Professional Documents
Culture Documents
Blockchain and Applications 3Rd International Congress 1St Edition Javier Prieto Editor Online Ebook Texxtbook Full Chapter PDF
Blockchain and Applications 3Rd International Congress 1St Edition Javier Prieto Editor Online Ebook Texxtbook Full Chapter PDF
https://ebookmeta.com/product/introducing-blockchain-
applications-understand-and-develop-blockchain-applications-
through-distributed-systems-george/
https://ebookmeta.com/product/blockchain-technology-and-
applications-1st-edition-ahmed-banafa/
https://ebookmeta.com/product/wireless-blockchain-principles-
technologies-and-applications-1st-edition-bin-cao-editor/
Blockchain and IoT Integration Approaches and
Applications 1st Edition Kavita Saini (Editor)
https://ebookmeta.com/product/blockchain-and-iot-integration-
approaches-and-applications-1st-edition-kavita-saini-editor/
https://ebookmeta.com/product/classical-mechanics-with-matlab-
applications-2nd-edition-javier-e-hasbun-phd/
https://ebookmeta.com/product/blockchain-for-dummies-3rd-edition-
tiana-laurence/
https://ebookmeta.com/product/classical-hopf-algebras-and-their-
applications-algebra-and-applications-29-pierre-cartier-frederic-
patras/
https://ebookmeta.com/product/blockchain-technology-for-iot-
applications-seok-won-lee/
Lecture Notes in Networks and Systems 320
Javier Prieto
Alberto Partida
Paulo Leitão
António Pinto Editors
Blockchain and
Applications
3rd International Congress
Lecture Notes in Networks and Systems
Volume 320
Series Editor
Janusz Kacprzyk, Systems Research Institute, Polish Academy of Sciences,
Warsaw, Poland
Advisory Editors
Fernando Gomide, Department of Computer Engineering and Automation—DCA,
School of Electrical and Computer Engineering—FEEC, University of Campinas—
UNICAMP, São Paulo, Brazil
Okyay Kaynak, Department of Electrical and Electronic Engineering,
Bogazici University, Istanbul, Turkey
Derong Liu, Department of Electrical and Computer Engineering, University
of Illinois at Chicago, Chicago, USA; Institute of Automation, Chinese Academy
of Sciences, Beijing, China
Witold Pedrycz, Department of Electrical and Computer Engineering,
University of Alberta, Alberta, Canada; Systems Research Institute,
Polish Academy of Sciences, Warsaw, Poland
Marios M. Polycarpou, Department of Electrical and Computer Engineering,
KIOS Research Center for Intelligent Systems and Networks, University of Cyprus,
Nicosia, Cyprus
Imre J. Rudas, Óbuda University, Budapest, Hungary
Jun Wang, Department of Computer Science, City University of Hong Kong,
Kowloon, Hong Kong
The series “Lecture Notes in Networks and Systems” publishes the latest
developments in Networks and Systems—quickly, informally and with high quality.
Original research reported in proceedings and post-proceedings represents the core
of LNNS.
Volumes published in LNNS embrace all aspects and subfields of, as well as new
challenges in, Networks and Systems.
The series contains proceedings and edited volumes in systems and networks,
spanning the areas of Cyber-Physical Systems, Autonomous Systems, Sensor
Networks, Control Systems, Energy Systems, Automotive Systems, Biological
Systems, Vehicular Networking and Connected Vehicles, Aerospace Systems,
Automation, Manufacturing, Smart Grids, Nonlinear Systems, Power Systems,
Robotics, Social Systems, Economic Systems and other. Of particular value to both
the contributors and the readership are the short publication timeframe and the
world-wide distribution and exposure which enable both a wide and rapid
dissemination of research output.
The series covers the theory, applications, and perspectives on the state of the art
and future developments relevant to systems and networks, decision making, control,
complex processes and related areas, as embedded in the fields of interdisciplinary
and applied sciences, engineering, computer science, physics, economics, social, and
life sciences, as well as the paradigms and methodologies behind them.
Indexed by SCOPUS, INSPEC, WTI Frankfurt eG, zbMATH, SCImago.
All books published in the series are submitted for consideration in Web of Science.
Editors
123
Editors
Javier Prieto Alberto Partida
Building Edificio I+D+i, Room 24.1 Universidad Rey Juan Carlos
University of Salamanca Móstoles, Madrid, Spain
Salamanca, Salamanca, Spain
António Pinto
Paulo Leitão ESTG, Instituto Politécnico do Porto
Research Centre in Digitalization Felgueiras, Portugal
Instituto Politécnico de Bragança
Bragança, Portugal
This Springer imprint is published by the registered company Springer Nature Switzerland AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Preface
The 3rd International Congress on Blockchain and Applications 2021 will be held
in Salamanca from 6 to 8 of October. This annual congress will reunite blockchain
and artificial intelligence (AI) researchers, who will share ideas, projects, lectures,
and advances associated with those technologies and their application domains.
Among the scientific community, blockchain and AI are seen as a promising
combination that will transform the production and manufacturing industry, media,
finance, insurance, e-government, etc. Nevertheless, there is no consensus with
schemes or best practices that would specify how blockchain and AI should be used
together. Combining blockchain mechanisms and artificial intelligence is still a
particularly challenging task.
The BLOCKCHAIN’21 congress is devoted to promoting the investigation of
cutting-edge blockchain technology, to exploring the latest ideas, innovations,
guidelines, theories, models, technologies, applications and tools of blockchain and
AI for the industry, and to identifying critical issues and challenges those
researchers and practitioner must deal with in the future research. We want to offer
researchers and practitioners the opportunity to work on promising lines of research
and to publish their developments in this area.
The technical program has been diverse and of high quality, and it focused on
contributions to both, well-established and evolving areas of research. More than 44
papers have been submitted to 38 from over 20 different countries (Canada, France,
Germany, India, Ireland, Italy, Jordan, Luxembourg, Malaysia, Malta, Morocco,
Netherlands, Oman, Portugal, Slovenia, Spain, Sweden, United Arab Emirates, and
USA).
We would like to thank all the contributing authors, the members of the Program
Committee, the sponsors (IBM, Indra, EurAI, AEPIA, AFIA, APPIA, and AIR
Institute), and the Organizing Committee for their hard and highly valuable work.
