Peerj Cs 09 1705
Peerj Cs 09 1705
Peerj Cs 09 1705
overview
Shi Dong1, Khushnood Abbas1, Meixi Li1 and Joarder Kamruzzaman2
1
School of Computer Science and Technology, Zhoukou Normal University, Zhoukou, Henan,
China
2
School of Science, Engineering and Information Technology, Federation University Australia,
Ballarat, Australia
ABSTRACT
In recent years, with the rise of digital currency, its underlying technology,
blockchain, has become increasingly well-known. This technology has several key
characteristics, including decentralization, time-stamped data, consensus
mechanism, traceability, programmability, security, and credibility, and block data is
essentially tamper-proof. Due to these characteristics, blockchain can address the
shortcomings of traditional financial institutions. As a result, this emerging
technology has garnered significant attention from financial intermediaries,
technology-based companies, and government agencies. This article offers an
overview of the fundamentals of blockchain technology and its various applications.
The introduction defines blockchain and explains its fundamental working
principles, emphasizing features such as decentralization, immutability, and
transparency. The article then traces the evolution of blockchain, from its inception
in cryptocurrency to its development as a versatile tool with diverse potential
applications. The main body of the article explores fundamentals of block chain
systems, its limitations, various applications, applicability etc. Finally, the study
concludes by discussing the present state of blockchain technology and its future
potential, as well as the challenges that must be surmounted to unlock its full
potential.
How to cite this article Dong S, Abbas K, Li M, Kamruzzaman J. 2023. Blockchain technology and application: an overview. PeerJ
Comput. Sci. 9:e1705 DOI 10.7717/peerj-cs.1705
Habib et al., 2022), museum protection (Bilogrivic & Stublic, 2023), electronic invoicing
(Zhang & Lu, 2022), human resource management (Balon, Kalinowski & Paprocka, 2022),
international trade (Xing, Peng & Liang, 2022), distributed robot control (Kumar et al.,
2022), and more. Its foundational feature, a shared and immutable ledger, has unlocked
new opportunities for secure and transparent transactions involving both tangible and
intangible assets. Businesses leverage blockchain to streamline operations, track valuable
assets, and enhance trust and efficiency in their transactions. This technology’s ability to
provide quick and unalterable information in real-time fosters transparency and trust,
enabling businesses to identify innovative ways to enhance their operations.
Problem statement
Blockchain technology is currently gaining momentum across various industries, holding
the promise of modernizing our economic system. However, it also faces several significant
challenges, including scalability, energy consumption, interoperability, and regulatory
concerns. Unfortunately, only a limited amount of work has been undertaken in this
direction thus far. In our research, we have extensively explored nearly every aspect of
blockchain, ranging from its fundamental construction to various applications. Our focus
has been on examining the fundamental building blocks of blockchain technology and
shedding light on various security aspects related to blockchain-based systems. The
objective of this work is to provide a comprehensive review of blockchain technologies,
their applications, security and privacy issues, and the research obstacles that lie ahead
(Pieters, Kokkinou & van Kollenburg, 2022).
The remainder of this article is structured as follows: “Survey Methodology” discusses
the survey methodology. “Literature Review” presents the literature review. “Key
Technologies for Blockchain” covers the key technologies required to build a blockchain
system. “Types of Blockchains” presents the type of blockchain. In “Security Measures in
SURVEY METHODOLOGY
This study follows the established rules for conducting systematic literature reviews very
carefully. Our research approach involves three essential phases that are meticulously
planned to ensure the completeness and rigor of our investigation: planning, data
collection, and data review.
In the first phase of data collection, we conducted a thorough search using Google
Scholar and the Web of Science to find academic papers related to our study on blockchain
technology. This initial search aimed to include a wide range of literature on the topic.
After this broad search, we took a more focused approach. Specifically, we looked closely at
articles that had received a significant number of citations and directly related to the main
themes of our research. Because the blockchain field is rapidly changing, we went a step
further to ensure the comprehensiveness of our investigation. We expanded our search
beyond academic papers to include insights from relevant websites, authoritative blogs,
and technical reports. These additional sources helped us gain a comprehensive
understanding of the subject matter, incorporating practical experiences and expert
perspectives from those actively involved in blockchain technology from industries also.
Our rigorous methodological approach highlights our dedication to conducting a
thorough, rigorous, and comprehensive review. By incorporating both academic research
and real-world practical insights, we aim to provide a detailed and well-rounded portrayal
of the diverse landscape of blockchain technology, recognizing its dynamic evolution and
its relevance across various domains.
LITERATURE REVIEW
In early 2016, the Central Bank of China stated its intention to actively promote the official
publication of digital currency. As a result, more and more financial research institutions
started to take notice of blockchain technology, the innovative technology behind digital
currencies (Pilkington, 2016). Around the same time, the UK government released a special
report on blockchain technology titled “Distributed Accounting Technology: Beyond
Blockchain” in an effort to vigorously develop the use of blockchain in the government
sector (Hancock & Vaizey, 2016). Mckinsey Company (2016) has reported that blockchain
technology is the core technology most likely to trigger a disruptive revolution, which will
be the fifth wave of disruptive revolution after steam engine, electricity, information, and
Internet technology (Hancock & Vaizey, 2016). In Asia, some Internet giants have also
started researching blockchain technology and its potential applications. For example,
Baidu Finance and Huaneng Trust, and Changan New Life received recognition for the
country’s first domestically-backed blockchain-based project. Jingdong Group has built the
Jingdong Anti-Counterfeit Traceability Platform using blockchain technology. Biggest
structures, hashing algorithms, Merkle trees, and timestamps (Zhu, Guo & Zhang, 2021).
These elements work together to ensure the secure and orderly arrangement of data within
the blockchain system.
