose countermeasures, and foresee
the coming developments. In this article, the security and privacy dimensions
of Bitcoin have been surveyed extensively. We begin by presenting a summary of
the Bitcoin framework and its key components and their operating
characteristics and interactions[13].
We review the current vulnerabilities in
Bitcoin and the main underlying technology like blockchain and a consensus
protocol centered on PoW. These vulnerabilities lead to numerous security
threats against Bitcoin's standard function. We then evaluate whether
state-of-the-art safety solutions can be practical and durable. Besides, the
latest anonymity issues of Bitcoin and the safety risks to consumers of Bitcoin
are addressed as well as analyses of established secrecy solutions. In
conclusion, we outline the crucial open problems and offer recommendations for
future investigation to provide Bitcoin with rigorous protection and privacy
solutions[13].
As indicated in the study of Ersoy, Ren, Erkin, & Lagendijk,[14]
Current blockchain technologies depend on structures of peer-to-peer spread
where nodes are receiving their neighbors during a network transaction.
Unfortunately, such transaction propagation would not give explicit rewards.
Therefore, in a completely autonomous blockchain with rational nodes, current
dissemination processes would not stay viable. In this work, the problem with
incentivizing transaction propagation nodes is described formally. We are
suggesting an incentive system in which the transaction fee is shared to each
node participating in the spread of a transaction. We also explain that Sybil
is our proposal. We also integrate the reward mechanism with intelligent
routing to simultaneously reduce connectivity and storage costs. The suggested
routing function reduces the redundance of the transaction from network size to
an average shortest distance factor. A particular form of consensus is formed
for this routing process, in which the round leader who constructs the
transaction block is decided in advance. Please notice that our routing system
is standardized and can be used independently of the reward mechanism[14].
According to Decker & Wattenhofert[15],
Bitcoin is a decentralized currency that does not count on a single authority,
in contrast to traditional currencies. Instead, Bitcoin depends on a voluntary
network that mutually implements and verifies the transactions. In this paper,
we discuss how Bitcoin uses multi-hop transmission to distribute transactions
and network blocks to upgrade replicas of the LED. We then use the information
obtained to validate that the network spread delay is the key cause of
blockchain forks. Blockchain forks should be avoided because they are
symptomatic of the incoherence of the network replicas. We further demonstrate
what can be done with unilateral improvements in the actions of the customer by
bringing the new protocol to the limit[15].
According to Dirgantoro, Lee, & Kim [16], this essay proposes to acknowledge
the face of the safety infrastructure focused on artificial intelligence and
small data set edge computing. Generative opposing networks (GANs) are used to
exploit the data set to solve the problem of the exact constraint of the data
set. The average precision of GANs reaches 92.79% of the minimal results. Edge
computer is used with the Jetson Nano board to resolve the cloud delay, which
creates an average of 8.8 frames per second. Also, the sensed face pays for the
blockchain network with low static difficulties in opening the door or door
lock employing an intelligent contract. In contrast, the demonstration of the consent
algorithm in transaction times of around 33-39 milliseconds is exceeding a low
static complexity[16].
According to Dorri, Steger, Kanhere, & Jurdak[17],
Linked smart vehicles provide a range of advanced car owners, traffic agencies,
automakers, and other service providers with a wide range of services. This
could open intelligent vehicles to a variety of risks to safety and privacy,
such as location detection or remote hijacking. In this post, we suggest that
the groundbreaking platform blockchain (BC), which discovers multiple
technologies from cryptocurrency to smart contracts, may fix the problems. We
deliver a BC architecture that safeguards users' privacy and improves vehicle
ecosystem protection. The effectiveness of the proposed security architecture
can be demonstrated by wireless remote app upgrades and other new utilities,
such as car complex insurance costs. We also promote architectural resistance
to common security threats in a qualitative way[17].
According to Nakamoto[18],
a variant of electronic cash solely peer-to-peer will allow the transfer of
online paying money from one party to the next without a financial institution.
