• 首页
  • 每日更新
  • 文献
  • 会议文献
  • 政策法规
  • 研究专题
  • 区块链游戏
logo 区块链前沿
  • 区块链前沿
  • 首页
  • 每日更新
  • 文献
  • 会议文献
  • 政策法规
  • 研究专题
  • 区块链游戏
  • 文章创新角色
  • 科研创新指数
  • 区块链领域本体
  • 热点主题挖掘
  • 主题展示
  • 专利文献
  • 排行榜
  • DAO治理
  • 文献上传
  • 积分获取规则
  • 大语言模型解析
  • 期刊发文分布
注册 登录

2024年08月21日 36篇

文献来源

  • 36

主题分类

      • 1
      • 9
      • 3
      • 1
      • 1
      • 1
      • 2
      • 1
      • 1
      • 1
      • 1
      • 1
      • 1
      • 1
      • 2
      • 1
      • 1
      • 1
      • 1
      • 1
      • 2
      • 1
      • 1
      • 1

文献类型

  • 1
  • 24
  • 3
  • 1
  • 7
筛选
订阅
<< 前一天 后一天 >>

Embracing the quantum frontier: Investigating quantum communication, cryptography, applications and future directions

【Author】 Vasani, Vatsal Prateek, Kumar Amin, Ruhul Maity, Soumyadev Dwivedi, Ashutosh Dhar

【影响因子】11.718

【主题类别】

区块链应用-实体经济-量子通信

【Abstract】The continuous technological revolution, driven by transformative innovations such as artificial intelligence, blockchain, and Internet of Things, has left an everlasting mark on the global market landscape. This has motivated multinational corporations to not only explore the possibilities of quantum technology but also actively implement high-qubit systems and promote democratized access, thereby catalyzing a quantum revolution. Additionally, the demand to harness the potential of quantum technology and its applications has reached unprecedented levels, while concerns about security and privacy have intensified. Consequently, this paper offers an extensive exploration of the emerging field of quantum communication and cryptography, unveiling the untapped possibilities of quantum technology while delving into its prospective applications and future pathways. Quantum communication presents compelling advantages over classical communication, as it does not rely on any hard problems, offering unconditional security. We delve into the fundamental principles of quantum communication and cryptography, encompassing quantum key distribution, quantum teleportation, and quantum-resistant cryptography that aims to develop encryption methods resilient to attacks from quantum computers, potentially utilizing quantum hard problems or principles of quantum mechanics to ensure security. Additionally, we explore the prospective applications of quantum technology in diverse areas, including quantum machine learning, quantum blockchain, the quantum metaverse, and extended reality. Furthermore, this paper discusses future directions in quantum communication and cryptography, highlighting the development of quantum-secured identity and access management, quantum-secure multi-party computations, and quantum-oblivious transfer. These pioneering avenues hold the promise to revolutionize information security and communication, opening up thrilling new possibilities for the advancement of technology and innovation. The transformative potential of quantum communication and cryptography beckons a future where security and communication intertwine seamlessly, ushering in a new era of cutting-edge advancements.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Quantum communication; Quantum cryptography; Quantum computers; Quantum applications; Quantum technology

【发表时间】2024

【收录时间】2024-08-21

【文献类型】 综述

【DOI】 10.1016/j.jii.2024.100594

Constant-Size Verifiable Timed Signatures from RSA Group for Bitcoin-Based Voting Protocols

【Author】 Bao, Zijian He, Debiao Feng, Qi Luo, Min Zeng, Xiangyong

CCF-A

【影响因子】11.019

【主题类别】

区块链技术-协同技术-密码学

【Abstract】A verifiable timed signature (VTS) scheme allows a signature to be time-locked to a known message for a predetermined duration denoted as $\mathsf {T}$T. Verifiability ensures that anyone can verify that the time-lock contains a valid signature without completing the computation. In this paper, we introduce a novel VTS construction method based on the RSA group, designed to maintain a constant level of size. This approach serves as an improvement over the previous linear level size construction method (CCS 2020). First, we construct it by using a commitment to a valid RSA signature. This commitment can only be opened to a regular RSA signature after a sequential computation period. Our scheme utilizes a trapdoor verifiable delay function, RSA signatures, and a specialized zero-knowledge proof to instantiate the proposed scheme. We also conduct proofs in three aspects: correctness, soundness, and security. Furthermore, we identify potential applications for VTS and present a simple Bitcoin voting protocol based on an open vote protocol by utilizing VTS. Experimental results show that our scheme is more efficient compared to the construction of VTS (CCS 2020), reducing the signature size by at least 90.5% and lowering computational costs by at least 77%.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Cryptography; Protocols; Security; Delays; Privacy; Encryption; Authentication; Timed signature; RSA signature; bitcoin voting; zero-knowledge proof

【发表时间】2024

【收录时间】2024-08-21

【文献类型】 实验仿真

【DOI】 10.1109/TSC.2023.3347526

A blueprint for energy systems in the era of central bank digital currencies

【Author】 Savelli, Iacopo Hepburn, Cameron Morstyn, Thomas

【影响因子】10.884

【主题类别】

区块链应用-虚拟经济-数字货币

【Abstract】Central bank digital currencies (CBDC), i.e., electronic cash issued by central banks, are currently being developed and tested in several countries, including the European Union, Canada, China, India and Australia, and will likely become widely available for individuals and businesses in the coming years. In this Perspective, we argue that, if well-designed, CBDCs could provide significant opportunities for energy system innovation and net-zero transition, while addressing certain risks associated with digital cash. We propose a blueprint of a future energy system fully integrated with CBDCs, focusing on energy markets, carbon markets, and energy project financing. We show how this integration could increase transparency, reduce costs, trigger bottom-up citizen-driven energy initiatives, facilitate whole-system regulatory oversight, enhance carbon tracking and trading, and support energy project financing, creating a wealth of opportunities for innovation, financial inclusion in energy investment, and energy consumer engagement. We conclude by identifying major sources of risk and policy implications.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; Smart contract; Energy market; Digital currency; Central bank

【发表时间】2024

【收录时间】2024-08-21

【文献类型】 理论模型

【DOI】 10.1016/j.techfore.2024.123637

A Tensor-Train-Based P2 Blockchain for Internet of Things Services

【Author】 Wang, Xiaokang Yang, Laurence T. Huo, Dongdong Ren, Lei Deen, M. Jamal

CCF-C

【影响因子】10.238

【主题类别】

区块链应用-实体经济-物联网

【Abstract】Internet of Things (IoT), is the comprehensive interconnection systems of computational, networking, and physical devices with the important goal of providing proactive and personalized services efficiently. The foundation of such services is big data integration and processing among various devices, which brings important challenges, including data fusion, transferring, and sharing of computational results. On the other hand, decentralized blockchain platforms provide novel technologies for reliable IoT data integration and processing. In addition, to facilitate decentralization and distribution of IoT big data, tensor-train (TT), as a tensor decomposition method, can play a vital role. Therefore, in this article, a TT-based Permissioned-Private (P-2) blockchain is proposed to realize the organization, integration, sharing, and applications of IoT data for intelligent IoT services. To demonstrate the performance of the proposed method, case studies with IoT data are carried out on the permissioned-private chain platform to measure its performance.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Tensors; Blockchains; Internet of Things; Big Data; Data integration; Cloud computing; Real-time systems; Big data; Internet of Things (IoT); Permissioned-Private (P-2) blockchain; tensor-train (TT)

【发表时间】2024

【收录时间】2024-08-21

【文献类型】 案例研究

【DOI】 10.1109/JIOT.2024.3364528

Watchdog: Network-Aware Consensus Protocol for Enhancing Scalability of Public Blockchains

【Author】 Park, Gi Seok Song, Hwangjun

CCF-C

【影响因子】10.238

【主题类别】

区块链技术-核心技术-区块链网络

【Abstract】In this article, we present a watchdog blockchain network (WDN) that allows for simultaneous scalability and decentralization enhancements. Because of the blockchain trilemma, achieving high levels of security, scalability, and decentralization simultaneously is challenging. Typically, public blockchains are fully decentralized at the expense of scalability, whereas private blockchains achieve high scalability at the expense of decentralization. A WDN is proposed to compensate for the low-level decentralization of a private blockchain while maintaining its high-level scalability. A WDN may prevent arbitrary forgery, alteration, and deletion of distributed ledgers in private blockchains owing to weak decentralization. However, the transaction throughput gap between the WDN and the private blockchain can be a significant obstacle in operating a WDN with a private blockchain. Therefore, the WDN in this study has been designed to back up data on the private blockchain in real time over a distributed network environment. The WDN features a network-aware consensus protocol that can quickly complete the consensus process of the three phases. To this end, modern network technologies, such as GossipSub, quick UDP Internet connections (QUICs), and Google remote procedure call (GRPC), have been appropriately adopted for the WDN. To demonstrate the system performance of the WDN, a blockchain system was fully implemented in the form of docker containers. Furthermore, we verified the feasibility of the WDN by developing decentralized applications (DApps).

