error_outline You can access the new MDPI.com website here. Explore and share your feedback with us.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (77)

Search Parameters:
Keywords = proof-of-work (PoW)

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
26 pages, 3742 KB  
Article
A Network-Aware and Reputation-Driven Scalable Blockchain Consensus
by Jiayong Chai, Jun Guo, Muhua Wei, Mo Chen and Song Luo
Appl. Sci. 2025, 15(24), 13181; https://doi.org/10.3390/app152413181 - 16 Dec 2025
Viewed by 306
Abstract
Blockchain systems have been widely adopted in today’s society, with consensus algorithms serving as their core component to ensure all participants in the network agree on a specific data state. Existing consensus algorithms such as Proof of Work (PoW), Proof of Stake (PoS), [...] Read more.
Blockchain systems have been widely adopted in today’s society, with consensus algorithms serving as their core component to ensure all participants in the network agree on a specific data state. Existing consensus algorithms such as Proof of Work (PoW), Proof of Stake (PoS), and the Practical Byzantine Fault-Tolerant Algorithm (PBFT) exhibit certain limitations in terms of scalability, security, and efficiency. To address these limitations, this paper proposes a novel Network-based Reputation Consensus (NRC) algorithm. The main research contributions of this work include the following: (1) An intelligent grouping mechanism that dynamically groups nodes based on network awareness, forming consensus groups with low internal latency and high bandwidth utilization, significantly reducing intra-group communication overhead. (2) A dynamic reputation system incorporating a “diminishing returns” reward function and a “multiplicative penalty” mechanism, effectively incentivizing honest node participation while preventing power monopoly. (3) A two-phase model of “intra-group BFT consensus + global communication committee ordering” that decomposes complex global consensus into parallel intra-group processing and coordination among a small set of elite nodes, thereby drastically improving efficiency. (4) Comprehensive simulations comparing the NRC algorithm with mainstream consensus algorithms, demonstrating its superior performance in communication overhead, throughput, latency, and tolerance to malicious nodes, thereby laying the foundation for large-scale applications. Full article
(This article belongs to the Section Computing and Artificial Intelligence)
Show Figures

Figure 1

32 pages, 3108 KB  
Article
Blockchain-Integrated Secure Authentication Framework for Smart Grid IoT Using Energy-Aware Consensus Mechanisms
by Omar Abdullah Saleh and Mesut Cevik
Sensors 2025, 25(21), 6622; https://doi.org/10.3390/s25216622 - 28 Oct 2025
Cited by 2 | Viewed by 1079
Abstract
Integrating IoT devices into smart grids raises some hard problems related to safe data sharing, the ability to grow, and energy use. Blockchain provides a safe way to check identities without a central authority. Typical ways to confirm transactions, like Proof-of-Work (PoW), use [...] Read more.
Integrating IoT devices into smart grids raises some hard problems related to safe data sharing, the ability to grow, and energy use. Blockchain provides a safe way to check identities without a central authority. Typical ways to confirm transactions, like Proof-of-Work (PoW), use a lot of power, making them bad for devices that cannot use much energy. This study introduces a safe authentication system using Blockchain, a Deep Neural Network (DNN), and a power-saving way to confirm transactions (EACM). The system picks validators based on how much power they have left and their trust scores to save power during confirmation. Using the IoT-Enabled Smart Grid Dataset, simulations showed a transaction speed of 372 TPS, which is 32% better than normal methods. The system correctly authenticates 98.69% of the time, with a confirmation delay of 5.9 milliseconds and an 18% drop in validator node energy use. Also, the system spots 98.4% of unauthorized access tries, with a false acceptance rate (FAR) of 1.7% and a false rejection rate (FRR) of 0.31%. These outcomes prove the system’s ability to offer safe, fast, and energy-saving authentication for big, real-time Smart Grid IoT setups. Full article
(This article belongs to the Special Issue AI-Driven Security and Privacy for IIoT Applications)
Show Figures

