Encyclopedia of Wireless Networks

Living Edition
| Editors: Xuemin (Sherman) Shen, Xiaodong Lin, Kuan Zhang


  • Yuan ZhangEmail author
Living reference work entry
DOI: https://doi.org/10.1007/978-3-319-32903-1_171-1



A blockchain is a linear collection of data elements called block, where all blocks are linked to form a chain and secured using cryptography, and newly generated blocks are continuously chained to the blockchain in an untrusted environment. To date, there is still lack of formal definitions on the blockchain that can be accepted by both the academia and industry.

Historical Background

The Blockchain technique is derived from the Bitcoin which is first proposed by Nakamoto in 2008. The primary objective of Bitcoin is to propose a secure payment system without a trusted party such that online payments can be sent directly from one user to others without going through a financial institution. This is achieved by a distributed ledger which accounts for the ownership of coins. The key challenge is to resist double spending attacks, where an adversary could issue two transactions in parallel so as to transfer the same coin to different recipients. Essentially, enabling the distributed ledger to be secure against double spending attacks boils down to the Byzantine Generals problem (BGP). Existing solutions to solve BGP mainly focus on the permission model, where the participants in the system are predetermined (or participants know each other). However, the participants who maintain the ledger in a secure digital payment system are under a permissionless model, where anyone can join or leave the system without permitted by a centralized or distributed authority.

Bitcoin first achieved consensus on the distributed ledger in the permissionless model, where it cleverly integrates existing primitives and solutions from decades of research into one system to solve the fundamental problems existing in digital currencies in a practically viable way. Bitcoin is also the first cryptocurrency that is widely applied in large-scale networks. Due to the success of Bitcoin, its underlying technique called “blockchain” is extracted, which is of independent interest. Intuitively, the blockchain is a technique that maintains a public, immutable, and ordered ledger of records among all participants. It enables the participants to securely and periodically add new records into the ledger without trusting each other. It also guarantees that the records that have been added into the ledger cannot be removed or modified such that all honest participants have a consistent view of the ledger. More recently, the blockchain technique has been further investigated and one of the most prominent manifestations is to enable smart contracts. As a disruptive technique with profound implications, blockchain is transforming the very nature of how users including individuals and enterprises conduct transactions and perform smart contracts.

Generally, the blockchain technique can be classified into two types: public blockchain and private blockchain. For a public blockchain, the participants who maintain the blockchain are subject to the permissionless model, which means that anyone can join or leave the blockchain system without getting permission from a centralized or distributed authority. The most prominent manifestation of public blockchain is blockchain-based currencies, such as Bitcoin and Ethereum. The private blockchain (including the consortium blockchain) is derived from its public counterpart, where the participants who maintain the blockchain are authorized by blockchain managers or the managers themselves. At this point, the key difference between the private blockchain and distributed backup systems is that once a record is added to the blockchain, as long as the majority of participants is in accessible to the adversaries, the record cannot be removed or modified, even if the blockchain manager becomes the adversary.


Most of existing blockchain systems are either based on the proofs of work (PoW) or based on the proofs of stake (PoS) (Kiayias et al. 2017; Pass and Shi 2017; Tschorsch and Scheuermann 2016; Underwood 2016; Wood 2014). Both PoW and PoS are key component to implement a consensus algorithm such that newly generated records can be securely added to the blockchain. PoW is a cryptographic primitive that enables a prover to demonstrate to a verifier that she/he has performed a certain amount of computational work in a specified interval of time. In the PoW-based blockchain, PoW is used to build a bridge between a user’s identity and her/his hashrate, such that the more hashrate in the blockchain network, the higher probability that the content of the new block is determined by the participant. A typical PoW-based blockchain has the form shown in Fig. 1, where Block Hash denotes the hash value of current block, PreBlockHash denotes the hash value of the last block, Nonce denotes the PoW solution, Time denotes the timestamp of current block, Re denotes the record stored in the blockchain, and MerkleRoot denotes the root value of a Merkle hash tree formed by all records recorded in current block.
Fig. 1

A typical PoW-based blockchain

In the PoW-based blockchain, the participants need to solve the PoW puzzle to fight for generating the new block; this results in striking energy demands. Actually, the PoW-based blockchain has even been labeled an “environmental disaster (Dziembowski et al. 2015).” As such, a blockchain system that is constructed on another mechanism, rather than PoW, to obviate the huge energy requirements is urgently needed. Essentially, PoW in blockchain facilitates a practical randomized “leader election” process that elects one of the participants to issue the next block, where the probability to be the leader for a participant is proportional to her/his hashrate.

