Blockchain and Its Challenges
Blockchain and Its Challenges
Abstract- Overview: The included report focuses into a number of areas of blockchain development, from the Bitcoin
whitepaper to recent advances in growth, con- fidentiality, and consensus processes. It seeks to define blockchain architecture,
investigate protocol improvements, solve important security issues, and debate blockchain integration with upcoming
technologies such as the Internet of Things (IoT) Findings: Blockchain is built on decentralized peer-to- peer networks and
cryptographic proofs, which provide trust and security without relying on a central authority. Ethereum and Hyperledger
Fabric are protocols that ex- pand the capabilities of blockchain to smart contracts and corporate solutions. New consensus
algorithms, such as Del- egated Proof-of-Stake and Bitcoin-NG, increase scalability and efficiency. Objectives: To demonstrate
basic blockchain ideas like decentralization and cryptographic proofs. Investigate the evolution of blockchain protocols and
consensus tech- niques. To examine significant security concerns and pri- vacy solutions in blockchain technology. To
investigate the convergence of blockchain with IoT and its potential consequences. Results: Clarification of key blockchain
ideas, with an emphasis on decentralization and cryptographic proofs. Insights on blockchain protocol and consensus
mechanism improvements. A comprehensive review of security flaws and privacy remedies. Exploration of blockchain-IoT syn-
ergies, emphasizing blockchain’s revolutionary influence on developing technologies.
Index Terms- Proof-of-Work (PoW), Proof-of-Stake (PoS), Zero-Knowledge Proofs, hash functions, Zero-Knowledge Proofs,
Ring Signatures, Decentralized File Storage, scalability, DeFi, quantum-resistant encryption.
© 2024 IJSRET
1627
International Journal of Scientific Research & Engineering Trends
Volume 10, Issue 4, July-Aug-2024, ISSN (Online): 2395-566X
safety, capacity, and efficiency. Blockchain operations rely on improved efficiency and lower en- ergy consumption
consensus processes to validate transactions and add new compared to PoW.Furthermore, blockchain aims to provide
blocks to the chain. Proof of Work (PoW), used by Bitcoin, solutions for privacy-preserving transactions. Techniques like
which requires participants to solve complex mathematical zero-knowledge proofs and privacy-preserving smart
problems to validate transactions, and Proof of Stake (PoS), contracts, as seen in Hawk and Zerocoin, are critical for
which relies on validators who hold a certain amount of cryp- maintaining user anonymity while ensuring transaction
tocurrency to validate transactions. Other notable mechanisms security.
include Delegated Proof of Stake (DPoS), which elects a
small group of validators to improve scalability, and 3. Background
Byzantine Fault Tolerance (BFT) algorithms like Tendermint, The technology behind blockchain is being recognized as a
which provide security even if some nodes act maliciously. revolutionary innovation with an opportunity to transform
Cryptographic techniques ensure the integrity and confi- various sectors by enabling secure, transparent, and decentral-
dentiality of blockchain transactions. Public key cryptography ized digital transactions. Originating with the advent of
underpins the security of transactions, while hashing Bitcoin in 2008, introduced by the pseudonymous Satoshi
algorithms like SHA-256 provide secure block generation and Nakamoto, blockchain was initially designed as a
data in- tegrity . Advanced cryptographic methods like zero- decentralized digital currency system . This unique technique
knowledge proofs, used in systems like Zerocoin, enable enabled internet payments to be exchanged directly between
anonymous trans- actions by Allowing one end to find out the parties without the need for a financial institution, leveraging
truth of a statement without disclosing its details. Data cryptographic proof instead of trust . As time passes, bitcoin
structures in blockchain include traditional linear blockchains technology has grown beyond cryptocurrencies, offering
and newer structures like the Directed Acyclic Graph (DAG), versatile applications across diverse domains including
used by IOTA’s Tangle, which offers improved scalability and finance, healthcare, supply chain, and IoT .
efficiency by allowing multiple transactions to be processed
simultaneously. II. LITERATURE REVIEW
1. Motivation Blockchain technology has reshaped industries since its debut
The motivation behind blockchain technology is multi- in the digital world, particularly concerning the concepts of
faceted, driven by the need for decentralized, secure, and decentralized currency and secure, transparent transactions.
