【Abstract】Based on coverage of over 660m news stories from LexisNexis News & Business between 2015-2021, we provide two new indices around the growing area of Central Bank Digital Currency (CBDC): the CBDC Uncertainty Index (CBDCUI) and CBDC Attention Index (CBDCAI). We show that both indices spiked during news related to new developments in CBDC and in relation to digital currency news items. We demonstrate that CBDC indices have a significant negative relationship with the volatilities of the MSCI World Banks Index, USEPU, and the FTSE AllWorld Index, and positive with the volatilities of cryptocurrency markets, foreign exchange markets, bond markets, VIX, and gold. Our results suggest that financial markets are more sensitive to CBDC Uncertainty than CBDC Attention as proxy by these indices. These findings contain useful insights to individual and institutional investors, and can guide policymakers, regulators, and the media on how CBDC evolved as a barometer in the new digital-currency era.
【Abstract】This study aimed to develop a blockchain-based IoT (BIoT) system for adopting automated personalized indoor temperature control to the building management system (BMS) while ensuring data privacy and security. A novel blockchain framework was proposed to register occupants and the personalized thermal sensation vote (TSV) prediction model for training, and control indoor temperatures while ensuring the security of occupant and building data. By implementing the proposed BIoT temperature control system, it could securely transfer about 30,000 personal data for TSV prediction at the same time using a single PC. Moreover, the personalized TSV prediction model could improve accuracy compared to the existing generalized TSV prediction model. As a result, the developed BIoT temperature control system could improve thermal comfort and energy efficiency compared to manual indoor temperature control. Occupants can ultimately be satisfied with the personalized temperature control in every room where required IoT devices are installed without privacy issues.
【Keywords】Blockchain; Smart building technologies; Building management system; Intelligent control system; Building automation system; IoT sensor network; Personalized control; Energy efficiency
【Abstract】Markets in which similar goods of different qualities are sold suffer from information asymmetries and their negative consequences. Dealers have established themselves, and mediate these markets through their use of quality signals. While these signals help to mitigate information asymmetries, these markets still function well below their optimum: a large share of goods sold are overpriced, and most of the benefits are reaped by intermediaries. In this paper we build on prior research that proposes the use of blockchain as an enabler for trusted, decentralized asset documentation. Applying a socio-technical lens, we describe how blockchain-enabled multi-party certification affords dealers the action potential to send signals that are more closely correlated to the unobservable quality of the underlying good (i.e., signals with a higher fit) than the signals they send today. We then both theorize and experimentally explore the market effects of the two types of signals. Using data from a laboratory market experiment with 210 participants, we find empirical evidence that multi-party certification affords dealers the action potential to send signals of significantly higher fit than those sent by intermediaries alone, leading to a reduction in information asymmetries, a more efficient allocation of goods, and an increase in market fairness.
【Abstract】Node selection plays an important role to design and implement the crowdsourced abnormal data detection system with the purpose of completing complex tasks to meet the requirements of computing performance. Even though the blockchain-based trusted node selection approaches improve the reliability of the crowdsourcing task results, they still need to consider the crowdsourcing cost during the node selection process so as to embody a tradeoff between reliability and cost. In this paper, we propose to study the node selection problem for the crowdsourced abnormal data detection under both reliability and cost requirements. First, the working node selection is modeled as an inverse 0 - 1 knapsack problem in order to minimize the crowdsourcing cost under the budget constraints of the trustworthiness of the selected working nodes, where blockchain is used to calculate the trustworthiness of the working nodes. Then, a trusted working node selection (TWNS) algorithm is developed to select trusted working nodes with the minimum crowdsourcing cost for crowdsourced abnormal data detection, where the branch and bound method is utilized to efficiently solve the inverse 0 - 1 knapsack problem. Finally, extensive simulations are conducted based on three groups of real world datasets. The results show that the trust value evaluation is accurate by using blockchain and the TWNS algorithm can ensure the reliability of the detection result. The crowdsourcing cost is minimized in trusted working node selection process. Compared to existing approaches without considering the cost, the TWNS algorithm reduces the crowdsourcing cost by 64.6%. (C) 2022 Elsevier B.V. All rights reserved.
