Blockchain For Internet Of Things: A Survey

2y ago
6 Views
3 Downloads
2.27 MB
19 Pages
Last View : 1m ago
Last Download : 3m ago
Upload by : Sutton Moon
Transcription

1Blockchain for Internet of Things: A SurveyHong-Ning Dai, Senior Member, IEEE, Zibin Zheng, Senior Member, IEEE, Yan Zhang, Senior Member, IEEEAbstract— Internet of Things (IoT) is reshaping the incumbentindustry to smart industry featured with data-driven decisionmaking. However, intrinsic features of IoT result in a number ofchallenges such as decentralization, poor interoperability, privacyand security vulnerabilities. Blockchain technology brings theopportunities in addressing the challenges of IoT. In this paper,we investigate the integration of blockchain technology with IoT.We name such synthesis of blockchain and IoT as Blockchain ofThings (BCoT). This paper presents an in-depth survey of BCoTand discusses the insights of this new paradigm. In particular,we first briefly introduce IoT and discuss the challenges ofIoT. Then we give an overview of blockchain technology. Wenext concentrate on introducing the convergence of blockchainand IoT and presenting the proposal of BCoT architecture. Wefurther discuss the issues about using blockchain for 5G beyondin IoT as well as industrial applications of BCoT. Finally, weoutline the open research directions in this promising area.Index Terms— Blockchain; Internet of Things; Smart Contract; Industrial ApplicationsI. I NTRODUCTIONThe recent advances in information and communicationtechnology (ICT) have promoted the evolution of conventionalcomputer-aided industry to smart industry featured with datadriven decision making [1]. During this paradigm shift, Internet of Things (IoT) plays an important role of connecting the physical industrial environment to the cyberspace ofcomputing systems consequently forming a Cyber-PhysicalSystem (CPS). IoT can support a wide diversity of industrialapplications such as manufacturing, logistics, food industryand utilities. IoT aims to improve operation efficiency andproduction throughput, reduce the machine downtime andenhance product quality. In particular, IoT has the followingfeatures: 1) decentralization of IoT systems, 2) diversity ofIoT devices and systems, 3) heterogeneity of IoT data and4) network complexity. All of them result in the challengesincluding heterogeneity of IoT system, poor interoperability,resource constraints of IoT devices, privacy and securityvulnerabilities.The appearance of blockchain technologies brings the opportunities in overcoming the above challenges of IoT. Ablockchain is essentially a distributed ledger spreading overthe whole distributed system. With the decentralized consensus, blockchains can enable a transaction to occur and bevalidated in a mutually-distrusted distributed system withoutthe intervention of the trusted third party. Unlike incumbentCorresponding authors: Zibin Zheng and Yan Zhang.H.-N. Dai is with Faculty of Information Technology, Macau University ofScience and Technology, Macau (email: hndai@ieee.org).Z. Zheng is with School of Data and Computer Science, Sun Yat-senUniversity, China (email: zhzibin@mail.sysu.edu.cn).Y. Zhang is with Department of Informatics, University of Oslo, Norway.He is also with Simula Metropolitan Center for Digital Engineering, Norway(email: yanzhang@ieee.org).transaction-management systems where the centralized agencyneeds to validate the transaction, blockchains can achieve thedecentralized validation of transactions, thereby greatly savingthe cost and mitigating the performance bottleneck at the central agency. Moreover, each transaction saved in blockchainsis essentially immutable since each node in the network keepsall the committed transactions in the blockchain. Meanwhile,crytographic mechanisms (such as asymmetric encryption algorithms, digital signature and hash functions) guarantee theintegrity of data blocks in the blockchains. Therefore, theblockchains can ensure non-repudiation of transactions. Inaddition, each transaction in blockchains is traceable to everyuser with the attached historic timestamp.Blockchain is essentially a perfect complement to IoT withthe improved interoperability, privacy, security, reliability andscalability. In this paper, we investigate a new paradigm ofintegrating blockchain with IoT. We name such synthesisof blockchain and IoT as Blockchain of Things (BCoT). Inparticular, BCoT has the following merits: Interoperability across IoT devices, IoT systems andindustrial sectors, where the interoperability is the abilityof interacting with physical systems and exchanginginformation between IoT systems. It can be achievedthrough the blockchain-composite layer built on top of anoverlay peer-to-peer (P2P) network with uniform accessacross different IoT systems.Traceability of IoT data, where the traceability is thecapability of tracing and verifying the spatial and temporal information of a data block saved in the blockchain.Each data block saved in a blockchain is attached with ahistoric timestamp consequently assuring the data traceability.Reliability of IoT data is the quality of IoT data beingtrustworthy. It can be ensured by the integrity enforced bycrytographic mechanisms including asymmetric encryption algorithms, hash functions and digital signature, allof which are inherent in blockchains.Autonomic interactions of IoT system refer to the capability of IoT systems interacting with each other without theintervention of a trusted third party. This autonomy can beachieved by smart contracts enabled by blockchains. Inparticular, contract clauses embedded in smart contractswill be executed automatically when a certain conditionis satisfied (e.g., the user breaching the contract will bepunished with a fine automatically).Though BCoT can benefit IoT, there are also a number ofchallenges to be addressed before the potentials of BCoT canbe fully unleashed. Therefore, this paper aims to present an indepth survey on the state-of-the-art advances, challenges andopen research issues in BCoT.

