• 首页
  • 每日更新
  • 文献
  • 会议文献
  • 政策法规
  • 研究专题
  • 区块链游戏
logo 区块链前沿
  • 区块链前沿
  • 首页
  • 每日更新
  • 文献
  • 会议文献
  • 政策法规
  • 研究专题
  • 区块链游戏
  • 文章创新角色
  • 科研创新指数
  • 区块链领域本体
  • 热点主题挖掘
  • 主题展示
  • 专利文献
  • 排行榜
  • DAO治理
  • 文献上传
  • 积分获取规则
  • 大语言模型解析
  • 期刊发文分布
注册 登录

2024年09月24日 30篇

文献来源

  • 30

主题分类

      • 1
      • 1
      • 1
      • 1
      • 1
      • 1
      • 1
      • 1
      • 1
      • 1
      • 3
      • 3
      • 2
      • 1
      • 1
      • 1
      • 1
      • 1
      • 1
      • 1
      • 2
      • 1
      • 1
      • 2
      • 1
      • 1
      • 1
      • 1
      • 1
      • 1

文献类型

  • 2
  • 24
  • 3
  • 1
筛选
订阅
<< 前一天 后一天 >>

Lattice-Like Blockchain System for Maintaining the Data Privacy in the Distributed Computation of Carbon Emission

【Author】 Han, Zhuopu Ding, Tao Mu, Chenggang Shen, Xin Li, Jiahao Shahidehpour, Mohammad

【影响因子】10.275

【主题类别】

区块链应用-实体经济-电力领域

区块链技术-协同技术-多方计算

【Abstract】Calculation and deposit of carbon emission flow help optimize the systematic management of power system operation with different types of power generation units. Traditionally, centralized computation of carbon emission flow led to some inherent problems, including poor stability, flexibility and data privacy concerns. In contrast, the existing distributed computation methods for carbon emission fail to protect data privacy and is difficult to ensure data credibility. Therefore, this paper proposes a distributed computation method for carbon emission flow, where a bus classification method and an encryption algorithm are designed to protect data privacy. Then, a lattice-like light blockchain structure is proposed for carbon emission flow calculation result, enhancing efficiency during the deposit process. The proposed lattice-like blockchain breaks through the existing structure with a single chain, as it realizes an asynchronous consensus by significantly improving the uploading speed of the blockchain. Finally, the IEEE 33-bus system is used to verify the reliability and security of the proposed method, interact with the lattice-like blockchain, and enhance the computation performance of the proposed method.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Carbon dioxide; Data privacy; Power system stability; Load flow; Consensus protocol; Reliability; Power system reliability; Carbon emission flow; blockchain structure; distributed algorithm; encryption; asynchronous consensus

【发表时间】2024

【收录时间】2024-09-24

【文献类型】 理论模型

【DOI】 10.1109/TSG.2024.3380611

Secure and Efficient Data Sharing for IoT Based on Blockchain and Reputation Mechanism

【Author】 Yang, Wei Hou, Chengqi Zhang, Zhiming Wang, Xinlong Chen, Shaolong

CCF-C

【影响因子】10.238

【主题类别】

区块链应用-实体经济-物联网

区块链技术-协同技术-智能合约

【Abstract】The escalating adoption of Internet of Things (IoT) technologies produces vast amounts of real-time data, which can be shared and analyzed to enhance productivity and product quality across various industries. Unfortunately, the current IoT systems rely heavily on cloud servers for centralized data management. These systems not only suffer from the single point of failure problems but also have data security issues. The malicious users may compromise user privacy or inject corrupted data during the data sharing process. In this article, we propose a secure and efficient data sharing scheme for IoT. First, the scheme integrates blockchain with the distributed database, utilizing smart contracts to ensure secure data storage, querying, and sharing in IoT. Second, we incorporate a reputation mechanism into the data sharing process. This allows IoT users to receive reputation feedback from their partners based on their behaviors, which is dynamically updated as a reputation score on the blockchain by smart contracts. Therefore, honest users get more opportunities to share data, while malicious users are held accountable and revoked from the IoT system. We also harness advanced cryptographic techniques to ensure the submission of reputation feedback does not disclose the user's private information, preventing vindictive actions from malicious users. Finally, we demonstrate the security and effectiveness of the proposed scheme by conducting the security analysis and the detailed experiments.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchains; Cloud computing; Internet of Things; Access control; Smart contracts; Data privacy; Servers; Blockchain; data sharing; Internet of Things (IoT); privacy protection; reputation mechanism

【发表时间】2024

【收录时间】2024-09-24

【文献类型】 理论模型

【DOI】 10.1109/JIOT.2024.3371063

TBSCrowd: A Blockchain-Assisted Privacy-Preserving Mobile Crowdsourcing Scheme From Threshold Blind Signatures

【Author】 Liu, Jinhui Dong, Shunyu Wen, Jiaming Tang, Bo Yu, Yong

CCF-C

【影响因子】10.238

【主题类别】

区块链技术-协同技术-隐私保护

【Abstract】Mobile crowdsourcing is the practice of hiring a number of people (workers) at a low cost to complete tasks that are typically difficult to complete individually. However, in the IoT era, how to achieve lightweight privacy preservation and evaluate the trust of human mobility are crucial matters. Therefore, this article proposes a blockchain assisted privacy-preserving mobile crowdsourcing scheme based on threshold blind signatures (TBSCrowd for short). We design a blockchain assisted privacy-preserving mobile crowdsourcing scheme which can preserve security, robustness, fairness while reducing computation and communication overheads of scheme. To achieve the properties of privacy, unforgeability and robustness, we propose robust asynchronous ECC threshold signatures. Simulations are conducted to show the performance of the TBSCrowd scheme, and the experiment results demonstrate that our construction significantly outperforms some related schemes in security and other related aspects.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Crowdsourcing; Blockchains; Security; Privacy; Task analysis; Robustness; Internet of Things; Blind signatures; blockchain; mobile crowdsourcing system; privacy preserving; security; threshold signatures

【发表时间】2024

【收录时间】2024-09-24

【文献类型】 实验仿真

【DOI】 10.1109/JIOT.2023.3342092

Efficient Designated Verifier Signature for Secure Cross-Chain Health Data Sharing in BIoMT

【Author】 Li, Chaoyang Jiang, Bohao Dong, Mianxiong Chen, Yuling Zhang, Zhifeng Xin, Xiangjun Ota, Kaoru

