This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Blockchain Systems, Technologies and Applications: A Methodology Perspective

Bin Cao, , Zixin Wang, Long Zhang, Daquan Feng, Mugen Peng, , and Lei Zhang Bin Cao, Zixin Wang, and Mugen Peng are with State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876, China. E-mail: caobin@bupt.edu.cn, wzxph@foxmail.com, pmg@bupt.edu.cn.Long Zhang is with the National Key Laboratory of Science and Technology on Communications, University of Electronic Science and Technology of China, Chengdu 611731, China. E-mail: zhanglong3211@yeah.netDaquan Feng is with the Guangdong Province Engineering Laboratory for Digital Creative Technology and Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen University, Shenzhen 518060, China. E-mail: fdquan@szu.edu.cnLei Zhang is with the James Watt School of Engineering, University of Glasgow, Glasgow G12 8QQ, U.K. E-mail: lei.zhang@glasgow.ac.uk
Abstract

In the past decade, blockchain has shown a promising vision greatly to build the trust without any powerful third party in a secure, decentralized and salable manner. However, due to the wide application and future development from cryptocurrency to Internet of Things, blockchain is an extremely complex system enabling integration with mathematics, finance, computer science, communication and network engineering, etc. As a result, it is a challenge for engineer, expert and researcher to fully understand the blockchain process in a systematic view from top to down. First, this article introduces how blockchain works, the research activity and challenge, and illustrates the roadmap involving the classic methodology with typical blockchain use cases and topics. Second, in blockchain system, how to adopt stochastic process, game theory, optimization, machine learning and cryptography to study blockchain running process and design blockchain protocol/algorithm are discussed in details. Moreover, the advantage and limitation using these methods are also summarized as the guide of future work to further considered. Finally, some remaining problems from technical, commercial and political views are discussed as the open issues. The main findings of this article will provide an overview in a methodology perspective to study theoretical model for blockchain fundamentals understanding, design network service for blockchain-based mechanisms and algorithms, as well as apply blockchain for Internet of Things, etc.

Index Terms:
Blockchain, stochastic process, game theory, optimization, machine learning, cryptography, network

I Introduction

Originally proposed as the backbone technology of Bitcoin [1], Ethereum [2], and many other digital currencies [3], blockchain has become a revolutionary decentralized data management framework that establishes consensuses and agreements in a trust-less and distributed environment [4]. In addition to the soaring in the finance sector, blockchain has been attracted much attention from many other major industrial sectors ranging from supply chain [5], transportation [6], entertainment [7], retail [8], healthcare [9], information management [10] to financial services [11], etc. As such, Gartner forecasts that by 2030, blockchain will generate an annual business value of more than US $3 trillion, and envisions that 10% to 20% of global economic infrastructure will be running on blockchain-based systems [12].

Fundamentally, blockchain is a decentralized ledge management system for recording and validating transaction. It allows two parties to complete a transaction in a peer-to-peer (P2P) network [13]. Without involvement of an authority or third party, all peer nodes work together to maintain public ledge with aim of realizing trust, security, transparency and immutability. The recorded transaction in blockcahin can be any form of data which involves the ownership transfer or sharing of resource, where it can be tangible such as money, houses, cars, land, or intangible copyright, digital documents, and intellectual property, etc.

Essentially, blockchain is built on a physical network that relies on the communications, computing and caching, which serves the basis of blockchain functions such as incentive mechanism or consensus. As such, blockchain systems can be depicted as a two-tier architecture: an infrastructure layer and a blockchain layer. The infrastructure layer is the underlying entity and responsible for maintaining P2P network, building connection through wired/wireless communication, computing and storing data. The top is the blockchain layer that can realize trust and security functions based on underlying information exchanging. More specifically, blockchain features several key components which are summarized as: transaction, block and chain of blocks. Transaction contains the information requested by the client and need be recorded by public ledge; block securely records an amount of transactions or other useful information; using consensus mechanism, blocks are linked orderly to constitute a chain of blocks, which indicates logical relation among the blocks to construct blockchain. As a core function of the blockchain, the consensus mechanism works in the blockchain layer ensures a clear sequence of transactions and ensures the integrity and consistency of the blockchain across geographically distributed nodes [14]. State of a blockchain is updated when a valid transaction is recorded on chain, and smart contracts111The smart contract is a computer program designed to digitally facilitate direct negotiations or contract terms between users when certain conditions are met [15]. can be used to automatically trigger transactions under certain conditions [16]. Therefore, due to its autonomy and efficiency, smart contracts are being used for a wide range of purposes, from self-managed identities on public blockchains to allowing automated business collaboration on blockchains.

Driven by the continuous development of 5G technology, more and more services have been launched to improve network performance and user experience. Importantly, features such as data immutability and transparency are the key factors to ensure the successful launch of new services such as IoT data collection, driverless cars, drones, and federal learning. Blockchain is regarded as the most promising to meet these new requirements with its decentralization, openness, tamper resistance, anonymity and traceability. Therefore, in order to more thoroughly explore the potential of blockchain and make it better serve the requirements of modern networks, it is necessary to comprehensively and systematically understand blockchain from top to bottom. Methodology advocates going to the bottom of the problem, digging into the essence behind the phenomenon, and forming a theoretical system with a certain depth. The inherent contradictions of the problem can be revealed and the fundamental solution can be found from methodology perspective. Therefore, methodology can be well suited to the research of blockchain system performance to reveal the principles and problems of blockchain running process and blockchain protocol/algorithm design in the blockchain system, and provide theoretical support for solving specific problems. Consequently, this paper outlines the theoretical model research of blockchain basic knowledge, the design of network services based on blockchain mechanisms and algorithms, and the deployment of blockchain-based applications in practical systems from a methodological perspective, as well as further outlines the application of methodology in blockchain from multiple dimensions such as advantages, limitations, case studies and challenges. It aims to provide a comprehensive and clear overview for researchers in the blockchain field.

I-A How Does Blockchain Work

Refer to caption
Figure 1: An overview of blockchain workflow

The infrastructure layer and blockchain layer are interrelated and interact on each other cooperatively, while the detailed procedures can vary among different blockchain systems. However, for all blockchain systems, they have to follow the following basic steps, as shown in Fig. 1. Firstly, blockchain clients generate transactions and broadcast them to the P2P network in Step I. More than one nodes may bundle different subset of unverified transactions into their candidate blocks in Step II. Afterwards, all nodes perform incentive and consensus mechanisms to find the winner whose candidate block would be announced as a new block in Step III. Then, the new block will be inserted into all node’s local ledgers in Step IV. This mechanism connects multiple blocks together and builds a chronological chain. In particular, the process of hashing a new block always contains metadata about the hash value of the previous block, which makes the linked data highly non-modifiable. At last, after the transaction is stored in the blockchain, the client can request the consensus network to confirm whether a transaction is in the blockchain.

Through this workflow, the transaction is finally agreed by the majority of nodes and recorded in blockchain, where malicious nodes cannot subvert the consensus results. This decentralized architecture ensures robust and safe operations on the blockchain, with the advantages of tamper resistance and no single point of failure. It can be seen from the Fig. 1 that each blockchain node in the blockchain system undertakes all or part of functions, such as communication between nodes, maintenance of P2P network, and computation of consensus mechanism. Thus, the underlying communication, network and computation is crucial to establish effective and secure blockchain system. This encourages us to study how communication, networking and computing affect blockchain systems. Fortunately, some classic methodologies can provide good ideas, such as stochastic process for block generation and nodes communication, machine learning for P2P network performance improving, and optimization theory for resource allocation. Therefore, it is feasible and valuable to explore the interaction process of communication, network and computing and their impact on the blockchain system from the perspective of methodology, and even can provides help for revealing the essential problems in the operation process of the blockchain system.

I-B Existing Surveys

Recognising the wide applications of blockchain technology, a novel survey paper can help researchers in various fields to build good foundations on the subject to guide actual developments. Recently, several work have reviewed the advanced development of blockchain from various views.

For security and privacy, T. Salman et al. in [13] present blockchain-based security services in authentication, confidentiality, privacy and access control, etc. N. Waheed et al. in [17] summarize the research efforts of using machine learning algorithm and blockchain technology to address security and privacy problems in the field of Internet of Things in the past few years. M. Conti et al. in [18] focus on the security and privacy threats of Bitcoin, and discusses the feasibility and limitations of potential solutions. M. Saad et al. in [19] focus on how attacks effect public blockchain and discusses the relationships between a sequence of possible attacks.

Besides, as the core of blockchain, consensus determines the performance and security of the blockchain in many ways, M. S. Ferdous et al. in [20] utilize comprehensive taxonomy of properties to analyze a wide range of consensus algorithms, and examines in detail the meaning of the different problems that are still prevalent in the consensus algorithm. W. Wang et al. in [21] review the state of the art consensus protocols and game theory in mining strategy management.

In the context of artificial intelligence (AI), Y. Liu et al. in [22] discuss feasible solutions integrating blockchain and machine learning for communications and networking system. Y. Xiao et al. in [23] introduce the classic theory of fault tolerance and analyzes blockchain consensus protocols using a five-component framework.

For the scalability of the blockchain, J. Xie et al. in [24] study the scalability of the blockchain system, analyzes the scalability from the perspective of throughput, storage and network, and introduces the existing enabling technology of the scalable blockchain system. H. T. M. Gamage et al. in [25] discuss issues of the existing blockchains such as 51% attack, nothing-at-stake problem together with improvements for the scalability issues in current blockchains. R. Belchior et al. in [26] study cryptocurrency-directed interoperability approaches, blockchain Engines and blockchain connectors, providing a holistic overview of blockchain interoperability.

The integration of blockchain and 5G has become a mainstream trend, D. C. Nguyen et al. in [27] provide the latest survey on the integration of blockchain with 5G networks and other networks. It gives an extensive discussion about the potential of blockchain for enabling key technologies of 5G, and further explores and analyzes the opportunities that blockchain may give important 5G services. G. Yu et al. in [28] study the sharding problem in the blockchain, mainly including providing detailed comparison and quantitative evaluation of the main sharding mechanisms, as well as analysis of the characteristics and limitations of existing solutions. Moreover, by enabling the integration of blockchain and other advanced technologies, some of work explore potential applications and research challenges in IoT [29, 30], smart city [31], cloud computing [32], edge computing [33], and fog computing[34].

From the perspective of mathematical tools, Z. Liu et al. in [35] provide reviews and analyses using game theory in detail to deal with a variety of problems regarding security, mining management and blockchain applications. However, some classic mathematical methods used in blockchain are not limited to game theory, but also include machine learning, cryptography, and so on. Moreover, a survey which provides a comprehensive overview on theoretical model, network service and management, and application for blockchain system on a methodology perspective is even more needed.

I-C Motivation

The existing surveys mainly focus on blockchain architecture, blockchain protocol algorithm, the integration of blockchain with other network technologies, etc. Besides, to the best of our knowledge, there is very few survey provides comprehensive reviews to elaborate the impact of communication networks and computing from methodology perspective. However, as a system science, blockchain requires researchers with multidisciplinary knowledge background in communication, network, computing and cryptography disciplines to understand the operating environment and principles of blockchain from different dimensions, so as to make rational use of blockchain technology to improve innovative service applications in 5G/B5G, IoT and other fields.

This motivates us to review the state of the art of blockchain, to reveal the reason why a blockchain system needs communication, network and computing and how them interact to each other. Furthermore, to facilitate the deployment of blockchain-based applications, how to carry out mathematical methods to define a specific blockchain problem is a concern that many researchers deserve to pay attention to, but there is no survey specifically discussing the use of blockchain from the perspective of methodology such as stochastic process, cryptography and so on. Motivated by this limitation, different from the previous surveys that focus on blockchain application such as IoT, smart city and edge computing or blockchain technology such as security and privacy, consensus algorithm and resource management, we overview the theoretical model for blockchain fundamentals understanding, and the design of network services for blockchain-based mechanisms and algorithms from a methodology perspective involving of stochastic process, game theory, optimization, machine learning, and cryptography, as well as summarizing the advantages and limitations of these methods. Moreover, this paper reviews some case studies and challenges applying blockchain in IoT, providing feasible guidance and potential research problems.

The organization of this article is as follows. Section II discusses the research activity, challenges and roadmap of blockchain system. Section III-VII analysis the application of stochastic processes, game theory, optimization theory, machine learning, and cryptography for mining pool management, security strategy, resource management and so on in blockchain, respectively. Section VIII discusses main issues of blockchain and its improvements. Finally, Section IX concludes this paper.

II Research Activity, Challenge and Roadmap

Recently, lots of work have been done on the application of blockchain and the improvement of network system performance, involving of the blockchain-based functions design and network optimization. The blockchain-based functions such as consensus protocol, incentive mechanism and smart contract have significant impacts on the reliability, efficiency and scalability of the blockchain system [36]. However, the design of blockchain-based functions also faces challenges due to storage constraints, computing overhead and delay constraints. Moreover, blockchain is seen as a potential technology to improve network system performance, furthermore, blockchain and the network system especially for wireless network system interact and support each other [14]. Specifically, on the one hand, with the advent of the 5G era, we are about to enter a highly dynamic wireless connected digital society mainly composed of massive wireless devices. Sequentially, the explosive information will likely be exchanged through wireless networks. However, the scarcity of wireless spectrum resources poses challenges for public in the safety and efficiency of resource/data management and sharing. On the other hand, blockchain relies on frequent communication among consensus nodes to reach consensus. While the highly dynamic wireless network environment will bring performance and security degradation to the communication within blockchain consensus nodes.

Therefore, the above-mentioned challenges greatly hinder the safe and efficient application of blockchain in practical systems and weaken the contribution of blockchain to better improve the practical systems performances. To cope with those challenges, it is first necessary to understand the fundamentals of blockchain, the operating process of practical communication systems, as well as the impact of the resources (e.g., communication, network computing resources, etc.) and other uncertain factors on the performance of blockchain. Thus, an accurate and efficient theoretical model need to be established to analyze blockchain system performances and its influencing factors in essence. Then the design of network services for blockchain-based mechanisms and algorithms can be implemented, but which often require the help of classical methodologies. Finally, in order to facilitate the deployment of blockchain-based applications in IoT, Internet of Vehicles (IoV) and other scenarios, it is also necessary to explore how to use mathematical methods to define a specific blockchain problem, and examine various constraints and application requirements in the practical systems from the perspective of methodology. Therefore, methodology is the basis for studying the fundamentals, performances and applications of blockchain, and has been recognized. However, most of the existing review research directions focus on the combination of blockchain and other advanced technologies, the integration of blockchain and novel networks, and the security and privacy issues of blockchain technology, etc., with the advantage of providing theoretical support for blockchain applications. But, it may also have certain limitations, which are affected by complex and uncertain factors in the practical system, and thus fail to further support the optimization of blockchain function design and network performance improvement. Therefore, it is necessary to systematically and comprehensively study the blockchain systems, technologies and applications from the perspective of methodology, and objectively evaluate their advantages and limitations.

In this Section, we first discuss the research activity classified into theoretical modeling for blockchain performance analysis, blockchain-based function design for network services, and blockchain-based solution for vertical applications. Next, we discuss the remaining challenge of blockchain system, and present the technical roadmap which illustrates the relationship in methodology, uses case and topic.