Digital signatures offer part of the solution, but key advantages would be
missed if a trustworthy third party remains essential to avoid replication. We
suggest a solution to the issue of double-spending using a network of pairs to
pairs. The network timestamps transactions by hashing them through a dangerous
proof of operating chain, making a record that cannot be altered without the
proof of work being replenished. Not only does the longest chain act as
evidence of the sequence of events, but it demonstrates that it originated from
the greatest pool of CPU capacity. As long as most CPU power is managed by
nodes that do not cooperate to attack the network, the longest chain and
out-pace attackers are created. The network itself has to be organized
minimally. Messages are sent on the best effort, and nodes will leave and
re-enthusiastically rejoin the network and embrace the longest evidence chain
to show their mistake[18].
As indicated in the study Fabiano[19], the IoT is
revolutionary and important but should take into consideration the legal
problems relating to the data security legislation, as well as applications for
different services. Legal problems relating to data security and privacy
legislation should, however, be taken into consideration. It is welcome to have
technical solutions, but the threats that we cannot overlook need to be
addressed before designing applications. Personal knowledge is worthwhile. The
assessment and prevention, taking the privacy in each project by design
approach, is important in this sense. In this context. Concerning privacy and
protection threats, certain concerns with possible data security and liability
implications are present. We can move data on the Internet, including personal
information, via the IoT device. The latest European General Data Protection
Regulation (GDPR), which will apply on 25 May 2018 and has been in effect since
24 May 2016, is relevant to remember in this sense. In the light of
infringements of the Law, the GDPR is implementing data security evaluation
(DPIA), data breach information, and very serious administrative penalties. A
thorough legal review encourages risk management to be undertaken to avoid the
abuse of sensitive knowledge[19].
The IoT environment evolves rapidly with
numerous implementations in diverse fields. Big Data and the blockchain are the
key subjects for the last time. Because of its future specific use for
utilities and software, the more recent is provided priority and improved
safety steps are taken to ensure a stable device. But analyzing the legal
questions leading to them is equally relevant. Everyone has the freedom to
defend his or her personal records. Here we cannot refuse the promise that any
program is appropriate to secure sensitive data. We cannot reject the appeal.
The contribution discusses the key legal issues relating to the security of
privacy and records, notably with regard to the blockchain, focussing on the
GDPR approach to privacy by design. I sincerely assume, however, that it would
be possible for companies to create a global privacy standard system for data
security.
According to HAFID, HAFID, & SAMIH [20], it was a lot
recognized and widely extended in recent years by Blockchain (e.g. Bitcoin and
Ethereum). But the scalability of blockchain continues to be an obstacle. This
paper outlines the current solutions to the scalability of blockchains and can
be divided into two categories: first layer, and second layer solutions: first
layer, secondary layer solutions, first layer solutions, and block chaining
frameworks. We focus in particular on sharding the scalability problem as a
promising first layer solution; the core concept behind sharding consists of
breaking up the blockchain network into numerous commissions, each handling a
different collection of transactions. In specific, (a) we are proposing a taxonomy
focused on committee consensus and committee membership; and (b) we are
contrasting the key current blockchain protocols based on sharing. Furthermore,
we present the advantages and drawbacks of current scalability technologies in
a performant comparative study (i.e., efficiency and latency)[20].
Hari, Kodialam, &
Lakshman [21]
has explained that The Bitcoin blockchain is a decentralized, distributed
directory that facilitates trustworthy transactions between non-reliable
businesses. However, certain implementations need much quicker transaction
recognition than the existing Bitcoin blockchain. In this article, we are
proposing an extremely successfully developed, low-latency definite method
called ACCEL to accelerate the block validation mechanism of Bitcoin. The
accelerated labeling of the singular components of the blockchain is our main
concept for quicker proof. Since it may not be definitively established if a
block belongs to a blockchain while the northbound delays are infinite, a
special block identification shows that the bottom-to-bottom latency of Bitcoin
miners is considerably below and can be supposed to be upper restricted. ACCEL
is particularly appropriate for low-latency blockchains where block spacing can
be tailored for the limited latencies of the network to increase the output
dramatically. With comprehensive simulations and actual execution, we test
ACCEL's performance, designed with minimal adjustments and completely compliant
with the Bitcoins blockchain. We demonstrate that transaction validation
latencies can be reduced with ACCEL to milliseconds and thus satisfy the performance
requirements of a large variety of applications with adequate constraints on
end-to-end latency[21].
