【Author】 Clifton, Judith Pal, Leslie A.
【影响因子】10.104
【主题类别】
区块链治理-法律治理-区块链监管制度
【Abstract】
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】
【发表时间】
【收录时间】2022-08-04
【文献类型】 理论性文章
【DOI】 10.1093/polsoc/puac025
【Author】 Duan, Yongshuai Huang, Junqin Lei, Jiale Kong, Linghe Lv, Yibin Lin, Zhiliang Chen, Guihai Khan, Muhammad Khurram
CCF-B
【影响因子】9.551
【主题类别】
区块链应用-实体经济-交通领域
【Abstract】Since 2002, hundreds of thousands of vessels have equipped the Automatic Identification System (AIS), which continuously broadcasts its identity and location information for vessel collision avoidance. To utilize these scattered AIS data for further analysis, there are multiple AIS data platforms collecting AIS data from vessels around the world through their satellites and land-based stations. Thus, users can obtain AIS data of vessels from these platforms without dedicated devices. However, existing platforms work in silos, and AIS data is distributed across different platforms, resulting in reduced data availability. In addition, AIS is vulnerable to jamming and spoofing attacks, which can undermine the authenticity of AIS data. In this paper, we propose AISChain, a secure and fast blockchain-based AIS data platform. AISChain adopts consortium blockchain, which only permits those authorized parties (i.e., AIS data providers) to participate in the consensus protocol, and is compatible with current commodity AIS hardware. Since the whole system is co-maintained by multiple authorized parties, AISChain can integrate AIS data resources in a secure way. For avoiding repeated recording of AIS data on the chain, we design the Dynamic Bloom Filter Tree (DBFT) to realize efficient duplication detection in the transaction verification phase. We also propose the dual signature scheme to clarify the AIS data ownership. Moreover, we leverage the geographical location-based blockchain sharding approach to further improve the scalability of AISChain. We implement a prototype of AISChain, and conduct extensive experiments to evaluate the performance of AISChain. Evaluation results show that the search time of DBFT is negligible (4.3 ms) with an extreme low error ratio (0.4%). Meanwhile, AISChain can achieve more than 730 tx/s throughput even when nodes scale to 36. To the best of our knowledge, AISChain is the first work to apply the blockchain technology to secure the AIS data platform.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Artificial intelligence; Blockchains; Soft sensors; Electronic mail; Throughput; Satellite broadcasting; Safety; Automatic identification system; blockchain; bloom filter; security
【发表时间】
【收录时间】2022-08-04
【文献类型】 实证性文章
【Author】 El-Sayed, Hesham Alexander, Henry Kulkarni, Parag Khan, Manzoor Ahmed Noor, Rafidah Md Trabelsi, Zouheir
CCF-B
【影响因子】9.551
【主题类别】
区块链应用-实体经济-交通领域
【Abstract】Maintaining interconnectivity between dynamic vehicular nodes and ensuring trust in vehicular networking is still a challenging issue. It is crucial for the vehicular environments to maintain a stable interconnectivity between the vehicular nodes and further to prevent the vehicular nodes from broadcasting fake messages and simultaneously protect the vehicles against tracking attacks. An efficient Trust Management System (TMS) is proposed in this paper that will ensure trustworthiness and stable interconnectivity between vehicular entities to assure road safety and reliable communication. The proposed approach incorporates a novel timestamp mechanism and block chain concepts to ensure the steady inter-connectivity between the dynamic vehicular nodes. Further, the framework leverages block chain concepts to verify the correctness of the events stored in the Road Side Units (RSUs). It also proposes a versatile hybrid trust model that uses innovative direct and recommended trust evaluation techniques to compute trust between the vehicular entities. Moreover, the framework integrates a threading mechanism to schedule message execution in direct trust evaluation, and clustering techniques to group similar messages in indirect trust evaluation. Various experimental and comparative analyses with other related studies are carried out in a simulated environment to evaluate the performance of the proposed hybrid trust model. The findings show that the proposed trust model produces an accuracy of 92% in identifying malicious nodes.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchains; Computational modeling; Security; Trust management; Peer-to-peer computing; Safety; Privacy; Vehicular networks; trust management system (TMS); hybrid model (HM); direct trust evaluation; recommended trust evaluation; blockchain
【发表时间】
【收录时间】2022-08-04
【文献类型】 实证性文章
【影响因子】7.985
【主题类别】
区块链应用-实体经济-供应链
【Abstract】Traceability system is one of the popular applications of graphic blockchains. However, there are centralisation problems and a long time for final consistency confirmation in the graphic blockchain. In addition, the blockchain system in the traceability application scenario has the problem of insufficient supervision. Therefore, a witness-based graphic blockchain consensus mechanism is proposed. In the consensus mechanism, a verifiable random function is used to screen the publishers of the unit; an SM2 threshold signature is used to sign the unit information to improve the non-repudiation of the traceability information uploaders to the unit information under the supervision of the witness. The improved consistency algorithm cancels the process of finding a stable main chain and makes relatively many nodes to participate in the consensus process. The experimental results show that the graphic blockchain using the improved witness mechanism can reduce the degree of centralisation, shorten the time for new units to reach consensus, and greatly ensure the security and scalability of the blockchain system.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】