Refer to caption
Figure 2: Multi-dimensional graph for performance comparison of typical consensus mechanisms in blockchain

II-A Research Activity

TABLE I: Major blockchain platforms
Platforms Bitcoin [37] Nxt [38] ETH [39] Hashgraph [40] IOTA [41]
Hyperledger
Fabric [42]
EOS [43]
Application
layer
Bitcoin
transaction
DAPP/Nxt
transaction
DAPP/ETH
transaction
Public
network
IOTA
transaction
Enterprise
block
application
Operating
system
Programming
language
JavaScript Java
Solidity/
Serpent
-
JavaScript/
Java/C#/Go
Go/Java C++
Data model
Transaction
model
Account model Account model - Account model Account model
Account
model
Block
storage
LevelDB - LevelDB - - FileSystem -
Communication
protocol
P2P P2P P2P - HTTP P2P P2P
Category
Public
blockchain
Private
blockchain
Public
blockchain
Consortium
blockchain/
Private
blockchain
Public
blockchain
Consortium
blockchain
Consortium
blockchain
Consensus
algorithm
PoW PoS PoW BFT Tangle BFT DPoS
Architecture
Continuous
single chain
architecture
Continuous
single chain
architecture
Continuous
single chain
architecture
Based on
DAG
architecture
Based on
DAG
architecture
Continuous
chain
architecture
Continuous
chain
architecture
Solution
Computational
power
competition
Coin age
Computational
power
competition
Virtual
voting,
gossip
protocols
Self-weight
and
cumulative
weight
Gossip
protocols,
endorsement
and ordering
Virtual
voting
Characteristic
Low
transaction
fee, high
security, low
network
resource
consumption
Proof-of-
Stake
consensus,
universal
blockchain
framework,
decentralized
asset
exchange,
proven
stability
Low
transaction
fee, high
security, low
network
resource
consumption
Low
consensus
cost, high
security,
high
transaction
throughput,
low
confirmation
latency
High
scalability,
low resource
requirements,
zero-fee
transactions,
secure data
transfer,
offline
transactions,
quantum immune
High
scalability,
permission
control and
modular
architecture
Flexible,
scalable,
user-
friendly
Open source
address
https://bit
coincore.org/
en/download/
https://bitbuc
ket.org/Jeluri
da/nxt/src/
master/
https://geth.
ethereum.org/
downloads/
-
https://github.
com/iotaledger/
iota.js
https://github.
com/hyperledger
/fabric
https://
github.com
/EOSI
O/eos

II-A1 Theoretical modeling for blockchain performance analysis

The establishment of accurate and effective theoretical model is very important to study the system performance such as the necessary conditions for achieving consistency, delay and cost of achieving consistency, and processing capacity of blockchain, which can provide reliable theoretical guidance for analyzing the performance of blockchain system. Existing projects and studies on system performance focus on he theoretically analyzing in stochastic variable analysis, design of consensus protocols for specific applications, and decoupling of the traditional centralized network architectures for security and scalability. Specifically, in the practical blockchain system, there are random behaviors such as block generation time, confirmation delay and chain growth rate. Thus, the random variable analysis is often used to observe its impact on the throughput, delay and cost of the blockchain system, so as to help researchers effectively and accurately study the running process of the blockchain [44, 45, 46]. In addition, the innovation of different types of consistent algorithms which have different characteristics and serve different purposes has great significance to the security and efficiency of blockchain systems, and thus attracted the attention of many scholars [20]. Furthermore, in order to cope with the shortcomings of single point of failure caused by traditional centralized network, the blockchain technology is used to reshape the network architecture to improve the network scalability, reliability and positivity, and the interaction between blockchain and network can be observed through the fusion of blockchain and networks [47].

However, in practical blockchain systems, the factors affecting its performance are rich and complex. Therefore, in order to better perform blockchain performance analysis, in addition to the aspects mentioned above, resource constraints and uncertain aspects of communication, network and computing need to be considered. Thus, it is also necessary to further design a theoretical model that can capture the characteristics of complex dynamic scenarios for the optimal design of the blockchain system, and the network service design based on the blockchain, to provide the necessary theoretical guidance and design ideas for technological innovation and breakthroughs.

II-A2 Blockchain-based function for network services

Refer to caption
Figure 3: The technical roadmap on the methodology perspective

Relying on mechanism and algorithm design, blockchain can achieve various functions and provide network services in a distributed way, including management, incentive, security & privacy, and resource allocation. In addition to the initial financial service, more research related to blockchain services is being concentrated on specific areas relevanted to network services, such as public and social services [48], cloud services [49], and other Internet services. For distributed systems with blockchain participation, the consistency of state among nodes is a key to ensure the integrity and security. Importantly, blockchain system exactly uses the consensus algorithm to achieve the consistency of state among nodes, which plays a key and irreplaceable role. This fact has fuelled the consensus algorithm is the core component that directly dictates how such a system behaves and the performance it can achieve. So that, the consensus mechanism is the basis for blockchain to establish trust and agreements without the participation of third parties. Generally speaking, consensus mechanism is a system that can constrain each decentralized node in the decentralized network, maintain the operation order and fairness of the system, and enable each unrelated node to verify and confirm the data in the network, so as to generate trust and reach consensus. consequently, consensus plays a key role in the blockchain, which largely determines blockchain system security bound and performance.

To establish consistency, various consensus algorithms for different projects are proposed. Most consensus algorithms are originated from typical Proof-of-Work (PoW), Proof of Stake (PoS), Practical Byzantine Fault Tolerance (PBFT) and Raft, and the above algorithms have their own advantages and drawbacks in throughput, confirmation latency, security, transaction fee and tolerate fault. For example, PoW and PoS are completely decentralized consensus algorithms, but they require much meaningful computation to win the competition [13]. PBFT and Raft [14][50] have good performance, but they are suitable for private networks. Besides, the performance of Raft depends on honest nodes and cannot solve BFT. For some typical consensus algorithms, a multi-dimensional performance comparison is shown in Fig. 2.

II-A3 Blockchain-based solution for vertical applications

Owning to the benefits of building trust, reducing cost and accelerating transactions, blockchain technology is expanding to other areas including IoV, the industry 4.0, smart homes, artificial intelligence integrated services, and such [51, 52, 53, 14]. In addition, as an important carrier of industrial applications, the construction of blockchain platform has attracted more and more attention from major blockchain enterprises. The analysis of existing mainstream platforms is shown in Table I. However, as we discussed before, the performance of the mainstream blockchain technologies is limited by communication, network and computation, resulting in some shortcoming such as high confirmation delay, low throughput, intensive computation, and redundant storage. Moreover, these limitations restrict the development of blockchain platforms and the landing of industrial applications. Naturally, it is necessary to propose feasible architecture and workflow to support blockchain platform construction and application development with satisfactory communication, network and computation capabilities.

II-B Challenges

II-B1 Theoretical model

Targeted at the problem of scalability, transaction throughput, latency and security, etc, various algorithms and protocols are designed in existing researches on blockchain [54] [55]. In these researches, performance analysis are conducted through experimental emulations or application implements. However, without a complete theoretical model, it is difficult to accurately find out the impact of user behaviors and system parameters on the performance and security, thus leading to the absence of the precise theoretical indicators, such as performance boundaries, tolerance to malicious attacks and so on. Importantly, the lack of theoretical foundation cannot provide theoretical guidance for the rational application or technological breakthrough of the blockchain, which will further limit the development of the blockchain. Therefore, facing the rapid popularization of blockchain application, to make up for the relative backwardness of the theoretical basis, an accurate and easily extensible set of mathematical theoretical models is necessary to be established.

II-B2 Technique fusion

Known as a secure, reliable and transparent distributed ledger, blockchain has been heralded as a technology that can energize many scenarios for practical systems, such as spectrum management, Industrial Internet of Things (IIoT) and so on [56] [57]. However, how to integrate blockchain into practical systems especially into wireless networks, while ensuring its security and performance, is still challenging. Designed for different purposes, the essence of blockchain is data storage and consensus while that of wireless networks is for data perception, transmission and aggregation. It is necessary to propose a new set of architectures and processes that can effectively combine them. Furthermore, as the mainstream blockchain protocols, PoW is of high resource consumption, direct acyclic graph’s performance is highly influenced by information load and byzantine fault tolerance is of high communication complexity. These characteristics form the obstacle for them to be applied to practical system, which is with complex communication environment, limited resources and diversified service requirements. Therefore, faced with the mismatches from communication, network and computation, a dedicated blockchain protocol for practical system is necessary to be designed.

%ͬʱ, ϵͳ й , ά û ݵ Ȩ и Ч ȫ ,  ̵ͬ ͵Ĺ

II-B3 Joint optimization

Performance and security of wireless network based blockchain are not only affected by the designed blockchain protocol, but also by application environment and business requirements of the intelligent wireless network. For example, as to Blockchain-Enabled MEC Systems [58], not only delay/time to finality (DTF) for the blockchain system but also energy consumption for the MEC system, are the performance metrics that need to be considered. Then, to avoid the sub-optimal performance resulted in by separate optimizations, a joint optimization problem can be formulated to achieve the optimal trade-off between these two performance metrics. Generally, when it comes to the matching of blockchain and other technologies, from the perspective of multi-dimensional performance requirements, in order to eliminate unilateral bottlenecks and ultimately achieve the overall system performance, the joint optimization is necessary to be considered.

II-C Roadmap on the Methodology Perspective

This article aims to provide a comprehensive overview on theoretical model, network service and management, and application for blockchain system on a methodology perspective. In order to illustrate the relationship in methodology, use cases and topic, a technical roadmap is shown in Fig. 3. First, we introduce the calssic methodology to investigate running process of blockchain to formulate and analyze. Then illustrate the use cases for blockchain theoretical model, blockchain technology design enabling network service, and how to use blockchain as the fundamental of industry vertical applications effectively. Accordingly, we review the state of the art of blockchain system for performance and security analysis, resource management, incentive mechanism, ect, and some remaining problems are summarized and discussed.

III Stochastic Process in Blockchain

Stochastic Process [59] is a mathematical method to establish system model and analyze the performance index in uncertain environment, it is a set of time-dependent random variables used to describe the system state at a specific time. In communications, especially in wireless scenario, the complex environment can be abstracted as stochastic process for analysis in a mathematical manner. As well known, Markov process has been widely used to describe the common random process. Generally, if the current system state is determined, the trend of system state in the future would be also known, no matter what the system state is in the past. Therefore, the Markov process is an important and effective mathematical tool to predict the system state, user action and network performance. Meanwhile, stochastic geometry [60] is another mathematical tool widely used in the modeling and analysis of communications and networks [61]. In communication networks, the actual network nodes and spatial locations can be formulated as random point processes, such as Homogeneous Poisson Point Process (HPPP), which is to eliminate the randomness by traversal to analyze the system performance and provide design ideas theoretically.

III-A Model Briefs

In practical blockchain system, there exist many random behaviors such as block generation time, confirmation delay, chain growth rate, and forking. As mentioned before, it is a nature design to adopt stochastic process to model these random behaviors systematically, which can help us to formulate the blockchain operation process effectively and accurately. Next, we discuss how to use stochastic process in blockchain system on the typical issues of consensus, security and deployment. In order to formulate the consensus process in blockchain system as a stochastic process, it is necessary to define a metric (like the cumulative block in PoW, or the cumulative weight in DAG) to indicate the consensus state at the different time. Moreover, if it satisfies Markov properties, the consensus process can be formulated as a Markov chain model with one-step transition probability P=P{Xn+1=in+1|Xn+1=in}P=P\{X_{n+1}=i_{n+1}|X_{n+1}=i_{n}\}.

Refer to caption
Figure 4: The Stochastic Process in consensus process of the Blockchain.

As shown in Fig. 4, we use Markov chain to model the consensus process. In this process, Si(i=1,2,m)S_{i}(i=1,2...,m) represents the state in the consensus process, and Pi,jP_{i,j} is the one-step transition probability in the Markov chain mode. Accordingly, we can learn the consensus process and gradually understand the inner-action. Furthermore, it is also useful to analyze the malicious forking attack for security.

As the most famous consensus process, the PoW-based mining task proposed by bitcoin is a competition among minors, where the winner has the right to generate a new block to obtain an amount of reward. For malicious purposes like double-spending in the blockchain, forking attack launched by the malicious node which generates blocks to build a parasite chain privately, it would succeed if the parasite chain is longer than the main chain built by the honest node due to Longest-Chain-Rule (LCR). Indeed, this attack can be treated as a competition between honest and malicious nodes. Particularly, without any malicious node, this competition is also the consensus process formulated previously. Therefore, the competition for block generation can be modeled as a Poisson process to study the relationship between honest and malicious nodes, which is shown in Fig. 5. The malicious nodes compete against the honest nodes to generate the block. The node which has the biggest probability will have the right to generate the block. Accordingly, the factors affecting the vulnerability of blockchain can be known, and the successful probability of malicious node can be determined. As a result, the theoretical insight can be provided to resist forking attack, optimize consensus mechanisms, and improve network security.

Refer to caption
Figure 5: The Stochastic Process in the block generation of the Blockchain.

Like the classic base station deployment problem in heterogeneous networks, deployment of blockchain funtion node (or called as full node in some literatures) can be solved using a stochastic method/stochastic methods in the same manner. The blockchain system is decentralized which is composed of multiple distributed blockchain nodes, their geographical distribution can be modeled as a Homogeneous Poisson Point Process (HPPP). In this way, we can construct an effective blockchain system architecture, and analyze the impact of blockchain node distribution on the communication throughput, SNR, security and other network metrics. Therefore, a valuable theoretical guidance is developed to optimize the blockchain node deployment in order to imporve the system performance.

III-B Case Study

In this section, we will use our previous work [62] as an example to introduce how to model the classic blockchain problem as a stochastic process. As shown in Fig. 6, Tangle is a DAG based distributed ledger for recording transactions.

DAG consensus is a typical voting mechanism to accumulate weight for consensus, which allows the new transaction to randomly select two unselected transactions that are called as tips. Therefore, according to the random selection in DAG consensus, selected times of the observed transaction within the time period [0,t][0,t] is a random variable of tt based on the assumption that the arrival time of the observed transaction is 0. Thus, the cumulative weight of the observed transaction is its own weight plus the overall number of transactions which select it (the weight of each transaction is assumed to be 1). Therefore, the cumulative weight W(t)W(t) is a random variable with time tt ({W(t),t[0,]}\{W(t),t\in[0,\infty]\}), which is a stochastic process. Meanwhile, L(t)L(t) is the number of tips at time tt, and it is also a stochastic process because it is affected by the random selection as well as W(t)W(t).

Refer to caption
Figure 6: The structure of DAG consensus [62].

In summary, the future states of L(t+1)L(t+1) and W(t+1)W(t+1) are determined by their current states (L(t)L(t) and W(t)W(t)) only, which satisfies Markov properties. Therefore, this consensus process can be formulated as a Markov chain. Due to the consideration that the new transaction arrives slowly resulting in a low network load, the system state is defined as {W(t),L(t)}\{W(t),L(t)\} that is modeled as a discrete Markov chain {W(k),L(k)},k=0,1,2,,\{W(k),L(k)\},k=0,1,2,...,\infty.

When a new transaction xx arrives, the change in system state can be expressed as

W(k+1)={W(k)ax=1;W(k)+1ax=0.\displaystyle W\left({k+1}\right)=\left\{{\begin{array}[]{*{20}{c}}{W\left(k\right)}&{{a_{x}}=1};\\ {W\left(k\right){\rm{+1}}}&{{a_{x}}=0}.\end{array}}\right. (3.3)
L(k+1)=L(k)1.\displaystyle L(k+1)=L(k)-1. (3.4)

where the ax=1a_{x}=1 stands for the situation that the observed transaction has been approved by an incoming new transaction, and ax=0a_{x}=0 stands for the situation that the observed transaction has not been approved. Since the new transaction should select two unselected transactions randomly, thus (3.2) indicates that the new transaction replaces two unselected transactions as a new one.

Therefore, the corresponding one-step transition probabilities and Markov chain can be shown as Fig. 7.

Refer to caption
Figure 7: The Markov chain for DAG-baed consensus process.