【Abstract】In contrast to the traditional cloud-based IoT structure, which imposes high computation and storage demands on the central cloud server, edge computing can process data at the network edge. In this article, we present an edge computing data storage protocol employing the blockchain and the group signature, where the blockchain works as the trusted third party, offering a convenient platform for the data storage and protection, and the group signature is utilized for privacy identity information protection. Unlike the common group signature scheme, we propose a notion of simplified group signature, which removes the traceable property to improve the computational efficiency. In edge computing, the edge devices and the end devices can easily set up a long-term trust relationship through the cloud services, so the traceability may be of little utility in this scenario. In our protocol, we also design a new data validation scheme that has a proof size of only O(1).
【Abstract】Edge computing as a promising technology provides lower latency, more efficient transmission, and faster speed of data processing since the edge servers are closer to the user devices. Each edge server with limited resources can offload latency-sensitive and computation-intensive tasks from nearby user devices. However, edge computing faces challenges such as resource allocation, energy consumption, security and privacy issues, etc. Auction mechanisms can well characterize bidirectional interactions between edge servers and user devices under the above constraints in edge computing. As demonstrated by the existing works, auction and mechanism design approaches are outstanding on achieving optimal allocation strategy while guaranteeing mutual satisfaction among edge servers and user devices, especially for scenarios with scarce resources. In this paper, we introduce a comprehensive survey of recent researches that apply auction approaches in edge computing. Firstly, a brief overview of edge computing including three common edge computing paradigms, i.e., cloudlet, fog computing and mobile edge computing, is presented. Then, we introduce fundamentals and backgrounds of auction schemes commonly used in edge computing systems. After then, a comprehensive survey of applications of auction-based approaches applied for edge computing is provided, which is categorized by different auction approaches. Finally, several open challenges and promising research directions are discussed.
【Abstract】The COVID-19 pandemic has been experienced as the most significant global disaster after the Spanish flue in 1918. Millions of people lost their life due to a lack of preparedness and ineffective strategies for managing humanitarian supply chains (HSC). Based on the learnings from this pandemic outbreak, different strategies for managing the effective HSC have been explored in the present context of pandemics through a systematic literature review. The findings highlight some of the major challenges faced during the COVID-19 pandemic, such as lack of planning and preparedness, extended shortages of essential lifesaving items, inadequate lab capacity, lack of transparency and visibility, inefficient distribution network, high response time, dependencies on single sourcing for the medical equipment and medicines, lack of the right information on time, and lack of awareness about the protocol for the treatment of the viral disease. Some of the significant learnings observed from this analysis are the use of multiple sourcing of essential items, joint procurement, improving collaboration among all stakeholders, applications of IoT and blockchain technologies for improving tracking and traceability of essential commodities, application of data analytics tools for accurate prediction of next possible COVID wave/disruptions and optimization of distribution network. Limited studies are focused on finding solutions to these problems in managing HSC. Therefore, as a future scope, researchers could find solutions to optimizing the distribution network in context to pandemics, improving tracing and tracking of items during sudden demand, improving trust and collaborations among different agencies involved in HSC.
【Abstract】This article proposes a blockchain-based architecture for the optimal scheduling of the dispatchable units in the smart grids considering the high penetration of renewable energy sources. The proposed method makes use of blockchain technology to secure the data exchange among the agents in the smart grid and avoid unauthorised access to the real data of the system. Considering the flexibility which is provided by the optimal switching in the smart grid, the reconfiguration problem is also considered in the model using some remote control switches. A stochastic framework based on the unscented transform is proposed to not only capture the independent randomness of the renewables but also to handle the correlated uncertainties among them. The problem formulation is constructed as a multi-objective optimization problem optimizing the total operating cost and the reliability indices. Due to the nonlinear and complex nature of the problem, a new optimization method based on the honey bee mating (HBM) algorithm is proposed to solve the problem without any simplification or linearization. Moreover, a correction approach based on local search is proposed to increase the algorithm capability. The appropriate performance of the proposed model is examined on a test smart grid. The data for the optimal decision is based on the internet of things (IoT) data.