Figure 1

26 pages, 1325 KB  
Article
From Bribery–Stubborn Mining to Leading Hidden Triple-Fork Strategies for Incentive Optimization in PoW Blockchains
by Weijie Li, Shan Jiang, Bina Ni, Weipeng Liang and Yu Wang
Symmetry 2025, 17(10), 1618; https://doi.org/10.3390/sym17101618 - 30 Sep 2025
Viewed by 812
Abstract
Proof-of-Work (PoW) blockchains with symmetric consensus face threats such as selfish mining, bribery mining, block withholding, and replay attacks. This paper introduces a hybrid attack, Bribery–Stubborn Mining (BSbM), which integrates stubborn mining’s delayed chain publication with bribery incentives to recruit miners during forks. [...] Read more.
Proof-of-Work (PoW) blockchains with symmetric consensus face threats such as selfish mining, bribery mining, block withholding, and replay attacks. This paper introduces a hybrid attack, Bribery–Stubborn Mining (BSbM), which integrates stubborn mining’s delayed chain publication with bribery incentives to recruit miners during forks. Simulation experiments confirm that BSbM yields additional revenue. To obtain even higher revenue, we propose Leading Hidden Bribery–Stubborn Mining (LHBSbM) based on BSbM. By concealing and delaying broadcasts, LHBSbM constructs a triple fork, maintaining three chains at the same height. Upon revealing the private chain, two public blocks can be isolated, breaking the single-block limit of double-fork attacks. Theoretical analysis shows that LHBSbM raises the attacker’s maximum effective block rate from α/(1α) to α/(1αβ). Experimental results indicate that, under ideal conditions (r=0), BSbM becomes profitable once the attacker’s hash rate (α) exceeds approximately 34% and further confirm that, under certain conditions, LHBSbM nearly doubles isolated blocks compared to BSbM, yielding greater profits. Finally, potential defenses against such hybrid attacks are discussed, offering new insights for blockchain security. Full article
(This article belongs to the Special Issue Applications Based on Symmetry in Adversarial Machine Learning)
Show Figures

Figure 1

22 pages, 1195 KB  
Article
Private Blockchain-Driven Digital Evidence Management Systems: A Collaborative Mining and NFT-Based Framework
by Butrus Mbimbi, David Murray and Michael Wilson
Information 2025, 16(7), 616; https://doi.org/10.3390/info16070616 - 17 Jul 2025
Viewed by 2698
Abstract
Secure Digital Evidence Management Systems (DEMSs) ae crucial for law enforcement agencies, because traditional systems are prone to tampering and unauthorised access. Blockchain technology, particularly private blockchains, offers a solution by providing a centralised and tamper-proof system. This study proposes a private blockchain [...] Read more.
Secure Digital Evidence Management Systems (DEMSs) ae crucial for law enforcement agencies, because traditional systems are prone to tampering and unauthorised access. Blockchain technology, particularly private blockchains, offers a solution by providing a centralised and tamper-proof system. This study proposes a private blockchain using Proof of Work (PoW) to securely manage digital evidence. Miners are assigned specific nonce ranges to accelerate the mining process, called collaborative mining, to enhance the scalability challenges in DEMSs. Transaction data includes digital evidence to generate a Non-Fungible Token (NFT). Miners use NFTs to solve the puzzle according to the assigned difficulty level d, so as to generate a hash using SHA-256 and add it to the ledger. Users can verify the integrity and authenticity of records by re-generating the hash and comparing it with the one stored in the ledger. Our results show that the data was verified with 100% precision. The mining time was 2.5 s, and the nonce iterations were as high as 80×103 for d=5. This approach improves the scalability and integrity of digital evidence management by reducing the overall mining time. Full article
(This article belongs to the Special Issue Blockchain and AI: Innovations and Applications in ICT)
Show Figures