【发表时间】
【收录时间】2022-08-04
【文献类型】 实证性文章
【DOI】 10.1049/cit2.12124
【Author】 Zhai, Zhonghao Shen, Subin Mao, Yanqin
【影响因子】4.960
【主题类别】
区块链技术-核心技术-加密算法
【Abstract】Frequent attacks on the certificate authority (CA) have exposed the trust problem of the traditional public key infrastructure (PKI) for the web service. For example, malicious certificates issued by compromised CAs are used to impersonate the existing domain, and revoked certificate are still trusted by clients. Blockchain is considered as one of the most potential technologies to enable a more secure and trustworthy PKI. Although a lot of blockchain-based solutions have been proposed to improve or even replace the traditional PKI, there are still some critical issues unsolved. On the one hand, all of existing blockchain-based solutions are still vulnerable to the domain name preemption attack if a malicious or compromised CA registers a certificate for a domain before the rightful domain owner applies for a certificate for the domain. On the other hand, almost all blockchain-based solutions ignore the scalability problem and can hardly satisfy the current requirement (46 tX/s) of only certificate registrations for global web services. In this paper, we propose a secure and scalable blockchain-based PKI solution, which is called BPKI. In BPKI, we introduce new entities called auditors to supervise CA's certificate registration operations to eliminate the domain name preemption attack. Furthermore, we design a new delegated PBFT (DPBFT) consensus using the verifiable pseudo-random functions (VRFs) and a double blockchain structure to solve the scalability problem. It is theoretically proved that BPKI is secure. The simulation and experiment demonstrate that BPKI is superior to the existing blockchain-based PKI solutions in scalability.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Public key infrastructure; Blockchain; Web services; Decentralization; Authentication
【发表时间】2022
【收录时间】2022-08-04
【文献类型】 实证性文章
【影响因子】4.481
【主题类别】
区块链应用-实体经济-公共管理
【Abstract】Purpose Blockchain technology (BCT) can be used for a wide variety of applications across domains and can bring many benefits. BCT-based applications can be beneficial for the government as well as businesses. Despite the many promises, BCT implementation lags behind. The purpose of this research is to identify a roadmap of critical implementation challenges that influence BCT implementation by governments. Design/methodology/approach The study develops an ISM-based model spread across seven levels to analyze the inter-relationship among the selected BCT challenges. The MICMAC analysis further helps in evaluating the variables based on their driving power and dependencies. Findings The findings show that all challenges have a strong impact on implementing BCT. The foundation for implementation BCT is to define standards and develop appropriate regulations. Next, the findings show the need for a shared infrastructure meeting the basic technical and societal requirements and developing viable business models to advance BCT implementation. Many challenges hinder the development of blockchain applications meeting the technical and ethical requirements. Originality/value Existing research has analyzed the relationship among challenges. To the best of the authors' knowledge this is the first paper to collate these implementation challenges and incorporate them to develop a hierarchical model using interpretive structural modeling technique. The results can be used to prioritize the tackling of the challenges.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain; Blockchain technology; Implementation; Challenges; Interpretive structural modeling; MICMAC analysis
【发表时间】
【收录时间】2022-08-04
【文献类型】 实证性文章
【DOI】 10.1108/ITP-08-2020-0600
【Author】 Badidi, Elarbi
【影响因子】3.889
【主题类别】
区块链应用-实体经济-公共管理
【Abstract】Modern cities worldwide are undergoing radical changes to foster a clean, sustainable and secure environment, install smart infrastructures, deliver intelligent services to residents, and facilitate access for vulnerable groups. The adoption of new technologies is at the heart of implementing many initiatives to address critical concerns in urban mobility, healthcare, water management, clean energy production and consumption, energy saving, housing, safety, and accessibility. Given the advancements in sensing and communication technologies over the past few decades, exploring the adoption of recent and innovative technologies is critical to addressing these concerns and making cities more innovative, sustainable, and safer. This article provides a broad understanding of the current urban challenges faced by smart cities. It highlights two new technological advances, edge artificial intelligence (edge AI) and Blockchain, and analyzes their transformative potential to make our cities smarter. In addition, it explores the multiple uses of edge AI and Blockchain technologies in the fields of smart mobility and smart energy and reviews relevant research efforts in these two critical areas of modern smart cities. It highlights the various algorithms to handle vehicle detection, counting, speed identification to address the problem of traffic congestion and the different use-cases of Blockchain in terms of trustworthy communications and trading between vehicles and smart energy trading. This review paper is expected to serve as a guideline for future research on adopting edge AI and Blockchain in other smart city domains.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】edge computing; edge intelligence; Blockchain; smart grids; smart mobility; smart energy
