Professional Documents
Culture Documents
Abstract: — Blockchain has been a breakthrough in the Cryptocurrency can be thought of as a digital asset that can
technology since the last decade and is anticipated as the go- be used as a method of transaction between untrustworthy
to thing due to features presented by it. The features such as parties without the need of an intermediary body like a
secure, immutable, transparent, and anonymous makes bank. Carrying out transaction in such a distributed system
Blockchain technology the frontrunner in the untrustworthy
distributed environment. The driving force behind the
wherein the parties are not fully trusted, there is a
Blockchain technology are the consensus algorithms that are requirement of a system that can build the trust among the
at the heart of any Blockchain technology. These algorithms other wise untrusted parties. Consensus algorithms in such
determine the security and performance of any Blockchain. Blockchain-based cryptocurrency systems make sure that
The most popular consensus algorithm is the Proof-of-Work only valid transactions are committed in the system and
which was first used in the Bitcoin. Since then, a number of invalid transactions are blocked.
consensus algorithms have been proposed. This paper
presents a brief overview of the Blockchain Technology and The rest of the paper is organized as follows. Section II
popular cryptocurrencies based on Blockchain. Next, the presents an overview of the Blockchain technology and its
most popular consensus algorithms in the context of
Blockchain and cryptocurrencies are discussed.
architecture. Section III discusses Cryptocurrencies.
Section IV discusses various consensus algorithms and
Keywords—Blockchain, Cryptocurrencies, Consensus their comparison. Finally in section V summarizes the
Problem, PoW, PoS, pPBFT, SCP. work presented in this paper.
Blockchain technology has been a buzzword in this decade Blockchain is a peer-to-peer network which maintains a
as it offers applicability in various fields such as distributed ledger which is always in sync. Blockchain
healthcare, IoT, supply chain management, agriculture, consists of a number of blocks which are linked together
finance, insurance, and e-voting[1-3]. Blockchain is a by cryptographic functions to create a chain which is
distributed ledger which eliminates the need of a central immutable in nature and is append-only. The blocks
authority for the transactions to occur in the network. It consist of records or transactions which are visible to
addresses the issues such as security and performance anyone. The block size is limited and contains a limited
bottlenecks that are prevalent in centralized systems. number of transactions. Whenever a transaction is added to
Blockchain ensures integrity in an untrustworthy peer-to- a block, it is time stamped so that in future it can be
peer network which consists of both genuine and audited easily. The block diagram of Blockchain is shown
malicious nodes. Blockchain was first implemented in in Figure 1.
2009 in Bitcoin by Satoshi Nakamoto.
Authorized licensed use limited to: NED UNIV OF ENGINEERING AND TECHNOLOGY. Downloaded on July 19,2021 at 04:32:31 UTC from IEEE Xplore. Restrictions apply.
The blocks in the Blockchain technology consists of block secured by using cryptographic algorithms.
header and transactions. The block header consists of Cryptocurrencies do not require any central authority to
Block version, Merkle Tree hash, nonce, parent hash and make transactions in a distributed peer-to-peer network.
timestamp [6]. Table 1 shows these fields in Bitcoin Block These currencies have no intrinsic value and are not
#45000. These fields are explained as follows. regulated by the governments [7-8]. Some of the popular
cryptocurrencies are Bitcoin, Ether, and XRP. A brief
Block version: Block version defines the version of the description of these cryptocurrencies follows next.
block and the corresponding validation rules defined in it.
The versions of Bitcoin are version 1 (2009), version 2 Bitcoin: Blockchain technology was first implemented in
(2012), version 3 (Feb 2015), and version 4(Nov 2015). Bitcoin by Satoshi Nakamoto in 2009. Bitcoin is a
cryptocurrency that can be transacted between parties
Parent hash: It is a 32 byte hash in the form of SHA256 [5] without any intermediary in a peer-to-peer network. The
and is the hash of the previous block in a Blockchain. By transactions in Bitcoin network are verified by the miners
means of this hash, blocks are linked together in a who get incentives for validating the transactions in the
chronological fashion. Bitcoin network. The blocks in a Bitcoin network are
generated after every 10 minutes. The number of
Merkle tree hash: Merkle tree hash is a 32 byte hash of all transactions committed in a Bitcoin network per second is
the transactions contained in a block. It is useful in the 7. Bitcoin uses the Proof-of-Work consensus mechanism
verification process of the transactions and ensures the to confirm transactions and to generate new blocks [9-10].
integrity of the transactions in a block. Figure 2 shows Bitcoin cryptocurrency values as on 13-
Dec-2020.
