170,99 €
As we enter the Industrial Revolution 4.0, demands for an increasing degree of trust and privacy protection continue to be voiced. The development of blockchain technology is very important because it can help frictionless and transparent financial transactions and improve the business experience, which in turn has far-reaching effects for economic, psychological, educational and organizational improvements in the way we work, teach, learn and care for ourselves and each other. Blockchain is an eccentric technology, but at the same time, the least understood and most disruptive technology of the day. This book covers the latest technologies of cryptocurrencies and blockchain technology and their applications. This book discusses the blockchain and cryptocurrencies related issues and also explains how to provide the security differently through an algorithm, framework, approaches, techniques and mechanisms. A comprehensive understanding of what blockchain is and how it works, as well as insights into how it will affect the future of your organization and industry as a whole and how to integrate blockchain technology into your business strategy. In addition, the book explores the blockchain and its with other technologies like Internet of Things, big data and artificial intelligence, etc.
Sie lesen das E-Book in den Legimi-Apps auf:
Seitenzahl: 608
Veröffentlichungsjahr: 2020
Cover
List of Figures
List of Tables
Foreword
Preface
Acknowledgments
Acronyms
PART I: CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY
CHAPTER 1: BLOCKCHAIN: A NEW ERA OF TECHNOLOGY
1.1 Introduction to Web 3.0
1.2 Blockchain
1.3 Bitcoin
1.4 Ethereum
1.5 InterPlanetary File System (IPFS)
1.6 Decentralized Applications (DApps)
1.7 Case Study: FIR
1.8 Conclusion
REFERENCES
CHAPTER 2: BLOCKCHAIN: A PATH TO THE FUTURE
2.1 Introduction
2.2 Blockchain Architecture
2.3 Types of Blockchain Systems
2.4 Consensus Algorithms
2.5 Blockchain Applications That Are Transforming Society
2.6 Future Scope
REFERENCES
CHAPTER 3: BLOCKCHAIN IN 5G
3.1 Introduction
3.2 Data Economy of Blockchain and 5G
3.3 Combination of Blockchain Technology and 5G Mobile Connection
3.4 How to Use 5G and Blockchain Together
3.5 Applications of Blockchain and 5G
3.6 Conclusion
REFERENCES
CHAPTER 4: BLOCKCHAIN IN SOCIAL NETWORKING
4.1 Overview of Blockchain and Social Networking Platform
4.2 Decentralized Online Social Network
4.3 Trusted Social Network with Blockchain Technology
4.4 Privacy-Preserving Services for Social Network
4.5 Issues and Challenges of Blockchain in Social Network
4.6 Conclusion
REFERENCES
CHAPTER 5: INTEGRATING BLOCKCHAIN WITH CACC FOR TRUST AND PLATOON MANAGEMENT
5.1 Introduction
5.2 Literature Review
5.3 Background
5.4 Consensus in Blockchain
5.5 Proposed Framework
5.6 Experiments
5.7 Results and Discussion
5.8 Conclusion
REFERENCES
CHAPTER 6: IMPACT OF BLOCKCHAIN FOR INTERNET OF THINGS SECURITY
6.1 Introduction
6.2 Challenges and Issues in IoT
6.3 Blockchain
6.4 IoT Blockchain Approaches
6.5 Research Challenges
6.6 Conclusion
REFERENCES
CHAPTER 7: CHAOS CONTROL DYNAMICS OF CRYPTOVIROLOGY IN BLOCKCHAIN
7.1 Introduction
7.2 Mathematical Modeling and Stability Analysis
7.3 Lyapunov Exponent and Chaos
7.4 Controlling of Chaos
7.5 Conclusion
REFERENCES
CHAPTER 8: BLOCKCHAIN AND BITCOIN SECURITY
8.1 Introduction
8.2 Security Threats to Bitcoin
8.3 Working Idea of Bitcoin
8.4 Case Study for Analyzing the Reason for Fall in Bitcoin Value
8.5 Analyzed Report
8.6 Rise of Bitcoin Value
8.7 Conclusion
REFERENCES
PART II: CRYPTOCURRENCIES AND BLOCKCHAIN APPLICATIONS
CHAPTER 9: APPLICATIONS WITH BLOCKCHAIN TECHNIQUE
9.1 Introduction
9.2 Applications of Blockchain Technology
9.3 Conclusion
REFERENCES
CHAPTER 10: IMPACT OF APPLICATION OF BIG DATA ON CRYPTOCURRENCY
10.1 Introduction
10.2 Related Studies
10.3 Cryptocurrency
10.4 Blockchain
10.5 Big Data
10.6 Coexistence of Big Data and Blockchain
10.7 Future Aspects of Cryptocurrency with Big Data
10.8 Conclusion
REFERENCES
CHAPTER 11: A NEOTERIC SMART AND SUSTAINABLE FARMING ENVIRONMENT INCORPORATING BLOCKCHAIN-BASED ARTIFICIAL INTELLIGENCE APPROACH
11.1 Introduction
11.2 Artificial Intelligence Technology and Its Impact on Agriculture
11.3 Blockchain Technology (BCT) and Its Impact on Agriculture
11.4 A Neoteric Smart and Sustainable Farming Environment Incorporating Blockchain-Based Artificial Intelligence Approach
11.5 Conclusion and Future Work
REFERENCES
CHAPTER 12: THEORIES OF CRYPTOCURRENCY, BLOCKCHAIN AND DISTRIBUTED SYSTEMS AND ENVIRONMENTAL IMPLICATIONS
12.1 Introduction
12.2 Literature Review
12.3 Theories of Cryptocurrency, Blockchain and Distributed Systems
12.4 Environmental Implications of the Cryptocurrency Market
12.5 Conclusion
REFERENCES
CHAPTER 13: BLOCKCHAIN TECHNOLOGY: A PARADIGM SHIFT IN INVESTMENT BANKING
13.1 Introduction
13.2 Literature Review
13.3 Statement of the Problem
13.4 Results
13.5 Discussion of Findings
13.6 Conclusion
REFERENCES
CHAPTER 14: TRADING ENERGY AS A DIGITAL ASSET: A BLOCKCHAIN-BASED ENERGY MARKET
14.1 Introduction
14.2 Blockchain-Based P2P Energy Market
14.3 Distributed Ledger for Energy Tracking
14.4 Self-Enforcing Smart Contracts for Energy Market Management
14.5 Conclusion
REFERENCES
CHAPTER 15: APPLICATION VIEW TOWARDS BLOCKCHAIN: DEMYSTIFYING THE MYTHS
15.1 Introduction
15.2 What Blockchain Does Not Replace
15.3 Mining Mechanism
15.4 Various Participants of Blockchain System
15.5 Organized Use Cases
15.6 Hyperledger
15.7 Steps to Creating Your Own App
15.8 Advertising Industry
15.9 Present Day Implementation
15.10 Versatile Use Cases
15.11 Myths
15.12 Conclusion
REFERENCES
End User License Agreement
Chapter 1
Table 1.1 Difference between Client-Server and P2P.
