An Ethereum-Based, Integrity-First Communication Protocol for Iot

Total Page:16

File Type:pdf, Size:1020Kb

An Ethereum-Based, Integrity-First Communication Protocol for Iot An Ethereum-Based, Integrity-First Communication Protocol for IoT Devices by Elizabeth Reilly Submitted to the Department of Electrical Engineering and Computer Science in partial fulfillment of the requirements for the degree of Master of Science in Computer Science and Engineering at the MASSACHUSETTS INSTITUTE OF TECHNOLOGY June 2019 c Massachusetts Institute of Technology 2019. All rights reserved. Author.............................................................. Department of Electrical Engineering and Computer Science May 24, 2019 Certified by. Michael Siegel Principal Research Scientist Thesis Supervisor Accepted by . Katrina LaCurts Chairwoman, Department Committee on Graduate Theses 2 An Ethereum-Based, Integrity-First Communication Protocol for IoT Devices by Elizabeth Reilly Submitted to the Department of Electrical Engineering and Computer Science on May 24, 2019, in partial fulfillment of the requirements for the degree of Master of Science in Computer Science and Engineering Abstract The use of IoT devices in smart cities, advanced energy delivery systems, manufactur- ing plants and transportation systems is rapidly increasing. These systems are often responsible for communicating critical data about infrastructure and system state. Despite the significance of IoT devices, many of these devices lack communication protocols with data integrity as a priority. Without data integrity, these systems become reliant on compromised data, and ultimately fail. Attackers can use these vulnerabilities to wage cyber-physical attacks. The light client is an integrity-first communication protocol for IoT devices based on the Ethereum blockchain. This light client ensures that data is not compromised and is lightweight, at a total mem- ory consumption size of 1.2 MB. Therefore, this light client is distributed, secure, and light enough to fit on many IoT devices and ensure that integrity is maintained where it is needed most [24]. Thesis Supervisor: Michael Siegel Title: Principal Research Scientist 3 4 Acknowledgments First and foremost I would like to thank my supervisor Michael Siegel, for continually supporting and encouraging my research. I would also like to thank my colleagues Gregory Falco and Matthew Maloney. Their technical guidance was instrumental in helping me complete this research. I would further like to thank the Cyber Resilient Energy Delivery Consortium (CREDC)1 for all of the support and resources they have given me and for welcoming me into their research group. Finally, I would like to thank my friends and family. Specifically, my Mother and Father, for helping me set up and run all of my tests on their home Wifi system. They have supported me endlessly in both my undergraduate and graduate degree and this thesis would not have been possible without them. 1This material is based in part on work supported by the Department of Energy under Award Number DE-OE0000780. The views and opinions of the authors expressed herein do not necessarily state or reflect those of the United States Government or any agency thereof. 5 6 Contents 1 Introduction 15 2 Related Works 17 2.1 Legacy Communication Protocols . 17 2.1.1 Modbus . 17 2.1.2 DNP3 . 18 2.2 Modern IoT Communication Protocols . 18 2.2.1 DTLS and CoAP . 18 2.2.2 MQTT . 19 2.3 IoT Blockchains . 19 2.3.1 Tangle . 20 2.3.2 IoT Chain . 20 2.3.3 IoTex . 21 2.3.4 NeuroMesh . 21 3 Light Client Implementation 23 3.1 Using Ethereum as a Base . 23 3.2 Avoiding Storing Chain Data . 24 3.2.1 Nonce . 24 3.2.2 Gas Price and Gas Limit . 25 3.3 Reducing Code Size . 25 3.3.1 Code Removed . 26 3.3.2 Compiler Flags . 26 7 3.3.3 UPX and Code Compression . 26 3.4 Architecture and Communication . 26 4 Testing Environment 29 4.1 Ropsten Network Constraints . 29 4.2 Testing Dashboard . 30 4.3 Devices . 31 4.3.1 Mac OS and Unix . 31 4.3.2 ThinkPad and Linux . 31 4.3.3 64 bit ARM . 32 4.4 Parameters . 32 5 Preliminary Testing 35 5.1 Transaction Approval and Removal Time . 35 5.2 Peer Count Over Time . 37 5.3 Transaction Size . 38 5.4 Stress Testing . 39 5.4.1 Maximum Queue Size . 39 5.5 Device Comparisons . 40 6 Discussion 43 6.1 Comparison to other Blockchains . 43 6.2 Evaluation as a Communication Protocol . 44 6.3 Applications . 45 6.3.1 Smart Cities . 45 6.3.2 Energy Delivery Systems . 45 6.3.3 Device Updates . 45 6.4 Limitations . 46 7 Conclusion 47 7.1 Summary of Contributions . 47 7.2 Future Work . 48 8 A Tables 51 B Figures 53 9 10 List of Figures 3-1 Distributed node architecture . 27 4-1 The GL iNet router, a sample 64 bit ARM device, on the left. The GL iNet plugged into a Verizon ethernet port on the right. 32 5-1 A graph of transaction approval times over a 100 minute period. 