• 首页
  • 每日更新
  • 文献
  • 会议文献
  • 政策法规
  • 研究专题
  • 区块链游戏
logo 区块链前沿
  • 区块链前沿
  • 首页
  • 每日更新
  • 文献
  • 会议文献
  • 政策法规
  • 研究专题
  • 区块链游戏
  • 文章创新角色
  • 科研创新指数
  • 区块链领域本体
  • 热点主题挖掘
  • 主题展示
  • 专利文献
  • 排行榜
  • DAO治理
  • 文献上传
  • 积分获取规则
  • 大语言模型解析
  • 期刊发文分布
注册 登录

2023年03月07日 17篇

文献来源

  • 16
  • 1

主题分类

      • 2
      • 3
      • 1
      • 1
      • 3
      • 3
      • 1
      • 1
      • 1
      • 1

文献类型

  • 5
  • 5
  • 2
  • 3
  • 2
筛选
订阅
<< 前一天 后一天 >>

Preference heterogeneity in Bitcoin and its forks' network

【Author】 Kim, Hyeonoh Ha, Chang Yong Ahn, Kwangwon

【影响因子】9.922

【主题类别】

区块链应用-虚拟经济-虚拟货币

【Abstract】This study investigates the transmission channel of information diffusion in the network of Bitcoin and its six forks using daily closing prices from the start of trading for each one to September 24, 2021. In particular, the price series are stationarized for further analysis by converting them to log returns. We find the following: (i) the Bitcoin market has the central authority of information flow because of its large market size and high liquidity, and (ii) the Bitcoin Gold and Bitcoin Diamond markets collaborate in information dissemination and interme-diary role despite their small market size and low liquidity. Using the scaling and Hurst exponents, we explain the roles of Bitcoin, Bitcoin Gold, and Bitcoin Diamond in the network of forks. The potential externality emerges from a highly liquid market and spreads through efficient markets in terms of price fairness, resulting in considerable information share in the cryptocurrency market. Our findings suggest that the forks' network evolves for preference heterogeneity rather than for a single dominant entity with market leadership in the network.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Information diffusion; Transmission channel; Bitcoin; Hard fork

【发表时间】2022

【收录时间】2023-03-07

【文献类型】 实验仿真

【DOI】 10.1016/j.chaos.2022.112719

The Lightning Network: Turning Bitcoin into money

【Author】 Divakaruni, Anantha Zimmerman, Peter

【影响因子】9.848

【主题类别】

区块链应用-虚拟经济-虚拟货币

【Abstract】The Lightning Network (LN) is a means of netting Bitcoin payments outside the blockchain. We find a significant association between LN adoption and reduced blockchain congestion, suggesting that the LN has helped improve the efficiency of Bitcoin as a means of payment. This improvement cannot be explained by other factors, such as changes in demand or the adoption of SegWit. We find mixed evidence on whether increased centralization in the Lightning Network has improved its efficiency. Our findings have implications for the future of cryptocurrencies as a means of payment and their environmental footprint.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Bitcoin; Blockchain; Cryptocurrency; Lightning Network; Payments

【发表时间】2023

【收录时间】2023-03-07

【文献类型】 理论模型

【DOI】 10.1016/j.frl.2022.103480

Metaverse intrusion detection of wormhole attacks based on a novel statistical mechanism

【Author】 Kuo, Shu-Yu Tseng, Fan-Hsun Chou, Yao-Hsin

【影响因子】7.307

【主题类别】

区块链技术-协同技术-物联网

【Abstract】The Metaverse shows great potential to facilitate the development of new technologies. Because the security of the Metaverse has attracted considerable attention, the automatic detection of malware in different scenarios related to the Metaverse has become significant as well. A Metaverse-based wireless system comprises various physical and virtual sensing models, and the security between these sensors and nodes should be further considered. A wormhole link is created by two malicious radio transceivers connected by high capacity out-of-band wireless or wired links. Wormhole attacks can easily subvert many network protocols and maliciously collect a large amount of traffic. As many new mobile applications in the Internet of Things (IoT) have emerged recently, the threat posed by wormhole attacks has increased. Accordingly, research efforts have been made to develop countermeasures for wormhole attacks. However, most of them have considered a static network, assuming that a wormhole does not move and that wormhole nodes cannot adaptively turn their radio on or off to avoid being detected. These assumptions limit the use of existing detection methods. Hence, we first study the security impact and characteristics of wormhole attacks in mobile cloud and Metaverse environments and find the possibility of matching statistical methods such as the sequential probability ratio test (SPRT) to detect wormholes. Moreover, in our assumed topology, nodes in the network have mobility. From our investigation results, we attempt to derive a novel defense mechanism design against wormhole attacks.(c) 2023 Elsevier B.V. All rights reserved.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】IoT security; Network security; Malware analysis; Wormhole attacks; Intrusion detection; Probability ratio test; Mobile cloud security; Security for Metaverse; Virtualization security; Cyber -Physical security

