Blockchain Structrure
Blockchain Structrure
com
Available online at www.sciencedirect.com
ScienceDirect
ScienceDirect
Available online at www.sciencedirect.com
Procedia Computer Science 00 (2023) 000–000
www.elsevier.com/locate/procedia
ScienceDirect
Procedia Computer Science 00 (2023) 000–000
www.elsevier.com/locate/procedia
Procedia Computer Science 237 (2024) 645–658
Abstract
Abstract
Blockchain-based decentralized technology has gained a lot of attractions and interest in academia and industry. This peer-to-peer
and transparent blockchain
Blockchain-based network
decentralized makes ithas
technology an gained
acceptable
a lottechnology.
of attractions This
anddecentralized networkand
interest in academia hasindustry.
many great
Thisspecifications
peer-to-peer
such as transparency,
and transparent immutability,
blockchain irreversibility
network makes and auditability.
it an acceptable technology.Bitcoin,
This the first and most
decentralized successful
network blockchain
has many application,
great specifications
achieves much success
such as transparency, in recent years.
immutability, This survey
irreversibility andarticle attempts
auditability. to outline
Bitcoin, an extensive
the first survey of blockchain
and most successful blockchain technology,
application,
investigating
achieves much its success
structures, variousyears.
in recent protocol layers,
This surveyfeatures,
article value, challenges,
attempts to outlineandanapplications.
extensive survey of blockchain technology,
© 2022 The Authors.
investigating Published
its structures, by protocol
various ELSEVIER B.V.features, value, challenges, and applications.
layers,
© 2024
This The
is an Authors.
open Published
accessPublished by ELSEVIER
article under the CC BY-NC-NDB.V. license (https://creativecommons.org/licenses/by-nc-nd/4.0)
© 2022
This is The
an Authors.
open access article by
under ELSEVIER
the CC B.V. license
BY-NC-ND (https://creativecommons.org/licenses/by-nc-nd/4.0)
Peer-review
This under
is an open responsibility
access of the
article under of
thethescientific committee
CCscientific
BY-NC-ND of the
license International Conference on Industry Sciences and Computer
(https://creativecommons.org/licenses/by-nc-nd/4.0)
Peer-review under responsibility committee of the iSCSi – International Conference on Industry Sciences
Sciences Innovation
Peer-review under responsibility of the scientific committee of the International Conference on Industry Sciences and Computer
and Computer Science Innovation
Keywords: Blockchain Technology; Blockchain Structure; Blockchain Features; Blockchain challenges; Blockchain Applications
Sciences Innovation
Keywords: Blockchain Technology; Blockchain Structure; Blockchain Features; Blockchain challenges; Blockchain Applications
1. Introduction
1. Introduction
Blockchain is proposed as a disruptive and unique technology for realizing distributed ledgers, which gathered
enormous research
Blockchain attentionasina academia
is proposed disruptive and
and industry. The first introduction
unique technology for realizing of blockchain
distributed was from
ledgers, whichbygathered
Satoshi
Nakamoto [1] with Bitcoin as a cryptocurrency to provide a trusted peer-to-peer network to perform transactions.
enormous research attention in academia and industry. The first introduction of blockchain was from by Satoshi Five
© 2022 The Authors. Published by ELSEVIER B.V.
Nakamoto [1] with Bitcoin as a cryptocurrency to provide a trusted peer-to-peer network to perform transactions. Five
This is an
© 2022 open
The accessPublished
Authors. article under the CC BY-NC-ND
by ELSEVIER B.V. license (https://creativecommons.org/licenses/by-nc-nd/4.0)
Peer-review under
This is an open responsibility
access of the
article under the scientific
CC BY-NC-NDcommittee of the
license International Conference on Industry Sciences and Computer
(https://creativecommons.org/licenses/by-nc-nd/4.0)
Sciences Innovation
Peer-review under responsibility of the scientific committee of the International Conference on Industry Sciences and Computer
© 2022 The
Sciences Authors. Published by ELSEVIER B.V.
