Volume 19 , Issue 1 , PP: 128-143, 2025 | Cite this article as | XML | Html | PDF | Full Length Article
Rasha Hani Salman 1 * , Hala Bahjat Abdul Wahab 2
Doi: https://doi.org/10.54216/FPA.190112
Blockchain technology is now widely used in data sharing, cryptocurrency industry, Internet of Things and other fields. However, despite its increasing use, security and privacy concerns remain important issues. Blockchain security is enhanced by the use of hashing algorithms that ensure data integrity and provide a solution to security problems, but hashing algorithms usually have limitations in terms of resource consumption, memory and speed. To overcome these obstacles, the efficiency and security of the hashing algorithm used in blockchain must be increased. This paper presents a proposal to improve the hashing process in blockchain by leveraging the lightweight quantum algorithm Ascon, which has been improved after integrating it with nonlinear Lotka-Volterra equations. This integration can improve performance and security by combining the mathematical principles of these nonlinear equations to study the interactions between systems. Through this integration, it is possible to improve power management and work on intelligent resource allocation, as well as make the system more robust against attacks by complicating the random number generation process. The performance of the proposed system was tested in terms of throughput, elapsed time, amount of memory used, and time required to process data. The results showed that the proposed algorithm outperforms the original Ascon algorithm in terms of providing faster processing while maintaining a high level of performance and security, reducing time, and increasing the amount of data processed with less memory required for storage. These improvements are of great importance in developing blockchain technology and enabling its multiple uses in many applications.
Lightweight blockchain , Cryptographic hashing , Post-quantum algorithm , Ascon algorithm , Lotka&ndash , Volterraequation , Performance optimization
[1] Y. Zou, T. Meng, P. Zhang, W. Zhang, and A. Li, "Focus on blockchain: A comprehensive survey on academic and application," IEEE Access, vol. 8, pp. 187182–187201, 2020.
[2] M. Sharples and J. Domingue, "The blockchain and kudos: A distributed system for educational record, reputation and reward," in European Conference on Technology Enhanced Learning, 2016, pp. 490-496: Springer.
[3] D. A. Dawar, "Enhancing Wireless Security and Privacy: A 2-Way Identity Authentication Method for 5G Networks," Int. J. Math., Stat. Comput. Sci., vol. 2, pp. 183–198, 2024. [Online]. Available: https://doi.org/10.59543/ijmscs.v2i.9073.
[4] V. Morabito, "Business innovation through blockchain," Cham: Springer International Publishing, 2017.
[5] Z. H. Noori and S. K. Ebis, "An information security engineering framework for modeling packet filtering firewall using neutrosophic petri nets," Computers, vol. 12, no. 10, 2023.
[6] J. Al-Jaroodi and N. Mohamed, "Blockchain in industries: A survey," IEEE Access, vol. 7, pp. 36500–36515, 2019.
[7] B. Marr, "A very brief history of blockchain technology everyone should read," Forbes, New York, NY, USA, 2018.
[8] M. A. Uddin, A. Stranieri, I. Gondal, and V. Balasubramanian, "A survey on the adoption of blockchain in IoT: Challenges and solutions," Blockchain: Res. Appl., p. 100006, 2021.
[9] P. W. Shor, "Algorithms for quantum computation: Discrete logarithms and factoring," in Proc. Ann. IEEE Symp. Found. Comput. Sci. (FOCS), 1994, pp. 124–134. doi: 10.1109/SFCS.1994.365700.
[10] L. K. Grover, "A fast quantum mechanical algorithm for database search," in Proc. Ann. ACM Symp. Theory Comput., vol. Part F1294, pp. 212–219, 1996. doi: 10.1145/237814.237866.
[11] J. Fu, S. Qiao, Y. Huang, X. Si, B. Li, and C. Yuan, "A Study on the Optimization of Blockchain Hashing Algorithm Based on PRCA," Security Commun. Netw., vol. 2020, pp. 1–12, 2020. doi: 10.1155/2020/8876317.
[12] Z. A. Kamal and R. Fareed, "A proposed hash algorithm to use for blockchain base transaction flow system," Periodicals Eng. Nat. Sci. (PEN), vol. 9, no. 4, pp. 657–673, 2021.
[13] A. A. M. A. Ali, M. J. Hazar, M. Mabrouk, and M. Zrigui, "Proposal of a Modified Hash Algorithm to Increase Blockchain Security," Procedia Comput. Sci., vol. 225, pp. 3265–3275, 2023.
[14] Z. A. Othman, S. Tiun, and Y. A. Lotfy, "Towards a secure signature scheme based on multimodal biometric technology: application for IoT Blockchain network," Symmetry, vol. 12, no. 10, p. 1699, 2020.
[15] F. Hanif, U. Waheed, R. Shams, and A. Shareef, "GAHBT: genetic-based hashing algorithm for managing and validating health data integrity in blockchain technology," Blockchain Healthc. Today, vol. 6, 2023.
[16] G. Subathra, N. Jeyakkannan, A. Lavanya, R. Karthika, D. Nancykirupanithi, "A Double Security Hashing Algorithm for Storing Data in Blockchain Technology," IEEE Access, vol. 1528–1535, 2023. doi: 10.1109/iceca58529.2023.10395158.
[17] R. K. Salih and A. H. Kashmar, "Enhancing Blockchain Security by Developing the SHA256 Algorithm," Iraqi J. Sci., 2024.
