Cited By
View all- Karim MVan DKhan SQu QKholodov Y(2025)AI Agents Meet Blockchain: A Survey on Secure and Scalable Collaboration for Multi-AgentsFuture Internet10.3390/fi1702005717:2(57)Online publication date: 2-Feb-2025
Fundamental keywords | Blockchain |
---|---|
Primary keywords | Optimization, Improvement |
Secondary Keywords | Distributed ledger, Smart contract |
Inclusion | Exclusion |
---|---|
1. The selected document needs to highlight optimizations made to the blockchain. | 1. The conference version of research that has been published in the journal. |
2. Selected academic research papers must be empirical research about Blockchain optimization. | 2. Studies just focusing on improving applications and solutions using Blockchain. |
3. Selected academic research papers must be reviewed in a conference or journal | |
4. Whitepapers should be cited several times in published research works. |
Aspect | Our Survey | Existing Surveys [6, 72, 80, 100, 121, 146, 152, 196, 207] |
---|---|---|
Scope | Comprehensive review of AI-optimized blockchain solutions. | Various applications of blockchain and AI in IoT, AIoT, edge computing, and so on. |
Challenges Addressed | Sustainability, Scalability, Efficiency, Security, Privacy, Governance and dependency. | Decentralization of AI applications, Decentralized intelligence, Data Management, Sustainability, Scalability, Efficiency, Security, Privacy. |
Solutions Discussed | AI-enhanced blockchain solutions. | General blockchain and AI solutions for IoT and AI applications. |
Unique Insights | Emphasis on AI optimization in blockchain technology. | General integration of AI and blockchain, harnessing the advantages afforded by blockchain technology such as transparency and security–without focusing on resolving existing blockchain challenges. |
Future Directions | Proposes future research directions focusing on AI-driven blockchain optimizations. | General future directions in AI and blockchain research. |
Categories | Methodologies | Solutions |
---|---|---|
Rollup, “ZK-Rollups, optimistic rollups | The goal is to reduce network congestion and lower fees by transferring computational data storage away from the primary layer of the blockchain. | Truebit [179], Arbitrum [86] |
Payment Chanel | It is a temporary off-chain trading channel, where transactions are directed to alleviate the transaction volume on the main chain and enhance system throughput. | Lightning Network [84], Raiden Network [141], Sprites [117], DMC [59] |
MultiChain | 1- Side chain: is a separate blockchain from the main chain designed to streamline transaction operations. It enables the transfer of data that undergoes one-way transformation before being reintegrated into the main chain. | Plasma [85], Pegged sidechain [17], Liquidity network [99] |
2- Cross chain: is the process of integrating multiple blockchains to create a large interconnected network, all the while ensuring seamless interoperability among them. | Polkadot [40], Cosmos [51] | |
3- Sharding: it involves splitting the blockchain network into numerous shards. This strategy seeks to distribute the workload across multiple chains to enhance throughput and decrease latency. | Elastico [107], OmniLedger [90], RapidChain [200], RsCoin [56], Monoxide [188], ChainSpace [5], Zilliqa [177], QuarkChain [139], Elrond [176], Ostraka [109], Harmony [77], Ethereum 2.0 [70], ZyConchain [162] | |
Block data | Solutions exploring methods to reduce data, which include increasing the number of transactions per block or implementing block compression techniques. | SegWit [104], Bitcoin-Cash [41], CUB [195], Txilm [64], compact block relay [119], Jidar [55], Litecoin [142], Optimized aggregation scheme [57] |
Consensus | Enhance the consensus protocol for achieving higher throughput and reduced latency. | BlockML [116], PoAI [43], PoDL [47], SPoDL [106], PoA [25], PoB [88], PoSpace [68], PoWeight [8], PoC [115], PoI [8], PoSearch [153],PoL [37], PoLE [94], PoUW [20], PoDLwHO [118], PoH [32], PoFL [138], PoKW [105], DAIBCN [92], Optimized PoW [128, 190], PII [48], Optimized PPoV [194], GBT-CHAIN [187], B-PDA [14], Optimized MEC [101], Optimzed Edge Computing Framework [41] |
Solutions | Benefits | Limitations |
---|---|---|
Rollup | Reducing fees and gas consumption for users. Fast transaction throughput. | Solutions depends on third party verification. |
