• 首页
  • 每日更新
  • 文献
  • 会议文献
  • 政策法规
  • 研究专题
  • 区块链游戏
logo 区块链前沿
  • 区块链前沿
  • 首页
  • 每日更新
  • 文献
  • 会议文献
  • 政策法规
  • 研究专题
  • 区块链游戏
  • 文章创新角色
  • 科研创新指数
  • 区块链领域本体
  • 热点主题挖掘
  • 主题展示
  • 专利文献
  • 排行榜
  • DAO治理
  • 文献上传
  • 积分获取规则
  • 大语言模型解析
  • 期刊发文分布
注册 登录

2022年09月04日 26篇

文献来源

  • 23
  • 3

主题分类

      • 2
      • 2
      • 1
      • 1
      • 1
      • 1
      • 2
      • 2
      • 1
      • 1
      • 2
      • 1
      • 1
      • 1
      • 1
      • 3
      • 2
      • 1
      • 1
      • 1

文献类型

  • 6
  • 2
  • 3
  • 12
  • 3
筛选
订阅
<< 前一天 后一天 >>

Matrix-Weighted Consensus of Second-Order Discrete-Time Multiagent Systems

【Author】 Miao, Suoxia Su, Housheng Chen, Shiming

CCF-B

【影响因子】14.255

【主题类别】

区块链技术-核心技术-共识机制

【Abstract】In this article, we study the matrix-weighted consensus issues for second-order discrete-time multiagent systems on directed network topology. Under the designed matrix-weighted consensus algorithm, based on the eigenvalues of the Laplacian matrix, coupling gains, and discrete interval, we build some consensus conditions for reaching discrete-time consensus and deduce some simplified and straightforward consensus conditions for undirected network topology. Besides, for a given network topology, we theoretically analyze the influence of the coupling gains and discrete intervals on the consensus conditions of the network dynamics. Finally, we offer several simulation examples to validate the obtained results.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Network topology; Eigenvalues and eigenfunctions; Couplings; Topology; Laplace equations; Symmetric matrices; Multi-agent systems; Consensus; discrete time; matrix weighted; multiagent systems (MASs); second order

【发表时间】

【收录时间】2022-09-04

【文献类型】 实验仿真

【DOI】 10.1109/TNNLS.2022.3194010

Profiling the Potential Risks and Benefits of Emerging "Play to Earn" Games: a Qualitative Analysis of Players' Experiences with Axie Infinity

【Author】 Delic, Amelia J. Delfabbro, Paul H.

【影响因子】11.555

【主题类别】

区块链应用-虚拟经济-GameFi

【Abstract】The invention of blockchain technology, coupled with the growing interest in cryptocurrencies, has given rise to a new form of monetised gaming known as "Play to Earn" (PTE). "Axie Infinity" (AI) is currently the most popular PTE game, occupying a large portion of the online gaming market. In this paper, we profile the risks and benefits of PTE gaming, with a specific focus on AI. Qualitative data in the form of online chat threads was evaluated via a Thematic Analysis (TA) approach. The analysis revealed a number of themes including the dominance of extrinsically motivated gameplay in conjunction with negative appraisals of game quality, the benefits and costs of play, and the potential for PTE scholarship models to be associated with exploitation. The results did, however, indicate awareness of potential consumer risks. The findings have implications for informing consumer education, regulation, as well as areas of focus in future quantitative research.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Play to Earn; Axie Infinity; Online gaming; Cryptocurrency

【发表时间】

【收录时间】2022-09-04

【文献类型】 实证数据

【DOI】 10.1007/s11469-022-00894-y

Food traceability 4.0 as part of the fourth industrial revolution: key enabling technologies

【Author】 Hassoun, Abdo Abdullah, Nour Alhaj Ait-Kaddour, Abderrahmane Ghellam, Mohamed Besir, Aysegul Zannou, Oscar Onal, Begum Aadil, Rana Muhammad Lorenzo, Jose M. Khaneghah, Amin Mousavi Regenstein, Joe M.

【影响因子】11.208

【主题类别】

区块链应用-实体经济-农牧领域

区块链应用-实体经济-供应链

区块链应用-实体经济-食品领域

【Abstract】Food Traceability 4.0 (FT 4.0) is about tracing foods in the era of the fourth industrial revolution (Industry 4.0) with techniques and technologies reflecting this new revolution. Interest in food traceability has gained momentum in response to, among others events, the outbreak of the COVID-19 pandemic, reinforcing the need for digital food traceability that prevents food fraud and provides reliable information about food. This review will briefly summarize the most common conventional methods available to determine food authenticity before highlighting examples of emerging techniques that can be used to combat food fraud and improve food traceability. A particular focus will be on the concept of FT 4.0 and the significant role of digital solutions and other relevant Industry 4.0 innovations in enhancing food traceability. Based on this review, a possible new research topic, namely FT 4.0, is encouraged to take advantage of the rapid digitalization and technological advances occurring in the era of Industry 4.0. The main FT 4.0 enablers are blockchain, the Internet of things, artificial intelligence, and big data. Digital technologies in the age of Industry 4.0 have significant potential to improve the way food is traced, decrease food waste and reduce vulnerability to fraud opening new opportunities to achieve smarter food traceability. Although most of these emerging technologies are still under development, it is anticipated that future research will overcome current limitations making large-scale applications possible.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Artificial intelligence; big data; Internet of things; blockchain; digital transformation; food fraud; Industry 4; 0; IoT; real-time surveillance; smart sensors

