【Abstract】Link prediction in co-word network is a quantitative method widely used to predict the research trends and direction of disciplines. It has aroused extensive attention from academia and the industry domain. Most of the methods to date predicting co-word network links are only based on the topology of the co-word network but ignore the characteristics of network nodes. This paper proposes an approach with an attempt to exploit network nodes' semantic information to improve link prediction in co-word network. Our work involves three major tasks. First, a new semantic feature of network nodes (based on the original technology) was proposed. Second, multiple ground-truth data sets which consist of literature from the Information Science and Library Science, Blockchain and Primary Health Care fields are built. Third, to validate the effectiveness of the new feature and prior ones, extensive prediction experiments are carried out based on the data set we construct. The result shows that the new predictive models with semantic information obtain more than 80% of overall accuracy and more than 0.7 of Area Under Curve, which indicates the effectiveness and stability of the new feature in different feature sets and algorithm sets.
【Abstract】Proof-of-Stake cryptocurrencies avoid many of the computational and environmental costs associated with Proof-of-Work protocols. However, they must address the nothing-at-stake problem, where a validator might attempt to sign off on competing blocks, with the hopes of earning coins regardless of which block becomes accepted as part of the blockchain. Cryptocurrencies such as Tendermint resolve this challenge by requiring validators to bond coins, which can be seized from a validator that is caught signing two competing blocks. Nevertheless, as the number of validators increases, it becomes increasingly infeasible to effectively monitor all validators, and to reach consensus. In this work, we incentivize proper block monitoring by allowing validators to form tontines. In the real world, tontines are financial agreements where payouts to each member increase as the number of members decreases. In our system, a tontine is a group of validators that monitor each other's behavior, murdering any cheating tontine members to seize their stake. As the number of validators in a tontine is smaller than the number of validators in the currency as a whole, members can effectively police each other. We propose two methods whereby a Tendermint-like currency can be extended to allow for the creation of tontines: a pure PoS model, and a hybrid Proof-of-Stake/Proof-of-Work model. We describe snitch mechanisms for both the inter- and intra-tontine setting, argue our incentive mechanisms increase monitoring, and describe how it handles a variety of possible attacks. We extend our model to act as a validator delegated cryptocurrency, with the users having an incentive to partially participate. We show that these strategies may benefit validators as well as speed up the block formation process. Moreover, we describe a prototype implementation of TontineCoin, and perform various experiments that support our theoretical analysis
【Abstract】Ability to perform fast analysis on massive public blockchain transaction data is needed in various applications such as tracing fraudulent financial transactions. The blockchain data is continuously growing and is organized as a sequence of blocks containing transactions. This organization, however, cannot be used for parallel graph algorithms which need efficient distributed graph data structures. Using message passing libraries (MPI), we develop a scalable cluster-based system that constructs a distributed transaction graph in parallel and implement various transaction analysis algorithms. We report performance results from our system operating on roughly 5 years of 10.2 million block Ethereum Mainnet blockchain data. We report timings obtained from tests involving distributed transaction graph construction, partitioning, page ranking of addresses, degree distribution, token transaction counting, connected components finding and our new parallel blacklisted address trace forest computation algorithm on a 16 node economical cluster set up on the Amazon cloud. Our system is able to construct a distributed graph of 766 million transactions in 218 s and compute the forest of blacklisted address traces in 32 s.
【Abstract】With the rapid development of unmanned aerial vehicles assisted applications enabled with a communication system, they are open to various malicious attacks. As a new form of flying things, they can access the network for better communication via the aerial base station. Most of the Unmanned aerial vehicles assisted flying objects' optimal path selection schemes does not consider the path deviation. In path deviation attacks, secure data transmission are not addressed in existing works. The secure communication process between Unmanned aerial vehicles and base station are exploited through security-based attacks. Moreover, path loss issue leads to multicast packet loss and unsecured broadcast. The existing network architecture setup does not fulfill the secure data communication and privacy issues. In this paper, Blockchain is utilized to investigate the secure communication between Unmanned aerial vehicles to Wireless Unmanned aerial vehicles Base stations. Since the destination information is dynamic under an uncertain environment, it will cause a delay in data communication. Unmanned aerial vehicles are more vulnerable to security attacks. The proposed blockchain-based architecture supports secure data communication in Unmanned aerial vehicles uncertain environments. To improve network security, this paper designs a modified particle swarm optimization method for better path selection. Through these experimental results, a blockchain-based data communication scheme is outer performed concerning network security.