transparent systems. Traditional centralized systems tend to be This review delves into the foundational theories and
prone to single points of failure, resulting in companies open advance- ments in blockchain and its security aspects,
to cyberattacks, fraud, and data breaches. Blockchain’s decen- drawing from a comprehensive collection of scholarly works.
tralized nature eliminates these vulnerabilities by distributing Bitcoin, introduced as a decentralized digital currency sys-
data across a network of nodes, ensuring no single point of tem, established the foundation for blockchain technology,
control or failure. Additionally, blockchain offers enhanced demonstrating the capability to execute secure transactions
transparency and immutability. Every transaction is recorded without relying on traditional financial institutions [1]. This
on a public ledger, making it nearly impossible to alter or groundbreaking system employs cryptographic proof to fa-
delete records without detection. Transparency strengthens cilitate direct transactions between parties, circumventing the
trust among participants, getting rid of the need for need for trust in intermediaries. Building on this concept,
middlemen and minimizing transaction fees. The blend of Ethereum expanded the functionality of blockchain by
blockchain with IoT and other new technologies offers enabling smart contracts—programs that automatically handle
considerable prospects for innovation. Blockchain technology transac- tionsseamlessly based on specified criteria, thus
can improve the security and efficiency of IoT systems by eliminating the risks of downtime, censorship, and fraud [2].
creating a tamper-proof record of transactions and automating
activities using smart contracts. Various studies have analyzed Bitcoin and other cryptocur-
rencies, addressing the myriad research perspectives and chal-
2. Objectives lenges these digital currencies face, including security,
The primary objectives of blockchain-based systems in the privacy, and scalability issues [3].They identify key topics for
context of security are to provide robust mechanisms for further study to improve the effectiveness and efficiency of
trans- action validation, ensure data integrity, and protect user blockchain systems. Conversely, some researchers have
privacy. This involves developing and implementing secure scrutinized Bit- coin’s decentralization, revealing that the
consensus algorithms, cryptographic protocols, and data concentration of mining power and nodes poses significant
structures. An- other objective is to enhance the ability to risks to its intended security and stability [4].
scale and the efficiency of blockchain networks to support
widespread adoption. This includes exploring alternative The advent of Hyperledger Fabric marked a significant ad-
consensus mechanisms like PoS and DPoS, which offer vancement in permissioned blockchains, tailored for
© 2024 IJSRET
1628
International Journal of Scientific Research & Engineering Trends
Volume 10, Issue 4, July-Aug-2024, ISSN (Online): 2395-566X
enterprise use [5]. Its modular architecture and novel Proof-of-Stake protocols like Ouroboros have been devel-
consensus mecha- nism cater specifically to the needs of oped with provable security guarantees, provide an effec- tive
business environments, ensuring a secure and efficient reliable alternative to existing consensus processes [19].
framework for enterprise appli- cations. Similarly, theoretical Benchmarking frameworks like Blockbench are instrumental
analyses of the Bitcoin protocol have led to formalizing its in evaluating the performance of private blockchains,
security properties and identifying potential weaknesses, providing insights into their scalability and effectiveness [20].
paving the way for enhancements and applications beyond Scalability solutions such as Bitcoin-NG, which separates
digital currency [6]. leader election from transaction serialization, demonstrate
significant improve- ments in blockchain performance [21].
In the realm of information propagation, studies have fo-
cused on the efficiency and latency of transaction The trade-offs between on-chain and off-chain computation
dissemination within the Bitcoin network, giving vital insights and data storage are critical considerations for optimizing
about their resiliency and performance [7]. Innovations such blockchain applications, with various techniques offering dif-
as the Tangle, which uses a directed acyclic graph (DAG) ferent security and performance benefits [22]. A systematic
instead of a tradi- tional blockchain, offer promising approach to determining the necessity of blockchain for spe-
improvements in scalability and efficiency, particularly for cific applications helps in evaluating factors such as trust,
IoT applications [8]. Meanwhile, consensus algorithms like transparency, and decentralization, ensuring that blockchain is
Delegated Proof-of-Stake (DPoS) aim to enhance blockchain appropriately leveraged [23]. Comprehensive surveys on
scalability and performance by delegating transaction blockchain security challenges categorize various attacks and
validation to elected representatives [9]. The Tendermint vulnerabilities, proposing future research directions to
consensus algorithm presents an alternative approach to enhance security measures [24].