【发表时间】2022
【收录时间】2022-08-04
【文献类型】 综述
【DOI】 10.3390/su14137609
【Author】 Bai, Pinky Kumar, Sushil Aggarwal, Geetika Mahmud, Mufti Kaiwartya, Omprakash Lloret, Jaime
【影响因子】3.847
【主题类别】
区块链应用-实体经济-医疗领域
【Abstract】An identity management system is essential in any organisation to provide quality services to each authenticated user. The smart healthcare system should use reliable identity management to ensure timely service to authorised users. Traditional healthcare uses a paper-based identity system which is converted into centralised identity management in a smart healthcare system. Centralised identity management has security issues such as denial of service attacks, single-point failure, information breaches of patients, and many privacy issues. Decentralisedidentity management can be a robust solution to these security and privacy issues. We proposed a Self-Sovereign identity management system for the smart healthcare system (SSI-SHS), which manages the identity of each stakeholder, including medical devices or sensors, in a decentralisedmanner in the Internet of Medical Things (IoMT) Environment. The proposed system gives the user complete control of their data at each point. Further, we analysed the proposed identity management system against Allen and Cameron's identity management guidelines. We also present the performance analysis of SSI as compared to the state-of-the-art techniques.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】internet of things; blockchain; self-sovereign identity; IoMT; security; privacy
【发表时间】2022
【收录时间】2022-08-04
【文献类型】 实证性文章
【DOI】 10.3390/s22134714
【Author】 Someda, Hiroshi Akagi, Takanori Kajikawa, Yuya
【影响因子】3.801
【主题类别】
区块链治理-元分析-领域分析
【Abstract】A simple and robust approach to predict the spillover effects of emerging technologies enables proper formulation of investment strategies. In this study, we propose the method in order to detect industry sectors impacted by the spillover effect of emerging technologies in their early stage. The method integrates patent analysis with input-output analysis to model knowledge spillover among industrial sectors and has the following three steps. The first is an analysis of technological features in industry sectors. Using the IPC group of patents, we characterized each industrial sector by technological features. The second is an analysis of technological features in a given emerging technology. The third is a similarity analysis of the technological features between emerging technology and industry sectors. In this paper, we conducted a case study on blockchain technology. We demonstrated the effectiveness of the proposed method by comparing the results with the existing reports. We found that the predictive performance became the highest when we used an industrial sector-normalized matrix in patent analysis and producer's price table in input-output analysis. This method is expected to be used for the early detection of spillover effects of emerging technologies.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Patent analysis; Technology spillover; Blockchain impact; Input-output table; Concordance table
【发表时间】
【收录时间】2022-08-04
【文献类型】 实证性文章
【Author】 Chen, Shu-Ching
【影响因子】3.491
【主题类别】
区块链应用-实体经济-数字藏品
【Abstract】With the emergence of blockchain technology, decentralized and trustworthy platforms for data storage and propagation transactions become available, which can improve the security of the digital assets, i.e., data with their right to use (e.g., authority, ownership, fingerprinting, etc.). However, the security mechanism of blockchain suffers more vulnerabilities when it is being attacked and when managing multimedia data. It remains challenging to secure multimedia data and protect data integrity. Meanwhile, multimedia data could contain critical personal information. Research in privacy-preserving multimedia data management needs to be further studied to enable using and analyzing multimedia digital assets in the decentralized system without personal information leakage. This is an important feature to enable applications, such as surveillance and e-health. While blockchain sheds light on the future of multimedia data management, further research on secure and privacy-preserving management for digital assets and multimedia data is needed.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】
【发表时间】2022
【收录时间】2022-08-04
【文献类型】 实证性文章
【Author】 Lee, Yeonjoon
【影响因子】3.426
【主题类别】
区块链应用-虚拟经济-数字藏品
【Abstract】I measure the impact of rarity on price. The main challenge is that usually rarity is positively correlated with quality. In addition, sometimes price also affects rarity. To overcome these difficulties, I study an NBA digital collectibles market called NBA Top Shot where those concerns are well addressed. By analyzing novel and rich data sets, I find that the elasticity of price with respect to circulation (reverse rarity) is -0.74 on average. I also find that less popular products are more elastic than more popular products are.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Rarity; Digital collectibles; NBA Top Shot; Non-fungible tokens; Blockchain
【发表时间】
【收录时间】2022-08-04
【文献类型】 实证性文章
【Author】 Sun, Daojun Deng, Limin Ying, Wenchi
【影响因子】3.422
【主题类别】
区块链应用-实体经济-公共管理