【Abstract】In wireless sensor networks (WSN), data aggregation is a widely used method. Security issues like data integrity and data confidentiality became a significant concern in data aggregation when the sensor network is deployed in a hostile environment. Many researches may carry out several works to tolerate these security issues. However, there were some limitations like delay, the arrival rate of packets, and so on. Hence, to overcome the existing problems, this approach offers a blockchain-dependent data aggregation scheme in WSN. The main intention of the proposed work is to generate a certificateless key generation so that the proposed system's secrecy rate is improved. The use of blockchain is employed for security purposes, and it enables the user to acquire the information stored internally in an effortless manner. Initially, deployment of sensor and base station (BS) is carried out, followed by node registration at which the public/private keys are generated. The computation of private hash values is carried by performing certificateless key generation. After that, the formation of blockchain is made using the PoW (Proof of Work) detection algorithm followed by the aggregation of data. In the data aggregation process, Elgammal based cryptographic approach is introduced to acquire member data, perform aggregation logic, and transfer the aggregated data. Finally, cluster-based routing is established with the use of Knapsack based cluster routing strategy. The performance investigation of the proposed system is estimated and the outcomes attained are compared with the existing techniques in terms of arrival rate, average delay, and the delay ratio of the packets. The investigation illustrates that the suggested approach is better than the traditional techniques.
【Abstract】As the (Covid-19) pandemic spreads, the creativity of the scientific community is thriving while trying to control the situation. They are trying to treat patients viably and work with the almost exhausted medical equipment and staff, while growing new, successful antibodies. Successful screening of SARS-CoV-2 empowers fast and proficient determination of COVID-19 and can relieve the weight on medical care frameworks. Numerous forecast models are being created to comprehend and prognosticate the spread of the pandemic and to stay away from the following wave. But in the coming time, we can be sure that the models would experience the ill effects of a few issues, security being one of them. All the models need to be built in such a way that the investigation task gets successfully conducted without compromising the privacy and security of the patients. To take care of this, we propose a blockchain framework for sharing patients' personal data or medical reports. A blockchain will take care of the integrity part, but we still need to worry about confidentiality. Therefore, combining a genetic approach with a blockchain seemed like a good idea. A twofold hybrid methodology is proposed in this paper to tackle the issue of confidentiality. The outcomes displayed high entropy accomplishment for the utilized dataset. The sensitivity of the plaintext and ciphertext is also checked and compared with existing approaches which thus demonstrates the security of the proposed approach in the given setting.
【Abstract】Demand for Halal food has significantly increased with the growing Muslim population and society's interest in sustainable food production. However, there has been an increase in concerns regarding the Halal food labeling transparency process, with misleading labels found across the world. Blockchain-based traceability systems are a potential solution for current limitations in monitoring the production process of food due to its inherent decentralization and immutable nature. The technology allows stakeholders, including consumers, to promote farm-to-fork transparency, where traceability is a core component. This paper will explore the blockchain-based traceability system use case implemented by the Indonesian poultry player PT Sreeya Sewu Indonesia Tbk. Utilizing a blockchain-based system as a foundation for traceability shows promising results: data throughout the process is recorded permanently and difficult to tamper. Although the system does not eliminate the possibility of incorrect information being recorded, the same immutability characteristics will keep the new knowledge of fraud permanent if found during the audit. This layer of accountability contributes to the transparency that benefits both the consumers and stakeholders of the value chain.
【Abstract】Cryptocurrencies often tend to maintain a publically accessible ledger of all transactions. This open nature of the transactional ledger allows us to gain macroeconomic insight into the USD 1 Trillion crypto economy. In this paper, we explore the free market-based economy of eight major cryptocurrencies: Bitcoin, Ethereum, Bitcoin Cash, Dash, Litecoin, ZCash, Dogecoin, and Ethereum Classic. We specifically focus on the aspect of wealth distribution within these cryptocurrencies as understanding wealth concentration allows us to highlight potential information security implications associated with wealth concentration. We also draw a parallel between the crypto economies and real-world economies. To adequately address these two points, we devise a generic econometric analysis schema for cryptocurrencies. Through this schema, we report on two primary econometric measures: Gini value and Nakamoto Index which report on wealth inequality and 51% wealth concentration respectively. Our analysis reports that, despite the heavy emphasis on decentralization in cryptocurrencies, the wealth distribution remains in-line with the real-world economies, with the exception of Dash. We also report that 3 of the observed cryptocurrencies (Dogecoin, ZCash, and Ethereum Classic) violate the honest majority assumption with less than 100 participants controlling over 51% wealth in the ecosystem, potentially indicating a security threat. This suggests that the free-market fundamentalism doctrine may be inadequate in countering wealth inequality within a crypto-economic context: Algorithmically driven free-market implementation of these cryptocurrencies may eventually lead to wealth inequality similar to those observed in real-world economies.
