Вы находитесь на странице: 1из 6

Blockchain Design for Trusted Decentralized IoT

Networks
Juah C Song, Mevlut A Demir, John J Prevost, Paul Rad
Department of Electrical and Computer Engineering
The University of Texas at San Antonio
One UTSA Circle, San Antonio, TX 78249
Email: juahcsong@gmail.com, mevlut.demir@utsa.edu, jeff.prevost@utsa.edu, Peyman.Najafirad@utsa.edu

Abstract—The use of Blockchain in the Internet of Things intensive tasks locally. However, these devices can offload their
(IoT) promises to provide an avenue of decentralized, fault- processing tasks to a central device with higher processing
resistant management and data immutability. The wide range power such as a cloud-based server. The crux of this approach
of research on blockchain, focused on how to improve upon its
drawbacks of latency and resource consumption, demonstrates is that the system experiences network latency. This issue can
that the blockchain design has flexibility. Almost every aspect of be addressed by introducing an edge device as an intermediary
blockchain can be tailored to fit the requirements of a desired between the end smart device and the cloud. The edge device,
application. However, the wide range of options in configuring being local to the smart devices, process strict latency tasks
blockchains presents challenges in the adoption of blockchains locally, while other tasks can be offloaded to the cloud.
to secure IoT. In this paper, we present the opportunities and
challenges of implementing blockchains and present a use case For these reasons, this model based upon cloud and edge
of integrating blockchain into an IoT framework for securing computing has proven to be particularly advantageous in data
sensor data acquisition. aggregating and processing while minimizing latency.
Index Terms—blockchain, IoT, framework, sensor data
Combining blockchain with the so-called edge-centric Inter-
I. I NTRODUCTION net of Things faces a number of readily-apparent challenges
Blockchain is a distributed means of securing data in a [7], [8]. Blockchains are typically expensive with respect to
way that is auditable, immutable, and fault-resistant. First computation, communication, power consumption, and mem-
widely introduced in 2009 [1], Bitcoin’s blockchain served as ory consumption. Given that IoT systems are generally meant
a functional proof-of-concept that removed the need for trusted to be inexpensive in many of the same areas, combining such
third parties when transacting with strangers across the world. systems with blockchain requires some creativity. The appeal
Validation of transactions no longer had to be completed by of blockchain as a security mechanism is its implementation
a centralized service such as a bank, but instead was being of a distributed ledger. Unlike the traditional approach of
carried out by a network of peers. Trust could be created in a centralized service, a blockchain system ideally does not
a trust-less environment, so long as a majority of participants have a single point of failure. Every participating node has a
were willing to play by the rules. As it first appeared, Bitcoin copy of the blockchain ledger, and changes to that ledger are
was not without its faults. Maintaining a blockchain across very difficult to make without the proper consensus of some
a wide network of peers incurs heavy cost on computation, determined number of participants. Securing an IoT system
power, and memory for every full participant. As of May with a blockchain provides a way to decentralize management
2018, the Bitcoin ledger size surpassed 196 GB [2]. Other of devices. In addition, the blockchain’s immutability can offer
Bitcoin limits are well-documented in works such as [3], [4], a way to audit and track data sources.
[5]. These works point out that Bitcoin is relatively slow to In this paper, we aim to provide a clear and simplified
process transactions, scales poorly with a growing number of perspective on blockchains in IoT centered on the flexibility
participants, and is still susceptible to a number of different of blockchain design and how it can be tailored for a high-
attacks. throughput system (i.e., sensor networks). Application-specific
Meanwhile, the number of smart devices and electronics designs must carefully consider the trade-off between security,
with on-board compute, storage, and wireless communica- privacy, and latency versus the value of the task at hand. We
tion capabilities has risen to the scale of billions [6]. This offer framework trends present in literature and propose an
exponential rise is being powered in part by the decreasing implementation of our own.
manufacturing costs of electronics and the rising pervasiveness
of communication networks such as the Internet. The typical Section II gives an overview of core blockchain concepts;
smart device is an amalgamation of sensors and actuators Section III presents trends in IoT frameworks; Section IV
designed to perform a specific task as a cohesive unit. Devices discusses blockchain parameters that can be tailored to an
such as sensor nodes and smart appliances have limited on- application; and Section V describes our implementation for
board processing power, preventing them from running CPU applying blockchain to an IoT system.

