Loading...

Messages

Proposals

Stuck in your homework and missing deadline?

Get Urgent Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework Writing

100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Evaluating the Impact of Network Latency on the Safety of Blockchain Transactions

Category: Business & Management Paper Type: Report Writing Reference: APA Words: 6764

Blockchain technology applications in healthcare: An overview -  ScienceDirect


Abstract

            Blockchain technology is a very useful and effective technology and capable to perform complex processes. Furthermore, computing processes can be complex and needs high-level security. It is used to make processes optimized as well as it also supports each process to increase the speed. The project is evaluating the network latency and checking the impact on blockchain-based transactions. The block time in the network can be effective for businesses and many industries in the world and it can reduce the workability of the business processes. Blockchain technology provides many services in blockchain transactions, and improve the processes through increased security. Furthermore, in distributed leader technologies, it is hypothesized that blockchain would serve as a catalyst for global disruptions, and those blockchain-based applications in many industries such as the supply chain; the medical and legal fields are now being developed and implemented. This research study discussing the impact of network latency in which different techniques such as PoWare discussed. The divergences between these latest blocks open the transactions in question to the possibility that the blockchain fork will not be used. We concentrate on evaluating block detection accuracy and the breach of the six confirmed blockchain agreement.

Introduction

There are special properties in Blockchain. When data is used in a committed blockchain contract, it is in practice unchanged. The unchangeable sequence of past transactions authenticated by cryptography does not replicate stored data. Cryptographic tools also promote data privacy, offers open public access to blockchain data and fair protection empower each participant to access and exploit a blockchain in the same way. The communications between nodes in the network gain trust in the blockchain. Blockchain network users depend instead on the blockchain network itself to render transfers easy for trustworthy third parties who can monitor and exploit the mechanism and are a single point of failure. Blockchain opposed both data protection and scalability.

There are no privileged users, and each member may access the details on the Blockchain through the network. The secrecy is limited.Through increasing network latency, the block convergence of blockchain can quickly be broken down. Ideally, nodes can listen as easily as possible to freshly mined blocks. Faster delivery to a new block's network encourages other nodes to verify it faster, encouraging the blockchain to update for the new block that is validated. The blockchain would thus stabilize in shorter timeframes to a globally converged state. However, as network latency decreases, the blockchain is far more likely to form forks because various nodes remove several new blocks. The diversity of new blocks will lead to honest nodes becoming confused about which fork is the longest chain, destabilizing global consensus.

The disparity between these new blocks opens the subsequent transactions to the possibility of a not adopted blockchain fork. Nodes with lower latency can gain disproportionate control over greedy mining when situations with variable network latency are present in various nodes. Modern technologies designed for high-latency communications in the network context, blockchain protection might become vulnerable by delaying communication between blockchain maintainers[1].The important thing is that the Blockchain consensus algorithm only guarantees probabilistic accuracy. Solid continuity may bring three essential benefits to cryptocurrencies. Second, any mining company immediately agree on the validity of blocks without wasting computer resources to fix discrepancies (forks). Secondly, consumers do not wait until lengthy times are confident a requested transaction will be committed; the transaction can be deemed as validated as soon as it occurs inside the blockchain. Third, good durability offers protection for the future: when a block is added to the blockchain, it remains for always. While the consistency of cryptocurrencies has been proposed, current proposals abandon blockchain de-centralization and/or implement fresh and non-intuitive security assumptions or refuse to show efficiency and scalability experimentally[2].

Literature Review

According to Vukolić[3], Across the thousands of nodes, the utility of the globe has been particularly demonstrated by the Bitcoin cryptocurrency. It is also necessary for various other processes and perspectives.  Due to such kinds of various terms, digital transactions are changing the world forever. In the initiating time of Bitcoin, its performance was probably lower, and later on, it has become faster. The consequences fabric was introduced particularly for the probabilistic proof of work. This particular term and process are known as the blockchain which was not considered as the major issue. The study of Vukolić, (2015) is particularly contrasted the PoW based blockchain with the BFT state replication machine that analyze the PoW-based blockchains that state the condition of machine replication[3].

As indicated in the study ofKuzlu [4],this study is particularly focusing on the most important and famous source of the blockchain frameworks, which is particularly known as the Hyper ledger fabrics. The particular study examines the effect of the workload of the network for the performance platform of the blockchain. In this study, the platform of the Hyperledger Fabric is evaluated particularly in specific terms of the throughput. It includes latency, scalability, and successful transactions. The specifications of the blockchain, also include the time responses per transactions. It also includes the scale scalability of the participants in specific manners. He researchedto investigate the performance of a different version of Hypeledger fabric that evaluates specific terms of throughput[4].  

