Abstract

Blockchain-based technologies have been created across a range of businesses for improving data security and integrity. A network chain is the most remarkable blockchain applications as part of the Industrial Internet of Things (IIoT). Sensor data in real time aids industrial equipment and infrastructures in making decisions and taking specified actions. Without sufficient security, an IIoT system can cause operational disruption and financial loss and lead to malicious activities and system manipulation. Detecting anomalies in IIoT networks is critical for network security. In this paper we discuss the Proof of Authority consensus algorithm. The Proof of Authority (PoA) depends on the reputation of trusted parties in blockchain network. The PoA consensus mechanism is based on the values of identities on a network, and validators stake their own identities and reputation. So, the validating nodes that are randomly picked as trustworthy safeguard the Proof of Authority Blockchain network. In Proof of Authority model, transactions are reviewed by already approved network users, and it operates with a fixed number of block validators. Since the identities of the nodes are trusted and known, the process can be used in applications like supply chains and trade networks.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call