35 5-2 A graph of the time it takes for transactions to be removed from the local queue when using a peer limit. 36 5-3 A graph of the peer count over time. 37 5-4 A graph of how the transaction times change with data size. 38 5-5 A graph of how the transaction cost changes with the data size. 39 5-6 The number of transactions sent within various time ranges for each device. 40 B-1 Sample output from the testing dashboard when testing for transaction time. Output is human-readable. Testing dashboard also includes a regrex file to strip this output file into a dataset. 53 B-2 Sample output from the testing dashboard when testing for peer count. Output is human-readable. Testing dashboard also includes a regrex file to strip this output file into a dataset. 54 11 12 List of Tables 3.1 The impact of each code reduction method. 25 3.2 A comparison of the original Ethereum source code to the light client implementation. 25 4.1 Statistics about the average performance of the Ethereum network [8]. 29 4.2 Size of each cross-compiled binary. 31 5.1 The average time to send a transaction per operating system. Taken across 4096 transactions. 40 6.1 Comparison of different Blockchain algorithms [5][6][13][29]. 43 6.2 Comparison of different IoT communication protocols [12]. 44 A.1 Sizes of the cross-compiled light client for operating systems and ar- chitectures that were not explicitly tested in this thesis. 51 13 14 Chapter 1 Introduction Although the use and prevelance of IoT devices is on the rise in homes and in cities, many of these devices lack proper security [14]. There are hundreds of videos ded- icated to demonstrating how to hack into IoT devices in minutes [7][24]. There are currently few communication protocols and the variation in manufacturers makes standardizing communicaiton difficult. Furthermore, communication becomes even more difficult on memory and processing power-constrained devices such as smart me- ters and CCTV security cameras [13]. This research focuses specifically on improving the communication integrity of critical infrastructure IoT. Integrity-first communication, otherwise known as prioritizing correct communi- cations, is important for many IoT devices. IoT devices such as smart meters and electronic appliances can be found in the home [14]. They can also play a large role in transportation systems such as subways and traffic control [16]. Furthermore, IoT devices can be found in energy delivery systems or smart cities, where lack of integrity of data can have cyber-physical consequences [24]. The integrity of these devices is critical. It can be hard to determine a single universal communication protocol for IoT de- vices because these devices often have different operating systems and configurations [11]. This is even more difficult for IoT devices with limited memory and compu- tational resources as they often lack the space to be able to host a communication protocol at all [18]. Many integrity-first IoT communication protocols have been 15 suggested, but they are often not scalable to large networks of devices [22]. Given the scale and distributed nature of IoT devices, a suitable integrity-first communication protocol is needed [24]. Blockchain is therefore a good candidate. Blockchain is a distributed ledger in which different nodes in the system can send transactions and also verify the transactions of other participants. The global blockchain is comprised of the overall series of approved transactions, in order of when they were approved. This global blockchain is determined by consensus among the nodes. Es- sentially, the majority of nodes in the system will agree about which transactions should be approved and these transactions then go into the blockchain so that the majority of nodes will always have the same blockchain. This blockchain is therefore immutable and secure. Blockchain provides a scalable, distributed record that en- forces consensus across all participating nodes [23][24]. Once a transaction has been approved by the majority of nodes, it cannot be altered or deleted unless an attacker controls over 51% of the nodes. If an attacker does gain control over 51% of the nodes, that attacker could control which direction the chain grows, essentially choos- ing which transactions to verify. This is known as a '51% attack'. However, the risk of such an attack in a large network is very low as the attacker would need to gain control over a massive number of nodes. Therefore, large blockchains are effective at guaranteeing the integrity of IoT communications [23][24]. In general, hosting a blockchain node on an IoT device has been difficult because each node must store the entire chain of transactions. Many IoT devices have mem- ory and computational limits which keep them from being able to store entire chain data.