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchains; Peer-to-peer computing; Scalability; Consensus protocol; Aggregates; Throughput; Fabrics; Blockchain; Byzantine fault tolerance; decentralized network; GossipSub; hyperledger fabric

【发表时间】2024

【收录时间】2024-08-21

【文献类型】 实验仿真

【DOI】 10.1109/JIOT.2024.3368448

Federated Learning Meets Blockchain in Decentralized Data Sharing: Healthcare Use Case

【Author】 Alsamhi, Saeed Hamood Myrzashova, Raushan Hawbani, Ammar Kumar, Santosh Srivastava, Sumit Zhao, Liang Wei, Xi Guizan, Mohsen Curry, Edward

CCF-C

【影响因子】10.238

【主题类别】

区块链应用-实体经济-医疗领域

【Abstract】In the era of data-driven healthcare, the amalgamation of blockchain and federated learning (FL) introduces a paradigm shift toward secure, collaborative, and patient-centric data sharing. This article pioneers the exploration of the conceptual framework and technical synergy of FL and blockchain for decentralized data sharing, aiming to strike a balance between data utility and privacy. FL, a decentralized machine learning paradigm, enables collaborative AI model training across multiple healthcare institutions without sharing raw patient data. Combined with blockchain, a transparent and immutable ledger, it establishes an ecosystem fostering trust, security, and data integrity. This article elucidates the technical foundations of FL and blockchain, unravelling their roles in reshaping healthcare data sharing. This article vividly illustrates the potential impact of this fusion on patient care. The proposed approach preserves patient privacy while granting healthcare providers and researchers access to diversified data sets, ultimately leading to more accurate models and improved diagnoses. The findings underscore the potential acceleration of medical research, improved treatment outcomes, and patient empowerment through data ownership. The synergy of FL and blockchain envisions a healthcare ecosystem that prioritizes individual privacy and propels advancements in medical science.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Medical services; Blockchains; Data privacy; Collaboration; Data models; Medical diagnostic imaging; 6G mobile communication; Blockchain; data sharing; Dataspace 4.0; decentralized data sharing; federated learning (FL); healthcare; Industry 4.0; Industry 5.0; IoE

【发表时间】2024

【收录时间】2024-08-21

【文献类型】 理论模型

【DOI】 10.1109/JIOT.2024.3367249

An Innovative Decentralized and Distributed Deep Learning Framework for Predictive Maintenance in the Industrial Internet of Things

【Author】 Alabadi, Montdher Habbal, Adib Guizani, Mohsen

CCF-C

【影响因子】10.238

【主题类别】

区块链应用-实体经济-物联网

【Abstract】The integration of predictive maintenance (PdM) with the Industrial Internet of Things (IIoT) represents a pivotal shift in equipment management, particularly with the incorporation of deep learning (DL) for processing time series data from IIoT devices. This combination offers a sophisticated approach to predictive analysis, harnessing DL's prowess in analyzing complex patterns in large data sets. However, it also presents notable challenges, including significant security risks associated with centralized organizations and the immense volume of time series data generated by IIoT. To address these issues, our study introduces an innovative decentralized framework thoughtfully segmented into device and edge levels. This framework leverages the strengths of blockchain technology and the interplanetary file system (IPFS). IPFS effectively manages the large-scale storage needs of time series data for DL applications in a decentralized manner, while blockchain provides a robust foundation for ensuring data security and maintaining consistent transactions. Furthermore, we conducted thorough performance analyses, examining aspects, such as accuracy, execution time, and computational cost, which validated the efficacy of our approach. Security considerations were also rigorously evaluated, focusing on potential attacker scenarios, the strengths of a decentralized architecture, and the immutable nature of smart contracts. The results highlight our framework's exceptional ability to ensure the highest level of security in DL, maintain data integrity, and preserve model accuracy. In conclusion, the seamless integration of DL, PdM, blockchain, and IPFS in our framework marks a significant advancement in contemporary industrial maintenance strategies. It successfully bridges the gap between advanced security needs and the handling of vast quantities of data, positioning our approach at the forefront of modern industrial maintenance solutions.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchains; Industrial Internet of Things; Security; InterPlanetary File System; Data models; Data privacy; Medical services; Blockchain; deep learning (DL); Industrial Internet of Things (IIoT); interplanetary file system (IPFS); predictive maintenance (PdM)

【发表时间】2024

【收录时间】2024-08-21

【文献类型】 实证数据

【DOI】 10.1109/JIOT.2024.3372375

A Detection Method Against Selfish Mining-Like Attacks Based on Ensemble Deep Learning in IoT

【Author】 Wang, Yilei Li, Chunmei Zhang, Yiting Li, Tao Ning, Jianting Gai, Keke Choo, Kim-Kwang Raymond

CCF-C

【影响因子】10.238

【主题类别】

区块链治理-市场治理-加密劫持检测

【Abstract】Cryptojacking is a new type of Internet of Things (IoT) attack, where an attacker hijacks the computing power of IoT devices, such as wireless routers, smart TVs, set-top boxes, or cameras, to mine cryptocurrencies, e.g., PyRoMineIoT. The attackers launch selfish mining-like (SM-like) attacks to obtain lucrative mining rewards with the stolen computing power, once the power exceeds a threshold. Generally, a single deep learning (DL) model with a single feature (e.g., fork height) is trained to detect SM-like attacks. However, the existing model fails to detect every SM-like attack since the model training ignores other distinctive features (e.g., mining rewards and blocking rate) of SM-like attacks. In this article, SM-NEEDLE, an ensemble DL (NEEDLE) method is proposed to detect SM-like attacks. More specifically, the distinctive features are extracted from the blockchain system, where SM-like simulators emulate the strategies of SM-like attacks. Further, to circumvent the local optima problem caused by the single DL model (e.g., Back-Propagation Neural Network, BPNN), the SM-NEEDLE trains multiple BPNNs with these distinctive features. Evaluation results indicate the accuracy and false negative rate (FNR) of SM-NEEDLE for detecting SM-like attacks (including SM1 and its variants) are 98.9% and 1.48%, respectively. That is, 98.9% of SM-like attacks are correctly identified and only 1.48% of attacks are undetectable.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Data mining; Internet of Things; Deep learning; Feature extraction; Needles; Training; Biological neural networks; Back-propagation neural network; blockchain; ensemble deep learning (NEEDLE); selfish mining attack

【发表时间】2024

【收录时间】2024-08-21

【文献类型】 实验仿真

【DOI】 10.1109/JIOT.2024.3367689

Privacy-Preserving Scheme With Bidirectional Option for Blockchain-Enhanced Logistics Internet of Things

