CCF-C
【影响因子】10.238
【主题类别】
区块链应用-实体经济-物联网
【Abstract】Internet of Things (IoT) devices operate in an untrusted environment, and blockchain technology can provide a secure distributed collaboration method. However, the widespread distribution of heterogeneous devices in the IoT creates complex information asymmetry issues, leading to inefficient resource allocation. This is especially true when information asymmetry occurs in long-term cooperative relationships, where contract design often faces more complex incentive problems. This article focuses on studying long-term cooperation between IoT devices based on the blockchain technology and proposes a solution to information asymmetry in long-term cooperation based on contract theory and reputation mechanism: 1) we design more flexible pricing strategies based on contract theory to attract more devices to become validators and provide different long-term job contracts to overcome information asymmetry issues in the cooperative process and 2) we propose a subjective reliability-linked reputation evaluation mechanism to construct the career of validators, which can constrain unethical behavior and incentivize validators to comply with rules and protect data security in long-term cooperation. Experimental results show that our scheme can improve device willingness to cooperate, overcome information asymmetry in long-term cooperation, improve the efficiency of computing resource allocation, reduce network security risks, achieve long-term trusted cooperation between devices, and provide effective security for the development of the IoT.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain; contract theory; incentive; Internet of Things (IoT); long-term cooperation; reputation; security
【发表时间】2024
【收录时间】2024-03-14
【文献类型】 实验仿真
CCF-C
【影响因子】10.238
【主题类别】
区块链应用-实体经济-社交隐私
【Abstract】The vehicular social networks (VSNs) provide passengers, drivers and vehicles with multiple services, such as safe driving, data sharing, and traffic management. However, transmitting data in VSNs can expose information, such as the user's identity and location. Malicious users who tamper with shared data can even cause serious traffic accidents. Considering the privacy protection and secure transmission of shared data in VSNs, we propose a blockchain-based and fog computing-assisted data access control (BFDAC) scheme. We combine the multi-authority ciphertext-policy attribute-based encryption algorithm with the consortium blockchain to avoid the security and trust issues in the form of centralized key management, and outsource part of the decryption calculations to roadside units (RSUs) as fog nodes to realize lightweight calculation for users. Our BFDAC scheme also supports user tracking and revocation, while users can also revoke shared data saved in the cloud. Security analysis shows that the BFDAC scheme can effectively protect the shared data. Experiments show that our BFDAC scheme reduces 32.8% in storage cost, 9.5% in encryption cost, and 57.1% in outsourced decryption cost compared to previous ones.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain; data access control; outsourcing decryption; revocation; vehicular social networks (VSNs)
【发表时间】2024
【收录时间】2024-03-14
【文献类型】 实验仿真
CCF-C
【影响因子】10.238
【主题类别】
区块链应用-实体经济-车联网
【Abstract】Bad weather or environmental factors, particularly in remote mountain areas, may result in unsafe driving conditions and consequently road traffic accidents. As the deployment of large-scale sensing nodes for reporting road conditions is too expensive, the crowdsourcing method or reporting by sensors in vehicles themselves will be easier to deploy and more practical. However, those participant sensing methods impose some difficulties, such as fake information, reporter misbehavior, and timeliness. Thus, we propose a tri-blockchain-based Internet of Vehicles system, called TriBoDeS, to facilitate real-time information detection and sharing. It is designed to guarantee concurrency and security to dynamically store, manage, and share information uploaded by vehicles with great efficiency. Such information will be announced on the blockchain under the autonomous identification of vehicles in low-trust conditions. In order to ensure the software's security, TriBoDeS can monitor the software's state, detect identified malicious activities, and respond accordingly. To ensure data security, a role-based management mechanism is introduced to achieve fine-grained control over permissions, and confidence rules are established to guarantee the authenticity of the data. To demonstrate the applicability of the proposed scheme, we evaluate its performance (e.g., computing and communication overheads) and security (e.g., resiliency against common attacks) over a consortium blockchain. The experimental results demonstrate that, under the conditions of a sufficient number of vehicles, the TriBoDeS system is capable of real-time information sharing while ensuring the security of user information. Compared to conventional single-chain systems, the TriBoDeS system achieves a 2.75-time improvement in efficiency.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain; Internet of Vehicles (IoV); road condition detection and sharing
【发表时间】2024
【收录时间】2024-03-14
【文献类型】 实验仿真
【Author】 Nguyen, Binh Minh Nguyen, Thieu Vu, Quoc-Hien Tran, Huy Hung Vo, Hiep Son, Do Bao Binh, Huynh Thi Thanh Yu, Shui Wu, Zongda
CCF-C
【影响因子】10.238
【主题类别】
区块链应用-实体经济-物联网
【Abstract】In recent years, the utilization of fog cloud-based Internet of Things (IoT) applications has been steadily rising due to the exponential growth of data produced by interconnected smart devices. However, cloud providers who are responsible for these IoT applications face two critical problems: 1) how to protect the system from untrusted users and 2) how to allocate processing units to meet the demands with acceptable costs. The fog-cloud blockchain system (FCB), proposed in past research, provides a perfect solution for the former question by integrating Blockchain's security qualities into the fog-cloud paradigm. In this article, we address the latter question by proposing an improved version of the life-choice-based optimization algorithm (ILCO) to solve the task scheduling for Bag-of-Task applications in the FCB system. Task scheduling is one of the most prominent problems in resource allocation. Our proposed algorithm not only increases the convergence speed but also maintains diversity better, optimizing the FCB's power, latency, and cost. Under a single-objective problem setting, ILCO outperforms LCO and similar state-of-the-art methods by achieving better results for FCB's latency and power consumption.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Cloud computing; fog computing; fog-cloud blockchain system (FCB); optimization; task scheduling
【发表时间】2024
【收录时间】2024-03-14
【文献类型】 实验仿真
【Author】 Liang, Hao Zhu, Li Yu, F. Richard
CCF-C
【影响因子】10.238
【主题类别】
区块链应用-实体经济-交通领域