169
978-1-5386-4876-6/2018/$31.00 2018
c IEEE
II. OVERVIEW OF B LOCKCHAIN private. If any peer can append to the ledger, it is permission-
The name “blockchain” itself refers to the structure of the less. If write access is limited, it is permissioned.
blockchain’s data can be thought of as an immutable chain of Bitcoin serves as the prime example of a public, permission-
events. Data, mostly in the form of transactions, is grouped less blockchain network. Anyone can participate in the net-
together in a block. This block is then packaged with a work and the ledger is open to the public. Anonymity is pre-
reference to the previous block, which contains a reference to served by the use of public-private key pairs. Public networks
the block before that, etc. Blockchain is “distributed” because tend to require computationally heavy consensus methods - or,
every participant in the network holds a copy of this append- in the case of Ethereum’s ethash method [13], computation-
only ledger. All participants, or peers, must agree on the state and memory-intensive. This is mainly to protect against Sybil
of the ledger and unauthorized changes to that ledger must attacks and prevent double-spending (see II-C).
be reasonably detectable. In reality, blockchain technology A network like Sovrin [14] is public and permissioned.
requires (1) a distributed ledger among peers, (2) a consensus Anyone has access to ledger information, but additions to
protocol to ensure that all peers have the same copy, and (3) a the ledger can only be made by specific set of participants.
cryptographic infrastructure. Every other detail is determined Permissioned blockchains have the benefit of not requiring
by the desired application. consensus methods as resource-intensive as permission-less
systems, since unauthorized parties could be revoked for not
A. Consensus Protocols being part of a whitelist. Privacy is not a goal for Sovrin, which
We provide an overarching classification for consensus is an identity management system. Alas, even for Bitcoin’s
methods. In-depth protocol algorithms and mathematical anonymous addressing, true privacy is not guaranteed on a
proofs of robustness are beyond the scope of this paper. public network [15].
Consensus protocols have their own massive pool of research Private, permissioned blockchains like Hyperledger Fabric
effort and are well-reviewed in other works: [4], [8], [9], [10]. [16] target enterprise applications, where businesses may want
1) Lottery Election: Lottery election, such as Proof of Work the fault tolerance and self-management offered by blockchain
(PoW), relies on probability to “elect” a consensus leader within a private network. Smaller networks reduce communi-
who determines the order of incoming transactions, usually cation overhead, but tend to be less secure as a result - large,
for a set amount of time. In Bitcoin, peer nodes append a public networks have the advantage of peer numbers, where a
nonce to a block and calculate the hash value. The resulting 51 percent majority attack is more difficult to execute.
value must have some pre-determined number of leading zeros. 2) Block Handling: Block handling refers to methods
Peers constantly hash new values in order to find the correct which try to reduce blockchain latencies, either in writing to
“answer.” The first peer to find the right nonce broadcasts its the ledger or reading from it for transaction validation. These
results to the network, who verifies and appends the block methods include block ordering, pruning, and ledger sharding.
organized by the winning leader. This temporary leader is Block ordering can be handled in a number of ways. Bitcoin
the one that determines the order of transactions within its can result in forks - when more than one peer concurrently
announced block. In this case, difficulty is determined by the broadcasts a valid block to append to the ledger. At that point,
number of leading zeros and the leader is only the leader for peers will continue to “race” against one another to find the
one block. Other lottery election examples include Proof of next hash value, and once the longer chain is created, the other
Stake (PoS) and Proof of Elapsed Time (PoET) [10], although peers will adopt that chain. Ethereum mitigates this wasted
this is by no means an exhaustive list. Note that election effort by creating incentives to include so-called “orphaned”
difficulty and leader term lengths could be configurable pa- blocks into the main chain. Directed Acyclic Graphs (DAG)
rameters. have also been suggested for block ordering to decrease
2) Majority Election: Majority election refers to a majority ordering latency [17] [18]. Whereas traditional blockchains are
of peers voting on a particular value. Peers could vote to mostly linear in structure, DAG blockchains allow for more
validate a transaction, or vote upon a block leader. The complex web chains.
distinction here is that majority election does not rely on Block pruning has been suggested to reduce ledger size [16]
probability, but is instead far more communication-bound - [19], generally by reducing older blocks into a new “jump-
the notable example being Practical Byzantine Fault Tolerance off” point from which the ledger can continue. As long as all
(PBFT) [11]. Consensus in this manner must take care to peers reach consensus and agree to prune, the ledger can be
manage its upscaling to prevent significant communication collectively reduced. This method needs to carefully define at
overhead. The general trend is to create “round robin” or sub- which point old data is considered “old enough.”
group voting pools to mitigate scaling issues [12]. Ledger sharding is another method to reduce ledger read
times. A system could provide service-specific blockchains,
B. Implementation Differences such as in [20]. Transaction validations would avoid searching
1) Read-Write Access: Blockchain systems can be defined through unnecessary blocks in order to find relevant informa-
by what entities have read and write access to the ledger. As tion, but be linked at common blocks for some set interval.
aforementioned, write access is append-only. If any peer can Other proposed protocols with ledger sharding can be found
read the ledger, it is public. If the read access is limited, it is in [19], [21], [22].

