Blockchain is essentially a form of distributed data storage technology. It is designed to prevent arbitrary manipulation by operators of distributed nodes and contains a list of changes that records the continuously changing data on the participating nodes. Currently, various blockchain-based services are appearing. in particular, blockchain-based medical convergence services are emerging worldwide. In a blockchain-based medical environment, hospitals, departments, doctors and patients must frequently update and use all public and private key pairs to minimize the leakage of personal information. As such, key pairs management is of great importance. To securely manage keys in such a medical environment, hierarchical deterministic wallet is used. Defined as Bitcoin's BIP32 standard, it is currently the most commonly used technology and allows hospitals to easily derive and manage the key of departments, doctors and patients. In addition, if the hospital, which is at the root level, backs up the first seed value, the doctor and patient can easily recover the key in the future, in case it is lost. However, problems have been found with hierarchical deterministic wallets. The attacker can infer the doctor's private key by obtaining doctor's public key, chain code, or the patient's index and private key. In addition, there is a privilege escalation attack that can be acquired up to the department or hospital's private key. Subsequently, an attacker can leak personal information, such as the personal information of doctors or medical records of managed patients. That is why the current BIP32 standard does not include the function to derive lower public keys from the higher public keys. In this scheme, we maintain the functionality removed from BIP32. In addition, we propose a secure scheme of hierarchical deterministic key generation scheme in blockchain-based medical environment by preventing privilege escalation attack.
{"title":"Secure Hierarchical Deterministic Key Generation Scheme in Blockchain-based Medical Environment","authors":"Taehoon Kim, Imyeong Lee","doi":"10.1145/3409934.3409958","DOIUrl":"https://doi.org/10.1145/3409934.3409958","url":null,"abstract":"Blockchain is essentially a form of distributed data storage technology. It is designed to prevent arbitrary manipulation by operators of distributed nodes and contains a list of changes that records the continuously changing data on the participating nodes. Currently, various blockchain-based services are appearing. in particular, blockchain-based medical convergence services are emerging worldwide. In a blockchain-based medical environment, hospitals, departments, doctors and patients must frequently update and use all public and private key pairs to minimize the leakage of personal information. As such, key pairs management is of great importance. To securely manage keys in such a medical environment, hierarchical deterministic wallet is used. Defined as Bitcoin's BIP32 standard, it is currently the most commonly used technology and allows hospitals to easily derive and manage the key of departments, doctors and patients. In addition, if the hospital, which is at the root level, backs up the first seed value, the doctor and patient can easily recover the key in the future, in case it is lost. However, problems have been found with hierarchical deterministic wallets. The attacker can infer the doctor's private key by obtaining doctor's public key, chain code, or the patient's index and private key. In addition, there is a privilege escalation attack that can be acquired up to the department or hospital's private key. Subsequently, an attacker can leak personal information, such as the personal information of doctors or medical records of managed patients. That is why the current BIP32 standard does not include the function to derive lower public keys from the higher public keys. In this scheme, we maintain the functionality removed from BIP32. In addition, we propose a secure scheme of hierarchical deterministic key generation scheme in blockchain-based medical environment by preventing privilege escalation attack.","PeriodicalId":145384,"journal":{"name":"Proceedings of the 2nd International Electronics Communication Conference","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130115221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Healthcare records management system has been revolutionized over the last decade aiming to provide accurate, efficient and enhanced patient care. The existing management system is either based on a client/server approach where each hospital maintains its own database or on a cloud approach where the health records are stored in a cloud server and managed by a third-party cloud service provider. However, these approaches suffer from the issues of security, privacy, data vulnerability and fragmentation. Furthermore, healthcare providers and patients are unable to have a unified view of a patient's medical history from all visited medical care centers. This results in additional treatment costs, repeated medical tests and increased time to diagnosis. The data traceability, immutability, transparency, replication, security and privacy traits of the emerging blockchain technology have a promising potential in the healthcare domain addressing these issues. In this paper, we propose BlockHR, a patient-centric healthcare records management system for efficient medical care at an optimal cost. The system enables healthcare providers to enter the patients' medical record data to the blockchain network and allows patients to enter their social data such as sleeping habits, physical activities, and current location. Consequently, BlockHR provides support to doctors for better diagnosis and prognosis. We evaluate the performance of BlockHR in terms of execution time and the total amount of data transferred for ledger update with an increasing number of hospitals and blocks in the network.