【Abstract】With the advancement of urban rail transits (URTs), the demand for artificial intelligence (AI)-based URTs services grows exponentially. Edge intelligence (EI) leverages computing resources on the network edge to provide real-time intelligent services in close proximity. As it enables fast distributed learning, EI is envisioned to be a potential component of URTs, and ideal EI service provision is a critical concern for the intelligent development of URTs. The existing EI-related research concentrates on the computation offloading of general AI-based tasks, whereas both the edge server deployment and AI model training process are not explicitly designed for URTs. The URTs AI service characteristics, such as model training demand, priority, and security, are largely ignored. In this article, we propose a novel collaborative EI service provision framework for URTs. Blockchain is used along with the EI server to construct a trusted computing infrastructure. To address the EI service credit crisis, a blockchain-based trust management mechanism, including short-term reward incentives and long-term reputation evaluation, is designed in the trusted computing infrastructure. An HRL-based collaborative training service optimization model is proposed to improve the learning efficiency and edge resource utilization rate in URTs. Specifically, the proposed two-stage collaborative optimization model jointly considers high-level service scheduling and low-level task offloading. In addition, we present an intelligent train control model based on the state-of-the-art decision transformer (DT), with the training service as a case study to demonstrate the effectiveness of the proposed collaborative EI service provision. Extensive simulation results show that the proposed EI service provision framework can provide trusted, efficient, and high-quality AI training services, simultaneously improving URTs operational efficiency.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain; edge intelligence (EI); hierarchical reinforcement learning (HRL); urban rail transits (URTs)
【发表时间】2024
【收录时间】2024-03-14
【文献类型】 案例研究
【Author】 Guo, Yimin Zhang, Zhenfeng Guo, Yajun Xiong, Ping
CCF-C
【影响因子】10.238
【主题类别】
区块链应用-实体经济-物联网
【Abstract】The insufficient trustworthiness of fog nodes in fog computing leads to new security and privacy problems in communication between entities. Existing authentication schemes rely on a trusted third party, or assume that fog nodes are trustworthy, or the authentication overhead is high, which is inconsistent with the characteristics of fog computing. To solve the problem of secure communication in the fog computing environment, we propose an efficient blockchain-based secure remote authentication protocol for the fog-enabled Internet of Things (BSRA). Specifically, blockchain is introduced to construct distributed trust for the fog computing environment. Only lightweight cryptographic primitives, such as physical unclonable functions (PUFs) and cryptographic hash functions, are exploited to design the authentication scheme. In addition, we use temporary identities and the authentication-piggybacking-synchronization to ensure the anonymity and effectiveness of the authentication scheme. We conduct security analysis to demonstrate that BSRA can provide guarantees against various known attacks. We also evaluate the performance of BSRA from several aspects, and the results show that BSRA is effective.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Authentication; blockchain; fog-enabled Internet of Things (IoT); key agreement; physical unclonable functions (PUFs)
【发表时间】2024
【收录时间】2024-03-14
【文献类型】 实验仿真
CCF-C
【影响因子】10.238
【主题类别】
区块链治理-技术治理-漏洞检测
【Abstract】IOTA has emerged as a promising blockchain platform specially designed for the Internet of Things (IoT). Its distributed ledger, called tangle, adopts a directed acyclic graph (DAG) structure to achieve fast transaction confirmation and high scalability. While the tangle tremendously mitigates blockchain performance concerns relative to a traditional single chain, it simultaneously increases the potential risk of double-spending attacks. Utilizing constructing illegal tangle branches to substitute for legitimate ones, attackers inside IOTA can launch double-spending attacks and seriously compromise the tangle security. In this work, we take the first step toward investigating the problem of tangle vulnerability by leveraging the large deviation theory. The proposed scheme, called SecTangle, can assist IOTA in effectively reducing the tangle vulnerability to resist double-spending attacks. The core idea is to explore the security threshold defined and deduced to affect the robustness of the tangle by evaluating the probability of tangle vulnerability. By adjusting the critical factors of the security threshold, fake tangle branches can be found by IOTA efficiently to prevent double-spending attacks. Besides, we further devise a transaction recovery algorithm to recover time-sensitive legitimate transaction branches. This article validates that the proposed scheme is efficient with comprehensive theoretical analysis and simulation experiments.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Distributed ledgers; double-spending attack; IOTA; large deviation theory; tangle
【发表时间】2024
【收录时间】2024-03-14
【文献类型】 实验仿真
CCF-C
【影响因子】10.238
【主题类别】
区块链技术-协同技术-联邦学习
【Abstract】Mobile crowdsourcing federated learning (FL-MCS) allows a requester to outsource its model-training tasks to other workers who have the desired data as well as strong computing power. FL-MCS can thereby overcome the limitations of computing capability as well as the data availability of participants. However, FL-MCS still faces the problem of workers' data privacy leakage when diverse malicious attacks (e.g., gradient inference attacks) are launched. To address these problems, some privacy-preserving FL-MCS (PPFL-MCS) schemes are proposed to aggregate local models at a central server. Unfortunately, these schemes are vulnerable to single-point-of-failure and other malicious attacks at the central server. Meanwhile, the workers may drop from the online task due to the erratic communication network in PPFL-MCS schemes, thereby resulting in the failure of the entire model aggregation. To solve these issues, we propose a novel dropout-tolerated and privacy-preserving decentralized FL-MCS scheme, namely, dropout-tolerated decentralized PPFL-MCS based on blockchain. Specifically, we define a novel cryptographic primitive, i.e., ID-based Aggregated Decryptable Broadcast Encryption (AD-IBBE) based on traditional ID-based broadcast encryption. In AD-IBBE, the senders' ciphertexts can only be decrypted by themselves while the aggregated ciphertexts can be decrypted by all receivers in the broadcast group. Then, we design a homomorphic AD-IBBE algorithm, which is formally proved to be semantically secure. We next devise the decentralized PPFL-MCS scheme to guarantee the confidentiality of model gradients against internal and external adversaries. Moreover, we design a dropout-tolerated aggregation method to ensure the robustness of our decentralized PPFL-MCS scheme even if some workers lose connection. Extensive experimental results on different models and data sets demonstrate that the proposed scheme guarantees a close model accuracy to the nondropout case. Even when some workers are offline, our scheme still performs more efficiently than existing schemes in terms of dropout aggregation overhead.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Decentralized; dropout tolerated; federated learning (FL); mobile crowdsourcing; privacy preserving
【发表时间】2024
【收录时间】2024-03-14
【文献类型】 实验仿真
CCF-C
【影响因子】10.238
【主题类别】
区块链应用-实体经济-物联网
【Abstract】Since fog nodes are resource-constrained and imperfectly trusted heterogeneous devices, guaranteeing a real-time response to Internet of Things (IoT) tasks while optimizing system energy consumption remains a significant challenge. To overcome this, we first propose a acrlong DBC-enabled cloud-fog collaborative task scheduling architecture. Second, a task scheduling model is constructed to optimize system energy consumption and task deadline violation time while adhering to the IoT task response time restriction. Finally, two blockchain-enabled task scheduling algorithms are developed: 1) the reputation-based priority-aware algorithm (DB_RP) and 2) the accelerated ant colony system algorithm (DB_AACS). Extensive experiments are conducted to assess the proposed algorithm in four dimensions: 1) task completion rate; 2) system makespan; 3) system energy consumption; and 4) task deadline violation time. The experimental results demonstrate that the proposed algorithm is superior to the existing literature, and the acceleration strategy in DB_AACS is effective.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Accelerated ant colony system; double blockchain (DBC); fog computing; Internet of Things (IoT); task scheduling
【发表时间】2024
