<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Scaling Multichain Systems using DAG-based Architecture</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Maksym Kotov</string-name>
          <email>maksym_kotov@ukr.net</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Serhii Toliupa</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Serhii Buchyk</string-name>
          <email>buchyk@knu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ivan Parkhomenko</string-name>
          <email>ivan.parkhomenko@knu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="editor">
          <string-name>Blockchain; Multichain Systems; Blockchain State Sharding; Security Incidents; Multichain Communication
Protocols; DAG-based Multichain Architecture.1</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Taras Shevchenko National University of Kyiv</institution>
          ,
          <addr-line>60 Volodymyrska St., Kyiv, 01033</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2026</year>
      </pub-date>
      <fpage>16</fpage>
      <lpage>30</lpage>
      <abstract>
        <p>The demand for decentralized value exchange solutions has been steadily growing for the last few decades. In that light, blockchain technology has gained momentum as a trustless platform for arbitrary computations. The myriads of consensus protocols, networks, and custom functionalities enable the migration of a wide range of traditional centralized finance into a distributed environment, reducing the impact of a single custodian entity. Nonetheless, the technology has met significant limitations related to scaling. Modern blockchain networks are faced with high transaction latencies, low throughput, and evergrowing storage requirements. Gradual iterative solutions have been proposed to offload computational complexity tied to consensus onto subnetworks or an off-chain extension. Such solutions often come in the form of second-layer structures, such as rollups, or an entirely new approach towards consensus similar to the Ethereum 2.0 multichain system. A tree-based state sharding and load balancing has been proposed in recent studies but is associated with limitations of its own. In the following article we will provide an overview of existing scaling solutions and propose an improvement of tree-based architecture by generalizing the approach to a directed acyclic graph (DAG)-based system. Its structure, security considerations, and communication management between interconnected chains will be laid out, providing a basis for further research in scalability and efficiency in multichain networks.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <sec id="sec-1-1">
        <title>1.1. Scaling Blockchain Networks</title>
        <p>Traditional financial institutions require both interacting clients to put trust into a third party and
its accounting capabilities. The outsourcing of building a compliant asset exchange system simplified
security management and integration efforts, while in exchange, a centralized entity keeps a private
ledger holding records about each transaction ever processed within the institution and holds
responsibility for its consistency and validity.</p>
        <p>Unfortunately, there were plenty of historical occasions when such a trusted entity became a
reason for financial data leakage or fraudulent activities either because of a coordinated attack
against the institution or unintentional changes made by employees. Centralized solutions highly
depend on political and social landscape which could endanger trusted assets in critical situations.
Hence, the demand for decentralized solutions has been steadily rising for the past few decades.</p>
        <p>
          The most widely adopted technology for decentralized asset exchange is a blockchain network.
Comprised of thousands of participating peers, each responsible for validation and verification of
data consistency, blockchain technology lays foundation for trustless and secure accounting of
occurring transactions [
          <xref ref-type="bibr" rid="ref1 ref2">1-2</xref>
          ].
        </p>
        <p>
          Nonetheless, the basic Consistency, Availability, and Partition Tolerance (CAP) theorem has its
implication for building such networks [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ]. It is of paramount importance for a finance system to
provide consistency guarantees as a top priority. Hence, the decision comes down to a balance
between availability and partition tolerance. Since the nature of a decentralized solution implies
distribution, the tradeoffs were mainly centered around the availability, namely the throughput,
transaction finality, and latencies associated with the addition of new records to the ledger.
        </p>
        <p>
          Most modern consensus protocols in blockchain networks require an agreement by a majority of
participants to either accept or deny a new block [
          <xref ref-type="bibr" rid="ref1 ref2">1-2</xref>
          ]. The majority could be represented by the
held assets of validating nodes, customized trust rules, or a simple popular count. That creates a
significant bottleneck in the throughput of transactions and their respective latencies.
        </p>
        <p>
          Significant efforts have been put into research to improve the finalization speed and throughput,
which are mostly centered around the second layer of blockchain systems [
          <xref ref-type="bibr" rid="ref1 ref2">1-2</xref>
          ]. This layer is built
on top of the basic consensus protocol and usually provides an off-chain computational power for
executing smart contracts and providing proof of their validity [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ].
        </p>
        <p>
          A prominent example of such an approach used in Ethereum is called rollups and helps to
significantly reduce latencies and increase the throughput of the system [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ]. In its essence, the side
network provides the computation, while the main is responsible solely for keeping the records.
While improving latencies and throughput, it only optimizes the network but does not solve the
horizontal scaling problem.
        </p>
      </sec>
      <sec id="sec-1-2">
        <title>1.2. Expansion to Multichain Systems</title>
        <p>
          The previously discussed extensions improve these conditions, but to allow horizontal scaling while
keeping strong consistency guarantees, another approach is required using sharding as a core
principle. Such a system is comprised of multiple subnetworks or autonomous networks interacting
with each other through custom consensus or communication protocols [
          <xref ref-type="bibr" rid="ref6 ref7 ref8">6-8</xref>
          ].
        </p>
        <p>
          As of now, Ethereum is one of the most popular networks utilizing such a principle. By leveraging
a Beacon chain and a Proof of Validity mechanism, it allows the distribution of processing of
transactions between multiple subnetworks [
          <xref ref-type="bibr" rid="ref10 ref11 ref9">9-11</xref>
          ].
shared security mechanism with validators pooling and rotation, where each validator is assigned to
a particular subnetwork for a limited timeframe through a consensus process established on the
Beacon chain.
        </p>
        <p>
          Cosmos Network is another example of an attempt to build a large-scale multichain system and
serves as a communication layer between external networks. In contrast to the Ethereum 2.0
solution, its main goal is to conjoin multiple independent networks rather than build an isolated
multichain system [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ], [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ].
        </p>
        <p>
          Lastly, Avalanche leverages subnetworking and multiple ledgers for division of responsibilities.
