• 首页
  • 每日更新
  • 文献
  • 会议文献
  • 政策法规
  • 研究专题
  • 区块链游戏
logo 区块链前沿
  • 区块链前沿
  • 首页
  • 每日更新
  • 文献
  • 会议文献
  • 政策法规
  • 研究专题
  • 区块链游戏
  • 文章创新角色
  • 科研创新指数
  • 区块链领域本体
  • 热点主题挖掘
  • 主题展示
  • 专利文献
  • 排行榜
  • DAO治理
  • 文献上传
  • 积分获取规则
  • 大语言模型解析
  • 期刊发文分布
注册 登录

2024年10月13日 31篇

文献来源

  • 31

主题分类

      • 1
      • 1
      • 2
      • 1
      • 1
      • 1
      • 1
      • 1
      • 1
      • 2
      • 2
      • 1
      • 1
      • 1
      • 1
      • 1
      • 1
      • 1
      • 1
      • 1
      • 1
      • 1
      • 1
      • 1
      • 1
      • 1
      • 1
      • 2
      • 1
      • 1

文献类型

  • 12
  • 4
  • 11
  • 1
  • 3
筛选
订阅
<< 前一天 后一天 >>

Secure UAV (Drone) and the Great Promise of AI

【Author】 Zolfaghari, Behrouz Abbasmollaei, Mostafa Hajizadeh, Fahimeh Yanai, Naoto Bibak, Khodakhast

【影响因子】14.324

【主题类别】

区块链应用-实体经济-无人机领域

【Abstract】UAVs have found their applications in numerous applications from recreational activities to business in addition to military and strategic fields. However, research on UAVs is not going on as quickly as the technology. Especially, when it comes to the security of these devices, the academia is lagging behind the industry. This gap motivates our work in this article as a stepping stone for future research in this area. A comprehensive survey on the security of UAVs and UAV-based systems can help the research community keep pace with, or even lead the industry. Although there are several reviews on UAVs or related areas, there is no recent survey broadly covering various aspects of security. Moreover, none of the existing surveys highlights current and future trends with a focus on the role of an omnipresent technology such as AI. This article endeavors to overcome these shortcomings. We conduct a comprehensive review on security challenges of UAVs as well as the related security controls. Then we develop a future roadmap for research in this area with a focus on the role of AI. The future roadmap is established based on the identified current trends, under-researched topics, and a future look-ahead.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Unmanned aerial vehicle; UAV; drone; artificial intelligence; AI; security; quantum inspired AI; bio-inspired AI

【发表时间】2024

【收录时间】2024-10-13

【文献类型】 案例研究

【DOI】 10.1145/3673225

Digitalisation in food supply chains to build resilience from disruptive events: a combined dynamic capabilities and knowledge-based view

【Author】 Pal, Tapabrata Ganguly, Kunal Chaudhuri, Atanu

【影响因子】11.263

【主题类别】

区块链应用-实体经济-食品领域

【Abstract】PurposeBuilding resilience in food supply chains is considered vital to tackle disruptions and ensure the availability of food. This study aims to empirically explore how firms operating in food supply chains can develop dynamic capabilities and use digital technologies to address disruption.Design/methodology/approachA multiple case study methodology was adopted to understand how the firms built resilience by developing dynamic capabilities. Twenty-five semi-structured interviews were conducted with four case companies to gather data across various functional areas (sourcing, operations and logistics).FindingsResults show that knowledge management is a key antecedent to developing dynamic capabilities. The development of such dynamic capabilities - sensing, seizing and transforming, along with the adoption of digital technologies enabled firms to address the disruptions and, hence, build resilience. Resilience is demonstrated in the form of maintaining or improving performance outcomes such as profit, waste reduction, food quality, lead time, efficiency and customer satisfaction.Originality/valueThis is one of the earliest empirical studies that provide insights into how firms operating in food supply chains have built resilience by developing dynamic capabilities through knowledge management practices and, which required the implementation of digital technologies. The study extends dynamic capability theory with the knowledge-based view and develops a novel framework along with a pathway to build resilience.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Resilience; Dynamic capabilities; Knowledge management; Food supply chain; Artificial intelligence; Blockchain; IoT