According to Khan, Jung, Hashmi, & Waqas[22],In recent years, academics and business
experts have paid considerable attention to state-of-the-art Blockchain
technologies. Blockchain is essentially a global, immutable, user-focused
blockchain network that uses transactions exclusively through multiple nodes
through a shared awareness of all the related network nodes. Blockchain is
known for the cryptocurrency of Bitcoin. Blockchain has had multiple
applications with a global valuation of 150B disrupted since 2017. The
consensus models are responsible for committing to a new block between all
blockchain nodes. The consensus paradigm plays an important role in preserving
productivity in Blockchain. Using the proper consensus model, the efficiency of
the blockchain can be greatly improved. There are two types of consensus
structures. The first type is the evidence-based consensus model, which offers
enough evidence for a node in the Blockchain against other nodes to allow the
next block to be put in the chain. The second type is the voting model in which
nodes must share their votes before they validate a new block transaction. In
this document, we examine the features and critical feedback on the
performances of some of the most current consensus models. These factors are analyzed
primarily for transaction throughput, latency, the bandwidth of the network,
and storage[22].
As depicted in the study of Kosba, Miller, Shi, Wen, & Papamanthou, [23] Key element
contract structures over decentralized cryptocurrencies allow mutually
distrustful parties without trustworthy third parties to transact safely. The
transparent blockchain guarantees that honest parties are paid for mutual
breaks or abortions. Yet there is no transactional anonymity on current
networks. Both transfers, including cash flow between pseudonyms and
transactions in the number, will appear on the blockchain. We introduce Hawk, a
decentralized intelligent contract scheme that does not clear up financial
transactions in the blockchain and hence maintains public transactional
anonymity[23].
According to Poon & Dryja[24], the bitcoin
Protocol will now include the global volume of financial transactions in all
e-payment networks without any single third party custodial supported or
enabling participants to use a broadband link on a device. A decentralized
mechanism is proposed under which micropayment networks (i.e. payment channels
or transaction channels) are sent via a network of transactions of
off-blockchain exchanging value. If Bitcoin transactions can be signed with a
new form of sighash that resolve mixability, such transfers can take place
between untrusted parties along the transfer path, under agreements that can be
implemented, in the case of an uncooperative or aggressive party, by a sequence
of decremental time blocks, through a Bitcoin blockchain broadcast[24].
Citations
|
Objective
|
Algorithms
|
Tool and Technique
|
Significant Results
|
[3]
|
To analyze the
PoW-based blockchains to those based on BFT state machine replication
|
POW and BFT
|
Byzantine
fault-tolerant (BFT
Cryptocurrency
|
The study has contrasted the PoW based blockchain with the BFT state replication
machine.
|
[4]
|
To examine the
performance analysis of the two versions of Hyperledger Fabric, v0.6, and
v1.0.
|
Hyperledger Fabric,
v0.6, and v1.0.
|
It results in evaluatesthroughput, metrics, scalability, execution time,
and latency
|
the platform of the Hyperledger Fabric
is evaluated particularly in specific terms of the throughput
|
[5]
|
To explores the
various aspects of Secure and Low latency Proof of Work (SLPoW) protocol
|
Field-programmable
gate array (FPGA), Proof of Work (PoW)
|
To improve the processing speeds of the computation Field the
programmable gate array (FPGA) has been used
|
The gadgets of IoT are generally
obliged in energy, stockpiling, and calculation.
|
[6]
|
To explores the process if the
blockchain history and transaction settlement
|
PPCoin
|
hybrid design proof-of-work
|
It gives largely nonessential as well
as initial minting in the long run
|
[8]
|
To explores the topic of the current
research challenges along with blockchain future direction
|
Systematic literature review
|
To explain the technology of Bitcoin
by considering Bitcoin
|
It has worked faultlessly and
discovered a wide scope of utilization in both worlds monetary and
non-monetary
|
[9]
|
To demonstrates a blockchain
practical incorporation that is required the Internet of Things
|
Ethereum Proof of
Authority (PoA).