Recommended publications
  • Evmpatch: Timely and Automated Patching of Ethereum Smart Contracts
    EVMPatch: Timely and Automated Patching of Ethereum Smart Contracts Michael Rodler Wenting Li Ghassan O. Karame University of Duisburg-Essen NEC Laboratories Europe NEC Laboratories Europe Lucas Davi University of Duisburg-Essen Abstract some of these contracts hold, smart contracts have become an appealing target for attacks. Programming errors in smart Recent attacks exploiting errors in smart contract code had contract code can have devastating consequences as an attacker devastating consequences thereby questioning the benefits of can exploit these bugs to steal cryptocurrency or tokens. this technology. It is currently highly challenging to fix er- rors and deploy a patched contract in time. Instant patching is Recently, the blockchain community has witnessed several especially important since smart contracts are always online incidents due smart contract errors [7, 39]. One especially due to the distributed nature of blockchain systems. They also infamous incident is the “TheDAO” reentrancy attack, which manage considerable amounts of assets, which are at risk and resulted in a loss of over 50 million US Dollars worth of often beyond recovery after an attack. Existing solutions to Ether [31]. This led to a highly debated hard-fork of the upgrade smart contracts depend on manual and error-prone pro- Ethereum blockchain. Several proposals demonstrated how to defend against reentrancy vulnerabilities either by means of cesses. This paper presents a framework, called EVMPATCH, to instantly and automatically patch faulty smart contracts. offline analysis at development time or by performing run-time validation [16, 23, 32, 42]. Another infamous incident is the EVMPATCH features a bytecode rewriting engine for the pop- ular Ethereum blockchain, and transparently/automatically parity wallet attack [39].
    [Show full text]
  • ARK​ ​​Whitepaper
    ARK Whitepaper ​ ​​ A Platform for Consumer Adoption ​ ​ ​ ​ ​ ​ ​ ​ v.1.0.3 The ARK Crew ARK Whitepaper v.1.0.3 ​ ​ ​ ​ ​ ​ ​ ​ Table Of Contents ​ ​ ​ ​ Overview………………………………………………………………...……………………………….……………….………………………………………………………….….3 ​ Purpose of this Whitepaper………………………………………………………………………………………………………………………..….……….3 ​ ​ ​ ​ ​ ​ ​ Why?…………………………………………………………………………………………………………………….…………………………………………………….…………..4 ​ ​ ARK…………………………………………………………………………………………………….……………….…………………………………………………………………..5 ​ ​ ARK IS………………………………………………………………………………………………....……………….………………………………………………………………..5 ​ ​ ​ ​ ARK: Technical Details……………………………………….…….…..…………………………...……………….………………...…………………………...6 ​ ​ ​ ​ ​ ​ - Delegated Proof of Stake…………………………….……………...………………………….……………………………………….………...…...6 ​ ​​ ​ ​ ​ ​ ​ ​ ​ - Hierarchical Deterministic (HD) Wallets ​ ​​ ​ ​ ​ ​ ​ ​ (BIP32)…………………………………………………….....…………………..…..8 ​ - Fees……………………………………………………………………………………………………………….……………….…...………………………………..……...8 ​ ​​ ​ - ARK Delegates and Delegate Voting.…………………………………………………………………………………...………………….9 ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ - Bridged Blockchains (SmartBridges)....................………………………………………………………………….………...…….10 ​ ​​ ​ ​ ​ ​ ​ - POST ARK-TEC Token Distribution …………………..…………………………………….………………….………..……..…..……….11 ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ - Testnet Release……………………………………………….…………………………………………………………………….………...….....12 ​ ​ ​ And Beyond?…………………………………………………………………….………...……………………………………….………………………...……….…12 ​ ​ ​ ​ Addendum 1: ARK IS…(Cont.)...……..……..…………....…..………...………………………………………...………………………......……12