【发表时间】

【收录时间】2022-09-04

【文献类型】 观点阐述

【DOI】 10.1080/10408398.2022.2110033

Improving transaction succeed ratio in payment channel networks via enhanced node connectivity and balanced channel capacity

【Author】 Guo, Jianan Wang, Zhaojie Liang, Hai Zhao, Minghao An, Hui Wang, Yilei

CCF-C

【影响因子】8.993

【主题类别】

区块链技术-核心技术-核心技术集

【Abstract】Payment channel networks (PCNs) are generally regarded as one of the most effective and promising scalability solutions for blockchain-based cryptocurrency systems, but suffer the issues of low success ratio and long confirmation latency in processing transactions. In this paper, we demonstrate the feasibility of tremendously increasing the success ratio of transactions and improving their execution efficiency by enhancing network nodes' connectivity and enforcing a balanced network channel capacity. To implement such ideas, multiple designs have been made. First, to extent nodes connectivity, we transform the nearly-linear ordered nodes into a star payment structured typology, and design an incentive financing mechanism to restructure a new landmark routing typology design. Especially, for the marginalized or dissociative nodes, we utilize specific financial loan strategies to encourage them to (re)join the system. Besides, we propose the Power Atomic Multi-Path Payments (Power AMP) traffic distribution method, which hierarchically allocates the bottleneck's currently-available capacity (to replace the random or equal division used in traditional AMP), and thus archives a balanced traffic usage. With such efforts, we improve the transaction success ratio and efficiency of transaction exertion by order of magnitude-compared with traditional PCN using the benchmark of landmark route, our method improves the success ratio by 11.06%.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】blockchain; payment channel networks; transactions

【发表时间】

【收录时间】2022-09-04

【文献类型】 实验仿真

【DOI】 10.1002/int.22978

An enabling Framework for Blockchain in Tourism

【Author】 Balasubramanian, Sreejith Sethi, Jaspreet Singh Ajayan, Shalini Paris, Cody Morris

【影响因子】6.093

【主题类别】

区块链应用-实体经济-旅游领域

【Abstract】This viewpoint article proposes an enabling framework that identifies the use of various blockchain technologies in tourism and their applications (digitalization, automation, disintermediation, and intelligent environment) across the different stages of travel (pre-trip, during the trip, and post-trip). As we know, the tourism sector contributes immensely to world GDP and job creation. However, the COVID-19 pandemic, even after two years since it first appeared, continues to adversely impact the tourism prospects of countries across the world due to nationwide lockdowns and travel restrictions. As the world tries to adapt to the "new normal," the tourism sector is forced to re-think its ways of doing business and bring about innovations to facilitate the new norms of contactless and safe transactions. Also, the sector, more than ever, need to effectively deal with its inherent challenges such as transparency and credibility of information, fraudulent practices, opportunistic behavior of intermediaries, and foreign currency risks. Blockchain technology can transform the tourism sector by offering innovative solutions that address its pressing issues. However, our current understanding of blockchain application in tourism is quite limited, with previous work being largely fragmented and narrow in terms of both scope and application. We foresee that the insights offered in this viewpoint, including the framework, will advance both theory and practice and facilitate the implementation of blockchain-enabled solutions across different travel stages.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Cryptocurrency; Automation; Intelligent environments; Digitalization; Disintermediation; Smart tourism; Blockchain technology; COVID-19

【发表时间】

【收录时间】2022-09-04

【文献类型】 理论模型

【DOI】 10.1007/s40558-022-00229-6

PDPChain: A Consortium Blockchain-Based Privacy Protection Scheme for Personal Data

【Author】 Liang, Wei Yang, Yang Yang, Ce Hu, Yonghua Xie, Songyou Li, Kuan-Ching Cao, Jiannong

