Blockchain Technology is exclusively used to make online transactions secure by
maintaining a distributed and decentralized ledger of records across multiple computers.
Tendermint is a general-purpose blockchain engine that is composed of two
parts; Tendermint Core and the blockchain application interface. The application interface
makes Tendermint suitable for a wide range of applications. In this paper, we
analyze and improve Practical Byzantine Fault Tolerant (PBFT), a consensus-based
Tendermint blockchain algorithm. In order to avoid negative issues of locks, we first
propose a lock-free algorithm for blockchain in which the proposal and voting phases
are concurrent whereas the commit phase is sequential. This consideration in the algorithm
allows parallelism. Secondly, a new methodology is used to decide the size
of the voter set which is a subset of blockchain nodes, further investigating the block
sensitivity and trustworthiness of nodes. Thirdly, to fairly select the voter set nodes,
we employ the random walk algorithm. Fourthly, we imply the wait-freedom property
by using a timeout due to which all blocks are eventually committed or aborted. In
addition, we have discussed voting conflicts and consensuses issues that are used as a
correctness property, and provide some supportive techniques.
IRJET- Study of Blockchain and its ConceptsIRJET Journal
This document discusses using blockchain technology to implement a log storage system. It begins with an introduction to blockchain and its key properties. It then discusses several concepts related to implementing a log storage system using blockchain, including using a logchain as a service and the Medusa system which utilizes Hyperledger. It also covers different blockchain platforms like Hyperledger Fabric and Ethereum. Consensus algorithms including proof-based and voting-based methods are described. Finally, potential applications of a blockchain-based log storage system are outlined such as for libraries, organizations, healthcare, and cloud storage.
Blockchain , Deploying your first smart contract to azure ethereum blockchain.
Slides from my session in "Global Azure Bootcamp Chandigarh"
Presentation starts with basic terms like transactions , ledger and contracts. Talks about what is blockchain and ethereum and concludes with deployment of a smart contract to azure ethereum blockchain.
IRJET - A Detailed Study on CryptocurrencyIRJET Journal
This document provides a detailed overview of cryptocurrency and blockchain technology. It begins with an abstract that introduces cryptocurrency and its reliance on blockchain technology. It then discusses the history and development of cryptocurrency from Bitcoin's creation in 2009 to present day. The document provides explanations of key concepts such as blockchain, mining, and different consensus protocols. It describes the architecture of blockchain and challenges that cryptocurrencies face such as 51% attacks and security issues. Overall, the document comprehensively surveys cryptocurrencies, blockchain technology, and associated challenges through detailed explanations across multiple sections.
This presentation goes over consensus fundamentals, what consensus algorithms are used in Hyperledger blockchain projects today and how do they work. This presentation was presented at the April 2nd SF Hyperledger Meetup @ PubNub.
BLOCKCHAIN-BASED SMART CONTRACTS : A SYSTEMATIC MAPPING STUDY csandit
An appealing feature of blockchain technology is smart contracts. A smart contract is
executable code that runs on top of the blockchain to facilitate, execute and enforce an
agreement between untrusted parties without the involvement of a trusted third party. In this
paper, we conduct a systematic mapping study to collect all research that is relevant to smart
contracts from a technical perspective. The aim of doing so is to identify current research topics
and open challenges for future studies in smart contract research. We extract 24 papers from
different scientific databases. The results show that about two thirds of the papers focus on
identifying and tackling smart contract issues. Four key issues are identified, namely, codifying,
security, privacy and performance issues. The rest of the papers focuses on smart contract
applications or other smart contract related topics. Research gaps that need to be addressed in
future studies are provided.
Consensus Algorithms - Nakov at CryptoBlockCon - Las Vegas (2018)Svetlin Nakov
This document discusses various blockchain consensus algorithms, including Byzantine Fault Tolerance (BFT), Proof of Work (PoW), Proof of Stake (PoS), Delegated Proof of Stake (DPoS), and Asynchronous BFT (aBFT). It provides an overview of how each algorithm works, examples of blockchain systems that use each algorithm, and the advantages and disadvantages of each approach. In conclusion, it notes that there is no perfect consensus algorithm and that each has tradeoffs between decentralization, performance, and security.
Architecture of the Hyperledger Blockchain Fabricmustafa sarac
The document summarizes the architecture of Hyperledger Fabric, an implementation of a distributed ledger platform. Key points:
- Hyperledger Fabric uses a modular architecture and allows pluggable consensus protocols, currently implementing PBFT.
- It distinguishes between validating peers that run consensus and non-validating peers.
- Smart contracts called "chaincode" are run on peers and can read/write to the ledger state.
- Transactions are added to the ledger through consensus of validating peers executing the chaincode. Membership is currently static.
A SYSTEMATIC MAPPING STUDY ON CURRENT RESEARCH TOPICS IN SMART CONTRACTSijcsit
The document summarizes the results of a systematic mapping study on current research topics related to smart contracts. The study identified 24 relevant papers from scientific databases. Two-thirds of the papers focused on identifying and addressing issues with smart contracts, such as coding, security, privacy and performance issues. The remaining papers examined smart contract applications or other topics. The study aims to map current research areas and identify gaps to guide future work on smart contracts.
IRJET- Study of Blockchain and its ConceptsIRJET Journal
This document discusses using blockchain technology to implement a log storage system. It begins with an introduction to blockchain and its key properties. It then discusses several concepts related to implementing a log storage system using blockchain, including using a logchain as a service and the Medusa system which utilizes Hyperledger. It also covers different blockchain platforms like Hyperledger Fabric and Ethereum. Consensus algorithms including proof-based and voting-based methods are described. Finally, potential applications of a blockchain-based log storage system are outlined such as for libraries, organizations, healthcare, and cloud storage.
Blockchain , Deploying your first smart contract to azure ethereum blockchain.
Slides from my session in "Global Azure Bootcamp Chandigarh"
Presentation starts with basic terms like transactions , ledger and contracts. Talks about what is blockchain and ethereum and concludes with deployment of a smart contract to azure ethereum blockchain.
IRJET - A Detailed Study on CryptocurrencyIRJET Journal
This document provides a detailed overview of cryptocurrency and blockchain technology. It begins with an abstract that introduces cryptocurrency and its reliance on blockchain technology. It then discusses the history and development of cryptocurrency from Bitcoin's creation in 2009 to present day. The document provides explanations of key concepts such as blockchain, mining, and different consensus protocols. It describes the architecture of blockchain and challenges that cryptocurrencies face such as 51% attacks and security issues. Overall, the document comprehensively surveys cryptocurrencies, blockchain technology, and associated challenges through detailed explanations across multiple sections.
This presentation goes over consensus fundamentals, what consensus algorithms are used in Hyperledger blockchain projects today and how do they work. This presentation was presented at the April 2nd SF Hyperledger Meetup @ PubNub.
BLOCKCHAIN-BASED SMART CONTRACTS : A SYSTEMATIC MAPPING STUDY csandit
An appealing feature of blockchain technology is smart contracts. A smart contract is
executable code that runs on top of the blockchain to facilitate, execute and enforce an
agreement between untrusted parties without the involvement of a trusted third party. In this
paper, we conduct a systematic mapping study to collect all research that is relevant to smart
contracts from a technical perspective. The aim of doing so is to identify current research topics
and open challenges for future studies in smart contract research. We extract 24 papers from
different scientific databases. The results show that about two thirds of the papers focus on
identifying and tackling smart contract issues. Four key issues are identified, namely, codifying,
security, privacy and performance issues. The rest of the papers focuses on smart contract
applications or other smart contract related topics. Research gaps that need to be addressed in
future studies are provided.
Consensus Algorithms - Nakov at CryptoBlockCon - Las Vegas (2018)Svetlin Nakov
This document discusses various blockchain consensus algorithms, including Byzantine Fault Tolerance (BFT), Proof of Work (PoW), Proof of Stake (PoS), Delegated Proof of Stake (DPoS), and Asynchronous BFT (aBFT). It provides an overview of how each algorithm works, examples of blockchain systems that use each algorithm, and the advantages and disadvantages of each approach. In conclusion, it notes that there is no perfect consensus algorithm and that each has tradeoffs between decentralization, performance, and security.
Architecture of the Hyperledger Blockchain Fabricmustafa sarac
The document summarizes the architecture of Hyperledger Fabric, an implementation of a distributed ledger platform. Key points:
- Hyperledger Fabric uses a modular architecture and allows pluggable consensus protocols, currently implementing PBFT.
- It distinguishes between validating peers that run consensus and non-validating peers.
- Smart contracts called "chaincode" are run on peers and can read/write to the ledger state.
- Transactions are added to the ledger through consensus of validating peers executing the chaincode. Membership is currently static.
A SYSTEMATIC MAPPING STUDY ON CURRENT RESEARCH TOPICS IN SMART CONTRACTSijcsit
The document summarizes the results of a systematic mapping study on current research topics related to smart contracts. The study identified 24 relevant papers from scientific databases. Two-thirds of the papers focused on identifying and addressing issues with smart contracts, such as coding, security, privacy and performance issues. The remaining papers examined smart contract applications or other topics. The study aims to map current research areas and identify gaps to guide future work on smart contracts.
Distributed ledger technology includes blockchain technologies and smart contracts. Blockchains construct a chronological chain of blocks, with each block containing a set of bundled transactions. Smart contracts are computer programs that execute predefined actions when certain conditions are met. Consensus algorithms like proof of work and proof of stake are used to build agreement among participants on the valid state of the ledger. Permissioned blockchains like Hyperledger require pre-verification of participants and provide improved privacy and security for enterprise applications.
Ofrecemos una descripción histórica de las técnicas de prueba de trabajo y los campos en los que hunde sus raíces. Estamos interesados en las técnicas de PoW aplicadas a la tecnología blockchain y, por lo tanto, examinamos los protocolos de vanguardia que emplean estos métodos para algoritmos de consenso, enfatizando las diferencias entre los sistemas eficientes de hashcash y los prometedores protocolos de pudín de pan. Posteriormente, se discuten los mecanismos de consenso y se recopilan y clasifican algunos ataques conocidos interesantes a estos algoritmos de acuerdo con sus ideas subyacentes.
Blockchain consensus algorithms allow distributed networks to agree on a single transaction history. The document discusses several popular consensus algorithms including proof of work (PoW), proof of stake (PoS), practical Byzantine fault tolerance (PBFT), Istanbul Byzantine fault tolerance (IBFT), proof of authority (PoA), and RAFT. It provides overviews of how each algorithm works and compares their properties such as finality, tolerance for malicious nodes, trust requirements, and energy usage.
Bits, Blocks, and Chains: A Concise Examination of Bitcoin and Cryptocurrency...Richard Givens
Bitcoin is a digital currency created through cryptography and advanced mathematics. It is recorded through a blockchain, which is a distributed digital ledger of transactions grouped into blocks. Each block contains a cryptographic hash of the previous block, linking all transactions in a chain. Bitcoin is "mined" through solving computationally difficult puzzles to validate transactions and create new blocks. This process secures the blockchain from manipulation.