Block hash: Block hash is a 32 byte hash which is the hash
of all the fields of a block header including the Merkle Bitcoin suffers from the scalability problem as the
hash. maximum block size is 1MB, which limits the number of
transactions to be executed to around 7 per second. For the
Nonce: It is a 4 byte random number that is used for the new set of transactions, the network has to wait for the
authentication purposes so that a new block is not created creation of a new block which will further increase the
from the previously used hashes that have been used in the latency in the network.
creation of previous blocks. It enhances the difficulty level
in solving a mathematical problem by the miners.
Authorized licensed use limited to: NED UNIV OF ENGINEERING AND TECHNOLOGY. Downloaded on July 19,2021 at 04:32:31 UTC from IEEE Xplore. Restrictions apply.
Each user in an Ethereum network has ETH balance which Table 2 presents the comparison of the cryptocurrencies:
he can send to other users in the network. For a transaction Bitcoin, Ether, and XRP. Bitcoin uses the well-known
to occur in such a cryptocurrency, Gas or fee is required, SHA256 hashing algorithm, Ether uses Ethash and XRP
which is set by the miners. The unit of gas is gwei. uses the Ripple Protocol Consensus Algorithm (RPCA).
Bitcoin tends to be moderately decentralized whereas both
Ether and XRP are highly decentralized. The problem with
the Bitcoin is that its transaction time is quite high. Ether
reduced the time considerably but the transaction time is
yet smaller in case of XRP. Consequently, the transaction
throughput is highest in XRP and smallest in Bitcoin. But,
by far, the Bitcoin is the most popular Blockchain-based
cryptocurrency and enjoys a market capital to the tune of
USD 357.94 billion.
Proof-of-Work
Proof-of-Work (PoW) is a consensus algorithm used in
permissionless Bitcoin network. PoW proves to the
Figure 4: XRP values as on 13-Dec-2020. network server that some computational work has been
performed by the nodes in the network. The network
Authorized licensed use limited to: NED UNIV OF ENGINEERING AND TECHNOLOGY. Downloaded on July 19,2021 at 04:32:31 UTC from IEEE Xplore. Restrictions apply.
server gives problems such as Hash sequences, In Fig 6, blocks B0 and B1 are created without any
computational puzzles or other mathematical problems to problem in the network. However, blocks B2 and B3 are
be solved by the nodes in the network. The nodes perform created almost at the same time; so both the blocks are
the computations and provide answers to the network appended in the Blockchain on different branches using
server which then reward the nodes that compute the forking. At this point, the mining power is controlled by
correct answers. Figure 5 shows this scenario. the malicious nodes which results in the faster creation of
blocks, B4 and B5. Hence, blocks B3, B4, and B5 are
created by malicious nodes. The rule for the Blockchain in
this case is to follow the longest chain which results in the
rejection of block B2 in our example. Now, the network is
controlled by the malicious nodes which can hamper the
creation of further legitimate blocks in the network.
Proof-of-Stake
To address the issues of PoW, Proof-of-Stake (PoS) was
conceptualized and implemented in many systems
including the Ethereum platform. In PoS, a validator can
mint/forge a block or verify transactions according to the
stake he puts in the network. If a validator confirms a
fraud transaction, he may lose his stake in the network
Figure 5: Proof-of-Work [14].
PoW consensus algorithm is used to confirm the PoS networks are more decentralized in nature as
transactions that are submitted to the network. It is further compared to PoW networks and allows sharding to
used in the creation of blocks which holds the transactions. improve the scalability of the network. In PoS, the attacker
These two operations are overseen by the special nodes in needs 51% of the cryptocurrency to execute 51% attack
the network and are called miners. which is very less likely. It can result in the loss of
holdings an attacker possesses in case the value of the
In PoW, the complexity of a problem to be solved by the cryptocurrency falls. Ether, NXT, PeerCoin
nodes is determined by the number of users, load on the cryptocurrencies use the PoS consensus algorithm.
network, and the current power. It is adjusted in such a
way that it takes around 10 minutes for the creation of a Byzantine Fault Tolerance
block. Once the block is created, all the unconfirmed Byzantine Fault Tolerance (BFT) consensus mechanism
transactions are placed in a new block and are confirmed uses messages to reach consensus in a network which
later. This newly created block is linked with its previous consists of both genuine and faulty nodes.
block to create a chain of blocks to enhance security.
In a faulty network, consensus can be reached when there
Despite being the driving force in cryptocurrencies, PoW are more than two-third genuine nodes in the network. The
suffers from issues. The first issue is that it consumes a lot network can tolerate at most m faulty nodes when there are
of computational power which results in the consumption 3m+1 correctly working nodes in the network [13].
of large amount of electricity. Secondly, it may suffer from
51% attack in which 51% of the total mining power of the Practical Byzantine Fault Tolerance (pBFT) operates in
network is controlled by the malicious nodes. The rounds within which it selects a node as a primary node
malicious nodes while controlling the network can create a and the other nodes as the secondary nodes.
new chain of block which is longer than the original one.