C-Chain executes smart contracts, P-Chain manages the lifecycle of subnets, while X-Chain manages
the native assets available on Avalanche. [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ].
        </p>
      </sec>
      <sec id="sec-1-3">
        <title>1.3. Tree-Based State Sharding</title>
        <p>
          Sharding the state of a blockchain in a tree-like structure is an attempt to combine the scalability
properties of the Cosmos network while locally improving security on par with the Ethereum
network. The main purpose of such architecture is to divide traffic both by cohesion and
responsibility zones. The rationale and comparison between existing solutions are provided in their
own dedicated article [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ].
        </p>
        <p>
          The network is comprised of three main structures: the chain trunk, bough chains, and spring
chains. Here, the chain trunk serves as a root of the network and is a gene-sis point of a multichain
system, its governance, and its coordination. The trunk connects distant leaves and might become
the primary bottleneck in distant communication [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ].
        </p>
        <p>
          Bough chains are the managing chains responsible for implementing the communication protocol
among its subjected spring chains. A bough chain could potentially manage and validate another
bough chain, enabling growth of the structure. Spring chains are the main computational units to be
used by clients. While it is possible to execute a transaction on a bough chain, it would cost more
and is incentivized against due to scalability considerations [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ].
        </p>
        <p>Figure 1 shows a diagram of the tree-based multichain system architecture:</p>
        <p>Here we can clearly see a combination of properties from previously discussed multichain
solutions. The tree-based invariant incorporates Proof of Validity similar to one used in Ethereum
2.0 for the bough chain and its child networks. It also promotes distant communication through
parents or custom channels similar to Cosmos. The division between governance ledger and
clientoriented load is separated akin to the Avalanche approach, resulting in an efficient sharding method.</p>
        <p>
          The tree-based architecture also describes three primary communication modes between its
subnetworks. The primary and most efficient is through the parent bough chain and a Proof of
Validity mechanism. Secondary is a multi-hop transaction passing to non-distant relatives. Lastly,
the architecture allows establishing custom communication bridges between distant chains to avoid
congestions [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ].
        </p>
      </sec>
      <sec id="sec-1-4">
        <title>1.4. Purpose of the Article</title>
        <p>
          The purpose of the article is to improve the limitation tied to the trunk chain in the tree-based
architecture. The overall goal is to develop an architecture based on Directed Acyclic Graphs (DAG)
that aims to improve the scalability and security properties of the proposed model [
          <xref ref-type="bibr" rid="ref16 ref17">16-17</xref>
          ].
        </p>
        <p>
          When constructing a multichain system model, evaluating its efficiency against existing solutions
is crucial. Therefore, this paper discusses the comparison model as one of its key points. The model
A directed graph is acyclic iff it admits a topological ranking [
          <xref ref-type="bibr" rid="ref16 ref17">16-17</xref>
          ].
        </p>
        <p>A level function (topological ranking):</p>
        <p>ℓ:  → ℕ = {0,1,2, … }.</p>
        <p>This function assigns an integer level to each node such that ( ,  ) ∈ 
⇒ ℓ( ) &lt; ℓ( ). Then,
for each  ∈ ℕ, define   : = { ∈  : ℓ( ) =  } as a set of assigned levels for each node. ℓ can be
chosen to be strict (no equal levels along any edge) since we topologically require ℓ( ) &lt; ℓ( ).
•
•
•
•
•
•
 = ( ,  ℎ) is a forest of arborescences (disjoint union of rooted out-trees), with (possibly
multiple) roots  .</p>
        <p>No node has two different backbone parents.
includes parameters representing security and scalability properties and evaluates them based on the
previous iteration, a recently suggested enhancement, and a collection of pre-existing networks.</p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>2. Architecture Based on Directed Acyclic Graphs</title>
      <sec id="sec-2-1">
        <title>2.1. Coordination Hierarchy</title>
        <p>
          The architecture is a finite, simple, directed graph  = ( ,  ) [
          <xref ref-type="bibr" rid="ref16 ref17">16-17</xref>
          ], where:
 is a finite set of nodes (chains). The cardinality | | is the number of nodes.
 ⊆  ×  is a set of directed edges (ordered pairs), ( ,  ) ∈  .
        </p>
        <p>Simplicity: no self-loops ( ,  ) ∉  and no multi-edges (because edges are elements of a set
of ordered pairs).</p>
        <p>Acyclicity: there is no directed cycle (no sequence  0 →  1 → ⋯ →   =  0 with  ≥ 1).
ℓ
(tie(1)
(2)
(3)
(4)
(5)
breaking) without changing reachability.</p>
        <p>We partition edges into backbone vs cross edges.</p>
        <sec id="sec-2-1-1">
          <title>There exist disjoint sets  ℎ,   ⊆  such that:</title>
          <p>edges.</p>
          <p>For every  ∈  :

=  ℎ ∪̇   ,</p>
          <p>ℎ ∩   = ∅,
  −ℎ( ) ≤ 1,
where ∪̇ disjoint union, ∅ is the empty set,  ℎ is a set of backbone edges, and   is a set of cross
where   −ℎ( ): = |{ ∈  : ( ,  ) ∈  ℎ}|.</p>
          <p>Consequences:
For every ( ,  ) ∈   :</p>
          <p>ℓ( ) &lt; ℓ( ) ⋏ ( ,  ) ∉  ℎ.</p>
          <p>Cross edges preserve acyclicity and cannot duplicate a backbone edge. They may skip levels
arbitrarily (as long as ℓ( ) &lt; ℓ( )). The level function organizes edges by levels:
 ℎ ⊆
⋃   ×   +1
 ∈ℕ
Backbone edges move exactly one level down:</p>
          <p>Root node:  ∈  ⟺   −ℎ( ) = 0;
Bough node:   +ℎ( ) ≥ 1;</p>
          <p>Spring node (leaf):   +ℎ( ) = 0.</p>
          <p>Roles are derived, not labelled: they depend only on degrees in  ℎ. Multiple roots are allowed (no
(7)</p>
          <p>A quadruple ( ,  ℎ,   , ℓ) defines a valid DAG-multichain architecture iff all of the following
hold:</p>
        </sec>
        <sec id="sec-2-1-2">
          <title>Layering (optional normalization):  ℎ ⊆</title>
          <p>⋃ ∈ℕ   ×   +1 ⋏   ⊆
⋃ &lt;   ×   .</p>
          <p>Here, (1) (4) are the essential structural rules and (5) is a convenient normalization matching</p>
        </sec>
      </sec>
      <sec id="sec-2-2">
        <title>2.2. Governance Structures and Security</title>
      </sec>
      <sec id="sec-2-3">
        <title>2.2.1. Defining a Governance Structure</title>
        <p>
          A Governance Structure is a shared security mechanism initially introduced for the tree-based
architecture. Within DAG-based architecture it could be represented as a subgraph of the multichain
backbone [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ]:
where:
        </p>
        <p>= (  ,   ),
By default,   consists of all immediate parent child pairs:
 ( ) = parent function, defined as  ( ) ∈  ∪ ∅.
