【影响因子】33.840
【主题类别】
区块链技术-协同技术-数字孪生
【Abstract】Future wireless services will focus on improving the quality of life by enabling various applications, such as extended reality, brain-computer interaction, and healthcare. These applications will have diverse performance requirements (e.g., user-defined quality of experience metrics, latency, and reliability) which will be challenging to be fulfilled by existing wireless systems. To meet the diverse requirements of the emerging applications, the concept of digital twins has been recently proposed. A digital twin uses a virtual representation along with security-related technologies (e.g., blockchain), communication technologies (e.g., 6G), computing technologies (e.g., edge computing), and machine learning, so as to enable the smart applications. In this tutorial, we present a comprehensive overview on digital twins for wireless systems. First, we present the fundamental concepts (i.e., design aspects, high-level architecture, and frameworks) of digital twins for wireless systems. Second, a comprehensive taxonomy is devised for two aspects, namely, twins for wireless and wireless for twins. For the twins for wireless aspect, we consider issues related to design of twin objects, physical devices, and interface, as well as prototyping, deployment trends, incentive mechanism, isolation of twins, and decoupling. For the wireless for twins aspect, we consider issues related to accessing twin objects, security and privacy, and air interface design are considered. Finally, open research challenges and opportunities are discussed.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Digital twin; wireless system; machine learning; federated learning; virtual modeling
【发表时间】2022
【收录时间】2023-04-16
【文献类型】 综述
【Author】 Viriyasitavat, Wattana Xu, Li Da Dhiman, Gaurav Sapsomboon, Assadaporn Pungpapong, Vitara Bi, Zhuming
CCF-A
【影响因子】11.019
【主题类别】
区块链应用-实体经济-项目管理
【Abstract】Workflow is used to support and connect business processes (BP) in organizations. Historically, it is used to define the control of how tasks are coordinated and executed. Its importance has been continuously increasing with the incorporation of rapidly developed Service-oriented Architecture (SoA), Blockchain, and Internet-of-Thing (IoT); new information technologies have expanded the coverage of workflow across various applications. Workflows often interact with services, where SoA is a key driver to smoot service discovery and provide standards for interoperation. In decentralized collaborative environments, a workflow often deals with disparate services dynamically and interacts with services on demand. This not only unlocks the potentials of workflow applications in business process managements (BPM), but also precipitates significant challenges and has brought considerable attentions to the research community. This paper investigates the state-of-the-art of service workflow modelling and enabling technologies. It begins with the identification and examination of workflow and IoT characteristics; it proposes a workflow architecture to classify existing works on service workflows, and it summarizes the methods for workflow modeling, service interoperation to identify the limitations of existing works and clarify future research directions in using service workflows.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Scheduling; Task analysis; Market research; Blockchains; Computer architecture; Monitoring; Transient analysis; Business process management; workflow; service; Internet-of-Things; service-oriented architecture
【发表时间】2023
【收录时间】2023-04-16
【文献类型】 综述
【DOI】 10.1109/TSC.2021.3121394
【Author】 Saha, Rahul Kumar, Gulshan Devgun, Tannishtha Buchanan, William J. Thomas, Reji Alazab, Mamoun Hoon-Kim, Tai Rodrigues, Joel J. P. C.