2A. Comparison between this paper and existing surveysThere are several published papers discussing the convergence of blockchain with IoT. For example, the work of[2] presents a smart home application of using blockchainsfor IoT. Zhang and Wen [3] proposed a business model tosupport P2P trading based on smart contracts and blockchains.However, these studies are too specific to a certain scenarioof incorporating blockchain with IoT (e.g., a smart homeapplication).Recently, several surveys on the convergence of blockchainwith IoT have been published. In particular, [4] gives asystematic literature review on blockchain for IoT with thecategorization of a number of use cases. The work of [5]presents a survey on IoT security and investigates the potentials of blockchain technologies as the solutions. Reynaet al. [6] investigated the possibility and research issues ofintegrating blockchain with IoT. The work of [7] presents areview on integrating blockchain with IoT in the applicationaspect. Ref. [8] attempted to give a comprehensive surveyon application of blockchain in IoT. The work of [9] givesa categorization of applications of blockchain for IoT.However, most of the existing surveys suffer from the following limitations: 1) there is no general architecture proposedfor BCoT; 2) there is no study explicitly discussing blockchainfor 5G beyond networks for IoT (however, this topic is of greatimportance for the development of IoT); 3) other importantissues like life cycle of smart contracts are missing in most ofthe existing surveys.B. ContributionsIn view of prior work, we aim to (i) provide a conceptual introduction on IoT and blockchain technologies, (ii)present in-depth analysis on the potentials of incorporatingblockchains into IoT and (iii) give insightful discussions oftechnical challenges enabling BCoT. In summary, the maincontributions of this paper are highlighted as follows:1) A brief introduction on IoT is first given and thenaccompanied by a summary of key characteristics of IoT.Meanwhile, research challenges of IoT are outlined.2) An overview of key blockchain technologies isthen given with a summary of key characteristicsof blockchains and a taxonomy of the incumbentblockchain systems.3) The core part of this paper is focused on the convergenceof blockchain and IoT. In this respect, the opportunitiesof integrating blockchain with IoT are first discussed. Anarchitecture of BCoT is then proposed and illustrated.4) The 5G-beyond networks play an important role in constructing the infrastructure for BCoT. Research issuesabout blockchain for 5G-beyond networks in IoT arealso discussed.5) Furthermore, this paper summarizes the applications ofBCoT and outlines the open research issues in BCoT.The remainder of the paper is organized as follows. SectionII first presents an overview on IoT. Section III then givesthe introduction of blockchain technology. The convergenceof blockchain and IoT is discussed in Section IV. SectionV discusses the research issues about blockchain for 5Gbeyond networks. Section VI next summarizes the applicationsof BCoT. Open research issues are discussed in Section VII.Finally, the paper is concluded in Section VIII.II. I NTERNET OF T HINGSIn this section, we briefly introduce Internet of Things (IoT)in Section II-A and summarize the challenges of IoT in SectionII-B.A. Introduction to Internet of ThingsToday’s industry is experiencing a paradigm shift fromconventional computer-aided industry to smart industry drivenby recently advances in Internet of Things (IoT) and BigData Analytics (BDA). During this evolution, IoT plays acritical role of bridging the gap between the physical industrialenvironment and the cyberspace of computing systems whileBDA can help to extract hidden values from massive IoT dataso as to make intelligent decisions.IoT is essentially a network of smart objects (i.e., things)with provision of various industrial services. A typical IoTsystem consists of the following layered sub-systems (frombottom to up) as shown in Fig. 1: Perception Layer: There is a wide diversity of IoT devicesincluding sensors, actuators, controllers, bar code/QuickResponse Code (QR Code) tags, RFID tags, smart metersand other wireless/wired devices. These devices can senseand collect data from the physical environment. Meanwhile, some of them (like actuators and controllers) canmake actions on the environment. Communication Layer: Various wireless/wired devicessuch as sensors, RFIDs, actuators, controllers and othertags can then connect with IoT gateways, WiFi AccessPoints (APs), small base stations (BS) and macro BSto form an industrial network. The network connectionis enabled by a diverse of communication protocolssuch as Bluetooth, Near Field Communications (NFC),Low-power Wireless Personal Area Networks (6LoWPAN), Wireless Highway Addressable Remote Transducer (WirelessHART) [10], Low Power Wide Area Networks (LPWAN) technologies including Sigfox, LoRa,Narrowband IoT (NB-IoT) and industrial Ethernet [11]. Industrial Applications: IoT can be widely used to support a number of industrial applications. The typical industrial applications include manufacturing, supply chain,food industry, smart grid, health care and internet ofvehicles.B. Challenges of Internet of ThingsIn this paper, we mainly focus on Industrial IoT. We denoteIndustrial IoT by IoT thereafter without loss of generality.The IoT ensures the connection of various things (smartobjects) mounted with various electronic or mechanic sensors,actuators and software systems which can sense and collectinformation from the physical environment and then makeactions on the physical environment. The unique features of