Figure 1

42 pages, 6696 KB  
Article
Design, Implementation and Practical Energy-Efficiency Evaluation of a Blockchain Based Academic Credential Verification System for Low-Power Nodes
by Gabriel Fernández-Blanco, Iván Froiz-Míguez, Paula Fraga-Lamas and Tiago M. Fernández-Caramés
Appl. Sci. 2025, 15(12), 6596; https://doi.org/10.3390/app15126596 - 12 Jun 2025
Cited by 4 | Viewed by 1598
Abstract
The educational system manages extensive documentation and paperwork, which can lead to human errors and sometimes abuse or fraud, such as the falsification of diplomas, certificates or other credentials. In fact, in recent years, multiple cases of fraud have been detected, representing a [...] Read more.
The educational system manages extensive documentation and paperwork, which can lead to human errors and sometimes abuse or fraud, such as the falsification of diplomas, certificates or other credentials. In fact, in recent years, multiple cases of fraud have been detected, representing a significant cost to society, since fraud harms the trustworthiness of certificates and academic institutions. To tackle such an issue, this article proposes a solution aimed at recording and verifying academic records through a decentralized application that is supported by a smart contract deployed in the Ethereum blockchain and by a decentralized storage system based on Inter-Planetary File System (IPFS). The proposed solution is evaluated in terms of performance and energy efficiency, comparing the results obtained with a traditional Proof-of-Work (PoW) consensus protocol and the new Proof-of-Authority (PoA) protocol. The results shown in this paper indicate that the latter is clearly greener and demands less CPU load. Moreover, this article compares the performance of a traditional computer and two Single-Board Computers (SBCs) (a Raspberry Pi 4 and an Orange Pi One), showing that is possible to make use of the latter low-power devices to implement blockchain nodes but at the cost of higher response latency. Furthermore, the impact of Ethereum gas limit is evaluated, demonstrating its significant influence on the blockchain network performance. Thus, this article provides guidelines, useful practical evaluations and key findings that will help the next generation of green blockchain developers and researchers. Full article
Show Figures

Figure 1

32 pages, 694 KB  
Article
Preserving Whistleblower Anonymity Through Zero-Knowledge Proofs and Private Blockchain: A Secure Digital Evidence Management Framework
by Butrus Mbimbi, David Murray and Michael Wilson
Blockchains 2025, 3(2), 7; https://doi.org/10.3390/blockchains3020007 - 17 Apr 2025
Viewed by 5677
Abstract
This research presents a novel framework and experimental results that combine zero-knowledge proofs (ZKPs) with private blockchain technology to safeguard whistleblower privacy while ensuring secure digital evidence submission and verification. For example, whistleblowers involved in corporate fraud cases can submit sensitive financial records [...] Read more.
This research presents a novel framework and experimental results that combine zero-knowledge proofs (ZKPs) with private blockchain technology to safeguard whistleblower privacy while ensuring secure digital evidence submission and verification. For example, whistleblowers involved in corporate fraud cases can submit sensitive financial records anonymously while maintaining the credibility of the evidence. The proposed framework introduces several key innovations, including a private blockchain implementation utilising proof-of-work (PoW) consensus to ensure immutable storage and thorough scrutiny of submitted evidence, with mining difficulty dynamically aligned to the sensitivity of the data. It also features an adaptive difficulty mechanism that automatically adjusts computational requirements based on the sensitivity of the evidence, providing tailored protection levels. In addition, a unique two-phase validation process is incorporated, which generates a digital signature from the evidence alongside random challenges, significantly improving security and authenticity. The integration of ZKPs enables iterative hash-based verification between parties (Prover and Verifier) while maintaining the complete privacy of the source data. This research investigates the whistleblower’s niche in traditional digital evidence management systems (DEMSs), prioritising privacy without compromising evidence integrity. Experimental results demonstrate the framework’s effectiveness in preserving anonymity while assuring the authenticity of the evidence, making it useful for judicial systems and organisations handling sensitive disclosures. This paper signifies notable progress in secure whistleblowing systems, offering a way to juggle transparency with informant confidentiality. Full article
(This article belongs to the Special Issue Feature Papers in Blockchains 2025)
Show Figures