【发表时间】2023

【收录时间】2023-03-07

【文献类型】 理论模型

【DOI】 10.1016/j.future.2023.01.017

Metaverse Meets Branding: Examining Consumer Responses to Immersive Brand Experiences

【Author】 Wongkitrungrueng, Apiradee Suprawan, Lokweetpun

CCF-B

【影响因子】4.920

【主题类别】

区块链应用-虚拟经济-元宇宙

【Abstract】The metaverse connects the physical and digital worlds to improve the consumer experience, but little is known about how consumers respond to branded virtual worlds in real life. This study proposes a model to investigate the influence of metaverse experiential value on consumer's brand perception and behavioral responses in the virtual and real world. The covariance-based SEM analysis was conducted based on data from 702 Thai users of Asia's largest metaverse platform. Results revealed that all three dimensions of value indirectly affect consumer-brand engagement (CBE) through brand image and virtual purchase intention. Hedonic value had no direct effect on consumer responses, but on symbolic and utilitarian value which in turn influences CBE and virtual purchase respectively. As one of the first empirical studies on metaverse brand experience, this study contributed by incorporating multidimensional and interrelated experiential value and examining the mediating role of brand image and virtual purchase. The findings suggest brand design the branded virtual environment to facilitate consumer learning and virtual ownership, and align virtual merchandise and store ambiance with the real world to unify the brand image in both worlds.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】

【发表时间】

【收录时间】2023-03-07

【文献类型】 理论模型

【DOI】 10.1080/10447318.2023.2175162

Fake News in Virtual Community, Virtual Society, and Metaverse: A Survey

【Author】 Wang, Jinxia Makowski, Stanislav Cieslik, Alan Lv, Haibin Lv, Zhihan

【影响因子】4.747

【主题类别】

区块链治理-市场治理-舆情分析

【Abstract】In the trend of the accelerated progression of communication network technology, the emergence of virtual communities (VCs), virtual societies (VSs), metaverse, and other technologies not only makes data access and sharing easier but also leads to the proliferation of fake news (FN). To effectively monitor and identify FN in VC, VS, and metaverse, and to create a safer virtual space, this work takes FN in VC, VS, and metaverse as objects. First, the content and display methods of FN are reviewed and explained, and it is understood that FN is mainly displayed by single-modal and multimodal representations. Second, the application scenarios in many important fields such as transportation are reviewed and analyzed, so as to further understand the impact and detection effect of FN in different scenarios. Finally, an intelligent outlook and summary analysis are carried out on the detection and information security of FN, which provides theoretical reference and new opportunities for the detection and identification of FN in the virtual cyberspace.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Fake news (FN); information security; meta-verse; virtual community (VC); virtual society (VS)

【发表时间】

【收录时间】2023-03-07

【文献类型】 综述

【DOI】 10.1109/TCSS.2022.3220420

Delegate contract signing mechanism based on smart contract

【Author】 Xiong, Wei Hu, Yangcheng

【影响因子】3.752

【主题类别】

区块链技术-核心技术-智能合约

【Abstract】In this paper, a delegate contract signing solution is proposed to eliminate the potential risk of contract fraud caused by information and interest asymmetry. By utilizing the functional properties of the Ethereum blockchain and smart contracts, a delegate contract signing mechanism is established. By running the mechanism, the delegate contract signing information is received and processed, and the information is broadcast to the blockchain network nodes. By designing the algorithms of "requesting contract signing", "successful contract signing" and "contract fraud dispute resolution", the delegate contract signing is realized. By proposing algorithms and their calling processes, the smart contracts are completed. Finally, the smart contracts based on the solution are tested and verified. The source code of the smart contracts has been published on GitHub.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】

【发表时间】2022

【收录时间】2023-03-07

【文献类型】 理论模型

【DOI】 10.1371/journal.pone.0273424

Neural-FEBI: Accurate function identification in Ethereum Virtual Machine bytecode