CCF-A
【影响因子】11.019
【主题类别】
区块链技术-协同技术-量子区块链
【Abstract】The decentralization and transparency have provided wide acceptance of blockchain technology in various sectors through numerous applications. The claimed security services by blockchain have been proved using various cryptographic techniques, mainly public key infrastructure and digital signatures. However, the use of generic cryptographic primitives using large prime numbers or elliptic curves with logarithms is going to be an issue with quantum computers as those techniques are vulnerable in post-quantum era. Therefore, the paradigm shift from pre-quantum to the post-quantum era has necessitated new cryptographic developments which are robust against quantum attacks and applicable in blockchain for post-quantum decentralization. Therefore, we have presented a solution for post-quantum decentralization in the blockchain. It uses lattices with polynomials for identity-based encryption (IBE) and aggregate signatures for the consensus to ensure efficiency and suitability in post-quantum blockchain applications. We experiment the proposed approach based on delay, throughput, energy consumption and complexity. The comparative results prove that the presented work is efficient.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchains; Lattices; Aggregates; Security; Encryption; Identity-based encryption; Elliptic curve cryptography; Cryptography; blockchain; post-quantum; security; signature; identity
【发表时间】2023
【收录时间】2023-04-16
【文献类型】 理论模型
【DOI】 10.1109/TSC.2021.3116896
CCF-A
【影响因子】11.019
【主题类别】
区块链技术-协同技术-数据管理
【Abstract】In this paper, we introduce a concept of transparent integrity auditing and propose a concrete scheme based on the blockchain, which goes one step beyond existing public auditing schemes, since the auditing does not rely on third-party auditors while freeing users from heavy communication costs on auditing the data integrity. Then we construct a secure transparent deduplication scheme based on the blockchain that supports deduplication over encrypted data and enables users to attest the deduplication pattern on the cloud server. Such a scheme allows users to directly benefit from data deduplication and protects data content against anyone who does not own the data. Finally, we integrate the proposed transparent integrity auditing scheme and transparent deduplication scheme into one system, dubbed BLIND. We evaluate BLIND from security and efficiency, which demonstrates that BLIND achieves a strong security guarantee with high efficiency.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Cloud computing; Servers; Data integrity; Blockchains; Security; Encryption; Costs; Cloud storage; data encryption; blockchain; transparent integrity auditing; transparent deduplication
【发表时间】2023
【收录时间】2023-04-16
【文献类型】 实验仿真
【DOI】 10.1109/TSC.2022.3144430
【Author】 Liu, Yanhui Zhang, Jianbiao Pathan, Muhammad Salman Yuan, Yijian Zhang, Puzhe Maroc, Sarah Nag, Avishek
【影响因子】8.839
【主题类别】
区块链技术-协同技术-物联网
【Abstract】With the development of the Internet of Things (IoT) and its applications, a large amount of data is gen-erated regularly. If this information is used by malicious attackers, it will be a great disaster for the rel-evant users. In this regard, this article focuses on the user's identity privacy issues involved in the IoT. By protecting the user's identity privacy, the attacker cannot associate the obtained data with the user's real identity, and so achieve the purpose of protecting the user. This article uses the features of blockchain that cannot be tampered with nor forged to strengthen the reliability of the system. The proposed scheme saves the transaction information of user information through the Hyperledger and uses the ring signa-ture method to obscure