This document discusses profitable double-spending attacks on blockchains. It introduces the concept of a "cut-time" which is the duration of a double-spending attack. It shows that double-spending attacks can be profitable even with less than 50% of computing power if the expected profit is positive. It develops new mathematical tools to analyze the probability distribution and expected time to successfully double-spend. It derives conditions for when double-spending attacks are profitable and provides an example analysis for the BitcoinCash network.
Blockchain technology application in drones and cybersecurityNile University
The presentation describes the Blockchain main concepts, structure, and advantages with application in Drones to empower the cybersecurity problems and gave a sample of application is Inventory and supply chain management
- Analyze the strength and weakness of public blockchain and the goal of private blockchain.
- Explains the core architectural features, mechanisms and provisioning process of Hyperledger Fabric.
Decentralised Apps, Decentralised Web and then ... Decentralised Comms.
What is it? why we need decentralised comms and how?
Come and Join the brainstorming.
This document discusses smart contracts and the Æternity blockchain. It provides an overview of distributed ledger technologies and decentralized applications. It also describes how to set up the Æternity local test net and deploy and interact with smart contracts using the Sophia language. Sophia is an imperative and functional smart contract language used for building decentralized applications on Æternity. The document provides resources for learning more about Æternity development.
Blockchain Scalability - Themes, Tools and TechniquesGokul Alex
This presentation is a deep dive on Blockchain Scalability Challenges, Constraints with a narrative on promising techniques such as State Channel, Side Chains, Simple Payment Vehicles, Consensus Algorithms and Directed Acyclic Graphs. The presentation starts with analysing the scalability cube.
Sarwar sayeed , hector marco gisbert, tom caira ieeeIT Strategy Group
The document discusses smart contracts and attacks against them. It classifies blockchain exploitation techniques into 4 categories: attacking consensus protocols, bugs in smart contract code, malware running in operating systems, and fraudulent users. It focuses on analyzing the 7 most important smart contract attack techniques and their real impact. While 10 widely used tools can detect some vulnerabilities, they still contain known vulnerabilities, providing a false sense of security. The paper concludes with recommendations for more secure smart contracts.
Blockchain is a distributed digital ledger that records transactions across a peer-to-peer network. It allows for transparency, where all transactions are visible across the network, and immutability, where transactions cannot be altered once added to the chain. There are two main types - public blockchains that anyone can participate in without permission and private blockchains that require an invitation. Popular blockchain platforms include Bitcoin, Ethereum, Hyperledger, R3 Corda, and others. Blockchain provides benefits like disintermediation, empowering users, high quality transparent data, and lower transaction costs. It can be used in financial areas like payments and supply chain management as well as non-financial areas like medical records and identity management.
Roman Oliynykov - Bitcoin and Blockchain: Technologies, Scaling and ForksTimetogrowup
The document discusses Bitcoin and blockchain technologies. It describes the key components of Bitcoin including transactions, blocks, mining, and the blockchain. It explains how consensus is reached in Bitcoin to prevent double spending. It also discusses some of Bitcoin's advantages as well as open problems regarding scalability and centralization. Finally, it provides overviews of some approaches to scaling Bitcoin like SegWit and forks like Bitcoin Cash and Bitcoin Gold.
Once created, smart contracts on the Ethereum blockchain cannot be modified or updated. The article discusses how smart contracts can be "self-destructed" to remove them from the blockchain. It explains that a selfdestruct function sends the contract's funds to a designated address and clears its data. While this eliminates bugs or stops execution, funds sent to a self-destructed contract will be lost. The article concludes by advising self-destructing contracts when no longer needed to stop execution and potentially lower gas costs.
Blockchain is a distributed database that maintains a growing list of transaction records called blocks. Each block contains a cryptographic hash of the previous block, transaction data, and a timestamp. This forms a chain where blocks are linked in a linear chronological order. New transactions are broadcast to the peer-to-peer network, validated by nodes, and grouped into blocks that are then added to the blockchain through a process called mining which solves a complex math problem. The blockchain is maintained across the decentralized network and no single entity controls it, providing security, transparency, and decentralization.
This document provides an introduction to Hyperledger Fabric, a permissioned blockchain platform developed by the Hyperledger project. It outlines the key components of Hyperledger Fabric including nodes, transactions, channels, chaincode, and membership services. It also discusses the differences between public and private blockchains as well as examples use cases for Hyperledger Fabric such as global supply chain management and city management.
This document discusses profitable double-spending attacks on blockchains. It introduces the concept of a "cut-time" which is the duration of a double-spending attack. It shows that double-spending attacks can be profitable even when the attacker controls less than 50% of the computing power, as long as the target transaction value is high enough. It derives new mathematical results for calculating the probability distribution and expected time for a double-spending attack to succeed, which allows analyzing the expected profit from such attacks. The results surprisingly indicate that double-spending attacks at any level of computing power can potentially be profitable.
Elliptic curve cryptography (ECC) is an approach to public-key cryptography that uses elliptic curves over finite fields. It provides the same level of security as other cryptosystems but with smaller key sizes. ECC is used for encryption, digital signatures, and other tasks. It is based on the algebraic structure of elliptic curves and points on those curves forming an Abelian group. The U.S. has endorsed ECC algorithms for key exchange and digital signatures.
A decentralized consensus application using blockchain ecosystem IJECEIAES
This document summarizes a research paper that proposes developing a secure decentralized consensus application using blockchain technology. The paper identifies limitations in traditional centralized consensus systems, such as availability issues if the central server fails and potential for data manipulation. The proposed application aims to address these issues by building a decentralized application on the Ethereum blockchain that uses smart contracts to securely store data and ensure integrity. The application architecture involves a front-end hosted on IPFS and a backend on the Ethereum blockchain network, where each node maintains a copy of the ledger and smart contracts. The paper provides an overview of blockchain technology and consensus mechanisms to provide context for the proposed application.
This document discusses blockchain technology and its potential applications. It begins with an introduction to blockchain as a decentralized ledger that allows transactions to be confirmed without an intermediary. It then provides more details on how blockchain works, including how blocks are added in a chronological chain. The document also discusses how blockchain could be used in various industries like finance, providing examples of banks exploring blockchain applications. It concludes that blockchain allows secure transactions in a transparent way without third parties by recording all deals in a public ledger.
Yao Yao, Jack Rasmus-Vorrath, Ivelin Angelov
https://github.com/yaowser/basic_blockchain
https://www.slideshare.net/YaoYao44/blockchain-security-and-demonstration/
Distributed ledger technology over a network of computers, which provides an alternative to the centralized system
Distributed Database
Peer-to-Peer Transmission
Transparency with Pseudonymity
Records are immutable
Computational Logic
https://www.youtube.com/watch?v=5ArZxRdhyPc
Distributed ledger technology includes blockchain technologies and smart contracts. Blockchains construct a chronological chain of blocks, with each block containing a set of bundled transactions. Smart contracts are computer programs that execute predefined actions when certain conditions are met. Consensus algorithms like proof of work and proof of stake are used to build agreement among participants on the valid state of the ledger. Permissioned blockchains like Hyperledger require pre-verification of participants and provide improved privacy and security for enterprise applications.
Ofrecemos una descripción histórica de las técnicas de prueba de trabajo y los campos en los que hunde sus raíces. Estamos interesados en las técnicas de PoW aplicadas a la tecnología blockchain y, por lo tanto, examinamos los protocolos de vanguardia que emplean estos métodos para algoritmos de consenso, enfatizando las diferencias entre los sistemas eficientes de hashcash y los prometedores protocolos de pudín de pan. Posteriormente, se discuten los mecanismos de consenso y se recopilan y clasifican algunos ataques conocidos interesantes a estos algoritmos de acuerdo con sus ideas subyacentes.
Blockchain consensus algorithms allow distributed networks to agree on a single transaction history. The document discusses several popular consensus algorithms including proof of work (PoW), proof of stake (PoS), practical Byzantine fault tolerance (PBFT), Istanbul Byzantine fault tolerance (IBFT), proof of authority (PoA), and RAFT. It provides overviews of how each algorithm works and compares their properties such as finality, tolerance for malicious nodes, trust requirements, and energy usage.
Bits, Blocks, and Chains: A Concise Examination of Bitcoin and Cryptocurrency...Richard Givens
Bitcoin is a digital currency created through cryptography and advanced mathematics. It is recorded through a blockchain, which is a distributed digital ledger of transactions grouped into blocks. Each block contains a cryptographic hash of the previous block, linking all transactions in a chain. Bitcoin is "mined" through solving computationally difficult puzzles to validate transactions and create new blocks. This process secures the blockchain from manipulation.
This document discusses profitable double-spending attacks on blockchains. It introduces the concept of a "cut-time" which is the duration of a double-spending attack. It shows that double-spending attacks can be profitable even with less than 50% of computing power if the expected profit is positive. It develops new mathematical tools to analyze the probability distribution and expected time to successfully double-spend. It derives conditions for when double-spending attacks are profitable and provides an example analysis for the BitcoinCash network.
Blockchain technology application in drones and cybersecurityNile University
The presentation describes the Blockchain main concepts, structure, and advantages with application in Drones to empower the cybersecurity problems and gave a sample of application is Inventory and supply chain management
- Analyze the strength and weakness of public blockchain and the goal of private blockchain.
- Explains the core architectural features, mechanisms and provisioning process of Hyperledger Fabric.
Decentralised Apps, Decentralised Web and then ... Decentralised Comms.
What is it? why we need decentralised comms and how?
Come and Join the brainstorming.
This document discusses smart contracts and the Æternity blockchain. It provides an overview of distributed ledger technologies and decentralized applications. It also describes how to set up the Æternity local test net and deploy and interact with smart contracts using the Sophia language. Sophia is an imperative and functional smart contract language used for building decentralized applications on Æternity. The document provides resources for learning more about Æternity development.
Blockchain Scalability - Themes, Tools and TechniquesGokul Alex
This presentation is a deep dive on Blockchain Scalability Challenges, Constraints with a narrative on promising techniques such as State Channel, Side Chains, Simple Payment Vehicles, Consensus Algorithms and Directed Acyclic Graphs. The presentation starts with analysing the scalability cube.
Sarwar sayeed , hector marco gisbert, tom caira ieeeIT Strategy Group
The document discusses smart contracts and attacks against them. It classifies blockchain exploitation techniques into 4 categories: attacking consensus protocols, bugs in smart contract code, malware running in operating systems, and fraudulent users. It focuses on analyzing the 7 most important smart contract attack techniques and their real impact. While 10 widely used tools can detect some vulnerabilities, they still contain known vulnerabilities, providing a false sense of security. The paper concludes with recommendations for more secure smart contracts.
Blockchain is a distributed digital ledger that records transactions across a peer-to-peer network. It allows for transparency, where all transactions are visible across the network, and immutability, where transactions cannot be altered once added to the chain. There are two main types - public blockchains that anyone can participate in without permission and private blockchains that require an invitation. Popular blockchain platforms include Bitcoin, Ethereum, Hyperledger, R3 Corda, and others. Blockchain provides benefits like disintermediation, empowering users, high quality transparent data, and lower transaction costs. It can be used in financial areas like payments and supply chain management as well as non-financial areas like medical records and identity management.
