• 首页
  • 每日更新
  • 文献
  • 会议文献
  • 政策法规
  • 研究专题
  • 区块链游戏
logo 区块链前沿
  • 区块链前沿
  • 首页
  • 每日更新
  • 文献
  • 会议文献
  • 政策法规
  • 研究专题
  • 区块链游戏
  • 文章创新角色
  • 科研创新指数
  • 区块链领域本体
  • 热点主题挖掘
  • 主题展示
  • 专利文献
  • 排行榜
  • DAO治理
  • 文献上传
  • 积分获取规则
  • 大语言模型解析
  • 期刊发文分布
注册 登录

2024年09月23日 33篇

文献来源

  • 33

主题分类

      • 1
      • 2
      • 1
      • 1
      • 1
      • 1
      • 1
      • 2
      • 1
      • 1
      • 2
      • 1
      • 2
      • 1
      • 1
      • 1
      • 1
      • 1
      • 1
      • 1
      • 2
      • 1
      • 1
      • 1
      • 1
      • 1
      • 1
      • 1
      • 1

文献类型

  • 1
  • 14
  • 15
  • 1
  • 2
筛选
订阅
<< 前一天 后一天 >>

Formation and regulation strategies for volatile off-flavor compounds in livestock meat, poultry meat, and their products: A comprehensive review

【Author】 Ren, Yue Wang, Yilin Zhang, Yuxin Yang, Zhongshuai Ma, Zhiming Chen, Jiaxin Chen, Xintong Qiu, Zecheng Tian, Jing Pu, Aofei Yin, Junjie Guo, Mei Song, Yating Guo, Jiajun Feng, Yuqin Liu, Guishan

【影响因子】16.002

【主题类别】

区块链应用-实体经济-食品领域

【Abstract】Background: Livestock and poultry and their meat products (LPMP) are significant in providing human nutrients. However, the presence of off-flavors such as boar taint from pork, "mutton" odor from mutton, and so on poses challenges to consumer acceptability. Hence, exploring the sources of off-flavors and ways to reduce off-flavors is particularly vital for the increasing consumption of the market. Scope and approach: This review discusses the causes and mechanisms of off-flavor formation, and the physical, chemical, and biological means of off-flavor removal in LPMP are systematically and comprehensively reviewed. Finally, it summarizes the current challenges and prospects of off-flavors control in LPMP. Key findings and conclusions: Before slaughter, the off-flavors like boar taint, "grazing" flavor, etc. may be affected by species, sex, and feeding conditions. During the slaughtering, environment, and method may have an influence. Subsequently, handling methods at the stages of cooking and processing, packaging and storage can affect the development of specific off-flavors like "warm" and "rancid" flavors. These off-flavors are primarily attributed to lipid oxidation and degradation, protein oxidation and degradation, and microbial metabolism. Lastly, some novel removal techniques including electrolyzed water, ultrasound thawing, supercritical carbon dioxide, cold plasma, antioxidant active film, microbial fermentation, etc. which have shown good properties in slowing off-odors are summarized. The trend of composite methods, smart technologies, and blockchain is expected to show promising prospects in the future. These can provide certain ideas for the improvement of the quality and the industrial development of LPMP.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Livestock and poultry; Off-flavor; Formation mechanism; Regulation strategies; Smart packaging and blockchain

【发表时间】2024

【收录时间】2024-09-23

【文献类型】 综述

【DOI】 10.1016/j.tifs.2024.104689

An exploration method for technology forecasting that combines link prediction with graph embedding: A case study on blockchain

【Author】 Wang, Liang Li, Munan

【影响因子】10.884

【主题类别】

区块链治理-市场治理-链上信息预测

【Abstract】To keep pace with the latest technological changes and advancements, predicting future technological trends and topics has become a critical approach for high-tech companies and policy-making institutions. In this paper, we proposed an explorative method that integrates link prediction and Node2Vec graph embedding to predict future technology topics using co-occurrence data from patent keywords. Specifically, this method collects and preprocesses patent datasets, constructs network graphs that depict relationships among different technology topics, and builds a supervised link prediction model based on the time series of the graph to identify future technology graphs. Furthermore, node2vec graph embedding is conducted to obtain node vector representations, and then the clustering algorithms can be improved to identify the relevant topics, which could be interpreted as future technology. A case study on blockchain is conducted to validate the feasibility and practicality of the method to demonstrate the application of the method. Through the comparison of machine learning methods, we selected the Random Forest (RF) model, which presents the highest accuracy, for our experiments. The results show that the proposed method can be used to effectively visualize potential future topics related to a specific technology. Compared to traditional methods such as Latent Dirichlet Allocation (LDA), our method can identify more unique and differentiated technological topics, significantly reducing topic overlap. Additionally, the reported method can illustrate the internal relationships of topics through subgraphs, helping readers better understand the core concepts of each topic and vividly displaying the structure and composition of the topics. Furthermore, the proposed method can also depict potential relationships between different technology topics, which can facilitate the visualization of new directions of research and development.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Technology forecasting; Topic recognition; Link prediction; Graph representation learning; Emerging technology; Blockchain

【发表时间】2024

【收录时间】2024-09-23

【文献类型】 案例研究

【DOI】 10.1016/j.techfore.2024.123736

Blockchain-based security-minded information-sharing in precast construction supply chain management with scalability, efficiency and privacy improvements

【Author】 Ding, Shishu Hu, Hao Xu, Feng Chai, Zhenyu Wang, Wen

【影响因子】10.517

【主题类别】

区块链技术-核心技术-访问控制

【Abstract】Blockchain and Interplanetary File System (IPFS) integration holds great promise for enhancing transparency and traceability in precast construction supply chain management (PCSCM). However, such integration faces challenges regarding unauthorized access to confidential data, which can lead to significant consequences, such as financial losses and legal issues. Regarding this gap, this paper proposes a hybrid privacy-preserving access control mechanism for securing blockchain-IPFS information-sharing in PCSCM with confidentiality considerations. Multiple privacy-preserving techniques (e.g., information-sharing channels, symmetric and asymmetric encryption, and lightweight proxy re-encryption) are leveraged. A prototype system demonstrates its feasibility and effectiveness, achieving demonstrably low network latency (millisecond level), efficient encryption (millisecond level), and robust data security within both blockchain and IPFS. This research contributes to a deeper understanding of blockchain-IPFS integration and provides a valuable reference point for future research and practical adoption.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; IPFS; Privacy protection; Proxy re-encryption (PRE); PCSCM

【发表时间】2024

【收录时间】2024-09-23

【文献类型】 理论模型

【DOI】 10.1016/j.autcon.2024.105698

A sharding blockchain protocol for enhanced scalability and performance optimization through account transaction reconfiguration