【Author】 Li, Kunchang

CCF-C

【影响因子】10.238

【主题类别】

区块链应用-实体经济-物联网

【Abstract】The logistics Internet of Things (Logistics IoT) is a new generation logistics model that integrates advanced network communication technology in the traditional logistics industry. It can achieve intelligent and efficient logistics management and personalized services and has attracted the attention of massive researchers and industrial practitioners. However, the leakage of logistics privacy and chaotic access control mechanisms are still noteworthy issues. In this article, we propose a privacy-preserving scheme with bidirectional option for blockchain-enhanced Logistics IoT, named PB-LIoT. The scheme is based on the blockchain-enhanced logistics IoT architecture, using smart contracts to achieve data access control, ciphertext-policy attribute-based encryption to achieve privacy, and hash function to achieve data integrity detection. To find more efficient delivery routes, we design a logistics routing selection algorithm based on objective optimization. This algorithm considers time efficiency, transportation cost, workload, and other factors and uses objective optimization to optimize the path. More importantly, we devise a bidirectional choice strategy to achieve more humane services, not only for customers but also for express delivery sites. Finally, we analyze the security and performance of the scheme. The results show that the proposed scheme in this article has data privacy protection and efficiency, while considering the humanized factor of bidirectional option.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Logistics; Blockchains; Privacy; Internet of Things; Data privacy; Access control; Smart contracts; Bidirectional option; blockchain; Logistics Internet of Things (Logistics IoT); privacy-preserving; smart contract

【发表时间】2024

【收录时间】2024-08-21

【文献类型】 实验仿真

【DOI】 10.1109/JIOT.2024.3370375

SC-CAAC: A Smart-Contract-Based Context-Aware Access Control Scheme for Blockchain-Enabled IoT Systems

【Author】 Merlec, Mpyana Mwamba In, Hoh Peter

CCF-C

【影响因子】10.238

【主题类别】

区块链应用-实体经济-物联网

【Abstract】Integrating blockchain technology with the Internet of Things (IoT) facilitates seamless interaction between IoT devices and systems to securely share, access, and exchange data. However, ensuring adequate access control within blockchain-enabled IoT (BIoT) systems remains a significant challenge. It is often difficult to adapt existing access control mechanisms to the dynamic and context-dependent nature of IoT environments, necessitating a robust context-aware approach to ensure adequate security and the privacy of resources within BIoT systems. In this article, we propose a novel smart contract-enabled context-aware access control (SC-CAAC) scheme for BIoT systems. It utilizes context-aware access control models that consider contextual information, including user profile, purpose, date, time, location, resource, and operating environment specifications, to make access control decisions. Smart contracts dynamically enforce access control policies and manage access permissions, ensuring that sensitive data and resources are accessible only to authorized users. The proposed scheme leverages the immutability, transparency, and decentralization of a blockchain that is shared by multiple participants in a consortium network, removing the need for a central authority to record and audit access control policies and decisions and promoting accountability and trust. The implementation and evaluation of our proposed scheme using the Hyperledger Besu blockchain demonstrates its effectiveness and scalability in real-world scenarios.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; blockchain-based Internet of Things (BIoT); context-aware access control (CAAC); Internet of Things (IoT); smart contracts

【发表时间】2024

【收录时间】2024-08-21

【文献类型】 实验仿真

【DOI】 10.1109/JIOT.2024.3371504

Decentralized Fair IoT Data Trading via Searchable Proxy Re-Encryption

【Author】 Lu, Xin Zhang, Zijian Zhou, Tyler Niu, Tao Li, Meng Guan, Zhitao Ma, Teng Zhu, Liehuang

CCF-C

【影响因子】10.238

【主题类别】

区块链应用-实体经济-物联网

【Abstract】The Internet of Things (IoT) is a network composed of information-gathering devices, sensors, and computing devices assembled in an intelligent manner, and the most important element in this system is data. IoT data trading plays a vital role in the area of personalized business nowadays. Individual IoT devices generate large amounts of private data, which data owners can sell to enterprises as important digital assets to make money, while enterprises collect IoT data to improve the accuracy of their services. Cloud storage services have been widely used in IoT data trading. In IoT data trading, cloud storage services have been widely used for individuals to store IoT data and for enterprises to automatically facilitate data trading. However, there are still two crucial drawbacks to be solved. From the point of security, it is difficult for data buyers to check the validity of the search result without getting the decryption key of the data owner. From the point of fairness, there is a lack of a punishment mechanism to transfer money from the cheating party to the honest party. To tackle the two challenges, we propose a searchable re-encryption scheme to maintain traditional security without sacrificing service quality. Next, we design a fair trading protocol based on smart contracts to automatically detect any cheating behaviors. Formal security analysis proves that the scheme provides expected security. Experimental results show that the scheme achieves good performance.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Internet of Things; Cloud computing; Servers; Keyword search; Data privacy; Bitcoin; Big Data; Blockchain; data trading; fairness; Internet of Things (IoT); searchable re-encryption; smart contract

【发表时间】2024

【收录时间】2024-08-21

【文献类型】 实验仿真

【DOI】 10.1109/JIOT.2024.3365832

Special Characters Usage and Its Effect on Password Security

【Author】 He, Daojing Liu, Zhiyong Zhu, Shanshan Chan, Sammy Guizani, Mohsen

CCF-C

【影响因子】10.238

【主题类别】

区块链应用-实体经济-物联网

【Abstract】Continuously preventing weak password attacks is one of the most important initiatives to secure IoT and smart contract platforms. Despite their significance as crucial components of passwords, special character segments have been overlooked. This study systematically investigates the basic characteristics and semantic patterns of special character segments. We assess the efficacy of special character segment characteristics in cracking trials through assimilation into the latest probabilistic context-free grammar (PCFG(v4)) method for password cracking by updating the preterminal structure or performing special character segment transformation. Experimental findings demonstrate that a mere 6% transformation rate improves the cracking rate by 3.72% under the optimal assimilation combination. Our investigation reveals that the current password creation policies of mainstream IoT platforms and smart contract wallets overestimate the strength of passwords with special characters. To enhance their passwords, users can employ low-frequency special character semantic strings. For IoT platforms or smart contract wallets, the use of blacklist constructed from special character segment characteristics can effectively mitigate the risk of overestimating the strength of passwords with special characters.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Internet of Things; Internet of Things (IoT) platforms security; password analysis; password protection; smart contract wallet security; weak password attack

【发表时间】2024

【收录时间】2024-08-21

【文献类型】 实验仿真

【DOI】 10.1109/JIOT.2024.3367323

Enhancing digital cryptocurrency trading price prediction with an attention-based convolutional and recurrent neural network approach: The case of Ethereum

【Author】 Shang, Dawei Guo, Ziyu Wang, Hui

【影响因子】9.848

【主题类别】

区块链治理-市场治理-价格预测

【Abstract】To predict Ethereum price fluctuations, this study proposes a new two-stage Machine Learning approach using an improved convolutional neural network and a recurrent neural network framework, integrating an attention mechanism-based distribution function algorithm. We construct a dataset and perform model training, fitting, and forecasting. The results indicate that compared with traditional neural networks and time-series models such as GRU and ARIMA, respectively, this approach can effectively use the data information of digital cryptocurrency and improve the prediction accuracy and interpretability of attention-based allocation functions. This study contributes to the literature by offering a new approach for stakeholders.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Improved convolutional neural network; Attention-based allocation function; Cryptocurrency price; Interpretable machine learning approach; Times series

【发表时间】2024

【收录时间】2024-08-21

【文献类型】 实证数据

【DOI】 10.1016/j.frl.2024.105846

Revisiting seasonality in cryptocurrencies

【Author】 Mueller, Lukas

【影响因子】9.848

【主题类别】

区块链治理-市场治理-数字货币

区块链治理-市场治理-价格预测

【Abstract】The evidence on seasonality in cryptocurrency returns is not robust. Although the positive Monday effect for Bitcoin is internally valid, it does not persist in data after 2015. We do not find robust evidence of return abnormalies but of lower trading activity on weekends. This finding is robust across 500 different coins. We also find that the Monday effect in the cross-section of coins is typically negative, but the confidence intervals remain wide.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】January effect; Monday effect; Weekend effect; Halloween effect; Cryptocurrencies; Bitcoin; Ethereum; Seasonality; Calendar anomalies