ayerSupply chainFood IndustryHealth careSmart gridInternet of VehiclesSmall BSMacro BSBluetoothIoT gatewaySmall BSWiFi APWiFi APPerceptionlayerSensorMeter SurveillancecameraRobot arm QR code Bar code Panel PC Portable PCs ReaderFig. 1. Internet of Things (IoT) consists of perception layer, communicationlayer and industrial applicationsIoT pose a number of research challenges exhibiting in thefollowing aspects. Heterogeneity of IoT systems exhibits in the heterogeneous IoT devices, heterogeneous communication protocols and heterogeneous IoT data types (i.e., structured,semi-structured and nonstructured). The heterogeneity isalso the root of other challenges such as interoperability,privacy and security (to be explained as follows).Complexity of networks. There are a number of communication/network protocols coexisting in IoT. Typicalnetwork protocols include NFC, Bluetooth, 6LoWPAN,WirelessHART, Sigfox, LoRa and NB-IoT, all of whichoffer different network services. For example, 6LoWPANand WirelessHART have typically short communicationcoverage (e.g., less than 100 meters) while LPWANtechnologies can provide the coverage from 1km to 10km [12], [13].Poor interoperability is the capability of IoT systems(both hardware and software) to exchange, make use ofinformation and collaborate with each other. Due to thedecentralization of IoT systems and the heterogeneityof IoT systems, it is challenging to exchange the databetween different industrial sectors, strategic centers, IoTsystems. As a result, the interoperability of IoT is difficultto be achieved.Resource constraints of IoT devices. IoT devices suchas sensors, actuators, RFID tags and smart meters sufferfrom limited resources including computing resource,storage resource and battery power. For example, thereis no battery power for passive RFID tags that can onlyharvest the energy from RFID readers or from ambientenvironment [14]. Moreover, the resource constraints alsoresult in the vulnerability of IoT devices to maliciousattacks.Privacy vulnerability. Privacy is to guarantee the appropriate usage of IoT data while there is no disclosureof user private information without user consent. It ischallenging to preserve data privacy in IoT due to thecomplexity and the decentralization of IoT systems, theheterogeneity of IoT systems. Moreover, it becomes atrend to integrate IoT with cloud computing since cloudcomputing can empower IoT with extra computing andstorage capabilities. However, uploading the confidentialIoT data to the third-party cloud servers may also com-promise the vulnerable privacy of IoT [15].Security vulnerability. The decentralization and the heterogeneity of IoT systems also result in the difficulty inensuring the security of IoT while the security is extremely important for an enterprise. The typical solutionssuch as authentication, authorization and communicationencryption may not be appropriate to IoT due to the difficulty in implementing the security countermeasures inresource-constrained IoT systems. Moreover, IoT systemsare also vulnerable to malicious attacks due to the failureof security firmware updates in time [16].Discussion. Some intrinsic limitations of IoT can be overcome via recent ICT advances. For example, ambient backscatter assisted communications [14] can help IoT nodes obtainextra energy from ambience. Meanwhile, mobile edge computing can extend the capability of IoT nodes via offloadingthe computationally-intensive tasks to edge servers [17]. Moreover, the recent advances in blockchain technologies offer potential solutions to the challenges such as poor interoperability,privacy and security vulnerabilities. In addition, blockchainis also beneficial to improve heterogeneity of IoT systems.We will discuss these opportunities brought by blockchainto IoT in Section IV-A after giving a briefing on blockchaintechnologies in Section III. III. B LOCKCHAIN T ECHNOLOGIESIn this section, we first give an overview on blockchain technologies in Section III-A, then summarize the key blockchaincharacteristics in Section III-B and present a taxonomy ofblockchain platforms in Section III-D.A. Overview of Blockchain Technologies1) Blockchain: A blockchain is essentially a distributedledger spreading over the whole blockchain system [18].Fig. 2 shows an exemplary blockchain consisting of a number of consecutively-connected blocks. Each block (with theexception of the first block) in a blockchain points to itsimmediately-previous block (called parent block) via an inverse reference that is essentially the hash value of the parentblock. For example, block i contains the hash of block i 1as shown in Fig. 2. The first block of a blockchain is calledthe genesis block having no parent block. In particular, ablock structure consists of the following information: 1) blockversion (indicating the validation rules to follow), 2) the hashof parent block, 3) Timestamp recording the current time inseconds, 4) Nonce staring from 0 and increasing for every hashcalculation, 5) the number of transactions, 6) MerkleRoot (i.e.,the hash value of the root of a Merkel tree with concatenatingthe hash values of all the transactions in the block) as shownin the detailed view of Fig. 2.A blockchain is continuously growing with the transactionsbeing executed. When a new block is generated, all the nodesin the network will participate in the block validation. Avalidated block will be automatically appended at the endof the blockchain via the inverse reference pointing to theparent block. In this manner, any unauthorized alterations onthe previously-generated block can be easily detected since the