We are especially grateful for the funding supporting by project “XAI - XAI -
Sistemas Inteligentes Auto Explicativos creados con Módulos de Mezcla de
Expertos,” ID SA082P20, financed by Junta Castilla y León, Consejería de
Educación, and FEDER funds. Their work contributed to the success of the
BLOCKCHAIN’21 event and, finally, the Local Organization Members and the
v
vi Preface
Program Committee Members for their hard work, which was essential for the
success of BLOCKCHAIN’21.
Javier Prieto
Alberto Partida
Paulo Leitão
António Pinto
Organization
General chair
Advisory Board
Ashok Kumar Das IIIT Hyderabad, India
Abdelhakim Hafid Université de Montréal, Canada
António Pinto Instituto Politécnico do Porto, Portugal
Organizing Committee
Juan M. Corchado Rodríguez University of Salamanca, Spain, and AIR
Institute, Spain
Javier Prieto Tejedor University of Salamanca, Spain, and AIR
Institute, Spain
Roberto Casado Vara University of Salamanca, Spain
Fernando De la Prieta University of Salamanca, Spain
Sara Rodríguez González University of Salamanca, Spain
Pablo Chamoso Santos University of Salamanca, Spain
Belén Pérez Lancho University of Salamanca, Spain
Ana Belén Gil González University of Salamanca, Spain
Ana De Luis Reboredo University of Salamanca, Spain
Angélica González Arrieta University of Salamanca, Spain
vii
viii Organization
Program Committee
Regio A. Michelin University of New South Wales, Australia
Mo Adda University of Portsmouth, UK
Rishav Agarwal University of Waterloo, Canada
Imtiaz Ahmad Akhtar Higher Colleges of Technology, Sweden
Sami Albouq Islamic University of Madinah, Saudi Arabia
Ricardo Alonso AIR Institute, Spain
Alejandro Alfonso Fernández DigitelTS, Spain
Diego Andina Universidad Politécnica de Madrid, Spain
Artem Barger IBM, Israel
Francisco Luis Benítez University of Granada, Spain
Martínez
Javier Bermejo Higuera Universidad Internacional de La Rioja, Spain
Bill Buchanan Napier University, UK
Roben C. Lunardi IFRS, Brazil
Roberto Casado Vara University of Salamanca, Spain
Arnaud Castelltort Montpellier, France
Giovanni Ciatto University of Bologna, Italy
Victor Cook University of Central Florida, EE.UU.
Manuel E. Correia CRACS/INESC TEC; DCC/FCUP, Portugal
Gaby Dagher Boise State University, Idaho, USA
Ashok Kumar Das International Institute of Information Technology,
India
Pankaj Dayama IBM, India
Organization ix
BLOCKCHAIN’21 Sponsors
Contents
BLOCKCHAIN-Main Track
Formal Analysis of Smart Contracts: Model Impact Factor
on Criminality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Malaw Ndiaye and Karim Konaté
A Blockchain-Enabled Fog Computing Model for Peer-To-Peer
Energy Trading in Smart Grid . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Saurabh Shukla, Subhasis Thakur, Shahid Hussain, and John G. Breslin
Energy Trading Between Prosumers Based
on Blockchain Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Susana M. Gutiérrez, José L. Hernández, Alberto Navarro,
and Rocío Viruega
Protection Against Online Fraud Using Blockchain . . . . . . . . . . . . . . . . 34
Raphael Burkert, Jonas van Hagen, Maximilian Wehrmann,
and Marc Jansen
Decentralized Online Multiplayer Game Based on Blockchains . . . . . . . 44
Raphael Burkert, Philipp Horwat, Rico Lütsch, Natalie Roth,
Dennis Stamm, Fabian Stamm, Jan Vogt, and Marc Jansen
Parameter Identification for Malicious Transaction Detection
in Blockchain Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
Vikram Kanth, John McEachen, and Murali Tummala
Blockchain Validity Register for Healthcare Environments . . . . . . . . . . 64
Cinthia Paola Pascual Cáceres, José Vicente Berná Martinez,
Francisco Maciá Pérez, and Iren Lorenzo Fonseca
Implementation and Evaluation of a Visual Programming Language
in the Context of Blockchain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
Farouk Hdhili, Ramy Gouiaa, and Marc Jansen
xiii
xiv Contents
Doctoral Consortium
A Fully Anonymous e-Voting Protocol Employing Universal
Zk-SNARKs and Smart Contracts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 349
Aritra Banerjee
A Secure Email Solution Based on Blockchain . . . . . . . . . . . . . . . . . . . . 355
Diego Piedrahita, Javier Bermejo, and Francisco Machío
Artificial Intelligence Decision and Validation Powered Smart
Contract for Open Learning Content Creation . . . . . . . . . . . . . . . . . . . 359
Frederick Ako-Nai, Enrique de la Cal Marin, and Qing Tan
Towards a Holistic DLT Architecture for IIoT . . . . . . . . . . . . . . . . . . . 363
Denis Stefanescu
1 Introduction
Ethereum, taken as a whole, can be viewed as a transaction-based state machine.
The state can include such information as account balances, reputations, trust
arrangements, data pertaining to information of the physical world; in short,
anything that can currently be represented by a computer is admissible. Trans-
actions thus represent a valid arc between two states; the ‘valid’ part is important
there exist far more invalid state changes than valid state changes. Invalid state
changes might, e.g., be things such as reducing an account balance without an
equal and opposite increase elsewhere. A valid state transition is one that is
produced by a transaction [36].
Smart contract is the program deployed in a distributed network that can
acquire outside information via transations and update the internal state auto-
matically. Majority of smart contract procedures are based on blockchain tech-
nology. Existing smart contracts control digital currencies principal. Whereas
they were found having defects and deficiencies in the course of their operations,
leading to more serious consequences, such as “The DAO” and Ethereum Parity
wallet incident, which caused a large number of cryptocurrencies to be stolen,
causing a large loss. If these program bug cannot be processed, smart contracts
will be difficult to manipulate real assets [10].
c The Author(s), under exclusive license to Springer Nature Switzerland AG 2022
J. Prieto et al. (Eds.): BLOCKCHAIN 2021, LNNS 320, pp. 3–13, 2022.
https://doi.org/10.1007/978-3-030-86162-9_1
4 M. Ndiaye and K. Konaté
1.1 Contributions
1.2 Organize
Smart contracts generally have two attributes: value and state (Fig. 1). The trig-
gering conditions and the corresponding response actions of the contract terms
are preset using triggering condition statements such as “If-Then” statements.
