18th IFAC Conference on Technology, Culture and International 18th IFAC Conference on Technology, Culture and International Stability Availableand online at www.sciencedirect.com 18th IFAC Conference Sept on Technology, International Stability Baku, Azerbaidschan, 13-15, 2018Culture 18th IFAC Conference on Technology, Culture and International Stability Baku, Azerbaidschan, Sept 13-15, 2018 Stability Baku, Azerbaidschan, Sept 13-15, 2018 Baku, Azerbaidschan, Sept 13-15, 2018
ScienceDirect
IFAC PapersOnLine 51-30 (2018) 693–696
Implementation of directed acyclic graph in blockchain network to improve Implementation of directed acyclic graph in blockchain network to improve Implementation graph blockchain securityacyclic and speed ofin transactions Implementation of of directed directed graph blockchain network network to to improve improve securityacyclic and speed ofin transactions security and speed of transactions security and speed ofMagomedov***, transactionsV.V. Nikonov***, S.A. Pavelev*** I.D. Kotilevets*, I.A. Ivanova**, I.O. Romanov***, S.G.
I.D. Kotilevets*, I.A. Ivanova**, I.O. Romanov***, S.G. Magomedov***, V.V. Nikonov***, S.A. Pavelev*** I.D. Kotilevets*, I.A. Ivanova**, I.O. Romanov***, S.G. Magomedov***, V.V. Nikonov***, S.A. Pavelev*** I.D. Kotilevets*, I.A. Ivanova**, *MIREA I.O. Romanov***, V.V. Nikonov***, S.A. Pavelev*** - Russian Technological University, S.G. Magomedov***, *MIREA Russian Technological University, Moscow,*MIREA Russian-Federation (email:
[email protected]) Russian Technological University, Moscow, Russian--Federation (email:
[email protected]) *MIREA Russian Technological University, **MIREA Russian Technological University, Moscow, Russian Federation (email:
[email protected]) **MIREA -Federation Russian Technological University, Moscow, Russian (email:
[email protected]) Moscow, Russian Federation (email:
[email protected]) **MIREA - Federation Russian Technological University, Moscow, Russian (email:
[email protected]) **MIREA Russian Technological University, ***MIREA - Russian Technological University, Moscow, Russian Federation Moscow, Russian Federation (email:
[email protected]) ***MIREA - Russian Technological University, Moscow, Russian Federation Moscow, Russian Federation (email:
[email protected]) ***MIREA - Russian Technological University, Moscow, Russian Federation ***MIREA - Russian Technological University, Moscow, Russian Federation Abstract: The article describes the advantages provided by the implementation of a directed acyclic Abstract: article describes the advantages provided the implementation a directednetworks acyclic graph in theThe blockchain network. The advantages and knownby limitations of commonof blockchain Abstract: article describes the advantages provided the implementation of a directednetworks acyclic graph in theThe blockchain network. The advantages and knownby limitations of common blockchain Abstract: The article describes the advantages provided byincreasing the implementation of a directedbetween acyclic are described. It is shown how directed acyclic graph allows the speed of transactions graph in the blockchain network. The advantages and known limitations of common blockchain networks are described. It is shown how directed acyclic graph allows increasing the speed of chains transactions between graph in the blockchain network. The advantages and known limitations of common blockchain networks the network nodes and scaling the channel width due to the formation parallel instead of the are described. It is shown how directed acyclic graph allows the of chains transactions between the network nodes and scaling the channel width due to theincreasing formation of speed parallel instead of the are described. It isinshown howblockchain directed acyclic graph allows increasing the speed of transactions between single true chain common networks. Consequently, it is shown how blockchain network the network nodesinand scalingblockchain the channel width due to the formation of parallel chains insteadnetwork of the single true chain common networks. Consequently, it is shown blockchain the nodes and scaling the channel width due toofthe formation of parallel chains instead of the withnetwork directed acyclic graph also eliminates the concept mining, allowing forhow transactions without single true chain in common blockchain networks. Consequently, it is shown how blockchain network with directed acyclic graph also eliminates the concept of mining, it allowing forhow transactions without the single true chain in common blockchain networks. Consequently, is shown blockchain network corresponding fees. with directed acyclic also eliminates the concept of mining, allowing for transactions without the corresponding fees. graph with directed acyclic graph also eliminates the concept of mining, allowing for transactions without the corresponding fees. © 2018, IFAC (International Federation of Automatic Control) Hosting by Elsevier All rights reserved. Keywords: blockchain; network; security; transactions; capacity; directed acyclicLtd. graph. corresponding fees. Keywords: blockchain; network; security; transactions; capacity; directed acyclic graph. Keywords: blockchain; network; security; transactions; capacity; directed acyclic graph. Keywords: blockchain; network; security; transactions; capacity; directed acyclic graph. both ordinary members of society and applicants for positions 1. INTRODUCTION both ordinaryinmembers of society and applicants for positions of managers local government). 