Payment Channel | Faster payment. High throughput. Real-time payments. Low transaction fees. Scalable. Privacy protection. | Users are not scaled. Low protection. Designed just for payments. Smart contracts not adopted. |
Multi Chain | High throughput. Communicates among heterogeneous blockchains. Highly scalable. High security. Reduce transaction costs and speed up operations. | Long wait to withdraw funds. Complicated implementation. Genesis epoch and starting new epochs are sensitive phases. |
Block Data | Increase the throughput. Increasing Block size. Fixing transaction malleability problem. Reduces UTXO growth. | Generates hard fork. Low scalability. |
Consensus | Increase the throughput. Investing computational energy in meaningful tasks. Improve blockchain performance by selecting best nodes in the network. | Depends on new actors: suppliers, keepers. The blockchain depends highly on the new types of tasks proposed in the solutions. |
Inclusion | Exclusion |
---|---|
1. The paper must be empirical research about integrating artificial intelligence or machine learning in Blockchain. | 1. Articles only interested in improving blockchain without using artificial intelligence. |
2. The paper needs to highlight the optimizations made on Blockchain by the integration of AI or ML. | 2. Studies focusing on the integration of blockchain to improve AI. |
3. Paper with a view of the concept of blockchain issues that can be optimized with AI. |
Work | Sustainability | Scalability | Security | Efficiency | Governance and Dependency |
---|---|---|---|---|---|
Bravo-Marquez et al. [37] | + | ||||
Lan et al. [94] | + | ||||
Chenli, Li et al. [47] | + | ||||
Luo, Yang et al. [106] | + | ||||
Baldominos et al. [20] | + | ||||
Mittal et al. [118] | + | ||||
Merlina et al. [116] | + | ||||
Blocki et al. [32] | + | ||||
Qu et al. [138] | + | ||||
Liu et al. [102] | + | ||||
Zhang et al. [202] | + | ||||
Yun et al. [199] | + | ||||
Qiu et al. [137] | + | ||||
Scicchitano et al. [150] | + | ||||
Agarwal et al. [3] | + | ||||
Tang et al. [173] | + | ||||
Bogner [35] | + | ||||
Firdaus et al. [73] | + | ||||
Dey [62] | + | ||||
Chen [44] | + | ||||
Liang et al. [98] | + | ||||
Chen et al. [46] | + | ||||
Salimitari et al. [147] | + | ||||
Chen et al. [43] | + | ||||
Lundbaek et al. [105] | + | ||||
Kumaresh et al. [92] | + | ||||
Wang et al. [190] | + | ||||
Nguyen et al. [128] | + | ||||
Mohammadi et al. [120] | + | ||||
Chouli et al. [48] | + |
Terms | Explanation |
---|---|
ATN | A function for evaluating a node in Proof of Artificial intelligence approach, which serves as the primary criterion for choosing nodes, based on a comprehensive assessment of the average number of transactions a node receives per time period.”. |
Blockchain trilemma | It is the fact that no blockchain has been able to optimize simultaneously scalability, decentralization, and security. |
Consensus | A set of operations that starts with declaring a transaction as official and ends with mutually validating the results. |
Consensus algorithm | In general, it is an algorithm for mutually verifying data on a distributed ledger. The most well-known ones are Proof of Work and Proof of Stake, as well as other methods. |
Data gatekeeper | His role is to protect applications and data by using specific tools to validate requests and data. |
Decentralized governance | It means that a blockchain transaction cannot be completed by a single central authority. |
Hard Forks | Is a significant modification to a network’s protocol that allows previously invalid blocks and transactions to become legitimate, or vice versa. |
Hash Functions | A key technology used in the Blockchain. It is a mathematical equation. |
Node | In a communication network, it is a relay point, branch point, or endpoint. |
Off-chain computation | Method making transaction calculations out of the mainnet. |
Rollup | Rollups execute transactions off the main blockchain and then upload the data to the main blockchain when consensus is attained. Rollups are classified into two types:Optimistic rollups: presume transactions are genuine by default and only performs computation in the case of a challenge, using a fraud proof. Zero-knowledge rollups: performs computation off-chain and gives a validity proof to the chain. |
Selfish mining | Is a dishonest cryptocurrency mining technique in which one miner or a group solves a hash, creates a new block, and keeps it off the public blockchain. This step generates a fork, which is then mined to gain an advantage over the public blockchain. |