Smart contracts are agreed upon and signed by all parties and submitted in
transactions to the blockchain network, then transactions are broadcasted via
the P2P network, verified by the miners and stored in the specific block of the
blockchain [22,34].
The creators of the contracts get the returned parameters (e.g., contract
address), then users can invoke a contract by sending a transaction. Miners
are motivated by the system’s incentive mechanism and will contribute their
computing resources to verify the transaction. More specially, after the miners
receive the contract creation or invoking transaction, they create contract or
execute contract code in their local Execution Environment. Based on the input
of trusted data feeds and the system state, the contract determines whether
the current scenario meets the triggering conditions. If the conditions are met,
the response actions are strictly executed. After a transaction is validated, it is
packaged into a new block. The new block is chained into the blockchain once
the whole network reaches a consensus [10,34].
Formal Analysis of Smart Contracts: Model Impact Factor on Criminality 5
Among them:
• Q = {q1∗, q2∗, ..., qm
∗ }. Q is the set about all states of contract execution
...
, m);
• is the set of all input events;
• δ∗ is the set of all the transition functions,
δ∗ : Q × → Q
• s∗ is the initial state, s∗ ∈ Q
• F ∗ is the set of termination states, F ∗ ⊂ Q.
b) State Invariant
A state invariant is a superset of Q. Given the transition invariant T and the
set of starting states I ∈ Q, the set
I ∪ {q |q ∈ I and (q , q) ∈ T } (7)
In software systems, programming errors are usually the root cause leading to
security breaches such as denial of service, buffer overflow, format string, code
injection, etc. Coding errors may result either from defectively designed language
features such as no built-in protection for accessing memory, or from invalid logic
having high-level semantic error [12].
Smart contracts may contain vulnerabilities, which cause contracts to run on
an unplanned scenario. However, these vulnerabilities are still harmless until an
adversary takes advantage by exploiting them. Generally, he must send trans-
actions, which are termed as attack vectors in security field, to exploit these
vulnerabilities [23].
In formal verification (model verification, symbolic execution, theorem proof,
translation and type verification) [1,2,4,5,14,18,21,22,28,31] as in the detection
of vulnerabilities [6–9,11,13,15,20,24,25,27,32,33,37], all smart contracts which
do not respect the properties of theorems 1 and 2, are carriers attack vectors.
Table 1 represent the properties which are likely to be violated.
4 Proposition
It is important to understand that formal verification does not solve the problem
of malicious smart contracts crime. To solve the problem of contracts while
respecting the properties mentioned above, we propose an anomaly detection
system on smart contracts. The idea is to create a consensus mechanism based
on the behavior of smart contracts whose principle will be based on the prototype
of normal behavior of the smart contract.
Anomaly detection overcomes the limitation of misuse detection by focusing
on normal system behaviors, rather than attack behaviors. This approach is
characterized by two phases: in the training phase, the behavior of the system
is observed in the absence of attacks, and invariant calculation technique used
to create a profile of such normal behavior. In the detection phase, this profile
is compared against the current behavior of the system, and any deviations
are flagged as potential attacks. Unfortunately, systems often exhibit legitimate
but previously unseen behavior, which leads anomaly detection techniques to
produce a high degree of false alarms. Moreover, the effectiveness of anomaly
detection is affected greatly by what aspects of the system behavior are learnt.
Thus our model is composed of two modules: an invariant calculation algo-
rithm to determine the normal profile of a smart contract, and an algorithm for
monitoring the execution of the contract (Fig. 4).
5 Challenges
Given that all of the proposed solutions use techniques based on formal verifica-
tion, it would be of great importance to orient the field of research towards the
anomalies detection in smart contract systems. Anomaly detection is based on
a program or host or network. Many distinct techniques are used based on type
of processing related to behavioral model.
They are: Statistical based, Operational or threshold metric model, Markov
Process or Marker Model, Statistical Moments or mean and standard devia-
tion model, Invariant Model, Multivariate Model, Time series Model, Cognition
based, Finite State Machine Model, Description script Model, Machine Learn-
ing based, Baysian Model, Genetic Algorithm model, Neural Network Model,
Computer Immunology based.
The application of these detection techniques relating to the behavior model
can solve the problem of attacks in smart contract systems.
Additional work could be carried out on smart contract anomaly detection
techniques using artificial intelligence, ontology-based smart contracts for detect-
ing malicious behavior, deep learning technique.
A future project could consist of working on a behavior detection model based
on artificial intelligence because so far, cybersecurity systems using artificial
intelligence have proven to be the most effective in protecting blockchain.
6 Conclusion
References
1. Abdellatif, T., Brousmiche, K.-L.: Formal verification of smart contracts based on
users and blockchain behaviors models. In: 2018 9th IFIP International Conference
on New Technologies, Mobility and Security (NTMS), pp. 1–5. IEEE (2018)
Formal Analysis of Smart Contracts: Model Impact Factor on Criminality 11
2. Amani, S., Bégel, M., Bortin, M., Staples, M.: Towards verifying ethereum smart
contract bytecode in Isabelle/HOL. In: Proceedings of the 7th ACM SIGPLAN
International Conference on Certified Programs and Proofs, pp. 66–77. ACM
(2018)
3. Bartoletti, M., Galletta, L., Murgia, M.: A true concurrent model of smart contracts
executions. In: International Conference on Coordination Languages and Models,
pp. 243–260. Springer (2020)
4. Bhargavan, K., et al.: Short paper: formal verification of smart contracts. In: Pro-
ceedings of the 11th ACM Workshop on Programming Languages and Analysis for
Security (PLAS), in Conjunction with ACM CCS, pp. 91–96 (2016)
5. Bigi, G., Bracciali, A., Meacci, G., Tuosto, E.: Validation of decentralised smart
contracts through game theory and formal methods. In: Programming Languages
with Applications to Biology and Security, pp. 142–161. Springer (2015)
6. Brent, L., et al.: Vandal: a scalable security analysis framework for smart contracts.
arXiv preprint arXiv:1809.03981 (2018)
7. Chen, W., Zheng, Z., Cui, J., Ngai, E., Zheng, P., Zhou, Y.: Detecting ponzi
schemes on ethereum: towards healthier blockchain technology. In: Proceedings
of the 2018 World Wide Web Conference, pp. 1409–1418 (2018)
8. Di Angelo, M., Salzer, G.: A survey of tools for analyzing ethereum smart con-
tracts. In: 2019 IEEE International Conference on Decentralized Applications and
Infrastructures (DAPPCON). IEEE (2019)
