【影响因子】10.047
【主题类别】
区块链应用-实体经济-物联网
【Abstract】The objective of this study was to identify, assess, and prioritize resolution strategies to address paradoxes associated with the integrated use of artificial intelligence (AI), blockchain, and the Internet of Things (IoT) in logistics for decarbonization. To achieve these objectives, a four-phase mixed-methods approach was employed, involving the identification, prioritization, and verification of resolution strategies for their significance in managing paradoxes. A panel of 10 experts with experience in adopting AI, blockchain, and IoT in logistics participated in the study. The study identified ten key resolution strategies: education & training, coordination & collaboration, government regulations & support, standardized data format and protocol, modular architecture, interoperability standard, process optimization, security auditing, management participation, and man-machine interactions. Using an integrated multicriteria decision-making approach, the study presented compromised rank of these strategies based on their effectiveness in addressing paradoxes. The most significant resolution strategy identified was modular architecture. This was followed by a second compromise solution set of interoperability standards, process optimization, management participation, coordination & collaboration, and man-machine interactions, and a third compromise solution set including education & training, government regulation & support, standardized data format, and security auditing. The derived solutions were then verified by logistics domain experts. This study provided the first empirical investigation of paradox theory related to the adoption of AI, blockchain, and IoT for decarbonization in logistics. Overall, the study enhanced the understanding of competing demands, tensions, and complexities involved in adopting digital technologies for decarbonization using paradox theory.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Artificial intelligence; Blockchain; Internet of things; Decarbonization; Logistics; Paradox theory
【发表时间】2024
【收录时间】2024-08-16
【文献类型】 实证数据
CCF-B
【影响因子】9.551
【主题类别】
区块链应用-实体经济-交通领域
【Abstract】Cloud-assisted intelligent transportation systems depend on cloud computing to provide powerful computing capabilities and big data storage services. As precise intelligent traffic control and dispatch policies are heavily based on real-time traffic information (e.g., unmanned driving test information), any altered data may cause severe consequences. The integrity of outsourced critical traffic control data has been the most concerning security issue. To this end, a lightweight proxy-oriented data integrity checking mechanism has been devised, without incurring substantial certificates management. The mechanism enables a data manager in traffic information control center to delegate the proxy to produce the signatures of encrypted data and outsource them to the cloud server, dramatically alleviating the work intensity of the data manager. By integrating blockchain into the mechanism, it gives assistance to the data manager for validating malicious integrity checking behaviors. The comprehensive security analysis and performance evaluation demonstrate the feasibility of the mechanism in the deployment of cloud-assisted intelligent transportation systems.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Cloud computing; Intelligent transportation systems; Data integrity; Blockchains; Smart contracts; Oils; Intelligent sensors; cloud computing; proxy-oriented integrity checking; blockchain
【发表时间】2024
【收录时间】2024-08-16
【文献类型】 实验仿真
【Author】 He, Xie Hamori, Shigeyuki
【影响因子】8.235
【主题类别】
区块链治理-市场治理-数字货币
【Abstract】This study aims to investigate whether conditional higher moments offer additional and distinct information compared to lower moments in spillover effect analysis, and to examine their relevance for portfolio construction and hedging strategies. We use the autoregressive conditional density (ACD) model to estimate the conditional skewness and kurtosis of nine major cryptocurrency markets. We explore the higher moment spillovers among these markets using the Diebold Yilmaz spillover approach. The results confirm that the magnitude and direction of spillover effects vary across different moments in the cryptocurrency market, each providing unique insights. Additionally, we find that although the spillover effects exhibit variations over different time periods and market conditions, the skewness spillover and kurtosis spillover, which track the transmission of downside (upside) risk and tail risk respectively, demonstrate similarities in their patterns. These variations differ noticeably from the changes observed in volatility spillover, which tracks the transmission of volatility risk. Comparing the minimum connectedness portfolio (MCoP) based on different moment spillovers, we discover that the MCoP derived from higher moment spillovers exhibits superior hedge effectiveness and Sharpe ratios.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Hedging; Investment strategies; Cryptocurrency markets; Higher moments
