skip to main content


This content will become publicly available on October 12, 2024

Title: Enhancing Research Results with Programmable Blockchain Network
Since its inception in 2008, Blockchain has been proposed in different fields of study, and the research results have shown promising prospects in these areas. Despite these study results, blockchain technology has suffered some setbacks in adoption for real-life implementations. The unwillingness to adopt it stems from industries and organizations not being convinced about the proposed solutions' results. The reason is that many of the presented solution results come from simulation. While simulation results are acceptable for research purposes, industries might be skeptical about adopting a new system based only on simulation results. Researchers must present results from real-life implementations to fully convince stakeholders of the usefulness of adopting blockchain technology. However, presenting blockchain results from reallife performance is challenging because of the following significant problems: 1. Blockchain networks are customized to implement a single approach, i.e., no blockchain network can test multiple proposed implementations concurrently, and 2. There is a lack of testbeds (with enough blockchain nodes) to test proposed solutions. This ongoing work presents a Programmable Blockchain Network (PBN), which can implement multiple approaches simultaneously and a global testbed to evaluate proposed solutions in real-life scenarios. The PBN, implemented on Generic Routing Encapsulation (GRE) global testbed, uses a master-slave model for smart contracts calling to implement concurrent blockchain solutions. The preliminary result shows that the proposed solution enhances research results, convincing more industries to adopt blockchain technology.  more » « less
Award ID(s):
2029295
NSF-PAR ID:
10471044
Author(s) / Creator(s):
;
Publisher / Repository:
IEEE 14th Annual Ubiquitous Computing, Electronics & Mobile Communications (UEMCON 2023)
Date Published:
Subject(s) / Keyword(s):
["Authentication, Blockchain","COSM-IC, GRE,\nProgrammable Smart Contracts, Testbed, Verification"]
Format(s):
Medium: X
Location:
New York
Sponsoring Org:
National Science Foundation
More Like this
  1. Since its inception in 2008, Blockchain has been proposed in different fields of study, and the research results have shown promising prospects in these areas. Despite these study results, blockchain technology has suffered some setbacks in adoption for real-life implementations. The unwillingness to adopt it stems from industries and organizations not being convinced about the proposed solutions' results. The reason is that many of the presented solution results come from simulation. While simulation results are acceptable for research purposes, industries might be skeptical about adopting a new system based only on simulation results. Researchers must present results from real-life implementations to fully convince stakeholders of the usefulness of adopting blockchain technology. However, presenting blockchain results from reallife performance is challenging because of the following significant problems: 1. Blockchain networks are customized to implement a single approach, i.e., no blockchain network can test multiple proposed implementations concurrently, and 2. There is a lack of testbeds (with enough blockchain nodes) to test proposed solutions. This ongoing work presents a Programmable Blockchain Network (PBN), which can implement multiple approaches simultaneously and a global testbed to evaluate proposed solutions in real-life scenarios. The PBN, implemented on Generic Routing Encapsulation (GRE) global testbed, uses a master-slave model for smart contracts calling to implement concurrent blockchain solutions. The preliminary result shows that the proposed solution enhances research results, convincing more industries to adopt blockchain technology. 
    more » « less
  2. Blockchain is a decentralized, digital, and distributed ledger which allows transparent and secure information sharing among the peer-to-peer network. It eliminates the need for a centralized trusted party and, though it was introduced as the backbone technology for cryptocurrencies but has proved to be a promising and revolutionary technology for almost all global industries. The application of blockchain technology in the energy sector proposes a paradigm of solutions to problems of different levels of complexity in the traditional energy ecosystem. Extensive research has been proposed to exploit the inherent benefits of blockchain technology for the integration of distributed energy sources and facilitate peer-to-peer energy trading. This paper proposes a blockchain-based architecture to facilitate secure and decentralized energy trading generated from renewable energy sources. The solution utilizes the Ethereum blockchain and Smart Contracts for energy trading among the members of a small community without any trusted third entity and adopts features to achieve data integrity and confidentiality, and user identity privacy. 
    more » « less
  3. The Internet of Things (IoT) is an emerging technology that aims to connect our environment to the internet in the same way that personal computers connected people. As this technology progresses, the IoT paradigm becomes more prevalent in our everyday lives. The nature of IoT applications necessitates devices that are low-cost, power-sensitive, integrated, unobtrusive, and interoperable with existing cloud platforms and services, for example, Amazon AWS IoT, IBM Watson IoT. As a result, these devices are often small in size, with just enough computing power needed for their specific tasks. These resource-constrained devices are often unable to implement traditional network security measures and represent a vulnerability to network attackers as a result. Few frameworks are positioned to handle the influx of this new technology and the security concerns associated with it. Current solutions fail to provide a comprehensive and multi-layer solution to these inherent IoT security vulnerabilities. This paper presents a layered approach to IoT testbed that aims to bridge multiple connection standards and cloud platforms. To solve challenges surrounding this multi-layer IoT testbed, we propose a mesh inside a mesh IoT network architecture. Our designed "edge router" incorporates two mesh networks together and performs seamlessly transmission of multi-standard packets. The proposed IoT testbed interoperates with existing multi-standards (Wi-Fi, 6LoWPAN) and segments of networks, and provides both Internet and resilient sensor coverage to the cloud platform. To ensure confidentiality and authentication of IoT devices when interoperating with multiple service platforms, we propose optimized cryptographic techniques and software frameworks for IoT devices. We propose to extend and modify the existing open-source IDS platforms such as Snort to support IoT platforms and environments. We validate the efficacy of the proposed system by evaluating its performance and effect on key system resources. The work within this testbed design and implementation provides a solid foundation for further IoT system development. 