|
Performance analyses,
|
The smart devices of IoT may
experience the bad effects of asset and force requirements.
|
[10]
|
The major aim of explores the trends
of the research along with the implementation of the multistep methodology
|
bibliometric analysis
|
multi-step
methodology
|
Initially, a bibliometric examination
was done to acquire an expansive diagram of the subject of interest.
|
[11]
|
To examine current scalability measures that are adopted by Bitcoin
|
Nit identified
|
Systematic review
|
It has been presented
an adversary exploit that is required to effectively measure propagation that has been delayed.
|
[12]
|
To explain and
explores the first systematic exposition of Bitcoin and its relevant
cryptocurrencies
|
'altcoins.'
|
Drawing from a
scattered body of knowledge,
|
we offer new ideas on what we call
disintermediation protocols, which absolve the need for trustworthy
intermediaries in a fascinating range of applications
|
[1]
|
In this study, the author examines
test results that indicate that the latency variance is applied, and the
lower the MBRT value, the more produced blocks.
|
NS3, MBRT
|
PoW) mechanism
|
. To achieve better scalability, the
network latency must be minimal, which decreases the amount of time taken to
validate the transaction.
|
[13]
|
To explore that Bitcoin is a common
cryptocurrency that contains the details in a distributed appended-only
public ledger called the blockchain
|
|
PoW mechanism
|
They explained that preserve the
blockchain sincerely in substitution for the opportunity.
|
[14]
|
To learn about the problem with
incentivizing transaction propagation nodes is described formally
|
peer-to-peer review
|
Nodes to determine the blockchain
|
A blockchain with rational nodes,
current dissemination processes would not stay viable. It also integrates the
reward mechanism with intelligent routing to simultaneously reduce
connectivity and storage costs
|
[15]
|
To research that Bitcoin is a
decentralized currency that does not count on a single authority, in contrast
to traditional currencies
|
Blockchain forks
|
Verification of transactions
|
what can be done with unilateral
improvements in the actions of the customer by bringing the new protocol to
the limit?
|
[16]
|
It proposes to acknowledge the face of
the safety infrastructure focused on artificial intelligence and small data
set edge computing
|
Generative opposing networks (GANs)
|
Opening and lock of door with face
sensing
|
to exploit the data set to solve the
problem of the exact constraint of the data set
|
[17]
|
It provides a range of advanced car
owners, traffic agencies, automakers, and other service providers with a wide
range of services
|
cryptocurrency
|
safeguards users' privacy
|
Explained about open intelligent
vehicles to a variety of risks to safety and privacy, such as location
detection or remote hijacking
|
[18]
|
It suggests a solution to the issue of
double-spending using a network of pairs to pairs
|
Pool of CPU
|
Connection of networks
|
A variant of electronic cash solely
peer-to-peer will allow the transfer of online paying money from one party to
the next without a financial institution
|
Discussion
In the 21sy century, it
has become very important that the information related to transactions is
transparent. When the information related to transactions is going to be
transparent than the issues such as fraud or manipulation of information will
not occur. Blockchain technology is like a ledger thatis distributed to each
individual who is part of a network. It means that blockchain increases the
transparency of the information. This research will try to evaluate how much
transparency does blockchain technology provides and how it reduces the risk
related to fraud. As discussed earlier the research aims to provide deep
insights into the risks & benefits of Blockchain technology.
The research will
evaluate the benefits of this technology from different aspects such as
security, accuracy, efficiency, cost reduction, and traceability. Any
organization needs to perform its finance-related activities efficiently
otherwise various issues can arise which not only decreases the performance of
the organization but also the profitability of the organization decreases as a
result. There is a need for such technology that improves the security and
efficiency of the activities so that organizations can manage their financial
activities more accurately. Blockchain technology has proved beneficial for
finance-related activities or transactions because not only does the speed of
the process increase but also the security of the process also increasesas a
result of this technology. However, it is not known how much blockchain can
support an organization and whether its benefits are more than the risks or
not.