CCF-C

【影响因子】10.238

【主题类别】

区块链应用-实体经济-健康领域

【Abstract】Blockchain technology brings a method for cross-institution health data sharing through the systems of the Internet of Medical Things (IoMT). As different medical institutions compete to establish their own blockchain ledgers, it leads to new problems of "data island." In this article, a relay chain-based multichain fusion (MCF) model has been designed for blockchain-enabled IoMT (BIoMT), which can achieve cross-institution health data sharing by composing different blockchains together. In this MCF model, the existing patient private health chain, medical institution chain, and government supervision chain compose a cross-chain health data-sharing platform, which extends the storage capacity of health data, and the capacity of data sharing among different departments, institutions, and fields. Meanwhile, a cross-chain transaction model has been established which helps to achieve secure cross-chain transactions among different medical institutions. Then, to guarantee user privacy in the cross-chain transaction process, a designated verifier signature (DVS) scheme is proposed. Only the designated verifier can verify this DVS and other users cannot identify the real signer. This DVS also can achieve the anonymity of the signer as the third party cannot distinguish the signature generated by the signer or the verifier. Moreover, the proposed DVS scheme can be proved to capture the unforgeability, nontransferability, and signer anonymity with the random oracle model. The theoretical analyses and efficiency comparisons are given which show the efficiency of the proposed DVS scheme compared with similar schemes. The performance simulation of the cross-chain transaction shows that the MCF model is secure and practical for cross-chain health data sharing among different BIoMT systems.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchains; Biological system modeling; Voltage control; Data privacy; Cryptography; Security; Data models; Blockchain; designated verifier signature (DVS); Internet of Medical Things (IoMT); paper; privacy-preservingLATEX; template

【发表时间】2024

【收录时间】2024-09-24

【文献类型】 实验仿真

【DOI】 10.1109/JIOT.2024.3370708

A Novel Internet of Things Web Attack Detection Architecture Based on the Combination of Symbolism and Connectionism AI

【Author】 An, Yufei Yu, F. Richard He, Ying Li, Jianqiang Chen, Jianyong Leung, Victor C. M.

CCF-C

【影响因子】10.238

【主题类别】

区块链技术-协同技术-物联网

【Abstract】The rapid advancement and wide application of the Internet of Things technology (IoT) have brought unprecedented convenience to people's production and life. A great number of devices are connected to the IoT network to provide various services for people, which also makes the IoT more vulnerable to various cyber attacks. This article designs a novel IoT Web attack detection architecture, which combines the powerful knowledge expression ability and high interpretability of symbolic artificial intelligence (AI) with the adaptive learning ability of connectionist AI to form a closed loop of knowledge embedding and extraction, effectively improve the detection ability of Web attacks. The architecture solves the "black box" feature of deep learning models and can obtain knowledge from the trained detection model and add it to the training process of the new model to improve detection capabilities. It also uses the advantages of blockchain technology to realize intelligent sharing between different detection systems, solve the problem of difficult detection model updates and training data acquisition "bottlenecks." To better detect Web attacks, we propose a semi-supervised learning method based on an interpretable convolutional neural network (CNN) to reduce misjudgments during self-training and improve detection accuracy. Additionally, we propose a new feature method to extract the features of Web logs in IoT devices, which can help the system to detect Web attacks in IoT more quickly and accurately. Simulation results on two different data sets show that the proposed architecture and method can effectively detect Web attacks in IoT and reduce the false positive rate.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Internet of Things; Artificial intelligence; Feature extraction; Deep learning; Blockchains; Training; Service-oriented architecture; Blockchain; connectionist artificial intelligence (AI); Internet of Things (IoT); semi-supervised learning; symbolic AI; Web attack

【发表时间】2024

【收录时间】2024-09-24

【文献类型】 实验仿真

【DOI】 10.1109/JIOT.2024.3369852

Blockchain-Enhanced Time-Variant Mean Field-Optimized Dynamic Computation Sharing in Mobile Network

【Author】 Bai, Fenhua Shen, Tao Yu, Zhuo Song, Jian Gong, Bei Waqas, Muhammad Alasmary, Hisham

CCF-B

【影响因子】8.346

【主题类别】

区块链技术-核心技术-共识机制

【Abstract】Although 5G and beyond communication technology empower a large number of edge heterogeneous devices and applications, the stringent security remains a major concern when dealing with the millions of edge computing tasks in the highly dynamic heterogeneous networks (HDHNs). Blockchains contribute significantly to addressing security challenges by guaranteeing the reliability of data and information. Since the node's mobility, there are risks of exiting the network and leaving the remaining tasks noncomputed. Therefore, we model the cost function of offloaded computing tasks as a dynamic stochastic game. To reduce the computational complexity, the Time-Variant Mean-Field term (TVMF) is adopted to solve the cost-optimized problem. What's more, we design an Adaptivity-Aware Practical byzantine fault tolerance consensus Protocol (AAPP) to dynamically formulate domains, execute leader node selection with regard to task completion and quickly verify computational results. In addition, a Dynamic Multi-domain Fractional Repetition uncoded repair storage (DMFR) scheme with variant redundancy is proposed to reduce the storage pressure and repair overhead. The simulation is implemented to demonstrate our scheme outperforms the benchmarks in terms of cost and time overhead.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Task analysis; Games; Wireless communication; Mobile handsets; Maintenance engineering; Dynamic scheduling; Costs; Dynamic networks; tasks offload; blockchains; mean-field game; fractional repetition code

【发表时间】2024

【收录时间】2024-09-24

【文献类型】 实验仿真

【DOI】 10.1109/TWC.2024.3388411

Profitability Analysis of Time-Restricted Double-Spending Attack on PoW-Based Large Scale Blockchain With the Aid of Multiple Types of Attacks

