A Precarious Study of network propagation delay in Blockchain Technology

Authors

  • Summiya A Pathan
  • Dr. Yogesh Kumar Sharma

Keywords:

IoT, Brine water, Energy consumption, Water treatment, pH vale

Abstract

This paper analyses the Bitcoinblockchain selfish-mine strategy. A colluding group of miners could use this tactic to earn more than their fair share of mining profits and thereby forcefully join other honest men in decreasing the variance of their revenues and making their revenues more stable for months. It is a very dangerous dynamic that could enable the disbelieving mining body, accumulating news adherents' forces and manipulating the entire network, to enter the majority. Given that information spread between two miners in the network is not negligible and is accompanied by a normally distributed midway distribution proportional to the physical gap between the two miners, and by a permanent variance, regardless of other people's delays, we show that the success or failure of the attack on the selfish mines can not be assured due to uncertainty.

Downloads

Download data is not yet available.

References

V. Martinez, M. Zhao, C. Blujdea, X. Han, A. Neely, and P. Albores, “Blockchain- driven customer order management,” Int. J. Oper. Prod. Manag., vol. 39, no. 6, pp. 993– 1022, 2019, doi: 10.1108/IJOPM-01-2019-0100.

. R. van Hoek, “Exploring blockchain implementation in the supply chain: Learning from pioneers and RFID research,” Int. J. Oper. Prod. Manag., vol. 39, no. 6, pp. 829–859, 2019, doi: 10.1108/IJOPM-01-2019-0022.

. S. Höhne and V. Tiberius, “Powered by blockchain: forecasting blockchain use in the electricity market,” Int. J. Energy Sect. Manag., vol. 14, no. 6, pp. 1221–1238, 2020, doi: 10.1108/IJESM-10-2019-0002.

. M. Kizildag et al., “Blockchain: a paradigm shift in business practices,” Int. J. Contemp. Hosp. Manag., vol. 32, no. 3, pp. 953–975, 2019, doi: 10.1108/IJCHM-12-

-0958.

. A. C. Issac and R. Baral, “A trustworthy network or a technologically disguised scam: A biblio-morphological analysis of bitcoin and blockchain literature,” Glob. Knowledge, Mem. Commun., vol. 69, no. 6–7, pp. 443–460, 2020, doi: 10.1108/GKMC-06-2019-0072.

. W. L. Harris and J. Wonglimpiyarat, “Blockchain platform and future bank competition,” Foresight, vol. 21, no. 6, pp. 625–639, 2019, doi: 10.1108/FS-12-2018-

. S. Burmaoglu, O. Saritas, and H. Sesen, “IdeaChain: a conceptual proposal for blockchain-based STI policy development,” Foresight, vol. 22, no. 2, pp. 189–204, 2020, doi: 10.1108/FS-07-2019-0067.

. J. Veuger, “Trust in a viable real estate economy with disruption and blockchain,” Facilities, vol. 36, no. 1–2, pp. 103–120, 2018, doi: 10.1108/F-11-2017-0106.

. J. W. Lian, C. T. Chen, L. F. Shen, and H. M. Chen, “Understanding user acceptance of blockchain-based smart locker,” Electron. Libr., vol. 38, no. 2, pp. 353–366, 2020, doi: 10.1108/EL-06-2019-0150.

. J. H. Jo, S. Rathore, V. Loia, and J. H. Park, “A blockchain-based trusted security zone architecture,” Electron. Libr., vol. 37, no. 5, pp. 796–810, 2019, doi: 10.1108/EL-02-

-0053.

. X. (Alice) Qian and E. Papadonikolaki, “Shifting trust in construction supply chains through blockchain technology,” Eng. Constr. Archit. Manag., 2020, doi: 10.1108/ECAM-12-2019-0676.

. H. Singh, G. Jain, A. Munjal, and S. Rakesh, “Blockchain technology in corporate governance: disrupting chain reaction or not?,” Corp. Gov., vol. 20, no. 1, pp. 67–86, 2019, doi: 10.1108/CG-07-2018-0261.

. S. B. Rane and Y. A. M. Narvel, “Re-designing the business organization using disruptive innovations based on blockchain-IoT integrated architecture for improving agility in future Industry 4.0,” Benchmarking, 2019, doi: 10.1108/BIJ-12-2018-0445.

. A. Shojaei, J. Wang, and A. Fenner, “Exploring the feasibility of blockchain technology as an infrastructure for improving built asset sustainability,” Built Environ. Proj. Asset Manag., vol. 10, no. 2, pp. 184–199, 2019, doi: 10.1108/BEPAM-11-2018-0142.

. G. Chen, B. Xu, M. Lu, and N.-S. Chen, “Exploring blockchain technology and its potential applications for education,” Smart Learn. Environ., vol. 5, no. 1, pp. 1–10, 2018, doi: 10.1186/s40561-017-0050-x.

. H. Yi, “Securing e-voting based on blockchain in P2P network,” Eurasip J. Wirel.

Commun. Netw., vol. 2019, no. 1, pp. 1–9, 2019, doi: 10.1186/s13638-019-1473-6.

