Details

Wireless Blockchain


Wireless Blockchain

Principles, Technologies and Applications
IEEE Press 1. Aufl.

von: Bin Cao, Lei Zhang, Mugen Peng, Muhammad Ali Imran

116,99 €

Verlag: Wiley
Format: PDF
Veröffentl.: 21.10.2021
ISBN/EAN: 9781119790815
Sprache: englisch
Anzahl Seiten: 336

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<b>Explore foundational concepts in blockchain theory with an emphasis on recent advances in theory and practice</b> <p>In <i>Wireless Blockchain: Principles, Technologies and Applications,</i> accomplished researchers and editors Bin Cao, Lei Zhang, Mugen Peng, and Muhammad Ali Imran deliver a robust and accessible exploration of recent developments in the theory and practice of blockchain technology, systems, and potential application in a variety of industrial sectors, including manufacturing, entertainment, public safety, telecommunications, public transport, healthcare, financial services, automotive, and energy utilities.</p> <p>The book presents the concept of wireless blockchain networks with different network topologies and communication protocols for various commonly used blockchain applications. You’ll discover how these variations and how communication networks affect blockchain consensus performance, including scalability, throughput, latency, and security levels.</p> <p>You’ll learn the state-of-the-art in blockchain technology and find insights on how blockchain runs and co-works with existing systems, including 5G, and how blockchain runs as a service to support all vertical sectors efficiently and effectively. Readers will also benefit from the inclusion of:</p> <ul> <li>A thorough introduction to the Byzantine Generals problem, the fundamental theory of distributed system security and the foundation of blockchain technology</li> <li>An overview of advances in blockchain systems, their history, and likely future trends</li> <li>Practical discussions of Proof-of-Work systems as well as various Proof-of-“X” alternatives, including Proof-of-Stake, Proof-of-Importance, and Proof-of-Authority</li> <li>A concise examination of smart contracts, including trusted transactions, smart contract functions, design processes, and related applications in 5G/B5G</li> <li>A treatment of the theoretical relationship between communication networks and blockchain</li> </ul> <p>Perfect for electrical engineers, industry professionals, and students and researchers in electrical engineering, computer science, and mathematics,<i> Wireless Blockchain: Principles, Technologies and Applications</i> will also earn a place in the libraries of communication and computer system stakeholders, regulators, legislators, and research agencies.</p>
<p>List of Contributors xiii</p> <p>Preface xvii</p> <p>Abbreviations xxiii</p> <p><b>1 What is Blockchain Radio Access Network? </b><b>1<i><br /> </i></b><i>Xintong Ling, Yuwei Le, Jiaheng Wang, Zhi Ding, and Xiqi Gao</i></p> <p>1.1 Introduction 1</p> <p>1.2 What is B-RAN 3</p> <p>1.2.1 B-RAN Framework 3</p> <p>1.2.2 Consensus Mechanism 6</p> <p>1.2.3 Implementation 6</p> <p>1.3 Mining Model 7</p> <p>1.3.1 Hash-Based Mining 7</p> <p>1.3.2 Modeling of Hash Trials 7</p> <p>1.3.3 Threat Model 10</p> <p>1.4 B-RAN Queuing Model 10</p> <p>1.5 Latency Analysis of B-RAN 12</p> <p>1.5.1 Steady-State Analysis 12</p> <p>1.5.2 Average Service Latency 16</p> <p>1.6 Security Considerations 18</p> <p>1.6.1 Alternative History Attack 