2020
DOI: 10.3390/data5030066
|View full text |Cite
|
Sign up to set email alerts
|

Measurements of Mobile Blockchain Execution Impact on Smartphone Battery

Abstract: This is a data descriptor paper for a set of the battery output data measurements during the turned on display discharge process caused by the execution of modern mobile blockchain projects on Android devices. The measurements were executed for Proof-of-Work (PoW) and Proof-of-Activity (PoA) consensus algorithms. In this descriptor, we give examples of Samsung Galaxy S9 operation while a broader range of measurements is available in the dataset. Examples provide the data about battery output current, output vo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1

Relationship

4
3

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 17 publications
0
5
0
Order By: Relevance
“…PoA is applied in the cryptocurrency-related communications of the decentralized network. In that case, the PoA [206] is an important addition to the digital currency Bitcoin or a similar digital scheme. It delivers a strong security system for all transactions in the blockchain against potential aggressive action and ensures the consensus of arriving miners.…”
Section: Proof Of Activity (Poa)-amentioning
confidence: 99%
“…PoA is applied in the cryptocurrency-related communications of the decentralized network. In that case, the PoA [206] is an important addition to the digital currency Bitcoin or a similar digital scheme. It delivers a strong security system for all transactions in the blockchain against potential aggressive action and ensures the consensus of arriving miners.…”
Section: Proof Of Activity (Poa)-amentioning
confidence: 99%
“…Indeed, the utilization of blockchain-based systems would bring potential bandwidth overuse [11]. Furthermore, as the blockchain's size grows, storage, throughput, and processing power requirements increase.…”
Section: Introductionmentioning
confidence: 99%
“…Android uses the concept of user authentication cryptographic keys, which require a cryptographic key store, a cryptographic key service provider, and a user authenticator [9]. Although the ongoing research is not explicitly targeted at distributed ledger technology applications, the results obtained can also be used to develop appropriate [10] applications. Understanding latency for mobile devices serving as part of a distributed infrastructure with different consensus mechanisms is an integral part of application design, considering the trade-offs between different system characteristics.…”
Section: Introductionmentioning
confidence: 99%
“…The presented text is intended to explain the security model on sixteen smartphones and one smartwatch using the Android OS and compare existing cryptographic protocols and the resulting run time as a direct translation to battery life. Unfortunately, providing the actual power consumption of the cryptographic primitives' execution becomes close to impossible due to the present devices' manufacturing concept of irremovable battery, but we also supplement the data with the battery properties that, along with the execution time, allows for better qualitative analysis of the results, similarly to [12], [10].…”
Section: Introductionmentioning
confidence: 99%