170
compromises the security of the linked currency. This vulnera-
bility falls back upon user-end passwords and implementation
design, not upon blockchain technology itself.

D. Applications
Although blockchain is inherently transactional, its func-
tionality has been expanded to include smart contracts - code
stored on the blockchain that executes upon fulfillment of
programmed criteria [25]. Instead of requiring some trusted
third party to verify an agreement between parties, a contract
stored on the blockchain could automate specified transactions.
Smart contracts provide a way to create a system that is, to
some degree, self-managing.
With smart contracts, blockchain networks can accomplish
more than cryptocurrency. They can provide proof of exis-
tence, intellectual property rights, public notaries, supply chain
management [9] [26] [27] [28] - any application that could
benefit from an immutable record. Blockchain has been inves-
tigated for smart grids, smart homes [29] [30], decentralized
program applications [13], database storage [31], and the list
of potential uses continue to grow with every passing day.
Figure 1. Possible attack vectors on a blockchain network. In this case, the
peer node outside the inner shaded area is the only non-malicious actor. III. B LOCKCHAIN -I OT F RAMEWORK T RENDS
Though merging blockchain and IoT is not without its
challenges, a common theme in overcoming issues of latency
C. Common Attack Vectors
and computation overhead is to utilize edge, fog, and cloud
Common attack vectors involving blockchain systems in- computing. Edge devices serve as gateway nodes for data
clude Sybil attacks, 51 % attacks, routing attacks, and insecure aggregation and packaging, while leveraging the more plentiful
wallet implementations (Fig. 1). Keeping these attacks in resources of the cloud.
mind help to remember the limitations and requirements of This emerging hierarchy of compute resources tend to
a blockchain system. follow the patterns shown in Fig. 2: centralized, locally
1) Sybil Attack: Sybil attacks refer to the generation of centralized, decentralized, or layered. Works such as [32] and
multiple virtual peers by a malicious party with the intent to
influence a network. Permissioned blockchains will throw out
unauthorized requests to the network. Public networks such as
Bitcoin and Ethereum utilize CPU-intensive algorithms pre-
vent such attacks, forcing participants to “vote” with compute
power.
2) 51% Attack: The 51% attack is similar to the Sybil
attack, but more broadly refers to a malicious party controlling
the majority of the network to influence the blockchain. In a
system that relies on compute resources to build a blockchain,
the majority pool will be able to dominate the ledger.
3) Routing Attacks: Since blockchains networks are heavily
communication-dependent, routing attacks can affect block
propagation, and thereby block ordering on more remote peers
[23]. This can be especially detrimental to implementations of
blockchain that make use of timeouts to throw out potentially
invalid or malfunctioning peers.
4) Insecure Wallet Implementations: Probably the most
publicized weaknesses of blockchain networks are insecure
wallet implementations [24]. Cryptocurrency networks rely
on public-private key infrastructure for transaction addressing.
Possession of private keys provides proof of ownership of
currency like bitcoin. These private keys can be managed by
applications called wallets, which, if compromised, in turn Figure 2. Trend Patterns for Blockchain-IoT Frameworks.