CCF-C

【影响因子】5.883

【主题类别】

区块链技术-协同技术-隐私计算

【Abstract】With the advances and innovations in digital technologies, blockchain has empowered advancements in communications and networking, promising to build trust and establish secure decentralized communications networks. Unfortunately, current personal data privacy protection schemes still suffer from explicit storage, lack of data ownership and implementation of fine-grained access control by users, and lack of transparency and auditability of data. In this article, we propose a personal data privacy protection scheme based on consortium blockchain that stores original data encrypted with an improved Paillier homomorphic encryption mechanism, namely PDPChain, where users realize fine-grained access control based on ciphertext policy attribute-based encryption (CP-ABE) on blockchain. In this scheme, consortium blockchain combines distributed private clusters to store the encrypted data, improving data transmission efficiency, and guaranteeing user privacy and security through off-chain storage and on-chain transmission synergy. In addition, it is more lightweight encryption and demarcation, ultimately protecting personal data privacy and providing a secure and trusted way to obtain information for data mining. For the performance testing, data in the form of files are used as an example, and the scheme is designed and simulated on Hyperledger Fabric and InterPlanetary File System. Experimental results show that the improved Paillier encryption mechanism reduces the overall encryption and decryption elapsed time by 25% and encryption elapsed time by 48%. Furthermore, the proposed CP-ABE access control method is adaptive to storing and sharing a massive amount of data. With the increase in the number of access control policies, the overall time-consuming of the scheme does not increase, and the time-consuming of decryption can also be stabilized at about 2 s.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchains; Access control; Data privacy; Cryptography; Homomorphic encryption; Authentication; Cloud computing; Consortium blockchain; ciphertext policy attribute-based encryption (CP-ABE); homomorphic encryption; InterPlanetary File System (IPFS); privacy protection; secure sharing

【发表时间】

【收录时间】2022-09-04

【文献类型】 理论模型

【DOI】 10.1109/TR.2022.3190932

Metaverse: How to Approach Its Challenges from a BISE Perspective

【Author】 Peukert, Christian Weinhardt, Christof Hinz, Oliver van der Aalst, Wil M. P.

【影响因子】5.675

【主题类别】

区块链应用-虚拟经济-元宇宙

【Abstract】

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】

【发表时间】

【收录时间】2022-09-04

【文献类型】 观点阐述

【DOI】 10.1007/s12599-022-00765-9

Theorizing the impact of network characteristics on multitier sustainable supply chain governance: a power perspective

【Author】 Gruchmann, Tim

【影响因子】5.446

【主题类别】

区块链应用-实体经济-供应链

【Abstract】Purpose While the literature on multitier supply chain management traditionally assumes that first-tier suppliers belong to the visible proportion of the supply base, intermediaries might limit focal firms' visible horizon already at this stage. High power asymmetries promoting centrality and complexity in the supply network are seen as a particular root cause that limits the impact of governance mechanisms for sustainability. To map the space for governance mechanisms in a network-sensitive context more comprehensively, the study analyzes supply network characteristics from a power perspective. Design/methodology/approach This research is conceptual. To better understand power imbalances and mutual dependencies from network centrality and complexity, network configurations were constructed drawing on resource dependence theory. These configurations allow deducing the impact of (non-)mediated governance mechanisms for a sustainable development in the supply network. An agenda to stimulate future empirical and model-based research is accordingly presented. Findings The research shows that those networks with densely interconnected first-tier suppliers promote network centrality and complexity, leading to an inverted U-shape relationship between the focal firm's exertion of coercive power and the sustainability performance in the supply network. The findings allow a more comprehensive theoretical grounding for mapping governance approaches in a network-sensitive context and provide insights on how to avoid negative effects from power asymmetries. Practical implications The findings suggest the need for accompanying, indirect governance mechanisms already at the stage of first-tier suppliers based on non-mediated forms of power, such as referent power, also promoting disintermediation. Purchasing companies may also consider using digital platform technologies that foster disintermediation, such as blockchain technology. Originality/value By studying intermediaries from a power and network perspective, the conceptualization adds to the discussion on governance in multitier sustainable supply chain networks in various industries. Furthermore, it contributes to the increasing efforts of middle-range theorizing in logistics and supply chain management. The results partially challenge previous assumptions on the moderating role of specific network characteristics.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Supply chain governance; Power asymmetry; Sustainable supply chain management; Supply networks

【发表时间】2022

【收录时间】2022-09-04

【文献类型】 观点阐述

【DOI】 10.1108/IJLM-08-2021-0429

Testing the adoption of Blockchain Technology in Supply Chain Management among MSMEs in China

【Author】 Deng, Nianqi Shi, Yangyan Wang, Junbin Gaur, Jighyasu

【影响因子】4.820

【主题类别】

区块链应用-实体经济-供应链

【Abstract】Supply chain (SC) digitalization has become a new trend in the development of micro, small, and medium enterprises (MSMEs). Blockchain technology (BCT) is a cutting-edge innovation that many supply chain management (SCM) professionals have already adopted. Although studies on BCT have yielded some findings, they do not provide sufficient discussion regarding BCT adoption in SCs among MSMEs. Moreover, the determinants and effects of BCT adoption on SCM among MSMEs remain unclear. This study aims to bridge these gaps by helping understand individual BCT adoption in the SC domain in Chinese MSMEs. Using the technology-organization-environment (TOE) framework, this study examines the effects of BCT, organizational, and environmental contexts on BCT adoption in MSMEs' SCs. The findings reveal that cost saving, complexity, relative advantage, top management support, SC cooperation, and government support positively affect BCT adoption in SCM. Whereas, compatibility, technological readiness, financial readiness, and competitive pressure had no significant impact on BCT adoption in SCM among MSMEs in China.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Supply chain management; MSMEs; Blockchain technology adoption

