• 首页
  • 每日更新
  • 文献
  • 会议文献
  • 政策法规
  • 研究专题
  • 区块链游戏
logo 区块链前沿
  • 区块链前沿
  • 首页
  • 每日更新
  • 文献
  • 会议文献
  • 政策法规
  • 研究专题
  • 区块链游戏
  • 文章创新角色
  • 科研创新指数
  • 区块链领域本体
  • 热点主题挖掘
  • 主题展示
  • 专利文献
  • 排行榜
  • DAO治理
  • 文献上传
  • 积分获取规则
  • 大语言模型解析
  • 期刊发文分布
注册 登录

2023年01月11日 18篇

文献来源

  • 15
  • 3

主题分类

      • 1
      • 1
      • 1
      • 1
      • 1
      • 2
      • 1
      • 3
      • 1
      • 1
      • 1
      • 1
      • 1
      • 3

文献类型

  • 4
  • 5
  • 4
  • 3
  • 2
筛选
订阅
<< 前一天 后一天 >>

A Novel Approach for Predictable Governance of Decentralized Autonomous Organizations Based on Parallel Intelligence

【Author】 Ding, Wenwen Liang, Xiaolong Hou, Jiachen Li, Juanjuan Rouabah, Younes Yuan, Yong Wang, Fei-Yue

【影响因子】11.471

【主题类别】

区块链应用-虚拟经济-DAO

【Abstract】Decentralized autonomous organizations (DAOs) have become an indispensable part of digital infrastructure in recent years. The unique organizational characteristics and functional structure empower them to become an effective tool for solving corporate governance issues, including contract risks, principal-agent dilemmas, etc. However, DAOs themselves also face a variety of governance issues. On one hand, as a new economic organization model, the existing corporate governance theories and methods are no longer fully applicable to DAOs. On the other hand, unpredictable logic vulnerabilities and code loopholes in the governance mechanism might cause devastating damage to DAOs. The parallel intelligence theory based on the ACP method (i.e., artificial systems, computational experiments, and parallel execution) is an elegant research paradigm and a practical approach tailored to solving these challenges. As such, we propose a novel parallel governance framework for DAOs based on the parallel intelligence theory and further discuss its technical methodology and implementation model. Furthermore, we construct a parallel governance system for GnosisDAO and conduct computational experiments to validate the effectiveness of its governance mechanism. The experimental results not only confirm the defects of the GnosisDAO governance mechanism but also illustrate parallel governance as a useful research direction to solve existing governance problems of DAOs.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; decentralized autonomous organizations (DAOs); GnosisDAO; parallel governance; parallel intelligence; smart contracts

【发表时间】

【收录时间】2023-01-11

【文献类型】 实验仿真

【DOI】 10.1109/TSMC.2022.3224250

The application of blockchain technology in the recycling chain: a state-of-the-art literature review and conceptual framework

【Author】 Xie, Shenghao Gong, Yu Kunc, Martin Wen, Zongguo Brown, Steve

【影响因子】9.018

【主题类别】

区块链应用-实体经济-回收链

【Abstract】More practitioners are embracing blockchain technology to improve recycling performance. However, current research on the use of blockchain is mostly confined to general discussions on sustainable supply chains and circular economy, with limited studies specifically focusing on the recycling chain. This paper conducts a thorough content-based review of the literature related to the application of blockchain technology in the recycling chain with the objective to identify a conceptual framework. Although descriptive and thematic analyses show limited developments, blockchain technology can offer four distinct functions in the recycling chain: transparency, integration, behaviour channelisation, and service transformation. The adoption of blockchain in this area has technical, organisational, and environmental limitations that have not been overcome yet. In terms of benefits, blockchain technology improves recycling performance in terms of cost, dependability, flexibility, sustainability, and risk reduction. To summarise the findings, the paper proposes a novel conceptual framework for blockchain implementations in the recycling chain to support practitioners and guide scholars in further blockchain technology exploration.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain technology; recycling chain; sustainable supply chain; literature review; sustainability

