Holochain: An Agent-Centric Distributed Hash Table Security in Smart IoT Applications
The accomplishment of blockchain has increased the focus on the various applications for simplifying the confidentiality and transaction sanctuary using the decentralized architecture via consensus mechanisms between different internet of things (IoT) nodes in daily increasing societal areas. The gr...
Gespeichert in:
Veröffentlicht in: | IEEE access 2023, Vol.11, p.81205-81223 |
---|---|
Hauptverfasser: | , , , , , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | The accomplishment of blockchain has increased the focus on the various applications for simplifying the confidentiality and transaction sanctuary using the decentralized architecture via consensus mechanisms between different internet of things (IoT) nodes in daily increasing societal areas. The growth of blockchain lasted to grow and used to do compare technologies. The major shortcomings of blockchain is the lack of scalability in modern application settings. Holochain technology vends itself as a "thinking" exterior to blocks, and it is a peer-to-peer disseminated ledger technology. It works contrarily compared to the blockchain, and it offers an exclusive value in the existing market. IoT devices are continuously used in distributed environments, in various smart applications. The peer-to-peer IoT networks, connected to smart agricultural systems are exposed to the security issues. Specifically, the personal data of agricultural land records need protection against unauthorized access and eradicate corruption in land transactions. The Blockchain offers a possible solution based on distributed ledger, but it has scalability issues due to high storage and processing requirements with growing network size. Also data is not locally stored in a Blockchain. This paper studies the conventions of holochain technology, its architecture and challenges, and critical mechanisms of holochain applications. We also analyze the numerous models utilized for the implementation of protected transactions. We discuss an agent centric framework with distributed hash table for secured applications. |
---|---|
ISSN: | 2169-3536 2169-3536 |
DOI: | 10.1109/ACCESS.2023.3300220 |