According to Yazdinejad[5], the technology is considered as a dispersed record without any concentrated administration that is particular utilized to store entire exchanges of transactions, which prompts a lot of information that increments after some time. The gadgets of IoT are generally obliged in energy, stockpiling, and calculation. These are probably not utilized for going to have the option that is required to store all information of blockchain. An Enormous Amount of information sums will be more articulated along with the expanding IoT gadgets and blockchain use cases including IoT. It also includes the current implementation that is required for blockchain and it is also utilized for friendly IoT. The research is based on the research about different aspects to get the proof of work. It is considered common gadgets that are based on energy, stockpiling, and calculations of figure[5]

According to King [6] said that Satoshi Nakamoto's Bitcoin A shared cryptographic money configuration has been got derived. To give the majority of the organization security, the evidence of-stake replaces confirmation of-work is required.  By considering such kinds of the particular design of the verification of-work chiefly, it gives largely nonessential as well as initial minting in long run. The level of security of the organization isn't subject to utilization energy in the drawn-out along with these lines in order giving an energy effective as well as peer to peer cryptocurrencies that is more competitive than others. On the coinage confirmation, of-stake depends as well as it is created by every hub through a hashing plan bearing comparability to Bitcoin's yet over restricted hunt space. The research provided the procedure for the blockchain transaction settlement. It provides nonessential monitoring of the work in the long run[6].

According toCrosby[7], The Shared advanced cash is decentralized by Bitcoin that is considered the most well-known model utilizes for the innovation of blockchain. The advanced and mostly innovative cash bitcoin itself is considered exceptionally disputable that is referred to as the fundamental of the technology of blockchain. It has worked faultlessly and discovered a wide scope of utilization in both worlds monetary and non-monetary. It is considered as the primary theory is that the blockchain is utilized to builds up an arrangement of making a conveyed agreement in the computerized online world. This is required permits taking an interest substance to know for sure that a computerized occasion occurred by making an undeniable record in a public record. It is specifically utilized for opening the entry that is required for building up popularity which is based on the adaptable computerized economy from various concentrated ones[7].

Alrubei[8]has explained for some applications, the individual and organization are progressively using the Internet of Things (IoT) and its products. In various kinds of smart devices, this usage implies increments that are associated with the Internet of Things. It will altogether utilize to build the difficulties that are identified with these specific devices. It includes interconnectivity and the executives, information and client protection, and organization, information, along with the security of devices. Simultaneously, the approaches blockchain gives a decentralized, permanent, and technology of peer to peer ledger that could be the correct response for all of these various challenges. In any case, huge difficulties go with the mix of blockchain into the Internet of Things. Since the smart devices of IoT may experience the bad effects of asset and force requirements. Blockchain is related to adaptability and postpones issues. The research providesa gap for future work and it is considered to be helpful to resolve future challenges. His work is authentic and explored a broad scope of utilization of monetary and non-monetary funds[8].

Astarita[9]has indicated in this study that the particular literature is presented in the study related to the use of blockchain, which is based upon the frameworks in transportation. The major principle point that was required to recognize, by considering the usage of a multi-step technique. It includes momentum research patterns, fundamental holes in the writing, and conceivable future difficulties. Initially, a bibliometric examination was done to acquire an expansive diagram of the subject of interest. In this way, the most persuasive commitments were analyzed particularly for a top to bottom. It is also concerning the following two regions: street traffic the board and keen urban areas store network and coordinations. He showed that practical blockchain is required to implement the IoT that providesan opportunity to use smart devices and gain experience for the asset’s requirements[9].

According to Gervais[10] said the current scalability of the measure has been presentedin the particular study of Gervais. It is adopted by Bitcoin that is come with various security systems. The systems of the bitcoin can not be explained easily. Specifically, this paper is conducted to present an adversary exploit that is required to effectively measure propagation that has been delayed. It also includes the transaction which are required blocks the specific nodes. It is also required for siderbale amount of time by considering its causes network partitioning in its particular systems. It includes the information which is specifically received by the nodes of Bitcoins. It is utilized to modifies their various views of ledger states. He provided the main theme to research the new trend of the research that implements different methodology. It examines the bibliography that is based on the interests of research. 