the real identity. A key generator is used to generate system public parameters and ring membership information required for signature. Users can use this information to hide their identity in a ring group of n users so that other users can only guess the true identity of the user with a probability of 1/n. Additionally, the method of aggregated signature is used to shorten the time and space required fork signature verification to 1/k, which greatly improves the efficiency. Finally, this arti-cle also uses an accountability mechanism to punish some attackers who attempt to waste system resources by revealing the real identity of the attacker and refusing to serve him. In this paper, GO lan-guage is used to write chain code to realize the proposed algorithm, and a prototype system is built through HyperLeger Fabric blockchain network, and the prototype system is verified by experiment. The correctness and efficiency of the above scheme are also proved through theoretical analysis and experiments.(c) 2022 The Author(s). Published by Elsevier B.V. on behalf of King Saud University. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Internet of Things; Identity Privacy; Hyperledger Fabric; Ring Signature; Aggregate Signature
【发表时间】2022
【收录时间】2023-04-16
【文献类型】 理论模型
【影响因子】3.752
【主题类别】
区块链技术-协同技术-隐私计算
【Abstract】Self-sovereign identity authentication protocol is an active research topic in the field of identity authentication and management. However, the current SSI authentication protocols pay little attention to privacy protection and the fine-grained access control. Therefore, a secure and decentralized SSI authentication protocol with privacy protection and fine-grained access control is proposed. Firstly, the formal model of SSI including the SDPP-SSI identity model and management model is presented. And then, based on the federated blockchain, the distributed identifier is used as a global identifier for users in the decentralized domain. Finally, the verifiable statement is encapsulated using a policy control signature supporting privacy protection to develop the user's access control for identity registration in the centralized domain. Compared with the related work (Lin 2018, Zhu 2018, Stokkink 2018, Hammudoglu 2017, Othman 2017, Abraham 2018, Guan 2019, Lin 2019) from controllability, security, flexibility, privacy protection, authentication and fine-grained access control, the proposed SSI authentication protocol not only meets controllability, authentication, and flexibility, but also supports privacy protection and fine-grained access control.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】
【发表时间】2022
【收录时间】2023-04-16
【文献类型】 理论模型
【Author】 Sirisawat, Siriphong Chatjuthamard, Pattanaporn Kiattisin, Supaporn Treepongkaruna, Sirimon
【影响因子】3.752
【主题类别】
区块链应用-实体经济-众包领域
【Abstract】Amidst the Coronavirus crisis, many fundraising projects have emerged to relieve financial burdens resulting from social distancing policies. Crowdfunding is a way to raise money to fund a business, project or charity, through either social media or other online platforms to reach hundreds of potential sponsors. We developed guidelines for effective donation-based crowdfunding through online platforms. Using Futures Research (FR) technique, we conducted our analyses in 3 phases. In Phase 1, we reviewed relevant literature and conducted in-depth interviews of related parties. In Phase 2, we interviewed experts using Ethnographic Futures Research (EFR) technique. In Phase 3, we visualized the future using the principles of Futures Wheel, Cross-impact Matrix and Scenarios. Based on our findings, effective donation-based crowdfunding platforms should adopt Blockchain technology for transparency and accountability, and incentivize donations to keep backers loyal. Founders should be required to obtain fundraising licenses from relevant regulators. Finally, laws and regulations that protect platform users should be standardized internationally. Our proposed guidelines hope to improve the quality and transparency of future fundraising activities.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】