{"title":"Performance Evaluation of a Patient-Centric Blockchain-based Healthcare Records Management Framework","authors":"L. Ismail, Huned Materwala, Moien A B Khan","doi":"10.1145/3409934.3409941","DOIUrl":"https://doi.org/10.1145/3409934.3409941","url":null,"abstract":"Healthcare records management system has been revolutionized over the last decade aiming to provide accurate, efficient and enhanced patient care. The existing management system is either based on a client/server approach where each hospital maintains its own database or on a cloud approach where the health records are stored in a cloud server and managed by a third-party cloud service provider. However, these approaches suffer from the issues of security, privacy, data vulnerability and fragmentation. Furthermore, healthcare providers and patients are unable to have a unified view of a patient's medical history from all visited medical care centers. This results in additional treatment costs, repeated medical tests and increased time to diagnosis. The data traceability, immutability, transparency, replication, security and privacy traits of the emerging blockchain technology have a promising potential in the healthcare domain addressing these issues. In this paper, we propose BlockHR, a patient-centric healthcare records management system for efficient medical care at an optimal cost. The system enables healthcare providers to enter the patients' medical record data to the blockchain network and allows patients to enter their social data such as sleeping habits, physical activities, and current location. Consequently, BlockHR provides support to doctors for better diagnosis and prognosis. We evaluate the performance of BlockHR in terms of execution time and the total amount of data transferred for ledger update with an increasing number of hospitals and blocks in the network.","PeriodicalId":145384,"journal":{"name":"Proceedings of the 2nd International Electronics Communication Conference","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126703219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Robert Norvill, Jean Hilger, Irfan-Ullah Awan, A. Cullen, R. State
Banks must comply with a complex set of regulatory and legislative requirements in order to be sure they know who they are doing business with. Current Know Your Customer processes are inefficient and costly, often being repeated by multiple banks. As such, financial institutions have a need to reduce the cost of compliance. Banks can reduce their costs through inter-bank Know Your Customer data trading. In this paper, we build upon an industry-strength, blockchain-based, Know Your Customer data sharing platform to facilitate a novel data marketplace by detailing a method of pricing data such that banks save money and are suitably incentivised to trade their data. The pricing model we detail enables banks to reduce the cost of document acquisition and verification by at least 45%, and even profit by providing documents. In addition, we discuss how decentralised pricing is realised through the use of smart contracts.
{"title":"Decentralised Compliant Data Trading for Banks","authors":"Robert Norvill, Jean Hilger, Irfan-Ullah Awan, A. Cullen, R. State","doi":"10.1145/3409934.3409947","DOIUrl":"https://doi.org/10.1145/3409934.3409947","url":null,"abstract":"Banks must comply with a complex set of regulatory and legislative requirements in order to be sure they know who they are doing business with. Current Know Your Customer processes are inefficient and costly, often being repeated by multiple banks. As such, financial institutions have a need to reduce the cost of compliance. Banks can reduce their costs through inter-bank Know Your Customer data trading. In this paper, we build upon an industry-strength, blockchain-based, Know Your Customer data sharing platform to facilitate a novel data marketplace by detailing a method of pricing data such that banks save money and are suitably incentivised to trade their data. The pricing model we detail enables banks to reduce the cost of document acquisition and verification by at least 45%, and even profit by providing documents. In addition, we discuss how decentralised pricing is realised through the use of smart contracts.","PeriodicalId":145384,"journal":{"name":"Proceedings of the 2nd International Electronics Communication Conference","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125170236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Internet-of-Things (IoT) networks interoperability is of a crucial role in driving innovation to achieve smart city agenda. However, the potential for a unified and connective digital linkage is undermined by competitive private sector standards and protocols that are dissociated and disunited. In this paper, we propose a blockchain-based standard for IoT integration which is democratized, scalable, and decentralized. As a transactional ledger, the blockchain serves as a central data warehouse capable of monitoring the entrance and exit of user-triggered information. Network interchange and authentication can be facilitated through blockchain-relegation of network communication and security protocol. The outcome is linked with integrated communications, efficiency and a highly functional user experience as the constructs of interoperability develops.