【Author】 Jiang, Yiming Zhang, Jiangfan

CCF-A

【影响因子】7.231

【主题类别】

区块链技术-核心技术-共识机制

【Abstract】We consider the time-restricted double-spending attack (TR-DSA) on the Proof-of-Work-based blockchain, where an adversary conducts a DSA within a finite timeframe and simultaneously launches multiple types of attacks on the blockchain. To be specific, the adversary can conduct attacks to isolate some honest miners and cause block propagation delays among miners to enhance the success probability of the TR-DSA. We first develop the closed-form expression for the success probability of a TR-DSA with the aid of multiple types of attacks, which is leveraged to develop the closed-form expression for the expected profit of a TR-DSA. The numerical analysis reveals that in scenarios where an adversary lacks the majority of computational power in the blockchain network, it is advisable for the adversary to refrain from indefinitely conducting a DSA, and moreover, the adversary can repeatedly launch "short-time" TR-DSAs to obtain their maximum expected profit. Notably, by leveraging the closed-form expression for the expected profit of a TR-DSA, the blockchain network designer can reduce the expected profit of a TR-DSA and therefore significantly mitigate the risk of TR-DSAs by adjusting system parameters, such as the number of blocks required for transaction confirmation, mining reward, and mining cost.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchains; Task analysis; Reliability; Bitcoin; Resistance; Closed-form solutions; Security; Proof-of-work; blockchain; double-spending attack; profitability; eclipse attack; Sybil attack

【发表时间】2024

【收录时间】2024-09-24

【文献类型】 实验仿真

【DOI】 10.1109/TIFS.2024.3449224

Trustworthy Federated Learning Against Malicious Attacks in Web 3.0

【Author】 Yuan, Zheng Tian, Youliang Zhou, Zhou Li, Ta Wang, Shuai Xiong, Jinbo

【影响因子】5.033

【主题类别】

区块链技术-协同技术-联邦学习

【Abstract】In the era of Web 3.0, federated learning has emerged as a crucial technical method in resolving conflicts between data security and open sharing. However, federated learning is susceptible to various malicious behaviors, including inference attacks, poisoning attacks, and free-riding attacks. These adversarial activities can lead to privacy breaches, unavailability of global models, and unfair training processes. To tackle these challenges, we propose a trustworthy federated learning scheme (TWFL) that can resist the above malicious attacks. Specifically, we firstly propose a novel adaptive method based on two-trapdoor homomorphic encryption to encrypt gradients uploaded by users, thereby resisting inference attacks. Secondly, we design confidence calculation and contribution calculation mechanisms to resist poisoning attacks and free-riding attacks. Finally, we prove the security of our scheme through formal security analysis, and demonstrate through experiments conducted on MNIST and FASHIONMNIST datasets that TWFL achieves a higher model accuracy of 2%-3% compared to traditional methods such as Median and Trim-mean. In summary, TWFL can not only resist a variety of attacks but also ensure improved accuracy, which is enough to prove that it is a trustworthy solution suitable for Web 3.0 privacy protection scenarios.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Federated learning; Training; Semantic Web; Servers; Privacy; Blockchains; Resists; web 3.0; inference attacks; poisoning attacks; free-riding attacks

【发表时间】2024

【收录时间】2024-09-24

【文献类型】 实验仿真

【DOI】 10.1109/TNSE.2024.3350365

SecureSL: A Privacy-Preserving Vertical Cooperative Learning Scheme for Web 3.0

【Author】 Yang, Wenti Wang, Xiaodong Guan, Zhitao Wu, Longfei Du, Xiaojiang Guizani, Mohsen

【影响因子】5.033

【主题类别】

区块链技术-协同技术-隐私保护

【Abstract】Web 3.0 is the highly anticipated new evolution of the World Wide Web that promises greater decentralization, intelligence, and security than its predecessors. Neural networks are a powerful tool that can be used to build more intelligent and personalized web. However, traditional centralized learning of neural networks is limited, and the emerging cooperative learning methods such as federated learning are often restricted to horizontally partitioned data. To enable vertical cooperative learning and tackle the associated privacy preservation issues, we propose SecureSL, a vertical cooperative learning scheme based on split learning. We present an edge-end cooperative learning framework that fits the decentralized feature of Web 3.0. We adopt multi-key homomorphic encryption (MKHE) to ensure the confidentiality of the data, the labels and the trained model, making SecureSL resistant to collusion attacks. Furthermore, we employ the single instruction, multiple data (SIMD) technique and optimize the training process to improve the computational efficiency of MKHE. Finally, we evaluate the privacy preservation performance and the model accuracy of SecureSL through extensive experiments. The results show that our proposed scheme provides a robust solution for vertical cooperative learning in Web 3.0 applications which can address the critical privacy concerns while maintaining the model accuracy.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Semantic Web; Training; Computational modeling; Data models; Security; Privacy; Federated learning; Privacy-preserving; split learning; vertical cooperative learning; web 3.0

【发表时间】2024

【收录时间】2024-09-24

【文献类型】 实验仿真

【DOI】 10.1109/TNSE.2023.3332760

A Web 3.0-Based Trading Platform for Data Annotation Service With Optimal Pricing

【Author】 Yang, Shu Zhang, Yilei Cui, Laizhong Deng, Bin Chen, Taoyuan Dong, Qingzhen

【影响因子】5.033

【主题类别】

区块链应用-实体经济-数据资产交易

【Abstract】Annotating data is becoming increasingly important with the prevalence of machine learning. However, due to limited computing resources and high costs, most data owners prefer to outsource the task of data annotation to service providers with more computing resources and experience in annotation. While different parties are decentralized and selfish, it is important for them to reach consensus. We develop a Web 3.0-based trading platform for data annotation services that aims to ensure security and botain optimal prices during trading. Specifically, user information and trading records are stored in the blockchain to safeguard the platform's security. Moreover, we introduce a market mechanism that automates the transaction negotiation. In the market, a game theory-based pricing algorithm is proposed to maximize the whole utility of both parties. Finally, we conduct extensive experiments, and the results show that our system can significantly enhance the security level and user utility.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Annotations; Pricing; Blockchains; Security; Semantic Web; Outsourcing; Games; Blockchain; pricing mechanism; Web 3.0

【发表时间】2024

【收录时间】2024-09-24

【文献类型】 实验仿真

【DOI】 10.1109/TNSE.2023.3322817

Blockchain-Based Dynamic Cloud Data Integrity Auditing via Non-Leaf Node Sampling of Rank-Based Merkle Hash Tree