Innovation
This is an
© 2022 open
The accessPublished
Authors. article under the CC BY-NC-ND
by ELSEVIER B.V. license (https://creativecommons.org/licenses/by-nc-nd/4.0)
Peer-review under responsibility of the scientific committee
This is an open access article under the CC BY-NC-ND license of the International Conference on Industry Sciences and Computer
(https://creativecommons.org/licenses/by-nc-nd/4.0)
Sciences Innovation
Peer-review under responsibility of the scientific committee of the International Conference on Industry Sciences and Computer
Sciences Innovation
generation for blockchain is introduced in scientific communities. Blockchain 1.0 mostly with Bitcoin to propose a
trusted network for transactions mostly Bitcoin; Blockchain 2.0 introduces smart contracts which are some
programmable rules, Blockchain 3.0 introduces various blockchain use cases in different industries such as telecom,
energy, manufacturing, Blockchain 4.0 for real-time business use cases and Blockchain 5.0 for the integration between
artificial intelligence (AI) and blockchain [2-4].
Blockchain network consists of some blocks that contain transactional records. Each block contains two main parts,
block header that contains some information about the block and block data that contains transactions. Every block
header links to the previous block by a cryptographic link. Each transaction contains some details about users who
want to the send and receive data and the transferring amount. The sender digitally signed the transaction with a public
and private key to ensure security. Sender encrypts the information in each transaction with receiver public key and
then receiver decrypt the information with its private key. This is the basic of asymmetric encryption algorithm in
blockchain [5].
Blockchain is famous for providing a decentralized network. It deletes the necessity for third parties or authorities
to verify and validate the transaction records. Verification is done by using a consensus algorithm to ensure security
and trust in a public ledger. The consensus mechanism provide a fair network where every participants can have a
merit to append a new block to the block sequences or validate a transaction. The most common consensus mechanism
that is although used in Bitcoin network is proof of work (PoW) [6].
Blockchain technology contains many features: transparency which means that all the transactions and process is
transparent to all the users in the network, autonomy which makes it a trust-free network by omitting any authority,
immutability means that no one can edit or delete the transaction after being initiated, irreversibility which ensures the
non-retraceability feature of the technology, and auditability which is the ability that any user can reach the source of
a transaction [7].
As the internet has revolutionized information and communication, blockchain is known to revolutionize
transactions. With the advent of the internet, various services and applications such as social media, and game
streaming were introduced. Blockchain is also proposing many new and interesting services. However, the value
captured from the blockchain is different incomparable to the value captured from the internet. Internet captured its
values mostly from application layer, whereas blockchain captured its value from protocol layer [8]. Therefore, it is
so important to have a general overview of value capturing in blockchain to propose proper and affordable solutions
for academic and industrial purposes.
There is hype surrounding most nascent technology. Since the technology is almost new and even experts not know
much about it, there are a lot of misunderstandings around it. Blockchain technology has encountered this hype.
Although blockchain outlines a new and interesting concept it faces some challenges which needed to be further
investigated [9]. Scalability is one big issue of this technology. Two main performance degradations in blockchain
efficiency are throughput and validation delay in transactions that are still under investigation to reach satisfaction.
There are other limitations such as privacy, energy, regulation, interoperability, and security that require further
research to achieve acceptance.
Although blockchain is known to transform the financial market, it can propose novel applications in other sectors.
As an example, the integration blockchain technology and internet of things (IoT) can help to overcome security and
privacy problems in IoT networks [10, 11]. In addition, multiple healthcare open issues have been tackled with
blockchain technology [12-15]. Other verticals such as telecommunication, smart energy, media and entertainment,
etc. can gain from this disruptive technology.
The primary contribution of this survey is to offer a deep understanding on blockchain ecosystem. In addition,
different specifications such as block structures, different protocol layers consensus protocols, blockchain
classification, challenges, the value captured in blockchain, and their application are described in detail. Eventually,
this survey article outlines a deep review on blockchain structure and basics and along with blockchain application in
different industries that we believe is the strength of this review.
This survey has been structured into seven sections. Section 2 outlines the complete blockchain architectural
overview. Section 3 addresses general blockchain features. Section 4 declares the value captured from the blockchain.