【Abstract】Data sharing is increasingly popular especially for scientific research and business fields where large volume of datasets need to be used, but it involves data security and privacy concerns. This paper mitigates such concerns by tracking and logging the history of shared data (i.e., provenance records) while preserving data privacy. This is a challenging problem in the data sharing scenario in this paper because the environment is decentralized and internal logs are not accessible publicly due to privacy concerns. We present ProvNet, a decentralized data sharing platform that can detect malicious users and provide secure provenance records using the newly proposed networked blockchain without disclosing raw data contents. Valid sharing records are collected and stored in the blocknet and misbehavior is detected with the stored provenance records according to our accountable protocols. We give a proof-ofconcept implementation, and evaluation results show that the overhead is acceptable. (c) 2022 Elsevier Inc. All rights reserved.
【Abstract】New technologies such as Internet, cloud computing, artificial intelligence (AI) and blockchain have greatly promoted the innovation of financial industry structure and paradigm, improved the efficiency of financial services and brought the spillover of the financial technology (FinTech) risk. The existing financial regulation methods cannot meet the needs of the development of FinTech, therefore, there is an urgent need to improve the trust mechanism. Blockchain can effectively solve the problems of security and trust in FinTech. This paper will explore the expression method of trust index in blockchain, and build based on blockchain a multi-dimensional trust index system and evaluation mechanism (MDTEM) for FinTech. Firstly, a four-level blockchain structure has been built, including cloud level blockchain, Internet level blockchain, contract level blockchain and application level blockchain in the FinTech ecological environment to ensure the security, reliability and trustworthiness of financial services. Secondly, according to the trust structure of blockchain on FinTech payment behavior, the index system and evaluation mechanism of direct trust, indirect trust, recommendation trust and feedback trust of FinTech based on blockchain are designed. Finally, the trust simulation experiment of FinTech mechanism is carried out from three aspects: data sending, data transmission, data reception and delivery success rate. Simulation results show that the proposed MDTEM trust mechanism can better improve the safe and reliable application of FinTech trust mechanism.
【Abstract】Low-Power Wide-Area Network (LPWAN) is a new type of wireless technology that offers long range communication for devices in the Internet of Things (IoT) and LoRaWAN is one of the main technologies currently available to enable LPWAN environments. In the LoRaWAN architecture, the Join Server is a key component and is responsible for security tasks, such as authentication and key management. However, the Join Server acts as a Single Point of Failure (SPOF) since all encryption keys are stored centrally. Then, this paper presents a secure and fault-tolerant architecture to increase the levels of security and availability in LoRaWAN. A permissioned blockchain and smart contracts are used to replace the Join Server and solve the SPOF problem. A working prototype was created using open-source tools in order to evaluate the feasibility of the proposed architecture. Additionally, the performance of a blockchain network was analyzed in a cloud environment under multiple workloads and fault-tolerance experiments were performed to evaluate the impact of network failures. The results show a trade-off between availability and performance when choosing the number of blockchain peers in small scenarios. However, this behavior is reversed in large scenarios where the performance of multiple peers is best suited.