【收录时间】2024-03-14
【文献类型】 实验仿真
【Author】 Agarwal, Vidushi Pal, Sujata
CCF-C
【影响因子】10.238
【主题类别】
区块链应用-实体经济-医疗领域
【Abstract】Healthcare is a crucial element of human lives that produces a substantial amount of medical data every year. A major difficulty faced by e-Health systems is the secure storage and sharing of this data without compromising its integrity and privacy. Being a trustless, traceable, and immutable technology, blockchain has the potential to address these issues. In this article, we propose HierChain, a hierarchical block chain-based data storage and sharing system for healthcare. This framework provides a trustless environment that is decentralized and tamper-resistant for efficient management of data. We first introduce an optimization problem aimed at identifying the optimal data storage solution for maximum efficiency. Next, we classify the health data based on its specific features, sensitivity, and storage requirements. This classified data is then stored on three different blockchains (Ethereum, Hyperledger Sawtooth, and MultiChain) according to their optimal attributes. We utilize fog nodes for providing computational services to the resource-constrained Internet of Things (IoT) nodes, enabling us to perform data preprocessing and eliminate redundant information from the collected data. Moreover, we use differential privacy on the fog layer to ensure that sensitive medical data remains protected throughout the analysis process. Finally, we present a comprehensive attack evaluation and performance analysis by implementing our framework on a real-world medical data set. The simulation results indicate that HierChain outperforms existing algorithms in terms of scalability and security of health data without degrading the performance of the IoT network.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain network; data security; healthcare; Internet of Things (IoT); scalability
【发表时间】2024
【收录时间】2024-03-14
【文献类型】 实验仿真
CCF-C
【影响因子】10.238
【主题类别】
区块链应用-实体经济-物联网
【Abstract】Security and trust have become the key issues in the Internet of Things (IoT) environment. Characterized by the centralized control and high-energy consumption, the traditional trust management schemes are not suitable for the IoT systems, in which most of the interactions are short-duration, random and maybe one-time, and the terminal devices always have resource constraints. Therefore, this article proposes a distributed and two-layered trust management framework based on blockchain architecture for IoT. The hierarchical architecture of the cloud, the edge, the IoT subgroups, and devices solves the resource limitation problem and improves the privacy protection of the IoT applications. And a novel lightweight Q-learning improved DPoS consensus algorithm named QV-DPoS is proposed to solve the problems of large energy consumption and high complexity of consensus mechanism of blockchain. Ethereum is used to build a blockchain-based IoT prototype system, and some experiments were designed to verify whether the proposed platform can successfully conduct trust management and achieve identity and behavior authentication between the IoT entities. Moreover, the simulation experiments based on NetLogo is also designed to test the performance of the trust and consensus mechanisms. The results of the experiments show that the proposed mechanisms can effectively enhance the credibility of the interactions in the IoT environments, improve the transaction success rate, and reduce energy consumption at least 10% compared with the traditional algorithms.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain; consensus algorithm; low-energy consumption; Q-learning; trust management in Internet of Things (IoT)
【发表时间】2024
【收录时间】2024-03-14
【文献类型】 实验仿真
CCF-C
【影响因子】10.238
【主题类别】
区块链应用-实体经济-社交媒体
【Abstract】As a typical application of mobile crowdsourcing, streaming media has been attracting increasing attention in recent years. However, traditional streaming media platforms, such as Netflix, Disney+, and Hulu, may suffer some problems like inflexible billing modes, lacking sustainability in the incentive mechanisms, and management censorship. These problems may lead to a decrease in user participation rate, which will directly affect the interests of streaming media platforms. To address these issues, we propose a secure, efficient, and flexible streaming media platform framework based on blockchain and well-designed smart contracts. In particular, we design a new billing model based on a pay-as-you-go strategy and a new incentive mechanism with a probabilistic payment technique. To improve the fairness of our incentive model, we introduce a secondary fee refund protocol where a user's second consecutive payment could be refunded, which in turn can attract more users to participate in the platform. Since blockchain has the natural properties of decentralization and transparency, the proposed framework is resistant to censorship and enables the transactions to be publicly auditable. Based on the proposed framework, we have implemented two streaming media platform schemes. Scheme I relies primarily on smart contracts to implement the framework's functionality, while Scheme II moves the main flow of the framework to off-chain channels. As the execution of smart contracts requires transaction fees, Scheme I is more expensive but can provide much more security and accountability as well. Scheme II can execute the transaction process much faster and with only a small transaction fee. Finally, we deployed these two schemes on Ropsten and conduct a series of experiments. The results show the effectiveness and efficiency of the proposed schemes.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain; fairness; probability payment; smart contract; streaming media
【发表时间】2024
【收录时间】2024-03-14
【文献类型】 实验仿真
【Author】 Li, Xinyan Zhao, Huimin Deng, Wu
CCF-C
【影响因子】10.238
【主题类别】
区块链应用-实体经济-航运领域
【Abstract】With the rapid growth of flight operation data, how to alleviate the contradiction between data sharing and privacy protection of civil aviation corporations has become a challenging problem. Therefore, a blockchain-based flight operation data sharing scheme, named BFOD is designed to achieve the privacy protection and secure sharing of flight operation data. In BFOD, physical entities of airlines, airports and air traffic control are divided into data owners, data requesters and authorization institutes according to the business logic. First, the authorization institute grants a hash anonymous identity and different levels of access right for each civil aviation corporation. When the data are accessed, a hash anonymous identity is designed to verify the access right of the data requester, which protects identity privacy. Then, zero-knowledge succinct noninteractive argument of knowledge (zk-SNARKs) is employed to verify whether the flight operation data meets the specific requirements raised by the data requester without disclosing data privacy. Finally, a proxy re-encryption is used to improve the sharing efficiency of flight operation data. In addition, a grouped practical Byzantine fault tolerant (PBFT) algorithm is proposed to reduce consensus latency. The theoretical analysis and experimental results show that the consensus latency of the grouped PBFT algorithm reduces 91.4% under the number of consensus node N=100, and the BFOD meets data confidentiality, availability and privacy protection, which is feasible and efficient.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain; data security; flight operation data sharing; practical Byzantine fault tolerant (PBFT); privacy protection; smart contract
【发表时间】2024
【收录时间】2024-03-14
【文献类型】 实验仿真
CCF-C
【影响因子】10.238
【主题类别】
区块链应用-实体经济-工业领域
区块链技术-协同技术-物联网