【Author】 Wang, Chenxu Sun, Yifan Liu, Boyang Xue, Lei Guan, Xiaohong

【影响因子】5.033

【主题类别】

区块链技术-协同技术-云存储

【Abstract】Cloud storage plays an important role in the era of Big Data and Web 3.0. More and more data owners (DOs) store their data on Cloud for convenience and affordability. However, security and integrity completely depend on cloud storage service providers (CSPs) after data outsourcing. Once CSPs commit dishonest actions that lead to data tampering or loss, it will cause huge losses to DOs. Therefore, DOs need to audit the integrity of their data regularly. Traditional auditing schemes rely on trusted third parties (TPAs), which are not always trustworthy. This paper utilizes Blockchain instead of a trusted third-party auditor for data integrity auditing to address the trust crisis between data owners and cloud storage providers. Existing Rank-based Merkle Hash Tree (RMHT)-based auditing approaches suffer from high communication cost, limiting its applications to Blockchain scenarios. To address these issues, we enhance the auditing algorithm through extending the Rank-based Merkle Hash Tree (RMHT) for dynamic update of stored data and using a non-leaf node sampling strategy. These modifications significantly reduce the communication overhead during auditing and update phases. Such optimizations enable the algorithm to be well-suited for the Blockchain environment because proofs are stored on the Blockchain with gas fees. We implement a prototype and perform a security analysis of the proposed system. Experimental results demonstrate the security and effectiveness of the proposed approach.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchains; Peer-to-peer computing; Cloud computing; Data integrity; Security; Fabrics; Smart contracts; Blockchain; cloud storage; data auditing; smart contracts; Web 3.0

【发表时间】2024

【收录时间】2024-09-24

【文献类型】 实验仿真

【DOI】 10.1109/TNSE.2024.3393978

Cooperation and Optimization of Multi-Pool Mining Game With Zero Determinant Alliance

【Author】 Tang, Changbing Yang, Baosen Zhang, Yao Lin, Feilong Chen, Guanrong

【影响因子】5.033

【主题类别】

区块链技术-核心技术-挖矿策略

【Abstract】In blockchain technology, solving the SHA256 problem (also known as mining) is key for the proof-of-work (PoW)-based blockchain networks. However, selfish pools typically initiate block withholding attacks on others for greater rewards in the process of consensus, resulting in a decline of the social welfare and even posing a threat to the efficiency of the entire blockchain system. In this study, the multi-pool mining game in the blockchain network is applied to optimize the strategy selection of mining pools and to improve the mining efficiency. First, the multi-pool mining process is formulated as a multi-player game and then the zero determinant (ZD) strategy is utilized to resolve the mining pool dilemma. Thereafter, a ZD alliance mechanism is proposed to optimize the strategy selection of pools, aiming to effectively avoid block withholding attacks and to encourage cooperative mining among pools. Finally, numerical simulations show that the ZD alliance can significantly improve the social welfare and the cooperation probability of the mining pools, which verifies the theoretical results.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchains; Games; Peer-to-peer computing; Proof of Work; Stability analysis; Optimization; Data mining; Blockchain network; block withholding attack; mining pool game; zero determinant alliance

【发表时间】2024

【收录时间】2024-09-24

【文献类型】 实证数据

【DOI】 10.1109/TNSE.2024.3409288

Blockchain-Based Semantic Information Sharing and Pricing for Web 3.0

【Author】 Lin, Yijing Gao, Zhipeng Du, Hongyang Niyato, Dusit Kang, Jiawen Gao, Yulan Wang, Jiacheng Jamalipour, Abbas

【影响因子】5.033

【主题类别】

区块链技术-核心技术-通信方法

【Abstract】Web 3.0 is a promising next-generation Internet paradigm that is driven by multiple technologies, e.g., semantic communications, besides blockchain to enable transparent and traceable data sharing. Specifically, semantic communication can provide Web 3.0 services with a promising and lightweight paradigm for semantic information transmission. However, a unified integration framework has not been studied. Moreover, how to achieve efficient semantic sharing and pricing challenges the traditional centralized communication paradigm. Therefore, this paper integrates blockchain and semantic communication to share valuable semantic information for Web 3.0 services. The Proof of Semantic mechanism is designed to reduce the garbage-in garbage-out challenge of Web 3.0 services. Moreover, we utilize the state channel and the information bottleneck to construct a task-relevant semantic sharing mechanism to exchange information efficiently in Web 3.0 services. To maximize semantic information's utility, we propose a semantic pricing mechanism based multi-leader multi-follower Stackelberg game to circulate information in Web 3.0 services. Simulation results indicate that the proposed mechanisms are both verifiable and efficient, achieving reduced communication overheads while maintaining test accuracy comparable to benchmark methods.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Semantics; Blockchains; Semantic Web; Task analysis; Pricing; Resource management; Redundancy; Web 3.0 service; blockchain; semantic communication; semantic sharing; semantic pricing

【发表时间】2024

【收录时间】2024-09-24

【文献类型】 实验仿真

【DOI】 10.1109/TNSE.2023.3345335

RPSC: Regulatable Privacy-Preserving Smart Contracts on Account-Based Blockchain

【Author】 Jiang, Zoe L. Xie, Min Chen, Hanlin Pan, Yijian Lyu, Jiazhuo Au, Man Ho Fang, Junbin Liu, Yang Wang, Xuan

【影响因子】5.033

【主题类别】

区块链技术-核心技术-智能合约

【Abstract】Smart contracts have been widely used to develop decentralized applications on account-based blockchain. The privacy issues of smart contracts have also received attention from researchers, and many privacy-preserving schemes and applications have been proposed. However, most existing schemes cannot achieve flexible conversion between private and public data. And the overly secure privacy-preserving scheme directly makes the regulation impossible. To mitigate these limitations, we propose a flexible privacy-preserving smart contracts with regulation (RPSC) system over the account-based blockchain. We first design a two-layer commitment structure that enables the fine-grained privacy protection (identity anonymity and data confidentiality) and flexible data state transitions. Then we combine a public-key encryption scheme with a zk-SNARKs scheme to achieve regulation property while keeping user's identity from others. Moreover, we prove that our scheme is secure, including privacy, soundness and traceability. Finally, we integrate RPSC into an account-based blockchain and implement two applications to evaluate the system performance. The evaluation results show our system performs effectively in practical settings.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Regulatable smart contracts; account-based blockchain; identity anonymity; data privacy; zk-SNARKs; Regulatable smart contracts; account-based blockchain; identity anonymity; data privacy; zk-SNARKs

【发表时间】2024

【收录时间】2024-09-24

【文献类型】 实验仿真

【DOI】 10.1109/TNSE.2024.3421539

Novel Blockchain-Integrated Quantum-Resilient Self-Certified Authentication Protocol for Cross-Industry Communications

