Full Download Wireless Blockchain Principles Technologies and Applications 1st Edition Bin Cao (Editor) PDF DOCX
Full Download Wireless Blockchain Principles Technologies and Applications 1st Edition Bin Cao (Editor) PDF DOCX
com
https://ebookmeta.com/product/wireless-blockchain-
principles-technologies-and-applications-1st-edition-bin-
cao-editor/
OR CLICK HERE
DOWLOAD NOW
https://ebookmeta.com/product/the-diversity-consultant-cookbook-
preparing-for-the-challenge-eddie-moore-jr/
ebookmeta.com
I m a Lot of Sometimes A Growing Up Story of Identity Jack
Guinan Lars Rudebjer
https://ebookmeta.com/product/i-m-a-lot-of-sometimes-a-growing-up-
story-of-identity-jack-guinan-lars-rudebjer/
ebookmeta.com
https://ebookmeta.com/product/hooray-for-police-officers-elle-parkes/
ebookmeta.com
https://ebookmeta.com/product/summary-of-the-rise-and-fall-of-
american-growth-by-robert-j-gordon-instaread/
ebookmeta.com
https://ebookmeta.com/product/the-handbook-of-religion-and-
communication-yoel-cohen/
ebookmeta.com
https://ebookmeta.com/product/red-magick-grimoire-of-djinn-spells-and-
sorceries-al-toukhi/
ebookmeta.com
A Book For Midwives: Care For Pregnancy, Birth, and
Women's Health First Edition, 7Th Revised Printing Edition
Susan Klein
https://ebookmeta.com/product/a-book-for-midwives-care-for-pregnancy-
birth-and-womens-health-first-edition-7th-revised-printing-edition-
susan-klein/
ebookmeta.com
Wireless Blockchain
Wireless Blockchain
Edited by
Bin Cao
Beijing University of Posts and Telecommunications
Beijing, China
Lei Zhang
University of Glasgow
Glasgow, UK
Mugen Peng
Beijing University of Posts and Telecommunications
Beijing, China
No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by
any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted
under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written
permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the
Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978)
750-4470, or on the web at www.copyright.com. Requests to the Publisher for permission should be
addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030,
(201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permission.
Limit of Liability/Disclaimer of Warranty: While the publisher and authors have used their best efforts in
preparing this work, they make no representations or warranties with respect to the accuracy or
completeness of the contents of this work and specifically disclaim all warranties, including without
limitation any implied warranties of merchantability or fitness for a particular purpose. No warranty may
be created or extended by sales representatives, written sales materials or promotional statements for this
work. The fact that an organization, website, or product is referred to in this work as a citation and/or
potential source of further information does not mean that the publisher and authors endorse the
information or services the organization, website, or product may provide or recommendations it may
make. This work is sold with the understanding that the publisher is not engaged in rendering professional
services. The advice and strategies contained herein may not be suitable for your situation. You should
consult with a specialist where appropriate. Further, readers should be aware that websites listed in this
work may have changed or disappeared between when this work was written and when it is read. Neither
the publisher nor authors shall be liable for any loss of profit or any other commercial damages, including
but not limited to special, incidental, consequential, or other damages.
For general information on our other products and services or for technical support, please contact our
Customer Care Department within the United States at (800) 762-2974, outside the United States at (317)
572-3993 or fax (317) 572-4002.
Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not
be available in electronic formats. For more information about Wiley products, visit our web site at
www.wiley.com.
Names: Cao, Bin, editor. | Zhang, Lei, editor. | Peng, Mugen, editor. |
Imran, Muhammad Ali, editor.
Title: Wireless blockchain : principles, technologies and applications /
Bin Cao, Beijing University of Posts and Telecommunications, Beijing,
China, Lei Zhang, University of Glasgow, Glasgow, UK, Mugen Peng,
Beijing University of Posts and Telecommunications, Beijing, China,
Muhammad Ali Imran, University of Glasgow, Glasgow, UK.
Description: Chichester, United Kingdom ; Hoboken : Wiley-IEEE Press,
[2022] | Includes bibliographical references and index.
Identifiers: LCCN 2021034990 (print) | LCCN 2021034991 (ebook) | ISBN
9781119790808 (cloth) | ISBN 9781119790815 (adobe pdf) | ISBN
9781119790822 (epub)
Subjects: LCSH: Blockchains (Databases) | Wireless communication
systems–Industrial applications. | Personal communication service
systems.
Classification: LCC QA76.9.B56 W57 2022 (print) | LCC QA76.9.B56 (ebook)
| DDC 005.74–dc23
LC record available at https://lccn.loc.gov/2021034990
LC ebook record available at https://lccn.loc.gov/2021034991
10 9 8 7 6 5 4 3 2 1
v
Contents
Index 297
xiii
List of Contributors
Preface
Originally proposed as the backbone technology of Bitcoin, Ethereum, and many other
cryptocurrencies, blockchain has become a revolutionary decentralized data management
framework that establishes consensuses and agreements in trustless and distributed envi-
ronments. Thus, in addition to its soaring popularity in the finance sector, blockchain has
attracted much attention from many other major industrial sectors ranging from supply
chain, transportation, entertainment, retail, healthcare, information management to finan-
cial services, etc.
