Paper 4-Modeling and Simulation of A Blockchain Consensus
Paper 4-Modeling and Simulation of A Blockchain Consensus
Abstract—The classical blockchain developed for the Bitcoin technologies in the hands of bad actors and hackers could
cryptocurrency has evolved since its introduction more than a render sophisticated cyber-attack exploitations to networks and
decade ago. Blockchain exists in different forms for different user accounts resulting in breaching data, corrupting data, and
purposes and operational contexts. There has been a significant compromising the security of such network systems [1].
growth in the business use cases of blockchain which is based on
the unique attributes of the distributed ledger technology. Reaching an agreement to validate messages as well as
Blockchain provides peer-to-peer distribution of data in a authenticate the state of a distributed ledger have been the
traceable and decentralized architecture that attains data requirement for networks whose major components are
authentication using consensus protocols. Blockchain as a resource constrained.
distributed ledger is the fusion of cryptography, peer-to-peer
networking technology, distributed system technology, and Distributed consensus research has become popular since
consensus mechanism to assure information security and digital the Nakamoto Satoshi introduced the Bitcoin blockchain
asset management. Consensus mechanisms are applied to the cryptocurrency more than a decade ago. Internet of things have
distributed ledger that operates in a peer-to-peer network where provided a platform for expanding the network resources to
message transmission between peers is validated and stored secure a new value proposition for scaling the scope of an
across all active peers. Reaching an agreement to validate enterprise‟s network. Available reports support that the
message transmission and maintaining the correctness of the technological and cybersecurity budgets for business and
state of data in a network for critical wireless sensor networks institutions have increased allocations and are making efforts to
have become a necessary requirement for networks that span include internet-of-things integration, expansion, and
several subsystems covering a large operational area. Due to the management [2].
resource constrained nature of the active actors of wireless sensor
networks, any cryptographic solution to be adopted must be Cybersecurity investments and the annual budgetary
lightweight and efficient as well. This paper proposes a allocations across most enterprises have increased largely due
blockchain-based decentralized mechanism for authentication of to the increasing number of cyber-attack incidences on
node data for storage onto a distributed ledger. The coloured enterprise systems which have resulted in data corruption, data
Petri net was used to model and simulate by detailing the critical theft and huge revenue losses in some cases [3].
attributes of the workings of the system that is based on cyber-
physical IoT architecture. During the COVID-19 lockdown period, most businesses
and institutions adopted telecommuting as a measure to
Keywords—Blockchain consensus; ripple consensus algorithm; regulate and manage people in observing physical distancing to
coloured petri net; cyber-physical system; IoT architecture; node avoid possible person-to-person infection. There were reported
data security cases of cyber-attacks during this period where personal and
enterprise data were breached as a result [4].
I. INTRODUCTION
Cascading effect of cyber-attacks on heterogeneous
Reaching agreements to validate the authenticity of node systems for wireless sensor networks like the internet of things
data and subsequent transmission and storage of such network has a wide and costly impact due to the critical messages that
resources for cyber-physical systems have been a challenging the resource-constrained devices in such networks transmit [5].
and interesting domain for academia and information security
industry players in recent times. Distributed ledgers use The effect of cyber-attacks on heterogeneous wireless
consensus algorithms to reach agreement among all connected sensor networks resulting in the compromise of critical data in
active nodes to validate message transmission in a peer-to-peer enterprise networks have taken an alarming trajectory due to
approach. Recent advancements in connectivity, artificial the complexity of the interconnectedness of the components of
intelligence, machine learning approaches although have the subsystems that make up the internet of things architecture
provided an advantage for the expansion of network coverage [6].
and prediction and visualization of network resource sharing
for enterprises and institutions, these available passive
22 | P a g e
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 13, No. 12, 2022
Availability of pervasive applications and their integration In [10] a decentralized multi-agent system achieved
in enterprise networks that have most of its component relying consensus using consensus problem to control these multi-
on internet of things architecture could make the security agents. More than half of all the multi-agents and processes
management of such wireless sensor systems a complex agreed by voting on the state and integrity of a process.
challenge to undertake.