Figure 1

26 pages, 6981 KB  
Article
A Hybrid Blockchain Solution for Electric Vehicle Energy Trading: Balancing Proof of Work and Proof of Stake
by Sid-Ali Amamra
Energies 2025, 18(7), 1840; https://doi.org/10.3390/en18071840 - 5 Apr 2025
Cited by 1 | Viewed by 2033
Abstract
This research presents an innovative blockchain-based solution for the charging and energy trading of electric vehicles (EVs). By combining the strengths of two prominent consensus mechanisms, Proof of Work (PoW) and Proof of Stake (PoS), the proposed system balances security, decentralization, and energy [...] Read more.
This research presents an innovative blockchain-based solution for the charging and energy trading of electric vehicles (EVs). By combining the strengths of two prominent consensus mechanisms, Proof of Work (PoW) and Proof of Stake (PoS), the proposed system balances security, decentralization, and energy efficiency. PoW secures the blockchain, while PoS enhances energy efficiency and scalability, key factors in meeting the growing demand for EV infrastructure. The system’s decentralized nature allows for EV owners, charging stations, and stakeholders to interact and transact transparently, without relying on centralized entities. The research conducts a comprehensive simulation to assess the performance of the proposed hybrid blockchain model, demonstrating significant improvements in cost-effectiveness, scalability, and energy management. Additionally, dynamic pricing mechanisms within the blockchain enable real-time energy trading, optimizing charging times and balancing grid demand efficiently. Through the use of smart contracts, automated pricing adjustments, and incentive-driven user behaviors, the proposed system paves the way for more sustainable, cost-effective, and efficient energy solutions in the future. Full article
Show Figures

Figure 1

27 pages, 1376 KB  
Article
Proof-of-Friendship Consensus Mechanism for Resilient Blockchain Technology
by Jims Marchang, Rengaprasad Srikanth, Solan Keishing and Indranee Kashyap
Electronics 2025, 14(6), 1153; https://doi.org/10.3390/electronics14061153 - 14 Mar 2025
Cited by 2 | Viewed by 2054
Abstract
Traditional blockchain consensus mechanisms, such as Proof of Work (PoW) and Proof of Stake (PoS), face significant challenges related to the centralisation of validators and miners, environmental impact, and trustworthiness. While PoW is highly secure, it is energy-intensive, and PoS tends to favour [...] Read more.
Traditional blockchain consensus mechanisms, such as Proof of Work (PoW) and Proof of Stake (PoS), face significant challenges related to the centralisation of validators and miners, environmental impact, and trustworthiness. While PoW is highly secure, it is energy-intensive, and PoS tends to favour wealthy stakeholders, leading to validator centralisation. Existing mechanisms lack fairness, and the aspect of sustainability is not considered. Moreover, it fails to address social trust dynamics within validator selection. To bridge this research gap, this paper proposes Proof of Friendship (PoF)—a novel consensus mechanism that leverages social trust by improving decentralisation, enhancing fairness and sustainability among the validators. Unlike traditional methods that rely solely on computational power or financial stakes, PoF integrates friendship-based trust scores with geo-location diversity, transaction reliability, and sustainable energy adoption. By incorporating a trust graph, where validators are selected based on their verified relationships within the network, PoF mitigates the risks of Sybil attacks, promotes community-driven decentralisation, and enhances the resilience of the blockchain against adversarial manipulation. This research introduces the formal model of PoF, evaluates its security, decentralisation, and sustainability trade-offs, and demonstrates its effectiveness compared to existing consensus mechanisms. Our investigation and results indicate that PoF achieves higher decentralisation, improved trustworthiness, reduced validator monopolisation, and enhanced sustainability while maintaining strong network security. This study opens new avenues for socially aware blockchain governance, making consensus mechanisms more equitable, efficient, and environmentally responsible. This consensus mechanism demonstrates a holistic approach to modern blockchain design, addressing key challenges in trust, performance, and sustainability. The mechanism is tested theoretically and experimentally to validate its robustness and functionality. Processing latency (PL), network latency (NL) [transaction size/network speed], synchronisation delays (SDs), and cumulative delay per transaction are 85 ms, 172 ms, 1802 ms, [PL + NL + SD] 2059 ms, respectively. Full article
(This article belongs to the Special Issue Recent Advances in Information Security and Data Privacy)
Show Figures