18</p> <p>1.6.2 Probability of a Successful Attack 19</p> <p>1.7 Latency-Security Trade-off 20</p> <p>1.8 Conclusions and Future Works 22</p> <p>1.8.1 Network Effect and Congest Effect 22</p> <p>1.8.2 Chicken and Eggs 22</p> <p>1.8.3 Decentralization and Centralization 22</p> <p>1.8.4 Beyond Bitcoin Blockchain 22</p> <p>References 23</p> <p><b>2 Consensus Algorithm Analysis in Blockchain: PoW and Raft </b><b>27</b><i><br /> Taotao Wang, Dongyan Huang, and Shengli Zhang</i></p> <p>2.1 Introduction 27</p> <p>2.2 Mining Strategy Analysis for the PoWConsensus-Based Blockchain 30</p> <p>2.2.1 Blockchain Preliminaries 30</p> <p>2.2.2 Proof ofWork and Mining 30</p> <p>2.2.3 Honest Mining Strategy 31</p> <p>2.2.4 PoW Blockchain Mining Model 32</p> <p>2.2.4.1 State 33</p> <p>2.2.4.2 Action 33</p> <p>2.2.4.3 Transition and Reward 34</p> <p>2.2.4.4 Objective Function 39</p> <p>2.2.4.5 Honest Mining 40</p> <p>2.2.4.6 Selfish Mining 40</p> <p>2.2.4.7 Lead Stubborn Mining 40</p> <p>2.2.4.8 Optimal Mining 41</p> <p>2.2.5 Mining Through RL 41</p> <p>2.2.5.1 Preliminaries for Original Reinforcement Learning Algorithm 41</p> <p>2.2.5.2 New Reinforcement Learning Algorithm for Mining 42</p> <p>2.2.6 Performance Evaluations 44</p> <p>2.3 Performance Analysis of the Raft Consensus Algorithm 52</p> <p>2.3.1 Review of Raft Algorithm 52</p> <p>2.3.2 System Model 53</p> <p>2.3.3 Network Model 53</p> <p>2.3.4 Network Split Probability 55</p> <p>2.3.5 Average Number of Replies 57</p> <p>2.3.6 Expected Number of Received Heartbeats for a Follower 57</p> <p>2.3.7 Time to Transition to Candidate 58</p> <p>2.3.8 Time to Elect a New Leader 59</p> <p>2.3.9 Simulation Results 60</p> <p>2.3.10 Discussion 67</p> <p>2.3.10.1 Extended Model 67</p> <p>2.3.10.2 System Availability and Consensus Efficiency 68</p> <p>2.4 Conclusion 69</p> <p>Appendix A.2 69</p> <p>References 70</p> <p><b>3 A Low Communication Complexity Double-layer PBFT Consensus </b><b>73<i><br /> </i></b><i>Chenglin Feng, Wenyu Li, Bowen Yang, Yao Sun, and Lei Zhang</i></p> <p>3.1 Introduction 73</p> <p>3.1.1 PBFT Applied to Blockchain 74</p> <p>3.1.2 From CFT to BFT 74</p> <p>3.1.2.1 State Machine Replication 74</p> <p>3.1.2.2 Primary Copy 75</p> <p>3.1.2.3 Quorum Voting 75</p> <p>3.1.3 Byzantine Generals Problem 76</p> <p>3.1.4 Byzantine Consensus Protocols 76</p> <p>3.1.4.1 Two-Phase Commit 76</p> <p>3.1.4.2 View Stamp 76</p> <p>3.1.4.3 PBFT Protocol 76</p> <p>3.1.5 Motivations 78</p> <p>3.1.6 Chapter Organizations 78</p> <p>3.2 Double-Layer PBFT-Based Protocol 79</p> <p>3.2.1 Consensus Flow 79</p> <p>3.2.1.1 The Client 79</p> <p>3.2.1.2 First-Layer Protocol 81</p> <p>3.2.1.3 Second-Layer Protocol 81</p> <p>3.2.2 Faulty Primary Elimination 82</p> <p>3.2.2.1 Faulty Primary Detection 82</p> <p>3.2.2.2 View Change 83</p> <p>3.2.3 Garbage Cleaning 84</p> <p>3.3 Communication Reduction 84</p> <p>3.3.1 Operation Synchronization 85</p> <p>3.3.2 Safety and Liveness 85</p> <p>3.4 Communication Complexity of Double-Layer PBFT 85</p> <p>3.5 Security Threshold Analysis 86</p> <p>3.5.1 Faulty Probability Determined 87</p> <p>3.5.2 Faulty Number Determined 89</p> <p>3.6 Conclusion 90</p> <p>References 90</p> <p><b>4 Blockchain-Driven Internet of Things </b><b>93<i><br /> </i></b><i>Bin Cao, Weikang Liu, and Mugen Peng</i></p> <p>4.1 Introduction 93</p> <p>4.1.1 Challenges and Issues in IoT 93</p> <p>4.1.2 Advantages of Blockchain for IoT 94</p> <p>4.1.3 Integration