1. INTRODUCTION both ordinaryinmembers of society and applicants for positions of managers local government). 1. INTRODUCTION ordinary members of society and applicants for positions One of the biggest problems today in the information both of managers in local government). 1. INTRODUCTION Blockchain-based prevent a range of different One of theisbiggest problems in The the information managers in localsystems government). technology the problem of today security. number of of Blockchain-based systems prevent a range of different One of theisbiggest problems today in The the information attacks. technology the problem of security. number of Blockchain-based systems prevent a range of different One of the isbiggest problems today in the information cybercrime to attacks. technology isis thegrowing, problem including of security.those The related number of Blockchain-based systems prevent a range of different cybercrime including those to attacks. technology isdata thegrowing, problem of security. The related number of identification theft. According to the analytical agency cybercrime is growing, including those related to attacks. identification data theft. According to analytical cybercrime is growing, including those related to 1.1 Man-in-the-middle attacks Cybersecurity Ventures, Morgan S. the (2016), the agency annual identification data theft. According to the analytical 1.1 Man-in-the-middle attacks Cybersecurity Ventures, Morgan S. (2016), thebyagency annual identification data theft. According totrillion the analytical agency damage from cybercrime will reach 6 dollars 2021. 1.1 Man-in-the-middle attacks Cybersecurity Ventures, will Morgan S.trillion (2016), thebyannual damage from cybercrime reach 6 dollars 2021. 1.1 Man-in-the-middleattacks attacks correspond to a type of Cybersecurity Ventures, Morgan S. (2016), the annual Man-in-the-middle damage will reach 6 trillionbegan dollars by 2021. Man-in-the-middle attacks correspond to can a type of To solvefrom thiscybercrime problem, many companies the cryptographic damage from cybercrime will reach 6 trillion dollarstobyuse 2021. attack in which an attacker intercept Man-in-the-middle correspond to can a type of To solve this problem, many companies began to use data the cryptographic attack attacks in which anwith attacker intercept blockchain, because this technology is able to protect Man-in-the-middle attacks correspond to a type of messages and secretly replace them different ones. This To solve this problem, many companies began to use the cryptographic attack in which an attacker can intercept blockchain, because this many technology is able to protect and in secretly replace them different ones. This To this problem, companies began to use data the messages and solve make their audit more transparent. cryptographic attack in data which anwith attacker can intercept is quite real modern networks, where information blockchain, because this technology is able to protect data and in secretly replace with different ones. This and make their audit more transparent. is able to protect data messages is quite modern data them networks, where information blockchain, because this technology messages and secretly replace them different ones.many This from onereal user is transmitted to with another through and make their audit means more transparent. is quite real in modern data networks, where information Blockchain literally "block chain". In other words, the from onerealuser is that transmitted to another through many and make their audit more transparent. is quite in modern data networks, where information intermediate nodes are not controlled by these users. This Blockchain literally means "block chain". In other words, the from one user is that transmitted to another through many blockchain isliterally a log with data"block records. Under datawords, any kind intermediate nodes are not controlled by these users. This Blockchain means chain". Inthe other the type from ofone user is organization transmitted to secured another through many attack and of data transfer to blockchain isliterally a log with data"block records. Under data any kind intermediate nodes that are not controlled by these users. This Blockchain means chain". Inthe other words, the type of information can be implied. All information is combined of attack and organization of secured data transfer to blockchain is a log with data records. Under the data any kind intermediate nodes that are not controlled by these users. This prevent it were discussed by Magomedov Sh. (2017). of information can be implied. All information is combined of itattack and organization of secured data transfer to blockchain a log withcryptographic data records. blocks Under the anyinto kinda type intoinformation blocks,isand then are data linked prevent were discussed by Magomedov Sh. (2017). of can be implied. All information is combined type of attack and organization of secured data transfer to into blocks, then cryptographic