【发表时间】2024

【收录时间】2024-10-13

【文献类型】 案例研究

【DOI】 10.1108/SCM-02-2024-0108

Feature selection with annealing for forecasting financial time series

【Author】 Pabuccu, Hakan Barbu, Adrian

【影响因子】6.793

【主题类别】

区块链治理-技术治理-交易预测

【Abstract】Stock market and cryptocurrency forecasting is very important to investors as they aspire to achieve even the slightest improvement to their buy-or-hold strategies so that they may increase profitability. However, obtaining accurate and reliable predictions is challenging, noting that accuracy does not equate to reliability, especially when financial time-series forecasting is applied owing to its complex and chaotic tendencies. To mitigate this complexity, this study provides a comprehensive method for forecasting financial time series based on tactical input-output feature mapping techniques using machine learning (ML) models. During the prediction process, selecting the relevant indicators is vital to obtaining the desired results. In the financial field, limited attention has been paid to this problem with ML solutions. We investigate the use of feature selection with annealing (FSA) for the first time in this field, and we apply the least absolute shrinkage and selection operator (Lasso) method to select the features from more than 1000 candidates obtained from 26 technical classifiers with different periods and lags. Boruta (BOR) feature selection, a wrapper method, is used as a baseline for comparison. Logistic regression (LR), extreme gradient boosting (XGBoost), and long short-term memory are then applied to the selected features for forecasting purposes using 10 different financial datasets containing cryptocurrencies and stocks. The dependent variables consisted of daily logarithmic returns and trends. The mean-squared error for regression, area under the receiver operating characteristic curve, and classification accuracy were used to evaluate model performance, and the statistical significance of the forecasting results was tested using paired t-tests. Experiments indicate that the FSA algorithm increased the performance of ML models, regardless of problem type. The FSA hybrid models showed better performance and outperformed the other BOR models on seven of the 10 datasets for regression and classification. FSA-based models also outperformed Lasso-based models on six of the 10 datasets for regression and four of the 10 datasets for classification. None of the hybrid BOR models outperformed the hybrid FSA models. Lasso-based models, excluding the LR type, were comparable to the best models for six of the 10 datasets for classification. Detailed experimental analysis indicates that the proposed methodology can forecast returns and their movements efficiently and accurately, providing the field with a useful tool for investors.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Financial time-series forecasting; Feature selection; Machine learning; Cryptocurrency; Stock market; Return forecasting

【发表时间】2024

【收录时间】2024-10-13

【文献类型】 实证数据

【DOI】 10.1186/s40854-024-00617-3

Recreational Cannabis Legalization and Illicit Drugs: Drug Usage, Mortality, and Darknet Transactions

【Author】 Liu, Yizhi (Louis) Xie, Karen Chen, Wei

FT50 UTD24

【影响因子】4.638

【主题类别】

区块链治理-市场治理-暗网分析

【Abstract】Recreational cannabis legalization has become an unprecedented trend in the United States, arousing heated debates on its implications for public health. Legalizing access to recreational cannabis may shrink the illicit market as it could be a substitute for illicit substances-the substitution effect. Alternatively, recreational cannabis may serve as a gateway drug to illicit drugs and raise the risk of using illicit substances-the gateway effect. Using novel darknet transactional data along with public health databases, we add evidence to the debate by empirically investigating the impact of recreational cannabis legalization on illicit drug use and mortality. Capitalizing on a quasi-experiment opportunity in which U.S. states legalized recreational cannabis at different times, we found a significant increase in the mortality of illicit drug overdose, along with the initiation and use of illicit drugs after the policy, i.e., the gateway effect. This effect is evident in a significant surge of Bitcoin transactions on darknets-a major source of illicit drugs-after the policy. It is also particularly salient in states allowing higher dosage possession and lower excise taxes on recreational cannabis. Our study contributes novel data to address the public health debate and provide policymakers with timely regulatory recommendations on recreational cannabis legalization.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Recreational Cannabis Legalization; Illicit Drugs; Darknet; Overdose Mortality; Public Health

【发表时间】2024

【收录时间】2024-10-13

【文献类型】 案例研究

【DOI】 10.1177/10591478241276132

A cross-chain-based approach for secure data sharing and interoperability in electronic health records using blockchain technology

【Author】 Puneeth, R. P. Parthasarathy, G.