【发表时间】2022
【收录时间】2023-04-16
【文献类型】 实证数据
【影响因子】3.476
【主题类别】
区块链应用-实体经济-能源领域
【Abstract】Local energy markets (LEMs) provide opportunity to handle the challenges arising from the lower grid level while using the traditional top-down approach to manage distributed generated renewable energy resources. Blockchain-based local energy markets (LEMs) have been introduced in recent years as a way to enable local consumers/prosumers to trade their energy locally in a distributed and highly secured manner in an LEM. However, there are still some challenges regarding the main factors that can drive local consumers/prosumers to participate in a blockchain-based LEM, optimal community size, and prosumer to consumer ratio for an efficient LEM. Also, there is still no information on how the quantifying factors for participation on a blockchain-based LEM can affect the performance of an LEM. This paper presents a survey and simulation based analysis of quantifying factors for participation in a blockchain-based LEM. The survey was distributed among local consumers/prosumers and a total of 261 responses were received from the responders. The results from the responders were analyzed using a Python code based statistical analysis model. The simulation based analysis was conducted using a community based LEM model and evaluated using data received from a combination of German household profiles and standard load profiles. The survey results showed that the major drive for local consumers/prosumers to participate on blockchain-based LEM is their willingness to support renewable energy integration, transparency, and trust offered by a blockchain network. On the other hand, the simulation based analysis showed that small and medium communities with prosumers to consumer ratios between 0.3 to 0.5 create more economic and technical benefits for local consumers/prosumers compared to large communities. The community based simulation results were modelled together with the survey results to determine how the individual quantifying factors for participating in a blockchain-based LEM can affect the performance of an LEM.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain; decentralized energy system; survey analysis; local energy market; multi agent system
【发表时间】2023
【收录时间】2023-04-16
【文献类型】 实证数据
【Author】 Kang, Dongwoo Jo, Hyo Jin
【影响因子】3.476
【主题类别】
区块链应用-实体经济-交通领域
【Abstract】With the development of IT technologies, event data recorder (EDR) devices are now installed in modern vehicles to record and analyze vehicle-related events. As data recorded in EDRs began to be used as conclusive proof in courts, many researchers turned their to focus on developing methodologies that can protect data recorded in EDRs from data forgery attacks. In general, these existing methods generate verification values for EDR data by using a digital signature algorithm. However, these methods do not provide a way to protect the data stored in an EDR from data forgery attacks in the event of an emergency, such as a car accident, and it is not possible to properly create a verification value for the EDR data due to unexpected and sudden events like a power supply problem. Thus, in this paper, we propose TB-Logger, a novel method that protects EDR data even when there is an emergency situation. TB-Logger relies on the trusted execution environment (TEE) to protect EDR data from data forgery attacks, which ultimately result in data modification, reordering, and deletion. In addition, in the event of an emergency, TB-Logger utilizes a blockchain system to store verification values and publicly verify the data generated during the event. We evaluated the practicality of TB-Logger using two real vehicles: the Hyundai Avante CN7 and the Tesla Model 3. Through these tests, we confirmed that TB-Logger can generate verification values for EDR data without incurring any data loss.