【Abstract】It is witnessed that blockchain technology has been widely studied in Internet of Things (IoT) applications due to its decentralized tamper-resistance. Meanwhile, satellite-based IoT (S-IoT) becomes popular and has been regarded as a potential solution of the scalability due to its ubiquitous coverage inherited from satellites. Nevertheless, the large-scale blockchain network enabled S-IoT (BNS-IoT) would be limited by timely performing consensus. In this paper, we propose an age-critical blockchain sharding (ABS) scheme with the metric of information timeliness, i.e., age of information (AoI) to realize timely consensus in BNS-IoT. Specifically, we propose a forking-waiting-retransmission (FR) mechanism for the ABS scheme to deal with forking events, and realize a secure consensus. Then, we derive the closed-form expressions of average AoI (AAoI), throughput and security performance of the FR mechanism in ABS scheme, respectively, and compare with the n-block confirmation and select the longest-chain (n-LC) mechanism. Simulation results show that our ABS scheme can realize the linear expansion of throughput with the increasing number of shards, and our FR mechanism can greatly improve the security by sacrificing minor AAoI compared with the n-LC mechanism. Furthermore, our ABS scheme can outperform the conventional random sharding (RS) scheme in terms of AAoI and throughout.
【Abstract】With the growth of Internet technologies, including 5G, blockchain, and big data, the digital economy has emerged as an important driving force of economic growth, offering a fresh viewpoint on the sustainability of dual circulation. Thus, this study analyzes the impact of the digital economy on dual circulation and the underlying influencing mechanism. The influence of the digital economy on the degree of dual circulation sustainability was measured using panel data of 30 provinces in China from 2011 to 2020, and the influence was found to be significant and statistically positive. The analysis of the mechanism indicates that the increasing technological innovation capacity can amplify the digital economy's effect on dual circulation. The promotion effect of the digital economy has a spatial spillover effect. The function of the digital economy in fostering dual circulation is heterogenous, with a greater impact on central and eastern China. Therefore, this study proposes that increasing communication infrastructure investment and implementing differentiated policies supporting the digital economy should be considered by policymakers to boost dual circulation.
【Abstract】This study provides an in-depth analysis and research on multimedia fusion privacy protection algorithms based on IoT data security in a network regulation environment. Aiming at the problem of collusion and conspiracy to deceive users in the process of outsourced computing and outsourced verification, a safe, reliable, and collusion-resistant scheme based on blockchain is studied for IoT outsourced data computing and public verification, with the help of distributed storage methods, where smart devices encrypt the collected data and upload them to the DHT for storage along with the results of this data given by the cloud server. After testing, the constructed model has a privacy-preserving budget value of 0.6 and the smallest information leakage ratio of multimedia fusion data based on IoT data security when the decision tree depth is 6. After using this model under this condition, the maximum value of the information leakage ratio of multimedia fusion data based on IoT data security is reduced from 0.0865 to 0.003, and the data security is significantly improved. In the consensus verification process, to reduce the consensus time and ensure the operating efficiency of the system, a consensus node selection algorithm is proposed, thereby reducing the time complexity of the consensus. Based on the smart grid application scenario, the security and performance of the proposed model are analyzed. This study proves the correctness of this scheme by using BAN logic and proves the security of this scheme under the stochastic prediction machine model. Finally, this study compares the security aspects and performance aspects of the scheme with some existing similar schemes and shows that the scheme is feasible under IoT.
【Abstract】Blockchain is an emerging computing platform that provides recording and tracking facilities to substantially increase the security issues in healthcare systems. The evolution of wireless body area networks requires the continuous monitoring of the health parameters of traveling patients while traveling on road. The health parameter data of each patient are sent to the Road Side Units (RSUs) for generating the blocks by computing the required hash functions. A major challenge in such a network is to efficiently exchange the data blocks between mining RSUs and vehicles using a medium access protocol with a reduced number of collisions. The medium access problem becomes more challenging due to the vehicle mobility, high vehicle density and the varying nature of the data generated by the vehicles. In this work, a TDMA-based MAC protocol to meet an Adaptive Patients Data traffic for Vehicular Network (TAPD(VN)) is proposed. TAPD(VN) is specifically designed for patients in a vehicular network by considering the frequent entry and exit of vehicles in a mining node's coverage area. It allows mining nodes to adjust time slots according to the sensitive patient's data and allows the maximum number of patient vehicular nodes by considering their sensitivity to send their data in a session to compute their hash values accordingly. Simulation results verify that the proposed scheme accommodates the maximum number of high-risk patient data and improves bandwidth utilization by 20%.
【Abstract】For the past few years, centralized decision-making is being used for malicious node identification in wireless sensor networks (WSNs). Generally, WSN is the primary technology used to support operations, and security issues are becoming progressively worse. In order to detect malicious nodes in WSN, a blockchain-routing- and trust-model-based jellyfish search optimizer (BCR-TM-JSO) is created. Additionally, it provides the complete trust-model architecture before creating the blockchain data structure that is used to identify malicious nodes. For further analysis, sensor nodes in a WSN collect environmental data and communicate them to the cluster heads (CHs). JSO is created to address this issue by replacing CHs with regular nodes based on the maximum remaining energy, degree, and closeness to base station. Moreover, the Rivest-Shamir-Adleman (RSA) mechanism provides an asymmetric key, which is exploited for securing data transmission. The simulation outcomes show that the proposed BCR-TM-JSO model is capable of identifying malicious nodes in WSNs. Furthermore, the proposed BCR-TM-JSO method outperformed the conventional blockchain-based secure routing and trust management (BSRTM) and distance degree residual-energy-based low-energy adaptive clustering hierarchy (DDR-LEACH), in terms of throughput (5.89 Mbps), residual energy (0.079 J), and packet-delivery ratio (89.29%).
