Performance enhancement in blockchain based IoT data sharing using lightweight consensus algorithm Scientific Reports

Our sharded architecture further reduces the risk of double spending by isolating transactions within shards, thus localizing potential attack surfaces. One natural approach to partially address the aforementioned limitation is to divide the system into various dimensions, such as computation and state storage10. Blockchain sharding is a prominent methodology employed to enhance blockchain scalability and increase throughput by parallelizing the blockchain verification process, a technique known as sharding10. In order https://www.xcritical.com/ to bolster data security and scalability in the context of IoT, several emerging blockchain solutions enable scalability through sharding which can involve sharding of storage, computations, or both14,24.

How to Choose the Right Scaling Solution?

If you find a hash that satisfies the conditions set out by the protocol, you get the right to broadcast the new block to the network. At this point, the other participants of the network update their blockchains to include the new block. Lastly, critics also argue that proof-of-work consensus algorithms proof of work cryptocurrency have become more centralized over the years. The increasing cost to entry and computing difficulty has consolidated network consensus decisions around a handful of major mining pools.

What is the Proof-of-Work (PoW) Mechanism in Blockchain?

  • Miners win the reward when they guess a hash that falls below the threshold provided by the network.
  • Given the rollout of Kamino Lend V2, the protocol may scale aggressively over the coming months, penetrating previously untapped markets in Solana DeFi.
  • One example of PoS in action is Ethereum 2.0, which used a hybrid model combining both PoW and PoS mechanisms for validating transactions on its blockchain in the past.
  • Figure 5 demonstrates that the average transaction acceptance latency increases when the PoA consensus algorithm is used, while the DPoS consensus algorithm exhibits lower latency.
  • It took a further eight years to develop proof-of-stake to the point where it could be implemented.
  • Consensus plays an important role in the architecture of blockchain technology.

In the DPoS mechanism, a smaller group of trusted delegates is elected to validate transactions and generate new blocks, rather than involving every user directly in the consensus process. DPoS seeks to expedite the consensus process without a lot of processing capacity, users can still participate in the consensus process by giving trusted representatives their vote. Furthermore, an IoT node functioning as a validator in the DPoS consensus method loses power if it inadvertently accepts data packets carrying erroneous information. This feature of DPoS creates a strong security solution for a P2P system while reducing the need for a large amount of processing power. The selfish mining strategy can backfire if honest miners detect an abnormal forking rate, prompting them to abandon the blockchain and thereby reducing the revenue of selfish miners. Given that honest miners estimate network conditions, it is prudent for selfish miners to control the fork rate to maintain an acceptable level.

Proof of work vs. proof of stake

However, as Bitcoin’s acceptance grows, it faces increasing threats from attacks targeting these mechanisms, such as selfish mining, double-spending, and block withholding. Recent research shows that these attacks can be combined with each other or with either malicious strategies, such as network-layer attacks, or non-malicious strategies, like honest mining. These combinations lead to more sophisticated attacks, increasing the attacker’s success rates and profitability. Therefore, understanding and evaluating these attacks is essential for developing effective countermeasures and ensuring the long-term security. This paper begins by examining the individual attacks executed in isolation and their profitability.

Proof-of-work is the blockchain-based algorithm that secures many cryptocurrencies, including Bitcoin and Ethereum.

To safely develop and test the proof-of-stake consensus logic, the Beacon Chain was launched two years before proof-of-stake was implemented on Ethereum Mainnet. Once this had been stable and bug-free for a sufficient time, the Beacon Chain was “merged” with Ethereum Mainnet. This all contributed to taming the complexity of proof-of-stake to the point that the risk of unintended consequences or client bugs was very low. Although it could be perceived as wasteful, mining is the only consensus algorithm that’s been battle-tested for over a decade. Since its launch, Bitcoin’s PoW has secured trillions of dollars worth of transactions.

proof of work in blockchain

However, every win on a public mining pool is split among the members in proportion to their hashrate. They can leave the pool or syndicate and do so very easily, a feature that comes in handy if the pool attempts to become dishonest. In the above example, the lottery tickets represent the hash rate deployed, while the prize is the BTC reward paid for successfully creating a Bitcoin block. Hash rate is the number of hashes per second mining equipment can carry out to find the above-noted cryptographic hash function. The more efficient a mining device is, the higher chances a miner has of winning the block rewards.

