Название: Smart City Infrastructure
Автор: Группа авторов
Издательство: John Wiley & Sons Limited
Жанр: Программы
isbn: 9781119785545
isbn:
1.8.7 The Trusted Execution Environment (TEE)
TEE offers an entirely remote atmosphere for appliance executions, efficiently checking additional software appliances plus operating systems from being corrupt or tamper. The Intel Software Guard Extension (SGX) is a delegate skill to apply a TEE in various domains, especially in blockchain appliances. Multiple aspects are subjective for credit scoring: the quantity and nature of financial records, payment reports, and credit exploitation.
1.8.8 Game-Based Smart Contracts (GBSC)
GBSC designed based on a verification game that decides whether a computational assignment is properly executed or not. Moreover, in every stage of the “verification game”, the verifier persistently tests less critical subsection of the calculation that permits TrueBit to diminish the commutating load on its nodes significantly.
1.9 Challenges of Blockchain
Blockchain is an incredible invention of this decade; at the same time, it has some significant challenges, which we discussed below. Even though considerable challenges, they can easily triumph over the ripeness and enrichment of the blockchain skill in the coming future.
1.9.1 Scalability
Due to the high volume of blockchain and its characteristics enhancement, the number of digital transactions also increased exponentially. Every transaction must store in a node block for authorization. The foundation of existing transactions desires to be legalized primary than the transaction deal to be authenticated. The adequate block size and then the intermission times play a huge role in introducing new blocks into the system. In some situations, the blocks’ size may build unauthorized transaction delays in minute transactions since miners or clients mostly prefer to execute and prefer transactions for high transactional fees. By taking all these operations, scalability is a big issue in blockchain, and it classifies into storage optimization. Lightweight client or miner utilized to fix the scalability concern and redesigning of blockchains— where blockchain scattered into a critical block responsible for the leadership elections, a micro block accountable for business deal storing.
1.9.2 Privacy Outflow
When everyone on the network accesses the public keys, the blockchain defenseless against denial-of-service attacks leads to the outflow of transactional data. To overcome all these, various authors proposed dissimilar actions, those classified into mixing solution: Mixing suggests anonymity through transferring finances from manifold input address to manifold output addresses. Anonymous is another effective solution that unlinks the payment genesis for a transaction.
1.9.3 Selfish Mining
In selfish mining, some nasty or wicked miners or clients store the mined blocks in their database and tries to create a confidential branch that transmits only after reaching specific requirements. In such scenarios, truthful or sincere miners waste lots of time and resources since selfish miners or clients organize private chains.
1.9.4 Security
Security describes confidentiality, truthfulness, and availability, which are challenging tasks in public blockchains where keys are visible to all nodes. Confidentiality level is low in scattered systems, and truthfulness is the profession of blockchains; even though it faces different issues, accessibility in blockchains is high in terms of legibility compared to writing accessibility.
1.10 Conclusion
Blockchain is a broadly renowned technology, which got massive interest from various research communities around the world. It consists of different key techniques that support various requirements in different human life areas like healthcare, financial transactions, elections, and markets. However, it faces many challenges associated with security and privacy. So, in this chapter, we made a systematic study on blockchain safety measurements in recent years. We made an explicit discussion on blockchain development, working procedure, structure and key technologies, and IoT inclusion with blockchain. Moreover, we described various security and privacy properties and respective practices; finally, we discussed challenges in the blockchain.
References
1. Dorri, A., Steger, M., Kanhere, S.S., Jurdak, R., BlockChain: A Distributed Solution to Automotive Security and Privacy. IEEE Commun. Magxs., 55, 12, 119–125, 2017.
2. Xie, J., Tang, H., Huang, T., Yu, F.R., Xie, R., Liu, J., Liu, Y., A Survey of Blockchain Technology Applied to Smart Cities: Research Issues and Challenges. IEEE Commun. Surv., Tutor., 21, 3, 2794–2830, 2019.
3. Archana Prashanth, J., Han, M., Wang, Y., A Survey on Security and Privacy Issues of Blockchain Technology. Math. Found. Comput. Am. Inst. Math. Sci., 1, 2, 121–147, 2018.
4. Zhang, R., Xue, R., Liu, L., Security and Privacy on Blockchain. ACM Comput. Surv., 52, 3, Article, 51, 2019.
5. Ferrag, M.A., Derdour, M., Mukherjee, M., Derhab, A., Maglaras, L., Janicke, H., Blockchain Technologies for the Internet of Things: Research Issues and Challenges. IEEE Commun. Surv., 6, 2, 2327–4662, 2018.
6. Lao, L., Li, Z., Hou, S., Xiao, B., Guo, S., Yang, Y., A Survey of IoT Applications in Blockchain Systems: Architecture, Consensus, and Traff Modeling. ACM Comput. Surv., 53, 1, Article 18, 2020.
7. Zheng, X., Zhu, Y., Si, X., A Survey on Challenges and Progresses in Blockchain Technologies: A Performance and Security Perspective. Appl. Sci., 9, 2, 4731, 2019.
8. Restuccia, F., D’Oro, S., Kanhere, S.S., Melodia, T., Das, S.K., Blockchain for the Internet of Things: Present and Future. IEEE Internet Thingsg, 1, 1, 1–8, 2018.
9. Bach, L.M., Mihaljevic, B., Zagar, M., Comparative Analysis of Consensus Algorithm, in: MIPRO 2018, Opatija Croatia, May 21–25, 2018, IEEE, pp. 218–225, 2018
10. Conti, M., Kumar, E.S., Lal, C., Ruj, S., A Survey on Security and Privacy Issues of Bitcoin. IEEE Commun. Surv. Tutor., 20, 4, 3416–3452, 2018.
11. Melhem, A., AlZoubi, O., Mardini, W., Applications of Blockchain in Smart Cities., in: DATA ’19: Proceedings of the Second International Conference on Data Science, E-Learning and Information Systems, December 2–5, 2019, Association for Computing Machinery, New York, NY, USA, Article 358, pp. 1–7, 2019.
12. Mohanta, B.K., Jena, D., Panda, S.S., Sobhanayak, S., Blockchain technology: A survey on applications and security privacy Challenges. Internet Things, 8, Article 100107, 2019.
13. Sapirshtein, Sompolinsky, Y., Zohar, A., Optimal selfish mining strategies in bitcoin, in: Financial Cryptography and Data Security: 20th International Conference, FC 2016, Christ Church, Barbados, 2017, Springer, Berlin Heidelberg, pp. 515–532, 2017.
14. Lei, A., Cruickshank, H., Cao, Y., Asuquo, P., Ogah, C.P.A., Sun, Z., Blockchain-based dynamic key management for heterogeneous intelligent transportation systems. IEEE Internet Things J., 4, 6, 1832–1843, 2017.
15. СКАЧАТЬ