. M. Sultana, A. Hossain, F. Laila, K. A. Taher, and M. N. Islam, “Towards developing a secure medical image sharing system based on zero trust principles and blockchain technology,” BMC Med. Inform. Decis. Mak., vol. 20, no. 1, pp. 1–10, 2020, doi: 10.1186/s12911-020-01275-y.

. Chahar, P., Dalal, S.: Deadlock resolution techniques: an overview. Int. J. Sci. Res.

Publ. 3(7), 1–5 (2013).

. X. Burri, E. Casey, T. Bollé, and D. O. Jaquet-Chiffelle, “Chronological independently verifiable electronic chain of custody ledger using blockchain technology,” Forensic Sci. Int. Digit. Investig., vol. 33, 2020, doi: 10.1016/j.fsidi.2020.300976.

. Dr. Yogesh Kumar Sharma and P. C. Harish (2018), “Critical Study of Software Models Used Cloud Application Development”, International Journal of Engineering & Technology, E-ISSN: 2227-524X, Vol. 7, Issue 3.29, Pp. 514-518.

. B. K. Mohanta, D. Jena, U. Satapathy, and S. Patnaik, “Survey on IoT security: Challenges and solution using machine learning, artificial intelligence and blockchain technology,” Internet of Things, vol. 11, p. 100227, 2020, doi: 10.1016/j.iot.2020.100227.

. AD Vyas, DYK Sharma, “Significance Study of User Web Access Records Mining For Business Intelligence” Indian Journal of Applied Research (IJAR) 9 (7), 10-13.

. A. Sydow, S. A. Sunny, and C. D. Coffman, “Leveraging blockchain’s potential – The paradox of centrally legitimate, decentralized solutions to institutional challenges in Kenya,” J. Bus. Ventur. Insights, vol. 14, no. March, p. e00170, 2020, doi: 10.1016/j.jbvi.2020.e00170.

. P. Velmurugadass, S. Dhanasekaran, S. ShasiAnand, and V. Vasudevan, “Enhancing Blockchain security in cloud computing with IoT environment using ECIES and cryptography hash algorithm,” Mater. Today Proc., no. xxxx, 2020, doi: 10.1016/j.matpr.2020.08.519.

. MadhavPanthee, Dr. Yogesh Kumar Sharma, “Review of E-Government Implementation,” International Journal of Recent Research Aspects, vol. 6, Issue 1, 2019, pp. 26-30.

. G. Kumar et al., “Decentralized accessibility of e-commerce products through blockchain technology,” Sustain. Cities Soc., vol. 62, no. March, p. 102361, 2020, doi: 10.1016/j.scs.2020.102361.

. F. Alam Khan, M. Asif, A. Ahmad, M. Alharbi, and H. Aljuaid, “Blockchain technology, improvement suggestions, security challenges on smart grid and its application in healthcare for sustainable development,” Sustain. Cities Soc., vol. 55, no. December 2019, p. 102018, 2020, doi: 10.1016/j.scs.2020.102018.

. Yogesh Kumar Sharma, " Designing enhanced Security Architecture for 5G Networks", International Journal of Management, IT & Engineering, vol. 8, no. 1, pp. 73-83, 2018.

. B. Guidi, “When Blockchain meets Online Social Networks,” Pervasive Mob. Comput., vol. 62, p. 101131, 2020, doi: 10.1016/j.pmcj.2020.101131.

. S. Saini, Y. Sharma, “Li-Fi the Most Recent Innovation in Wireless Communication”, International Journal of Advanced Research in Computer Science and Software Engineering 6(2), February - 2016, pp. 347-351.

. M. T. de Oliveira, L. H. A. Reis, D. S. V. Medeiros, R. C. Carrano, S. D. Olabarriaga, and D. M. F. Mattos, “Blockchain reputation-based consensus: A scalable and resilient

mechanism for distributed mistrusting applications,” Comput. Networks, vol. 179, no. May, p. 107367, 2020, doi: 10.1016/j.comnet.2020.107367.

. J. Wang, G. Sun, Y. Gu, and K. Liu, “ConGradetect: Blockchain-based detection of code and identity privacy vulnerabilities in crowdsourcing,” J. Syst. Archit., no. October, 2020, doi: 10.1016/j.sysarc.2020.101910.

. V. K. Samyal and Y. K. Sharma, “Performance evaluation of Delay Tolerant Network routing protocol under varying time to Live”, International Journal of Advanced Research in Computer Science, 2017, pp. 299-302.

. T. M. Choi, S. Guo, and S. Luo, “When blockchain meets social-media: Will the result benefit social media analytics for supply chain operations management?,” Transp. Res. Part E Logist. Transp. Rev., vol. 135, no. December 2019, p. 101860, 2020, doi: 10.1016/j.tre.2020.101860.

. W. Serrano, “The Blockchain Random Neural Network for cybersecureIoT and 5G infrastructure in Smart Cities,” J. Netw. Comput. Appl., vol. 175, p. 102909, 2021, doi: 10.1016/j.jnca.2020.102909.

Downloads

Published

2021-02-28

How to Cite

Pathan, S. A. ., & Sharma, D. Y. K. . (2021). A Precarious Study of network propagation delay in Blockchain Technology. The Journal of Contemporary Issues in Business and Government, 27(1), 332–341. Retrieved from https://cibgp.com/au/index.php/1323-6903/article/view/564