【影响因子】4.152

【主题类别】

区块链技术-核心技术-跨链与多链

【Abstract】In most healthcare facilities, Electronic Health Records (EHRs) have changed paper-based medical records in the healthcare industry. Nevertheless, there are issues with credibility, management, and secure data storage with the existing EHR frameworks. In order to fill this, this work establishes a cross-chain approach for EHR record sharing that is based on the interoperability of EHRs. Different entities, like patients, healthcare providers, Government Agencies (GA), blockchain, and ledger are included in the proposed system. Several processes including initialization, registration process, agreement and verification process, bank fund transfer and certificate generation, health record exchange among two hospitals, and secret key generation, are used to implement the newly developed authentication approach. In addition, the key is obtained from the interior layers of Deep Residual SpinalNet (Deep RSNet), which is utilized to encrypt the EHR records. The Deep RSNet is the integration of Deep Residual Network (DRN) and SpinalNet. The investigation of the developed technique exposes the supremacy of the Deep RSNet model by achieving minimal values of response time, memory usage, and normalized variance of 53.677 sec, 2.682 MB, and 1.346 respectively.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; Authentication; Electronic healthcare records; Deep residual network; SpinalNet

【发表时间】2024

【收录时间】2024-10-13

【文献类型】 理论模型

【DOI】 10.1016/j.compeleceng.2024.109676

Multimodal healthcare data classification with Tangent Namib Beetle Optimization based routing in blockchain based IoT

【Author】 Lakshmanan, Ramanathan Balakrishnan, Sarojini Mahendran, Anand Subramanian, Ananda Kumar

【影响因子】4.152

【主题类别】

区块链应用-实体经济-健康领域

【Abstract】Blockchain and the Internet of Things (IoT) represent the most promising digital technologies in the modern era. Blockchain serves as a data-sharing platform, while IoT is a network for real-time data transmission analysis. If both of these advancements are executed, they will bring solutions to numerous problems, especially in healthcare applications. In this research, the IoT-blockchainbased fused conventional Neural Network (FCNN) is devised for healthcare data classification. The blockchain-enabled IoT health monitoring systems provide four layers device, communication or blockchain, computation or cloud, and user interface layer. Here, the device layer gathers the data, and the routing is carried out in the communication layer. The proposed Tangent Namib Beetle Optimization (TNBO) with fitness measures is considered for the routing process. Moreover, the input voice signal and input handwriting spiral image are subjected to a computation layer, in which they are subjected to preprocessing, image augmentation, and feature extraction. The features of the input image and voice signal are applied to the healthcare classification process. Finally, the healthcare classification is done by the proposed FCNN. Moreover, the efficiency of the system is ensured via the accuracy, specificity, and sensitivity parameters with optimal values of 0.924, 0.926, and 0.921, respectively.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Convolution neural network (CNN); Tangent Search Algorithm (TSA); Namib Beetle Optimization (NBO); Deep Learning (DL); Internet of Things (IoT)

【发表时间】2024

【收录时间】2024-10-13

【文献类型】 案例研究

【DOI】 10.1016/j.compeleceng.2024.109614

FgDAP: A blockchain-based privacy-enhanced decentralized anonymous payment system with fine-grained traceability

【Author】 Wang, Yibo

【影响因子】4.152

【主题类别】

区块链应用-实体经济-支付领域

【Abstract】Decentralized Anonymous Payment (DAP) frameworks provide users with the capability to securely and privately transfer cryptocurrencies. These frameworks enable direct peer-to-peer transactions, eliminating the involvement of central authorities and ensuring user anonymity. Several advanced anonymous digital currencies have been developed with the primary goal of enhancing user privacy, including Monero and Zerocash. Despite the robust privacy, it results in unexpected criminal activities, like money laundering and online extortion. In this article, we put forward a blockchain-based privacy-enhanced decentralized anonymous payment system with fine-grained traceability (FgDAP) to alleviate the aforementioned threats. It primarily utilizes several essential components, including multimodal private signatures (CRYPTO'22), along with our proposed dual-mode non-interactive zero-knowledge proofs. Specifically, a signing function, along with a set of disclosing functions, is introduced to establish an open algorithm that ensures fine-grained traceability. Finally, we provide an in-depth security analysis and a comprehensive performance evaluation for our proposal. The findings indicate the feasibility of our solution.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Decentralized anonymous payment; Cryptocurrency; Blockchain; Conditional privacy-preserving; Traceability

【发表时间】2024

【收录时间】2024-10-13

【文献类型】 案例研究

【DOI】 10.1016/j.compeleceng.2024.109723

A Security Evaluation Model of the Industrial Internet Based on a Selection Covariance Matrix

【Author】 Yang, Qingqing Wang, Yuhe Li, Shiming Yang, Chao Li, Guoxing Yuan, Yanbin