【发表时间】2024

【收录时间】2024-08-21

【文献类型】 实证数据

【DOI】 10.1016/j.frl.2024.105429

QBMA-BIV: Quantum-Key-Distribution (QKD)-Based Multi-Server Authentication Scheme for Blockchain-Enabled Internet of Vehicles

【Author】 Yang, Ze Shi, Qin Cheng, Teng Zhang, Qiang Liu, Qiang Liu, Yangyang Peng, Shenghao

CCF-B

【影响因子】9.551

【主题类别】

区块链应用-实体经济-车联网

【Abstract】With the rapid development of the Internet of Vehicles (IoV) and Intelligent Transportation, connected vehicles can access a variety of latency-sensitive cloud services to improve real-time road traffic conditions, driving safety and driving comfort. However, as the number of cloud service providers (CSPs) increases, vehicles and CSPs should efficiently complete authentication to ensure consistency and timeliness of IoV services. Moreover, many services are realized via public wireless channels, which are vulnerable to various security attacks and threats. Therefore, this paper proposes a secure and efficient authentication scheme for blockchain-enabled IoV based on quantum key distribution (QKD), called QBMA-BIV. The QBMA-BIV supports efficient authentication and re-authentication between vehicles and multiple servers through the lightweight signature algorithm and the quantum authentication keys. In QBMA-BIV, the authentication phase is achieved based on the QKD network and blockchain assistance, which is not dependent on third-party trusted centers and avoids the threat of a single point of failure. Furthermore, the security analysis demonstrates that QBMA-BIV could resist potential security attacks. Performance analysis also shows that QBMA-BIV could reduce computation and communication costs by 78.58 $\%$ - 86.87 $\%$ and 38.39 $\%$ -81.91 $\%$ compared to related schemes. Simulation and experiments show that QBMA-BIV has outstanding feasibility.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Authentication; Protocols; Blockchains; Cloud computing; Smart contracts; Servers; Elliptic curves; Internet of Vehicles; multi-server; authentication; blockchain; quantum key distribution (QKD)

【发表时间】2024

【收录时间】2024-08-21

【文献类型】 实验仿真

【DOI】 10.1109/TITS.2024.3432772

Efficient and Privacy-Preserving Skyline Queries Over Encrypted Data Under a Blockchain-Based Audit Architecture

【Author】 Zeng, Shuchang Hsu, Chingfang Harn, Lein Liu, Yining Liu, Yang

CCF-A

【影响因子】9.235

【主题类别】

区块链应用-实体经济-审计领域

【Abstract】Skyline queries is an advanced data mining algorithm suitable for multi-criteria decision-making scenarios (i.e., medical pre-diagnosis). Privacy-preserving skyline queries schemes are usually constructed by certain methods of cryptography such as additive homomorphic cryptosystem, secret sharing technology, etc. Interestingly, these secure skyline queries schemes require that skyline computations do not reveal any message details, including encrypted inter-tuple domination relations, among which privacy schemes based on homomorphic cryptosystems are the most popular due to their strong security. However, existing secure skyline queries schemes not only suffer from low computational efficiency, but also do not have sufficient security for privacy-key management in the system. To address the above issues, this paper designs an efficient and privacy-preserving skyline queries over encrypted data under a blockchain-based audit architecture. Firstly, we propose a blockchain-based audit architecture that not only provides error auditing functionality but also makes our scheme suitable for (distributed) multi-user scenarios while providing secure key management in the system. Secondly, we implement a series of secure sub-protocols using the CRT-Based Paillier encryption algorithm and construct a privacy sparse matrix elimination protocol to reduce the size of the dataset, leading to a significant reduction in computational cost without compromising privacy. Finally, we put forward our secure skyline queries protocol and prove its security. The performance evaluation shows that our proposed method our proposed method is significantly more efficient (at least 7.4 times faster) compared to current methods.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Protocols; Privacy; Data privacy; Computer architecture; Computational efficiency; Servers; Hardware; Blockchain-based auditing; distributed; privacy-key management; privacy-preserving; secure skyline queries

【发表时间】2024

【收录时间】2024-08-21

【文献类型】 实验仿真

【DOI】 10.1109/TKDE.2024.3373602

Smart Contract Vulnerability Detection Based on Automated Feature Extraction and Feature Interaction

【Author】 Li, Lina Liu, Yang Sun, Guodong Li, Nianfeng

CCF-A

【影响因子】9.235

【主题类别】

区块链技术-核心技术-智能合约

【Abstract】Smart contract is the core of blockchain operation, and contract vulnerability will cause huge economic losses. Therefore, effective smart contract vulnerability detection is of vital importance and attracts more and more attention. In this paper, we propose a vulnerability detection model (VDM-AEI) based on automatic feature extraction and feature interaction. For the first time, this model converts smart contracts into gray images and uses VGG16 and GRU models to automatically extract vulnerability features and filter effective features, respectively. Then, a contract graph and an expert knowledge feature vector are constructed by using commonly used methods as part of feature construction. Next, AutoInt and DCN networks are used to build a dual feature interaction network to obtain more abundant vulnerability feature information, which extracts high-dimensional nonlinear features from the low and sparse features of the contract graph feature vector and the expert knowledge-defined feature vector. Finally, all output features of GRU, AutoInt and DCN networks are integrated to obtain vulnerability classification results through fully connected neural networks. We conducted extensive experiments on the ESC and VSC datasets for reentrancy vulnerabilities, timestamp dependency vulnerabilities, and infinite loop vulnerabilities. The experimental results prove the effectiveness and accuracy of the VDM-AEI model. Compared with the latest vulnerability detection model CGE, the accuracy rates of the 3 types of vulnerability detection are improved by 10.85%, 6.18%, and 12.34%, respectively. In addition, the predicted F1 scores of VDM-AEI are all greater than 95%, and the recall rate is no less than 94%.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Feature extraction; Smart contracts; Deep learning; Codes; Blockchains; Flow graphs; Data mining; Smart contract; vulnerability detection; feature engineering; deep learning; feature interaction

【发表时间】2024

【收录时间】2024-08-21

【文献类型】 实验仿真

【DOI】 10.1109/TKDE.2023.3333371

Two-stage evolutionary game model on complex networks for emergency logistics based on blockchain platform

【Author】 Xue, Rudan Xiong, Li

CCF-C

【影响因子】8.665

【主题类别】

区块链应用-实体经济-物流领域

【Abstract】Enhancing the efficiency of emergency logistics is essential to reinforce the response capacity to emergencies. It requires collaborative efforts from both the emergency management departments and logistics enterprises. However, the capability for information docking between these organizations substantially influences the efficiency of emergency materials transportation. Blockchain, as an emerging information technology, has the potential to substantially enhance the efficiency and security of information docking through its unique characteristics. Additionally, logistics enterprises share information and resources based on the blockchain platform, aiming to ensure fast, efficient, and reliable collaborative transportation of emergency materials to impacted regions. Therefore, we propose a two-stage evolutionary game analysis of emergency materials collaborative transportation based on this platform. First, we develop a first-stage evolutionary game model to analyze the challenges associated with building a blockchain platform among emergency management departments and logistics enterprises. Subsequently, a second-stage evolutionary game model is devised to bolster the willingness of logistics enterprises based on this platform for collaborative transportation of emergency materials. Third, to validate the theoretical findings of the two-stage game model, two scale-free networks are employed for numerical simulations. As those networks evolve, the edges among nodes and the strategy choices of nodes in those networks likewise change. Numerical simulations are performed based on those networks to scrutinize the sensitivity of factors influencing strategic choice among game stakeholders. Ultimately, certain management insights gleaned from the findings can assist emergency management departments and logistics enterprises in making more informed decisions in the future.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Emergency materials; Collaborative transportation; Evolutionary game; Complex network; Blockchain