of IoT and Blockchain 94</p> <p>4.2 Consensus Mechanism in Blockchain 96</p> <p>4.2.1 PoW 96</p> <p>4.2.2 PoS 97</p> <p>4.2.3 Limitations of PoWand PoS for IoT 98</p> <p>4.2.3.1 Resource Consumption 98</p> <p>4.2.3.2 Transaction Fee 98</p> <p>4.2.3.3 Throughput Limitation 98</p> <p>4.2.3.4 Confirmation Delay 98</p> <p>4.2.4 PBFT 98</p> <p>4.2.5 DAG 100</p> <p>4.2.5.1 Tangle 101</p> <p>4.2.5.2 Hashgraph 102</p> <p>4.3 Applications of Blockchain in IoT 102</p> <p>4.3.1 Supply Chain 102</p> <p>4.3.1.1 Introduction 102</p> <p>4.3.1.2 Modified Blockchain 103</p> <p>4.3.1.3 Integrated Architecture 104</p> <p>4.3.1.4 Security Analysis 105</p> <p>4.3.2 Smart City 106</p> <p>4.3.2.1 Introduction 106</p> <p>4.3.2.2 Smart Contract System 107</p> <p>4.3.2.3 Main Functions of the Framework 109</p> <p>4.3.2.4 Discussion 110</p> <p>4.4 Issues and Challenges of Blockchain in IoT 111</p> <p>4.4.1 Resource Constraints 111</p> <p>4.4.2 Security Vulnerability 111</p> <p>4.4.3 Privacy Leakage 112</p> <p>4.4.4 Incentive Mechanism 112</p> <p>4.5 Conclusion 112</p> <p>References 112</p> <p><b>5 Hyperledger Blockchain-Based Distributed Marketplaces for 5G Networks </b><b>117<br /> </b><i>Nima Afraz, Marco Ruffini, and Hamed Ahmadi</i></p> <p>5.1 Introduction 117</p> <p>5.2 Marketplaces in Telecommunications 118</p> <p>5.2.1 Wireless Spectrum Allocation 119</p> <p>5.2.2 Network Slicing 119</p> <p>5.2.3 Passive optical networks (PON) Sharing 120</p> <p>5.2.4 Enterprise Blockchain: Hyperledger Fabric 121</p> <p>5.2.4.1 Shared Ledger 122</p> <p>5.2.4.2 Organizations 122</p> <p>5.2.4.3 Consensus Protocol 122</p> <p>5.2.4.4 Network Peers 122</p> <p>5.2.4.5 Smart Contracts (chaincodes) 123</p> <p>5.2.4.6 Channels 123</p> <p>5.3 Distributed Resource Sharing Market 123</p> <p>5.3.1 Market Mechanism (Auction) 125</p> <p>5.3.2 Preliminaries 125</p> <p>5.4 Experimental Design and Results 126</p> <p>5.4.1 Experimental Blockchain Deployment 127</p> <p>5.4.1.1 Cloud Infrastructure 127</p> <p>5.4.1.2 Container Orchestration: Docker Swarm 127</p> <p>5.4.2 Blockchain Performance Evaluation 127</p> <p>5.4.3 Benchmark Apparatus 128</p> <p>5.4.3.1 Hyperledger Caliper 130</p> <p>5.4.3.2 Data Collection: Prometheus Monitor 130</p> <p>5.4.4 Experimental Results 131</p> <p>5.4.4.1 Maximum Transaction Throughput 131</p> <p>5.4.4.2 Block Size 131</p> <p>5.4.4.3 Network Size 131</p> <p>5.5 Conclusions 133</p> <p>References 133</p> <p><b>6 Blockchain for Spectrum Management in 6G Networks </b><b>137</b><i><br /> Asuquo A. Okon, Olusegun S. Sholiyi, Jaafar M. H. Elmirghani, and Kumudu Munasighe</i></p> <p>6.1 Introduction 137</p> <p>6.2 Background 139</p> <p>6.2.1 Rise of Micro-operators 139</p> <p>6.2.2 Case for Novel Spectrum Sharing Models 140</p> <p>6.2.2.1 Blockchain for Spectrum Sharing 141</p> <p>6.2.2.2 Blockchain in 6G Networks 142</p> <p>6.3 Architecture of an Integrated SDN and Blockchain Model 143</p> <p>6.3.1 SDN Platform Design 143</p> <p>6.3.2 Blockchain Network Layer Design 144</p> <p>6.3.3 Network Operation and Spectrum Management 146</p> <p>6.4 Simulation Design 149</p> <p>6.5 Results and Analysis 152</p> <p>6.5.1 Radio Access Network and Throughput 152</p> <p>6.5.2 Blockchain Performance 154</p> <p>6.5.3 Blockchain Scalability Performance 155</p> <p>6.6 Conclusion 156</p> <p>Acknowledgments 156</p> <p>References 157</p> <p><b>7 Integration of MEC and Blockchain </b><b>161<i><br /> </i></b><i>Bin Cao, Weikang Liu, and