Proof of Delivery in a Trustless Network

Kyle Park, Kideok Cho, Dookyoon Han, Ted Ltaekyoungr Kwon, Sangheon Pack

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

We propose a novel proof of delivery (PoD) mechanism to incentivize peers to participate in peer-To-peer content delivery services in a secure and effective fashion. By analyzing transaction records on a blockchain, the PoD can detect a fraudulent peer which does not pay for its content retrieval. Moreover, the PoD can enhance the delivery performance of a trustworthy peer by substantiating the notion of a trust window, whose size is proportional to the trustworthiness of a peer. That is, a trustworthy peer will experience enhanced delivery performance while a fraudulent one will be isolated from the network, which is checked by simulation results.

Original languageEnglish
Title of host publicationICBC 2019 - IEEE International Conference on Blockchain and Cryptocurrency
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages196-200
Number of pages5
ISBN (Electronic)9781728113289
DOIs
Publication statusPublished - 2019 May
Event1st IEEE International Conference on Blockchain and Cryptocurrency, ICBC 2019 - Seoul, Korea, Republic of
Duration: 2019 May 142019 May 17

Publication series

NameICBC 2019 - IEEE International Conference on Blockchain and Cryptocurrency

Conference

Conference1st IEEE International Conference on Blockchain and Cryptocurrency, ICBC 2019
Country/TerritoryKorea, Republic of
CitySeoul
Period19/5/1419/5/17

Bibliographical note

Publisher Copyright:
© 2019 IEEE.

Keywords

  • P2P network
  • Proof of delivery
  • blockchain

ASJC Scopus subject areas

  • Business, Management and Accounting (miscellaneous)
  • Management of Technology and Innovation
  • Computer Networks and Communications
  • Information Systems and Management
  • Safety, Risk, Reliability and Quality

Fingerprint

Dive into the research topics of 'Proof of Delivery in a Trustless Network'. Together they form a unique fingerprint.

Cite this