Blockchain is making a loud, impactful noise on the digital front of our world. And, we are accepting it.

Because of blockchain, we are trying to make things that we otherwise could have never ever imagined. Things like:

Smart contracts Smart home and cryptographically mapped relationships New rental models New servicing models

The list of fortune 500 getting into blockchain is getting huge day by day. It can be said that Blockchain is one of the most revolutionary technologies of 2019 that can be used in software product development.

Starting this year, we started to build on blockchain and it’s business potential bits-by-bits. The absolute opportunity to run a distributed trust network was extremely revolutionary for us.

But, as we worked and tested one service to another, we found that many of these blockchain services lacked scalability. The scalability challenges were further enhanced by high costs per second and the lack of transparency involved in these networks.

This is when we were introduced to IOTA.

What we are going to learn in this blog –

Architecture of IOTA

In traditional blockchain models, transactions are bundled in each block after getting verified by the miners. So, as the number of transactions increases, the work for miners increases as well.

In IOTA, instead of a global blockchain, we have directed acyclic graph, called Tangle. This Tangle graph is the ledger for storing history of all transactions.

As opposed to that, in a Tangle architecture each transaction will form a new block and will be verified by itself. In order to carry out this verification, it needs two randomly chosen transactions in the same network.

IOTA’s is decentralized and is indefinitely scalable with zero cause, allowing us to build a self sustainable economy on-demand. Perfectly fitting the next generation business models.

How does IOTA works?

IOTA has nodes. A node is a part of the global IOTA network and is constantly exchanging information with its neighbours. This information is the status of the network: who made transactions, how many transactions were made, etc

Your node’s IP has to be static in order for it to stay connected with the tangle. Otherwise, your neighbours will have to keep updating your IP everytime it changes.

How IOTA is different from blockchain?

The cryptocurrency IOTA itself doesn’t runs over blockchain, and runs on top of their own ledger called Tangle. It is said to be immune towards quantum computers. In case, if quantum computing is made possible, IOTA would be one of the very few IoT solutions available that will be secure.

IOTA is a quantum resistant Directed Acyclic Graph(DAG)

When it comes to cryptography and encryption, quantum computing can seamless break them down. Making any encryption layer a false hope for protecting our mission critical IoT systems. Tangle network is the hope for our secure future, whereas the entire existing of crypto-algorithms is extremely doubtful.

When it comes to future of IoT, we see millions of transactions, let me rephrase it – microtransactions. Getting slowly into the needs of real time transactions, most available blockchain solutions wouldn’t scale as they won’t be able to scale to a higher number of transactions per seconds and at the same time provide stable infrastructure and run on a lightweight hardware.

Now add a transaction fees to these millions of microseconds, that’s just the scalability killer!

In IOTA, tokens are never lost: No miners involved

In other solutions that involve blockchains, the presence of miner requires IoT networks to be fed consistently with more cryptocurrencies. A miner will keep consuming cryptocurrencies, and hence arises the need to manage and purchase more cryptocurrency makes building future IoT networks difficult.

In IOTA however, there are no miners present. And, any IOTA that has been exchanged, can always be sent back. This makes is extremely cost efficient to just keep moving IOTAs back and forth into an IoT network, eliminating the need to purchase more IOTAs for a very limited number of devices.

The illustration below shows the difference:

How IOTA protects against spamming or DoS attacks?

In traditional blockchains, it brings a lot of chances for an attacker to carry out a 51%(in reality only a 34%) attack. And the only requirement to carry out this attack would be to have that percentage of network hashing rate.

Now, IOTA’s network topology and protocols are way different from most blockchains, and percentage of hashing rate is one of the many factors

Use of Coordinators to safeguard against attacks

Coordinators in IOTA are essentially training wheels for the IOTA network till the amount of organic activity on the ledger is sufficient to where it can evolve without any further assistance. When that happens, coordinators will be completely shut down.

The hardware requirements (MCU) for IOTA?

In order to run an embedded IOTA node, the minimum hardware requirements:

Weak devices should use the swarm technique

For other SBCs, an architecture better than i386 would work

IOTA isn’t divisible

IOTA isn’t divisible, all decimals have been removed to create large quantities. Currently, there are 2.7 quadrillion IOTA making the issue of non-splitting cryptocurrency not a big problem.

The problem with non-splitting IOTA isn’t a really big concern as a node would split in a very similar way any two parties would split a $57 bill at a restaurant.

Why a transaction points to 2 transactions? Why not 3/4/5 transactions?

As IOTA Tangle evolves, the width varies depending upon on certain parameters of its environment like network topology. The parameter’s value fluctuates and Tangle width reacts to that trying to maximize the performance. Pointing towards two transactions brings protection against a malicious user who might try to affect the width to reduce overall performance.

If there were three, four, or five transactions, an attacker would gain an advantage.

Myth : IOTA and it’s security dependencies on number of transactions?

Many are casually assuming that in IOTA, the security is proportional to the number of transactions. And, if an attacker wants to double their spend after 1 hour since his transaction, he needs to submit number of transaction for the last hour of his transactions to invalidate his first spend.

Truth: IOTA’s security is multiplied by a quotient depending on network topology. The above only applies if there were no latency between network nodes.

What happens when a Tangle is split into two pieces?

It is quite possible that with IOTA gaining huge traction, big mesh networks – on a global scale would be created. Let’s say if this huge mesh network is split into two or three sub nets.

In any other blockchain solution it would be easy for them to converge once the connection is re-established. But in IOTA, they won’t be able to converge fully without a lot of reattachments.

A security hole in the $1 billion cryptocurrency market?

The current usage model of IOTA requires typing the seed in plain text. It seems like a huge security hole in implementing IOTA. There are password managers that can use copy and paste obfuscation.

When you integrate IOTA with your platform, you can integrate these password managers with the system to make the seed encrypted and the problem of plain text goes away.