【发表时间】

【收录时间】2022-09-04

【文献类型】 实证数据

【DOI】 10.1007/s10479-022-04856-4

Patient-Centric Token-Based Healthcare Blockchain Implementation Using Secure Internet of Medical Things

【Author】 Dewangan, Narendra K. Chandrakar, Preeti

【影响因子】4.747

【主题类别】

区块链应用-实体经济-医疗领域

【Abstract】Security and privacy are becoming increasingly difficult to preserve in today's fast-growing data world. We use the Internet of Medical Things (IoMT) to make quick diagnoses and get results. IoMT devices measure the human body's functioning in various parameters and collect, process, and store data in cloud servers. There is a public channel used to collect data from humans and send it to the cloud, which is highly unreliable and vulnerable to attacks. Another risk is storing data in a single centralized system, which can be vulnerable to a single-point failure. Blockchain is being used for secure data storage in a decentralized manner to avoid single-point failure. We propose a secure IoMT-based data collection method for patients and storing the data on the blockchain in accordance with general data protection regulation (GDPR). In the proposed system, IoMT devices send data to the cloud via the patient's personal digital assistant (PDA), and the cloud server transacts data on the blockchain. We propose a miner selection algorithm to avoid bias in the blockchain. We simulate various attacks on open channels between IoMT devices and the cloud servers. This scheme is implemented on a custom Python-based blockchain. IoT simulation is performed using the Bevywise IoT simulator and the message queuing telemetry transport (MQTT) simulator. The security protocol is analyzed using Scyther.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchains; Cloud computing; Medical services; Security; Servers; Data models; Cryptography; Authentication; blockchain; healthcare; Internet of Medical Things (IoMT); privacy; security

【发表时间】

【收录时间】2022-09-04

【文献类型】 理论模型

【DOI】 10.1109/TCSS.2022.3194872

A model-based smart contracts system via blockchain technology to reduce delays and conflicts in construction management processes

【Author】 Wahab, Abdul Wang, Jun Shojaei, Alireza Ma, Junfeng

【影响因子】3.850

【主题类别】

区块链技术-核心技术-智能合约

【Abstract】Purpose Smart contracts using blockchain technology (BCT) is a tool that decentralizes authority and makes it easier to upgrade the contract administration process by providing an efficient system. Current literature provides a good overview of contracts in the construction industry; however, the specific details of BCT's smart contracts applications in the three categories have not been addressed adequately: (1) information quality, (2) enhancing project schedule and progress payment time and (3) reducing conflicts among project stakeholders. Thus, this study aims to analyze smart contracts using BCT by creating a computerized contract model, specifically evaluating its impact on the three identified categories. Design/methodology/approach In this paper BCT-SmContract was developed through an automated program that utilizes blockchain to define the contractual agreements between different parties in a construction project. BCT-SmContract model provides a new technique to overcome the current challenges associated with factors identified in this study, i.e. (1) information quality, (2) enhancing project schedule and progress payment time and (3) reducing conflicts among project stakeholders. Afterward, the model was tested to ensure validity and reliability through a construction project. Findings The findings indicated that BCT-SmContract was approximately 90% faster to execute the contract and 100% accurate in reflecting the correct information about the project status, resulting in reduced conflicts. Originality/value This study has contributed in upgrading the traditional contracting method in construction by developing an automated smart contract model to enhance the processes and achieve higher accuracy.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain technology (BCT); Smart contracts; Contracts model; Construction management processes; Case study; Categories

【发表时间】

【收录时间】2022-09-04

【文献类型】 理论模型

【DOI】 10.1108/ECAM-03-2022-0271

Uncovering research trends and opportunities on FinTech: a scientometric analysis

【Author】 Wang, Junbin Zhao, Chenyang Huang, Lufei Yang, Shuai Wang, Minxing

【影响因子】3.462

【主题类别】

区块链应用-虚拟经济-金融领域

【Abstract】This paper employs the scientific econometric analysis approach to review 705 academic publications related to Fintech from 2006 to 2021. The historical evolution, latest status and development trend of FinTech research are identified by co-authorship networks, co-citation networks and timeline evolution. CiteSpace software is applied to conduct the literature analysis. The results show that the scientometric analysis based on CiteSpace is a practical approach to review the development of financial technology. The rapidly increasing number of publications confirms the vitality of the FinTech field. China, the USA, the UK, Australia and South Korea are the most productive countries in the FinTech field. In contrast, the UK is the country with the highest degree of inter-country cooperation. The analysis results of citation bursts and timeline evolution on FinTech research provide the trends of FinTech research in discipline categories and keywords. Finally, four frontier research streams of FinTech are proposed.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Fintech; Financial technology; Scientometric analysis; CiteSpace

