Blockless DAG IoT network

by May 30, 2020IoT Security

Technology is constantly evolving and improving. Phones were once connected via a wire, then became wireless, and we now have smart mobile devices. The history of technology goes a long way to prove that it is indeed true that all technology constantly upgrades. True to this statement, Blockless DAG networks have now been introduced. But before we are able to appreciate what this means; we must first understand Blockchain and DAG networks and what they can do.

What is a DAG network?

DAG is a directed graph data structure that uses a topological ordering. Only forward movement occurs throughout the sequence. Data processing, analysis, and compression problems often use DAG application. This linked storage structure allows for only one chain on the whole network. NXT used the idea of changing the chain-like storage structure into a DAG of blocks.

The Blockchain combination with DAG still comes from the idea of side-chains. Different types of transactions run on different chains simultaneously. DAG of blocks, however, relies on the concept of blocks.

DAG with blocks structure

IoT and Blockchains:

To understand the potential of the combination of IoT and Blockchain, we must first understand them individually.

IoT — the interconnection of computing devices via the Internet, which can send and receive data through it.

Blockchain — an encrypted, distributed computer filing system that can help create real-time records. This Distributed Ledger Technology is cited as revolution in digital business.

Our world is constantly becoming smarter and more interconnected. This poses a few problems: most IoT devices are not very secure. The security issue is very compelling as a failure in an IoT ecosystem exposes multiple devices along with personal data. But in Blockchains the authority is not centralized. Hence, single-point failure will give access only to a node rather than the entire system. Oversight is another vital component that Blockchain can contribute. It can record a permanent, immutable list of data that passes through the supply chain. This will make it impossible to overwrite and tamper with. 

Currently most IoT devices share a centralized cloud storage. However, this is not sustainable in the long-term. Especially taking into consideration the large number of devices and hence data volume. Blockchains can do away with the data bottle-neck problem due to their distributed nature. Putting these together in theory, it is possible to create a verifiable and secure method of tracking processed data using smart devices. In addition to this is the ability to interact and make decisions without any human intervention. Such a network will give rise to a plethora of applications.

Blockless DAG:

Blockless DAG is a contrary to the popular notion about necessity of ‘blocks’. In a Blockchain, transactions are mined into blocks. The sequence of blocks is maintained by the pre-hashes between them. The combination of blocks and transactions, is the foundation of Blockless networks. Each transaction is directly involved in maintaining the sequence, and hence the process of mining is skipped.

Comparison of block-based and DAG-enabled Blockless and Block-based chain systems

Blockless projects:

DiscoveryIoT:

An autonomous Blockchain IoT network, inspired by a biological system: Discovery is a Blockless DAG protocol. This Blockchain IoT platform allows the nodes to share infrastructure like Wi-Fi, Bluetooth, Processing power and storage enhance the intelligence of the Edge Computing process. It is not only Blockless but also localized using semantic ontology.

The core of the Discovery network comprises of three layers, Cliot-the IoT tag, user community and the data analytics/Artificial Intelligence engine

Cliot is an IoT tag that utilizes backscatter technology to absorb surrounding electromagnetic waves to power itself up. This can communicate with devices within a 30m range, and is also compatible with several sensors.

The user community is a community of smartphone users that have the Discovery application installed on their phones. These smartphones act as nodes in the network. Cliot communicates and transmits data over this through WiFi or Bluetooth.

Data analytics, the third layer where the data received is processed using edge and sent to the cloud to capture useful insights about the processes in the supply chain. These insights help to strategize businesses and maintain quality of the supply chain.

IOTA

With Blockchain scalability, there can only be a fixed Blockchain with fixed block interval which limits transactions per second. To overcome this scalability problem IOTA created its solution, Tangle, a Blockless DAG protocol. This gets rid of blocks by using the principle that transactions validate previous transactions. With the Tangle protocol, when a user sends a transaction, it validates two previous transactions. This enables a stream of incoming transactions to validate prior unconfirmed transactions. Which eventually validates continuously without being held up by discreet blocks.

This Blockless architecture and uses the directed acyclic graph (DAG) rather than the conventional Blockchain. It is especially useful for Machine-to-Machine (M2M) micropayments and data messaging.

Conclusion:

If you are truly interested in the domain of IoT and what the future holds, understanding Blockless networks is a stepping stone. You might already be familiar with Block-based chains, in which case understadning this should be easier. If not, don’t fret. Feel free to go read about it and revisit this article for a better understanding. Learning will not happen over night, take your time. The quality of what you know is worth much more than how much you know. If you want to look through more examples of Blockless projects, a few good examples are Byteball ( a cryptocurrency platform), IoT Chain ( a lite and secure OS for IoT devices).