Mugen Peng</i></p> <p>7.1 Introduction 161</p> <p>7.2 Typical Framework 162</p> <p>7.2.1 Blockchain-Enabled MEC 162</p> <p>7.2.1.1 Background 162</p> <p>7.2.1.2 Framework Description 162</p> <p>7.2.2 MEC-Based Blockchain 164</p> <p>7.2.2.1 Background 164</p> <p>7.2.2.2 Framework Description 164</p> <p>7.3 Use Cases 166</p> <p>7.3.1 Security Federated Learning via MEC-Enabled Blockchain Network 166</p> <p>7.3.1.1 Background 166</p> <p>7.3.1.2 Blockchain-Driven Federated Learning 167</p> <p>7.3.1.3 Experimental Results 168</p> <p>7.3.2 Blockchain-Assisted Secure Authentication for Cross-Domain Industrial IoT 170</p> <p>7.3.2.1 Background 170</p> <p>7.3.2.2 Blockchain-Driven Cross-Domain Authentication 170</p> <p>7.3.2.3 Experimental Results 172</p> <p>7.4 Conclusion 174</p> <p>References 174</p> <p><b>8 Performance Analysis on Wireless Blockchain IoT System </b><b>179</b><i><br /> Yao Sun, Lei Zhang, Paulo Klaine, Bin Cao, and Muhammad Ali Imran</i></p> <p>8.1 Introduction 179</p> <p>8.2 System Model 181</p> <p>8.2.1 Blockchain-Enabled IoT Network Model 181</p> <p>8.2.2 Wireless Communication Model 183</p> <p>8.3 Performance Analysis in Blockchain-Enabled Wireless IoT Networks 184</p> <p>8.3.1 Probability Density Function of SINR 185</p> <p>8.3.2 TDP Transmission Successful Rate 187</p> <p>8.3.3 Overall Communication Throughput 189</p> <p>8.4 Optimal FN Deployment 189</p> <p>8.5 Security Performance Analysis 190</p> <p>8.5.1 Eclipse Attacks 190</p> <p>8.5.2 Random Link Attacks 192</p> <p>8.5.3 Random FN Attacks 192</p> <p>8.6 Numerical Results and Discussion 192</p> <p>8.6.1 Simulation Settings 193</p> <p>8.6.2 Performance Evaluation without Attacks 193</p> <p>8.7 Chapter Summary 197</p> <p>References 197</p> <p><b>9 Utilizing Blockchain as a Citizen-Utility for Future Smart Grids </b><b>201</b><i><br /> Samuel Karumba, Volkan Dedeoglu, Ali Dorri, Raja Jurdak, and Salil S. Kanhere</i></p> <p>9.1 Introduction 201</p> <p>9.2 DET Using Citizen-Utilities 204</p> <p>9.2.1 Prosumer Community Groups 204</p> <p>9.2.1.1 Microgrids 205</p> <p>9.2.1.2 Virtual Power Plants (VPP) 206</p> <p>9.2.1.3 Vehicular Energy Networks (VEN) 206</p> <p>9.2.2 Demand Side Management 207</p> <p>9.2.2.1 Energy Efficiency 208</p> <p>9.2.2.2 Demand Response 209</p> <p>9.2.2.3 Spinning Reserves 210</p> <p>9.2.3 Open Research Challenges 211</p> <p>9.2.3.1 Scalability and IoT Overhead Issues 211</p> <p>9.2.3.2 Privacy Leakage Issues 212</p> <p>9.2.3.3 Standardization and Interoperability Issues 212</p> <p>9.3 Improved Citizen-Utilities 213</p> <p>9.3.1 Toward Scalable Citizen-Utilities 213</p> <p>9.3.1.1 Challenges 213</p> <p>9.3.1.2 HARB Framework-Based Citizen-Utility 214</p> <p>9.3.2 Toward Privacy-Preserving Citizen-Utilities 216</p> <p>9.3.2.1 Threat Model 217</p> <p>9.3.2.2 PDCH System 219</p> <p>9.4 Conclusions 220</p> <p>References 221</p> <p><b>10 Blockchain-enabled COVID-19 Contact Tracing Solutions </b><b>225</b><i><br /> Hong Kang, Zaixin Zhang, Junyi Dong, Hao Xu, Paulo Valente Klaine, and Lei Zhang</i></p> <p>10.1 Introduction 225</p> <p>10.2 Preliminaries of BeepTrace 228</p> <p>10.2.1 Motivation 228</p> <p>10.2.1.1 Comprehensive Privacy Protection 229</p> <p>10.2.1.2 Performance is Uncompromising 229</p> <p>10.2.1.3 Broad Community Participation 229</p> <p>10.2.1.4 Inclusiveness and Openness 230</p> <p>10.2.2 Two Implementations are Based on Different Matching Protocols 230</p> <p>10.3 Modes of BeepTrace 