【Abstract】In this paper, an automated real-time traffic management scheme is proposed by using unmanned aerial vehicles (UAV) in an effective and secured way. However, owing to the low computational capability and limited battery capacity of a UAV, multi-access edge computing (MEC) is applied to enhance the performance of an automated UAV-based traffic management scheme. Additionally, blockchain technology is introduced in the automated traffic management scheme to store the traffic record for providing network repudiation and avoiding any third-party interference with the network. An algorithm is developed based on the concept of a pairwise compatibility graph for the UAV-assisted automated traffic management scheme wherein a deep learning (DL) model is used for vehicle detection. Moreover, a two-phase authentication mechanism is proposed for a faster and secure verification process of the registered devices in the proposed scheme. Finally, a result analysis is conducted based on the security analysis and performance analysis to verify the effectiveness of the proposed scheme. (c) 2022 Elsevier B.V. All rights reserved.
【Abstract】With the rapid development of the social economy, the problem of environmental pollution has been widely concerned. The existing environmental monitoring system adopts a hierarchical centralized management structure, which has some problems, such as data silos and the risk of data falsification. Thus, this paper proposes an environmental monitoring data security model based on the blockchain, which uses the blockchain distributed storage mode to realize the secure sharing of monitoring data and curb the behavior of data forgery. A practical Byzantine fault tolerant mechanism based on credit grouping supervision is adopted to reduce the computation and communication overhead caused by data consensus. Through the cloud chain fusion technology, the encrypted monitoring data is stored on the cloud storage server, and the monitoring data credentials are stored on the blockchain to reduce the storage pressure. And AES(Advanced Encryption Standard) combined with the RSA (Rivest-Shamir-Adleman) encryption algorithm to ensure the security of data transmission and storage. Security analysis and experiments demonstrate that our proposed scheme achieves authenticity, integrity, and security for monitored data. In addition, it effectively reduces the computation, communication, and storage overhead of the block nodes.
【Abstract】Context: The success or failure of any software development project significantly depends on the accuracy of its effort estimates. Software development effort estimation is the foundation for project bidding, budgeting, planning, and cost control. Problem: The literature shows that a lot of work has been done on software effort estimation. But still, there is a need for improvement in effort estimation by introducing new methodologies. The structured group-based and analogy-based effort estimations are the widely used estimation methods. Nevertheless, there are several shortcomings of using these methods such as lack of experts, lack of historical data, and biasness in expert opinion, which negatively affect the estimation results. Motivation: With the advancement of technologies, such limitations could be overcome. Such as leveraging the applicability of blockchain in several domains such as improvement in the software development process and network security. Method: In this article, we have proposed a Blockchain-Based Software Effort Estimation (BBSEE) methodology to improve the software effort estimation. We employ the proposed method using Web and blockchain technologies. Moreover, we also proposed evaluation criteria to assess the efficacy of the proposed method in terms of Mean Magnitude of Relative Error (MMRE), Mean Absolute Error (MAE) and percentage of successful predictions falling (PRED (25)). Result: We performed several case studies and analyses of expert opinions of 52 organizations to present the efficacy of the proposed method. Conclusion: We observe that the BBSEE method outperforms expert judgment and analogy-based effort estimation methodologies in terms of software effort estimation.
【Abstract】Large-scale and widely dispersed distributed energy resource (DER) can be gathered by a virtual power plant (VPP) in a given area, and its parameters can be combined into a single external operation pro<^>le. Each distributed energy source in the VPP has a complete backup of the critical information for the entire network because it is a node of blockchain. The distribution network can be accessed by DER freely and adaptable under the scientific management of the VPP, and it can oSer the system high-reliability, high-quality, and high-security power services. An energy blockchain network model based on particle swarm optimization (PSO) to optimise the neural network is proposed in this paper as a solution to the issues with the current VPP models. This will enable distributed dispatching of the VPP and reasonable load distribution among units. According to the simulation results, this algorithm's error is minimal and its accuracy can reach 94.98 percent. This model can more accurately capture demand-side realtime information, which bene<^>ts VPP's stable scheduling with a welcoming environment and transparent information. It also enhances the system's data security and storage security. This system can successfully address the issues of subject-to-subject mistrust and high information interaction costs in the VPP.
