Pregled bibliografske jedinice broj: 1179917
Resource Constraint Client for Distributed Ledger Networks
Resource Constraint Client for Distributed Ledger Networks, 2020., diplomski rad, diplomski, Fakultet elektrotehnike i računarstva, Zagreb
CROSBI ID: 1179917 Za ispravke kontaktirajte CROSBI podršku putem web obrasca
Naslov
Resource Constraint Client for Distributed Ledger Networks
Autori
Toplak, Teo
Vrsta, podvrsta i kategorija rada
Ocjenski radovi, diplomski rad, diplomski
Fakultet
Fakultet elektrotehnike i računarstva
Mjesto
Zagreb
Datum
13.02
Godina
2020
Stranica
25
Mentor
Podnar Žarko, Ivana
Neposredni voditelj
Benčić, Federico-Matteo
Ključne riječi
Distributed ledger networks, light client, security, Ethereum, Trinity, Aurora
Sažetak
Light clients for distributed ledger networks can verify the chain by downloading only the block headers. They have been developed to counter the big bandwidth and storage requirements by the full nodes which are inappropriate for resource-constrained devices. Since the light client requirements grow linearly with the chain length, and as demand for even more resource-limited devices is increasing, the current implementations don’t satisfy the long term technology needs. In addition to efficiency, security concerns are a big issue for the state-of-the-art light clients. They are prone to accepting malicious fabricated data from full nodes they depend on, or in case of malicious cliques, to eclipse attacks. Hence, people usually opt-in for centralized solutions, such as block explorers or remote clients, which rely on trusted third parties. With both security and resource limitation concerns, distributed ledger networks are in a need for new-generation light clients. This thesis presents an implementation of the Aurora algorithm on top of the Ethereum Trinity client. Aurora algorithm can detect malicious nodes with a certain likelihood using a non-deterministic algorithm. As the algorithm is capable of confirming node honesty with certain likelihood, it can also verify a transaction without downloading a header chain. By using the Aurora algorithm, the client in this thesis is aiming to solve the aforementioned security concerns, by either finding the honest nodes, or in case of the eclipse attack, by exiting the network. Moreover, it is addressing the resource limitation demands by taking advantage of Aurora algorithm transaction verification with no need for any chain synchronization.
Izvorni jezik
Engleski
Znanstvena područja
Računarstvo
POVEZANOST RADA
Ustanove:
Fakultet elektrotehnike i računarstva, Zagreb