Professional Documents
Culture Documents
Abstract—IOTA Tangle is a distributed ledger technology blockchain solutions unsuitable for IoT applications. DLTs
(DLT), primarily designed for Internet-of-Things (IoT) networks utilizing directed acyclic graph (DAG) topology do away with
and applications. IOTA Tangle utilizes a direct acyclic graph the singular block chains, thereby storing transactions directly
(DAG) structure for the ledger, with its protocol offering features
arXiv:2209.04959v1 [cs.NI] 11 Sep 2022
attractive to the IoT domain, over most blockchain alternatives, within the ledger as opposed to within blocks. The DAG struc-
such as feeless transactions, higher achievable transactions per ture allows asynchronous parallel attachment of transactions
second (TPS), and lower energy consumption. The original IOTA therefore facilitating a larger throughput and addressing the
implementation relied on a bootstrap centralized coordinator scalability concerns of blockchain. DAG-based DLTs also do
solution for consensus which limited its degree of decentralization not use mining, with their protocol consequently facilitating
and scalability. This concern, alongside other limitations to its
adoption, such as lack of smart contracts, are being addressed feeless transactions and much more lightweight devices due
with the release of IOTA 2.0. This update brings with it significant to the reduced energy demand.
changes in order to remove the coordinator and achieve a scalable IOTA Tangle is a DAG-based DLT, specifically targeting
decentralized solution. To this end, this paper provides a technical IoT networks and devices. The Tangle network comprises
overview of the key features of IOTA 2.0 while discussing their nodes that use P2P communication to propagate messages
relevance and benefits for the wider IoT ecosystem. The paper
also provides performance insights and future research directions and transactions. The nodes are entry points for data and
for IOTA 2.0. transactions into the network and autonomously handle and
Index Terms—Blockchain, consensus, DLT, IoT, IOTA, ma- verify messages and maintain the state of the Tangle (ledger).
chine economy, smart contracts, Tangle. Each node has its own local view of the ledger and their
decentralized and autonomous nature are key to the operation
I. I NTRODUCTION of the Tangle protocol. The DAG structure of the Tangle
Distributed ledger technology is promising to address the ledger, as well as the blockcain topology, is shown in Figure
issues originating from existing centralized Internet-of-Things 1. When issuing each new message (tip), network nodes must
(IoT) architectures. The key features of DLT which are ben- first approve two previous messages. Unconfirmed messages
eficial to IoT implementations include decentralization, im- are considered confirmed once an accepted level of network
mutability, auditability, and cryptographic security. Decentral- consensus has been reached. As the number of transactions
ization allows network-wide information exchange via peer-to- per second (TPS) increases, the confirmation time decreases
peer (P2P) communication, removing the need for validation due to the requirement of each node having to approve two
or control by an authorized and trusted central third party. messages when issuing one. Consensus aspects are covered in
This can reduce system costs as maintenance and running of detailed later. Numerous works have compared IOTA Tangle
said centralized main sever is no longer required and has the to alternative DLTs and it performs well, if not best in class,
additional benefit to users that they no longer must rely on for many key metrics [1].
and trust any centralized third party. Immutability prevents However, upon first going live in 2016, IOTA could not
tampering of data and facilitates full history tracking of all fully realize their vision [2], and instead relied on a bootstrap
data exchanges. Auditability is important for IoT networks solution called the coordinator. The coordinator added a non-
with each device having the option to store a full copy of the ideal element of centralization into the protocol and since then,
ledger, if required, and timestamped transaction records ensure the IOTA foundation has worked to change their protocol to
all transactions and data exchanges are verifiable. Each DLT remove the coordinator in a development arc called coordicide
utilizes a unique cryptographic algorithm to secure its protocol [3]. Not only is the coordinator an unwanted element of
which equips IoT networks with resilience against adversarial centralization, it also limits scalability of the protocol. Lack
attacks. Some of the employed cryptographic algorithms, such of smart contracts and digital asset support were also the key
as those that harness one-time signature schemes, are quantum- concerns for industry adoption.