Bonneau[11]has explained in his study that the cryptographic currency [11]most popular in history, Bitcoin has appeared. Within two years of Bitcoin's quiet 2009 debut, amid just a cursory study of the system's architecture, it expanded to contain billions of dollars. Since then, increasing literature, the system's secret but essential virtues have been established, attacks uncovered, promising solutions suggested and threats for the future identified. In the meantime, a broad and diverse open-source group has introduced and adopted several amendments and extensions. We give the first Bitcoin structural exposure and the underlying cryptocurrency or 'altcoins.' We define the three key elements of Bitcoin's architecture which can be isolated from a broad range of information. Thus, Bitcoin's properties and potential viability are analyzed more thoroughly. The room for several suggestions is mapped, comparative analyses of alternative consensus structures, currency allotment mechanisms; machine puzzles, and key management instruments are presented. To evaluate several data security proposals, we review anonymity problems in Bitcoin and have an appraisal structure. Finally, we offer new ideas on what we call disintermediation protocols, which absolve the need for trustworthy intermediaries in a fascinating range of applications. We define three general disintermediation methods and offer a thorough comparison. He explained about current scalability measures that are adopted by Bitcoin. It demonstrated that it required effective measures propagation that is not being worked[11].

According to Putri[12], the highest market share of all digital currencies lies with Bitcoin. Transaction protection in Bitcoin is protected using the hash-based work proof (PoW) mechanism of blocks. Bitcoin PoW takes an average of 10 minutes to complete, and for a single device transaction, six consecutive blocks are recommended. PoW is a functional protocol validating all incoming data for spam and DDoS attacks (Distributed Denial of Service). The ego miner is an infringement on Bitcoin's dignity. It is successful because fair miners have to spend part of their machine cycle on the blocks not to be in the public chain. The greedy miner is successful. To achieve better scalability, the network latency must be minimal, which decreases the amount of time taken to validate the transaction. The author will calculate the effect of block latency in Bitcoin time with a selfish attack using NS3 in this analysis. In this study, the author The test results indicate that the latency variance is applied, and the lower the MBRT value, the more produced blocks. The average MBRT of each parameter indicates the reception time required by the number of blocks between about 15 and 16 minutes. This extends the time limit for the resistance of PoW while transacting. The egotism of miners and latency are accountable.He explained and explores the first systematic exposition of Bitcoin and its relevant cryptocurrencies that offer new ideas on what we call disintermediation protocols, which absolve the need for trustworthy intermediaries in a fascinating range of applications.

As indicated in the study of Choubey, Mahidhar, Misra, Behera, & Patel [1], there is a need for a highly safe and privacy-protected transaction environment in a decentralized V2V energy trading between electric vehicles (EVs). Most blockchain apps have a similar cryptocurrency infrastructure for safe processing as digital currencies such as Bitcoin come into play. In this piece, we suggest a blockchain-based approved electrical trading mechanism to improve the protection and privacy of the details of the EV customer. We are launching a new "ETcoin" crypto-currency for electricity trading. All of these matched offers are held in blockchain with a traded power unit and exchanged Ecoins. Using large-scale Big Data Analytics, the transaction graph generated by energy trading can be analyzed. Current works have not dealt with blockchain technology to process massive energy trading transaction graphs. Analytics was considered for any blockchain transactions submitted over a pre-defined duration. For the Blockchain analysis of broad-scale transaction graphs, we suggest an Energy Exchange Rank (ETR) algorithm. ETR algorithm uses the Weighted Ranking method to measure the ETR score for each VR over a traded time, which takes into account both the edge and vertex properties of the graph. Transaction graph analytics on trade in energy services to prove its activity and to enable the EVs to engage in the most environmentally friendly way. We used IBMs hyperladen cloth, the composer with reduced transaction delay, and in-time device templates for each participant in the system. We applied the blockchain-based Proof of Concept (POC). For real-time, dataflow processing distributions, transaction graph analytics are deployed using Apache Spark's open-source GraphX library. Transactions are modeled as edge triplets on many computers, and the ETR score is determined to converge with a set of tolerances for any vertex at the same time. The simulation results show that, as parallel machines grow, the algorithm converges faster and scaled better. We also evaluated that the total reward benefit for EVs with optimum, real, and dedicated participation improves so the scheme is active. They had thoroughly offered new ideas on what we call disintermediation protocols, which absolve the need for trustworthy intermediaries in a fascinating range of applications. They explained the methods to achieve better scalability; the network latency must be minimal, which decreases the amount of time taken to validate the transaction[1].

According to Conti, E, Lal, & Ruj [13], Bitcoin is a common cryptocurrency that contains the details in a distributed appended-only public ledger called a blockchain. Bitcoin's protection primarily depends on the distributed consensus protocol based on the reward compliant proof-of-work (PoW) mechanism operated by the miners' Networks. The miners are required to preserve the blockchain sincerely in substitution for the opportunity. Bitcoineéconomie has risen at a tremendous pace since its introduction in 2009 and now stands at some 150 trillion dollars. This rapid increase of bitcoin market valuation motivates adversaries to take advantage of loopholes and scientists to identify new device flaws, propose countermeasures, and foresee the coming developments. In this article, the security and privacy dimensions of Bitcoin have been surveyed extensively. We begin by presenting a summary of the Bitcoin framework and its key components and their operating characteristics and interactions[13].