    [Show full text]
  • Metamask Pre-Assignment
    MMS 562F: Tech Driven Transformation MetaMask Pre-Assignment Campbell R. Harvey Duke University and NBER February 2021 Setup • Metamask is a cryptocurrency wallet that is used to interface with the Ethereum-based Apps • We will be setting up this Wallet on your mobile device (iOS or Android only) – If you are unable to use a mobile device, the end of this deck has a web browser tutorial (Page 19) – If you already have MetaMask on your browser, the end of this deck has a tutorial to link your Web Account to the Mobile App (Page 25) Campbell R. Harvey 2021 2 Setup • Download the Metamask app from the App Store or Google Play Store • Click Get Started • Click Create a new wallet • Create a new account by typing in a password of your choosing and pressing “Create” • Go through the prompts to secure your wallet • Store Secret Backup Phrase in a secure location, ideally paper or a password manager – not on your phone or computer. • Type in secret backup phrase Campbell R. Harvey 2021 3 1 Using MetaMask 1. Network • This determines which Ethereum Network you are using. Click on this to see all network options in a 2 dropdown. For this class we will only discuss or use the Main Ethereum Network and the Ropsten Test Network. 3 Campbell R. Harvey 2021 4 1 Using MetaMask 1. Network • The Ethereum Mainnet is where live ether (ETH) with real value exists and is 2 used for payment and applications. I will refer to this as the “main network” or the “mainnet” 3 Campbell R.
    [Show full text]
  • Reputation Driven Dynamic Access Control Framework for Iot Atop Poa Ethereum Blockchain
    Reputation Driven Dynamic Access Control Framework for IoT atop PoA Ethereum Blockchain Auqib Hamid Lonea,∗, Roohie Naaza aDepartment of Computer Science and Engineering., NIT Srinagar, Jammu and Kashmir,India,190006 Abstract Security and Scalability are two major challenges that IoT is currently fac- ing. Access control to critical IoT infrastructure is considered as top security challenge that IoT faces. Data generated by IoT devices may be driving many hard real time systems, thus it is of utmost importance to guarantee integrity and authenticity of the data and resources at the first place itself. Due to heterogeneous and constrained nature of IoT devices, traditional IoT security frameworks are not able to deliver scalable, efficient and manage- able mechanisms to meet the requirements of IoT devices. On the other hand Blockchain technology has shown great potential to bridge the missing gap towards building a truly decentralized, trustworthy, secure and scalable environment for IoT. Allowing access to IoT resources and data managed through Blockchain will provide an additional security layer backed by the strongest cryptographic algorithms available. In this work we present a rep- utation driven dynamic access control framework for IoT applications based on Proof of Authority Blockchain, we name it as Rep-ACM. In Rep-ACM framework we build two major services, one for Reputation building (for bet- ter IoT device behaviour regulations) and other for Misbehaviour detection (for detecting any Misbehaviour on object resource usage). Both of these services work in coordination with other services of proposed framework to determine who can access what and under what conditions access should be granted.