secure, whilst those that use RSA or elliptic curve encryption In 2021 IOTA’s first fully decentralized network was re-
are susceptible to attacks from quantum computers. leased on their development network [4]. The protocol, named
Blockchain is the most well-known form of DLT; how- IOTA 2.0, is significantly and notably different from the
ever, associated fees and energy concerns of the mining legacy protocol and addresses many of its shortcomings, in
process as well as limited transaction throughput make many regard to IoT applications. Developed in a modular fashion on
TABLE I: Key differences between legacy IOTA and IOTA 2.0
(b)
Fig. 2: 2a shows abstract protocol layer model for IOTA 2.0; 2b describes high-level flow diagram of IOTA 2.0 protocol.
B. Fast Probabilistic Consensus particularly in terms of metrics like agreement rate and
mean termination round of the protocol. We have conducted
Consensus in the legacy Tangle was reliant on the coordi- performance evaluation of FPC using the simulation software
nator which brought an unwanted element of centralization to by the IOTA Foundation [9]. Fig. 3 shows the agreement rate
the network. With IOTA 2.0, consensus is instead achieved of FPC when changing the total number of nodes (N), the
with a probabilistic leaderless binary voting protocol called quorum size (k) which is the number of neighbors each node
fast probabilistic consensus (FPC). Consensus is needed to queries every round, and the proportion of adversarial nodes
maintain the validity of the Tangle by addressing conflicts such in the network (q), respectively. Similarly, Fig. 4 shows the
as double spends. In its simplest reduction, FPC allows a node corresponding mean termination rounds of the protocol. Fig.
to update its opinion by querying a set size subset of other 3a and Fig. 4a demonstrate the scalability of the protocol with
nodes on the network and then choosing the majority opinion. no change in agreement rate and the average finalization round
This is done multiple times (rounds) until an unchanging also remaining effectively unchanged, even with increasingly
opinion is decided or a maximum round threshold is reached. large changes to the number of nodes. As shown in Fig. 3b
For increased resistance to attackers, opinions are weighted and Fig. 4b, controllable variables such as the number of
by a node’s mana (discussed later) and random thresholds are nodes queried each round must be adapted to the specific
used throughout the protocol to prevent meta-stable situations network implementation in order to maximize performance
[8]. The random thresholds are common amongst the nodes at a manageable communication overhead. It can be seen in
and set via a decentralized random number generator (dRNG) Fig. 3b that if k is too low, most of the nodes won’t query
module. an adversarial node, providing a seemingly high agreement
There are various variables which affect FPC performance,
Agreement rate with increasing N (k=11, q=0.1) Mean Termination Round with increasing N (k=11, q=0.1)
100
1 90
80
60
0.6
50
40
0.4
30
0.2 20
10
0 0
0 1000 2000 3000 4000 5000 6000 7000 8000 9000 10000 0 1000 2000 3000 4000 5000 6000 7000 8000 9000 10000
Number of Nodes (N) Number of Nodes (N)
(a) (a)
Agreement Rate with increasing k (N=100, q=0.49) Mean Termination Round with increasing k (N=100, q=0.49)
1 100
0.9 90
0.8 80
0.6 60
0.5 50
0.4 40
0.3 30
0.2 20
0.1 10
0 0
0 10 20 30 40 50 60 70 80 90 100 0 10 20 30 40 50 60 70 80 90 100
Quorum Size (k) Quorum Size (k)
(b) (b)
Agreement Rate with increasing q (k=11, N=100) Mean Termination Round with increasing q (k=11, N=100)
1 100
0.9 90
0.8 80
Mean Termination Round
0.7 70
Agreement Rate
0.6 60
0.5 50
0.4 40
0.3 30
0.2 20
0.1 10
0 0
0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0.45 0.5 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0.45 0.5
Proportion of adverserial nodes (q) Proportion of adverserial nodes (q)
(c) (c)
Fig. 3: FPC simulations for agreement rate. Fig. 4: FPC simulations for mean termination round.
