Blockchains and Smart Contracts for the Internet of Things
Citations
18 citations
Cites background from "Blockchains and Smart Contracts for..."
...The public blockchain application to the PKI context is presented in [12]–[16]....
[...]
18 citations
18 citations
Cites background or methods from "Blockchains and Smart Contracts for..."
...The application of Blockchain in the creation of machine to machine service and resource marketplaces has also been addressed in [75]....
[...]
...In [75], the authors describe how smart contracts can facilitate the automation of complex multi-step processes in an Internet of Things (IoT) ecosystem....
[...]
17 citations
Cites background from "Blockchains and Smart Contracts for..."
...Implementation-wise, we developed the SCs in the Solidity language....
[...]
...As transactions are public, everyone can observe traffic between end users (data sources) and SCs in a way that reveals only pairs of nodes that communicate with each other....
[...]
...For example, solidity, the de-facto programming language for SCs on the Ethereum platform, only supports deterministic functions....
[...]
...The first, and probably the most important one, is the required determinism of algorithms used, if implementing the whole event detection system using SCs....
[...]
...Compiled and deployed SCs are assigned unique public addresses that act as an interface for interaction with other entities on the network (Figure 5)....
[...]
17 citations
Cites background from "Blockchains and Smart Contracts for..."
...bitcoin cryptocurrency), where as in case of private blockchains (or permissioned network), access is restricted to few users only [1]....
[...]
...Blockchain technologies continue to attract significant interest both from academic communities and industries [1]–[3]....
[...]
...trusted intermediary can now operate in a decentralised manner with the need of having central authority [1]....
[...]
...keys (public and private) using asymmetric cryptography [29], where the private key will be used to sign their own transactions and the corresponding public key is normally used as an address on the network [1]....
[...]
References
5,208 citations
4,901 citations
[...]
4,816 citations
"Blockchains and Smart Contracts for..." refers background in this paper
...Because of the Sybil attack [15], consensus in public networks is costly...
[...]
...anyone can join though, this would be catastrophic because of the Sybil attack [15]: a single entity could join with multiple identities, get multiple votes, and thus influence the network to favor this entity’s interests....
[...]
3,562 citations
"Blockchains and Smart Contracts for..." refers background or methods in this paper
...5If more than 3f + 1 nodes are used, then the quorum thresholds listed in [26] may lead to forks....
[...]
...Tendermint vs PBFT—Tendermint....
[...]
...Sieve [38], a mechanism used in the HyperLedger Fabric project, augments the PBFT algorithm [26] by adding speculative execution and verification phases, inspired by the execute-verify architecture presented in [39]....
[...]
...Tendermint [32] provides BFT tolerance and is similar to the PBFT algorithm; however it provides a tighter guarantee with regards to the results returned to the client when more than one third of the nodes are faulty, and allows for a dynamically changing set of set of validators, and leaders that can be rotated in a round-robin manner, among other optimizations [33]....
[...]
...PBFT works on the assumption that less than one third of the nodes are faulty (f ), which is why say that it requires at least5 3f + 1 nodes....
[...]
1,811 citations
"Blockchains and Smart Contracts for..." refers methods in this paper
...popular Raft algorithm [30], is used as a consensus mechanism in Juno [31]....
[...]