{"id":1152,"date":"2021-11-05T11:54:34","date_gmt":"2021-11-05T16:54:34","guid":{"rendered":"https:\/\/sites.imsa.edu\/hadron\/?p=1152"},"modified":"2021-11-05T11:57:10","modified_gmt":"2021-11-05T16:57:10","slug":"not-just-bitcoin-blockchain-for-communication","status":"publish","type":"post","link":"https:\/\/sites.imsa.edu\/hadron\/2021\/11\/05\/not-just-bitcoin-blockchain-for-communication\/","title":{"rendered":"Not just Bitcoin: Blockchain for Communication"},"content":{"rendered":"<p style=\"text-align: center\"><span style=\"font-weight: 400\">Written by: Gloria Wang<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400\">With the boom of cryptocurrency in the last couple years, decentralization\u2060\u2014 distributing control away from a single source\u2014 has become an increasingly popular methodology. Blockchain, a technology widely known for its applications in Bitcoin and other cryptocurrencies, is the core of the decentralization process. As its name suggests, blockchain is fundamentally composed of \u201cblocks\u201d\u2014 data structures composed of a transaction history, a hash, and the previous hash. A hash is like a digital fingerprint; a completely unique representation of a transaction typically of alphanumeric composition. Because each block is linked to the one before by the previous hash, changing one hash means changing them all, which is nearly impossible.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><b>Application in Robotics Communication<\/b><\/p>\n<p><span style=\"font-weight: 400\">The decentralization aspect of blockchain technology comes from the distribution of the recorded transactions. Every user has an identical copy of the blockchain, so there are multiple sources that can collectively verify the accuracy of any given account. Due to this ability to authenticate each transaction, blockchain\u2019s application in security is appealing\u2060\u2014 especially for communication.<\/span><\/p>\n<p><span style=\"font-weight: 400\">In a paper published in <\/span><i><span style=\"font-weight: 400\">IEEE Transactions on Robotics<\/span><\/i><span style=\"font-weight: 400\"> just last month, researchers at MIT and Polytechnic University of Madrid explain that blockchain technology could make communication between robots more secure by comparing each copy of directions and ignoring the one that doesn\u2019t match the rest.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center\"><span style=\"font-weight: 400\">Figure 1<\/span><\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1153 size-full\" src=\"http:\/\/sites.imsa.edu\/hadron\/files\/2021\/11\/Screenshot-2021-11-05-114743.jpg\" alt=\"\" width=\"1615\" height=\"637\" srcset=\"https:\/\/sites.imsa.edu\/hadron\/files\/2021\/11\/Screenshot-2021-11-05-114743.jpg 1615w, https:\/\/sites.imsa.edu\/hadron\/files\/2021\/11\/Screenshot-2021-11-05-114743-300x118.jpg 300w, https:\/\/sites.imsa.edu\/hadron\/files\/2021\/11\/Screenshot-2021-11-05-114743-1024x404.jpg 1024w, https:\/\/sites.imsa.edu\/hadron\/files\/2021\/11\/Screenshot-2021-11-05-114743-768x303.jpg 768w, https:\/\/sites.imsa.edu\/hadron\/files\/2021\/11\/Screenshot-2021-11-05-114743-1536x606.jpg 1536w, https:\/\/sites.imsa.edu\/hadron\/files\/2021\/11\/Screenshot-2021-11-05-114743-139x55.jpg 139w, https:\/\/sites.imsa.edu\/hadron\/files\/2021\/11\/Screenshot-2021-11-05-114743-400x158.jpg 400w\" sizes=\"auto, (max-width: 1615px) 100vw, 1615px\" \/><\/p>\n<p style=\"text-align: center\"><span style=\"font-weight: 400\">Visualization of the robots\u2019 communication blockchain given three transactions each containing three fields: the sender robot, local sequence index, and the instruction message.<\/span><\/p>\n<p style=\"text-align: center\"><span style=\"font-weight: 400\">Source: <\/span><i><span style=\"font-weight: 400\">Ferrer et. al., 2021<\/span><\/i><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400\">In addition, the researchers\u2019 system is designed so that \u201clying costs money.\u201d Each leader robot receives a certain number of tokens, which will be confiscated for every misinformation spread. \u201cWhen the malicious robots run out of tokens, they can no longer spread [false information]. So, you can limit or constrain the lies that the system can expose the robots to\u201d (Ferrer 2021). With this system, the study found that while a follower robot was initially misled, it was able to complete its assigned task.