Figure 1

24 pages, 7291 KB  
Article
Piranha Foraging Optimization Algorithm with Deep Learning Enabled Fault Detection in Blockchain-Assisted Sustainable IoT Environment
by Haitham Assiri
Sustainability 2025, 17(4), 1362; https://doi.org/10.3390/su17041362 - 7 Feb 2025
Cited by 3 | Viewed by 1632
Abstract
As the acceptance of Internet of Things (IoT) systems quickens, guaranteeing their sustainability and reliability poses an important challenge. Faults in IoT systems can result in resource inefficiency, high energy consumption, reduced security, and operational downtime, obstructing sustainability goals. Thus, blockchain (BC) technology, [...] Read more.
As the acceptance of Internet of Things (IoT) systems quickens, guaranteeing their sustainability and reliability poses an important challenge. Faults in IoT systems can result in resource inefficiency, high energy consumption, reduced security, and operational downtime, obstructing sustainability goals. Thus, blockchain (BC) technology, known for its decentralized and distributed characteristics, can offer significant solutions in IoT networks. BC technology provides several benefits, such as traceability, immutability, confidentiality, tamper proofing, data integrity, and privacy, without utilizing a third party. Recently, several consensus algorithms, including ripple, proof of stake (PoS), proof of work (PoW), and practical Byzantine fault tolerance (PBFT), have been developed to enhance BC efficiency. Combining fault detection algorithms and BC technology can result in a more reliable and secure IoT environment. Thus, this study presents a sustainable BC-Driven Edge Verification with a Consensus Approach-enabled Optimal Deep Learning (BCEVCA-ODL) approach for fault recognition in sustainable IoT environments. The proposed BCEVCA-ODL technique incorporates the merits of the BC, IoT, and DL techniques to enhance IoT networks’ security, trustworthiness, and efficacy. IoT devices have a substantial level of decentralized decision-making capacity in BC technology to achieve a consensus on the accomplishment of intrablock transactions. A stacked sparse autoencoder (SSAE) model is employed to detect faults in IoT networks. Lastly, the Piranha Foraging Optimization Algorithm (PFOA) approach is used for optimum hyperparameter tuning of the SSAE approach, which assists in enhancing the fault recognition rate. A wide range of simulations was accomplished to highlight the efficacy of the BCEVCA-ODL technique. The BCEVCA-ODL technique achieved a superior FDA value of 100% at a fault probability of 0.00, outperforming the other evaluated methods. The proposed work highlights the significance of embedding sustainability into IoT systems, underlining how advanced fault detection can provide environmental and operational benefits. The experimental outcomes pave the way for greener IoT technologies that support global sustainability initiatives. Full article
Show Figures

Figure 1

23 pages, 613 KB  
Article
PROACTION: Profitable Transactions Selection Greedy Algorithm in Rational Proof-of-Work Mining
by Mariano Basile, Giovanni Nardini, Pericle Perazzo and Gianluca Dini
Blockchains 2025, 3(1), 2; https://doi.org/10.3390/blockchains3010002 - 22 Jan 2025
Cited by 1 | Viewed by 2301
Abstract
Despite the many consensus algorithms being used in blockchains, proof of work (PoW) is still the most common nowadays. The state-of-the-art mining strategy for PoW-based blockchain protocols consists of including as many transactions as possible in a block to maximize the block reward. [...] Read more.
Despite the many consensus algorithms being used in blockchains, proof of work (PoW) is still the most common nowadays. The state-of-the-art mining strategy for PoW-based blockchain protocols consists of including as many transactions as possible in a block to maximize the block reward. Unfortunately, this strategy maximizes the block orphaning probability too. Recently, we proposed a rational mining strategy aimed at carefully balancing the trade-off between the block reward and the risk of block orphaning. In this work, we present PROACTION, a PROfitable transACTions selectION greedy algorithm that implements such a strategy. We evaluate the algorithm both analytically and experimentally on Bitcoin by assuming a variable random percentage of winning miners adopting PROACTION. Experiments show that when executing PROACTION, miners gain higher long-term rewards than when using the state-of-the-art strategy. The gain is in the order of the block orphaning probability. This result is particularly relevant for those PoW-based blockchain protocols in which such a probability is significant. Full article
(This article belongs to the Special Issue Feature Papers in Blockchains)
Show Figures