9. Dika, A.: Ethereum smart contracts: Security vulnerabilities and security tools.
Master’s thesis, NTNU (2017)
10. Feng, T., Yu, X., Chai, Y., Liu, Y.: Smart contract model for complex reality trans-
action. Int. J. Crowd Sci. 3(2), 184–197 (2019). https://doi.org/10.1108/IJCS-03-
2019-0010
11. Fu, Y., et al.: EVMFuzzer: detect EVM vulnerabilities via fuzz testing. In Pro-
ceedings of the 2019 27th ACM Joint Meeting on European Software Engineering
Conference and Symposium on the Foundations of Software Engineering, pp. 1110–
1114. ACM (2019)
12. Hadjidj, R., Yang, X., Tlili, S., Debbabi, M.: Model-checking for software vulner-
abilities detection with multi-language support. In: 2008 Sixth Annual Conference
on Privacy, Security and Trust, pp. 133–142. IEEE (2008)
13. He, J., Balunović, M., Ambroladze, N., Tsankov, P., Vechev, M.: Learning to fuzz
from symbolic execution with application to smart contracts. In: Proceedings of
the 2019 ACM SIGSAC Conference on Computer and Communications Security,
pp. 531–548 (2019)
14. Hirai, Y.: Formal verification of deed contract in ethereum name service, November
2016 (2016). https://yoichihirai.com/deed.pdf
15. Jiang, B., Liu, Y., Chan, W.K.: ContractFuzzer: fuzzing smart contracts for vulner-
ability detection. In: Proceedings of the 33rd ACM/IEEE International Conference
on Automated Software Engineering, pp. 259–269. ACM (2018)
16. Juels, A., Kosba, A., Shi, E.: The ring of gyges: using smart contracts for crime.
Aries 40, 54 (2015)
17. Juels, A., Kosba, A., Shi, E.: The ring of gyges: investigating the future of crim-
inal smart contracts. In: Proceedings of the 2016 ACM SIGSAC Conference on
Computer and Communications Security, pp. 283–295 (2016)
18. Kalra, S., Goel, S., Dhawan, M., Sharma, S.: Analyzing safety of smart contracts.
In: NDSS, Zeus (2018)
19. Lamport, L.: “Sometime” is sometimes “not never” on the temporal logic of pro-
grams. In: Proceedings of the 7th ACM SIGPLAN-SIGACT Symposium on Prin-
ciples of Programming Languages, pp. 174–185 (1980)
12 M. Ndiaye and K. Konaté
20. Luu, L., Chu, D.-H., Olickel, H., Saxena, P., Hobor, A.: Making smart contracts
smarter. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and
Communications Security, pp. 254–269 (2016)
21. Murray, Y., Anisi, D.A.: Survey of formal verification methods for smart contracts
on blockchain. In: 2019 10th IFIP International Conference on New Technologies,
Mobility and Security (NTMS), pp. 1–6. IEEE (2019)
22. Nehai, Z., Piriou, P.-Y., Daumas, F.: Model-checking of smart contracts. In: 2018
IEEE International Conference on Internet of Things (iThings) and IEEE Green
Computing and Communications (GreenCom) and IEEE Cyber, Physical and
Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 980–987.
IEEE (2018)
23. Nguyen, Q.-B. Nguyen, A.-Q., Nguyen, V.-H., Nguyen-Le, T., Nguyen-An, K.:
Detect abnormal behaviours in ethereum smart contracts using attack vectors. In:
International Conference on Future Data and Security Engineering, pp. 485–505.
Springer (2019)
24. Nguyen, T.D., Pham, L.H., Sun, J., Lin, Y., Minh, Q.T.: sFuzz: an efficient adaptive
fuzzer for solidity smart contracts. arXiv preprint arXiv:2004.08563 (2020)
25. Nikolic, I., Kolluri, A., Sergey, I., Saxena, P., Hobor, A.: Finding the greedy, prodi-
gal, and suicidal contracts at scale. In: Proceedings of the 34th Annual Computer
Security Applications Conference, pp. 653–663 (2018)
26. Osterland, T., Rose, T.: Correctness of smart contracts for consistency enforce-
ment. ERCIM NEWS 110, 18–19 (2017)
27. Parizi, R.M., Dehghantanha, A., Choo, K.-K.R., Singh, A.: Empirical vulnera-
bility analysis of automated smart contracts security testing on blockchains. In:
Proceedings of the 28th Annual International Conference on Computer Science
and Software Engineering, pp. 103–113. IBM Corp. (2018)
28. Permenev, A., Dimitrov, D., Tsankov, P., Drachsler-Cohen, D., Vechev, M.: VerX:
safety verification of smart contracts. In: 2020 IEEE Symposium on Security and
Privacy, SP, pp. 18–20 (2020)
29. Pnueli, A.: The temporal logic of programs. In: 18th Annual Symposium on Foun-
dations of Computer Science (SFCS 1977), pp. 46–57. IEEE (1977)
30. Podelski, A., Rybalchenko, A.: Transition invariants. In: 2004 Proceedings of the
19th Annual IEEE Symposium on Logic in Computer Science, pp. 32–41. IEEE
(2004)
31. So, S., Lee, M., Park, J., Lee, H., Oh, H.: VeriSmart: a highly precise safety verifier
for ethereum smart contracts. In: 2020 IEEE Symposium on Security and Privacy
(SP), pp. 1678–1694. IEEE (2020)
32. Torres, C.F., Schütte, J., State, R.: Osiris: hunting for integer bugs in ethereum
smart contracts. In: Proceedings of the 34th Annual Computer Security Applica-
tions Conference, pp. 664–676 (2018)
33. Wang, H., Li, Y., Lin, S.-W., Ma, L., Liu, Y.: VULTRON: catching vulnerable
smart contracts once and for all. In: Proceedings of the 41st International Confer-
ence on Software Engineering: New Ideas and Emerging Results, pp. 1–4. IEEE
Press (2019)
34. Wang, S., Ouyang, L., Yuan, Y., Ni, X., Han, X., Wang, F.-Y.: Blockchain-enabled
smart contracts: architecture, applications, and future trends. IEEE Trans. Syst.