【Author】 He, Jiahao Li, Shuangyin Wang, Xinming Cheung, Shing-Chi Zhao, Gansen Yang, Jinji

CCF-B

【影响因子】3.514

【主题类别】

区块链技术-核心技术-智能合约

【Abstract】Millions of smart contracts have been deployed onto the Ethereum platform, posing potential attack subjects. Therefore, analyzing contract binaries is vital since their sources are unavailable, involving identification comprising function entry identification and detecting its boundaries. Such boundaries are critical to many smart contract applications, e.g. reverse engineering and profiling. Unfortunately, it is challenging to identify functions from these stripped contract binaries due to the lack of internal function call statements and the compiler-inducing instruction reshuffling. Recently, several existing works excessively relied on a set of handcrafted heuristic rules which impose several faults. To address this issue, we propose a novel neural network-based framework for EVM bytecode Function Entries and Boundaries Identification (neural-FEBI) that does not rely on a fixed set of handcrafted rules. Instead, it used a two-level bi-Long Short-Term Memory network and a Conditional Random Field network to locate the function entries. The suggested framework also devises a control flow traversal algorithm to determine the code segments reachable from the function entry as its boundary. Several experiments on 38,996 publicly available smart contracts collected as binary demonstrate that neural-FEBI confirms the lowest and highest F1-scores for the function entries identification task across different datasets of 88.3 to 99.7, respectively. Its performance on the function boundary identification task is also increased from 79.4% to 97.1% compared with state-of-the-art. We further demonstrate that the identified function information can be used to construct more accurate intra-procedural CFGs and call graphs. The experimental results confirm that the proposed framework significantly outperforms state-of-the-art, often based on handcrafted heuristic rules.(c) 2023 The Authors. Published by Elsevier Inc. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Function identification; Ethereum smart contract; Binary analysis; LSTM-CRF; Control flow traversal

【发表时间】2023

【收录时间】2023-03-07

【文献类型】 实验仿真

【DOI】 10.1016/j.jss.2023.111627

NFTs for Open-Source and Commercial Software Licensing and Royalties

【Author】 Madine, Mohammad Salah, Khaled Jayaraman, Raja Zemerly, Jamal

【影响因子】3.476

【主题类别】

区块链应用-虚拟经济-NFT

【Abstract】Software licenses are legal agreements of sale and usage among software developers and clients. Such legal agreements are crucial to effectively manage ownership and protect the rights of involved parties. Today's software licensing mechanisms are mostly centralized and do not address the ever-increasing issues and complexities of modern software that may include multiple licenses, open-source distribution, rewarding other contributors of external software libraries, and utilizing royalty payments for monetization. As a result, developers have lost confidence in the existing software licensing models, and many software projects are failing due to lack of funding and royalty payments. This paper addresses such issues and complexities by proposing a novel decentralized software licensing system based on Non-Fungible Tokens (NFTs) and blockchain. The proposed licensing system is applicable to both commercial and open-source software. We use NFTs as digital tokens that encapsulate software code and their artifacts by minting them as unique valuable assets that allow developers to store and manage them on a blockchain ledger. With NFTs, developers can register and license their code, monetize it on NFT marketplaces, and earn royalties from other software projects that use their code. We present system architecture, relevant sequence diagrams, and develop aggregation algorithms for Ethereum smart contracts with ERC-1155 NFTs. Furthermore, we perform functional validation of our system and analyze the cost of its adoption. We also analyze the security of the solution and show how its applicability can be generalized and extended. We have made our smart contract code and related testing scripts publicly available on GitHub.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Software; Licenses; Smart contracts; Blockchains; Codes; Program processors; Software development management; Software licensing; software royalties; open-source software; NFTs; blockchain; Ethereum; smart contracts

【发表时间】2023

【收录时间】2023-03-07

【文献类型】 实验仿真

【DOI】 10.1109/ACCESS.2023.3239403

Futures trading activity and the jump risk of spot market: Evidence from the bitcoin market*