Section 5 investigates the challenges and issues of this technology. Blockchain application in different industries is
explained in section 6 and finally, section 7 depicts the conclusion.
Nazanin Moosavi et al. / Procedia Computer Science 237 (2024) 645–658 647
Author name / Procedia Computer Science 00 (2019) 000–000 3
Blockchain network is a string of blocks that holds transactional records through distributed ledgers like public
ledgers. In recent years, digitalized ledgers have been used to store data with centralized ownership, but blockchain
technology introduces a distributed and decentralized way to store data records. The first block in a block sequence is
named genesis block. From the second block onwards, each block holds the hash value of the previous block and
hence the sequence of blocks is created.
Every block consists of two parts, block data which is a transaction record stored in each block and block header
[12]. The block header consists of some parts as follow:
• Block version- 4 byte: Indicates some rules to validate the block
• Merkle root hash- 32 byte: Hashing method to represent hash of block data
• Previous block hash- 32 byte: Hash value of previous data block
• Timestamp- 4 byte: The time that each block is created since 1970-01-01T00:00 UTC
• nBits- 4 byte: threshold for hashing target value
• Nonce- 4byte: A unique number to create hash for each block data and usually starts with zero
The block data consists of transactions and transaction numerators. An encrypted version of transactions is stored
in each block. The encryption of data happens by Merkle tree algorithm. Transactions go into the hash function and
then hash value is produced. Next, each of the two-hash value of each transaction forms a pair and go into another
hash function to prepare a new hash value. This action continues until reaching one hash value. This procedure is
called Merkle tree root hash and is represented in Figure 1.
Both the transaction size and block size affect the maximum number of transactions in every block. Block Structure
Figure 2 shows the pictorial representation of block header and block structure.
a) Block Header
648 Nazanin Moosavi et al. / Procedia Computer Science 237 (2024) 645–658
Author name / Procedia Computer Science 00 (2019) 000–000 4
b) Block Structure
Fig. 2. Block Structure and Blockchain Sequence
Blockchain users are called nodes. Since the blockchain is a distributed ledger, each node in the network has one
copy of the whole blockchain. Nodes are so important since they have an important duty in transactions. There are
some nodes with special features that can add a new block to the block sequences. These nodes are miners. Miners
perform the process of transaction validation. Once they confirm the transaction, for example in the case of transferring
money, the amount of money is transferred from the sender to the receiver [13].
Each node can start a transaction by using a digital signature with public and private key cryptography. Every node
knows the public key of other nodes (It is the same as the email address that your contact have it) and the private key
is an address that just each node knows (It is the same as the email password). This process is shown in Figure 3. A
transaction can be a money transfer between two nodes or any kind of contract between peers in the network. Utilizing
the Gossip protocol any transactions are sent to all the nodes. Next, miners verify and validate the transactions and
the transaction is appended to the block. This process is called mining. Each miner should expend a lot of
computational power to solve a puzzle to release a new block. Winner miner is the first one that solves the puzzle and
can create a new block. A transaction fee is also given to the winning miner. Every in the network should verify the
new block by employing a consensus protocol which is a set of rules that should be followed during the transactions.
After this validation new block is added to the chain [14, 15]. The transaction process presented in Figure 4.
Later in this section, 2.2 introduces different blockchain classification, 2.3 discusses blockchain protocol layers,
2.4 explains some consensus protocols, 2.5 defines smart contract and 2.6 outlines different generation of blockchain.
Blockchain networks are classified into two models based on the permission for appending a new block. If any user
can access to add a new block, the blockchain is permissionless. But if only a few specified users can add a new block
to the network the blockchain is permitted. Simply, a permissionless blockchain is the same as public internet that
anyone can access to it, but a permissioned blockchain is the same as an Intranet that is under control. Permissioned
blockchain is often used by groups or organizations [7]. Blockchain classification is proposed in Figure 5.
A consortium blockchain has some specification of public and private blockchain where there is more than one
organization that is controlling the network [19]. Here is the comparison between different blockchain classifications
in Table 1.