For example, if the network is from high to low with Unsteady State, the one-step transition probabilities can be expressed as:

{P{i+1,j1|i,j}=2/j,i=1,2,,Ln1;j=2,3,,Lh,P{i,j1|i,j}=12/j,i=1,2,,Ln1;j=2,3,,Lh,P{i+1,1|i,j}=1,i=2,,;j=1.\displaystyle\left\{{\begin{array}[]{*{20}{l}}{P\left\{{i+1,j-1\left|{i,j}\right.}\right\}={2\mathord{\left/{\vphantom{2j}}\right.\kern-1.2pt}j},}&{i=1,2,\cdots,{L_{n}}-1{\rm{;}}j=2,3,\cdots,{L_{h}},}\\ {P\left\{{i,j-1\left|{i,j}\right.}\right\}={{1-2}\mathord{\left/{\vphantom{{1-2}j}}\right.\kern-1.2pt}j},}&{i=1,2,\cdots,{L_{n}}-1{\rm{;}}j=2,3,\cdots,{L_{h}},}\\ {P\left\{{i+1,1\left|{i,j}\right.}\right\}=1,}&{i=2,\cdots,\infty{\rm{;}}j=1.}\end{array}}\right. (3.8)

This model is for low network load case, and we can also obtain the modelling for high network load case in the same manner. According to this Markov chain model, it is possible to provide a theoretical guidance for the blockchain implementation, which can help us to analyze the key performance indicators in terms of cumulative weight and confirmation delay under different network loads, and it is able to evaluate the security performance based on the understanding the impact of network loads.

III-C Related Work

III-C1 Control of mining difficulty

D. Kraft et al. in [63] discuss the difficulty-of-work re-adjustment in the blockchain system. In order to achieve a relatively ideal average block generation rate over a period of time, the mining work is formulated as a non-homogeneous Poisson process and a new method of the difficulty-of-work re-adjustment is proposed. However, the randomness of the hash rate in the blockchain system has not been addressed yet. To this end, D. Fullmer et al. in [64] consider this situation and introduces a random model about block arrival time, in which the marginal distribution of block arrival time and its both expectation and variance are derived. Accordingly, we can know that the target difficulty value both is a function related to the arrival time of the previous block and affects the block arrival time in the next retargeting period.

III-C2 Modeling and analysis

Using the stochastic reward network (SRN), H. Sukhwani et al. propose a new Hyperledger Fabric v1.0 + system model and study the performance indicators such as throughput, transaction delay, node utilization, and queue length in [65]. In addition, this work analyze the fullsystem as well as the subsystems corresponding to each transaction phase in details. The proposed model can provide a quantitative framework that helps a system architect estimate performance as a function of different system configurations and makes design trade-offs decisions. N. Papadis et al. in [66] propose a stochastic network model to describe the joint dynamics of “frontier” processes, track the dynamic evolution of blockchain networks, capture important blockchain features, and study the impact of delay on security.

III-C3 blockchain node deployment

Based on the RAFT consensus mechanism, H. Xu et al. in [50] study the security performance of wireless blockchain networks under malicious interference, and provides analysis guidance for the actual deployment of wireless blockchain networks. Y. Zhu et al. in [67] introduce the blockchain-based heterogeneous network in a air-to-ground IoT heterogeneous network. In order to determine the consensus process and obtain the downlink information transmission rate through mathematical analysis, stochastic geometry method is adopted to model the deployment of Ground Sensors (GSs), Air Sensors (ASs), and the place of eavesdroppers with interference attacks. Y. Sun et al. in [68] model the location deployment and transaction arrival rate in IoT network as a PPP to study the relationship between communication throughput and transaction throughput, and propose an optimal communication node deployment algorithm, which achieves the maximum communication and transaction throughput with the minimum communication node density. M. Liu et al. in [69] formulate the location deployment of base stations and mobile users as a HPPP for mobile edge computing, and derive the theoretical expressions of relevant performance indicators in various modes using stochastic geometric methods.

III-D Summary and Existing Problems

Due to the randomness of the blockchain system, stochastic methods is commonly used for formulation, which can accurately describe the distribution of blockchain nodes, the arrival of transactions, the behavior of blockchain users and etc. Through these mathematical modeling, researchers can track the dynamic evolution of the blockchain system, and further analyze of the consensus process, throughput, and security performance. Accordingly, the corresponding theoretical basis can be provided for performance improving, such as malicious attack preventing, and blockchain application accelerating.

Although stochastic process has been widely used in the literature, there are still issues that should be considered and improved in the future.

  1. 1.

    Most existing researches formulate the blockchain system as a certain stochastic process assuming a simple model such as the Poisson distribution. However, in the actual environment, the blockchain running process usually is more complicated, and how to abstract the common random variables accurately without lossing generality should be well studied. In another word, the mathematical formulation must accurately describe the blockchain system in practice, while considering the property, complexity and constraint in the view of theoretical approach.

  2. 2.

    Currently, some typical issues in a few specific scenarios have been widely investigated. In contrast, a generalized stochastic model is in need to describe the whole blockchain system. In the future, we should further consider how to use stochastic process to model an end-to-end blockchain system model, which can systematical study the actions of blockchain user and the system performance. In addition, understanding the interactions between various functions of hash operation, cache, consensus, communication network and smart contract is another direction for future research.

IV Game Theory in Blockchain

Game theory [70][71] is a mathematical theory to study the strategy selection in competitive behaviors. A basic game consists of four basic elements: player (decision maker), strategy (the player’s action), reward (the game result obtained after the player chooses a strategy) and equilibrium (a balance).

We can use the game theory to formulate the conflicts and cooperations between selfish and rational decision-makers. By analyzing both expected and actual behaviors of the players, we can study how how each player generate and optimize individual strategy under different situation. In a game, if no player can obtain more profits by changing his own strategy alone, we call that the strategy set of all players at this time is at the state of Nash equilibrium [72]. Nash equilibrium guarantees that each player’s strategy is optimal no matter how the strategy of other players changes.

In recent years, game theory has become an important tool for communication and network research, in which most interactions can be analyzed as game behaviors to find the optimal competitive strategy.

IV-A Model Briefs

Many blockchain problems can be structured as a game based on game theory. Through the analysis of the optimal strategy and equilibrium solution, we can investigate the operation process of blockchain mechanisms and the behavior of blockchain users to optimize the systematic performance accordingly.

Considering the malicious characteristic, a miner launches an attack to increase his/her own winning probability while unfairly reducing the wining probability of others. In fact, any selfish and rational miner would like to maximize its own overall reward, which is determined by the environment feedbacks, cost and successful attacking probability simultaneously. Therefore, a miner must consider all possible re-actions of others to choose the strategy that is most beneficial to itself in this typical non-cooperative game. Therefore, the miner can be treated as the player, its strategy is whether to launch an attacking, and the reward function is the expected reward if the attacking succeeds minus the cost for attacking. In this manner, we can formulate this mining process as a game shown in Fig. 8, to study the impact of miners’ strategies (to be honest or malicious) on the blockchain network. Based on the analysis and equilibrium solution, a game model could employed and to provide a theoretical guidance to optimize the consensus process in order to improve the security (refrain from launching the attacking action).

Refer to caption
Figure 8: A Non-cooperative game framework for the mining process

During the mining process, a miner should allocate certain amount of computing resources to increase the wining probability to get the right that generates a new block with corresponding reward. Meanwhile, the more computing resources consumed, the higher cost would be generated. It means there is an effective trade-off between cost and benefit needs to be made. Accordingly, this problem can be also formulated as a game to study the interaction among miners and analyze the best strategy. for instance, game theory is often used to study equilibrium-based strategy, which guarantees the optimal reward of each miner while avoiding the meaningless mining competition caused by greedy resource allocation. Fig. 9 is a game theory model based on auction, the miners will bid for the computing resource, and the computing service providers will provide different computing resource. The more bid, the more resource. Therefore, the miner need to balance the cost and revenue.

Refer to caption
Figure 9: A auction-based a non-cooperative game model for computing resource allocation.

Using mobile edge computing in blockchain networks, the miner can offload its mining task to edge server, which can solve the limitation of computing resource of blockchain users to extend the blockchain application in wireless scenarios effectively. To encourage the miner to offload reasonably and motivate edge server to process effectively, the miner should pay an amount of payment to edge server for offloading. As shown in Fig. 10, the miners will offload some mining task to mobile edge. The more computing resource the miner buy, the greater the probability of successfully minings. Stackelberg game can be employed based on the concerning of resource allocation as mentioned above. If addressing the mining task assignment (the association between edge server and miner), auction model is a common approach.

Refer to caption
Figure 10: A MEC-basd non-cooperative game for mining strategy

IV-B Case Study

In this section, we will use our previous work [73] as an example to introduce how to motivate honest actions of participants in blockchain-based scenarios.

In the typical MEC enabled WBN, controlled by the MEC manager, edge servers are just treated as network resources providers, including computational resources and storage resources. However, the MEC server manager may become a central node that is independent of the blockchain system, thereby undermining the distributed nature of the blockchain system and further damaging its security. To this end, in this example, the underlying P2P network consists of edge servers, who are treated as blockchain miners, undertaking blockchain functionality operations and earning transaction fees, while IoT devices are treated as blockchain users, who only need to upload transactions to blockchain with specified transaction rate requirements. As shown in Fig. 11, the blockchain users submit transactions to blockchain miners, and then the blockchain miners execute the mining task and successfully generate a block. Finally, it will be added to the local ledger and broadcast to peers and this operations will also be performed by other blockchain miners once they have verified it as a valid block.

At blockchain users’ side, the utility of a blockchain user fjf_{j} includes the satisfaction degree and incentive cost, i.e., the transaction fee. Thus, in order to maximize the utility by requiring considerable transaction rate γj\gamma_{j}, the optimization problem for fjf_{j} can be expressed as follows:

maxγjUfj=Sfj(γj)Cfj(γj)s.t.j=1NγjΓmax\displaystyle\begin{split}\max\limits_{\gamma_{j}}\quad&U_{f_{j}}=S_{f_{j}}(\gamma_{j})-C_{f_{j}}(\gamma_{j})\\ &s.t.\sum_{j=1}^{N}\gamma_{j}\leq\Gamma_{max}\end{split} (4.1)

where Sfj(γj)S_{f_{j}}(\gamma_{j}) is the satisfaction degree, Cfj(γj)C_{f_{j}}(\gamma_{j}) is the transaction fees and Γmax\Gamma_{max} is the maximum transaction rate blockchain system can afford.

At the blockchain miners’ side, the utility of them is defined as charged transaction fees minus computational resources consumption. Thus, to maximize their revenue, the optimization problem can be expressed as

maxβUl=Sl(j=1Nγj,β)Cl(j=1Nγj)\displaystyle\max\limits_{\beta}\quad U_{l}=S_{l}(\sum_{j=1}^{N}\gamma_{j},\beta)-C_{l}(\sum_{j=1}^{N}\gamma_{j}) (4.2)

where NN is the number of blockchain users, Sl(j=1Nγj,β)S_{l}(\sum_{j=1}^{N}\gamma_{j},\beta) is the earning by publishing j=1Nγj\sum_{j=1}^{N}\gamma_{j} transactions per hour and Cl(j=1Nγj)C_{l}(\sum_{j=1}^{N}\gamma_{j}) is the corresponding cost of resources consumption.

Refer to caption
Figure 11: The explaination of the case study in Game Theory [73]

With blockchain miners acting as the leader while blockchain users acting as followers, a single-leader-multiple-followers Stackelberg game can be used to model interaction between them. Based on the Karush-Kuhn-Tucker (KKT) conditions and backward induction method, a distributed algorithm can be designed to reach the optimal strategy (β,γj)(\beta^{*},\gamma_{j}^{*}) in an iterative manner.

IV-C Related Work

IV-C1 Mining pool management

Game theory has been widely used for mining pool management. In [74], X. Liu et al. use an evolutionary game to describe the dynamic evolution of pool selection strategies for individual miners, analyze the evolution of the mining pool selection strategy considering the hash rate, and the broadcast delay of the block. In [75], J. Li et al. define the mining as a non-priority queuing problem that is determined entirely by transaction fee, and propose a transaction queuing game model to study the role of transaction fee in the consensus process. Based on this model, the authors analyze the relationship between the mining reward and the time cost, and prove the existence of Nash equilibriums. In order to improve the mining rate, the authors in [76] and [77] formulate the mining process in a PoW-based blockchain as iterative game, and apply Zero-determinant strategy to optimize the mining strategy in order to solve the miners’ dilemma problem.

IV-C2 Security strategy

Game theory is also potential to study the behaviors of blockchain users and the strategies for security concerns. S. Feng et al. in [78] introduce a risk management framework for blockchain service, and a Stackelberg game is adopted to describe the interactions among blockchain providers, network insurance companies and blockchain users. Based on this game model, the existence and uniqueness of equilibrium are discussed, and the three-party equilibrium-based strategy is analyzed to avoid the double-spending attacking. S. Kim et al. in [79] use the evolutionary game to study the dynamics of mining pool strategy, in which the pool can choose some participating miners to infiltrate into other pools to launch a block withholding attack. Based on the formulated model, the authors qualitatively analyzed the influence of malicious infiltrators on mining pool strategy and the feasibility of automatic migration among pools.

IV-C3 Resource management

In order to study the issues of resource management and pricing between cloud computing providers and miners, H. Yao et al. in [80] propose a multi-agent reinforcement learning algorithm to find the Nash equilibrium of the proposed model, and prove that the Nash equilibrium point of service demand in the system is related to the expected reward of each miner. Y. Jiao et al. in [81] propose an auction-based model to study the interaction between miners and edge service providers, and analyze the allocation and pricing of edge computing resource in the blockchain network. Considering the reward of service providers, N. C. Luong et al. in [82] propose an optimal auction model using deep learning to solve service providers reward and resource management issues. D. Xu et al. in [83] study the security issues in blockchain edge networks using the game theory as well. In this work, a penalty scheme based on behavioral records is designed considering the conditions of Nash equilibrium.

IV-D Summary and Existing Problems

As an analysis tool, game theory is widely used to study security, mining, and resource allocation problems in blockchain networks. A game model can be built by capturing the characteristic of the addressed problem in terms of the role of blockchain users, behavior of blockchain decision-maker and the performance of blockchain system. Thus, the game modling can help researchers understand the impact of different strategy and analyze the optimal strategy based on equilibrium solution.

Meanwhile, some problems are still remaining to be addressed as follows.

  1. 1.

    Some necessary information should be collected and exchanged in game theory, for example, the selling price of edge server for mining task offloading and the computing resources used by miners for mining. Schedule the communication resource into the game theory need to be well investigated.

  2. 2.

    Furthermore, to achieve the equilibrium solution, multi-round iterations in game theory are needed usually, but the corresponding overhead should be considered. The overhead which cause commnuication delay, would generate significant impact on the performance and the security of blockchain system. Next, efficient and light-weight game theoretic mechanism for blockchain system should be investigated.

  3. 3.

    Rationality and selfishness are the basic assumptions in game theory. However, these assumptions might be invalid especially for the malicious attacker, whose purpose is to launch an attacking to ruin the blockchain system regardless of the cost. Therefore, how to understand and study this extreme malicious action in order to improve security and privacy should be studied in the future.

V Optimization in Blockchain

Optimization theory [84][85] is a well-known computational tool to solve theoretical analysis and practical engineering issues. Generally, the goal of the optimization theory is to make the best decisions under some constraints. As a famous subfield of optimization theory, convex optimization [84] has been widely investigated and applied. Since lots of optimization problems can be transformed into a convex optimization, this section mainly focuses on the applications of convex optimization in blockchain. In addition, because optimization problems in large-scale and complicated network environments are usually nonconvex, convex optimization can also be effectively applied by relaxing or/and approximating some nonconvex conditions. A basic form of convex optimization can be regarded as constrained optimization problems which can be formulated as

minxf(x)s.t.{gi(x)0,i=1,,majT=bj,j=1,,p\displaystyle\begin{split}\begin{array}[]{l}\mathop{\min}\limits_{x}f\left(x\right)\\ s.t.\left\{{\begin{array}[]{*{20}{c}}{{g_{i}}\left(x\right)\leq 0,{\rm{}}i=1,\cdots,m}\\ {a_{j}^{T}={b_{j}},{\rm{}}j=1,\cdots,p}\end{array}}\right.\end{array}\end{split} (5.1)

where the objective function f(x)f(x) and the inequality constrained function g(x)g(x) are convex functions on Rn{{\mathop{\rm R}\nolimits}^{n}}, and the equality constraint function hi(x)=aiTxbi{h_{i}}\left(x\right)=a_{i}^{T}x-{b_{i}} must be affine.