【发表时间】

【收录时间】2023-01-11

【文献类型】 综述

【DOI】 10.1080/00207543.2022.2152506

RSU Cluster Deployment and Collaboration Storage of IoV Based Blockchain

【Author】 Chen, Chen Quan, Shi

【影响因子】3.889

【主题类别】

区块链应用-实体经济-交通领域

【Abstract】The Internet of Vehicles is increasingly becoming an indispensable platform to make interactions among vehicles, humans, and roadside infrastructures, and it is continuing to evolve with improvements on its application scenarios and service robustness. Academia and industry have also been concerned with the security issue of Internet of Vehicles (IoV). The Blockchain technology provides a new solution to improve security of the IoV, and it has drawn increased attention. Blockchain technology deals with the network model, identity authentication, trust management, and access control. However, there are insufficient studies on strategy of nodes deployment in the existing BIoV (Blockchain-based IoV). Based on the principle of partition, this paper studies the Blockchain-based IoV model in which the vehicle network system consists of vehicles and Road Side Unit (RSU) nodes. The Blockchain network is formed by the RSU nodes. By optimizing the LEACH algorithm, we partition RSUs and select cluster heads in BIoV, which has good scalability while maintaining a reasonable scale of Blockchain. Simulation results indicated that the improved-LEACH algorithm (I-LEACH) is more effective than the LEACH, DEEC, and the improved-DEEC algorithms (I-DEEC) with respect to the network life cycle and data transmission. Additionally, in order to reduce dependence of the storage resources from BIoV, we designed an intra-cluster collaborative storage scheme by adopting three algorithms for comparison-the genetic algorithm (GA), particle swarm optimization (PSO) algorithm, and the model quantum genetic algorithm (QGA). It revealed that the intra-cluster collaborative storage scheme is effective to ease the bottleneck of storage space demanded in BIoV, and verified by the simulation experiments.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Internet of Vehicles (IoV); Blockchain; LEACH algorithm; distributed collaborative storage; genetic algorithm (GA); particle swarm optimization algorithm (PSOA); quantum genetic algorithm (QGA)

【发表时间】2022

【收录时间】2023-01-11

【文献类型】 实验仿真

【DOI】 10.3390/su142316152

Blockchain for Internet of Underwater Things: State-of-the-Art, Applications, Challenges, and Future Directions

【Author】 Bhattacharya, Sweta Victor, Nancy Chengoden, Rajeswari Ramalingam, Murugan Selvi, Govardanan Chemmalar Maddikunta, Praveen Kumar Reddy Donta, Praveen Kumar Dustdar, Schahram Jhaveri, Rutvij H. Gadekallu, Thippa Reddy

【影响因子】3.889

【主题类别】

区块链技术-协同技术-物联网

【Abstract】The Internet of Underwater Things (IoUT) has become widely popular in the past decade as it has huge prospects for the economy due to its applicability in various use cases such as environmental monitoring, disaster management, localization, defense, underwater exploration, and so on. However, each of these use cases poses specific challenges with respect to security, privacy, transparency, and traceability, which can be addressed by the integration of blockchain with the IoUT. Blockchain is a Distributed Ledger Technology (DLT) that consists of series of blocks chained up in chronological order in a distributed network. In this paper, we present a first-of-its-kind survey on the integration of blockchain with the IoUT. This paper initially discusses the blockchain technology and the IoUT and points out the benefits of integrating blockchain technology with IoUT systems. An overview of various applications, the respective challenges, and the possible future directions of blockchain-enabled IoUT systems is also presented in this survey, and finally, the work sheds light on the critical aspects of IoUT systems and will enable researchers to address the challenges using blockchain technology.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Internet of Underwater Things; ocean ecosystem; privacy; security

【发表时间】2022

【收录时间】2023-01-11

【文献类型】 综述

【DOI】 10.3390/su142315659

Integrating Blockchain with Artificial Intelligence to Secure IoT Networks: Future Trends

【Author】 Alharbi, Shatha Attiah, Afraa Alghazzawi, Daniyal

【影响因子】3.889

【主题类别】

区块链技术-协同技术-物联网

【Abstract】Recently, the Internet of Things (IoT) has gained tremendous popularity in several realms such as smart cities, healthcare, industrial automation, etc. IoT networks are increasing rapidly, containing heterogeneous devices that offer easy and user-friendly services via the internet. With the big shift to IoT technology, the security of IoT networks has become a primary concern, especially with the lack of intrinsic security mechanisms regarding the limited capabilities of IoT devices. Therefore, many studies have been interested in enhancing the security of IoT networks. IoT networks need a scalable, decentralized, and adaptive defense system. Although the area of development provides advanced security solutions using AI and Blockchain, there is no systematic and comprehensive study talking about the convergence between AI and Blockchain to secure IoT networks. In this paper, we focus on reviewing and comparing recent studies that have been proposed for detecting cybersecurity attacks in IoT environments. This paper address three research questions and highlights the research gaps and future directions. This paper aims to increase the knowledge base for enhancing IoT security, recommend future research, and suggest directions for future research.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Internet of Things (IoT); blockchain; artificial intelligence; intrusion detection system; antivirus; cybersecurity; network security

【发表时间】2022

【收录时间】2023-01-11

【文献类型】 综述

【DOI】 10.3390/su142316002

Factors affecting blockchain adoption in Italian companies: the moderating role of firm size.