【Author】 Wu, Jiaying Yuan, Lingyun Xie, Tianyu Dai, Hui

【影响因子】8.839

【主题类别】

区块链技术-核心技术-分片区块链

【Abstract】Sharding is a critical technology for enhancing blockchain scalability. However, existing sharding blockchain protocols suffer from a high cross-shard ratio, high transaction latency, limited throughput enhancement, and high account migration. To address these problems, this paper proposes a sharding blockchain protocol for enhanced scalability and performance optimization through account transaction reconfiguration. Firstly, we construct a blockchain transaction account graph network structure to analyze transaction account correlations. Secondly, a modularity-based account transaction reconfiguration algorithm and a detailed account reconfiguration process is designed to minimize cross-shard transactions. Finally, we introduce a transaction processing mechanism for account transaction reconfiguration in parallel with block consensus uploading, which reduces the reconfiguration time overhead and system latency. Experimental results demonstrate substantial performance improvements compared to existing shard protocols: up to a 34.7% reduction in cross-shard transaction ratio, at least an 83.2% decrease in transaction latency, at least a 52.7% increase in throughput and a 7.8% decrease in account migration number. The proposed protocol significantly enhances the overall performance and scalability of blockchain, providing robust support for blockchain applications in various fields such as financial services, supply chain management, and industrial Internet of Things. It also enables better support for high-concurrency scenarios and large-scale network environments.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; Scalability; Sharding technique; Account transaction reconfiguration; Low cross-shard ratio

【发表时间】2024

【收录时间】2024-09-23

【文献类型】 理论模型

【DOI】 10.1016/j.jksuci.2024.102184

An efficient certificateless blockchain-enabled authentication scheme to secure producer mobility in named data networks

【Author】 Wang, Cong Zhou, Tong Ma, Maode Xiong, Yuwen Zhang, Xiankun Liu, Chao

CCF-C

【影响因子】7.574

【主题类别】

区块链技术-核心技术-身份验证

【Abstract】Named Data Networking (NDN) aims to establish an efficient content delivery architecture. In NDN, secure and effective identity authentication schemes ensure secure communication between producers and routers. Currently, there is no feasible solution to perform identity authentication of mobile producers in NDNs. Identity authentication schemes in other networks are either weak in security or performance, such as privacy leakage, difficulty to establish cross-domain trust, and long handover delays, and are not fully adaptable to the security requirements of NDNs. Additionally, the mobility of producers was not fully considered in the initial design of NDNs. This paper first revises the structure of packets and routers to support the identity authentication and mobility of producers. On this basis, this paper proposes a secure and efficient certificateless ECC-based producer identity authentication scheme (CL-BPA), which includes initial authentication and re-authentication, aimed at achieving rapid switch authentication and integrating blockchain to solve single-point failure issues. Using the Canetti and Krawczyk (CK) adversarial model and informal security analysis, the proposed CL-BPA scheme is demonstrated to be resistant to anonymity attacks, identity forgery attacks, and man-in-the-middle attacks. The performance analysis demonstrates that the proposed CL-BPA scheme exhibits excellent capabilities in terms of computation delay, communication cost, smart contract execution time, average response delay, and throughput.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】NDN; Producer; Mobile; Certificateless; Authentication; Blockchain

【发表时间】2024

【收录时间】2024-09-23

【文献类型】 理论模型

【DOI】 10.1016/j.jnca.2024.104007

Bodyless block propagation: TPS fully scalable blockchain with pre-validation

【Author】 Zhao, Chonghe Zhang, Shengli Wang, Taotao Liew, Soung Chang

【影响因子】7.307

【主题类别】

区块链技术-核心技术-区块传输

【Abstract】Despite numerous prior attempts to boost transaction per second (TPS) of blockchain system, most of them were at a price of degraded decentralization and security. In this paper, we propose a bodyless block propagation (BBP) scheme for which the blockbody is not validated and transmitted during the block propagation process, to increase TPS without compromising security. Rather, the nodes in the blockchain network anticipate the transactions and their ordering in the next upcoming block so that these transactions can be pre-executed and pre-validated before the birth of the block. It is critical, however, that all nodes have a consensus on the transaction content of the next block. This paper puts forth a transaction selection, ordering, and synchronization algorithm to drive the nodes to reach such a consensus. Yet, the Coinbase Address of the miner of the next block cannot be anticipated, and therefore transactions that depend on the Coinbase Address cannot be pre-executed and pre-validated. This paper further puts forth an algorithm to deal with such unresolvable transactions for an overall consistent and TPS-efficient scheme. With our scheme, most transactions do not need to be validated and transmitted during block propagation, ridding the dependence of propagation time on the number of transactions in the block, and making the system fully TPS scalable. Experimental results show that our protocol can reduce propagation time by 4x with respect to the current Ethereum blockchain, and its TPS performance is limited by the node hardware performance rather than block propagation.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; Bodyless block; TPS; Block propagation; Block validation

【发表时间】2025

【收录时间】2024-09-23

【文献类型】 理论模型

【DOI】 10.1016/j.future.2024.107516

Joint energy efficiency and network optimization for integrated blockchain-SDN-based internet of things networks

【Author】 Hakiri, Akram Sellami, Bassem Ben Yahia, Sadok

【影响因子】7.307

【主题类别】

区块链应用-实体经济-物联网

区块链技术-协同技术-智能合约

【Abstract】The Internet of Things (IoT) networks are poised to play a critical role in providing ultra-low latency and high bandwidth communications in various real-world IoT scenarios. Assuring end-to-end secure, energy- aware, reliable, real-time IoT communication is hard due to the heterogeneity and transient behavior of IoT networks. Additionally, the lack of integrated approaches to efficiently schedule IoT tasks and holistically offload computing resources, and computational limits in IoT systems to achieve effective resource utilization. This paper makes three contributions to research on overcoming these problems in the context of distributed IoT systems that use the Software Defined Networking (SDN) programmable control plane in symbiosis with blockchain to benefit from the dispersed or decentralized, and efficient environment of distributed IoT transactions over Wide Area Networks (WANs). First, it introduces a Blockchain-SDN architectural component to reinforce flexibility and trustworthiness and improve the Quality of Service (QoS) of IoT networks. Second, it describes the design of an IoT-focused smart contract that implements the control logic to manage IoT data, detect and report suspected IoT nodes, and mitigate malicious traffic. Third, we introduce a novel consensus algorithm based on the Proof-of-Authority (PoA) to achieve agreements between blockchain-enabled IoT nodes, improve the reliability of IoT edge devices, and establish absolute trust among all smart IoT systems. Experimental results show that integrating SDN with blockchain outperforms traditional Proof-of-Work (PoW) and Practical Byzantine Fault Tolerance (PBFT) algorithms, delivering up to 68% lower latency, 87% higher transaction throughput, and 45% better energy savings.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Internet of things; Blockchain; SDN/NFV; Proof-of-authority; Energy-efficiency; Trust

【发表时间】2025

【收录时间】2024-09-23

【文献类型】 理论模型

【DOI】 10.1016/j.future.2024.107519

Digital twin (DT) and extended reality (XR) for building energy management

【Author】 Yeom, Seungkeun Kim, Juui Kang, Hyuna Jung, Seunghoon Hong, Taehoon

【影响因子】7.201

【主题类别】

区块链应用-实体经济-能源领域

【Abstract】In the era of the Fourth Industrial Revolution (Industry 4.0), sustainable development, especially in building energy management, is not optional but essential. This study aims to explore the multifaceted impact of Digital Twin (DT) and Extended Reality (XR) technologies on building energy management. Based on a comprehensive review of DT and XR, this research identifies the limitations of each technology and discusses the importance of their integration across three key aspects: (i) energy consumption management, (ii) indoor environment quality and occupants' comfort management, and (iii) facility management. Through a comprehensive review, this study illustrates the pivotal roles these technologies play in not only reducing carbon emissions but also in elevating occupant comfort and facilitating efficient building operations. As a result, it is important to integrate DT and XR for building energy management, enhance collaboration, and optimize energy systems through human-building interaction and a metaverse environment. Moreover, this study proposed DT and XR integrated solutions for building energy management, emphasizing the need for fidelity, interoperability, and data security. Ultimately, this paper offers a novel perspective on leveraging DT and XR towards achieving greater sustainability in building, suggesting future research directions and practical applications for industry professionals and scholars.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Digital twin; Extended reality; Energy management; Indoor environment quality; Metaverse; Interoperability