Man Cybern.: Syst. 49(11), 2266–2277 (2019)
35. Wang, Y., Bracciali, A., Li, T., Li, F., Cui, X., Zhao, M.: Randomness invalidates
criminal smart contracts. Inf. Sci. 477, 291–301 (2019)
36. Wood, G.: Ethereum: a secure decentralized generalized transaction ledger (EIP-
150 revision) (2020). http://gavwood.com/paper.pdf
Formal Analysis of Smart Contracts: Model Impact Factor on Criminality 13
37. Wustholz, V., Christakis, M.: Harvey: a greybox fuzzer for smart contracts. arXiv
preprint arXiv:1905.06944 (2019)
38. Xia, X., Ji, Q., Le, J.: Research on transaction dependency mechanism of self-
healing database system. In: 2012 International Conference on Systems and Infor-
matics (ICSAI2012), pp. 2357–2360. IEEE (2012)
A Blockchain-Enabled Fog Computing Model
for Peer-To-Peer Energy Trading in Smart Grid
1 Introduction
Nowadays, the increasing demand for timely electrical energy consumption and mon-
itoring has given rise to the role of a smart grid network over the traditional grid. The
traditional grid is a centralized and one-way transmission of energy. Whereas the SG net-
work is distributed two-way transmission of energy and information. Where prosumers
and consumers have a major role to play in buying and selling energy in a decentralized
manner. The current SG network extends the controlling, computation, monitoring and
sensing of the information and electrical energy flow in a bidirectional way when com-
pares to a traditional network where different buyers and sellers participate in the auction
and bidding. SG when enabled with Information and Communication Technology (ICT)
and Cyber-Physical System (CPS) has become an autonomous and resilient energy trad-
ing system. The different and independent stakeholders can unite and build a trustworthy
relationship to exchange the required electrical energy as per the end-user requirement
in real-time. The existing state-of-the-art SG system requires a distributed platform for
storing, processing, and controlling a large amount of information and energy to make
the system reliable for P2P energy trading. This can be possible with the use of Fog Com-
puting (FC) acting as the middleware layer at the edge of prosumers and consumers in a
Neighbourhood Area Network (NAN), Building Area Network (BAN), Household Area
Network (HAN), and Local Area Network (LAN) [1]. FC nodes can transmit the data in
a real-time mode with a single hop count. This makes the SG network efficient for the
performance related to energy trading and exchange of information between prosumers
and consumers as they require minimum service latency, network usage and an efficient
secure channel [2]. Next, to secure the energy trading transaction in the SG network
blockchain can play a major role by acting as a decentralized system along with the FC
environment. Recent studies have not evaluated the underlying blockchain performance
for QoS requirement in P2P energy trading in an FC environment. Therefore, to meet
the above-mentioned challenges we have proposed a novel paradigm using blockchain
in the FC environment. The proposed work includes a novel BSET algorithm along with
a BFCM for P2P energy trading in SG.
This section discusses the conventional way of P2P energy sharing between the com-
munities using smart meters in an SG network. See Fig. 1 for the conventional trading
involving different communities.
Figure 1 shows the conventional way of P2P energy trading between the different
communities i.e., the different distributed customers. Where one of the customers acts
as prosumers and another one-act as consumers. The smart meters are further connected
to utility offices. However, this conventional way of P2P energy trading suffers from the
various QoS requirements i.e., service delay, and network usage for efficient P2P energy
trading between the buyers and sellers of electrical energy in the SG network. In general,
energy trading is conducted between different microgrids. Where both producers and
consumers participate in using the energy supply from smart meters to measure con-
sumption. The conventional energy trading model lacks secure private communication
and energy transaction between prosumers related to P2P energy trading.
A Blockchain-Enabled Fog Computing Model for Peer-To-Peer Energy 17
Fig. 2. Blockchain-enabled fog computing model for P2P energy trading in smart grid
Figure 2 shows the novel advanced blockchain-based P2P energy trading model.
The model consists of a secure data transmission channel that uses blockchain-based
technology. The blockchain here used for electrical data distribution, settlements of
contracts, recording of transactions that occurred, data and user verification along with
storage of blocks. Where FC nodes are used for minimizing the service latency and
network usage at the edge of the smart meter deployed in the SG network. Next, the
energy available for trading is transferred to prosumers and consumers in a real-time
mode where negotiations are conducted for the auction of available energy to sell. The
advanced model will help in achieving QoS requirement by minimizing the bottlenecks
which affect the performance of the energy trading and achieve the best configuration
for the system. Each prosumer can share his/her energy usage information which can be
used by other neighbours with a secure channel using the blockchain model.
Algorithm 1: Negotiation protocol of two users begin inside fog computing (FC) envi-
ronment. In this part, the seller generated a contract and final contract based on the offer
and counteroffer for negotiation with the buyer.
Algorithm 2: Final contract determination begins between the peers in FC. This part
of the algorithm deals with the final contract determination and contract determination
deadline.
A Blockchain-Enabled Fog Computing Model for Peer-To-Peer Energy 19
Algorithm 3: Encryption and decryption of electrical data using blockchain for secure
communication between peers. The data is encrypted and then decrypted using a private
blockchain and different cryptographic operations. The encryption algorithm is used to
encrypt the meter data and readings from the outside world. The algorithm performs
security of data transmission between smart meters, meter management system, and
consumers using the blockchain. The electrical data is encrypted using private-public
key arrangements the data is encrypted and then decrypted as per the user requirement.
20 S. Shukla et al.
packet allocation by creating different edges, networks, nodes, and devices with cloud
and fog sever. A detailed comparative analysis is conducted between FC and cloud-
related latency, malicious node percentage, and network usage. The simulations are
conducted between different prosumers at different physical topology configurations.
Furthermore, the malicious node percentage increases with an increase in the number
of prosumers. See Fig. 3 represent the physical topology configuration.
Figure 3 shows the physical topology for configuration built in the iFogSim simulator.