V-A Model Briefs

Optimization theory is widely used in various fields, which help us to adjust the parameters, schedule the resource and determine the decision improving the system performance in a distributed/centralized manner. In blockchain, it can be used to manage the mining, improve security, and jointly optimize the blockchain with other technologies. The mining management optimization is a typical problem in blockchain. As well known, the mining reward for miners is an important factor to encourage the contribution of computing resource. Therefore, maximizing the reward and promoting the accomplish of the consensus process is a popular topic in mining management. In order to increase the successful mining probability, miners usually choose to join the mining pool. Generally, as long as any miner in the pool succeeds in mining, the mining reward will be distributed to each miner in the pool. Different mining pools may adopt different reward mechanisms. Therefore, the miner should consider how to choose the optimal pool selection strategy to optimize its reward, and this problem can be transformed into a mathematical optimization problem. For this optimization problem, the mining reward obtained by miners under different reward mechanisms can be formulated as the objective function, the variable is the miner’s pool selection strategy, and the constraints are determined by the actual situation. Through this mining pool selection optimization problem, we can study the impact of different reward mechanisms on the blockchain network in term of the objective function, and determine the optimal selection under the constraints.

When miners join the mining pool and cooperate with others, the competition among miners becomes the competition among the mining pools. In order to win for mining reward, some mining pools may choose to take the Block Withholding (BWH) attacking on other mining pools. As shown in Fig. 12, the pool A will allocate a part of computing power α\alpha to another pool B for attacking. The greater computing power consumed by the attacker, the greater the malicious impact on other pools would be happened. The malicious impacts would decline the computing power for consensus and is costly to the attacker itself. As a result, the attacker should choose the optimal computing power for attacking, which can be considered as an optimization problem. In this case, the objective function is to maximize the mining reward as well as successful attacking probability with the computing power for attacking as the variable. Through the optimization analysis, we can know the optimal attacking strategy, which is the baseline to analyze and design the consensus process for security based on the understanding the malicious action of the attacker.

Refer to caption
Figure 12: The explaination of BWH attack.

As discussed before, mining task offloading from the miners to the edge servers can be also formulated as an optimization problem with resource allocation. In this case, the miner should choose an appropriate offloading strategy to determine whether to offload, or to which edge server to offload, and how many resources (computing, communication and cache) the edge server allocates to the offloading task. Using this optimal offloading formulation, we can analyze the impact of the offloading on the performance and security of the blockchain network, and the optimal solution is to provide a theoretical guidance for the blockchain development and application.

V-B Case Study

In this section, we use the previous work [86] as an example to introduce how to perform optimization in blockchain. In this paper, to improve the security and privacy of D2D (device to device) communication, the authors introduce a new distributed and secure data sharing framework called D2D blockchain. The simplified procedure for transaction relaying and block verification is shown in Fig. 13. In this framework, the authors deploy a series of Access Point (APs) to incentivize the transaction relay and block verification using DPoS-Based Lightweight Block Verification Scheme. Therefore, an important problem for AP is that how to improve the efficiency of transaction relaying and DPoS based block verification, while the payment (cost) is small.

Refer to caption
Figure 13: The simplified procedure for transaction relaying and block verification [86]

In this work, a two-stage contract theory based on joint optimization scheme is proposed, where the AP serves as an employer who designs all kinds of contracts, pays rewards for employees, relays devices, and verifiers serve as employees. Relay devices should consider their battery energy, resource of occupied bandwidth, etc., and verifiers should consider their CPU cycles, energy consumption, etc. In order to maximize the expected utility of AP while satisfying the individual rationality and the incentive compatible constraints for transaction relaying and block verification, the objective function in the optimization problem is formulated as

maxUAP=VRRR+VVRVs.t.{a,b,c,d,e}\displaystyle\begin{split}max\quad&U_{AP}=V_{R}-R_{R}+V_{V}-R_{V}\\ &s.t.\quad\{a,b,c,d,e\}\end{split} (5.2)

where the limiting conditions {a,b,c,d,e}\{a,b,c,d,e\} are respectively expressed as

  • (a)

    For each relay device, the reward paid from AP should be not less than its cost due to the rationality.

  • (b)

    Similarly, for each verifier, the reward paid from AP should be not less than its cost due to the rationality.

  • (c)

    AP needs to design the contract for the relay device or verifier flexibly according to their corresponding types.

  • (d)

    Similarly, AP needs design the contract for the verifier flexibly according to their corresponding types.

  • (e)

    For AP, the reward paid to relay devices and verifiers must be reasonable following a limitation.

where VRV_{R} is the whole value of transaction relaying created by all the relay devices, and RRR_{R} is the whole payment from AP to relay devices. Similarly, VVV_{V} is the whole value of block verification created by all the verifiers, and RVR_{V} is the whole payment from AP to verifiers.

However, to solve the optimization problem in a practical system, the constraint conditions often are set to non-convex, thus (5.2) cannot be solved directly.

By reducing some constraints, this optimization problem can be transferred into a convex problem. Finally, the optimal solution is the best strategy for transaction relaying and block verification, which can maximize the utility of AP while incentivizing the relay devices and block verifiers to accomplish their tasks optimally.

V-C Related Work

V-C1 Security

As one of the most important issue in blockchain, the security topic has been widely formulated as an optimization problem. O. Onireti et al. in [87] propose a practical modeling framework for PBFT, and the viable area for wireless PBFT network is defined to ensure the minimum number of replication nodes required for protocol security and activity. Considering the secured communication and data sharing between vehicles, J. Kang et al. in [88] propose a two-stage security enhancement solution to solve collusion attacks in IoV. In the first stage, the system selects active miners and standby miners (candidates) based on reputation voting. Hence, the active miners selected get the chance to generate block. In the second stage, standby miners will verify the block generated by active miners. Therefore, the internal collusion among active miners is avoided. However, how to incentivize the standby miners to participate is an important problem, which is solved using contract theory. M. Saad et al. in [89] model the malicious behavior as a Lyapunov optimization problem. Then they study how attacker uses the impact of memory pool overflow on blockchain users to launch an DDoS attacking. To prevent DDoS attacks, the authors propose two effective countermeasures: fee-based and age-based design. The core of the fee-based design is to conduct transaction relay with minimum relay fee to reject spam transactions. And similarly, the core of the age-based design is to compare transaction mining fee and minimum mining fee. While spam transactions are rejected, the DDoS attacks are also resolved.

V-C2 Resource allocation

Considering the high-resource consumption, mobile edge computing is a nature design for the blockchain-enabled wireless networks. Y. Wu et al. in [90] convert the computing resource allocation problem in multi-access MEC-based blockchain into a mathematical form of joint optimization problem. To maximize the total revenue of the mobile terminals while ensuring the fairness of the mobile terminals, they consider two different scenarios, namely a single-edge-server scenario and a multi-edge-servers scenario. For the two scenarios, the authors propose two layered algorithms to solve the non-convex optimization problem above. S. Fu et al. in [91] study the issue of joint resource allocation in blockchain-based IoT systems. To maximize the system energy-efficiency, the authors use stochastic programming to solve the joint optimization problem above. M. Wang et al. in [92] propose a blockchain-based decentralized and truthful framework for MDC (BC-MDC), which enable the decentralization and prevented dishonesty by incorporating a plasma-based blockchain into the MDC. There are 4 smart contracts designed for distributed management of worker registration, task posting/allocation, rewards and penalties. Furthermore, MDC task allocation is formulated as a stochastic optimization problem that jointly minimized the long-term processing cost and risk of task failure, and an online task allocation is proposed to timely allocate the task to workers to accommodate the network variation. Moreover, a rewarding/penalizing scheme is designed to ensure the individually rational to truthful of rewarding and prevent the free-riding as well.

V-C3 Optimal algorithm and strategy design

The optimization problem can be also used to describe various purposes in blockchain system. Y. Zhang et al. in [93] study the routing issue in a blockchain-based payment channel network. The authors analyze the payment routing problem using the optimization theory method. While considering the constraints of timeliness and feasibility, the authors propose a distributed optimization scheme to achieve the lowest total transaction costs from the sender to the receiver. Applying the consortium blockchain technology to electric taxi charging scenarios with multiple operators, J. Zhang et al. in [94] propose a new Byzantine fault tolerance algorithm to solve the problem of trust among operators of charging stations. In addition, this work designs a system model based on multi-objective optimization to maximize operating efficiency and customer satisfaction while minimizing the time and distance costs of electric taxis. Z. Jin et al. in [95] propose EdgeChain, a blockchain-based architecture to make mobile edge application placement decisions for multiple service providers. The placement decision is modeled as a stochastic programming problem to minimize the placement cost for mobile edge application placement scenarios. In this scenario, the blockchain is used to store all placement transactions, which can be traceable by every mobile edge service providers and application vendors who consume resources at the mobile edge.

V-D Summary and Existing Problem

For blockchain system, the mathematical optimization tool is usually introduced to find the best pool selection strategy for miners to determine the best task offloading strategy, and to allocate resource for consensus process. Although existing researches show that the optimization can achieve the better system performance and security, some problems should be further studied in the future.

  1. 1.

    The optimization problem and corresponding solution are usually for a specific situation in static or semi-static state. However, the practical blockchain system is dynamic and stochastic with some important parameters and constraints that are uncertain and might be changed over time and space. Therefore, these uncertainties should be further considered in optimization formulation.

  2. 2.

    Due to the complexity of the blockchain system, the solution to the formulated optimization problem might be challenging. For example, the original problem should be transformed into a standard convex problem, decompose into multi-subproblem, or design an iterative approach to achieve a sub-optimal solution instead of the optimal one. Therefore, the solution method is another issue that should be addressed considering the solution quality, convergence speed and overhead.

  3. 3.

    For modelling, some basic assumptions and simplifications with some typical mathematical properties are necessary especially for problem formulation and analysis, but they cannot describe the actual blockchain system accurately. Therefore, the acceptable gap between the reality (practical system) and ideality (mathematical model) should be also well studied.

VI Machine Learning in Blockchain

Machine learning [96][97] is a method of designing and analyzing algorithm to “learn” automatically, which allows computers to analyze from a large amount of data, find out the hidden laws for prediction or classification based on characteristics of data. Machine learning usually involves the algorithm of supervised learning [98], unsupervised learning, and reinforcement learning [99], and the model of Surport Vector Machine (SVM) [100], Random Forest (RF) [101], and Deep Learning (DL) [102][103]. Those models and algorithms mentioned above are widely used in the analysis, prediction, and optimization of communications and networks. Supervised learning is to train labeled data and analyze the training data to solve classification and regression problems. In contrast, unsupervised learning trains data with no labels to achieve clustering or dimensionality reduction by finding similarities or internal relationships in the data. Different from supervised/unsupervised learning, reinforcement learning is mainly used to solve decision-making problems in a trial-and-error process based on the interaction and feedback between the agent and environment. SVM discriminates two classes by fitting an optimal linear separating hyperplane to the training samples of two classes in a multidimensional feature space [104]. Random forest is a more accurate and stable model obtained by building multiple decision trees and fusing them together, with the advantage of high accuracy and efficient operation [105], which is suitable for the case of non-differentiable model with discrete features and limited values. Deep learning allows computational models that are composed of multiple processing layers to learn representations of data with multiple levels of abstraction [106]. It involves AtuoEncode, Variational Auto-Encoder and Generative Adversarial Network based on unsupervised learning, Deep Neural Networks, Convolutional Neural Networks (CNN), and Recurrent Neural Networks (RNN) based on supervised learning [107, 108]. It is based on basic features and uses multi-layer activation functions to learn high-dimensional nonlinear features, including CNN networks suitable for image domains, RNN networks suitable for time series and WiDE &\& Deep networks suitable for recommendation domains, etc [109].

VI-A Model Briefs

In recent years, machine learning has been widely used in pattern recognition [110], data mining [111], etc., due to its capabilities in data management, analysis, and decision-making. In blockchain, machine learning can provide an efficient and intelligent approach to discover the malicious action and recognize the attacks to guarantee the data reliability, system security and user privacy. On the other hand, machine learning is also used to make the decision for resource allocation, block size setting and transactions scheduling to optimize the performance of blockchain system.

Malicious attackers can launch double spend attacking [112], denial of service attacking, and eclipse attacking on the blockchain network, which will cause the deteriorated security risk. In recent years, machine learning is introduced in blockchain to solve security problems. By using unsupervised/supervised learning algorithms such as the K-means algorithm and supervised SVM, etc., we can monitor the transaction in consensus process and the behavior of blockchain users [113]. Accordingly, as shown in Fig. 14, we can learn the characteristic of both honest and malicious actions, identify suspicious transaction, and malicious attacker or illegal activity in the network, which can reduce the possibility of successful attacks.

Refer to caption
Figure 14: Using machine learning to recognize the type of blockchain nodes.

Nowadays, the resource consumption is an barrier for blockchain applications, especially in the case which is resource-limited such as the IoT device in the wireless network [14]. Therefore, it is necessary to consider the energy-saving in mechanism design and resource allocation. To develop an optimal strategy, we can define the state space s(t)s(t), the action space a(t)a(t), and the reward function r(t)r(t) to represent the agent, environment, and the feedback between them in a machine learning manner [114]. The interaction among s(t)s(t), a(t)a(t) and r(t)r(t) is shown in Fig. 15. In a real environmental transformation, the probability of going to the next state s(t+1)s(t+1), is related to both the current state s(t)s(t) and the previous state s(t1)s(t-1), occasionally related to even earlier state s(t2)s(t-2), so that the environmental transformation model may be too complex to model. Therefore, the way to simplify the environmental transformation model of reinforcement learning is to assume the markov property of state transformation: the probability of transformation to the next state s(t+1)s(t+1) is only related to the current state s(t)s(t), and has nothing to do with the previous state [115]. Accordingly, to maximize the long-term reward, the optimal strategy determination considering the interaction and feedback over time can be treated as a Markov decision process, and it is able to be achieved using reinforcement learning or deep reinforcement learning algorithms.

Refer to caption
Figure 15: The explaination of the interaction and feedback between agent and environment in a machine learning manner.

In addition, blockchain is a potential solution to the problems in machine learning. Most typically, the decentralized feature of blockchain can be used to solve the problem of single point of failure caused by aggregating machine learning models using centralized servers.

VI-B Case Study

In this section, the previous work [116] is used as an example to illustrate the benefits of the combination of blockchain and machine learning.

Federated learning (FL) [117], as a promising training paradigm, was proposed by Google to tackle the privacy and security problems of centralized machine learning and to alleviate the communication load of the core network. As shown in Fig. 16 (a), many devices collaborate in solving a machine learning problem by updating the local model with their own local data, under the coordination of the centralized FL server. However, the traditional FL, which relies on a centralized FL server for model aggregation is vulnerable to experience service paralysis even when a single point of failure happens. All local models updated from devices will be distorted by the inaccurate global model aggregated at the FL server. In addition, for some devices with massive amounts of data, if there is no credible incentive mechanism, they are usually unwilling to participate in training, which brings great challenge to the rapid convergence of the FL model.

Refer to caption
Figure 16: (a) The structure of traditional FL; (b) The structure of the proposed BlockFL [116]

To address the problems mentioned above, H. Kim proposed a blockchained FL (BlockFL) architecture, which is shown in Fig. 16(b). With the distributed and non-tamperable characteristics of the blockchain, the use of a blockchain network instead of the centralized FL server can effectively overcome the issue of single point failure. The model parameters uploaded by the devices are taken as the transactions, and will be recorded in the candidate block after being verified by the associated miner. After all miners reached a consensus, devices can obtain the latest global model by aggregating the local model updates contained in the newly generated block downloaded from the associated miner. Generally, the global model is aggregated anywhere as long as the latest block can be obtained. In addition, the data reward for devices will be issued by the associated miner according to the size of the device data sample; the mining reward for miners will be issued by the blockchain network according to the total volume of data used by the connected devices. With the reasonable incentives, the blockchain-based FL can be positively driven for efficient training.