【发表时间】2024
【收录时间】2024-08-16
【文献类型】 实证数据
【影响因子】8.235
【主题类别】
区块链治理-市场治理-数字货币
【Abstract】This paper presents a comprehensive multiscale analysis of volatility spillover mechanisms among diverse financial markets utilizing a novel combination of Normalized Adaptive Multivariate Empirical Mode Decomposition (NA-MEMD) and Time-Varying Parameter Vector Autoregressive (TVP-VAR) model. Our analysis spans Bitcoin, crude oil, gold, foreign exchange, emerging stock markets, and developed stock markets, examining their respective roles in global volatility transmission. Utilizing the NA-MEMD methodology and a time-varying volatility spillover index, we find that in the short-term, Bitcoin and crude oil primarily act as volatility receivers, while other markets serve as volatility transmitters. Over the long-term, gold and Bitcoin consistently act as volatility receivers, with Bitcoin and gold showing evident safe-haven effects, while the remaining markets primarily function as volatility transmitters. Particularly post-COVID-19, developed stock markets emerge as significant transmitters of volatility, largely directed towards the crude oil market. By evaluating and comparing risk transmission patterns among financial markets before and during the COVID-19 pandemic, our findings offer valuable insights that can assist policymakers and other stakeholders in managing financial uncertainty in times of global crises.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Volatility spillover; Multiscale analysis; Financial markets
【发表时间】2024
【收录时间】2024-08-16
【文献类型】 实证数据
【影响因子】8.235
【主题类别】
区块链治理-市场治理-数字货币
【Abstract】This study examines the long-run relationships between Bitcoin and various financial and commodity markets. Utilizing a novel methodology termed the Implicit Asymmetric Combined Cointegration Test (IACC), an augmented variant of the Bayer Hanck combined cointegration method (BH), this research applies ten-minute frequency time series data to test asymmetric shocks associated with Bitcoin, stock markets, futures indices, sectoral stock indices, Islamic stocks, commodities, and foreign exchange markets. The principal finding reveals a hidden cointegration between negative Bitcoin shocks and both negative and positive shocks in almost all examined financial instruments, indicating an absence of decoupling in the connections between Bitcoin shocks and other financial instrument shocks. The study demonstrates Bitcoin's centrality in financial investments and establishes long-run relationships between Bitcoin price shocks and those of other financial instruments. The findings suggest caution for participants in both financial and commodity markets, as Bitcoin emerges as a major source of the recent volatility observed in these instruments' prices.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Bitcoin; Asymmetric shocks; Commodity market; Financial instruments; The implicit asymmetric combined; cointegration test
【发表时间】2024
【收录时间】2024-08-16
【文献类型】 实证数据
【影响因子】7.307
【主题类别】
区块链应用-实体经济-医疗领域
【Abstract】Healthcare supply chain domain and medical records' management face numerous challenges that come with new demands, such as customer dissatisfaction, rising healthcare costs, tracking and traceability of drugs, and security and privacy related to the sensitive information managed in such a domain. Executing processes related to healthcare domain in a trusted, secure, efficient, accessible and traceable manner is challenging due to the fragmented nature of the healthcare supply chain, which is prone to systemic errors and redundant efforts that may compromise patient safety and negatively impact health outcomes. To cope with such issues, blockchain technology, combined with the Internet of Things (IoT), can offers a reliable way to track and trace products and protect medical data though a peer-to-peer distributed, secure, and shared ledger. Hence, this paper proposes an IoT-driven blockchain-based architecture to manage the healthcare supply chain and protect medical records from tampering and access violation. Hyperledger Fabric, which is a permissioned blockchain, has been adopted due to the sensitive and private nature of the collected data. The envisioned network has been implemented and performance has been evaluated in terms of execution time, resources consumption and throughput.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain; Internet of Things; Access control; Security policies; Smart health