4Hash of block j 1TimestampNonceHash of block jTimestampMerkleRootMerkle treestructureTX 1TX 2TX nBlock jMerkleRootNonceMerkleRootTX 1TX 2TX nBlock j 1A shorter chain is desertedHash of block 0TimestampNoncehash(TX1, TX2)hash(TX1) hash(TX2)hash(TXn 1, TXn) hash(TXn)Hash of block i 1TimestampMerkleRootTX 1TX 2NonceHash of block iTimestampMerkleRootTX nTX 1TX 2 TX nTX 1TX 2Block iGenesis blockNonceHash of block m 1TimestampMerkleRootTX nTX 1TX 2Block i 1NonceMerkleRootTX nTX 1TX 2TX nBlock mDetailed viewFig. 2. Blockchain consists of a number of consecutively-connected blocks and the detailed view represents a Merkle tree structure (where TX represents atransaction)hash value of the tampered block is significantly different fromthat of the unchanged block. Moreover, since the blockchainis distributed throughout the whole network, the tamperingbehavior can also be easily detected by other nodes in thenetwork.Data integrity guarantee in blockchain. Blockchains leverage cryptographic techniques to guarantee data integrity. Inparticular, there are two mechanisms in blockchains to ensurethe data integrity: 1) an ordered link list structure of blocks, inwhich each newly-appended block must include the hash valueof the preceding block. In this manner, a falsification on anyof the previous blocks will invalidate the subsequent blocks.2) Merkel Tree structure, in which each block contains a roothash of a Merkel tree of all the transactions. Each non-leavenode is essentially a hash value of two concatenated values ofits two children. Therefore, a Merkel tree is typically a binarytree. In this way, any falsification on the transactions will leadto a new hash value in the above layer, consequently resultingin a falsified root hash. As a result, any falsification can beeasily detected.2) Consensus algorithms: One of the advantages ofblockchain technologies is to validate the block trustfulness ina decentralized trustless environment without the necessity ofthe trusted third-party authority. In distributed environment, itis challenging to reach a consensus on a newly-generated blockas the consensus may be biased in favor of malicious nodes.This trustfulness validation in a decentralized environmentcan be achieved by consensus algorithms. Typical consensusalgorithms include proof of work (PoW), proof of stake (PoS)and practical byzantine fault tolerance (PBFT) [19].Take PoW as an example. The creation of a newly-generatedblock is equivalent to the solution of a computationallydifficult problem. This computationally-difficult problem (akaa puzzle) can nevertheless be verifiable without difficulty[20]. Each node in the distributed peer-to-peer (P2P) networkcan participate in the validation procedure. The first nodewho solves the puzzle can append the validated block to theblockchain; this node is also called a miner. It then broadcaststhe validation results in the whole blockchain system, consequently other nodes validating and updating the new results inthe blockchain. A small portion of bonus will then be givento this node as a compensation for solving the puzzle.Discrepancy solution. In a distributed system, multiplenodes may validate blocks nearly at the same time. Meanwhile,the network latency can somehow result in bifurcated (orforked) chains at the same time. To solve the discrepancy, mostof existing blockchain systems typically maintain the longestchain as the valid chain because the longest chain implies themost tolerant of being compromised by adversaries. If so, ashorter chain is automatically deserted (i.e., the blue dash-linebox as shown in Fig. 2) and the future validation work willcontinue on the longest chain.Trustfulness of PoW. The trustfulness of PoW is based onthe assumption that a majority of blockchain nodes is trustful.Generally, 51% of computational capability is regarded asthe threshold of PoW being tolerant of malicious attacks.The incentive mechanisms can encourage miners to be honestagainst compromising. Meanwhile, solving the puzzle typically requires extensive computing power. The probability ofsolving the puzzle at a miner is often proportional to thecomputational capability and resource of a miner [21].PoW schemes require extensive computation to solve thepuzzle, thereby resulting in the extensive energy consumption.Unlike PoW, PoS requires the proof of ownership to validatethe trustfulness of a block since the users with more cryptocurrencies (i.e., more stakes) are more trustful than thosewith fewer cryptocurrencies. In PBFT, each node who has theequal right to vote for the consensus will send its voting stateto other nodes. After multiple rounds of voting procedure, theconsensus reaches.We roughly categorize typical consensus algorithms intotwo types: 1) Probabilistic consensus algorithms and 2) Deterministic consensus algorithms. Table I gives the taxonomy.Probabilistic consensus algorithms including PoW, PoS andDelegated proof of stake (DPOS) typically first save thevalidated block to the chain and then seek the consensus ofall the nodes while deterministic consensus algorithms firstconsent to the block and then saved the validated block tothe chain. Moreover, probabilistic consensus algorithms oftenresult in multiple bifurcate chains and the discrepancy issolved by choosing the longest chain. In contrast, deterministicconsensus algorithms solve the discrepancy through multiple