Due to the decentralized architecture of BlockFL, the malfunction of each miner only distorts the global model of its own devices instead of paralyzing the entire system. Moreover, such distortion can be recovered by interaction with other regular miners or federating with other devices associated with regular miners. Besides, by optimizing the block generation rate, the time for BlockFL to complete the model training can be reduced and the performance of the system can be improved.

VI-C Related Work

VI-C1 Security

Due to the capability of learning, analyzing and classifying, machine learning is used to monitor behaviors and to detect the malicious attack for the blockchain security. S. Dey et al. in [113] combine machine learning and game theory to solve the majority-attack problem. In this work, the activities of attackers and participants in the network are monitored to judge and classify both participants’ motivation and the service value in transactions, and then detect network anomalies. Therefore, the probability of majority-attack will be reduced. H. Tang et al. in [118] introduce a deep learning-based algorithm to identify and classify malicious nodes by classifying behavior patterns in the network. The proposed algorithm can reduce the probability of the blockchain network being attacked by malicious nodes. Experimental results show that the proposed algorithm is significantly more effective than the existing conventional methods. In order to detect anomalies (such as DDoS, double-spend and denial-of-service attacks) in electronic transactions of Bitcoin, S. Sayadi et al. in [119] propose an anomaly detection model based on machine learning. This work proposes two modes of machine learning approaches: 1)\left.{\rm{1}}\right) the One Class Support Vector Machines (OCSVM) algorithm to detect outliers, 2)\left.{\rm{2}}\right) the K-Means algorithm in order to group outliers based on similiar type of anomalies. Experimental results show that the proposed model can accurately identify the types of attacks, and can provide the theoretical guidance to improve the security of the electronic trading system based on Bitcoin. P. Thai et al. in [120] focus particularly on the anomaly detection to the Bitcoin transaction network, with the goal of detecting suspicious users and transactions. The data is first represented in two focal points: users and transactions. And then, unsupervised learning methods including k-means, and SVM are utilized to detect anomalies. M. Shin et al. in [121] propose a clustering method for bitcoin block and transaction data analysis, which defines the data that can be collected from the Bitcoin network, and the statistics of the blocks that can be extracted from the collected data. In addition, this paper performs a clustering experiment by applying Principal Component Analysis (PCA) to the extracted data, and also testes how to apply PCA to the clustering data.

VI-C2 Performance improvement

Machine learning is widely used for performance improvement of the blockchain systems. To meet the great demand of the blockchain, the solution need to be found for the scalability problem. Nowadays, sharding method is found to resolve the scalability problem of the blockchain. A. Bugday et al. in [122] propose a method which uses adaptive machine learning model and Verifiable Random Functions together to assign nodes to achieve shards. As sharding method solves the scalability problem, the performance of the blockchain is improved. In order to optimize the system performance of the blockchain-based IoV, M. Liu et al. in [123] use Deep Reinforcement Learning Technology (DLT) to select the consensus algorithm and the block generated nodes, as well as adjust the block size and the interval between block generations. The solution proposed can be applied to the dynamic IoV scenario, and it can maximie the system throughput without affecting the system’s decentralization, latency and security. W. Hao et al. in [124] establish a trust-enhanced blockchain P2P topology (BlockP2P-EP) that considers the transmission rate and transmission reliability to improve the performance of the blockchain network in achieving fast and reliable broadcasting. BlockP2P-EP first uses K-means to cluster neighboring peer nodes. Then on top of the trust-enhanced blockchain topology, BlockP2P-EP executes the parallel spanning tree broadcasting algorithm to achieve fast data broadcasting among nodes in terms of intra- and inter-clusters.

VI-C3 Application in IoT

Machine learning is also useful to apply blockchain in various fields such as IoT, IoV and smart grid. In order to implement blockchain technology into IoT fields and achieve the condition-based management on the blockchain, T. Id in [125] applies blockchain and machine learning into the task of anomaly detections in the IoT. The authors transform the collaborative anomaly detection task of the blockchain into multi-task probabilisitc dictionary learning. Then, the statistical machine learning algorithms is used to solve major technical issues such as building and validation of consensus in the blockchain. To ensure the performance of data aggregation, data storage, and data processing in IoT services, N. C. Luong in [126] use blockchain to support IoT services which is based on cognitive radio network. To help secondary users (IoT devices) to choose an optimal transaction transmission under intricate conditions, the authors get an optimal transaction transmission policy for secondary users by adopting a Double Deep-Q Network (DDQN) algorithms that can allow the secondary users to learn the optimal policy above. H. Yao et al. in [80] introduce blockchain and cloud computing into IoT to offload computational task from the IIoT network itself. In addition, this paper models the resource interaction between cloud providers and miners as a Stackelberg game, while proposing a multiagent reinforcement learning algorithm to find the Nash equilibrium of the proposed game.

VI-C4 Application in smart grid

To protect the smart grid from suffering cyber attacks, M. A. Ferrag et al. in [127] propose a novel deep learning and blockchain-based energy framework. This framework consists of two schemes: a blockchain based scheme and a deep learning-based scheme. The blockchain-based scheme is used to facilitate the exchange of excess energy among neighboring nodes. And the deep learning-based scheme is used to detect attacks and fraudulent transactions to enhance the system reliability and security.

VI-C5 Application in VANETs

For the problem that the data collected by different entities in the vehicle social network (VSNs) usually contains very different attributes, M. Shen et al. in [100] propose a privacy-preserving SVM classifier training scheme over vertically-partitioned datasets posessed by multiple data providers. In addition, consortium blockchain and threshold homomorphic cryptosystem are used to establish a secure SVM classifier training platform without a trusted third-party. To improve the security and reduce the attack in the vehicular ad hoc networks (VANETs), C. Dai et al. in [128] propose an indirect reciprocity security framework. This framework tries to encourage the On Board Units (OBUs) to help each others to reduce attacks. According to a designed social norm, the framework assigns a scalar reputation to each OBUs to evaluate their dangerous level to the VANET, and apply the blockchain technique to protect the reputation from being tampered. Each OBU under the indirect reciprocity principle takes actions to another OBU based on the reputation which is assigned by the framework. Therefore, a selection strategy for OBUs based on Q-learning (one kind of the reinforcement learning) is proposed to solve the core problem of action selection. According to the strategy, the OBU can achieve the optimal action. Therefore, the proposed framework can efficiently increase both the reputation and the utility of the each OBU, and improve the security of the VANETs.

VI-D Summary and Existing Problems

In the literature, a number of works have shown that using machine learning in both data management and analysis can effectively monitor and classify the behavior of blockchain users, as well as recognize malicious behavior, suspicious user and illegal activity in the system, therefore both reduce the possibility of attacks and optimize the performance of system. Comparing with the traditional method of optimization or game theory, machine learning can adjust its strategy according to the changing of environment based on the long-term reward maximizing. However, there are still two existing problems that should be further investigated.

  1. 1.

    Machine learning is valuable to understand the blockchain process and behavior in order to optimize system throughput and security (i.e., the transaction processing speed and malicious attack recognition), how to use the ability of machine learning in management, analysis and prediction to provide an intelligent guideline for decision-making and mechanism design is still an open issue.

  2. 2.

    The impact of convergence and accuracy of selected machine learning algorithms on the performance and security of blockchain system should be considered.

VII Cryptography in Blockchain

Cryptography [129] is a method for confidential communication based on information transformation in a prescribed way, which is to ensure the confidentiality, integrity, authentication and non-repudiation. To improve information security, cryptography has been widely used in security identification, such as access control and privacy protection. Symmetric encryption and asymmetric encryption are the mainstream cryptographic techniques to prevent information from being eavesdropped. Symmetric encryption use the same key for encryption and decryption, such as Data Encryption Standard (DES) [130], Advanced Encryption Standard (AES) [131], and International Data Encryption Algorithm (IDEA). Asymmetric encryption uses public and private keys to encrypt and decrypt, such as Rivest-Shamir-Adleman (RSA) [132][133], Elliptic-curve cryptography (ECC) [134], and Elgamal [135]. Symmetric encryptionis fast and simple, but as the number of users increases, it will face the risk of key management and key leakage [136]. In contrast, asymmetric encryption has high security but low efficiency [137].

VII-A Model Briefs

Cryptography is the basic theory in blockchain, in which hashing, asymmetric encryption, timestamp, Merkle tree, etc. have been widely used to guarantee the security of transactions and the privacy of user information. The basic structure of blockchain is chain-of-blocks, the chain can be seemed as the relationship of blocks, and the block is an encapsulated data structure to cache data/transactions. In order to maintain the blockchain system, blockchain users perform consensus mechanism to generate blocks continuously, and hash algorithm in cryptography is carried out for transaction integrity, proof of consensus, writing new block in chain, etc. Besides, a binary Merkle tree is used for data structure which can confirm the existence and integrity of the transactions quickly.

Refer to caption
Figure 17: The Cryptography used in Blockchain.

Fig. 17 shows the application of asymmetric encryption in the blockchain. with asymmetric encryption, blockchain users can use the public key to encrypt information in transaction to ensure the security. Meanwhile, the private key is used to sign the transaction digitally by any blockchain user, and the others can use the corresponding public key to verify and to prevent in a distributed manner. For the privacy issue caused by data stored in the blockchain, some scheme can be adopted to provide anonymity decoupling users’ information from published transactions, involving of public key encryption scheme with keyword searchable, anonymous digital certificate publishing scheme, and zero-knowledge proof. For data processing security in the blockchain, homomorphic encryption technology enables users to encrypt the transaction data using the corresponding encryption algorithm before submitting the transaction data to the block chain network. The data exists in ciphertext, which will not reveal any privacy information of users even if it is obtained by the attackers. Meanwhile, the ciphertext operation result is consistent with the plaintext operation result.

Refer to caption
Figure 18: Cryptography theory for access control and authentication in blockchain systems

In the meantime, we can apply cryptography theory for access control and authentication in the blockchain systems. As shown in Fig. 18, by controlling the right of data reading and user access, only the users who have the right attributes can decrypted the encrypted data and access the blockchain systems, while those users who do not have the right attribute cannot decypt data successfully. Thesefore, the security of storing data and information in the blockchain can be guaranteed by using crytography.

VII-B Case Study

In this section,we use the previous work [138] to introduce the application of cryptography in blockchain. Due to the attributes of blockchain, many researchers try to apply blockchain technology to vehicular networks to improve its security. However, possible privacy leakage issues will reduce the enthusiasm of vehicles to participate in ad dissemination. In order to solve the vehicle privacy problem of the blockchain-based vehicular networks, the authors use Zero-knowledge proof of knowledge (ZKPoK) to propose a new blockchain-based ad dissemination framework which is shown in Fig. 19.

To ensure the validation of ad dissemination and improve the security of the vehicular networks, this work designs a concrete, fair and anonymous scheme under the proposed framework. In order to ensure fairness, Merkle hash trees and smart contracts are used to implement the proof of ad reception to mitigate “free-riding” attacks. In addition,the proposed scheme can protect vehicles’ privacy in terms of anonymity and conditional unlinkability based on zero-knowledge proof techniques. In addition, we briefly explain the five-stage process involved in the privacy protection blockchain architecture using Merkle hash tree and ZKPoK.

Refer to caption
Figure 19: The blockchain-based AD Dissemination framework [138]
  • System Setup: Register authority initializes the system and generates public and private keys based on predefined security parameters.

  • Registration: Advertisers and vehicles run sub-protocols to obtain valid certificates or keys individually. In the sub-protocol for advertisers, the registration authority adds registration information based on the ECDSA public key sent by the advertiser. In the sub-protocol for vehicle operation, register authority verifies the vehicle’s identity information according to the ZKPoK sent by the vehicle.

  • Ad Publication: Advertisers with valid certificates package ad information as a transaction and submit it to smart contracts, where the ad information is stored as the form of Merkle hash trees. Advertisers also generate ECDSA signatures so that participants can verify the validity of the transaction. Then, they select the suitable roadside unit to broadcast the ad.

  • Ad Dissemination: The selected Road Side Unit (RSU) broadcasts ad to nearby vehicles, or vehicles forward advertising to other vehicles. In addition, both the forwarding vehicle and the receiving vehicle will use ZKPoK to generate anonymous credentials to prove that the forwarding process is actually took place.

  • Reward Payment:. At this stage, RSU checks the validity of the anonymous credential and proof-of-ad-receiving submitted by the forwarding vehicle. If the verification is passed, the valid advertisement receiver and sender will receive corresponding rewards.

VII-C Related Work

VII-C1 Security

M. Noel et al. in [139] present basic analysis and the background understanding of Stateful Hash-based Signature Schemes, particularly the Lamport One-Time Signature Scheme, Winternitz One-Time Signature Scheme, and the Merkle Signature Scheme. Moreover, the three hash-based digital signatures are compared in terms of key generation, signature generation, verification, and security levels. K. Chalkias et al. in [140] propose BPQS, a scalable post-quantum (PQ) digital signature scheme best suited for blockchain and distributed ledger technologies (DLTs). It can leverage application-specific chain/graph structures to reduce the cost of key generation, signing and validation, as well as decreasing the size of signature. Besides, an open source implementation of the scheme is provided in this paper. Furthermore, compared with other benchmark schemes (e.g., SHA256 and SHA384), BPQS is superior to existing hashing algorithms when reusing keys for a reasonable number of signatures. The reason is that it support a fallback mechanism to allow for an almost unlimited number of signatures if needed. M. Sato et al. in [141] propose a scheme to extend the validity of past blocks when the underlying cryptographic algorithms (hash functions and digital signatures) are destroyed. This scheme can effectively avoid the hard-fork of the original blockchain when the hash function is compromised, and provide the smooth-fork when the digital signature scheme is compromised.

VII-C2 Privacy

Cryptography is widely used to protect the privacy of users in the blockchain. G. Micaliey al. in [142] utilize the partial homomorphic encryption to enhance data privacy, and resist both collision attack and prime attack in the blockchain. In order to protect the privacy of blockchain users, P. Zhong et al in [143] design a Privacy-Protected blockchain system to protect the privacy of users in the blockchain. This system encrypts all data uploaded by blockchain users within the agreed time. During this period, the user’s personal data will not leak unless he voluntarily publish these data. When the agreed time is reached, the system publishes the decryption key and verifies the user’s behavior to avoid fraudulent behavior by malicious users. Y. Rahulamathavan et al. in [144] apply attribute-based encryption to control the permission of data access and usage in the blockchain system to achieve privacy protection. M. Zhang et al. in [145] propose an ID-based encryption scheme to improve the data privacy particularly for the non-transaction applications in the blockchain. This scheme encrypts the plaintext into the ciphertext to hide the information for preventing disguise and passive attacks. One innovation of this sheme is that complex certificate management and issuance in traditional PKI systems can be avoid without using advance technologies such as zero-knowledge proof.

VII-C3 Zero-knowledge proof

Zero-knowledge proof (ZKP) provides the ability to prove secrets without directly disclosing them. It guarantees that the proof will not reveal more information about private input, nor can it infer from the calculations. A large number of research scholars have used ZKP to solve blockchain privacy issues. M. Harikrishnan et al. in [146] study the problem of confidentiality of data in the blockchain network and design a new interactive ZKP encryption technology-ZKSTARK, which is achieved by selecting two indistinguishable hash functions in the blockchain system and integrating them into the ZKP protocol. M. H. MurtazaIn et al in [147] introduce a simple non-interactive ZKP scheme for blockchain-based electronic voting systems, namely zkSNARKs. This work uses digital signatures for message authentication, cryptographic hash functions for getting a message digest, and ZKP for obtaining unlinkability, to achieve the security and confidentiality of the electronic voting system. On this basis, D. Ding et al. in [148] propose a blockchain privacy protection scheme using accounts and multi-asset model, where the zkSNARKs algorithm is use to generate and to verify the zero-knowledge proof. This scheme is faster than ZKSTARK, but it requires trusted settings, unable to resist quantum attacks, and is less secure than ZKSTARK. Y. Tsai et al. in [149] introduce an improved non-interactive zero-knowledge range proof scheme based on the predecessors. This work use the Fujisaki-Okamoto commitment, non-interactive zero-knowledge and computational bindingness through proof of knowledge in the cyclic group with secret order technique (CBPKCGSO), to achieve better security and efficiency.