【发表时间】2024
【收录时间】2024-08-16
【文献类型】 实验仿真
CCF-A
【影响因子】6.791
【主题类别】
区块链应用-实体经济-审计领域
【Abstract】The primitive of verifiable data streaming (VDS) provides a secure data outsourcing solution for resource-constrained users, that is, they can stream their continuously-generated data items to untrusted servers while enabling publicly verifiable query and update. However, existing VDS schemes either require the server to store the authentication tags of all data items to support data query and auditing, or bind all data items into a constant-size tag to achieve optimal storage on the server side, but cannot achieve public auditing. To close this gap, in this article, we first design a novel authentication data structure, dubbed retrievable homomorphic verifiable tags (RHVTs), which allows users to aggregate the authentication tags of all data items into a constant-size tag, and enables them to retrieve the original tags from the aggregated tag when necessary. Based on this, we propose a compact verifiable and auditable data streaming (CVADS) scheme, which adopts a single-level authentication mechanism to achieve more efficient data append and update, as well as optimal storage and public auditing. For better robustness and performance, we introduce a nested dual-level authentication mechanism and propose a blockchain-based CVADS (BCVADS) scheme to achieve a distributed CVADS with self-auditing. Finally, we prove the security of our schemes in the random oracle model and demonstrate their practicality through a visual performance evaluation.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain; verifiable data streaming; retrievable homomorphic verifiable tags; optimal storage; public auditing; Blockchain; verifiable data streaming; retrievable homomorphic verifiable tags; optimal storage; public auditing
【发表时间】2024
【收录时间】2024-08-16
【文献类型】 理论模型
CCF-A
【影响因子】6.791
【主题类别】
区块链应用-实体经济-物联网
【Abstract】There is a growing concern about the complete lifecycle security of data in Internet of Things (IoT). This may cause privacy and trust problems for users regarding data sources, data storage, and access control for data sharing. Blockchain is a valuable solution to the above problems through distributed ledger technology, and it has been widely applied in various fields such as public services, finance, and IoT. However, the data in IoT are characterized by a large quantity, large capacity, and timely response, and existing blockchain systems only partially resolve them for data security and performance. We propose DSChain for IoT data security to address the challenges mentioned above. Our system uses a certificateless signature to ensure a trusted data source and public auditing to ensure the integrity of stored data while using ciphertext-policy attribute-based encryption to control access to shared data. Moreover, we propose a packaging mechanism based on the Merkle Hash Tree that effectively improves system performance. We implement the DSChain and provide a detailed analysis of performance and security. The experimental results indicate that DSChain can achieve approximately 1035 transactions per second on a single peer and is scalable.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchains; Internet of Things; Security; Soft sensors; Data privacy; Packaging; Encryption; Blockchain; IoT; certificateless signature; ciphertext policy; ABE; public auditing; data lifecycle security
【发表时间】2024
【收录时间】2024-08-16
【文献类型】 实验仿真
【Author】 Hu, Shun Li, Ming Weng, Jiasi Liu, Jia-Nan Weng, Jian Li, Zhi
CCF-A
【影响因子】6.791
【主题类别】
区块链技术-核心技术-跨链与多链
【Abstract】Blockchain rewriting has become widely explored for addressing data deletion requirements, such as error data deletion, space-saving, and compliance with the "right-to-be-forgotten" rule. However, existing approaches are inadequate for handling cross-chain redaction issues, in facing with the increasing need for inter-chain communication. In particular, transaction rewriting on a blockchain might have relevant effects on the states of other blockchains. The cross-chain interoperability results in inter-chain transactions with more complex dependency relations. The issues pose new challenges to achieve rewriting consistency, for example, ensuring the rewriting of related transactions when a transaction is being modified, and achieve atomic rewriting, whereby two cross-chain transactions must either all, or neither, be processed. This article introduces a cross-chain solution IvyRedaction, with an emphasis on customizing a decentralized intermediary for generating and maintaining global cross-chain redaction states and transaction dependencies. The article proposes a novel cross-chain state mapping method with rollback rules, as well as customized block structures and verification algorithms, to address the aforementioned issues. Proof-of-concept experiments are conducted to demonstrate the feasibility of the proposed framework.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchains; Proposals; Smart contracts; Consensus protocol; Insurance; Consensus algorithm; Peer-to-peer computing; Blockchain interoperability; blockchain rewriting; atomic swapping; smart contract