5TABLE I1 Transaction is initiatedTAXONOMY OF TYPICAL CONSENSUS ALGORITHMSBobAliceProbabilistic ConsensusDeterministic ConsensusConsensusprocedureSaving first and then consentingConsenting first and smAdversarytoleranceChoosing the longest chainwhen there are multipleforked chainsTransaction2 The node broadcasts thetransaction to the P2P network4The validated transaction isthen appended to othertransactions to form a blockTX 1TX 2Forming ablockVoting to solve discrepancythroughmultiplecommunication-roundsTX nnewly addedHash of block i 13 The P2P network validatesTimestampNoncethe transcactionMerkleRoot 50% computing or stakes 1/3 voting nodesTX 1TX 2TX nBlock iComplexityHighcomputationalcomplexityHigh network-complexityExamplesPoW, PoS, DPOSPBFT and PBFT variants,Tendermintrounds of communications in the overlay network.There are many attempts to improve incumbent consensusalgorithms, such as Ripple [22], Algorand [23], Tendermint,proof of authority (PoA) [24], proof of elapsed time (PoET)[25]. Instead of choosing single consensus algorithm, there isa trend of integrating multiple consensus algorithms to fulfillthe requirements from different applications.3) Working flow of blockchains: We next show how ablockchain works in an example. Take a money transfer asan example as shown in Fig. 3. Alice wants to transfer anamount of money to Bob. She first initiates the transactionat a computer through her Bitcoin wallet (i.e., Step 1 ).The transaction includes the information such as the sender’swallet, the receiver’s address and the amount of money. Thetransaction is essentially signed by Alice’s private key and canbe accessible and verifiable by other users via Alice’s publickey thereafter. Then the computer broadcasts the initiatedtransaction to other computers (or nodes) in the P2P network(i.e., Step 2 ). Next, a validated transaction is then appendedto the end of the chain of transactions consequently forming anew block in the blockchain once a miner successfully solvesthe puzzle (i.e., Step 3 ). Finally, every node saves a replicaof the updated blockchain when the validated transaction isappended to the blockchain (i.e., Step 4 ).Fig. 3. B. Key Characteristics of BlockchainIn summary, blockchain technologies have the following keycharacteristics. Decentralization. In traditional transaction managementsystems, the transaction validation has been conductedthrough a trusted agency (e.g., a bank or government).This centralization manner inevitably results in the extracost, the performance bottleneck and the single-pointfailure (SPF) at centralized service providers. In contrast,blockchain allows the transaction being validated betweentwo peers without the authentication, jurisdiction or intervention done by the central agency, thereby reducingthe service cost, mitigating the performance bottleneck,lowering the SPF risk. Working flow of blockchainsImmutability. A blockchain consists of a consecutivelylinked chain of blocks, in which each link is essentiallyan inverse hash point of previous block. Any modificationon the previous block invalidates all the consequentlygenerated blocks. Meanwhile, the root hash of the Merkletree saves the hash of all the committed transactions. Any(even tiny) changes on any transactions generates a newMerkle root. Therefore, any falsification can be easilydetected. The integration of the inverse hash point andthe Merkle tree can guarantee the data integrity.Non-repudiation. Recall the fact that the private key isused to put the signature to the transaction, which canthen be accessible and verified by others via the corresponding public key. Therefore, the crytographicallysigned transaction cannot be denied by the transactioninitiator.Transparency. For most of public blockchain systems(like Bitcoin and Ethereum), every user can access andinteract with the blockchain network with an equal right.Moreover, every new transaction is validated and savedin the blockchain, consequently being available for every user. Therefore, the blockchain data is essentiallytransparent to every user who can access and verify thecommitted transactions in the blockchain.Pseudonymity. Despite the transparency of blockchaindata, blockchain systems can preserve a certain level ofthe privacy via making blockchain addresses anonymous.For example, the work of [26] presents an applicationof blockchain to preserve the privacy of personal data.However, blockchain can only preserve the privacy at acertain level since blockchain addresses are essentiallytraceable by inference [8]. For example, it is shown in[27] that the analysis of blockchain data can help to detectfraud and illegal transactions. Therefore, blockchain canonly preserve the pseudonymity instead of full privacy.Traceability. Each transaction saved in the blockchain isattached with a timestamp (recorded when the transactionoccurs). Therefore, users can easily verify and tracethe origins of historical data items after analyzing theblockchain data with corresponding timestamps.