Figure 1

19 pages, 415 KB  
Article
Wireless May Benefit Blockchain
by Seungmo Kim and Junsung Choi
Appl. Sci. 2025, 15(1), 334; https://doi.org/10.3390/app15010334 - 31 Dec 2024
Viewed by 1356
Abstract
Wireless technologies now take every part of one’s everyday life. As such, it will be no longer a surprise if a blockchain system is composed of wirelessly connected nodes. However, wireless communication is known for its inherent unreliability caused by noise, interference, limited [...] Read more.
Wireless technologies now take every part of one’s everyday life. As such, it will be no longer a surprise if a blockchain system is composed of wirelessly connected nodes. However, wireless communication is known for its inherent unreliability caused by noise, interference, limited bandwidth, etc. Motivated by this fundamental problem, this paper investigates the impact of wireless communications on the performance of three representative consensus mechanisms, viz., proof of work (PoW), proof of stake (PoS), and proof of coverage (PoC). It features a comprehensive analytical framework that mathematically derives metrics quantifying the scalability and the level of decentralization of the three consensus mechanisms, constituting a key contribution of this work. The paper then proceeds to present extensive simulation results as a means to confirm the underpinning theoretical findings. Overall, we emphasize that the framework’s holisticity will allow it to be applied to diverse consensus mechanisms. Full article
(This article belongs to the Topic Innovation, Communication and Engineering)
Show Figures

Figure 1

21 pages, 4618 KB  
Article
Towards an Optimized Blockchain-Based Secure Medical Prescription-Management System
by Imen Ahmed, Mariem Turki, Mouna Baklouti, Bouthaina Dammak and Amnah Alshahrani
Future Internet 2024, 16(7), 243; https://doi.org/10.3390/fi16070243 - 9 Jul 2024
Cited by 3 | Viewed by 2764
Abstract
This work introduces a blockchain-based secure medical prescription-management system seamlessly integrated with a dynamic Internet of Things (IoT) framework. Notably, this integration constitutes a pivotal challenge in the arena of resource-constrained IoT devices: energy consumption. The choice of a suitable blockchain consensus mechanism [...] Read more.
This work introduces a blockchain-based secure medical prescription-management system seamlessly integrated with a dynamic Internet of Things (IoT) framework. Notably, this integration constitutes a pivotal challenge in the arena of resource-constrained IoT devices: energy consumption. The choice of a suitable blockchain consensus mechanism emerges as the linchpin in surmounting this hurdle. Thus, this paper conducts a comprehensive comparison of energy consumption between two distinct consensus mechanisms: Proof of Work (PoW) and Quorum-based Byzantine fault tolerance (QBFT). Furthermore, an assessment of the most energy-efficient algorithm is performed across multiple networks and various parameters. This approach ensures the acquisition of reliable and statistically significant data, enabling meaningful conclusions to be drawn about the system’s performance in real-world scenarios. The experimental results show that, compared to the PoW, the QBFT consensus mechanism reduced the energy consumption by an average of 5%. This finding underscores the significant advantage of QBFT in addressing the energy consumption challenges posed by resource-constrained IoT devices. In addition to its inherent benefits of privacy and block time efficiency, the Quorum blockchain emerges as a more sustainable choice for IoT applications due to its lower power consumption. Full article
Show Figures

Figure 1

15 pages, 866 KB  
Data Descriptor
Hardware Trojan Dataset of RISC-V and Web3 Generated with ChatGPT-4
by Victor Takashi Hayashi and Wilson Vicente Ruggiero
Data 2024, 9(6), 82; https://doi.org/10.3390/data9060082 - 19 Jun 2024
Cited by 4 | Viewed by 4371
Abstract
Although hardware trojans impose a relevant threat to the hardware security of RISC-V and Web3 applications, existing datasets have a limited set of examples, as the most famous hardware trojan dataset TrustHub has 106 different trojans. RISC-V specifically has study cases of three [...] Read more.
Although hardware trojans impose a relevant threat to the hardware security of RISC-V and Web3 applications, existing datasets have a limited set of examples, as the most famous hardware trojan dataset TrustHub has 106 different trojans. RISC-V specifically has study cases of three and four different hardware trojans, and no research was found regarding Web3 hardware trojans in modules such as a hardware wallet. This research presents a dataset of 290 Verilog examples generated with ChatGPT-4 Large Language Model (LLM) based on 29 golden models and the TrustHub taxonomy. It is expected that this dataset supports future research endeavors regarding defense mechanisms against hardware trojans in RISC-V, hardware wallet, and hardware Proof of Work (PoW) miner. Full article
(This article belongs to the Section Information Systems and Data Management)
Show Figures