We review the current vulnerabilities in Bitcoin and the main underlying technology like blockchain and a consensus protocol centered on PoW. These vulnerabilities lead to numerous security threats against Bitcoin's standard function. We then evaluate whether state-of-the-art safety solutions can be practical and durable. Besides, the latest anonymity issues of Bitcoin and the safety risks to consumers of Bitcoin are addressed as well as analyses of established secrecy solutions. In conclusion, we outline the crucial open problems and offer recommendations for future investigation to provide Bitcoin with rigorous protection and privacy solutions[13].

As indicated in the study of Ersoy, Ren, Erkin, & Lagendijk,[14] Current blockchain technologies depend on structures of peer-to-peer spread where nodes are receiving their neighbors during a network transaction. Unfortunately, such transaction propagation would not give explicit rewards. Therefore, in a completely autonomous blockchain with rational nodes, current dissemination processes would not stay viable. In this work, the problem with incentivizing transaction propagation nodes is described formally. We are suggesting an incentive system in which the transaction fee is shared to each node participating in the spread of a transaction. We also explain that Sybil is our proposal. We also integrate the reward mechanism with intelligent routing to simultaneously reduce connectivity and storage costs. The suggested routing function reduces the redundance of the transaction from network size to an average shortest distance factor. A particular form of consensus is formed for this routing process, in which the round leader who constructs the transaction block is decided in advance. Please notice that our routing system is standardized and can be used independently of the reward mechanism[14].

According to Decker & Wattenhofert[15], Bitcoin is a decentralized currency that does not count on a single authority, in contrast to traditional currencies. Instead, Bitcoin depends on a voluntary network that mutually implements and verifies the transactions. In this paper, we discuss how Bitcoin uses multi-hop transmission to distribute transactions and network blocks to upgrade replicas of the LED. We then use the information obtained to validate that the network spread delay is the key cause of blockchain forks. Blockchain forks should be avoided because they are symptomatic of the incoherence of the network replicas. We further demonstrate what can be done with unilateral improvements in the actions of the customer by bringing the new protocol to the limit[15].

According to Dirgantoro, Lee, & Kim [16], this essay proposes to acknowledge the face of the safety infrastructure focused on artificial intelligence and small data set edge computing. Generative opposing networks (GANs) are used to exploit the data set to solve the problem of the exact constraint of the data set. The average precision of GANs reaches 92.79% of the minimal results. Edge computer is used with the Jetson Nano board to resolve the cloud delay, which creates an average of 8.8 frames per second. Also, the sensed face pays for the blockchain network with low static difficulties in opening the door or door lock employing an intelligent contract. In contrast, the demonstration of the consent algorithm in transaction times of around 33-39 milliseconds is exceeding a low static complexity[16].

According to Dorri, Steger, Kanhere, & Jurdak[17], Linked smart vehicles provide a range of advanced car owners, traffic agencies, automakers, and other service providers with a wide range of services. This could open intelligent vehicles to a variety of risks to safety and privacy, such as location detection or remote hijacking. In this post, we suggest that the groundbreaking platform blockchain (BC), which discovers multiple technologies from cryptocurrency to smart contracts, may fix the problems. We deliver a BC architecture that safeguards users' privacy and improves vehicle ecosystem protection. The effectiveness of the proposed security architecture can be demonstrated by wireless remote app upgrades and other new utilities, such as car complex insurance costs. We also promote architectural resistance to common security threats in a qualitative way[17].

According to Nakamoto[18], a variant of electronic cash solely peer-to-peer will allow the transfer of online paying money from one party to the next without a financial institution. Digital signatures offer part of the solution, but key advantages would be missed if a trustworthy third party remains essential to avoid replication. We suggest a solution to the issue of double-spending using a network of pairs to pairs. The network timestamps transactions by hashing them through a dangerous proof of operating chain, making a record that cannot be altered without the proof of work being replenished. Not only does the longest chain act as evidence of the sequence of events, but it demonstrates that it originated from the greatest pool of CPU capacity. As long as most CPU power is managed by nodes that do not cooperate to attack the network, the longest chain and out-pace attackers are created. The network itself has to be organized minimally. Messages are sent on the best effort, and nodes will leave and re-enthusiastically rejoin the network and embrace the longest evidence chain to show their mistake[18].