Essentially, blockchain is built on a physical network that relies on the communications,
computing, and caching, which serves the basis for blockchain functions such as incentive
mechanism or consensus. As such, blockchain systems can be depicted as a two-tier archi-
tecture: an infrastructure layer and a blockchain layer. The infrastructure layer is the under-
lying entity responsible for maintaining the P2P network, building connection through
wired/wireless communication, and computing and storing data. On the other hand, the
top layer is the blockchain that is responsible for trust and security functions based on
the underlying exchange of information. More specifically, blockchain features several key
components that are summarized as transactions, blocks, and the chain of blocks. Transac-
tions contain the information requested by the client and need to be recorded by the public
ledger; blocks securely record a number of transactions or other useful information; using
a consensus mechanism, blocks are linked orderly to constitute a chain of blocks, which
indicates logical relation among the blocks to construct the blockchain.
As a core function of the blockchain, the consensus mechanism (CM, also referred to as
consensus algorithm or consensus protocol) works in the blockchain layer in order to ensure
a clear sequence of transactions and the integrity and consistency of the blockchain across
geographically distributed nodes. The CM largely determines the blockchain system perfor-
mance in terms of security level (fault tolerance level), transaction throughput, delay, and
node scalability. Depending on application scenarios and performance requirements, differ-
ent CMs can be used. In a permissionless public chain, nodes are allowed to join/leave the
network without permission and authentication. Therefore, proof-based algorithms (PoX),
such as proof-of-work (PoW), proof-of-stake (PoS), and their variants, are commonly used
in many public blockchain applications (e.g. Bitcoin and Ethereum). PoX algorithms are
designed with excellent node scalability performance through node competition; however,
they could be very resource demanding. Also, these CMs have other limitations such as
long transaction confirmation latency and low throughput. Unlike public chains, private
xviii Preface
and consortium blockchains prefer to adopt lighter protocols such as Raft and practical
Byzantine fault tolerance (PBFT) to reduce computational power demand and improve
the transaction throughput. A well-known example of PBFT implementation is the Hyper-
Ledger Fabric, part of HyperLedger business blockchain frameworks. However, such CMs
may require heavy communication resources.
Today, most state-of-the-art blockchains are primarily designed in stable wired commu-
nication networks running in advanced devices with sufficient communication resource
provision. Hence, the blockchain performance degradation caused by communication is
negligible. Nevertheless, this is not the case for the highly dynamic wireless connected
digital society that is mainly composed of massive wireless devices encompassing finance,
supply chain, healthcare, transportation, and energy. Especially through the upcoming 5G
network, the majority of valuable information exchange may be through a wireless medium.
Thus, it is critically important to answer one question, how much communication resource
is needed to run a blockchain network (i.e. communication for blockchain).
From another equally important aspect when combining blockchain with communi-
cation (especially wireless communication), many works have focused on how to use
blockchain to improve the communication network performance (i.e. blockchain for
communication). This integration between wireless networks and blockchain allows the
network to monitor and manage communication resource utilization in a more efficient
manner, reducing its administration costs and improving the speed of communication
resource trading. In addition, because it is the blockchain’s inherit transparency, it can
also record real-time spectrum utilization and massively improve spectrum efficiency by
dynamically allocating spectrum bands according to the dynamic demands of devices.
Moreover, it can also provide the necessary incentive for spectrum and resource sharing
between devices, fully enabling new technologies and services that are bound to emerge.
The resource coordination and optimization between resource requesters and providers
can be automatically completed through smart contracts, thus improving the efficiency of
resource optimization. Furthermore, with future wireless networks shifting toward decen-
tralized solutions, with thousands of mobile cells deployed by operators and billions of
devices communicating with each other, fixed spectrum allocation and operator-controlled
resource sharing algorithms will not be scalable nor effective in future networks. As such,
by designing a communications network coupled with blockchain as its underlying infras-
tructure from the beginning, the networks can be more scalable and provide better and more
efficient solutions in terms of spectrum sharing and resource optimization, for example.
The book falls under a broad category of security and communication network and their
transformation and development, which itself is a very hot topic for research these years.
The book is written in such a way that it offers a wide range of benefits to the scientific
community: while beginners can learn about blockchain technologies, experienced
researchers and scientists can understand the extensive theoretical design and architecture
development of blockchain, and industrial experts can learn about various perspectives
of application-driven blockchains to facilitate different vertical sectors. Therefore, this
feature topic can attract graduate/undergraduate level students, as well as researchers and
leading experts from both academia and industry. In particular, some blockchain-enabled
use cases included in the book are suitable for audiences from healthcare, computer,
telecommunication, network, and automation societies.