Roman Oliynykov - Bitcoin and Blockchain: Technologies, Scaling and ForksTimetogrowup
The document discusses Bitcoin and blockchain technologies. It describes the key components of Bitcoin including transactions, blocks, mining, and the blockchain. It explains how consensus is reached in Bitcoin to prevent double spending. It also discusses some of Bitcoin's advantages as well as open problems regarding scalability and centralization. Finally, it provides overviews of some approaches to scaling Bitcoin like SegWit and forks like Bitcoin Cash and Bitcoin Gold.
Once created, smart contracts on the Ethereum blockchain cannot be modified or updated. The article discusses how smart contracts can be "self-destructed" to remove them from the blockchain. It explains that a selfdestruct function sends the contract's funds to a designated address and clears its data. While this eliminates bugs or stops execution, funds sent to a self-destructed contract will be lost. The article concludes by advising self-destructing contracts when no longer needed to stop execution and potentially lower gas costs.
Blockchain is a distributed database that maintains a growing list of transaction records called blocks. Each block contains a cryptographic hash of the previous block, transaction data, and a timestamp. This forms a chain where blocks are linked in a linear chronological order. New transactions are broadcast to the peer-to-peer network, validated by nodes, and grouped into blocks that are then added to the blockchain through a process called mining which solves a complex math problem. The blockchain is maintained across the decentralized network and no single entity controls it, providing security, transparency, and decentralization.
This document provides an introduction to Hyperledger Fabric, a permissioned blockchain platform developed by the Hyperledger project. It outlines the key components of Hyperledger Fabric including nodes, transactions, channels, chaincode, and membership services. It also discusses the differences between public and private blockchains as well as examples use cases for Hyperledger Fabric such as global supply chain management and city management.
This document discusses profitable double-spending attacks on blockchains. It introduces the concept of a "cut-time" which is the duration of a double-spending attack. It shows that double-spending attacks can be profitable even when the attacker controls less than 50% of the computing power, as long as the target transaction value is high enough. It derives new mathematical results for calculating the probability distribution and expected time for a double-spending attack to succeed, which allows analyzing the expected profit from such attacks. The results surprisingly indicate that double-spending attacks at any level of computing power can potentially be profitable.
Elliptic curve cryptography (ECC) is an approach to public-key cryptography that uses elliptic curves over finite fields. It provides the same level of security as other cryptosystems but with smaller key sizes. ECC is used for encryption, digital signatures, and other tasks. It is based on the algebraic structure of elliptic curves and points on those curves forming an Abelian group. The U.S. has endorsed ECC algorithms for key exchange and digital signatures.
A decentralized consensus application using blockchain ecosystem IJECEIAES
This document summarizes a research paper that proposes developing a secure decentralized consensus application using blockchain technology. The paper identifies limitations in traditional centralized consensus systems, such as availability issues if the central server fails and potential for data manipulation. The proposed application aims to address these issues by building a decentralized application on the Ethereum blockchain that uses smart contracts to securely store data and ensure integrity. The application architecture involves a front-end hosted on IPFS and a backend on the Ethereum blockchain network, where each node maintains a copy of the ledger and smart contracts. The paper provides an overview of blockchain technology and consensus mechanisms to provide context for the proposed application.
This document discusses blockchain technology and its potential applications. It begins with an introduction to blockchain as a decentralized ledger that allows transactions to be confirmed without an intermediary. It then provides more details on how blockchain works, including how blocks are added in a chronological chain. The document also discusses how blockchain could be used in various industries like finance, providing examples of banks exploring blockchain applications. It concludes that blockchain allows secure transactions in a transparent way without third parties by recording all deals in a public ledger.
Yao Yao, Jack Rasmus-Vorrath, Ivelin Angelov
https://github.com/yaowser/basic_blockchain
https://www.slideshare.net/YaoYao44/blockchain-security-and-demonstration/
Distributed ledger technology over a network of computers, which provides an alternative to the centralized system
Distributed Database
Peer-to-Peer Transmission
Transparency with Pseudonymity
Records are immutable
Computational Logic
https://www.youtube.com/watch?v=5ArZxRdhyPc
Benchmark and comparison between hyperledger and MySQLTELKOMNIKA JOURNAL
In this paper, we report the benchmarking results of Hyperledger, a Distributed Ledger, which is the derivation Blockchain Technology. Method to evaluate Hyperledger in a limited infrastructure is developed. Themeasured infrastructure consists of 8 nodes with a load of up to 20000 transactions/second. Hyperledger consistently runs all evaluation, namely, for 20,000 transactions, the run time 74.30s, latency 73.40ms latency, and 257 tps. The benchmarking of Hyperledger shows better than a database system in a high workload scenario. We found that the maximum size data volume in one transaction on the Hyperledger network is around ten (10) times of MySQL. Also, the time spent on processing a single transaction in the blockchain network is 80-200 times faster than MySQL. This initial analysis can provide an overview for practitioners in making decisions about the adoption of blockchain technology in their IT systems.
Scaling up Banking Operations: Harnessing the power of block chain TechnologyIRJET Journal
Blockchain technology has the potential to transform banking operations by providing a decentralized, transparent, and secure system for financial transactions. The document proposes a blockchain-based platform that allows banks and users to interact on a shared ledger to facilitate money transfers with lower fees, faster processing times, and around-the-clock availability. Key benefits of the proposed platform include a single database for user information, automated transfers between banks, and transparency of conversion rates and transaction histories. The system is designed using UML diagrams and implemented with Python, Truffle Ethereum, and Django to allow users to register, deposit funds, send payments, and check balances.
IRJET- Blockchain-A Secure Mode for TransactionIRJET Journal
The document discusses using blockchain technology to securely process banking transactions. Blockchain uses cryptography to connect blocks in a chain, creating a decentralized and tamper-resistant ledger. This allows transactions to be processed faster, more efficiently and securely without a central authority. The proposed system would use blockchain for banking transactions like account creation, fund transfers, and checking transaction histories. It would provide security through cryptographic hashing, transaction verification across nodes, and use of digital signatures. This could make current banking systems more secure, efficient and reduce fraud compared to centralized databases.
Our latest white paper, “Blockchain Technology and the Financial Services Market,” covers themes around:
Distributed ledger and blockchain are about to cause major business transformations in the financial services industry
Three of the most promising fields of application are payment transactions, trade finance and over-the-counter markets
Technical challenges and legal frameworks are currently a major obstacle
Many market participants are exploring ways of using blockchain, including established institutions and start-ups firms
Read the entire research report for expert insights and the full Infosys Consulting point-of-view!
IRJET- Transaction based Block Chain CryptocurrencyIRJET Journal
This document proposes a transaction-based blockchain cryptocurrency. It aims to build a transaction-based blockchain architecture to discover cryptocurrencies in a decentralized way. The proposed system would overcome mining transactions by having nodes store the ledger, allowing node-to-node transactions to be monitored. Transactions would be sent through an encrypted channel using elliptic curve cryptography. The system would run locally and provide security, acting as a proof of concept for building blockchain applications.
Distributed ledger technical research in central bank of brazilmustafa sarac
This document summarizes a report by the Central Bank of Brazil on its distributed ledger technology research. It provides an overview of the bank's research process, including analyzing potential use cases, examining platforms to develop prototypes, and addressing perceived privacy issues. The bank studied relevant projects, built experiments to test responses to privacy concerns, and hopes the lessons learned will inform future decisions on this technology. It also summarizes previous work by other financial institutions exploring distributed ledgers.
Blockchain : A Catalyst for New Approaches in Insurance VIJAY MUTHU
Blockchain technology and smart contracts have the potential to significantly impact the insurance industry. Smart contracts allow insurance policies, claims, and settlements to be automatically executed based on predefined rules and data inputs from oracles and IoT sensors. This could accelerate the development of on-demand or usage-based insurance products. It may also simplify and automate claims management by automatically validating events and processing payouts. While smart contracts offer benefits of increased efficiency, automation, and transparency, their large-scale implementation also faces challenges related to governance, legal standards, and technical scalability that require further development.
Creating An E-Commerce web application using BlockchainIRJET Journal
This document summarizes a research paper that explores using blockchain technology to develop e-commerce platforms. It discusses how blockchain can solve security issues, lack of trust in intermediaries, intermediary fees, and high transaction costs that are problems in the e-commerce sector. The paper describes using the Truffle framework, Solidity programming language, and Ethereum smart contracts to build a blockchain-based e-commerce application. It also discusses integrating the application with front-end tools like React JS and Web3.js. In summary, the paper proposes that a blockchain-powered e-commerce platform can provide a secure, trustworthy and cost-effective solution for online shopping.
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...AlAtfat
Advances in technology always had an impact on our lives. Several emerging technologies, most notably the Internet of Things (IoT) and blockchain, present transformative opportunities. The blockchain is a decentralized, transparent ledger for storing transaction data. By effectively establishing trust between nodes, it has the remarkable potential to design unique architectures for most enterprise applications. When it first appeared as a platform for anonymous cryptocurrency trading, such as Bitcoin, on a public network platform, blockchain piqued the interest of researchers. The chain is completed when each block connects to the previous block. The Internet of Things (IoT) is a network of networked devices that can exchange data and be managed and controlled via unique identifiers. Automation, wireless sensor networks, embedded systems, and control systems are just a few of the well-known technologies that power the IoT. Converging advancements in real-time analytics, machine learning, commodity sensors, and embedded systems demonstrate the rapid expansion of the IoT paradigm. The Internet of Things refers to the global networking of millions of networked smart gadgets that gather and exchange data. Integrating the IoT and blockchain technology would be a significant step toward developing a reliable, secure, and comprehensive method of storing data collected by smart devices. Internet-enabled devices in the IoT can send data to private blockchain networks, creating immutable records of all transaction history. As a result, these networks produce unchangeable logs of all transactions. This research looks at how blockchain technology and the Internet of Things interact to understand better how devices can communicate with one another. The blockchain-enabled Internet of Things architecture proposed in this article is a useful framework for integrating blockchain technology and the Internet of Things using the most cutting-edge tools and methods currently available. This article discusses the principles of blockchain-based IoT, consensus methods, reviews, difficulties, prospects, applications, trends, and communication between IoT nodes in an integrated framework.
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...AlAtfat
This document provides a comprehensive literature review of blockchain-based Internet of Things (IoT) networks. It begins with introductions to blockchain technology and IoT. It discusses consensus methods, blockchain architecture layers, trends, and the role of blockchain in IoT. It explores communication among IoT nodes in blockchain-IoT frameworks and associated challenges. It also reviews applications and provides comparisons to related work. The document aims to analyze trends in blockchain approaches and tools for IoT environments to explore opportunities and challenges in further integrating blockchain and IoT technologies.
IRJET- Secure Online Voting Systems using Block of ChunksIRJET Journal
This document proposes a blockchain-based online voting system called Blockchain Voting System (BVS) to address the issues of slow voting processes and corruption in existing systems. BVS allows voters to simultaneously transmit their votes by assigning votes to pre-defined blocks on the blockchain. This significantly reduces delays in vote collection and tallying. BVS uses cryptography and message authentication to secure votes against hacking or manipulation. Analytical models show that BVS voting robustness increases with larger block parameters. The system could help achieve secure and transparent election results in less time.
Details in how InfiniteChain is the most practical solution to connect your centralized environment with public blockchain. Ethereum-based InfiniteChain addresses the blockchain bottleneck of privacy, transaction speed and block bloat.