B. Blockchain Consensus Algorithm
A consensus algorithm for decentralized authentication and Blockchain as a cryptocurrency framework for Bitcoin has
distributed ledgers for an IoT with heterogeneous system evolved since its introduction. Blockchains are uniquely
architecture requires a blockchain-based agreement mechanism categorized based on the type of consensus algorithm in use. In
that operates with relatively less energy, fully scalable and a Proof-of-Work (PoW) consensus, agreement on the validity
most importantly byzantine fault-tolerant [7]. of a process was achieved using the computing power
Wireless sensor networks achieve privacy and integrity for challenge. The node that had more computing power achieved
message transmissions using either third-party trust consensus through a completely decentralized approach. There
enforcement systems that adopt a centralized entity to is Proof-of-Stake (PoS) consensus that is based on financial
authenticate devices and validate messages or a decentralized power competition where the node that controls more than a
mechanism for authentication of devices and validating third of all the resources within the network gets to validate
messages. The centralized authentication mechanism is prone processes within the blockchain. PoS operates by selecting
to several attacks including single point of failure attacks. In a validators to authenticate transactions within the blockchain
distributed system that rely on decentralized authentication based on the quantity of the cryptocurrency holdings forming a
mechanism, agreement is reached by all active nodes on the stake by a node. The more stake a node possesses the higher
network using consensus. Since the introduction of Bitcoin the chance of being selected to validate transactions. In a PoS,
cryptocurrency, several consensus algorithms have been less computational power is involved since it takes shorter time
developed. The Bitcoin cryptocurrency uses a distributed to reach consensus than in PoW. In Delegated Proof-of-Stake
consensus mechanism that is based on proof of work [8]. (DPoS), consensus is reached based on election and voting
process to guard malicious usage and centralization of
The Coloured Petri Net (CPN) is a modeling and blockchain. In DPoS, less computing power and time are
simulation tool for modeling and simulating systems, and involved in achieving consensus [11].
verifying their properties (real-time, behavioral, security
properties …). A consensus mechanism must provide a trade-off between
performance, fairness, and security. There is Proof-of-Activity
The CPN modeling, simulation, and validation of critical (PoA) that is a fusion of PoW and PoS. The PoA operated on
security properties of an efficient blockchain-based consensus an economic phenomenon with the assumption of “Tragedy of
mechanism that does not compromise the security requirements the Commons” which described a situation where a limited
of a cryptographic solution and offers low latency with resource for several agents could be ruined in situations where
improved resistance to the Byzantine fault tolerance is there is uncontrolled use [12].
presented by this paper.
C. Ripple Consensus Algorithm
The rest of the paper is structured in sections and
represented as follows. In Section II, related work describing The Ripple consensus algorithm is a permissioned
the state of the art for CPN in modeling and simulating security blockchain consensus algorithm that requires access
protocols for networks, node data security and critical security permission for nodes in the network because it is not publicly
challenges in cyber-physical systems is presented. In Section accessible, and operates in rounds using active nodes as
III, the Ripple consensus algorithm is described. Section IV servers. It adopts an approach of closing an active ledger
outlines the implementation of the consensus algorithm in updating session once a consensus is reached to store and
establishing agreements for storing messages on the distributed maintain an identical state of the ledger on all active nodes. For
ledger. Section V concludes the paper. each round within the ripple protocol consensus algorithm
(RPCA) [13];
II. RELATED WORK End users of the server forwards all new transactions to
A. Consensus Algorithm each server. These valid transactions are compiled and
made public in the form of a list to constitute the
In a stand-alone system, validating transmitted message or
“candidate set”.
any transaction is vested in a dedicated centralized node.
Consensus algorithms are useful in networks that do not have a All the candidate sets from several servers are merged
dedicated node to singularly authenticate users, processes and on every server‟s unique node list (UNL), to
transmitted messages or transactions. A consensus algorithm authenticate these transactions.
was employed by the system to agree on a single data among
multiple processes and agents. To ensure that situations of The transactions that do not pass the authentication
some multi-agents failing to agree or be unreliable by not being minimal percentage of “Yes” votes are either discarded
available for consensus to actively reach agreement, a or included in the candidate set at the commencement
consensus protocol must adopt mechanisms to make them of the consensus process for the next ledger.