【Abstract】Blockchain technology has been widely applied in numerous industries with its decentralization, verifiability, distributivity, and immutability. However, the identity privacy security of blockchain users is facing serious threats because of the openness of traditional blockchain transaction information. Moreover, numerous traditional cryptographic algorithms used by blockchain transaction networks are difficult to attack quantum computing. In this paper, we propose a new lattice-based blind ring signature scheme in allusion to completely anonymous blockchain transaction systems. There into, the blind ring signature can implement the complete anonymity of user identity privacy in blockchain transactions. Meanwhile, lattice cryptography can availably resist quantum computing attacks. Firstly, the proposed signature scheme has strong computational security based on the small integer solution (SIS) problem and a high sampling success rate by utilizing the techniques of rejection sampling from bimodal Gaussian distribution. Secondly, the proposed signature scheme can satisfy the correctness and security under the random oracle model, including anonymity, blindness, and one-more unforgeability. Thirdly, we construct a blockchain transaction system based on the proposed blind ring signature algorithm, which realizes the completely anonymous and antiquantum computing security of the blockchain users' identity privacy. Finally, the performance evaluation results show that our proposed blind ring signature scheme has lower latency, smaller key size, and signature size than other similar schemes.
【Abstract】In recent times, a number of Internet of Things (IoT) related healthcare applications have been deployed for automating healthcare services and offering easy accessibility to patients. Several issues like security, fault-tolerant, and reliability have restricted the utilization of IoT services in real-time healthcare environments. To achieve security, blockchain technology can be utilized which offers effective interoperability of healthcare databases, ease of medical data access, device tracking, prescription database, hospital assets, etc. Therefore, this paper presents an optimal Elliptic curve cryptography-based encryption algorithm for a blockchain-enabled medical image transmission model, named OECC-BMIT. The presented OECC-BMIT model involves different stages of operations such as encryption, optimal key generation, blockchain-enabled data transmission, and decryption. Firstly, the OECC-BMIT model performs Elliptic curve cryptography (ECC) based encryption technique to securely transmit the medical images. In order to generate the optimal set of keys for the ECC technique, modified bat optimization (MBO) algorithm is applied. Then, the encrypted images undergo secure transmission via blockchain technology. The encrypted images are decrypted on the recipient side and the original medical image is reconstructed effectively. Extensive sets of experimentations were performed to highlight the goodness of the OECC-BMIT algorithm and the obtained results pointed out the improved outcome over the state of art methods in terms of different measures.
【Abstract】In wireless sensor network (WSN), routing is one of the substantial maneuvers for distributing data packets to the base station. But malevolent node outbreaks will happen during routing process, which exaggerate the wireless sensor network operations. Therefore, a secure routing protocol is required, which safeguards the routing fortification and the wireless sensor network effectiveness. The existing routing protocol is dynamically volatile during real time instances, and it is very hard to recognize the unsecured routing node performances. In this manuscript, a Deep Dropout extreme Machine learning optimized Improved Alpha-Guided GreyWolf based Crypto Hash Signature Token fostered Blockchain Technology is proposed for secure dynamic optimal routing in Wireless Sensor Networks (SDOR-DEML-IAgGWO-CHS-BWSN). In this, Crypto Hash signature (CHS) token are generated for flow accesses with a secret key owned by each routing sensor node and it also offers an optimal path for data transmission. Then the secured dynamic optimal routing information is delivered through the proposed Blockchain based wireless sensor network platform with the help of Deep Dropout Extreme Machine learning optimized Improved Alpha-Guided Grey Wolf routing algorithm. Then the proposed method is simulated using the NS-2 (Network Simulator) tool. The simulation performance of the proposed SDOR-DEML-IAgGWO-CHS-BWSN method provide 76.26%, 65.57%, 60.85%, 48.99% and 42.9% lower delay during 30% malicious routing environment, 73.06%, 63.82%, 59.25%, 44.79% and 38.84% lower delay during 60% malicious routing environment is compared with the existing methods.
【Abstract】This paper is to improve the privacy and security in the distributed virtual environment using blockchain technology. One of the feature it provides is greater security in the decentralized virtual environment. A key aspect of this technology is used for various fields like healthcare, finance, business and cloud environment. Key issue of the virtual environment is to protect the data privacy and security which is difficult to handle. To overcome this issue, a new security model to protect the virtual environment is created and will focus on different types of attacks in blockchain technology.
【Abstract】The traditional microgrid electricity transactions face a low security, poor economic benefits, and weak stability. To solve these problems, this paper proposes a multimicrogrid cross-chain transaction model based on quantum blockchain. Specifically, a bidding strategy was developed for the noncooperative dynamic game of aggregator-multimicrogrid alliance, aiming to balance and optimize the benefits of all parties and effectively enhance the consumption rate of electric energy. To improve the transaction efficiency between aggregators, a consensus mechanism was designed for multimicrogrid cross-chain communication, realizing consistent self-adaptation to cross-chain information. In addition, the quantum threshold signature technology was adopted to ensure the reliability of transaction data and create an unconditional secure communication environment. Case analysis shows that our model proposed in this paper not only ensures the security and stability of transactions but also enhances the economic benefits, providing theoretical support and decision support for the optimization of multimicronetwork cross-chain transaction model.