Blockchain Computing: Prospects and Challenges for Digital Transformation Pr...eraser Juan José Calderón
Blockchain Computing: Prospects and Challenges for Digital Transformation . Professor Syed Akhter Hossain.
Abstract:
A revolutionary trustable sharable computing outcome, the blockchain is essentially a distributed database of records or public ledger of all transactions originated from digital events and shared among participating parties within a computing framework. Each transaction of the chain in the public ledger is verified by consensus of a majority of the participants in the system and its constituents. Once recorded, information can never be erased and neither altered. The blockchain contains a certain and verifiable record of every single transaction ever made during the business operations. In general sense, the blockchain could be described simply as being a way of storing the information of a transaction, between multiple parties in a trustable way. Recording, sharing, storing and redistributing contents in a secure and decentralized way. Being owned, run and monitored by everybody and without anyone controlling it. Besides, avoiding any kind of modifications or abuses from a central authority. Blockchain technology is non-controversial and has worked flawlessly over the last few years and is being successfully applied to both financial and non-financial world applications and listed as as the most important invention since the Internet itself. Besides, digital transformation is taking off as rapid agent for change as part of the global business convergence. In this article, detail of blockchain technologies is presented from the pe
IoT and Blockchain Challenges and RisksAhmed Banafa
The biggest challenge facing IoT security is coming from the very architecture of the current IoT ecosystem; it’s all based on a centralized model known as the server/client model. All devices are identified, authenticated and connected through cloud servers that support huge processing and storage capacities. The connection between devices will have to go through the cloud, even if they happen to be a few feet apart. While this model has connected computing devices for decades and will continue to support today IoT networks, it will not be able to respond to the growing needs of the huge IoT ecosystems of tomorrow.
A Technological Perspective of Blockchain SecurityRagaviRaghavan
This document discusses blockchain technology and its applications. It begins by defining blockchain as a shared ledger that records transactions in blocks linked through cryptography. It then discusses how blockchain can provide security, transparency and immutability for both public and private records. The document also examines challenges around data growth, potential solutions using blockchain, and security issues and attacks against blockchain systems. It provides examples of blockchain applications in government services, healthcare, manufacturing and more. Finally, it summarizes that blockchain introduces a new way to securely exchange digital assets and transactions in a decentralized manner.
This document provides an overview of blockchain technology. It begins by defining blockchains as distributed and decentralized digital ledgers that allow users to record transactions in a shared ledger that cannot be altered. The document then discusses the history and evolution of blockchain technology. It covers the key elements of blockchains including their use of cryptographic hash functions, transactions, addresses, distributed ledgers organized into blocks, and how new blocks are added to the chain in a linear fashion. The document also classifies blockchain networks as either public or permissioned and discusses aspects like consensus mechanisms. In summary, the document provides a comprehensive introduction to blockchain technology, its components, and different types of blockchain networks.
Similar to Fair and trustworthy: Lock-free enhanced tendermint blockchain algorithm (20)
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
In recent times, the trend of online shopping through e-commerce stores and websites has grown to a huge extent. Whenever a product is purchased on an e-commerce platform, people leave their reviews about the product. These reviews are very helpful for the store owners and the product’s manufacturers for the betterment of their work process as well as product quality. An automated system is proposed in this work that operates on two datasets D1 and D2 obtained from Amazon. After certain preprocessing steps, N-gram and word embedding-based features are extracted using term frequency-inverse document frequency (TF-IDF), bag of words (BoW) and global vectors (GloVe), and Word2vec, respectively. Four machine learning (ML) models support vector machines (SVM), logistic regression (RF), logistic regression (LR), multinomial Naïve Bayes (MNB), two deep learning (DL) models convolutional neural network (CNN), long-short term memory (LSTM), and standalone bidirectional encoder representations (BERT) are used to classify reviews as either positive or negative. The results obtained by the standard ML, DL models and BERT are evaluated using certain performance evaluation measures. BERT turns out to be the best-performing model in the case of D1 with an accuracy of 90% on features derived by word embedding models while the CNN provides the best accuracy of 97% upon word embedding features in the case of D2. The proposed model shows better overall performance on D2 as compared to D1.
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
In this study, a microstrip patch antenna that works at 3.6 GHz was built and tested to see how well it works. In this work, Rogers RT/Duroid 5880 has been used as the substrate material, with a dielectric permittivity of 2.2 and a thickness of 0.3451 mm; it serves as the base for the examined antenna. The computer simulation technology (CST) studio suite is utilized to show the recommended antenna design. The goal of this study was to get a more extensive transmission capacity, a lower voltage standing wave ratio (VSWR), and a lower return loss, but the main goal was to get a higher gain, directivity, and efficiency. After simulation, the return loss, gain, directivity, bandwidth, and efficiency of the supplied antenna are found to be -17.626 dB, 9.671 dBi, 9.924 dBi, 0.2 GHz, and 97.45%, respectively. Besides, the recreation uncovered that the transfer speed side-lobe level at phi was much better than those of the earlier works, at -28.8 dB, respectively. Thus, it makes a solid contender for remote innovation and more robust communication.
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
This document describes using a snake optimization algorithm to tune the gains of an enhanced proportional-integral controller for congestion avoidance in a TCP/AQM system. The controller aims to maintain a stable and desired queue size without noise or transmission problems. A linearized model of the TCP/AQM system is presented. An enhanced PI controller combining nonlinear gain and original PI gains is proposed. The snake optimization algorithm is then used to tune the parameters of the enhanced PI controller to achieve optimal system performance and response. Simulation results are discussed showing the proposed controller provides a stable and robust behavior for congestion control.
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
Vehicular ad-hoc networks (VANETs) are wireless-equipped vehicles that form networks along the road. The security of this network has been a major challenge. The identity-based cryptosystem (IBC) previously used to secure the networks suffers from membership authentication security features. This paper focuses on improving the detection of intruders in VANETs with a modified identity-based cryptosystem (MIBC). The MIBC is developed using a non-singular elliptic curve with Lagrange interpolation. The public key of vehicles and roadside units on the network are derived from number plates and location identification numbers, respectively. Pseudo-identities are used to mask the real identity of users to preserve their privacy. The membership authentication mechanism ensures that only valid and authenticated members of the network are allowed to join the network. The performance of the MIBC is evaluated using intrusion detection ratio (IDR) and computation time (CT) and then validated with the existing IBC. The result obtained shows that the MIBC recorded an IDR of 99.3% against 94.3% obtained for the existing identity-based cryptosystem (EIBC) for 140 unregistered vehicles attempting to intrude on the network. The MIBC shows lower CT values of 1.17 ms against 1.70 ms for EIBC. The MIBC can be used to improve the security of VANETs.
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
Understanding the primary factors of internet banking (IB) acceptance is critical for both banks and users; nevertheless, our knowledge of the role of users’ perceived risk and trust in IB adoption is limited. As a result, we develop a conceptual model by incorporating perceived risk and trust into the technology acceptance model (TAM) theory toward the IB. The proper research emphasized that the most essential component in explaining IB adoption behavior is behavioral intention to use IB adoption. TAM is helpful for figuring out how elements that affect IB adoption are connected to one another. According to previous literature on IB and the use of such technology in Iraq, one has to choose a theoretical foundation that may justify the acceptance of IB from the customer’s perspective. The conceptual model was therefore constructed using the TAM as a foundation. Furthermore, perceived risk and trust were added to the TAM dimensions as external factors. The key objective of this work was to extend the TAM to construct a conceptual model for IB adoption and to get sufficient theoretical support from the existing literature for the essential elements and their relationships in order to unearth new insights about factors responsible for IB adoption.
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
The smart antennas are broadly used in wireless communication. The least mean square (LMS) algorithm is a procedure that is concerned in controlling the smart antenna pattern to accommodate specified requirements such as steering the beam toward the desired signal, in addition to placing the deep nulls in the direction of unwanted signals. The conventional LMS (C-LMS) has some drawbacks like slow convergence speed besides high steady state fluctuation error. To overcome these shortcomings, the present paper adopts an adaptive fuzzy control step size least mean square (FC-LMS) algorithm to adjust its step size. Computer simulation outcomes illustrate that the given model has fast convergence rate as well as low mean square error steady state.
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
This paper presents the design and implementation of a forest fire monitoring and warning system based on long range (LoRa) technology, a novel ultra-low power consumption and long-range wireless communication technology for remote sensing applications. The proposed system includes a wireless sensor network that records environmental parameters such as temperature, humidity, wind speed, and carbon dioxide (CO2) concentration in the air, as well as taking infrared photos.The data collected at each sensor node will be transmitted to the gateway via LoRa wireless transmission. Data will be collected, processed, and uploaded to a cloud database at the gateway. An Android smartphone application that allows anyone to easily view the recorded data has been developed. When a fire is detected, the system will sound a siren and send a warning message to the responsible personnel, instructing them to take appropriate action. Experiments in Tram Chim Park, Vietnam, have been conducted to verify and evaluate the operation of the system.
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
Cognitive radio is a smart radio that can change its transmitter parameter based on interaction with the environment in which it operates. The demand for frequency spectrum is growing due to a big data issue as many Internet of Things (IoT) devices are in the network. Based on previous research, most frequency spectrum was used, but some spectrums were not used, called spectrum hole. Energy detection is one of the spectrum sensing methods that has been frequently used since it is easy to use and does not require license users to have any prior signal understanding. But this technique is incapable of detecting at low signal-to-noise ratio (SNR) levels. Therefore, the wavelet-based sensing is proposed to overcome this issue and detect spectrum holes. The main objective of this work is to evaluate the performance of wavelet-based sensing and compare it with the energy detection technique. The findings show that the percentage of detection in wavelet-based sensing is 83% higher than energy detection performance. This result indicates that the wavelet-based sensing has higher precision in detection and the interference towards primary user can be decreased.
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
In this paper, we present the design of a new wide dual-band bandstop filter (DBBSF) using nonuniform transmission lines. The method used to design this filter is to replace conventional uniform transmission lines with nonuniform lines governed by a truncated Fourier series. Based on how impedances are profiled in the proposed DBBSF structure, the fractional bandwidths of the two 10 dB-down rejection bands are widened to 39.72% and 52.63%, respectively, and the physical size has been reduced compared to that of the filter with the uniform transmission lines. The results of the electromagnetic (EM) simulation support the obtained analytical response and show an improved frequency behavior.
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
A distributed denial of service (DDoS) attack is where one or more computers attack or target a server computer, by flooding internet traffic to the server. As a result, the server cannot be accessed by legitimate users. A result of this attack causes enormous losses for a company because it can reduce the level of user trust, and reduce the company’s reputation to lose customers due to downtime. One of the services at the application layer that can be accessed by users is a web-based lightweight directory access protocol (LDAP) service that can provide safe and easy services to access directory applications. We used a deep learning approach to detect DDoS attacks on the CICDDoS 2019 dataset on a complex computer network at the application layer to get fast and accurate results for dealing with unbalanced data. Based on the results obtained, it is observed that DDoS attack detection using a deep learning approach on imbalanced data performs better when implemented using synthetic minority oversampling technique (SMOTE) method for binary classes. On the other hand, the proposed deep learning approach performs better for detecting DDoS attacks in multiclass when implemented using the adaptive synthetic (ADASYN) method.