【Abstract】Purpose This study investigates into how organizations enable the compatibility between intermediary role of conventional systems with disintermediary potentials of blockchain toward the coordination of multiple actors in operations management. Design/methodology/approach The data were collected from 31 interviewees of the case organizations. We conduct an in-depth case study of successful BC implementation in operations management, by using affordance-actualization (A-A) theory as the theoretical lens. Findings This study identifies the incompatibility between the affordances of conventional systems and blockchain in coordination/operations management and offers a process model in which a fusion phase enables the affordances to be compatible and then to be actualized. The fusion phase extends A-A theory by transposing and connecting in the context of operations management. The result also shows that blockchain technology has decentralized potentials to address the issues caused by centralized organizations or information systems, while not to replace the intermediary roles of centralized organizations or information systems. Originality/value This study makes important theoretical contributions to the literature on blockchain used in operations management, the roles of blockchain enablement and affordance-actualization theory. The findings can also help IT practitioners to implement BC-based applications effectively.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain; Affordance; Fusion; Compatibility; Operations management; Coordination
【发表时间】
【收录时间】2022-08-04
【文献类型】 理论性文章
【Author】 Alothman, Basil Joumaa, Chibli Alotaibi, Abdulrahman Alotaibi, Bandar Almutairi, Bashayer Aldhafairi, Asmaa Khan, Murad
【影响因子】2.838
【主题类别】
区块链应用-实体经济-工业领域
【Abstract】Effective security has become a vital part of our daily routine, for example securing cash, jewelry, documents, and other valuables. One way is to protect these items by keeping them in a safe box. However, current safe boxes are vulnerable to a number of security attacks such as physical, repudiation, anonymously modifying, etc. In this regard, this paper presents a robust smart safe box using the blockchain solution to ensure each transaction and secure it from unauthorized access. Also, it traces back the local safe items by reading back to blockchain data transactions and protecting them from thieves by tracking the burglar with a real-time tracking location Global Positioning System (GPS) tracker and capturing a picture and video recording through the external camera. Similarly, with more security enhancement using the TensorFlow framework to analyze optical detection and identify things inside the box using an internal camera. At the same time, each transaction is stored by using Write Once and Read Many (WORM) patterns saved in local private blockchain data block logs. Finally, it uses three-way authentication mechanisms to unlock the safe box that authenticates the users, (1) face recognition, (2) fingerprint and (3) the keypad password. The performance of the proposed smart safe box is tested by a number of hardware and blockchain tests. The results reveal that the proposed smart safe box ensures safe and authenticated access to the box and records each transaction using blockchain technology. Further, the performance evaluation of the private blockchain significantly improved the integrity and safeness of the proposed smart safe box.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】blockchain; safe-box; smart-box; optical detector; security-box; Internet of Things (IoT)
【发表时间】2022
【收录时间】2022-08-04
【文献类型】 实证性文章
【DOI】 10.3390/app12136445
CCF-C
【影响因子】2.812
【主题类别】
区块链应用-实体经济-医疗领域
【Abstract】Healthcare 4.0 is about collecting huge amounts of data and getting it to work in applications, enabling healthcare management decisions well-informed while providing for important gains in effectiveness and cost control. Diagnostics based on the digital footprint depend on wearable technology's ability to gather and extract essential patient data. Artificial intelligence (AI) technologies allow the analysis of real-time observed data and continuously developing from data to understand the world surrounding them. To connect and access intelligent healthcare services, people, and devices at any time, a secure wireless mobile communication system is essential. This article suggests a mHealth-based patient monitoring system (mHealth-PMS) based on AI for healthcare 4.0. Mobile healthcare applications motorized by Convolutional Neural Network (CNN) have enabled people to triage their conditions and preemptive treatment decisions. Information collected has been analysed for substantiating cause, and alert and preventive messages have been immediately sent through the mobile application. The performance analysis has been executed, and the proposed mobile application-based surveillance provided much-enhanced reporting of information quickly on diseases, symptoms, factors, and more. The mHealth-PMS strategy shows an accuracy ratio of 95.6%, monitoring ratio of 93.5%, data management ratio of 94.4%, data security ratio of 91.7%, data privacy ratio of 92.1%, prediction ratio of 95.3%, a cost-effective ratio of 25.5% compared to the existing methods.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】artificial intelligence; healthcare 4; 0; mobile healthcare (mHealth)
【发表时间】
【收录时间】2022-08-04
【文献类型】 理论性文章
【DOI】 10.1111/exsy.13025
【影响因子】2.627
【主题类别】
区块链技术-核心技术-加密算法
