Nalazite se na CroRIS probnoj okolini. Ovdje evidentirani podaci neće biti pohranjeni u Informacijskom sustavu znanosti RH. Ako je ovo greška, CroRIS produkcijskoj okolini moguće je pristupi putem poveznice www.croris.hr
izvor podataka: crosbi !

Resource Constraint Client for Distributed Ledger Networks (CROSBI ID 447840)

Ocjenski rad | diplomski rad

Toplak, Teo Resource Constraint Client for Distributed Ledger Networks / Podnar Žarko, Ivana (mentor); Benčić, Federico-Matteo (neposredni voditelj). Zagreb, Fakultet elektrotehnike i računarstva, . 2020

Podaci o odgovornosti

Toplak, Teo

Podnar Žarko, Ivana

Benčić, Federico-Matteo

engleski

Resource Constraint Client for Distributed Ledger Networks

Light clients for distributed ledger networks can verify the chain by downloading only the block headers. They have been developed to counter the big bandwidth and storage requirements by the full nodes which are inappropriate for resource-constrained devices. Since the light client requirements grow linearly with the chain length, and as demand for even more resource-limited devices is increasing, the current implementations don’t satisfy the long term technology needs. In addition to efficiency, security concerns are a big issue for the state-of-the-art light clients. They are prone to accepting malicious fabricated data from full nodes they depend on, or in case of malicious cliques, to eclipse attacks. Hence, people usually opt-in for centralized solutions, such as block explorers or remote clients, which rely on trusted third parties. With both security and resource limitation concerns, distributed ledger networks are in a need for new-generation light clients. This thesis presents an implementation of the Aurora algorithm on top of the Ethereum Trinity client. Aurora algorithm can detect malicious nodes with a certain likelihood using a non-deterministic algorithm. As the algorithm is capable of confirming node honesty with certain likelihood, it can also verify a transaction without downloading a header chain. By using the Aurora algorithm, the client in this thesis is aiming to solve the aforementioned security concerns, by either finding the honest nodes, or in case of the eclipse attack, by exiting the network. Moreover, it is addressing the resource limitation demands by taking advantage of Aurora algorithm transaction verification with no need for any chain synchronization.

Distributed ledger networks, light client, security, Ethereum, Trinity, Aurora

nije evidentirano

nije evidentirano

nije evidentirano

nije evidentirano

nije evidentirano

nije evidentirano

Podaci o izdanju

25

13.02.2020.

obranjeno

Podaci o ustanovi koja je dodijelila akademski stupanj

Fakultet elektrotehnike i računarstva

Zagreb

Povezanost rada

Računarstvo