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchains; Digital signatures; Accidents; Event detection; Switches; Forgery; Recording; Event data recorder (EDR); trusted execution environment (TEE); blockchain; secure logging
【发表时间】2023
【收录时间】2023-04-16
【文献类型】 理论模型
【Author】 Fugkeaw, Somchart
【影响因子】3.476
【主题类别】
区块链应用-实体经济-身份验证
【Abstract】Existing Single Sign-On (SSO) access control systems typically rely on the traditional protocols requiring additional authentication mechanism and/or identity providers. As the growing demand in outsourcing system resources such as data and applications to the cloud platform, implementing traditional SSO models to support efficient and fine-grained access control for multi-user and multi-application environment is not practical. In this paper, we propose a blockchain-based identification and access management (IAM) scheme called D-2-IAM to provide strong security measures for controlling SSO access to resources in the cloud. At a core of D-2-IAM, core access control processes are done by the smart contracts and blockchain where the access transactions are well retained for the accountability. In our system, the SSO authentication is based on the highest authentication level and the hashed-based token management. Owing to the autonomous authentication management, the communication overhead regarding the interaction with identity providers and third-party verification mechanism for multi-system authentication is minimized. For the authorization system, D-2-IAM enables fine-grained access through the access policy modeled in the document database written and enforced to each customer. Finally, we conducted the experiments on Google cloud to show that our D-2-IAM system is efficient for the implementation. The performance test showed that our proposed system was approximately 4 times efficient than the average processing time of three existing works.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Authentication; Access control; Cloud computing; Authorization; Blockchains; Smart contracts; Servers; SSO; authentication; access control; blockchain; access policy; document database
【发表时间】2023
【收录时间】2023-04-16
【文献类型】 实验仿真
【Author】 Azamuddin, Wan Muhammad Hazwan Aman, Azana Hafizah Mohd Sallehuddin, Hasimi Abualsaud, Khalid Mansor, Norhisham
【影响因子】3.476
【主题类别】
区块链应用-实体经济-技术管理
【Abstract】Named Data Networking (NDN) is developed to accommodate future-oriented internet traffic. In recent years, NDN's popularity has grown due to the evolution of the Internet of Things, Artificial Intelligence, Cloud Services, and Blockchain. NDN's key promising features are dynamic content management, privacy, mobility, and trust. This manuscript provides a comprehensive overview of the motivations and promises of NDN in the context of recent evolution technologies and applications. The recent reviews highlight the trend of NDN Blockchain and 5G technology with 73% of research interest, while transportation applications dominate 64% of the research interest. Afterward, we discuss existing NDN Architecture, Operation, Services, and applications, as well as the most popular NDN technologies. Our discussions are based on investigating current solutions with criticism. These significantly highlight the emergence of the NDN and the potential to revolutionize internet traffic management and security.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】NDN AI; NDN application; NDN blockchain; NDN cloud edge; NDN IoT; NDN technology