【Abstract】This study conducts a bibliometric analysis and systematic review of cryptocurrency trading algorithms to identify existing gaps in the area. From our standpoint, this is the first study to carry out a deep analysis of price forecasts and portfolio management in cryptocurrencies in addition to analyzing the most relevant studies and authors, trend topics of the area, and identifying countries with the most published studies. During our research, we identified some gaps that can be used for further research. Currently, there are approximately 16,000 cryptocurrencies; however, in majority of the papers, the authors have only used the top 10 ranking market capitalization cryptocurrencies, leaving aside potential minor cryptocurrencies. Thus, trading strategies using Big Data can be a potential research topic, considering the greater number of emerging cryptocurrencies.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】bibliometric analysis; cryptocurrencies portfolio; cryptocurrency trading; systematic review
【发表时间】
【收录时间】2022-08-04
【文献类型】 综述
【DOI】 10.1002/for.2886
CCF-C
【影响因子】2.577
【主题类别】
区块链应用-实体经济-其他
【Abstract】Applying machine learning techniques and methods in biometric recognition has gained significant attention in recent years as it can provide a better performance, high accuracy, and cancellable biometrics data. This paper proposes a new approach for fingerprint recognition based on machine learning methods and stylometric features. The proposed solution deals with fingerprint recognition, cancellability, stylometry, blockchain and machine learning. This research uses machine learning methods that classify fingerprint templates as a numeric feature instead of using Gabor wavelets and filters. The proposed method gives very high accuracy for biometric fingerprint templates. For these reasons, we additionally consider the use of an internal blockchain in the form of a distributed database that implements all security services, including privacy protection. Because the recognition method is based on machine learning, the generated templates are a numerical data type and take up minimal memory size, which further favors the application of a blockchain and enables implementation even in IoT devices. We generate the fingerprint biometric template by converting an enhanced fingerprint image into a 1-D set of fixed length codes. After that, we extract stylometric features that will be used for classification. The experiment is conducted on the CASIA-FingerprintV5 and achieved excellent results where the CatBoost method with over-sampling (SMOTE) achieved the best results for All_features(42) and GRRF(10) sets with 99.95% accuracy and 99.98%, respectively, and FAR 0.0007 and 0.0003, respectively. In addition, the proposed system significantly decreased the computational costs which makes it suitable for other applications.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Machine learning; Ensemble learning; Random forest; Feature selection; Blockchain
【发表时间】
【收录时间】2022-08-04
【文献类型】 理论性文章
【Author】 Balani, Nisha Chavan, Pallavi Ghonghe, Mangesh
CCF-C
【影响因子】2.577
【主题类别】
区块链应用-实体经济-通信领域
【Abstract】Blockchain technology has become the epitome of security due to its traceability, transparency, immutability, and decentralized nature. To deploy blockchain into any network, a wide variety of mathematical operations are needed to be performed. These operations include hashing, block verification, encryption, and mining. Implementation of these operations is highly complex and requires heavy computational operations to be performed in real-time. Thus, high-performance computing engines are needed to develop blockchain systems, which can be done via the design of parallel processing, pipelining, and VLSI process miniaturization. Apart from high-performance computing, blockchain systems require high-performance communication, which enables seamless node-to-node connectivity for a truly decentralized implementation. Current 4(th) Generation (4G) communication models do not have enough throughput which is needed for high-performance blockchain-based communications, due to rapid block transfers for verification, mining, and viewing operations. Thus, 5G networks are the best application for deploying truly decentralized blockchain systems due to their low communication overheads, and high throughput. As the length of the blockchain increases, 5G networks will also face scalability issues due to an exponential increase in packet sizes. This will reduce the QoS performance of large length blockchains, thereby making them less useful for real-time large-scale applications like Industrial IoT, medical data privacy, etc. Thus, in this work, a machine learning-based sidechaining model is proposed, that utilizes a modified Genetic Algorithm powered engine. This engine aims at splitting the underlying blockchain into sidechains, thereby reducing mining complexity and reducing the number of packets needed for communication while maintaining true decentralization. The model is compared with standard blockchain & sidechain implementations in terms of access time, reading delay, and writing delay. It is observed that the model when implemented under 5G network emulation, outperforms existing blockchain and sidechain models in terms of these parameters, thereby making it useful for highly scalable blockchain systems.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain; Sidechain; Security; Decentralization; Machine learning
【发表时间】
【收录时间】2022-08-04
【文献类型】 理论性文章
【Author】 Herrera Montano, Isabel Garcia Aranda, Jose Javier Ramos Diaz, Juan Molina Cardin, Sergio de la Torre Diez, Isabel Rodrigues, Joel J. P. C.