As indicated in the study Fabiano[19], the IoT is revolutionary and important but should take into consideration the legal problems relating to the data security legislation, as well as applications for different services. Legal problems relating to data security and privacy legislation should, however, be taken into consideration. It is welcome to have technical solutions, but the threats that we cannot overlook need to be addressed before designing applications. Personal knowledge is worthwhile. The assessment and prevention, taking the privacy in each project by design approach, is important in this sense. In this context. Concerning privacy and protection threats, certain concerns with possible data security and liability implications are present. We can move data on the Internet, including personal information, via the IoT device. The latest European General Data Protection Regulation (GDPR), which will apply on 25 May 2018 and has been in effect since 24 May 2016, is relevant to remember in this sense. In the light of infringements of the Law, the GDPR is implementing data security evaluation (DPIA), data breach information, and very serious administrative penalties. A thorough legal review encourages risk management to be undertaken to avoid the abuse of sensitive knowledge[19].

The IoT environment evolves rapidly with numerous implementations in diverse fields. Big Data and the blockchain are the key subjects for the last time. Because of its future specific use for utilities and software, the more recent is provided priority and improved safety steps are taken to ensure a stable device. But analyzing the legal questions leading to them is equally relevant. Everyone has the freedom to defend his or her personal records. Here we cannot refuse the promise that any program is appropriate to secure sensitive data. We cannot reject the appeal. The contribution discusses the key legal issues relating to the security of privacy and records, notably with regard to the blockchain, focussing on the GDPR approach to privacy by design. I sincerely assume, however, that it would be possible for companies to create a global privacy standard system for data security.

According to HAFID, HAFID, & SAMIH [20], it was a lot recognized and widely extended in recent years by Blockchain (e.g. Bitcoin and Ethereum). But the scalability of blockchain continues to be an obstacle. This paper outlines the current solutions to the scalability of blockchains and can be divided into two categories: first layer, and second layer solutions: first layer, secondary layer solutions, first layer solutions, and block chaining frameworks. We focus in particular on sharding the scalability problem as a promising first layer solution; the core concept behind sharding consists of breaking up the blockchain network into numerous commissions, each handling a different collection of transactions. In specific, (a) we are proposing a taxonomy focused on committee consensus and committee membership; and (b) we are contrasting the key current blockchain protocols based on sharing. Furthermore, we present the advantages and drawbacks of current scalability technologies in a performant comparative study (i.e., efficiency and latency)[20].

Hari, Kodialam, & Lakshman [21] has explained that The Bitcoin blockchain is a decentralized, distributed directory that facilitates trustworthy transactions between non-reliable businesses. However, certain implementations need much quicker transaction recognition than the existing Bitcoin blockchain. In this article, we are proposing an extremely successfully developed, low-latency definite method called ACCEL to accelerate the block validation mechanism of Bitcoin. The accelerated labeling of the singular components of the blockchain is our main concept for quicker proof. Since it may not be definitively established if a block belongs to a blockchain while the northbound delays are infinite, a special block identification shows that the bottom-to-bottom latency of Bitcoin miners is considerably below and can be supposed to be upper restricted. ACCEL is particularly appropriate for low-latency blockchains where block spacing can be tailored for the limited latencies of the network to increase the output dramatically. With comprehensive simulations and actual execution, we test ACCEL's performance, designed with minimal adjustments and completely compliant with the Bitcoins blockchain. We demonstrate that transaction validation latencies can be reduced with ACCEL to milliseconds and thus satisfy the performance requirements of a large variety of applications with adequate constraints on end-to-end latency[21].

According to Khan, Jung, Hashmi, & Waqas[22],In recent years, academics and business experts have paid considerable attention to state-of-the-art Blockchain technologies. Blockchain is essentially a global, immutable, user-focused blockchain network that uses transactions exclusively through multiple nodes through a shared awareness of all the related network nodes. Blockchain is known for the cryptocurrency of Bitcoin. Blockchain has had multiple applications with a global valuation of 150B disrupted since 2017. The consensus models are responsible for committing to a new block between all blockchain nodes. The consensus paradigm plays an important role in preserving productivity in Blockchain. Using the proper consensus model, the efficiency of the blockchain can be greatly improved. There are two types of consensus structures. The first type is the evidence-based consensus model, which offers enough evidence for a node in the Blockchain against other nodes to allow the next block to be put in the chain. The second type is the voting model in which nodes must share their votes before they validate a new block transaction. In this document, we examine the features and critical feedback on the performances of some of the most current consensus models. These factors are analyzed primarily for transaction throughput, latency, the bandwidth of the network, and storage[22].