【发表时间】2024

【收录时间】2024-09-23

【文献类型】 案例研究

【DOI】 10.1016/j.enbuild.2024.114746

Internet over the ocean: A smart IoT-enabled digital ecosystem for empowering coastal fisher communities

【Author】 Anand, Sruthy Enayati, Mojtaba Raj, Dhanesh Montresor, Alberto Ramesh, Maneesha Vinodini

【影响因子】6.879

【主题类别】

区块链应用-实体经济-海洋领域

【Abstract】Coastal communities across the globe are prone to imminent disasters and emergencies due to their geographic placement, and their fishing occupations add to their exposure to ocean-related disasters more during their occupational voyage. The fishermen in the state of Kerala, India, lead a distinctive lifestyle compared to the mainstream community, primarily because of a significant digital divide. This divide hampers their access to livelihood support, such as live market information and impedes any potential improvement in their quality of life through digital services. The community's transformation is possible only through discrete and gradual steps of progression by bringing services to different areas such as education, connectivity, technology adoption, business, and livelihood. This study revealed prevalent gaps in the fishing community, including a lack of digital access and communication opportunities in the deep ocean, a deficiency in digital capacity preventing them from leveraging the benefits of Information and communications technology (ICT), leading to community isolation from digital inclusion and limiting economic opportunities. To address these issues, the study proposes an IoT-enabled digital ecosystem, transforming the community into a smart digital community. This ecosystem integrates a low-cost deep ocean communication solution, supportive software applications, a blockchain-based e-commerce platform, and a sustainable social change model for technology adoption. Proper adoption and utilisation of the digital ecosystem can strengthen the community's resilience to natural disasters, and climatic changes by providing relevant information and livelihood resilience by offering them an e-commerce platform to improve income and reduce their vulnerability. It will equip them to enhance their responsiveness to changing environmental and social factors and bounce back to build their innate resilience.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Sustainable social change; Coastal community empowerment; Digital ecosystem; Blockchain technology; Co-Design; Digital divide; Fishing Community

【发表时间】2024

【收录时间】2024-09-23

【文献类型】 案例研究

【DOI】 10.1016/j.techsoc.2024.102686

Factors That Facilitated the Development of Blockchain Technology in the AEC Industry: Study Based on System Dynamics

【Author】 Wang, Xuetong Weng, Zhikun Liu, Lingyi Liu, Jingkuang

【影响因子】6.415

【主题类别】

区块链治理-技术治理-新兴技术

【Abstract】Various factors restrict the forward movement of blockchain technology (BT) in the architecture, engineering, and construction (AEC) industry. These factors frequently interact and change over time. Thus, conducting continual research and recognizing the crucial factors to establish focused policies and strategies for progress are essential. To tackle this issue, this paper puts forward a theoretical research model of the system dynamics of BT development in the AEC industry from a dynamic research perspective. This research model incorporates the technology-organization-environment framework and the technology acceptance model. The research results show that the development trend of BT within the AEC industry follows an overall S-shape. To varying degrees, the key influencing factors at the technological, organizational, and environmental levels can promote the development of BT. Furthermore, the paper analyzes promotion strategies for the key influencing factors at these three levels. We found that promoting organizational drive significantly impacted improving the effect of BT development. For instance, promoting organizational drive twice could improve the effect by 6.85%. On the other hand, promoting technological factors had a lesser effect; doubling that promotion resulted in an improvement of only 4.53%. Additionally, in the initial phases of BT development, its maturity, compatibility, and adoption cost play a more pronounced effect in determining the level of its development. The research findings aim to enable analyzing the key factors that influence AEC industry development by leveraging BT. This analysis provides the government with the necessary information to create policies that relate to BT. It also shows how adopting this technology can help businesses to reduce costs and improve efficiency.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain technology (BT); Key influencing factors; Architecture, engineering, and construction (AEC) industry; Technology acceptance model (TAM); System dynamics (SD)

【发表时间】2024

【收录时间】2024-09-23

【文献类型】 理论模型

【DOI】 10.1061/JMENEA.MEENG-6137

IntelliChain: An Intelligent and Adaptive Framework for Decentralized Applications on Public Blockchain Technologies: An NFT Marketplace Case Study

【Author】 Rasolroveicy, Mohammadreza Fokaefs, Marios

CCF-C

【影响因子】5.883

【主题类别】

区块链应用-虚拟经济-NFT

【Abstract】Non-fungible tokens (NFTs), attracting interest from a variety of audiences including collectors and traders, saw transactions exceeding ${\$}$50 billion in 2022. The inherent features of blockchain technology-distributed, immutable, and transparent-make it an ideal platform for verifying ownership of digital assets. Despite these advantages, the high computational and transaction costs of networks, which utilizes proof of work pose significant challenges. To overcome these, alternative public blockchains have been developed, each offering unique benefits for NFT marketplaces. Choosing the right blockchain platform is crucial but complex. In our study, we introduce a prototype NFT marketplace optimized for scalability and efficiency, capable of rapidly handling a large volume of NFT transactions. We also conducted a comparative analysis of various public blockchains to identify the most cost-effective and reliable options for NFT exchanges. Further, we developed two predictive models to enhance decision-making around transaction fees and error management, thus improving cost-efficiency and reliability. We also propose a self-adaptive mechanism that allows for dynamic switching between blockchain platforms, enhancing the flexibility, and overall performance of the marketplace. Our contributions are integrated into IntelliChain, a self-adaptive framework designed to predict optimal transaction fees, reduce errors, and adapt to changing conditions like network stability and fee structures, bolstering efficiency, and reliability.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchains; Smart contracts; Cryptocurrency; Open source software; Nonfungible tokens; Costs; Consensus protocol; Blockchain; blockchain scalability; blockchain performance; distributed ledger technologies; neural networks (NNs) and machine learning (ML); self-adaptive systems

【发表时间】2024

【收录时间】2024-09-23

【文献类型】 案例研究

【DOI】 10.1109/TR.2024.3451964

A fair multi-attribute data transaction mechanism supporting cross-chain

【Author】 Fan, Kuan Zhou, Chaozhi Lu, Ning Shi, Wenbo Chang, Victor

【影响因子】5.711

【主题类别】

区块链技术-核心技术-跨链与多链

【Abstract】Reliable storage and high-speed data networks enable individuals to access high-quality Internet of Things (IoT) data for scientific research through global transactions. Blockchain technology provides transparency for institutions to securely store and manage IoT data, while cross-chain transaction mechanisms facilitate the flow of IoT data. However, fairness issues may arise when it comes to cross-chain transactions of IoT data. This paper proposes a mechanism for multi-attribute data transactions to support cross-chain. The solution utilizes Vickrey-Clarke-Groves (VCG) auction, Paillier, Intel SGX, and other technologies to design a secure and equitable data seller selection scheme. The scheme ensures that the selection process for data sellers is both informed and private. Additionally, we generate a key pair for each attribute in the dataset to produce the corresponding attribute data signature. The dataset's legitimacy is verified through batch verification to ensure that the data seller's purchased attributes align with their requirements. The exchange of crypto assets and private keys between data sellers and buyers is designed to achieve fair payment. Our research suggests that the scheme meets the necessary security standards, and simulation results confirm its feasibility and effectiveness.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Fairness; Data transaction; IoT data; Multi-attribute; Cross-chain

【发表时间】2024

【收录时间】2024-09-23

【文献类型】 理论模型

【DOI】 10.1016/j.iot.2024.101339

How retailers can gain more profitability driven by digital technology: Live streaming promotion and blockchain technology traceability?

