Blockchains: Empowering Technologies and Industrial Applications

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

A comprehensive guide to the most recent developments in blockchains in theoretical and industrial perspectives Originally introduced as a method to keep track of Bitcoin transactions over a peer-to-peer network, blockchain is a continuously growing list of records, called blocks, which are linked and secured using cryptography into a chain held in public databases. The use of this technology has grown since its cryptocurrency creation and now store three types of information: 1) transactions, including the date, time, and value of purchases; 2) records of participates in transactions; and 3) unique code known as a “hash” that distinguishes one block from another. A single block on the blockchain can hold 1 MB of data, or potentially thousands of transactions – this then can allow for hundreds of thousands of transactions to be recorded as each block can join the state-of-the-art blockchain. Blockchains provides a detailed overview of the latest and most innovative concepts, techniques, and applications related to the developing blockchain. Aimed at novices and experts on the subject, the book focuses on blockchain technologies, integrated systems, and use cases, specifically by looking at three major technical areas: blockchain platforms and distributed database technologies, consensus and fault tolerance, and Blockchain as a Service (BaaS). These avenues of research are essential to support blockchain functionalities, such as acquiring and updating existing data, securing data resources and the recovery of failures, and using blockchains in various services that range from cryptocurrencies to cloud automation. Blockchains readers will also find Brainstorming activities that gradually builds the knowledge of readers on the described technology and deployment scenarios Investigation of specific topics such as novel networking protocols, wireless techniques, new infrastructure designs, operations management, and deployment strategies Discussion of technical challenges in blockchain, as well as how to manage cloud-based networks, service automation, and cyber security Numerous elementary and advanced examples on various topics at the end of the book that can be used for training purposes Illustrations including tables and diagrams to help elucidate points made throughout the volume Glossary of relevant terminology to blockchains in enterprise Blockchains isa useful reference for researchers in vehicular networking and computer science, as well as cloud storage providers and governmental offices for data management.

Author(s): Anwer Al-Dulaimi, Octavia A. Dobre, Chih-Lin
Publisher: Wiley
Year: 2023

Language: English
Pages: 419

Cover
Title Page
Copyright
Contents
About the Editors
About the Contributors
Foreword
Preface
Chapter 1 Introduction
1.1 Exploring Blockchain Technology
1.2 Developing and Testing Blockchains: Software Development Approach
1.3 Blockchains and Cloud Integration
1.4 Blockchain and Mobile Networking
1.5 Open Architecture and Blockchains
1.6 Open API and Monetization of Mobile Network Infrastructure
1.6.1 Using Blockchain Technology to Tokenize API Access
1.6.2 Monetize Mobile Network Infrastructure
1.7 Resiliency of Current Blockchain Models
1.8 Next Evolution in Blockchain Functions
1.9 Book Objectives and Organization
References
Chapter 2 Enabling Technologies and Distributed Storage
2.1 Introduction
2.2 Data Storage
2.2.1 Distributed File Systems
2.2.2 Cloud Storage Systems
2.3 Blockchains
2.3.1 Building Elements of Blockchains