    [Show full text]
  • Exploring the Interconnectedness of Cryptocurrencies Using Correlation Networks
    Exploring the Interconnectedness of Cryptocurrencies using Correlation Networks Andrew Burnie UCL Computer Science Doctoral Student at The Alan Turing Institute [email protected] Conference Paper presented at The Cryptocurrency Research Conference 2018, 24 May 2018, Anglia Ruskin University Lord Ashcroft International Business School Centre for Financial Research, Cambridge, UK. Abstract Correlation networks were used to detect characteristics which, although fixed over time, have an important influence on the evolution of prices over time. Potentially important features were identified using the websites and whitepapers of cryptocurrencies with the largest userbases. These were assessed using two datasets to enhance robustness: one with fourteen cryptocurrencies beginning from 9 November 2017, and a subset with nine cryptocurrencies starting 9 September 2016, both ending 6 March 2018. Separately analysing the subset of cryptocurrencies raised the number of data points from 115 to 537, and improved robustness to changes in relationships over time. Excluding USD Tether, the results showed a positive association between different cryptocurrencies that was statistically significant. Robust, strong positive associations were observed for six cryptocurrencies where one was a fork of the other; Bitcoin / Bitcoin Cash was an exception. There was evidence for the existence of a group of cryptocurrencies particularly associated with Cardano, and a separate group correlated with Ethereum. The data was not consistent with a token’s functionality or creation mechanism being the dominant determinants of the evolution of prices over time but did suggest that factors other than speculation contributed to the price. Keywords: Correlation Networks; Interconnectedness; Contagion; Speculation 1 1. Introduction The year 2017 saw the start of a rapid diversification in cryptocurrencies.
    [Show full text]
  • Ethereum Vs Ethereum Classic Which to Buy Update [06-07-2021] It Has Fully Compatibility with Solidity and Thus Ethereum Eco-System
    1 Ethereum vs Ethereum Classic Which to Buy Update [06-07-2021] It has fully compatibility with Solidity and thus Ethereum eco-system. It offers scalable and instantaneous transactions. It means that L2 projects are going to have a field day ahead with the increasing integrations and maturity of infrastructure around them. Therefore, it s the first entry in our top 5 Ethereum layer 2 projects list. Essentially it s a mixed PoW, PoS algorithm which it s purpose is to arrive one day to a PoS full implementation. Or will a completely new evolution of Ethereum be necessary to reach that level of transaction capacity. 380 transactions per block. Another important improvement is the next. More miners. Last week, the Ontario Securities Commission approved the launch of three ETFs that would offer investors direct exposure to Ether, the second-largest cryptocurrency by market capitalization after Bitcoin. 75 after May 31, the company said, plus applicable sales taxes. Management fees are not the only thing investors will need to pay. What to Know. Still, hopes of a technical adjustment called EIP ethereum improvement proposal 1559, which is expected to go live in July and is seen reducing the supply of ethereum, has provided a lift for the digital currency. Technically, ethereum is the blockchain network in which decentralized applications are embedded, while ether is the token or currency that enables or drives the use of these applications. It hit a record high of 3,610. Ethereum is well off its highs, though, so let s see if now is the time to make an investment.
    [Show full text]
  • Ethereum Vs. Bitcoin
    Ethereum vs. Bitcoin Creighton University Julianne Harm Josh Obregon Josh Stubbendick Contents Objectives ..................................................................................................................................................... 3 Comparing Bitcoin and Ethereum................................................................................................................. 3 The Future of Bitcoin and Ether ................................................................................................................... 6 Figure 1: Number of Bitcoin Transactions Per Day ............................................................................ 10 Recommended Investment Strategy............................................................................................................ 10 Figure 2: Standard Deviation of Portfolio ........................................................................................... 11 Projected Returns of the 5 Year Investment ............................................................................................... 11 Figure 3: Project Prices per unit (USD) .............................................................................................. 12 Figure 4: Projected Value ................................................................................................................... 12 Conclusion .................................................................................................................................................. 13 Works Cited