achieving consensus without mining, leveraging Byzantine
fault tolerance to ensure secure and efficient transac- tions The pairing of blockchain with the Internet of Things (IoT)
[10]. Privacy-preserving digital contracts were a key focus brings unique challenges and opportunities, particularly
frameworks like Hawk employing cryptographic techniques to concerning security and scalability [25]. Blockchain and smart
ensure transaction privacy and contract correctness [11]. argeements can significantly enhance the security, privacy,
Enhancements to Bitcoin’s privacy, such as Zerocoin, and pace of IoT, with several use cases demonstrating their
introduce protocols that enable anonymous transactions while potential [26]. However, the Bitcoin network’s susceptibility
maintaining compatibility with the existing Bitcoin system to Sybil attacks that facilitate double-spending necessitates
[12]. robust countermeasures to protect against such threats [27].
TumbleBit offers another layer of privacy by facilitating Technical surveys on decentralized digital currencies provide
anonymous and unlinkable Bitcoin transactions without re- a thorough overview of their foundations, security issues, and
quiring changes to the underlying Bitcoin protocol [13]. The potential applications, guiding ongoing research and future
exploration of cryptocurrencies that do not rely on Proof of developments [28]. Blockchain platforms and smart
Work has introduced alternative consensus mechanisms, agreements enable decentralized computing in banking,
evaluated for their security and performance implications healthcare, and supply chain management, illustrates the
[14]. broad applicability and transformative potential of blockchain
[29]. Finally, in- depth technical analyses of Bitcoin elucidate
However, vulnerabilities in Bitcoin’s Proof-of-Work mecha- its underlying mechanisms, cryptographic foundations, and
nism, particularly to majority attacks, highlight the need for potential vulnera- bilities, offering critical insights into its
countermeasures to safeguard its security [15]. operation and security [30].
Integrating intelligent contracts requires secure and ap- proved III. PROBLEM STATEMENT
information feeds, such as those supplied by Town Crier,
thereby enhancing the functionality and reliability of smart Blockchain computing has build as a revolutionary inno-
contracts [16]. vation, promising enhanced security, transparency, and decen-
tralization across various applications. Despite its promise,
The design and security analysis of memory-hard functions considerable problems persist, particularly concerning secu-
like Argon2 for password hashing further contribute to rity, scalability, and integration with existing systems. The
securing sensitive data in blockchain applications [17]. decentralized nature of blockchain, while a strength, also
Empirical studies on the double-spending problem in Bitcoin introduces vulnerabilities such as majority attacks, double-
fast payments underscore the need for robust solutions to spending, and Sybil attacks. Blockchain is being implemented
prevent such attacks and ensure transaction integrity [18]. in several domains, including IoT and enterprise contexts.
Unique issues demand strong privacy protection measure and
© 2024 IJSRET
1629
International Journal of Scientific Research & Engineering Trends
Volume 10, Issue 4, July-Aug-2024, ISSN (Online): 2395-566X
scalable consensus systems. Existing research highlights these signatures are core components ensuring data integrity and
issues but often addresses them in isolation, lacking a authenticity (Narayanan, 2015).
comprehensive approach to blockchain safety. A thorough
analysis of blockchain technology’s security frameworks, con- 2. Blockchain Algorithms
sensus processes, and practical implementations is necessary The security and efficiency of blockchain technology are
to successfully detect and mitigate any dangers. This report heavily reliant on robust algorithms. This part will look into
aims to synthesize current research, evaluate the efficacy of the primary algorithms used in blockchain systems.
proposed solutions, and provide a holistic view of the security
landscape in blockchain technology, ensuring its reliable SHA-256 The Secure Hash Algorithm 256 (SHA-256) is a
adoption and integration across various domains. cryptographic hash function used in Bitcoin for mining and
transaction integrity. SHA-256 converts input data into a fixed
IV. PROPOSED METHOD 256-bit hash, ensuring that even a slight change in input
produces a significantly different hash (Nakamoto, 2008).