The configuration is solely based on the concept of a proposed system. The figure shows
the fog devices connected with a cloud server and the smart meters embedded at the
prosumers place. See Fig. 4 for average latency performance.
Figure 4 shows the average latency comparison between different prosumers during
P2P energy trading in fog and cloud computing environment. The FC easily outperforms
the cloud in terms of latency.
Fig. 5. Malicious node percentage vs detection accuracy in fog and cloud environment
Figure 5 shows the malicious node percentage in fog and cloud along with the
detection accuracy in percentage. The figure shows that the detection accuracy in fog
nodes is much greater when compared to the cloud for different distributed prosumers.
Fig. 6. Network usage in P2P energy trading for different prosumers in fog and cloud
Figure 6 shows the network usage by the different prosumers in P2P energy trading
using fog and cloud. The FC easily outperforms the cloud in terms of network usage.
A Blockchain-Enabled Fog Computing Model for Peer-To-Peer Energy 23
7 Conclusion
To overcome the limited communication, network efficiency, and data privacy issues of
the SG network a fully distributed energy trading system using FC and blockchain is pro-
posed. Next, we have proposed a novel Blockchain-Based Smart Energy Trading (BSET)
algorithm. The algorithm is further divided into three other major sub-algorithms. 1)
Negotiation protocols between two users 2) Final contract determination between the
peers and 3) Encryption and decryption of electrical data using blockchain for secure
communication. The main contribution of the proposed work is to improve P2P energy
trading by providing a secure communication channel among prosumers along with
determining the latency and network usage requirement.
Acknowledgements. This publication has emanated from research supported in part by a research
grant from Cooperative Energy Trading System (CENTS) under Grant Number REI1633, and by
a research grant from Science Foundation Ireland (SFI) under Grant Number SFI 12/RC/2289_P2
(Insight), co-funded by the European Regional Development Fund.
References
1. Ahsan, M.M., Ali, I., Imran, M., Idris, M.Y.I., Khan, S., Khan, A.: A fog-centric secure cloud
storage scheme. IEEE Trans. Sustain. Comput. (2019). https://doi.org/10.1109/TSUSC.2019.
2914954
2. Sarenche, R., Salmasizadeh, M., Ameri, M.H., Aref, M.R.: A secure and privacy-preserving
protocol for holding double auctions in smart grid. Inf. Sci. 557, 108–129 (2021)
3. Luo, F., Dong, Z.Y., Liang, G., Murata, J., Xu, Z.: A distributed electricity trading system in
active distribution networks based on multi-agent coalition and blockchain. IEEE Trans. Power
Syst. 34(5), 4097–4108 (2018)
4. Sadhukhan, D., Ray, S., Obaidat, M.S., Dasgupta, M.: A secure and privacy preserv-
ing lightweight authentication scheme for smart-grid communication using elliptic curve
cryptography. J. Syst. Arch. 114, 101938 (2020)
5. Lohachab, A., Garg, S., Kang, B.H., Amin, M.B.: Performance evaluation of Hyperledger
Fabric-enabled framework for pervasive peer-to-peer energy trading in smart Cyber-Physical
Systems. Futur. Gener. Comput. Syst. 118, 392–416 (2021)
6. Mohan, V., et al.: Realistic energy commitments in peer-to-peer transactive market with risk
adjusted prosumer welfare maximization. Int. J. Electric. Power Energy Syst. 124, 106377
(2021)
7. Jiang, A., Yuan, H., Li, D.: A two-stage optimization approach on the decisions for prosumers
and consumers within a community in the Peer-to-peer energy sharing trading. Int. J. Electric.
Power Energy Syst. 125, 106527 (2021)
8. Tushar, W., et al.: Peer-to-peer energy systems for connected communities: a review of recent
advances and emerging challenges. Appl. Energy 282, 116131 (2021)
9. Wang, N., Li, J., Ho, S.-S., Qiu, C.: Distributed machine learning for energy trading in electric
distribution system of the future. Electric. J. 34(1), 106883 (2021)
Energy Trading Between Prosumers Based
on Blockchain Technology
Abstract. Electrification of the energy systems and the current policies for sus-
tainable development are increasing the potential for distributed energy resources
(DERs). Within this trend, electricity grid generation and intermediary elements
(e.g. batteries) are distributed, promoting a new business model where the con-
sumers have become prosumers. That is to say, they can both generate and con-
sume energy. The distributed energy generation is based on renewable (mainly,
photovoltaics) and storage (i.e. batteries). However, the produced energy is unpre-
dictable without forecasting tools and intermittent (i.e. dependent on the solar
resources). Additionally, although the priority is the usage of this energy for self-
consumption, the surplus of energy is usually sold to the DSO (Distribution System
Operator). Then, the usage of Peer-to-Peer (P2P) energy trading fosters new busi-
ness models and novel paradigms of energy system generation where people can
generate their own energy and share it locally with each other. The aforementioned
factors have encouraged a wider adoption of microgrids powered by renewable
distributed energy sources and they provide a lot of economic and environmen-
tal benefits. For that end, this paper presents a P2P approach, combined with
demand and production forecasting, to enable novel prosumers’ business models
and promoting renewable energy communities for energy transition.
1 Introduction
Energy markets are evolving from centralized electricity generation to distributed con-
cepts [1], thanks to the wide deployment of renewable self-consumption installations
(e.g. photovoltaics in roofs). This aspect contributes to more efficient, environmentally-
friendly and small-size generating units, as well as better demand management. This
new trend is enhanced by the integration of new technologies, like blockchain and P2P
(peer to peer). Under this approach, the new concept of microgrid arises where the
distributed generation and consumption elements are integrated in the existing power
system [2] and communicated though the aforementioned P2P technology. Thus, Dis-
tributed Ledger Technologies (DLTs) and, in particular, blockchain technology, have the
potential to transform the energy sector. The World Economic Forum, Stanford Woods
Institute for the Environment, and PwC released a joint report [3] identifying more than
65 blockchain use-cases for the environment. These use cases include new business
models for energy markets and, even more, moving carbon credits or renewable energy
certificates onto the blockchain.
