ABSTRACT
In this paper, we evaluate the benefits of the Lisk SDK version, 5.0.3, over the old version of Lisk SDK 2.3.8 using the Restaurant sidechain solution created as a Proof-Of-Concept of online food requests using Lisk blockchain technology. We evaluated the Restaurant sidechain in aspects of performance, the capacity of receiving transactions in a short amount of time, the maximum waiting time for customers requesting food, consensus improvements of Lisk-BFT, and transaction spam attack resilience. It was observed the aspects of block size, transaction pool size, communication between nodes, and analyzed security concerns regarding liveness and Denial of Service attacks in the sidechain. In the end, we concluded that the new version of Lisk SDK 5.0 demonstrated improvements in size capacity of a block, and therefore improved Lisk Restaurant capacity to receive customers food requests, also transaction pool size improvement, and the creation of a mitigation strategy implemented on node life cycle reduced the chance of interruption on the entire network during a transaction spam attack.
- Elham Akbari, Wenbing Zhao, Shunkun Yang, and Xiong Luo. 2020. The Impact of Block Parameters on the Throughput and Security of Blockchains. In Proceedings of the 2020 The 2nd International Conference on Blockchain Technology (Hilo, HI, USA) (ICBCT’20). Association for Computing Machinery, New York, NY, USA, 13–18. https://doi.org/10.1145/3390566.3391673Google ScholarDigital Library
- Lisk SDK documentation. Retrieved Feb 2021. https://lisk.io/documentation/lisk-sdkGoogle Scholar
- Davi Alves. 2020. Proof-of-Concept (POC) of Restaurants food requests in the Lisk Blockchain/sidechain. In Journal of Physics: Conference Series (JPCS)(Beijing, China). IOP Publishing, Bristol, UK, 8 pages. https://doi.org/10.1088/1742-6596/1828/1/012110 Chelsea Finn. 2018. Learning to Learn with Gradients. PhD Thesis, EECS Department, University of Berkeley.Google Scholar
- Jan Hackfeld. 2019. A lightweight BFT consensus protocol for blockchains. CoRR abs/1903.11434 (2019). arXiv:1903.11434 http://arxiv.org/abs/1903.11434Google Scholar
- Satoshi Nakamoto. 2009.Bitcoin: A Peer-to-Peer Electronic Cash System. Cryptography Mailing list at https://metzdowd.com (03 2009).Google Scholar
- Davi Alves. 2020. A Strategy for Mitigating Denial of Service Attacks on Nodes with Delegate Account of Lisk Blockchain. In Proceedings of the 2020 The 2nd International Conference on Blockchain Technology (Hilo, HI, USA) (ICBCT’20). Association for Computing Machinery, New York, NY, USA, 7–12. https://doi.org/10.1145/3390566.3391684.Google ScholarDigital Library
- Kordek M. and Beddows O. 2016. White paper: LiskGoogle Scholar
- Leslie Lamport. 2001. Paxos Made Simple. ACM SIGACT News (Distributed Computing Column) 32, 4 (Whole Number 121, December 2001) (December 2001), 51–58. https://www.microsoft.com/en-us/research/publication/paxos-made-simple/.Google Scholar
- Alessandro R. 2020. Introducing Lisk Tree. Retrieved Sep 2020 from https://lisk.io/blog/research/introducing-lisk-tree.Google Scholar
- Leslie Lamport, Robert Shostak, and Marshall Pease. 1982. The Byzantine Generals Problem.ACM Trans. Program.Lang. Syst.4, 3 (July 1982), 382–401. https://doi.org/10.1145/357172.357176Google ScholarDigital Library
- Iker A. 2020. Introducing Lisk Dynamic Fee. Retrieved May 2020 from https://lisk.io/blog/research/lisks-dynamic-fee-systemGoogle Scholar
- Iker A. 2020. New Lisk ID System. Retrieved Jul 2020 from https://lisk.io/blog/research/new-lisk-id-systemGoogle Scholar
Recommendations
A Strategy for Mitigating Denial of Service Attacks on Nodes with Delegate Account of Lisk Blockchain
ICBCT'20: Proceedings of the 2020 The 2nd International Conference on Blockchain TechnologyIn this paper, I evaluate a type of denial of service attack, bandwidth depletion, that difficult the block propagation in blockchain networks. Towards the end, I study the attack on Lisk blockchain and explore its effects in the Delegated Proof of ...
Analysing the ability to retain sidechain hydrogen-bonds in mutant proteins
Motivation: Hydrogen bonds are one of the most important inter-atomic interactions in biology. Previous experimental, theoretical and bioinformatics analyses have shown that the hydrogen bonding potential of amino acids is generally satisfied and ...
Model-based Security Metrics Using ADversary VIew Security Evaluation (ADVISE)
QEST '11: Proceedings of the 2011 Eighth International Conference on Quantitative Evaluation of SysTemsSystem architects need quantitative security metrics to make informed trade-off decisions involving system security. The security metrics need to provide insight on weak points in the system defense, considering characteristics of both the system and ...
Comments