【Author】 Prisco, Anna Abdallah, Yasser Omar Morande, Swapnil Gheith, Mohamed Hani

【影响因子】3.745

【主题类别】

区块链应用-实体经济-企业管理

【Abstract】Although Blockchain technology has shown its usefulness, there exist limited studies and industrial applications. Presented research investigates factors influencing blockchain adoption. It reflects on how the perceived benefit of blockchain may influence the adoption and how organisational size may affect this process. This study integrates the framework of the Technology Acceptance Model (TAM) with the Theory of Planned Behaviour (TPB) and extends it with the perceived benefits of blockchain adoption while including firm size as moderator. Data collected were analysed with a PLS-SEM. Our results showed that a significant predictor of intention to use blockchain is perceived behavioural control. Moreover, it was found that perceived benefit significantly influenced perceived usefulness. Finally, the study demonstrated that SMEs are more efficient in adopting blockchain compared to Large firms.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; technology acceptance model; theory of planned behaviour; PLS-SEM

【发表时间】

【收录时间】2023-01-11

【文献类型】 实证数据

【DOI】 10.1080/09537325.2022.2155511

Practical Byzantine fault tolerance consensus based on comprehensive reputation

【Author】 Qi, Jiamou Guan, Yepeng

CCF-C

【影响因子】3.488

【主题类别】

区块链技术-核心技术-共识机制

【Abstract】Consensus protocol is challenging due to the poor node reliability, low efficiency and decentralization. A comprehensive reputation based Practical Byzantine Fault Tolerance consensus method (CRPBFT) has been proposed. Comprehensive reputation model has been developed to evaluate the credibility of each node from service behavior and consensus process at first. The nodes with higher reputation are selected to participate in the consensus process, which helps to reduce the probability of consensus failure caused by the existence of malicious nodes. A consensus communication structure is optimized by replacing the whole network broadcast structure in the commit phase with a star one. It can be applied to degrade the network communication overhead and improve consensus efficiency. A rotation mechanism for replacing the consensus nodes regularly has been proposed to increase the degree of decentralization and enhance the robustness and dynamic of the consensus network. Some experimental results demonstrate that the developed method has excellent performance by comparisons with some state-of-the-arts.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; Byzantine fault tolerance; Consensus protocol; Reputation model; Distributed network

【发表时间】

【收录时间】2023-01-11

【文献类型】 实验仿真

【DOI】 10.1007/s12083-022-01408-2

Towards Improving Privacy and Security of Identity Management Systems Using Blockchain Technology: A Systematic Review

【Author】 Alanzi, Haifa Alkhatib, Mohammad

【影响因子】2.838

【主题类别】

区块链应用-实体经济-身份管理

【Abstract】An identity management system (IDMS) manages and organizes identities and credentials information exchanged between users, identity providers (IDPs), and service providers (SPs) to ensure confidentiality and enhance privacy of users' personal data. Traditional or centralized IDMS rely on a third party to store a user's personal information, authenticate the user, and organize the entire process. This clearly constitutes threats to the privacy of the user, in addition to other issues, such as single point of failure (SPOF), user tracking, and data availability issues. Blockchain technology has many useful features that can contribute to solving traditional IDMS issues, such as decentralization, immutability, and anonymity. Blockchain represents an attractive solution for many issues related to traditional IDMS, including privacy, third-party control, data leakage, and SPOF, supported by Distributed Ledger Technology (DLT) security features and powerful smart contracts technology. The current study presents a systematic literature review and analysis for recently proposed solutions that adopt the traditional centralized approach, as well as solutions based on blockchain technology. The study also aims to provide a deep understanding of proposed IDMS solutions and best practices, and highlight the research gaps and open issues related to IDMSs and users' privacy. In particular, the current research focuses on analyzing the blockchain-based solutions and illustrating their strengths and weaknesses, as well as highlighting the promising blockchain technology framework that can be utilized to enhance privacy and solve security issues in a centralized IDMS. Such a study is an important step towards developing efficient solutions that address the pressing needs in the field.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】identity management; blockchain; distributed ledger technology; self-sovereign identity; privacy