171
[33] mention the need for edge devices and the leveraging of a peer may need to make use of some kind of queuing policy
cloud service for data persistence. Other suggestions like [30] to prevent flooding the network with requests.
utilize a locally centralized design. Many approaches such as 5) Network Topology: Since blockchain implementation is
in [34], [35], and [36] suggest a layering of blockchains to dependent upon a distribution of peers by necessity, having
handle latency. Edge-level devices would have a blockchain the actual network reconfigure in response to environmental
tailored for faster verification and higher throughput of data, condition could prove an interesting adaptation. This would
while higher levels could utilize more robust, yet slower work best in a permissioned environment, else the system
consensus methods in a larger network of peers at the cloud would risk a 51 % attack from malicious peers. Additionally,
level. The layers would be linked by some form of verification difficulties would arise with key and certificate distributions.
process dependent on the specific framework’s algorithms. 6) Containerization: The suggestion to utilize containers
in IoT-Blockchain systems has been investigated in [32], and
IV. C ONFIGURABLE PARAMETERS indeed projects such as Hyperledger Fabric [16] are closely
coupled with Docker containers for pluggable operation. Con-
IoT networks tend to produce large amounts of data that
tainer orchestration across environments could be handled with
need to be analyzed for further action. This need incites
Docker Swarm or Kubernetes.
requirements for latency, throughput, authentication, integrity,
and likely privacy while minimizing resource consumption. In
an environment of numerous devices, a system also needs to V. P ROPOSED B LOCKCHAIN I MPLEMENTATION
be careful with management of identities and cryptographic A. Hyperledger Fabric
keys.
1) Block Parameters: Block size can be varied by restrict- We selected Hyperledger Fabric as our blockchain solution
ing the number of transactions to each block, or placing a to deploy across our network with the use of Docker Swarm.
limit on data size. Data size will affect propagation times and Fabric is a private, permissioned blockchain whose functions
communication channel overhead. Block intervals, the time are closely coupled with Docker containers [16]. Fabric also
allowed between block creation, can also be controlled. Bitcoin decouples transaction validation from ledger block ordering
aims to create blocks roughly every 10 minutes [37], whereas into separate containers. Peer nodes carry out validation and
Ethereum will create a new block about every 15 seconds [13]. ledger maintenance. Orderer nodes handle consensus and
This affects the time it takes for a transaction confirmation, block broadcasting to the peers. The Fabric equivalent to
since blocks that have been in the chain longer are more secure smart contracts is called “chaincode.” Fig.3 depicts the general
- it would take more effort for a malicious party to change framework that has been planned for use in our project. Our
older blocks than newer ones. framework leverages the containerization of Fabric so that the
network can operate between the edge devices and the cloud
2) Epoch Time: Peer leadership for consensus methods
in a single, private system.
could last longer than the lifetime of the most recent block.
This is sometimes referred to as the epoch time, which could
help reduce communications by reducing the count of elections B. Sensor Device Layer
required. On the other hand, a longer epoch time in the hands Our setup uses sensors hardwired to Raspberry Pi devices.
of a compromised node could prove disastrous. Multiple sensors can be connected to one Pi - for the sake of
3) Consensus Protocol: Aniello et al. [34] suggested using clarity, Fig. 3 shows one sensor per edge device.
different consensus protocols at the edge versus at the cloud.
Investigating changes in the consensus protocol at the edge C. Edge Device Layer
layer could be worthwhile, especially if those changes are
made to accommodate environmental changes. Such changes We use Raspberry Pi devices for our Edge Device Layer.
could involve noisier networks, spotty connections, or even Each Pi is installed with a Fabric Peer Container equipped with
momentary peer failures. chaincode that packages sensor data into proper transaction
format for the ledger. Fig. 3 shows several bidirectional arrows
To some degree, dynamic consensus parameters are already
pointing between peers for cleaner representation; however,
utilized in the Bitcoin network. Hashing difficulty is altered
connections can be assumed between any two peers in the
to ensure block intervals at set rate, which is a response to
network.
peer activity. We could take this further and have a system
respond to peer count, channel conditions, peer status, etc.
Other difficulty controls for consensus systems are reviewed D. Cloud Layer
in [38]. The Cloud Layer is where multiple peers can be deployed
4) Throughput Queuing: In the case of changing environ- for fault-tolerance. The optimal number of backup peers will
ments, end devices that are trying to submit data to the ledger ultimately depend on the overall system environment. The
may not be able to transmit at an optimal rate. If an end device Cloud Layer will also contain the Orderer nodes so that the
is functioning but its gateway node loses connection, ideally Edge Device Layer does not have to handle the overhead of
the data should be preserved. Once connection is restored, the block creation.