【发表时间】2023
【收录时间】2023-04-16
【文献类型】 综述
【Author】 Asamoah, Kwame Omono Darko, Adjei Peter Antwi, Collins Opoku Kodjiku, Seth Larweh Aggrey, Esther Stacy E. B. Wang, Qing Zhu, Jia
【影响因子】3.476
【主题类别】
区块链应用-实体经济-众包领域
【Abstract】In developing countries, funding is a significant obstacle to receiving higher education. Brilliant but needy students cannot complete their studies since their parents are unemployed and their countries' economies are poor. As a result, the students' talents are not harnessed to their full potential. In order to help students obtain higher education and harness their full potential, governments provide student loans to students in higher education. The government provides loans to students through the ministry of education. The students pay back the loan with interest when they start working. Governments have been the sole funders of student loans. The emergence of COVID-19 and the Russia-Ukraine war have resulted in a global economic crisis. Because of the global economic crisis, the government's spending has increased. In order to help reduce the burden of government and thereby reduce spending, we intend to revolutionize the student loan program through blockchain and crowdsourcing. This work presents a blockchain-based crowdsourcing decentralized loan platform where investors will be brought on board to provide funds for students in higher education. The platform will allow students to apply for loans from investors through registered financial institutions. The students will pay back the loans with interest when they enter the workforce. The proposed platform will allow students to fund their education, investors will get interest on the money they invest, and governments can channel the money they put into student loan programs into other avenues. We perform a thorough security analysis and back the efficiency of our work with numerical results.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Crowdsourcing; Blockchains; Education; Task analysis; Smart contracts; Developing countries; Peer-to-peer computing; Finance; Blockchain; crowdsourcing; higher education; smart contracts; student loans
【发表时间】2023
【收录时间】2023-04-16
【文献类型】 实验仿真
【Author】 Yu, Xiangyang Wang, Xiaojing
【影响因子】3.252
【主题类别】
区块链应用-实体经济-交通领域
【Abstract】With the realization of the "dual carbon" goal, urban public transport with an increasing proportion of new energy vehicles will become the key subject to achieve the carbon emission reduction goal. Under the new background of deep coupling between transport networks and power grids, it is of great significance to study the carbon-trading mode of urban public transport participation in promoting the development of new energy vehicles and improving the operating efficiency and low-carbon level of the "energy-transport" system. In this paper, based on blockchain technology, a framework for urban public transportation networks to participate in carbon trading is established to solve the current problems of urban public transportation's insufficient motivation to reduce emissions, lax operation strategy and lack of carbon-trading matching mechanisms. Finally, Hyperledger Fabric was selected as the simulation platform, and we simulated the model through the calculation example. The results show that the proposed scheme can effectively improve the operating efficiency of urban public transport and reduce its operating costs and carbon emissions. In addition, policy recommendations on carbon price, carbon quota and penalties are proposed to improve the institutional system of the carbon-trading market. [Yu, Xiangyang; Wang, Xiaojing] Xinjiang Univ, Sch Elect Engn, Urumqi 830017, Peoples R China Xinjiang University Wang, XJ (通讯作者),Xinjiang Univ, Sch Elect Engn, Urumqi 830017, Peoples R China. wangxiaojing345@163.com Natural Science Foundation of Xinjiang Uygur Autonomous Region [2020D01C031] Natural Science Foundation of Xinjiang Uygur Autonomous Region This research was supported by the Natural Science Foundation of Xinjiang Uygur Autonomous Region under Grant 2020D01C031. 