【发表时间】2024
【收录时间】2024-08-16
【文献类型】 实验仿真
CCF-A
【影响因子】6.791
【主题类别】
区块链治理-市场治理-DeFi
【Abstract】The rapid growth of Decentralized Finance (DeFi) boosts the blockchain ecosystem. At the same time, attacks on DeFi applications (apps) are increasing. However, to the best of our knowledge, existing smart contract vulnerability detection tools cannot directly detect DeFi attacks. That's because they lack the capability to recover and understand high-level DeFi semantics, e.g., a user trades a token pair X and Y in a Decentralized EXchange (DEX). In this work, we focus on the detection of two new types of price manipulation attacks. To this end, we propose a platform-independent method to identify high-level DeFi semantics. Specifically, we first construct the Cash Flow Tree (CFT) from a raw transaction and then lifting the low-level semantics to high-level ones, including five advanced DeFi actions. Finally, we use patterns expressed with the recovered DeFi semantics to detect price manipulation attacks. We implemented a prototype named DeFiRanger that detected 14 zero-day security incidents. These findings were reported to affected parties or/and the community for the first time. Furthermore, the backtest experiment discovered 15 unknown historical security incidents. We further performed an attack analysis to shed light on the root causes of vulnerabilities incurring price manipulation attacks.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Finance; Decentralized applications; Semantics; Security; Cryptocurrency; Smart contracts; Ecosystems; Attack detection; blockchain transaction analysis; DeFi security
【发表时间】2024
【收录时间】2024-08-16
【文献类型】 实验仿真
CCF-A
【影响因子】6.791
【主题类别】
区块链技术-核心技术-区块链节点
【Abstract】As all software, blockchain nodes are exposed to faults in their underlying execution stack. Unstable execution environments can disrupt the availability of blockchain nodes' interfaces, resulting in downtime for users. This article introduces the concept of N-Version Blockchain nodes. This new type of node relies on simultaneous execution of different implementations of the same blockchain protocol, in the line of Avizienis' N-Version programming vision. We design and implement an N-Version blockchain node prototype in the context of Ethereum, called N-ETH. We show that N-ETH is able to mitigate the effects of unstable execution environments and significantly enhance availability under environment faults. To simulate unstable execution environments, we perform fault injection at the system-call level. Our results show that existing Ethereum node implementations behave asymmetrically under identical instability scenarios. N-ETH leverages this asymmetric behavior available in the diverse implementations of Ethereum nodes to provide increased availability, even under our most aggressive fault-injection strategies. We are the first to validate the relevance of N-Version design in the domain of blockchain infrastructure. From an industrial perspective, our results are of utmost importance for businesses operating blockchain nodes, including Google, ConsenSys, and many other major blockchain companies.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchains; Peer-to-peer computing; Software; Programming; Prototypes; Computer architecture; Time factors; N-version design; blockchain; availability
【发表时间】2024
【收录时间】2024-08-16
【文献类型】 实验仿真
【影响因子】6.363
【主题类别】
区块链应用-实体经济-工业领域
【Abstract】The advent of advanced digital technologies, including the Internet of Things (IoT), image processing, artificial intelligence (AI), blockchain, robotics and cognitive computing that have been embedded in Industry 5.0, is considerably improving the sustainability, resilience, and human-centric performance of industrial organizations. Despite the increasing use of Industry 5.0 technologies in smart product platforming in industrial organizations, a critical issue remains how to assess the providers/suppliers of such technologies in highly competitive markets to fulfil personalized products and services. Following Lancaster's characteristics approach to consumer theory, in this study we contribute to assess digital technologies service providers in the Industry 5.0 era by focusing on both theoretical and empirical evidence inquiring about the convexity of conventional nonparametric frontier estimation methods. To do so, a nonparametric double frontier estimation of the hedonic price characteristics relation is developed from both the buyer's and seller's perspectives. Moreover, a separable directional distance function-based optimization model is developed for the efficiency estimation. Furthermore, a comparable estimation of the convex and nonconvex hedonic price function is proposed. We also explicitly test the impact of convexity in evaluating the efficiency of IoT service providers in the Industry 5.0 context. In this study, we also show that the hypothesis of convexity in assessing the efficiency of IoT service providers is rejected using the Li-test comparing entire densities in the case of the seller's perspective without ratio data. Differences are less pronounced for the buyer's perspective and in the case with ratio data.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Industry 5.0; Sustainability; Convexity and Nonconvexity; Free disposal hull (FDH) technology; Hedonic price
【发表时间】2024
【收录时间】2024-08-16
【文献类型】 实证数据
【Author】 Li, Mengge Ma, Miao Wang, Liang Yang, Bo
【影响因子】4.747
【主题类别】
区块链技术-核心技术-激励机制
【Abstract】With the explosive popularity of mobile devices, mobile crowdsensing (MCS) has emerged as a promising large-scale data collection paradigm. Suitable incentive mechanisms are essential for encouraging user participation. Current MCS work more or less ignores three factors. First, mobile users are assumed to be independent of each other, ignoring social effects. Second, due to the heterogeneity of users, if you just blindly attract users without distinguishing them, the data quality can decrease. Finally, the limited communication resource allocation problem during uploading sensing results is ignored. Therefore, we model the quality-improved and delay-aware incentive mechanism with social concerns as a two-stage Stackelberg game, in which the rational use of social effects not only motivates user participation but also avoids a serious decline in information value due to repetition, and reasonable allocation of communication resources ensures the timeliness of delay-sensitive tasks. Furthermore, data screening, similarity analysis, voting, and reputation are used simultaneously to improve data quality. The Hessian matrix in a multiuser, multitask hyperspace setting is utilized to verify the existence and uniqueness of the game equilibrium. The closed-form expressions of the optimal requester pricing and the optimal user data load strategies are derived, respectively. The proposed mechanism is compared with gather-scatter, incentive- G, Blockchain-based secure, interactive, and fair MCS (BSIF), and Socially-aware incentive mechanism (SAIM) algorithms. Extensive simulation results on a real trajectory dataset show that compared with these state-of-the-art algorithms, the proposed incentive mechanism can motivate users to provide more data loads with few rewards, greatly improve the requester utility, and suppress the data upload of malicious users.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Task analysis; Games; Sensors; Data integrity; Social networking (online); Resource management; Crowdsensing; Communication resource allocation; data quality; incentive mechanism; mobile crowdsensing (MCS); social concerns; two-stage Stackelberg game
【发表时间】2024
【收录时间】2024-08-16
【文献类型】 实证数据
【影响因子】4.080
【主题类别】
区块链应用-实体经济-农牧领域
【Abstract】The agriculture industry is facing a difficult situation as an outcome of mounting food demand, food security, climatical situations, legislative laws, etc. Moreover, the practice of chemical fertilizer in agriculture adds to greenhouse gas emissions and large water consumption. As a result, agricultural systems must be rethought to become more robust and sustainable. Regenerative agriculture, a collection of agricultural methods and techniques that prioritize long-term organic farming, environmental responsibility, and sustainability, is a potential solution to these issues. This review intends to discuss the interplay between regenerative agriculture (RA) and digital agri-technologies to attain sustainability. The significance of RA over conventional agri-technologies, the role of nanobiotechnology, smart sensors, and other fourth Agri-tech 4.0 innovations to augment food production are emphasized. Growing evidence shows that digital technologies (particularly the Internet of Things (IOTs), big data, artificial intelligence, and blockchain) would have a greater impact on RA. These practices can have an array of environmental benefits. Precision agri-technologies like internet-of-things (IoTs), cloud computing, blockchain, satellites, drones, use of nanosensors, and remote sensing of fresh produce during the supply chain can augment food production at a commendable rate. Implementation of automated harvesting processes to attain minimum contact harvesting and post-harvest operations are quite useful in increasing food production. Thus, current strategies toward agricultural transformation and novel government policies, toward sustainable regenerative agriculture could be a game-changer in sustainable agriculture. These implications are derived through carefully analysing the published literature we have amassed using various search engines. However, more research is still needed to entirely harness the benefit of progressive technologies, to realize a healthier and further sustainable agriculture future.