The appearance of uncertainties and disturbances often effects the characteristics of either linear or nonlinear systems. Plus, the stabilization process may be deteriorated thus incurring a catastrophic effect to the system performance. As such, this manuscript addresses the concept of matching condition for the systems that are suffering from miss-match uncertainties and exogeneous disturbances. The perturbation towards the system at hand is assumed to be known and unbounded. To reach this outcome, uncertainties and their classifications are reviewed thoroughly. The structural matching condition is proposed and tabulated in the proposition 1. Two types of mathematical expressions are presented to distinguish the system with matched uncertainty and the system with miss-matched uncertainty. Lastly, two-dimensional numerical expressions are provided to practice the proposed proposition. The outcome shows that matching condition has the ability to change the system to a design-friendly model for asymptotic stabilization.
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...TELKOMNIKA JOURNAL
Many systems, including digital signal processors, finite impulse response (FIR) filters, application-specific integrated circuits, and microprocessors, use multipliers. The demand for low power multipliers is gradually rising day by day in the current technological trend. In this study, we describe a 4×4 Wallace multiplier based on a carry select adder (CSA) that uses less power and has a better power delay product than existing multipliers. HSPICE tool at 16 nm technology is used to simulate the results. In comparison to the traditional CSA-based multiplier, which has a power consumption of 1.7 µW and power delay product (PDP) of 57.3 fJ, the results demonstrate that the Wallace multiplier design employing CSA with first zero finding logic (FZF) logic has the lowest power consumption of 1.4 µW and PDP of 27.5 fJ.
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
The flaw in 5G orthogonal frequency division multiplexing (OFDM) becomes apparent in high-speed situations. Because the doppler effect causes frequency shifts, the orthogonality of OFDM subcarriers is broken, lowering both their bit error rate (BER) and throughput output. As part of this research, we use a novel design that combines massive multiple input multiple output (MIMO) and weighted overlap and add (WOLA) to improve the performance of 5G systems. To determine which design is superior, throughput and BER are calculated for both the proposed design and OFDM. The results of the improved system show a massive improvement in performance ver the conventional system and significant improvements with massive MIMO, including the best throughput and BER. When compared to conventional systems, the improved system has a throughput that is around 22% higher and the best performance in terms of BER, but it still has around 25% less error than OFDM.
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
In this study, it is aimed to obtain two different asymmetric radiation patterns obtained from antennas in the shape of the cross-section of a parabolic reflector (fan blade type antennas) and antennas with cosecant-square radiation characteristics at two different frequencies from a single antenna. For this purpose, firstly, a fan blade type antenna design will be made, and then the reflective surface of this antenna will be completed to the shape of the reflective surface of the antenna with the cosecant-square radiation characteristic with the frequency selective surface designed to provide the characteristics suitable for the purpose. The frequency selective surface designed and it provides the perfect transmission as possible at 4 GHz operating frequency, while it will act as a band-quenching filter for electromagnetic waves at 5 GHz operating frequency and will be a reflective surface. Thanks to this frequency selective surface to be used as a reflective surface in the antenna, a fan blade type radiation characteristic at 4 GHz operating frequency will be obtained, while a cosecant-square radiation characteristic at 5 GHz operating frequency will be obtained.
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
A simple and low-cost fiber based optical sensor for iron detection is demonstrated in this paper. The sensor head consist of an unclad optical fiber with the unclad length of 1 cm and it has a straight structure. Results obtained shows a linear relationship between the output light intensity and iron concentration, illustrating the functionality of this iron optical sensor. Based on the experimental results, the sensitivity and linearity are achieved at 0.0328/ppm and 0.9824 respectively at the wavelength of 690 nm. With the same wavelength, other performance parameters are also studied. Resolution and limit of detection (LOD) are found to be 0.3049 ppm and 0.0755 ppm correspondingly. This iron sensor is advantageous in that it does not require any reagent for detection, enabling it to be simpler and cost-effective in the implementation of the iron sensing.
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
This article discusses the progressive learning for structural tolerance online sequential extreme learning machine (PSTOS-ELM). PSTOS-ELM can save robust accuracy while updating the new data and the new class data on the online training situation. The robustness accuracy arises from using the householder block exact QR decomposition recursive least squares (HBQRD-RLS) of the PSTOS-ELM. This method is suitable for applications that have data streaming and often have new class data. Our experiment compares the PSTOS-ELM accuracy and accuracy robustness while data is updating with the batch-extreme learning machine (ELM) and structural tolerance online sequential extreme learning machine (STOS-ELM) that both must retrain the data in a new class data case. The experimental results show that PSTOS-ELM has accuracy and robustness comparable to ELM and STOS-ELM while also can update new class data immediately.
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
This study aimed to develop a brain-computer interface that can control an electric wheelchair using electroencephalography (EEG) signals. First, we used the Mind Wave Mobile 2 device to capture raw EEG signals from the surface of the scalp. The signals were transformed into the frequency domain using fast Fourier transform (FFT) and filtered to monitor changes in attention and relaxation. Next, we performed time and frequency domain analyses to identify features for five eye gestures: opened, closed, blink per second, double blink, and lookup. The base state was the opened-eyes gesture, and we compared the features of the remaining four action gestures to the base state to identify potential gestures. We then built a multilayer neural network to classify these features into five signals that control the wheelchair’s movement. Finally, we designed an experimental wheelchair system to test the effectiveness of the proposed approach. The results demonstrate that the EEG classification was highly accurate and computationally efficient. Moreover, the average performance of the brain-controlled wheelchair system was over 75% across different individuals, which suggests the feasibility of this approach.
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
For image segmentation, level set models are frequently employed. It offer best solution to overcome the main limitations of deformable parametric models. However, the challenge when applying those models in medical images stills deal with removing blurs in image edges which directly affects the edge indicator function, leads to not adaptively segmenting images and causes a wrong analysis of pathologies wich prevents to conclude a correct diagnosis. To overcome such issues, an effective process is suggested by simultaneously modelling and solving systems’ two-dimensional partial differential equations (PDE). The first PDE equation allows restoration using Euler’s equation similar to an anisotropic smoothing based on a regularized Perona and Malik filter that eliminates noise while preserving edge information in accordance with detected contours in the second equation that segments the image based on the first equation solutions. This approach allows developing a new algorithm which overcome the studied model drawbacks. Results of the proposed method give clear segments that can be applied to any application. Experiments on many medical images in particular blurry images with high information losses, demonstrate that the developed approach produces superior segmentation results in terms of quantity and quality compared to other models already presented in previeous works.
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
Drug addiction is a complex neurobiological disorder that necessitates comprehensive treatment of both the body and mind. It is categorized as a brain disorder due to its impact on the brain. Various methods such as electroencephalography (EEG), functional magnetic resonance imaging (FMRI), and magnetoencephalography (MEG) can capture brain activities and structures. EEG signals provide valuable insights into neurological disorders, including drug addiction. Accurate classification of drug addiction from EEG signals relies on appropriate features and channel selection. Choosing the right EEG channels is essential to reduce computational costs and mitigate the risk of overfitting associated with using all available channels. To address the challenge of optimal channel selection in addiction detection from EEG signals, this work employs the shuffled frog leaping algorithm (SFLA). SFLA facilitates the selection of appropriate channels, leading to improved accuracy. Wavelet features extracted from the selected input channel signals are then analyzed using various machine learning classifiers to detect addiction. Experimental results indicate that after selecting features from the appropriate channels, classification accuracy significantly increased across all classifiers. Particularly, the multi-layer perceptron (MLP) classifier combined with SFLA demonstrated a remarkable accuracy improvement of 15.78% while reducing time complexity.
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...University of Maribor
Slides from talk presenting:
Aleš Zamuda: Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapter and Networking.
Presentation at IcETRAN 2024 session:
"Inter-Society Networking Panel GRSS/MTT-S/CIS
Panel Session: Promoting Connection and Cooperation"
IEEE Slovenia GRSS
IEEE Serbia and Montenegro MTT-S
IEEE Slovenia CIS
11TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTING ENGINEERING
3-6 June 2024, Niš, Serbia
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
Fair and trustworthy: Lock-free enhanced tendermint blockchain algorithm
1. TELKOMNIKA Telecommunication, Computing, Electronics and Control
Vol. 18, No. 4, August 2020, pp. 2224∼2234
ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, No: 21/E/KPT/2018
DOI: 10.12928/TELKOMNIKA.v18i4.15701 Ì 2224
Fair and trustworthy: Lock-free enhanced tendermint
blockchain algorithm
Basem Assiri, Wazir Zada Khan
Department of CS and IS, Jazan University, Jazan, Saudi Arabia
Article Info
Article history:
Received January 30, 2020
Revised April 13, 2020
Accepted April 29, 2020
Keywords:
Blockchain protocol
Consensus protocols
Correctness
Cryptocurrency
Fairness
Lock-free
Smart contracts
ABSTRACT
Blockchain Technology is exclusively used to make online transactions secure by
maintaining a distributed and decentralized ledger of records across multiple com-
puters. Tendermint is a general-purpose blockchain engine that is composed of two
parts; Tendermint Core and the blockchain application interface. The application in-
terface makes Tendermint suitable for a wide range of applications. In this paper, we
analyze and improve Practical Byzantine Fault Tolerant (PBFT), a consensus-based
Tendermint blockchain algorithm. In order to avoid negative issues of locks, we first
propose a lock-free algorithm for blockchain in which the proposal and voting phases
are concurrent whereas the commit phase is sequential. This consideration in the al-
gorithm allows parallelism. Secondly, a new methodology is used to decide the size
of the voter set which is a subset of blockchain nodes, further investigating the block
sensitivity and trustworthiness of nodes. Thirdly, to fairly select the voter set nodes,
we employ the random walk algorithm. Fourthly, we imply the wait-freedom property
by using a timeout due to which all blocks are eventually committed or aborted. In
addition, we have discussed voting conflicts and consensuses issues that are used as a
correctness property, and provide some supportive techniques.
This is an open access article under the CC BY-SA license.
Corresponding Author:
Wazir Zada Khan,
Department of CS and IS,
Jazan University,
Main University Campus, Jazan, 45142, Saudi Arabia.
Email: wazirzadakhan@jazanu.edu.sa
1. INTRODUCTION
Blockchain technology, also called Distributed Ledger technology is capable of achieving and main-
taining data integrity in distributed systems, so the interest in this technology has been increased. The term
blockchain was started in the 90’s as variant of distributed database in which event or information was stored.
After the global financial meltdown in September 2008, the term ”Bitcoin” was first introduced by Satoshi
Nakamoto [1]. Being the first application as a pure peer to peer electronic payment concept that was initially
proposed to avoid the incurred cost caused by online payments. During the period of September 2014-2015
[2], bitcoin has experienced an exponential growth with over 4 million users, which has transformed it into
one of the most powerful computing networks in existence. After the success of Bitcoin, blockchain has been
applied in many applications including smart cities [3], content delivery networks [4], access control systems
[5], smart grid powered systems, Internet of Things (IoT) and Industrial IoT (IIoT) [6, 7].
