14 research outputs found
LApps: Technological, Legal and Market Potentials of Blockchain Lightning Network Applications
Following in the footsteps of pioneer Bitcoin, many altcoins as well as
coloured coins have been being developed and merchandised adopting blockchain
as the core enabling technology. However, since interoperability and
scalability, due to high and capped (in particular cases) transaction latency
are deep-rooted in the architecture of blockchain technology, they are by
default inherited in any blockchain based applications. Lightning Network (LN)
is one of the supporting technologies developed to eliminate this impediment of
blockchain technology by facilitating instantaneous transfers of cryptos. Since
the potentials of LN is still relatively unknown, this paper investigates the
current states of development along with possible non-monetary usage of LN,
especially in settlement coloured coins such as securities, as well as creation
of new business models based on Lightning Applications (LApps) and microchannel
payments as well as micro-trades. The legal challenges that may act as
impediment to the adoption of LN is also discussed.Comment: ICISDM 2019, published by AC
Internet of Nano-Things, Things and Everything: Future Growth Trends
The current statuses and future promises of the Internet of Things (IoT), Internet of Everything (IoE) and Internet of Nano-Things (IoNT) are extensively reviewed and a summarized survey is presented. The analysis clearly distinguishes between IoT and IoE, which are wrongly considered to be the same by many commentators. After evaluating the current trends of advancement in the fields of IoT, IoE and IoNT, this paper identifies the 21 most significant current and future challenges as well as scenarios for the possible future expansion of their applications. Despite possible negative aspects of these developments, there are grounds for general optimism about the coming technologies. Certainly, many tedious tasks can be taken over by IoT devices. However, the dangers of criminal and other nefarious activities, plus those of hardware and software errors, pose major challenges that are a priority for further research. Major specific priority issues for research are identified