The blockchain framework has three layers called network layer, data layer, and application layer as shown in
Figure 4. Data layer responsibility is building new blocks, the network layer is responsible for interaction protocols
between users and environments and finally, the application layer represents the various application of this technology
[20, 21]. Further details on these layers are given below.
N. Szabo first introduced a smart contract in 1997 [25]. The idea of a smart contract is to predefine some roles,
which are programmable codes between two participants. The concept of a smart contract is just like a cryptographic
box. It can be opened when some conditions are met. There are no third party or intermediaries in a smart contract
hence it is a self-executing code. To be specific if ‘x’ happens, then ‘y’ applies. For ease of understanding, Table 3
compares traditional contracts with smart contracts.
Blockchain evolution from its first day until today is described in the Figure 7 [28-30].
3. Blockchain Features
Six main features of blockchain, which made it one of the technology trends these days, is presented in Erro! A
origem da referência não foi encontrada.
3.1. Decentralized
Decentralization is the most important feature of blockchain technology. It omits the need for a third party or
centralized authority to validate the transaction. With this feature, every node in the network can transact with each
other without having any information about their real identity or their location. Moreover, since there is no centralized
system, every node has the entire information of the network, and the data is stored in multiple systems. When a new
block is added to the chain, the data is updated in all the systems [23].
3.2. Transparent
All the algorithms and transactions in blockchain technology are transparent to all the users in the network. It leads
the way for accountability and integrity of data in the network since no one can change, add or delete data. This feature
is unprecedented for the financial systems, which makes the blockchain technology popular in the financial market
[24].
3.3. Autonomy
A Blockchain network is called a trust-free network, which omits the need for an authority to ensure trust. In this
system, trust is not an issue, and guarantees trust for all network transactions. Cryptographically algorithms in the
blockchain network replace the governor's authority to ensure trust [25].
3.4. Immutable
The immutability characteristic of blockchain means once a transaction happens and the data is stored in the
blockchain sequence; no one can edit or delete it. After transaction registration, they can just be validated and verified.
This characteristic makes a blockchain immutable and constant. Since transactions are stored in all the nodes, if any
modification happened to one transaction, all the nodes are informed and try to fix it [26].
3.5. Irreversible
This feature proposes that once a transaction is saved in the network, it cannot be retraced. This happens due to the
usage of the hash function that gives an encrypted version of the data in each data block of the blockchain. Since the
hash function is a one-way function, the input cannot be retraced from the hash data. In addition, the hash function is
a deterministic function which means that just the same output, has the same input. Hence, just a small change in
inputs, causes different output. Both two properties of the hash function guarantee the irreversibility feature of
blockchain [27].
3.6. Auditability
Each transaction is recorded in a distributed ledger and with a timestamp that is stored in a block header. Hence,
one can detect the previous nodes by accessing any node in the network [28]. It is a beneficial feature of blockchain
654 Nazanin Moosavi et al. / Procedia Computer Science 237 (2024) 645–658
Author name / Procedia Computer Science 00 (2019) 000–000 10
in some applications since it is so important to know the source of the data for example the source of a huge transaction
or money transfer in financial services to avoid fraud or money laundering [23].
Blockchain is known to be a transformational technology since it provides an open-source basis for security
services in various sectors and financial markets. Some visionaries simulate blockchain with the internet. In the early
days of the internet, no one could guess how the internet was going to influence our lives. From smartphones to diverse
applications for example social media, video conferences, game streaming, etc. Due to the fast and wide development
in blockchain applications, some specialists envisage blockchain would transform transactions similar to the way that
the internet has transformed information and communication technology [24, 29, 30].
The main difference between the value captured on the internet and blockchain is the protocol layer. To investigate
this difference, it should be noted that the internet runs on open protocols such as TCP, IP, HTTP, etc. These protocols
are usually preserved by non-profit organizations. These protocols produce different applications such as Facebook,
Gmail, and Wikipedia, which people use to communicate with each other or get information about different things.
