Smart City Infrastructure. Группа авторов
Читать онлайн книгу.Selfish Mining
In selfish mining, some nasty or wicked miners or clients store the mined blocks in their database and tries to create a confidential branch that transmits only after reaching specific requirements. In such scenarios, truthful or sincere miners waste lots of time and resources since selfish miners or clients organize private chains.
1.9.4 Security
Security describes confidentiality, truthfulness, and availability, which are challenging tasks in public blockchains where keys are visible to all nodes. Confidentiality level is low in scattered systems, and truthfulness is the profession of blockchains; even though it faces different issues, accessibility in blockchains is high in terms of legibility compared to writing accessibility.
1.10 Conclusion
Blockchain is a broadly renowned technology, which got massive interest from various research communities around the world. It consists of different key techniques that support various requirements in different human life areas like healthcare, financial transactions, elections, and markets. However, it faces many challenges associated with security and privacy. So, in this chapter, we made a systematic study on blockchain safety measurements in recent years. We made an explicit discussion on blockchain development, working procedure, structure and key technologies, and IoT inclusion with blockchain. Moreover, we described various security and privacy properties and respective practices; finally, we discussed challenges in the blockchain.
References
1. Dorri, A., Steger, M., Kanhere, S.S., Jurdak, R., BlockChain: A Distributed Solution to Automotive Security and Privacy. IEEE Commun. Magxs., 55, 12, 119–125, 2017.
2. Xie, J., Tang, H., Huang, T., Yu, F.R., Xie, R., Liu, J., Liu, Y., A Survey of Blockchain Technology Applied to Smart Cities: Research Issues and Challenges. IEEE Commun. Surv., Tutor., 21, 3, 2794–2830, 2019.
3. Archana Prashanth, J., Han, M., Wang, Y., A Survey on Security and Privacy Issues of Blockchain Technology. Math. Found. Comput. Am. Inst. Math. Sci., 1, 2, 121–147, 2018.
4. Zhang, R., Xue, R., Liu, L., Security and Privacy on Blockchain. ACM Comput. Surv., 52, 3, Article, 51, 2019.
5. Ferrag, M.A., Derdour, M., Mukherjee, M., Derhab, A., Maglaras, L., Janicke, H., Blockchain Technologies for the Internet of Things: Research Issues and Challenges. IEEE Commun. Surv., 6, 2, 2327–4662, 2018.
6. Lao, L., Li, Z., Hou, S., Xiao, B., Guo, S., Yang, Y., A Survey of IoT Applications in Blockchain Systems: Architecture, Consensus, and Traff Modeling. ACM Comput. Surv., 53, 1, Article 18, 2020.
7. Zheng, X., Zhu, Y., Si, X., A Survey on Challenges and Progresses in Blockchain Technologies: A Performance and Security Perspective. Appl. Sci., 9, 2, 4731, 2019.
8. Restuccia, F., D’Oro, S., Kanhere, S.S., Melodia, T., Das, S.K., Blockchain for the Internet of Things: Present and Future. IEEE Internet Thingsg, 1, 1, 1–8, 2018.
9. Bach, L.M., Mihaljevic, B., Zagar, M., Comparative Analysis of Consensus Algorithm, in: MIPRO 2018, Opatija Croatia, May 21–25, 2018, IEEE, pp. 218–225, 2018
10. Conti, M., Kumar, E.S., Lal, C., Ruj, S., A Survey on Security and Privacy Issues of Bitcoin. IEEE Commun. Surv. Tutor., 20, 4, 3416–3452, 2018.
11. Melhem, A., AlZoubi, O., Mardini, W., Applications of Blockchain in Smart Cities., in: DATA ’19: Proceedings of the Second International Conference on Data Science, E-Learning and Information Systems, December 2–5, 2019, Association for Computing Machinery, New York, NY, USA, Article 358, pp. 1–7, 2019.
12. Mohanta, B.K., Jena, D., Panda, S.S., Sobhanayak, S., Blockchain technology: A survey on applications and security privacy Challenges. Internet Things, 8, Article 100107, 2019.
13. Sapirshtein, Sompolinsky, Y., Zohar, A., Optimal selfish mining strategies in bitcoin, in: Financial Cryptography and Data Security: 20th International Conference, FC 2016, Christ Church, Barbados, 2017, Springer, Berlin Heidelberg, pp. 515–532, 2017.