{"title":"A Blockchain-Based Smart Network for IoT-Driven Smart Cities","authors":"Nada Alasbali, S. Azzuhri, R. Salleh","doi":"10.1145/3409934.3409957","DOIUrl":"https://doi.org/10.1145/3409934.3409957","url":null,"abstract":"Internet-of-Things (IoT) networks interoperability is of a crucial role in driving innovation to achieve smart city agenda. However, the potential for a unified and connective digital linkage is undermined by competitive private sector standards and protocols that are dissociated and disunited. In this paper, we propose a blockchain-based standard for IoT integration which is democratized, scalable, and decentralized. As a transactional ledger, the blockchain serves as a central data warehouse capable of monitoring the entrance and exit of user-triggered information. Network interchange and authentication can be facilitated through blockchain-relegation of network communication and security protocol. The outcome is linked with integrated communications, efficiency and a highly functional user experience as the constructs of interoperability develops.","PeriodicalId":145384,"journal":{"name":"Proceedings of the 2nd International Electronics Communication Conference","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131456495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Due to the increasing popularity of the Internet of Things (IoT), several modules, development boards, and single-board computers have been proposed by the community and manufacturers. In this paper, we selected the ESP8266, an inexpensive module, to make a performance evaluation of its networking subsystem. Since the popular benchmarking tools of the area have not been ported for the ESP8266, we wrote several benchmarks to evaluate its TCP and UDP performance over IPv4 and IPv6, as an end-point device or as an access point. In our tests, we report parameters such as one-way delay and throughput. To cover a wider range of developers, we give performance measurements for two development tools: Arduino IDE and Espressif SDK.
{"title":"Performance Evaluation of TCP and UDP over IPv4 and IPv6 for the ESP8266 Module","authors":"Eric Gamess, Brody Smith","doi":"10.1145/3409934.3409956","DOIUrl":"https://doi.org/10.1145/3409934.3409956","url":null,"abstract":"Due to the increasing popularity of the Internet of Things (IoT), several modules, development boards, and single-board computers have been proposed by the community and manufacturers. In this paper, we selected the ESP8266, an inexpensive module, to make a performance evaluation of its networking subsystem. Since the popular benchmarking tools of the area have not been ported for the ESP8266, we wrote several benchmarks to evaluate its TCP and UDP performance over IPv4 and IPv6, as an end-point device or as an access point. In our tests, we report parameters such as one-way delay and throughput. To cover a wider range of developers, we give performance measurements for two development tools: Arduino IDE and Espressif SDK.","PeriodicalId":145384,"journal":{"name":"Proceedings of the 2nd International Electronics Communication Conference","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127182070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Smart Distributed Ledger (aka blockchain) has attracted much attention in recent years. According to the European Parliament, this technology has the potential to change the lives of many people. The blockchain is a data structure built upon a hashed function in a distributed network, enabled by an incentive mechanism to discourage malicious nodes from participation. The consensus is at the core of the blockchain technology, and is driven by information embedded into a data structure that takes many forms such as linear, tree, and graph chains. The found related information will be subject to various validation incentives among the miners, such as proof of stake and proof of work. However, all the existing solutions suffer from a heavy state transition before dealing with the problem of a validation mechanism which suffers from resource consumption, monopoly or attacks. This work raises the following question: "Why is there a need for consensus where all participants can make a quick and correct decision?", and underlines the fact that sometimes ledger is subject to maintenance from regional parties in the data that leads to partial territories and eliminates monopoly, which is the hurdle to eliminating the trusted party. The validity of the blockchain transaction comes from the related information scattered above the data structure, and the authenticity lies in the digital signature. The aim is to switch from a validator based on incentives to a broadcaster governed by an unsupervised clustering algorithm, and the integrity does lie in the intersection among regions. However, the data structure takes advantage of the Petri network regarding its suitability. Building the entire ledger in the Petri network model will allow parallel processing of the transactions and securing of the total order between the participants on the memory reference layer. Moreover, it takes account of validation criteria quickly and safely before adding the new transaction list using the graph reachability.