Block
The unit of data that can record information about Bitcoin transactions is the block. A
block is made up of two parts: one part is the block header, and the other part is the block
content. This is shown in Fig. 1.
Merkle tree
The Merkle tree plays a crucial role in blockchain technology, serving as a vital data
structure for efficiently summarizing and verifying the existence and integrity of block data
(Mohan, Mohamed Asfak & Gladston, 2020; de Ocáriz Borde, 2022). Its main function is to
enable the identification of all transactions recorded in a block, making it possible to locate
them on each block of the blockchain. To achieve this, the blockchain system utilizes a
binary tree variant of the Merkle tree. This variant is responsible for summarizing and
Root Hash
Hash01 Hash23
representing the transactions in a block, ultimately producing a digital signature for the
entire set of transactions. Figure 2 provides a visual illustration of this concept.
Timestamp
In blockchain technology, nodes with bookkeeping privileges are required to include a
timestamp in the header of the current data block. This timestamp indicates the exact time
when the block was written or added to the blockchain. By incorporating this
timestamping mechanism, the blockchain ensures that blocks on the main chain are
arranged in a chronological order, reflecting the sequential order of transactions.
The inclusion of timestamps enhances the tamper-evident nature of the blockchain.
Any attempt to modify or alter the data in a block would result in a mismatch between the
timestamp and the actual time of the tampering, immediately indicating the presence of
unauthorized changes. This chronological organization and tamper-evident feature
contribute to the overall security and integrity of the blockchain system.
Private key
˄256 bits˅
Private key
˄50 characters˅
not been tampered with, as evidenced by the consistency of the digital signature (Li, Hu &
Lan, 2020).
Paxos algorithm
The Paxos algorithm is a widely used algorithm that enables achieving consensus in
blockchain technology (Mingxiao et al., 2017; Charapko, Ailijiang & Demirbas, 2018; Deng
et al., 2022; Burchert & Wattenhofer, 2018), specifically in the presence of node failures
SHA256 algorithm
Bitcoin uses a double SHA256 hash function to obtain a 256-bit hash from the original
transaction record of any length. This hash function is advantageous due to its fixed length,
timing, single direction, and randomness. Fixed length refers to the output hash values
having the same length, while timing means that the time needed to compute the hash is
virtually the same for different lengths of data. Single direction means that the original
input data cannot be derived from the hash, although theoretically possible, it is practically
impossible. Randomness means that even with similar values entered, the output hash will
be completely different. Moreover, the proof of work used in Bitcoin is also based on the
SHA256 function (Ye et al., 2018).
Consensus mechanism
A consensus algorithm serves as a critical procedure within a blockchain network, enabling
each peer to establish a unified agreement on the distributed ledger’s state. Essentially, it
acts as a protocol facilitating all nodes in the blockchain network to collectively determine
the current data state within the ledger and trust unknown peers in the network. The
blockchain network implements an incentive-based block creation process also known as
“block mining” (Wang et al., 2019b).
The consensus mechanism stands as a foundational technology in the blockchain realm.
It identifies the nodes responsible for maintaining the ledger and ensures the confirmation
and synchronization of transaction information. This consensus process typically involves
two key phases: “master selection” and “bookkeeping,” with each round being further
subdivided into four stages: master selection, block generation, data verification, and
uploading (i.e., bookkeeping) (Castro & Liskov, 1999). Presently, mainstream consensus
mechanisms encompass proof of work, practical Byzantine fault tolerance (dBFT), tangle
(IOTA), proof of stake (PoS), delegated proof of stake (DPoS), Ripple consensus protocol,
proof of weight, proof of elapsed time, proof of history, proof of stake velocity, proof of
importance, proof of reputation, proof of identity, proof of activity, proof of time, proof of
retrievability, proof of capacity, Byzantine fault tolerance (BFT), delayed proof of work,
Proof of Stake (PoS): PoS is an alternative consensus mechanism where validators are
chosen based on their stake in the network (cryptocurrency holdings). It is more energy-
efficient than PoW and might be more suitable for IoT devices with limited resources.
Delegated Proof of Stake (DPoS): DPoS is a variation of PoS where participants vote
for a set of delegates who then validate transactions and create blocks. It offers faster
transaction times and is commonly used in blockchain networks like EOS.
Proof of Work (PoW): The PoW is a crucial and foundational mechanism in
blockchain technology. Its primary role is to achieve consensus and secure the
blockchain network by adding new blocks to the blockchain (Gervais et al., 2016;
Gemeliarana & Sari, 2018; Shi, 2016). The mechanism’s fundamental steps include: (i)
nodes monitor and temporarily store network data records, which are subsequently
verified for their basic legitimacy; (ii) nodes utilize their computational power to test
different random numbers; (iii) after identifying a suitable random number, nodes
generate the corresponding block information by first inserting the block header
information, followed by the data record information; (iv) upon receiving the
instruction, the newly generated block is broadcasted to the network. Once the
remaining nodes pass the verification process, the block is added to the blockchain, and
a node is added to the height of the main chain, increasing its height by one. The proof of
work (PoW) method aims to establish a reward mechanism to incentivize other nodes in
the blockchain network to solve a SHA256 mathematical problem, which is difficult to
solve but easy to verify. The mathematical problem requires that the computed random
number be equal to or less than the target hash value.
Proof of Stake (PoS): PoS is a consensus mechanism used in blockchain networks to
achieve agreement on the state of the blockchain and validate new transactions. In this
model, participants stake their digital currency to become validators. The more coins
they stake, the higher their chances of being chosen to create and validate new blocks
(Saleh, 2021; Li et al., 2017; Gaži, Kiayias & Zindros, 2019; Shifferaw & Lemma, 2021).
To incentivize holding coins and discourage hoarding, the concept of “coin days” is
employed. This means that for each coin owned, one “coin day” is generated every day.