blocks are intobya prevent it were discussed by Magomedov Sh. (2017). of information implied. All information is combined chain using aand setcan of be mathematical algorithms, as linked described In a blockchain-based system, this type Sh. of attack is almost into blocks, and then cryptographic blocks are linked into a prevent it were discussed by Magomedov (2017). chain using aand set then of mathematical algorithms, as linked described system, typepublishes of attackdata is almost into blocks, cryptographic blocks are intobya In a blockchain-based Morozov D.M. to implement. Whenthis a user to the chain using a set(2016). of mathematical algorithms, as described by impossible a blockchain-based system, this typepublishes of attackdata is almost Morozov D.M. impossible toall implement. When anetwork user to the chain using a set(2016). of mathematical algorithms, as described by In In a blockchain-based system, this type of attack is almost blockchain, nodes in the also receive Morozov D.M. (2016). toall implement. When anetwork user publishes data to this the This technology can be used in absolutely different areas. impossible blockchain, nodes in the also receive this Morozov D.M. (2016). impossible to Information implement. When a user publishes data to and the information. isthe written to also the receive block, This technology can be used in absolutely different areas. blockchain, all nodes in network this From the distribution of multimedia (Paperchain - a information. Information is written to the block, and This technology can be used in absolutely different areas. blockchain, all nodes in the network alsoof receive this blockchain cryptography protects the integrity the registry. From the distribution of multimedia (Paperchain a Informationprotects is written to theof the block, and This technology used in absolutely different areas. decentralized toolcanforbestandardized collection, storage ofa information. blockchain cryptography the integrity registry. From the distribution of multimedia (Paperchain Information is to attackers the block, Therefore, publishing fake datawritten from the will and not decentralized tool for standardized collection, storage-- the ofa information. blockchain cryptography protects the integrity of the registry. From theand distribution of multimedia (Paperchain metadata exchange of this information between publishing fake data from the attackers will not decentralized tool for standardized collection,between storage the of Therefore, blockchain cryptography protects the integrity of the registry. work because the fake is immediately recognized. metadata and exchange of this information publishing fake data fromrecognized. the attackers will not decentralized tool forof standardized collection, storage of Therefore, various participants the music industry), between real estate work because the fake is immediately metadata and exchange of this information the Therefore, publishing fake data from the attackers will not various participants ofblockchain-platform the music industry), real estate work because the fake is immediately recognized. metadata and exchange of this information between the (UBITQUITY SaaS for records of various participants ofblockchain-platform the music industry), estate because the fake is immediately recognized. (UBITQUITY - SaaS for real records of work various and participants of the rights) musicto industry), real estate 1.2 The manipulation of data property related property operations with goods (UBITQUITY SaaS blockchain-platform for records of property and related property rights) tofor operations with goods (UBITQUITY - SaaS blockchain-platform for converting, records of 1.2 The manipulation of data and raw materials (Uphold - platform moving, property and related property rights) tofor operations with goods 1.2 The manipulation of data and raw materials (Uphold platform moving, converting, manipulation of data property and related property rights) to operations with goods NotThe so long ago, hackers were able to compromise the site of making and storing any form of money, goods or 1.2 and raw transactions materials (Uphold - platform for moving, converting, Not so long ago, hackers were able compromisean theinfected site of making transactions and storing any form of money, goods or and raw materials (Uphold platform for moving, converting, the Linux Mint operating system andto downloaded raw materials), data management (in ofcompany Factom making transactions and storing any form money, goods or Not so long ago, hackers were able compromisean theinfected site of Linux Mint system andto raw materials), data (in Factom Not so long ago,operating hackerswith were able todownloaded compromise the site of making transactions andmanagement storing any to form ofcompany money, goods or the version of the system a built-in backdoor. Typically, identification blockchains are used implement a database the Linux Mint operating system and downloaded an infected raw materials), data management (in company Factom identification blockchains are used to (in implement database the system a built-in backdoor. the LinuxofMint operating system and infected raw materials), dataandmanagement Factom developers provide hashwith amounts to