【发表时间】

【收录时间】2022-09-04

【文献类型】 综述

【DOI】 10.1007/s10660-022-09554-8

Advanced security model for multimedia data sharing in Internet of Things

【Author】 Dhar, Shalini Khare, Ashish Singh, Rajani

【影响因子】3.310

【主题类别】

区块链应用-实体经济-其他

【Abstract】Sharing a file that contains multimedia data among the different peers of wireless Internet of Things (IoT) networks has several challenges. One of the main challenges is their centralized system, which leads to high-security risk and low user reachability. One solution could be to simply change the system to a decentralized network by using the blockchain network to store these files. However, it may solve the low user reachability and security problem at the cost of low latency, longer response time, scalability and privacy issues. Therefore, this article uses the advanced blockchain scheme and distributes InterPlanetary File System. We also presented the system framework and its working. Finally, we do the security analysis of our proposed system and found that it has strong potential to solve most of the security challenges that traditional system faces. Moreover, our proposed approach can be applied to any file-changing wireless IoT network that needs to exchange multimedia data such as healthcare data, IoT data in wearable devices, traffic data in smart cities, etc.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】

【发表时间】

【收录时间】2022-09-04

【文献类型】 理论模型

【DOI】 10.1002/ett.4621

A rendezvous block-based authentication framework for service-level security in decentralized cloud resources

【Author】 Murugaiyan, Pajany Godandapani, Zayaraz

CCF-C

【影响因子】2.812

【主题类别】

区块链技术-协同技术-云计算

【Abstract】Cloud services are distributed from manifold sources with autonomous security procedures. The conventional authentication methods result in asynchronous security towards multi-resource access and sharing. This provides volatile authentication for sequential service sessions. For alleviating this issue, a Rendezvous Block-based Authentication Framework (RBAF) is proposed. This framework is backboned with a blockchain paradigm that differentiates authentication based on rendezvous and asynchronous attributes. The modifications in initial and final attributes are observed, intended for training, and supplanted with service-dependent authentications. In the different sessions, attribute-based authentication and agreed end-to-end security are administered using agreed keys that are valid within the sessions. This key generation is modified using the new session and user attributes based on learning recommendations. The ledger paradigm records the session and its associated attributes for different training instances, based on which service flexibility is ensured. The proposed framework's performance is verified using the metrics service distribution ratio, false rate, session uptime, and service delay.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】attribute authentication; blockchain; cloud service; machine learning; mutual key

【发表时间】

【收录时间】2022-09-04

【文献类型】 实验仿真

【DOI】 10.1111/exsy.13106

A novel blockchain federated safety-as-a-service scheme for industrial IoT using machine learning

【Author】 Hasan, Nabeela Chaudhary, Kiran Alam, Mansaf

CCF-C

【影响因子】2.577

【主题类别】

区块链技术-协同技术-物联网

【Abstract】Blockchains are costly in terms of computing and involve high overhead bandwidth and delays that are not suitable for smart appliances. Enhancing the precision of output, quality, and delivery of data is particularly critical in Machine Learning. The combination of Machine Learning and Blockchain technologies may create accurate results. The Industrial IoT (IIoT), has quickly been established and is getting huge attention in educational areas and manufacturing, but IoT solitude danger and privacy exposures are developing by lack of important security technology. Because blockchain technique's regionalization and information revelation were planned as a decentralized and distributed method to give assurance security and motivate the development of the IoT and IIoT. The Blockchain Driven Cyber-Physical system (BDCPS) is supported by IoT and cloud services. BDCPS will confirm the statement utilizing the Intelligent Agreements functionality and the trust-less peer-to-peer centrally controlled database showcase by a tiny-scale real-life Blockchain to the IoT system. In this study, a private Blockchain can be run on a separate board system and paralleled to a microcontroller with Smart devices. The suggested system uses blockchain technology to resolve issues such as lightweight, evaporation, warehousing transactions, and shipment time. The data flow of Blockchain is intended to demonstrate the application of machine learning to food traceability. Finally, to extend shelf life, a supply chain employs dependable and accurate data. This paper shows a relevant blockchain and machine learning research that identifies numerous key elements of combining the two technologies such as Blockchain and Machine Learning, including an overview, benefits, and applications.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; IoT; Security of information; Machine learning; Blockchain technology; Cloud storage; Industry 4; 0

【发表时间】

【收录时间】2022-09-04

【文献类型】 理论模型

【DOI】 10.1007/s11042-022-13503-w

Prospects and challenges of Metaverse application in data-driven intelligent transportation systems

【Author】 Njoku, Judith Nkechinyere Nwakanma, Cosmas Ifeanyi Amaizu, Gabriel Chukwunonso Kim, Dong-Seong

CCF-C

【影响因子】2.568

【主题类别】

区块链应用-虚拟经济-元宇宙

【Abstract】The Metaverse is a concept used to refer to a virtual world that exists in parallel to the physical world. It has grown from a conceptual level to having real applications in virtual reality games. The applicability of the Metaverse in numerous sectors like marketing, education, social, and even advertising exists. However, there exists little or no work on Metaverse applicability to the transportation industry. Data-driven intelligent transportation systems (DDITS) aim to provide more intelligent systems based on exploiting data. This paper reviews the concepts and features of the Metaverse. Also, the review goes over three dominant DDITS challenges: vehicle fault detection and repair, testing new technologies, and anti-theft systems. In addition, it highlights prospective Metaverse solutions that apply to the DDITS. Buttressing the utility of Metaverse in DDITS, this paper presents two major case studies: the invisible to visible (I2V) and the Metaverse on Wheels (MoW) technologies. Finally, the influence, limitations, and open issues of Metaverse applications to DDITS are discussed.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】