【Author】 Ghaemi, Hadi Abbasinezhad-Mood, Dariush

【影响因子】5.033

【主题类别】

区块链技术-协同技术-物联网

【Abstract】The Fourth Industrial Revolution (4IR) aims at improving the manufacturing cost and quality by inter-connection of Industrial Internet of Things (IIoT) devices. In the 4IR, IIoT-based machines need to collaborate securely and autonomously through the insecure Internet channel. Although various blockchain-based protocols have been introduced for securing cross-industry Machine-to-Machine (M2M) communications, they, are insecure to some cyberattacks, rely on some intermediary servers for successful M2M authentication, are not efficient enough to be employed in the context of IIoT environments, and are not resilient to quantum computers. To address these weaknesses, this paper suggests a novel quantum-resilient self-certified authentication protocol for cross-industry communications using the cutting-edge blockchain technology. Thanks to the blockchain ledger, the cross-industry connections have been facilitated and thanks to the self-certified approach, the blockchain referrals have been reduced to only one ledger reading. In our protocol, no intermediary server needs to involve and IIoT machines can directly authenticate each other. The advantages and efficiency enhancements of our protocol, compared to top-related ones, are shown, respectively, by comparative property and performance analyses. Specifically, our protocol indicates 13% and 91% improvements in communication and computation overheads over the most efficient protocol.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Authentication; blockchain; cross-industry communications; post-quantum cryptography; self-certified; blockchain; cross-industry communications; post-quantum cryptography; self-certified

【发表时间】2024

【收录时间】2024-09-24

【文献类型】 实验仿真

【DOI】 10.1109/TNSE.2024.3428916

Knowledge Inference Over Web 3.0 for Intelligent Fault Diagnosis in Industrial Internet of Things

【Author】 Chi, Yuanfang Duan, Haihan Cai, Wei Wang, Z. Jane Leung, Victor C. M.

【影响因子】5.033

【主题类别】

区块链应用-实体经济-工业互联网

【Abstract】Collaboration through knowledge sharing is critical for the success of intelligent fault diagnosis in a complex Industrial Internet of Things (IIoT) system that comprises various interconnected subsystems. However, since the subsystems of an IIoT system may be owned and operated by different stakeholders, sharing fault diagnosis knowledge while preserving data security and privacy is challenging. While decentralized data exchange has been proposed for cyber-physical systems and digital twins based on the Web 3.0 paradigm, decentralized knowledge sharing in knowledge-based intelligent fault diagnosis is less investigated. To address this research gap, we propose a Web 3.0 application for collaborative knowledge-based intelligent fault diagnosis using blockchain-empowered decentralized knowledge inference (BDKI). Our proposed mechanism enables workers to self-evaluate their ability to contribute to the knowledge inference with their local knowledge graphs. The knowledge-sharing requestor can then choose a worker with the best evaluation result and initiate collaborative training. To demonstrate the efficiency and effectiveness of BDKI, we evaluate it using well-known datasets. Results show that BDKI delivers a favorable inference model with higher overall accuracy and less training effort compared to inference models trained using conventional knowledge inference with random training sequences.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Fault diagnosis; Industrial Internet of Things; Knowledge graphs; Semantic Web; Knowledge based systems; Collaboration; Training; Industrial Internet of Things (IIoT); fault diagnosis; decentralized knowledge inference; Web 3.0

【发表时间】2024

【收录时间】2024-09-24

【文献类型】 实验仿真

【DOI】 10.1109/TNSE.2023.3344516

SCcheck: A Novel Graph-Driven and Attention- Enabled Smart Contract Vulnerability Detection Framework for Web 3.0 Ecosystem

【Author】 Cao, Yuanlong Jiang, Fan Xiao, Jianmao Chen, Shaolong Shao, Xun Wu, Celimuge

【影响因子】5.033

【主题类别】

区块链治理-技术治理-智能合约漏洞检测

【Abstract】With the rapid progress of technology, Web 3.0 has emerged as a transformative force in the digital realm. It is characterized by decentralization, user-centric data ownership, and the implementation of cryptographic techniques. Smart contracts, as a core component of Web 3.0, play a pivotal role in driving its evolution by enabling novel functionalities and various application. However, given the substantial financial significance of smart contracts and their inherent transparency, the accessibility of their source code to all opens potential avenues for attackers to identify and exploit vulnerabilities. Therefore, the detection of security vulnerabilities in smart contracts has become significantly important. Existing smart contract vulnerability detection tools mostly rely on expert-defined rules, leading to high false positive rates. To address this problem, this article proposes an efficient and automated framework that combines Graph and Attention for detecting smart contract vulnerabilities. This framework takes into account the code structure of smart contracts, extracts nodes, and constructs a contract graph, utilizing dataflow to represent the different semantics of variable nodes at different locations. Additionally, a bidirectional multilayer Transformer framework is constructed and trained with our dataset, utilizing the information from the nodes. The framework achieves state-of-the-art levels of Accuracy 92.72%, Recall 82.81%, and F1(score) 87.54%, respectively. These results show that our framework can effectively detect security vulnerabilities in smart contracts and has the potential to improve their security.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; Smart Contract; Vulnerability Detection; Transformer; Graph; Attention; Blockchain; Smart Contract; Vulnerability Detection; Transformer; Graph; Attention

【发表时间】2024

【收录时间】2024-09-24

【文献类型】 实验仿真

【DOI】 10.1109/TNSE.2023.3324942

Bayesian Game-Driven Incentive Mechanism for Blockchain-Enabled Secure Federated Learning in 6G Wireless Networks

【Author】 Cai, Lingyi Dai, Yueyue Hu, Qiwei Zhou, Jiaxi Zhang, Yan Jiang, Tao

【影响因子】5.033

【主题类别】

区块链技术-协同技术-6G

区块链技术-协同技术-联邦学习

【Abstract】The sixth-generation (6G) wireless networks are envisioned to build a data-driven digital world with widespread Artificial Intelligence (AI). Federated learning (FL) is a distributed AI paradigm that coordinates different data owners to train shared AI models cooperatively. However, traditional FL faces challenges in practically deploying in 6G networks: (i) the central server becomes the bottleneck and fails to identify clients' malicious behaviors, and (ii) the lack of incentive mechanisms makes heterogeneous nodes hard to collaborate when considering unilateral returns. To address the above challenges, we first propose a blockchain-enabled FL (BFL) framework where clients' malicious behaviors could be identified without a central server. Then we propose a Bayesian game-driven incentive mechanism to encourage honest nodes to provide valid models while hindering the training interference from malicious clients. Moreover, we propose a dynamic data contribution scheme to schedule data resources equitably while ensuring model performance. Finally, a Proof-of-Incentive consensus mechanism is designed as benign impetuses to guide the system toward the direction of more secure model aggregation and higher incentives. Experimental results show that our proposed schemes can obtain high-precision models even with malicious clients and effectively motivate honest nodes to join FL in 6G networks.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Federated learning; Blockchain; Incentive mechanism; Bayesian game; Consensus; 6G wireless networks; Federated learning; Blockchain; Incentive mechanism; Bayesian game; Consensus; 6G wireless networks