Table 1.2 Difference between bitcoin, ethereum, and hyperledger.
Chapter 2
Table 2.2 Consensus algorithms comparison.
Chapter 4
Table 4.1 Issues and techniques related to different areas of social media.
Chapter 5
Table 5.1 Testbed details.
Chapter 8
Table 8.1 Bitcoin value changes against the U.S. dollar and their reasons.
Chapter 11
Table 11.1 Generations of blockchain.
Chapter 12
Table 12.1 Bitcoin energy consumption.
Chapter 13
Table 13.1 Model fit summary of the structural equation model of adaptability of...
Table 13.2 Confirmatory factor analysis of the impact of the adoption of technol...
Table 13.3 Regulatory framework and performance on the adaptability of the block...
Table 13.4 Model fit summary of the multiple linear regression model.
Table 13.5 The performance predictors in the regression model.
Chapter 14
Table 14.1 Generator functions for zero-knowledge proofs.
Table 14.2 Prover and verifier functions for zero-knowledge proofs.
Table 14.3 Public vs. private blockchain for energy marketplace implementation.
Chapter 15
Table 15.1 Famous cryptocurrencies around the world.
Table 15.2 List of some key players in the advertising industry.
Table 15.3 List of some successful startups using blockchain around the world an...
Table 15.4 The list of some successful Indian startups and their basic applicati...
Chapter 1
Figure 1.1 Sectors of blockchain.
Figure 1.2 Cryptographically linked blocks.
Figure 1.3 Hash function.
Figure 1.4 Immutability of blockchain.
Figure 1.5 P2P network of blockchain.
Figure 1.6 Process of mining.
Figure 1.7 Ethereum network.
Figure 1.8 Interfacing with Ethereum.
Figure 1.9 Transaction in Ethereum network.
Figure 1.10 Index page of the application.
Figure 1.11 Fields for a complaint.
Figure 1.12 Submitting the complaint.
Figure 1.13 Fetching complaint by ID.
Figure 1.14 Fetching recent complaint.
Chapter 2
Figure 2.1 Continuous sequence of blocks in blockchain.
Figure 2.2 Block structure.
Figure 2.3 Digital signature.
Figure 2.4 Blockchain branches scenario.
Figure 2.5 Double-spending attack script.
Figure 2.6 Technique for choosing main chain when fork appears.
Chapter 3
Figure 3.1 Blockchain – the invisible technology.
Figure 3.2 Transaction cycle of blockchain.
Figure 3.3 Collaboration of Blockchain with 5G.
Figure 3.4 The fusion of Blockchain and 5G.
Chapter 4
Figure 4.1 An example of blockchain.
Figure 4.2 Block structure.
Figure 4.3 Popular social networks as of April 2019.
Figure 4.4 Data generated every single minute (Courtesy of Domo, Inc.).
Figure 4.5 DOSN architecture.
Figure 4.6 Hierarchical organization of social content.
Figure 4.7 An instance of an object structure.
Figure 4.8 Architecture of blockchain-based information exchange.
Figure 4.9 Comparison of SIR and Blockchain-based SIR model.
Figure 4.10 Blockchain technology market size.
Chapter 5
Figure 5.1 CACC platooning variants.
Figure 5.2 Blockchain.
Figure 5.3 Blockchain in the platoon for intra-platoon communication and plato...
Figure 5.4 Periodic self-status update in a smart contract by vehicle.
Figure 5.5 Operations performed by the initial vehicles (validator nodes) in t...
Figure 5.6 Operations performed by non-initial platoon members.
Figure 5.7 Blockchain for trust and reputation management at RSU plane.
Figure 5.8 Testbed setup for the CACC platoon of vehicular plane.
Figure 5.9 Testbed setup for maintaining blockchain at the RSU plane.
Figure 5.10 CPU utilization of blockchain node (vehicle) when running the PoA ...
Figure 5.11 System performance of blockchain node (RSU) when idle.
Figure 5.12 System performance of blockchain node (RSU) when mining.
Chapter 7
Figure 7.1 Schematic diagram of the VVP model.
Figure 7.2 The different dynamic states observed in 2D phase space.
Figure 7.3 Combined time series plots for different dynamic states.
Figure 7.4 Bifurcation diagram for variation in
b
1
parameter.
Figure 7.5 Lyapunov exponent plot for different dynamic states.
Figure 7.6 Synchronization in Case 1 and synchronization with chaos control of...
Chapter 8
Figure 8.1 Understanding a Bitcoin transaction.
Figure 8.2 Average percentage of the Bitcoin value drop.
Figure 8.3 Bitcoin price prediction.
Chapter 9
Figure 9.1 Linked list.
Figure 9.2 Hash function.
Figure 9.3 Simplified Bitcoin blockchain.
Figure 9.4 Client-Server model.
Figure 9.5 Peer-to-peer connection.
Figure 9.6 Centralized vs. Decentralized downloading.
Figure 9.7 Photo showing the effects of the ban on spinach due to the
E. coli
...
Figure 9.8 Flow of supply process.
Figure 9.9 Representation of cybersecurity.