This process is called forking. In a Blockchain network the pBFT reaches the consensus after the termination of the
longest chain is followed and as a result of which the following rounds in the sequence as follows:
transactions can be denied and reversed. In Figure 6, 51% a) In the first phase called the request phase, client
attack is shown. sends a request to the primary or leader node in the
network.
b) Upon the receipt of request from the client node, the
primary nodes broadcast this message to the
secondary nodes.
c) In the third phase, the primary as well as the
secondary nodes sends their reply to the client node.
d) The consensus is reached when the client node
receives the same reply from at least m+1 nodes in
Fig 6: 51% attack the network, the network being tolerant to a
Authorized licensed use limited to: NED UNIV OF ENGINEERING AND TECHNOLOGY. Downloaded on July 19,2021 at 04:32:31 UTC from IEEE Xplore. Restrictions apply.
maximum of m faulty nodes. The whole scenario is
shown in Figure 7 below.
V. CONCLUSION
Authorized licensed use limited to: NED UNIV OF ENGINEERING AND TECHNOLOGY. Downloaded on July 19,2021 at 04:32:31 UTC from IEEE Xplore. Restrictions apply.
consensus algorithm for cryptocurrency systems include [7] Y. Yuan and F.-Y. Wang, “Blockchain and Cryptocurrencies:
Model, Techniques, and Applications,” IEEE Transactions on
permission-less, low power utilization, fast transaction
Systems, Man, and Cybernetics: Systems, vol. 48, no. 9, pp.
processing/ low latency and security. In this paper, we 1421–1428, Sep. 2018.
presented an overview of the Blockchain technology, [8] G. W. Peters, E. Panayi, and A. Chapelle, “Trends in Crypto-
Blockchain-based cryptocurrency systems and consensus Currencies and Blockchain Technologies: A Monetary Theory
and Regulation Perspective,” SSRN Electronic Journal, 2015.
algorithms used in these systems.
[9] R. Böhme, N. Christin, B. Edelman, and T. Moore, “Bitcoin:
Economics, Technology, and Governance,” Journal of
REFERENCES Economic Perspectives, vol. 29, no. 2, pp. 213–238, May 2015.
[10] C. S. Wright, “Bitcoin: A Peer-to-Peer Electronic Cash
[1] N. Chowdhury, “Applications of Blockchain,” Inside System,” SSRN Electronic Journal, 2008.
Blockchain, Bitcoin, and Cryptocurrencies, pp. 177–198, Aug. [11] D. Vujicic, D. Jagodic, and S. Randic, “Blockchain technology,
2019. bitcoin, and Ethereum: A brief overview,” 2018 17th
[2] T. Wang, L. Yu, and Y. Li, “Blockchain Technology and Its International Symposium INFOTEH-JAHORINA (INFOTEH),
Applications,” Advances in Logistics, Operations, and Mar. 2018.
Management Science, pp. 1247–1260, 2021. [12] L. W. Cong and Z. He, “Blockchain Disruption and Smart
[3] “Applications of blockchain technology in different domains,” Contracts,” The Review of Financial Studies, vol. 32, no. 5, pp.
Blockchain and the Digital Economy, pp. 115–172, Jul. 2020. 1754–1797, Apr. 2019.
[4] D. Preethi, N. Khare, and B. K. Tripathy, “Security and Privacy [13] L. Lamport, R. Shostak, and M. Pease, “The Byzantine generals
Issues in Blockchain Technology,” Blockchain Technology and problem,” Concurrency: the Works of Leslie Lamport, Oct.
the Internet of Things, pp. 245–263, Dec. 2020. 2019.
[5] S.-H. Lee and K.-W. Shin, “An efficient implementation of [14] O. Vashchuk and R. Shuwar, “Pros and cons of consensus
SHA processor including three hash algorithms (SHA-512, algorithm proof of stake. Difference in the network safety in
SHA-512/224, SHA-512/256),” 2018 International Conference proof of work and proof of stake,” Electronics and Information
on Electronics, Information, and Communication (ICEIC), Jan. Technologies, vol. 9, 2018.
2018. [15] M. David. "The stellar consensus protocol: A federated model
[6] Z. Zheng, S. Xie, H. Dai, X. Chen, and H. Wang, “An Overview for internet-level consensus." Stellar Development
of Blockchain Technology: Architecture, Consensus, and Future Foundation 32 (2015).
Trends,” 2017 IEEE International Congress on Big Data
(BigData Congress), Jun. 2017.
Authorized licensed use limited to: NED UNIV OF ENGINEERING AND TECHNOLOGY. Downloaded on July 19,2021 at 04:32:31 UTC from IEEE Xplore. Restrictions apply.