【发表时间】2022

【收录时间】2023-01-11

【文献类型】 综述

【DOI】 10.3390/app122312415

Blockchain-Based Trust and Reputation Management in SIoT

【Author】 Alam, Sana Zardari, Shehnila Shamsi, Jawwad Ahmed

【影响因子】2.690

【主题类别】

区块链技术-协同技术-物联网

【Abstract】In the Social Internet of Things (SIoT), trust refers to the decision-making process used by the trustor (Service Requesters (SRs) or Service Consumers (SCs)) to decide whether or not to entrust the trustee (Service Providers (SPs)) with specific services. Trust is the key factor in SIoT domain. The designing of a two-way, two-stage parameterized feedback-based, service-driven, attacks-resistant trust and reputation system for SIoT accompanied by a penalty mechanism for dishonest SPs and SRs is our main contribution that mitigates the trust-related issues occurring during service provisioning and service acquisition amongst various entities (SPs or SRs) and enhances trust amongst them. Our proposed methodology examines a SP's local trust, global trust, and reputation by taking into account "Social Trust" and "Quality of Service (QoS)" factors". Two-Stage Parameterized feedback" is incorporated in our proposed strategy to better manage "intention" and "ability" of SRs and provides early identification of suspicious SRs. This feature compels SRs to act honestly and rate the corresponding SPs in a more accurate way. Our recommended paradigm sorts SPs into three SP status lists (White List, Grey List, and Black List) based on reputation values where each list has a threshold with respect to the maximum service fee that can be charged. SPs in White List charge the most per service. SPs in other lists have a lower selection probability. Every feedback updates the SP's trust and reputation value. Sorting SPs increases resistance against On Off Attack, Discriminatory Attack, Opportunistic Service Attack, and Selective Behavior Attacks. SPs must operate honestly and offer the complete scope of stated services since their reputation value relies on all their global trust values (Tglobal) for various services. Service requests may be accepted or denied by SPs. "Temporarily banned" SRs can only request unblocked services. SRs lose all privileges once on a "permanently banned" list. If local and global trust values differ by more than the threshold, the SR is banned. Our method also provides resistance against Bad Mouthing Attack, Ballot Stuffing Attack. Good Mouthing Attack/Self-Propagating Attack. Experiments indicate our trust and reputation management system recognizes and bans fraudulent SRs. "Dishonest SPs" are "blacklisted," which affects their reputation, trust, and service charges. [Alam, Sana] NEDUET, Dept Comp Sci & Informat Technol, Karachi 75270, Pakistan; [Alam, Sana] SSUET, Dept Comp Engn, Karachi 75300, Pakistan; [Zardari, Shehnila] NEDUET, Dept Software Engn, Karachi 75270, Pakistan; [Shamsi, Jawwad Ahmed] FAST Natl Univ Comp & Emerging Sci NUCES, Dept Comp Sci, Karachi 75270, Pakistan Ned University of Engineering & Technology; Ned University of Engineering & Technology Alam, S (通讯作者),NEDUET, Dept Comp Sci & Informat Technol, Karachi 75270, Pakistan.; Alam, S (通讯作者),SSUET, Dept Comp Engn, Karachi 75300, Pakistan. sana.email43@gmail.com Aalibagi S, 2022, IEEE T DEPEND SECURE, V19, P2274, DOI 10.1109/TDSC.2021.3052953; Abdelghani W, 2022, J SUPERCOMPUT, V78, P8137, DOI 10.1007/s11227-021-04205-5; Abidi R, 2021, 2021 6TH INTERNATIONAL CONFERENCE ON RENEWABLE ENERGY: GENERATION AND APPLICATIONS (ICREGA), P1, DOI 10.1109/ICREGA50506.2021.9388314; Afzal B, 2019, FUTURE GENER COMP SY, V92, P718, DOI 10.1016/j.future.2017.12.002; Alam S, 2022, IEEE ACCESS, V10, P108924, DOI 10.1109/ACCESS.2022.3213699; Ali-Eldin Amr M. T., 2021, 2021 International Mobile, Intelligent, and Ubiquitous Computing Conference (MIUCC), P161, DOI 10.1109/MIUCC52538.2021.9447667; Amiri-Zarandi Mohammad, 2020, 2020 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), P49, DOI 10.1109/DASC-PICom-CBDCom-CyberSciTech49142.2020.00024; Amiri-Zarandi M, 2022, J SUPERCOMPUT, V78, P8302, DOI 10.1007/s11227-021-04231-3; Atzori L., 2015, NEWSLETTER; Atzori L, 2012, COMPUT NETW, V56, P3594, DOI 10.1016/j.comnet.2012.07.010; Azad MA, 2020, IEEE INTERNET THINGS, V7, P2690, DOI 10.1109/JIOT.2019.2962282; Ben Abderrahim O, 2017, INT WIREL COMMUN, P1903, DOI 10.1109/IWCMC.2017.7986574; Ben Abderrahim O, 2017, INT WIREL COMMUN, P747, DOI 10.1109/IWCMC.2017.7986378; Benedict S, 2020, IEEE T COMPUT SOC SY, V7, P1146, DOI 