Figure 9.10 Representation of voting technology using blockchain.
Figure 9.11 Representation of voting system.
Chapter 10
Figure 10.1 Growth of big data from GBs to ZBs.
Figure 10.2 Expected growth of bitcoins based on past data.
Figure 10.3 Schematic of how a blockchain works.
Figure 10.4 Growth of big data research studies by various people in different...
Figure 10.5 Digital transformations in Industry 4.0 using Big Data.
Figure 10.6 Use of blockchain and big data in health facilities.
Chapter 11
Figure 11.1 Farmers across various states caught in the cycle of agricultural ...
Figure 11.2 Types of blockchain.
Figure 11.3 Major components of the global agricultural blockchain.
Figure 11.4 Challenges facing blockchain methodology.
Figure 11.5 Artificial intelligence approach to revolutionize farming methodol...
Figure 11.6 Potential benefits and opportunities provided through blockchain i...
Figure 11.7 Different stages of the agricultural supply chain in which the pro...
Chapter 12
Figure 12.1 Bitcoin energy consumption index.
Figure 12.2 Photographic depiction of the relation between cryptocurrencies an...
Figure 12.3 The environmental impacts of Bitcoin.
Figure 12.4 Simple blockchain model.
Figure 12.5 Distributed ledger technology (DLT).
Figure 12.6 Distributed communications networks.
Figure 12.7 Blockchain structure.
Figure 12.8 How blockchain works.
Figure 12.9 Diagram of the combined technological advancements of Bitcoin.
Figure 12.10 The November 1, 2008 online post of Satoshi Nakamoto announcing t...
Figure 12.11 Digital signatures.
Figure 12.12 How a blockchain works.
Figure 12.13 Published blockchain and private blockchain.
Figure 12.14 The threat of double-spending.
Figure 12.15 What is blockchain technology?
Figure 12.16 Blockchain: A blockchain is a linked list that is built with hash...
Figure 12.17 Environmental implications of the cryptocurrency market.
Figure 12.18 Steps to determine Bitcoin’s energy consumption.
Chapter 13
Figure 13.1 Applications of blockchain technology.
Figure 13.2 Blockchain technology for better customer experience.
Figure 13.3 Theoretical framework of investment banks.
Figure 13.4 Process in front-end operations.
Figure 13.5 Process in middle operations.
Figure 13.6 Process in back-end operations.
Figure 13.7 Flowchart representation of a conceptual framework.
Figure 13.8 Path diagramwith standardized estimates displayed based on the reg...
Chapter 14
Figure 14.1 Blockchain-based P2P energy market.
Figure 14.2 Example of P2P network distributed ledger [26].
Figure 14.3 Energy transactions registered in blockchain.
Figure 14.4 Merkle tree for storing multiple energy transactions and Merkle pa...
Figure 14.5 Private transaction for energy tokens using zero-knowledge proofs....
Figure 14.6 Smart contract controlling prosumers registration in the energy ma...
Figure 14.7 Energy token based on ERC-721 contract (left) and token metadata (...
Figure 14.8 Prosumer-level smart contracts for defining energy bids (left) and...
Figure 14.9 Smart contract for market session management.
Figure 14.10 Smart contract for market session financial settlement.
Chapter 15
Figure 15.1 Parts of a block in a blockchain.
Figure 15.2 The market capital of the main cryptocurrencies; the total market ...
Cover
Table of Contents
Begin Reading
ii
iii
iv
v
xv
xvi
xvii
xviii
xix
xxi
xxiii
xxiv
xxv
xxvi
xxvii
xxviii
xxix
xxxi
xxxii
xxxiii
xxxiv
1
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
Scrivener Publishing
100 Cummings Center, Suite 541J
Beverly, MA 01915-6106
Publishers at Scrivener
Martin Scrivener ([email protected])
Phillip Carmical ([email protected])
Edited by
Gulshan Shrivastava
National Institute of Technology Patna, India
Dac-Nhuong Le
Haiphong University, Haiphong, Vietnam
Kavita Sharma
National Institute of Technology, Kurukshetra, India
This edition first published 2020 by John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, USA and Scrivener Publishing LLC, 100 Cummings Center, Suite 541J, Beverly, MA 01915, USA© 2020 Scrivener Publishing LLCFor more information about Scrivener publications please visit www.scrivenerpublishing.com.
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, except as permitted by law. Advice on how to obtain permission to reuse material from this title is available at http://www.wiley.com/go/permissions.
Wiley Global Headquarters111 River Street, Hoboken, NJ 07030, USA
For details of our global editorial offices, customer services, and more information about Wiley products visit us at www.wiley.com.
Limit of Liability/Disclaimer of WarrantyWhile the publisher and authors have used their best efforts in preparing this work, they make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives, written sales materials, or promotional statements for this work. The fact that an organization, website, or product is referred to in this work as a citation and/or potential source of further information does not mean that the publisher and authors endorse the information or services the organization, website, or product may provide or recommendations it may make. This work is sold with the understanding that the publisher is not engaged in rendering professional services. The advice and strategies contained herein may not be suitable for your situation. You should consult with a specialist where appropriate. Neither the publisher nor authors shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages. Further, readers should be aware that websites listed in this work may have changed or disappeared between when this work was written and when it is read.
Library of Congress Cataloging-in-Publication Data
ISBN 978-1-119-62116-4
Cover image: Pixabay.ComCover design by Russell Richardson
Dedicated to our friends and family for their constant support during the course of this book
1.1
Difference between Client-Server and P2P.
1.2
Difference between bitcoin, ethereum, and hyperledger.
2.1
Classification of blockchain systems.
2.2
Consensus algorithms comparison.
4.1
Issues and techniques related to different areas of social media.
5.1
Testbed details.
8.1
Bitcoin value changes against the U.S. dollar and their reasons.
11.1
Generations of blockchain.
12.1
Bitcoin energy consumption.
13.1
Model fit summary of the structural equation model of adaptability of blockchain technology in investment banks.
13.2
Confirmatory factor analysis of the impact of the adoption of technology on the performance based on the SEM model.