 ( ) = ∅ iff  is a root.</p>
        <p>= {( ,  ( )) ∣  ∈   ,
 ( ) ≠ ∅},</p>
        <p>A Governance Structure is essentially the restriction of the backbone forest to a consecutive chain
(or small hierarchy) of boughs. It captures their hierarchical organization. There could be many
Governance Structures within a multichain system.</p>
      </sec>
      <sec id="sec-2-4">
        <title>2.2.2. Defining a United Governance Structure</title>
        <p>
          A United Governance Structure is a higher-order governance subgraph [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ]:
        </p>
        <p>= (  ,   ),
 ⊆  is a subset of participating bough chains that agreed to extend governance through
the consensus process.
shared security.
  ⊆   ×   is the set of agreed governance relations among them with an established


•
•
•
•
•
•
where:
where:
Formally:
 ⊆  is the subset of bough nodes (blockchain networks) participating in this governance
structure.
default direct control.
  ⊆  ℎ is the set of parent-child edges between consecutive boughs inside   representing
(8)
(9)
(10)
(11)</p>
        <p>If (  ,   ) ∈   and (  ,   ) ∈   , then (  ,   ) ∈   . Unlike   , which is local and hierarchical,
allows extended coordination: validator rotation, policy alignment, and inter-chain
communication. For simplicity we did not index   in the definition, but it should be clear that there
could be multiple   as well as   in a multichain system.</p>
        <p>The purpose of a United Governance Structure is to expand shared security principle farther than
a direct parent to child relation. Withing such a structure there is a pool of shared and rotated
validators to reduce the likelihood of 51% attacks. Such a structure does not scale horizontally since
the assignment of validators requires general consensus, hence there could be many disjoined
structures throughout the multichain system.</p>
      </sec>
      <sec id="sec-2-5">
        <title>2.3. Communication and Routing</title>
        <p>A large-scale multichain system could have numerous blockchain networks interconnected within a
global network. Addressing a single chain in such a scenario could pose a problem when relying on
unstructured unique names. A directory service would be required either on-chain or off-chain to
manage requests routing.</p>
        <p>Maintaining such a directory could have its limitations due to update propagation and
bottlenecks. Hence, within a discussed architecture, we propose to utilize a structured and routable
naming system for individual chains, similar to DNS.</p>
        <p>Figure 3 shows a diagram of the DNS-like routing system within the multichain architecture:</p>
        <p>
          In a classical DNS system, there are multiple levels of servers, including root domain servers,
toplevel servers, and authoritative servers [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ], [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ]. Within the proposed DAG-based multichain
architecture, the root chains mirror responsibilities of top-level domains, while their direct children
would function akin to authoritative nodes.
        </p>
        <p>An advantage in contrast to some centralized directory service is apparent from the perspective
of distant networks. When a client from spring chain A tries to create a transaction involving assets
on spring chain B, all that chain A has to know is the root chain address, which then points to its
authoritative record, allowing for recursive traversal of the graph.</p>
        <p>
          Now a similar problem happening with unstructured names could happen if there are many root
chains dynamically created or updated. In such cases the role of a root DNS server could be allocated
to a single off-chain directory service or a separate blockchain network. Since the cardinality of the
root-level chain should not be significant, the capabilities of a single blockchain network would be
enough for such a purpose.
Message Verification (MV),
NIST SP 800-30 [
          <xref ref-type="bibr" rid="ref21">21</xref>
          ].
        </p>
        <p>Shared Security (SS),
every domain fully secluded (1); shared security in specific clusters (2); shared security for most, not
all, cross-chain traffic (3); shared security covers &gt;90% of inter-chain transactions (4); all interchain
operations are validated through a shared pool (5).</p>
        <p>Pooled validators set raise economic security and reduce the probability of 51% attacks since it
would require an infeasible amount of computational and voting power for an attacker to influence
the consensus process. Validators rotation is essential to ensure that there could not be organized
pooling of consensus votes.</p>
        <p>Coordinator Centralization (CC),
network (1); major coordination network with multiple subordinate chains (3); multiple dominant
chains with a balanced workload (3); the multichain is distributed with local coordinators but without
global (4); distributed architecture without reliance on coordination hubs (5).</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Comparison With Existing Solutions</title>
      <sec id="sec-3-1">
        <title>3.1. Scoring Model</title>
      </sec>
      <sec id="sec-3-2">
        <title>3.1.1. Security Scoring Model</title>
        <p>
          Security assessment includes multiple categories discretely scored following ISO/IEC 27005
riskassessment practice [
          <xref ref-type="bibr" rid="ref20">20</xref>
          ]. Each dimension will be scored using a discrete 0-5 ordinal (Likert-style)
scale to transform qualitative security properties into quantitative judgments. Such an approach
infeasible due to complexities related to assessed systems and has grounds as a common practice in

= (   1 ⋅    2 ⋅    3 ⋅    4 ⋅    5) 1+ 2+ 3+ 4+ 5,
where we will use the following weights during final calculations:  1 = 3 (SS),  2 = 3 (CC),
external actors for correctness (1); relays required, with partial on-chain checks (2); external agents
required for liveness with on-chain verification (3); on-chain proofs exist with partial reliance on
coordinator (4); self-sufficient cryptographic proofs for all inter-chain transactions (5).