【影响因子】2.303
【主题类别】
区块链应用-实体经济-其他
【Abstract】Data leakage is a problem that companies and organizations face every day around the world. Mainly the data leak caused by the internal threat posed by authorized personnel to manipulate confidential information. The main objective of this work is to survey the literature to detect the existing techniques to protect against data leakage and to identify the methods used to address the insider threat. For this, a literature review of scientific databases was carried out in the period from 2011 to 2022, which resulted in 42 relevant papers. It was obtained that from 2017 to date, 60% of the studies found are concentrated and that 90% come from conferences and publications in journals. Significant advances were detected in protection systems against data leakage with the incorporation of new techniques and technologies, such as machine learning, blockchain, and digital rights management policies. In 40% of the relevant studies, significant interest was shown in avoiding internal threats. The most used techniques in the analyzed DLP tools were encryption and machine learning.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Data leak Protection; Data leak Prevention; DLP; Internal threat; Classified Information Security; DRM
【发表时间】
【收录时间】2022-08-04
【文献类型】 实证性文章
CCF-C
【影响因子】1.937
【主题类别】
区块链技术-核心技术-共识机制
【Abstract】Federated Byzantine Agreement Systems (FBASs) are a fascinating new paradigm in the context of consensus protocols. Originally proposed for powering the Stellar payment network, FBASs can instantiate Byzantine quorum systems without requiring out-of-band agreement on a common set of validators; every node is free to decide for itself with whom it requires agreement. Sybil-resistant and yet energy-efficient consensus protocols can therefore be built upon FBASs, and the "decentrality" possible with the FBAS paradigm might be sufficient to reduce the use of environmentally unsustainable proof-of-work protocols. In this paper, we first demonstrate how the robustness of individual FBASs can be determined, by precisely determining their safety and liveness buffers and therefore enabling a comparison with threshold-based quorum systems. Using simulations and example node configuration strategies, we then empirically investigate the hypothesis that while FBASs can be bootstrapped in a bottom-up fashion from individual preferences, strategic considerations should additionally be applied by node operators in order to arrive at FBASs that are robust and amenable to monitoring. Finally, we investigate the reported "open-membership" property of FBASs. We observe that an often small group of nodes is exclusively relevant for determining liveness buffers and prove that membership in this top tier is conditional on the approval by current top tier nodes if maintaining safety is a core requirement.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Byzantine quorum systems; Asymmetric trust; Byzantine faults; Consensus; Stellar; Blockchain
【发表时间】
【收录时间】2022-08-04
【文献类型】 理论性文章
【Author】 Abraham, Ittai Chan, T. -H. Hubert Dolev, Danny Nayak, Kartik Pass, Rafael Ren, Ling Shi, Elaine
CCF-C
【影响因子】1.937
【主题类别】
区块链技术-核心技术-共识机制
【Abstract】As Byzantine Agreement (BA) protocols find application in large-scale decentralized cryptocurrencies, an increasingly important problem is to design BA protocols with improved communication complexity. A few existing works have shown how to achieve subquadratic BA under an adaptive adversary. Intriguingly, they all make a common relaxation about the adaptivity of the attacker, that is, if an honest node sends a message and then gets corrupted in some round, the adversary cannot erase the message that was already sent-henceforth we say that such an adversary cannot perform "after-the-fact removal". By contrast, many (super-)quadratic BA protocols in the literature can tolerate after-the-fact removal. In this paper, we first prove that disallowing after-the-fact removal is necessary for achieving subquadratic-communication BA. Next, we show new subquadratic binary BA constructions (of course, assuming no after-the-fact removal) that achieve near-optimal resilience and expected constant rounds under standard cryptographic assumptions and a public-key infrastructure (PKI) in both synchronous and partially synchronous settings. In comparison, all known subquadratic protocols make additional strong assumptions such as random oracles or the ability of honest nodes to erase secrets from memory, and even with these strong assumptions, no prior work can achieve the above properties. Lastly, we show that some setup assumption is necessary for achieving subquadratic multicast-based BA.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Byzantine agreement; Communication complexity; Subquadratic; Lower bounds
【发表时间】
【收录时间】2022-08-04
【文献类型】 实证性文章
【影响因子】1.831
【主题类别】
区块链技术-协同技术-物联网
【Abstract】Internet of things (IoT) has evolved exponentially in the recent years and its applications are also being explored in the medical field. Due to this, the volume of medical images transmitted has increased multifold. Usage of IoT networks for medical image transmission has significantly reduced the time needed for clinical diagnosis and thereby increasing treatment efficiency. However at present, IoT networks are open to various security threats, which may affect the sensitive and private information that are present in patient's medical image datasets. Existing studies reveal the need of improvisation for secured medical data transmission over IoT networks. In the context to IoT security issues, this research paper proposes blockchain architecture integrated with chaotic encrypted medical image transmission to ensure the high security in medical image transmission. The proposed system incorporates tri-layered architecture such as Image Aware Segmentation (IAS), hybrid chaotic encryption scheme and finally blockchain environment. The extensive experimentation has been carried out in which the performance parameters such as entropy, NACI and UACI (Number of Pixel Change Ratio and Unified Average Changed Intensity) were calculated and analyzed. It is found that the proposed architecture has NPCR as 99.65%, UACI as 33.95% and entropy ideally close to 8. Encryption results show that the proposed architecture exhibited more randomness, which can defend the IoT security threats.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】blockchain; entropy; hybrid chaotic encryption; Image Aware Segmentation; medical IoT
【发表时间】
【收录时间】2022-08-04
【文献类型】 理论性文章
【DOI】 10.1002/cpe.7115
【Author】 Rupa, Chiramdasu MidhunChakkarvarthy, Divya Patan, Rizwan Prakash, Ande Bhanu Pradeep, Ghantasala G. S.