【Abstract】Blockchain-based Industrial Internet of Things (IIoT) integrates the blockchain technology into the traditional IIoT infrastructure to provide secure and collaborative services. In IIoT, the traffic is usually encrypted using a cipher suite (SSL/TLS) for secure communication, which makes it hard for middleboxes (MBs) to detect malicious activity in the traffic. To address this problem, secure MBs that directly perform encrypted traffic inspection have been presented. Recently, a new privacy preserving deep packet inspection (DPI) system on MB for IoT scenarios was proposed, but it suffered from the following two limitations: 1) no support for fast token detection and 2) no support for tracing abnormal sources. To address the two limitations, we propose BTDPI, a privacy-preserving traceable DPI system that efficiently performs inspection over encrypted traffic in blockchain-based IIoT. Technically, we adopt a two-layer filter architecture to improve the efficiency of detection and moreover introduce a new online-offline certificateless aggregate signature with smart contract to design an identity traceability mechanism. The experiment result shows that BTDPI runs 26.7x faster for token detection with 3000 tokens and 3000 rules than the state-of-the-art work.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain; encrypted traffic inspection; Industrial Internet of Things (IIoT)
【发表时间】2024
【收录时间】2024-03-14
【文献类型】 实验仿真
CCF-C
【影响因子】10.238
【主题类别】
区块链应用-实体经济-工业互联网
【Abstract】In Industrial Internet, mutual authentication between enterprises is a prerequisite for establishing reliable upstream and downstream relationships. Existing authentication methods suffer from complicated certificate management and key escrow problems. Moreover, many authentication mechanisms cannot resist common security attacks and have high computational overhead and communication costs. Therefore, this article proposes a blockchain-based certificate-free cross-domain authentication mechanism for Industrial Internet. By establishing an Ethereum consortium blockchain as the trusted cornerstone among different regions, industrial enterprises in each region generate the user's private key with the key generation center in the region, thus avoiding the key escrow problem. This consortium blockchain adopts the Proof-of-Authority consensus mechanism for scalability and throughput. Industrial enterprises in different regions invoke smart contracts and query other industrial enterprises for mutual authentication and key negotiation. SVO logic proves the proposed scheme achieves the intended authentication goal, and the automated formal verification tool Scyther proves the scheme's security. In addition, compared with seven related schemes in the last three years, the experimental results show that the proposed scheme has low communication overhead and computational cost in the authentication key negotiation phase. The experiments on the Ethereum consortium blockchain built by Raspberry Pi prove the effectiveness of the proposed scheme. Finally, the comparative analysis of common security properties proves the reliability of the scheme.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Authentication; blockchain; certificate-free; Industrial Internet
【发表时间】2024
【收录时间】2024-03-14
【文献类型】 实验仿真
CCF-C
【影响因子】10.238
【主题类别】
--
【Abstract】Mobile crowdsensing (MC), an excellent solution to large-scale spatiotemporal data sensing problems, has recently received lots of attention from both industry and academia. In the MC system, any requester can acquire the sensing data for his points of interest (PoIs) by offering some payments to attract a group of mobile users capable of completing these PoI-related sensing tasks. However, the current MC work neglected three vital factors, more or less. First, they assume that these distributed users are mutually independent in MC, ignoring the social effects. Actually, the sensing data collected by one user may be corroborated by others' sensing data, so-called information corroboration. Second, all rational and selfish users are inclined to gather to perform these tasks due to information corroboration. Meanwhile, they may be strategic about their participation levels to maximize profits. However, more similar sensing data will undoubtedly lower the information value, so any user has a tradeoff between gather and scatter. Third, although mobile users can obtain some payments, privacy issues may still prevent them from participating in MC. In this article, we propose a secure blockchain-assisted socially-aware MC framework by adopting the smart contract technique of Ethereum. For this framework, we further devise a two-stage Stackelberg game model to assist the requester (i.e., the leader in the game) in properly pricing each PoI-related sensing task, so that mobile users (i.e., the followers in the game) can exactly select their tasks and determine their participation levels. To analyze the game equilibrium, we extend the traditional Hessian matrix method to a multidimension case involving the multiuser multitask hyperspace setting. We conduct extensive experiments to prove the equilibrium and effectiveness of the proposed solution. We also implement a prototype and deploy the smart contract to an official Ethereum test network to demonstrate the practicability of the proposed framework.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain-based crowdsensing; game theory; information corroboration; privacy preservation; social effects
【发表时间】2024
【收录时间】2024-03-14
【文献类型】
【影响因子】8.464
【主题类别】
区块链治理-市场治理-技术采用
【Abstract】Although the significance of sustainable supply chain finance (SSCF) has been recognized, our knowledge of its antecedents remains limited. Drawing upon organizational information processing theory (OIPT), our research explores how blockchain technology adoption influences SSCF via supply chain visibility, and the moderating role of supply chain ethical leadership. We examine the proposed relationships employing survey data from 317 manufacturers in China. The findings indicate that blockchain technology adoption positively affects SSCF. Supply visibility and demand visibility partially mediate the influence of blockchain technology adoption on SSCF. Furthermore, supply chain ethical leadership undermines the positive influence of blockchain technology adoption on demand visibility. This research enriches our understanding of the antecedents affecting SSCF by offering insights from the perspective of OIPT.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】blockchain technology adoption; supply chain ethical leadership; supply chain visibility; sustainable supply chain finance
【发表时间】2024
【收录时间】2024-03-14
【文献类型】 实证数据
【DOI】 10.1002/csr.2759
【Author】 Samadhiya, Ashutosh Kumar, Anil Garza-Reyes, Jose Arturo Luthra, Sunil del Olmo Garcia, Francisco
CCF-B
【影响因子】8.233
【主题类别】
区块链应用-实体经济-医疗领域
【Abstract】The Internet of Medical Things (IoMTs) has rapidly gained popularity recently, and the need for self-health assessment and the resulting reduction in treatment waiting periods have sped up the usage of IoMTs. Unfortunately, the growing usage of IoMTs has also brought up issues that have unintended effects, including a lack of data management, an unsafe network environment, privacy and security concerns. To address the problems with IoMT applications, distributed ledger technology, which forms the basis of blockchain technology (BCT), has emerged as a practical solution. The utility of BCT to support IoMT-based settings has been demonstrated by academic research. However, no analysis of the literature has been performed to comprehend BCT performance in IoMT scenarios. Therefore, the present study offers a thorough literature review of 182 studies on the use of BCT in an IoMT environment, drawn from 70 pioneering journals included in the WoS database. It also outlines recommendations for future research areas. This study adds to the body of literature in three main ways using a mix of bibliographic and content analysis. It starts out by outlining the structure of how BCT works in an IoMT setting. Secondly, it provides a roadmap that takes into account the factors that might aid in BCT proliferation in IoMT situations. Thirdly, the paper outlines the prerequisites for BCT's effective adoption and use in an IoMT environment. The implications of the recognized clusters and the factors influencing the properties and outcomes of BCT are covered in the article's conclusion. This is the first effort to investigate BCT's function within the context of the IoMT environment; this has become crucial since BCT has developed popularity in IoMT contexts. The article highlights many aspects that may help to improve comprehension of this important issue by utilizing the provided outline as a guide and identifying major knowledge gaps.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain technology; Internet of medical things; IoT in healthcare; Healthcare sector