flexible and fault-tolerant [9]. Conversely, transactions that obtain the minimal
23 | P a g e
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 13, No. 12, 2022
24 | P a g e
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 13, No. 12, 2022
the encrypted data is sealed and written to disk in step 7a. If the TABLE I. SMART CONTRACT PSEUDOCODE
report from the Integrity Checker shows a difference in the Algorithm: Smart Contract Pseudo-code
string structure of the derived hash from the given hash, that
will result in discarding the data including the hash from the 1: HashMap deviceRegistry(key:ownerAddress, value:List[deviceIDs])
sink node. Step 7a and Step 8a are used in validating the hash 2: HashMap deviceData(key:(ownerAddress, deviceID),
and proceeding to either write the encrypted data to disk or value:List[DataHash])
3: HashMap DataAccessRegistry(key:(ownerAddress, thirdpartyAddress,
disproving the hash and discarding the data from the sink node. deviceID), value: bool isAllowed)
Data accessing activities from the blockchain is done using 4: function REGISTERDEVICE(ownerAddress, deviceID)
the data read module. A user module first registers third-party 5: InsertToHashMap(key:ownerAddress, value:List[deviceIDs])
users using the allowAccess method with the smart contract.
The user calls the revokeAccess function to revoke access for a 6: end function
user. Step 1b outlines the interaction of the third-party user 7: function WRITEDATA(ownerAddress, deviceID, Data)
with the smart contract in obtaining the hash of the data
generated by the sink node after providing the device ID of the 8: if owner == ownerAddress
sink node. The smart contract checks if the third-party user 9: deviceData([owner, deviceID], List.InsertData(hash(Data)))
device ID and the address have the validation necessary to
10: end function
access the data after doing integrity checking for the third-party
user ID and address. The hash of the sink node data is only 11: function READDATA(ownerAddress, thirdPartyAddress, deviceID)
returned from the cloud storage after the integrity checker
12: if DataAccessRegistry(thirdPartyAddress) == true
grants the access permission to the third-party user to enable it
to access the data from the IoT gateway persistent storage (IoT 13: return deviceData[hash(ownerAddress, deviceID])
gateway internal memory) that represents local storage of the 14: end function
data. The smart contract uses the READDATA API as
15: function GRANTACCESS(ownerAddress, thirdPartyAddress,
illustrated in step 4b, to confirm if the third-party user has the deviceID)
access permission to read the data hash identifier supplied by
16: if owner == ownerAddress
the third-party request. In step 5b, it illustrates how data is
retrieved from the secured internal gateway storage once data 17: DataAccessRegistry[hash(ownerAddress, thirdPartyAddress,
deviceID)] = true
access permission is granted. The data is unsealed in step 6b,
and the integrity of the data is checked in step 7b, after 18: end function
recalculating and verifying the digital signature by comparing 19: function REVOKEACCESS(ownerAddress, thirdPartyAddress,
the given and the derived digital signatures. The sensor data deviceID)
stored in the gateway internal memory is read and returned by 20: if owner == owner Address
the user only after the digital signature verification is 21: DataAccessRegistry[hash(ownerAddress, thirdPartyAddress,
completed. Steps 9 and 10 illustrate the data flow for this deviceID)] = false
operation [14]. 22: end function
In Table I, the pseudo-code for the smart contract is D. Modeling Languages for Verification Systems
presented.
Modeling systems exist to provide opportunity for
Where: designing, developing, and implementing critical systems.
Although there are several kinds of tools and platforms for
OwnerAddress: Sink node identity (SNId)
modeling, simulation, and verification of systems, the coloured
Device: Sensor petri nets (CPN) is distinguishable in the following aspects:
CPN offers several functions and provides a flexible
DeviceID: SensorID (SsId) manipulation of the functions in developing a model. The CPN
In [15] five main blockchain consensus protocols were tool has been improved and tested to support the modeling of
examined using the unique properties of type (probabilistic or complex systems [17].
absolute finality), level of fault-tolerance, power consumption, Study [18] surveyed several modeling tools for checking,
scalability, and application. The five consensus protocols are: validating, and some cases improving the design requirements
Proof-of-Work (PoW), Proof-of-Stake (PoS), Delegated Proof- of systems. Notable modeling systems mentioned included the
of-Stake (DPoS), Practical Byzantine Fault Tolerance (PBFT) Practical Robust Implementation and Sustainability Model
and Ripple. (PRISM), Numeric Symbolic Model Verifier (NuSMV),
The ripple consensus proved to have a good scalability, UPPAAL, Symbolic Analysis Laboratory (SAL), SPIN, Beryl,
involved negligible power consumption, low fault tolerance D-Finder.
and operated using permissioned application. In ripple The related works showed available research on IoT
consensus, the entire network will continue to function to solutions that is based on blockchain. It however confirmed the
support correct consensus even if 20% of the nodes are absence of an implementation for a blockchain-based solution
attacked by Byzantine generals problem [16]. to authenticate and protect IoT data transmitted between
actively connected network elements of the IoT gateway and
the cloud.