【影响因子】3.476

【主题类别】

区块链应用-实体经济-网络安全

【Abstract】To improve the quality of industrial internet network security assessment, this paper proposes an improved industrial internet network security situation assessment model. First,we analyze the factors that affect the network security of the industrial internet and determine the evaluation indicators; Second, the ER iterative algorithm and mutation method are used to fuse the evaluation indicators; Then, according to the fusion results, the industrial Internet network security situation assessment model is established; Finally, the selection covariance matrix adaptive evolution strategy (S-CMA-ES) is used to optimize the model parameters. This method establishes one-way selection of better strategies among different subclass groups, achieving better evaluation results. This method effectively solves the problem of reduced modeling accuracy caused by insufficient data. This paper conducts evaluation experiments on an industrial data set, and verifies the feasibility and effectiveness of the industrial Internet network security situation assessment model and S-CMA-ES optimization algorithm proposed in this paper.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Security; Network security; Data models; Indexes; Blockchains; Risk management; Internet; Knowledge based systems; Belief rule-based system; expert system; industrial internet network; selection covariance matrix adaptive evolution strategy

【发表时间】2024

【收录时间】2024-10-13

【文献类型】 理论模型

【DOI】 10.1109/ACCESS.2024.3456781

Secure and Transparent Mobility in Smart Cities: Revolutionizing AVNs to Predict Traffic Congestion Using MapReduce, Private Blockchain, and XAI

【Author】 Saleem, Muhammad Sajid Farooq, Muhammad Shahzad, Tariq Hassan, Arfa Abbas, Sagheer Ali, Tariq Aggoune, El-Hadi M. Khan, Muhammad Adnan

【影响因子】3.476

【主题类别】

区块链应用-实体经济-智慧城市

【Abstract】In the recent era, the practical implementation of Autonomous Vehicular Networks (AVNs) with the vulnerable Vehicle-to-Vehicle (V2V) communication of autonomous vehicles and inadequate intelligent decision-making systems has become a primary concern in smart city mobility. This has led to the traffic congestion concerns such as time wastage, compromised safety, decreased durability and reliability of transportation infrastructure and V2V communication short delay and Roadside Units (RSUs), and reduced traffic flow. To address these issues, secure AVN communication and smart decision-making for autonomous vehicles in smart cities are of utmost importance. It ensures safety on roads, durability of the infrastructure, transparency, reliability, traffic congestion reduction and transportation efficiency. MapReduce is a reliable distributed computing paradigm which is able to analyze and process enormous AVN data in parallel. It contributes to smoother traffic flow by identifying the patterns and providing actionable insights for real-time decision making to decrease congestion. A private blockchain AVN can efficiently solve the problems of data security and reliability by providing tamper-proof record of all the transactions, hence enhancing reliability, and also offering a trusted solution of unauthorized access in real-time V2V communication. Explainable Artificial Intelligence (XAI) which is an efficient way to analyze fairness in traffic data over time providing transparency and availability of intricate traffic patterns, improving real-time traffic management with V2V communication and RSUs and reducing short delays that may occur as well as enabling traffic flow and the development of predictive traffic models that assist in decision making. This research proposed an XAI-based transparent model integrating MapReduce for processing large amounts of data and private blockchain technology for secured and tamper-proof vehicular communication. This proposed model is a promising solution for addressing the AVN data security issues and reliability of the system, mitigating negative effects of traffic congestion, and improving the transparency of decision making on the transport efficiency in smart cities. The proposed model provides a better performance than the previous approaches and gets 96% of the accuracy and 4% of miss rate.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchains; Smart cities; Decision making; Data models; Transportation; Real-time systems; Servers; Traffic congestion; map reduce; blockchain; XAI; AVN

【发表时间】2024

【收录时间】2024-10-13

【文献类型】 实证数据

【DOI】 10.1109/ACCESS.2024.3458983

Exploring Secure V2X Communication Networks for Human-Centric Security and Privacy in Smart Cities

【Author】 Rishiwal, Vinay Agarwal, Udit Alotaibi, Aziz Tanwar, Sudeep Yadav, Preeti Yadav, Mano