For example, if someone holds 200 coins for 15 days, their total coin days would be
3,000. When a new PoS block is discovered, the individual’s coin days are reset to zero.
1. Voting: Token holders in the network can vote to elect delegates from a pool of
candidates. The number of votes a token holder has is typically proportional to the
number of tokens they hold. The elected delegates then take on the responsibility of
validating transactions and adding blocks to the blockchain.
2. Block production: The elected delegates are responsible for creating new blocks.
They take turns in producing blocks in a round-robin fashion or based on a predefined
schedule.
3. Consensus: Consensus is achieved when a supermajority of elected delegates agree on
the validity of a transaction and its inclusion in the blockchain.
4. Decentralization: Although DPoS relies on a limited number of delegates, it is still
considered decentralized because token holders have the power to vote and change the
delegates if they are dissatisfied with their performance.
5. Efficiency and scalability: DPoS is known for its high transaction throughput and
faster block confirmation times compared to other consensus mechanisms like PoW.
6. DPoS relies on the assumption that elected delegates act in the best interest of the
network since they have a stake in it. To prevent malicious behavior, penalties or
mechanisms like vote slashing can be implemented. DPoS has been adopted by several
blockchain projects, including Steem, BitShares, and EOS. It aims to strike a balance
between decentralization, efficiency, and security, making it suitable for applications
that require high transaction speeds and scalability. However, it also introduces some
degree of centralization due to the limited number of elected delegates, which is a topic
of ongoing debate within the blockchain community.
PBFT: The Practical Byzantine Fault-Tolerant algorithm (PBFT) (Castro & Liskov,
1999) is a state machine replication algorithm that models services as state machines.
The algorithm addresses the low-efficiency issues of the original Byzantine Fault-
Tolerant algorithm and reduces the complexity from exponential to polynomial level.
We have compared well-known consensus mechanism algorithms in the Table 1.
Blockchain wallet
A blockchain wallet is a digital wallet that securely stores and manages multiple
cryptocurrencies, allowing users to exchange and transfer funds with utmost security (Dai
et al., 2018; Eyal, 2022). It offers privacy and identity protection and can be accessed via
web devices. The wallet has essential features to facilitate secure and reliable transfers and
exchanges between parties.
A blockchain wallet comes with a private and public key. The public key is like an email
address that can be shared with anyone to receive funds. However, the private key is
confidential, like a password, and should never be shared as it is used to spend the funds. If
the private key is compromised, there is a high risk of losing all cryptocurrency deposits in
the account (Suratkar, Shirole & Bhirud, 2020). The sequence diagram is described in
Fig. 4. The arrows show the flow of communication between these participants. The user
initiates the transaction through the wallet, which broadcasts it to the network. The
network validates the transaction, and then confirms it back to the wallet, which in turn
Initiate transaction
broadcast transaction
vali date
Transaction hash
Transaction hash
Confirm transaction
Transaction confirmed
Confirmation
confirms the transaction to the user. When a user initiates a transaction using their
preferred wallet application, the transaction is broadcast to the blockchain network for
processing and validation. The network will then verify the transaction using a consensus
algorithm, ensuring that the transaction is legitimate and that the user has the required
funds to complete it. Once confirmed, the wallet receives notification of the successful
transaction, and the user can then proceed with the next step in their transactional process.
Ultimately, this coordinated effort between the user, wallet, and blockchain network
ensures secure and reliable transfers and exchanges of cryptocurrencies.
Hashing algorithms
Secure Hash Algorithm 256-bit (SHA-256): This is widely used in Bitcoin and other
cryptocurrencies. It provides a high level of security and is resistant to collision attacks.
It ensures data integrity by generating fixed-size hash values for the data, which cannot
be reversed to the original data.
Secure Hash Algorithm 3 (SHA-3): The successor of SHA-256, SHA-3 is part of the
Keccak family of cryptographic hash functions. It was designed to offer enhanced
security and resistance against potential attacks.
Privacy-focused algorithms
Zero-Knowledge Scalable Transparent Arguments of Knowledge (zk-STARKs): zk-
STARKs are an evolution of zk-SNARKs, providing scalability and transparency in zero-
knowledge proofs.
Confidential transactions: These algorithms, like Bulletproofs, ensure transaction
amounts remain confidential, enhancing privacy in blockchain networks.
Interoperability protocols
Atomic swaps: Atomic swaps allow for direct exchange of cryptocurrencies between
different blockchains without the need for a trusted intermediary.
Polkadot: Polkadot is a multi-chain framework that enables cross-chain
communication and interoperability between different blockchains.
Types of blockchains
The blockchains have been classified into three types based on their intended use and
specific requirements: public, private, and consortium (also known as federated)
blockchains. Each type of blockchain network is designed to serve a specific purpose and
address particular issues, and each has its unique set of features and benefits over the others
(Guegan, 2020).
Public blockchain
A public blockchain is a type of blockchain that is open for all participants to read and use
for transactions, and anyone can participate in the process of creating consensus. It
operates without a central register or trusted third party, and the governance of public
channels is based on the “Code is Law” principle that emerged from the open-source
movement and cypherpunk philosophy. In this system, nodes in the network validate the
choices discussed and initiated by developers by deciding whether to integrate the
proposed modifications (Karafiloski & Mishev, 2017).