【发表时间】2024
【收录时间】2024-03-14
【文献类型】 综述
【影响因子】7.772
【主题类别】
--
【Abstract】Background & aims: The gamblification of UK football has resulted in a proliferation of in-game marketing associated with gambling and gambling-like products such as cryptocurrencies and financial trading apps. The English Premier League (EPL) has in response banned gambling logos on shirt-fronts from 2026 onward. This ban does not affect other types of marketing for gambling (e.g., sleeves and pitch-side hoardings), nor gambling-like products. This study therefore aimed to assess the ban's implied overall reduction of different types of marketing exposure. Methods: We performed a frequency analysis of logos associated with gambling, cryptocurrency, and financial trading across 10 broadcasts from the 2022/23 EPL season. For each relevant logo, we coded: the marketed product, associated brand, number of individual logos, logo location, logo duration, and whether harm-reduction content was present. Results: There were 20,941 relevant logos across the 10 broadcasts, of which 13,427 (64.1%) were for gambling only, 2,236 (10.7%) were for both gambling and cryptocurrency, 2,014 (9.6%) were for cryptocurrency only, 2,068 (9.9%) were for both cryptocurrency and financial trading, and 1,196 (5.7%) were for financial trading only. There were 1,075 shirt-front gamblingassociated logos, representing 6.9% of all gambling-associated logos, and 5.1% of all logos combined. Pitch-side hoardings were the most frequent marketing location (52.3%), and 3.4% of logos contained harm-reduction content. Discussion & Conclusions: Brand logos associated with gambling, cryptocurrency, and financial trading are common within EPL broadcasts. Approximately 1 in 20 gambling and gambling-like logos are subject to the EPL's voluntary ban on shirt-front gambling sponsorship.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】gambling; sports; marketing; cryptocurrency; trading; sponsorship
【发表时间】2023
【收录时间】2024-03-14
【文献类型】
【DOI】 10.1556/2006.2023.00066
【Author】 Xie, Qi Ding, Zixuan Tang, Wen He, Debiao Tan, Xiao
【影响因子】6.239
【主题类别】
--
【Abstract】As one of the most valuable vehicle-based Internet of Things (IoT) applications, Vehicular Ad-hoc Networks (VANETs) have received extensive attention since it was proposed. In order to ensure the safety of VANETs and improve the communication efficiency between moving vehicles and different Roadside Units (RSUs), some handover authentication protocols for VANETs have been proposed. However, the existing protocols have some problems such as excessive computation overhead, untraceable malicious messages, and the inability to resist RSU captured attacks. To solve the above problems, we propose a blockchain-based protocol to achieve Vehicle to Infrastructure (V2I) authentication, V2I handover authentication, and Vehicle to Vehicle (V2V) broadcasting authentication. The advantages of our protocol are: (1) It achieves lightweight V2I handover authentication and V2V broadcast authentication, dynamic anonymity strategy and embedding strategy of pseudo-identity and vehicle feature are used to guarantee anonymity and traceability simultaneously; (2) The announcement can be broadcasted verifiably without the help of transportation infrastructure (e.g., RSU) or the Trusted Authority (TA); and (3) The Physically Unclonable Functions (PUF) technology is used to resist RSU captured attacks. We use formal security proof under random oracle model to prove the security of the proposed protocol. Compared with related V2I handover authentication protocols, our protocol can resist RSU captured attacks and other various known attacks. The sum of first and handover authentication efficiency of our protocol is 37.93% higher than the previous most effective protocol, while maintaining the same level of communication and storage costs.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Handover authentication; VANETs; blockchain; broadcast authentication; vehicle to infrastructure; vehicle to vehicle
【发表时间】2023
【收录时间】2024-03-14
【文献类型】
【DOI】 10.1109/TVT.2023.3289175
【影响因子】6.239
【主题类别】
--
【Abstract】Communication technologies have grown fast over the previous decade, resulting in substantial breakthroughs in Intelligent Transportation Systems (ITS) applications and services. ITS is distinguished by high node mobility and instability, making confidentiality, security, and privacy a difficult challenge to address in its implementation. Even though several researchers have suggested authenticated key agreement protocols for secure transmission, significant flaws can still be observed. Moreover, this research presents a unique blockchain-based group key agreement protocol to address these complex challenges. The proposed protocol can minimize processing latency, deployment costs, and queuing delay by utilizing RSU as a semi-trusted entity. Moreover, blockchain characteristics accomplish inter-regional authentication. We show that the proposed protocol is secure against known security threats, which we proved formally. In addition, the performance analysis demonstrates that the proposed protocol has considerably less communication and computational overhead than other existing protocols. Furthermore, the simulations are performed on NS-3 to demonstrate the practical aspects of the proposed protocol.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Intelligent transportation systems (ITS); blockchain; authentication; security; privacy
【发表时间】2023
【收录时间】2024-03-14
【文献类型】
【DOI】 10.1109/TVT.2023.3299705
【Author】 Esparcia, Carlos Lopez, Raquel
【影响因子】6.143
【主题类别】
--
【Abstract】This study identifies and assesses the diversification benefits of including large-cap and highly liquid cryptocurrencies into portfolios comprised of major fiat currencies quoted against the USD. We employ hourly data over the period from January 01, 2019 to May 31, 2021. We identify hedging properties across crypto-currency pairs based on intraday volatility fitting through multiplicative component Generalized Autoregressive Conditional Heteroscedasticity (mcGARCH) models and the estimation of Dynamic Conditional Correlation (DCC) Skew Student Copulas. We find that the optimal diversified crypto-Forex portfolio outperforms the actively and passively managed Forex portfolios based on both total risk and downside and upside risk performance measures. Outperformance is robust to different market conditions and optimization methods.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Diversification; Cryptocurrencies; Forex; Intraday frequency; McGARCH; Skew Student Copula
【发表时间】2024
【收录时间】2024-03-14
【文献类型】
【Author】 Yang, Han Fang, Junyuan Wu, Jiajing Zheng, Zibin
【影响因子】5.877
【主题类别】
区块链治理-技术治理-实体分类