    more » « less
  4. Gørtz, Inge Li ; Farach-Colton, Martin ; Puglisi, Simon J. ; Herman, Grzegorz (Ed.)
    In this paper, we study efficient parallel edit distance algorithms, both in theory and in practice. Given two strings A[1..n] and B[1..m], and a set of operations allowed to edit the strings, the edit distance between A and B is the minimum number of operations required to transform A into B. In this paper, we use edit distance to refer to the Levenshtein distance, which allows for unit-cost single-character edits (insertions, deletions, substitutions). Sequentially, a standard Dynamic Programming (DP) algorithm solves edit distance with Θ(nm) cost. In many real-world applications, the strings to be compared are similar to each other and have small edit distances. To achieve highly practical implementations, we focus on output-sensitive parallel edit-distance algorithms, i.e., to achieve asymptotically better cost bounds than the standard Θ(nm) algorithm when the edit distance is small. We study four algorithms in the paper, including three algorithms based on Breadth-First Search (BFS), and one algorithm based on Divide-and-Conquer (DaC). Our BFS-based solution is based on the Landau-Vishkin algorithm. We implement three different data structures for the longest common prefix (LCP) queries needed in the algorithm: the classic solution using parallel suffix array, and two hash-based solutions proposed in this paper. Our DaC-based solution is inspired by the output-insensitive solution proposed by Apostolico et al., and we propose a non-trivial adaption to make it output-sensitive. All of the algorithms studied in this paper have good theoretical guarantees, and they achieve different tradeoffs between work (total number of operations), span (longest dependence chain in the computation), and space. We test and compare our algorithms on both synthetic data and real-world data, including DNA sequences, Wikipedia texts, GitHub repositories, etc. Our BFS-based algorithms outperform the existing parallel edit-distance implementation in ParlayLib in all test cases. On cases with fewer than 10⁵ edits, our algorithm can process input sequences of size 10⁹ in about ten seconds, while ParlayLib can only process sequences of sizes up to 10⁶ in the same amount of time. By comparing our algorithms, we also provide a better understanding of the choice of algorithms for different input patterns. We believe that our paper is the first systematic study in the theory and practice of parallel edit distance. 
    more » « less
  5. Context: Addressing women's under-representation in the soft-ware industry, a widely recognized concern, requires attracting as well as retaining more women. Hearing from women practitioners, particularly those positioned in multi-cultural settings, about their challenges and and adopting their lived experienced solutions can support the design of programs to resolve the under-representation issue. Goal: We investigated the challenges women face in global software development teams, particularly what motivates women to leave their company; how those challenges might break down according to demographics; and strategies to mitigate the identified challenges. Method: To achieve this goal, we conducted an ex-ploratory case study in Ericsson, a global technology company. We surveyed 94 women and employed mixed-methods to analyze the data. Results: Our findings reveal that women face socio-cultural challenges, including work-life balance issues, benevolent and hos-tile sexism, lack of recognition and peer parity, impostor syndrome, glass ceiling bias effects, the prove-it-again phenomenon, and the maternal wall. The participants of our research provided different suggestions to address/mitigate the reported challenges, including sabbatical policies, flexibility of location and time, parenthood support, soft skills training for managers, equality of payment and opportunities between genders, mentoring and role models to sup-port career growth, directives to hire more women, inclusive groups and events, women's empowerment, and recognition for women's success. The framework of challenges and suggestions can inspire further initiatives both in academia and industry to onboard and retain women. Women represent less than 24% of employees in software development industry and experience various types of prejudice and bias. Even in companies that care about Diversity & Inclusion, “untying the mooring ropes” of socio-cultural problems is hard. Hearing from women, especially those working in a multi-cultural organization, about their challenges and adopting their suggestions can be vital to design programs and resolve the under-representation issue. In this work we work closely with a large software development or-ganization which invests and believes in diversity and inclusion. We listened to women and the challenges they face in global soft-ware development teams of this company and what these women suggest reduce the problems and increase retention. Our research showed that women face work-life balance issues and encounter invisible barriers that prevent them from rising to top positions. They also suffer micro-aggression and sexism, need to show com-petence constantly, be supervised in essential tasks, and receive less work after becoming mothers. Moreover, women miss having more female colleagues, lack self-confidence and recognition. The women from the company suggested sabbatical policies, the flexibil-ity of location and time, parenthood support, soft skills training for managers, equality of opportunities, role models to support career growth, directives to hire more women, support groups, and more interaction between women, inclusive groups and events, women's empowerment by publishing their success stories in media and recognizing their achievements. Our results had been shared with the company Human Resources department and management and they considered the diagnosis helpful and will work on actions to mitigate the challenges that women still perceive. 
    more » « less