VII-C4 Verification

A. S. Sani et al. in [150] introduce a new high-performance and scalable blockchain network. This blockchain network uses Time-based Zero-Knowledge Proof of Knowledge (T-ZKPK) to perform identity verification and the establishment of key protection transactions, which can enhance the security and privacy of IIoT. S. Zhu et al. in [151] propose a novel hybrid blockchain crowdsourcing platform to achieve decentralization and privacy preservation. On this platform, a hybrid blockchain structure, dual-ledgers and dual-consensus algorithms are integrated to ensure secured communication between requesters and workers. In addition, the smart contract and zero-knowledge proof are deployed to achieve permission control and privacy protection. Z. Wan et al. in [152] design a zero-knowledge SNARK scheme for authenticated data by effectively combining zk-SNARK technology with digital signature, called zk-DASNARK. Based on this, zk-AuthFeed (a zero-knowledge authenticated data feed scheme) is designed to achieve data privacy and authenticity of smart contracts, and it is implemented using libsnark and Ethereum to prove the efficiency of the proposed scheme.

VII-C5 Supervisability

To solve the nonsupervisability problem in the blockchain-based IoT e-commerce autonomous transaction management system, C. Liu et al. in [153] propose a new transaction settlement system called NormaChain. This work design a three-layers sharding blockchain network and an innovative decentralized public key searchable encryption scheme (decentralized public key encryption with keyword search (PEKS) scheme) to resist chosen ciphertext attacks, cryptanalysis, and collusion. H. Kang et al. in [154] propose a blockchain network called FabZK. By only storing the encrypted data of each transaction, and anonymizing the transaction relationship between participants at the same time, this blockchain network FabZK hides the transaction details in the shared ledger. In addition, it achieves both privacy and auditability by supporting verifiable Pedersen commitments and constructing zero-knowledge proofs. Evaluation result shows that this FabZK offers strong privacy-preserving capabilities, while delivering reasonable performance for the applications developed based on its framework.

TABLE II: Reference classification on methodology perspective
Method Research category Theoretical model Network service Application
Stochastic
Markov
process
- -
performance and security
analysis in IoT [62]
Poisson
process
mining difficulty
control [63][64]
-
node deployment in IoT [68],
node deployment in MEC [69]
Stochastic
geometry
- - node deployment in IoT [67]
Others
modeling and performance
analysis [65][66]
- -
Game
Stackelberg
game
-
incentive mechanismin IoT [73],
security strategy in network [78],
resource management in MEC [80]
-
Evolutionary
game
mining pool
management [74],
mining pool
security strategy [79]
- -
Iterative
game
mining pool
management [76][77]
- -
Auction -
resource management
in MEC [81][82]
-
Others
mining pool
management [75]
security
in edge networks [83]
-
Optimization
Convex
optimization
-
security in D2D
communication [86]
-
Geometric
programming
-
resource allocation
in IoT [91]
-
Stochastic
programming
-
optimal algorithm and
strategy design in mobile
edge network [95]
-
Lyapunov
Optimization
DDoS attack avoidance [89]
resource allocation in
mobile device cloud [92]
-
Others
analytical framework modeling
for PBFT [87]
security in IoV [88],
resource allocation in MEC [90],
optimal algorithm and strategy design in
payment channel network [93]
optimal algorithm and
strategy design in electric
taxi charging scenarios [94]
Machine Learning
Supervised
learning
majority-attack avoidance [113] - -
Unsupervised
learning
performance
optimization [124]
security in Bitcoin [119][120][121] -
Federated
learning
-
privacy and security in
centralized machine
learning [116]
-
Deep
learning
identify malicious
nodes [118]
-
application in IoT [126],
application in smart grid [127]
Reinforcement
learning
-
resource management
in IoT [80]
-
Deep
reinforcement
learning
- security in IoV [128]
performance optimization
in IoV [123]
Others -
sharding management [122],
collaborative anomaly
detection in IoT [125]
SVM traning platform
for VSNs [100]
Cryptography
Asymmetric
encryption
-
security issues [139][140],
user privacy [143]
-
Partial
homomorphic
encryption
- user privacy [142] -
ZKP -
privacy [138][146][147]
[148][149][154],
identity verification[150][151][152]
-
Others -
security [141][153],
privacy [144][145]
-

VII-D Summary and Existing Problem

Cryptography is the key element for confidentiality, integrity, authentication and non-repudiation for security and privacy in blockchain using the typical scheme like digital signature, asymmetric encryption, hashing and etc. These methods focus on security and privacy protection in an external manner, which are to design a powerful wall around the blockchain system to deny the attacks from malicious users. However, the system would be vulnerable if any bugs found by the attacker to break. Therefore, how to empower the security and privacy ability of blockchain system in a systematic manner providing inherent safety is still an open issue. Moreover, the mechanism and protocol should be designed to optimize the performance as well as security simultaneously.

VIII Open Issue Discussions

This paper discussed the theoretical model research of blockchain basic knowledge, the design of network services based on blockchain mechanisms and algorithms, and the deployment of blockchain-based applications in practical systems from a methodological perspective, and the reference classification is shown in Table II. In the meantime, some remaining problems in terms of technical, commercial and political views are still needed to be discussed as the open issues.

VIII-A Technology Issue

From the resource consumption perspective, many blockchain protocols, which consumes less power than PoW, have been proposed, such as PoS, IOTA and so on. However, they struggle to be widely used in wireless networks because of their scalability. As to another type of blockchain protocols which vote instead of calculating, such as PBFT, Hashgraph and so on, they are still not widely applicable to wireless networks due to their communication complexity. From the communication perspective, caused by blockchain’s transaction release, consensus interaction, ledger updating and so on, additional communication overhead is bound to be incurred along with the improvement of data security brought by blockchain. There have to be a tradeoff between the communication performance and the security performance of the blockchain network. In conclusion, essential questions to be technologically addressed include: 1)\left.{\rm{1}}\right) how to design a blockchain protocol with high scalability and appropriate power consumption, communication complexity while ensuring its security, 2)\left.{\rm{2}}\right) how to compromise between blockchain’s performance and network’s performance.

VIII-B Commercial Issue

In addition to the technical matters, the lack of killer applications [155] and business models also hinders the large-scale application of blockchain. For private or consortium blockchains, only the untamperability of the data on chain can be guaranteed. While the authenticity of the data off chain requires the cooperation of other technologies form Internet of Things. In terms of public chain, it is more about the transformation of the whole system, which is suitable for the system without effective incentive system or reliable allocation mechanism. The first areas to to be implemented will be those that have formed a consensus but lack incentives and cannot be implemented on a large scale.

VIII-C Policy Issue

The lack of policies, regulations, standardization and other related policy issues are hindering the mass commercialization of blockchain. In the formulation of them, the development and limitations of blockchain should be taken into consideration. At the mean time, the selection of solutions in blockchain must also comply with the restrictions of policies, regulations and standards.

VIII-D Communication Issue

Blockchain is built in a P2P network, which means that a large amount of communication overhead will be added in terms of network traffic and system processing capacity. Because current applications are highly dynamic, data sources frequently change. This indicates that the node may have to send a large number of update transactions, which will further increase the communication overhead. On the other hand, blockchain deployment in wireless is foreseeable in the near future [36]. In this case, blockchain services rely on wireless communication networks to reach consensus. During the consensus process, blockchain nodes are connected through wireless channels. However, due to factors such as wireless channel fading and unauthorized malicious interference, the wireless connection among blockchain nodes may be attacked, and the uplink or downlink transmission may fail, thereby reducing the probability of successful transactions. Therefore, in the wireless blockchain system, a framework is needed to measure the communication overhead and communication quality in the communication process.

IX Conclusion

Blockchain is an emerging technology that is considered as one of the key enablers of 5G networks due to its unique features of decentralization, scalability, security and the corresponding characteristics. In this article, we presented a comprehensive survey focusing on the current most advanced achievements in exploring the intrinsic nature of blockchain from a methodological perspective. Based on the state of art literatures, we outlined the theoretical model research for blockchain fundamentals understanding, the network service design for blockchain-based mechanisms and algorithms, as well as the application of blockchain for Internet of Things and etc. We first introduced the working principles, research activities, and challenges of blockchain, as well as illustrated the roadmap involving the classic methodology with typical blockchain use cases and topics. Subsequently, we discussed the contribution of the methodology to the performance of blockchain systems, focusing on the role of stochastic process, game theory, optimization, machine learning and cryptography in both the study of blockchain operation process and the design of blockchain protocol/algorithm. Finally, we pointed out several blockchain issues from technical, commercial, and political perspectives. Although the blockchain is still in its infancy, it is clear that blockchain will significantly improve the landscape and experience of future network services and applications.