[18] Y. Davda, "Design of Hash Algorithm for Blockchain Security," in Blockchain Applications in Cryptocurrency for Technological Evolution, pp. 118–135, IGI Global, 2023.
[19] R. F. Ghani, A. A. Salman, A. B. Khudhair, and L. Aljobouri, "Blockchain-based student certificate management and system sharing using Hyperledger Fabric platform," Periodicals Eng. Nat. Sci., vol. 10, no. 2, pp. 207–218, 2022.
[20] I. M. Hasan and R. F. Ghani, "Blockchain for authorized access of health insurance IoT system," IRAQI J. Comput. Commun. Control Syst. Eng., vol. 21, no. 3, pp. 76–88, 2021.
[21] M. A. Mohammed and H. B. Abdul Wahab, "Enhancing IoT Data Security with Lightweight Blockchain and Okamoto Uchiyama Homomorphic Encryption," CMES-Comput. Model. Eng. Sci., vol. 138, no. 2, 2024.
[22] A. Narayanan, J. Bonneau, E. Felten, A. Miller, and S. Goldfeder, Bitcoin and Cryptocurrency Technologies, Princeton, NJ, USA: Princeton Univ. Press, 2016.
[23] J. Sedlmeir, H. U. Buhl, G. Fridgen, and R. Keller, "The energy consumption of blockchain technology: Beyond myth," Bus. Inf. Syst. Eng., vol. 62, no. 6, pp. 599–608, 2020.
[24] N. Rathod and D. Motwani, "Security threats on blockchain and its countermeasures," Int. Res. J. Eng. Technol., vol. 5, no. 11, pp. 1636–1642, 2018.
[25] K. C. Chaudhary, V. Chand, and A. Fehnker, "Double-spending analysis of bitcoin," in Pacific Asia Conf. Inf. Syst., 2020, June.
[26] A. Dabholkar and V. Saraswat, "Ripping the Fabric: Attacks and Mitigations on Hyperledger Fabric," in Applications and Techniques in Information Security, V. S. Shankar Sriram et al., Eds., Singapore: Springer Singapore, 2019, pp. 300–311.
[27] B. Putz and G. Pernul, "Trust Factors and Insider Threats in Permissioned Distributed Ledgers," Trans. Large-Scale Data Knowledge-Centered Syst., vol. XLII, pp. 25–50, 2019.
[28] Y. Cai, Y. Tang, H. Li, L. Yu, H. Zhou, X. Luo, and P. Su, "Resource race attacks on android," in 2020 IEEE 27th Int. Conf. Softw. Anal., Evol. Reeng. (SANER), pp. 47–58, 2020.
[29] J. Joshi and R. Mathew, "A survey on attacks of bitcoin," in Proceeding Int. Conf. Comput. Networks, Big Data IoT (ICCBI-2018), pp. 953–959, 2020.
[30] C. Dobraunig, M. Eichlseder, F. Mendel, and M. Schläffer, "Ascon MAC, PRF, and Short-Input PRF: Lightweight, Fast, and Efficient Pseudorandom Functions," Cryptographers Track at RSA Conf., Cham: Springer Nature Switzerland, 2024.
[31] C. Dobraunig, M. Eichlseder, F. Mendel, and M. Schläffer, "Ascon v1.2: Lightweight authenticated encryption and hashing," J. Cryptol., vol. 34, pp. 1–42, 2021.
[32] U. V. Johnson, O. S. Adesina, O. O. Agboola, and A. F. Adedotun, "A Lotka-Volterra nonlinear differential equation model for evaluating tick parasitism in canine populations," Math. Model. Eng. Problems, vol. 10, no. 4, 2023.
[33] S. H. Strogatz, Nonlinear Dynamics and Chaos: With Applications to Physics, Biology, Chemistry, and Engineering, 2nd ed., Cambridge, MA, USA: Perseus Books, 2018.
[34] D. Hawashin, M. Nemer, S. A. Gebreab, K. Salah, R. Jayaraman, M. K. Khan, and E. Damiani, "Blockchain applications in UAV industry: Review, opportunities, and challenges," J. Netw. Comput. Appl., vol. 230, p. 103932, 2024.
[35] J. K. Madhloom and H. N. Abd Ali, "A quantum-inspired ant colony optimization approach for exploring routing gateways in mobile ad hoc networks," Electronics, vol. 12, no. 5, p. 1171, 2023.
[36] Z. A. Othman, S. Tiun, and Y. A. Lotfy, "Towards a secure signature scheme based on multimodal biometric technology: application for IoT Blockchain network," Symmetry, vol. 12, no. 10, p. 1699, 2020.
[37] S. Nakaoka, Y. Saito, and Y. Takeuchi, "Stability, delay, and chaotic behavior in a Lotka-Volterra predator-prey system," Math. Biosci. Eng., vol. 3, no. 1, pp. 173–187, 2005.
[38] L. Sidhom and T. Galla, "Ecological communities from random generalized Lotka-Volterra dynamics with nonlinear feedback," Phys. Rev. E, vol. 101, no. 3, p. 032101, 2020.
[39] A. A. Elsadany, A. E. Matouk, A. G. Abdelwahab, and H. S. Abdallah, "Dynamical analysis, linear feedback control and synchronization of a generalized Lotka-Volterra system," Int. J. Dyn. Control, vol. 6, pp. 328–338, 2018.
[40] H. Ibrahim, "A review on the mechanism mitigating and eliminating internet crimes using modern technologies," Wasit J. Comput. Math. Sci., vol. 1, no. 3, pp. 50–68, 2022.