2020
DOI: 10.36227/techrxiv.12152142
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

A Survey on Consensus Methods in Blockchain for Resource-constrained IoT Networks

Abstract: The success of blockchain as the underlying technology for cryptocurrencies has opened up possibilities for its use in other application domains as well. The main advantages of blockchain for its potential use in other domains are its inherent security mechanisms and immunity to different attacks. A blockchain relies on a consensus method for agreeing on any new data. Most of the consensus methods which are currently used for the blockchain of different cryptocurrencies require high computational power and thu… Show more

Help me understand this report
View published versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2
1
1

Relationship

2
5

Authors

Journals

citations
Cited by 10 publications
(14 citation statements)
references
References 41 publications
(74 reference statements)
0
14
0
Order By: Relevance
“…. (26) Since the parameters in gamma functions (n α + 1, n β + 1, and so on) are all non-zero positive values, we can use the property that Γ(z) = (z − 1)! to rewrite Equation (26) as: P(D(N )) = N !…”
Section: Discussionmentioning
confidence: 99%
“…. (26) Since the parameters in gamma functions (n α + 1, n β + 1, and so on) are all non-zero positive values, we can use the property that Γ(z) = (z − 1)! to rewrite Equation (26) as: P(D(N )) = N !…”
Section: Discussionmentioning
confidence: 99%
“…We show the probability density function (pdf) of all the mentioned delays for our implemented IoT network with 100 [6] and adding that block to the copy of ledger would take about 5 microseconds according to Fig. 4(b).…”
Section: B Network Latencymentioning
confidence: 99%
“…Therefore, manipulation attacks on transmitted or stored data are not plausible through a single compromised node and majority of nodes ought to be compromised for a successful attack [5]. Different consensus protocols and their applicability towards IoT networks can be found in [1], [6].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations