Acknowledgement
본 연구는 2018년도 정부(과학기술정보통신부)의 재원으로 정보통신기술진흥센터의 지원을 받아 수행된 연구임 (No. 2018-0-00539, 블록체인의 트랜잭션 모니터링 및 분석 기술개발)
References
- S. Nakamoto, Bitcoin: A Peer-to-Peer Electronic Cash System(2009), Retrieved Jun. 14, 2020, from http://www.bitcoin.org/bitcoin.pdf.
- S. Nakamoto, Bitcoin Core(2009), Retrieved Mar. 13, 2020, from http://bitcoin.org/en/download/.
- C. Decker, C. and R. Wattenhofer, "Information propagation in the bitcoin network," In Proc. of IEEE P2P 2013, IEEE, pp. 1-10, Trento, Italy, Sep. 2013.
- W. Bi, Y. Huawei and Z. Maolin, "An Accelerated Method for Message Propagation in Blockchain Networks," arXiv preprint arXiv:1809.00455, Sep. 2018.
- R. Banno and S. Kazuyuki, "Simulating a blockchain network with SimBlock," In Proc. of International Conference on Blockchain and Cryptocurrency, IEEE, pp. 3-4, Seoul, Korea, May 2019.
- Y. Aoki, "SimBlock: A blockchain network simulator," In Proc. of IEEE INFOCOM 2019 Conference on Computer Communications Workshops, IEEE, pp. 325-329, May, 2019.
- G. Wood, "Ethereum: A secure decentralized generalized transaction ledger," Ethereum project yellow paper 151, pp. 1-32, 2014.
- E. Androulaki, et al., "Hyperledger fabric: a distributed operating system for permissioned blockchains," In Proc. of the Thirteenth EuroSys Conference, ACM, pp. 1-15, Apr. 2018.
- Z. Zheng, et al., "An overview of blockchain technology: Architecture, consensus, and future trends," In Proc. of IEEE International Big Data Congress, IEEE, pp. 557-564, Honolulu, USA, Jun. 2017.
- M. Pilkington, "Blockchain technology: principles and applications," Research handbook on digital transformations Edward Elgar Publishing, 2016.
- H. Gilbert, and H. Handschuh, "Security analysis of SHA-256 and sisters," In Proc. of International workshop on selected areas in cryptography, Springer, pp. 175-193, Berlin, Heidelberg, Aug. 2003.
- J. Park, "Design Scheme and Configuration of Private Blockchains Based Multiple Security Authentication Methods For Internet of Medical Things(IoMT) Application," The Journal of Korean Institute of Communications and Information Sciences, Vol. 44, No. 12, pp. 2315-2322, Dec. 2019. https://doi.org/10.7840/kics.2019.44.12.2315
- S. Lee, Y. Kim, H. Kim, "Trends and Analysis of Blockchain Privacy Protocols," The Journal of Korean Institute of Communications and Information Sciences, Vol. 44, No. 12, pp. 2252-2259, Dec. 2019. https://doi.org/10.7840/kics.2019.44.12.2252
- C. Jang, O. Yi, "Blockchain Network Configuration for Smart Contract in EV Charging Infrastructure," The Journal of Korean Institute of Communications and Information Sciences, Vol. 44, No. 8, pp. 1597-1604, Aug. 2019. https://doi.org/10.7840/kics.2019.44.8.1597
- A. Kosba, A. Miller, E. Shi, Z. Wen, and C. Papamanthou, "Hawk: The blockchain model of cryptography and privacy-preserving smart contracts," In Proc. of IEEE Symposium on security and privacy, IEEE, pp. 839-858, San Jose, USA, Aug. 2016.
- A. Yeow, Bitnodes(2018), Retrieved Mar. 16, 2020, from https://bitnodes.earn.com/.
- A. Gervais, et al., "On the security and performance of proof of work blockchains," In Proc. of the SIGSAC conference on computer and communications security, ACM, Oct. 2016.
- G. F. Riley, and R. H. Thomas, "The ns-3 network simulator," Modeling and tools for network simulation, Springer, pp. 15-34, Berlin, Heidelberg, June 2010.