【发表时间】2024

【收录时间】2024-08-21

【文献类型】 实验仿真

【DOI】 10.1016/j.eswa.2024.124925

Does every cloud (bubble) have a silver lining? An investigation of ESG financial markets

【Author】 Foglia, Matteo Miglietta, Federica

【影响因子】8.222

【主题类别】

区块链应用-虚拟经济-金融领域

【Abstract】This paper investigates the presence of financial bubbles in the environmentally friendly investments captured by the ESG markets. By using the log-periodic power law singularity framework, we identified several periods of positive and negative bubbles in the short, medium, and long term. Moreover, we examined the relationship between ESG attention sentiment and financial bubbles. We found an asymmetric effect of ESG sentiment on financial bubbles, i.e., increasing positive and decreasing negative bubbles. Our empirical results provide valuable insights into the stability of environmentally friendly markets, which help risk managers and policymakers respond appropriately to financial and social bubbles.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】ESG; Sentiment; Financial bubble; Social bubble hypothesis; Capital markets; Log-periodic power law singularity; Climate performance

【发表时间】2024

【收录时间】2024-08-21

【文献类型】 实证数据

【DOI】 10.1016/j.jbef.2024.100928

Blockchain technology empowers the cross-border dual-channel supply chain: Introduction strategy, tax differences, optimal decisions☆

【Author】 Jiang, Lin Yao, Aibo Li, Wei Wei, Qi

【影响因子】7.180

【主题类别】

区块链应用-实体经济-供应链

【Abstract】Fueled by the widespread adoption of blockchain technology in supply chain management and international trade, this paper develops a cross-border dual-channel supply chain consisting of a domestic manufacturer, a domestic cross-border e-commerce company, and an overseas physical store. This paper aims to explore the impacts of tax differences, market competition intensity, consumers' sensitivity to products with blockchain attributes, blockchain technology investment costs, and production quantity deviations on the strategies for adopting blockchain technology. Through simulation analysis, this study compares blockchain investment efforts, wholesale prices, retail prices, and the profits generated by supply chain members across different scenarios. The results show that when production quantity deviations are greater than 0, the domestic manufacturer's adoption of blockchain technology provides free-riding benefits to other supply chain members, thereby enhancing the overall profitability of the supply chain. However, the introduction of blockchain technology by the domestic manufacturer does not always yield benefits; when the production quantity deviations are less than 0 and the blockchain investment cost coefficient is too high, it decreases the willingness of the domestic manufacturer to adopt blockchain technology. Moreover, from a profit maximization perspective, regardless of the changes in production quantity deviations and whether the domestic manufacturer introduces blockchain technology, both the domestic cross-border e-commerce company and the overseas physical store should adopt blockchain technology. Finally, The five influencing factors mentioned earlier will, to some extent, affect the profits and decision-making of supply chain members, suggesting that these members should vigilantly track these variables.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain technology; Supply chain management; Cross-border dual-channel supply chain; Tax differences; Stackelberg game

【发表时间】2024

【收录时间】2024-08-21

【文献类型】 实验仿真

【DOI】 10.1016/j.cie.2024.110431

Interlinking FinTech and eHealth: a qualitative study

【Author】 Al-Anezi, Fahad

【影响因子】6.461

【主题类别】

区块链应用-实体经济-医疗领域

【Abstract】Introduction This study investigates the integration of financial technology (FinTech) and electronic health (eHealth) to explore the opportunities, challenges, and implications arising from their interlinkage in Saudi Arabia.Methods Utilizing qualitative semi-structured interviews with 26 participants-including physicians, patients, technical and administrative managers, and FinTech consultants-the research adopts an inductive approach to understand diverse perspectives.Results Key findings reveal significant benefits such as improved efficiency in administrative processes, enhanced access to healthcare services, increased financial inclusion, better decision-making, improved patient experience, and the promotion of innovation and sustainability. However, barriers including regulatory challenges, data privacy and security concerns, interoperability issues, the digital divide, resistance to change, and cost implications were also identified.Conclusion Overall, the integration of FinTech and eHealth holds substantial promise for advancing healthcare delivery in Saudi Arabia. Future implications include the expansion of telehealth services, an increase in startups, the integration of wearable health devices, blockchain-based systems, evolving regulatory frameworks, and heightened collaborations. Addressing the identified challenges is crucial for realizing the full potential of this integration.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】FinTech; eHealth; Saudi Arabia; interlink; benefits; healthcare; digital payments

【发表时间】2024

【收录时间】2024-08-21

【文献类型】 实证数据

【DOI】 10.3389/fpubh.2024.1398136

Blockchain-based IoT security solutions for IDS research centers

【Author】 Hizal, Selman Akhter, A. F. M. Suaib Cavusoglu, Unal Akgun, Devrim

【影响因子】5.711

【主题类别】

区块链应用-实体经济-物联网

【Abstract】The rapid evolution of the Internet of Things (IoT) has connected real-world objects to the Internet, enhancing digital interaction and introducing critical security vulnerabilities. Intrusion Detection Systems (IDS) are essential in identifying threats and protecting Internet of Things devices from cyberattacks. A secure, decentralized platform enabled by blockchain technology offers the optimal solution for researchers worldwide to collaboratively address the challenges of IoT security effectively. This study introduces a blockchain-based IDS research center to strengthen IoT network security via global collaboration. It demonstrates the benefits of combining IDS with blockchain to improve cybersecurity in research centers, facilitating the efficient sharing of security solutions. By defining various node types on the blockchain, the platform ensures controlled access to services and streamlined network management through specific authorizations. Research centers can contribute to the blockchain with their findings, whereas others utilize the platform to access IDS services. Our work uses machine learning algorithms to achieve promising performance in detecting DDoS attacks, with the XGBoost algorithm demonstrating good results compared to the literature. The findings illustrate how effectively the presented approach works with blockchain technology and the CiCIoT2023 dataset to provide safe and decentralized information sharing.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】IoT security; Blockchain; Machine learning; Intrusion detection system; DDoS

【发表时间】2024

【收录时间】2024-08-21

【文献类型】 实验仿真

【DOI】 10.1016/j.iot.2024.101307

Role and attribute-based access control scheme for decentralized medicine supply chain

【Author】 Hathaliya, Jigna J. Tanwar, Sudeep

【影响因子】4.960

【主题类别】

区块链应用-实体经济-供应链

【Abstract】The medicine supply chain (MSC) is an intricate structure that extends across multiple organizations and geographic locations and is an important basis for essential daily services. It involves manufacturing, distributing, and delivering medicine to patients. The intermediaries in the MSC include manufacturers, warehouses, distributors, transporters, retailers, consumers, and patients, in which each intermediary plays a vital role and responsibility in an MSC. MSC poses different challenges, such as medicine counterfeiting, data temperament, and cold chain shipping, leading to various security and privacy issues. To overcome the aforementioned issues, public blockchain (BC) provides transparency, traceability, and data security to some extent but often fails to protect MSC's data privacy. To address the aforementioned, we adopted the Hyperledger Fabric consortium BC, which preserves the data security and privacy of the proposed scheme. Hyperledger Fabric uses a role-based access control (RBAC) policy for all writers and readers, where each reader and writer accesses all the smart contract information based on their static roles (reader and writer). This RBAC scheme limits the dynamicity and granularity of the access control. With this concern, we adopt the combination of RBAC and attribute-based access control (ABAC) schemes to provide fine-grained access to the smart contract functions. Additionally, we use a distributed interplanetary file system (IPFS) to enhance the scalability of the proposed scheme. Before saving data, IPFS does not use any encryption algorithm. We embraced the advanced encryption standard (AES) algorithm to encrypt MSC data. Next, we integrated RBAC and fine-grained ABAC through smart contracts to prevent unauthorized access in an MSC environment. Further, the proposed scheme is evaluated using various performance parameters, such as scalability for different number of clients, average latency (0.12 s), minimum execution time is around (115 s) for 100 transactions execution, and throughput of (72.5) transactions per second (TPS) of invoke-based smart contract functions while 618.7 (TPS) for query-based smart contract functions.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】InterPlanetary file system; Hyperledger Fabric; Medicine supply chain; Hyperledger Calliper; Role based access control; Attribute based access control; Blockchain

