-
Comparative Analysis of Hash Functions in Blockchain for Implementation of Blockchain on a Resource-Constrained System
- Vibha Mani and Shruti Jaiswal
-
2025, 21(2):
84-93.
doi:10.23940/ijpe.25.02.p3.8493
-
Abstract
PDF (324KB)
-
References |
Related Articles
In recent years, researchers have shifted their focus from effective security to technologies that enhance service quality. For a resource-constrained system such as the Internet of Things (IoT), there must be a trade-off between service quality and security. Access control is the most important responsibility for any system, and in this area of the system, we may increase security by using blockchain. Resource-constrained systems, due to their limited memory and small settings, cannot utilize blockchain technology. The problem with blockchain is that resource-constrained systems cannot handle its intricate and time-consuming calculations. If we can balance the complexity and viability of blockchain, we can easily implement it for security solutions. We can make blockchain lighter by modifying the Proof of Work (PoW), the overall framework, or the hash function. To make blockchain more lightweight, one can use several quicker hash coding methods. In this study, we examine various hashing techniques and employ blockchain technology to evaluate the results. This article provides a numerical analysis to evaluate the efficacy of various hashing strategies on blockchain, enabling their application in resource-constrained systems such as the Internet of Things, electronic health record systems, and voting systems, among others. In our work, we provide a novel mathematical analysis of the hash function in a blockchain system. We analyzed the suitability of a hash function for resource-constrained devices using Python. Experimental results show that time consumption is as low as 26-29% at various difficulty levels, demonstrating the feasibility of the BLAKE2s() hash function as compared to the traditional SHA256() hash function on blockchain. This work aims to establish a solid foundation for researchers and designers of resource-constrained systems seeking to integrate blockchain for enhanced security in next-generation devices.