Creating a multiplication Skill in Alexa using python

Written By Jyotsna Rajaraman

Hi! I'm Jyotsna, an electronics and communication undergrad who likes reading, writing, talking and learning. So when it comes to teaching, all my favorite things come together! I hope my articles have helped and taught you something. 🙂

RELATED POSTS

Logic Locking: Advancement to IoT Security

Logic Locking: Advancement to IoT Security

Logic locking technology is one of the latest advancement in the improvement of IoT security to protect your devices from cyber attacks. Before knowing that lets talk about Internet of Things (IoT). What is IoT ? The Internet of Things (IoT) is a new, but at the same...

Security Tools For IoT

Security Tools For IoT

Security is required for the connecting things on internet and some of the tools and solutions used are: 1.M2MLabs Mainspring: M2MLabs is a set of M2MLabs. Mainspring is an open-source technology platform for developing M2M (machine-to-machine) applications. Including...

Cryptography and Security in the Internet of Things

Cryptography and Security in the Internet of Things

Cryptography is the process of securing information by transforming the information into a secure format and vice versa. In other words, encrypting and decrypting the formation to secure it. Firstly, let's understand the security issues in IoT to understand the...

Advanced Encryption Standard – AES Algorithm

Advanced Encryption Standard – AES Algorithm

Encryption is a key feature for securing information. Encryption is basically converting any normal yet confidential message to an encoded and unreadable format for high-security purposes. This unreadable text is known as ciphertext. There are many Encryption...

Cloud Security

Cloud Security

Cloud security consists of several protocols and policies. There are several procedures and technologies which are required to maintain cloud-based systems. Also, it helps in protecting cloud data and giving protection to the privacy of users. Set of protocols are...

Secure Shell Protocol (SSH Protocol)

Secure Shell Protocol (SSH Protocol)

What is SSH Protocol? Secure Shell Protocol or SSH Protocol is a protocol for secure remote login over an insecure network. SSH achieves to provide a secure channel over the insecure channel by using client-server architecture, connecting an SSH client to the SSH...

Hashing in IoT

Hashing in IoT

Hashing is transforming a string of characters into a usually shorter value of a fixed length representing the original string. Besides faster data recovery, Hashing is also used to encrypt and decrypt digital signature. Introduction The number of interconnected...

VIDEOS – FOLLOW US ON YOUTUBE

EXPLORE OUR IOT PROJECTS

IoT Smart Gardening System – ESP8266, MQTT, Adafruit IO

Gardening is always a very calming pastime. However, our gardens' plants may not always receive the care they require due to our active lifestyles. What if we could remotely keep an eye on their health and provide them with the attention they require? In this article,...

How to Simulate IoT projects using Cisco Packet Tracer

In this tutorial, let's learn how to simulate the IoT project using the Cisco packet tracer. As an example, we shall build a simple Home Automation project to control and monitor devices. Introduction Firstly, let's quickly look at the overview of the software. Packet...

All you need to know about integrating NodeMCU with Ubidots over MQTT

In this tutorial, let's discuss Integrating NodeMCU and Ubidots IoT platform. As an illustration, we shall interface the DHT11 sensor to monitor temperature and Humidity. Additionally, an led bulb is controlled using the dashboard. Besides, the implementation will be...

All you need to know about integrating NodeMCU with Ubidots over Https

In this tutorial, let's discuss Integrating NodeMCU and Ubidots IoT platform. As an illustration, we shall interface the DHT11 sensor to monitor temperature and Humidity. Additionally, an led bulb is controlled using the dashboard. Besides, the implementation will be...

How to design a Wireless Blind Stick using nRF24L01 Module?

Introduction Let's learn to design a low-cost wireless blind stick using the nRF24L01 transceiver module. So the complete project is divided into the transmitter part and receiver part. Thus, the Transmitter part consists of an Arduino Nano microcontroller, ultrasonic...

Sending Temperature data to ThingSpeak Cloud and Visualize

In this article, we are going to learn “How to send temperature data to ThingSpeak Cloud?”. We can then visualize the temperature data uploaded to ThingSpeak Cloud anywhere in the world. But "What is ThingSpeak?” ThingSpeak is an open-source IoT platform that allows...

Amaze your friend with latest tricks of Raspberry Pi and Firebase

Introduction to our Raspberry Pi and Firebase trick Let me introduce you to the latest trick of Raspberry Pi and Firebase we'll be using to fool them. It begins with a small circuit to connect a temperature sensor and an Infrared sensor with Raspberry Pi. The circuit...

How to implement Machine Learning on IoT based Data?

Introduction The industrial scope for the convergence of the Internet of Things(IoT) and Machine learning(ML) is wide and informative. IoT renders an enormous amount of data from various sensors. On the other hand, ML opens up insight hidden in the acquired data....

Smart Display Board based on IoT and Google Firebase

Introduction In this tutorial, we are going to build a Smart Display Board based on IoT and Google Firebase by using NodeMCU8266 (or you can even use NodeMCU32) and LCD. Generally, in shops, hotels, offices, railway stations, notice/ display boards are used. They are...

Smart Gardening System – GO GREEN Project

Automation of farm activities can transform agricultural domain from being manual into a dynamic field to yield higher production with less human intervention. The project Green is developed to manage farms using modern information and communication technologies....