6CreationDeploymentNegotiation Smart contractDeployment Freezing assetsExecutionEvaluationWrite toblockchainBlock 0Block 1Auto-executeWrite toblockchainBlock iBlock i 1CompletionUpdating statesUnfreezing assetsWrite toblockchainBlock mBlockchainFig. 4. Life cycle of smart contracts consisting of four consecutive phases:Creation, Deployment, Execution and CompletionC. Smart ContractSmart contracts are a great advance for blockchain technology [28]. In 1990s, smart contracts were proposed as acomputerized transaction protocol that executes the contractualterms of an agreement [29]. Contractual clauses that areembedded in smart contracts will be enforced automaticallywhen a certain condition is satisfied (e.g., one party whobreaches the contract will be punished automatically).Blockchains are enabling smart contracts. Essentially, smartcontracts are implemented on top of blockchains. The approved contractual clauses are converted into executable computer programs. The logical connections between contractualclauses have also been preserved in the form of logical flowsin programs (e.g., if-else-if statement). The execution ofeach contract statement is recorded as an immutable transaction stored in the blockchain. Smart contracts guarantee appropriate access control and contract enforcement. In particular,developers can assign access permission for each function inthe contract. Contract enforcement ensures that the contractexecution is deterministic. Once any conditions in a smart contract are satisfied, the triggered statement will automaticallyexecute the corresponding function in a predictable manner.For example, Alice and Bob agree on the penalty of violatingthe contract. If Bob breaches the contract, the correspondingpenalty (as specified in the contract) will be automatically paidfrom Bob’s deposit.The whole life cycle of smart contracts consists of fourconsecutive phases as illustrated in Fig. 4:1) Creation of smart contracts. Several involved partiesfirst negotiate on the obligations, rights and prohibitionson contracts. After multiple rounds of discussions andnegotiations, an agreement can reach. Lawyers or counselors will help parties to draft an init