Since years ago, the penetration of renewables has been seen as a disruptive way
to transform energy markets thanks to the integration of PV (photovoltaics) cells, wind
turbines, Information and Communication technologies, among others [4]. Therefore,
better balances of the energy flows are possible based on trading mechanisms [5], where
blockchain is the enabler technology. Also, this blockchain technology breaks with the
traditional role of the system aggregator by using the Smart Contracts concept as a virtual
aggregator within the microgrid.
Thus, this paper presents a blockchain-based microgrid deployment so as to foster
distributed energy resources within microgrids and energy trading mechanisms. Then,
the implementation of this P2P concept aims to foster new electricity markets for energy
transition. The implementation of blockchain plus Smart Contract allows the creation
of transactions for energy sharing between agents in the microgrid. In this sense, local
energy exchange is prioritized, reducing the grid stress (i.e. when supplying the excess
of energy from the aforementioned renewables sources into the grid).
In order to detail the concept, Sect. 2 contains a very brief summary of the related
work and how the aforementioned approach is sited in the current research context.
Section 3 explains the approach and business model that applies for the energy trading
solution proposed in this paper. Section 4 describes the system that has been developed
and the technological aspects to be considered. Finally, Sect. 5 provides the real case
demonstration and test results, and the set of conclusions is described in Sect. 6.
2 Related Work
In the last years, a lot of research works have been published in the field of blockchain,
P2P and energy trading. One of the pioneers was the Brooklyn microgrid [6], where
a distributed energy generation microgrid was set up to balance energy generation and
consumption. The concept of the Brooklyn microgrid established self-produced energy
trading mechanisms integrating both physical and virtual prosumers.
Other studies like [5] or [7] have been focused on the implementation of auction
mechanisms based on blockchain and smart contracts for the optimization of the energy
flows, allowing trading between peers. Additionally, blockchain has been deployed to
enable a direct energy trading among consumers and facilitating the local power, such
as the analysis in [8]. Finally, the authors in [9] propose a framework under where
P2P trading is possible. Then, energy matching strategies are followed to match demand
and renewable energy supply. Double auction principles are applied within the microgrid
where the players count on renewable producers, consumers, and the distribution system
operator (DSO).
However, it has to be highlighted that the previous researches, with the exception
of the Brooklyn microgrid, lacks of real demonstrators and they are simulation-based
in test environments, such as Ganache. Additionally, the results are focused on the
26 S. M. Gutiérrez et al.
prosumers energy trading, without considering the DSO, who plays a very important
role, where only the research in [9] includes the DSO in the energy matching process.
Finally, as stated before, the distributed energy generation, distribution and demand is
intermittent, which is not considered within the previous researches and depends on the
user’s behavior. But, end-consumers are not considered as the core of the microgrid.
The research presented in this paper goes beyond the state of the art in the axes that are
described in the following bullets:
• First of all, to overcome the uncertainties in the available energy production, as well as
demand uncertainties, combined blockchain and demand prediction has been imple-
mented. While the blockchain technology enables the energy trading, machine learn-
ing for forecasting is applied on top of the blockchain to predict the production,
demand and, thus, excess of energy. According to this, three stages in the energy
trading are modelled: (1) predicted excess of energy to be sold and predicted energy
demand to be covered (i.e. requirements for purchase); (2) execution of the trading
according to the real condition; (3) cross-validation to double-check that the sold and
purchased energy are the agreed ones. The advantage of this approach is the increased
accuracy, based on predictions, but checked with real measurements of data from the
smart meters.
• Secondly, the sales and purchases of energy are based on informed users, which are
the core of the system. The predicted excess of production and the demand needs are
provided to the prosumer through a user-friendly interface. Then, the end-consumer is
empowered to decide about the proposals to sell and/or purchase energy. Moreover, the
trading final decision is also possible thanks to the interface, where the end-consumer
can make the decision about matching the sales-purchases, although the automatic
auction is also possible for non-experience users.
• Next, the research presented in this paper goes a step forward as the test environment
is a real, but controlled, scenario in contrast to Ganache simulation network.
• Finally, and related to the previous point, one of the actors within the system tested
in this paper is the DSO or aggregator. Energy that has not been matched cannot be
missed and, here, the DSO or aggregator plays the crucial role of being the buyer for
the non-matched energy.
As mentioned before, the presented paper tests the P2P network in a real, but controlled,
environment, where the energy that is produced should be consumed or dumped into the
grid. Aligned with this, the role of the traditional consumers has also changed to become
prosumers. Then, this drives to new business models where aggregators are not part
of the energy market, while the Smart Contract acts as virtual aggregator. Thus, direct
“communication channels” among end-consumers and DSOs are established through the
P2P-blockchain network and Smart Contract. This new way, as stated in [10], benefits of
Energy Trading Between Prosumers Based on Blockchain Technology 27
using blockchain technology for a more transparent, distributed and secure transaction
log. The first clear advantage is the confidence of the end-consumers, as well as their
intervention in the energy markets, thus, empowering them and making them participants
of the process.
According to that, this paper proposes a new paradigm in the energy trading market,
where both sellers and buyers are able to exchange energy. The energy purchases and
sales are guided by a predictive algorithm that always informs the user about the excess
of energy that will be available to be sold, as well as the energy requirements according
to the demand for the energy purchases. Thus, there are two ways of behaviour:
• “User guided” energy trading: This is provided for experienced and energy-aware
users, empowering them in the final decisions. Both sellers and buyers are in charge
of the sales and purchases proposals, the matching and the final validation. The trans-
actions are “manually” generated and the developed smart contract provides the user
with a method to generate such an energy transaction. That is to say, after having
published the sales and purchases proposals, including the energy prices, the users are
in charge of selecting the matches between sellers and buyers, being possible selling
energy to multiple buyers and vice versa, but always specifying the total amount of
energy and its price to sell/buy. Besides, the amount of energy not sold will be con-
sidered as transferred to the DSO (Distribution System Operator). Figure 1 shows an
example of user guided energy trading in which the sequence of operations has been
the following one:
– Three “rounds” of energy transactions have been done. In the first round, the pro-
sumer offered 4 energy units, seller1 bought 3 energy units and seller2 bought 1 (in
this case, no energy has been transferred to the general grid). In the second round,
the prosumer offered 3 energy units, seller1 bought 2.5, seller2 bought 0.5 and no
energy was transferred to the general grid. During the third round, the prosumer
put on sale 5 energy units, seller1 acquired 3 energy units, seller2 bought 1 energy
unit and 1 energy unit was transferred to the general grid.
