Blockchain Nodes


Blockchain Nodes

If you want to read the PDF, try requesting it from the authors.


In the previous chapter, I covered basic concepts related to blockchain and the pieces that make up an individual blockchain. I covered how blockchain technology solved the double spending problem by utilizing a P2P network, which led to the creation of a global distributed shared ledger and digital cash. The blockchain P2P network is stitched together by connecting multiple nodes, and in this chapter, you will be taking a closer look at the nodes that make up the network.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the author.

... • Irreversibility and resilience: Every node in blockchain stores an identical copy of the whole chain in distributed network of nodes as designed. Blockchain resilience originates from its structure (Elrom, E., 2019). • Provenance and trust: To verify the reality of data of transaction at a specific time in the block, undisputable mechanism is provided by blockchain technology. ...
... In centralized distributed system, master node breaks down data or tasks and distributes the load to remaining nodes. On the other hand in decentralized distributed system, computation may be distributed without having any master node (Elrom, E., 2019). Distributed computing is one of the reason for faster computation in such designs, due to centralization these systems also suffers from limitations. ...
... Bitcoin validates whether one is spending legal transaction in this layer (Khalilov, M. C. K. & Levi, 2018). While traversing previous transactions, all nodes validate transaction whether it is legitimate transaction or not (Elrom, E., 2019). ...
Full-text available
The Internet of Things paradigm is growing rapidly. In fact, controlling this massive growth of IoT globally raises new security and privacy issues. The traditional access control mechanisms provide security to IoT systems such as DAC (discretionary access control) and mandatory access control (MAC). However, these mechanisms are based on central authority management, which raises some issues such as absence of scalability, single point of failure, and lack of privacy. Recently, the decentralized and immutable nature of blockchain technology integrated with access control can help to overcome privacy and security issues in the IoT. This paper presents a review of different access control mechanisms in IoT systems. We present a comparison table of reviewed access control mechanisms. The mechanisms' scalability, distribution, security, user-centric, privacy and policy enforcing are compared. In addition, we provide access control classifications. Finally, we highlight challenges and future research directions in developing decentralized access control mechanisms for IoT systems.
ResearchGate has not been able to resolve any references for this publication.