| Literature DB >> 30225029 |
Leif-Nissen Lundbæk1, Daniel Janes Beutel2, Michael Huth1, Stephen Jackson3, Laurence Kirk2, Robert Steiner3.
Abstract
We adjust the Proof of Work (PoW) consensus mechanism used in Bitcoin and Ethereum so that we can build on its strength while also addressing, in part, some of its perceived weaknesses. Notably, our work is motivated by the high energy consumption for mining PoW, and we want to restrict the use of PoW to a configurable, expected size of nodes, as a function of the local blockchain state. The approach we develop for this rests on three pillars: (i) Proof of Kernel Work (PoKW), a means of dynamically reducing the set of nodes that can participate in the solving of PoW puzzles such that an adversary cannot increase his attack surface because of such a reduction; (ii) Practical Adaptation of Existing Technology, a realization of this PoW reduction through an adaptation of existing blockchain and enterprise technology stacks; and (iii) Machine Learning for Adaptive System Resiliency, the use of techniques from artificial intelligence to make our approach adaptive to system, network and attack dynamics. We develop here, in detail, the first pillar and illustrate the second pillar through a real use case, a pilot project done with Porsche on controlling permissions to vehicle and data log accesses. We also discuss pertinent attack vectors for PoKW consensus and their mitigation. Moreover, we sketch how our approach may lead to more democratic PoKW-based blockchain systems for public networks that may inherit the resilience of blockchains based on PoW.Entities:
Keywords: Cryptographic Sortition; access control; blockchain; cybersecurity
Year: 2018 PMID: 30225029 PMCID: PMC6124024 DOI: 10.1098/rsos.180422
Source DB: PubMed Journal: R Soc Open Sci ISSN: 2054-5703 Impact factor: 2.963
Figure 1.An illustration of the Cryptographic Sortition process used in PoKW.
Figure 2.(a) Specification of digital signatures for node pk, sig(m) refers to the digital signature of message m with private key for pk. (b) Specification of checking whether node pk is a potential participant in the task task. (c) Function name for extraction of set of eligible public keys from local blockchain state. (d) Function name for computing local transactions that should get into the next block (should node pk become leader). The manner in which outputs for (c) and (d) are computed will be application-specific
Figure 3.Specification of PoW for potential leaders for blockheight r. Nodes pk start mining only if they are eligible. New system values are the same as the old ones when r is not a multiple of p; otherwise, the new system values are determined by local machine learning.
Some values of the probabilities in (4.2) and (4.3), rounded to three significant digits. Probabilities refer to a group of nodes finding PoW, not winning a PoW race that includes convincing the network that one has won that race.
| 10−8 | 0.998 | 0.956 |
| 10−9 | 0.465 | 0.268 |
| 10−10 | 0.06 | 0.03 |
Figure 4.System architecture of our pilot use case for Porsche: user smartphone components are shown on upper left; vehicle ECU, CAN bus and vehicle systems are depicted on upper right; and the XAIN network is seen below. Edges are labelled with communications and their realizing technology.
Figure 5.Schematic overview of our approach to key management in our pilot use case.