This means that the value is captured from different applications. Hence the value captured from the internet is mainly
from the application layer, not the protocol layer and therefore it is composed of thin protocol and fat applications [8].
Next, we want to investigate the value captured in the blockchain. Blockchain consists of fat protocols and thin
applications. Value is mainly captured from the protocol layer and just a small amount of it is captured from the
application layer. As an example, the market capitalization of Ethereum [31], which is the most famous blockchain
network after Bitcoin, until 2021 is $528 billion, however applications that run on top of this network get a small
fraction of its value. Figure 8 proposes a comparison between internet and blockchain from the perspective of value
captured.
Nowadays, blockchain technology is a new trend in both academia and industry. With its special features, it is
known to revolutionize the financial market. However, it should be considered that blockchain technology is still in
its infancy time and it suffers from some limitations which make it not acceptable in some industries [32, 33]. In this
section, challenges of blockchain technology are investigated. Erro! A origem da referência não foi encontrada.9
shows some challenges of blockchain technology.
Nazanin Moosavi et al. / Procedia Computer Science 237 (2024) 645–658 655
Author name / Procedia Computer Science 00 (2019) 000–000 11
With the popularity of blockchain application in various sectors, the number of transactions is increasing diurnally.
However, there is always a concern about whether blockchain can handle this large amount of transactions or not.
Hence, the scalability of the network is of high importance and many researchers have started working on it. By
increasing the number of replicas, two important performance features change, throughput which depicts how many
transactions can happen in a second and latency which depicts the time delay for appending a block to the blockchain
[34]. As an example, Bitcoin has a very low throughput which can only process 6-10 transactions per second.
However, in comparison with Bitcoin Ethereum can process 15 transactions [35], Ripple can process 1500
transactions [36] and Visa can process more than 2000 transaction per second[37]. Hence, Bitcoin is not a good
solution for real-time transactions in some industries. In addition, Bitcoin network needs around 10 minutes to append
a new block to the network. Although Bitcoin and PoW can somehow assure scalability it suffers from low throughput,
high latency, and a large amount of processing power.
It should be noted that since the capacity of the block is so small ( block capacity of Bitcoin is 1MB), miners are
eager to mine the blocks with a high transaction fee, hence small transactions might be delayed. Although this
characteristic ensures the security of the network it slows down the transactions process compared with existing
systems.
The DCS (decentralized, consistent and scalable) theorem which is shown in Erro! A origem da referência não
foi encontrada.0 can propose some ideas around the scalability issues on blockchain [38]. According to this theorem,
a blockchain network can not have all the three DSC features simultaneously and it can meet only two of the features.
Albeit, it gives low throughput and high latency, e.g., low volume and slow transaction.
5.1. Privacy
Each user in blockchain can initiate the transaction without its real identity and with user pseudonyms, which
provides safety and privacy for the user’s personal information. However, some researchers studied privacy leakages
in the blockchain network. Researches in [39] showed that since the value of transaction and its balance is visible to
everyone with public key, the blockchain network is vulnerable. Authors in [40] provide a method that links the user's
pseudonyms to IP addresses even if users are behind firewalls. In addition works in [41] reveal a way to show the
656 Nazanin Moosavi et al. / Procedia Computer Science 237 (2024) 645–658
Author name / Procedia Computer Science 00 (2019) 000–000 12
user’s identity by using transaction history. Consequently, the privacy and safety of users should be considered in the
initial stage of building a blockchain network based on the level of privacy that each sector or organization needed.
5.2. Regulation
Based on discussions in [42] unclear regulations and lack of standardization are two factors to limit the
blockchain's popularity in different industries. However, the principle of blockchain and cryptocurrencies is to create
an open and trusted platform for trading, this open network eases the presence of malicious attackers. Hence,
government and developers should study some regulations to create cryptocurrency ecosystem, which is legal and
ethical [43]. Regulation and rules could affect the growth of technology in the fastest time.
Researches in [44] agreed that if blockchain wants to replace existing solutions, it should overcome uncertain
regulation, cultural issues, and integration issues. Nowadays there are no complete regulations and rules for
cryptocurrencies, which makes the usage of the blockchain network, a big challenge in the financial markets.