downloaded allow users an toTypically, verify a management system data analysis in acompany varietyaa of areas) version version of the system with a built-in backdoor. identification blockchains are used to implement database developers provide hash amounts to allow users toTypically, verify management system and data analysis in a variety of areas) version of the systembut with athis built-in backdoor. Typically, identification blockchains are usedand to implement a database copy of the software, in case, hackers were able toaa and the organization of private public administration provide hash amounts to allow userswere to verify management system and data analysis in a variety of areas) developers copy of the software, but in this case, hackers ableone toa and the organization of private and public administration hash amounts to allow users so to verify management and for data improving analysis in the a variety of areas) publish theprovide hash amounts of their no (Advocate, asystem platform interaction of developers copy of the software, but in this case, version, hackers were ableone to and the organization of for private and public administration publish the hash amounts of their version, so no (Advocate, a platform improving the interaction of copy of the but problem in this case, hackers were ablewas to and the with organization of private and public administration suspected of software, forgery. The of data manipulation citizens government representatives, aimed at helping publish the hash amounts of their version, so no one (Advocate, a platform for improving the interaction of suspectedthe of forgery. The problem of data manipulation citizens witha government representatives, aimed at helping hash amounts of their version, so no was one (Advocate, platform for improving the interaction of publish citizens with government representatives, aimed at helping suspected of forgery. The problem of data manipulation was citizens with government representatives, aimed at helping suspected of forgery. The problem of data manipulation was
2405-8963 © IFAC (International Federation of Automatic Control) Copyright © 2018, 2018 IFAC 693Hosting by Elsevier Ltd. All rights reserved. Peer review©under of International Federation of Automatic Copyright 2018 responsibility IFAC 693Control. Copyright © 2018 IFAC 693 10.1016/j.ifacol.2018.11.213 Copyright © 2018 IFAC 693
IFAC TECIS 2018 694 Baku, Azerbaidschan, Sept 13-15, 2018
I.D. Kotilevets et al. / IFAC PapersOnLine 51-30 (2018) 693–696
researched by Voit A. et al. (2017), Popov G. and Magomedov Sh. (2017). However, user of a blockchain network can publish a hash associated with a single file, operating system image and other data that requires protection. In this case, if hackers get to the information and change it, they will not be able to correct the hash amount recorded in the blockchain.
Scalability limits;
Low transaction speed
Unreliable consensus mechanisms.
2.1 Scalability limits In many blockchain networks specific algorithms of consensus are used. These algorithms have the same problem: each full network node must process each transaction. This is due to the decentralized structure of the blockchain. Instead of a single center that is responsible for security and functionality, each node in the blockchain network contributes to the overall security by confirming each transaction and storing a complete copy of the network state.
1.3 DDoS-attack The primary purpose of DDoS is to limit the capacity of a network resource, such as a server or infrastructure that supports a particular company's site. Servers have certain limits of requests that are processed at the same time. If the number of calls to the server exceeds the capabilities of any infrastructure component, service level issues occur. And the scale of these problems depends on the purpose of DDoSattacks.
This method provides resistance to censorship, independence from regulators and provides certain security guarantees. But on the other hand, the number of transactions that a blockchain network is capable of processing is equivalent to the capacity of one network node.
Not so long ago, information security specialists from the company Recorded Future, Moriuchi P. and Chohan S. (2018), found that several organizations of the financial sector were exposed to one of the largest DDoS attacks of recent time.
This leads to two practical conclusions: 1. Low- capacity. The blockchain can only process a limited number of transactions.
Usage of blockchain technology abandons centralized DNS servers and implements a system in which name and IPaddress pairs are registered in the blockchain network and distributed across all nodes. This will ensure transparency and security at the same time. As shown by Dickson B. (2017), hackers will not be able to target the whole infrastructure by attacking a single cluster.
2. Low speed of transaction execution. The processing of the transaction block takes a significant amount of time. In other words, as the size of the blockchain grows, so do the demands on the storage, capacity and processing power of each network node. There may come a time when block processing will require so many resources that there will be too little nodes capable of handling this load.