2.3.2 Mining in Blockchains
2.3.3 Blockchain‐Based Data Storage
2.3.4 Blockchain Types
2.4 Distributed Storage Systems
2.4.1 DSS Layers
2.4.2 Distributed Storage Challenges
2.4.2.1 Security
2.4.2.2 Reliability
2.4.2.3 Economic Incentives
2.4.2.4 Coordination
2.4.2.5 Monetization
2.4.3 DSS Implementations
2.4.4 DSS Use Cases
2.4.4.1 SCT dApps
2.4.4.2 SCT dApp Food Chain Example
2.4.5 Performance Evaluation of DSSs
2.5 The Future of DSS
2.6 Concluding Considerations
Acronyms
References
Chapter 3 Managing Consensus in Distributed Transaction Systems
3.1 Ledgers and Consensus
3.1.1 Distributed Ledgers
3.1.2 Consensus
3.1.2.1 Consensus for Consistent Data Storage
3.1.2.2 Consensus for Transaction Ordering
3.1.2.3 Consensus as a Defense Against Bad Actors
3.1.3 Industrial Case Study
3.2 Consensus Protocols, Then and Now
3.2.1 State Machine Replication
3.2.2 Byzantine Fault Tolerance
3.2.3 Nakamoto Consensus
3.2.4 Hybrid Consensus
3.3 Cryptographic Nakamoto Proofs
3.3.1 Proof of Work
3.3.2 Proof of Stake
3.3.2.1 Chain‐Based Proof of Stake
3.3.3 Proof of Capacity
3.3.4 Proof of Time
3.4 Challenges to Scalability
3.4.1 Communication Complexity
3.4.2 Asynchronous Context
3.4.3 Participant Churn
3.4.4 The Blockchain Scalability Problem
3.5 Block Size and Propagation
3.5.1 Larger Blocks
3.5.2 Shorter Rounds
3.6 Committees, Groups, and Sharding
3.6.1 Committees
3.6.2 Groups
3.6.3 Sharding
3.7 Transaction Channels
3.7.1 Trust‐Weighted Agreement
3.7.2 Off‐Chain Transactions
3.7.3 Lightning Network
3.8 Checkpointing and Finality Gadgets
3.8.1 Probabilistic Finality
3.8.2 Checkpointing
3.8.3 Finality Gadgets
3.9 Bootstrapping
3.9.1 Networking
3.9.2 Data
3.10 Future Trends
3.10.1 Private Consensus
3.10.2 Improved Oracles
3.10.3 Streaming Consensus
3.11 Conclusion
References
Chapter 4 Security, Privacy, and Trust of Distributed Ledgers Technology
4.1 CAP Theorem and DLT
4.1.1 Distributed Database System (DDBS)
4.1.2 Evolution of DDBS to the Blockchain
4.1.3 Public vs Permissioned Blockchains
4.1.4 Evolution of Blockchain to the DLTs
4.2 CAP Theorem
4.2.1 CAP Theorem and Consensus Algorithms
4.2.2 Availability and Partition Tolerance (AP) Through PoW
4.2.3 Consistency and Partition Tolerance (CP) Through PBFT
4.2.4 Consistency and Availability (CA)
4.3 Security and Privacy of DLT
4.3.1 Security Differs by DLT
4.3.2 Security and Requirements for Transactions
4.3.3 Security Properties of DLT
4.3.4 Challenges and Trends in DLT Security
4.4 Security in DLT
4.4.1 Governance Scenario Security
4.4.2 DLT Application Security
4.4.3 DLT Data Security
4.4.4 Transactions Security
4.4.5 DLT Infrastructure Security
4.5 Privacy Issues in DLT
4.6 Cyberattacks and Fraud
4.6.1 Challenges
4.6.2 Key Privacy and Security Techniques in DLT
4.7 DLT Implementation and Blockchain
4.7.1 Cryptocurrencies and Bitcoin
4.7.1.1 Origin of Blockchain
4.7.1.2 Bitcoin
4.7.1.3 Monero
4.7.2 Blockchain and Smart Contracts
4.7.3 Typical Blockchain Systems
4.7.3.1 Ethereum Classic (ETC)
4.7.3.2 Ethereum (ETH)
4.7.3.3 Extensibility of Blockchain and DLT
4.7.4 Origin of Blockchain 3.0
4.7.5 Overview of Hyperledger Fabric
4.8 DLT of IOTA Tangle
4.9 Trilemma of Security, Scalability, and Decentralization
4.9.1 First‐Generation Solutions: BTC/BCH
4.9.2 Second‐Generation Solutions: ETH/BSC
4.9.3 Threats in DLT and Blockchain Networks
4.10 Security Architecture in DLT and Blockchain
4.10.1 Threat Model in LDT
4.11 Research Trends and Challenges
References
Chapter 5 Blockchains for Business – Permissioned Blockchains#
5.1 Introduction
5.2 Major Architectures of Permissioned Blockchains
5.2.1 Order–Execute
5.2.2 Simulate–Order–Validate