5.3. Interoperability
Interoperability refers to an ability of different software to collaborate, connect and share data/information [45].
Although various industries are interested in using blockchain, there are no standard rules and protocols to allow them
to collaborate. This lack of interoperability has attenuated the development of the blockchain ecosystem. Hence,
emphasizing cryptocurrency as the main blockchain platform is a better solution instead of offering a different solution
for a variety of industries. Although, the lack of interoperability between current internal platforms and blockchain
solution cause some challenges to the existing companies [46]. In addition to these issues, active blockchain networks
developed on different platforms with different programming languages, consensus protocols, and privacy features
make interoperability harder.
PoW with its Bitcoin evolution is the most important consensus protocol in the blockchain network. However, its
strong desire to use a huge amount of energy for computation causes a lot of environmental problems [47]. One way
to understand this huge amount of energy is to compare it with the amount of energy that payment systems such as
VISA need for their transaction. In [48], it is shown that the amount of energy for 1 bitcoin transaction is even twice
the amount of energy for 100,000 VISA transactions. Although blockchain is proposed to remove the need for central
authorities in the financial market, this huge amount of energy is too high to bear. Consequently, new protocols such
as PoS, which use less energy, should be considered as alternatives.
5.5. Security
Blockchain has shown promising applications in financial market. However, users are worried about its security
[49]. In addition, smart contracts suffers from security risks, which may produces loss [50]. As an example by an
attack to DAO smart contract, the attackers stole around 60 million dollars by applying a recursive calling vulnerability
[51]. Two main security vulnerabilities and attacks are as follow.
6. Conclusion
In this work, a detailed survey on blockchain technology is presented. Blockchain technology by enabling
decentralized networks provides an immutable, tamper-proof, and secure network by eliminating central authorities.
This survey explains the complete details of block structures with the mining method to append a new block to the
blockchain. Blockchain generation and classification, different protocol layers, and the definition of the smart contract
is been fully investigated. In addition, this paper investigates main blockchain technology specifications such as
decentralization, immutability, transparency, etc. Although blockchain is known to be such as the internet, which is
going to transform the transaction, the way that it captures value, is much different from the internet.
Blockchain value mostly comes from the protocol layer instead of the application layer. Subsequently, it is so
important to know the meaning of fat protocol and thin application. Next blockchain challenges and issues are
outlined. Eventually, the application of blockchain in different verticals and industries is elucidated. In this
comprehensive survey, we offer a brief but complete outline of blockchain with its structure, principles, protocol
layers, consensus mechanisms, classification, usage in industries and we provide a concise but extensive review of
blockchain with its background, principles, consensus mechanisms, classifications, applications, and challenges inside
a one survey valuable for a blockchain innovation devotees. The principles and discoveries discussed here can be
examined profoundly based on the needs of academia circles and industries.
References
1. Nakamoto, S., Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review, 2008: p. 21260.
2. Perera, S., et al., Blockchain technology: Is it hype or real in the construction industry? Journal of Industrial Information Integration, 2020.
17: p. 100125.
3. Hameed, K., et al., A taxonomy study on securing Blockchain-based Industrial applications: An overview, application perspectives,
requirements, attacks, countermeasures, and open issues. Journal of Industrial Information Integration, 2022: p. 100312.
4. Taherdoost, H. and M. Madanchian, Blockchain-Based E-Commerce: A Review on Applications and Challenges. Electronics, 2023. 12: p.
1889.
5. Attaran, M. and A. Gunasekaran, Blockchain principles, qualities, and business applications, in Applications of blockchain technology in
business. 2019, Springer. p. 13-20.
6. Becker, J., et al., Can we afford integrity by proof-of-work? Scenarios inspired by the Bitcoin currency, in The economics of information
security and privacy. 2013, Springer. p. 135-156.
7. Taherdoost, H., Blockchain Technology and Artificial Intelligence Together: A Critical Review on Applications. Applied Sciences, 2022.
12(24): p. 12948.