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Applicable in self-driving car systems used to transport passengers or deliver goods, blockchain for secure communication in robotics could become more relevant in the immediate future than many expect.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><b>Applications in Social Media<\/b><\/p>\n<p><span style=\"font-weight: 400\">Similarly, in social media, privacy is a growing concern. Platforms such as Facebook, Twitter, and Tiktok collect data on millions of users. Data collection tactics have included reading users\u2019 clipboards and aggregating personal information, leading to concerns over privacy and data security. As the popular saying goes, \u201cIn big data, the consumer is the product.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400\">UTU.ONE is one of the first platforms attempting to decentralize social media. Built on the EOSIO blockchain, it supports both efficient and environmentally friendly development. While the Bitcoin network uses the Proof-of-Work (PoW) consensus mechanism which has \u201ca vast army of nodes on the network competing to solve a mathematical puzzle and \u2018mine\u2019 tokens,\u201d EOSIO implements the Delegated Proof-of-Stake (DPoS) mechanism that delegates work to 21 nodes\u2060\u2014 saving processing power and electricity.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Eliminating bots and fake accounts through Certified Biometric Liveness Detection and 3D face authentication, UTU is pushing for a safe and secure environment. With the open-source EOSIO blockchain, cyberbullying and fraud are traceable and contained.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><b>Conclusion<\/b><\/p>\n<p><span style=\"font-weight: 400\">While security and privacy concerns are still extremely prevalent in this tech-driven world, researchers and innovators are working to make technology safer and more secure. Through applications of blockchain technology in a variety of fields like robotics and social media, perhaps communication will become more trustworthy.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center\"><span style=\"font-weight: 400\">References and Sources<\/span><\/p>\n<p style=\"text-align: left\">E. C. Ferrer, E. Jim\u00e9nez, J. L. Lopez-Presa and J. Mart\u00edn-Rueda, \u201cFollowing Leaders in Byzantine Multirobot Systems by Using Blockchain Technology,\u201d in IEEE Transactions on Robotics, doi: 10.1109\/TRO.2021.3104243.<\/p>\n<p style=\"text-align: left\"><span style=\"font-weight: 400\">T Tomu, \u201cCan Blockchain Solve the Social Media Privacy Puzzle?,\u201d <\/span><i><span style=\"font-weight: 400\">Data Driven Investor, Medium<\/span><\/i><span style=\"font-weight: 400\">, https:\/\/medium.datadriveninvestor.com\/can-blockchain-solve-the-social-media-privacy-puzzle-28ba32c6522f\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Written by: Gloria Wang &nbsp; With the boom of cryptocurrency in the last couple years, decentralization\u2060\u2014 distributing control away from a single source\u2014 has become an increasingly popular methodology. Blockchain, a technology widely known for its applications in Bitcoin and other cryptocurrencies, is the core<\/p>\n","protected":false},"author":588,"featured_media":1153,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"footnotes":""},"categories":[13],"tags":[],"class_list":["post-1152","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/sites.imsa.edu\/hadron\/wp-json\/wp\/v2\/posts\/1152","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sites.imsa.edu\/hadron\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.imsa.edu\/hadron\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.imsa.edu\/hadron\/wp-json\/wp\/v2\/users\/588"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.imsa.edu\/hadron\/wp-json\/wp\/v2\/comments?post=1152"}],"version-history":[{"count":3,"href":"https:\/\/sites.imsa.edu\/hadron\/wp-json\/wp\/v2\/posts\/1152\/revisions"}],"predecessor-version":[{"id":1156,"href":"https:\/\/sites.imsa.edu\/hadron\/wp-json\/wp\/v2\/posts\/1152\/revisions\/1156"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sites.imsa.edu\/hadron\/wp-json\/wp\/v2\/media\/1153"}],"wp:attachment":[{"href":"https:\/\/sites.imsa.edu\/hadron\/wp-json\/wp\/v2\/media?parent=1152"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.imsa.edu\/hadron\/wp-json\/wp\/v2\/categories?post=1152"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.imsa.edu\/hadron\/wp-json\/wp\/v2\/tags?post=1152"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}