45 0 0 0 0 MDPI BASEL ST ALBAN-ANLAGE 66, CH-4052 BASEL, SWITZERLAND 1996-1073 ENERGIES Energies MAR 2023 16 6 2606 10.3390/en16062606 http://dx.doi.org/10.3390/en16062606 21 Energy & Fuels Science Citation Index Expanded (SCI-EXPANDED) Energy & Fuels A6BJ7 gold 2023-04-10 WOS:000955952600001
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】blockchain technology; traffic network; carbon trading; power grid; operation optimization; transaction-matching mechanism
【发表时间】2023
【收录时间】2023-04-16
【文献类型】 理论模型
【DOI】 10.3390/en16062606
【影响因子】0.633
【主题类别】
区块链应用-实体经济-食品供应链
【Abstract】Food safety and food security have captured the significant attention of researchers. The main objective of this study is to identify the critical barriers of food supply chain management in the Indian context. For this, a decision-making trial and evaluation laboratory (DEMATEL) based approach is used. With an assessment of existing literature and consultation with food chain experts, 15 barriers have been identified for analysis. Critical barriers and their causal relationships are explored through the cause-and-effect diagram. Results of this study show that the barriers, namely "Lack of Government policy and regulation support" (B8) and "Extreme & diverse climate conditions in India" (B15), are the top two most critical and influential barriers. Recent advances in Blockchain technology have paved for mitigating the impact of these barriers on the performance of the food supply chain, and with the suitable intervention of Blockchain technology, many such barriers can be overcome, thereby improving food supply chain performance. [Patidar, Santosh; Sukhwani, Vijay Kumar; Shukla, Apratul Chandra] Ujjain Engn Coll, Dept Mech Engn, Ujjain, Madhya Pradesh, India Patidar, S (通讯作者),Ujjain Engn Coll, Dept Mech Engn, Ujjain, Madhya Pradesh, India. santoshpatidar102@gmail.com 39 0 0 0 0 UNIV CINCINNATI INDUSTRIAL ENGINEERING CINCINNATI UNIV CINCINNATI, CINCINNATI, OH 45221-0116 USA 1072-4761 1943-670X INT J IND ENG-THEORY Int. J. Ind. Eng.-Theory Appl. Pract. 2023 30 1 189 202 10.23055/ijietap.2023.30.1.8507 http://dx.doi.org/10.23055/ijietap.2023.30.1.8507 14 Engineering, Industrial; Engineering, Manufacturing Science Citation Index Expanded (SCI-EXPANDED) Engineering A1AY1 2023-04-10 WOS:000952538200001
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain Technology; Food Supply Chain Management (FSCM); FSC Barriers; DEMATEL
【发表时间】2023
【收录时间】2023-04-16
【文献类型】 实证数据
【作者】 邹文涛;李传艺;葛季栋;骆斌;
【作者单位】南京大学计算机软件新技术国家重点实验室;
【文献来源】计算机集成制造系统
【复合影响因子】2.432
【综合影响因子】1.650
【主题类别】
区块链技术-协同技术-隐私计算
【摘要】协作业务流程可以在执行跨组织的业务目标时简化业务逻辑,提升协作效率。它有两个重要的管理目标,隐私保护和数据监管。协作者们通常会利用可信的第三方平台。然而这种中心化的协作会存在监管失效和隐私泄露的风险。因此,目前的研究转向了利用去中心化方式的区块链技术实现流程监管。目前的方法基于匿名身份和公开的数据,会造成数据泄露的风险。为此,本文提出了一个基于混合链的协作业务流程管理新方法,在监管业务流程数据的基础上,设计了对流程数据的针对性隐私保护方案。公有链部分确保流程实例对外部用户的隐私性和可监管性,联盟链部分提供了对内部协作者的隐私保护和数据监管。当流程实例在联盟链上执行时,利用三次遍历全体协作者的双向传递机制隔离协作任务。本文通过在多个公开的业务流程数据上的仿真实验,对比了混合链方法与其他基于区块链的方法。实验结果表明,混合链方法能够保护隐私数据和监管流程数据,在执行效率上具备可用性。
【关键词】协作业务流程;;区块链;;隐私保护;;数据监管
【文献类型】 实验仿真
【发表时间】2023-04-16
【作者】 徐明;张保俊;伍益明;应晨铎;郑宁;
【作者单位】杭州电子科技大学网络空间安全学院;
【文献来源】通信学报
【复合影响因子】2.347
【综合影响因子】1.740
【主题类别】
区块链技术-协同技术-隐私计算
【摘要】为解决网络攻击与信息窃听环境下的多智能体系统分布式共识问题,提出一种能有效抵御网络拒绝服务(DoS)攻击和保护节点状态隐私的平均共识算法。首先,结合网络化控制系统中DoS攻击的特性,构建与时间相关的周期性DoS攻击模型。其次,利用邻居节点间的信息交互给出一种基于差分隐私的分布式网络节点信息处理机制,并将其引入平均共识算法。再次,结合事件触发机制,提出一种适用于DoS攻击下无向通信网络的分布式共识算法,并分别对其收敛性和隐私保护性能进行了严格的数学分析。最后,通过数值仿真实验和硬件实验验证了所提算法的有效性。