        </p>
        <p>Trust introduces potential attack vectors, the less trust is put into cross-ledger transaction the
better (e.g. verifiable proof are preferred). External actors could get compromised which diminishes
decentralized security principles. Global coordination chains are potential single points of failure.</p>
        <p>Data Retention &amp; Redundancy (DR),
could be pruned (1); periodic roots for short history (2); moderate historical checkpoints (3); strong
redundancy and proofs (4); explicit retention with configurable depth (5).</p>
        <p>Blast Radius / Containment (BR)
compromise propagates globally (1); spillover limited to hub cluster (2); spillover limited to a
governance group (3); spillover limited to parent-child only (4); compromise fully contained (5).</p>
        <p>
          To combine the previously discussed scores, we use a weighted geometric mean [
          <xref ref-type="bibr" rid="ref22">22</xref>
          ]. Such a
method allows us to expose weaknesses within individual metrics by penalizing disproportionately
low scores. We calculate Composite Security Score (CSS) as follows:
: no shared security,
: single coordination
: requires trusted
: state
: full
(12)
(13)
        </p>
        <p>So the final formula looks as follows:</p>
        <p>= (  3 ⋅   3 ⋅   2 ⋅   1 ⋅   2)111.</p>
        <p>Within this scoring model, higher means more secure. Poor dimensions drag down the score (no
averaging-away weaknesses). To normalize the score and use it later for cumulative assessment
model, we use:  ∗ =</p>
        <p>/5.</p>
      </sec>
      <sec id="sec-3-3">
        <title>3.1.2. Performance Assessment Model</title>
        <p>assessment of the architecture. The performance metrics are calculative in relative perspective to
compared networks.</p>
        <p>Latency utility  ∗ shows relative performance of an architecture. It compares latencies with
respect to the fastest available  ∗ =   / , where   is the lowest latency observed within
assessed multichain systems. ̅ is an average latency associated with an inter-chain transaction
within target architecture. Latencies here include routing, consensus/finality delay, periodic proof
interval, and queueing.</p>
        <p>Throughput utility  ∗ measures relative ability of cross-chain message processing per second and
defined as  ∗ = μ/μ , where μ is the cross-chain throughput capacity of the architecture and
μ is the highest capacity among the compared set. If the throughput is unlimited within a
multichain system, its total score is  ∗ = 1.5.</p>
        <p>Const utility  ∗ shows the cost associated with an inter-chain transaction. The following formula
is used:  ∗ =   / ̅, where   is the lowest cost observed within assessed multichain system
and  ̅is the average cost of a target architecture. Since cost could fluctuate due to economic reasons,
we assume the cost as an amount of records required on multiple ledgers to perform an asset transfer.
If there is no additional cost, then  ∗ = 1.5.</p>
        <p>Each cross-chain operation requires proof so that participants from different ledgers could verify
the validity of the state. Data availability  ∗ shows extra bytes related to the construction of such
proofs  ∗ =   / , where  is the overhead within a target system and   is the minimal
overhead among tested systems. If there is no overhead, then  ∗ = 1.5.</p>
      </sec>
      <sec id="sec-3-4">
        <title>3.1.3. Cumulative assessment model</title>
        <p>Within a cumulative assessment model, we include 5 dimensions discussed previously:

=    ∗ +    ∗ +    ∗ +   
∗ +    ∗ ,
where, the weights are summing to 1 with   = 0.2,   = 0.3,   = 0.1,  
Therefore, the formula is as follows:</p>
        <p>= 0.2 ⋅  ∗ + 0.3 ⋅  ∗ + 0.1 ⋅  ∗ + 0.1 ⋅ 
Here, the higher the value the better.</p>
        <p>
          It is possible to get score larger than 1 due to metrics such as  ∗ = 1.5.
3.2. Ethereum 2.0
Latency in Ethereum 2.0 could be represented ̅ ℎ 2.0 ≈ 984 seconds, which describes a
finalized assets transfer between shards [
          <xref ref-type="bibr" rid="ref23">23</xref>
          ], [
          <xref ref-type="bibr" rid="ref24">24</xref>
          ].
        </p>
        <p>
          Moving on to the throughput μ, each shard should post a commitment to a beacon chain per
epoch, where an epoch is roughly 384 seconds [
          <xref ref-type="bibr" rid="ref23">23</xref>
          ], [
          <xref ref-type="bibr" rid="ref24">24</xref>
          ]. One commitment can contain up to 40000
transactions (~105 transactions per second). Since the architecture limits shards to 64, we can assume
a throughput of μ ℎ 2.0 ≈ 105 ⋅ 64 = 6720 cross-chain transactions per second [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ].
        </p>
        <p>
          Cost  ̅as a count of records per cross-chain transaction could be expressed as follows: a record
on chain A for the transaction, a record on chain A for the proof object, a record for commitment on
the beacon chain shared in a batch, a record on chain B for the transaction and one for proof
verification [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ]. Meaning,  ̅ ℎ 2.0 ≈ 4.
        </p>
        <p>
          Data overhead   ℎ 2.0 ≈ 544 bytes for a Merkle proof with a depth of 16 [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ], [
          <xref ref-type="bibr" rid="ref23">23</xref>
          ], [
          <xref ref-type="bibr" rid="ref24">24</xref>
          ]. The
beacon chain is also responsible for storing commitments ~256 bytes per shard for an epoch but this
is for all transactions inside an epoch.