【Author】 Liu, Xingfen Zhou, Zhongbao Hu, Minhui Zhong, Feimin

【影响因子】5.622

【主题类别】

区块链应用-实体经济-营销领域

【Abstract】Live streaming in e-commerce often faces challenges like counterfeit products and high return rates. To mitigate this issue, retailers can adopt blockchain technology for product traceability to enhance consumer trust, i.e., blockchain-traceable products may be sold in live streaming. Our paper presents three analytical models under various return policies to explore how live streaming and blockchain technology interact in e-commerce. Retailers can invest in live streaming with influencers to attract consumers and in blockchain technology to reduce product returns, benefiting from a demand-enhancing effect and a price-enhancing effect, , respectively. The retailer's investment strategy between live streaming and blockchain technology depends on the interactions of these two effects, moderated by the retailer's budget type, the market commission level of live streaming, and the traceability cost of blockchain technology. For budget-constrained retailers, live streaming and blockchain technology act as substitutes. When the commission level is low (high) and the traceability cost is high (low), the demand-enhancing (price-enhancing) effect dominates the price-enhancing (demand-enhancing) effect, thus the retailer invests in live streaming (blockchain technology) as a substitute for blockchain technology (live streaming). Conversely, for budget-unconstrained retailers, they may act as complements, prompting investment in both when commission levels and traceability costs are low. The retailer does not invest in either when both the commission level and traceability cost are high. We extend our results to a full refund policy to show the robustness of our result and find that it reduces the retailer's incentive to invest in live streaming or blockchain technology.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】E-commerce; Live streaming; Blockchain; Refund policy; Pricing

【发表时间】2024

【收录时间】2024-09-23

【文献类型】 案例研究

【DOI】 10.1016/j.elerap.2024.101445

Advancing building construction: A novel conceptual framework integrating circularity with modified lean project delivery systems

【Author】 Saradara, Shadeedha Mohamed Khalfan, Malik Mansoor Ali Jaya, Sachin Venu Swarnakar, Vikas Rauf, Abdul El Fadel, Mutasem

【影响因子】5.563

【主题类别】

区块链应用-实体经济-建筑领域

【Abstract】The circular economy (CE) and lean construction (LC) are pivotal for advancing sustainability in the construction industry. CE focuses on minimizing resource use and waste recovery, while LC emphasizes efficiency and waste minimization. Combined, they play a vital role in promoting sustainable development by optimizing resources, minimizing waste generation, and enhancing environmental responsibility. This study presents a novel method to examine the effective combination of these two principles throughout the various stages of the building lifecycle. Through an extensive literature review analysis, we develop a framework that incorporates CE principles across all building stages while leveraging the Lean Project Delivery System (LPDS) to enhance circularity. This approach promotes early collaboration and utilizes smart relational contracts facilitated by blockchain, engaging a diverse team of professionals, including designers, contractors, and specialists. This framework is positioned to redefine industry norms and foster the advancement of sustainable construction methodologies by integrating established principles with innovative technologies.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Circular economy; Lean construction; Lean project delivery system; Waste reduction; Construction industry

【发表时间】2024

【收录时间】2024-09-23

【文献类型】 理论模型

【DOI】 10.1016/j.dibe.2024.100531

HCVC: A High-Capacity Off-Chain Virtual Channel Scheme Based on Bidirectional Locking Mechanism

【Author】 Xie, Songyou Xiao, Lijun Han, Dezhi Xie, Kun Li, Xiong Liang, Wei

【影响因子】5.033

【主题类别】

区块链技术-核心技术-支付通道网络

【Abstract】As one of the key components of Web 3.0, the security of cryptocurrency is essential to its development and application. A Payment Channel Network (PCN) enhances transaction confirmation speed and throughput by executing blockchain transactions off-chain. However, existing PCN protocols have problems like privacy leaks and offline and challenges in meeting privacy and security demands. Due to such problems, we propose in this work High-Capacity Virtual Channel (HCVC) scheme to achieve payment across PCNs. As a lightweight virtual channel protocol based on the unspent transaction output model, HCVC uses a bidirectional locking mechanism to lock the collateral on payment channels to increase the capacity of the virtual channel. Additionally, a bidirectional punishment mechanism is introduced to deter malicious nodes, maintain balance security, and enable secure peer-to-peer transactions across PCNs, as all phases of HCVC can be performed off-chain without confirming transactions on-chain. Experimental analysis shows that the HCVC performs better in n-path PCNs. Compared to Donner, the communication overhead of HCVC in the open and resolve(undesirable) phases can be reduced by 39% and 37%, respectively, effectively reducing the overhead of transactions and enhancing the transaction throughput of the blockchain.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Protocols; Blockchains; Privacy; Bitcoin; Semantic Web; Peer-to-peer computing; Throughput; Cryptocurrency; virtual channel; Web3.0; bidirectional locking mechanism; payment channel network (PCN)

【发表时间】2024

【收录时间】2024-09-23

【文献类型】 理论模型

【DOI】 10.1109/TNSE.2023.3332130

Self-sovereign identity management in ciphertext policy attribute based encryption for IoT protocols

【Author】 Deng, Weichu Li, Jin Yan, Hongyang Koe, Arthur Sandor Voundi Huang, Teng Wang, Jianfeng Peng, Cong

【影响因子】4.960

【主题类别】

区块链技术-核心技术-身份管理

【Abstract】In the Internet of Things, access control and identity management rely on centralized platforms. However, centralized platforms will compromise user privacy with identity leakage. Self-sovereign identity (SSI) is a novel model for identity management that does not require third-party centralized authority. Thus, SSI is a potential solution to the identity management problem in IoT access control. This paper's motivation is to address the problems of lack of identity sovereignty, centralized authorization, and high computational overhead for IoT access control. We propose a novel access control scheme for IoT that decentralizes identity management and tackles single-point-of-failure issues. This scheme leverages ciphertext policy attribute-based encryption (CP-ABE) and SSI to achieve the overall goal. Specifically, Our scheme eliminates the central authority and empowers users to manage their identity, allowing users to decide what attributes they disclose. Regarding the distribution of roles in the architecture, this paper follows the generic SSI model (ISSUER-HOLDER- VERIFIER) that allows a user to access a service from a service provider. To enable real-world deployment of our scheme, we establish an attribute authorization authority(such as the government) as a trusted identity point of entry. Users generate decentralized identifiers to enjoy services of interest in a privacy-preserving manner. The analysis demonstrates the practicality and superiority of our scheme. Our scheme requires less computation and is suitable for resource-constrained IoT scenarios.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Access control; Self-sovereign identity; Ciphertext policy ABE; Secret sharing; Blockchain