13.3
Regulatory framework and performance on the adaptability of the blockchain.
13.4
Model fit summary of the multiple linear regression model.
13.5
The performance predictors in the regression model.
14.1
Generator functions for zero-knowledge proofs.
14.2
Prover and verifier functions for zero-knowledge proofs.
14.3
Public vs. private blockchain for energy marketplace implementation.
15.1
Famous cryptocurrencies around the world.
15.2
List of some key players in the advertising industry.
15.3
List of some successful startups using blockchain around the world and their basic field of work.
15.4
The list of some successful Indian startups and their basic application and product.
The concept of blockchain recently came into the limelight when the hype around Bitcoin and other cryptocurrencies gained momentum. Blockchain is the underlying principle behind cryptocurrencies. At the center of blockchain is a distributed ledger that records all the transactions that take place in the network. A blockchain network is usually described as decentralized because it is replicated across many network participants, each of which collaborates in its maintenance. In addition to being decentralized and collaborative, the information recorded on the blockchain is also immutable, which guarantees that once a transaction has been added to the ledger, it cannot be modified. This property of immutability assures the participants that their information is safe and secure.
The technology itself holds much more promise in various areas such as time stamping, logging of critical events in a system, recording of transactions, trustworthy e-governance, etc. With blockchain technology in the financial sector, participants can interact directly and can make transactions across the Internet without the interference of a third party. Such transactions through blockchain will not share any personal information regarding participants and it creates a transaction record by encrypting the identifying information. The most exciting feature of blockchain is that it greatly reduces the possibilities of a data breach. In contrast with the traditional processes, in blockchain there are multiple shared copies of the same database which makes it challenging to wage a data breach attack or cyber-attack. With all the fraud resistant features, the blockchain technology holds the potential to revolutionize various business sectors and make processes smarter, more secure, more transparent, and more efficient compared to traditional business processes.
Many researchers are working on multiple uses such as decentralized public key infrastructure, self-sovereign identity management, registry maintenance, health record management, decentralized authentication, decentralized DNS, etc. Also, corporations, such as IBM and Microsoft, are developing their own applications in diverse fields such as the Internet of Things (IoT), etc., even enabling blockchain platforms on the cloud.
With all the best available expertise and knowledge, the editors provide a complete and comprehensive collection of chapters that address the various aspects of blockchain technology such as decentralization computing, automation of content extraction and an assortment of business applications in blockchain using machine learning, evolutionary algorithms and other techniques.
By the end of the book, the reader will know everything one needs to know about blockchain technology and be ready use that information for future applications and investments.
Professor Nguyen Thanh Thuy
VNU University of Engineering and Technology, Vietnam
April 2020
Blockchain is in its early phase of development where experiments are performed on existing systems by developers working on reducing the cost and making user activities faster. Their support is limited in terms of computing power and the number of nodes within the network being small. The current situation is that solutions are usually designed to address where the decentralized system makes decisions. Coin offerings made by blockchain technology implemented using smart contract can deliver high proposition value to the solution over a decentralized network where each node will have equal importance and control over the decisions made by the system. In the future, real power is empowered by smart contract where advanced technologies will enable transactions at a faster rate. Satoshi Nakamoto published his paper titled “Bitcoin: A Peer-to-Peer Electronic Cash System” in October 2008 and released it in January 2009, which was a clear sign of the disruption of the financial and banking sectors to come. Since it is a practical solution with limiting technology, it seemed very unlikely to have drawbacks to its success and full-fledged implementation. With the exception of financial sectors, healthcare, supply chains, and governments look forward to implementing game-changing results. Companies acting as a middleman to conduct business can be eliminated using this technology. Thus, they are looking forward to utilizing blockchain technology to remove central authority over the network. It enables us to achieve transformative change but will take time to solve existing challenges with user scalability and complexity of transaction. Thus, the blockchain technology can be imagined as the ozone layer in the atmosphere where with its presence we can stop many malicious activities in the field of computer technology, where it acts as a protective shield to the users’ data against attackers.
Objective of the Book
This book covers the latest cryptocurrencies and blockchain technologies and their applications. It discusses blockchain and cryptocurrencies related issues and also explains how to provide the security differently through algorithms, frameworks, approaches, techniques and mechanisms. This book explores blockchain in relation to other technologies like IoT, big data, artificial intelligence, etc.
Organization of the Book
This book consists of 15 chapters which are organized into two sections. The first section of the book contains eight chapters focusing mainly on blockchain technology and its impact on IoT and social networks. The second section consists of seven chapters that concentrate mostly on the cryptocurrencies and blockchain applications. A brief description of each of the chapters follows:
Section 1: Cryptocurrencies and Blockchain Technologies
(
Chapters 1
-
8
)
Chapter 1
: In this chapter, the author discusses how the advent of Blockchain Technology has changed the lives of people, giving them a new dimension. It has changed the perspective of viewing things on the web and has been more user-centric and user-friendly. Blockchain, with its wide range of technology, has provided more data security. The hashing algorithms used security parameters that have a wide diversity in controlling the cybercrimes occurring in the world and also solve the problem of data breach and money, and property-related issues. With this, sectors like digital advertising, cybersecurity, forecasting, supply chain management, IoT, and networking have a fantastic future. It has a comprehensive perspective of the new occupation industry. In a client-server architecture, users experience a single point of failure and even it is prone to attackers to provide a better solution. The use of distributed network improves the efficiency of the system and provides more security to the system. The transactional activities can be performed much faster and can be efficiently used. The blockchain technology provides a sustainable and efficient method to the existing service structures where some are underperforming and have unreliable security. The authors discuss that the blockchain technology is going to be used in many more sectors in the future, such as in government systems, as these systems are slow, dense, and likely to be affected by corruption. Implementing blockchain technology in government systems can make their operations much more secure and efficient.
Chapter 2
:
In this chapter, the author discusses the blockchain technology architecture with the consensus algorithms involved in it. Also, the type of blockchain systems and applications, such as those in reputation systems and the internet of things (IoT), are discussed. Future directions in the field of blockchain are also discussed.