231</p> <p>10.3.1 BeepTrace-Active 231</p> <p>10.3.1.1 Active Mode Workflow 231</p> <p>10.3.1.2 Privacy Protection of BeepTrace-Active 232</p> <p>10.3.2 BeepTrace-Passive 233</p> <p>10.3.2.1 Two-Chain Architecture and Workflow 233</p> <p>10.3.2.2 Privacy Protection in BeepTrace-Passive 235</p> <p>10.4 Future Opportunity and Conclusions 237</p> <p>10.4.1 Preliminary Approach 237</p> <p>10.4.2 Future Directions 238</p> <p>10.4.2.1 Network Throughput and Scalability 238</p> <p>10.4.2.2 Technology for Elders and Minors 239</p> <p>10.4.2.3 Battery Drainage and Storage Optimization 240</p> <p>10.4.2.4 Social and Economic Aspects 240</p> <p>10.4.3 Concluding Remarks 240</p> <p>References 241</p> <p><b>11 Blockchain Medical Data Sharing </b><b>245<i><br /> </i></b><i>Qi Xia, Jianbin Gao, and Sandro Amofa</i></p> <p>11.1 Introduction 245</p> <p>11.1.1 General Overview 248</p> <p>11.1.2 Defining Challenges 248</p> <p>11.1.2.1 Data Security 248</p> <p>11.1.2.2 Data Privacy 248</p> <p>11.1.2.3 Source Identity 248</p> <p>11.1.2.4 Data Utility 249</p> <p>11.1.2.5 Data Interoperability 249</p> <p>11.1.2.6 Trust 249</p> <p>11.1.2.7 Data Provenance 249</p> <p>11.1.2.8 Authenticity 250</p> <p>11.1.3 Sharing Paradigms 250</p> <p>11.1.3.1 Institution-to-Institution Data Sharing 251</p> <p>11.1.3.2 Patient-to-Institution Data Sharing 256</p> <p>11.1.3.3 Patient-to-Patient Data Sharing 257</p> <p>11.1.4 Special Use Cases 260</p> <p>11.1.4.1 Precision Medicine 261</p> <p>11.1.4.2 Monetization of Medical Data 263</p> <p>11.1.4.3 Patient Record Regeneration 264</p> <p>11.1.5 Conclusion 266</p> <p>Acknowledgments 266</p> <p>References 266</p> <p><b>12 Decentralized Content Vetting in Social Network with Blockchain </b><b>269<br /> </b><i>Subhasis Thakur and John G. Breslin</i></p> <p>12.1 Introduction 269</p> <p>12.2 Related Literature 270</p> <p>12.3 Content Propagation Models in Social Network 271</p> <p>12.4 Content Vetting with Blockchains 273</p> <p>12.4.1 Overview of the Solution 273</p> <p>12.4.2 Unidirectional Offline Channel 273</p> <p>12.4.3 Content Vetting with Blockchains 275</p> <p>12.5 Optimized Channel Networks 278</p> <p>12.6 Simulations of Content Propagation 280</p> <p>12.7 Evaluation with Simulations of Social Network 286</p> <p>12.8 Conclusion 293</p> <p>Acknowledgment 293</p> <p>References 294</p> <p>Index 297</p>
<P><B>Bin Cao, PhD,</b> is an Associate Professor/Researcher in the State Key Laboratory of Network and Switching Technology at Beijing University of Posts and Telecommunications (BUPT). Before that, he was an Associate Professor at Chongqing University of Posts and Telecommunications. He was an international visitor at the Institute for Infocomm Research (I2R), and a research fellow at the National University of Singapore. His research interests include blockchain systems, internet of things, and mobile edge computing.</P> <P><B>Lei Zhang, PhD,</B> is a Senior Lecturer at the University of Glasgow, UK. He has 19 patents granted/filed in 30+ countries/regions including US/UK/EU/China/Japan/Singapore. He has published 3 books and over 100 peer-reviewed papers. His research was reported by BBC and Bloomberg. Dr Zhang’s research focuses on wireless communications, Blockchain, IoT, data privacy and security. <P><B>Mugen Peng, PhD,</B> is the Dean of the School of Information and Communication Engineering, and the Deputy Director of State Key Laboratory of Networking and Switching