• Auction energy trading: This second approach is depicted for non-experienced users
and the energy transactions are automatically generated by the smart contract once it
is required to do it (after the expiration of the prediction horizon). The sales and pur-
chases proposals are still manually published according to the information provided
to the users (again, empowering users with information), but matching and transaction
processes are automatically executed (including the ones linked to the DSO), sorting
out the energy sales from the cheapest to the most expensive one and purchases in the
reverse way.
Here, it is important to remark some important aspects related to the business models.
First of all, the automatic auction is currently based on the average price where both the
seller and the buyer benefit. The seller sells energy with a higher price than the offered
by the DSO, while the buyer still buys energy with price below the DSO. Secondly,
the manual validation is contrasted to the smart meter readings, which are currently not
integrated in the system, but it will be done in the future steps to automatically detect
malicious behaviours. Payment process is externalised in order not to create a token, so
it is just energy power units trading.
4 System Overview
The selection of the blockchain technology has been made based on the described busi-
ness models and the microgrid creation. It should be also considered the current Spanish
legislation, which limits the creation of energy communities larger than 500 m [11].
This means that the possibility to set up energy trading mechanisms is reduced to local
neighborhoods, where the players are well known.
Then, taking this into account, permissioned blockchain has been selected. Per-
missioned blockchains provide an additional level of security over typical blockchain
systems like Bitcoin due to the fact that they require an access control layer. Then, only
the administrator of the microgrid is able to accept new peers and, as stated above, the
people taking part is perfectly known. Besides, it has to be considered that a physical
connection is needed to allow the physical transmission of the energy from one user to
another. Additionally, there are multiple benefits of using permissioned blockchains:
As stated before, the payments are not performed within the blockchain, but with an
external accounting software, that is not part of this paper.
Energy Trading Between Prosumers Based on Blockchain Technology 29
According to the previous advantages, Hyperledger Besu1 has been chosen in con-
trast to other possibilities such as Fabric or Quorum, among others. The consensus
algorithm is PoA2 (by using Clique). The reasons for selecting this technology are:
Smart contracts provide the necessary means to design and implement fully automated
contractual agreements among involved stakeholders. They mediate and monitor trans-
actions, provide transparency and enforcement of contractual clauses. In this case, the
smart contract has been developed using Solidity as programming language.
For multiple reasons, two versions of the smart contract have been developed. In one
of them, the user is in charge of generate the transactions. The other version of the smart
contract uses an automatic auction algorithm that makes it possible to automatically
generate transactions between prosumers (as per Fig. 2). In both versions, both the seller
and the purchaser have to validate the transaction: the purchaser has to validate that
he/she has received the energy stated in the transaction, and the seller has to validate that
he/she has generated and sent the amount of energy indicated in the transaction.
As aforementioned, in contrast to other researches, the validation has been made against a
real, but controlled, environment, not just making use of simulated networks as Ganache.
Thus, two scenarios have been deployed: (1) an initial test case with 4 Raspberry PI
with the purpose of debugging Smart Contract and Hyperledger Besu configuration;
(2) SYLTEC offices as real and controlled environment where nodes are the different
instances of the offices, which are independently managed from the electrical perspective.
Figure 3 shows the schema of the connected nodes, simulating a condominium where
each office could be mirrored to a dwelling. In this configuration, the orange node is
the one with PV plus batteries for storage, while the rest of nodes are just consumers.
Each one of the rooms has its own energy meter, thus, independent consumption. The
Besu network has been deployed in each one of the nodes, considering two bootnodes
(or masters of the network). Moreover, to enable the transactions and creation of new
blocks, CLIQUE protocol has been selected and, thus, 4 nodes are defined as signers
(the two bootnodes that are by default and two additional ones to comply with more than
half of the network).
1 https://www.hyperledger.org/use/besu.
2 Proof of Authority.
Another random document with
no related content on Scribd:
brengt alle gemoederen in beweging, is de schrik van woekeraars en
geldschieters; ontrooft hun door zijn listen hunne bezittingen,
waarmede hij belaagde onschuld beschermt en behoeftigen
ondersteunt.
Men leze, hoe alles in het werk wordt gesteld, Lord Lister, genaamd
John C. Raffles, den geniaalsten aller dieven, te vatten!
[Inhoud]
Vertaling:
WARRANT OF
ARREST. Bevel tot
aanhouding.
DESCRIPTION: Beschrijving:
[Inhoud]
I. OP LEVEN EN DOOD. 1
II. DE BEKENTENIS VAN DEN STERVENDE. 5
III. EEN VROUWELIJKE DETECTIVE. 9
IV. DE BLINDE PASSAGIER. 16
V. AAN HET WERK. 19
VI. EEN LEVENDE DOODE. 24
VII. IN DE STALEN KLUIS ONDER DE AARDE. 29
Colofon
Beschikbaarheid
Dit eBoek is voor kosteloos gebruik door iedereen overal, met vrijwel
geen beperkingen van welke soort dan ook. U mag het kopiëren,
weggeven of hergebruiken onder de voorwaarden van de Project
Gutenberg Licentie in dit eBoek of on-line op www.gutenberg.org ↗️.
Metadata
Codering
Documentgeschiedenis
2022-05-28 Begonnen.
Verbeteringen
1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside
the United States, check the laws of your country in addition to
the terms of this agreement before downloading, copying,
displaying, performing, distributing or creating derivative works
based on this work or any other Project Gutenberg™ work. The
Foundation makes no representations concerning the copyright
status of any work in any country other than the United States.
1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if
you provide access to or distribute copies of a Project
Gutenberg™ work in a format other than “Plain Vanilla ASCII” or
other format used in the official version posted on the official
Project Gutenberg™ website (www.gutenberg.org), you must, at
no additional cost, fee or expense to the user, provide a copy, a
means of exporting a copy, or a means of obtaining a copy upon
request, of the work in its original “Plain Vanilla ASCII” or other
form. Any alternate format must include the full Project
Gutenberg™ License as specified in paragraph 1.E.1.
• You pay a royalty fee of 20% of the gross profits you derive from
the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”
• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.
1.F.
Most people start at our website which has the main PG search
facility: www.gutenberg.org.