Chapter 3
:
In this chapter, the author discusses the ability of blockchain to reduce business costs, simplifying various processes and interactions with others. Blockchain can provide its users with a faster and safer way to verify essential information and establish trust. With the advent of 5G technology, which provides faster speed and faster communication, its impact can be seen everywhere. This chapter also discusses how blockchain makes supply chains trustful and trackable. Because of the enormous potential of blockchain, it can be thought of as the operating system of the future. It also helps in streamlining processes and removing intermediaries.
Chapter 4
:
This chapter discusses various blockchain-based social media platforms. Today’s primary concern is social media platform security and privacy. Blockchain-based social media provides more benefits than just security and privacy. It assists in gaining control over the user’s content and enables e-commerce, crowd-funding transactions as well as smart apps and contracts. This chapter also highlights the research challenges and issues facing the blockchain social network.
Chapter 5
:
In this chapter, the rapid advancement in connected and automated vehicle technologies are discussed. Cooperative adaptive cruise control (CACC)-based platooning is used as a case study. The CACC-based platooning can enhance safety and driving comfort, increase traffic throughput, and reduce fuel consumption and pollutant emissions. Various platooning maneuvers, such as merge, split, lane change, leave, etc., have been integrated with CACC-based platooning to meet the objectives mentioned above. In such a platooning, a platoon leader plays a crucial role in the execution of various functions such as synchronization, collision avoidance, coordination, and better route planning. However, if a malevolent vehicle becomes the leader, it may put the entire platoon in danger. Thus, vehicles must elect a trusted and reputed leader to lead the platoon. The unencrypted broadcast inter-vehicle communication of CACC exposes vehicles to several security threats. Establishing trust among vehicles is a critical challenge. The author states that the core features of the blockchain of decentralization, immutability, security, and high availability turn out to be a strong contender for addressing the challenge. Introduction of blockchain platforms supporting smart contracts helps build trust among untrusted parties and enhances the decision-making processes.
Chapter 6
:
In this chapter, the author discusses various applications of IoT, followed by security and privacy issues. The internet of things (IoT) plays a significant role in the industry and is encouraging research to come up with various applications by bringing economic and social benefits to society. The impact of IoT can be seen in various environments like mission-critical applications, health, transport systems, video surveillance, banking, etc. The chapter discusses challenges for secure IoT followed by an introduction to blockchain technology along with various advantages of blockchain for IoT. The author discusses the application domains of blockchain technology in IoT, classification of threat models that are considered by blockchain protocols for IoT networks, and comparison of state-of-art secure models concerning blockchain. The IoT objects are interconnected to each other, but the functions of these vary from each other, which yield better results of security with the conventional approaches. To address the security and privacy concerns, the central server concept is eliminated and blockchain technology is introduced as a part of IoT, blockchain, which is used to provide security in a peer-to-peer network which is similar to IoT technology.
Chapter 7
:
In this chapter, the author discusses the dynamics of worm propagation in cryptovirology. A nonlinear epidemic model is applied to study the viral propagation of worm in the cyber network system and the effect of rate of worm infection on the dynamics of the model is analyzed. In this chapter, the author discusses how the internet is used as a powerful tool for communication, cyber transactions and cyber networks; most computers are interconnected through the same operating software. Also, in the present era, the internet becomes the primary medium for cybercrime. Cybercrimes are committed by developing malicious codes or programs which invade private and public computers, gathering information and posing security threats. The highest risks faced by computer networks is from viral malware or worm propagation which target the software vulnerability. Like in cryptovirology, cryptography is used to design powerful malicious software. The security of critical networks is targeted and chaotic or erratic behavior is introduced in their performance, leading to disruption in the complete system. Also, in recent times, blockchain security vulnerabilities have become an issue of distributed ledger technology.
Chapter 8
:
In this chapter, the author shows the strength of Bitcoin value, even though it has many security threats. With the help of a case study, the major contributing security breach which caused a drop in the value of Bitcoin is identified. Also, there is a focus on the prediction of the future value of the Bitcoin. Bitcoin is the world’s first virtual currency.
Section 2: Cryptocurrencies and Blockchain Applications
(
Chapter 9
-
15
)
Chapter 9
:
In this chapter, the blockchain technologies are discussed that could be used to develop a lot of applications, which is similar to the internet. The information recorded on a blockchain can take on any form, whether it is denoting a transfer of money, ownership, a transaction, someone’s identity, an agreement between two parties, or even how much electricity a light bulb has used. It can be done by getting confirmation from several devices such as the computer on the network. The data cannot be removed or altered by anyone without the knowledge and permission of those who made that record, as well as the wider community. In blockchain technology, rather than keeping information in one central point, as is done by traditional recording methods, multiple copies of the same data are stored in different locations and on different network devices, such as computers or printers, which is called peer-to-peer network. If one point of storage is damaged or lost, multiple copies remain safe and secure elsewhere and if one piece of information is changed without the agreement of the rightful owners, there are countless other examples in existence where the information is right, making the false record obsolete. Blockchain owes its name to the manner in which it works and where data is stored, that means the information is packed into blocks, which link to form a chain with similar blocks. Usually, each block contains the data it is recording. It also includes a digital signature linked to the account that made the recording and a unique identifying link, in the form of a hash (think of it as a digital fingerprint), to the previous block in the chain. It is this link that makes it impossible for any of the information to be altered or for a block to be inserted between two existing blocks. In order to do so, all the following blocks would need to be edited too. As a result, each block strengthens the previous block and the security of the entire blockchain because it means more blocks would need to be changed to tamper with any information. When combined, all of these create unquestionable storage of information which cannot be disputed or declared to be untrue. This chapter discusses the working of blockchain technology.
Chapter 10
:
This chapter provides an outlook on big data and blockchain individually with viewpoints of various situations in which both Big Data and Blockchain coexist to ensure data quality in various sectors, including web, health, education and government through diagrams, working and inner implementations. The importance of Blockchain-Big Data in the national development with its various aspects in Industry 4.0 and some other future aspects that need to be addressed are also discussed. This chapter is designed to give insights into various facets of cryptocurrency, blockchain and big data, which are combined to perform certain operations pertaining to the task of any organization or institution that may be private or public.