【Keywords】Blockchains; Low-power wide area networks; Servers; Security; Internet of Things; Logic gates; Authentication; Blockchain; hyperledger; Internet of Things; IoT; LoRaWAN; LPWAN; security
【Abstract】Drones are imperative for the 5G architecture as a mobile source to expand network coverage and support seamless services, particularly through enabling device-to-device (D2D) communication. Such deployment of drones in D2D settings raises various security threats in drone communication. While the existing D2D communication security standard within the 4G cellular architecture may address some of these issues, the standard includes heavy traffic toward the network core servers. If this security standard is to be adopted in the 5G D2D security services with the same traffic load, it may negatively impact the 5G network performance. Therefore, this paper proposes a lightweight proxy signature-based authentication mechanism for a swarm of drones compatible with the 5G D2D standard mechanisms. This paper proposes a distributed delegation-based authentication mechanism to reduce the traffic overhead toward the 5G core network. In this scheme, the legitimate drones are authorized as proxy delegated signers to perform authentication on behalf of the core network. Furthermore, we propose a mechanism to elect and relocate a new leader relay drone from the existing drone swarm. We implemented the proposed authentication algorithm in the 5G D2D-based communication package over NS-3 while performing the computational calculations on a RaspberryPi3 device to mimic the drone calculation process and delays. The performance of the proposed authentication shows a promising reduction in the authentication time and shows lightweight and reliable compatibility.
【Abstract】Blockchain technology and its applications are gaining popularity day by day. It is a ground-breaking technology that allows users to communicate without the need of a trusted middleman. A smart contract (self-executable code) is deployed on the blockchain and auto executes due to a triggering condition. In a no-trust contracting environment, smart contracts can establish trust among parties. Terms and conditions embedded in smart contracts will be imposed immediately when specified criteria have been fulfilled. Due to this, the malicious assailants have a special interest in smart contracts. Blockchains are immutable means if some transaction is deployed or recorded on the blockchain, it becomes unalterable. Thus, smart contracts must be analyzed to ensure zero security vulnerabilities or flaws before deploying the same on the blockchain because a single vulnerability can lead to the loss of millions. For analyzing the security vulnerabilities of smart contracts, various analysis tools have been developed to create safe and secure smart contracts. This paper presents a systematic review on Ethereum smart contracts analysis tools. Initially, these tools are categorized into static and dynamic analysis tools. Thereafter, different sources code analysis techniques are studied such as taint analysis, symbolic execution, and fuzzing techniques. In total, 86 security analysis tools developed for Ethereum blockchain smart contract are analyzed regardless of tool type and analysis approach. Finally, the paper highlights some challenges and future recommendations in the field of Ethereum smart contracts.
【Abstract】This paper applies a quantile-based analysis to investigate the causal relationships between Bitcoin and investor sentiment by considering the possible effects of the ongoing COVID-19 pandemic. Such an analysis allows investigating the predictive power of investor sentiment (Bitcoin) on Bitcoin (investor sentiment) at different levels of the distributions. Results emphasize that only Bitcoin returns/volatility have significant predictive power on the investor sentiment whether investors are fear or greed before and over the COVID-19 period. Moreover, the COVID-19 crisis has no effect on the causal relationship between the two variables. Further analysis shows an asymmetric causality observed only during the pandemic period. Furthermore, the quantile autoregressive regression model shows a significant positive relationship between investor sentiment and Bitcoin returns.
【Abstract】With the rapid rise of cryptocurrencies, it has become an urgent problem to realize the flat use of digital currency, with making it really put into use, and giving full play to its utility in the current economic market. This paper innovatively takes the maximization of user benefit as the key point to predict transaction bidding price combining dynamic game theory. The bidding price of user transaction not only refers to historical transactions, but also considers the impact on future subsequences, and the result describes the interaction between transactions in detail. Also this paper proposes a method to express user satisfaction and establishes a user benefit model accordingly, so as to ensure the transaction is packaged successfully to the greatest extent within the acceptable range of transaction pricing. Finally this paper compares the proposed model with conventional machine learning prediction algorithms, finding that when user does not participate in the trading for the first time, the prediction effect of this proposal is better than that of machine learning over small data sets, moreover superior to machine learning methods in prediction accuracy and sensitivity, with a lower time complexity.