【发表时间】2024

【收录时间】2024-08-21

【文献类型】 实证数据

【DOI】 10.1016/j.jisa.2024.103851

Decentralized peer-to-peer energy trading in microgrids: Leveraging blockchain technology and smart contracts

【Author】 Saeed, Nimrah Wen, Fushuan Afzal, Muhammad Zeshan

【影响因子】4.937

【主题类别】

区块链应用-实体经济-能源领域

【Abstract】Microgrids are regarded as vital components in contemporary realm of energy system improvement, resilience, and sustainability. In this paper a novel decentralized peer-to-peer energy trading system leveraging blockchain technology is proposed. The proposed model not only demonstrates the implementation of blockchain technology in microgrids but also transforms the energy sector by emphasizing decentralization, security and efficiency. This research aims to enhance the energy trading system by including smart contracts written on the Ethereum network. Energy Token and Demand Response contracts are integrated to enable dynamic interactions inside microgrids, which leads to a transparent, secure, and efficient energy trading system. Moreover, automation of energy transactions and elimination of intermediaries ensure cost effectiveness and utilization of excess energy potentially reduce dependency on the main grid. A microgrid system is designed in Simulink for distributed energy trading. Energy credits are represented by standard ERC-20 digital token and then demand response contract dynamically adjusts rewards and energy prices based on energy production and consumption. the ERC-20 contract manages the token transaction and then demand response contract enforces governance rules. The purpose of a demand response contract is to enable the automatic and efficient control of energy usage in response to changing demand and supply conditions. The use of the Web3 library further facilitates a direct and smooth connection between the blockchain network and microgrids. The results demonstrate the successful implementation of both smart contracts, making trading possible at noon when the combined generation from solar array and energy management system exceed the energy demand.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; Smart contract; Web 3; Microgrid; Demand response

【发表时间】2024

【收录时间】2024-08-21

【文献类型】 实验仿真

【DOI】 10.1016/j.egyr.2024.07.053

Oracle Based Privacy-Preserving Cross-Domain Authentication Scheme

【Author】 Su, Yuan Wang, Yuheng Li, Jiliang Su, Zhou Pedrycz, Witold Hu, Qinnan

CCF-C

【影响因子】4.908

【主题类别】

区块链技术-核心技术-身份验证

【Abstract】The Public Key Infrastructure (PKI) system is the cornerstone of today's security communications. All users in the service domain covered by the same PKI system are able to authenticate each other before exchanging messages. However, there is identity isolation in different domains, making the identity of users in different domains cannot be recognized by PKI systems in other domains. To achieve cross-domain authentication, the consortium blockchain system is leveraged in the existing schemes. Unfortunately, the consortium blockchain-based authentication schemes have the following challenges: high cost, privacy concerns, scalability and economic unsustainability. To solve these challenges, we propose a scalable and privacy-preserving cross-domain authentication scheme called Bifrost-Auth. Firstly, Bifrost-Auth is designed to use a decentralized oracle to directly interact with blockchains in different domains instead of maintaining a consortium blockchain and enables mutual authentication for users lying in different domains. Secondly, users can succinctly authenticate their membership of the domain by the accumulator technique, where the membership proof is turned into zero knowledge to protect users' privacy. Finally, Bifrost-Auth is proven to be secure against various attacks, and thorough experiments are carried out and demonstrate the security and efficiency of Bifrost-Auth.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; cross-domain authentication; decentralized Oracle; privacy-preserving; Blockchain; cross-domain authentication; decentralized Oracle; privacy-preserving

【发表时间】2024

【收录时间】2024-08-21

【文献类型】 实验仿真

【DOI】 10.1109/TSUSC.2024.3350343

A Novel Resource Management Framework for Blockchain-Based Federated Learning in IoT Networks

【Author】 Mishra, Aman Garg, Yash Pandey, Om Jee Shukla, Mahendra K. Vasilakos, Athanasios V. Hegde, Rajesh M.

CCF-C

【影响因子】4.908

【主题类别】

区块链应用-实体经济-物联网

【Abstract】At present, the centralized learning models, used for IoT applications generating large amount of data, face several challenges such as bandwidth scarcity, more energy consumption, increased uses of computing resources, poor connectivity, high computational complexity, reduced privacy, and large latency towards data transfer. In order to address the aforementioned challenges, Blockchain-Enabled Federated Learning Networks (BFLNs) emerged recently, which deal with trained model parameters only, rather than raw data. BFLNs provide enhanced security along with improved energy-efficiency and Quality-of-Service (QoS). However, BFLNs suffer with the challenges of exponential increased action space in deciding various parameter levels towards training and block generation. Motivated by aforementioned challenges of BFLNs, in this work, we are proposing an actor-critic Reinforcement Learning (RL) method to model the Machine Learning Model Owner (MLMO) in selecting the optimal set of parameter levels, addressing the challenges of exponential grow of action space in BFLNs. Further, due to the implicit entropy exploration, actor-critic RL method balances the exploration-exploitation trade-off and shows better performance than most off-policy methods, on large discrete action spaces. Therefore, in this work, considering the mobile scenario of the devices, MLMO decides the data and energy levels that the mobile devices use for the training and determine the block generation rate. This leads to minimized system latency and reduced overall cost, while achieving the target accuracy. Specifically, we have used Proximal Policy Optimization (PPO) as an on-policy actor-critic method with it's two variants, one based on Monte Carlo (MC) returns and another based on Generalized Advantage Estimate (GAE). We analyzed that PPO has better exploration and sample efficiency, lesser training time, and consistently higher cumulative rewards, when compared to off-policy Deep Q-Network (DQN).

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Internet of Things (IoT); actor-critic reinforcement learning; federated learning; blockchain; resource managemnet; queuing theory; exploration-exploitation; Internet of Things (IoT); actor-critic reinforcement learning; federated learning; blockchain; resource managemnet; queuing theory

【发表时间】2024

【收录时间】2024-08-21

【文献类型】 实验仿真

【DOI】 10.1109/TSUSC.2024.3358915

Blockchain-supported online banking scheme

【Author】 Tsai, Chien-Hua Liou, Dah-Kwei Lee, Hsiu-Li

【影响因子】4.195

【主题类别】

区块链应用-实体经济-银行领域

【Abstract】Online banking not merely enables customers to make transactions within a short time and access transactional information anywhere but also facilitates financial institutions to simplify transaction procedures and reduce their operating expenses. Common concerns by both customers and financial institutions are the secure authentication measures for protecting sensitive financial information from cybersecurity threats and maintaining their trust in a secure environment. This paper presents a blockchain-supported scheme to establish secure authentication and mutual trust for handling online banking processes. The proposed solution's model design, inference process, proof method, security analysis, and performance evaluation are included in this study. With the decentralized applications and smart contracts, that benefit from disruptive innovations in blockchain technology, the proposed scheme enables financial institutions to provide efficient, immutable, transparent, and secure online financial services for customers. In addition, the computational efforts of the proposed solution show that high performance can be achieved in executing financial transactions while safeguarding sensitive data and retaining trust in a decentralized environment which is some of the most significant weak security of the existing authentication schemes for online banking platforms.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Online banking; Blockchain technology; Disruptive innovation; Decentralized application; Smart contract