Blockchain technology has revolutionized the digital land-
scape, providing a decentralized and secure framework for Ethash Ethash is the PoW algorithm used by Ethereum,
various applications, particularly in financial transactions. designed to be memory-intensive to deter the use of
This proposed methodology aims to present a comprehensive specialized mining hardware. This algorithm enhances the
re- search report on blockchain system and its safety, strictly security and decentralization of the Ethereum network by
adhering to the knowledge supplied in the abstracts of the promoting equal mining opportunities (Wood, 2014).
selected papers. The methodology will encompass the archi-
tecture, algorithms, formulas, and other methods pertinent to Ouroboros Ouroboros is a PoS algorithm developed for the
blockchain technology. Cardano blockchain. It is the first PoS protocol with a formal
security proof, providing a more energy-efficient alternative to
1. Blockchain Architecture PoW while maintaining high security (Kiayias et al., 2017).
The architecture of blockchain is foundational to
understanding its functionality and security. Several key Tendermint BFT Tendermint uses a BFT consensus algo-
components constitute this architecture, which will be rithm that allows for consensus without mining. This
discussed in detail. algorithm enhances scalability and security by enabling rapid
and secure agreement among nodes, making it suitable for
Distributed Ledger The blockchain operates as a dis- tributed both public and private blockchains (Kwon, 2014).
ledger where every participant, or node, Keep a record of the
entire ledger. This decentralized approach eliminates The Table 1: Comparison of Blockchain Algorithms
necessity for a central authority and enhances the security and Algorithm Description Applications
transparency of the system (Nakamoto, 2008). SHA-256 Produces a f ixed 256- Used in Bitcoin
bit hash ensuring data mining.
Consensus Mechanisms Consensus mechanisms are vital for integrity.
validating transactions and safe-guarding the confidentiality Ethash Designed to be Used in Ethereum.
of the blockchain.. Key consensus algorithms include Proof of memory- intensive to
Work (PoW), Proof of Stake (PoS), Delegated Proof of Stake promote decentralization
(DPoS), and Byzantine Fault Tolerance (BFT). Each of these
mechanisms has unique features and security implications, as Ouroboros It offers energy Used in Cardano
highlighted by various authors (Nakamoto, 2008; Larimer, efficiency and high blockchain
2014; Kwon, 2014). security.
Tendermint Enables rapid and Used in Binance
Smart Contracts Contracts that are smart are self- executing, BFT secure agreement Smart Chain.
with terms expressed directly in code. They run on the among nodes without
blockchain, ensuring that agreements are automatically mining.
enforced without intermediaries (Wood, 2014). Ethereum’s
platform is an excellent example of a blockchain supporting Several mathematical formulas underpin the algorithms and
smart contracts, offering significant advantages in automation security mechanisms in blockchain technology.
and trust minimization.
Hash Functions The hash function formula is essential for
Cryptographic Techniques Blockchain relies heavily on ensuring data integrity:
cryptographic techniques for securing data and transactions.
Public and private keys, cryptographic hashing, and digital H(x) = h
© 2024 IJSRET
1630
International Journal of Scientific Research & Engineering Trends
Volume 10, Issue 4, July-Aug-2024, ISSN (Online): 2395-566X
where H is the hash function, x is the input data, and h is the V. PERFORMANCE EVALUATION
fixed-size hash output.