172
Figure 3. Data workflow of the proposed framework.

E. Data Workflow a method for potential client authorization and revocation, as


As represented in Fig. 3, data acquired by the sensors well as better define a secure key distribution procedure for
transmit to the edge devices. The data is packaged by chain- each peer, orderer, and authorized client that wishes to access
code hosted on the peer nodes. The peer that packages the the ledger data. As explored in Section II-C with insecure
respective data into a “transaction” will request validation from wallets, the implementation of access control is often the weak
a configurable number of peers. The selected peers will be able link in security, rather than the blockchain itself.
to determine transaction validity by way of criteria that can In our permissioned network with a limited set of peers, we
be determined by the blockchain designer - typically this will can aim for high throughput and lighter consensus. Once the
include transaction structure and peer signature authenticity. proof-of-concept stage is complete, we can begin performance
If the data transaction passes validation, the Peer that created metrics on throughput, latency, and communication overhead.
the transaction will send it to the orderer nodes in the Cloud These metrics will help us optimize container distribution
Layer. If the selected peers deem the data transaction invalid, across the stack and the configurable parameters of our system
it will not be sent to the orderer nodes. in a static state. To test dynamic configurations, our system
Once the orderer nodes receive enough transactions to create must be assessed under varying conditions - i.e., peer device
a block, or the Block Epoch time has expired, they will reach location, data frequency, cloud latency.
consensus on the order of transactions they have received
VII. CONCLUSION
since the last block’s creation. The block will be created and
broadcast back to the peer nodes. Data acquisition frequency Coupling blockchain with the Internet of Things could
should be related Epoch time in order to control overall latency provide a robust, decentralized way to manage the rapidly
from sensor detection to ledger access by an authorized client. increasing number of networked devices. Enabling dynamic
reconfiguration of blockchain parameters could lead to sys-
VI. FUTURE WORK tem capable of enduring changing environments. Viewing
We will continue to investigate our implementation. Though blockchain design as a process with customizable aspects
we mentioned the use of Docker Swarm for container or- helps to analyze what parameters can be chosen to self-
chestration, we also plan to extend our studies to the use of manage in a stand-alone system. In this paper, we provided
Kubernetes as an alternative. In addition, We need to define a simpler perspective of blockchain design elements for an