Furthermore,
the cost and challenges, at present, associated with a blockchain technology
use for recordkeeping of the public of Vermont outweigh the identifiable
benefits. The authors of this research emphasized that providing the blockchain
technology’s legal recognition may create the advantage as a “first mover” with
the potential to bring the activity of the economy surrounding the blockchain
technology’s development to Vermont. However, according to the authors, this
potential is challenging to capture and difficult to quantify because of the
nature of technology.
It has
been discussing in this study that Bitcoin cryptocurrency, blockchain
technology is characterized as the decentralized, distributed, open-source
database for storing information of the transaction. Rather than trusting the
centralized intermediaries such as banks or other financial institutions, two
parties are allowed by this technology to transact directly using linked and
duplicate ledgers known as blockchains. According to the authors, blockchain
technology makes the transaction more transparent than other centralized
systems. Transactions, as a result, are executed without relying on a third
party. Moreover, the authors have credited the blockchain as bringing
transparency of the supply chain to a new level, but, according to the authors,
currently, managerial and academic blockchain technology adoption is limited.
Conclusion
It is concluded
that cryptographic tools also promote data privacy, offers open public access
to blockchain data and fair protection empower each participant to access and
exploit a blockchain in the same way.The diversity of new blocks will lead to
honest nodes becoming confused about which fork is the longest chain,
destabilizing global consensus. The important thing is that the blockchain
consensus algorithm only guarantees probabilistic accuracy. Solid continuity
may bring three essential benefits to cryptocurrencies. While the consistency
of cryptocurrencies has been proposed, current proposals abandon Blockchain
de-centralization and/or implement fresh and non-intuitive security assumptions
or refuse. This article applies to a collective group of miners who have a
stable consensus protocol on the global state. Round robin (RR) is typically
used in Blockchain permitted. The method offers the ability to publish your
latest block to the next node in the queue. We assess and thus revoke
transactions the effect of various network latency settings on blockchain
security.Relationship between winner number and blockchain length. The length
of the blockchain can be seen to be purely equal to the number of winners at each
network latency.
References
[1]
|
A.
Choubey, K. Mahidhar, R. Misra, S. Behera, and Y. S. Patel,
"EnergyTradingRank Algorithm for Truthful Auctions among EVs via
Blockchain Analytics of Large Scale Transaction Graphs," 2019 11th
International Conference on Communication Systems & Networks (COMSNETS), 2019.
|
[2]
|
X. Zheng,
M. Li, Y. Chen, J. Guo, and M. Alam, "Blockchain-Based Secure
Computation Offloading in Vehicular Networks," IEEE TRANSACTIONS ON
INTELLIGENT TRANSPORTATION SYSTEMS, 2020.
|
[3]
|
M.
Vukolić, " The quest for scalable blockchain fabric: Proof-of-work vs.
BFT replication. In," International workshop on open problems in
network security (pp. 112-125). Springer, Cham., 2015.
|
[4]
|
M. P. M.
G. L. &. R. S. Kuzlu, " Performance analysis of a hyperledger fabric
blockchain framework: throughput, latency, and scalability," In 2019
IEEE international conference on blockchain, pp. (Blockchain) (pp.
536-540)., 2019, July.
|
[5]
|
A. S. G.
P. R. M. D. A. K. H. &. K. S. R. Yazdinejad, "SLPoW: Secure and Low
Latency Proof of Work Protocol for Blockchain in Green IoT Networks.," In
2020 IEEE 91st Vehicular Technology Conference (VT, 2020, May.
|
[6]
|
S. &.
N. S. King, "Ppcoin: Peer-to-peer crypto-currency with
proof-of-stake.," self-published paper, August, pp. 19, 1., 2012.
|
[7]
|
M. P. P.
V. S. &. K. V. Crosby, " Blockchain technology: Beyond
bitcoin.," Applied Innovation, pp. 2(6-10), 71., 2016.
|
[8]
|
S. M. B.
E. A. R. J. M. &. W. C. A. Alrubei, "Latency and Performance
Analyses of Real-World Wireless IoT-Blockchain Application.," IEEE
Sensors Journal, pp. 20(13), 7372-7383., 2020.
|
[9]
|
V. G. V.
P. M. G. &. S. V. Astarita, " A review of blockchain-based systems
in transportation.," Information, pp. 11(1), 21., 2020.