【发表时间】

【收录时间】2022-09-04

【文献类型】 综述

【DOI】 10.1049/itr2.12252

Blockchain-based secure data transmission for internet of underwater things

【Author】 Razzaq, Abdul

【影响因子】2.303

【主题类别】

区块链技术-协同技术-物联网

【Abstract】Internet of Things (IoTs) is an integrated network collection of heterogeneous objects which enable seamless integration between systems, humans, devices, and various other things, to support pervasive computing for smart systems. IoT-driven systems and sensors continuously ingest data resulting in an increased volume and velocity of information which can lead to critical concerns such as security of the data and scalability of the system. The Internet of Underwater Things (IoUTs) is a specific genre of IoTs in which data related to oceanic ecosystems is continuously sensed through underwater sensors. IoUT has emerged as an innovative paradigm to support smart oceans. However, there are several critical challenges which IoUT system designers must consider such as (1) scalability of the system to handle large volumes of oceanic data and (2) security of data that is transmitted from IoT sensors deployed underwater. Blockchain as a newly emerged technology and an enabling platform allows decentralized and secure transmission of data among a wide group of untrustworthy parties. This research aims to exploit blockchain technology to secure IoUT data transmission by exploiting Interplanetary File System (IPFS) method. Additionally, this study also addresses the system's scalability in two aspects, (1) scalability, and (2) security. We used a case study-based approach and performed experiments to evaluate the proposed solution's usability and efficiency in terms of query response (i.e., performance), and algorithmic execution (i.e., efficiency). The proposed solution unifies blockchain technologies to secure IoT-driven systems and provides guidelines to engineer and develop next-generation of robust and secure blockchain-aided distributed IoT systems.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Internet of things; Blockchain; Smart contract; Ethereum; Decentralized storage; Privacy; Data security

【发表时间】

【收录时间】2022-09-04

【文献类型】 理论模型

【DOI】 10.1007/s10586-022-03701-4

GPBFT: A Practical Byzantine Fault-Tolerant Consensus Algorithm Based on Dual Administrator Short Group Signatures

【Author】 Yu, Xiaosheng Qin, Jie Chen, Peng

CCF-C

【影响因子】1.968

【主题类别】

区块链技术-核心技术-共识机制

【Abstract】The practical Byzantine fault-tolerant consensus algorithm reduces the operational complexity of Byzantine protocols from an exponential level to a polynomial level, which makes it possible to apply Byzantine protocols in distributed systems. However, it still has some problems, such as high communication overhead, low security, poor scalability, and difficulty in tracking. In this article, we propose a Byzantine fault-tolerant consensus algorithm based on dual administrator short group signatures (GPBFT). Firstly, the certification authority chooses the master node and group administrators based on the credit value. The group administrators organize the nodes into a group, and the members generate the signatures by applying the short group signatures scheme, in which any group member can represent the group during the GroupSign phase. Additionally, the GPBFT algorithm adds the Trace phase. According to member and client authentication information, the group administrator can track the true identity of the malicious node, identify the malicious node, and revoke it. The experimental results show that compared with the PBFT algorithm, the GPBFT algorithm can reduce the network communication overhead, reduce the consensus delay, and greatly improve the security and stability of the system. The algorithm can effectively manage member nodes and enable the tracking of identified malicious nodes while maintaining anonymity in terms of node tracking.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】

【发表时间】2022

【收录时间】2022-09-04

【文献类型】 理论模型

【DOI】 10.1155/2022/8311821

Towards roadmap to implement blockchain in healthcare systems based on a maturity model

【Author】 Akbar, Muhammad Azeem Leiva, Victor Rafi, Saima Qadri, Syed Furqan Mahmood, Sajjad Alsanad, Ahmed

【影响因子】1.864

【主题类别】

区块链应用-实体经济-医疗领域

【Abstract】Healthcare systems face various issues related to complex networks of intermediaries and a lack of transaction traceability. The most critical issues are the fragmentation of healthcare data, obstacles in providing efficient research and services, lack of clinical trial reporting, high cost and mismanagement of the drug supply chain, patient data security, and fake drugs. Blockchain technology has the potential to address these criticalities as it has in build traceability mechanisms and promises new business models by enabling incentive structures. This potential of blockchain gathers a high interest in the health industry. However, the implementation of blockchain in healthcare faces various issues as well. Currently, there are no practice-oriented maturity models to improve such an implementation. In this paper, we present a roadmap to develop a maturity model for blockchain in healthcare (MMBH) based on critical barriers (CBs), critical success factors (CSFs), and the best practices for blockchain implementation in healthcare systems. As a first step to develop the MMBH, in this paper, we present the initial results of a systematic literature review (SLR) to identify critical success factors for implementing blockchain in healthcare systems. We also applied fuzzy technique order preference by similarity to ideal solution (TOPSIS) to prioritize the identified CSFs.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】blockchain technology; critical barriers and success factors; drug supply chain; systematic and multivocal literature reviews; traceability

【发表时间】

【收录时间】2022-09-04

【文献类型】 理论模型

【DOI】 10.1002/smr.2500

Block chain enabled auditing with optimal multi-key homomorphic encryption technique for public cloud computing environment

【Author】 Bandaru, Venkata Naga Rani Visalakshi, P.