Sharding | A processing segmentation, as in distributed databases. Transactions are grouped according to distinct shards and sent to a separate server based on the cluster. |
Token | Tokens are virtual currencies that are unique to blockchains. Tokens are virtual currencies that are used on blockchains to pay fees for asset management, and so on. |
Users are not scaled | The solution has a predetermined number of users, e.g., Payment Channel solutions. |
Artificial intelligence: | Is the capacity to understand or interpret information by the machine. Artificial intelligence uses many techniques and approaches, such as support vector machines, neural networks, swarm, and fuzzy logic...and so on. |
Machine Learning: | ML is a type of computer programing that uses probability statistics to enable machines to learn on their own without needing explicit programming [174]. |
Supervised ML | A basic but rigorous technique. The operator provides the computer with examples of the required inputs and outputs, and then the computer searches for solutions based on those inputs to obtain those outputs [103]. |
Unsupervised ML: | In this type of machine learning, the algorithm is left alone to determine the input structure [174]. This method can be the goal itself, or it can be means to a specific end. |
Reinforcement ML | A computer program must accomplish a specific task. The learning program receives feedback in the form of “rewards” or “punishments” to recognize the most effective behavior in a given context. |
Abbreviations | Original terms |
---|---|
AI | Artificial intelligence |
ANN | Artificial neural network |
ATN | Average Transaction Number |
BlockML | Block based on Machine Learning tasks |
CAPTCHA | Completely Automated Public Turing test to tell Computers and Humans Apart |
CNN | Convolutional Neural Network |
DAIBCN | Decentralized Artificial Intelligence enabled Blockchain Network |
ECSP | Edge Computing Service Provider |
IPFS | Interplanetary File System |
MEC | Mobile Edge Computing |
ML | Machine learning |
MPC | Multiparty computation |
Optimized PoW | Optimized Proof of Work |
P2P | Peer to peer |
PII | Proof of Involvement and integrity |
PoA | Proof of Activity |
PoAI | Proof of Artificial Intelligence |
PoB | Proof of Burn |
PoC | Proof of capacity |
PoDL | Proof of deep learning |
PoDLwHO | Proof of deep learning with hyperparameter optimization |
PoFL | Proof of Federated Learning |
PoH | Proof of Human work |
PoI | Proof of importance |
PoKW | Proof of Kernel Work |
PoL | Proof of Learning |
PoLe | Proof of Learning |
PoS | Proof of Stake |
PoSearch | Proof of Search |
PoSpace | Proof of Space |
PoUW | Proof of Useful Work |
PoW | Proof of Work |
PPoV | Parallel Proof of Vote |
SPoDL | separate proof of deep learning |
Tx | Transaction |
ZK rollup | Zero Knowledge rollup |
Hash algorithm | Description | Blockchain |
---|---|---|
SHA-256 [157] | SHA 256 is a member of the 2 Secure Hash Algorithm (SHA 2). It was a collaborative project between the NSA and NIST. The 256 in the name refers to the final hash digest value. The algorithm will always return 256 bits regardless of the input size. It is true that the sha256 mining process requires so much energy, but it has a high hash rate and is one of the finest algorithms for dealing with security problems. | Bitcoin, Bitcoin Cash, Bitcoin SV, Namecoin, RSK, Nxt, Stacks, Peercoin |
Ethash [144] | Ethash was Ethereum’s PoW mining algorithm, it uses a function called Keccak or SHA-3, as well as Dagger-Hashimoto hashes. Ethash is among the algorithm that uses memory intensively. | Ethereum, Ethereum Classic, WhaleCoin, Expanse, Musicoin |
Cryptonight [122] | CryptoNight is on the same degree of mystery as bitcoin, as we do not know who invented it. The algorithm provides absolute anonymity and was designed to be suitable for CPU and GPU mining as well as ASIC resistance. | Bytecoin, Dero, Monero, Electroneum |
Scrypt [184] | Scrypt is a highly efficient hash algorithm designed to handle massive volumes of data while still providing cryptographic integrity. It guarantees and facilitates restore when needed. This algorithm needs more RAM than other encryption algorithms, but it is faster and uses less energy than the SHA256 algorithm. | Dogecoin, Litecoin, ReddCoin, Carboncoin, Nyancoin, 42-coin |
X11 [26] | The X11 is not a hash algorithm in itself, but rather the union of 11 hash algorithms that are performed serially to get the final hash. The objective behind its construction is to assure perfect security. This algorithm is designed for GPU mining. | Dash, Polis, SmartCoin |