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Agrarian economy; Agri-tech 4.0 and supply chain; Artificial intelligence and blockchain technology; Internet of things; Precision farming; Regenerative agriculture
【发表时间】2024
【收录时间】2024-08-16
【文献类型】 综述
【影响因子】3.752
【主题类别】
区块链治理-技术治理-隐私保护
【Abstract】To ensure optimal use of images while preserving privacy, it is necessary to partition the shared image into public and private areas, with public areas being openly accessible and private areas being shared in a controlled and privacy-preserving manner. Current works only facilitate image-level sharing and use common cryptographic algorithms. To ensure efficient, controlled, and privacy-preserving image sharing at the area level, this paper proposes an image partition security-sharing mechanism based on blockchain and chaotic encryption, which mainly includes a fine-grained access control method based on Attribute-Based Access Control (ABAC) and an image-specific chaotic encryption scheme. The proposed fine-grained access control method employs smart contracts based on the ABAC model to achieve automatic access control for private areas. It employs a Cuckoo filter-based transaction retrieval technique to enhance the efficiency of smart contracts in retrieving security attributes and policies on the blockchain. The proposed chaotic encryption scheme generates keys based on the private areas' security attributes, largely reducing the number of keys required. It also provides efficient encryption with vector operation acceleration. The security analysis and performance evaluation were conducted comprehensively. The results show that the proposed mechanism has lower time overhead than current works as the number of images increases.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】
【发表时间】2024
【收录时间】2024-08-16
【文献类型】 理论模型
【影响因子】3.519
【主题类别】
区块链应用-实体经济-碳交易
【Abstract】Cooperation among companies is essential for reducing the whole-process carbon emissions of products, but the existence of asymmetric information can negatively affect the cooperation. The information-sharing framework based on blockchain technology can solve the problem and contribute to an efficient supply chain for collaborative carbon emission reduction. We obtain conditions on the optimal carbon reduction efforts of the producer and the retailer by designing a blockchain information sharing mechanism, and confirm that the optimal carbon reduction efforts are associated with consumers' low-carbon preferences. Our study shows that: (1) The blockchain-based information-sharing mechanism can improve the way that producers and retailers collaborate on carbon emission reductions and help them understand information on consumers' low-carbon preferences to make scientific decisions. (2) Companies have to pay an information rent to ensure that consumers correctly disclose their low-carbon preferences under information asymmetry. Blockchain technology eliminates the information rent and enables the overall efficiency of the supply chain. (3) An optimal blockchain cost-sharing factor exists that maximizes the overall supply chain revenue under the mechanism.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Collaborative emission reduction; Information sharing; Blockchain technology; Principal-agent model
【发表时间】2024
【收录时间】2024-08-16
【文献类型】 理论模型
CCF-B
【影响因子】3.514
【主题类别】
区块链技术-平台项目-智能合约
【Abstract】The number of applications supported by blockchain smart contracts has been greatly increasing in recent years, with smart contracts now being used across several domains, such as the music industry, finance, and retail, to name a few. Despite being used in business-critical contexts, the number of security vulnerabilities in smart contracts has also been increasing, with many of them being exploited and resulting in huge financial and reputation losses. This is despite the enormous effort that is being placed into the research and development of vulnerability detection tools and techniques, which have also greatly increased in number and type in the last few years. Motivated by the recent increase in both vulnerabilities and vulnerability detection techniques, this paper reviews the latest research in smart contract vulnerability detection, emphasizing the techniques being used, the vulnerabilities targeted, and the characteristics of the dataset used for evaluating the technique. We mapped the vulnerabilities against two common vulnerability classification schemes (DASP and SWC) and performed a consolidated analysis. We identified the current research trends and gaps in each technique and highlighted future research opportunities in the field.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain; Smart contract; Smart contract security; Vulnerability detection; Verification tools