【发表时间】2024

【收录时间】2024-09-24

【文献类型】 实验仿真

【DOI】 10.1109/TNSE.2024.3405070

Get rich quick, scheme or script? The effect of cryptoculture on the susceptibility of fraud victimization among cryptocurrency purchasers

【Author】 Dulisse, Brandon Christopher Connealy, Nathan Logan, Matthew William

【影响因子】5.009

【主题类别】

区块链治理-市场治理-欺诈犯罪

【Abstract】Purpose: Despite the precipitous rise of cryptocurrency in recent years, little is known regarding the utility and legitimacy of such fiat currencies. This research assesses whether or not a "cryptoculture" exists, and if so, its influence on fraud and/or cryptocurrency loss. Methods: Logistic Regression was used to examine the relationship between cryptoculture and cryptocurrency loss or fraud in a sample of 919 survey respondents who previously purchased cryptocurrency. Results: Results support the existence of a cryptoculture. Respondents who reported higher levels of confidence in cryptocurrency were significantly more likely to also report fraud or loss. This was despite also admitting to feeling more vulnerable when purchasing cryptocurrency. These seemingly conflicting results may actually point to a false sense of confidence by cryptopurchasers driven by cryptoculture, which encourages purchasing decisions to outweigh initial skepticism or distrust. Conclusions: Underlying mechanisms of cryptocurrency purchasing decisions (like cryptoculture) should continue to be examined in greater depth. Over one-third of cryptocurrency purchasers reported that at least some of their cryptocurrency portfolio is missing, yet many remain confident in their ability to navigate the market. This study provides a nuanced analysis of the factors influencing how victims of fraud may be influenced to participate in risky purchases.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Cryptoculture; White-collar crime; Fraud; Victimology; Cryptocurrency

【发表时间】2024

【收录时间】2024-09-24

【文献类型】 实证数据

【DOI】 10.1016/j.jcrimjus.2024.102273

PARE: Privacy-Preserving Data Reliability Evaluation for Spatial Crowdsourcing in Internet of Things

【Author】 He, Peicong Xin, Yang Yang, Yixian

【影响因子】3.860

【主题类别】

区块链技术-协同技术-物联网

区块链技术-协同技术-隐私保护

【Abstract】The proliferation of intelligent, connected Internet of Things (IoT) devices facilitates data collection. However, task workers may be reluctant to participate in data collection due to privacy concerns, and task requesters may be concerned about the validity of the collected data. Hence, it is vital to evaluate the quality of the data collected by the task workers while protecting privacy in spatial crowdsourcing (SC) data collection tasks with IoT. To this end, this paper proposes a privacy-preserving data reliability evaluation for SC in IoT, named PARE. First, we design a data uploading format using blockchain and Paillier homomorphic cryptosystem, providing unchangeable and traceable data while overcoming privacy concerns. Secondly, based on the uploaded data, we propose a method to determine the approximate correct value region without knowing the exact value. Finally, we offer a data filtering mechanism based on the Paillier cryptosystem using this value region. The evaluation and analysis results show that PARE outperforms the existing solution in terms of performance and privacy protection.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Spatial crowdsourcing; privacy-preserving; data evaluation; IoT; blockchain

【发表时间】2024

【收录时间】2024-09-24

【文献类型】 实验仿真

【DOI】 10.32604/cmc.2024.054777

Enhancing Unmanned Aerial Vehicle Security: A Zero-Knowledge Proof Approach with Zero-Knowledge Succinct Non-Interactive Arguments of Knowledge for Authentication and Location Proof

【Author】 Koulianos, Athanasios Paraskevopoulos, Panagiotis Litke, Antonios Papadakis, Nikolaos K.

【影响因子】3.847

【主题类别】

区块链技术-核心技术-零知识证明

【Abstract】UAVs are increasingly being used in various domains, from personal and commercial applications to military operations. Ensuring the security and trustworthiness of UAV communications is crucial, and blockchain technology has been explored as a solution. However, privacy remains a challenge, especially in public blockchains. In this work, we propose a novel approach utilizing zero-knowledge proof techniques, specifically zk-SNARKs, which are non-interactive cryptographic proofs. This approach allows UAVs to prove their authenticity or location without disclosing sensitive information. We generated zk-SNARK proofs using the Zokrates tool on a Raspberry Pi, simulating a drone environment, and analyzed power consumption and CPU utilization. The results are promising, especially in the case of larger drones with higher battery capacities. Ethereum was chosen as the public blockchain platform, with smart contracts developed in Solidity and tested on the Sepolia testnet using Remix IDE. This novel proposed approach paves the way for a new path of research in the UAV area.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】UAV; authentication; privacy; blockchain technology; ethereum; zero-knowledge proof; zk-SNARKs

【发表时间】2024

【收录时间】2024-09-24

【文献类型】 实验仿真

【DOI】 10.3390/s24175838

IOTASDN: IOTA 2.0 Smart Contracts for Securing Software-Defined Networking Ecosystem

【Author】 Fartitchou, Mohamed Lamaakal, Ismail Maleh, Yassine El Makkaoui, Khalid El Allali, Zakaria Plawiak, Pawel Alblehai, Fahad El-Latif, Ahmed A. Abd

【影响因子】3.847

【主题类别】

区块链技术-核心技术-智能合约

【Abstract】Software-Defined Networking (SDN) has revolutionized network management by providing unprecedented flexibility, control, and efficiency. However, its centralized architecture introduces critical security vulnerabilities. This paper introduces a novel approach to securing SDN environments using IOTA 2.0 smart contracts. The proposed system utilizes the IOTA Tangle, a directed acyclic graph (DAG) structure, to improve scalability and efficiency while eliminating transaction fees and reducing energy consumption. We introduce three smart contracts: Authority, Access Control, and DoS Detector, to ensure trusted and secure network operations, prevent unauthorized access, maintain the integrity of control data, and mitigate denial-of-service attacks. Through comprehensive simulations using Mininet and the ShimmerEVM IOTA Test Network, we demonstrate the efficacy of our approach in enhancing SDN security. Our findings highlight the potential of IOTA 2.0 smart contracts to provide a robust, decentralized solution for securing SDN environments, paving the way for the further integration of blockchain technologies in network management.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain (BC); integrity; IOTA 2.0; security; smart contracts; software-defined networking; trust