【发表时间】2024

【收录时间】2024-09-23

【文献类型】 理论模型

【DOI】 10.1016/j.jisa.2024.103885

Application of Event Study Methodology in the Analysis of Cryptocurrency Returns

【Author】 Zhou, Fan

【影响因子】4.859

【主题类别】

区块链应用-虚拟经济-加密货币

【Abstract】This study employs event study methodology to investigate the impact of various types of events on cryptocurrency market returns and volatility. The research focuses on six major cryptocurrencies-ETH, BTC, BNB, XRP, DOGE, and TRX-over the period from December 31, 2017, to October 30, 2023. Six types of events are analyzed: cybersecurity events, block reward adjustment events, political conflict events, public health emergency events, cryptocurrency recognition and support events, and social media sentiment events. The findings reveal that cybersecurity and block reward adjustment events have minimal and short-lived impacts on market returns. Political conflict events cause significant short-term return volatility depending on market expectations. Public health emergency events, such as the COVID-19 pandemic, have significant and lasting negative impacts on market returns. Cryptocurrency recognition and support events have significant and sustained positive impacts on market returns. Social media sentiment events have significant but short-lived impacts on market returns. The robustness of the results was validated through the analysis of abnormal returns during the event period. This study provides valuable insights for investors and policymakers in managing market volatility.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Cryptocurrency market; returns; volatility; event study

【发表时间】2024

【收录时间】2024-09-23

【文献类型】 案例研究

【DOI】 10.1080/1540496X.2024.2404173

Transforming luxury: young consumers' motivations towards purchasing virtual luxury non-fungible token wearables

【Author】 Lee, Hanna Rana, Md. Rafiqul Islam Xu, Yingjiao

【影响因子】4.743

【主题类别】

区块链应用-虚拟经济-NFT

【Abstract】PurposeThis study explores young consumers' motivations for purchasing Virtual Luxury Non-Fungible Token Wearables (VL-NFTs) from luxury brands, which are virtually crafted luxury wearables minted as blockchain-based NFTs. Specifically, it investigates the relationships among consumers' perceived value of VL-NFTs, engagement with NFTs and purchase intention and the mediating effect of consumer engagement with NFTs.Design/methodology/approachData were collected via an online survey of 504 young US consumers who had previously considered purchasing luxury fashion products and NFTs. Structural equation modelling was adopted for analysis.FindingsPerceived economic, functional (uniqueness) and experiential (self-directed pleasure and affiliation) values of VL-NFTs directly influenced consumers' purchase intention. While symbolic value (self-presentation and conspicuousness) did not significantly influence purchase intention, it facilitated consumer engagement with NFTs. Moreover, consumer engagement mediated the relationship between economic and functional values and purchase intention.Research limitations/implicationsThe sample was only comprised of young consumers, limiting the generalizability. Additionally, consumers may perceive VL-NFTs differently because of differences in past experiences and the varying VL-NFT types, necessitating further investigation on consumers' motivations across different types of VL-NFTs.Originality/valueThis study contributes to the existing literature by examining the importance of multifaceted perceived-value dimensions and engagement with NFTs in consumers' motivation for purchasing VL-NFTs through the lens of the customer value framework.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Luxury; NFT; Virtual wearable; Motivation; Engagement

【发表时间】2024

【收录时间】2024-09-23

【文献类型】 案例研究

【DOI】 10.1108/IJRDM-12-2023-0712

A Blockchain-Based Authentication Mechanism for Enhanced Security

【Author】 Mccabe, Charlotte Mohideen, Althaff Irfan Cader Singh, Raman

【影响因子】3.847

【主题类别】

区块链技术-核心技术-认证机制

【Abstract】Passwords are the first line of defence against preventing unauthorised access to systems and potential leakage of sensitive data. However, the traditional reliance on username and password combinations is not enough protection and has prompted the implementation of technologies such as two-factor authentication (2FA). While 2FA enhances security by adding a layer of verification, these techniques are not impervious to threats. Even with the implementation of 2FA, the relentless efforts of cybercriminals present formidable obstacles in securing digital spaces. The objective of this work is to implement blockchain technology as a form of 2FA. The findings of this work suggest that blockchain-based 2FA methods could strengthen digital security compared to conventional 2FA methods.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】authentication; blockchain technology; smart contracts; multi-factor authentication; cryptocurrency

【发表时间】2024

【收录时间】2024-09-23

【文献类型】 理论模型

【DOI】 10.3390/s24175830

Green cryptocurrencies versus sustainable investments dynamics: Exploration of multifractal multiscale analysis, multifractal detrended cross-correlations and nonlinear Granger causality

【Author】 Vogl, Markus Kojic, Milena

【影响因子】3.778

【主题类别】

区块链治理-市场治理-数字货币

【Abstract】Within this study, we analyse green cryptocurrencies versus sustainable investments dynamics by calculating a multifractal multiscale analysis (MMA) with Hurst surfaces paired with powerlaw distributional coherence tests for each series. Next, we determine multifractal cross-correlations by applying a maximal overlap discrete wavelet transform (MODWT) based trend-filtered variation of a multifractal detrended cross-correlation analysis (MF-DCCA). Finally, to determine the strength and directionality of potential causations, we determine the results of a nonlinear Granger causality test. The results for the MMA state q-dependent unstable multifractality for each series. The coherence tests indicate that the series follow powerlaws or exponentially nested powerlaws and yield fat-tails in some cases. Moreover, we find strong scaling and multifractal cross-correlations between the cryptocurrencies and the sustainability series. Finally, the nonlinear Granger causality tests across four lags indicate a complex interplay between some of the selected cryptocurrencies and various indices. These results suggest the existence of potential predictive powers of these cryptocurrencies on the market indices.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】(Green) cryptocurrencies; Multifractal multiscale analysis (MMA); Multifractal detrended cross-correlation anal- ysis (MF-DCCA); Nonlinear Granger causality test; Sustainable investments (ESG investments)

【发表时间】2024

【收录时间】2024-09-23

【文献类型】 实证数据

【DOI】 10.1016/j.physa.2024.130085

A digital resource copyright protection scheme based on blockchain cross-chain technology

【Author】 Xie, Renqiang Tang, Min

【影响因子】3.776

【主题类别】

区块链技术-核心技术-跨链与多链

【Abstract】With the expansion of the digital publishing industry, copyright infringement of digital resources has become increasingly rampant. Blockchain technology offers a promising solution for copyright protection of digital resources. However, existing copyright protection methods based on single-chain or consortium blockchains have disadvantages such as low system processing efficiency, poor scalability, and a lack of alignment with real-world business needs. To address the current challenges of blockchain technology in the field of copyright protection and establish a more effective solution for protecting digital resource copyrights, while also expanding the application of blockchain cross-chain technology and promoting its development, leveraging blockchain cross-chain theory, technology, and methods, a digital resource copyright protection scheme based on blockchain cross-chain technology was constructed. It outlines detailed processes for copyright registration, resource transactions, copyright modifications, and copyright enforcement. Furthermore, this copyright protection scheme was analyzed. The findings indicated that the blockchain cross-chain technology is suitable for digital resource copyright protection. The proposed copyright protection scheme can allow various stakeholders to better fulfill their roles, in addition to enhancing the overall maintainability and scalability of the blockchain system.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; Digital resources; Copyright protection; Cross-chain; Relay chain

【发表时间】2024

【收录时间】2024-09-23

【文献类型】 理论模型

【DOI】 10.1016/j.heliyon.2024.e36830

Analyzing blockchain-based waste management investments in smart cities using quantum picture fuzzy rough modelling

【Author】 Kou, G. Dincer, H. Pamucar, D. Yuksel, S. Simic, V.