Chapter 11
:
In this chapter, the author proposes a smart farming environment based on artificial intelligence (AI) and blockchain technology. Artificial intelligence can be harnessed to automate and manage agricultural and related tasks while blockchain technology can help in intensifying agriculture food and supply chains. A sensational AI-based approach helps in developing the smart farming environment that can efficiently gather and monitor data for real-time monitoring to address the uncertain issues faced by the agricultural community. Because of the rapid increase in global population, there will be an increase of nearly 70% in the agricultural production by 2050 to meet the ever-increasing demands of people. To develop cost-effective agricultural solutions, 90% intensification is required on technological farming for achieving agricultural inputs and market demands. Today, the agricultural sector is affected by various factors like increased labor costs, increased population, crop failures, unpredictable yields, extreme weather, climate change, market fluctuations, etc. All these factors have directly or indirectly affected the socioeconomic status of farmers. With such a large number of challenges and increasing demands, there is a need to implement an artificial intelligence-based approach for developing the smart farming environment for real-time monitoring and management of agricultural issues. Blockchain can handle issues related to the increased demands for agricultural products with transparency and trust. It accompanies a variety of certification schemes on branded agricultural products that face issues related to claims, labels and adulterations. Blockchain can prove to be an efficient solution for agricultural products safety, quality and sustainability. Blockchain ensures the permanency of records during data sharing. ICT in the agricultural sector provides more efficient solutions for effective water and land usage, resulting in maximum agricultural yields. The author proposes a neoteric smart and sustainable farming environment incorporating the blockchain-based artificial intelligence approach.
Chapter 12
:
In this chapter, the author states that many countries have quantified their purpose to create an ecosystem in which businesses can grow, which can only mean the continued growth of the sector in the predictable future. Simultaneously, it reduces the friction of making payments and transfers in fiat currency, facilitated by e-money. This has raised the bar of virtual currency and the cryptocurrency market. Bill Gates opined that “
Banking is essential, banks are not
.” The early 21st century has seen a proliferation of financial technology and analytics firms, providing a wide and varied array of services, from payments and local and international money transmission to financing through P2P lending and crowdfunding. Venture capital funding in the U.K. for financial technology-related business increased to more than US$500 million in 2014, while the sector is estimated to contribute more than GBP 20 billion to the economy. Cryptocurrencies have come a long way from their relatively ambiguous origins. Even though the financial institutions have concerns about digital currencies as tools for criminals, terrorists or rebellious individuals frustrated with traditional money, the industry has significantly progressed in establishing their potential legitimacy.
Chapter 13
:
In this chapter, the author discusses how blockchain technology can create ramifications across the investment banking ecosystem due to their cryptographic distributed ledger. The author evaluates the adaptation feasibility and predicts performance for a regulatory framework when investment banks apply blockchain technology. Random sampling is used with a sample size of 50 respondents from investment banks operating in urban Bangalore based on the primary data collected. Statutory impact (SI), compliance policy (CP), fiscal policy (FP), competitive edge (CE) and service-level agreement (SLA) are the variables. The statistical software used to test structural equation model (SEM) with confirmatory factor analysis (CFA), multiple linear regression analysis and one-way ANOVA (analysis of variance) are SPSS and SPSS AMOS. SI is the most influential variable and has a more significant impact on acceptability with beta value 0.899 at 0.001 percent significant level with Chi-square value of 3.14 and the estimated reliability post-adoption of 81 per cent. SI, CP, SLA, and CE are the significant predictors of performance with a higher association between the performance of the banks and regulatory framework indicators with significance at 0.01 percent level. The author discusses how technology can reduce the middle- and back-end operating cost and improves transparency.
Chapter 14
:
In this chapter, the author discusses how blockchain technology could facilitate and help to implement a market, allowing the transformation of energy in a digital asset which could be tracked and traded. The author discusses the smart energy grid decentralization problem by proposing a blockchain-based energy market allowing the energy to be traded among prosumers in a peer-to-peer fashion. The main advantages brought by the blockchain technology, such as energy provenance, transaction privacy and immutability, are discussed and details on their implementation in our envisioned energy market are provided. To implement the energy market management operations, such as prosumers registration and permission control, bids and offers matching and financial settlement self-enforcing smart contracts are used. At the same time, the prosumers level smart contract is used to automatize the bids and offers registration and monitor their energy generation and demand.
Chapter 15
:
In this chapter, the author discusses blockchain from an application point of view, throwing some light on mining mechanism, participants of the blockchain system, and organized and versatile use cases, while demystifying the related myths. Blockchain is an eccentric technology, in addition to being the most vaunted, least understood and most disrupting technology of the current era.
Gulshan Shrivastava
National Institute of Technology Patna, India
Dac-Nhuong Le
Hai Phong University, Hai Phong, Vietnam
Kavita Sharma
National Institute of Technology, Kurukshetra, India
First of all, we would like to thank the authors for contributing their excellent chapters to this book. Without their contributions, this book would not have been possible. Thanks to all our friends for sharing our happiness at the start of this project and following up with their encouragement when it seemed too difficult to complete.
We would like to acknowledge and thank the most important people in our life, our parents, and finally, give thanks to god. This book has been a long-cherished dream of ours which would not have been turned into reality without the support and love of our families, who encouraged us despite not giving them the proper time and attention.