10.1109/TCSS.2020.3008995; Chahal RK, 2020, COMPUT COMMUN, V150, P13, DOI 10.1016/j.comcom.2019.10.034; Chen IR, 2016, IEEE T DEPEND SECURE, V13, P684, DOI 10.1109/TDSC.2015.2420552; Cho JH, 2015, ACM COMPUT SURV, V48, DOI 10.1145/2815595; Ekbatanifard G., 2019, J ADV COMPUT ENG TEC, V5, P57; Gorski T, 2022, APPL SCI-BASEL, V12, DOI 10.3390/app12115339; Gorski T, 2022, SENSORS-BASEL, V22, DOI 10.3390/s22010128; Gorski T, 2021, APPL SCI-BASEL, V11, DOI 10.3390/app112411745; Hankare P, 2021, TEH GLAS, V15, P43, DOI 10.31803/tg-20210204180217; Jafarian B, 2020, COMPUT NETW, V178, DOI 10.1016/j.comnet.2020.107254; Jayasinghe U, 2016, 2016 INT IEEE CONFERENCES ON UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING AND COMMUNICATIONS, CLOUD AND BIG DATA COMPUTING, INTERNET OF PEOPLE, AND SMART WORLD CONGRESS (UIC/ATC/SCALCOM/CBDCOM/IOP/SMARTWORLD), P930, DOI [10.1109/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.129, 10.1109/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0146]; Khan PW, 2020, SENSORS-BASEL, V20, DOI 10.3390/s20102990; Khan WZ, 2021, IEEE INTERNET THINGS, V8, P7768, DOI 10.1109/JIOT.2020.3039296; Kokoris-Kogias E., 2016, P 2016 IEEE 21 INT C, P1; Kouicem DE, 2022, IEEE T DEPEND SECURE, V19, P1292, DOI 10.1109/TDSC.2020.3003232; Kowshalya AM, 2018, SADHANA-ACAD P ENG S, V43, DOI 10.1007/s12046-018-0885-z; Kowshalya AM, 2017, WIRELESS PERS COMMUN, V96, P2681, DOI 10.1007/s11277-017-4319-8; Kowshalya AM, 2017, IET NETW, V6, P75, DOI 10.1049/iet-net.2017.0021; Kumar S, 2019, J BIG DATA-GER, V6, DOI 10.1186/s40537-019-0268-2; Lakshmanaprabu SK, 2018, IEEE ACCESS, V6, P24196, DOI 10.1109/ACCESS.2018.2830651; Latif R, 2022, IEEE ACCESS, V10, P46526, DOI 10.1109/ACCESS.2022.3169788; Lin ZT, 2018, IEEE T KNOWL DATA EN, V30, P234, DOI 10.1109/TKDE.2017.2762678; Marche C, 2021, IEEE T NETW SERV MAN, V18, P3297, DOI 10.1109/TNSM.2020.3046906; Masmoudi M, 2020, LECT NOTE DATA ENG, V41, P389, DOI 10.1007/978-3-030-34986-8_28; Motlagh NH, 2020, ENERGIES, V13, DOI 10.3390/en13020494; Truong NB, 2017, SENSORS-BASEL, V17, DOI 10.3390/s17061346; Nguyen DC, 2019, IEEE ACCESS, V7, P66792, DOI 10.1109/ACCESS.2019.2917555; Nitti M, 2014, IEEE T KNOWL DATA EN, V26, P1253, DOI 10.1109/TKDE.2013.105; Nitti M, 2012, 2012 IEEE 23RD INTERNATIONAL SYMPOSIUM ON PERSONAL INDOOR AND MOBILE RADIO COMMUNICATIONS (PIMRC), P18, DOI 10.1109/PIMRC.2012.6362662; Pourghebleh B, 2019, IEEE INTERNET THINGS, V6, P9326, DOI 10.1109/JIOT.2019.2933518; Premarathne US, 2017, INT CONF IND INF SYS, P64; Rad MM, 2020, HUM-CENT COMPUT INFO, V10, DOI 10.1186/s13673-020-00254-6; Rajendran S, 2022, WIRELESS PERS COMMUN, V123, P2625, DOI 10.1007/s11277-021-09256-8; Rehman Ateeq Ur, 2019, 2019 IEEE 5th International Conference on Computer and Communications (ICCC), P1644, DOI 10.1109/ICCC47050.2019.9064242; Sagar S, 2020, IEEE ICC; Sagar S, 2020, IEEE GLOB COMM CONF, DOI 10.1109/GLOBECOM42002.2020.9322540; Saraf C., 2018, P 2018 IEEE INT C IN, P1; Shahab Saima, 2022, ICT Analysis and Applications. Lecture Notes in Networks and Systems (314), P289, DOI 10.1007/978-981-16-5655-2_28; Sharma V, 2019, FUTURE GENER COMP SY, V92, P758, DOI 10.1016/j.future.2017.12.039; Suciu George, 2018, 2018 Global Wireless Summit (GWS), P370, DOI 10.1109/GWS.2018.8686563; Talbi S, 2020, J AMB INTEL HUM COMP, V11, P1129, DOI 10.1007/s12652-019-01256-8; Toyoda K, 2020, IEEE ACCESS, V8, P141611, DOI 10.1109/ACCESS.2020.3011876; Tripathy BK, 2016, MODEL OPTIM SCI TECH, V8, P153, DOI 10.1007/978-3-319-30913-2_8; Truong N.B., 2016, P 19 INNOVATIONS CLO, P104; Truong NB, 2017, IEEE GLOB COMM CONF; Wang K, 2016, IEEE WIREL COMMUN, V23, P30, DOI 10.1109/MWC.2016.7721739; Wei LJ, 2020, CHIN AUTOM CONGR, P159, DOI 10.1109/CAC51589.2020.9326856; Xia H, 2019, IEEE INFOCOM SER, P838, DOI 10.1109/INFOCOM.2019.8737491; Xiao HN, 2015, INT WIREL COMMUN, P600, DOI 10.1109/IWCMC.2015.7289151; Yi X., 2022, BLOCKCHAIN FDN APPL, DOI [10.1007/978-3-031-09670-9_2, DOI 10.1007/978-3-031-09670-9_2]; Zheng ZB, 2018, INT J WEB GRID SERV, V14, P352, DOI 10.1504/IJWGS.2018.095647 64 0 0 0 0 MDPI BASEL ST ALBAN-ANLAGE 66, CH-4052 BASEL, SWITZERLAND 2079-9292 ELECTRONICS-SWITZ Electronics DEC 2022 11 23 3871 10.3390/electronics11233871 http://dx.doi.org/10.3390/electronics11233871 33 Computer Science, Information Systems; Engineering, Electrical & Electronic; Physics, Applied Science Citation Index Expanded (SCI-EXPANDED) Computer Science; Engineering; Physics 6X2MD gold 2023-01-05 WOS:000896252700001