Blake2 [31] | BLAKE2 is a cryptographic hash algorithm that is quicker than MD5, SHA-1, SHA-2, and SHA-3 while remaining at least as safe as the most recent standard SHA-3. Its remarkable attributes include speed, simplicity, and robust security. It has two variants, Blake2s (32 bits) and Blake2b (64bits). | Siacoin, Verge, Decred, Nano |
Blockchain | Consensus algorithm | Through-put (TPS) | Block Time (Sec) | Confirmation time (Sec) | Node count | Blockchain size (GB) | Power Consumption (kWh/Transaction) |
---|---|---|---|---|---|---|---|
Bitcoin | PoW | 7 | 600 | 360 | 6708 | 445.66 | 1173 |
Ethereum | PoW (until mid- 2022) – PoS (now) | 15 | 15 | 360 | 6000 | 537 | 87.29 |
LiteCoin | PoW | 53 | 150 | 1800 | 1,039 | 86.72 | 18.522 |
Qtum | PoS | 70 | 120 | 1200 | 1,253 | N/A | N/A |
Waves | PoS | 100 | 60 | 2 | N/A | N/A | N/A |
EOS | DPoS | 4000 | 30 | 1.5 | N/A | N/A | N/A |
Cardano | DPoS | 257 | 20 | 600 | 3173 | 94.24 | 0.547 |
TRON | DPoS | 2000 | 3 | 300 | N/A | N/A | N/A |
Ripple | PBFT | 1500 | 3,6 | 4 | N/A | N/A | 0.0079 |
Stellar | PBFT | 1000 | 4,8 | 4 | N/A | N/A | N/A |
DASH | PoA | 56 | 150 | 360 | 4,246 | 27.94 | N/A |
NEO | dBFT | 1000 | 15 | 15 | N/A | N/A | N/A |
NEM | PoI | 10000 | 60 | 30 | N/A | N/A | N/A |
Blockchain Attacks categories | Attack name | Causes | Affected Blockchain versions | Involved Blockchain layers | Involved Blockchain Processes | Affected Blockchain actors |
---|---|---|---|---|---|---|
Double-Spending attacks | ||||||
51% Attack [65] | Consensus mechanism | 1.0, 2.0 | Network, Consensus, Data | Mining, Network discovery, Block Validation, Transaction Creations, | Network, Sellers, Exchange, Miner | |
Alternative History Attack [29] | Transaction Verification process | 1.0, 2.0 | Consensus | Mining, Transaction Creations, Block Validation | Sellers | |
Finney Attack [27] | Transaction Verification process | 1.0, 2.0 | Consensus | Mining, Transaction Creations, Block Validation | Sellers | |
Race Attack [30] | Transaction Verification process | 1.0, 2.0 | Consensus | Transaction Creations, Mining | Sellers | |
Vector76 Attack/ one-confirmation attack [28] | Transaction Verification process | 1.0, 2.0 | Consensus | Transaction Creations, Mining, Block Validation | Exchange | |
Mining/Pool attacks | ||||||
Selfish Mining [89] | Consensus mechanism | 1.0, 2.0 | Network, Consensus | Mining | Mining pool miners | |
Block-discard Attack [18] | Consensus mechanism | 1.0, 2.0 | Network, Consensus | Mining | Mining pool miners | |
Bribery Attack [69] | Consensus mechanism | 1.0, 2.0 | Network, Consensus | Mining, Transaction Creations, Block Validation | Mining pool miners | |
Block-Withholding Attack [193] | Consensus mechanism | 1.0, 2.0 | Network, Consensus | Mining | Mining pool miners | |
Fork-After-withhold Attack [93] | Consensus mechanism | 1.0, 2.0 | Network, Consensus | Mining | Mining pool miners | |
Pool Hopping Attack [50] | Consensus mechanism | 1.0, 2.0 | Network, Consensus | Mining | Mining pool miners | |
Clients’/Wallet attacks | ||||||
Vulnerable Digital signature [36] | Poor randomness | 1.0, 2.0 | Data | Signature generation | Users wallets | |
Users’ addresses vulnerability: Lack of control in address creation [11] | Public nature of the blockchain | 1.0, 2.0 | Data | Signature generation | Users wallets | |
Collison and Pre-Image Attack [192] | Flaws in ECDSA, SHA256 and RIPEMD 160 | 1.0, 2.0 | Data | Signature generation | Users wallets | |
Flawed key generation [191] | Flaws in implementing ECDSA | 1.0, 2.0 | Data | Signature generation | Users wallets | |
Bugs and Malware [186] | Client design flaws | 1.0, 2.0 | Data | Signature generation | Users wallets | |
Network attacks | ||||||
Sybil Attack [136] | Forge identities | 1.0, 2.0 | Network | Network discovery | Network, miners, users | |
Eclipse Attack [53] | Flaws in blockchain protocols - outgoing connections | 1.0, 2.0 | Network | Network discovery | Users, Miners | |
Refund Attack [112] | Bitcoin refund policy | 1.0, 2.0 | Application | Payment protocol authentication and refund | Exchanges, users, sellers | |
Balance Attack [126] | Consensus mechanism | 1.0, 2.0 | Network, Consensus | Network discovery | Users, miners | |
Punitive and Feather forking Attack [108] | Consensus mechanism | 1.0, 2.0 | Network, Consensus, Data | Mining | Users | |