【影响因子】3.476

【主题类别】

区块链应用-实体经济-车联网领域

【Abstract】The Internet of Things (IoT) and advanced human-centred technologies have seen rapid expansion in smart city applications, including smart enterprises, homes, and vehicular networks. The IoT architecture underpins technological support for both human- and device-centric secure solutions, which are essential to the functioning of smart cities. Within this evolving landscape, Vehicle-to-Everything (V2X) technology has emerged as a key innovation, integrating vehicular communication with internet connectivity. This integration facilitates seamless data exchange between vehicles, infrastructure, and other entities, contributing to enhanced road safety, optimized traffic flow, reduced emissions, and the development of more intelligent transportation systems. As V2X technology becomes increasingly widespread, ensuring the security and privacy of the information exchanged within these networks is critical. While much of the existing research has concentrated on general IoT security frameworks and standalone vehicular communication protocols, our study addresses the unique security challenges inherent in V2X environments. This paper identifies and examines various security threats, including data privacy breaches, malicious attacks, and traffic manipulation, and explores strategies to mitigate these risks within V2X communications. In addition, this paper investigates the potential of blockchain technology as an innovative solution for enhancing the security and trustworthiness of information exchanges in V2X networks. The paper also includes a case study that presents a proposed solution demonstrating how blockchain technology could strengthen the security and integrity of data transfers within V2X systems. Through comprehensive analysis, evaluation, and recommendations for future research, this work contributes to the current understanding of secure data exchange in V2X networks.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Vehicle-to-everything; Security; Blockchains; Privacy; Pedestrians; Safety; Smart cities; Human factors; Vehicular networks; V2X communication; human-centric security; authentication; blockchain technology

【发表时间】2024

【收录时间】2024-10-13

【文献类型】 案例研究

【DOI】 10.1109/ACCESS.2024.3467002

Cloning Hardware Wallet Without Valid Credentials Through Side-Channel Analysis of Hash Function

【Author】 Park, Dongjun Kim, Joonsup Kim, Heeseok Hong, Seokhie

【影响因子】3.476

【主题类别】

区块链技术-协同技术-钱包技术

【Abstract】Hardware wallets, specialized devices designed to securely manage users' credentials, play a crucial role in securing cryptocurrencies, ensuring credentials remain under user control without reliance on third-party entities. However, despite extensive research on Side-Channel Analysis (SCA) attacks, studies specifically addressing their implications for hardware wallets remain relatively limited. While previous work has demonstrated various SCA attacks on hardware wallets, most of these attacks require sophisticated environmental controls or detailed knowledge of target device. In addition, some attacks assume unrealistic scenarios that require valid credentials to conduct the attacks. This paper introduces a novel SCA attack on hardware wallets to extract master seeds-a foundational component in the security of hardware wallets. Our proposed attack leverages power traces obtained during the processing of the Keyed-Hash Message Authentication Code (HMAC), or more precisely, the Secure Hash Algorithm 2 (SHA-2) inside the HMAC. Notably, our attack is non-invasive, ensuring the integrity of the target device, thereby making it difficult for the wallet owners to detect the attack. Furthermore, our attack can be conducted without a profiling phase, excluding the excessive capabilities required for the attack.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Cryptocurrency; Cryptography; Universal Serial Bus; Random access memory; Microprogramming; Hardware security; Side-channel attacks; Electronic commerce; Online banking; hardware security; side-channel analysis

【发表时间】2024

【收录时间】2024-10-13

【文献类型】 理论模型

【DOI】 10.1109/ACCESS.2024.3440370

Securing Permissioned Blockchain-Based Systems: An Analysis on the Significance of Consensus Mechanisms

【Author】 Nasir, Norshakinah Md Hassan, Suhaidi Mohd Zaini, Khuzairi

【影响因子】3.476

【主题类别】

区块链技术-核心技术-共识机制

【Abstract】In the era of the Fourth Industrial Revolution (Industry 4.0), blockchain technology emerges as an innovative solution to address the challenges of digital-based business networks, such as traceability, transparency, trust, and data authenticity. This transformative technology has shown promise across diverse domains, including finance, healthcare, and supply chain, by enabling secure data transmission and trust establishment between entities. However, blockchain technology experiences an inherent trade-off issue between the core properties of security, decentralization, and scalability in its type of network. While permissionless blockchain excels in security and decentralization, such networks lack scalability and suitability for business transactions. Conversely, permissioned blockchains offer better performance, but are vulnerable to cyber-attacks due to weaknesses in consensus mechanisms. Therefore, this paper provides an analysis of blockchain technology, emphasizing the pivotal role of consensus mechanisms in ensuring security and system performance. In addition, it identifies practical threats, suggests countermeasures, and underscores the importance of resilient and secure consensus mechanisms. Furthermore, it compares and analyzes existing mechanisms for permissioned blockchains, discusses their limitations, and highlights the significance of ensuring system security and performance. Finally, it uncovers essential factors to consider when designing consensus mechanisms for specific blockchain-based applications, laying the foundation for future research in practical and secure permissioned blockchain applications.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Security; Consensus protocol; Business; Peer-to-peer computing; Scalability; Fourth Industrial Revolution; Consensus algorithm; Blockchains; Fault tolerance; Blockchain; consensus mechanism; byzantine fault tolerance; distributed technology; permissioned blockchain