{"title":"TheChain: A Fast, Secure and Parallel Treatment of Transactions","authors":"Mohamed Ikbal Nacer, S. Prakoonwit, Ismail Alarab","doi":"10.1145/3409934.3409944","DOIUrl":"https://doi.org/10.1145/3409934.3409944","url":null,"abstract":"The Smart Distributed Ledger (aka blockchain) has attracted much attention in recent years. According to the European Parliament, this technology has the potential to change the lives of many people. The blockchain is a data structure built upon a hashed function in a distributed network, enabled by an incentive mechanism to discourage malicious nodes from participation. The consensus is at the core of the blockchain technology, and is driven by information embedded into a data structure that takes many forms such as linear, tree, and graph chains. The found related information will be subject to various validation incentives among the miners, such as proof of stake and proof of work. However, all the existing solutions suffer from a heavy state transition before dealing with the problem of a validation mechanism which suffers from resource consumption, monopoly or attacks. This work raises the following question: \"Why is there a need for consensus where all participants can make a quick and correct decision?\", and underlines the fact that sometimes ledger is subject to maintenance from regional parties in the data that leads to partial territories and eliminates monopoly, which is the hurdle to eliminating the trusted party. The validity of the blockchain transaction comes from the related information scattered above the data structure, and the authenticity lies in the digital signature. The aim is to switch from a validator based on incentives to a broadcaster governed by an unsupervised clustering algorithm, and the integrity does lie in the intersection among regions. However, the data structure takes advantage of the Petri network regarding its suitability. Building the entire ledger in the Petri network model will allow parallel processing of the transactions and securing of the total order between the participants on the memory reference layer. Moreover, it takes account of validation criteria quickly and safely before adding the new transaction list using the graph reachability.","PeriodicalId":145384,"journal":{"name":"Proceedings of the 2nd International Electronics Communication Conference","volume":"47 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128372864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Utkan Eryilmaz, R. Dijkman, W. Jaarsveld, Wouter van Dis, K. Alizadeh
Blockchain emerged as a peer-to-peer trust platform for trading virtual currencies and evolved to be used for different problems including supply chain provenance. Due to stringent requirements of safety, regulated manufacturing and service industries such as aerospace, healthcare, and transportation require regulated traceability for parts, from source to the last customer, with detailed information requirements for each handover and operation. In this research, we analyzed the current traceability problem and list use cases of a traceability blockchain platform. A prototype platform is developed for the aerospace industry where every single part is required to have source and path traces recorded by certified supply chain actors. We evaluate the efficiency benefits of the platform in terms of duration and address future research topics.
{"title":"Traceability Blockchain Prototype for Regulated Manufacturing Industries","authors":"Utkan Eryilmaz, R. Dijkman, W. Jaarsveld, Wouter van Dis, K. Alizadeh","doi":"10.1145/3409934.3409937","DOIUrl":"https://doi.org/10.1145/3409934.3409937","url":null,"abstract":"Blockchain emerged as a peer-to-peer trust platform for trading virtual currencies and evolved to be used for different problems including supply chain provenance. Due to stringent requirements of safety, regulated manufacturing and service industries such as aerospace, healthcare, and transportation require regulated traceability for parts, from source to the last customer, with detailed information requirements for each handover and operation. In this research, we analyzed the current traceability problem and list use cases of a traceability blockchain platform. A prototype platform is developed for the aerospace industry where every single part is required to have source and path traces recorded by certified supply chain actors. We evaluate the efficiency benefits of the platform in terms of duration and address future research topics.","PeriodicalId":145384,"journal":{"name":"Proceedings of the 2nd International Electronics Communication Conference","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116775389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The next-generation mobile communication, which is 5G wireless mobile networks, has become the paradigm to bring not only solutions for the rising demand for huge data traffic, and massively connected devices such as IoT but also new services. One of the promising solutions is that device-to-device communications are expected to play a key role to improve efficiency and have low latency. Most importantly, D2D communications will be the key enabler for group-based services. However, the new case scenarios and new system architecture of 5G Heterogeneous Networks are vulnerable against various attacks since the 5G is still in the early stage. It is utmost important to have a secure and privacy-preserving scheme for D2D communications in 5G HetNets. Even though various research studies have been done by the researchers for D2D communications but many of them fail to address the heterogenous access scenarios, identity protection, and group authentication. In this paper, we propose a certificateless privacy-preserving authentication and key agreement scheme for D2D communications in 5G HetNets using identity-based encryption and elliptic curve digital signature algorithm (ECDSA) to achieve secure and robust communication. The proposed scheme has been analyzed in terms of security and performance. The result of the formal verification using AVISPA and performance analysis shows that the scheme is secure, lightweight and efficient.