【Abstract】The tremendous increase in the use of Internet of Things (IoT) has made an impact worldwide by changing the mode of day-to-day life. Like any other application, IoT based networks also have to be protected since the data produced consist of sensitive information. Existing algorithms for providing security in such networks do not consider all the security objectives. Starting from the sensing of data from IoT environment, the data have to be protected from several types of attacks. Also, the authentication of involved entities, integrity of data, access control and confidentiality are to be achieved. This work proposes a novel security architecture for IoT based distributed applications. The architecture uses the best known lightweight cipher ChaCha20. Principles of cellular automata are applied for random number generation to attain more security and randomness. Double encryption ensures multilevel protection of data during the data uploading and storing phases. Providing encryption based on dynamic session keys guarantees the security of the method. It also ensures secure data sharing, mutual authentication between communicating entities, fast execution, user authentication and message integrity. The IoT device connected to a gateway node has to complete registration phase successfully. Subsequently, each time a data transfer between the device and gateway node takes place, mutual authentication phase is executed. Blockchain network used at the edge level ensures authentication of participating nodes and hence, unintended modification of data is prevented. The proposed architecture proves to be efficient in terms of throughput, execution time and resistance to various security attacks.
【Abstract】An electronic health record (EHR) is a technology that allows you to keep track of your health information. It keeps computerized records of several healthcare organizations. Records are exchanged via enterprise-wide data systems as well as other networking technologies and exchanges. Patients nowadays expect immediate access to their health information. However, the health sector comes with immediate access to data, and there are worries about the privacy and security of medical records of patients. As a result, a blockchain-based solution can assist in resolving this issue. The blockchain has the potential to beat the conventional centralized system, which suffers from a severe lack of accessibility. This is a decentralized technology that has recently been presented to provide a new viewpoint on data security and system efficiency. This paper presents a blockchain-based system that helps the patient's data be managed and secured into a single record held by the patient. This system was developed using the Ethereum network using Ganache, as well as programming languages, tools, and techniques such as Solidity and web3.js. The measured approach suggested in this paper uses this platform to store patients' data and execute functions in a decentralized system using blockchain smart contracts. Transactions are communicated through the smart contract once it has been launched, providing security and privacy features. Furthermore, the transaction's desired alterations can be verified and transmitted to the entire distributed network. There is also a cryptocurrency wallet (MetaMask) that holds a centrally controlled, private information system in which records can be quickly accessed and secured by authorities. Doctors and patients can access the system through the wallet. Moreover, all the data of the doctor and patient will be secured and managed through this system. This proposed system is aimed at doing things such as the following: blockchain technology allows users to obtain the same data at the same time, increasing efficiency, developing credibility, and reducing barriers. It enables the secure storage of data by setting specific access for users. Additionally, this proposed system facilitates the secure transfer of patient medical records. Finally, this paper describes a health-record system and a new protocol that are quick and secure to use. It allows greater openness and ownership of sensitive data to be recorded and secured and also promotes the healthcare sector with blockchain.
【Abstract】Verifiable random function is a powerful function that provides a noninteractively public verifiable proof for its output. Recently, verifiable random function has found essential applications in designing secure consensus protocols in blockchain. How to construct secure and practical verifiable random functions has also attracted more and more attention. In this paper, we propose a practical anonymous verifiable random function. Security proofs show that the proposed anonymous verifiable random function achieves correctness, anonymity, uniqueness, and pseudorandomness. In addition, we show a concrete application of our proposed anonymous verifiable random function in blockchain to improve the consensus mechanism for Hyperledger fabric. Finally, we implement the proposed anonymous verifiable random function and evaluate its performance. Test results show that the proposed anonymous verifiable random function supports faster computing operations and has a smaller proof size.