Private blockchain
In contrast to public blockchains, a private blockchain is a more restrictive and
permissioned blockchain that functions within a closed network. It is predominantly
utilized within organizations where only specific members have access to the blockchain
network. This type of blockchain is particularly suited for enterprises and businesses that
seek to utilize blockchain solely for internal purposes. One key difference between public
and private blockchains lies in their accessibility; the former is highly accessible while the
latter is limited to a select group of individuals. Additionally, a private blockchain is more
centralized since a single authority is responsible for maintaining the network. Notable
examples of private blockchains include Corda, Hyperledger Fabric, and Hyperledger
Sawtooth. Private blockchains are known for their higher transaction processing speed and
scalability. They operate within a closed network of selected participants, allowing for
increased processing power and efficiency. Unlike public blockchains, private blockchains
are less decentralized, with a single authority maintaining the network. This centralized
structure allows for higher scalability as there are no limitations to the number of nodes
that can be added to the network. With greater control over the network, private
blockchains can be customized to meet the specific needs of the organization, further
enhancing their scalability. In addition, private blockchains offer a higher transaction per
second (TPS) rate, allowing for a greater volume of transactions to be processed in a
shorter amount of time. Overall, private blockchains are an ideal solution for enterprises
and businesses that require high levels of scalability and transaction processing speed.
Private blockchains, while offering higher transaction speeds and scalability, have some
notable demerits. The first of these is that private blockchains are less secure compared to
public blockchains. This is because the private blockchain operates within a closed network
and is more centralized than public blockchains. As a result, it is more vulnerable to attacks
by hackers and other malicious actors. Another demerit is that private blockchains are less
decentralized compared to public blockchains. Achieving trust in a private blockchain can
be difficult as a result. As such, private blockchains are not suitable for use cases that
decentralized apps for public blockchains, internal enterprise use for private blockchains,
and collaborative projects between organizations for consortium blockchains.
Security
Blockchain technology’s remarkable security stems from its capability to safeguard
information interactions from human intervention through decentralized operations,
consensus mechanisms, and immutability. Blockchain operates on a decentralized network
of nodes, ensuring no single entity has full control over the data. Consensus mechanisms
require agreement among participants for data validity, preventing malicious intervention.
Once data is recorded on the blockchain, it becomes tamper-proof and immutable due to
cryptographic links. Participants’ private keys secure their data, authorizing transactions
and safeguarding against unauthorized access. Blockchain’s transparency enables auditing
and immediate detection of unauthorized intervention, enhancing trust and data integrity
(Sun, Zhang & Han, 2023). Overall, blockchain’s inherent features ensure secure and
trustworthy information interactions. Participants in blockchain interactions play a vital
role in ensuring effective information security by safeguarding their private keys (Alangot
et al., 2020). To delve deeper into its security aspects, this section will provide a concise
explanation of various attack types and the tactics employed by both honest miners and
attackers within the security assessment model (Zeng et al., 2019). Understanding these
intricacies is crucial for comprehending the robust security framework of blockchain
technology.
51% attack
One of the most widely recognized types of attack in the blockchain ecosystem is the 51%
attack. In this attack, the attacker controls more than 51% of the computing resources in
the entire blockchain network, enabling them to prevent the confirmation of a new
transaction and interrupt the user’s transaction process. The attacker can quickly confirm
false transaction information and create a longer blockchain with that information
appearing more frequently. The greater the number of computing resources under the
attacker’s control, the easier it is to execute the attack. The 51% attack can lead to the
Double-spending
In the realm of blockchain technology, a double spending attack is a grave threat that arises
from the ability of a user to spend a digital asset, such as cryptocurrency, more than once.
This exploit is based on the inherent replicability of a digital asset, enabling it to be
simultaneously used in multiple transactions. To perform this attack, the attacker initiates
a transaction and rapidly creates another transaction using the same digital asset but with a
higher transaction cost. Subsequently, the attacker attempts to get the second transaction
confirmed by the network faster than the first one, leading to the confirmation and
addition of the second transaction to the blockchain, while the first transaction is
discarded. The outcome of this malicious act is that the attacker is able to spend the same
digital asset twice, resulting in financial losses for the victims of the attack. To mitigate the
threat of double spending attacks, blockchain networks use consensus mechanisms and
validation processes that verify each transaction’s uniqueness and ensure that digital assets
can only be spent once (Malik et al., 2019).
Sybil attack
Sybil attacks in blockchain technology refer to the act of an attacker creating multiple fake
identities or nodes to gain control over the network. This attack can have severe
consequences, including the ability to manipulate transactions, prevent certain
transactions from being processed, change the blockchain’s history, overwhelm the
network with fake transactions or requests, and even perform double-spending attacks. To
prevent Sybil attacks, blockchain networks can implement various measures, including
Proof of Work (PoW), Proof of Stake (PoS), and identity verification. These measures
make it more difficult for an attacker to create multiple fake identities and gain control
over the network. Overall, Sybil attacks are a serious threat to blockchain networks, and it
is important to implement appropriate security measures to prevent them. The choice of
consensus mechanism and other security measures should be carefully considered to
protect against such attacks (Platt & McBurney, 2021; Zhong & Guo, 2021).
Timejacking
A timejacking attack in blockchain technology is a sophisticated type of attack that
specifically targets the timestamp of the blockchain. In this type of attack, the attacker
manipulates the time counter of a node to trick it into using an alternative or fake
blockchain. By doing so, the attacker can create confusion and potentially manipulate the
blockchain’s history, leading to disastrous consequences (Moubarak, Filiol & Chamoun,
2018). This type of attack can be particularly dangerous in proof-of-work blockchain
systems where the validity of a block is determined by its timestamp. As a result, it is
essential to prevent timejacking attacks. Some blockchain systems have mechanisms in
place, such as checkpointing, which involves pre-determined checkpoints that nodes can
use to verify the blockchain’s history and detect any malicious activity. Furthermore,
implementing secure time synchronization protocols can also help prevent timejacking
attacks and ensure that all nodes have synchronized and accurate time counters.