【发表时间】2024

【收录时间】2024-10-13

【文献类型】 观点阐述

【DOI】 10.1109/ACCESS.2024.3465869

HybCBDC: A Design for Central Bank Digital Currency Systems Enabling Digital Cash

【Author】 Lamberty, Ricky Kirste, Daniel Kannengieser, Niclas Sunyaev, Ali

【影响因子】3.476

【主题类别】

区块链应用-虚拟经济-CBDC

【Abstract】Central Bank Digital Currencies (CBDCs) have the potential to increase the financial reliability of digital payment systems by offering direct interactions between payment system participants, including institutional and private ones. To unfold the potential of CBDCs, CBDC systems need to offer confidential payments to protect participants from surveillance. However, confidential payments lay at odds with requirements for transparency of payments in CBDC systems to enforce regulations, such as anti-money laundering (AML) and countering the financing of terrorism (CFT) regulations. This work presents HybCBDC, a CBDC system design that tackles the tension between confidential payments and the enforceability of regulations. We iteratively refined HybCBDC in three rounds of focus group interviews with finance and industry experts. HybCBDC offers cash-like confidential payments and means to enforce regulations. HybCBDC builds on a hybrid access model for using monetary items of a CBDC and combines an account-based and an unspent transaction output (UTXO)-based subsystem to record payments. The main purpose of this work is to support the design of CBDC systems that can tackle the tension between offering payments with cash-like confidentiality while allowing for enforcement of regulations related to AML and CFT.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Distributed ledger; System analysis and design; Regulation; Receivers; Surveillance; Digital signatures; Blockchains; Currencies; Online banking; Privacy; Central bank digital currency (CBDC); confidential payments; digital cash; distributed ledger technology (DLT); privacy enhancing technologies (PETs)

【发表时间】2024

【收录时间】2024-10-13

【文献类型】 理论模型

【DOI】 10.1109/ACCESS.2024.3458451

Blockchain-Enabled Safeguard Mechanism in SCP-Based Relief Supply Chain Designs in Response to Long-Term Disasters

【Author】 Gao, Xuehong Chen, Zhijin Huang, Guozhong Hezam, Ibrahim M.

【影响因子】3.476

【主题类别】

区块链应用-实体经济-供应链

【Abstract】The COVID-19 pandemic has highlighted challenges in manufacturing and distributing essential medical relief supplies like personal protective equipment (PPE) and medical rescue equipment (MRE), such as sudden demand surges, supply chain disruptions, limited resources, and lack of coordination. This study proposes an innovative smart relief manufacturing system leveraging smart connected products (SCP) integrated with a blockchain-enabled safeguard mechanism to enhance relief supply chain (RSC) resilience. The SCP-based SRMS enables mass customization of PPEs and MREs tailored to diverse customer needs. A multi-phase collaboration framework engages customers in ordering, production planning, and delivery. Blockchain enhances transparency, efficiency, and trust by preventing record tampering and enabling the verification of optimal medical supply distribution decisions. This framework provides a valuable template for building intelligent, transparent RSC networks using emerging technologies like SCP and blockchain.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Smart relief manufacturing; smart connected products; relief supply chain; blockchain; disaster; Smart relief manufacturing; smart connected products; relief supply chain; blockchain; disaster

【发表时间】2024

【收录时间】2024-10-13

【文献类型】 理论模型

【DOI】 10.1109/ACCESS.2024.3457609

A Hybrid Optimization Approach to Enhance Source Location Privacy for IoT Healthcare

【Author】 Arpitha, T. Chouhan, Dharamendra Shreyas, J.