Technology, Beijing, China. He is now or has been on the Editorial/Associate Editorial Board of the IEEE Communications Magazine, the IEEE Internet of Things Journal, the IEEE Transactions on Vehicular Technology, the IEEE Transactions on Network Science and Engineering, and IEEE Network. <P><B>Muhammad Ali Imran</B> is Dean at the University of Glasgow, UK, UESTC and Professor of Communication Systems and Head of Communications Sensing and Imaging Group in the James Watt School of Engineering at the University of Glasgow, UK. He is a Visiting Professor at the University of Surrey and an Adjunct Professor at the University of Oklahoma, US. He has been awarded 15 patents, has authored/co-authored 8 books, over 400 journal and conference publications, and has been PI/Co-I on over £25 million research grants and contracts.
<b>Explore foundational concepts in blockchain theory with an emphasis on recent advances in theory and practice</b> <p>In <i>Wireless Blockchain: Principles, Technologies and Applications,</i> accomplished researchers and editors Bin Cao, Lei Zhang, Mugen Peng, and Muhammad Ali Imran deliver a robust and accessible exploration of recent developments in the theory and practice of blockchain technology, systems, and potential application in a variety of industrial sectors, including manufacturing, entertainment, public safety, telecommunications, public transport, healthcare, financial services, automotive, and energy utilities.</p> <p>The book presents the concept of wireless blockchain networks with different network topologies and communication protocols for various commonly used blockchain applications. You’ll discover how these variations and how communication networks affect blockchain consensus performance, including scalability, throughput, latency, and security levels.</p> <p>You’ll learn the state-of-the-art in blockchain technology and find insights on how blockchain runs and co-works with existing systems, including 5G, and how blockchain runs as a service to support all vertical sectors efficiently and effectively. Readers will also benefit from the inclusion of:</p> <ul> <li>A thorough introduction to the Byzantine Generals problem, the fundamental theory of distributed system security and the foundation of blockchain technology</li> <li>An overview of advances in blockchain systems, their history, and likely future trends</li> <li>Practical discussions of Proof-of-Work systems as well as various Proof-of-“X” alternatives, including Proof-of-Stake, Proof-of-Importance, and Proof-of-Authority</li> <li>A concise examination of smart contracts, including trusted transactions, smart contract functions, design processes, and related applications in 5G/B5G</li> <li>A treatment of the theoretical relationship between communication networks and blockchain</li> </ul> <p>Perfect for electrical engineers, industry professionals, and students and researchers in electrical engineering, computer science, and mathematics,<i> Wireless Blockchain: Principles, Technologies and Applications</i> will also earn a place in the libraries of communication and computer system stakeholders, regulators, legislators, and research agencies.</p>

Diese Produkte könnten Sie auch interessieren:

Bandwidth Efficient Coding
Bandwidth Efficient Coding
von: John B. Anderson
PDF ebook
114,99 €
Bandwidth Efficient Coding
Bandwidth Efficient Coding
von: John B. Anderson
EPUB ebook
114,99 €