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】trust; reputation; parameterized feedback; service-based; SIoT; blockchain; penalty

【发表时间】2022

【收录时间】2023-01-11

【文献类型】 理论模型

【DOI】 10.3390/electronics11233871

Optimal Operation Policies in a Cross-Regional Fresh Product Supply Chain with Regional Government Subsidy Heterogeneity to Blockchain-Driven Traceability

【Author】 Cao, Bing-Bing Zhu, Mei-Fei Tian, Quan

【影响因子】2.592

【主题类别】

区块链应用-实体经济-供应链

【Abstract】The quality of fresh products through cross-regional sales has been uncertain to consumers. To improve the quality of fresh products, some fresh product supply chains have implemented blockchain technology to provide traceable information for their products, and some regional governments have subsidized their local firms to incentivize them to implement blockchain-driven traceability systems. However, with regional government subsidy heterogeneity, cross-regional fresh product supply chain firms lack theoretical guidance on their operation decisions. Based on the research gap, we investigate optimal operation policies in a fresh product supply chain consisting of a manufacturer and a retailer located in different regions. The local governments may subsidize the manufacturer or the retailer located in their own regions, which construct four subsidy strategies (SS, SN, NS, and NN) along the supply chain. We find that the optimal operation policies under four subsidy strategies can be affected by the sensitivity to traceability level, cost-sharing rate of the manufacturer, rate of products left after corrosion, and subsidy rate to the manufacturer. Moreover, the government subsidy to the retailer is always beneficial to the retailer and the supply chain but does not affect the manufacturer's operation policies and profits. The government subsidy to the manufacturer is always beneficial to the manufacturer but not always beneficial to the retailer and the supply chain. Hence the desired subsidy strategy for the manufacturer is SS and SN, and the one for the retailer and the supply chain is either NS or SS with different conditions.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】blockchain-driven traceability; government subsidy heterogeneity; fresh product; cross-regional supply chain; Stackelberg game

【发表时间】2022

【收录时间】2023-01-11

【文献类型】 理论模型

【DOI】 10.3390/math10234592

Blockchain-Based Distributed Federated Learning in Smart Grid

【Author】 Antal, Marcel Mihailescu, Vlad Cioara, Tudor Anghel, Ionut

【影响因子】2.592

【主题类别】

区块链技术-协同技术-联邦学习

区块链应用-实体经济-电力领域

【Abstract】The participation of prosumers in demand-response programs is essential for the success of demand-side management in renewable-powered energy grids. Unfortunately, the engagement is still low due to concerns related to the privacy of their energy data used in the prediction processes. In this paper, we propose a blockchain-based distributed federated learning (FL) technique for energy-demand prediction that combines FL with blockchain to provide data privacy and trust features for energy prosumers. The privacy-sensitive energy data are stored locally at edge prosumer nodes without revealing it to third parties, with only the learned local model weights being shared using a blockchain network. The global federated model is not centralized but distributed and replicated over the blockchain overlay, ensuring the model immutability and provenance of parameter updates. We had proposed smart contracts to deal with the integration of local machine-learning prediction models with the blockchain, defining functions for the model parameters' scaling and reduction of blockchain overhead. The centralized, local-edge, and blockchain-integrated models are comparatively evaluated for prediction of energy demand 24 h ahead using a multi-layer perceptron model and the monitored energy data of several prosumers. The results show only a slight decrease in prediction accuracy in the case of blockchain-based distributed FL with reliable data privacy support compared with the centralized learning solution.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】energy prediction; federated learning; blockchain; smart grid management; demand response; smart contracts; machine learning

