How Does CSMA/CA Affect the Performance and Security in Wireless Blockchain Networks

The impact of communication transmission delay on the original blockchain, has not been well considered and studied since it is primarily designed in stable wired communication environment with high communication capacity. However, in a wireless scenario, due to the scarcity of spectrum resource, a blockchain user may have to compete for wireless channel to broadcast transactions following media access control (MAC) mechanism. As a result, the communication transmission delay may be significant and pose a bottleneck on the blockchain system performance and security. To facilitate blockchain applications in wireless industrial Internet of Things (IIoTs), this article aims to investigate whether the widely used MAC mechanism, carrier sense multiple access/collision avoidance (CSMA/CA), is suitable for wireless blockchain networks or not. Based on tangle, as an example to analyze the system performance in term of confirmation delay, transaction per second and transaction loss probability by considering the impact of queueing and transmission delay caused by CSMA/CA. Next, a stochastic model is proposed to analyze the security issue taking into account the malicious double-spending attack. Simulation results provide valuable insights when running blockchain in wireless network, the performance would be limited by the traditional CSMA/CA protocol. Meanwhile, we demonstrate that the probability of launching a successful double-spending attack would be affected by CSMA/CA as well.

[1]  D. Woolley The White Paper. , 1972, British medical journal.

[2]  Philip Staupe,et al.  Quasi-Analytic Parasite Chain Absorption Probabilities in the Tangle , 2017 .

[3]  Lei Zhang,et al.  Blockchain-Enabled Wireless Internet of Things: Performance Analysis and Optimal Communication Node Deployment , 2019, IEEE Internet of Things Journal.

[4]  Peter G. Neumann,et al.  The future of the internet of things , 2017, Commun. ACM.

[5]  Sheldon M. Ross,et al.  Introduction to Probability Models (4th ed.). , 1990 .

[6]  A. Girotra,et al.  Performance Analysis of the IEEE 802 . 11 Distributed Coordination Function , 2005 .

[7]  S. Popov The Tangle , 2015 .

[8]  Jay Cheng,et al.  Recursive Constructions of Parallel FIFO and LIFO Queues With Switched Delay Lines , 2007, IEEE Transactions on Information Theory.

[9]  Sheldon M. Ross Introduction to Probability Models. , 1995 .

[10]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[11]  Meni Rosenfeld,et al.  Analysis of Hashrate-Based Double Spending , 2014, ArXiv.

[12]  Leandros Tassiulas,et al.  Stochastic Models and Wide-Area Network Measurements for Blockchain Design and Analysis , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications.

[13]  Shahid Mumtaz,et al.  When Internet of Things Meets Blockchain: Challenges in Distributed Consensus , 2019, IEEE Network.

[14]  Proof of Stake versus Proof of Work White Paper , 2016 .

[15]  Geovane Fedrecheski,et al.  Swarm Economy: A Model for Transactions in a Distributed and Organic IoT Platform , 2019, IEEE Internet of Things Journal.

[16]  Zhetao Li,et al.  Consortium Blockchain for Secure Energy Trading in Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.

[17]  Long Zhang,et al.  Direct Acyclic Graph based Blockchain for Internet of Things: Performance and Security Analysis , 2019, ArXiv.

[18]  Sachin Shetty,et al.  Integrating blockchain for data sharing and collaboration in mobile healthcare applications , 2017, 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).

[19]  Vitalik Buterin A NEXT GENERATION SMART CONTRACT & DECENTRALIZED APPLICATION PLATFORM , 2015 .

[20]  Guido Perboli,et al.  Blockchain in Logistics and Supply Chain: A Lean Approach for Designing Real-World Use Cases , 2018, IEEE Access.

[21]  Thierry Turletti,et al.  Saturation throughput analysis of error-prone 802.11 wireless networks , 2005, Wirel. Commun. Mob. Comput..

[22]  Chonggang Wang,et al.  On use of traditional M/G/1 model for IEEE 802.11 DCF in unsaturated traffic conditions , 2006, IEEE Wireless Communications and Networking Conference, 2006. WCNC 2006..

[23]  Michael Devetsikiotis,et al.  Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.