•
•
•
•
•
Composite Security Score:
        </p>
        <p>Normalized Security Score:</p>
        <p>
          = (53 ⋅ 13 ⋅ 42 ⋅ 31 ⋅ 32)111 ≈ 2.69.
 ∗
=
Latency ̅ ≈ 12 second to finalize a transaction which includes sending it for validation to
the relay chain and inclusion into the destination ledger [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ], [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ], [
          <xref ref-type="bibr" rid="ref25">25</xref>
          ].
        </p>
        <p>
          Throughput μ ≈ 2000
ability to validate transactions depending on allocated cores and including limitations on messages
to parachains [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ], [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ], [
          <xref ref-type="bibr" rid="ref25">25</xref>
          ].
        </p>
        <p>
          Cost  ̅ ≈ 5 includes the original transaction and XCMP message on chain A, entry on the
relay chain, and respective transaction and XCMP receipt on chain B [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ], [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ], [
          <xref ref-type="bibr" rid="ref25">25</xref>
          ].
        </p>
        <p>
          Data overhead   ≈ 1536 bytes for three XCMP entries on chain A, relay, and B
respectively [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ], [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ], [
          <xref ref-type="bibr" rid="ref25">25</xref>
          ]. Each XCMP message on both chain A and B contain header information
and payload, while relay chain record hold Merkel proof.
        </p>
        <p>Security Score:</p>
        <p>
          Shared Security (SS = 5) shared validation pool coordinated through a relay chain [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ], [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ].
Coordinator Centralization (CC = 1) relay chain involved in all inter-chain operations [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ],
[
          <xref ref-type="bibr" rid="ref11">11</xref>
          ].
        </p>
        <p>
          Message Verification (MV=4) XCMP/XCM with verification of proof from the relay chain
[
          <xref ref-type="bibr" rid="ref10">10</xref>
          ], [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ].
        </p>
        <p>
          Data Retention &amp; Redundancy (DR = 3) relay finality and checkpoints for data verification
[
          <xref ref-type="bibr" rid="ref10">10</xref>
          ], [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ].
        </p>
        <p>
          Blast Radius / Containment (BR = 3) parachain faults are isolated but relay faults could
propagate [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ], [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ].
        </p>
        <p>
          Shared Security (SS = 5) shared validation pool coordinated through a beacon chain [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ].
Coordinator Centralization (CC = 1) centralized beacon chain is responsible for security
management and coordination [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ].
        </p>
        <p>
          Message Verification (MV=4) on-chain verification of roots received from the beacon chain
[
          <xref ref-type="bibr" rid="ref9">9</xref>
          ].
        </p>
        <p>
          Data Retention &amp; Redundancy (DR = 2) the beacon stores periodic roots for data verification
but does not support data restoration [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ].
        </p>
        <p>
          Blast Radius / Containment (BR = 4) security breaches are isolated to a child chain but
potential major issues could happen if the beacon itself gets compromised [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ].
        </p>
        <p>Composite Security Score:</p>
        <p>ℎ
Normalized Security Score:
(16)
(17)
(18)
(19)</p>
      </sec>
      <sec id="sec-3-5">
        <title>3.4. Cosmos</title>
        <p>
          Latency ̅ ≈ 30 seconds to finalize a transaction which includes request commitment on chain
A, its transfer to the hub, and later to the chain B [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ], [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ], [
          <xref ref-type="bibr" rid="ref25">25</xref>
          ].
        </p>
        <p>
          Since Cosmos is a distributed system without an apparent limitation in scale, its throughput final
estimation  ∗ = 1.5 [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ], [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ].
        </p>
        <p>
          Cost  ̅ ≈ 8 in case if we consider a single hub hop. Each hop would include commitment
and deletion records on the source and receipt and acknowledgement records on the destination [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ],
[
          <xref ref-type="bibr" rid="ref13">13</xref>
          ].
        </p>
        <p>
          Data overhead   ≈ 192 bytes the commitment and acknowledgement records [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ], [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ].
Each additional hop would increase the value but for estimation purposes we will consider only the
most frequent case.
        </p>
        <p>Security Score:
•
•
•
•
•</p>
        <p>
          Shared Security (SS = 1) connects uncoordinated ledgers, does not ensure shared security
[
          <xref ref-type="bibr" rid="ref12">12</xref>
          ], [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ].
        </p>
        <p>
          Coordinator Centralization (CC = 4) does not enforce centralized topology, multiple hubs
could be used for connecting ledgers [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ], [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ].
        </p>
        <p>
          Message Verification (MV=4) on-chain light clients verify headers and proofs with
minimized trust [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ], [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ].
        </p>
        <p>
          Data Retention &amp; Redundancy (DR = 2) light clients windowing and pruning are typical,
proof is isolated to a short context [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ], [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ].
        </p>
        <p>
          Blast Radius / Containment (BR = 5) security breach on one chain does not propagate to
another since Cosmos serves as a communication media rather than a shared security
coordinator [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ], [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ].
(20)
(21)
Composite Security Score:
        </p>
        <p>Normalized Security Score:
= (13 ⋅ 43 ⋅ 42 ⋅ 21 ⋅ 52)111 ≈ 2.68.
 ∗
=</p>
      </sec>
      <sec id="sec-3-6">
        <title>3.5. Avalanche</title>
        <p>
          Latency ̅ ℎ ≈ 4 seconds to finalize a transaction which includes commitment to chain A, its
transfer through the teleporter, and later to the chain B [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ], [
          <xref ref-type="bibr" rid="ref25">25</xref>
          ].
        </p>
        <p>
          Avalanche is a highly distributed system without an apparent limitation in scale of transaction
processing. Though it could have unlimited number of subnetworks, the primary chain is responsible
for recording the assignments of validators which could become a bottleneck. Its throughput final
estimation  ∗ ℎ = 1 [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ].