【影响因子】3.519

【主题类别】

区块链应用-实体经济-智慧城市

【Abstract】Blockchain-based waste management investments are key to increase the performance for achieving sustainable growth for both businesses and the country's economy. In this context, a new study should be conducted to identify the most important variables. Accordingly, the purpose of this study is to examine blockchain-based waste management investments via a novel model. The scope of this study is the smart cities that are defined as settlements that aim to improve the quality of life and ensure sustainability by using technology to manage and improve services. Firstly, artificial intelligence (AI) methodology is taken into consideration to compute the weights of the experts. Secondly, the weights of the criteria for blockchain-based waste management investments are computed. Finally, selected investment alternatives for smart cities are ranked with Vise Kriterijumska Optimizacija I Kompromisno Resenje (VIKOR) methodology. Additionally, a comparative analysis is also performed by technique for order preference by similarity (TOPSIS). In addition to this issue, a sensitivity analysis is also conducted with four different cases to check the coherency of the analysis results. The main contribution of this study is the calculation of the expert weights by AI. It is identified that participating in waste to energy schemes has the greatest significance. Similarly, optimizing the lifecycle management has also high weight. It is also defined that integration of physical and digital infrastructures is the most critical alternative. Moreover, urban innovativeness is another critical factor for this situation.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Artificial intelligence-based decision-making; Quantum picture fuzzy rough modelling; Blockchain-based waste management; Energy investments

【发表时间】2024

【收录时间】2024-09-23

【文献类型】 理论模型

【DOI】 10.1007/s13762-024-06032-6

A cross domain access control model for medical consortium based on DBSCAN and penalty function

【Author】 Yao, Chuanjia Jiang, Rong Wu, Bin Li, Pinghui Wang, Chenguang

【影响因子】3.298

【主题类别】

区块链应用-实体经济-医疗领域

【Abstract】BackgroundGraded diagnosis and treatment, referral, and expert consultations between medical institutions all require cross domain access to patient medical information to support doctors' treatment decisions, leading to an increase in cross domain access among various medical institutions within the medical consortium. However, patient medical information is sensitive and private, and it is essential to control doctors' cross domain access to reduce the risk of leakage. Access control is a continuous and long-term process, and it first requires verification of the legitimacy of user identities, while utilizing control policies for selection and management. After verifying user identity and access permissions, it is also necessary to monitor unauthorized operations. Therefore, the content of access control includes authentication, implementation of control policies, and security auditing. Unlike the existing focus on authentication and control strategy implementation in access control, this article focuses on the control based on access log security auditing for doctors who have obtained authorization to access medical resources. This paper designs a blockchain based doctor intelligent cross domain access log recording system, which is used to record, query and analyze the cross domain access behavior of doctors after authorization. Through DBSCAN clustering analysis of doctors' cross domain access logs, we find the abnormal phenomenon of cross domain access, and build a penalty function to dynamically control doctors' cross domain access process, so as to reduce the risk of Data breach. Finally, through comparative analysis and experiments, it is shown that the proposed cross domain access control model for medical consortia based on DBSCAN and penalty function has good control effect on the cross domain access behavior of doctors in various medical institutions of the medical consortia, and has certain feasibility for the cross domain access control of doctors.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Medical consortium; Blockchain technology; Medical informatization; Access control

【发表时间】2024

【收录时间】2024-09-23

【文献类型】 案例研究

【DOI】 10.1186/s12911-024-02638-5

Utilizing blockchain to enhance project management information systems: insights into project portfolio success, knowledge management and learning capabilities

【Author】 Alkhudary, Rami Gardiner, Paul

【影响因子】2.951

【主题类别】

区块链应用-实体经济-商业领域

【Abstract】PurposeThis paper explores how blockchain technology can enhance information quality within project management information systems (PMIS), thereby positively affecting knowledge management, learning capabilities and project portfolio success.Design/methodology/approachWe employ a literature review and a theory-based approach to develop a conceptual framework and set of propositions that integrate key principles from blockchain technology, project management and dynamic capabilities theory. Subsequently, a focus group is conducted to refine our propositions, providing insights and examples demonstrating the potential value of blockchain in project management.FindingsThe findings suggest that blockchain significantly impacts the information quality within PMIS. This improvement in information quality enhances traceability, reliability and security of project data, facilitating better decision-making and governance. The focus group revealed blockchain's benefits in managing confidential data and streamlining knowledge sharing processes, ultimately contributing to project portfolio success.Originality/valueThis research offers a novel conceptual framework and original insights into the application of blockchain in project management, particularly within the context of Industry 4.0, paving the way for future research on digital transformation in project management.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; Project management; Information systems; Dynamic capabilities; Knowledge management; Learning capabilities; Focus group

【发表时间】2024

【收录时间】2024-09-23

【文献类型】 案例研究

【DOI】 10.1108/IJMPB-01-2024-0021

Animation URL in NFT marketplaces considered harmful for privacy

【Author】 Callejo, Patricia Fernandez, Ignacio Gomez Bagnulo, Marcelo

【影响因子】2.427

【主题类别】

区块链治理-市场治理-链上信息预测

【Abstract】Non-Fungible Tokens (NFTs) are becoming increasingly popular as a way to represent and own digital property. However, the usage of NFTs also prompts questions about privacy. In this work, we show that it is possible to use NFTs to retrieve enough information to fingerprint users. By doing so, we can uniquely associate users with blockchain accounts. This would allow linking several blockchain accounts to the same user. This work focuses on the vulnerabilities presented by some popular NFT marketplaces. Since NFTs may have HTML files embedded, they allow the use of fingerprinting techniques if not handled carefully. Finally, we provide recommendations and countermeasures for the different actors in this ecosystem to avoid these kinds of tracking methods and, in doing so, safeguard user privacy.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】NFT; Privacy; Blockchain

【发表时间】2024

【收录时间】2024-09-23

【文献类型】 案例研究

【DOI】 10.1007/s10207-024-00908-x

A dual incentive mechanism based on graph attention neural network and contract in mobile networks

