2020
DOI: 10.1109/access.2020.2998951
|View full text |Cite
|
Sign up to set email alerts
|

An Overview on Blockchain for Smartphones: State-of-the-Art, Consensus, Implementation, Challenges and Future Trends

Abstract: The authors would like to acknowledge Enecuum community support in the testing of the developed system.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
2
1

Relationship

3
6

Authors

Journals

citations
Cited by 48 publications
(29 citation statements)
references
References 90 publications
0
25
0
Order By: Relevance
“…In the role of a typical state with the aim of destroying information integrity, the analysis outcomes of state estimation can be disrupted by the FDA, so result in misleading the control center decision. Nowadays, blockchain [17] has been promoted in the role of an efficient and safe technology for the online financial operations by the communication merely among transaction network peers and without the third party's involvement. Through applying blockchain, the datum is able to be saved in the distributed partly small databases instead of saving the whole datum in a central datum center.…”
Section: Introductionmentioning
confidence: 99%
“…In the role of a typical state with the aim of destroying information integrity, the analysis outcomes of state estimation can be disrupted by the FDA, so result in misleading the control center decision. Nowadays, blockchain [17] has been promoted in the role of an efficient and safe technology for the online financial operations by the communication merely among transaction network peers and without the third party's involvement. Through applying blockchain, the datum is able to be saved in the distributed partly small databases instead of saving the whole datum in a central datum center.…”
Section: Introductionmentioning
confidence: 99%
“…The first motivation to generate a new dataset is that, especially while the technology readiness and perspectives levels are already quite high, the behavior that users expect from their handheld devices might not be pleasant from usability perspective in the case of conventional PoW execution [18]. Generally, users would expect the blockchain to either have limited or no impact on their devices' operation.…”
Section: Discussionmentioning
confidence: 99%
“…The work presented in [181], [182] outlines a sophisticated scenario of the blockchain systems migration towards wearable devices as an unavoidable step of the distributed systems' evolution. The authors have developed a testbed allowing to measure the self-discharge rate of the battery of the device caused by the execution of different consensus algorithms.…”
Section: J Security Primitives-related Aspectsmentioning
confidence: 99%
“…A, N, SW [46], [111] Energy awareness regarding neighboring nodes to select the optimal route [50] Multi parameter cost function for the next hop selection [60] Selective data routing based on the data priority Securityrelated aspects HW, DP, SW [110] Content agnostic privacy and encryption protocol eliminating the need for asymmetric encryption [180], [181] Integration of lightweight cryptography solutions including more appropriate elliptic curve types or algorithm implementations [186] More efficient utilization of manufacturer-provide SoCs accelerated for cryptographic primitives execution [187] Finding trade-offs between the primitive and required level of the provided security Processing limitations HW, DP, SW [54] The use of heterogeneous multicore processor gateway as compared to little cores gateway working as a router [64], [86], [104], [105] Task offloading to leverage high computing resources of nearby devices for improved performance [106] Edge/fog/cloud computing techniques for optimal performance [107] Seamless resource sharing between heterogeneous mobile devices Storage limitations HW [47], [55] Data compression to reduce the size of the dataset for efficient data processing and storage [106] Edge/Fog/Cloud computing techniques for better performance [173] Data summarization and aggregation Lack of hardware acceleration HW, SW [47], [55] Data compression to reduce the size of the data set for more efficient data processing and storage [64], [86], [104], [105] Task offloading to leverage high computing resources of the nearby devices for the improved performance [186] Identifying and use of present hardware acceleration, which may not be accessible by the default Inefficient use of energy consuming modules HW, SW [62] Configurable data acquisition modules [88] Replacing high power consumption modules with low power alternates, e.g., using two accelerometers instead of a gyroscope as...…”
Section: Inefficient Routingmentioning
confidence: 99%