References

  • [1] S. Nakamoto, “Bitcoin: a peer-to-peer electronic cash system,” 2009. [Online]. Available: https://bitcoin.org/bitcoin.pdf.
  • [2] Ethereum, “What is ethereum?” 2020. [Online]. Available: https://ethereum.org/what-is-ethereum/.
  • [3] N. community, “Nxt: a peer-to-peer digital socioeconomic system,” White paper, 2014.
  • [4] G. Zyskind, O. Nathan, and A. S. Pentland, “Decentralizing privacy: Using blockchain to protect personal data,” in 2015 IEEE Security and Privacy Workshops, 2015, pp. 180–184.
  • [5] S. Mondal, K. P. Wijewardena, S. Karuppuswami, N. Kriti, D. Kumar, and P. Chahal, “Blockchain inspired rfid-based information architecture for food supply chain,” IEEE Internet of Things Journal, vol. 6, no. 3, pp. 5803–5813, 2019.
  • [6] Y. Yuan and F. Wang, “Towards blockchain-based intelligent transportation systems,” in 2016 IEEE 19th International Conference on Intelligent Transportation Systems (ITSC), 2016, pp. 2663–2668.
  • [7] D. Bhowmik and T. Feng, “The multimedia blockchain: A distributed and tamper-proof media transaction framework,” in 2017 22nd International Conference on Digital Signal Processing (DSP), 2017, pp. 1–5.
  • [8] D. Liu, A. Alahmadi, J. Ni, X. Lin, and X. Shen, “Anonymous reputation system for iiot-enabled retail marketing atop pos blockchain,” IEEE Transactions on Industrial Informatics, vol. 15, no. 6, pp. 3527–3537, 2019.
  • [9] H. Xu, L. Zhang, O. Onireti, Y. Fang, W. B. Buchanan, and M. A. Imran, “Beeptrace: Blockchain-enabled privacy-preserving contact tracing for covid-19 pandemic and beyond,” 2020.
  • [10] N. Al-Zaben, M. M. Hassan Onik, J. Yang, N. Lee, and C. Kim, “General data protection regulation complied blockchain architecture for personally identifiable information management,” in 2018 International Conference on Computing, Electronics Communications Engineering (iCCECE), 2018, pp. 77–82.
  • [11] R. S. Sangwan, M. Kassab, and C. Capitolo, “Architectural considerations for blockchain based systems for financial transactions,” Procedia Computer Science, vol. 168, pp. 265 – 271, 2020, ’Complex Adaptive Systems’ Malvern, PennsylvaniaNovember 13-15, 2019. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S1877050920303914
  • [12] B. Granetto, R. Kandaswamy, J. Lovelock, and M. Reynolds, “Forecast: Blockchain business value, worldwide, 2017-2030,” Gartner, 2017.
  • [13] T. Salman, M. Zolanvari, A. Erbad, R. Jain, and M. Samaka, “Security services using blockchains: A state of the art survey,” IEEE Communications Surveys Tutorials, vol. 21, no. 1, pp. 858–880, 2019.
  • [14] H. Xu, P. V. Klaine, O. Onireti, B. Cao, M. Imran, and L. Zhang, “Blockchain-enabled resource management and sharing for 6g communications,” arXiv preprint arXiv: 2003.13083, 2020.
  • [15] B. Cao, Y. Li, L. Zhang, L. Zhang, S. Mumtaz, Z. Zhou, and M. Peng, “When internet of things meets blockchain: Challenges in distributed consensus,” IEEE Network, vol. 33, no. 6, pp. 133–139, 2019.
  • [16] Y. Hu, M. Liyanage, A. Mansoor, K. Thilakarathna, G. Jourjon, and A. Seneviratne, “Blockchain-based Smart Contracts - Applications and Challenges,” arXiv e-prints, Sep. 2018.
  • [17] N. Waheed, X. He, M. Usman, and M. Usman, “Security & Privacy in IoT Using Machine Learning & Blockchain: Threats & Countermeasures,” arXiv preprint arXiv:2002.03488, 2020.
  • [18] M. Conti, E. Sandeep Kumar, C. Lal, and S. Ruj, “A survey on security and privacy issues of bitcoin,” IEEE Communications Surveys Tutorials, vol. 20, no. 4, pp. 3416–3452, 2018.
  • [19] M. Saad, J. Spaulding, L. Njilla, C. Kamhoua, S. Shetty, D. Nyang, and D. Mohaisen, “Exploring the Attack Surface of Blockchain: A Comprehensive Survey,” IEEE Internet of Things Journal, vol. 22, no. 3, pp. 1977–2008, 2020.
  • [20] M. S. Ferdous, M. Chowdhury, M. Hoque, and A. Colman, “Blockchain consensus algorithms: A survey,” 2020. [Online]. Available: https://www.researchgate.net/publication/338738073_Blockchain_Consensus_Algorithms_A_Survey
  • [21] W. Wang, D. T. Hoang, P. Hu, Z. Xiong, D. Niyato, P. Wang, Y. Wen, and D. I. Kim, “A Survey on Consensus Mechanisms and Mining Strategy Management in Blockchain Networks,” IEEE Access, vol. 7, pp. 22 328–22 370, 2019.
  • [22] Y. Liu, F. R. Yu, X. Li, H. Ji, and V. C. M. Leung, “Blockchain and Machine Learning for Communications and Networking Systems,” IEEE Communications Surveys & Tutorials, no. c, pp. 1–1, 2020.
  • [23] Y. Xiao, N. Zhang, W. Lou, and Y. T. Hou, “A Survey of Distributed Consensus Protocols for Blockchain Networks,” IEEE Communications Surveys & Tutorials, no. c, pp. 1–1, 2020.
  • [24] J. Xie, F. R. Yu, T. Huang, R. Xie, J. Liu, and Y. Liu, “A survey on the scalability of blockchain systems,” IEEE Network, vol. 33, no. 5, pp. 166–173, Sep. 2019.
  • [25] H. T. M. Gamage, H. Weerasinghe, and N. G. J. Dias, “A survey on blockchain technology concepts, applications, and issues,” 2020. [Online]. Available: https://doi.org/10.1007/s42979-020-00123-0
  • [26] R. Belchior, A. Vasconcelos, S. Guerreiro, and M. Correia, “A Survey on Blockchain Interoperability: Past, Present, and Future Trends,” arXiv preprint arXiv:2005.14282, 2020.
  • [27] D. C. Nguyen, P. Pathirana, M. Ding, and A. Seneviratne, “Blockchain for 5g and beyond networks: A state of the art survey,” Journal of Network and Computer Applications, p. 102693, May. 2020.
  • [28] G. Yu, X. Wang, K. Yu, W. Ni, J. A. Zhang, and R. P. Liu, “Survey: Sharding in blockchains,” IEEE Access, vol. 8, pp. 14 155–14 181, 2020.
  • [29] M. A. Ferrag, M. Derdour, M. Mukherjee, A. Derhab, L. Maglaras, and H. Janicke, “Blockchain technologies for the internet of things: Research issues and challenges,” IEEE Internet of Things Journal, vol. 6, no. 2, pp. 2188–2204, 2019.
  • [30] M. Chowdhury, M. S. Ferdous, K. Biswas, N. Chowdhury, and V. Muthukkumarasamy, “A survey on blockchain-based platforms for iot use-cases,” The Knowledge Engineering Review, vol. 35, May. 2020.
  • [31] J. Xie, H. Tang, T. Huang, F. R. Yu, R. Xie, J. Liu, and Y. Liu, “A Survey of Blockchain Technology Applied to Smart Cities: Research Issues and Challenges,” IEEE Communications Surveys and Tutorials, vol. 21, no. 3, pp. 2794–2830, 2019.
  • [32] K. Gai, J. Guo, L. Zhu, and S. Yu, “Blockchain Meets Cloud Computing: A Survey,” IEEE Communications Surveys and Tutorials, no. c, pp. 1–22, 2020.
  • [33] R. Yang, F. R. Yu, P. Si, Z. Yang, and Y. Zhang, “Integrated Blockchain and Edge Computing Systems: A Survey, Some Research Issues and Challenges,” IEEE Communications Surveys and Tutorials, vol. 21, no. 2, pp. 1508–1532, 2019.
  • [34] H. Baniata and A. Kertesz, “A survey on blockchain-fog integration approaches,” IEEE Access, vol. 8, pp. 102 657–102 668, 2020.
  • [35] Z. Liu, N. C. Luong, W. Wang, D. Niyato, P. Wang, Y. C. Liang, and D. I. Kim, “A Survey on Blockchain: A Game Theoretical Perspective,” IEEE Access, vol. 7, pp. 47 615–47 643, 2019.
  • [36] L. Zhang, H. Xu, O. Onireti, M. Imran, and B. Cao, “How much communication resource is needed to run a wireless blockchain network?” submitted to IEEE Wireless Communications Magazine, 2020.
  • [37] S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” [Online]. Available: http://www.ildgroup.si/uploads/product/20/bitcoin.pdf, 2008.
  • [38] “Nxt.” [Online]. Available: https://www.jelurida.com/nxt, 2020.
  • [39] “Ethereum,” [Online]. Available: https://www.ethereum.org/, 2016.
  • [40] “Hashgraph,” [Online]. Available: https://hashgraph.com/, 2020.
  • [41] S. Popov, “The tangle,” [Online]. Available: http://iotatoken.com/IOTA Whitepaper.pdf, 2017.
  • [42] E. Androulaki, A. Barger, V. Bortnikov, C. Cachin, K. Christidis, A. De Caro, D. Enyeart, C. Ferris, G. Laventman, Y. Manevich, S. Muralidharan, C. Murthy, B. Nguyen, M. Sethi, G. Singh, K. Smith, A. Sorniotti, C. Stathakopoulou, M. Vukolić, S. Weed Cocco, and J. Yellick, “Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains,” arXiv e-prints, p. arXiv:1801.10228, Jan. 2018.
  • [43] “Eosio,” [Online]. Available: https://eos.io, 2020.
  • [44] Z. Zhang, M. Zargham, and V. Preciado, “On modeling blockchain-enabled economic networks as stochastic dynamical systems,” Applied Network Science, vol. 5, p. 19, 2020.
  • [45] S. Guo, X. Hu, S. Guo, X. Qiu, and F. Qi, “Blockchain meets edge computing: A distributed and trusted authentication system,” IEEE Transactions on Industrial Informatics, vol. 16, no. 3, pp. 1972–1983, 2020.
  • [46] A. Gopalan, A. Sankararaman, A. Walid, and S. Vishwanath, “Stability and scalability of blockchain systems,” 2019, pp. 71–72.
  • [47] X. Ling, J. Wang, T. Bouchoucha, B. C. Levy, and Z. Ding, “Blockchain radio access network (b-ran): Towards decentralized secure radio access paradigm,” IEEE Access, vol. 7, pp. 9714–9723, 2019.
  • [48] A. Chakravorty and C. Rong, “Ushare: User controlled social media based on blockchain,” in Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, ser. IMCOM ’17.   New York, NY, USA: Association for Computing Machinery, 2017. [Online]. Available: https://doi.org/10.1145/3022227.3022325
  • [49] Q. Xia, E. B. Sifah, K. O. Asamoah, J. Gao, X. Du, and M. Guizani, “Medshare: Trust-less medical data sharing among cloud service providers via blockchain,” IEEE Access, vol. 5, pp. 14 757–14 767, 2017.
  • [50] H. Xu, L. Zhang, Y. Liu, and B. Cao, “Raft based wireless blockchain networks in the presence of malicious jamming,” IEEE Wireless Communications Letters, vol. 9, no. 6, pp. 817–821, 2020.
  • [51] V. Sharma, “An energy-efficient transaction model for the blockchain-enabled internet of vehicles (iov),” IEEE Communications Letters, vol. 23, no. 2, pp. 246–249, 2019.
  • [52] S. Huh, S. Cho, and S. Kim, “Managing iot devices using blockchain platform,” in 2017 19th International Conference on Advanced Communication Technology (ICACT), 2017, pp. 464–467.
  • [53] “Blockchain for smart homes: Review of current trends and research challenges,” Computers & Electrical Engineering, vol. 83, p. 106585, 2020.
  • [54] I. Eyal, A. E. Gencer, E. G. Sirer, and R. Van Renesse, “Bitcoin-ng: A scalable blockchain protocol,” 2015.
  • [55] P. Robinson, R. Ramesh, J. Brainard, and S. Johnson, “Atomic Crosschain Transactions White Paper,” arXiv preprint arXiv:2003.00903v2, 2020.
  • [56] K. Zhang, Y. Zhu, S. Maharjan, and Y. Zhang, “Edge intelligence and blockchain empowered 5g beyond for the industrial internet of things,” IEEE Network, vol. 33, no. 5, pp. 12–19, 2019.
  • [57] M. B. H. Weiss, K. Werbach, D. C. Sicker, and C. E. C. Bastidas, “On the application of blockchains to spectrum management,” IEEE Transactions on Cognitive Communications and Networking, vol. 5, no. 2, pp. 193–205, 2019.
  • [58] J. Feng, F. R. Yu, Q. Pei, J. Du, and L. Zhu, “Joint optimization of radio and computational resources allocation in blockchain-enabled mobile edge computing systems,” IEEE Transactions on Wireless Communications, vol. 19, no. 6, pp. 4321–4334, 2020.
  • [59] A. Papoulis and S. U. Pillai, Probability, random variables, and stochastic processes.   Tata McGraw-Hill Education, 2002.
  • [60] F. Baccelli and B. Błaszczyszyn, Stochastic geometry and wireless networks.   Now Publishers Inc, 2010, vol. 1.
  • [61] S. N. Chiu, D. Stoyan, W. S. Kendall, and J. Mecke, Stochastic geometry and its applications.   John Wiley & Sons, 2013.
  • [62] Y. Li, B. Cao, M. Peng, L. Zhang, L. Zhang, D. Feng, and J. Yu, “Direct acyclic graph based blockchain for internet of things: Performance and security analysis,” arXiv preprint arXiv:1905.10925, 2019.
  • [63] D. Kraft, “Difficulty control for blockchain-based consensus systems,” Peer-to-Peer Networking and Applications, vol. 9, no. 2, pp. 397–413, 2016.
  • [64] D. Fullmer and A. S. Morse, “Analysis of difficulty control in bitcoin and proof-of-work blockchains,” in 2018 IEEE Conference on Decision and Control (CDC).   IEEE, 2018, pp. 5988–5992.
  • [65] H. Sukhwani, N. Wang, K. S. Trivedi, and A. Rindos, “Performance modeling of hyperledger fabric (permissioned blockchain network),” in 2018 IEEE 17th International Symposium on Network Computing and Applications (NCA).   IEEE, 2018, pp. 1–8.
  • [66] N. Papadis, S. Borst, A. Walid, M. Grissa, and L. Tassiulas, “Stochastic models and wide-area network measurements for blockchain design and analysis,” in IEEE INFOCOM 2018-IEEE Conference on Computer Communications.   IEEE, 2018, pp. 2546–2554.
  • [67] Y. Zhu, G. Zheng, and K.-K. Wong, “Blockchain-empowered decentralized storage in air-to-ground industrial networks,” IEEE Transactions on Industrial Informatics, vol. 15, no. 6, pp. 3593–3601, 2019.
  • [68] Y. Sun, L. Zhang, G. Feng, B. Yang, B. Cao, and M. A. Imran, “Blockchain-enabled wireless Internet of Things: Performance analysis and optimal communication node deployment,” IEEE Internet of Things Journal, vol. 6, no. 3, pp. 5791–5802, 2019.
  • [69] M. Liu, F. R. Yu, Y. Teng, V. C. M. Leung, and M. Song, “Computation offloading and content caching in wireless blockchain networks with mobile edge computing,” IEEE Transactions on Vehicular Technology, vol. 67, no. 11, pp. 11 008–11 021, 2018.
  • [70] R. B. Myerson, Game theory.   Harvard university press, 2013.
  • [71] Z. Han, D. Niyato, W. Saad, T. Ba\\backslashcsar, and A. Hjørungnes, Game theory in wireless and communication networks: theory, models, and applications.   Cambridge university press, 2012.
  • [72] J. Nash, “Non-cooperative games,” Annals of mathematics, pp. 286–295, 1951.
  • [73] W. Liu, B. Cao, L. Zhang, M. Peng, and M. Daneshmand, “A Distributed Game Theoretic Approach for Blockchain-based Offloading Strategy,” 2020.
  • [74] X. Liu, W. Wang, D. Niyato, N. Zhao, and P. Wang, “Evolutionary game for mining pool selection in blockchain networks,” IEEE Wireless Communications Letters, vol. 7, no. 5, pp. 760–763, 2018.
  • [75] J. Li, Y. Yuan, S. Wang, and F.-Y. Wang, “Transaction queuing game in bitcoin blockchain,” in 2018 IEEE Intelligent Vehicles Symposium (IV).   IEEE, 2018, pp. 114–119.
  • [76] Y. Zhen, M. Yue, C. Zhong-yu, T. Chang-bing, and C. Xin, “Zero-determinant strategy for the algorithm optimize of blockchain PoW consensus,” in 2017 36th Chinese Control Conference (CCC).   IEEE, 2017, pp. 1441–1446.
  • [77] C. Tang, C. Li, X. Yu, Z. Zheng, and Z. Chen, “Cooperative mining in blockchain networks with zero-determinant strategies,” IEEE transactions on cybernetics, 2019.
  • [78] S. Feng, Z. Xiong, D. Niyato, P. Wang, S. S. Wang, and Y. Zhang, “Cyber Risk Management with Risk Aware Cyber-Insurance in Blockchain Networks,” in 2018 IEEE Global Communications Conference (GLOBECOM).   IEEE, 2018, pp. 1–7.
  • [79] S. Kim and S.-G. Hahn, “Mining Pool Manipulation in Blockchain Network Over Evolutionary Block Withholding Attack,” IEEE Access, vol. 7, pp. 144 230–144 244, 2019.
  • [80] H. Yao, T. Mai, J. Wang, Z. Ji, C. Jiang, and Y. Qian, “Resource trading in blockchain-based industrial Internet of Things,” IEEE Transactions on Industrial Informatics, vol. 15, no. 6, pp. 3602–3609, 2019.
  • [81] Y. Jiao, P. Wang, D. Niyato, and Z. Xiong, “Social welfare maximization auction in edge computing resource allocation for mobile blockchain,” in 2018 IEEE international conference on communications (ICC).   IEEE, 2018, pp. 1–6.
  • [82] N. C. Luong, Z. Xiong, P. Wang, and D. Niyato, “Optimal auction for edge computing resource management in mobile blockchain networks: A deep learning approach,” in 2018 IEEE International Conference on Communications (ICC).   IEEE, 2018, pp. 1–6.
  • [83] D. Xu, L. Xiao, L. Sun, and M. Lei, “Game theoretic study on blockchain based secure edge networks,” in 2017 IEEE/CIC International Conference on Communications in China (ICCC).   IEEE, 2017, pp. 1–5.
  • [84] H. Hindi, “A tutorial on convex optimization II: duality and interior point methods,” in 2006 American Control Conference.   IEEE, 2006, pp. 11—-pp.
  • [85] P. Berck and K. Sydsæter, “Linear and nonlinear programming,” in Economists’ Mathematical Manual.   Springer, 1993, pp. 71–76.
  • [86] L. Jiang, S. Xie, S. Maharjan, and Y. Zhang, “Joint Transaction Relaying and Block Verification Optimization for Blockchain Empowered D2D Communication,” IEEE Transactions on Vehicular Technology, 2019.
  • [87] O. Onireti, L. Zhang, and M. A. Imran, “On the viable area of wireless practical byzantine fault tolerance (pbft) blockchain networks,” in 2019 IEEE Global Communications Conference (GLOBECOM), 2019, pp. 1–6.
  • [88] J. Kang, Z. Xiong, D. Niyato, D. Ye, D. I. Kim, and J. Zhao, “Toward secure blockchain-enabled internet of vehicles: Optimizing consensus management using reputation and contract theory,” IEEE Transactions on Vehicular Technology, vol. 68, no. 3, pp. 2906–2920, 2019.
  • [89] M. Saad, L. Njilla, C. Kamhoua, J. Kim, D. Nyang, and A. Mohaisen, “Mempool Optimization for Defending Against DDoS Attacks in PoW-based Blockchain Systems,” in 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC).   IEEE, 2019, pp. 285–292.
  • [90] Y. Wu, J. Shi, X. Chen, K. Ni, L. P. Qian, and K. Zhang, “Optimal Multi-access Computation Offloading for Mobile Blockchain,” in 2018 IEEE International Conference on Communication Systems (ICCS).   IEEE, 2018, pp. 198–203.
  • [91] S. Fu, L. Zhao, X. Ling, and H. Zhang, “Maximizing the system energy efficiency in the blockchain based Internet of Things,” in ICC 2019-2019 IEEE International Conference on Communications (ICC).   IEEE, 2019, pp. 1–6.