【Author】 Ma, Huahong Gu, Yuxiang Wu, Honghai Xing, Ling Zhang, Xiaohui

【影响因子】2.379

【主题类别】

区块链技术-核心技术-激励机制

【Abstract】In mobile opportunistic networks, messages are transmitted through opportunistic contacts between nodes. Hence, the successful delivery of messages heavily relies on the mutual cooperation among nodes in the network. However, due to limited network resources such as node energy and cache space, nodes tend to be selfish, and they are unwilling to actively participate in message forwarding. In response to this challenge, lots of incentive mechanisms have been proposed. However, most of them rely on single incentives, there are issues such as inadequate handling of selfish nodes and vulnerability to malicious attacks, which ultimately lead to poor incentive effects. Therefore, in this paper, a Dual Incentive mechanism based on Graph attention neural network and Contract (DIGC) is introduced to encourage active participation of network nodes in data transmission. This incentive mechanism is divided into two steps. In the first step, the graph attention neural network is used to evaluate the reputation of nodes to achieve the goal of reputation-based incentive, and blockchain is employed to store and manage node reputation to ensure security and transparency. In the second step, an incentive based on contract theory is introduced, where personalized contracts were designed based on the different resources owned by nodes, thereby establishing a reward mechanism to encourage collaborative transmission. Extensive simulations based on two real-life mobility traces have been done to evaluate the performance of our DIGC compared with other existing incentive mechanisms. The results show that, our proposed mechanism can greatly improve throughput and reduce average delay while ensuring the overall of the network.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Opportunistic networks; Node selfishness; Graph attention neural network; Dual incentive mechanism

【发表时间】2024

【收录时间】2024-09-23

【文献类型】 案例研究

【DOI】 10.1016/j.phycom.2024.102485

Dynamic game research of food agricultural products supply chain based on blockchain traceability technology

【Author】 Ma, Junhai Fan, Jie Zhu, Meihong Chen, Jiecai

【影响因子】2.352

【主题类别】

区块链应用-实体经济-食品供应链

【Abstract】PurposeFood quality and safety issues have always been imperative topics discussed by people. The anti-tampering of blockchain technology and the transparency of information make it possible to improve food traceability and safety quality. How to effectively apply blockchain traceability technology to food safety has great research significance for improving food safety and consumer quality trust.Design/methodology/approachThe paper aims to analyze the differences in product quality levels and market participants' profits before and after the use of blockchain-driven traceability technology in the food agricultural product supply chain (SC) in the dynamic game frameworks of supplier-led and retailer-led modes, respectively, and explores the willingness, social welfare and consumer surplus of each member of the agricultural product SC to participate in the blockchain. Besides, We investigate the SC performance improvement with the mechanism of central centralized decision-making and revenue-sharing contract, compared to the SC performance in dynamic games.FindingsThe results are obtained as follow: The adoption of blockchain traceability technology can help improve the quality of food agricultural products, consumer surplus and social welfare, but the application and popularization of technology is hindered by traceability technology installment costs. Compared with the supplier leadership model, retailer-led food quality level, customer surplus and social welfare are higher.Research limitations/implicationsHow to effectively apply blockchain traceability technology to food safety has great research significance for improving food safety and consumer quality trust.Practical implicationsFood quality and safety issues have always been hot topics discussed by people. The anti-tampering of blockchain technology and the transparency of information make it possible to improve food traceability and safety quality.Social implicationsThe research results enrich the theories related to food safety and quality, and provide a valuable reference for food enterprises involved in the decision-making exploration of blockchain technology.Originality/valueBased on the characteristics of blockchain technology, the demand function is adjusted and the product loss risk of channel members is transferred through a Stackelberg game SC composed of agricultural products suppliers and retailers.Highlights:We introduce two features of blockchain: quality trust and product information tracking.The willingness of each member of the supply chain to use blockchain for product traceability was explored.The overall traceability effect of the retailer-led blockchain is better than that of the manufacturer-led blockchain.The cost of blockchain technology is a barrier to its adoption.Blockchain brings higher consumer surplus and social welfare.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; Traceability; Agricultural supply chain; Stackelberg game

【发表时间】2024

【收录时间】2024-09-23

【文献类型】 案例研究

【DOI】 10.1108/K-12-2023-2636

Economic sanctions and debt default

【Author】 Apeti, Ablam Estel Edoh, Eyah Denise

【影响因子】2.343

【主题类别】

区块链治理-市场治理-区块链金融监管

【Abstract】This paper analyzes the effect of US economic sanctions on sovereign debt default across 118 developing countries from 1980 to 2018. We use entropy balancing method, and provide robust evidence that US sanctions increase sovereign debt default in the targeted states. This finding withstands several robustness tests, including alternative specifications and databases, and alternative estimation methods. The results also reveal some heterogeneity depending on the type of sanctions (for example, trade versus financial sanctions), on whether they are imposed unilaterally or multilaterally, on the severity of the sanctions, on the geographical distance from the United States, the time since sanctions were imposed, and some structural characteristics. In addition, we find that the development of cryptocurrencies reduces the effect of sanctions, and that failed sanctions have a greater effect on default. The compositon effect based on the type of debt in default shows that the effect of US sanctions is only observed on the default on external debt and not on that of internal debt. Next, we identify three main channels through which sanctions trigger sovereign risk; namely economic growth contraction, the occurrence of banking crisis and reduced access to international financial market. Finally, we explore the effect of other sanctions, notably those of the European Union and the United Nations, and find that these sanctions also raise the probability of sovereign debt default.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Economic sanctions; Sovereign debt default; Entropy balancing

【发表时间】2024

【收录时间】2024-09-23

【文献类型】 案例研究

【DOI】 10.1016/j.ejpoleco.2024.102571

Securing internet of things using machine and deep learning methods: a survey

【Author】 Ghaffari, Ali Jelodari, Nasim Pouralish, Samira Derakhshanfard, Nahide Arasteh, Bahman

【影响因子】2.303

【主题类别】

区块链应用-实体经济-物联网

【Abstract】The Internet of Things (IoT) is a vast network of devices with sensors or actuators connected through wired or wireless networks. It has a transformative effect on integrating technology into people's daily lives. IoT covers essential areas such as smart cities, smart homes, and health-based industries. However, security and privacy challenges arise with the rapid growth of IoT devices and applications. Vulnerabilities such as node spoofing, unauthorized access to data, and cyberattacks such as denial of service (DoS), eavesdropping, and intrusion detection have emerged as significant concerns. Recently, machine learning (ML) and deep learning (DL) methods have significantly progressed and are robust solutions to address these security issues in IoT devices. This paper comprehensively reviews IoT security research focusing on ML/DL approaches. It also categorizes recent studies on security issues based on ML/DL solutions and highlights their opportunities, advantages, and limitations. These insights provide potential directions for future research challenges.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Internet of things; Machine learning; Deep learning; Security

【发表时间】2024

【收录时间】2024-09-23

【文献类型】 案例研究

【DOI】 10.1007/s10586-024-04509-0

Blockchain-based cyber-security trust model with multi-risk protection scheme for secure data transmission in cloud computing

【Author】 Akbar, Mohd Waseem, Mohammed Mujtaba Mehanoor, Syeda Husna Barmavatu, Praveen