As depicted in the study of Kosba, Miller, Shi, Wen, & Papamanthou, [23] Key element contract structures over decentralized cryptocurrencies allow mutually distrustful parties without trustworthy third parties to transact safely. The transparent blockchain guarantees that honest parties are paid for mutual breaks or abortions. Yet there is no transactional anonymity on current networks. Both transfers, including cash flow between pseudonyms and transactions in the number, will appear on the blockchain. We introduce Hawk, a decentralized intelligent contract scheme that does not clear up financial transactions in the blockchain and hence maintains public transactional anonymity[23].

According to Poon & Dryja[24], the bitcoin Protocol will now include the global volume of financial transactions in all e-payment networks without any single third party custodial supported or enabling participants to use a broadband link on a device. A decentralized mechanism is proposed under which micropayment networks (i.e. payment channels or transaction channels) are sent via a network of transactions of off-blockchain exchanging value. If Bitcoin transactions can be signed with a new form of sighash that resolve mixability, such transfers can take place between untrusted parties along the transfer path, under agreements that can be implemented, in the case of an uncooperative or aggressive party, by a sequence of decremental time blocks, through a Bitcoin blockchain broadcast[24].

Citations

Objective

Algorithms

Tool and Technique

Significant Results

[3]

To analyze the  PoW-based blockchains to those based on BFT state machine replication

POW and BFT

 Byzantine fault-tolerant (BFT

Cryptocurrency

The study has contrasted the PoW based blockchain with the BFT state replication machine.

[4]

To examine the performance analysis of the two versions of Hyperledger Fabric, v0.6, and v1.0.

Hyperledger Fabric, v0.6, and v1.0.

It results in evaluatesthroughput, metrics, scalability, execution time, and latency

the platform of the Hyperledger Fabric is evaluated particularly in specific terms of the throughput

[5]

To explores the various aspects of Secure and Low latency Proof of Work (SLPoW) protocol

Field-programmable gate array (FPGA), Proof of Work (PoW)

To improve the processing speeds of the computation Field the programmable gate array (FPGA) has been used

The gadgets of IoT are generally obliged in energy, stockpiling, and calculation.

[6]

To explores the process if the blockchain history and transaction settlement

PPCoin

hybrid design proof-of-work

It gives largely nonessential as well as initial minting in the long run

[8]

To explores the topic of the current research challenges along with blockchain future direction

Systematic literature review

To explain the technology of Bitcoin by considering Bitcoin

It has worked faultlessly and discovered a wide scope of utilization in both worlds monetary and non-monetary

[9]

To demonstrates a blockchain practical incorporation that is required the Internet of Things

Ethereum Proof of Authority (PoA).

Performance analyses,

The smart devices of IoT may experience the bad effects of asset and force requirements.

[10]

The major aim of explores the trends of the research along with the implementation of the multistep methodology

bibliometric analysis

multi-step

methodology

 

Initially, a bibliometric examination was done to acquire an expansive diagram of the subject of interest.

[11]

To examine current scalability measures that are adopted by Bitcoin

Nit identified

Systematic review

It has been presented an adversary exploit that is required to effectively measure propagation that has been delayed.

[12]

 To explain and explores the first systematic exposition of Bitcoin and its relevant cryptocurrencies

'altcoins.'

Drawing from a scattered body of knowledge,

we offer new ideas on what we call disintermediation protocols, which absolve the need for trustworthy intermediaries in a fascinating range of applications

[1]

In this study, the author examines test results that indicate that the latency variance is applied, and the lower the MBRT value, the more produced blocks.

NS3, MBRT

PoW) mechanism

. To achieve better scalability, the network latency must be minimal, which decreases the amount of time taken to validate the transaction.

[13]

To explore that Bitcoin is a common cryptocurrency that contains the details in a distributed appended-only public ledger called the blockchain

 

PoW mechanism

They explained that preserve the blockchain sincerely in substitution for the opportunity.

[14]

To learn about the problem with incentivizing transaction propagation nodes is described formally

peer-to-peer review

Nodes to determine the blockchain

A blockchain with rational nodes, current dissemination processes would not stay viable. It also integrates the reward mechanism with intelligent routing to simultaneously reduce connectivity and storage costs

[15]

To research that Bitcoin is a decentralized currency that does not count on a single authority, in contrast to traditional currencies

Blockchain forks

Verification of transactions

what can be done with unilateral improvements in the actions of the customer by bringing the new protocol to the limit?