【发表时间】2024

【收录时间】2024-08-21

【文献类型】 理论模型

【DOI】 10.1016/j.eij.2024.100516

CRBFT: A Byzantine Fault-Tolerant Consensus Protocol Based on Collaborative Filtering Recommendation for Blockchains

【Author】 Wu, Xiangyu Du, Xuehui Yang, Qiantao Liu, Aodi Wang, Na Wang, Wenjuan

【影响因子】3.860

【主题类别】

区块链技术-协同技术-共识机制

【Abstract】Blockchain has been widely used in finance, the Internet of Things (IoT), supply chains, and other scenarios as a revolutionary technology. Consensus protocol plays a vital role in blockchain, which helps all participants to maintain the storage state consistently. However, with the improvement of network environment complexity and system scale, blockchain development is limited by the performance, security, and scalability of the consensus protocol. To address this problem, this paper introduces the collaborative filtering mechanism commonly used in the recommendation system into the Practical Byzantine Fault Tolerance (PBFT) and proposes a Byzantine fault-tolerant (BFT) consensus protocol based on collaborative filtering recommendation (CRBFT). Specifically, an improved collaborative filtering recommendation method is designed to use the similarity between a node's recommendation opinions and those of the recommender as a basis for determining whether to adopt the recommendation opinions. This can amplify the recommendation voice of good nodes, weaken the impact of cunning malicious nodes on the trust value calculation, and make the calculated results more accurate. In addition, the nodes are given voting power according to their trust value, and a weight random election algorithm is designed and implemented to reduce the risk of attack. The experimental results show that CRBFT can effectively eliminate various malicious nodes and improve the performance of blockchain systems in complex network environments, and the feasibility of CRBFT is also proven by theoretical analysis.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; consensus; byzantine fault-tolerant; collaborative filtering; trust

【发表时间】2024

【收录时间】2024-08-21

【文献类型】 实验仿真

【DOI】 10.32604/cmc.2024.052708

QBIoT: A Quantum Blockchain Framework for IoT with an Improved Proof-of-Authority Consensus Algorithm and a Public-Key Quantum Signature

【Author】 Liu, Ang Zhang, Qing Xu, Shengwei Feng, Huamin Chen, Xiu-bo Liu, Wen

【影响因子】3.860

【主题类别】

区块链技术-协同技术-量子区块链

【Abstract】The Internet of Things (IoT) is a network system that connects physical devices through the Internet, allowing them to interact. Nowadays, IoT has become an integral part of our lives, offering convenience and smart functionality. However, the growing number of IoT devices has brought about a corresponding increase in cybersecurity threats, such as device vulnerabilities, data privacy concerns, and network susceptibilities. Integrating blockchain technology with IoT has proven to be a promising approach to enhance IoT security. Nevertheless, the emergence of quantum computing poses a significant challenge to the security of traditional classical cryptography used in blockchain, potentially exposing it to quantum cyber-attacks. To support the growth of the IoT industry, mitigate quantum threats, and safeguard IoT data, this study proposes a robust blockchain solution for IoT that incorporates both classical and post-quantum security measures. Firstly, we present the Quantum-Enhanced Blockchain Architecture for IoT (QBIoT) to ensure secure data sharing and integrity protection. Secondly, we propose an improved Proof of Authority consensus algorithm called "Proof of Authority with Random Election" (PoARE), implemented within QBIoT for leader selection and new block creation. Thirdly, we develop a public- key quantum signature protocol for transaction verification in the blockchain. Finally, a comprehensive security analysis of QBIoT demonstrates its resilience against cyber threats from both classical and quantum adversaries. In summary, this research introduces an innovative quantum-enhanced blockchain solution to address quantum security concerns within the realm of IoT. The proposed QBIoT framework contributes to the ongoing development of quantum blockchain technology and offers valuable insights for future research on IoT security.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】IoT; quantum blockchain; public-key quantum signature; quantum hash function

【发表时间】2024

【收录时间】2024-08-21

【文献类型】 实验仿真

【DOI】 10.32604/cmc.2024.051233

A consent-aware electronic medical records sharing method based on blockchain

【Author】 Qu, Xiao Yang, Zhexuan Chen, Zeng Sun, Guozi

【影响因子】3.721

【主题类别】

区块链应用-实体经济-医疗领域

【Abstract】Electronic medical records (EMRs) sharing has become a vital component of the modern health care system, which involves patients, The Medical Institution with Medical Records (MI-MR), and The Medical Institution Requiring Medical Records (MI-RMR) within this ecosystem. Currently, a substantial amount of research focuses on the security, authenticity, and privacy of the shared information. However, there is a shortage of attention on design and research that adequately reflect personal rights and interests of patients. We propose a consent- aware EMR sharing method leveraging blockchain technology, which not only preserves patients' right to be informed, but also fulfills the fundamental needs for security and privacy in EMR sharing. Furthermore, it ensures transparency and decentralization in the sharing process and incorporates on-chain verification mechanisms against malicious alteration of blockchain data. To enhance system scalability, a secure off- chain storage mechanism has been implemented. Our experimental findings underscore the practicality of our smart contract on Ethereum, along with its economic benefits, evaluated using tests conducted on a Ganachebased Ethereum blockchain network and a Remix-based Ethereum blockchain network. The performance and advantages of the proposed architecture have been corroborated through a prototype implementation using Ethereum.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; Data sharing; Smart contracts; Ring signature; Privacy protection

【发表时间】2025

【收录时间】2024-08-21

【文献类型】 实验仿真

【DOI】 10.1016/j.csi.2024.103902

EduCopyRight-Chain: an educational resources copyright protection system utilizing permissionless blockchain and non-fungible tokens

【Author】 Rani, Prity Sachan, Rohit Kumar Kukreja, Sonal

CCF-C

【影响因子】3.488

【主题类别】

区块链应用-实体经济-教育领域

【Abstract】Blockchain technology and non-fungible tokens have gained significant attention and widespread adoption due to their unique characteristics and potential for innovation in numerous industries, including education. In recent years, there has been a significant increase in digital learning resources such as multimedia-rich learning content, audio content, and online course content. The advancement of these learning resources has introduced several copyright challenges, such as copyright ownership, fair use of resources, licensing agreements, open educational resources and Creative Commons licenses, digital piracy, and international considerations. Copyright infringement in educational learning resources poses a significant concern that impacts content creators hugely and raises concerns regarding the quality and reliability of the content. This work proposes a copyright protection framework named EduCopyRight-Chain for educational resources using the Ethereum blockchain and non-fungible tokens to overcome concerning challenges. This work also presents a sharding approach within the proposed framework to enhance scalability. Additionally, this work proposes wallet generation, network joining, educational resource tokenization, and a verification approach by utilizing blockchain and non-fungible tokens. The proposed framework uses a Proof-of-Authority consensus mechanism to validate transactions over the peer-to-peer network, and an inter-planetary file system is used for the decentralized storage of associated records. This framework uses Remix IDE, MetaMask wallet, and the Sepolia test network. We use the BlockSim simulation toolkit to conduct experiments to evaluate the performance of the proposed framework in terms of throughput, latency, response time, and standard deviation. The proposed framework achieves an average throughput of 354.26 TPS, a latency of 62.2 milliseconds, a response time of 124.1 milliseconds, and a standard deviation of 144.2 milliseconds. This work also conducts a comparative analysis to assess security features and limitations between the proposed framework and related work. Our observation reveals that the proposed EduCopyRight-Chain framework has better features.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; Copyright; Educational resources; Ethereum; Smart contract; Education; NFT

【发表时间】2024

【收录时间】2024-08-21

【文献类型】 实验仿真

【DOI】 10.1007/s12083-024-01781-0

RaftOptima: An Optimised Raft With Enhanced Fault Tolerance, and Increased Scalability With Low Latency