DDoS Attack [54] | External resources, contracts underpriced operations | 1.0, 2.0 | Network, Consensus | Network discovery, Mining, Transaction Creations, Block Validation | Users, exchange, sellers, miners, pools, network | |
Transaction Malleability Attack [132] | Flaws in blockchain protocols -Transaction ID | 1.0, 2.0 | Network, Consensus, Data | Transaction Creations, Mining | Exchanges | |
Timejacking Attack [156] | Flaws in blockchain protocols - timestamp handling | 1.0, 2.0 | Network, Consensus, Data | Transaction Creations, Mining | Miners | |
Partition Routing Attack [180] | Flaws in Internet routing - routing manipulations | 1.0, 2.0 | Network, Consensus, Data | Network discovery | Users, Miners | |
Delay Routing Attack [10] | Flaws in Internet routing - routing manipulations | 1.0, 2.0 | Network, Consensus, Data | Network discovery | Users, Miners | |
Smart Contracts attacks | ||||||
Vulnerabilities in contracts source code | Program design flaws | 2.0 | Execution | Transaction Creations | Contracts owner, sellers | |
Vulnerabilities in EVM Bytecode | EVM design flaws | 2.0 | Execution | Transaction Creations, Mining | Contracts owner, sellers | |
Vulnerabilities in Blockchain | Program design flaws | 2.0 | Network, Consensus | Transaction Creations, Mining | Users, Sellers, contracts owner, | |
Eclipse Attack on Smart contract blockchain [110] | EVM design flaws | 2.0 | Network, Consensus | Network discovery | Miners, users | |
Low-level attacks [45] | underprice operations | 2.0 | Consensus, Data | Transaction Creations, Mining | Miners, network, users, sellers, exchange. |
Category of smart contract vulnerability | Vulnerability | Cause | Real-World Attacks |
---|---|---|---|
Vulnerabilities in contracts source code | Reentrancy [170] | Improper Workflow caused by a non-recursive function re-enter before termination. | The DAO Attack [114] |
Exception disorders [13] | Irregularity in exception handling. | King of The Ether Attack [83] | |
Selfdestruct [171] | Improper Access Control. | Parity Library bug [178] | |
Arithmetic issues [164] | Incorrect Calculation. | PoWHcoin attack [21] | |
Keeping secrets [163] | Contracts private fields, secrecy is not guaranteed. | Multi-player games | |
Type casts | No expectation is thrown if type mismatched. | – | |
Gasless Send [13] | Invoking the Callee’s out-of-gas exception. | – | |
Call to the unknown [13] | Call of a non-existent function. | The DAO Attack [114] | |
tx.origin [166] | Using the variable for authorization could make a contract vulnerable if an authorized account calls into a malicious contract. | – | |
Default visibility [2] | Public visibility for functions and variables whose visibility is not set. | Parity Wallet(First Hack) [140] | |
\(\langle\) Delegatecall \(\rangle\) to insecure contracts [167] | Include Untrusted Control Party Functionality. | Parity Wallet(Second Hack) [4] | |
External contract referencing [169] | Include Untrusted Control Party Functionality. | Honey Pot [160] | |
Vulnerabilities in EVM | Immutable bugs [131] | Defective contracts cannot be patched or recovered. | Rubixi [19, 79], GovernMental Attack [19] |
Stack size limit [82] | The number of values exceeds 1024 in the stack. | GovernMental Attack [19] | |
Ether lost in transfer [81] | Ether sent to orphan address is lost. | – | |
Vulnerabilities in Blockchain | Generating randomness [172] | Malicious miner biases the outcome of random number. | PRNG contract [143] |
Unpredictable state [168] | Concurrent Execution with Improper Synchronization. | Attack on Bancor [34] | |
Time constraints [165] | Altered Timestamp by a malicious miner. | GovernMental attack [19] |
Despite the fact that companies are gravitating more and more towards the use of blockchains in their systems, it is clear that the blockchains is no silver bullet. Many challenges such as scalability issues and frustrating trade-offs most notable in ...
Blockchain has been increasingly used as a component to enable decentralisation in software architecture for a variety of applications. Blockchain governance has received considerable attention to ensure the safe and appropriate use ...
It has been ten years since Satoshi Nakamoto created bitcoin and introduced the concept of a blockchain. The original goal was to propose a solution to the double-spending problem using a peer-to-peer network. Now, Blockchain proves to have the ...
Association for Computing Machinery
New York, NY, United States
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in