【Abstract】Internet of things (IoT) is a world wide network and set of paradigms that are intended to allow communications between anything, anytime and anywhere. However, connected objects are in most cases vulnerable due to their constrained resources and the inherent IoT environment conditions, basically, the dynamic aspect, the heterogeneity, and the open and wireless medium of communication. Securing the IoT networks is still an open and challenging issue and the majority of traditional security mechanisms designed so far for Internet doesn't satisfy IoT security requirements. Recently, the use of emergent technologies such as Artificial Intelligence mechanisms, Blockchain and IoTA as a promising solutions to solve security and privacy problems has shown a yield remarkable performance. In this paper we outline the security requirements proposed for the IoT. We provide a comprehensive taxonomy of the major security issues based on IoT architecture, attack implications and application areas. Furthermore, we tabulate and map the different countermeasures used to solve these threats taking into account new advances in security approaches. Finally, we discuss and compare the enumerated countermeasures for IoT security.
【Abstract】Supply chain management (SCM) involves an interconnected structure of facilities that produces elements or compounds for transforming into a semifinished compound. After completion, the final compound is delivered to customers via a distribution system. Owing to ever-changing customer demands, increasingly efficient and resilient SCM is necessary, which requires support from the latest technologies. Therefore, this paper presents an overview of the latest technologies in SCM and logistics. The management of a supply chain and role of the different actors involved differ from industry to industry and company to company. Consequently, SCM has become a crucial issue to manufacturers, professionals and researchers. The latest technologies identified in this paper include radio frequency identification, vehicular ad hoc networks, the Internet of things, robotics and artificial intelligence and blockchain. Moreover, the application of the aforementioned technologies in different industries and systems is discussed to understand how the technologies impact practitioners. Although not discussed thoroughly, other recent technology trends in SCM and logistics, such as machine learning, autonomous vehicles/drones, advanced analytics, cloud logistics, supergrid logistics, anticipatory logistics, omnichannel logistics and additive manufacturing (3D printing), are also highlighted in this paper. By understanding the advancements in SCM technology, the possible direction of future innovations can be effectively planned and articulated.
【Keywords】Supply Chain Management (SCM); Radio Frequency Identification (RFID); Vehicular ad hoc networks (VANET); Internet of Things (IoT); Robotic and Artificial Intelligent (AI); Blockchain
【Abstract】Governance for centralized organizational structures has long roots and well-developed frameworks, including for various specialty areas, such as IT or data governance. However, the introduction of blockchain technology as a supportive tool for implementing decentralized organizations requires a renewed focus for research in the area. The paper utilizes empirical data from blockchain ecosystems in the form of white papers (public communique of intention) to analyze their governance intentions. The empirical findings are based on a review of 241 blockchains and distributed ledger technology white papers, out of which 67 include explicit descriptions of how governance should be organized in the ecosystem. Our empirical research distinguishes between three categories of governance: objectives, mechanisms, and stakeholders. We further identify 28 features for these categories, which are described in an open encoding format. Hence, the paper contributes to the emerging blockchain research field, particularly to the decentralized aspects of blockchain governance research. This research also reveals that blockchain governance does not receive the attention it should as a large majority of ecosystems have not disclosed their governance intentions. The results can be utilized as a framework for future research. The results can also be helpful for industry when designing and developing governance systems.
【摘要】比特币引入了一种新的P2P(Peer to Peer)交易方法,并依靠其底层协议实现去中心化交易.然而,由于目前缺乏对比特币各底层协议的细粒度形式化分析和系统建模,比特币安全性并未被保证.本文通过设计多维度的比特币安全模型引理和细粒度的比特币模型规则,系统地抽象了多协议组合运行考虑下的比特币协议实体交互,完成了对比特币的形式化符号建模与自动化安全分析.与以前的工作相比,本文更细粒度地建模了比特币协议实体及其相关操作,并全面设计了满足比特币各实体需求的安全属性.此外,本文利用自动化形式化验证系统SmartVerif实现了无需额外手工推导证明的形式化验证实验,通过将本文所建模的符号模型规则与引理作为SmartVerif的输入,发现了比特币底层协议算力盗取攻击.