【Author】 Zhang, Chuanhai Ma, Huan Liao, Xiaosai

【影响因子】3.239

【主题类别】

区块链治理-市场治理-数字货币

【Abstract】This paper examines the impacts of Bitcoin futures trading on the jump risk of spot market. Based on 5-min high-frequency data, we use a nonparametric method to detect Le ' vy-type jumps in Bitcoin and document that Bitcoin prices are subject to both big and small jumps, and the jump risk - captured by jump intensity and jump size- is time varying. We then investigate the changes of the jump risk before and after the Bitcoin futures introduction and find that both the jump intensity and jump size of big and small jumps have decreased, yet the change of the latter is insignificant. Furthermore, we examine whether greater futures trading activity, proxied by unexpected trading volume and open interest, is associated with greater jump risk in the spot market. We document that jump risk Granger-causes futures speculative trading activity while the reverse is not true, and there is no causality between futures hedging activity and jump risk.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Cryptocurrency; Bitcoin futures; Le ?vy jumps; Futures trading activity; High -frequency data

【发表时间】2023

【收录时间】2023-03-07

【文献类型】 实证数据

【DOI】 10.1016/j.pacfin.2023.101950

A Blockchain-Based Decentralized, Fair and Authenticated Information Sharing Scheme in Zero Trust Internet-of-Things

【Author】 Liu, Yizhi Hao, Xiaohan Ren, Wei Xiong, Ruoting Zhu, Tianqing Choo, Kim-Kwang Raymond Min, Geyong

CCF-A

【影响因子】3.183

【主题类别】

区块链技术-协同技术-物联网

【Abstract】Internet-of-Things (IoT) are increasingly operating in the zero-trust environments where any devices and systems may be compromised and hence untrusted. In addition, data collected by and sent from IoT devices may be shared with and processed by edge computing systems, in order to reduce the reliance on centralized (cloud) servers, leading to further security and privacy issues. To cope with these challenges, this paper proposes an innovative blockchain-enabled information sharing solution in zero-trust context to guarantee anonymity yet entity authentication, data privacy yet data trustworthiness, and participant stimulation yet fairness. This new solution is able to support filtering of fabricated information through smart contracts, effective voting, and consensus mechanisms, which can prevent unauthenticated participants from sharing garbage information. We also prove that the proposed solution is secure in the universal composability framework, and further evaluate its performance over an Ethereum-based blockchain platform to demonstrate its utility.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchains; Smart contracts; Authentication; Privacy; Internet of Things; Information sharing; Servers; Blockchain; information sharing; zero-trust; Internet-of-Things; privacy protection; smart contract

【发表时间】2023

【收录时间】2023-03-07

【文献类型】 实验仿真

【DOI】 10.1109/TC.2022.3157996

MSmart: Smart Contract Vulnerability Analysis and Improved Strategies Based on Smartcheck

【Author】 Fei, Jiajia Chen, Xiaohan Zhao, Xiangfu

【影响因子】2.838

【主题类别】

区块链治理-技术治理-智能合约漏洞检测

【Abstract】As is well known, smart contracts on the blockchain store plenty of digital assets, and these contracts deployed on the blockchain are difficult to be modified. For this reason, the analysis and detection of smart contract vulnerabilities have received extensive attention. Smartcheck, a typical Java-implemented static analysis tool of smart contracts, is capable of converting Solidity source code into path diagrams based on the lexical and syntactic analysis, and finds smart contract vulnerabilities by path matching. Although Smartcheck can analyze most of the real-world vulnerabilities, some imperceptible vulnerabilities may be ignored, causing huge economic losses. In order to address these issues, we develop a new tool named MSmart to analyze the vulnerabilities of high risk such as timestamp dependence vulnerabilities, integer overflow vulnerabilities, self-destruct vulnerabilities, etc. MSmart converts the smart contract source code into an intermediate representation, and looks for smart contract vulnerabilities based on intermediate representation and XPath rules. We add new intermediate representation rules of Smartcheck to detect more kinds of vulnerabilities and optimize existing rules to suit the complexity of smart contract. We also implemented smart contract batch detection to shorten the time it takes to find vulnerabilities. To analysis the performance of MSmart, we collect 6000 real-world contracts from Etherscan and design some comparative experiments with other tools. The results of experiment show that MSmart is able to analyze related vulnerabilities better, and false positives and false negatives have been reduced due to our improvements.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】smart contract; security vulnerability; Smartcheck; blockchain