8. Gamage, H., H. Weerasinghe, and N. Dias, A survey on blockchain technology concepts, applications, and issues. SN Computer Science,
2020. 1(2): p. 1-15.
9. Yaga, D., et al., Blockchain technology overview. arXiv preprint arXiv:1906.11078, 2019.
10. Reyna, A., et al., On blockchain and its integration with IoT. Challenges and opportunities. Future generation computer systems, 2018. 88:
p. 173-190.
11. Christidis, K. and M. Devetsikiotis, Blockchains and smart contracts for the internet of things. Ieee Access, 2016. 4: p. 2292-2303.
12. Yaqoob, I., et al., Blockchain for healthcare data management: opportunities, challenges, and future recommendations. Neural Computing
and Applications, 2021: p. 1-16.
13. Hasselgren, A., et al., Blockchain in healthcare and health sciences—A scoping review. International Journal of Medical Informatics, 2020.
134: p. 104040.
14. Taherdoost, H., Blockchain-Based Internet of Medical Things. Applied Sciences, 2023. 13(3): p. 1287.
15. Taherdoost, H., The Role of Blockchain in Medical Data Sharing. Cryptography, 2023. 7(3): p. 36.
16. Xiao, Y., et al., A survey of distributed consensus protocols for blockchain networks. IEEE Communications Surveys & Tutorials, 2020.
22(2): p. 1432-1465.
17. Mittal, A. and S. Aggarwal, Hyperparameter optimization using sustainable proof of work in blockchain. Frontiers in Blockchain, 2020. 3:
p. 23.
18. Bach, L.M., B. Mihaljevic, and M. Zagar. Comparative analysis of blockchain consensus algorithms. in 2018 41st International Convention
658 Nazanin Moosavi et al. / Procedia Computer Science 237 (2024) 645–658
Author name / Procedia Computer Science 00 (2019) 000–000 14
on Information and Communication Technology, Electronics and Microelectronics (MIPRO). 2018. Ieee.
19. Gao, W., W.G. Hatcher, and W. Yu. A survey of blockchain: Techniques, applications, and challenges. in 2018 27th international conference
on computer communication and networks (ICCCN). 2018. IEEE.
20. Taherdoost, H., The Role of Smart Contract Blockchain in 6G Wireless Communication System. Procedia Computer Science, 2022. 215: p.
44-50.
21. Ullah, F. and F. Al-Turjman, A conceptual framework for blockchain smart contract adoption to manage real estate deals in smart cities.
Neural Computing and Applications, 2021: p. 1-22.
22. Zheng, Z., et al., An overview on smart contracts: Challenges, advances and platforms. Future Generation Computer Systems, 2020. 105: p.
475-491.
23. Niranjanamurthy, M., B. Nithya, and S. Jagannatha, Analysis of Blockchain technology: pros, cons and SWOT. Cluster Computing, 2019.
22(6): p. 14743-14757.
24. Bhutta, M.N.M., et al., A survey on blockchain technology: Evolution, architecture and security. IEEE Access, 2021. 9: p. 61048-61073.
25. Xie, J., et al., A survey of blockchain technology applied to smart cities: Research issues and challenges. IEEE Communications Surveys &
Tutorials, 2019. 21(3): p. 2794-2830.
26. Click, K., et al., Immutable and secure IP address protection using blockchain, in Blockchain Cybersecurity, Trust and Privacy. 2020,
Springer. p. 233-246.
27. Lemeš, S. and L. Lemeš. Blockchain in distributed CAD environments. in International Conference “New Technologies, Development and
Applications”. 2019. Springer.
28. Yu, H., Z. Yang, and R.O. Sinnott, Decentralized big data auditing for smart city environments leveraging blockchain technology. IEEE
Access, 2018. 7: p. 6288-6296.
29. Monrat, A.A., O. Schelén, and K. Andersson, A survey of blockchain from the perspectives of applications, challenges, and opportunities.
IEEE Access, 2019. 7: p. 117134-117151.
30. Twesige, R., Bitcoin: A simple explanation of Bitcoin and Blockchain technology. Computer Science, 2015. 1(1): p. 1-5.