【发表时间】2024
【收录时间】2024-08-16
【文献类型】 综述
【影响因子】2.557
【主题类别】
区块链应用-实体经济-医疗领域
【Abstract】In recent years, the rapid integration of Internet of Things (IoT) devices into the healthcare sector has brought about revolutionary advancements in patient care and data management. While these technological innovations hold immense promise, they concurrently raise critical security concerns, particularly in safeguarding medical data against potential cyber threats. The sensitive nature of health-related information requires robust measures to ensure patient data's confidentiality, integrity, and availability within IoT-enabled medical environments. Addressing the imperative need for enhanced security in IoT-based healthcare systems, we propose a comprehensive method encompassing three distinct phases. In the first phase, we implement blockchain-enabled request and transaction encryption to fortify the security of data transactions, providing an immutable and transparent framework. Subsequently, in the second phase, we introduce request pattern recognition check, leveraging diverse data sources to identify and thwart potential unauthorized access attempts. Finally, the third phase incorporates feature selection and the BiLSTM network to enhance the accuracy and efficiency of intrusion detection through advanced machine-learning techniques. We compared the simulation results of the proposed method with three recent related methods, namely AIBPSF-IoMT, OMLIDS-PBIoT, and AIMMFIDS. The evaluation criteria encompass detection rates, false alarm rates, precision, recall, and accuracy, crucial benchmarks in assessing the overall performance of intrusion detection systems. Notably, our findings reveal that the proposed method outperforms these existing methods across all evaluated criteria, underscoring its superiority in enhancing the security posture of IoT-based healthcare systems.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain; Privacy-preserving; Healthcare; Machine learning; Whale optimization algorithm
【发表时间】2024
【收录时间】2024-08-16
【文献类型】 理论模型
【影响因子】2.295
【主题类别】
区块链应用-实体经济-商业领域
【Abstract】This paper studies the relationship between blockchain patents and firms' environmental and social performance. Using data from USPTO, we assess the effect of these patents on subcategories and aggregate grades for social and environmental dimensions. Our results show a negative main effect of blockchain-related patents on social and environmental grades. However, this effect is moderated by company size and focus on R&D. We exploit the first legislation favorable to blockchain in the United States and find a positive effect of blockchain patents on environmental grades, showing a change in corporate behavior regarding the use of blockchain.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】blockchain; environmental and social performance; patents
【发表时间】2024
【收录时间】2024-08-16
【文献类型】 实证数据
【DOI】 10.1111/eufm.12510
【影响因子】2.027
【主题类别】
区块链技术-核心技术-身份验证
【Abstract】Centralized storage and identity identification methods pose many risks, including hacker attacks, data misuse, and single points of failure. Additionally, existing centralized identity management methods face interoperability issues and rely on a single identity provider, leaving users without control over their identities. Therefore, this paper proposes a mechanism for identity identification and data sharing based on decentralized identifiers. The scheme utilizes blockchain technology to store the identifiers and data hashed on the chain to ensure permanent identity recognition and data integrity. Data is stored on InterPlanetary File System (IPFS) to avoid the risk of single points of failure and to enhance data persistence and availability. At the same time, compliance with World Wide Web Consortium (W3C) standards for decentralized identifiers and verifiable credentials increases the mechanism's scalability and interoperability.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Self-sovereign identity; decentralized identifier; blockchain
【发表时间】2024
【收录时间】2024-08-16
【文献类型】 实验仿真
【Author】 Penuela, F. Javier Fernandez-Bravo Aroca, Jordi Arjona Munoz-Escoi, Francesc D. Gavrylyak, Yuriy Yatsyk Garcia, Ismael Illan Bernabeu-Auban, Jose M.
