{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T02:45:22Z","timestamp":1747190722082,"version":"3.40.5"},"reference-count":71,"publisher":"Wiley","license":[{"start":{"date-parts":[[2021,10,31]],"date-time":"2021-10-31T00:00:00Z","timestamp":1635638400000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Scientific Programming"],"published-print":{"date-parts":[[2021,10,31]]},"abstract":"<jats:p>Blockchain as a decentralized distributed ledger is revolutionizing the world with a secure design data storage mechanism. In the case of Bitcoin, mining involves a process of packing transactions in a block by calculating a random number termed as a nonce. The nonce calculation is done by special nodes called miners, and all the miners follow the Proof of Work (PoW) mining mechanism to perform the mining task. The transaction verification time in PoW-based blockchain systems, i.e., Bitcoin, is much slower than other digital transaction systems such as PayPal. It needs to be quicker if a system adapts PoW-based blockchain solutions, where there are thousands of transactions being computed at a time. Besides this, PoW mining also consumes a lot of energy to calculate the nonce of a block. Mining pools resulting into aggregated hashpower have been a popular solution to speed up the PoW mining, but they can be attacked by using different types of attacks. Parallel computing can be used to speed up the solo mining methods by utilizing the multiple processes of the contributing processors. In this research, we analyze various consensus mechanisms and see that the PoW-based blockchain systems have the limitations of low transaction confirmation time and high energy consumption. We also analyze various types of consensus layer attacks and their effects on miners and mining pools. To tackle these issues, we propose parallel PoW nonce calculation methods to accelerate the transaction verification process especially in solo mining. We have tested our techniques on different difficulty levels, and our proposed techniques yield better results than the traditional nonce computation mechanisms.<\/jats:p>","DOI":"10.1155\/2021\/9996132","type":"journal-article","created":{"date-parts":[[2021,10,31]],"date-time":"2021-10-31T22:05:05Z","timestamp":1635717905000},"page":"1-13","source":"Crossref","is-referenced-by-count":3,"title":["Energy Efficient Multiprocessing Solo Mining Algorithms for Public Blockchain Systems"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4354-4062","authenticated-orcid":true,"given":"Zeeshan","family":"Raza","sequence":"first","affiliation":[{"name":"Department of Computer and Information Sciences (DCIS), Pakistan Institute of Engineering and Applied Sciences (PIEAS), Islamabad 45650, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5142-3965","authenticated-orcid":true,"given":"Irfan ul","family":"Haq","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Sciences (DCIS), Pakistan Institute of Engineering and Applied Sciences (PIEAS), Islamabad 45650, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6506-4430","authenticated-orcid":true,"given":"Muhammad","family":"Muneeb","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Sciences (DCIS), Pakistan Institute of Engineering and Applied Sciences (PIEAS), Islamabad 45650, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1859-8296","authenticated-orcid":true,"given":"Omair","family":"Shafiq","sequence":"additional","affiliation":[{"name":"School of Information Technology, Carleton University, Ottawa, ON, Canada"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/aieee.2018.8592253"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2019.07.026"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.3390\/sym10100470"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.02.027"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00940-3_4"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.tifs.2019.07.034"},{"key":"7","unstructured":"NakamotoS.Bitcoin: a peer-to-peer electronic cash system2019ManubotBitcoinTechnical Report"},{"key":"8","first-page":"1","article-title":"Understanding blockchain consensus models","volume":"4","author":"A. Baliga","year":"2017","journal-title":"Persistent"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2016.07.001"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978341"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/3213762"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2019.8761240"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/iccnc.2019.8685577"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-52153-4_16"},{"article-title":"The double spending problem and cryptocurrencies","year":"2017","author":"U. W. Chohan","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/tps-isa48467.2019.00014"},{"first-page":"81","article-title":"Random mining group selection to prevent 51% attacks on bitcoin","author":"J. Bae","key":"17"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/desec.2017.8073796"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-59013-0_28"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53357-4_2"},{"author":"T. Guggenberger","key":"21","article-title":"A structured overview of attacks on blockchain systems"},{"first-page":"581","article-title":"Refund attacks on bitcoin\u2019s payment protocol","author":"P. McCorry","key":"22"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/ccgrid.2017.111"},{"article-title":"Zeroblock: preventing selfish mining