【影响因子】3.476

【主题类别】

区块链应用-实体经济-健康领域

【Abstract】The privacy protection of the transmitted data is considered a vital issue encountered by most of the Internet of Things (IoT) platforms. In recent years, the privacy of users has been protected by employing many location privacy-protection algorithms. These methods often use static phantom node selection that lacks adaptability. This paper proposed an innovative Fractional Flamingo Archery Optimization (FFAO) to select the optimal phantom node and identify a suitable routing path for source location privacy in an IoT-enabled blockchain healthcare network. The hybrid approach is based on multi-objective optimization parameters, such as distance, energy, neighbor list, trust, and heterogeneity, to enhance adaptability and security. In addition, blockchain is integrated with FFAO to add an extra layer of protection. The performance of FFAO during optimal routing path selection is validated through simulation in MATLAB environment, and it attained a maximum safety period of 563501.7m, network lifetime of 119.679s, and energy of 0.125J. These findings highlight the effectiveness, scalability, and improved location privacy compared to existing techniques for real-world IoT healthcare applications.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Privacy; Protection; Blockchains; Routing; Medical services; Position measurement; Internet of Things; Internet of Medical Things; Blockchain for privacy; phantom routing; search optimization; source location privacy; IoT healthcare security

【发表时间】2024

【收录时间】2024-10-13

【文献类型】 理论模型

【DOI】 10.1109/ACCESS.2024.3452750

Blockchain-Enabled Federated Learning for Longitudinal Emergency Care

【Author】 Alshudukhi, Khulud Salem S. Ashfaq, Farzeen Jhanjhi, N. Z. Humayun, Mamoona

【影响因子】3.476

【主题类别】

区块链应用-实体经济-医疗领域

区块链技术-协同技术-联邦学习

【Abstract】Emergency situations, such as accidents, explosions, or earthquakes, pose significant challenges for healthcare providers as patients arrive at hospitals with little to no prior information about their medical history or treatment. Doctors frequently lack crucial information regarding past hospitalisations, surgeries, any allergies, previous treatments, and medical issues particularly when patients are alone and unable to communicate. Addressing these challenges requires a medical and technical solution that can rapidly access and incorporate a patient's past medical history while ensuring data privacy and security. By integrating these technologies, our framework not only ensures swift access to critical information but also maintains the highest standards of data privacy and security. To address this issue, we propose a framework that combines federated learning and blockchain technology to facilitate real-time emergency response while incorporating patient historical data. The proposed framework empowers doctors to make informed decisions and deliver personalized care based on a patient's comprehensive medical history, leading to improved treatment outcomes.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Medical services; Blockchains; History; Medical diagnostic imaging; Federated learning; Data privacy; Information exchange; Medical information systems; blockchain; smart healthcare; data security; health information sharing; longitudinal health record

【发表时间】2024

【收录时间】2024-10-13

【文献类型】 理论模型

【DOI】 10.1109/ACCESS.2024.3449550

A Survey on Integrating Edge Computing With AI and Blockchain in Maritime Domain, Aerial Systems, IoT, and Industry 4.0 (vol 12, pg 28684, 2024)

【Author】 Alanhdi, Amad Toka, Laszlo

【影响因子】3.476

【主题类别】

区块链技术-协同技术-边缘计算

【Abstract】Presents corrections to the paper, Corrections to "A Survey on Integrating Edge Computing With AI and Blockchain in Maritime Domain, Aerial Systems, IoT, and Industry 4.0".

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Surveys; Industries; Blockchains; Artificial intelligence; Edge computing

【发表时间】2024

【收录时间】2024-10-13

【文献类型】 综述

【DOI】 10.1109/ACCESS.2024.3465274

Resources Reservation Schemes for Time-Sensitive Networked Vehicular Applications With a View on ISAC

【Author】 Al-Khatib, Abdullah Ehsanfar, Shahab Moessner, Klaus Timinger, Holger

【影响因子】3.476

【主题类别】

区块链应用-实体经济-物联网

【Abstract】Edge computing resources are crucial for time-sensitive and safety-critical vehicular (TSSCV) applications, such as autonomous and remote driving. These applications require guaranteed resource availability for real-time communication and computation to ensure safety and efficiency. With the emergence of integrated sensing and communication (ISAC) in 6G communication systems, extensive sensing data will be added to the communication data. To meet these challenges, resource reservation becomes a necessity. Resource reservation approaches can be either network-side or vehicle-side. Most existing approaches are network-side. However, these approaches are insufficient for these applications because they only guarantee resources to individual vehicles with a certain probability. Vehicle-side reservation is challenging because vehicles usually do not have sufficient information to reason about future available resources and their costs. This comprehensive survey aims to define the characteristics of TSSCV applications and to analyze existing reservation approaches and cost-effective schemes, considering different reservation scenarios in single and multiple mobile network operator (MNO) environments. In addition, it explores strategies to revise or update reservations when faced with uncertain reservation times and costs. To this end, we propose to enable resource trading and reservation exchange facilitated by blockchain smart contracts. This approach promises a secure and efficient method for resource management in future smart vehicles.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Time factors; Resource management; Cloud computing; Autonomous vehicles; Vehicle dynamics; Surveys; Servers; Connected vehicles; Multi-access edge computing; Connected vehicular; TSSCV applications; communication and computation resources; reservation request; reservation update strategy; mobile edge computing; resource trading and exchange