CCF-C
【影响因子】1.345
【主题类别】
区块链应用-实体经济-公共管理
【Abstract】In the Industry 4.0 era, an inherited featured technology, blockchain, plays a vital role in knowledge engineering applications. Blockchain provides privacy to sensitive data as an intelligent agent, so its adoption rate increases in all the advanced domains. Especially in the health care department, blockchain technology usage helps avoid attacks like the Wannacry ransomware attack during 2017. Therefore, this paper described a decentralised application (DApp) expert system using public blockchain to create and maintain official health documents, especially medical certificates. Current existing systems, either paper-based or database or clouds to save the medical certificates, have more scope to do attacks. Hence, proposed a blockchain-based DApp that acts as an interface between intelligent agents, blockchains, and system related to the medical certificates. The main strength of this paper is implementation results, which are not among the maximum literary works currently available. The associate cost for conducting distributed application operations on the blockchain in terms of Gas comprehensively presented here. Furthermore, it consists of comparing the system's non-functional functions by considering blockchain and non-blockchain environments. Also, presented the simulation results with the performance results compared with the existed systems.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】
【发表时间】
【收录时间】2022-08-04
【文献类型】 实证性文章
【DOI】 10.1049/cmu2.12439
【Author】 Bhattacharya, S.
【影响因子】0.437
【主题类别】
区块链应用-实体经济-医疗领域
【Abstract】The fifth-generation wireless networks (5G) have an extremely low latency together with hundred times higher data transmission speed as compared to the existing 4G network. In healthcare, the ultra-reliable low latency communication (URLLT) feature of 5G will offer faster internet connectivity for massive objects and medical devices, with greater bandwidth and super coverage and availability. 5G is not a single technology or standard, but rather a combination of cutting-edge technologies, including big data, cloud computing, and artificial intelligence, virtual reality, machine learning, and deep learning, supercomputing and Internet of Things as well as digital security capabilities like blockchain. Together they will create an integrated ecosystem which will change medical education, telemedicine, smart ambulance and emergency services, care of the elderly and the patients recuperating in their homes, remote physiotherapy support and even remote surgery.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】5G; Telemedicine; Remote surgery; Augmented reality; Virtual reality; Machine learning; Tele-mentoring; Supercomputing; Big data