【Abstract】As the core of blockchain technology, the consensus algorithm directly affects the security, stability, and decentralisation of the blockchain and numerous other important characteristics. Choosing an appropriate consensus algorithm for different scenarios is currently a challenge in the implementation of blockchain applications. This paper classifies the improvement schemes of proof of stake (PoS) into three categories: PoS-based consensus algorithms, PoS- and PoW-based consensus algorithms, and PoS- and BFT-based consensus algorithms. First, the study introduces the PoS and PoS consensus algorithm variants and then summarises the core ideas, effects, advantages, and disadvantages of these algorithms. Subsequently, the performances of the improved algorithms are compared. Finally, the main improved methods are summarised, and the most common network security attacks are discussed. The study lays a foundation for the main improvement directions of PoS in the future, hoping to provide a reference for researchers to help them select and design consensus algorithms in different application scenarios while also helping the evolution of consensus algorithms and the implementation of blockchain applications.
【Abstract】In this paper, we take a forecasting perspective and compare the information content of a set of market risk factors, cryptocurrency-specific predictors, and sentiment variables for the returns of cryptocurrencies vs traditional asset classes. To this aim, we rely on a flexible dynamic econometric model that not only features time-varying coefficients, but also allows for the entire forecasting model to change over time to capture the time variation in the exposures of major digital currencies to the predictive variables. Besides, we investigate whether the inclusion of cryptocurrencies in an already diversified portfolio leads to additional economic gains. The main empirical results suggest that cryptocurrencies are not systematically predicted by stock market factors, precious metal commodities or supply factors. On the contrary, they display a time-varying but significant exposure to investors' attention. In addition, also because of a lack of predictability compared to traditional asset classes, cryptocurrencies lead to realized expected utility gains for a power utility investor.
【Abstract】Unlike public chains, the Alliance Blockchain Hyperledger Fabric has a member management service mechanism that may provide data isolation security at the channel level. However, because this data isolation security technique synchronizes plaintext data inside the channel, data leakage is still a possibility. Furthermore, in some fine-grained privacy protection circumstances, channel-based data access restriction is ineffective. In order to solve the data privacy security problems in the above-mentioned consortium chain superledger, a blockchain data attribute encryption scheme based on ciphertext policy is proposed. Combining the original Fabric Certificate Authority module in the Hyperledger, the proposed scheme can realize the user-level fine-grained security access to control blockchain data while also realizing the secure distribution of user attribute keys in the blockchain data attribute encryption scheme based on the ciphertext policy scheme. The security analysis of the scheme shows that the scheme achieves the security goals of attribute-based encryption user attribute private key secure distribution and data privacy protection. The scope of this research is that this study confirms that the solution's architecture achieves fine-grained access control of private data on the Hyperledger Blockchain network and also the security objectives of secure transmission of user characteristic secret keys and data privacy protection. The performance analysis part also shows that the proposed scheme has good usability.
【Abstract】The demand for the digital monitoring of environmental ecosystems is high and growing rapidly as a means of protecting the public and managing the environment. However, before data, algorithms, and models can be mobilized at scale, there are considerable concerns associated with privacy and security that can negatively affect the adoption of technology within this domain. In this paper, we propose the advancement of electronic environmental monitoring through the capability provided by the blockchain. The blockchain's use of a distributed ledger as its underlying infrastructure is an attractive approach to counter these privacy and security issues, although its performance and ability to manage sensor data must be assessed. We focus on a new distributed ledger technology for the IoT, called IOTA, that is based on a directed acyclic graph. IOTA overcomes the current limitations of the blockchain and offers a data communication protocol called masked authenticated messaging for secure data sharing among Internet of Things (IoT) devices. We show how the application layer employing the data communication protocol, MAM, can support the secure transmission, storage, and retrieval of encrypted environmental sensor data by using an immutable distributed ledger such as that shown in IOTA. Finally, we evaluate, compare, and analyze the performance of the MAM protocol against a non-protocol approach.
【Abstract】The promise of blockchain has far-reaching ramifications for health-care stakeholders. Blockchain technology has the potential to improve health care by putting the patient at the centre of the system and improving health data security, privacy, and interoperability. This is a reflective piece to highlight the opportunities for applications of blockchain technology in the future of healthcare.