Professional Documents
Culture Documents
The paramount technical challenge facing IoT is the ability to scale to meet service and
security requirements across a dynamic network of devices. These requirements aren’t
just precautions; they are foundational to running IoT in mission-critical, high-risk and
high [data] volume (sometimes low-bandwidth) environments, such as healthcare,
energy, transportation and beyond. management and analytics to the “edge,” where
compute occurs locally, instead of relying on cloud connectivity.
Decentralized public blockchain networks like Bitcoin and Ethereum can offer the highest
decentralized security. These networks offer decentralization, transparency,
disintermediation, encryption, digital signature, cryptographic hash functions, and
consensus algorithms.
What if you dilute any of the above-mentioned attributes? You still have a blockchain
network, however, its security will not match that of Bitcoin or Ethereum.
The high level of decentralized security offered by Bitcoin and Ethereum comes at a cost
though. The “Proof of Work” (POW) requires the participation of all miners in the
transaction validation process. This slows down the transaction validation process. The
more the Bitcoin and Ethereum networks grow, the higher will be the scalability
challenge.
IoT networks are very large. They will become far larger in the future. At the time of
writing, IoT has realized a fraction of its potential. The size of IoT networks will grow
manifold as more organizations and entities use them.
Many IoT networks will have micro-payment transactions. By their very nature, these will
be numerous transactions of small amounts.
The network size and transaction volume make scalable solutions imperative in IoT.
Therefore, IoT developers will find it hard to use a fully decentralized public blockchain
network like Bitcoin or Ethereum.
These networks have a process called “mining” for transaction validation. This process
uses the POW algorithm. “Miners”, i.e., transaction validators try to solve a cryptographic
puzzle.
The puzzle isn’t complex. However, it requires plenty of number-crunching at a fast pace.
Miners must use computers with high computing power. They need to run their computers
for long periods of time.
As a result, many miners run these computing-intensive processes for long periods of time
simultaneously. Computing-intensive operations and associated costs act as disincentives
for hackers.
Several other consensus algorithms exist. However, experts say that POW is more
secure than the other algorithms.
IoT experts and developers find a challenge here when integrating blockchain with IoT.
IoT devices often have low computing power. That makes the POW algorithm practically
unsuitable for them.
Note: Highly computing-intensive operations at a large scale increases the energy costs
of Bitcoin mining. In fact, Bitcoin mining consumes more energy than many countries.
High energy costs pose practical challenges in IoT-blockchain integration.
Hackers can’t possibly manipulate the majority of this network. The Bitcoin network is
transparent too. Any effort at manipulation attracts immediate attention.
Bitcoin miners need to have the entire data on the Bitcoin network for transaction
validation. They need to run a full Bitcoin node. A Bitcoin miner needs at least 350 GB of
disk space to run a full node. Miners should provide at least 2 GB RAM, furthermore, they
should have a robust Internet connection.
IoT experts and developers find these requirements challenging. Many IoT networks have
devices with relatively lower disk space and RAM. Internet connections can be slow in
many cases. The integration of such IoT networks with a public decentralized blockchain
can be hard.
Take the example of the IOTA cryptocurrency. It doesn’t use the kind of blockchain
technology used in Bitcoin and Ethereum. The IOTA project uses a technology called
“Tangle”, which is modelled after “Directed Acyclic Graph” (DAG).
Tangle doesn’t use blocks and chains. It uses a tree structure where multiple chains might
be intertwined with each other.
Tangle doesn’t use the POW consensus algorithm for transaction validation. IOTA
doesn’t require mining. Completing one transaction in Tangle requires validation of two
previous transaction.
IOTA offers better scalability than Bitcoin and Ethereum. You get a better performance
throughput, and the energy bill isn’t high. These would bode well for IoT systems.
However, experts find that Tangle isn’t as secure as the Bitcoin or Ethereum blockchain.