Previous iterations before Bitcoin failed because they required centralized entities to prevent the double spending of digital tokens. For example, on May 17, 2024, FoundryDigital had the most hashing power on the Bitcoin network, 175 exa hashes per second (EH/s) out of a network total of 673 EH/s. Foundry Digital is owned by Digital Currency Group, a venture firm that has funded or invested in hundreds of cryptocurrency projects.

The consensus and incentive mechanisms are two of the core components of blockchain networks [16, 17, 18]. As the blockchain is decentralized, a consensus mechanism is essential for achieving common agreement among all nodes on the state of the ledger, thereby preventing inconsistencies and fraudulent updates [19, 20]. These include Proof-of-Work (PoW) [16], Proof-of-Stake (PoS) [21], Proof-of-Activity (PoA) [22], and Proof-of-Burn (PoB) [23], among others. Bitcoin employs PoW consensus mechanism which involves, participants, known as miners, compete to solve a complex cryptographic puzzle known as the PoW puzzle [17, 24]. When a miner successfully solves this puzzle, they share the solution with the network.

proof of work in blockchain

There’s no need to buy expensive computing systems and consume massive amounts of electricity to stake crypto. One of the issues that had prevented the development of an effective digital currency in the past was called the double-spend problem. Cryptocurrency is just data, so there needs to be a mechanism to prevent users from spending the same units in different places before the system can record the transactions. Proof of Work consensus is the mechanism of choice for the majority of cryptocurrencies currently in circulation.

When the block is authenticated by a miner, the digital currency is then added to the blockchain. Without such an energy-intensive process, it would be easy for bad actors to attack the network and “double spend” Bitcoin. That’s called a 51% attack, in which a mining group commands a majority of the network’s total hash rate (computing power), thus allowing it to manipulate blocks and take advantage of the system. On a proof-of-stake network, a bad actor would need to own more than 51% of the coins staked at that time. Controlling 51% of all staked coins on the network is so difficult that it makes such an attack extremely unlikely. Plus, the punishment of losing your stake via slashing incentivizes validating transactions honestly.

For instance, An S19j Pro machine can perform 104 terahashes per second (TH/s), the equivalent of 104 trillion guesses or tickets per second. The main difference between proof-of-work and proof-of-stake is the difficulty requirement. In proof-of-stake, validating nodes compete for blocks by locking or delegating more of the network’s token to the network. Proof-of-work is a necessary part of adding new blocks to the Bitcoin blockchain. Blocks are summoned to life by miners, the players in the ecosystem who execute proof-of-work. A new block is accepted by the network each time a miner comes up with a new winning proof-of-work, which happens roughly every 10 minutes.

proof of work in blockchain

To complicate things further, transactions rejected on the temporary fork may not have been included in the accepted chain. So finality refers to the time you should wait before considering a transaction irreversible. Under the previous proof-of-work Ethereum, the more blocks were mined on top of a specific block N, the higher confidence that the transactions in N were successful and would not be reverted. Now, with proof-of-stake, finalization is an explicit, rather than probabilistic, property of a block.

Authentication approach to address the constraints of current centralized authentication techniques by presenting a fully decentralized authentication scheme utilizing edge nodes and blockchain. This approach offers a solution for managing IoT devices on a large scale leveraging the deployment of IoT nodes and edge nodes while ensuring the necessary security measures for an IoT ecosystem. Figure 4 illustrates the step-by-step process of the authentication mechanism highlighting the interactions between various components of the system. IoT devices transmit data to centrally located servers in a traditional cloud architecture which introduces latency and occasionally fails to meet the quality-of-service needs of these applications4. By shifting processing storage and analytics closer to the point of origin of the data edge computing helps to address this problem4.

A major criticism of proof-of-work is the amount of energy output required to keep the network safe. To maintain security and decentralization, Ethereum on proof-of-work consumed large amounts of energy. Shortly before switching to proof-of-stake, Ethereum miners were collectively consuming about 70 TWh/yr (about the same as the Czech Republic – according to digiconomist(opens in a new tab) on 18-July-2022). One potential problem with proof of stake is that parties with large crypto holdings could have too much power, which is an issue that proof of work doesn’t have. Also, much to the chagrin of gamers, mining for cryptocurrencies such as Ethereum has sparked immense demand for powerful PC graphics cards (or GPUs), causing widespread shortages and price increases. That’s led manufacturers to weaken the mining capabilities of their graphics cards to make them less desirable to miners.

PAGE TOP