        </p>
        <p>
          Cost   ̅ ℎ ≈ 2 in case if we consider AWM/Teleporter. One record for the request is written
on chain A and another for the import on the chain B [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ]. There are no intermediary writes to
internal chains.
        </p>
        <p>
          Data overhead   ℎ ≈ 512 bytes where each side writes a normal transaction that carries
an AWM proof including the message, BLS aggregate signature, and the metadata [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ].
        </p>
        <p>The apparent performance of the Avalanche network stems from its internal organization and
reliance on a few coordinating networks. In contrast to completely disjointed systems such as
Cosmos, Avalanche requires each subnetwork to register and manage its validators through the main
chain. This cohesion allows boosting performance but at the cost of a potential blast in case of the
main chain compromise.
Composite Security Score:</p>
        <p>Normalized Security Score:
•</p>
        <p>
          Shared Security (SS = 4) centralized pooling in place with subnets including validators from
the primary chain [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ].
        </p>
        <p>
          Coordinator Centralization (CC = 2) shared security coordination network [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ].
Message Verification (MV=4) cryptographic proof through the warp mechanism [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ].
Data Retention &amp; Redundancy (DR = 2) history is local to the subchain [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ].
        </p>
        <p>
          Blast Radius / Containment (BR = 4) faults are typically isolated to a subnetwork [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ].
        </p>
      </sec>
      <sec id="sec-3-7">
        <title>3.6. Tree-based Architecture</title>
        <p>
          Latency could vary greatly depending on the communication path. It could be either with the siblings
or to the distant nodes. Since the design of architecture assumes high cohesion, the most frequent
method of communication should be done through the bough chain where latency should be similar
to Ethereum 2.0. ̅ − ≈ 984 seconds to finalize a transaction which includes sending it for
validation to the relay chain and inclusion into the destination ledger [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ], [
          <xref ref-type="bibr" rid="ref23">23</xref>
          ], [
          <xref ref-type="bibr" rid="ref24">24</xref>
          ].
        </p>
        <p>
          The tree-based architecture in its essence as a data structure does not strictly impose the
communication mode between siblings, but the original article assumed coordination like Ethereum
2.0 between siblings. Since the Trunk chain underpins the entire system μ − ≈ 6720
transactions per second [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ].
        </p>
        <p>
          Cost  ̅ − = 4 similar to estimation for Ethereum 2.0 but could grow significantly larger
for distant-node communication [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ].
        </p>
        <p>
          Data overhead   − = 544 bytes for coordination through the bough chain between
siblings [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ]. Again, this could grow with N factor depending on the number of hops needed for
communication with distant nodes.
        </p>
        <p>Security Score:</p>
        <p>Shared Security (SS = 2) shared security within boughs and its direct child network.
Coordinator Centralization (CC = 2) has a major coordination network (The Tree Trunk).
Message Verification (MV=4) trust minimized cryptographic proofs for most operations.
Data Retention &amp; Redundancy (DR = 5) explicit and configurable N-ancestor data retention.
Blast Radius / Containment (BR = 3) faults are typically isolated to a subnetwork but could
propagate if happen on local coordination networks.</p>
        <p>Composite Security Score:</p>
        <p>−
Normalized Security Score:
= (23 ⋅ 23 ⋅ 42 ⋅ 51 ⋅ 32)111 ≈ 2.65.</p>
        <p>(24)
2.65 (25)
 ∗ − = 5 ≈ 0.53.</p>
        <p>The purpose of the Tree-based architecture was to improve the horizontal scalability capabilities
of multichain systems.</p>
      </sec>
      <sec id="sec-3-8">
        <title>3.7. DAG-based Architecture</title>
        <p>In contrast to the tree-based, the newly proposed DAG-based architecture assumes communication
expected to be the dominant way due to cohesion principles, the estimated latency ̅ − = 12
second to finalize a transaction which includes sending it for validation to the relay chain and
inclusion into the destination.</p>
        <p>Throughput in such an architecture is not limited to the trunk chain or any other general
coordination network, making its final estimation  ∗ − = 1.5. There could be many root
chains connecting different branches. Moreover, cross-connection facilitates efficient transactions.</p>
        <p>
          Cost  ̅ − = 5 similar to Polkadot and includes the original transaction and XCMP
message on chain A, entry on the relay chain, and respective transaction and XCMP receipt on chain
B [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ], [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ].
        </p>
        <p>
          Data overhead between sibling chains is similar to the Polkadot,   − = 1536 bytes for
three XCMP entries on chain A, relay, and B respectively [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ], [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ]. Each XCMP message on both
chain A and B contain header information and payload, while relay chain record hold Merkel proof.
The estimation would differ for a multi-hop transfer but due to cohesion principles, such transactions
should be rare.
        </p>
        <p>Security Score:
•</p>
        <p>Shared Security (SS = 3) shared security within boughs and its direct child network with
additional governance structures that could be shared.</p>
        <p>Coordinator Centralization (CC = 4) no global coordination network.</p>
        <p>Message Verification (MV=4) trust minimized cryptographic proofs for most operations.
Data Retention &amp; Redundancy (DR = 5) explicit and configurable N-ancestor data retention.
Blast Radius / Containment (BR = 3) faults are typically isolated to a subnetwork but could
propagate if happen on local coordination networks.
(26)
(27)
Composite Security Score:</p>
        <p>−
Normalized Security Score:</p>
        <p>= (33 ⋅ 43 ⋅ 42 ⋅ 51 ⋅ 32)111 ≈ 3.58.