25 | P a g e
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 13, No. 12, 2022
Additionally, there is an implementation gap for a formal transmit them through an IoT gateway to be stored on the
model for IoT systems that directly involved the sensor, sink distributed ledger [19].
node, IoT gateway, and the cloud elements in a blockchain-
based IoT architecture. The local IoT sub model is composed of elements that
consist of security management, devices and sensors, internet
In the next section, the methodology for the paper is connectivity things, Application Programming Interface (API)
presented. libraries, System Development Kits - SDK. Distributed
systems that operate based on a decentralized authentication
III. METHODOLOGY mechanism is prone to attacks such as the double spending
The target and design principles that formed the basis for instances where validated messages that represent independent
the chosen methodology to support a blockchain-based transactions have the possibility of getting used in
consensus mechanism for authentication of node data for IoT simultaneous transfers without considering the output of each
systems are hinged on a security solution appropriate for an transfer in the simultaneous transactions [20].
environment where the devices are resource-constrained. B. Coloured Petri Net
The design principles for the methodology are the usage of The coloured Petri Net (CPN) is a graphical mathematical
decentralized authentication, smart contract for consensus modeling language. It is used to describe and check system
among sink nodes, lightweight cryptographic solution, digital properties, security requirements and synchronization
signature, smart contract with lightweight cryptographic characteristics for real-time distributed systems, and more
function, a formal modeling tool that allows for dynamic generally event-driven systems. CPN comprises essential tools
behavior modeling, and the provision of a visual simulation for analyzing boundedness, reachability, resource conflicts,
tool. deadlock as well as the structural properties of a real-time
The design goals on the other hand involved the system [21].
elimination of a single point of failure, stronger security, The formalization of CPN is composed of nine tuples.
extending data protection with a lightweight cryptographic
solution, enforcing authentication with smart contract, the ( )
proposal of a formal model for a generic blockchain-based IoT Where:
solution, and the validation of a blockchain-based IoT solution P = {P1, P2, …, Pm} represents a finite set of places.
through simulation.
T = {T1, T2, …, Tn} denotes a finite set of transitions.
A. Heterogeneous IoT Architecture
An architecture consisting of several subsystems was A: Directed arc set
adopted for the implementation of the blockchain-based ∑: A finite set of colour set types
authentication mechanism.
V: Denotes a finite set of variables whose type .
C: It represents the colour set function from P to ∑.
G: Denotes the set of guard functions of transitions.
E: It represents a function that associates an arc expression
to each transition.
I: denotes the function that gives the initial marking of each
place.
The graphical representation of Petri net comprises of rings
representing Places, rectangles denoting Transitions, arrows
symbolizing Arcs.
A coloured Petri net is composed of variables, values, and
expressions. CPN objects are described using colour domain
that comprises variables, data values, operators, a syntax for
expressions, and typing rules. An abstract colour domain
Fig. 3. An IoT architecture consists of : Data values Variables and Expressions ( )
[22].
In Fig. 3, an IoT architecture with components for a
heterogeneous cyber-physical network is displayed. The These data values
architecture has three components involving a local IoT include integer values, Boolean values (True and
network which consisted of sensor end devices and sink nodes, False), and special undefined value ;
an overlay network that employs blockchain-based distributed that are represented using
ledger, and a cloud network (remote storage) to receive and
single letters or as subscribed letters
store the hash values of the sensor data. The local IoT networks
amalgamate validated sink nodes with their validated data and
26 | P a g e
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 13, No. 12, 2022
( )
is enabled at
Fig. 4. CPN modeling of the blockchain consensus protocol
, ⟩
In Fig. 4, the CPN modeling of the blockchain consensus
(( )) mechanism with validators is presented. The validators are an
amalgamation of the current sink node which presents the data
( ( )) True to be validated as well as other external sink nodes within the
hierarchical IoT network. The external sink nodes form the
external validators. The sink node whose data is to be validated
(( )) ( ). through the consensus assumes the local validator status. The
27 | P a g e
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 13, No. 12, 2022
validators (local and external) reach agreement to validate data In Fig. 6, a feedback decision of „1‟ on the data under
if and only if the number of the positive feedbacks are more validation is presented. The feedback from the local validator
than half of all the total decisions from the validation voting by confirms that the “start validation transition” has been fired.