【Abstract】In recent years, the cryptocurrency market has been booming with an ever-increasing market capitalization. However, due to the anonymity of blockchain technology, this market has become a hotbed of financial crimes. As the largest blockchain platform supporting smart contracts, financial crimes including scams and hacking frequently happen on Ethereum and have caused serious losses. Therefore, it is necessary to classify Ethereum accounts in order to better identify those involved in illegal transactions and analyze the behavior patterns of different classes of accounts. In this paper, we construct an Ethereum transaction network based on transaction records and find that this network is with heterophily. However, most of the current work on account classification ignores the role of this heterophily information. We first figure out that the heterophily information of the neighborhood may also be beneficial for the final predictions. Based on this, we propose a new graph neural network (GNN) model, named BPA-GNN, which incorporates both homophilic and heterophilic information into the neighborhood aggregations. Specifically, BPA-GNN consists of three main modules including bi-path neighbor sampling, separated neighborhood aggregation, and attention-based node representation learning. Comprehensive experiments on a real Ethereum transaction dataset demonstrate the state-of-the-art performance of BPA-GNN, showing that the model can effectively extract and utilize neighborhood information to improve the distinguishability of node representations. As an effective solution for Ethereum account de-anonymization, BPA-GNN can help identify illegal activities and promote the healthy development of the Ethereum ecosystem.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Ethereum; de-anonymization; graph neural network; heterophily
【发表时间】2023
【收录时间】2024-03-14
【文献类型】 实验仿真
【Author】 Chen, Weili Tang, Mingdong Zheng, Zibin
【影响因子】5.877
【主题类别】
区块链治理-市场治理-代币网络
【Abstract】The birth of Bitcoin created the era of cryptocurrency. At present, thousands of tokens are being published on blockchains, led by the popularity of Initial Coin Offerings (ICOs), launched by startups. Many have studied the token ecosystem from the perspective of economics. However, little is known about the characteristics of participants and tokens in the ecosystem. In order to fill this gap, and considering that more than 80 of ICOs are launched based on Ethereum, this article conducts a systematic survey of the Ethereum ERC20 and ERC721 token ecosystem to characterize the creators and holders of the tokens and transfer activities. By downloading the entire blockchain, and analyzing transaction records and event logs, we constructed three complex network graphs, a token creator graph, a token holder graph, and a token transfer graph. By analyzing these graphs, we are able to obtain many observations including token activeness distribution, token holder distribution, token relationship, and characteristics of token creation and decentralized exchanges. In addition, we propose an algorithm to reveal potential relationships between tokens and other addresses on Ethereum. The example shows that the proposed algorithm can effectively discover complex relationships between many accounts and find entities of addresses.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchains; Ecosystems; Smart contracts; Standards; Circuits and systems; Decentralized applications; Codes; Blockchain; ethereum; ERC20 token; ERC721 token; graph analysis
【发表时间】2023
【收录时间】2024-03-14
【文献类型】 实证数据
【Author】 He, Xiangzhou
【影响因子】5.100
【主题类别】
--
【Abstract】
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】
【发表时间】2023
【收录时间】2024-03-14
【文献类型】
【Author】 He, Xiangzhou
【影响因子】5.100
【主题类别】
--
【Abstract】
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】
【发表时间】2023
【收录时间】2024-03-14
【文献类型】
CCF-B
【影响因子】4.157
【主题类别】
区块链治理-技术治理-交易模式识别
【Abstract】Cryptocurrency has been subject to illicit activities probably more often than traditional financial assets due to the pseudo-anonymous nature of its transacting entities. An ideal detection model is expected to achieve all three critical properties of early detection, good interpretability, and versatility for various illicit activities. However, existing solutions cannotmeet all these requirements, as most of them heavily rely on deep learning without interpretability and are only available for retrospective analysis of a specific illicit type. To tackle all these challenges, we propose Intention Monitor for early malice detection in Bitcoin, where the on-chain record data for a certain address are much scarcer than other cryptocurrency platforms. We first define asset transfer paths with the Decision Tree based feature Selection and Complement to build different feature sets for different malice types. Then, the Status/Action Proposal module and the Intention-VAE module generate the status, action, intent-snippet, and hidden intent-snippet embedding. With all these modules, our model is highly interpretable and can detect various illegal activities. Moreover, well-designed loss functions further enhance the prediction speed and the model's interpretability. Extensive experiments on three real-world datasets demonstrate that our proposed algorithm outperforms the state-of-the-art methods. Furthermore, additional case studies justify that our model not only explains existing illicit patterns but also can find new suspicious characters.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Cybercrime; malicious address; early detection; intention discovery; cryptocurrency; Bitcoin
【发表时间】2024
【收录时间】2024-03-14
【文献类型】 实验仿真
【DOI】 10.1145/3626102
【Author】 Xu, Dawei Gao, Jiaqi Zhu, Liehuang Gao, Feng Zhao, Jian
【影响因子】3.752
【主题类别】
区块链治理-技术治理-去中心化衡量
【Abstract】Bitcoin is a decentralized digital cryptocurrency. Its network is a Peer-to-peer(P2P) network consisting of distributed nodes. Some of these nodes are always online and in this article are called Bitcoin backbone nodes. They have a significant impact on the stability and security of the Bitcoin network, so it is meaningful to analyze and discuss them. In this paper, we first continuously collect information about Bitcoin nodes from July 2021 through June 2022 (which is the longest duration of data collection to date). In total, we collect information on 127,613 Bitcoin nodes. At the same time, we conclude that the fluctuation of Bitcoin nodes is directly related to the fluctuation of onion network nodes. Further, we filtered 2694 Bitcoin backbone nodes based on our algorithm. By analyzing the backbone nodes' attributes such as geographic distribution, client version, operator, node function, and abnormal port number, it is demonstrated that these nodes are centralized and play an important role in the Bitcoin network. Based on this, three unsupervised machine learning algorithms are selected to cluster multiple attributes of backbone nodes in a more scientific way. In this paper, the whole process from data collection to cluster analysis is completed and the best results are obtained by comparison. The experiments proved the existence of centralization of Bitcoin backbone nodes and obtained the number of nodes within each cluster. Finally, cluster nodes are de-anonymized based on the optimal results. Through our experiments, we obtain organizational information about the deployers of 103 nodes, linking the Bitcoin backbone nodes to the real world, thus accurately demonstrating the existence of Bitcoin centrality.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】
【发表时间】2023
【收录时间】2024-03-14
【文献类型】 实证数据
【影响因子】3.476
【主题类别】
--
【Abstract】With the increasing investments in on-the-move electric vehicle (EV) charging solutions and wireless charging lanes (WCLs), coordination of the energy requirements of mobile EVs becomes essential to ensure load balancing while maximizing demand coverage. This necessitates the development of online and mobility-aware algorithms for assigning EV-to-charging lanes. In this work, a decentralized, blockchain-based EV assignment and energy allocation system is presented. The objective of system is to coordinate the charging requirements of mobile EVs among the available WCLs within a network of EV chargers in an Internet of Electric Vehicles (IoEVs). This blockchain-based system offers higher security, transparency and immutability over traditional rule-based coordination schemes. It also offers an integrated end-to-end framework that handles user registration, authentication, lane activation and energy reporting. This is in addition to its main functionality of establishing a real-time and load-balanced EV-to-WCL assignment process that addresses the EV energy requirements within constraints of traveling distance and remaining EV energy. The proposed system is tested on the Ethereum blockchain and its security and transparency are both validated accordingly.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchains; decentralized coordination; electric vehicles; energy management; smart contracts
