Introduction of Interstitial Model and a Sumkey to Address the Key Challenges with Blockchain

The Internet is an incredible platform available for sharing information and keeping track of data, but due to all that information and data floating around on the Internet and passing through multiple distinctive IoT devices, people can be tempted to steal that information for malicious use. With the help of 5G technology, we can reduce latency, increase speeds, and capacity for IoT devices for extensively used. Concurrently, these devices can power the security, decentralization, immutability, and consensus by using blockchains as foundational layers.In this paper, we discuss security issues in blockchain and IoT devices, and we propose the use of an interstitial model for flexibility and xtensibility of the layered architecture for the growth of blockchain, and a SumKey algorithm to resolve the subset sum problem for whole numbers by combining with the partition problem. This method applies to entire sequential numbers in a multiset cardinality. In ERP Financial Systems, the Chartfield can be used for this purpose.

[1]  Pieter Wuille,et al.  Enabling Blockchain Innovations with Pegged Sidechains , 2014 .

[2]  Jeremy Clark,et al.  SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies , 2015, 2015 IEEE Symposium on Security and Privacy.

[3]  Athanasios V. Vasilakos,et al.  BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0 , 2018, J. Netw. Comput. Appl..

[4]  Young-Sik Jeong,et al.  DistBlockNet: A Distributed Blockchains-Based Secure SDN Architecture for IoT Networks , 2017, IEEE Communications Magazine.

[5]  Sooyong Park,et al.  Where Is Current Research on Blockchain Technology?—A Systematic Review , 2016, PloS one.

[6]  Jason Bennett Thatcher,et al.  Blockchain Technology in Business and Information Systems Research , 2017, Business & Information Systems Engineering.

[7]  Mohamed Amine Ferrag,et al.  Blockchain Technologies for the Internet of Things: Research Issues and Challenges , 2018, IEEE Internet of Things Journal.

[8]  Xiaohong Huang,et al.  LNSC: A Security Model for Electric Vehicle and Charging Pile Management Based on Blockchain Ecosystem , 2018, IEEE Access.

[9]  Xiuzhen Cheng,et al.  A Blockchain Based Truthful Incentive Mechanism for Distributed P2P Applications , 2018, IEEE Access.

[10]  Johan Pouwelse,et al.  TrustChain: A Sybil-resistant scalable blockchain , 2017, Future Gener. Comput. Syst..

[11]  Igor Kabashkin,et al.  Risk Modelling of Blockchain Ecosystem , 2017, NSS.

[12]  Iuon-Chang Lin,et al.  A Survey of Blockchain Security Issues and Challenges , 2017, Int. J. Netw. Secur..

[13]  Juri Mattila,et al.  The Blockchain Phenomenon – The Disruptive Potential of Distributed Consensus Architectures , 2016 .

[14]  S. Ammous,et al.  Blockchain Technology: What is it Good for? , 2016 .

[15]  David Lee Kuo Chuen Handbook of Blockchain, Digital Finance, and Inclusion, Volume 1 : Cryptocurrency, FinTech, InsurTech, and Regulation , 2017 .

[16]  Klaus Wehrle,et al.  Secure and anonymous decentralized Bitcoin mixing , 2018, Future Gener. Comput. Syst..

[17]  Ke Xiao,et al.  A Blockchain Based Privacy-Preserving Incentive Mechanism in Crowdsensing Applications , 2018, IEEE Access.

[18]  Jennifer Xu,et al.  Are blockchains immune to all malicious attacks? , 2016 .

[19]  Christian Cachin,et al.  Architecture of the Hyperledger Blockchain Fabric , 2016 .

[20]  J.D. Day,et al.  The OSI reference model , 1983 .

[21]  Xingtong Liu,et al.  Unlinkable Coin Mixing Scheme for Transaction Privacy Enhancement of Bitcoin , 2018, IEEE Access.

[22]  Guigang Zhang,et al.  Deep Learning , 2016, Int. J. Semantic Comput..

[23]  M. Iansiti,et al.  The Truth about Blockchain , 2017 .

[24]  Alex Pentland,et al.  Decentralizing Privacy: Using Blockchain to Protect Personal Data , 2015, 2015 IEEE Security and Privacy Workshops.

[25]  Bharat S. Rawal Multilayer split-protocol , 2018, 2018 10th International Conference on Communication Systems & Networks (COMSNETS).

[26]  Qiaoyan Wen,et al.  An Anti-Quantum Transaction Authentication Approach in Blockchain , 2018, IEEE Access.

[27]  Danilo Gligoroski,et al.  SoK of Used Cryptography in Blockchain , 2019, IEEE Access.