[16]

It proposes to acknowledge the face of the safety infrastructure focused on artificial intelligence and small data set edge computing

Generative opposing networks (GANs)

Opening and lock of door with face sensing

to exploit the data set to solve the problem of the exact constraint of the data set

[17]

It provides a range of advanced car owners, traffic agencies, automakers, and other service providers with a wide range of services

cryptocurrency

safeguards users' privacy

Explained about open intelligent vehicles to a variety of risks to safety and privacy, such as location detection or remote hijacking

[18]

It suggests a solution to the issue of double-spending using a network of pairs to pairs

Pool of CPU

Connection of networks

A variant of electronic cash solely peer-to-peer will allow the transfer of online paying money from one party to the next without a financial institution

 

Discussion

In the 21sy century, it has become very important that the information related to transactions is transparent. When the information related to transactions is going to be transparent than the issues such as fraud or manipulation of information will not occur. Blockchain technology is like a ledger thatis distributed to each individual who is part of a network. It means that blockchain increases the transparency of the information. This research will try to evaluate how much transparency does blockchain technology provides and how it reduces the risk related to fraud. As discussed earlier the research aims to provide deep insights into the risks & benefits of Blockchain technology.

The research will evaluate the benefits of this technology from different aspects such as security, accuracy, efficiency, cost reduction, and traceability. Any organization needs to perform its finance-related activities efficiently otherwise various issues can arise which not only decreases the performance of the organization but also the profitability of the organization decreases as a result. There is a need for such technology that improves the security and efficiency of the activities so that organizations can manage their financial activities more accurately. Blockchain technology has proved beneficial for finance-related activities or transactions because not only does the speed of the process increase but also the security of the process also increasesas a result of this technology. However, it is not known how much blockchain can support an organization and whether its benefits are more than the risks or not.

Furthermore, the cost and challenges, at present, associated with a blockchain technology use for recordkeeping of the public of Vermont outweigh the identifiable benefits. The authors of this research emphasized that providing the blockchain technology’s legal recognition may create the advantage as a “first mover” with the potential to bring the activity of the economy surrounding the blockchain technology’s development to Vermont. However, according to the authors, this potential is challenging to capture and difficult to quantify because of the nature of technology.

It has been discussing in this study that Bitcoin cryptocurrency, blockchain technology is characterized as the decentralized, distributed, open-source database for storing information of the transaction. Rather than trusting the centralized intermediaries such as banks or other financial institutions, two parties are allowed by this technology to transact directly using linked and duplicate ledgers known as blockchains. According to the authors, blockchain technology makes the transaction more transparent than other centralized systems. Transactions, as a result, are executed without relying on a third party. Moreover, the authors have credited the blockchain as bringing transparency of the supply chain to a new level, but, according to the authors, currently, managerial and academic blockchain technology adoption is limited.

Conclusion

            It is concluded that cryptographic tools also promote data privacy, offers open public access to blockchain data and fair protection empower each participant to access and exploit a blockchain in the same way.The diversity of new blocks will lead to honest nodes becoming confused about which fork is the longest chain, destabilizing global consensus. The important thing is that the blockchain consensus algorithm only guarantees probabilistic accuracy. Solid continuity may bring three essential benefits to cryptocurrencies. While the consistency of cryptocurrencies has been proposed, current proposals abandon Blockchain de-centralization and/or implement fresh and non-intuitive security assumptions or refuse. This article applies to a collective group of miners who have a stable consensus protocol on the global state. Round robin (RR) is typically used in Blockchain permitted. The method offers the ability to publish your latest block to the next node in the queue. We assess and thus revoke transactions the effect of various network latency settings on blockchain security.Relationship between winner number and blockchain length. The length of the blockchain can be seen to be purely equal to the number of winners at each network latency.

 


 

References

[1]

A. Choubey, K. Mahidhar, R. Misra, S. Behera, and Y. S. Patel, "EnergyTradingRank Algorithm for Truthful Auctions among EVs via Blockchain Analytics of Large Scale Transaction Graphs," 2019 11th International Conference on Communication Systems & Networks (COMSNETS), 2019.

[2]

X. Zheng, M. Li, Y. Chen, J. Guo, and M. Alam, "Blockchain-Based Secure Computation Offloading in Vehicular Networks," IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2020.

[3]

M. Vukolić, " The quest for scalable blockchain fabric: Proof-of-work vs. BFT replication. In," International workshop on open problems in network security (pp. 112-125). Springer, Cham., 2015.

[4]

M. P. M. G. L. &. R. S. Kuzlu, " Performance analysis of a hyperledger fabric blockchain framework: throughput, latency, and scalability," In 2019 IEEE international conference on blockchain, pp. (Blockchain) (pp. 536-540)., 2019, July.