Figure 1

24 pages, 496 KB  
Article
Proof of Fairness: Dynamic and Secure Consensus Protocol for Blockchain
by Abdulrahman Alamer and Basem Assiri
Electronics 2024, 13(6), 1056; https://doi.org/10.3390/electronics13061056 - 12 Mar 2024
Cited by 6 | Viewed by 2241
Abstract
Blockchain technology is a decentralized and secure paradigm for data processing, sharing, and storing. It relies on consensus protocol for all decisions, which focuses on computational and resource capability. For example, proof of work (PoW) and proof of stake (PoS) are the most [...] Read more.
Blockchain technology is a decentralized and secure paradigm for data processing, sharing, and storing. It relies on consensus protocol for all decisions, which focuses on computational and resource capability. For example, proof of work (PoW) and proof of stake (PoS) are the most famous consensus protocols that are currently used. However, these current consensus protocols are required to recruit a node with a high computational or a large amount of cryptocurrency to act as a miner node and to generate a new block. Unfortunately, these PoW and PoS protocols could be impractical for adoption in today’s technological fields, such as the Internet of Things and healthcare. In addition, these protocols are susceptible to flexibility, security, and fairness issues, as they are discussed in detail in this work. Therefore, this paper introduces a proof of fairness (PoF) as a dynamic and secure consensus protocol for enhancing the mining selection process. The selection of the miner node is influenced by numerous factors, including the time required to generate a block based on the transaction’s sensitivity. Firstly, a reverse auction mechanism is designed as an incentive mechanism to encourage all nodes to participate in the miner selection process. In a reverse auction, each node will draw its strategy based on its computational capability and claimed cost. Secondly, an expressive language is developed to categorize transaction types based on their sensitivity to processing time, ensuring compatibility with our miner selection process. Thirdly, a homomorphic concept is designed as a security and privacy scheme to protect the bidder’s data confidentiality. Finally, an extensive evaluation involving numerical analysis was carried out to assess the efficiency of the suggested PoF protocol, which confirms that the proposed PoF is dynamic and more efficient than current PoW and PoS consensus protocols. Full article
(This article belongs to the Special Issue Recent Advances in Blockchain Technology and Its Applications)
Show Figures

Figure 1

38 pages, 8249 KB  
Article
Sustainable Optimizing Performance and Energy Efficiency in Proof of Work Blockchain: A Multilinear Regression Approach
by Meennapa Rukhiran, Songwut Boonsong and Paniti Netinant
Sustainability 2024, 16(4), 1519; https://doi.org/10.3390/su16041519 - 10 Feb 2024
Cited by 18 | Viewed by 7101
Abstract
The energy-intensive characteristics of the computations performed by graphics processing units (GPUs) in proof-of-work (PoW) blockchain technology are readily apparent. The optimization of GPU feature configuration is a complex subject that significantly impacts a system’s energy consumption and performance efficiency. The primary objectives [...] Read more.
The energy-intensive characteristics of the computations performed by graphics processing units (GPUs) in proof-of-work (PoW) blockchain technology are readily apparent. The optimization of GPU feature configuration is a complex subject that significantly impacts a system’s energy consumption and performance efficiency. The primary objectives of this study are to examine and improve the energy consumption characteristics of GPUs, which play a crucial role in the functioning of blockchains and the mining of cryptocurrencies. This study examines the complex relationship between GPU configurations and system architecture components and their effects on energy efficiency and sustainability. The methodology of this study conducts experiments involving various GPU models and mining software, evaluating their effectiveness across various configurations and environments. Multilinear regression analysis is used to study the complex relationships between critical performance indicators like power consumption, thermal dynamics, core speed, and hash rate and their effects on energy efficiency and performance. The results reveal that strategically adjusting GPU hardware, software, and configuration can preserve substantial energy while preserving computational efficiency. GPU core speed, temperature, core memory speed, ETASH algorithms, fan speed, and energy usage significantly affected the dependent computational-efficiency variable (p = 0.000 and R2 = 0.962) using multilinear regression analysis. GPU core speed, temperature, core memory speed, fan speed, and energy usage significantly affected efficient energy usage (p = 0.000 and R2 = 0.989). The contributions of this study offer practical recommendations for optimizing the feature configurations of GPUs to reduce energy consumption, mitigate the environmental impacts of blockchain operations, and contribute to the current research on performance in PoW blockchain applications. Full article
Show Figures

Figure 1

Back to TopTop