all the validators. Once a message does not get at least more The update on the number of proposals “nbprop” of 1`(1, 1)
than half of the total decisions to be positive feedbacks, that shows that voting has started on the decision feedback on the
message is discarded. A session for the consensus by the data under validation. That only 1 validator has voted on the
validators is considered closed once the decision on a message decision feedback. That decision is a positive decision (1 –
has been made in accordance with the consensus correctness „Number of decisions‟,1-„number of positive decisions‟).
criterion of the adopted blockchain consensus. The correctness
criterion of the consensus is critical to make the algorithm
byzantine fault tolerant.
Fig. 5. Local validator feedback decision In Fig. 7, the feedback decision from external validator1 on
the data under validation is illustrated.
In Fig. 5, the consensus commencement for validators is
illustrated. The blockchain consensus starting with the local The update on the nbprop place 1`(2,2) shows that there
validator to decide by voting by on the feedback of the data have been two voting decisions and all the decision are positive
under validation is presented. There are two feedback options decisions.
(0, 1) to be selected by a validator. Option 1 symbolizes
positive feedback whereas option 0 denotes non-positive
feedback. The “start validation transition” has not been fired
yet. Selecting a choice for the feedback will fire the transition.
The token (1`1) on the local validator symbolizes a single node
data and the specific data to be validated is 1. The update on
the number of proposals “nbprop” of 1`(0, 0) shows that voting
on the decision feedback on the data under validation has not
started (0, 0).
28 | P a g e
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 13, No. 12, 2022
29 | P a g e
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 13, No. 12, 2022
30 | P a g e
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 13, No. 12, 2022
In the next section, the general conclusion of the work is [6] B. T. Asare, K. Quist-Aphetsi, L. Nana, and G. Simpson, “A nodal
presented. Authentication IoT Data Model for Heterogeneous Connected Sensor
Nodes Within a Blockchain Network,” in 2021 International Conference
on Cyber Security and Internet of Things (ICSIoT), 2021, pp. 65–71.
V. CONCLUSION
[7] S. Zhang and J.-H. Lee, “Analysis of the main consensus protocols of
Distributed systems that rely on decentralized processing blockchain,” ICT express, vol. 6, no. 2, pp. 93–97, 2020.
for authentication and validation of processes like the [8] E. Zaghloul, T. Li, M. W. Mutka, and J. Ren, “Bitcoin and blockchain:
blockchain system use agreements through consensus Security and privacy,” IEEE Internet of Things Journal, vol. 7, no. 10,
mechanisms to assure and maintain the correctness of pp. 10288–10313, 2020.
decisions, and to guarantee stable systems. For a blockchain [9] X. Wang, H. Su, X. Wang, and G. Chen, “Fully distributed event-
triggered semiglobal consensus of multi-agent systems with input
mechanism to be deployed in an IoT network where the saturation,” IEEE Transactions on Industrial Electronics, vol. 64, no. 6,
devices are resource-constrained, an architecture was designed pp. 5055–5064, 2016.
that factored in the challenges regarding memory, [10] X. Wang, G.-P. Jiang, H. Su, and Z. Zeng, “Consensus-based distributed
computational processing, and energy limitations of sensors reduced-order observer design for LTI systems,” IEEE Transactions on
and sink nodes. The distinctive security features in the Cybernetics, 2020.
proposed consensus mechanism enabled the core elements of [11] J. Zhang and M. Wu, “Blockchain-Based Authentication with Optional
the IoT architecture to reach an agreement among the sparsely Privacy Preservation for Internet of Vehicles,” Mathematical Problems
fragmented network elements in the IoT architecture. The use in Engineering, vol. 2021, 2021.
of the IoT gateway, PKI, and cloud network in the architecture [12] D. Wang, C. Jin, H. Li, and M. Perkowski, “Proof of Activity Consensus
Algorithm Based on Credit Reward Mechanism,” in Web Information
supported a security solution that provided a trade-off between Systems and Applications: 17th International Conference, WISA 2020,
performance, fairness in load balance, and security. Guangzhou, China, September 23–25, 2020, Proceedings, Berlin,
Heidelberg, 2020, pp. 618–628. doi: 10.1007/978-3-030-60029-7_55.