Gulshan Shrivastava
National Institute of Technology Patna, India
Dac-Nhuong Le
Hai Phong University, Hai Phong, Vietnam
Kavita Sharma
National Institute of Technology, Kurukshetra, India
5G
The next (5th) Generation
AI
Artificial Intelligence
ACC
Adaptive Cruise Control
AMOS
Analysis of Moment Structure
ANOVA
Analysis of Variance
AGFI
Adjusted Goodness of Fit Index
API
Application Programming Interface
AWS
Amazon Web Services
ADEPT
Autonomous Decentralized Peer-to-Peer Telemetry
BCT
Blockchain Technology
BG
Byzantine Generals
CA
Certificate Authority
CACC
Cooperative Adaptive Cruise Control
CE
Competitive Edge
CFA
Confirmatory Factor Analysis
CFI
Comparative Fit Index
CP
Compliance Policy
C-DAC
Center for Development of Advanced Computing
CSS
Cross-Site Scripting
CP
Compliance Policy
CPU
Central Processing Unit
CoAP
Constrained Application Protocol
DApp
Decentralized Application
DHT
Distributed Hash Table
DPoS
Delegated Proof of Stake
dBFT
Delegated Byzantine Fault Tolerance
DLT
Distributed Ledger Technology
DNS
Domain Name System
DOSN
Distributed Online Social Network
DoS
Denial of Service
DDoS
Distributed Denial of Service
DTSL
Datagram Transport Layer Security
DSRC
Dedicated Short-Range Communications
EVM
Ethereum Virtual Machine
ECDSA
Elliptic Curve Digital Signature Algorithm
EHR
Electronic Health Record
ERP
Enterprise Resource Planning
EMR
Electronic Medical Record
FIR
First Information Report
FP
Fiscal Policy
GFI
Goodness of Fit Index
GUID
Global Unique Identification
HDAC
Hyundai Digital Access Currency
HTTP
Hypertext Transfer Protocol
HTML
Hypertext Markup Language
HD
High Definition
IANA
Internet Assigned Numbers Authority
IB
Investment Banks
ICT
Information and Communications Technology
IoT
Internet of Things
IPFS
InterPlanetary File System
I2V
Infrastructure-to-Vehicle
IP
Internet Protocol
IPv6
Internet Protocol version 6
IT
Information Technology
ICO
Initial Coin Offering
IoV
Internet of Value
IPO
Initial Public Offering
JSP
Java Server Pages
KYC
Know Your Customer
LPoS
Leased Proof-of-Stake
LoWPAN
Low-Power Wireless Personal Area Networks
LWM2M
Lightweight M2M
M2M
Machine to Machine
MBD
Misbehavior Detection
MQTT
Message Queuing Telemetry Transport
NAV
Net Asset Value
NIFTY
National Stock Exchange Index
NFI
Normed Fit Index
NHTSA
National Highway Transportation Safety Agency
NSA
National Security Agency
OBC
Open Blockchain
OS
Operating System
OBM
Original Brand Manufacturing
PKI
Public Key Infrastructure
PHP
Hypertext Preprocessor
PC
Personal Computer
P2P
Peer to Peer
PoW
Proof of Work
PoS
Proof of Stake
PBFT
Practical Byzantine Fault Tolerance
PoET
Proof of Elapsed Time
PoA
Proof of Activity
PoB
Proof of Burn
PL
Platoon Leader
RMSEA
Root Mean Square Error of Approximation
RMR
Root Mean Square Residential
RF1
Statutory Impact
RF2
Compliance policy
RF3
Competitive edge
RF4
Fiscal Policy
RF5
Service Level agreement
RFW
Regulatory Framework
REST
Representational State Transfer
RPC
Remote Procedure Call
RSU
Road-Side Units
RAT
Radio Access Technology
RPL
Routing Protocol for Low-Power and Lossy Networks
RFID
Radio Frequency Identification
RBAC
Role-Based Access Management
SIS
Susceptible, Infected, Susceptible Model
SEIR
Susceptible, Exposed, Infected and Recovered
SEI
Susceptible Exposed Infected
SC
Smart Contract
SCMS
Security Credential Management System
SIR
Susceptible, Infected, Recovered
SI
Statutory Impact
SLA
Service Level Agreement
S&P
Standard & Poor’s (Index)
SEM
Structural Equation Model
SQL
Structured Query Language
SSL
Secure Sockets Layer
SCP
Stellar Consensus Protocol
SO
Social Overlay
SHA
Secure Hash Algorithm
TA
Trusted Authority
TCS
Tata Consultancy Service
TSL
Transport Layer Security
TCP
Transmission Control Protocol
UGV
Unmanned Ground Vehicle
UI
User Interaction
URL
Uniform Resource Locator
UTXO
Unspent Transaction Output
UNL
Unique Node List
VANET
Vehicular Ad-Hoc Networks
VVP
Virus-Vulnerable and Protected
V2X
Vehicle-to-Everything
V2V
Vehicle-to-Vehicle
V2I
Vehicle-to-Infrastructure
XHTML
Extensible Hypertext Markup Language
XMPP
Extensible Messaging and Presence Protocol
XAMP
X-Cross Platform
XSS
Cross-Site Scripting
W3C
World Wide Web Consortium
WAVE
Wireless Access in Vehicular Environment
WSN
Wireless Sensor Network
Gururaj H L,∗ Manoj Athreya A, Ashwin A Kumar, Abhishek M Holla, Nagarajath S M, Ravi Kumar V
Vidyavardhaka College of Engineering, Mysuru, India
AbstractAs the whole world is moving towards digital payments, ethers and transaction methods with quick payment, information is stored in a blockchain in a distributed network. The distributed network is a network system through which data, software and computer programming are spread across more than one node (computers) and these nodes are dependent on each other. It is nothing but a peer-to-peer network which eliminates a single point of failure. The blockchain is a growing list of records called blocks that are linked using cryptography. It is a decentralized, distributed and immutable ledger to store digital transactions. Its databases are managed using a peer-to-peer network where all the nodes in a network are equal and are the major concern in the types of network architecture. The consensus protocol is used for transacting and communicating between the nodes. In this chapter, an approach for storing data in a blockchain is investigated and reported whereby the record is kept safe and secure, preventing it from being manipulated by others. With the help of the above blockchain technology we are able to achieve data that is secure from manipulators.