1.4 Hacking Internet of Things devices
2.2 Unreliable consensus-building mechanisms
According to a study by F5 Networks, Boddy S. and Shattuck J. (2017), the number of attacks on Internet of Things devices and infrastructure has increased by 280% since the beginning of 2017. For the most part, this is due to the spread of malware called Mirai. Hackers break into Internet of Things devices and use them to carry out DDoS attacks and host Trojan infrastructure. At the same time, researchers from the company Recorded Future, who discovered the largest DDoS-attack, claim that the botnet is formed from 13,000 devices of the Internet of Things. Meanwhile the criminals have changed the tactics of formation of botnets and are specifically looking for devices with known vulnerabilities.
Users who make transactions on the blockchain do not need to trust a third side. This achieves anonymity, the ability to resist restrictions without anyone's approval. A mechanism that has been used for a long time in a nontrusted blockchain and is able to effectively counter attacks is called a consensus algorithm. The consensus mechanism allowed the bitcoin blockchain to become the first widespread global decentralized transaction registry. Proof-of-Work (PoW) is a scheme based on solving problems that are difficult to solve but easy to verify. Users of the blockchain network perform complex resource-intensive calculations using their computing power, and the system, for example - bitcoin, rewards them with new bitcoins and transaction fees. The more the miner's computing power, the more "weight" it has in the adoption of decisions by consensus. The structure of the bitcoin blockchain is shown in figure 1.
The blockchain can help protect the Internet of Things for the same reasons it can help deal with Man-in-the-Middle attacks, data compromise and DDoS attacks - the legitimacy of information and a clear process of approving it. However, blockchain is still not widely used, and there are certain reasons for this. 2. LIMITATIONS OF BLOCKCHAIN Blockchain technology is not without its drawbacks, among which we will consider the following in more detail: 694
IFAC TECIS 2018 Baku, Azerbaidschan, Sept 13-15, 2018
I.D. Kotilevets et al. / IFAC PapersOnLine 51-30 (2018) 693–696
695
time confirm not one, but several transactions. Thanks to this we get the following: 1. The system determines the parent transactions; 2. Then the system signs their hashes and includes the following translations; 3. A tree structure of transactions is formed, where each transaction will be considered confirmed and unchanged. In the blockchain blocks cannot be created in parallel. Associated storage structure only allows for a single chain in the whole network. Data about transactions that occurred at about the same time are written to the block. Then miners compete with each other, trying to check the block as quickly as possible and get rewarded. However, if you change or even remove the concept of mining from such a network, its capacity can be increased by X times, simultaneously generating X blocks.
Fig 1. Structure of the bitcoin blockchain PoW solved the so-called double spending problem without the involvement of a trusted third side. However, the PoW protocol is imperfect, and serious work by researchers and developers is still required to create a more viable consensus mechanism. The main problems of PoW include:
Apart from blockchain, directed acyclic graphs are used in compilers, artificial intelligence, statistics and machine learning. In other words, directed acyclic graphs are used in those areas where the speed of transactions is extremely important. Some implementations of the platforms based on directed acyclic graphs were described by Aryanova T. (2018).
1. The need for special equipment. The disadvantages of the Proof-of-Work consensus include the need to use special hardware. In 2013 application-specific integrated circuit (ASIC) chips were developed. They were developed exclusively for mining, increasing its efficiency by 10 to 50 times. But they cannot be used anywhere else but mining.
Combining blockchain and directed acyclic graphs is based on the idea of parallel chains, while the blocks themselves retain their importance. Different types of transactions are executed simultaneously on different chains. A comparison of the blockchain structure and the directed acyclic graph is shown in figure 2.
Since then, mining with a conventional processor has become completely unprofitable: you can mine only through an ASIC device made independently or purchased from the manufacturer. This contradicts the decentralized nature of the blockchain, where everyone has the opportunity to contribute to the security of the network. 2. Power inputs. Miners employ computers of enormous power, carrying out calculations in the limits of the Proof-ofWork algorithm, but all this computational work does not benefit the society otherwise. As public blockchains such as bitcoin using the Proof-ofWork consensus will be growing in scale, energy consumption will only increase. If the purpose of the public blockchain is to scale to millions of users and transactions, then wasted energy will not contribute to this goal. These fundamental problems of open blockchains were discussed in the work of Belov A. (2018).
