Implementasi Monero Mining Pada Raspberry Pi 4 Model B
Abstract
In the world of cryptocurrency, Monero is one of the cryptocurrencies that was created in 2014. Monero uses CryptoNight as a proof-of-work algorithm to get cryptocurrency coins. The proof-of-work algorithm requires miners to have tools with large computing power so they are competing to buy tools with large computing power, but there is a problem with the electricity generated is also large. The Raspberry Pi was tested as an alternative cryptocurrency mining tool that has economic value. In this study, we implemented the Raspberry Pi 4 Model B to calculate how much computing power was generated and how to mine using this tool. The design of this system makes the tool made quite compact and efficient which helps the convoluted mining process. The rising trend of cryptocurrencies has resulted in an increasing demand for economical mining tools. The Raspberry Pi crypto mining system helps provide an economical and energy efficient tool.
Downloads
References
A. Berentsen, “Aleksander Berentsen Recommends ‘Bitcoin: A Peer-to-Peer Electronic Cash System’ by Satoshi Nakamoto,” in 21st Century Economics, B. S. Frey and C. A. Schaltegger, Eds. Cham: Springer International Publishing, 2019, pp. 7–8.
Tim CNN Indonesia, “9 Negara yang Melegalkan Bitcoin,” CNN Indonesia, May 21, 2021.
C. G. Raji, A. Vinish, G. Gopakumar, and K. Shahil, “Implementation of Bitcoin Mining using Raspberry Pi,” in 2019 International Conference on Smart Systems and Inventive Technology (ICSSIT), Nov. 2019, no. November, pp. 1087–1092, doi: 10.1109/ICSSIT46314.2019.8987802.
F. Knirsch, A. Unterweger, and D. Engel, “Implementing a blockchain from scratch: why, how, and what we learned,” EURASIP J. Inf. Secur., vol. 2019, no. 1, p. 2, Dec. 2019, doi: 10.1186/s13635-019-0085-3.
K. R. Ozyilmaz and A. Yurdakul, “Designing a Blockchain-Based IoT With Ethereum, Swarm, and LoRa: The Software Solution to Create High Availability With Minimal Security Risks,” IEEE Consum. Electron. Mag., vol. 8, no. 2, pp. 28–34, Mar. 2019, doi: 10.1109/MCE.2018.2880806.
D. Draghicescu, A. Caranica, A. Vulpe, and O. Fratu, “Crypto-Mining Application Fingerprinting Method,” in 2018 International Conference on Communications (COMM), Jun. 2018, pp. 543–546, doi: 10.1109/ICComm.2018.8484745.
Monero, “CryptoNight,” 2023. https://monerodocs.org/proof-of-work/cryptonight/ (accessed Jan. 28, 2023).
E. Le Jamtel, “Swimming in the Monero pools,” in 2018 11th International Conference on IT Security Incident Management & IT Forensics (IMF), May 2018, pp. 110–114, doi: 10.1109/IMF.2018.00016.
S. Noether and A. Mackenzie, “Ring Confidential Transactions,” Ledger, vol. 1, pp. 1–18, Dec. 2016, doi: 10.5195/ledger.2016.34.
A. Biryukov and S. Tikhomirov, “Security and privacy of mobile wallet users in Bitcoin, Dash, Monero, and Zcash,” Pervasive Mob. Comput., vol. 59, p. 101030, Oct. 2019, doi: 10.1016/j.pmcj.2019.101030.
M. Bedford Taylor, “The Evolution of Bitcoin Hardware,” Computer (Long. Beach. Calif)., vol. 50, no. 9, pp. 58–66, 2017, doi: 10.1109/MC.2017.3571056.
J. W. Jolles, “Broad-scale applications of the Raspberry Pi: A review and guide for biologists,” Methods Ecol. Evol., vol. 12, no. 9, pp. 1562–1579, 2021, doi: 10.1111/2041-210X.13652.
K. S. Salamah, I. U. Vistalina, and M. I. Danifan, “Sistem Deteksi Model Menggunakan Metode Background,” J. Inform. dan Rekayasa Elektron., vol. 5, no. 1, pp. 103–110, 2022, doi: https://doi.org/10.36595/jire.v5i1.520.
W. Bagye, T. Azizah, and M. F. Zulkarnaen, “Alat Pengaman Kandang Berbasis Mikrokontroler Arduino Uno,” J. Inform. dan Rekayasa Elektron., vol. 1, no. 2, p. 62, 2018, doi: 10.36595/jire.v1i2.61.
G. Arva and T. Fryza, “Embedded video processing on Raspberry Pi,” in 2017 27th International Conference Radioelektronika (RADIOELEKTRONIKA), Apr. 2017, pp. 1–4, doi: 10.1109/RADIOELEK.2017.7937598.
R. N. Dasmen and N. Halim, “Implementasi Papan Informasi Digital Menggunakan Raspberry Pi 3 Pada Stiper Sriwigama Palembang,” Comput. J. Comput. Sci. Inf. Syst., vol. 2, no. 2, p. 196, Oct. 2018, doi: 10.24912/computatio.v2i2.2570.
Copyright (c) 2023 Jurnal Ilmiah Informatika
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.