A naturel alternative mechanism to replace PoW is the notion of “proof of stake” (PoS). In PoS-based blockchain, the probability to be the leader for a participant is proportional to her/his stake according to the current blockchain ledger. A basic observation to use such mechanism is that if the higher ratio of shareholding one has, the stronger motivation to retain the system security she/he has. A key challenge to design a PoS-based blockchain is to simulate the randomized leader election process. In most of existing PoS-based blockchain systems, this is achieved by a cryptographic protocol that participants jointly generate a random number to elect the leader. A typical PoW-based blockchain has the form shown in Fig. 2, where Aux denotes the auxiliary information on the leader election process.
Fig. 2

A typical PoS-based blockchain

Except for PoS, some other mechanisms have been proposed to replace PoW, for example, proofs of space. In the proofs of space setting, a prover demonstrates to a verifier that she/he has significant amounts of disk space.

Applications in Wireless Networks

Blockchain-based identity management for wireless networks. Blockchain can be utilized as a database to record all users’ identities in wireless networks without a trusted authority (Garman et al. 2014). Since the blockchain is inherently resistant to forgery and modification, after the users’ identities are recorded into the blockchain, anyone cannot tamper with the identities. Compared with existing systems, the blockchain-based identity management system does not require a trusted authority and thereby can resist the single-point-of-failure problem.

Blockchain-based random number generator for wireless networks. In wireless networks, random numbers play an important role to construct systems and protocols. In a PoW-based blockchain system, the hash value (Block Hash in Fig. 1) of each block on the chain only can be determined after a valid nonce is computed and the block is chained to the blockchain. Due to the inherent resistance against modification of blockchain, once the block is chained to the blockchain, its hash value is deterministic and would never be changed. As such, given a time t, if t is a past time, the hash value of the latest block that has appeared since t in the PoW-based blockchain is deterministic and can be extracted efficiently; if t is a future time, the hash value is unpredictable (Zhang et al. 2015, 2016). Therefore, the PoW-based blockchain can be utilized to construct a time-dependent random number generator.

Blockchain-based data sharing for wireless networks. In wireless networks, multiple network systems need to share data with each other. However, due to the differences on the data form, software version, network delay, or even node location, sharing data is always a challenging problem for different wireless network systems (Kosba et al. 2016). Since the blockchain is publicly accessible to all participants, it enables the data sharing among different systems to be feasible and efficient. Multiple systems can joint maintain a blockchain to record the data to be shared, which build bridges between these systems to share data.



  1. Dziembowski S, Faust S, Kolmogorov V, Pietrzak K (2015) Proofs of space. In: Proceedings of the CRYPTO. Springer, Santa Barbara, CA, pp 585–605Google Scholar
  2. Garman C, Green M, Miers I (2014) Decentralized anonymous credentials. In: Proceedings of the NDSS. SanDiego, CA, pp 23–26Google Scholar
  3. Kiayias A, Russell A, David B, Oliynykov R (2017) Ouroboros: a provably secure proof-of-stake blockchain protocol. In: Proceedings of the CRYPTO. Springer, Santa Barbara, CA, pp 357–388CrossRefGoogle Scholar
  4. Kosba A, Miller A, Shi E, Wen Z, Papamanthou C (2016) Hawk: the blockchain model of cryptography and privacy-preserving smart contracts. In: Proceedings of the SP. IEEE, San Jose, CA, pp 839–858Google Scholar
  5. Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system. Technique Report, http://wfc-knowledgecentre.com/wp-content/uploads/2016/07/Bitcoin-A-Peer-to-Peer-electronic-Cash-System.pdf
  6. Pass R, Shi E (2017) Fruitchains: a fair blockchain. In: Proceedings of the PODC. ACM, Washington, DC, pp 315–324Google Scholar
  7. Tschorsch F, Scheuermann B (2016) Bitcoin and beyond: a technical survey on decentralized digital currencies. IEEE Commun Surv Tutorials 18(3):2084–2123CrossRefGoogle Scholar
  8. Underwood S (2016) Blockchain beyond Bitcoin. Commun ACM 59(11):15–17CrossRefGoogle Scholar
  9. Wood G (2014) Ethereum: a secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper, pp 1–32Google Scholar
  10. Zhang Y, Xu C, Yu S, Li H, Zhang X (2015) SCLPV: secure certificateless public verification for cloud-based cyber-physical-social systems against malicious auditors. IEEE Trans Comput Soc Syst 2(4):159–170CrossRefGoogle Scholar
  11. Zhang Y, Xu C, Li H, Liang X (2016) Cryptographic public verification of data integrity for cloud storage systems. IEEE Cloud Comput 3(5):44–52CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.University of Electronic Science and Technology of ChinaChengduChina

Section editors and affiliations

  • Haojin Zhu
    • 1
  • Jian Shen
    • 2
  1. 1.Shanghai Jiaotong University, ChinaShanghaiChina
  2. 2.Nanjing University of Information Science & Technology, ChinaNanjingChina