Preface xix
research challenges, the authors propose a scalable citizen-utility that supports interoper-
ability and a Privacy-preserving Data Clearing House (PDCH), which is a blockchain-based
data management tool for preserving on-ledger and off-ledger transactions data privacy.
The chapter is finished with outlines of future research directions of PDCH.
In Chapter 10, the authors introduce a blockchain-enabled COVID-19 contact tracing
solution named BeepTrace. This novel technology inherits the advantages of digital con-
tract tracing (DCT) and blockchain, ensuring the privacy of users and eliminating the con-
cerns about the third-party trust while protecting the population’s health. Then, based on
different sensing technologies, i.e. Bluetooth and GPS, the authors categorize BeepTrace
into BeepTrace-active mode and BeepTrace-passive mode, respectively. In addition, the
authors summarize and compare the two BeepTrace modes and indicate their working prin-
ciples and privacy preservation mechanisms in detail. After that, the authors demonstrate
a preliminary approach of BeepTrace to prove the feasibility of the scheme. At last, further
development prospects of BeepTrace or other decentralized contact tracing applications are
discussed, and potential challenges are pointed out.
Chapter 11 looks at the infusion of blockchain technology into medical data sharing. The
chapter provides an overview of medical data sharing and defines the challenges in this
filed. The authors revisit some already established angles of blockchain medical data shar-
ing in order to properly contextualize it and to highlight new perspectives on the logical
outworking of blockchain-enabled sharing arrangements. Then, the authors present three
cases that are especially suited to blockchain medical data sharing. They also present an
architecture to support each paradigm presented and analyze medical data sharing to high-
light privacy and security benefits to data owners. Finally, the authors highlight some new
and emerging services that can benefit from the security, privacy, data control, granular data
access, and trust blockchain medical data sharing infuses into healthcare.
In Chapter 12, the authors propose a blockchain-based decentralized content vetting for
social networks. The authors use Bitcoin as the underlying blockchain model and develop
an unidirectional channel model to execute the vetting procedure. In this vetting procedure,
all users get a chance to vote for and against a content. Content with sufficient positive votes
is considered as vetted content. The authors then optimize the offline channel network
topology to reduce computation overhead because of using blockchains. At last, the authors
prove the efficiency of the vetting procedure with experiments using simulations of content
propagation in social network.
Abbreviations
Salary—Increase of Salary—Carfare—Transportation—Telephone—Vacation—
Sick-Leave—Uniforms—Badges.
The reverse side of this chart contains spaces in which each visit
may be recorded. Sometimes these charts are kept up for months and
years, and it is therefore necessary to have what are called second
sheets—alike on both sides, and resembling the reverse side of the
first sheet, which contains the patient’s history. These sheets are
fastened together, and the chart of a chronic case may thus record
hundreds of visits. Each nurse is responsible for keeping up the
charts of all patients under her supervision. The notes should be
carefully recorded at the end of each day’s work, for it is bad policy to
let this charting accumulate for even two or three days. The entries
should be brief and concise, and should describe the patient’s
condition, or the work done for him.
Each nurse should have a filing box or drawer in which to keep
these charts; they should be arranged in alphabetical order, and kept
at the central office, where the superintendent may have ready access
to them. These charts are the property of the association, and under
no circumstances are to be removed from the central office. The
nurse may make her entries upon them either at the end of the day’s
work, or before she goes on duty the next morning.
Closing the Chart. Patients are removed from the visiting list
when they die, or when they are discharged. They are discharged
only for one of three reasons—either they leave the city, or they move
and their address is lost, or they prove not to be tuberculous. When a
patient dies or is discharged, a suitable entry is made on his chart,
which is then turned in to the superintendent of nurses, or to
whomever is responsible for the records. If there is only one nurse, it
is of course her duty to file these closed histories. These records
should be rich mines of sociological information, and should contain
valuable material for those who have access to them, such as
municipal authorities, physicians, and social workers. Except for the
access allowed to these, the files should be confidential.
The Card Index. All offices should contain a card index, giving
the name and address of each patient under supervision. Change of
address should always be noted, since it is only by means of this card
index that the particular chart desired can be referred to. For
example: the card index contains the names of some 3000 cases, all
under supervision, and each one having its own chart. The charts
themselves, however, are distributed among the filing boxes of
several nurses. If particulars are wanted concerning John Doe, it
would be necessary to turn first to the card index, find his address
and the district in which he lives, and then turn to the filing box of
that district and take out the chart. If it were not for the card index, it
would be necessary to search through all the filing boxes before
finding the desired chart.
Card, three by five inches, used in Card Index
Card, four by six inches, used for summarizing the weekly and
monthly reports
Finding Patients and Building up the Visiting List—Increasing the Visiting List—
Social Workers—Dispensaries—Patients’ Family and Friends—Nurses’
Cases—Physicians.