【Author】 Kondru, Kiran Kumar Rajiakodi, Saranya

【影响因子】3.476

【主题类别】

区块链技术-协同技术-共识机制

【Abstract】In cloud computing and distributed databases, ensuring strong consistency and system reliability of the leader depends on distributed consensus algorithms such as Raft and Paxos. Raft is particularly appreciated for its simplicity and ease of understanding, making it a go-to choice for contemporary distributed systems. However, it faces challenges in efficiency and reliability, especially during network interruptions and when scaling up. The growing dependence on these consensus protocols for modern applications calls for improvements to address these issues. This paper presents RaftOptima, an advanced version of the Raft algorithm, which incorporates proxy leaders into the system to enhance scalability and introduces robustness against network failures. RaftOptima distributes the tasks of command distribution and gathering responses to proxy leaders, aiming to mitigate Raft's scalability problems and efficiency bottlenecks. Through simulations and TLA+ verification, RaftOptima showed 60% reduction in latency in configurations with up to 25 servers, highlighting its ability to significantly improve performance. Our improvements also increased the resilience of the Raft algorithm against partial network issues. This adaptation not only enhances Raft's operational effectiveness, but also its applicability and reliability in distributed systems for modern computing demands, meeting the critical demand for better scalability and liveness.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Raft consensus; aliveness; partial network partitions; scalability; proxy leaders; decreased latency; simulation; Raft consensus; aliveness; partial network partitions; scalability; proxy leaders; decreased latency; simulation

【发表时间】2024

【收录时间】2024-08-21

【文献类型】 实验仿真

【DOI】 10.1109/ACCESS.2024.3435978

How does the time-varying dynamics of spillover between clean and brown energy ETFs change with the intervention of climate risk and climate policy uncertainty?

【Author】 Banerjee, Ameet Kumar Ozer, Zeynep Sueda Rahman, Ramizur Sensoy, Ahmet

【影响因子】3.399

【主题类别】

区块链治理-法律治理-数字资产

【Abstract】This paper studies how climate change risks and uncertainty in climate policies impact asset pricing. We analyze this issue through the interaction mechanism between clean and brown energy ETFs. We choose energy ETFs for their broader role in the transition phase as investment flows into clean energy ETFs with rising climate change risks. The paper analyzes the changing dynamics of interconnectedness between clean and carbon-energy assets as they differ in transmitting and receiving shocks between normal versus crisis periods in the backdrop of climate risk. Using daily data of clean and brown energy instruments with the TVP-VAR framework, we show that the asymmetric connectedness between the two instruments increases during crises. Specific clean and brown instruments are either net givers or receivers, and the climate risk and policy uncertainty variables are net receivers throughout the study periods. The results bring newer insights into interconnectivity, which have significant implications for market participants, especially for policymakers strategizing risk mitigation policies and the fund management industry for broader diversification and eco-savvy investors investing in eco-efficient portfolios offering better risk-return tradeoffs.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Climate risk; Policy uncertainty; ETFs; TVP-VAR

【发表时间】2024

【收录时间】2024-08-21

【文献类型】 实验仿真

【DOI】 10.1016/j.iref.2024.03.046

An empirical study on driving blockchain adoption in Maritime freight: an Asian business perspective

【Author】 Singh, Suneet Pratap, Saurabh Dwivedi, Ashish Lakshay

【影响因子】3.319

【主题类别】

区块链治理-技术治理-技术采用

【Abstract】PurposeIn the existing era, international trade is boosted by maritime freight movement. The academicians and Government are concerned about environmental contamination caused by maritime goods that transit global growth and development. Digital technologies like blockchain help the maritime freight business to stay competitive in the digital age. This study aims to illuminate blockchain technology (BCT) adoption aspects to alleviate early industry adoption restrictions.Design/methodology/approachThis study adopts a two-stage approach comprising of structural equation modeling (SEM) with artificial neural networks (ANN) to analyze critical factors influencing the adoption of BCT in the sustainable maritime freight industry.FindingsThe SEM findings from this study illustrate that social, organizational, technological and infrastructual and institutional factors affect BCT execution. Furthermore, the ANN technique uses the SEM data to determine that sustainability enabled digital freight training (S3), initial investment cost (O5) and trust over digital technology (G1) are the most essential blockchain deployment factors.Originality/valueThe hybrid approach aims to help decision-makers and policymakers examine their organizational blockchain adoption goals to construct sustainable, efficient and effective maritime freight transportation.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Maritime freight transportation; Asian business; Blockchain; Digitization; Sustainability; SEM; ANN

【发表时间】2024

【收录时间】2024-08-21

【文献类型】 实证数据

【DOI】 10.1108/JBIM-11-2023-0691

Should brand-owners adopt blockchain to combat deceptive counterfeits when competing with copycats? Impact of consumers' anticipated regret

【Author】 Guan, Zhimin Yu, Tianyang Dong, Jingyang Zhang, Jun

【影响因子】1.379

【主题类别】

区块链应用-实体经济-营销领域

【Abstract】Original products (sold by a brand-owner) are exposed to the dual challenge of imitation products (sold by a copycat) and deceptive counterfeit products (provided by a counterfeiter). In such cases, consumers face higher shopping risks and are more likely to experience post-purchase regret. Blockchain can prevent the infiltration of deceptive counterfeits and the occurrence of regret, but its adoption can also raise consumer privacy concern. Hence, considering the above factors, we focus on the brand-owner's blockchain adoption strategy. First, we define two types of regret: counterfeit-purchasing regret (CPR) and low-cost-effective regret (LCR). Second, we consider three scenarios: scenario NR: without blockchain and considering only CPR, scenario NT: without blockchain and considering only LCR, and Scenario B: with blockchain. Finally, we compare the equilibrium results under scenarios NR and NT with those under scenario B, respectively. We interestingly find that blockchain adoption benefits the brand-owner when (1) privacy concern is low or (2) privacy concern is moderate and the sensitivity factor of CPR is large or the sensitivity factor of LCR is small. Therefore, we advise brand-owners to intervene in consumers' sensitivity to regret in order to make blockchain adoption work in their favor.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】

【发表时间】2024

【收录时间】2024-08-21

【文献类型】 实验仿真

【DOI】 10.1002/mde.4358

A Novel Identity Authentication Mechanism for Unmanned Maritime Vessels Communication Based on MITRE ATT&CK & CK Framework

【Author】 He, Jun-Xian Chang, Shih-Hao

【影响因子】0.462

【主题类别】

区块链应用-实体经济-物联网

【Abstract】With the development of the smart shipping industry, unmanned vessel technology is rapidly evolving, accompanied by a demand for robust Internet of Things (IoT) communication security practices. Key communication technologies for the operation of unmanned vessels include external vessel communication. One crucial aspect is the verification fi cation of the identities of the parties involved in these communication systems, as this ensures secure and trusted interactions between unmanned vessels and port management authorities. Identity authentication plays a vital role in ensuring the secure communication of unmanned vessels. This paper aims to analyze potential risks related to identity authentication technology in unmanned vessel communication systems. To effectively address these risks, we propose leveraging digital certificates fi cates and blockchain technology to achieve device non-repudiation and substitution. Based on this technology, we organize and implement defense strategies using the MITRE ATT&CK & CK framework. This framework provides a comprehensive and systematic approach to understanding potential threats and designing appropriate defense measures. By utilizing this framework, security teams can better comprehend vulnerabilities and formulate effective countermeasures. To validate the effectiveness of the proposed defense framework, we conducted simulation experiments. These experiments helped us evaluate the efficiency fi ciency and reliability of the strategies in real-world scenarios. Through these experiments, we could ascertain whether the countermeasures effectively mitigated the identified fi ed risks and ensured the secure communication of unmanned vessels.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Unmanned ship; Internet-of-Things; Certificate; fi cate; Authentication; MITER ATT&CK; UUID; UUID

【发表时间】2024

【收录时间】2024-08-21

【文献类型】 实验仿真

【DOI】 10.51400/2709-6998.2736

在线标注

备案号: 苏ICP备17025947号-5

评论回复