【影响因子】1.914
【主题类别】
区块链技术-平台项目-Hyperledger Fabric
【Abstract】Besides cryptocurrencies, DLTs may be also exploited in enterprise systems operated by a consortium of organizations. Their interaction takes usually place on a permissioned blockchain network that holds a set of data to be queried frequently. In this scope, the main problem of DLTs is their unsuitability for a fast service of complex queries on those data. In order to solve this issue, many proposals dump the ledger contents onto databases that, because of their own goals and design, are already optimized for the execution of those queries. Unfortunately, many of those proposals assume that the data to be queried consist in only a block or (cryptocurrency-related) transaction history. However, those organization consortiums commonly store other structured business-related information in the DLT, and there is an evident lack of support for querying that other kind of structured data. To remedy those problems, DELTA synchronizes, with minimal overhead, the DLT state into a database, providing (1) a modular architecture with event-based handling of DLT updates that supports different DLTs and databases, (2) a transparent management, since DLT end users do not need to learn or use any new API in order to handle that synchronization (i.e., those users still rely on the original interface provided by their chosen DLT), (3) the efficient execution of complex queries on those structured data. Thus, DELTA reduces query times up to five orders of magnitude, depending on the DLT and the database, compared to queries directed to the ledger nodes. DELTA synchronizes, with minimal overhead, the state of a DLT into a database. Its modular architecture supports multiple DLTs and databases, providing a transparent management of them. Hence, the users are enabled to efficiently execute complex queries on the ledger data, expressed in the language of the chosen database. image
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】blockchain; database; DLT; ledger
【发表时间】2024
【收录时间】2024-08-16
【文献类型】 实验仿真
【DOI】 10.1002/nem.2293
【作者】 陈枫; 赵春江; 杨信廷; 罗娜; 徐大明; 孙传恒
【作者单位】沈阳农业大学信息与电气工程学院;国家农业信息化工程技术研究中心;农产品质量安全追溯技术及应用国家工程研究中心;
【文献来源】农业工程学报
【复合影响因子】3.446
【综合影响因子】2.615
【主题类别】
区块链应用-实体经济-供应链
【摘要】基于区块链的农产品追溯系统可有效解决农产品追溯的信任问题。然而,区块链的不可篡改性和全冗余存储导致了区块链节点存储数据量的持续增加,提高了区块链设备的门槛,限制了农产品区块链追溯系统的大规模落地应用。针对农产品区块链追溯系统的高存储量问题,该研究提出了一种基于可编辑区块链的农产品供应链追溯高效存储查询模型。首先,针对农产品追溯数据的周期特性,总结了农产品供应链追溯信息生命周期。其次,通过卸载超出生命周期的追溯数据降低数据存储量,研究农产品可编辑区块链存储模型。最后,通过计数布隆过滤器降低了农产品可编辑区块链数据卸载后假阳率高的问题,提高了农产品可编辑区块链追溯系统的查询效率。试验结果表明,在系统运行60个月时,本模型的存储量为传统农产品区块链追溯系统的48.70%。当区块数据量为1 000条,数据卸载量为30%时,本模型的假阳率较传统模型下降了21个百分点,数据查询效率提高了19.02%。该研究为农产品区块链追溯系统的规模化落地应用提供了解决方案。
【关键词】区块链;;农产品;;追溯;;存储;;高效查询
【文献类型】 理论模型
【发表时间】2024-08-16