173
IoT system, in particular for securing the acquisition of sensor [27] V. Pureswaran and P. Brody, “Device democracy: Saving the future of
data. Though we have yet to fully explore a method of key the internet of things,” tech. rep., IBM Institute for Business Value,
September 2014.
distribution for our system, we have designed the framework [28] M. Crosby, Machiappan, P. Pattanayak, S. Verma, and V. Kalyanara-
we need to merge blockchain with IoT and the cloud. man, “Blockchain technology: Beyond bitcoin,” Tech. Rep. 2, Applied
Innovation Review, June 2016.
R EFERENCES [29] M. P. Andersen, J. Kolb, K. Chen, G. Fierro, D. E. Culler, and R. A.
Popa, “Wave: A decentralized authorization system for iot via blockchain
[1] S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” tech. smart contracts,” tech. rep., University of California at Berkeley, Decem-
rep., bitcoin.org, October 2008. ber 2017.
[2] “Bitcoin (btc) statistics - price, blocks count, difficulty, hashrate, value,” [30] A. Dorri, S. S. Kanhere, R. Jurdak, and P. Gauravaram, “Blockchain for
2018. https://bitinfocharts.com/bitcoin/. iot security and privacy: The case study of a smart home,” in Perva-
[3] K. Croman, C. Decker, I. Eyal, A. E. Gencer, A. Juels, A. Kosba, sive Computing and Communications Workshops (PerCom Workshops),
A. Miller, P. Saxena, E. Shi, E. Gün Sirer, D. Song, and R. Wattenhofer, IEEE, March 2017.
On Scaling Decentralized Blockchains, pp. 106–125. Berlin, Heidelberg: [31] T. McConaghy, R. Marques, A. Miller, D. D. Jonghe, T. T. Mc-
Springer Berlin Heidelberg, 2016. Conaghy, G. McMullen, R. Henderson, S. Bellemare, and A. Granzotto,
[4] M. Vukolic̀, “The quest for scalable blockchain fabric: Proof-of-work vs. “Bigchaindb: A scalable blockchain database,” tech. rep., BigchainDB,
bft replication,” in Proceedings of the IFIP WB 11.4 Workshop, iNetSec 2016.
2015 (J. Camenisch and D. Kesdogan, eds.), vol. 9591, pp. 112–125, [32] A. Stanciu, “Blockchain based distributed control system for edge
Springer International Publishing, December 2015. computing,” in 21st International Conference on Control Systems and
[5] I. Eyal and E. G. Sirer, “Majority is not enough: Bitcoin mining Computer Science, 2017.
is vulnerable,” in Eighteenth International Conference on Financial [33] X. Liang, J. Zhao, S. Shetty, and D. Li, “Towards data assurance and
Cryptography and Data Security (FC’14), November 2013. resilience in iot using blockchain,” in IEEE MILCOM, 2017.
[6] “Gartner says 6.4 billion connected “things” will be in [34] L. Aniello, R. Baldoni, E. Gaetani, F. Lombardi, A. Margheri, and
use in 2016, up 30 percent from 2015,” November 2015. V. Sassone, “A prototype evaluation of a tamper-resistant high perfor-
https://www.gartner.com/newsroom/id/3165317. mance blockchain-based transaction log for a distributed database,” in
[7] A. Dorri, S. S. Kanhere, and R. Jurdak, “Blockchain in the internet of 13th European Dependable Computing Conference, 2017.
things: Challenges and solutions,” 2016. [35] P. K. Sharma, M.-Y. Chen, and J. H. Park, “A software defined fog node
[8] K. Yeow, A. Gani, R. W. Ahmad, J. J. P. C. Rodrigues, and K. KO, based distributed blockchain cloud architecture for iot,” IEEE Access,