【发表时间】2024
【收录时间】2024-03-14
【文献类型】
【影响因子】3.022
【主题类别】
--
【Abstract】One of the most important sectors of the world economy is the mining and metals sector. Although, many operational and commercial procedures continue to be ineffective and out-of-date, which results in crucial data omissions, security flaws, and sometimes corruption. Given that the mining industry wants to increase the emphasis on ethical and open mining practices, the industry has been looking for ways to incorporate these practices. It is envisioned that such practices will contribute to the modernisation of supply chains in addition to helping to reduce risks related to sustainability and reputation. The application of blockchain technology in the minerals industry capable of tracking natural resources has been discussed in this study, giving a much-needed layer of transparency of this technology. However, there are a lot of difficulties and problems that come up when thinking about blockchain technology; if it is to advance as an industry standard, stakeholders will need to evaluate the usefulness and scalability of the technology. While blockchain technology can be applied to a wide range of areas in the minerals industry, this study shines more light on the application of this technology to conflict minerals tracking, mineral resources reporting cheating scandals, rock mechanics designs and monitoring strategy, blasting designs and operation, mine ventilation designs and applications, mining machinery maintenance and management, and mining surveying. The study reveals that blockchain technology is starting to be seriously evaluated and used by a variety of stakeholders, even though broad acceptance has not yet been attained.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain; data integrity, transparency; mineral industry; supply chain; digital technology
【发表时间】2024
【收录时间】2024-03-14
【文献类型】
【影响因子】2.902
【主题类别】
--
【Abstract】The primary objective of implementing secure smart power networks is to reduce the risk of data privacy breaches, including adversarial data poisoning and inference attacks. This study presents a novel approach, namely the Blockchain-based Power System Security Model (BC-PSSM), to augment security measures within power systems. The proposed method utilizes blockchain technology to enhance the security of data storage and verification and the mechanisms for data signing and authentication. It employs decentralized detection to improve the effectiveness and precision of intrusion detection with a Support Vector Machine (SVM). The BC-PSSM method exhibits promising outcomes in multiple facets of power system security detection, as evidenced by thorough simulations and evaluations. The simulation results demonstrate a significant decrease in computational burden and energy consumption by maintaining a high energy output level. The BC-PSSM algorithm performs remarkably in detection and false positive rates, resulting in heightened security and enhanced efficiency. The results also illustrate the positive impact of BC-PSSM in enhancing the security of power systems, offering robust protection against cybersecurity threats. BC-PSSM aims to enhance the security of power systems, thereby promoting a more robust and dependable energy infrastructure. This initiative plays a crucial role in protecting essential assets and mitigating the potential threats posed by cyber-attacks. The BC-PSSM algorithm enhanced efficiency to 92.15% and boosted overall security to 96.34%. It achieved this by achieving an amazing identification rate of 96.75% and an extraordinarily low false positive rate of 1.82%.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Power systems; security; blockchain; intrusion detection; support vector machine
【发表时间】2024
【收录时间】2024-03-14
【文献类型】
【Author】 Pantin, Lynnise Phillips
【影响因子】2.438
【主题类别】
--
【Abstract】As a community, Black people consistently face barriers to full participation in traditional financial markets. The decentralized nature of the cryptocurrency market is attractive to a community that has been historically and systematically excluded from the traditional financial markets by both private and public actors. As new entrants to any type of financial market, Black people have increasingly embraced blockchain technology and cryptocurrency as a path towards the wealth-building opportunities and financial freedom they have been denied in traditional markets. This Article analyzes whether the technology's decentralized system will lead to financial inclusion or increased financial exclusion. Without reconciling the racially discriminatory history or effects of the current central financial system, the innovative decentralized appeal to Black people will do little to overcome economic inequity. It may be possible that some cryptocurrencies can be tools for financial inclusion by improving economic outcomes and building wealth outside of traditional financial institutions, but without an intervention, a decentralized system will not necessarily lead to decentralized wealth.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】
【发表时间】2023
【收录时间】2024-03-14
【文献类型】
【作者】 林炼升; 郑焕钦; 苏申; 雷凯; 陈晓丰; 田志宏
【作者单位】广州大学网络空间安全学院;数字化学习技术集成与应用教育部工程研究中心(国家开放大学);深圳市内容中心网络与区块链重点实验室(北京大学);区块链与数据安全全国重点实验室(浙江大学);杭州趣链科技有限公司标准化与课题管理部;
【文献来源】计算机研究与发展
【复合影响因子】3.363
【综合影响因子】2.388
【主题类别】
区块链治理-技术治理-区块链安全
【摘要】价格操控攻击通过改变去中心化金融项目的数字资产存量操控资产链上价格,从而攻击其清算机制以实现不当牟利,是目前去中心化金融生态最主要的安全威胁之一. 目前主流的安全防御手段是通过预言机获取不易被操控的链下价格,但频繁将链下数据更新上链会导致预言机的维护成本高昂,因而无法满足工业界需求. 为解决上述问题,提出一种针对价格操控攻击的防御机制,通过链下价格来指导链上价格操控行为的识别,以合约代理的形式实现对价格操纵交易的拦截,并通过低频的价格获取降低交易提交的频率和链下数据更新上链的成本,进而实现价格操控攻击的防御成本和识别精度之间的折中. 实验表明,该方法在降低预言机30%以上运维成本的前提下,对价格操纵攻击的防御率达到97.5%.
【关键词】区块链;;智能合约;;去中心化金融;;价格操纵攻击;;预言机喂价
【文献类型】 实验仿真
【发表时间】2024-03-14
【作者】 方鹏; 赵凡; 王保全; 王轶; 蒋同海
【作者单位】中国科学院新疆理化技术研究所;中国科学院大学计算机科学与技术学院;中国科学院新疆理化技术研究所新疆民族语音语言信息处理实验室;
【文献来源】计算机应用
【复合影响因子】2.197
【综合影响因子】1.475
【主题类别】
区块链应用-虚拟经济-Web3
【摘要】区块链3.0是区块链技术发展的第三阶段,也是构建价值互联网的内核,其在分片、跨链以及隐私保护等方面的创新为其赋予了广泛的应用场景和研究价值,受到学术界和产业界相关人士的高度重视。针对区块链3.0的发展、技术与应用,文章调研了近五年内国内外关于区块链3.0的相关文献,进行了综述。首先,介绍了区块链的基本理论和技术特点,为深入了解区块链的研究进展奠定了基础。随后,根据区块链技术随时间变化的演进趋势,阐述了区块链3.0的发展历程和各个关键的发展时间节点,并解释了为什么以分片和侧链技术为基准点划分区块链不同的发展阶段。接着,详细分析了区块链3.0关键技术的研究现状,对其在物联网、医疗、农业等六大领域内的典型应用进行了概述归纳。最后,总结了区块链3.0在发展过程中所面临的关键性挑战和未来发展机遇。
【关键词】区块链3.0;;分片;;侧链;;跨链;;隐私保护;;智能合约
【文献类型】 综述
【发表时间】2024-03-14
【作者】 陈廷伟; 张嘉诚; 王俊陆
【作者单位】辽宁大学信息学院;
【文献来源】计算机应用
【复合影响因子】2.197
【综合影响因子】1.475
【主题类别】
--
【摘要】针对现有联邦学习模型中存在的本地设备模型梯度泄露、中心化服务器设备可随意退出、全局模型无法抵御恶意用户攻击等问题,提出面向联邦学习的随机验证区块链构建及隐私保护方法。首先,引入可验证哈希函数随机选举区块链领导节点,确保节点出块的公平性;其次,设计了验证节点交叉检测机制防卫恶意节点的攻击;最后,基于差分隐私技术训练区块链节点,根据节点对模型的贡献程度构建激励规则进行节点激励,提高联邦学习模型的训练精度。实验结果表明,所提方法相较于Google FL、LDP-FL等现有联邦学习方法,在提升模型的安全性前提下能够保证良好的精确度,对于恶意节点的投毒攻击能够达到80%的精确度,对比Google FL提升了61个百分点,梯度匹配损失比Google FL提升了14个百分点。可见,所提方法具有更好的安全性和鲁棒性。
【关键词】联邦学习;;区块链;;差分隐私;;激励机制;;异常检测
【文献类型】
【发表时间】2024-03-14
【作者】 史佩昌; 王怀民; 傅翔
【作者单位】国防科技大学计算机学院并行与分布处理重点实验室;国防科技大学计算机学院复杂系统软件工程湖南省重点实验室;
【文献来源】电子学报
【复合影响因子】1.804
【综合影响因子】1.355
【主题类别】
区块链技术-协同技术-云计算
【摘要】云际计算是支持公有云、私有云、边缘云和微云等异源异质云服务以自主对等方式纵横协作共赢的新型计算模式,可为独立云服务实体间行为交互、信任构建和贡献度量等提供防篡改、可追溯能力支持,进而最大限度削弱阻碍不同利益攸关者协作的不确定性因素.提升云际协作意愿和效率需要基于何种机理进行何种机制创新,是云际计算成长演化中需要进一步阐述的新问题.本文首先以基于“数字空间证据”构建或增强信任关系为设计原则,提出了基于区块链的云际分布记账软件定义模型,并系统阐述了分布记账支撑云际服务独立性、可审计性以及释放云际协作潜能的内在机理;其次,面向云际复杂交互行为,深化并固化了云际分布记账运行逻辑流程及关键环节的设计,避免其在错综复杂要素综合作用下呈现不确定冲突和矛盾;再次,针对数据要素流通及复杂异步交互场景,细化并优化了云际分布记账合约逻辑模型;最后,论述了以分布共识、智能合约等为代表的云际分布记账核心技术及相应指标的现状,并对关键技术的目标属性体系、前瞻性挑战等进行了展望.