【影响因子】1.831

【主题类别】

区块链技术-协同技术-云计算

【Abstract】Cloud storage is a significant cloud computing (CC) service which enables the client to save and retrieve the data at anytime and anywhere. Due to the increased demand and familiarity of the CC environment, different kinds of security threats and susceptibilities are raised. Data integrity and privacy are the major problems in CC environment where the data can be saved in distinct geographic regions. So, privacy preservation and data integrity become important factors of the user concern related to the CC environment. Several auditing protocols are majorly dependent upon the conventional public key infrastructure, which led to high computational complexity and it is unsuitable for the setting of multiple users. To resolve these issues, this study develops a new block chain enabled auditing with optimal multi-key homomorphic encryption (BEA-OMKHE) technique for public cloud environment. The proposed BEA-OMKHE technique aims to assure data integrity, security, and auditing in public cloud storage. Besides, an OMKHE technique is derived to accomplish data integrating into the cloud environment by the design of end to end encryption system. A secure generation of keys and encryption processes are carried out by the use of MKHE technique; thereby the data becomes highly secure. In addition, the choice of keys is performed by the improved beetle antenna search optimization (IBAS) algorithm. Therefore, the proposed BEA-OMKHE technique offers an efficient way of enhancing the data integrity in CC method. The performance validation of the BEA-OMKHE technique takes place and the results are inspected under various aspects. The comparative result analysis ensured the betterment of the BEA-OMKHE technique interms of different measures such as communication cost, encryption time, decryption time, computation cost, privacy preserving rate, and authentication accuracy.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】auditing; blockchain; cloud computing; encryption process; optimal key generation; security

【发表时间】

【收录时间】2022-09-04

【文献类型】 理论模型

【DOI】 10.1002/cpe.7128

Three-stage auction scheme for computation offloading on mobile blockchain with edge computing

【Author】 Xia, Chengpeng Wu, Yalan Chen, Long Chen, Yawen Wu, Jigang

【影响因子】1.831

【主题类别】

区块链技术-协同技术-边缘计算

【Abstract】Blockchain has been applied in wide range of fields to guarantee security. However, it has been very challenging for blockchain to flourish in mobile environment with limited resources. Existing studies mainly assume that single mobile user can buy the whole resources from edge servers in mobile blockchain. This paper formulates the problem of maximizing the social welfare for computation offloading in mobile blockchain. A three-stage auction scheme with approximation ratio of (1-epsilon)$$ \left(1-\epsilon \right) $$ based on group-buying mechanism is proposed to allocate edge server resources for mobile blockchain applications. In the first stage, the miners are divided into groups, and a Vickrey-Clarke-Groves based auction is proposed to determine the bid of each group for each edge server. In the second stage, a matching algorithm is proposed to match edge servers and Access Points for maximizing the profit of edge servers. In the third stage, the edge server resources are allocated to mobile users for mining base on the results in the above stages. We prove that our auction scheme guarantees truthfulness, individual rationality and budget balance. Simulation results show that, the social welfare of our scheme is improved by 33.78%, 21.84%, 19.69%, and 6.69% for 1000 miners, compared with the existing works.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】auction; edge computing; mobile blockchain; resource allocation

【发表时间】

【收录时间】2022-09-04

【文献类型】 理论模型

【DOI】 10.1002/cpe.7253

Solving old problems or making new ones? Blockchain technology for the protection of refugees and migrants

【Author】 Connolly, Daniel Nam, Seunghyun Goodman, Kirsty

【影响因子】1.481

【主题类别】

区块链应用-实体经济-公共管理

【Abstract】Blockchain technology has applications that can revolutionize political and economic governance. Although most of the academic literature on blockchain has focused on Bitcoin, there is a need to look at the feasibility of new humanitarian applications. This study will proceed in two steps. First, it surveys current theoretical and practical work on how blockchain can be used to help protect the human rights of migrants and refugees, primarily through creation of digital identities. Then it conducts a critical examination of two major cases: the Building Blocks initiative by the World Food Programme in Jordan and the Rohingya Project. We find that blockchain can be useful in empowering vulnerable individuals, but the empowerment of organizations creates potential human rights risks, such as the infringement of privacy and discrimination. Therefore, adequate safeguards should be in place to ensure that blockchain initiatives meet their true purposes of protecting the most vulnerable groups.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】

【发表时间】

【收录时间】2022-09-04

【文献类型】 综述

【DOI】 10.1080/14754835.2022.2100984

To sell public or private goods

【Author】 Loertscher, Simon Marx, Leslie M.