31. Buterin, V., A next-generation smart contract and decentralized application platform. white paper, 2014. 3(37).
32. Deshpande, A., et al., Distributed Ledger Technologies/Blockchain: Challenges, opportunities and the prospects for standards. Overview
report The British Standards Institution (BSI), 2017. 40: p. 40.
33. Salah, K., et al., Blockchain for AI: Review and open research challenges. IEEE Access, 2019. 7: p. 10127-10149.
34. Vukolić, M. The quest for scalable blockchain fabric: Proof-of-work vs. BFT replication. in International workshop on open problems in
network security. 2015. Springer.
35. Schäffer, M., M.d. Angelo, and G. Salzer. Performance and scalability of private Ethereum blockchains. in International Conference on
Business Process Management. 2019. Springer.
36. Brand, M.J., et al., The influence of current ripples on the lifetime of lithium-ion batteries. IEEE Transactions on Vehicular Technology, 2018.
67(11): p. 10438-10445.
37. Herrera-Joancomartí, J. and C. Pérez-Solà. Privacy in bitcoin transactions: new challenges from blockchain scalability solutions. in
International Conference on Modeling Decisions for Artificial Intelligence. 2016. Springer.
38. Slepak, G. and A. Petrova, The DCS theorem. arXiv preprint arXiv:1801.04335, 2018.
39. Henry, R., A. Herzberg, and A. Kate, Blockchain access privacy: Challenges and directions. IEEE Security & Privacy, 2018. 16(4): p. 38-
45.
40. Biryukov, A. and I. Pustogarov. Bitcoin over Tor isn't a good idea. in 2015 IEEE Symposium on Security and Privacy. 2015. IEEE.
41. Biryukov, A., D. Khovratovich, and I. Pustogarov. Deanonymisation of clients in Bitcoin P2P network. in Proceedings of the 2014 ACM
SIGSAC Conference on Computer and Communications Security. 2014.
42. Company, M., Blockchain beyond the hype: What is the strategic business value?, in https://www.mckinsey.com/business-functions/mckinsey-
digital/our-insights/blockchain-beyond-the-hype-what-is-the-strategic-business-value#, G.R. Brant Carson, Patricia Walsh, and Askhat
Zhumaev, Editor. 2018.
43. ur Rehman, M.H., et al., Trust in blockchain cryptocurrency ecosystem. IEEE Transactions on Engineering Management, 2019. 67(4): p.
1196-1212.
44. Tavares, B., F.F. Correia, and A. Restivo, A survey on blockchain technologies and research. Journal of Information Assurance and Security,
2019. 14: p. 118-128.
45. DeSalvo, K. and E. Galvez, Connecting health and care for the nation: a shared nationwide interoperability roadmap—version 1.0. Health
IT Buzz, 2015.
46. Lewis, R., J. McPartland, and R. Ranjan, Blockchain and financial market innovation. Economic Perspectives, 2017. 41(7): p. 1-17.
47. O'Dwyer, K.J. and D. Malone, Bitcoin mining and its energy footprint. 2014.
48. Bitcoin Energy Consumption Index Digiconomist. 2022.
49. Saad, M., et al., Exploring the attack surface of blockchain: A systematic overview. arXiv preprint arXiv:1904.03487, 2019.
50. Li, X., et al., A survey on the security of blockchain systems. Future Generation Computer Systems, 2020. 107: p. 841-853.
51. Buterin, V., Critical update re: DAO vulnerability. Ethereum Blog, June, 2016.
52. Barber, S., et al. Bitter to better—how to make bitcoin a better currency. in International conference on financial cryptography and data
security. 2012. Springer.
53. Nicolas, K., et al., Blockchain system defensive overview for double-spend and selfish mining attacks: A systematic approach. IEEE Access,
2020. 9: p. 3838-3857.
54. Leelavimolsilp, T., L. Tran-Thanh, and S. Stein, On the preliminary investigation of selfish mining strategy with multiple selfish miners. arXiv
preprint arXiv:1802.02218, 2018.