Keywords: Blockchain, inter-planetary file system, Ethereum, Web 3.0, consensus protocol, mining, distributed P2P network, Ethereum transaction, SHA-256 algorithm, decentralized application
Blockchain is one of the booming words in the field of computer technology, which has the power to change the lives of people as the Internet did in the past twenty years. Blockchain is ready to make a big impact on the lives of people if we adhere to this technology. It is a fundamental and parallel part to the Internet and not just a use case like emails, e-commerce, etc. When people hear the term blockchain many come to a conclusion that it deals mainly with cryptocurrency and Bitcoin but it is not all about that. The cryptocurrency and Bitcoin can be compared to email where the backbone technology behind it is the internet. As such, blockchain is a technology. Blockchain can be broadly described as a digital form of the ledger where you can store whatever data you want and then later access it through the hash value you received. It’s just like the acknowledgment number you get when you produce some documents. Consider a scenario where some person x needs to send money to person y who lives in a different country; it takes at least 5-6 working days to transfer the money because we have middle parties like banks which require time to process it. When it comes to blockchain we have an immutable universal ledger where it stores transaction details of all the individuals in a block. When a transaction is made it adds a new block into the existing set of blocks in the system which is authenticated by everyone. When it comes to security it uses the best cryptographic algorithms and is difficult to hack. It uses the SHA-256 algorithm to keep the hash value secured. When a hacker tries to hack a blockchain system, first of all, he needs computation power of more than 50% of the supercomputer in the word and he also needs to change all the blocks because they are cryptographically linked to each other; moreover, the blocks reside in a distributed node and every time it checks with other nodes to see whether they possess the same details which are based on the consensus protocol. As it is a collection of chained blocks you can trace back to the transactions that have occurred by going back block by block. They also have originated smart contracts which are the logic built into most blockchains, where when an event happens it triggers another event. Finally, all the blocks are not owned by anyone like a bank or any trusted authority. The blockchain is owned by all of us and to maintain it we need resources, electricity, computing power, time, money, etc. So for the people who maintained all these resources, in 2008 Satoshi Nakamoto introduced the concept of Bitcoins to give them as incentives, and the persons who looked after the blockchain mined it and hence they were called miners. In this blockchain the word TRUST plays an important role. Consider an example of a party where ten people put in a thousand rupees each and draw one name from the box; this lucky person will get the entire amount. Here, it is the trust between all ten people which works like a blockchain and brings the trust from a centralized to decentralized platform.
The blockchain works on the following four major features:
Consensus
Security
Provenance
Trust
The countries which use this technology are Japan, Canada, Dubai, Estonia and many more. Dubai is transforming itself as the world’s first blockchain-powered government. Estonia is being called Ethereum Island. When it comes to India we have certain blockchain information such as:
State Bank of India partnered with BankChain and Intel to develop blockchain solutions.
West Bengal and Andhra Pradesh is transitioning to using blockchain software for solving land property issues.
The Centre for Development of Advanced Computing (C-DAC) Hyderabad is working on blockchain projects.
Blockchain patents are claimed by the Indians and many more.
Some of the recent blockchain technology being hyped in the current industry are as follows:
Google is bringing blockchain technology to its cloud services.
Facebook has plans for blockchain-based authentication.
Microsoft Azure allows the development, testing, and deployment of secure blockchain apps.
IBM is now delivering blockchain service around the world.
Walmart has partnered with IBM to create a blockchain for tracking food globally through its supply chain.
Mastercard has started to build their own blockchain-based payment gateways.
Huawei’s blockchain technology offers mobile carriers superb opportunities to subscribers.
Figure 1.1 shows the different sectors in which blockchain technology is being used.
Figure 1.1 Sectors of blockchain.
Blockchain is making its way into many sectors like agriculture, power production, education, banking, voting and many more. Consider the example of power production where if you have solar panels installed in your home and if you produce electricity, the excess can be sent to others and in turn you get money through Blockchain; and where we can have the IoT also being used with it. Basically, blockchain comes into the picture when you can prevent data hoaxes and establish trust in the distributed network. The internet has solved many more problems like information searches (Google, Yahoo), distribution (YouTube, Amazon Prime, Netflix) and communication (email, chat applications) but it has not solved two major problems, which are trust and intermediation. On the internet, we find fake news and fake profiles which are not to be trusted; and in intermediaries, the big companies like Google, Amazon, Facebook, etc., have acquired the market and are not open to all, which means there is a middleman between producer and consumer. But with the advent of Blockchain, we can solve all these problems and bring back a trusted environment.
With the web entering a new phase of evolution, Web 3.0 is lined up to be the next big thing marking a fundamental change in how developers create websites and how people interact with those websites. Internet experts claim that these changes will make the internet smarter, thereby making our lives easier [2].
This is referred to as the first generation of the web, invented by Tim Berners-Lee. It is often referred to as the read-only web as few people created content for the rest of the customers. Commonly used technologies are HTTP, XHTML, HTML, CSS, etc. It supports both server-side scripting (like JSP, PHP, etc.) and client-side scripting (JavaScript, VBScript, etc.) [3].
Web 1.0 has a lot of vulnerabilities, some of them are:
It is extremely slow.
Each time new content is pushed onto the webpage, it needs to be refreshed.
It doesn’t support two-way communication as it can be initiated only by the client (HTTP).
This is also referred to as the read-write web as the users can interact with websites that have predetermined behaviors according to the inputs. With the emergence of blogs in the 20th century, widgets and other instant and universal authorizing tools and sites are always ready to accept the content. These have played a substantial role in the democratization of the web. Commonly used technologies are Ajax, DOM, REST, etc. [6].
Web 2.0 has a lot of vulnerabilities, some of them are:
SQL Injection
Information Leakage
Cross-Site Request Forgery
Authentication and Authorization Flaws
Cross-Site Scripting
This term was coined by the reporter John Markoff of The New York Times in 2006. It allows online applications to receive information from the web and provide new information (results) to the users [4].
Web 3.0 is made up of these 4 basic properties:
Semantic Web
: This deals with the meaning or the emotion conveyed by the data.
3D graphics
: This is being used to provide a realistic feel to the websites.
Universal
: This will allow accessing the content/service on the web from anywhere.
Artificial intelligence
: This will allow websites to filter and present users the best data possible.