【发表时间】2022

【收录时间】2023-01-11

【文献类型】 实证数据

【DOI】 10.3390/math10234499

Mobile edge computing-enabled blockchain: contract-guided computation offloading

【Author】 Li, Yijun Lin, Ziqiong Zhang, Wenjie Zheng, Yifeng Yang, Jingmin

【影响因子】2.557

【主题类别】

区块链技术-核心技术-智能合约

【Abstract】The core problem of blockchain is to solve the proof-of-work puzzle, which is a high energy-consumption task. To address the resource limit problem, the combination of blockchain and mobile edge computing (MEC) has attracted widespread concern. In this paper, we consider a resource trading problem for a MEC-enabled blockchain system with multiple miners and one edge computing service provider (ESP), in which ESP has no previous knowledge of miners' private information. We focus on how to perform resource trading between miners and ESP to maximize ESP's profit under incomplete information? To tackle this problem, the resource trading process is modeled as a monopoly market using contract theory. The ESP acts as a monopolist and needs to set a contract containing service time and price for the miners. The miners can be classified into multiple types based on the private information and select one contract item designed for its type. We first analyze the necessary and sufficient conditions for feasible contracts and derive the optimal contract that maximizes the ESP's profit for complete information scenario. For incomplete information, the service demand and the number of transactions contained in the block are the private information of miners and not known by ESP, we explore the properties of a feasible contract to reduce the complexity and propose a Lagrange multiplier algorithm to obtain the optimal contract in this scenario. Finally, the feasibility and optimality of the contract have been shown through simulation results. In addition, our proposed method can achieve results close to that of complete information scenario and has a maximum performance improvement of 17.19% comparing with linear pricing strategy in incomplete information scenario.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Mobile edge computing; Blockchain; Computation offloading; Contract theory; Information scenario

【发表时间】

【收录时间】2023-01-11

【文献类型】 实证数据

【DOI】 10.1007/s11227-022-04990-7

Storage efficient blockchain models for constrained applications

【Author】 Rajendra, Yuvaraj Sahu, Sachin Subramanian, Venkatesan Shukla, Sandeep Kumar

【影响因子】2.303

【主题类别】

区块链技术-核心技术-存储策略

【Abstract】The growing chain's storage requirement is always an issue with blockchain platforms, and devices may not allocate the required storage to replicate an entire blockchain instance. To overcome this issue, we propose storage-efficient blockchain models that divide the growing blockchain into fixed-size sets of blocks, excluding the genesis block and allowing the participating nodes to store the recent blocks according to their storage capacity. Suppose a node, according to its storage capacity, decides not to replicate a few sets of old blocks to accommodate the new blocks. In that case, it stores the corresponding set's last block hash and a hash of the XOR of the remaining blocks' hashes and then drops those blocks. When required, nodes receive blocks equivalent to the deleted blocks from other nodes. They validate the received blocks by comparing the previous set's last block hash with the received set's first block parent hash and the XOR hash with the block hashes. If they match, the node will accept the equivalent set of deleted blocks; otherwise, reject. This will guarantee to avoid any uncertainty, single collision multi-block replacement and network diversion attack. The analysis and experimental results show that the proposed models are storage efficient and need less overhead. The proposed models provide security equivalent to the traditional blockchain and allow the storage-constrained devices to participate in the application for a long time compared with the other models. Also, we introduced the conceptual blockchain storage framework by combining traditional and lightweight schemes to allow nodes to choose and switch the storage model according to requirements.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; Storage constraint; Chain replacement attack; Security; Constrained devices

【发表时间】

【收录时间】2023-01-11

【文献类型】 实验仿真

【DOI】 10.1007/s10586-022-03804-y

Secured information sharing for supply chain management based on blockchain technology and optimal key generation process

【Author】 Lahane, Priti S. S. Sharma, Manish

【影响因子】1.831

【主题类别】

区块链应用-实体经济-供应链

【Abstract】Supply Chain Management (SCM) is one of the biggest important focal areas in most corporate environments. However, some difficulties are presented in the structure like high cost, privacy issues and distortions. Thus, new secured information sharing for SCM is proposed in this work and deals with the introduction of privacy preservation of data transfers among supply chains. Initially, a supply chain is constructed and the data transfer among the diverse levels takes place via blockchain technology. In the blockchain, security being a crucial factor, a new privacy preservation method is introduced. The initial information is converted to a sanitization procedure prior to transmission via blockchain technology, in which the information is turned into sanitized data. Similarly, the sanitized data is restored on the receiving end to obtain the original data. More importantly, key generation has a significant role in both processes, and it must be ideally chosen. The key is optimally chosen for this study using a new optimization algorithm called Fitness-based Self-adaptive Sea lion Optimization (FSA-SLnO), which is a better variant of the conventional Sealion Optimization technique (SLnO). In terms of security, the proposed protected information sharing in SCM using block chain technology is evaluated by comparing it with traditional approaches.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】data sanitization and restoration; FSA-SLnO; optimal key generation; privacy preservation; supply chain management

【发表时间】

【收录时间】2023-01-11

【文献类型】 理论模型

【DOI】 10.1002/cpe.7522

Investigating long and short memory in cryptocurrency time series by stochastic fractional Brownian models