 ∗
−
=</p>
      </sec>
      <sec id="sec-3-9">
        <title>3.8. Cumulative Assessment Results</title>
        <p>The results obtained in the previous subsections could be organized in a table for a more convenient
comparison.</p>
        <p>From the results we can see the improvement within DAG-based architecture over the tree-based.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Conclusions</title>
      <p>The increasing growth in traffic related to decentralized operations has led to a surge in research on
scalable multichain systems. Novel consensus protocols and inter-chain protocols are being
developed to allow the sustainable growth of distributed and decentralized computations. In this
based multichain system by generalizing it to a DAG-based system.</p>
      <p>A new coordination hierarchy has been discussed, showcasing previous consensus constraints
and their mitigation. The DAG-based approach allowed us to avoid a single bottleneck tied to the
trunk chain of the system. In contrast to the tree-based architecture, multiple authoritative
connection points could be established, allowing for parallelized request flow.</p>
      <p>Additionally, the DAG-based approach allows for improving the security properties of the system
by enabling multiple higher-level validations of transactions. The intersection of security boundaries
allows spreading the validation responsibility to participants in multiple networks, which improves
the security guarantees.</p>
      <p>Overall, the purpose of this article is to improve a previously developed tree-based architecture
by leveraging the properties of a DAG. A comparison between the proposed architecture and existing
systems has been provided, showing its relevance. The research aims to spark further interest in
building scalable and secure systems.</p>
    </sec>
    <sec id="sec-5">
      <title>Declaration on Generative AI</title>
      <p>The authors have not employed any Generative AI tools.</p>
    </sec>
    <sec id="sec-6">
      <title>Acknowledgements</title>
      <p>The authors would like to thank colleagues and reviewers for their valuable comments and
suggestions, which helped improve the quality of this work. No external funding was received for
this research.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Gad</surname>
            ,
            <given-names>A.G.</given-names>
          </string-name>
          , et al.:
          <article-title>Emerging Trends in Blockchain Technology and Applications: A Review and Outlook</article-title>
          .
          <source>Journal of King</source>
          Saud University - Computer and Information Sciences (
          <year>2022</year>
          ). https://doi.org/10.1016/j.jksuci.
          <year>2022</year>
          .
          <volume>03</volume>
          .007
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Habib</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          , et al.:
          <source>Blockchain Technology: Benefits</source>
          , Challenges, Applications, and
          <article-title>Integration of Blockchain Technology with Cloud Computing</article-title>
          .
          <source>Future Internet</source>
          <volume>14</volume>
          (
          <issue>11</issue>
          ),
          <volume>341</volume>
          (
          <year>2022</year>
          ). https://doi.org/10.3390/fi14110341
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Gilbert</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lynch</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          :
          <article-title>The CAP theorem</article-title>
          .
          <source>Computer</source>
          <volume>45</volume>
          (
          <issue>2</issue>
          ),
          <fpage>30</fpage>
          <lpage>36</lpage>
          (
          <year>2012</year>
          ). https://doi.org/10.1109/
          <string-name>
            <surname>MC</surname>
          </string-name>
          .
          <year>2011</year>
          .389
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Taherdoost</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          :
          <article-title>Smart Contracts in Blockchain Technology: A Critical Review</article-title>
          .
          <source>Information</source>
          <volume>14</volume>
          (
          <issue>2</issue>
          ),
          <volume>117</volume>
          (
          <year>2023</year>
          ). https://doi.org/10.3390/info14020117
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Thibault</surname>
            ,
            <given-names>L.T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sarry</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hafid</surname>
            ,
            <given-names>A.S.</given-names>
          </string-name>
          :
          <article-title>Blockchain Scaling using Rollups: A Comprehensive Survey</article-title>
          .
          <source>IEEE Access</source>
          ,
          <volume>1</volume>
          (
          <year>2022</year>
          ). https://doi.org/10.1109/access.
          <year>2022</year>
          .3200051
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Liu</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          , et al.:
          <article-title>Distributed and Parallel Blockchain: Towards A Multi-Chain System with Enhanced Security</article-title>
          .
          <source>IEEE Transactions on Dependable and Secure Computing</source>
          ,
          <volume>1</volume>
          <fpage>16</fpage>
          (
          <year>2024</year>
          ). https://doi.org/10.1109/tdsc.
          <year>2024</year>
          .3417531
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Hashim</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shuaib</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zaki</surname>
          </string-name>
          , N.:
          <article-title>Sharding for Scalable Blockchain Networks</article-title>
          .
          <source>SN Computer Science</source>
          <volume>4</volume>
          (
          <issue>2</issue>
          ) (
          <year>2023</year>
          ). https://doi.org/10.1007/s42979-022-01435-z
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Stone</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          : Trustless, Privacy-Preserving
          <source>Blockchain Bridges. arXiv 2102.04660</source>
          (
          <year>2021</year>
          ). https://doi.org/10.48550/arXiv.2102.04660
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Kudzin</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          , et al.:
          <source>Scaling Ethereum 2.0s Cross-Shard Transactions with Refined Data Structures. Cryptography</source>
          <volume>6</volume>
          (
          <issue>4</issue>
          ),
          <volume>57</volume>
          (
          <year>2022</year>
          ). https://doi.org/10.3390/cryptography6040057
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Petrowski</surname>
            ,
            <given-names>J.:</given-names>
          </string-name>
          <article-title>The Path of a Parachain Block</article-title>
          . Polkadot. https://polkadot.com/blog/the-path
          <article-title>-ofa-parachain-block</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Abbas</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Caprolu</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Di</surname>
            <given-names>Pietro</given-names>
          </string-name>
          ,
          <string-name>
            <surname>R.</surname>
          </string-name>
          :
          <article-title>Analysis of Polkadot: Architecture, Internals, and Contradictions</article-title>
          .
          <source>In: 2022 IEEE International Conference on Blockchain (Blockchain)</source>
          , pp.
          <fpage>61</fpage>
          <lpage>70</lpage>
          . IEEE,
          <string-name>
            <surname>Espoo</surname>
          </string-name>
          (
          <year>2022</year>
          ). https://doi.org/10.1109/Blockchain55522.