Blockchain system is now prevalent as groundbreaking inno-
Digital Signatures Digital certificates employ asymmetric vation with significant implications across various sectors.
cryptography, with a private key signing and a public key This decentralized and distributed ledger technology ensures
verifying the message. The signature formula can be trans- parency, security, and immutability, fostering trust in
expressed as: digital transactions. However, as blockchain technology
proliferates, it also encounters numerous challenges and
S = Eprivate(H(m)) security issues that need comprehensive evaluation. This
report provides an in-depth performance evaluation of
where S is the digital signature, Eprivate is the encryption blockchain technology, focusing on its security aspects,
with the private key, and H(m) is the hash of the message m. scalability, and integration with other technologies.
c) PoW Difficulty Adjustment The difficulty adjustment
formula in PoW ensures the blockchain remains secure and 1. Decentralization and Security
blocks are mined at a consistent rate: It’s primary strength lies in its decentralized nature, which
eliminates the need for a central authority. Decentralization
enhances security by distributing control among numerous
nodes, making it difficult for any single entity to manipu- late
the system. The cryptographic techniques employed in
where Dnew is the new difficulty, Dold is the previous blockchain, such as hashing and digital signatures, further
difficulty, Ttarget is the target time for a block, and Tactual is bolster its security. Transactions are verified by consensus
the actual time taken to mine the block. mechanisms, ensuring that all participants agree on the state
of the ledger. However, the degree of decentralization varies
Other Methods Beyond the core architectural and algo- across different blockchain systems. For instance, the analysis
rithmic elements, several methods enhance blockchain of Bitcoin’s decentralization revealed that mining power and
technol- ogy’s functionality and security. node distribution are not as decentralized as initially intended.
This concentration poses risks to the network’s security and
Off-Chain Computation Off-chain computation reduces the stability. Despite these challenges, blockchain’s decentralized
load on the blockchain by processing data and transactions off nature generally provides a robust security framework that
the main chain. This method enhances scalability and resists tampering and Unapproved access.
performance while maintaining security through
cryptographic proofs and periodic synchronization with the 2. Consensus Mechanisms
blockchain (Eber- hardt & Tai, 2017). For maintaining the integrity of blockchain networks. Proof of
Work (PoW) and Proof of Stake (PoS) are the most common
Privacy-Preserving Techniques Techniques like Zero- consensus algorithms. PoW, used by Bitcoin, requires miners
Knowledge Proofs (ZKPs) and ring signatures ensure transac- to solve complex mathematical problems, ensuring that it
tion privacy and anonymity. ZKPs allow one partyTo demon- validates transactions and by adding to the blockchain. While
strate skills without revealing the value itself, enhancing pri- PoW provides security through computational difficulty, it is
vacy in blockchain transactions (Miers et al., 2013). energy-intensive and faces scalability issues.
Permissioned Blockchains Permissioned blockchains re- strict To address these concerns, alternative consensus mechanisms
access to authorized participants, enhancing security and have been developed. Delegated Proof of Stake (DPoS) and
control over the network. Hyperledger Fabric is an example of Proof of Authority (PoA) provides maximum efficiency and
a permissioned blockchain, offering modular architecture and solutions that are scalable. DPoS, for example, delegates
customizable consensus mechanisms for enterprise use transaction validation to a small group of elected
(Androulaki et al., 2018). representatives, improving performance without
compromising security. PoA, used in permissioned
Sidechains Sidechains are separate blockchains that run blockchains, assigns transaction validation to trusted nodes,
parallel to the main chain, enabling the transfer of assets and providing high throughput and low latency. Another notable
data between them. consensus mechanism is the Ouroboros protocol, a PoS
algorithm with provable security guarantees. It formalizes
This method enhances scalability and allows for security properties and enhances the protocol’s robustness,
experimentation with new features without risking the security making it suitable for various applications beyond digital
of the main chain (Eyal et al., 2016). currency.
© 2024 IJSRET
1631
International Journal of Scientific Research & Engineering Trends
Volume 10, Issue 4, July-Aug-2024, ISSN (Online): 2395-566X
3. Privacy and Anonymity result in financial losses and weaken trust in blockchain
Several techniques have been developed to enhance privacy systems. Formal verification and auditing are vital for
while maintaining the benefits of blockchain. Zerocoin and ensuring the validity and security of smart contracts.