Eclipse attack
This type of attack is known as an IP address spoofing attack in blockchain technology. In
this attack, the attacker gains control of a large set of IP addresses, often through the use of
a distributed botnet. When the victim restarts its system or blockchain, the connection is
reset, and the attacker-controlled IP addresses are able to intercept the data or transactions
that are sent. By spoofing the IP address of the victim, the attacker can make it appear as
though the data or transactions are coming from a trusted source, potentially causing
significant damage to the blockchain system. To prevent IP address spoofing attacks, some
blockchain systems use techniques such as packet filtering and access control lists to verify
the authenticity of incoming data packets. Additionally, implementing secure
communication protocols such as Transport Layer Security (TLS) can also help prevent IP
address spoofing attacks (Singh & Singh, 2016).
Phishing
Phishing represents a form of cryptocurrency scam where perpetrators deceive victims into
divulging their private keys or personal details. The attacker often adopts a false identity,
pretending to be a genuine individual or entity to establish trust with the victim. Once the
victim falls prey to the scheme, the attacker exploits the obtained information to pilfer their
cryptocurrency funds. Phishing starts with a mass email or message from the attacker,
appearing legitimate, with a link to a fake website resembling the real one. When victims
input their login info on the fake site, the attacker gains access to their account. In 2022,
“Malicious browser bookmarks,” “Zero dollar purchase,” “Trojan horse currency theft,”
“Blank Check”, and “Same ending number transfer scam” emerged as notable examples of
phishing attacks (Katte, 2023). Spear phishing attack, Whaling attack, Clone phishing
attack, Pharming attack, Evil twin attack, Voice phishing attack, SMS phishing attack, and
so on are some well known phishing attacks in blockchain (Katte, 2022).
Vulnerable signatures
In blockchain technology, the vulnerable signatures attack is a specific type of security
vulnerability that targets the signature mechanism used for authentication and verification
of transactions. The attacker intercepts the digital signature, replicates it, and uses it to
Dictionary attacks
The dictionary attack constitutes a form of brute-force attack utilized to illicitly access
confidential information or systems, including passwords, hashes, digital signatures, and
encryption algorithms. In this attack strategy, the assailant adopts a hit-and-trial
methodology, commencing with a repository of commonly employed passwords and
personal details, such as names and dates of birth. Subsequently, the attacker meticulously
endeavors each entry from the compiled list until the correct password or sensitive
information is successfully identified. The objective of this attack is to exploit the
vulnerabilities of weakly guarded passwords and authentication mechanisms, thereby
gaining unauthorized entry to the targeted system or compromising the security of
cryptographic elements (Tosh et al., 2017; Houy, Schmid & Bartel, 2024). It is imperative to
be aware of the dictionary attack’s modus operandi, as it underscores the significance of
employing robust security measures to safeguard against such malicious endeavors. In the
context of blockchain-based systems, the term “dictionary attack” is not commonly used as
it would be in the context of traditional password-based systems. Blockchain systems
typically rely on cryptographic keys and signatures, and brute-force attacks like dictionary
attacks are not feasible due to the extremely high computational effort required to break
the cryptographic algorithms. Instead, in the context of blockchain security, the focus is on
protecting private keys, preventing unauthorized access to wallets or accounts, and
securing the consensus mechanism. Threats in blockchain-based systems are more likely to
involve attacks on the underlying protocols, vulnerabilities in smart contracts, or social
engineering techniques to trick users into revealing their private keys.
R, denotes the current linked block in the blockchain that the attacker selects, with each
block representing a node in the blockchain. The “child()” function is utilized to determine
whether the node has any children. In the presence of an attack block within the
blockchain, the attacker connects the new block to the longest chain after the attack block.
If no attack block exists, the attacker selects the relatively longest branch to connect the
new block.
(ii) Honest miner strategy definition: For an honest miner, the type of block remains
unknown. In a blockchain, the system only recognizes transaction information in the block
with the longest chain. At the probability level, honest miners can connect newly generated
nodes to any block, but they will ultimately choose the longest leaf node. If multiple leaf
nodes belong to the same chain length, the attacker will randomly connect to one of the
leaf nodes with equal probability. As the node depth decreases by one layer, the probability
of a node being selected will decrease by half. The sum of the probabilities of all selected
nodes in Eq. (4) equals one. Equation (5) is utilized to determine the relationship between
the probability of selecting a node and the level of the tree in which it is located.
X
n X
m
ð1=2ÞðLiÞ p ¼ 1 (4)
i¼1 j¼1
pi j ¼ ð1=2ÞðLiÞ p (5)
where, L represents the length of the entire blockchain, and the probability of selecting a
leaf node as the longest chain is denoted by p, which is determined by the current state of
the blockchain. In practical operating environments, the probability of an honest miner
selecting a node before reaching a leaf node is relatively low (Zeng et al., 2019). Honest
attackers adopt a more sophisticated strategy compared to other attackers, as they lack
knowledge of the state of each block. As the proximity to the root node increases, the
probability of a node being selected decreases.
Education
In October 2016, the Ministry of Industry and Information Technology published a
“White Paper on the Development of Blockchain Technology and Applications,” which
highlighted that the transparency and immutability of data in the blockchain system can be
utilized for student credit management, graduate employment, academic research,
industry-university cooperation, and qualification certification. This is of great significance
for promoting the healthy development of education and employment (Budiharso &
Tarman, 2020). The development of a decentralized education system using blockchain
technology can help break the monopoly of education or government agencies on the right
to education. It can create a comprehensive education system in which all parties can
participate and coordinate construction. In the future, not only schools, training units, and
other educational institutions approved by government departments with qualifications to
provide educational services but also more institutions and even individuals can assume
the role of professional educational service providers. Moreover, the open-source nature,
transparency, and tamper-proof of blockchain can guarantee the authenticity and
credibility of the educational process and results (Terzi et al., 2021; Yin et al., 2022).