【Abstract】Mobile edge computational power faces the difficulty of balancing the energy consumption of many devices and workloads as science and technology advance. Most related research focuses on exploiting edge server computing performance to reduce mobile device energy consumption and task execution time during task processing. Existing research, however, shows that there is no adequate answer to the energy consumption balances between multi-device and multitasking. The present edge computing system model has been updated to address this energy consumption balance problem. We present a blockchain-based analytical method for the energy utilization balance optimization problem of multi-mobile devices and multitasking and an optimistic scenario on this foundation. An investigation of the corresponding approximation ratio is performed. Compared to the total energy demand optimization method and the random algorithm, many simulation studies have been carried out. Compared to the random process, the testing findings demonstrate that the suggested greedy algorithm can improve average performance by 66.59 percent in terms of energy balance. Furthermore, when the minimum transmission power of the mobile device is between five and six dBm, the greedy algorithm nearly achieves the best solution when compared to the brute force technique under the classical task topology.
【Abstract】In today's world, a lot of various kinds of raw materials are shipped from one place to another as per the requirement of industries. This shipping process involved many multiple levels with multiple personalities or authorities. The intermediates may be influenced by some illegal external factors and there may be some theft or modification in the raw material which is in the shipping process. This generates a significant loss if the material is of high cost. Presently, the advancements in information technology precede a method to restrict this loss and it is blockchain. Blockchain technology is an essential feature in enabling a comprehensive view of events back to origination. The shipping chain of raw materials that provides integrity and tamper resistance for raw materials in the shipping process is proposed in the manuscript. we have also provided proof of concept (PoC) in Hyperledger Composer with performance evaluation.
【Abstract】Large-scale production is always associated with more and more development and interaction among peers, and many fields achieve higher economic benefits through project cooperation. However, project managers in the traditional centralized approach cannot rearrange their activities to cross-organizational project management. Thanks to its characteristics, the Blockchain can represent a valid solution to the problems mentioned above. In this article, we propose Fabric-GC, a Blockchain-based Gantt chart system. Fabric-GC enables to realize secure and effective cross-organizational cooperation for project management, providing access control to multiple parties for project visualization. Compared with other solutions, the proposed system is versatile, as it can be applied to project management in different fields and achieve effective and agile scheduling. Experimental results show that Fabric-GC achieves stable performance in large-scale request and processing distributed environments, where the data synchronization speed of the consortium chain reached four times faster than a public chain, achieving faster data consistency.
【Abstract】Blockchain technology provides a decentralized and peer-to-peer network, which has the advantages of transparency and immutability. In this paper, a novel secure authentication scheme applying digital holography to blockchain technology is proposed to protect privacy information in network nodes. The transactional information of the node is chained permanently and immutably in the blockchain to ensure network security. By designing a novel two-dimensional (2D) array data structure of the block, a proof of work (PoW) in the blockchain is executed through digital holography technology to verify true au-thentication and legal block linkage. A hash generated from the proposed algorithm reveals a random number of 2D array data. The real identity of each node in the network cannot be forged by a hacker's tampering because the privacy information of the node is encrypted using digital holography and stored in the blockchain. The reliability and feasibility of the proposed scheme are analyzed with the help of the research results, which evaluate the effectiveness of the proposed method. Forgery by a malicious node is impossible with the proposed method by rejecting a tampered transaction. The principal appli-cation is a secure anonymity system guaranteeing privacy information protection for handling of large information.
【Abstract】Data Analytics (DA) plays an important role in improving and optimizing the processes in a Supply Chain (SC) network. Due to a huge amount of data generated in the various SC processes, the role of DA in Supply Chain Management (SCM) is becoming increasingly evident. Organizations have already invested heavily in applying various DA technologies to their SC networks. Several reviews have been conducted in different domains of SCM indicating applications and limitations of DA in SCM. As the research domain of DA applications in SCM matures, it is necessary to identify and address the research gaps that exist at the intersection of these domains. The paper qualitatively examines recent review papers in the domain of DA in SCM to identify and outline prominent ways that DA is currently applied in SCM, what potential future opportunities stated and what challenges affecting DA application in SCM are existing. Prominent use cases of DA in SCM include i) forecasting demand, ii) product development, iii) logistics route planning and iv) lean SC development. However, there is no prominent, unique future application list of DA in SCM since the findings vary across the papers. Prominent challenges affecting DA in SCM include i) lack of collaboration, ii) data sharing problems, iii) risks associated with BD management and iv) lack of skilled experts. Lastly, this article provides two conceptual ideas for addressing these prominent DA challenges in SCM: first, a framework for data analytics enabling collaboration in SCM by using transparent data questions and second, a blockchain-based data management approach in SC networks.