[5]

A. S. G. P. R. M. D. A. K. H. &. K. S. R. Yazdinejad, "SLPoW: Secure and Low Latency Proof of Work Protocol for Blockchain in Green IoT Networks.," In 2020 IEEE 91st Vehicular Technology Conference (VT, 2020, May.

[6]

S. &. N. S. King, "Ppcoin: Peer-to-peer crypto-currency with proof-of-stake.," self-published paper, August, pp. 19, 1., 2012.

[7]

M. P. P. V. S. &. K. V. Crosby, " Blockchain technology: Beyond bitcoin.," Applied Innovation, pp. 2(6-10), 71., 2016.

[8]

S. M. B. E. A. R. J. M. &. W. C. A. Alrubei, "Latency and Performance Analyses of Real-World Wireless IoT-Blockchain Application.," IEEE Sensors Journal, pp. 20(13), 7372-7383., 2020.

[9]

V. G. V. P. M. G. &. S. V. Astarita, " A review of blockchain-based systems in transportation.," Information, pp. 11(1), 21., 2020.

[10]

A. R. H. K. G. O. &. C. S. Gervais, "Tampering with the delivery of blocks and transactions in bitcoin.," In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. (pp. 692-705)., 2015.

[11]

J. M. A. C. J. N. A. K. J. A. &. F. E. W. Bonneau, "Sok: Research perspectives and challenges for bitcoin and cryptocurrencies.," In 2015 IEEE symposium on security and privacy (pp. 104-121). IEEE., 2015.

[12]

B. D. C. &. S. R. F. Putri, "The Effect of Latency on Selfish-Miner Attack on Block Receive Time Bitcoin Network Using NS3.," In 2018 12th International Conference on Telecommunication Systems, Services, and Applications (TSSA) (pp. 1-5)., 2018.

[13]

M. Conti, S. K. E, C. Lal, and S. Ruj, "A Survey on Security and Privacy Issues of Bitcoin," IEEE Communications Surveys & Tutorials, pp. 1553-877X, 2018.

[14]

O. Ersoy, Z. Ren, Z. Erkin, and R. L. Lagendijk, "Transaction Propagation on Permissionless Blockchains: Incentive and Routing Mechanisms," 2018 Crypto Valley Conference on Blockchain Technology, pp. 20-30, 2018.

[15]

C. Decker and R. Wattenhofert, "Information Propagation in the Bitcoin Network," 13-the IEEE International Conference on Peer-to-Peer Computing, 2013.

[16]

K. P. Dirgantoro, J. M. Lee, and D.-S. Kim, "Generative Adversarial Networks Based on Edge Computing With Blockchain Architecture for Security System," Authorized licensed use limited to Auckland University of Technology, pp. 039-042, 2020.

[17]

A. Dorri, M. Steger, S. S. Kanhere and R. Jurdak, "BlockChain: A Distributed Solution to Automotive Security and Privacy," AutomotIve networkIng And ApplIcAtIons, pp. 119-125, 2017.

[18]

S. Nakamoto, "Bitcoin: A Peer-to-Peer Electronic Cash System," 2018 Annual National Seminar, 2018.

[19]

N. Fabiano, "Internet of Things and Blockchain: legal issues and privacy. The challenge for a privacy standard," 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), 2017.

[20]

A. HAFID, A. S. HAFID, and M. SAMIH, "Scaling Blockchains: A Comprehensive Survey," IEEE Access, 2016.

[21]

A. Hari, M. Kodialam and T. Lakshman, "ACCEL: Accelerating the Bitcoin Blockchain for High-throughput, Low-latency Applications," Blockchain, 2018.

[22]

D. Khan, L. T. Jung, M. A. Hashmani and A. Waqas, "A Critical Review of Blockchain Consensus Model," 2020 3rd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET), pp. 2-6, 2020.

[23]

A. Kosba, A. Miller, E. Shi, Z. Wen, and C. Papamanthou, "Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts," 2016 IEEE Symposium on Security and Privacy, pp. 839-858, 2016.

[24]

J. Poon and T. Dryja, "The Bitcoin Lightning Network: Scalable Off-Chain Instant Payments," Blockchain Problems and solutions, 2016.

[25]

Q. T. Zhong and Z. Cole, "Analyzing the Effects of Network Latency on Blockchain Performance and Security Using the Whiteblock Testing Platform," Blockchain Performance and Security, 2018.

Our Top Online Essay Writers.

Discuss your homework for free! Start chat

Quick N Quality

ONLINE

Quick N Quality

1428 Orders Completed

George M.

ONLINE

George M.

1344 Orders Completed

Study Master

ONLINE

Study Master

1617 Orders Completed