    [Show full text]
  • Package 'Ether'
    Package ‘ether’ January 25, 2020 Type Package Title Interaction with the 'Ethereum' Blockchain Version 0.1.6 Description Interacts with the open-source, public 'Ethereum' <https://www.ethereum.org/> blockchain. It provides a distributed computing platform via smart contracts. This package provides functions which interrogate blocks and transactions in the 'Ethereum' blockchain. License GPL-2 Encoding UTF-8 LazyData true Imports dplyr, httr, jsonlite, Rmpfr RoxygenNote 7.0.2 Suggests testthat, httptest NeedsCompilation no Author Andrew Collier [aut, cre] Maintainer Andrew Collier <[email protected]> Repository CRAN Date/Publication 2020-01-25 06:10:02 UTC R topics documented: as.ether . .2 as.finney . .3 as.gwei . .3 as.kwei . .3 as.mwei . .4 as.szabo . .4 dec_to_hex . .4 ether . .5 eth_accounts . .5 eth_blockNumber . .6 1 2 as.ether eth_coinbase . .6 eth_gasPrice . .7 eth_getBalance . .7 eth_getBlock . .8 eth_getBlockTransactionCountByHash . .9 eth_getBlockTransactionCountByNumber . .9 eth_getStorageAt . 10 eth_getTransactionByBlockHashAndIndex . 11 eth_getTransactionByBlockNumberAndIndex . 11 eth_getTransactionByHash . 12 eth_getTransactionCount . 13 eth_getTransactionReceipt . 13 eth_getUncleByBlockHashAndIndex . 14 eth_getUncleByBlockNumberAndIndex . 15 eth_getUncleCountByBlockHash . 15 eth_getUncleCountByBlockNumber . 16 eth_hashrate . 17 eth_mining . 17 eth_protocolVersion . 18 eth_syncing . 18 get_blocks . 19 get_rpc_address . 19 get_transactions . 20 hex_to_dec . 20 set_rpc_address . 21 web3_clientVersion . 21 web3_sha3 . 22 Index 23 as.ether Convert Wei to Ether. Description Convert Wei to Ether. Usage as.ether(wei) Arguments wei Number of Wei. as.finney 3 as.finney Convert Wei to Finney. Description Convert Wei to Finney. Usage as.finney(wei) Arguments wei Number of Wei. as.gwei Convert Wei to GWei. Description Convert Wei to GWei. Usage as.gwei(wei) Arguments wei Number of Wei. as.kwei Convert Wei to kWei. Description Convert Wei to kWei. Usage as.kwei(wei) Arguments wei Number of Wei.
    [Show full text]
  • An Organized Repository of Ethereum Smart Contracts' Source Codes and Metrics
    Article An Organized Repository of Ethereum Smart Contracts’ Source Codes and Metrics Giuseppe Antonio Pierro 1,* , Roberto Tonelli 2,* and Michele Marchesi 2 1 Inria Lille-Nord Europe Centre, 59650 Villeneuve d’Ascq, France 2 Department of Mathematics and Computer Science, University of Cagliari, 09124 Cagliari, Italy; [email protected] * Correspondence: [email protected] (G.A.P.); [email protected] (R.T.) Received: 31 October 2020; Accepted: 11 November 2020; Published: 15 November 2020 Abstract: Many empirical software engineering studies show that there is a need for repositories where source codes are acquired, filtered and classified. During the last few years, Ethereum block explorer services have emerged as a popular project to explore and search for Ethereum blockchain data such as transactions, addresses, tokens, smart contracts’ source codes, prices and other activities taking place on the Ethereum blockchain. Despite the availability of this kind of service, retrieving specific information useful to empirical software engineering studies, such as the study of smart contracts’ software metrics, might require many subtasks, such as searching for specific transactions in a block, parsing files in HTML format, and filtering the smart contracts to remove duplicated code or unused smart contracts. In this paper, we afford this problem by creating Smart Corpus, a corpus of smart contracts in an organized, reasoned and up-to-date repository where Solidity source code and other metadata about Ethereum smart contracts can easily and systematically be retrieved. We present Smart Corpus’s design and its initial implementation, and we show how the data set of smart contracts’ source codes in a variety of programming languages can be queried and processed to get useful information on smart contracts and their software metrics.