|
[10]
|
A. R. H.
K. G. O. &. C. S. Gervais, "Tampering with the delivery of blocks
and transactions in bitcoin.," In Proceedings of the 22nd ACM SIGSAC
Conference on Computer and Communications Security, pp. (pp. 692-705).,
2015.
|
[11]
|
J. M. A.
C. J. N. A. K. J. A. &. F. E. W. Bonneau, "Sok: Research
perspectives and challenges for bitcoin and cryptocurrencies.," In
2015 IEEE symposium on security and privacy (pp. 104-121). IEEE., 2015.
|
[12]
|
B. D. C.
&. S. R. F. Putri, "The Effect of Latency on Selfish-Miner Attack on
Block Receive Time Bitcoin Network Using NS3.," In 2018 12th
International Conference on Telecommunication Systems, Services, and
Applications (TSSA) (pp. 1-5)., 2018.
|
[13]
|
M. Conti,
S. K. E, C. Lal, and S. Ruj, "A Survey on Security and Privacy Issues of
Bitcoin," IEEE Communications Surveys & Tutorials, pp.
1553-877X, 2018.
|
[14]
|
O. Ersoy,
Z. Ren, Z. Erkin, and R. L. Lagendijk, "Transaction Propagation on
Permissionless Blockchains: Incentive and Routing Mechanisms," 2018
Crypto Valley Conference on Blockchain Technology, pp. 20-30, 2018.
|
[15]
|
C. Decker
and R. Wattenhofert, "Information Propagation in the Bitcoin
Network," 13-the IEEE International Conference on Peer-to-Peer
Computing, 2013.
|
[16]
|
K. P.
Dirgantoro, J. M. Lee, and D.-S. Kim, "Generative Adversarial Networks
Based on Edge Computing With Blockchain Architecture for Security
System," Authorized licensed use limited to Auckland University of
Technology, pp. 039-042, 2020.
|
[17]
|
A. Dorri,
M. Steger, S. S. Kanhere and R. Jurdak, "BlockChain: A Distributed
Solution to Automotive Security and Privacy," AutomotIve networkIng
And ApplIcAtIons, pp. 119-125, 2017.
|
[18]
|
S.
Nakamoto, "Bitcoin: A Peer-to-Peer Electronic Cash System," 2018
Annual National Seminar, 2018.
|
[19]
|
N.
Fabiano, "Internet of Things and Blockchain: legal issues and privacy.
The challenge for a privacy standard," 2017 IEEE International
Conference on Internet of Things (iThings) and IEEE Green Computing and
Communications (GreenCom) and IEEE Cyber, Physical and Social Computing
(CPSCom) and IEEE Smart Data (SmartData), 2017.
|
[20]
|
A. HAFID,
A. S. HAFID, and M. SAMIH, "Scaling Blockchains: A Comprehensive
Survey," IEEE Access, 2016.
|
[21]
|
A. Hari,
M. Kodialam and T. Lakshman, "ACCEL: Accelerating the Bitcoin Blockchain
for High-throughput, Low-latency Applications," Blockchain, 2018.
|
[22]
|
D. Khan,
L. T. Jung, M. A. Hashmani and A. Waqas, "A Critical Review of
Blockchain Consensus Model," 2020 3rd International Conference on
Computing, Mathematics and Engineering Technologies (iCoMET), pp. 2-6,
2020.
|
[23]
|
A. Kosba,
A. Miller, E. Shi, Z. Wen, and C. Papamanthou, "Hawk: The Blockchain
Model of Cryptography and Privacy-Preserving Smart Contracts," 2016
IEEE Symposium on Security and Privacy, pp. 839-858, 2016.
|
[24]
|
J. Poon
and T. Dryja, "The Bitcoin Lightning Network: Scalable Off-Chain Instant
Payments," Blockchain Problems and solutions, 2016.
|
[25]
|
Q. T.
Zhong and Z. Cole, "Analyzing the Effects of Network Latency on
Blockchain Performance and Security Using the Whiteblock Testing
Platform," Blockchain Performance and Security, 2018.
|