{"title":"A Group Authentication Scheme with Privacy-preserving for D2D Communications in 5G HetNets","authors":"Alican Ozhelvaci, M. Ma","doi":"10.1145/3409934.3409955","DOIUrl":"https://doi.org/10.1145/3409934.3409955","url":null,"abstract":"The next-generation mobile communication, which is 5G wireless mobile networks, has become the paradigm to bring not only solutions for the rising demand for huge data traffic, and massively connected devices such as IoT but also new services. One of the promising solutions is that device-to-device communications are expected to play a key role to improve efficiency and have low latency. Most importantly, D2D communications will be the key enabler for group-based services. However, the new case scenarios and new system architecture of 5G Heterogeneous Networks are vulnerable against various attacks since the 5G is still in the early stage. It is utmost important to have a secure and privacy-preserving scheme for D2D communications in 5G HetNets. Even though various research studies have been done by the researchers for D2D communications but many of them fail to address the heterogenous access scenarios, identity protection, and group authentication. In this paper, we propose a certificateless privacy-preserving authentication and key agreement scheme for D2D communications in 5G HetNets using identity-based encryption and elliptic curve digital signature algorithm (ECDSA) to achieve secure and robust communication. The proposed scheme has been analyzed in terms of security and performance. The result of the formal verification using AVISPA and performance analysis shows that the scheme is secure, lightweight and efficient.","PeriodicalId":145384,"journal":{"name":"Proceedings of the 2nd International Electronics Communication Conference","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117239930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
More and more people, in this age and day, choose to travel when they are in their convenience. At the same time, many tourism platforms appear to assist tourists to make their travel choices. For these platforms, the most efficient way to help tourists is to offer tourists relevant information concerning the destinations, so that tourists can acquire a better understanding of the resorts before making their decision. This article mainly studies what kind of information enables tourists to familiarize themselves with the destinations to more extent from the perspective of psychological distance and serendipity. Based on the method of group experiment, this paper studies five kinds of information, including VR, and the interaction before tourists, and finally finds that the high level of serendipity and the low level of psychological distance can higher tourists' decision-making satisfaction and decision outcome satisfaction, which is conductive to making a better final decision.
{"title":"The Impact of Interaction on the Travel Arrangement: Cultivating Serendipity and Reducing Psychological Distance in Tourism Platforms","authors":"Anzhuo Xie, Dong Tan","doi":"10.1145/3409934.3409954","DOIUrl":"https://doi.org/10.1145/3409934.3409954","url":null,"abstract":"More and more people, in this age and day, choose to travel when they are in their convenience. At the same time, many tourism platforms appear to assist tourists to make their travel choices. For these platforms, the most efficient way to help tourists is to offer tourists relevant information concerning the destinations, so that tourists can acquire a better understanding of the resorts before making their decision. This article mainly studies what kind of information enables tourists to familiarize themselves with the destinations to more extent from the perspective of psychological distance and serendipity. Based on the method of group experiment, this paper studies five kinds of information, including VR, and the interaction before tourists, and finally finds that the high level of serendipity and the low level of psychological distance can higher tourists' decision-making satisfaction and decision outcome satisfaction, which is conductive to making a better final decision.","PeriodicalId":145384,"journal":{"name":"Proceedings of the 2nd International Electronics Communication Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130948500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper introduces a method to make a consensus by recording proof of block validation, which operates in a public blockchain environment, with a consensus algorithm named Sybil Tolerant Equality Protocol (STEP). To solve the problem of centralization, which is pointed out as a problem of existing consensus algorithms, all nodes are given the same power. Also, methods to prevent Sybil attack in which one principal creates multiple nodes are proposed. To this end, STEP randomly selects nodes to create blocks, divides the validation process into two stages, and provides a reward for rapid and correct validation. Through simulations and experiments on STEP, we confirmed whether the random number generation method, the incentive function for block validation, and the network following this consensus algorithm work correctly within the practicable scope of execution time.
{"title":"Sybil Tolerant Consensus Method Using Mutual Proof of Validation","authors":"Hoon Shin, K. Son, Dongsoo Han","doi":"10.1145/3409934.3409936","DOIUrl":"https://doi.org/10.1145/3409934.3409936","url":null,"abstract":"This paper introduces a method to make a consensus by recording proof of block validation, which operates in a public blockchain environment, with a consensus algorithm named Sybil Tolerant Equality Protocol (STEP). To solve the problem of centralization, which is pointed out as a problem of existing consensus algorithms, all nodes are given the same power. Also, methods to prevent Sybil attack in which one principal creates multiple nodes are proposed. To this end, STEP randomly selects nodes to create blocks, divides the validation process into two stages, and provides a reward for rapid and correct validation. Through simulations and experiments on STEP, we confirmed whether the random number generation method, the incentive function for block validation, and the network following this consensus algorithm work correctly within the practicable scope of execution time.","PeriodicalId":145384,"journal":{"name":"Proceedings of the 2nd International Electronics Communication Conference","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128890702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}