Fig 2. Structure of the blockchain (on the left) and blockchain-based directed acyclic graph (on the right)
3. IMPLEMENTATION OF DIRECTED ACYCLIC GRAPH With the solution of these problems can help directed acyclic graph - the case of a directed graph, in which there are no paths starting and ending at the same node. Such a graph can also use topological sorting. Its growth can go only in one direction - from the early blocks to the later.
However, it can happen that at the same time hashes of multiple users of the network will be received, and they will be eligible for confirmation of a block. This can lead to time branches. The truth of a particular transaction is determined by the number of transactions behind it. The speed of the transaction returning to the network is the lower the more transactions are behind it, which makes the transaction more secure. After the transaction is verified, it must be associated
Blocks in this structure are not arranged sequentially one after another, and can go from earlier to later, but at the same 695
IFAC TECIS 2018 696 Baku, Azerbaidschan, Sept 13-15, 2018
I.D. Kotilevets et al. / IFAC PapersOnLine 51-30 (2018) 693–696
with an existing relatively new operation in the blockchain network with directed acyclic graph. However, if you associate transactions only with earlier transactions, the network becomes too wide to check for new transactions. Ideally, blockchain network with directed acyclic graph selects the existing most recent transaction to which the new transaction relates. The point is to keep the network capacity within certain limits, providing a quick check.
Moriuchi P. and Chohan S. (2018) Mirai-Variant IoT Botnet Used to Target Financial Sector in January 2018 URL: https://www.recordedfuture.com/mirai-botnet-iot/ (obtained 02.04.2018) Morozov D.M. (2016) Links of one chain: pros and cons of blockchain URL: http://lib.custis.ru/Звенья_одной_цепи:_плюсы_и_мин усы_блокчейна (obtained 02.04.2018) Popov G. and Magomedov Sh. (2017) Comparative analysis of various methods treatment expert assessments International Journal of Advanced Computer Science and Applications (DOI: 10.14569/IJACSA.2017.080505) Vol. 8 # 5 p. 35-39. Voit A., Stankus A., Magomedov S., Ivanova I. (2017) Big Data Processing for Full-Text Search and Visualization with Elasticsearch International Journal of Advanced Computer Science and Applications (DOI: 10.14569/IJACSA.2017.081211) # 8/12 p. 76-83
Due to the blockless structure, transactions are processed directly on directed acyclic graph networks. This process is much faster and demands much less resources than in the case of blockchains based on Proof-of-Work and analogues. Current implementations of blockchain networks with directed acyclic graph are able to process up to 10000 transactions per second. The blockchain network with directed acyclic graph also eliminates the concept of mining. Confirmation takes place directly in the transactions themselves. For users this means that transactions are almost instantaneous and do not require significant corresponding fees. 4. CONCLUSIONS By combining the blockchain and directed acyclic graph, it is possible to create a network in which the main disadvantages of blockchain technology - low transaction speed and scaling problems - are eliminated. Through the use of multiple parallel chains, the speed of transactions can increase greatly. This is also achieved because all data does not need to be written to the block. The resulting network can, for example, be used on low-power devices such as the Internet of Things devices. REFERENCES Aryanova T. (2018) DAG How platforms based on directed acyclic graph work URL: https://chaining.ru/2018/01/30/dag-kak-rabotayutplatformy-na-osnove-napravlennogo-atsiklicheskogografa/ (obtained 02.04.2018) Belov A. (2018) Fundamental problems of open blockchains URL: https://cryptocurrency.tech/fundamentalnyeproblemy-otkrytyh-blokchejnov-chast-3/ (obtained 02.04.2018) Boddy S. and Shattuck J. (2017) The Hunt for IoT: The Rise of Thingbots URL: https://f5.com/labs/articles/threatintelligence/ddos/the-hunt-for-iot-the-rise-of-thingbots (obtained 02.04.2018) Dickson B. (2017) How blockchain can improve cybersecurity URL: https://bdtechtalks.com/2017/01/11/how-blockchain-canimprove-cybersecurity/ (obtained 02.04.2018) Magomedov Sh. (2017) Organization of secured data transfer in computers using sign-value notation ITM Web of Conferences (DOI: 10.1051/itmconf/20171004004) Vol. 10 Morgan S. (2016) Cybersecurity and cybercrime statistics URL: https://cybersecurityventures.com/cybersecurityand-cybercrime-statistics/ (obtained 02.04.2018)
696