5.2.2.1 Simulation Phase
5.2.2.2 Ordering Phase
5.2.2.3 Validation Phase
5.2.3 Comparison and Analysis
5.3 Improving Order–Execute Using Deterministic Concurrency Control
5.3.1 Calvin
5.3.2 BOHM
5.3.3 BCDB
5.3.3.1 Simulation Phase
5.3.3.2 Commit Phase
5.3.4 Aria
5.3.4.1 Simulation Phase
5.3.4.2 Analysis Phase
5.3.4.3 Commit Phase
5.3.5 Comparison and Analysis
5.4 Improving Execute–Order–Validate
5.4.1 Transaction Reordering
5.4.2 Early Abort
5.4.3 FastFabric
5.5 Scale‐Out by Sharding
5.6 Trends of Development
5.6.1 Trusted Hardware
5.6.2 Chainify DBMSs
Acronyms
References
Chapter 6 Attestation Infrastructures for Automotive Cybersecurity and Vehicular Applications of Blockchains
6.1 Introduction
6.2 Cybersecurity of Automotive and IoT Systems
6.2.1 Protecting Assets in Smart Cars
6.2.2 Reported Cases
6.2.3 Trusted Computing Base for Automotive Cybersecurity
6.2.4 Special Hardware for Security
6.2.5 Truthful Reporting: The Challenge of Attestations
6.3 The TCB and Development of Trusted Hardware
6.3.1 The Trusted Computing Base
6.3.2 The Trusted Platform Module (TPM)
6.3.3 Resource‐Constrained Automotive Systems: Thin TPMs
6.3.4 Virtualized TPMs for ECUs
6.3.5 The DICE Model and Cyber‐Resilient Systems
6.4 Attestations in Automotive Systems
6.4.1 A Reference Framework for Attestations
6.4.2 Entities, Roles, and Actors
6.4.3 Variations in Evidence Collations and Deliveries
6.4.4 Composite Attestations for Automotive Systems
6.4.5 Appraisal Policies
6.5 Vehicle Wallets for Blockchain Applications
6.5.1 Vehicular Application Scenarios
6.5.2 Protection of Keys in Automotive Wallets
6.5.3 Types of Evidence from Wallets
6.6 Blockchain Technology for Future Attestation Infrastructures
6.6.1 Challenges in the Supply‐Chain of Endorsements
6.6.2 Decentralized Infrastructures
6.6.3 Example of Verifier Tasks
6.6.4 Notarization Records and Location Records
6.6.5 Desirable Properties of Blockchain‐Based Approaches
6.6.6 Information within the Notarization Record
6.6.7 Information in the Location Record
6.6.8 The Compliance Certifications Record
6.7 Areas for Innovation and Future Research
6.8 Conclusion
Acknowledgments
References
Chapter 7 Blockchain for Mobile Networks
7.1 Introduction
7.2 Next‐Generation Mobile Networks: Technology Enablers and Challenges
7.2.1 Mobile Networks: Technology Enablers
7.2.1.1 Software‐Defined Networking (SDN)
7.2.1.2 Network Function Virtualization (NFV)
7.2.1.3 Cloud Computing (CC)
7.2.1.4 Multi‐access Edge Computing (MEC)
7.2.1.5 5G‐New Radio (5G‐NR) and Millimeter Wave (mmWave)
7.2.2 Mobile Networks: Technology Challenges
7.2.2.1 Scalability in Massive Communication Scenarios
7.2.2.2 Efficient Resource Sharing
7.2.2.3 Network Slicing and Multi‐tenancy
7.2.2.4 Security
7.3 Blockchain Applicability to Mobile Networks and Services
7.3.1 Background and Definitions
7.3.2 Blockchain for Radio Access Networks
7.3.3 Blockchain for Core, Cloud, and Edge Computing
7.3.3.1 Data Provenance
7.3.3.2 Encrypted Data Indexing
7.3.3.3 Mobile Network Orchestration
7.3.3.4 Mobile Task Offloading
7.3.3.5 Service Automation
7.4 Blockchain for Network Slicing
7.4.1 The Network Slice Broker (NSB)
7.4.2 NSB Blockchain Architecture (NSBchain)
7.4.2.1 Technical Challenges
7.4.3 NSBchain Modeling
7.4.3.1 System Setup
7.4.3.2 Message Exchange
7.4.3.3 Billing Management
7.4.4 NSBchain Evaluation
7.4.4.1 Experimental Setup
7.4.4.2 Full‐Scale Evaluation
7.4.4.3 Brokering Scenario Evaluation
7.5 Concluding Remarks and Future Work
Acronyms
References
Chapter 8 Blockchains for Cybersecurity and AI Systems
8.1 Introduction
8.2 Securing Blockchains and Traditional IT Architectures