  • [92] M. Wang, C. Xu, X. Chen, L. Zhong, Z. Wu, and D. O. Wu, “Bc-mdc: A blockchain-based decentralized truthful framework for mobile device cloud,” IEEE Transactions on Industrial Informatics, pp. 1–1, 2020.
  • [93] Y. Zhang, D. Yang, and G. Xue, “Cheapay: An optimal algorithm for fee minimization in blockchain-based payment channel networks,” in ICC 2019-2019 IEEE International Conference on Communications (ICC).   IEEE, 2019, pp. 1–6.
  • [94] Z. Jin, R. Wu, X. Chen, and G. Li, “Charging Guiding Strategy for Electric Taxis Based on Consortium Blockchain,” IEEE Access, vol. 7, pp. 144 144–144 153, 2019.
  • [95] H. Zhu, C. Huang, and J. Zhou, “Edgechain: Blockchain-based multi-vendor mobile edge application placement,” in 2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft), 2018, pp. 222–226.
  • [96] T. O. Ayodele, “Introduction to machine learning,” New Advances in Machine Learning, pp. 1–9, 2010.
  • [97] P. Langley and H. A. Simon, “Applications of machine learning and rule induction,” Communications of the ACM, vol. 38, no. 11, pp. 54–64, 1995.
  • [98] R. Saravanan and P. Sujatha, “A state of art techniques on machine learning algorithms: A perspective of supervised learning approaches in data classification,” in 2018 Second International Conference on Intelligent Computing and Control Systems (ICICCS).   IEEE, 2018, pp. 945–949.
  • [99] L. P. Kaelbling, M. L. Littman, and A. W. Moore, “Reinforcement learning: A survey,” Journal of artificial intelligence research, vol. 4, pp. 237–285, 1996.
  • [100] M. Shen, J. Zhang, L. Zhu, K. Xu, and X. Tang, “Secure svm training over vertically-partitioned datasets using consortium blockchain for vehicular social networks,” IEEE Transactions on Vehicular Technology, vol. 69, no. 6, pp. 5773–5783, 2020.
  • [101] H. J. Singh and A. S. Hafid, “Transaction confirmation time prediction in ethereum blockchain using machine learning,” 2019.
  • [102] I. Arel, D. C. Rose, and T. P. Karnowski, “Deep machine learning-a new frontier in artificial intelligence research [research frontier],” IEEE computational intelligence magazine, vol. 5, no. 4, pp. 13–18, 2010.
  • [103] L. Deng, “A tutorial survey of architectures, algorithms, and applications for deep learning,” APSIPA Transactions on Signal and Information Processing, vol. 3, 2014.
  • [104] B. Waske and J. A. Benediktsson, “Fusion of support vector machines for classification of multisensor data,” IEEE Transactions on Geoscience and Remote Sensing, vol. 45, no. 12, pp. 3858–3866, 2007.
  • [105] L. Breiman, “Random forests,” Machine Learning, vol. 43, no. 1, pp. 5–32, 2001.
  • [106] Y. LeCun, Y. Bengio, and G. Hinton, “Deep learning,” Nature, vol. 521, pp. 436–44, 05 2015.
  • [107] L. Deng, “A tutorial survey of architectures, algorithms, and applications for deep learning – erratum,” APSIPA Transactions on Signal and Information Processing, vol. 3, 12 2014.
  • [108] G. Litjens, T. Kooi, B. Ehteshami Bejnordi, A. Setio, F. Ciompi, M. Ghafoorian, J. van der Laak, B. Ginneken, and C. Sánchez, “A survey on deep learning in medical image analysis,” Medical Image Analysis, vol. 42, 02 2017.
  • [109] H.-T. Cheng, L. Koc, J. Harmsen, T. Shaked, T. Chandra, H. Aradhye, G. Anderson, G. Corrado, W. Chai, M. Ispir, R. Anil, Z. Haque, L. Hong, V. Jain, X. Liu, and H. Shah, “Wide & deep learning for recommender systems,” 2016.
  • [110] C. Bishop, Pattern Recognition and Machine Learning (Information Science and Statistics), 2006.
  • [111] G. Nguyen, S. Dlugolinsky, M. Bobak, V. Tran, A. Lopez Garcia, I. Heredia, P. Malík, and L. Hluchý, “Machine learning and deep learning frameworks and libraries for large-scale data mining: a survey,” Artificial Intelligence Review, vol. 52, pp. 77–124, 01 2019.
  • [112] G. Karame, E. Androulaki, M. Roeschlin, A. Gervais, and S. Capkun, “Misbehavior in bitcoin: A study of double-spending and accountability,” ACM Transactions on Information and System Security, vol. 18, pp. 1–32, 06 2015.
  • [113] S. Dey, “Securing majority-attack in blockchain using machine learning and algorithmic game theory: A proof of work,” in 2018 10th computer science and electronic engineering (CEEC).   IEEE, 2018, pp. 7–10.
  • [114] R. S. Sutton and A. G. Barto, Reinforcement Learning: An Introduction, 2nd Edition, 2018.
  • [115] C. Szepesvári, “Reinforcement learning algorithms for mdps,” Tech. Rep., 2009.
  • [116] H. Kim, J. Park, M. Bennis, and S.-L. Kim, “Blockchained on-device federated learning,” IEEE Communications Letters, 2019.
  • [117] H. B. McMahan, E. Moore, D. Ramage, S. Hampson, and Others, “Communication-efficient learning of deep networks from decentralized data,” arXiv preprint arXiv:1602.05629, 2016.
  • [118] H. Tang, Y. Jiao, B. Huang, C. Lin, S. Goyal, and B. Wang, “Learning to Classify Blockchain Peers According to Their Behavior Sequences,” IEEE Access, vol. 6, pp. 71 208–71 215, 2018.
  • [119] S. Sayadi, S. B. Rejeb, and Z. Choukair, “Anomaly Detection Model Over Blockchain Electronic Transactions,” in 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC).   IEEE, 2019, pp. 895–900.
  • [120] T. Pham and S. Lee, “Anomaly detection in bitcoin network using unsupervised learning methods,” 2016.
  • [121] M. Shin, U. Baek, K. Shim, J. Park, S. Yoon, and M. Kim, “Block analysis in bitcoin system using clustering with dimension reduction,” in 2019 20th Asia-Pacific Network Operations and Management Symposium (APNOMS), 2019, pp. 1–4.
  • [122] A. Bugday, A. Ozsoy, and H. Sever, “Securing Blockchain Shards By Using Learning Based Reputation and Verifiable Random Functions,” in 2019 International Symposium on Networks, Computers and Communications (ISNCC).   IEEE, 2019, pp. 1–4.
  • [123] M. Liu, Y. Teng, F. R. Yu, V. C. M. Leung, and M. Song, “Deep Reinforcement Learning Based Performance Optimization in Blockchain-Enabled Internet of Vehicle,” in ICC 2019-2019 IEEE International Conference on Communications (ICC).   IEEE, 2019, pp. 1–6.
  • [124] W. Hao, J. Zeng, X. Dai, J. Xiao, Q. Hua, H. Chen, K. Li, and H. Jin, “Towards a trust-enhanced blockchain p2p topology for enabling fast and reliable broadcast,” IEEE Transactions on Network and Service Management, pp. 1–1, 2020.
  • [125] T. Idé, “Collaborative anomaly detection on blockchain from noisy sensor data,” in 2018 IEEE International Conference on Data Mining Workshops (ICDMW).   IEEE, 2018, pp. 120–127.
  • [126] N. C. Luong, T. T. Anh, H. T. T. Binh, D. Niyato, D. I. Kim, and Y.-C. Liang, “Joint transaction transmission and channel selection in cognitive radio based blockchain networks: A deep reinforcement learning approach,” in ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).   IEEE, 2019, pp. 8409–8413.
  • [127] M. A. Ferrag and L. Maglaras, “DeepCoin: A novel deep learning and blockchain-based energy exchange framework for smart grids,” IEEE Transactions on Engineering Management, 2019.
  • [128] C. Dai, X. Xiao, Y. Ding, L. Xiao, Y. Tang, and S. Zhou, “Learning Based Security for VANET with Blockchain,” in 2018 IEEE International Conference on Communication Systems (ICCS).   IEEE, 2018, pp. 210–215.
  • [129] W. Diffie and M. Hellman, “New directions in cryptography,” IEEE transactions on Information Theory, vol. 22, no. 6, pp. 644–654, 1976.
  • [130] F. PUB, “Data Encryption Standard (DES),” FIPS PUB, pp. 43–46, 1999.
  • [131] N.-F. Standard, “Announcing the advanced encryption standard (aes),” Federal Information Processing Standards Publication, vol. 197, no. 1-51, p. 3, 2001.
  • [132] R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the ACM, vol. 21, no. 2, pp. 120–126, 1978.
  • [133] S. R. Singh, A. K. Khan, and S. R. Singh, “Performance evaluation of RSA and elliptic curve cryptography,” in 2016 2nd International Conference on Contemporary Computing and Informatics (IC3I).   IEEE, 2016, pp. 302–306.
  • [134] A. Jurišic and A. Menezes, “Elliptic curves and cryptography,” Dr. Dobb’s Journal, pp. 26–36, 1997.
  • [135] T. ElGamal, “A public key cryptosystem and a signature scheme based on discrete logarithms,” IEEE transactions on information theory, vol. 31, no. 4, pp. 469–472, 1985.
  • [136] S. Chandra, S. Paira, S. S. Alam, and G. Sanyal, “A comparative survey of symmetric and asymmetric key cryptography,” in 2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE).   IEEE, 2014, pp. 83–93.
  • [137] G. Simmons, “Symmetric and asymmetric encryption,” ACM Comput. Surv., vol. 11, pp. 305–330, 12 1979.
  • [138] M. Li, J. Weng, A. Yang, J.-N. Liu, and X. Lin, “Toward Blockchain-Based Fair and Anonymous Ad Dissemination in Vehicular Networks,” IEEE Transactions on Vehicular Technology, vol. 68, no. 11, pp. 11 248–11 259, 2019.
  • [139] M. D. Noel, O. V. Waziri, M. S. Abdulhamid, and A. J. Ojeniyi, “Stateful hash-based digital signature schemes for bitcoin cryptocurrency,” in 2019 15th International Conference on Electronics, Computer and Computation (ICECCO), 2019, pp. 1–6.
  • [140] K. Chalkias, J. Brown, M. Hearn, T. Lillehagen, I. Nitto, and T. Schroeter, “Blockchained post-quantum signatures,” in 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), 2018, pp. 1196–1203.
  • [141] M. Sato and S. Matsuo, “Long-term public blockchain: Resilience against compromise of underlying cryptography,” in 2017 26th International Conference on Computer Communication and Networks (ICCCN), 2017, pp. 1–8.
  • [142] S. Yaji, K. Bangera, and B. Neelima, “Privacy preserving in blockchain based on partial homomorphic encryption system for AI applications,” in 2018 IEEE 25th International Conference on High Performance Computing Workshops (HiPCW).   IEEE, 2018, pp. 81–85.
  • [143] P. Zhong, Q. Zhong, H. Mi, S. Zhang, and Y. Xiang, “Privacy-Protected Blockchain System,” in 2019 20th IEEE International Conference on Mobile Data Management (MDM).   IEEE, 2019, pp. 457–461.
  • [144] Y. Rahulamathavan, R. C.-W. Phan, M. Rajarajan, S. Misra, and A. Kondoz, “Privacy-preserving blockchain based IoT ecosystem using attribute-based encryption,” in 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS).   IEEE, 2017, pp. 1–6.
  • [145] M. Zhang, S. Wang, P. Zhang, L. He, X. Li, and S. Zhou, “Protecting Data Privacy for Permissioned Blockchains using Identity-Based Encryption,” in 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC).   IEEE, 2019, pp. 602–605.
  • [146] M. Harikrishnan and K. V. Lakshmy, “Secure Digital Service Payments using Zero Knowledge Proof in Distributed Network,” in 2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS).   IEEE, 2019, pp. 307–312.
  • [147] M. H. Murtaza, Z. A. Alizai, and Z. Iqbal, “Blockchain Based Anonymous Voting System Using zkSNARKs,” in 2019 International Conference on Applied and Engineering Mathematics (ICAEM).   IEEE, 2019, pp. 209–214.
  • [148] D. Ding, K. Li, L. Jia, Z. Li, J. Li, and Y. Sun, “Privacy protection for blockchains with account and multi-asset model,” China Communications, vol. 16, no. 6, pp. 69–79, 2019.
  • [149] Y. C. Tsai, R. Tso, Z.-Y. Liu, and K. Chen, “An Improved Non-Interactive Zero-Knowledge Range Proof for Decentralized Applications,” in 2019 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPCON).   IEEE, 2019, pp. 129–134.
  • [150] A. S. Sani, D. Yuan, W. Bao, P. L. Yeoh, Z. Y. Dong, B. Vucetic, and E. Bertino, “Xyreum: A high-performance and scalable blockchain for iiot security and privacy,” in 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS), 2019, pp. 1920–1930.
  • [151] S. Zhu, H. Hu, Y. Li, and W. Li, “Hybrid blockchain design for privacy preserving crowdsourcing platform,” in 2019 IEEE International Conference on Blockchain (Blockchain), 2019, pp. 26–33.
  • [152] Z. Wan, Z. Guan, Y. Zhou, and K. Ren, “zk-authfeed: How to feed authenticated data into smart contract with zero knowledge,” in 2019 IEEE International Conference on Blockchain (Blockchain), 2019, pp. 83–90.
  • [153] C. Liu, Y. Xiao, V. Javangula, Q. Hu, S. Wang, and X. Cheng, “NormaChain: A blockchain-based normalized autonomous transaction settlement system for IoT-based E-commerce,” IEEE Internet of Things Journal, vol. 6, no. 3, pp. 4680–4693, 2018.
  • [154] H. Kang, T. Dai, N. Jean-Louis, S. Tao, and X. Gu, “FabZK: Supporting Privacy-Preserving, Auditable Smart Contracts in Hyperledger Fabric,” in 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).   IEEE, 2019, pp. 543–555.
  • [155] W. Kenton, “Killer application,” website, 2018, https://www.investopedia.com/terms/k/killerapplication.asp.
Bin Cao is an associate professor in the state key laboratory of network and switching technology at Beijing University of Posts and Telecommunications (BUPT). Before that, he was an associate professor at Chongqing University of Posts and Telecommunications. He received his Ph.D. degree (Honors) in communication and information systems from the National Key Laboratory of Science and Technology on Communications, University of Electronic Science and Technology of China in 2014. From April to December in 2012, he was an international visitor at the Institute for Infocomm Research (I2R), Singapore. He was a research fellow at the National University of Singapore from July 2015 to July 2016. He served as a guest editor for IEEE Sensors Journal and IEEE Transactions on Industrial Informatics, he also served as symposium cochair for IEEE ICNC 2018, blockchain workshop cochair for CyberC 2019, IEEE Blockchain 2020 special session and TPC member for numerous conferences. His research interests include blockchain system, internet of things and mobile edge computing.
Zixin Wang received the M.E degree in information and communication engineering from Chongqing University of Posts and Telecommunications, Chongqing, China, in 2020. She currently is pursuing her Ph.D. degree in the State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China. Her research interests include blockchain and Internet of Things.
Long Zhang received the M.E degree in information and communication engineering from Chongqing University of Posts and Telecommunications, Chongqing, China, in 2019. He currently is pursuing his Ph.D. degree at the National Key Laboratory of Science and Technology on Communications, University of Electronic Science and Technology of China, Chengdu, China. His research areas include next generation mobile networks and Internet of Things.
Daquan Feng received the Ph.D. degree in information engineering from the University of Electronic Science and Technology of China in 2015. He had been a visiting student with the School of Electrical and Computer Engineering, Georgia Institute of Technology, USA, from 2011 to 2014. After graduation, he was a research staff in the State Radio Monitoring Center, Beijing, China, and then a Postdoctoral Research Fellow in Singapore University of Technology and Design. He is now an Assistant Professor with the Shenzhen Key Laboratory of Digital Creative Technology, the Guangdong Province Engineering Laboratory for Digital Creative Technology, College of Electronics and Information Engineering, Shenzhen University, Shenzhen, China. His research interests include blockchain technology, URLLC communications, MEC, and massive IoT networks. He is an Associate Editor of IEEE COMMUNICATIONS LETTERS.
Mugen Peng received the Ph.D. degree in communication and information systems from the Beijing University of Posts and Telecommunications (BUPT), Beijing, China, in 2005. Afterward, he joined BUPT, where he has been a Full Professor with the School of Information and Communication Engineering since 2012. In 2014, he was an Academic Visiting Fellow with Princeton University, Princeton, NJ, USA. He leads a Research Group focusing on wireless transmission and networking technologies with the State Key Laboratory of Networking and Switching Technology, BUPT. He has authored/coauthored over 100 refereed IEEE journal papers and over 300 conference proceeding papers. Dr. Peng was a recipient of the 2018 Heinrich Hertz Prize Paper Award, the 2014 IEEE ComSoc AP Outstanding Young Researcher Award, and the Best Paper Award in the JCN 2016 and IEEE WCNC 2015. He is on the Editorial/Associate Editorial Board of the IEEE Communications Magazine, the IEEE Internet of Things Journal, and IEEE Access.
Lei Zhang is a Senior Lecturer (Associate Professor) at the University of Glasgow, U.K. He received his Ph.D. from the University of Sheffield, U.K. His research interests include wireless communication systems and networks, blockchain technology, radio access network slicing (RAN slicing), Internet of Things (IoT), multi-antenna signal processing, MIMO systems, etc. He has 19 patents granted/filed in more than 30 countries/regions including US/UK/EU/China/Japan etc. Dr Zhang has published 2 books and 100+ peer-reviewed papers. He received IEEE Communication Society TAOS TC Best Paper Award 2019. Dr. Zhang is a senior member of IEEE. He is a Technical Committee Chair of 5th International conference on UK-China Emerging Technologies (UCET) 2020. He was the Publication and Registration Chair of IEEE Sensor Array and Multichannel (SAM) 2018, Co-chair of Cyber-C Blockchain workshop 2019. He is an associate editor of IEEE Internet of Things (IoT) Journal, IEEE Wireless Communications Letters and Digital Communications and Networks.