14. Lei, A., Cruickshank, H., Cao, Y., Asuquo, P., Ogah, C.P.A., Sun, Z., Blockchain-based dynamic key management for heterogeneous intelligent transportation systems. IEEE Internet Things J., 4, 6, 1832–1843, 2017.
15. Mettler, M., Blockchain technology in healthcare: The revolution starts here, in: 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services, pp. 1–3, Sept 2016.
16. Biswas, K. and Muthu kumarasamy, V., securing smart cities using blockchain technology, in: 2016 IEEE 18th International Conference on High Performance Computing and Communications, pp. 1392–1393, 2016.
17. Dalipi, F. and Yayilgan, S.Y., Security and privacy considerations for iot application on smart grids: Survey and research challenges, in: Future Internet of Things and Cloud Workshops (FiCloudW), IEEE International Conference on. IEEE, 2016, pp. 63–68, 2016.
18. Laszka, A., Dubey, A., Walker, M., Schmidt, D., providing privacy, safety, and security in iot-based transactive energy systems using distributed ledgers, in: Proceedings of the Seventh International Conference on the Internet of Things, ACM, p. 13, 2017.
19. Lombardi, F., Aniello, L., De Angelis, S., Margheri, A., Sassone, V., A blockchain-based infrastructure for reliable and cost-effective iotaided smart grids, in: Living in the Internet of Things: Cybersecurity of the IoT-2018, pp. 1–6, 2018.
20. Mylrea, M. and Gourisetti, S.N.G., Blockchain for smart grid resilience: Exchanging distributed energy at speed, scale and security, in: Resilience Week (RWS), 2017, IEEE, pp. 18–23, 2017.
21. Kalkan, K. and Zeadally, S., Securing internet of things (iot) with software defined networking (sdn). IEEE Commun. Mag., 56, 9, 186–192, 2017.
22. Ziegeldorf, J.H., Matzutt, R., Henze, M., Grossmann, F., Wehrle, K., Secure and anonymous decentralized Bitcoin mixing. Futur. Gener. Comput. Syst., 80, 448–466, Mar 2018.
23. Yang, C., Chen, X., Xiang, Y., Blockchain-based publicly verifiable data deletion scheme for cloud storage. J. Netw. Comput. Appl., 103, 185–193, Feb 2018.
24. ElGamal, T., A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms, in: Advances in Cryptology. CRYPTO 1984. Lecture Notes in Computer Science, Blakley, G.R., Chaum, D. (Eds), Springer, Berlin, Heidelberg, vol. 196, pp. 10–18, 1985.
25. Gai, F., Wang, B., Deng, W., Peng, W., Proof of reputation: A reputation-based consensus protocol for peer-to-peer network, in: Database Systems for Advanced Applications, pp. 666–681, 2018.
26. Garay, J., Kiayias, A., Leonardos, N., The Bitcoin backbone protocol: Analysis and applications, in: EUROCRYPT 2015, pp. 281–310, 2015.
27. Garg, S., Gentry, C., Halevi, S., Sahai, A., Waters, B., Attribute-Based Encryption for Circuits from Multilinear Maps, in: Advances in Cryptology. CRYPTO 2013. Lecture Notes in Computer Science, Canetti R., Garay J.A. (Eds), Springer, Berlin, Heidelberg, vol. 8043, pp. 479–499.
28. Gentry, C., Fully homomorphic encryption using ideal lattices, in: STOC, pp. 169–178, 2009.
29. Xu, X., Weber, I., Staples, M., Zhu, L., Bosch, J., Bass, L., Pautasso, C., Rimba, P., A taxonomy of blockchain-based systems for architecture design, in Software Architecture (ICSA). 2017 IEEE International Conference on Communication Security, IEEE, pp. 243–252, 2017.
30. Zhang, L., Cai, Z., Wang, X., Fakemask: a novel privacy preserving approach for smartphones. IEEE Trans. Netw. Service Manag., 13, 335–348, 2016.
31. Zheng, X., Cai, Z., Li, J., Gao, H., Location-privacy-aware review publication mechanism for local business service systems,