【影响因子】0.238

【主题类别】

区块链应用-虚拟经济-NFT

【Abstract】Traditional analysis takes the public or private nature of goods as given. However, technological advances, particularly related to digital goods such as non-fungible tokens, increasingly make rivalry a choice variable of the designer. This paper addresses the question of when a profit-maximizing seller prefers to provide an asset as a private good or as a public good. While the public good is subject to a free-rider problem, a profit-maximizing seller or designer faces a nontrivial quantity-exclusivity tradeoff, and so profits from collecting small payments from multiple agents can exceed the large payment from a single agent. We provide conditions under which the profit from the public good exceeds that from a private good. If the cost of production is sufficiently, but not excessively, large, then production is profitable only for the public good. Moreover, if the lower bound of the support of the buyers' value distribution is positive, then the profit from the public good is unbounded in the number of buyers, whereas the profit from selling the private good is never more than the upper bound of the support minus the cost. As the variance of the agents' distribution becomes smaller, public goods eventually outperform private goods, reflecting intuition based on complete information models, in which public goods always outperform private goods in terms of revenue.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Revenue maximization; Public goods; Mechanism design; Non-fungible token (NFT); Bilateral trade

【发表时间】2022

【收录时间】2022-09-04

【文献类型】 理论模型

【DOI】 10.1007/s10058-022-00305-7

一种面向区块链溯源的高效查询方法

【作者】 刘炜;王栋;佘维;潘恒;宋轩;田钊;

【作者单位】郑州大学软件学院;郑州大学互联网医疗与健康服务河南省协同创新中心;郑州大学信息工程学院;中原工学院前沿信息技术研究院;

【文献来源】应用科学学报

【复合影响因子】

【综合影响因子】

【主题类别】

区块链技术-核心技术-区块传输

【摘要】针对现有区块链溯源系统查询效率较低以及引入外部数据库会面临数据篡改的风险问题,提出了一种面向区块链溯源的高效查询方法。首先结合布隆过滤器与Merkle树提出BMerkle树,进而形成一种新的区块结构,以便快速检索交易是否存在,同时查找存在交易的具体内容。然后在区块链外部添加索引构建一种优化的跳表结构hot_skiplist,可实现区块的快速定位;基于区块访问次数动态调整索引层级,进一步提高访问次数频繁区块的查询效率。最后通过实验验证了该方法能在保证区块链数据不可篡改的情况下有效提高溯源查询效率。

【关键词】区块链;;默克尔树;;查询效率;;布隆过滤器;;跳表

【文献类型】 实验仿真

【DOI】

【发表时间】2022-09-04

用于联盟链的布隆过滤器优化

【作者】 吴亦涵;黄建华;邵兴辉;王诚;

【作者单位】华东理工大学信息科学与工程学院;

【文献来源】应用科学学报

【复合影响因子】

【综合影响因子】

【主题类别】

区块链技术-核心技术-加密算法

【摘要】布隆过滤器常用于联盟链Hyperledger Fabric状态数据库LevelDB的读性能优化,但布隆过滤器本身存在误报现象,且LevelDB只能对布隆过滤器进行统一配置而无法自适应调整。为此,提出一种单元化的部分计数式布隆过滤器(partial counting Bloom filter,PCBF)构造方案,设计可并行计算的元素插入与查询机制并结合双重哈希及非加密哈希来实现快速插入与查询;基于开启过滤器单元与访问次数构建排序字符串表优先级,使用时间片轮询算法对过滤器单元进行自适应调整,实现了资源的合理分配。实验结果表明:PCBF具有较高的插入效率,并能减少20%左右的误报数量,适用于联盟链的高并发场景。

【关键词】区块链;;Hyperledger Fabric;;LevelDB;;布隆过滤器;;日志结构合并树

【文献类型】 实验仿真

【DOI】

【发表时间】2022-09-04

面向医疗区块链的新型轻节点数据查询方法

【作者】 张学旺;付康;叶财金;汪琨岚;

【作者单位】重庆邮电大学软件工程学院;

【文献来源】应用科学学报

【复合影响因子】

【综合影响因子】

【主题类别】

区块链技术-核心技术-核心技术集

【摘要】医疗区块链系统的用户向全节点请求数据时可能被欺骗,而简单支付验证等轻节点数据查询方法面临着存储困难。为解决这些问题,提出了一种面向医疗区块链的新型轻节点数据查询方法。引入具有动态追加能力的Merkle山脉(Merkle mountain range, MMR),设计基于推荐的可信节点选择和基于采样的可信节点验证的最新有效块获取算法,采取MMR和Merkle树的承诺机制,使得持有一个最新有效块的轻节点用户能够验证全节点发送的医疗数据。此外,还将该方法扩展应用于联盟链。分析和实验表明,所提方法的时间开销和空间开销均在较低的范围内。

【关键词】轻节点;;Merkle山脉;;数据查询;;医疗区块链

【文献类型】 实验仿真

【DOI】

【发表时间】2022-09-04

在线标注

备案号: 苏ICP备17025947号-5

评论回复