【影响因子】2.303

【主题类别】

区块链技术-协同技术-云计算

【Abstract】The rise of cloud computing has transformed the way data is stored and managed, yet it has also brought about major security issues, especially concerning the secure transfer of data within cloud systems. In response to these challenges, this research develops a comprehensive cyber-security trust model that provides multi-risk protection for secure data transmission in cloud computing, ensuring the highest level of privacy and data security. This innovative approach aims to ensure the secure transmission of data in cloud computing while harnessing the combined strengths of Quantum Key Distribution (QKD) and Advanced Encryption Algorithm. As cloud environments become integral to modern business operations, safeguarding data against a multitude of security risks, including traditional and emerging threats, is paramount. The Cyber-Security Trust Model leverages blockchain to establish a transparent and tamper-resistant ledger of all data transactions within the cloud. This blockchain layer enhances data integrity, auditability, and traceability while also providing a decentralized and trust-based framework for authentication and authorization. The Multi-Risk Protection Model incorporates both Quantum Key Distribution (QKD) and a Modified Advanced Encryption Standard (MAES) to offer multi-layered defence mechanisms. Through rigorous testing and analysis, this study demonstrates the feasibility and effectiveness of the proposed Cyber-Security Trust Model with a Merkle tree-based solution for data integrity verification. It makes a significant impact on the field of secure data transmission in cloud computing by providing strong protection against a constantly changing set of security threats. MATLAB is employed to conduct rigorous experiments, analyse results, and validate the model's performance in various cloud computing scenarios. The findings of the proposed study show the proposed method, combining Quantum Key Distribution (QKD) and Modified AES (MAES), stands out with exceptional performance, featuring encryption and decryption times of 2.25ms and 1.071ms, respectively. The proposed system outperforms all others, boasting an impressive accuracy rate of 99.84%. This research signifies a ground-breaking advancement in cloud computing security, addressing a spectrum of traditional and emerging threats through a multi-risk protection model incorporating Quantum Key Distribution (QKD) and MAES while demonstrating exceptional performance in rigorous experiments.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Cloud computing; Cyber-security trust; Merkle tree; Data integrity; Modified advanced encryption; Quantum key distribution

【发表时间】2024

【收录时间】2024-09-23

【文献类型】 实验仿真

【DOI】 10.1007/s10586-024-04481-9

Blockchain-Based Secured LEACH Protocol (BSLEACH)

【Author】 Ajay, Shubham Kant Sinha, Ditipriya Vikram, Raj Das, Ayan Kumar Prasad, Ramjee

【影响因子】2.017

【主题类别】

区块链技术-平台项目-数据共享

【Abstract】In Wireless Sensor Networks (WSNs), malicious nodes can infiltrate the network at any time, compromising network performance. Developing a secure routing protocol is critical for ensuring reliable data transmission. LEACH (Low-Energy Adaptive Clustering Hierarchy) is a well-established hierarchical routing protocol within the WSN paradigm. However, LEACH lacks robustness against security attacks due to the absence of integrated security mechanisms, making it vulnerable in the presence of malicious nodes. On the other hand, Blockchain, an emerging technology, is best suited for Wireless Sensor Networks due to its distributed, decentralized, immutable, and traceability features. Integrating blockchain with WSNs significantly enhances security, data integrity, and decentralization within the network. Integrating blockchain technology with WSNs significantly enhances security, data integrity, and decentralization within the network. In this paper, we introduce a Blockchain-enabled secure LEACH protocol to ensure reliable data transmission in wireless sensor networks. The proposed hybrid blockchain framework includes three phases: Registration, Authentication, and Malicious Node Detection. By utilizing the autonomous execution capabilities of smart contracts without third-party intervention, we develop specific smart contracts for the registration of cluster heads and ordinary nodes, for authentication between cluster heads and their corresponding ordinary nodes, and for the identification and elimination of malicious cluster head nodes. A detailed security analysis of the proposed BSLEACH framework is provided to provide its robustness against different network attacks such as Man-in-the-Middle attack, Sybil attack, Replay attack and non-repudiation.In performance evaluation, it is observed that the proposed Blockchain-based Secured LEACH (BSLEACH) protocol outperforms other versions of LEACH such as Sleach (Secure low-energy adaptive clustering hierarchy) and Ms-leach (A routing protocol combining multi-hop transmissions and Single-hop transmissions) in the presence of malicious cluster heads and Sybil nodes in the network. The proposed solution improves the performance of the traditional LEACH protocol by identifying and removing malicious Cluster head units from the Private Blockchain network.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Wireless sensor network; LEACH; Cluster head; Blockchain; Registration; Authentication; Malicious node identification

【发表时间】2024

【收录时间】2024-09-23

【文献类型】 理论模型

【DOI】 10.1007/s11277-024-11546-w

PEBS : An efficient patient-enabled blockchain system

【Author】 Pawar, Vijayant Sachdeva, Shelly

【影响因子】1.831

【主题类别】

区块链应用-实体经济-医疗领域

【Abstract】The precise diagnosis and effective treatment of patients rely heavily on healthcare data. However, sharing healthcare information can be challenging due to the potential risks of unauthorized tampering and data leakage. To address these concerns and facilitate secure and efficient data access for stakeholders within and outside the healthcare system, this study introduces a patient-enabled blockchain system (PEBS). Patient-enabled blockchain system uses the Model View Controller (MVC) approach where the model manages the off-chain and on-chain data, the view is the user-accessible module, and the controller acts as an interface between a user interface and storage layer. It enables patients to control their data by determining specific access permissions and executes various smart contracts for stakeholders' registration, authorization, data storage, query, and update operations. Patient-enabled blockchain system incorporates Modified Proof-of-Authority (MPoA), which has been compared against various consensus algorithms such as Proof-of-Work (PoW), Proof-of-Authority (PoA), and Istanbul Byzantine Fault Tolerance (IBFT). Furthermore, the suggested system incorporates the utilization of the Interplanetary File System (IPFS) to address concerns related to performance and storage. We conducted an in-depth analysis and comparison of the system's performance using key parameters such as transaction latency and throughput. Experiments are carried out using network sizes of 10 and 30, with transaction counts from 5 to 500. The experiments show that the highest latency for the proposed system is 58,105 ms, almost 4.8 times less than PoW, which is 283,575 and provides 2.7 times higher throughput (101 transactions per second) than PoW (38 transactions per second).

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】blockchain; healthcare; interplanetary file system; smart contract

【发表时间】2024

【收录时间】2024-09-23

【文献类型】 实验仿真

【DOI】 10.1002/cpe.8287

Process-commutative distributed objects: From cryptocurrencies to Byzantine-Fault-Tolerant CRDTs

【Author】 Frey, Davide Guillou, Lucie Raynal, Michel Taiani, Francois

CCF-B

【影响因子】1.002

【主题类别】

区块链技术-核心技术-拜占庭容错协议

【Abstract】This paper explores the territory that lies between best-effort Byzantine-Fault-Tolerant Conflict free Replicated Data Types (BFT CRDTs) and totally ordered distributed ledgers, such as those implemented by Blockchains. It formally characterizes a novel class of distributed objects that only requires a First In First Out (FIFO) order on the object operations from each process (taken individually). The formalization leverages Mazurkiewicz traces to define legal sequences of operations and ensure both Strong Eventual Consistency (SEC) and Pipleline Consistency (PC). The paper presents a generic algorithm that implements this novel class of distributed objects both in a crash and Byzantine setting. It also illustrates the practical interest of the proposed approach using four instances of this class of objects, namely money transfer, Petri nets, multi-sets, and concurrent work stealing dequeues.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Distributed algorithm; Byzantine fault tolerance; Conflict-free replicated data types; Mazurkiewicz traces

【发表时间】2024

【收录时间】2024-09-23

【文献类型】 理论模型

【DOI】 10.1016/j.tcs.2024.114794

在线标注

备案号: 苏ICP备17025947号-5

评论回复