【关键词】云际计算;;区块链;;分布记账;;分布共识;;智能合约
【文献类型】 综述
【发表时间】2024-03-14
【作者】 刘炜; 刘宇昭; 唐琮轲; 王媛媛; 佘维; 田钊
【作者单位】郑州大学网络空间安全学院;河南省网络密码技术重点实验室(信息工程大学);郑州市区块链与数据智能重点实验室(郑州大学);国网许昌供电公司;嵩山实验室;
【文献来源】计算机科学
【复合影响因子】1.722
【综合影响因子】1.149
【主题类别】
区块链应用-实体经济-数据管理
【摘要】零散、孤立的海量数据形成“数据孤岛”使得数据无法交互和连接,如何在保护原始数据隐私的前提下安全有效地共享数据中的知识信息已成为热点研究问题。基于以上内容,提出了一种基于区块链的联邦蒸馏数据共享模型(BFDS)。区别于中心化架构,采用区块链联合多参与方组建教师网络,实现分布式协同工作;通过交换蒸馏输出的方式,传递数据中的知识信息,联合训练轻量化模型;提出了一种多权重节点可信评估算法,调用智能合约分配权重并生成可溯源全局软标签,降低因参与方质量差异而产生的负向影响。实验结果表明,BFDS模型能联合多参与方安全可信共享数据知识,协同蒸馏训练模型,降低了模型的部署成本;所提出的多权重节点评估算法能有效减小低质量节点的负向影响,提高了全局软标签的质量与安全性。
【关键词】区块链;;知识蒸馏;;数据共享;;智能合约
【文献类型】 实验仿真
【发表时间】2024-03-14
【作者】 申自浩; 刘梦珂; 王辉; 刘沛骞; 刘琨
【作者单位】河南理工大学计算机科学与技术学院;河南理工大学软件学院;
【文献来源】浙江大学学报(工学版)
【复合影响因子】1.610
【综合影响因子】1.048
【主题类别】
--
【摘要】针对移动社交网络位置共享服务存在的隐私泄漏问题,提出基于区块链的用户自定义位置共享(BUDLS)方案.基于区块链实现位置信息分布式管理,防止中央服务器收集大量用户隐私,增强用户位置信息的可控性.设计基于公钥数字签名和同态加密相结合的加密机制,防止位置信息被攻击者非法获取.定义灵活的访问控制策略,根据用户需要提供可靠的服务.安全分析验证结果显示,BUDLS方案满足隐私安全目标.仿真实验结果表明,相比传统方案,BUDLS方案降低了时间成本,提高了位置查询的准确性,有效保护了移动社交网络平台用户的位置隐私.
【关键词】移动社交网络;;区块链;;位置共享;;位置隐私;;同态加密
【文献类型】
【发表时间】2024-03-14
【作者】 杨一珉; 孟雪
【作者单位】赛迪智库网络安全研究所;
【文献来源】软件和集成电路
【复合影响因子】
【综合影响因子】
【主题类别】
区块链应用-虚拟经济-Web3
【摘要】<正>目前,Web3.0尚处于发展初期,概念泛化、炒作现象严重,极易引发各类社会风险。为此,我国亟须加快开展顶层设计与统筹谋划,保障Web3.0健康、有序发展。近年来,得益于互联网的快速发展,我们享受到了平台带来的便利,但平台发展的弊端也逐渐显现,出现了垄断资源、个人隐私泄露、利益分配失衡、大数据杀熟等一系列问题。因此,全球掀起了一股互联网革命浪潮,We b3.0被视为能够有效解决这些问题的下一代互联网。从微观上看,Web3.0是集智能合约、分布式协议等技术为一体的去中心化、开放、安全和可信的新型网络体系,旨在帮助用户掌握数据的自主权、实现用户身份的去中心化管理、提升平台的互操作性、提供更加智能和个性化的服务体验。从宏观上看,
【关键词】
【文献类型】 综述
【发表时间】2024-03-14
【作者】 张江霄; 党莹; 高峰
【作者单位】邢台学院数学与信息技术学院;邢台医学高等专科学校公共教学部;
【文献来源】邢台学院学报
【复合影响因子】
【综合影响因子】
【主题类别】
--
【摘要】针对公共消防应急服务存在不可预见性、及时性、服务透明度和信任的问题,把区块链技术应用到公共消防应急服务中,以公平地实时处理公共消防应急服务请求,该系统包括三层:基础设施层、边缘层和区块链层。使用边缘计算服务器,以提高本地数据处理速度和数据存储。探讨了智能城市不同分区下智能家庭的基于区块链的物联网智能城市安全可信公共消防应急服务模型。实验结果表明,所提出的系统模型能够有效地将公共消防应急服务请求调度到合适的公共消防应急服务部门,并最大限度地减少到智能消防传感器位置的延迟。
【关键词】公共消防应急服务;;区块链;;物联网;;智慧城市;;突发事件
【文献类型】
【发表时间】2024-03-14
【作者】 李三希; 张明圣; 刘希
【作者单位】中国人民大学经济学院;中国人民大学数字经济研究中心;
【文献来源】产业经济评论
【复合影响因子】
【综合影响因子】
【主题类别】
--
【摘要】区块链具有去中心化、可追溯性两大核心特征和不可篡改、去信任化、信息透明、可匿名性四大衍生特征,并进一步引致出能够作用于经济领域的五大经济特性:减少信息不对称、降低组织的集中度、提供可置信的承诺、生成新的价值标的、减少交易成本。区块链是否能与产业良好融合是其能否有效发挥上述重要经济特性的一个重要因素。本文通过对中美区块链行业的对比分析发现,中国对于区块链的应用领域态度更为审慎,同时也具有更强的政策导向,主要应用领域为实体经济;而美国虽然对区块链的政策导向不如中国明显,但其在技术、人才培养等方面都具有显著优势,区块链应用规模在全球范围内处于绝对领先地位。总的来看,中国区块链产业发展面临审慎的金融政策与区块链特征不匹配、结合区块链与实体经济的配套设施相对缺失、区块链适用领域有待细化、区块链技术有待提升等问题。为进一步推动中国区块链产业发展,需要推动央行数字货币发展、加强数字化基础设施建设、针对性推动区块链行业发展、加强区块链技术基础研究。
【关键词】区块链;;中美比较;;数字经济
【文献类型】
【发表时间】2024-03-14
【作者】 徐磊; 任礼姝; 黄东亚
【作者单位】盐城师范学院体育学院;盐城师范学院文学院;南京铁道职业技术学院体育教学部;
【文献来源】河北体育学院学报
【复合影响因子】
【综合影响因子】
【主题类别】
--
【摘要】5G时代下体育网络情绪传播业态发生巨大变革,为其治理带来了新的挑战。当前,体育网络情绪传播主体和范围不断拓展、传播速度不断加快、传播不确性不断增加,使体育网络情绪治理难度不断提高。区块链技术凭借其去中心化、难以篡改、公开透明等优势,不仅可以有效提升体育网络情绪治理的精准性,而且可以有效提升治理效率。基于区块链技术从不同层面构建体育网络情绪治理机制,在宏观层面构建体育网络情绪信息联合治理平台,在中观层面建立基于大数据的体育网络情绪监测体系,在微观层面自媒体及其服务商实时跟踪处理体育网络情绪,以加强体育舆论引导,促进体育事业健康发展。
【关键词】5G;;区块链;;体育网络情绪;;体育热点事件;;舆情治理
【文献类型】
【发表时间】2024-03-14