【关键词】多智能体系统;;平均共识;;拒绝服务攻击;;隐私保护;;网络安全
【文献类型】 理论模型
【发表时间】2023-04-16
【作者】 刘雪娇;曹天聪;夏莹杰;
【作者单位】杭州师范大学信息科学与技术学院;浙江大学计算机科学与技术学院;浙江大学台州研究院;
【文献来源】通信学报
【复合影响因子】2.347
【综合影响因子】1.740
【主题类别】
区块链应用-实体经济-车联网
【摘要】为了解决车联网环境下跨信任域数据共享中跨域数据泄露严重、跨域共享不可控、跨域访问效率低的问题,提出了一种区块链架构下高效的车联网跨域数据安全共享方案。不同信任域的可信机构构成区块链,采用改进的密文策略属性基加密算法加密数据,结合区块链和星际文件系统进行存储,构建了基于区块链的跨域数据细粒度、安全共享方案;设计了基于混淆布隆过滤器的跨域访问验证方法,智能合约基于链上访问策略进行快速的解密测试,提高大量跨域密文的访问效率;设计了基于外包解密的跨域数据获取方法,可信机构为跨域访问请求进行密文转换,并执行包含复杂双线性配对运算的外包解密,减少了车辆在解密过程的计算开销。实验结果表明,所提方案有效提高了跨域密文转换和车辆解密的效率,与现有方案相比,跨域数据访问效率平均提升了60%。
【关键词】车联网;;跨域;;数据共享;;属性基加密;;区块链
【文献类型】 理论模型
【发表时间】2023-04-16
【作者】 顾康;张绍华;李超;
【作者单位】上海海洋大学信息学院;上海计算机软件技术开发中心;上海商学院;
【文献来源】计算机应用研究
【复合影响因子】1.888
【综合影响因子】1.138
【主题类别】
区块链技术-核心技术-可编辑区块链
【摘要】区块链账本中存在违规数据、误操作上链数据等问题,相关学者开展了可修正账本技术研究。针对传统修正方案中修改效率低、恶意节点作乱影响安全性等问题,提出了一种基于监督者组的区块链账本修正方案来改进传统方案。通过基于改进PageRank的区块链节点信用排序算法筛选出监督组成员节点,进而在可信前提下提升了账本修正流程的效率。设计了一种改进随机选择修正者算法并使用可验证随机函数构建节点验证追责机制,保障了账本数据修正流程的可追溯性和安全性。通过分析和仿真实验,该方案具有较高的安全性,并在区块信息修正效率和资源利用率方面优于传统方案。
【关键词】可编辑区块链;;变色龙哈希;;PageRank算法;;可验证随机函数
【文献类型】 理论模型
【发表时间】2023-04-16
【作者】 李莹;瞿红红;王佳;何自芬;
【作者单位】昆明理工大学机电工程学院;
【文献来源】湖南大学学报(自然科学版)
【复合影响因子】1.176
【综合影响因子】0.842
【主题类别】
区块链应用-实体经济-供应链
【摘要】为了解决烟草供应链各环节数据海量异构,企业间信息壁垒高筑,追溯数据可信度低,监管乏力等问题,运用超级账本(Hyperledger Fabric)构建烟草区块链多链追溯系统,设计多链数据存储与监管模型,利用多链结构实现追溯数据共享与隐私数据隔离;应用Raft共识算法,制定背书策略,并通过设计智能合约实现消费者追溯及监管部门精准监管;同时开发追溯系统去中心化应用(DAPP),便于用户使用。为验证追溯系统可行性,利用Caliper对区块链多链追溯系统进行性能测试。在网络性能方面,区块链网络吞吐量稳定维持在150tps;在可信度方面,区块链交易成功率100%;在合约效率方面,写入吞吐量稳定在150tps,查询最低延时稳定在0.01s,平均延时0.026s。结果表明,该系统满足实际应用性能要求,能实现消费者防伪溯源、监管部门精准监管的需求。
【关键词】区块链;;多链;;烟草;;追溯;;监管
【文献类型】 实验仿真
【发表时间】2023-04-16
【作者】 徐杨杨;王艳;纪志成;
【作者单位】江南大学物联网工程学院;
【文献来源】智能系统学报
【复合影响因子】
【综合影响因子】
【主题类别】
区块链技术-核心技术-扩展方案
【摘要】针对云制造系统中区块链的排队时延问题,并探索降低云制造系统中区块链排队时延的因素。提出一种新型的云制造系统区块链模型,在传统云制造系统架构的服务层中引入区块链服务。将制造服务请求在区块链服务的排队时延过程分解为缓冲阶段和共识阶段,使用M/M/1排队模型分析系统指标。提出一种自适应难度值机制,优化不同算力的节点参与共识的机会。研究了节点收益与节点服务率的关系。仿真结果表明,基于M/M/1排队模型能够反映云制造系统的请求排队时延过程;引入自适应难度值后,算力小的区块链节点有更大的机会挖矿成功,且节点的收益与其服务率呈正相关。
【关键词】云制造;;区块链;;排队时延;;排队论;;服务率;;自适应难度;;动态规划;;挖矿激励
【文献类型】 实验仿真
【发表时间】2023-04-16
【作者】 李刚;关雪;杨会峰;赵琳颖;辛锐;陈连栋;
【作者单位】华北电力大学计算机系;复杂能源系统智能计算教育部工程研究中心;国网河北省电力有限公司信息通信分公司;河北省电力物联网信息通信技术创新中心;
【文献来源】智能系统学报
【复合影响因子】
【综合影响因子】
【主题类别】
区块链应用-实体经济-能源领域
【摘要】随着能源系统向着绿色低碳化转型发展,大量新型产消者涌入交易市场,给能源交易带来了诸多不确定性,传统的集中式能源交易机制已不能满足新的需求。在此背景下,首先,分析了区块链技术与能源交易模式的契合性,在智能合约的基础上提出并构建了以产消者为研究对象的微电网点对点(P2P)能源交易模型,以提高可再生能源的消纳比例;然后,为增加用户收益,使用3种不同出清机制进行结算,并设计了一种用户满意度反馈度量方法,可为后续交易提供参考;最后,通过算例仿真,结果表明出清机制不同程度上影响着用户的满意度与收益,并且点对点能源交易策略优于传统的能源交易策略,该成果为数字化转型背景下创新能源交易模式提供了新的思路。
【关键词】微电网;;能源交易;;区块链;;智能合约;;点对点;;产消者;;清算机制;;用户满意度
【文献类型】 实验仿真
【发表时间】2023-04-16
【作者】 张小松;牛伟纳;黄世平;孙裕俨;贺哲远;
【作者单位】电子科技大学计算机科学与工程学院;交子金融科技中心;区块链安全与平台技术教育部工程研究中心;
【文献来源】四川大学学报(自然科学版)
【复合影响因子】
【综合影响因子】
【主题类别】
区块链治理-技术治理-智能合约漏洞检测
【摘要】智能合约是区块链三大特点之一,也是区块链具有应用价值和灵活性的领域.本质上,智能合约是一段用特定脚本语言实现的代码,不可避免地存在安全漏洞风险.如何及时准确地检查出各种智能合约的漏洞,就成为区块链安全研究的重点和热点.为了检测智能合约漏洞,研究者提出了各种分析方法,包括符号执行、形式化验证和模糊测试等.随着人工智能技术的快速发展,越来越多基于深度学习的方法被提出,并且在多个研究领域取得了很好的效果.目前,针对基于深度学习的智能合约漏洞检测方法并没有被详细地调查和分析.本文首先简要介绍了智能合约的概念以及智能合约漏洞相关的安全事件;然后对基于深度学习的方法中常用的智能合约特征进行分析;同时对智能合约漏洞检测中常用的深度学习模型进行描述.此外,为了进一步推动基于深度学习的智能合约漏洞检测方法的研究,本文将近年来基于深度学习的智能合约漏洞检测方法根据其特征提取形式进行了总结分类,从文本处理、静态分析和图像处理3个角度进行了分析介绍;最后,总结了该领域面临的挑战和未来的研究方向.
【关键词】区块链;;以太坊;;智能合约;;漏洞检测;;深度学习
【文献类型】 综述
【发表时间】2023-04-16
【作者】 石竹玉;王栋;李达;郭庆雷;赵丙镇;
【作者单位】国网区块链科技(北京)有限公司;国网区块链技术实验室;国网数字科技控股有限公司;
【文献来源】全球能源互联网
【复合影响因子】
【综合影响因子】
【主题类别】
区块链应用-实体经济-能源领域
【摘要】区块链技术凭借其开放、共享、协同的技术形态与构建能源互联网和建设新型电力系统的战略目标高度契合,成为能源电力转型的重要技术基础,能源电力区块链领域标准的缺失,使得区块链技术的应用和推广缺乏有效的规范和指导,严重制约了能源电力区块链的发展。首先,全面梳理国内外区块链技术及其在能源电力领域应用的标准化现状,指出现状不足。其次,分析区块链技术与碳交易、绿电交易、分布式交易等低碳化典型应用场景的匹配性,然后,按照GB/T 12366—2009《综合标准化工作指南》梳理提炼出典型应用场景中的标准化需求以及标准化对象。最后给出标准研制的思路与路径,为提升能源电力区块链技术应用的标准化、规范化水平提供参考。
【关键词】能源互联网;;区块链;;标准化
【文献类型】 观点阐述
【发表时间】2023-04-16