期刊
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
卷 16, 期 6, 页码 4270-4280出版社
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TII.2019.2943694
关键词
Wireless communication; Communication system security; Delays; Wireless sensor networks; Security; Consensus; carrier sense multiple access; collision avoidance (CSMA; CA); directed acyclic graph; double-spending attack; industrial Internet of Things; wireless blockchain network
类别
资金
- State Major Science and Technology Special Project [2018ZX033001023]
- National Program for Special Support of Eminent Professionals
- National Natural Science Foundation of China [61701059, 61831002]
- Eighteenth Open Foundation of State Key Lab of Integrated Services Networks of Xidian University [ISN20-05]
- Chongqing Technological Innovation and Application Development Projects [cstc2019jscx-msxm1322]
- Basic and Advanced Research Projects of CSTC [cstc2019jcyj-zdxm0102, TII-19-2959]
The impact of communication transmission delay on the original blockchain, has not been well considered and studied since it is primarily designed in stable wired communication environment with high communication capacity. However, in a wireless scenario, due to the scarcity of spectrum resource, a blockchain user may have to compete for wireless channel to broadcast transactions following media access control (MAC) mechanism. As a result, the communication transmission delay may be significant and pose a bottleneck on the blockchain system performance and security. To facilitate blockchain applications in wireless industrial Internet of Things (IIoTs), this article aims to investigate whether the widely used MAC mechanism, carrier sense multiple access/collision avoidance (CSMA/CA), is suitable for wireless blockchain networks or not. Based on tangle, as an example to analyze the system performance in term of confirmation delay, transaction per second and transaction loss probability by considering the impact of queueing and transmission delay caused by CSMA/CA. Next, a stochastic model is proposed to analyze the security issue taking into account the malicious double-spending attack. Simulation results provide valuable insights when running blockchain in wireless network, the performance would be limited by the traditional CSMA/CA protocol. Meanwhile, we demonstrate that the probability of launching a successful double-spending attack would be affected by CSMA/CA as well.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据