【发表时间】2024

【收录时间】2024-09-24

【文献类型】 实验仿真

【DOI】 10.3390/s24175716

Blockchain-Based Reputation Privacy Preserving for Quality-Aware Worker Recruitment Scheme in MCS

【Author】 Deng, Qingyong Zuo, Qinghua Li, Zhetao Liu, Haolin Xie, Yong

【影响因子】3.796

【主题类别】

区块链应用-实体经济-招聘领域

【Abstract】Mobile Crowdsourcing (MCS) has become a novel paradigm for enabling data collection by worker recruitment, and the reputation plays a crucial role in achieving high-quality data. Although identity, data, and bid privacy preserving have been thoroughly investigated with the advance of blockchain technology, existing literature barely focuses on reputation privacy, which prevents malicious workers from submitting false data that could affect truth discovery for data requester. Therefore, we propose a Blockchain-Based Reputation Privacy Preserving for Quality-Aware Worker Recruitment Scheme (BRPP-QWR). First, we design a lightweight privacy preserving scheme for the whole life cycle of the worker's reputation, which adopts sub-address retrieval technique combined with Pedersen Commitment and Compact Linkable Spontaneous Anonymous Group (CLSAG) signature to enable fast and anonymous verification of the reputation update process. Subsequently, to tackle the unknown worker recruitment problem, we propose a Reputation, Selfishness, and Quality-based Multi-Armed Bandit (RSQ-MAB) learning algorithm to select reliable and high-quality workers. Lastly, we implement a prototype system on Hyperledger Fabric to evaluate the performance of the reputation management scheme. The results indicate that the execution latency for the reputation score verification and retrieval latency can be reduced by an average of 6.30%-56.90% compared with ARMS-MCS. In addition, experimental results on both real and synthetic datasets show that the proposed RSQ-MAB algorithm achieves an increase of at least 20.05% in regard to the data requester's total revenue and a decrease of at least 48.55% and 3.18% in regret and Multi-round Average Error (MAE), respectively, compared with other benchmark methods.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Sensors; Privacy; Blockchains; Data privacy; Reliability; Recruitment; Servers; Mobile crowdsourcing; privacy preserving; reputation management; blockchain; multi-armed bandit

【发表时间】2024

【收录时间】2024-09-24

【文献类型】 实验仿真

【DOI】 10.1109/TNET.2024.3453056

Topologies for Blockchain Payment Channel Networks: Models and Constructions

【Author】 Khamis, Julia Kotzer, Arad Rottenstreich, Ori

【影响因子】3.796

【主题类别】

区块链技术-核心技术-支付通道网络

【Abstract】Payment channel networks (PCNs), also known as off-chain networks, implement a common approach to deal with the scalability problem of blockchain networks. They enable users to execute payments without committing them to the blockchain by relying on predefined payment channels. A pair of users can employ a payment even without a direct channel between them, by routing the payment via payment channels involving other intermediate users. Users, together with the channels, form a graph known as the off-chain network topology. The off-chain topology and the payment characteristics affect network performance such as the average number of intermediate users a payment is routed through or the values of transaction fees. In this paper, we study two basic problems in payment channel network design. First, efficiently mapping users to an off-chain topology with a known structure. Second, constructing a topology with a bounded number of channels that can serve users well with associated payments. We design algorithms for both problems while considering several fundamental topologies. We study topology-related real data statistics of Raiden, the off-chain extension for Ethereum as well as of Lightning, the equivalent off-chain layer of Bitcoin. We conduct experiments to demonstrate the effectiveness of the algorithms for these networks.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; graph theory; payment channel networks; off-chain payments; Blockchain; graph theory; payment channel networks; off-chain payments

【发表时间】2024

【收录时间】2024-09-24

【文献类型】 实证数据

【DOI】 10.1109/TNET.2024.3445274

Decentralized Trust Management and Incentive Mechanisms for Secure Information Sharing in VANET

【Author】 Han, Hongmu Zhang, Meng Xu, Zhigang Dong, Xinhua Wang, Zhongpeng

【影响因子】3.476

【主题类别】

区块链应用-实体经济-车联网

区块链技术-核心技术-激励机制

【Abstract】The information sharing among internet-connected vehicles is close, but there may be the issue of vehicles providing false information. This paper proposes a new incentive mechanism scheme for VANET to provide a decentralized and trusted service management. We introduce a trust-based message evaluation system, incorporating reputation assessment and negative feedback functions to evaluate the credibility of messages and assessments. A reward and punishment mechanism based on repeated games is designed to incentivize vehicles to proactively share information, thereby preventing false information and defamation attacks. Additionally, a blockchain-based distributed trust management scheme is designed to ensure the consistency of trust management storage through the consensus mechanism of the blockchain, reducing reliance on centralized institutions. Simulation results demonstrate that the establishment of reputation and incentive mechanisms among vehicles enhances the enthusiasm for information sharing and improves the accuracy of identifying false messages.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Vehicular ad hoc networks; Trust management; Blockchains; Security; Information sharing; Games; Computational modeling; Incentive schemes; Blockchain; incentive mechanism; repeated game; trust; vehicular ad-hoc network (VANET)

【发表时间】2024

【收录时间】2024-09-24

【文献类型】 实验仿真

【DOI】 10.1109/ACCESS.2024.3453368

A Blockchain and PKI-Based Secure Vehicle-to-Vehicle Energy-Trading Protocol

【Author】 Hossain, Md Sahabul Rodine, Craig Tsiropoulou, Eirini Eleni

【影响因子】3.252

【主题类别】

区块链应用-实体经济-能源领域

【Abstract】With the increasing awareness for sustainable future and green energy, the demand for electric vehicles (EVs) is growing rapidly, thus placing immense pressure on the energy grid. To alleviate this, local trading between EVs should be encouraged. In this paper, we propose a blockchain and public key infrastructure (PKI)-based secure vehicle-to-vehicle (V2V) energy-trading protocol. A permissioned blockchain utilizing the proof of authority (PoA) consensus and smart contracts is used to securely store data. Encrypted communication is ensured through transport layer security (TLS), with PKI managing the necessary digital certificates and keys. A multi-leader, multi-follower Stackelberg game-based trade algorithm is formulated to determine the optimal energy demands, supplies, and prices. Finally, we propose a detailed communication protocol that ties all the components together, enabling smooth interaction between them. Key findings, such as system behavior and performance, scalability of the trade algorithm and the blockchain, smart contract execution costs, etc., are presented through numerical results by implementing and simulating the protocol in various scenarios. This work not only enhances local energy trading among EVs, encouraging efficient energy usage and reducing burden on the power grid, but also paves a way for future research in sustainable energy management.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】electric vehicle charging; energy trading; blockchain; vehicle-to-vehicle; secure charging protocol; Stackelberg game