User transactions can be recorded in a decentralized fashion rather than centralized digital ledger ap-
Journal homepage: http://journal.uad.ac.id/index.php/TELKOMNIKA
2. TELKOMNIKA Telecommun Comput El Control Ì 2225
proaches. A blockchain avoids the alteration of all subsequent blocks or collusion of all nodes in the network
by maintaining a distributed and decentralized ledger of records across multiple computers[8]. The transac-
tions and some details (such as sender, receiver, amount of money, and hash number) are grouped into datasets
referred to as ”blocks” [9]. The blockchain users are called ”miners” who record and share the data blocks over
the whole blockchain network. Every node has a copy of the ledger and all node are connected for communi-
cations. The nodes communicate to maintain the copies of the ledger and to synchronize processes. Through
integration of edge computing and blockchain technology, high throughput and efficiency of transaction pro-
cessing can be achieved while maintaining data security and integrity [10].
The operation and working of blockchain is as follows: A new transaction record is created when a
blockchain user performs a transaction which is then transferred to neighboring peer users in the blockchain
network. Prior to adding blocks to the public ledger, verification of transactions is done by the neighboring peer
users who used to perform mining by utilizing consensus algorithms. These distributed consensus protocols are
used to ensure that the newly added transactions are not altered or not fake. For the validation of the block, the
nodes in the peer to peer network solve a crypto-puzzle called Proof-of-work (PoW) by using computational re-
sources at their disposal [11]. Since this approach is considered to be an energy inefficient consensus approach,
in order to avoid depletion of computational resources, various consensus mechanisms are proposed including
proof-of-stake (PoS), proof of activity, proof of space, variants of Byzantine fault-tolerant algorithms (BFT).
The proof-of-stake (PoS) consensus protocol is an interestingly attractive one because it does not cost com-
puting power and provides increased protection from a malicious attack on the network. In PoS mechanism,
there is pre-distribution of stakes at the beginning of the process. The entities that have stakes in the system are
allowed to take block-inclusion decisions, irrespective of blockchain’s length or history of the public ledger.
Differing in the consensus mechanism, recently many variants of blockchain protocols are proposed
[12, 13]. Comparing to the other existing blockchain protocols, the Tendermint blockchain has unique charac-
teristics including cross chain transactions system along with in-chain transactions. A new set of validators is
selected dynamically for each new block. Recently many studies have analyzed the correctness and fairness of
Tendermint blockchain protocol [14]. Identifying many bugs in the code of original Tendermint protocol, this
study has proposed fixes for these errors and for achieving correctness and fairness, many enhancements are
also proposed. Another recent study [15] has also analyzed the original Tendermint protocol and highlighted
various challenges caused by adversary and system model. In this paper, we have also reviewed the contribution
in [16] and after further investigation, we propose an enhancement, discussing the design and the Tendermint
blockchain protocol in more details. We have made the following enhancements in the original Tendermint
blockchain protocol:
• The proposal and voter phases are considered concurrent while the commit phase is considered sequen-
tial.
• The voters set is a subset of blockchain nodes. A new methodology is used to decide the size of this
subset, investigating the block sensitivity and nodes trustworthiness.
• For the selection of voters set nodes, the random walk algorithm is employed.
• The wait-freedom property is maintained by using a timeout on the voting phase. Thus, all blocks are
eventually committed or aborted, which means no one stays in the execution forever and no one waits
forever to execute.
• The reasons for voting conflicts and the weakness of consensuses when it is used as a correctness property
are investigated using Round2 of the algorithm.
• Finally, Detection of Byzantine and failure nodes in the blockchain is shown.
The remainder of this paper is organized as follows: section 2 discuss the related work. Section 3
defines the System Model. Section 4 discusses the proposed modified algorithm. Sections 5 discusses the
various concepts. Finally, section 6 concludes the paper.
2. RELATED WORK
The Tendermint is a PBFT consensus-based blockchian protocol [12–14]. Recently, few research stud-
ies have identified some issues and proposed enhancements in original Tendermint blockchian
protocol [14–16]. Y. Amoussou-Guenou et al. [14] have studied the correctness and fairness of Tendermint
blockchain protocol. They have identified issues and many bugs in original protocol. To achieve the correct-
ness and fairness, they have proposed enhancement by fixing the identified issues and bugs. In [15] the original
Fair and trustworthy: Lock-free enhanced tendermint blockchain ... (Basem Assiri)
3. 2226 Ì ISSN: 1693-6930
Tendermint protocol is analyzed. The authors have highlighted various challenges caused by adversary and
system model.
Our proposed enhanced Tendermint algorithm is different from the original Tendermint [12, 13] and
its enhance variants [14, 15], in the following ways; First, as compared to the existing Tendermint algorithms
that are lock based, our algorithm is lock-free. Although, the Tendermint algorithm and its variants use timeout
to maintain the correctness. However, it does not provide progressiveness such that in case of transaction
failure while holding the lock, it results in an issue with maintaining the progressiveness and the correctness
of blockchain. Secondly, we have used the wait-freedom property for eventually commit or abort without
staying in the execution forever or wait for execution for the non-deterministic time period. On the other
hand, the Tendermint algorithm and its variants use timeout to maintain the correctness. We have proposed
novel methods for the selection of the size of validator’s subsets and selection of validators in order to achieve
fairness. We have also considered the trustworthiness of nodes and sensitivity of data. We have also employed
a random walk for the selection of validators whereas, the original Tendermint and its enhanced variants select
the validators deterministically which results in unfair reward distribution of the validators.
3. SYSTEM MODEL
This section defines the fundamentals of our blockchain system model. The blockchain [1, 17, 18]
consists of a set of nodes (processors) of size n, called P, where P = {P1, ..., Pn}; and Pi is any processor
belongs to P and i is an integer such that 0 < i < n. The blockchain contains a distributed ledger L, and
each node shares copies of memory objects and L. For example, for a bank blockchain, the memory objects
represent the bank accounts, while the operations on the bank account recorded in L.
The operations on the memory objects are either read or write. The read operation returns the data of
the memory object, while the write operation updates the data of memory object. A transaction is a sequence
of read and/or write operations that execute in isolation and at the end, the transaction commits if it is correct,
otherwise, it aborts [19]. For example, if a bank account x has an amount of money equals to 100$, and a
transaction withdraws 10$, then the new value of x is 90$, this transaction is correct and commits; however if
the result of x is 50$, then the transaction aborts.
A block B consists of one or more transaction and B commits when all transactions in B commits. On
the other hand, B aborts if at least one transaction aborts. Upon the creation of B, it gets the index of proposer
as an identifier, namely Bi. It also gets a unique timestamp called ts and it keeps in mind the situation of L;
especially the order of the last committed block in L, called Lbts. Actually, every committed B represents a
page in L. The aborted blocks do not show up in L, but for correctness purpose, we consider their ts. Having a
blockchain of 4 nodes, Figure 1 shows L of two committed blocks (in the form of Bi.ts). The blocks are B2.0
and B4.2. The first block in L is proposed by nodes indexed as 2, and its ts is 0. The node 2 also proposes
another block with ts = 1 but it is aborted, so it is not recorded in L. The second block in L is proposed by
node 4, with ts = 2. This means L has blocks with the timestamps of 0 and 2, but it skips the block of ts = 1
(because it is aborted).
The blocks are chained in L using hashing, such that each block has the hash of the previous one.
Thus, L is unchangeable. The nodes communicate with each other through messages exchange over a network.
The blockchain allows broadcasting messages in parallel and a timeout is used to limit the delays. The timeout
is specified according to systems specifications. Since P might include a large number of processors, and to
reduce the cost of voting processes, we have a subset of validators (voters), called V , where V ⊆ P. The size
of V (or a number of validators) varies from system to another based on the level of data sensitivity and nodes
trustworthiness.
The blockchain may include some network issue, failure nodes or Byzantine ones. A Byzantine node
is the one that misleads the system or even lies intentionally [20, 21]. Network issue, failure nodes or no
show votes are considered as negative votes. The decision on block B is taken through consensus, which
finds the decision of the majority. The majority could be any percentage between 51% and 99%, and that is
decided based on the system sensitivity [22, 23]. This helps to reduce the influence of Byzantine nodes. In our
algorithm, we test node twice to investigate if it is a Byzantine or not, and to take decision such as excluding
it. In our algorithm, we use voters set[] to represent V . The node Pi broadcasts a proposal of Bi with a unique
ts. The nodes in V compute the transactions of Bi and vote to commit or abort Bi. Then, they broadcast the
votes in the form of 0 or 1. The received votes are stored in votes[].
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 4, August 2020 : 2224 – 2234
4. TELKOMNIKA Telecommun Comput El Control Ì 2227
Figure 1. The Ledger L Including the Committed Block B2.0 and B4.2 Only, While the Timestamps of the
Blocks are 0 and 2. The Timestamp 1 is a Unique Timestamp for an Aborted Transaction B2.1.
4. PROPOSED ALGORITHM
In the beginning, blockchain algorithm consists of three phases (as shown in Algorithm 1), which are:
(i) proposal phase; (ii) voting phase; (iii) commit phase. First, for the proposal phase, any node Pi can propose
and create a block Bi at any moment. Now, it sets a timeout for this proposal to complete within. Since some
blockchains have a large number of nodes, it is very costly to include all of them in the votes. However, based
on data sensitivity and system trustworthiness, Pi decides the size of how many nodes should vote through
a function called size voters set() (that will be explained in details later). Then, Pi calls voters set() to
decides which nodes are going to vote using a random-walk algorithm (that will be explained in details later).
After that, Pi finishes proposing phase by broadcasting Bi, L, Lbts and ts to all nodes in the voters set[].
Since the proposal phase can be executed by more than one node in parallel, Pi uses a unique integer number
(ts) to show the position of Bi in L if Bi commits; otherwise, when Bi aborts we skip its ts. The selection
of a unique number ts can be executed in a decentralized manner through many algorithms such as Counting
Network [24, 25]. This step ends the proposing phase.
Second, at the beginning of the voting phase, every node in voters set[] validates Bi and votes using
a function called vote(). In vote(), the node records 1 if Bi is valid or 0 if it is not. Actually, we create an
arrayvotes[] in corresponding to voters set[]. Next, we wait for some time until all nodes in voters set[]
vote or the timeout finishes. After that, if timeout finishes while some votes are still missing, then consider all
missing votes as votes against Bi using a function called no show votes(). Indeed, for those missing votes,
we record 0 in votes[]. To end the vote phase, Pi calls mj vote Ok(), checks the votes of the majority, and
broadcasts commit or abort message.
Third, the commit phase is the critical section of our algorithm, where we should maintain the ts s
of committed blocks in L. It is clear that using timeout all blocks are eventually committed or aborted. For
aborted ones we do nothing. However, for committed ones, all nodes must connect them to L in the same order;
otherwise, nodes would have different ledgers. In the commit phase, if Bi.ts comes directly after Lbts in L,
then Bi commits. For example, if the ts of the last block in the ledger Lbts = 5, and Bi.ts = 6, it commits.
On the other hand, if there is a gap between Bi.ts and Lbts, then Bi has to wait for all blocks in-between to
either commit or abort, then Bi commits. For example, if the ts of the last block in the ledger Lbts = 5, and
Bi.ts = 8, then Bi waits for commit and abort broadcasted messages that tells about the blocks of timestamps
6 and 7. Actually, if it receives an abort messages for any of them; it does nothing; while receiving a commit
message for any of them means it has to connect it to L before Bi.