TumbleBit are notable examples that offer anonymous trans-
actions on the Bitcoin network. Zerocoin uses cryptographic VI. RESULTS AND DISCUSSION
protocols to enable anonymous transactions, ensuring that the
transaction trail cannot be traced. TumbleBit, an anonymous The core attribute of blockchain is decentralization, which
payment hub, allows unlinkable Bitcoin transactions with- out eliminates the need for intermediaries. This is achieved
requiring modifications to the Bitcoin protocol. Privacy- through consensus mechanisms that ensure agreement among
preserving smart contracts are an- other significant advance- dis- tributed nodes. The most common consensus algorithms
ment. Hawk, for example, provides a framework for building are Proof of Work (PoW) and Proof of Stake (PoS). While
privacy-preserving smart contracts. It leverages cryptographic PoW is secure, it is resource-intensive and raises concerns
techniques to ensure transaction privacy and contract cor- about energy consumption and centralization risks due to
rectness, enabling secure and confidential transactions on the mining power con- centration. Alternatives like Delegated
blockchain. Proof of Stake (DPoS) and newer algorithms such as
Ouroboros offer promising improvements in efficiency and
4. Scalability and Performance security. Privacy in blockchain transactions is another critical
Scalability is a key barrier for blockchain technology, which is area. Cryptographic protocols used in privacy-enhancing
required for widespread adoption. Traditional networks, like technologies enable anonymous transactions while
as Bitcoin and Ethereum, suffer with scalability owing to con- maintaining the integrity of the blockchain. These protocols
sensus procedures and block size constraints. Solutions ensure transaction details remain confidential, addressing
include Bitcoin-NG, a scalable protocol that isolates leader privacy concerns without compromising blockchain
election from transaction serialization, and Hyperledger transparency and security. Integrating blockchain with the
Fabric, a per- missioned blockchain with a modular Internet of Things (IoT) opens new possibilities but also
architecture designed for corporate applications. Off-chaining introduces unique challenges. Blockchain can enhance IoT
approaches also boost scalability by relocating processing and security and efficiency by providing a secure ledger for IoT
data storage away from the main blockchain, resulting in devices, ensuring data integrity and authenticity.
higher performance while retaining security and integrity.
© 2024 IJSRET
1632
International Journal of Scientific Research & Engineering Trends
Volume 10, Issue 4, July-Aug-2024, ISSN (Online): 2395-566X
Scalability is also a key issue, as typical blockchains require 6. J. Garay, A. Kiayias, and N. Leonardos, ―The Bitcoin
all nodes to process and store all transactions, which limits Backbone Protocol: Analysis and Applications,‖ in
throughput. Off-chaining methods and new consensus Annual International Conference on the Theory and
techniques are being investigated to increase performance. Applications of Cryptographic Techniques, 2015, pp.
Despite these obstacles, blockchain technology has several 281–310.
potential uses, including disruptive solutions for financial 7. C. Decker and R. Wattenhofer, ―Information Propagation
services, supply chain man- agement, healthcare, and more. in the Bitcoin Network,‖ in IEEE P2P 2013 Proceedings,
Its decentralized, secure, and transparent architecture 2013, pp. 1– 10.
promises to assist in develop more robust and efficient digital 8. S. Popov, ―The Tangle,‖ 2016.
ecosystems. 9. D. Larimer, ―Delegated Proof-of-Stake (DPoS),‖ 2014.
10. J. Kwon, ―Tendermint: Consensus without Mining,‖
Future Work 2014.
Blockchain technology is set for major advancements, par- 11. A .Kosba, A. Miller, E. Shi, Z. Wen, and C.
ticularly in overcoming current limitations and expanding its Papamanthou, ―Hawk: The Blockchain Model of
use across various sectors. Key developments include enhanc- Cryptography and Privacy- Preserving Smart Contracts,‖
ing scalability to support higher transaction throughput in 2016 IEEE Symposium on Security and Privacy, 2016,
through innovations like sharding and off-chain solutions. pp. 839–858.
