8 research outputs found
A compute and wait in pow (Cw-pow) consensus algorithm for preserving energy consumption
Several trusted tasks use consensus algorithms to solve agreement challenges. Usually, consensus agreements are used to ensure data integrity and reliability in untrusted environments. In many distributed networking fields, the Proof of Work (PoW) consensus algorithm is commonly used. However, the standard PoW mechanism has two main limitations, where the first is the high power consumption and the second is the 51 % attack vulnerability. In this paper, we look to improve the PoW consensus protocol by introducing several proof rounds. Any given consensus node should resolve the game of the current round Roundi before participating in the next round Roundi+1 . Any node that resolves the game of Roundi can only pass to the next round if a predetermined number of solutions has been found by other nodes. The obtained evaluation results of this technique show significant improvements in terms of energy consumption and robustness against the 51 % and Sybil attacks. By fixing the number of processes, we obtained an energy gain rate of 15.63 % with five rounds and a gain rate of 19.91 % with ten rounds
Blockchain technology research and application: a systematic literature review and future trends
Blockchain, as the basis for cryptocurrencies, has received extensive
attentions recently. Blockchain serves as an immutable distributed ledger
technology which allows transactions to be carried out credibly in a
decentralized environment. Blockchain-based applications are springing up,
covering numerous fields including financial services, reputation system and
Internet of Things (IoT), and so on. However, there are still many challenges
of blockchain technology such as scalability, security and other issues waiting
to be overcome. This article provides a comprehensive overview of blockchain
technology and its applications. We begin with a summary of the development of
blockchain, and then give an overview of the blockchain architecture and a
systematic review of the research and application of blockchain technology in
different fields from the perspective of academic research and industry
technology. Furthermore, technical challenges and recent developments are also
briefly listed. We also looked at the possible future trends of blockchain
Recommended from our members
Function Virtualization Can Play a Great Role in Blockchain Consensus
Bitcoin introduced a cryptocurrency as a form of public ledger consequently that turned into a most popular security technology, Blockchain. Its integrated mining technology lies the key security mechanism. The system allows forming a pool mining group to solve a particular job and share their revenues to their CPU usage while one of them successfully mines a block. To mine a block, a cryptographic puzzle should be solved, which requires significant compute resources that cause huge energy consumption. On the other hand, recent statistics show that low computational energy-restricted Internet of Things (IoT) devices are increasing exponentially. Although it has low energy and limited computation power, it is large in quantity when it is integrated. So we focus on a stochastic geometry theory, which resolves the issue of block mining computation via utilizing multiple mobile IoT devices, given that these IoT devices are Computation Capable Nodes (CCNs). To further normalize this issue, we propose an efficient mathematical solution that uses smart coordination of Virtual Network Functions (VNFs) for IoT devices to enable their CPU usage efficiently. At the same time, the work and credit point distribution policy is smartly handled through virtual pool mining. The proposal renders Network Function Virtualization technology to configure VNF, and Service Function Chain technology is utilized to enable the network flow of such VNFs. New algorithms are presented to solve multiple issues like node discovery, computation offloading, and work credit point distribution. Our goal is to minimize energy consumption within the given time constraint. Implementation results show that although virtual functions for block mining require extensive computations in IoT devices, dividing computation work into small fractions called tasks embedded with VNF, and offloading them to nearby CCNs, tend to minimize the cost and energy consumption of individual shared miners. The overall mining process is proved efficient and faster
PUBLIC BLOCKCHAIN SCALABILITY: ADVANCEMENTS, CHALLENGES AND THE FUTURE
In the last decade, blockchain has emerged as one of the most influential innovations in software architecture and technology. Ideally, blockchains are designed to be architecturally and politically decentralized, similar to the Internet. But recently, public and permissionless blockchains such as Bitcoin and Ethereum have faced stumbling blocks in the form of scalability. Both Bitcoin and Ethereum process fewer than 20 transactions per second, which is significantly lower than their centralized counterpart such as VISA that can process approximately 1,700 transactions per second. In realizing this hindrance in the wide range adoption of blockchains for building advanced and large scalable systems, the blockchain community has proposed first- and second-layer scaling solutions including Segregated Witness (Segwit), Sharding, and two-way pegged sidechains. Although these proposals are innovative, they still suffer from the blockchain trilemma of scalability, security, and decentralization. Moreover, at this time, little is known or discussed regarding factors related to design choices, feasibility, limitations and other issues in adopting the various first- and second-layer scaling solutions in public and permissionless blockchains. Hence, this thesis provides the first comprehensive review of the state-of-the-art first- and second-layer scaling solutions for public and permissionless blockchains, identifying current advancements and analyzing their impact from various viewpoints, highlighting their limitations and discussing possible remedies for the overall improvement of the blockchain domain
All watched over by machines of loving grace: a critical look at smart contracts
Smart contracts are coded parameters written into an immutable distributed ledger called a blockchain. There has been increasing legal interest in the application of these self-executing programs to conduct transactions. Most of the scholarly and practical analysis so far has been taken the claims of this technology being akin to a contract at face value, with legal analysis of contract formation, performance, and enforcement at the forefront of the debate. This article discusses that while smart contracts may pose some interesting legal questions, most of these are irrelevant, and smart contracts should be understood almost strictly from a technical perspective, and that any legal response is entirely dependent on the technical capabilities of the smart contract. The article proposes that smart contracts are not contracts for all practical purposes
Applied Metaheuristic Computing
For decades, Applied Metaheuristic Computing (AMC) has been a prevailing optimization technique for tackling perplexing engineering and business problems, such as scheduling, routing, ordering, bin packing, assignment, facility layout planning, among others. This is partly because the classic exact methods are constrained with prior assumptions, and partly due to the heuristics being problem-dependent and lacking generalization. AMC, on the contrary, guides the course of low-level heuristics to search beyond the local optimality, which impairs the capability of traditional computation methods. This topic series has collected quality papers proposing cutting-edge methodology and innovative applications which drive the advances of AMC
Applied Methuerstic computing
For decades, Applied Metaheuristic Computing (AMC) has been a prevailing optimization technique for tackling perplexing engineering and business problems, such as scheduling, routing, ordering, bin packing, assignment, facility layout planning, among others. This is partly because the classic exact methods are constrained with prior assumptions, and partly due to the heuristics being problem-dependent and lacking generalization. AMC, on the contrary, guides the course of low-level heuristics to search beyond the local optimality, which impairs the capability of traditional computation methods. This topic series has collected quality papers proposing cutting-edge methodology and innovative applications which drive the advances of AMC