in bitcoin","year":"2016","author":"S. Solat","key":"24"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/dsn.2017.44"},{"article-title":"the balance attack against proof-of-work blockchains: The r3 testbed as an example","year":"2016","author":"C. Natoli","key":"26"},{"volume-title":"The Red Belly Blockchain. personal Communication","year":"2017","author":"V. Gramoli","key":"27"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/eurosp.2016.32"},{"volume-title":"Introduction to Parallel Computing","year":"2003","author":"A. Grama","key":"29"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/hoticn.2018.8606020"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/ccwc.2019.8666535"},{"key":"32","article-title":"Blockchain-free cryptocurrencies. a rational framework for truly decentralised fast transactions","volume":"2016","author":"X. Boyen","year":"2016","journal-title":"IACR Cryptology ePrint Archive"},{"key":"33","article-title":"A survey about consensus algorithms used in blockchain","volume":"14","author":"G. T. Nguyen","year":"2018","journal-title":"Journal of Information processing systems"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/icaccs.2017.8014672"},{"article-title":"Litecoin - open source p2p digital currency","year":"2020","author":"Litecoin","key":"35"},{"article-title":"The fastest cryptocurrency transaction speeds for 2018 by crypto account builders medium","year":"2021","author":"Medium","key":"36"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2925010"},{"article-title":"Navcoin - an easy to use decentralized cryptocurrency","year":"2021","author":"Navcoin","key":"38"},{"article-title":"Stratis blockchain development platform","year":"2021","author":"Stratis","key":"39"},{"article-title":"Survey of consensus protocols","year":"2018","author":"A. Wahab","key":"40"},{"article-title":"Waves.tech","year":"2021","author":"waves","key":"41"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.11113\/ijic.v10n2.272"},{"article-title":"Lisk blockchain application platform lisk","year":"2021","author":"Lisk","key":"43"},{"article-title":"The simplest way to blockchain","year":"2021","author":"ARK","key":"44"},{"article-title":"Eosio blockchain software & services","year":"2021","author":"EOSIO","key":"45"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.1109\/itqmis.2019.8928323"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.1109\/sies.2018.8442076"},{"article-title":"Nem ecosystem blockchain - because together, everything is possible","year":"2021","author":"NEM","key":"48"},{"key":"49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-60029-7_55"},{"article-title":"Decred - secure. adaptable. sustainable","year":"2021","author":"Decred","key":"50"},{"article-title":"Espers - web3 fractal engine","year":"2021","author":"Espers","key":"51"},{"key":"52","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-69084-1_19"},{"article-title":"Hyperledger sawtooth \u2013 hyperledger","year":"2021","author":"B. Hyperledger","key":"53"},{"key":"54","doi-asserted-by":"publisher","DOI":"10.1109\/trustcom50675.2020.00132"},{"article-title":"Hyperledger fabric \u2013 hyperledger","year":"2021","author":"A. Hyperledger","key":"55"},{"key":"56","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.107978"},{"key":"57","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2020.2975999"},{"key":"58","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11212-1_18"},{"key":"59","doi-asserted-by":"publisher","DOI":"10.1109\/icces48960.2019.9068181"},{"key":"60","doi-asserted-by":"publisher","DOI":"10.1145\/3211933.3211946"},{"first-page":"129","article-title":"Eclipse attacks on bitcoin\u2019s peer-to-peer network","author":"E. Heilman","key":"61"},{"key":"62","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45748-8_24"},{"key":"63","doi-asserted-by":"publisher","DOI":"10.1109\/sp.2017.29"},{"key":"64","doi-asserted-by":"publisher","DOI":"10.1109\/ent.2019.00008"},{"key":"65","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_28"},{"key":"66","doi-asserted-by":"publisher","DOI":"10.1109\/icse-companion.2019.00029"},{"article-title":"Precise attack synthesis for smart contracts","year":"2019","author":"Y. Feng","key":"67"},{"key":"68","doi-asserted-by":"publisher","DOI":"10.1109\/icce.2019.8662032"},{"key":"69","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-5171-3_4"},{"article-title":"Power consumption - the intel ivy bridge (core i7 3770k) review","year":"2021","author":"Anandtech","key":"70"},{"article-title":"Psu requirements - realhardtechx","year":"2020","author":"Realhardtechx","key":"71"}],"container-title":["Scientific Programming"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/sp\/2021\/9996132.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/sp\/2021\/9996132.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/sp\/2021\/9996132.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,31]],"date-time":"2021-10-31T22:05:13Z","timestamp":1635717913000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/sp\/2021\/9996132\/"}},"subtitle":[],"editor":[{"given":"Jiwei","family":"Huang","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,10,31]]},"references-count":71,"alternative-id":["9996132","9996132"],"URL":"https:\/\/doi.org\/10.1155\/2021\/9996132","relation":{},"ISSN":["1875-919X","1058-9244"],"issn-type":[{"type":"electronic","value":"1875-919X"},{"type":"print","value":"1058-9244"}],"subject":[],"published":{"date-parts":[[2021,10,31]]}}}