Energy
The energy industry is undergoing a shift towards a clean and distributed approach in
response to the energy revolution and environmental protection movement, resulting in a
new energy structure with complementary energy flows. The bottom-up distribution of the
energy system will effectively complement the traditional energy system. In this process,
blockchain technology is likely to become an important means to realize the infrastructure
of the Internet of Energy (IoE). By combining distributed trading systems and clean energy
in the energy industry, blockchain can popularize these two trends and promote their
widespread use. Blockchain can improve the efficiency of energy production, enhance
monitoring accuracy, reduce management costs, and secure the wholesale energy trading
market. It can also reduce communication costs, promote the development of clean energy,
provide timely payment and settlement systems for retail energy trading markets, increase
investment and financing channels, and reduce energy investment and financing risks.
These measures can increase participation, provide liquidity for energy saving and
emission reduction in the energy sector, and help achieve the goal of stabilizing climate
change. One of the most promising applications of blockchain in energy management is
energy trading. By using blockchain, energy producers and consumers can trade energy
directly with each other, without the need for intermediaries, thus reducing transaction
costs and increasing the efficiency of the energy market (Münsing, Mather & Moura,
2017). Blockchain can also improve grid security by providing a tamper-proof and
transparent platform for recording energy transactions and ensuring the integrity of
energy data. This can help prevent cyber attacks and ensure the reliability of the energy
grid (Bergquist et al., 2017). Furthermore, blockchain technology can be used for electricity
market control, enabling more efficient management of energy resources and reducing
waste. By automating the process of matching supply and demand and providing real-time
data on energy production and consumption, blockchain can help balance the energy grid
Digital identity
With the rapid development of the Internet, digital identity is becoming increasingly
prevalent in various industries. Generally, digital identity enables the association of a
person’s stored computer information with their societal identity. Broadly speaking, a
digital identity is used to identify an individual’s presence in an Internet scenario and is a
combination of relevant characteristics. Digital identity can represent physical information
about an external agent, such as an individual, a business, or a government, through a
computer system. Digital identity can create a better and more trustworthy environment
for the Internet and is a fundamental basis for the digitization of financial transactions
worldwide. Blockchain technology can be a viable solution to some of the issues related to
digital identity, such as privacy concerns and data sovereignty. Blockchain can prevent the
use of false information through unilateral use, such as phone numbers or address
information, which helps avoid identity theft and eliminates the risk of inconsistent
information resulting from the use of personal digital identities in various contexts.
Moreover, blockchain technology uses asymmetric cryptography in the verification phase,
verifying the identity of the requester by comparing the hash values of digital identities
without the original data, thus eliminating the risk of personal privacy leakage.
IoT
The blockchain technology has several promising applications in the IoT domain. It can
facilitate secure and decentralized data sharing among IoT devices without intermediaries,
provide a secure identity and authentication mechanism, enable tracking and tracing of
products in the supply chain, automate and enforce contracts between IoT devices using
smart contracts, and facilitate peer-to-peer energy trading. As research and development
in this area continues, it is likely that additional use cases for blockchain in IoT will emerge,
making it an important technology for enabling secure and autonomous IoT networks. IoT
applications need trust mechanisms that ensure the integrity of the collected data and the
associated interactions as well as their transparency, that blockchain can provide (Sicari
et al., 2015). The research community puts a lot of interest in the integration of blockchain
into different aspects of IoT—decentralization (Veena et al., 2015), security (Khan & Salah,
2018), anonymity (Christidis & Devetsikiotis, 2016), identity (Gan, 2017), and device
management (Samaniego & Deters, 2016).
Finance
The potential of blockchain technology in the finance sector is high and widely recognized
(Peters & Panayi, 2016). Research efforts are focused on enhancing transaction processing
speed and performance (Peters & Panayi, 2016), as well as strengthening security and data
privacy (Singh & Singh, 2016). Furthermore, blockchain is being explored for its ability to
automate financial contracts (Egelund-Müller et al., 2017) and support corporate finance
(Momtaz, Rennertseder & Schröder, 2019), among other applications.
Government
Blockchain technology has the potential to revolutionize the government sector by
enhancing transparency, security, and efficiency in a variety of areas. One of the most
promising applications of blockchain technology in government is e-government services.
By leveraging blockchain’s decentralized and secure nature, governments can offer secure
and efficient digital services, such as the issuance of licenses, permits, and certificates
(Batubara, Ubacht & Janssen, 2018). Another critical application of blockchain technology
in government is digital identity management. Blockchain-based identity systems can
provide a tamper-proof and transparent platform for managing personal data, enabling
secure and efficient digital identity verification and reducing the risk of identity theft
(Dunphy & Petitcolas, 2018). Blockchain can also be used to enhance the integrity and
transparency of e-voting systems, enabling secure and transparent voting processes that
are resistant to tampering and fraud (Pawlak, Guziur & Poniszewska-Marańda, 2019).
Furthermore, blockchain-based value registries can provide a secure and transparent
platform for recording and tracking the ownership and transfer of assets, such as land titles
or intellectual property rights (Ramya et al., 2019). Overall, the use of blockchain
technology in government has the potential to improve transparency, reduce corruption,
and enhance the efficiency and security of public services.
Decentralized AI
Decentralized Artificial Intelligence (DAI) represents a revolutionary AI system that
harnesses the power of Blockchain technology to store and process data. Unlike centralized
AI systems controlled by a single authority, DAI relies on consensus among multiple
nodes, ensuring a more secure, transparent, and trustworthy approach to decision-making
(Adel, Elhakeem & Marzouk, 2022; Rana et al., 2022). The prevalence of AI has surged in
recent years, with organizations increasingly adopting AI systems. The average number of
AI systems per organization has doubled (Sharma, 2023) from 1.9 in 2018 to 3.8 in 2022.