【发表时间】
【收录时间】2022-08-04
【文献类型】 实证性文章
【作者】 刘泽坤;王峰;贾海蓉;
【作者单位】太原理工大学信息与计算机学院;
【文献来源】计算机工程
【复合影响因子】1.808
【综合影响因子】1.289
【主题类别】
区块链技术-核心技术-共识机制
【摘要】近年来,实用拜占庭容错(PBFT)共识算法因联盟链的兴起而被广泛研究和应用,但其存在动态性缺乏、拜占庭节点处理方式不足以及算法通信开销和网络时延较大等问题。针对上述问题,本文提出基于积分机制-动态增删节点的实用拜占庭容错共识算法(DT-PBFT)。其中引入了动态加入/退出机制使集群内节点可以按需自由的加入/退出,具有较强的灵活性;其次增加信用积分制,通过分层机制将节点按可信任程度分为备用主节点层、中间层、警告层和清理层,采取较高的惩罚度机制降低节点连续作恶的可能性,从而保障了最优主节点从备用主节点层可优先选择,大大提高共识率。同时将网络清理层中的拜占庭节点剔除,提高了算法的运行效率;最后,基于上述两种机制再通过优化一致性协议对共识流程进行优化,减少了一轮全网节点的信息交互确认,极大程度上减少了通信开销。实验部分基于DT-PBFT、PBFT、DGPBFT以及DDBFT算法,通过控制变量方法,进行了多组对比性仿真实验。实验结果证明DT-PBFT随着节点数的增加性能优势体现的更为突出,当节点数为22时交易时延达到不逊于参与对比的两种算法且低于PBFT近350ms,同时保持吞吐量为292TPS,交易请求有效完成率为83.4%及CPU利用率在50%左右都明显优于其他对比算法,表明DT-PBFT在实用中的灵活性及节能性表现更好。
【关键词】区块链;;动态;;拜占庭容错算法;;信用机制;;分层
【文献类型】 实验仿真
【发表时间】2022-08-04
【作者】 张延华;赵铖泽;李萌;司鹏搏;孙恩昌;杨睿哲;
【作者单位】北京工业大学信息学部;北京工业大学先进信息网络北京实验室;
【文献来源】北京工业大学学报
【复合影响因子】
【综合影响因子】
【主题类别】
区块链应用-实体经济-无人机领域
【摘要】针对物联网设备部署在较偏远地区而导致的传输链路易受损或传输覆盖范围有限等问题,在此场景中引入了无人机和移动边缘计算(mobile edge computing,MEC)技术,有效改善物联网设备能源供给,优化计算资源,同时提升了通信覆盖范围,减少了不必要的网络开销.另外,区块链技术的引入保证了数据计算卸载与交互过程中的安全性和可靠性,实现数据共享.因此,面向无人机辅助的物联网系统提出一种融合MEC和区块链的资源分配决策方法,以实现MEC系统和区块链系统性能的最佳权衡为目标,综合考虑频谱资源和计算资源的分配,构建问题模型,并采用基于交替方向乘子法(alternating direction method of multipliers,ADMM)的分布式优化算法求解该优化问题.仿真结果表明,所提优化框架可以有效减少MEC系统的总能耗和区块链系统的计算时延.同时,所提方法具有良好的收敛性能,系统稳定性得到充分保证.
【关键词】资源优化;;物联网;;无人机;;移动边缘计算(mobile edge computing,MEC);;区块链;;交替方向乘子法(alternating direction method of multipliers,ADMM)
【文献类型】 实证性文章
【发表时间】2022-08-04
【作者】 王祥;罗亚;丁红发;
【作者单位】贵州财经大学;
【文献来源】机械设计与制造
【复合影响因子】
【综合影响因子】
【主题类别】
区块链技术-核心技术-分布式存储
【摘要】利用常规方法对区块链私钥进行分片存储前未对用户身份验证,存在嵌入时间波动大、私钥的恢复率低以及私钥储存延时长的问题,为此提出清扫机器人避障系统区块链私钥分片存储方法。该方法首先利用环签名算法将私钥转换成密钥,对节点分配环签名算法中的不同身份,进而对用户身份进行验证,其次利用载体图像将私钥嵌入到水印信息中,并根据用户身份进行私钥提取,实现区块链私钥分片存储。实验结果表明,清扫机器人避障系统区块链私钥分片存储方法的嵌入时间波动较小、私钥的恢复率较高,私钥储存延时较短,具有较好的性能。
【关键词】避障系统;;私钥存储;;小波变换;;身份认证;;水印嵌入
【文献类型】 理论性文章
【发表时间】2022-08-04
【作者】 丁建顺;任民;马亚彬;王凯;张闯;殷聪;
【作者单位】国网安徽省电力有限公司营销服务中心;国网安徽省电力有限公司电力科学研究院;哈尔滨电工仪表研究所有限公司;
【文献来源】电测与仪表
【复合影响因子】
【综合影响因子】
【主题类别】
区块链应用-实体经济-交通领域
【摘要】为解决电动汽车产业发展中电动汽车充电桩面临的检测维护、通信、数据安全等问题,文中以电动汽车交直流充电桩技术为基础,在此基础上,将RFID无线通信技术与区块链技术相结合应用于数据安全与管理中,提出了一种基于区块链技术的电动汽车充电桩共享检测的技术方案。方案实现了充电桩检测技术中射频通信机制与数据共享区的互斥管理,且保证了无源状态下的数据存储与通信安全。该方案对未来电动汽车充电桩共享检测系统的可行性、安全性、降低成本和功耗等都有一定的参考意义。
【关键词】电动汽车;;新能源;;RFID;;电能表;;区块链;;充电桩
【文献类型】 实证性文章
【发表时间】2022-08-04