Blockchain is essentially a perfect complement to IoT with the improved interoperability, privacy, security, reliability and . privacy an

Related Documents:

Bruksanvisning för bilstereo . Bruksanvisning for bilstereo . Instrukcja obsługi samochodowego odtwarzacza stereo . Operating Instructions for Car Stereo . 610-104 . SV . Bruksanvisning i original

Blockchain Technology in Industrial Internet of Things Applications John Soldatos Head of IoT Group, Athens Information Technology jsol@ait.gr. IoT Week, Aarhus, Denmark, June, 20th, 2019 Dispelling the Hype: When (not) to use Blockchain in IIoT When to use blockchain technology

10 tips och tricks för att lyckas med ert sap-projekt 20 SAPSANYTT 2/2015 De flesta projektledare känner säkert till Cobb’s paradox. Martin Cobb verkade som CIO för sekretariatet för Treasury Board of Canada 1995 då han ställde frågan

service i Norge och Finland drivs inom ramen för ett enskilt företag (NRK. 1 och Yleisradio), fin ns det i Sverige tre: Ett för tv (Sveriges Television , SVT ), ett för radio (Sveriges Radio , SR ) och ett för utbildnings program (Sveriges Utbildningsradio, UR, vilket till följd av sin begränsade storlek inte återfinns bland de 25 största

Hotell För hotell anges de tre klasserna A/B, C och D. Det betyder att den "normala" standarden C är acceptabel men att motiven för en högre standard är starka. Ljudklass C motsvarar de tidigare normkraven för hotell, ljudklass A/B motsvarar kraven för moderna hotell med hög standard och ljudklass D kan användas vid

LÄS NOGGRANT FÖLJANDE VILLKOR FÖR APPLE DEVELOPER PROGRAM LICENCE . Apple Developer Program License Agreement Syfte Du vill använda Apple-mjukvara (enligt definitionen nedan) för att utveckla en eller flera Applikationer (enligt definitionen nedan) för Apple-märkta produkter. . Applikationer som utvecklas för iOS-produkter, Apple .

www.sheppardmullin.com Blockchain Games and Collectibles - Patents and Other Legal Issues March 2019 By: James G. Gatto 1. Blockchain Games and Collectibles Are on the Rise – The use of blockchain (or distributed ledger) technology for games (a.k.a blockchain ga

AWS Blockchain Templates helps you quickly create and deploy blockchain networks on AWS using different blockchain frameworks. Blockchain is a decentralized database technology that maintains a continually growing set of transactions and smart contracts hardened against tampering and revision