While AI offers enhanced technologies and solutions across industries, its implementation
can be costly, potentially leaving some behind in the digital divide. However, AI’s potential
in Metaverse development is significant (Hwang & Chien, 2022; Cao, 2022). Centralized AI
systems face critical challenges due to their dependence on large data sets, raising concerns
about democratizing data and intelligence or retaining control within a few organizations.
To address these challenges, decentralized AI powered by Blockchain technology emerges
as a solution. Decentralized AI projects benefit from the openness and traceability of
shared ledgers, making them publicly verifiable by anyone. Platforms like SingularityNet
enable smaller companies to offer AI applications as a service, democratizing market access
for startups. Decentralization also fosters increased innovation by allowing multiple
entities to contribute to AI system development and decision-making. This diversity of
perspectives leads to a wider range of ideas and advancements in the AI landscape (Cao,
2022).
Big data
Blockchain technology has significant potential to address some of the key challenges in
the field of big data. By leveraging blockchain’s decentralized and secure nature, a data-
sharing platform can be established that enables the secure and efficient exchange of data
Money transfers
Blockchain enables fast cross-border transactions, completing within minutes compared to
traditional transfers taking days with high fees and intermediaries (Hashemi Joo,
Nishikawa & Dandapani, 2020). By eliminating intermediaries like banks, blockchain
reduces transaction costs, making transfers more affordable. Its decentralized and
encrypted nature ensures secure transactions, with each transaction recorded
transparently and immutably, preventing fraud. Users can track fund flow in real-time,
enhancing trust and accountability.
Lending
Blockchain smart contracts automate lending, eliminating intermediaries like banks.
Borrowers directly interact with the contract, which executes loan terms automatically
when conditions are met, streamlining the process and reducing overhead (Chen et al.,
2018). Smart contracts operate on a transparent and immutable blockchain ledger,
ensuring transparency and trust for all parties. Borrowers and lenders have complete
visibility into loan terms, and execution is verifiable by stakeholders. Blockchain’s
decentralized nature reduces fraud risk, and cryptographic techniques ensure data privacy
during lending. By eliminating intermediaries and automating processes, blockchain smart
contracts significantly reduce lending operational costs, benefiting borrowers and lenders.
Smart contracts expedite loan approvals by automating verification steps, benefiting
borrowers in urgent financial situations. Smart contracts manage collateral for secured
loans, automatically releasing it to borrowers or transferring ownership to lenders when
conditions are not met. Smart contracts accommodate various loan terms, customized to
suit borrowers’ needs. Blockchain smart contracts enable borderless lending, offering
opportunities worldwide without intermediaries.
Insurance
Financial insurance encompasses a wide array of activities, from stock trading and equity
management to bonds, fundraising, inter-institutional clearing and settlement, fund
management, and the issuance of insurance certificates. However, maintaining the
Voting
If we store personal identity information on a blockchain, it brings us closer to the
possibility of using blockchain for voting. Blockchain technology ensures that nobody can
vote twice, only eligible voters can participate, and no one can alter votes. Additionally, it
makes voting more accessible by allowing people to vote easily through their smartphones
with just a few taps. Using blockchain for voting would also reduce the cost of conducting
elections significantly (Yavuz et al., 2018; Shahzad & Crowcroft, 2019; Hanifatunnisa &
Rahardjo, 2017).
Interoperability
The diversity in protocols, algorithms, and data structures across various blockchains
hinders seamless information exchange, limiting their potential as universal transaction
platforms. For example, blockchains like Bitcoin and Ethereum lack meaningful
communication capabilities, impeding complex applications. This is exacerbated by
disparate programming languages for their smart contracts, necessitating dual proficiency
for developers. The absence of interoperability leads to high transaction fees and constrains
multi-network applications, curbing the broader adoption of blockchain technology.
Initiatives to foster data transfer between blockchains are emerging, but interoperability
remains a significant challenge (Belchior et al., 2021).
Distributed nature
A Blockchain functions by dispersing data across a network, forming an uninterrupted
series of records resistant to tampering and modification. This architecture integrates
blocks containing data or executable programs. Each block aggregates discrete transactions
and the results of executed blockchain operations. The bedrock of trust within the
blockchain framework emanates from the widespread presence of a complete chain replica,
meticulously recording every transaction, consistently upheld throughout the network.
However, managing this decentralized system, characterized by participants spanning
numerous computers, can prove intricate, particularly concerning consensus and
maintaining synchronization among all stakeholders (Patel et al., 2020).
Private keys
The security of the blockchain network is primarily upheld by the concept of private keys.
These private keys play a crucial role in validating blockchain addresses and ensuring the
integrity of transactions. When a user opens a cryptocurrency wallet, they are provided
with a unique private key, which essentially serves as a password granting access to
withdraw funds from the wallet. Losing the private key can be catastrophic, as it renders
the user unable to access their funds. To mitigate this risk, it is essential to store multiple
copies of the private key securely. This way, if the original key is lost or compromised, the
user can still rely on one of the backup copies to regain access to their wallet. However, the
practice of maintaining multiple copies of the private key also introduces a potential
vulnerability. If unauthorized individuals gain access to any of these copies, the entire
crypto wallet becomes compromised, exposing the user’s assets to theft or misuse (Malik
et al., 2019). Unlike typical passwords used for social media or email accounts, private keys
cannot be changed once they are generated. This lack of flexibility in altering private keys
further emphasizes the need for utmost caution in their storage and protection.
High cost
The adoption of blockchain technology entails significant financial investments, making it
a capital-intensive endeavor for most companies. This financial barrier serves as a
deterrent to many enterprises considering the implementation of blockchain solutions.