“Decentralized consensus for edge-centric internet of things: A review, vol. 6, pp. 115–124, September 2017.
taxonomy, and research issues,” IEEE Access Journal, vol. 18, pp. 1–10, [36] V. Daza, R. D. Pietro, I. Klimek, and M. Signorini, “Connect: Contextual
October 2017. name discovery for blockchain-based services in the iot,” in IEEE ICC
[9] K. Christidis and M. Devetsikiotis, “Blockchains and smart contracts for 2017 SAC Symposium Internet of Things Track, 2017.
the internet of things,” IEEE Access, vol. 4, pp. 2292–2303, 2016. [37] I. Abraham, D. Malkhi, K. Nayak, L. Ren, and A. Spiegelman, “Solidus:
[10] C. Cachin and M. Vukolic̀, “Blockchain consensus protocols in the wild,” An incentive-compatible cryptocurrency based on permissionless byzan-
2017. tine consensus,” December 2016.
[11] M. Castro and B. Liskov, “Practical byzantine fault tolerance and proac- [38] D. Kraft, “Difficulty control for blockchain-based consensus systems,”
tive recovery,” in Proceedings of the Third Symposium on Operating Peer-to-Peer Netw. Appl., vol. 9, pp. 397–413, 2016.
Systems Design and Implementation, vol. 20, ACM, November 2002.
[12] D. Mazières, “The stellar consensus protocol: A federated model for
internet-level consensus,” tech. rep., Stellar Development Foundation,
2016.
[13] “A next-generation smart contract and decentralized application plat-
form,” 2017. https://github.com/ethereum/wiki/wiki/White-Paper.
[14] P. Windley and D. Reed, “Sovrin: A protocol and token for self-
sovereign identity and decentralized trust,” tech. rep., Sovrin Foundation,
2018.
[15] E. Ben-Sasson, A. Chiesa, C. Garman, M. Green, I. Miers, E. Tromer,
and M. Virza, “Zerocash: Decentralized anonymous payments from
bitcoin,” in IEEE Symposium on Security and Privacy, 2014.
[16] “Hyperledger fabric,” 2015. https://hyperledger.org/projects/fabric.
[17] Y. Lewenberg, Y. Sompolinsky, and A. Zohar, “Inclusive block chain
protocols,” in Financial Cryptography, pp. 528–547, 2015.
[18] S. Popov, “The tangle,” tech. rep., IOTA, 2017.
[19] E. Kokoris-Kogias, P. Jovanovic, L. Gasser, N. Gailly, E. Syta, and
B. Ford, “Omniledger: A secure, scale-out, decentralized ledger via
sharding,” IACR Cryptology ePrint Archive, vol. 2017, p. 406, 2017.
[20] A. E. Gencer, R. van Renesse, and E. G. Sirer, “Service-oriented
sharding with aspen,” 2016.
[21] M. Al-Bassam, A. Sonnino, S. Bano, D. Hrycyszyn, and G. Danezis,
“Chainspace: A sharded smart contracts platform,” 2017.
[22] L. Luu, V. Narayanan, C. Zheng, J. Bajewa, S. Gilbert, and P. Saxena,
“A secure sharding protocol for open blockchains,” in Proceedings of
the 2016 ACM SIGSAC Conference on Computer and Communications
Security, no. 17-30 in CCS -16, 2016.
[23] M. Apostolaki, A. Zohar, and L. Vanbever, “Hijacking bitcoin: Routing
attacks on cryptocurrencies,” in IEEE Symposium on Security and
Privacy, 2017.
[24] O. Boireau, “Securing the blockchain against hackers,” Network Secu-
rity, vol. 2018, pp. 8–11, January 2018.
[25] N. Szabo, “Smart contracts: Building blocks for digital markets,” 1996.
[26] A. Bahga and V. Madisetti, “Blockchain platform for industrial internet
of things,” Journal of Software Engineering and Applications, vol. 9,
pp. 533–546, 2016.

174

Вам также может понравиться