Security remains a critical focus, with ongoing efforts to 12. I. Miers, C. Garman, M. Green, and A. D. Rubin,
improve con- sensus mechanisms and develop new algorithms ―Zerocoin: Anonymous Distributed E-Cash from
that balance security and efficiency. Privacy-preserving Bitcoin,‖ in 2013 IEEE Symposium on Security and
techniques, such as zero-knowledge proofs, are also being Privacy, 2013, pp. 397–411.
refined. 13. E. Heilman, L. AlShenibr, F. Baldimtsi, A. Scafuro, and
S. Gold- berg, ―TumbleBit: An Untrusted Bitcoin-
Interoperability between different blockchain networks is Compatible Anonymous Payment Hub,‖ in Network and
essential, with efforts aimed at creating standards and Distributed System Security Symposium (NDSS), 2017.
protocols for seamless interaction. This will enable diverse 14. I. Bentov, A. Gabizon, and A. Mizrahi, ―Cryptocurrencies
applications, from finance to healthcare, to integrate more without Proof of Work,‖ in Financial Cryptography and
effectively. Smart contracts are becoming more advanced, Data Security (FC’16), 2016.
with improvements in security and usability, encouraging 15. I. Eyal and E. G. Sirer, ―Majority is Not Enough: Bitcoin
broader industry adoption. In the IoT sector, blockchain Mining is Vulnerable,‖ in International Conference on
technology is anticipated to secure device communication and Financial Cryptography and Data Security, 2014.
automate processes through smart contracts. Overcoming 16. F. Zhang, E. Cecchetti, K. Croman, A. Juels, and E. Shi,
scalability and security challenges in IoT-blockchain ―Town Crier: An Authenticated Data Feed for Smart
integration will be crucial for maximizing its potential. Contracts,‖ in Proceedings of the 2016 ACM SIGSAC
Conference on Computer and Communications Security,
REFERENCES 2016, pp. 270–282.
17. A. Biryukov, D. Dinu, and D. Khovratovich, ―Argon2:
1. S. Nakamoto, ―Bitcoin: A Peer-to-Peer Electronic Cash The Memory-Hard Function for Password Hashing and
System,‖ 2008. Other Appli- cations,‖ in IEEE European Symposium on
2. G. Wood, ―Ethereum: A Secure Decentralised Generalised Security and Privacy (EuroS&P), 2016, pp. 289–304.
Trans- action Ledger,‖ 2014. 18. G. O. Karame, E. Androulaki, and S. Capkun, ―Double-
3. J. Bonneau, A. Miller, J. Clark, A. Narayanan, J. A. Kroll, Spending Fast Payments in Bitcoin,‖ in Proceedings of
and E. W. Felten, ―SoK: Research Perspectives and the 2012 ACM Conference on Computer and
Challenges for Bitcoin and Cryptocurrencies,‖ in 2015 Communications Security, 2012, pp. 906–917.
IEEE Symposium on Security and Privacy, 2015, pp. 19. A. Kiayias, A. Russell, B. David, and R. Oliynykov,
104–121. ―Ouroboros: A Provably Secure Proof-of-Stake
4. A. Gervais, G. O. Karame, V. Capkun, and S. Capkun, ―Is Blockchain Protocol,‖ in An- nual International
Bitcoin a Decentralized Currency?,‖ IEEE Security & Cryptology Conference, 2017, pp. 357–388.
Privacy, vol. 12, no. 3, pp. 54–60, 2014. 20. T. N. Dinh, J. Wang, G. Chen, R. Liu, and B. C. Ooi,
5. E. Androulaki et al., ―Hyperledger Fabric: A Distributed ―Block- bench: A Framework for Analyzing Private
Operat- ing System for Permissioned Blockchains,‖ in Blockchains,‖ in Proceedings of the 2017 ACM
Proceedings of the Thirteenth EuroSys Conference, 2018. International Conference on Management of Data, 2017,
Refer to the conference proceedings. pp. 1085–1100.
21. I. Eyal, A. E. Gencer, E. G. Sirer, and R. van Renesse,
―Bitcoin- NG: A Scalable Blockchain Protocol,‖ in 13th
© 2024 IJSRET
1633
International Journal of Scientific Research & Engineering Trends
Volume 10, Issue 4, July-Aug-2024, ISSN (Online): 2395-566X
© 2024 IJSRET
1634