Company owners seeking to incorporate blockchain into their operations must be
prepared for substantial expenses (Zhang et al., 2020a; Alammary et al., 2019). One of the
primary cost components is the need to hire proficient and specialized personnel. This
includes hiring core blockchain developers and blockchain software developers who
possess the expertise to design, build, and maintain blockchain systems. Given the scarcity
of skilled professionals in this domain, the cost of acquiring such talent can be substantial.
Additionally, the development of blockchain-based applications further adds to the
financial burden. Companies must allocate resources to create applications that leverage
blockchain technology effectively, tailored to meet their specific needs and requirements.
Moreover, the hardware infrastructure necessary to support blockchain networks
contributes to the overall expenses. The robust and decentralized nature of blockchain
demands sophisticated hardware setups capable of maintaining the integrity and security
of the distributed ledger.
Transactional workflow
The inherent distribution in blockchains renders them especially well-suited for inter-
organizational e-Business applications (Lokshina, 2022). By cryptographically endorsing
blocks housing transactions, blockchains establish an immutable record. Within a
distributed blockchain, participants create a peer-to-peer (P2P) network to autonomously
verify transactions and integrate them into the blockchain. In the context of inter-
organizational workflow management, consensus among participants is pivotal to
determine work status, influencing the array of subsequent valid actions in the process.
However, while blockchain is tailored for high-frequency transactions such as commercial
exchanges, its alignment might not be optimal for all systems’ workflows that don’t
necessitate this level of transaction frequency (Evermann & Kim, 2019).
Immutability
Blockchain technology inherently embodies immutability, a property wherein recorded
information becomes unalterable once committed to the blockchain. This property aligns
logically with the design of systems. However, in the context of archives, which house
records susceptible to long-term changes, the concept of immutable data presents a dual
challenge. Archives necessitate the capacity to modify records’ metadata, ensuring both
authenticity after digital preservation actions and the preservation of relationships with
subsequent records introduced after an initial record’s entry into the archive, registered
within a blockchain. The imperative to maintain archival bonds, signifying networks of
relationships among aggregated records, exemplifies this requirement. Thus, the
dichotomous nature of immutability mandates judicious contemplation, encompassing
both its merits and limitations within archival frameworks (Stančić & Bralić, 2021; Politou
et al., 2019; Hughes et al., 2019).
Storage problems
In a blockchain system, like Bitcoin for instance, each node operates independently
without needing a central authority. Every node stores a complete record of all transactions
in a database. However, this decentralized setup leads to a notable outcome—the
transaction database grows rapidly over time. As the system keeps working, the memory
capacity of each node has to keep expanding to handle its operations smoothly. This
becomes even more crucial in the context of today’s huge data era, where more network
activity results in transactions happening faster. This means that nodes that hold all the
data (full nodes) need more memory to make sure transactions are checked properly. And
in the era of big data, where there’s a lot of information being exchanged, the number of
nodes connected to the blockchain network is also increasing, leading to even more growth
in the blockchain’s transaction database. This poses challenges because the more users
there are, the more data there is to store within the blockchain system (Xu et al., 2020; Jia
et al., 2021; Zhang et al., 2021).
Other considerations
When considering the use of blockchain, there are important things to think about. These
factors include needing a unique digital identifier that should work worldwide, a
decentralized naming service, a way to securely show who owns what, and making it easier
to solve problems and disagreements without manual effort.
CONCLUSIONS
In conclusion, blockchain technology holds tremendous potential to transform various
industries by providing a secure, transparent, and decentralized system for data
management and transaction processing. The inclusion of smart contracts has made
blockchain technology even more intelligent, intricate, and automated. The integration of
existing scientific research into the blockchain system is feasible and can take its
application to the next level. Although the technology has already demonstrated its value
in sectors such as finance, supply chain management, and healthcare, its utilization is
expected to expand further in the future. Blockchain’s unique features, such as distributed
storage, decentralized management, shared maintenance, consensus trust, and a reliable
database, can help overcome many of the challenges posed by conventional centralized
systems, including security, transparency, and efficiency. However, there are still technical
and regulatory challenges that need to be addressed before blockchain technology can be
fully integrated into mainstream systems. Nevertheless, the growing adoption of
blockchain by major corporations and governments globally confirms its potential as a
disruptive technology that can reshape the way we store, manage, and exchange data.
While blockchain technology is already being utilized in some exclusive domains, its
application and development will undoubtedly require a considerable amount of time. As
with other emerging technologies, it is vital to gather experience and knowledge to refine
ACKNOWLEDGEMENTS
The authors thank the anonymous reviewers for their comments and suggestions.
Funding
This article is supported by the project supported by the Key Scientific Research Projects of
Colleges and Universities in Henan Province (Grand No. 23A520054), and the Open
Foundation of State Key Laboratory of Networking and Switching Technology (Beijing
University of Posts and Telecommunications) (KLNST-2020-2-01). The funders had no
role in study design, data collection and analysis, decision to publish, or preparation of the
manuscript.
Grant Disclosures
The following grant information was disclosed by the authors:
Key Scientific Research Projects of Colleges and Universities in Henan Province:
23A520054.
Networking and Switching Technology (Beijing University of Posts and
Telecommunications): KLNST-2020-2-01.
Competing Interests
Shi Dong is an Academic Editor for PeerJ.
Author Contributions
Shi Dong conceived and designed the experiments, prepared figures and/or tables,
authored or reviewed drafts of the article, and approved the final draft.
Khushnood Abbas conceived and designed the experiments, authored or reviewed drafts
of the article, and approved the final draft.
Meixi Li conceived and designed the experiments, prepared figures and/or tables,
authored or reviewed drafts of the article, and approved the final draft.
Joarder Kamruzzaman conceived and designed the experiments, authored or reviewed
drafts of the article, and approved the final draft.
Data Availability
The following information was supplied regarding data availability:
This is a literature review.