【发表时间】2023

【收录时间】2023-03-07

【文献类型】 实证数据

【DOI】 10.3390/app13031733

Cosmetic dermatology services in metaverse

【Author】 Babaei, Mahsa Galadari, Hassan Gold, Michael H. Goldust, Mohamad

【影响因子】2.189

【主题类别】

区块链应用-虚拟经济-元宇宙

【Abstract】

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】

【发表时间】

【收录时间】2023-03-07

【文献类型】 观点阐述

【DOI】 10.1111/jocd.15670

Knowing what is going on--a smart contract for modular construction

【Author】 Chen, Gongfan Li, Huaming Liu, Min Hsiang, Simon M. Jarvamardi, Ashtad

【影响因子】1.771

【主题类别】

区块链技术-核心技术-智能合约

【Abstract】This research aims to develop an automatic incentive-penalty enforcement system for modular construction. Smart contract rules were developed for a project of 120 prefabricated bath units. The results show that the smart contract can automatically enforce rewards and penalties for all 19 scenarios. The findings can help project managers detect and reject any inappropriate or malicious operations deviated from predefined rules efficiently. The results show that if the prefabricated bathroom unit fabricator can perform at the highest reliability level following the smart contract rules, the project can save 4.7% overall cost compared with the benchmark scenario. The findings will be beneficial to modular construction project by ensuring efficient monitoring, motivating reliable performance, and improving productivity and project documentation.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】discrete event simulation; smart contract; blockchain; construction payments; distributed file sharing

【发表时间】

【收录时间】2023-03-07

【文献类型】 实证数据

【DOI】 10.1139/cjce-2021-0649

Safemedchain - drug counterfeit prevention and recommendation using blockchain and machine learning

【Author】 Gopikarani, N. Gayathri, B. Praja, S. S. Sridharan, Sneha

【影响因子】1.737

【主题类别】

区块链应用-实体经济-医疗领域

【Abstract】Counterfeit drugs are without a doubt becoming a greater hazard to consumers and the pharmaceutical sector. As a result, real-time visibility of drug manufacturing and management is required. The proposed system uses Ethereum blockchain as the main technology. The primary advantage of blockchain technology is that the transactions are maintained in immutable digital ledger format and it may be read easily without jeopardizing the users security and privacy. In our proposed system, the admin validates and adds the manufacturers. The manufacturer after registering and logging in can perform tasks like adding the drug and seller list. The seller can place order to the manufacturer which the manufacturer can accept or reject. The seller can update status of order of accepted orders to delivered. The customer can view the order details by entering the serial number on the drug package. Any transaction or exchange that occurs in the network is recorded in the chain. It functions similarly to other networks, but blockchain technology is distinguished by the fact that no data can be removed or altered by anyone in the network. No changes to the network can be made unless it has been validated by all of the networks authorized users. All the information stored can be read by anybody so to incorporate more security, AES has been used to store data in the blockchain. The use of AES encryption technique distinguishes this system from all the existing implementations. Thus, this makes it easy to trace to the exact point in the supply chain and detect any counterfeit drugs in movement. As an extension to the drug counterfeit prevention system a Drug Recommendation System is also performed using the ensemble model with a combination of Random Forest and Logistic Regression for sentiment analysis training. Furthermore, when compared to the existing Linear SVM model, which has an accuracy of 90.39%, the suggested model has the best accuracy of 93.31%. Using the obtained sentiment for each drug, the drug is predicted accurately for the specified medical condition.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain (BC); Ethereum; smart contract; health- care; ensemble model; logistic regression; random forest

【发表时间】2023

【收录时间】2023-03-07

【文献类型】 实验仿真

【DOI】 10.3233/JIFS-220636

Quality improvement path and countermeasures for future-oriented film and animation teaching: based on fuzzy comprehensive evaluation method

