Smart City Infrastructure. Группа авторов
Чтение книги онлайн.

Читать онлайн книгу Smart City Infrastructure - Группа авторов страница 17

Название: Smart City Infrastructure

Автор: Группа авторов

Издательство: John Wiley & Sons Limited

Жанр: Программы

Серия:

isbn: 9781119785545

isbn:

СКАЧАТЬ balance by transferring zero-knowledge proofs, exclusive of enlightening the account balance. “Succinct Non-interactive Argument of Knowledge” is one of the extensions of zero-knowledge designed to support the Zcash procedure.

      1.8.7 The Trusted Execution Environment (TEE)

      TEE offers an entirely remote atmosphere for appliance executions, efficiently checking additional software appliances plus operating systems from being corrupt or tamper. The Intel Software Guard Extension (SGX) is a delegate skill to apply a TEE in various domains, especially in blockchain appliances. Multiple aspects are subjective for credit scoring: the quantity and nature of financial records, payment reports, and credit exploitation.

      1.8.8 Game-Based Smart Contracts (GBSC)

      GBSC designed based on a verification game that decides whether a computational assignment is properly executed or not. Moreover, in every stage of the “verification game”, the verifier persistently tests less critical subsection of the calculation that permits TrueBit to diminish the commutating load on its nodes significantly.

      Blockchain is an incredible invention of this decade; at the same time, it has some significant challenges, which we discussed below. Even though considerable challenges, they can easily triumph over the ripeness and enrichment of the blockchain skill in the coming future.

      1.9.1 Scalability

      1.9.2 Privacy Outflow

      When everyone on the network accesses the public keys, the blockchain defenseless against denial-of-service attacks leads to the outflow of transactional data. To overcome all these, various authors proposed dissimilar actions, those classified into mixing solution: Mixing suggests anonymity through transferring finances from manifold input address to manifold output addresses. Anonymous is another effective solution that unlinks the payment genesis for a transaction.

      1.9.3 Selfish Mining

      In selfish mining, some nasty or wicked miners or clients store the mined blocks in their database and tries to create a confidential branch that transmits only after reaching specific requirements. In such scenarios, truthful or sincere miners waste lots of time and resources since selfish miners or clients organize private chains.

      1.9.4 Security

      Blockchain is a broadly renowned technology, which got massive interest from various research communities around the world. It consists of different key techniques that support various requirements in different human life areas like healthcare, financial transactions, elections, and markets. However, it faces many challenges associated with security and privacy. So, in this chapter, we made a systematic study on blockchain safety measurements in recent years. We made an explicit discussion on blockchain development, working procedure, structure and key technologies, and IoT inclusion with blockchain. Moreover, we described various security and privacy properties and respective practices; finally, we discussed challenges in the blockchain.

      1. Dorri, A., Steger, M., Kanhere, S.S., Jurdak, R., BlockChain: A Distributed Solution to Automotive Security and Privacy. IEEE Commun. Magxs., 55, 12, 119–125, 2017.

      2. Xie, J., Tang, H., Huang, T., Yu, F.R., Xie, R., Liu, J., Liu, Y., A Survey of Blockchain Technology Applied to Smart Cities: Research Issues and Challenges. IEEE Commun. Surv., Tutor., 21, 3, 2794–2830, 2019.

      3. Archana Prashanth, J., Han, M., Wang, Y., A Survey on Security and Privacy Issues of Blockchain Technology. Math. Found. Comput. Am. Inst. Math. Sci., 1, 2, 121–147, 2018.

      4. Zhang, R., Xue, R., Liu, L., Security and Privacy on Blockchain. ACM Comput. Surv., 52, 3, Article, 51, 2019.

      5. Ferrag, M.A., Derdour, M., Mukherjee, M., Derhab, A., Maglaras, L., Janicke, H., Blockchain Technologies for the Internet of Things: Research Issues and Challenges. IEEE Commun. Surv., 6, 2, 2327–4662, 2018.

      6. Lao, L., Li, Z., Hou, S., Xiao, B., Guo, S., Yang, Y., A Survey of IoT Applications in Blockchain Systems: Architecture, Consensus, and Traff Modeling. ACM Comput. Surv., 53, 1, Article 18, 2020.

      7. Zheng, X., Zhu, Y., Si, X., A Survey on Challenges and Progresses in Blockchain Technologies: A Performance and Security Perspective. Appl. Sci., 9, 2, 4731, 2019.

      8. Restuccia, F., D’Oro, S., Kanhere, S.S., Melodia, T., Das, S.K., Blockchain for the Internet of Things: Present and Future. IEEE Internet Thingsg, 1, 1, 1–8, 2018.

      9. Bach, L.M., Mihaljevic, B., Zagar, M., Comparative Analysis of Consensus Algorithm, in: MIPRO 2018, Opatija Croatia, May 21–25, 2018, IEEE, pp. 218–225, 2018

      11. Melhem, A., AlZoubi, O., Mardini, W., Applications of Blockchain in Smart Cities., in: DATA ’19: Proceedings of the Second International Conference on Data Science, E-Learning and Information Systems, December 2–5, 2019, Association for Computing Machinery, New York, NY, USA, Article 358, pp. 1–7, 2019.

      12. Mohanta, B.K., Jena, D., Panda, S.S., Sobhanayak, S., Blockchain technology: A survey on applications and security privacy Challenges. Internet Things, 8, Article 100107, 2019.

      13. Sapirshtein, Sompolinsky, Y., Zohar, A., Optimal selfish mining strategies in bitcoin, in: Financial Cryptography and Data Security: 20th International Conference, FC 2016, Christ Church, Barbados, 2017, Springer, Berlin Heidelberg, pp. 515–532, 2017.

      14. Lei, A., Cruickshank, H., Cao, Y., Asuquo, P., Ogah, C.P.A., Sun, Z., Blockchain-based dynamic key management for heterogeneous intelligent transportation systems. IEEE Internet Things J., 4, 6, 1832–1843, 2017.

      15. СКАЧАТЬ