8.2.1 On Securing a Blockchain Platform
8.3 Public Blockchains Cybersecurity
8.3.1 Vulnerabilities Categorization
8.3.1.1 Technical Limitations, Legal Liabilities, and Connected 3rd‐Party Applications
8.3.1.2 Cybersecurity Issues
8.3.1.3 Public Blockchain 1.0: PoW and PoS
8.3.1.4 Public Blockchain 1.0: DPoS
8.3.1.5 Public Blockchain 2.0: Ethereum Smart Contracts
8.3.1.6 Public Blockchain 2.0 – Privacy Issues
8.4 Private Blockchains Cybersecurity
8.4.1 Hyperledger Fabric Architecture
8.4.2 HLF Vulnerabilities Categorization
8.5 Modeling Blockchain Vulnerabilities Using Graph Theory
8.5.1 Petri Nets
8.5.2 Bond Percolation and Random Graphs
8.6 Security: Blockchain for IoT
8.6.1 IoT Security Vulnerabilities
8.6.2 Blockchain–IoT Convergence
8.6.2.1 Enhancing IoT Security Features
8.7 Blockchain for Federated AI
8.7.1 FML Basic Principles
8.7.2 Case Study: Blockchain‐Based FML in Large‐Scale Environmental Sensing
References
Chapter 9 6G Resource Management and Sharing: Blockchain and O‐RAN
9.1 Introduction
9.2 Spectrum Management
9.3 Benefit of Using the Blockchain
9.3.1 Blockchain Background
9.3.2 Impact of Consensus and Security Performance
9.4 Application Scenarios
9.4.1 IoT and D2D Communications
9.4.2 Network Slicing
9.4.3 Network Slicing Broker
9.4.4 Integration of Blockchain to Network Slicing and Resource Brokerage
9.4.5 Inter‐Domain Blockchain Ecosystem
9.4.6 Blockchain Introduction on Mutual Authentication, Identities, and Certifications for O‐RAN
9.4.6.1 O‐RAN Common Protocol Stack Integration of PDCP
9.4.6.2 O‐RAN Interface Integration Scenario
9.4.7 Challenges of Applying the Blockchain Technology in Resource Sharing and Spectrum Management
9.5 Conclusions
References
Chapter 10 Blockchain for Smart Healthcare
10.1 Introduction
10.2 Smart Healthcare Architecture with Blockchain
10.2.1 Blockchain‐Based Healthcare Architecture
10.2.2 Blockchain Design
10.3 Blockchain for EMRs Data Sharing in Collaborative Healthcare
10.3.1 User Authentication with Smart Contract
10.3.1.1 Initialization Phase
10.3.1.2 Registration Phase
10.3.1.3 User Authentication Phase
10.3.2 Health Data Retrieval with Blockchain
10.4 Blockchain Mining Design for Smart Healthcare System
10.4.1 Miner Node Selection
10.4.1.1 Reputation Calculation
10.4.1.2 Miner Selection
10.4.2 Lightweight Block Verification
10.4.3 Latency of Block Verification
10.5 Experimental Results
10.5.1 Experimental Settings
10.5.2 Evaluation of EMRs Sharing Performance
10.5.2.1 Authentication Cost
10.5.2.2 Data Retrieval Latency
10.5.3 Evaluation of Blockchain Performance
10.5.3.1 Blockchain Consensus Performance
10.5.4 Security Analysis
10.5.4.1 Data Privacy
10.5.4.2 Authentication
10.5.4.3 Traceability
10.6 Conclusions
Acronyms
References
Chapter 11 Blockchain Standards
11.1 Introduction
11.2 The Role of Blockchain Standards
11.2.1 A Brief Introduction to Standards
11.2.2 Initiatives of Blockchain Standards
11.3 Landscape of Blockchain Standards
11.3.1 Blockchain Standards in IEEE
11.3.2 Blockchain Standards in ITU‐T
11.3.3 Blockchain Standards in ISO
11.3.4 Regional, National, and Industrial Blockchain Standards
11.3.4.1 ETSI
11.3.4.2 DIN in Germany
11.3.4.3 UNE CTN 71/SC307 in Spain
11.3.4.4 LACChain Alliance in Latin America and the Caribbean
11.3.4.5 ISO, ITU Participation, and National Blockchain Standards for Financial Asset Management in Russia
11.3.4.6 Blockchain Standards in China and Financial Sector Application
11.3.4.7 Blockchain Standards in Communication Networks
11.4 From Blockchain Standards to Industrial Adoption
List of Acronyms
References
Index
IEEE PRESS SERIES ON DIGITAL AND MOBILECOMMUNICATION
EULA