Fair and trustworthy: Lock-free enhanced tendermint blockchain ... (Basem Assiri)
5. 2228 Ì ISSN: 1693-6930
As mentioned before, the consensus decision means some nodes may vote against the majority. This
happens because of many reasons, such as (i) nodes have computation and processing issue; (ii) being a Byzan-
tine node and lay intentionally; (iii) having an issue with memory consistency [26]. For example, having
a memory block x, that equals to 50, when a proposed transaction adds 100 to x, it becomes 150. Since
blockchain is decentralized, there is a copy of x in all nodes. If there is an issue of updating x in some parts of
the system, then some nodes may have x = 50 (memory is not consistent), and by adding 100 to x, the result
would not be 150, so it votes against the transaction.
In some cases, some nodes do not vote. This happens because of many reasons, such as nodes are
being in failure; or having communication and network issues. Our algorithm introduces Round2 (as shown
in Algorithm 2), to investigate these issues. This helps the system to be aware of each node in the blockchain,
find network issue, improve the consensus ratio, and improve the system trustworthiness. In the beginning,
the proposer node Pi creates a new voters set voters set2[] includes all nodes that voted against in Round1.
Pi selects one node Pj from those nodes that voted with the majority in Round1 (Pj could be Pi). Then, Pj
broadcasts copies of memory blocks that are accessed by Bi (called Bi. access set) to voters set2[]. After that,
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 4, August 2020 : 2224 – 2234
6. TELKOMNIKA Telecommun Comput El Control Ì 2229
nodes in voters set2[], updates their memory, re-validates Bi and votes again; If Pi belongs to voters set2[],
it does the same thing. It waits for some time to get the votes. When the timeout finishes, there are three
possibilities: (i) some nodes vote (with a majority of Round1) correctly, which means they had a memory
consistency issue and by updating their memories they get the same results of the majority; (ii) some nodes do
not vote, which means they have a failure or communication and network issue (no show votes failed());
(iii) If nodes still voting against the majority of Round1, then they are Byzantine.
4.1. Correctness proof
Our algorithm is a lock-free algorithm where nodes are able to propose and vote in parallel. However,
block committing has to modify the ledger, so it should be serialized and ordered according to timestamps. In
the correctness analysis, we show that our algorithm satisfies the Linearizability which is a correctness property
that validates concurrent execution. In linearizability, all blocks are ordered in a way that matches a correct
sequential execution [27, 28]. Let H be a parallel execution history of all blocks. Now let S be a sequential
history, which shows a serialization of the blocks in H based on their timestamps. Indeed, for any two blocks
Bi and Bj, if i < j, then Bi <s Bj. Note that the timestamp for every block is unique.
Lemma 4..1. S preserves the real time order of H.
Proof. According to Algorithm 1, for a block Bi the timestamp i is a unique one, since it is obtained through
the Counting Networks. If Bi <H Bj then, i < j. Since S orders blocks in the timestamp order, then we also
have that Bi <S Bj, as needed.
Lemma 4..2. Our algorithm is wait-free.
Proof. It is trivial to prove that our algorithm is wait-free, as according to the propose phase in Algorithm 1,
every block Bi has a timeout. Clearly when the time equals to T, Bi must finish.
After that, the voting phase continues until all votes arrive, or the timeout finishes (means the time
reaches T). In such case, the missing votes are considered as negative votes. Then, we check the majority of
votes to commit or abort. Therefore, every block eventually finishes within a specific timeout; and the next
block eventually executes.
Lemma 4..3. The blocks in H are ordered based on their timestamps.
Proof. Let a block Bi has a timestamp ts = i, and the timestamp of the last block in the ledger Lbts = x.
where i > x.
i. If Bi passes proposing and voting phases successfully, and it is about to commit. If i − x = 1 (which
means i is ordered directly after x), then Bi commits and connected to the ledger next to Bx.
ii. If Bi passes proposing and voting phases successfully, and it is about to commit. If i − x = 1, which
means there is at least one block with a timestamp between x and i, such that {Bx+1, ..., Bi−1} (where
we could have Bx+1 = Bi−1) . For simplicity let say there is only one block Bj between Bx and Bi,
where x < j < i. Then Bi waits until either Bj aborts (receiving abort messages); or Bj commits and
becomes the last block in the ledger (Lbts = j). Thus, Bi commits since i − j = 1.
Seeking a contradiction, assume that Bi commits before Bj finishes (commits/abort). Then based on the
commit phase in Algorithm1; either i−x = 1, which is impossible since x < j < i; or Bi receives abort
messages of Bj, which is also impossible since the Bj abortion massage means that Bj already finishes,
contradiction.
In general case, Bi waits until either some/all of blocks {Bx+1, ..., Bi−1} abort or commit. Actually,
Bi knows aborted blocks by receiving abort messages; and knows committed blocks by following the
changes of Lbts. Therefore the ledger preserves the timestamp order.
iii. If Bi fails in proposing or voting phases, Then either the majority vote to abort it, and the abortion
massages get sent; otherwise the timeout finishes and the missing votes are considered as negative ones,
so it also seems like the majority vote to abort it. Actually, in both cases the aborted block Bi can be
ordered easily in the right position in H, since it does not modify the ledger or any local memory.
Therefore, in all cases H preserves the order of S, considering all blocks in H, and from Lemmas
4..1, 4..2 and 4..3, we obtain the following theorem.
Theorem 4..4. Any execution history H using our algorithm is linearizable (correct) as it respects the times-
tamps order that appears in S.
Fair and trustworthy: Lock-free enhanced tendermint blockchain ... (Basem Assiri)
7. 2230 Ì ISSN: 1693-6930
4.2. Selection of the validator’s group size (variable set of validators)
The selection of validators (voters/ miners) in the consensus process is a very important part. After the
51% miner’s validation, the new blocks can be added to the chain. Normally in the block verification process,
all miners participate in the consensus process. Selecting all miners is a costly process in terms of processing
and energy. But sometimes depending upon the sensitivity of data and trustworthiness of miners, it is possible to
select a subset of miners out of all the set of miners. We have proposed a new mechanism for the selection of val-
idators. The subset of validators is selected based on the sensitivity of data and the trustworthiness of validators.
If the data is highly sensitive and trustworthiness level of the system is low then we need high numbers of val-
idators. On the other hand, if the data sensitivity requirements are low and the trustworthiness high then we need
a relatively small number of validators. The following matrix explains (Table 1) the relationship between the
three actors (Data sensitivity (di), trustworthiness (ti) and validators (vi)) for the maximum size of the subset of
validators.
Table 1. Relationship between data sensitivity, trustworthiness and the size of the subset of validators
Data sensitivity (di) Trustworthiness (ti) Validators (vi)
High High 50%
High Low 75%
Low High 25%
Low Low 50%
4.3. Selection of validators
In the blockchain, a new block is appended to the chain after the agreement of validators. After we
discuss the size of validators set, now we focus one the validator selection. The selection of validators varies
according to types of blockchains. For example, in Tendermint blockchain protocol, the subset of validators is
selected deterministically using the current history of blockchain. The subset of validators only changes when
new blocks are added to the chain. In this paper, we have proposed a novel validator selection mechanism.
In the proposed mechanism, we have employed a random walk for the selection of validators. When a new
block B is proposed by a proposer, it will select a subset of validators through a random walk. The proposed
selection mechanism has few unique features, i.e., the subset of validators are selected non-deterministically
and randomly. For every new proposed block, a new subset of validators will be selected. The length of the
random walk will be equal to the size of the subset of the validator (explained in the previous section). The
proposer node will select a validator randomly from a set of validator and forward the newly created block to the
selected validator. The selected validator will select another validator from the list and forward the new block
received from the proposer node. The validator selection process will continue until the required numbers of
validators have not being selected (selected validators = = vi). Due to the pure nature of the random walk, we
can restrict the random walk to not the selected the already passed validators (i.e., we will exclude them from
the group of validators once selected). Figure 2 shows the selection mechanism of validators using random
walk.
5. DISCUSSION
5.1. Transaction’s validation
Clearly, in blockchain there are two levels of validation and correctness check, which are the val-
idation of transactions and the validation of blocks (of transactions). This section focuses on transactions
validation. In fact, when any node creates a new transaction, nodes (miners) picked it up to check the cor-
rectness of the transaction, validity, legality and its output [27, 28]. For example, a bank account x belongs
to user1, and x contains 100$. Now user1 withdraws 10$ form x, so the value of x becomes 90$. This is
a valid and legal transaction. After that, let user1 withdraws 100$, then this is invalid transaction since x
does not have sufficient fund to execute the transaction. Also, if x contains 90$ and user1 withdraws 20$,
but for some reasons x becomes 50$, then it is invalid transaction. This way, nodes check the validity of
transactions. If the transaction is valid (correct), it is stored in the node’s block, otherwise it is ignored. The
node continues the transactions’ validation process and place them in its own block until it reaches the block
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 4, August 2020 : 2224 – 2234
8. TELKOMNIKA Telecommun Comput El Control Ì 2231
capacity , then it proposes the block to the validators for another validation process. Moreover, it is impor-
tant to notes that all nodes work in isolation, so each one build its own block regardless the others. This
allows different nodes to validate the same transaction, so one transaction may appear in more than one block.
Figure 2. Selection mechanism of validators using random walk
5.2. Block’s validation
This section focuses on the block validation process. Upon the creation of a new block of transactions,
the block should hash it own content (transactions) and produce a fixed size hash number, with specific criteria.
This guarantees that no one would change the content of the block, as any change to the block will change
the hash number. Blockchain uses PoW to produce the hash number, where the proposer node should solve a
mathematical crypto-puzzle [11] (it can use different techniques such as PoS). The hash of the last block in the
ledger must be attached as well. The proposer node also includes its digital signature to confirm that the new
block is proposed by an authentic and authorized node.
When node proposes a block to the validators, the validators check the block and vote to add it to the
ledger (using consensus). Actually the validators validate four items as follows:
• Validators validate the signature of the proposer node to verify that the block is created by a legitimate
node.
• Validators validate the PoW to verify that it matches the system criteria and it matches the content of the
block (which means the content of the block has not been changed).
• Validators validate the hash of the previous block to fix the order of the block in the ledger.
• Validators validate the content of the block to prevent the conflicts and illegal transactions.
Now, blockchain uses consensus to validate the content of the block to prevent the conflicts and illegal
transactions. The consensus decision influences the order of the blocks that are added to the ledger. Figure
3 (a) shows the status of memories for four bank accounts before the block validation and execution. Figure
3 (b) shows three blocks where every block has two transactions. In Block1, Tx1 withdraws 10$ from acc1,
so it becomes 90$. Then, Tx2 withdraws 100$ from acc2, so acc2 = 100$. In Block2, Tx3 withdraws 50$
from acc3, so acc3 = 450$. Then, Tx4 deposits 100$ to acc4, so acc4 = 110$. Block3, also has Tx1
and Tx5 where it deposits 30$ to acc4, so acc4 = 40$. Thus, Block3 conflicts with Block1 and Block2.