A. Consensus - On Tangle FPC or streams, stored and secured by the Tangle ledger without
IOTA continues to develop and research improvements to having to contribute to the PoW and other protocol processes.
its consensus protocol. The most recent development direction Further developments include the use of oracle distributed
focuses on on-Tangle fast probabilistic consensus (OTFPC) networks (ODNs) [14]. By combining several oracles, which
[14]. This takes some elements of the previously described all provide data relevant to each other, as well as an ‘aggrega-
FPC and combines them with a virtual voting protocol that tor oracle’ which connects to the main Tangle ledger, ODNs
considers approval weight (AW), which is dependent on the aim to not only provide direct data issuing but also create a
number of indirect and direct approvals of the message, in network that enhances the credibility of data by acknowledging
order to provide finality based on the heaviest branch in double and disregarding erroneous data submissions as part of data
spend scenarios. More formally, AW is ‘the percent of the validation, regardless of data type. Developments as to an ag-
active consensus mana of nodes who directly or indirectly gregator oracle with a built in ‘truth finding algorithm’ aim to
reference it’ [15]. A double spend conflict is resolved when consolidate data, checking for and eliminating inconsistencies,
one of the conflicting transactions reaches a threshold AW before issuing only data deemed correct/truthful to the main
and thus its branch is finalized. To minimize the amount tangle.
Data provider sources and use cases also vary with them
of orphaned transactions from the losing branch, only the
not limited to IoT sensors. For example, an oracle could be
double spend message’s payload is rejected. This allows the
set to regularly pull data from a publicly accessible feed of
subsequent non-conflicting approving messages in the branch
a website or even provide potential DLT interoperability by
to merge with the main Tangle avoiding being orphaned.
using data from a secondary DLT platform.
OTFPC is also run in rounds but a key difference is that
instead of asking nodes to vote on their opinion via direct C. Enhancing Scalability - Sharding
queries, a node simply referencing that message is considered Sharding is a technique being researched and developed to
equivalent to a positive vote as nodes only reference mes- further increase the scalability of IOTA Tangle networks [14].
sages they approve of. By tracking the references, and thus IOTA Tangle aims to be able to increase its throughput to a
approvals, and calculating an approval weight, conflicts can level that can facilitate the relevant demands of the whole IoT
be simply resolved by picking the message or branch with the ecosystem and sharding is the leading development direction
highest AW. This removes the need for P2P communication to attain this goal.
between nodes during consensus, reducing the communication In its basics, a shard is a subset of network nodes with
overhead, a positive for IoT networks. As all the information those nodes processing and sending their messages amongst
needed for consensus is available on the Tangle, confirmation their subset and not having to process other shards messages.
times are also reduced. This breaks up the total number of messages nodes must
process, reduces redundancy, and with each of these shard
B. From Source Data Issuing - Oracles networks operating in parallel, the overall network throughput
Oracles are a key progression with high relevance to the can be increased. A shard can be permissioned with approval
IoT ecosystem. Oracles facilitate data being uploaded to the needed for nodes to join and control of the sybil protection
Tangle directly from the source, for example IoT sensor mechanism and congestion control amongst the shard given.
devices. This increases the level of trust in the data and This is of particular interest to IoT use cases that were
removes opportunities for data manipulation which could bring previously more suited to private implementations; by instead
the data’s credibility into repute as there is no intermediary using a permissioned shard running on the main public Tangle
between the data issuer and the attachment of its data to the network the privacy benefits of a permissioned setup are given
Tangle. Therefore, lightweight IoT data sources will be able with the added benefits brought by connection to the public
to feed data directly into smart contracts or, as data messages, network. The IOTA Foundation data sharding approach is in
development and plans to use a hierarchical sharding approach With the ongoing developments discussed, the IOTA Tangle
to increase overall network throughput for data messages. looks to become increasingly more scalable, with a smaller
Shards update the main tangle as to messages they have communication overhead and provide the means of direct
processed via stamp messages to their parent shard with from source data attachment of integrity verified data. These
consensus being reached upon said stamp and being necessary developments continue to position IOTA Tangle as a highly
for confirmation of the original message. Sharding can be attractive DLT for IoT industry.