【Author】 Tian, Xiaoyan Chen, Xinzhang Feng, Linlin

【影响因子】1.737

【主题类别】

区块链应用-虚拟经济-元宇宙

【Abstract】As the latest and hottest concept in the international arena, the metaverse concept has attracted the attention of various industries including information, economy, art, management, education and teaching for its application and technology integration research, but whether to define metaverse as a technology or a scenario has not yet reached a unified understanding in the academic and scientific communities. We believe that metaverse should be used as a key concept and emerging theory in building the future intelligent field. Therefore, we introduce the concept of metaverse in future film and animation teaching as a novel, strategic and disruptive teaching field with great potential, and the constructed metaverse self-directed learning field will become an important part of school education resource optimization. In this study, we focus on the quality improvement path of film and animation teaching in the context of metaverse, and conduct a study on the assessment method of teaching quality after the introduction of metaverse concept. Specifically, we discuss the quality improvement measures in the future teaching of film and animation, construct a teaching field of film and animation based on the metaverse, and propose a related teaching quality assessment model and establish an index system for the quality assessment of film and animation teaching in the context of the metaverse. The index system is composed of 3 primary indicators, 9 secondary indicators and 27 tertiary indicators, and the quantitative calculation is carried out by the Analytic Hierarchy Process (AHP) in fuzzy mathematics, and the weighting results of the indicators are calculated. The research goal of combining quantitative analysis and qualitative research was achieved. What can be seen through our research is that the metaverse online classroom built with virtual reality and other technologies will have more advantages than the traditional teaching classroom. In the future, similar learning devices can be introduced in film and animation teaching, and diversified learning modules can be established. Not only can the learning efficiency of offline classroom be improved, but also more learning space can be opened for online classroom. This study bridges the gap in the theory of quality assessment of film and animation teaching after the introduction of the future metaverse concept, innovates the analysis of the new concept and the improvement of the old method, builds a new scenario of organic combination of new technology and traditional education teaching, and provides a new idea for international and domestic future education research.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Teaching quality assessment; teaching film and animation; metaverse; metaverse field architecture; fuzzy mathematical theory

【发表时间】2023

【收录时间】2023-03-07

【文献类型】 观点阐述

【DOI】 10.3233/JIFS-222779

Design and implementation of a framework for blockchain based security using IoT

【Author】 Sureshkumar, T. Sivaraj, R. Vijayakumar, M.

【影响因子】1.737

【主题类别】

区块链技术-协同技术-物联网

【Abstract】The Internet of Things (IoT) has altered the world in the last few years due to its capacity to impact almost every part of life. However, IoT raises concerns about data security and privacy because it collects data from devices via the cloud, increasing its vulnerability to hacking. IoT security is a serious issue that has delayed its widespread adoption. Several security and privacy solutions have been proposed for IoT contexts that meet prevalent security criteria such as authentication, integrity, and secrecy. However, due to resource restrictions and heterogeneous IoT devices, present solutions are unable to address the security requirements of the approaching large-scale IoT paradigm. Blockchain, well known for bitcoin and Ethereum, provides an intriguing approach for IoT security. The IoT and blockchain technologies may be combined and significant improvements in distributed systems have been made as a result of the widespread use of IoT technology. A novel framework with a unique design was proposed to improve security in bitcoin transaction by combining blockchain and SHA-256 hash algorithm. Additionally, the performance of proposed framework is compared with the state-of-the-art algorithms like MD5 and SHA1 in term of encryption time, power consumption, latency, speed and security. It is observed that the proposed framework takes 12 ms lesser latency than MD5 and consumes 2.7Wh lesser power consumption than SHA1 and provides better security than both the techniques.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; IoT; security; bitcoin; privacy

【发表时间】2023

【收录时间】2023-03-07

【文献类型】 理论模型

【DOI】 10.3233/JIFS-220366

基于区块链技术的身份认证研究综述

【作者】 张淑娥;田成伟;李保罡;

【作者单位】华北电力大学电子与通信工程系;河北省电力物联网技术重点实验室;

【文献来源】计算机科学

【复合影响因子】1.722

【综合影响因子】1.149

【主题类别】

区块链技术-核心技术-认证机制

【摘要】区块链技术由中本聪于2008年的白皮书中提出。作为点对点网络中的一种去中心化和分布式公共账本技术,区块链应用链接块结构来验证和存储数据,用可信共识机制来同步数据变化,为身份认证的实现提供了一种可信的技术方案。与传统集中式认证方式相比,基于区块链技术的身份认证可以在保护数据真实可靠、节点隐私安全的同时实现数据共享。文中概述了基于区块链技术的身份认证研究现状及进展。首先,从区块链的技术架构、分类以及共识算法系统地介绍了区块链的一些基本理论;然后重点介绍了口令认证技术、生物识别技术、PKI技术以及其结合区块链应用的身份认证目前的研究现状;接着从物联网、车联网、智能电网、金融、医疗等应用方面介绍了基于区块链的身份认证技术的研究进展;最后分析了区块链身份认证技术目前存在的问题,展望了未来的发展趋势。

【关键词】区块链;;身份认证;;隐私安全;;数据保护;;访问控制

【文献类型】 综述

【DOI】

【发表时间】2023-03-07

在线标注

备案号: 苏ICP备17025947号-5

评论回复