It can’t match the decentralized security offered by the Bitcoin network. Experts state that
hacking the IOTA network is considerably easier than the Bitcoin or Ethereum networks.
Ethereum smart contracts are pieces of code that transfer cryptographic assets based on
predefined conditions. They run on the decentralized Ethereum network. Smart contracts
are open-source, autonomous, irreversible, and immutable. These characteristics of smart
contracts can help to automate contract administration.
While decentralized public blockchain networks are incredibly hard to hack, smart
contracts are programs that run on them. Any program can have bugs. However, smart
contract bugs can be hard to recover from. The 2016 Ethereum DAO hack was an
example.
The immutability of smart contracts prevents you from modifying them after deploying
them. You can’t fix bugs. Cybercriminals routinely look for common smart contract
vulnerabilities. They exploit them to hack the blockchain application.
Blockchain experts need to find tools, processes, and methods to review and test smart
contracts thoroughly. Adoption of blockchain in the IoT space requires defect prevention
in smart contracts.
Monetary policy is closely related to the sovereignty of countries, and the national
currency is important to a country. This sets cryptocurrencies on a collision course against
governments and central banks.
Many countries explicitly ban cryptocurrencies. China, Bangladesh, and Egypt are a few
examples. Countries like Guyana, Kuwait, and Bahrain implicitly ban cryptocurrencies.
Several other countries allow cryptocurrencies.
Developers can use decentralized blockchain networks to create cryptocurrencies.
Therefore, regulatory strictures affecting cryptocurrencies affect such blockchain
networks.
There isn’t a uniform set of regulations in the world governing decentralized blockchain
networks. Enterprise blockchain frameworks like Hyperledger Fabric aren’t used for
creating cryptocurrencies, therefore, regulatory uncertainties don’t affect them.
However, enterprise blockchain networks can’t provide the kind of decentralized security
offered by the Bitcoin network.
Both blockchain and IoT involve niche skills. Organizations often find it hard to hire
skilled developers for these technologies. Hiring can be an even bigger challenge in IoT-
blockchain integration projects.
The 3rd Among The Pros Of Hyperledger Fabric: Performance And Scalability
There is no POW algorithm and crypto mining in Fabric, and it delivers high scalability and
fast transactions. Transaction validation mirrors how a transaction workflow operates in
normal enterprise and works as follows:
Considering that Fabrics 1.0 was released only in July 2017, the above disadvantages are expected. The
project team is aware that addressing these challenges will take time.
There are those in the crypto community who consider Fabric to have fundamental disadvantages.
However, this is debatable. These crypto community members insist on fully decentralized and
completely open blockchain. Nothing less meets their standards.
Below are their concerns with Fabric, and the counterpoints from supporters of Fabric:
1. Critiques argue that Fabric is permissioned, and therefore not a public blockchain. This doesn‘t
allow complete transparency in hyperledger projects. Supporters of Fabric say that it will be used
in business-to-business (B2B) and business-to-consumer (B2C) contexts that demand trusted
participants only. This removes the possibility of using a permissionless blockchain.
2. Critiques don‘t find the consensus algorithm in Fabric as secure as POW. However, supporters of
Fabric argue that in a network where all participants have already been verified using an internal
identity management system, a costly algorithm like POW isn‘t required.
3. Critiques argue that without a crypto token, there will not be an incentive for nodes to keep the
network as secure as miners do in the Bitcoin network. Supporters point out that there will be no
anonymous transactions in the network, hence, POW and an expensive mining process isn‘t
necessary.
4. Critiques claim that there won‘t be real immutability without POW. Supporters agree that
complete immutability isn‘t possible in Fabric since it doesn‘t employ POW. But they also point
out that in a network with known participants, all bound by the governance and code of conduct of
the business organization, a ’tamper-evident’ system is needed, and not a ’tamper-proof’ one. The
cryptographic hash will be different if someone tampers with data. In Fabric, checking the hashes
will reveal if tampering was done, and that will allow organizations to start the necessary
corrective process.