          <year>2022</year>
          .00019
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Essaid</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kim</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ju</surname>
          </string-name>
          , H.:
          <article-title>Inter-Blockchain Communication Message Relay Time Measurement and Analysis in Cosmos</article-title>
          .
          <source>Applied Sciences</source>
          <volume>13</volume>
          (
          <issue>20</issue>
          ),
          <volume>11135</volume>
          (
          <year>2023</year>
          ). https://doi.org/10.3390/app132011135
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Peelam</surname>
            ,
            <given-names>M.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chaurasia</surname>
            ,
            <given-names>B.K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sharma</surname>
            ,
            <given-names>A.K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chamola</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sikdar</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Unlocking the Potential of Interconnected Blockchains: A Comprehensive Study of Cosmos Blockchain Interoperability</article-title>
          .
          <source>IEEE Access 12, 171753</source>
          <volume>171776</volume>
          (
          <year>2024</year>
          ). https://doi.org/10.1109/ACCESS.
          <year>2024</year>
          .3497298
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Avalanche</surname>
            <given-names>Docs: Primary</given-names>
          </string-name>
          <string-name>
            <surname>Network</surname>
          </string-name>
          . Avalanche Docs. https://docs.avax.network/protocol/primary-network
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Kotov</surname>
            ,
            <given-names>M.S.</given-names>
          </string-name>
          :
          <article-title>Tree-based state sharding for scalability and load balancing in multichain systems</article-title>
          .
          <source>Electronic Professional Scientific Journal «Cybersecurity: Education</source>
          , Science, Technique»
          <volume>2</volume>
          (
          <issue>26</issue>
          ),
          <fpage>392</fpage>
          <lpage>408</lpage>
          (
          <year>2024</year>
          ). https://doi.org/10.28925/
          <fpage>2663</fpage>
          -
          <lpage>4023</lpage>
          .
          <year>2024</year>
          .
          <volume>26</volume>
          .702
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>Fan</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          , Zhang,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            ,
            <surname>Shi</surname>
          </string-name>
          ,
          <string-name>
            <surname>C.</surname>
          </string-name>
          :
          <article-title>Directed acyclic graph structure learning from dynamic graphs</article-title>
          .
          <source>In: Proceedings of the AAAI Conference on Artificial Intelligence</source>
          , vol.
          <volume>37</volume>
          (
          <issue>6</issue>
          ),
          <fpage>7512</fpage>
          <lpage>7521</lpage>
          (
          <year>2023</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>Directed</given-names>
            <surname>Acyclic</surname>
          </string-name>
          <article-title>Graph (DAG). Hazelcast Foundations: Distributed Computing</article-title>
          . https://hazelcast.com/foundations/distributed-computing/
          <article-title>directed-acyclic-graph/ (last accessed</article-title>
          <year>2025</year>
          /07/22)
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <surname>Callahan</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Allman</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rabinovich</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>On modern DNS behavior and properties</article-title>
          .
          <source>SIGCOMM Comput. Commun. Rev</source>
          .
          <volume>43</volume>
          (
          <issue>3</issue>
          ),
          <fpage>7</fpage>
          <lpage>15</lpage>
          (
          <year>2013</year>
          ). https://doi.org/10.1145/2500098.2500100
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>van der Toorn</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Müller</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dickinson</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hesselman</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sperotto</surname>
          </string-name>
          , A.,
          <string-name>
            <surname>van</surname>
            Rijswijk-Deij,
            <given-names>R.</given-names>
          </string-name>
          :
          <article-title>Addressing the challenges of modern DNS: a comprehensive tutorial</article-title>
          .
          <source>Comput. Sci. Rev</source>
          .
          <volume>45</volume>
          ,
          <issue>100469</issue>
          (
          <year>2022</year>
          ). https://doi.org/10.1016/j.cosrev.
          <year>2022</year>
          .100469
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20] ISO/IEC 27005:
          <year>2018</year>
          <article-title>Information technology Security techniques Information security risk management</article-title>
          .
          <source>International Organization for Standardization</source>
          (
          <year>2022</year>
          ). https://www.iso.org/standard/80585.html (last accessed
          <year>2025</year>
          /07/28)
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>Joint</given-names>
            <surname>Task Force Transformation</surname>
          </string-name>
          <article-title>Initiative: Guide for conducting risk assessments</article-title>
          .
          <source>NIST Special Publication 800-30 Rev. 1. National Institute of Standards and Technology</source>
          ,
          <string-name>
            <surname>Gaithersburg</surname>
          </string-name>
          (
          <year>2012</year>
          ). https://doi.org/10.6028/NIST.SP.
          <fpage>800</fpage>
          -
          <lpage>30r1</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <surname>Siegel</surname>
            ,
            <given-names>I.H.</given-names>
          </string-name>
          :
          <article-title>Index-number differences: geometric means</article-title>
          .
          <source>J. Am. Stat. Assoc</source>
          .
          <volume>37</volume>
          (
          <issue>218</issue>
          ),
          <fpage>271</fpage>
          <lpage>274</lpage>
          (
          <year>1942</year>
          ). https://doi.org/10.1080/01621459.
          <year>1942</year>
          .10500636
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          <source>[23] The Beacon Chain: Ethereum</source>
          <volume>2</volume>
          .0 explainer. https://ethos.dev/beacon-chain
          <source>(last accessed</source>
          <year>2025</year>
          /08/23)
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <article-title>Consensys: The Ethereum 2.0 Beacon Chain Explained</article-title>
          . https://consensys.io/blog/the-ethereum2-0
          <article-title>-beacon-chain-explained (last accessed</article-title>
          <year>2025</year>
          /08/06)
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <article-title>LCX: Blockchain Platform Comparison: A Deep Dive into the Top Networks</article-title>
          . https://www.lcx.
          <article-title>com/blockchain-platform-comparison-a-deep-dive-into-the-top-networks/ (last accessed</article-title>
          <year>2025</year>
          /08/06)
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>