【发表时间】2024

【收录时间】2024-09-24

【文献类型】 实验仿真

【DOI】 10.3390/en17174245

A Secure Data E-Governance for Healthcare Application in Cyber Physical Systems

【Author】 Rathee, Geetanjali Saini, Hemraj Garg, Sahil Choi, Bong Jun Hassan, Mohammad Mehedi

CCF-C

【影响因子】1.478

【主题类别】

区块链应用-实体经济-医疗领域

【Abstract】The bio-medical devices gather patient information and communicate it to data consumers via wireless networks to take the appropriate action and decision by informing the doctors. However, IoMT is adopted by healthcare departments with a greater speed, yet the majority of devices are limited to resource constraints and security perspectives. The classical e-healthcare systems that are centric have the inherent problem of single-point failure with low transparency and low control over records. Many proposals have been validated in IoT for addressing the inadequate computing and storage of records through sensors. The main focus of this paper is to propose a novel hybrid architecture called Zero Trust Blockchain Architecture for decentralized E-health-CPS systems to support low latency along with storage and processing of records while monitoring the patients. In addition, a probability distribution function may further draft an accurate and real-time monitoring of patients. The proposed mechanism is analyzed against adequate decision, storage, accuracy and transmission of records.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Cyber-Physical Systems; Data e -Governance; e -Healthcare; Secure Communication; Secure Healthcare

【发表时间】2024

【收录时间】2024-09-24

【文献类型】 实验仿真

【DOI】 10.4018/IJSWIS.345934

A Study of Identity Authentication Using Blockchain Technology in a 5G Multi-Type Network Environment

【Author】 Kao, Jui-Hung Yen, Yu-Yu Wu, Wei-Chen Liaw, Horng-Twu Fan, Shiou-Wei Kao, Yi-Chen

【影响因子】1.170

【主题类别】

区块链技术-协同技术-5G

区块链技术-协同技术-身份验证

【Abstract】The 5G technology, known for its large bandwidth, high speed, low latency, and multi-connection capabilities, significantly accelerates digital transformation in enterprises, especially in addressing factory automation challenges. It facilitates efficient machine-to-machine (M2M) and device-to-device (D2D) connectivity, ensuring rapid data transfer and seamless process convergence under 5G standards. Although 5G offers substantial communication and low latency benefits, its limited indoor coverage requires the deployment of decentralized antennas or small base stations. In contrast, Wi-Fi 6 seamlessly complements 5G, providing superior indoor mobile connectivity. This integration is crucial for businesses looking to accelerate digital transformation. To optimize 5G, the deployment of devices such as bypass switches, SDN switches, and MEC in the 5G Local Breakout network enables user access control and fast authentication. Real-world validation confirms the effectiveness of these measures, which are expected to lead to the future of 5G mobile networks.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Fifth-Generation Mobile Communication; Blockchain; Identity Authentication

【发表时间】2024

【收录时间】2024-09-24

【文献类型】 实验仿真

【DOI】 10.2298/CSIS221115070K

XPull: A Relay-Based Blockchain Intercommunication Framework Achieving Cross-Chain State Pulling

【Author】 Liang, Xinyu Chen, Jing Du, Ruiying

【影响因子】1.019

【主题类别】

区块链技术-核心技术-跨链与多链

【Abstract】Cross-chain technology, which enables different blockchains to intercommunicate with one another, is challenging. Many existing cross-chain platforms, such as Polkadot and Cosmos, generally adopt a relay-based scheme: A relaychain (relay blockchain) receives and records the state information from every parachain (parallel blockchain), and publish the information on the platform, by which parachains are able to efficiently acquire the state information from one another. In the condition when parachain is consortium blockchain, the cross-chain platform cannot work properly. On the one hand, whether state information is submitted to relaychain is completely decided by the internal decision of parachain. The timeliness of state information cannot be guaranteed. On the other hand, the transfer of state information will be interrupted due to the failure of parachain or relaychain-parachain connection. In this paper, we propose a relay-based blockchain intercommunication framework, called XPull (cross-pulling). Specifically, to ensure the timeliness of state information, we propose a cross-chain state pulling scheme based on cosigned state pulling agreement. To solve the interruption of state transfer, we propose a random scheduling scheme to resume the transfer, or confirm the failure of parachain. The security analysis and experimental results demonstrate that XPull is secure and efficient.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Processor scheduling; Real-time systems; Blockchains; Consensus protocol; Security; Relays; Blockchain interoperability; Cross-chain; State pulling

【发表时间】2024

【收录时间】2024-09-24

【文献类型】 实验仿真

【DOI】 10.23919/cje.2023.00.004

Sustainable solutions for overcoming challenges in the tourism sector: integrating artificial intelligence and blockchain for environmental and energy efficiency

【Author】 Ozturk, Tolgahan Kahriman, Elif Altintas Tanriverdi, Volkan

【影响因子】0.972

【主题类别】

区块链应用-实体经济-旅游领域

区块链技术-协同技术-人工智能

【Abstract】The world's population growth is causing environmental pollution and climate change, forcing industry to constantly shift to clean and renewable energy sources. Pollution and energy consumption pose significant risks as a result of materialistic government initiatives at the local levels. These days, it is critical that Turkey's natural resources and tourism attractions become economically and environmentally sustainable for the rest of the world. The most difficult task is to ensure that the interactions between the environment, matter, energy are positive. This can only be accomplished by creating model that takes holistic approach. This study offers a model for applying artificial intelligence.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】holistic approach; artificial intelligence; environment and matter interaction; renewable energy

【发表时间】2024

【收录时间】2024-09-24

【文献类型】 观点阐述

【DOI】 10.1504/IJGW.2024.141408

在线标注

备案号: 苏ICP备17025947号-5

评论回复