multiple levels deep with stamping occurring recursively to the
R EFERENCES
parent shard until the main Tangle network is stamped. This
ensures a proof of inclusion for any message in any shard and [1] M. Salimitari and M. Chatterjee, “A Survey on Consensus Protocols
in Blockchain for IoT Networks,” Sept. 2018. [Online]. Available:
allows the main tangle to contribute to the confirmation of all http://arxiv.org/abs/1809.05613
messages no matter the shard depth. [2] S. Popov, “The Tangle,” Tech. Rep., 2018. [Online]. Available:
Other non-hierarchical sharding techniques are in develop- http://www.descryptions.com/Iota.pdf
[3] S. Popov et al., “The Coordicide,” 2020. [Online]. Available:
ment with fluid sharding being an active research direction https://files.iota.org/papers/202001204 Coordicide WP.pdf
that aims to infinitely increase the scalability of the network [4] “IOTA 2.0 DevNet (Nectar) - The Era of IOTA’s Decentralization Starts
and create a network that can optimally support any device Here.” [Online]. Available: https://blog.iota.org/iotav2devnet/
[5] “IOTA 2.0 DEVNET - Nectar Release.” [Online]. Available: https:
regardless of individual device requirements. Early research //v2.iota.org/how-it-works/introduction
suggests an approach that sees all nodes as individual shards [6] M. Conti, G. Kumar, P. Nerurkar, R. Saha, and L. Vigneri, “A Survey on
with interaction occurring with other shards within a radius of Security Challenges and Solutions in the IOTA,” Journal of Network and
Computer Applications, vol. 203, p. 103383, 2022. [Online]. Available:
perception. https://www.sciencedirect.com/science/article/pii/S1084804522000467
[7] L. Vigneri, W. Welz, A. Gal, and V. Dimitrov, “Achieving Fairness in
V. C ONCLUDING R EMARKS the Tangle through an Adaptive Rate Control Algorithm,” in 2019 IEEE
International Conference on Blockchain and Cryptocurrency (ICBC),
2019, pp. 146–148.
The key objective of removing the coordinator is vital to [8] S. Popov and W. J. Buchanan, “FPC-BI: Fast Probabilistic Consensus
the wide adoption of IOTA Tangle into the IoT ecosystem. Re- within Byzantine Infrastructures,” Journal of Parallel and Distributed
moving the coordinator achieves a greater degree of scalability Computing, vol. 147, p. 77–86, Jan 2021. [Online]. Available:
http://dx.doi.org/10.1016/j.jpdc.2020.09.002
for IOTA 2.0 as well as other benefits of full decentralization [9] “GitHub - iotaledger/fpc-sim: Fast Probabilistic Consensus Simulator.”
such as removing the single point of failure and a necessary [Online]. Available: https://github.com/iotaledger/fpc-sim
trust in a central authority. Other changes, such as mana, [10] “Explaining Mana in IOTA.” [Online]. Available: https://blog.iota.org/
explaining-mana-in-iota-6f636690b916/
offer improved Sybil protection and new features, like smart [11] E. Drasutis, “IOTA Smart Contracts,” IOTA Foundation White Paper,
contracts and digital assets, show improved functionality when 2021. [Online]. Available: https://github.com/iotaledger/wasp
compared to current industry adoption leaders. Consensus [12] “IOTA Native Digital Assets - DevNet Version.” [Online]. Available:
https://blog.iota.org/iota-native-digital-assets-devnet/
is also improved upon and is now both more scalable and [13] “Towards Full Decentralization with IOTA 2.0.” [Online]. Available:
faster than before. With the reduced need to walk the Tangle https://blog.iota.org/path-towards-full-decentralization-with-iota-2-0/
and adaptive PoW, the protocol becomes more lightweight [14] “IOTA Research Symposium 2021.” [Online]. Available: https:
//blog.iota.org/iota-research-symposium-2021/
for honest nodes increasing its accessibility within the IoT [15] “Improvements to the IOTA 2.0 Consen-
domain. The communication overhead is also reduced with sus Mechanism.” [Online]. Available: https://blog.iota.org/
the use of atomic messages. improvements-to-the-iota-2-0-consensus-mechanism/