2021
DOI: 10.1002/cpe.6285
|View full text |Cite
|
Sign up to set email alerts
|

Performance analysis on Diversity Mining‐based Proof of Work in bifolded consortium blockchain for Internet of Things consensus

Abstract: Internet of Things (IoT) networks have become part and parcel of the present life. In the present-day scenario, IoT networks are distributed, and they generate heterogeneous data to be shared, processed and analyzed. But, the prevailing centralized IoT architecture has numerous security vulnerabilities, specifically in data hosting and transfer.Blockchain, a cryptographically distributed tamper-proof database when blends with IoT, enables a secure data archival and exchange of peer-to-peer (P2P) transactions t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 23 publications
(20 reference statements)
0
5
0
Order By: Relevance
“…In networked data applications, security, storage, and efficient data management play a critical role in optimizing performance and efficiency. The growing popularity of blockchain-enabled networks faces challenges in scaling them to accommodate a wide range of devices and large data storage needs leading to degradation in performance and efficiency 11 , 12 . The main challenges include scalability, identity management, interoperability, reliability and security 1 , 7 , 10 .…”
Section: Introductionmentioning
confidence: 99%
“…In networked data applications, security, storage, and efficient data management play a critical role in optimizing performance and efficiency. The growing popularity of blockchain-enabled networks faces challenges in scaling them to accommodate a wide range of devices and large data storage needs leading to degradation in performance and efficiency 11 , 12 . The main challenges include scalability, identity management, interoperability, reliability and security 1 , 7 , 10 .…”
Section: Introductionmentioning
confidence: 99%
“…In this method, the blockchain network is made multilayer, consisting of private and public networks. Later, consensus processing will be carried out by many parties who are members of the blockchain network, referred to as the blockchain network consortium [34]. This consortium consists of several companies that create and use blockchain networks together.…”
Section: Algorithm Optimizationmentioning
confidence: 99%
“…34 The intent of Layer 2 is to depart trivial transactions hardly off the core network. 35 The most prevalent leads are the lightning and Raiden networks for Bitcoin and Ethereum frameworks, respectively. The basic idea is to set up a multi-signature address that can be perceived as a shared secondary wallet with a blockchain's ledger.…”
Section: Memory Leakage Improper Content Validationmentioning
confidence: 99%
“…Any blockchain system's primary concern is to have transaction finality somewhere close to Visa or MasterCard transactions per second 34 . The intent of Layer 2 is to depart trivial transactions hardly off the core network 35 . The most prevalent leads are the lightning and Raiden networks for Bitcoin and Ethereum frameworks, respectively.…”
Section: Related Workmentioning
confidence: 99%