【Author】 Ballestra, Luca Vincenzo Molent, Andrea Pacelli, Graziella

【影响因子】1.162

【主题类别】

区块链治理-市场治理-数字货币

【Abstract】Over the last years, the world of cryptocurrencies has undergone a tumultuous development, mostly characterized by speculative behaviors, and thus one might argue that it does not satisfy the Efficient Market Hypothesis. Since the efficiency of a financial market can be assessed by checking whether the times series of the assets traded on it are persistent/anti-persistent, we investigate the presence of memory in the price of seven among the most important cryptocurrencies. To this aim, we employ an original approach based on two fractional models, namely the geometric fractional Brownian motion and the geometric mixed fractional Brownian motion, which are tested against the Markovian geometric Brownian motion to detect the presence of memory. The above fractional models are estimated by employing an innovative maximum likelihood procedure that exploits the Toeplitz structure of the covariance matrix of log-returns. The null assumption of absence of memory in the time series is tested based on confidence ellipses for the estimated parameters. We validate the proposed procedure on artificial data and we apply it to the historical series of crypto-prices. Results suggest the presence of memory effects only for some of the considered cryptocurrencies. A possible explanation of such a persistence/anti-persistence phenomenon is provided.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Confidence ellipse; Cryptocurrency; Fractional Brownian motion; Maximum likelihood; Memory

【发表时间】

【收录时间】2023-01-11

【文献类型】 实证数据

【DOI】 10.1080/03610918.2022.2154802

基于零知识证明的区块链方案研究进展

【作者】 王勇;陈莉杰;钟美玲;

【作者单位】桂林电子科技大学计算机与信息安全学院;广西密码学与信息安全重点实验室;

【文献来源】信息网络安全

【复合影响因子】1.887

【综合影响因子】0.804

【主题类别】

区块链技术-协同技术-零知识证明

【摘要】匿名性是区块链的一个重要特性,随着区块链应用到溯源系统、身份认证、拍卖系统、物联网等多个领域,区块链去匿名化的风险极大增加,数据的隐私保护和审计监管问题亟待解决。一些研究人员已经在密码学领域找到一种高级加密原语(零知识证明)来增强区块链的匿名性和隐私性,目前已有突破性进展。文章对基于零知识证明的区块链方案进行分析研究,首先介绍了零知识证明的原理机制;然后将相关方案进行全面分析和对比,划分出隐私支付、隐私计算及审计监管3类研究重点,并分析了针对这3类重点方案的研究目标及进展情况,总结了已有工作的优点与不足;最后对基于零知识证明的区块链方案存在的局限性和挑战进行分析,阐述了未来研究方向。

【关键词】区块链;;零知识证明;;加密;;匿名性;;隐私

【文献类型】 综述

【DOI】

【发表时间】2023-01-11

主权数字货币与全球货币体系的未来

【作者】 程炼;

【作者单位】中国社会科学院金融研究所;

【文献来源】社会科学战线

【复合影响因子】

【综合影响因子】

【主题类别】

区块链治理-市场治理-数字货币

【摘要】尽管主权数字货币的研发初衷是部分替代现钞,但它的出现很可能会给当前以商业银行为基础的金融体系乃至国际货币体系带来严峻的挑战。除了人们普遍关注的脱媒问题之外,主权数字货币在诸多领域都与商业银行的业务存在替代关系。与此同时,主权数字货币可能承担的经济与社会治理功能之间也存在潜在的冲突。因此主权数字货币的未来发展及对于经济与金融体系的影响取决于其功能定位,而后者又意味着货币当局、商业银行与货币之间关系的再调整。

【关键词】法定数字货币;;全球货币体系;;支付系统;;中央银行;;商业银行

【文献类型】 观点阐述

【DOI】

【发表时间】2023-01-11

私人数字货币的后凯恩斯主义分析与启示

【作者】 袁辉;

【作者单位】中共中央党校(国家行政学院)经济学教研部;

【文献来源】学习与探索

【复合影响因子】

【综合影响因子】

【主题类别】

区块链治理-市场治理-数字货币

【摘要】私人数字货币追求的“完全去中心化”和“不依赖信任”及其实践部分契合了货币经济学中的奥地利传统,然而在后凯恩斯主义看来,经济主体在根本不确定的货币化生产环境中决策,会结成各种信用关系及其凭证,货币实际上是经济主体做出的支付承诺或发行的债务凭证,本质上体现交易双方的信用关系,执行记账单位和结算手段职能。随着信用关系范围和可靠程度的不同,货币也呈现出国家货币—银行信用货币—其他货币的金字塔型等级结构。国家货币位于金字塔顶端意味着国家有责任采取措施维护货币金融体系稳定,促进实体经济发展。后凯恩斯主义强调,货币体系不可能实现“完全去中心化”和“不依赖信任”,以比特币为代表的私人数字货币更接近于投机性的加密资产,以真实资产储备作支撑的稳定币则有望成为现行货币体系的补充,而央行数字货币兼具国家负债信用优势和数字经济技术优势,在带来支付体系效率、安全、多样、普惠的同时,有助于货币当局更好地发挥监管和调控作用,是潜力巨大的货币新形式。后凯恩斯主义的论述对认清货币金融本质,发展我国数字货币体系具有较强的借鉴意义。

【关键词】私人数字货币;;信用关系;;货币金字塔;;央行数字货币

【文献类型】 观点阐述

【DOI】

【发表时间】2023-01-11

在线标注

备案号: 苏ICP备17025947号-5

评论回复