Additionally, the ripple consensus mechanism provided a
[13] D. Schwartz, N. Youngs, and A. Britto, The ripple protocol consensus
byzantine fault-tolerant approach with good scalability to algorithm. Ripple Labs Inc.(2014). 2021.
support a large network consisting of several subsystems. [14] G. Ayoade, V. Karande, L. Khan, and K. Hamlen, “Decentralized IoT
The modeling and simulation of the blockchain-based data management using blockchain and trusted execution environment,”
in 2018 IEEE International Conference on Information Reuse and
authentication mechanism provided the possibility of Integration (IRI), 2018, pp. 15–22.
validating the security properties of an IoT security solution [15] S. Zhang and J.-H. Lee, “Analysis of the main consensus protocols of
that is based on a decentralized authentication approach. The blockchain,” ICT Express, vol. 6, no. 2, pp. 93–97, Jun. 2020, doi:
CPN features including places, transitions, arcs, expressions, 10.1016/j.icte.2019.08.001.
and initial markings of places with tokens were used to [16] B. Chase and E. MacBrough, “Analysis of the XRP Ledger Consensus
represent the entities or physical attributes of the system as Protocol.” arXiv, Feb. 20, 2018. Accessed: Jun. 02, 2022. [Online].
well as the design decisions of the system. The design Available: http://arxiv.org/abs/1802.07242
decisions and the dynamic nature expectations of the [17] H. Kaid, A. Al-Ahmari, Z. Li, and R. Davidrajuh, “Single controller-
based colored Petri nets for deadlock control in automated
distributed ledger system were represented using places, manufacturing systems,” Processes, vol. 8, no. 1, p. 21, 2019.
transitions, arc expressions, and tokens.
[18] M. Luckcuck, M. Farrell, L. A. Dennis, C. Dixon, and M. Fisher,
REFERENCES “Formal specification and verification of autonomous robotic systems: A
[1] M. Keerthika and D. Shanmugapriya, “Wireless Sensor Networks: survey,” ACM Computing Surveys (CSUR), vol. 52, no. 5, pp. 1–41,
Active and Passive attacks-Vulnerabilities and Countermeasures,” 2019.
Global Transitions Proceedings, vol. 2, no. 2, pp. 362–367, 2021. [19] G. Wang, Z. Shi, M. Nixon, and S. Han, “ChainSplitter: Towards
[2] W. Fu, X. Wei, and S. Tong, “An improved blockchain consensus Blockchain-Based Industrial IoT Architecture for Supporting
algorithm based on raft,” Arabian Journal for Science and Engineering, Hierarchical Storage,” 2019 IEEE International Conference on
vol. 46, no. 9, pp. 8137–8149, 2021. Blockchain (Blockchain), pp. 166–175, 2020, doi:
10.1109/blockchain.2019.00030.
[3] I. Lee, “Cybersecurity: Risk management framework and investment
cost analysis,” Business Horizons, vol. 64, no. 5, pp. 659–671, 2021. [20] U. W. Chohan, “The double spending problem and cryptocurrencies,”
Available at SSRN 3090174, 2021.
[4] H. S. Lallie et al., “Cyber security in the age of COVID-19: A timeline
and analysis of cyber-crime and cyber-attacks during the pandemic,” [21] W. Duo, H. Xin, and M. Xiaofeng, “Formal Analysis of Smart Contract
Computers & Security, vol. 105, p. 102248, 2021. Based on Colored Petri Nets,” IEEE Intell. Syst., vol. 35, no. 3, pp. 19–
30, May 2020, doi: 10.1109/MIS.2020.2977594.
[5] L. Dong, H. Xu, X. Wei, and X. Hu, “Security correction control of
stochastic cyber–physical systems subject to false data injection attacks [22] C. Gaucherel, C. Carpentier, I. R. Geijzendorffer, C. Noûs, and F.
with heterogeneous effects,” ISA transactions, vol. 123, pp. 1–13, 2022. Pommereau, “Discrete-event models for conservation assessment of
integrated ecosystems,” Ecological Informatics, vol. 61, p. 101205,
2021.
31 | P a g e
www.ijacsa.thesai.org