    [Show full text]
  • The Ethereum Classic Declaration of Independence Grammatical and Design Update: July 2019
    The Ethereum Classic Declaration of Independence grammatical and design update: july 2019 Let it be known to the entire world that on July 20th, 2016, at block 1,920,000, we as a community of sovereign individuals stood united by a common vision to continue the original Ethereum blockchain that is truly free from censorship, fraud or third party interference. In realizing, that the blockchain represents absolute truth, we stand by it, supporting its immutability and its future. We do not make this declaration lightly, or without forethought to the consequences of our actions. Looking Back It should be stated with great gratitude, that we acknowledge the creation of the Ethereum blockchain platform by the Ethereum Foundation and its founding developers. It certainly can be said without objection, that without their hard work and dedication that we as a community would not be, where we are today. From its inception, the Ethereum blockchain was presented as a decentralized platform for “applications that run exactly as programmed without any chance of fraud, censorship, or third-party interference”1. It provided a place for the free association of ideas and applications from across the globe without fear of discrimination, while also providing pseudonymity. In this decentralized platform, many of us saw great promise. List of Grievances It is however, with deep regret, that we as a community have had to spontaneously organize2 to defend the Ethereum blockchain platform from its founding members and organization due to a long train of abuses,
    [Show full text]
  • Arxiv:2003.14271V4 [Cs.LO] 20 Jul 2020 Ugs Oiiy Hc Uso H Teembokhi,Woenat Whose Blockchain, Ethereum the Ether on Runs Bank
    UTxO- vs account-based smart contract blockchain programming paradigms Lars Br¨unjes1 and Murdoch J. Gabbay2 1 IOHK 2 Heriot-Watt University, Scotland, UK Abstract. We implement two versions of a simple but illustrative smart contract: one in Solidity on the Ethereum blockchain platform, and one in Plutus on the Cardano platform, with annotated code excerpts and with source code attached. We get a clearer view of the Cardano pro- gramming model in particular by introducing a novel mathematical ab- straction which we call Idealised EUTxO. For each version of the con- tract, we trace how the architectures of the underlying platforms and their mathematics affects the natural programming styles and natural classes of errors. We prove some simple but novel results about alpha- conversion and observational equivalence for Cardano, and explain why Ethereum does not have them. We conclude with a wide-ranging and de- tailed discussion in the light of the examples, mathematical model, and mathematical results so far. 1 Introduction In the context of blockchain and cryptocurrencies, smart contracts are a way to make the blockchain programmable. That is: a smart contract is a program that runs on the blockchain to extend its capabilities. For the smart contract, the blockchain is just an abstract machine (database, if we prefer) with which it programmatically interacts. Basic design choices in the blockchain’s design can affect the the smart contract programming paradigm which it naturally supports, and this can have far-reaching consequences: differ- ent programming paradigms are susceptible to different programming styles, and different kinds of program errors.
    [Show full text]
  • Private Smart Contracts on Ethereum Enigma’S Vision
    Private Smart Contracts on Ethereum Enigma’s Vision Our mission is to create products and systems that accelerate the adoption and usability of decentralized technologies. Salad綾 is the user-friendly Ethereum mixer The Problem of Privacy Data on blockchains is public by default. This greatly limits potential applications. Our Pursuit Of Privacy “Decentralizing Privacy” - 2015 “Enigma: Decentralized Computation Platform with Guaranteed Privacy” - 2015 1,000+ combined citations These are from MIT Bitcoin Expo 2016! Enigma: A Protocol for Secure Computation Enigma enables decentralized applications to compute over encrypted data. Secret contracts use private computation methods to allow data inputs to remain hidden even from nodes. Enigma: Discovery The first network that publicly enables secret contracts. ● Permissionless network ● Secret state ● Proof of Stake ● Compatible with Ethereum ENIGMA STAKEHOLDERS Developers deploy dApps Users create tasks to use dApps Workers execute tasks DEVELOPERS build secret contracts Secret contracts are deployed to Enigma Developers write secret contracts Network in Rust, compiling to WASM - compatible with Web3 stack Ethereum blockchain A hash of the Secret contract is sent to the Enigma Contract on Ethereum USERS create tasks 1) Users interact with dApps by 3) The Task is sent to submitting encrypted data the Enigma Network using Enigma.js library - this creates “Tasks” 2) A hash of the Task is sent to the Enigma Contract on Ethereum (known as the “TaskID”) WORKERS execute tasks 1) Workers receive tasks
    [Show full text]