Indeed Block1 and Block3 both include Tx1, which means if we allows to both of them to commit, then
Tx1 will execute twice and double the withdraw operations on acc1, which is not acceptable. Moreover,
Block3 conflicts with Block2 since Tx4 and Tx5 both of them executes operations on acc4, and both of them
are not aware of each other. If both of them commit, then the amount of acc4 will be either 110$ or 40$
(according to the committing order), where the right value is the accumulative of both which is 140$. Thus,
if by consensus, Block1 and Block2 commit first (they can commit in any order as there is no dependency
between them), Block3 must be aborted. On the other hand, if by consensus, Block3 commits first, then
Fair and trustworthy: Lock-free enhanced tendermint blockchain ... (Basem Assiri)
9. 2232 Ì ISSN: 1693-6930
Block1 and Block2 must be aborted. The following section focuses on how to order blocks in the ledger.
Figure 3. (a) Shows the status of four bank accounts;
(b) Shows three blocks where every block includes two transactions
5.3. Correctness
In this paper, we focus on the correctness of blocks rather than arguing about the correctness of trans-
actions themselves. The correctness of transactions is checked by miners before they propose the blocks. To
validate the transactions, nodes may use any approved correctness prosperity such as opacity or Linearizability
[27, 28]. Indeed, many researchers restrict the parallelism of blockchain to guarantee correctness [13, 14].
Some algorithms use locks to serialize blocks execution or pipelining them. This increases the execution time
and may result in some lock’s issues such as deadlock and starvation. However, our algorithm is a lock-free
algorithm where nodes are able to propose and vote in parallel. In fact, proposing and voting run in temporary
memory and do not require maintaining the ledger. On the other hand, the critical section of our algorithm is
when nodes modify the ledger, which is the moment of commit. We propose a timestamped based algorithm
where every block has a unique timestamp ts [29]. This ts tells wither the block should commit or wait. Ac-
tually, blocks can be aborted directly (based on consensus), since the aborted blocks do not update the ledger.
Committed blocks must maintain the ledger with respect to their ts, so every block has to wait for all blocks of
timestamps smaller than its own.
5.4. Consensus
The validation of blocks is conducted via consensus. Actually, the consensus is considered as a weak
correctness prosperity, it is indeed a fault tolerance property [20, 21, 30]. This means consensus is able to
work with some faulty results (votes). For example, the block can commit even with about %49 negative votes.
To the best of our knowledge, blockchain algorithms do not consider the weakness of consensus itself. For
example, with some financial operations, the decision has to be black or white from all validators, while the
consensus allows for some gray area. In our algorithm, we introduce some techniques to support the consensus
decision. First, we select the number of validators based on the sensitivity of the data. Second, we decide
the consensus percentage based on both data sensitivity and trustworthiness. For example, with our criteria,
for some critical matters, the consensus may reach 99%, or abort. Third, we evaluate the trustworthiness of
the nodes based on their history of votes. Round2 in our algorithm investigates the reasons for having voting
conflicts. We investigate the data consistency and we give another chance for the faulty validators to adjust
themselves. This improves the data consistency in the blockchain and increases the ratio of consensus as some
nodes may be able to vote correctly (with the majority) in the second round. However, for those nodes that do
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 4, August 2020 : 2224 – 2234
10. TELKOMNIKA Telecommun Comput El Control Ì 2233
not vote because of failure or network issue. It is important to take some decisions to fix the issues or mark them
to be avoided later on. Moreover, they should be treated negatively in the rewards distributions. For Byzantine
nodes that insist to mislead the consensus, it is important to classify them under the class of low trustworthy
nodes; which decreases their chance to be selected in the voters set and consequently decreases their rewards.
Otherwise, blockchain supposes to exclude them. All mention steps are supportive techniques to enhance the
consensus decision as a correctness property.
5.5. Wait-freedom
Let us start with a proposed scenario, when one block B3 with ts = 3, about to commit but waits for
another block B2 with ts = 2. However, B2 passes the proposal phase and waits for validators to decide to
weather it commits or not. If at least one validator has an issue and does not respond, then B2, B3, and all
the following blocks would wait for non-deterministic time to commit. To solve such a problem our algorithm
maintains the wait-freedom property. Wait-freed means that all blocks are able to complete within a finite
number of steps (time) [31]. Indeed, we implement the wait-freedom property using timeout; it starts directly
after block creation and finishes within a deterministic time. If it finishes before the block completes, it ignores
the pending votes and considers them as negatives. Then takes the decision of the majority to commit or abort.
This way blocks can still commit even after the timeout decision. For example, when the voters set contains 10
nodes, 8 of them vote to commit the block, 1 node votes to abort and 1 node delays the vote; then we consider
the vote of the one with delay as a negative vote, which makes the ratio 8 to 2; so it commits. Thus, all blocks
are eventually committed or aborted, which means no one stays in the execution forever and no one wait for
non-deterministic time to execute.
6. CONCLUSION
Blockchain technology has the potential to transform the digitization of industries for more efficien-
cies. In this paper we analyzed the Tendermint blockchain protocol and proposed various enhancements to
improve correctness, fairness, parallelism, performance, progressiveness and trustworthiness.
REFERENCES
[1] S. Nakamoto and A. Bitcoin, “A peer-to-peer electronic cash system,” Bitcoin.–URL: https://bitcoin.
org/bitcoin. pdf, 2008.
[2] R. Cohen, “Global bitcoin computing power now 256 times faster than top 500 supercomputers, com-
bined,” Forbes, November, 2013.
[3] S. Hakak, W. Z. Khan, G. A. Gilkar, M. Imran, and N. Guizani, “Securing smart cities through blockchain
technology: Architecture, requirements, and challenges,” IEEE Network, vol. 34, no. 1, pp. 8–14, 2020.
[4] N. Herbaut and N. Negru, “A model for collaborative blockchain-based video delivery relying on ad-
vanced network services chains,” IEEE Communications Magazine, vol. 55, no. 9, pp. 70–76, 2017.
[5] Q. Lyu, Y. Qi, X. Zhang, H. Liu, Q. Wang, and N. Zheng, “Sbac: A secure blockchain-based access
control framework for information-centric networking,” Journal of Network and Computer Applications,
vol. 149, p. 102444, 2020.
[6] Z. Zheng, S. Xie, H.-N. Dai, W. Chen, X. Chen, J. Weng, and M. Imran, “An overview on smart contracts:
Challenges, advances and platforms,” Future Generation Computer Systems, vol. 105, pp. 475–491, 2020.
[7] W. Khan, M. Rehman, H. Zangoti, M. Afzal, N. Armi, and K. Salah, “Industrial internet of things: Recent
advances, enabling technologies and open challenges,” Computers & Electrical Engineering, vol. 81, p.
106522, 2020.
[8] S. Gao, G. Piao, J. Zhu, X. Ma, and J. Ma, “Trustaccess: A trustworthy secure ciphertext-policy and
attribute hiding access control scheme based on blockchain,” IEEE Transactions on Vehicular Technology,
2020.
[9] S. Moin, A. Karim, Z. Safdar, K. Safdar, E. Ahmed, and M. Imran, “Securing iots in distributed
blockchain: Analysis, requirements and open issues,” Future Generation Computer Systems, vol. 100,
pp. 325–343, 2019.
[10] W. Z. Khan, E. Ahmed, S. Hakak, I. Yaqoob, and A. Ahmed, “Edge computing: A survey,” Future
Generation Computer Systems, vol. 97, pp. 219–235, 2019.
Fair and trustworthy: Lock-free enhanced tendermint blockchain ... (Basem Assiri)
11. 2234 Ì ISSN: 1693-6930
[11] I.-C. Lin and T.-C. Liao, “A survey of blockchain security issues and challenges.” IJ Network Security,
vol. 19, no. 5, pp. 653–659, 2017.
[12] E. Buchman, J. Kwon, and Z. Milosevic, “The latest gossip on bft consensus,” arXiv preprint
arXiv:1807.04938, 2018.
[13] J. Kwon and E. Buchman, “Tendermint,” 2018.
[14] Y. Amoussou-Guenou, A. Del Pozzo, M. Potop-Butucaru, and S. Tucci-Piergiovanni, “Correctness and
fairness of tendermint-core blockchains,” arXiv preprint arXiv:1805.08429, 2018.
[15] ——, “Dissecting tendermint,” in International Conference on Networked Systems. Springer, 2019, pp.
166–182.
[16] B. Assiri and W. Z. Khan, “Enhanced and lock-free tendermint blockchain protocol,” in 2019 IEEE Inter-
national Conference on Smart Internet of Things (SmartIoT). IEEE, 2019, pp. 220–226.
[17] T.-T. Kuo, H.-E. Kim, and L. Ohno-Machado, “Blockchain distributed ledger technologies for biomedical
and health care applications,” Journal of the American Medical Informatics Association, vol. 24, no. 6,
pp. 1211–1220, 2017.
[18] M. Pilkington, “Blockchain technology: principles and applications,” in Research handbook on digital
transformations. Edward Elgar Publishing, 2016.
[19] N. Shavit and D. Touitou, “Software transactional memory,” Distributed Computing, vol. 10, no. 2, pp.
99–116, 1997.
[20] A. S. Tanenbaum and M. Van Steen, Distributed systems: principles and paradigms. Prentice-Hall,
2007.
[21] H. Attiya and J. Welch, Distributed computing: fundamentals, simulations, and advanced topics. John
Wiley & Sons, 2004, vol. 19.
[22] B. Assiri and C. Busch, “Approximately opaque multi-version permissive transactional memory,” in 2016
45th International Conference on Parallel Processing Workshops (ICPPW). IEEE, 2016, pp. 393–402.
[23] ——, “Approximate count and queue objects in transactional memory,” in 2017 IEEE International Par-
allel and Distributed Processing Symposium Workshops (IPDPSW). IEEE, 2017, pp. 894–903.
[24] J. Aspnes, M. Herlihy, and N. Shavit, “Counting networks and multi-processor coordination,” in Proceed-
ings of the twenty-third annual ACM symposium on Theory of computing, 1991, pp. 348–358.
[25] ——, “Counting networks,” Journal of the ACM (JACM), vol. 41, no. 5, pp. 1020–1048, 1994.
[26] T. Coppieters, W. De Meuter, and S. Burckhardt, “Serializable eventual consistency: consistency through
object method replay,” in Proceedings of the 2nd Workshop on the Principles and Practice of Consistency
for Distributed Data, 2016, pp. 1–3.
[27] R. Guerraoui and M. Kapalka, “On the correctness of transactional memory,” in Proceedings of the 13th
ACM SIGPLAN Symposium on Principles and practice of parallel programming, 2008, pp. 175–184.
[28] M. Herlihy and N. Shavit, The art of multiprocessor programming. Morgan Kaufmann, 2011.
[29] F. Cristian and F. Jahanian, “A timestamp-based checkpointing protocol for long-lived distributed com-
putations,” in [1991] Proceedings Tenth Symposium on Reliable Distributed Systems. IEEE, 1991, pp.
12–20.
[30] G. Tel, Introduction to distributed algorithms. Cambridge university press, 2000.
[31] M. Herlihy, “Wait-free synchronization,” ACM Transactions on Programming Languages and Systems
(TOPLAS), vol. 13, no. 1, pp. 124–149, 1991.
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 4, August 2020 : 2224 – 2234