【发表时间】2024

【收录时间】2024-10-13

【文献类型】 案例研究

【DOI】 10.1109/ACCESS.2024.3463880

A Threshold-Blind Signature Scheme and Its Application in Blockchain-Based Systems

【Author】 Reyes-Macedo, Victor Kawachi, Akinori Gallegos-Garcia, Gina Salinas-Rosales, Moises

【影响因子】3.476

【主题类别】

区块链技术-核心技术-隐私保护

【Abstract】In blockchain-based systems usually there are two common concerns: one of them is privacy and other is key management. Besides privacy has been widely studied, nor key management has been done so deeply, moreover, the conjunction of both neither has be addressed. In this work we present a threshold blind signature scheme designed on the modified version of the Paillier cryptosystem presented by Yi et al. Our scheme guarantees four main characteristics of interest: Independence meaning that our scheme could be applied to any blockchain-based transaction system, allowing to adapt it to different application scenarios, i.e. electronic voting or founds administration; secure key storage which improves the key management security by recovering the whole signature instead of the private key and avoiding to have one single point of failure. In addition, we also provide anonymity as one of the best-evaluated features on online transactions. Finally, we achieve independence from mixers or trusted third parties, which most of the time are used to reach anonymity with inherent risks. All of these characteristics are achieved without increase computational and communication cost in comparison with related work.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Bitcoin; Blockchains; Proposals; Privacy; Mixers; Smart contracts; Servers; Security; Blind signatures; blockchain; privacy; security; threshold signatures

【发表时间】2024

【收录时间】2024-10-13

【文献类型】 理论模型

【DOI】 10.1109/ACCESS.2024.3445298

SCoTMan: A Scalable Smart Contract for Trust Management in Social IoT With Real-World Constraints

【Author】 Rouzbahani, Amin Taghiyareh, Fattaneh

【影响因子】3.476

【主题类别】

区块链应用-实体经济-物联网

【Abstract】The Internet of Things (IoT) plays a crucial role in our daily lives. Many objects are being equipped with electronic components in order to facilitate their interconnection and integration with the Internet. Due to the growing usage of IoT devices and generated data, to ensure the reliability of the network, it is necessary to utilize scalable and effective trust management systems. This study introduces the SCoTMan model, which integrates social interactions with the capability of smart contracts for effective trust management in Social IoT (SIoT). Blockchain can enhance trust management protocols by providing a global view of data and improving the propagation of trust values. Implementing trust management algorithms in traditional decentralized architectures can be challenging, but using smart contracts can provide an efficient solution. We implemented the model on the Hyperledger Fabric platform and performed a comprehensive assessment. The model efficiently performs indirect trust computations by choosing optimized counselors and minimizing storage requirements. Multiple experiments have been carried out to assess and validate the efficiency of the model in functionality metrics such as trust convergence and success rate, as well as non-functional metrics like transaction delay, computation and communication overhead, and memory usage. We also conducted a comparative analysis to emphasize the method's advantages over existing approaches in the literature. We introduced the Total Storage Cost metric for better comparison. The results show substantial improvements in trust convergence under limited Total Storage Cost. The proposed method demonstrates that it is possible to establish scalable trust management in the SIoT by utilizing smart contracts and social metrics.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Internet of Things; Blockchains; Trust management; Smart contracts; Security; Peer-to-peer computing; Scalability; blockchain; smart contract

【发表时间】2024

【收录时间】2024-10-13

【文献类型】 实证数据

【DOI】 10.1109/ACCESS.2024.3411581

A Measurement Study on Tor Hidden Services via Keyword-Based Dark Web Collection Framework

【Author】 Kim, Daeun Park, Yuji Kim, Seongmin

【影响因子】3.476

【主题类别】

区块链治理-技术治理-暗网分析

【Abstract】Due to the anonymous nature of the Dark Web, perpetrators utilize it combined with cryptocurrencies to hide their online activities and identities. Moreover, recent criminals abuse coin-mixing services to obfuscate financial transactions, dramatically hindering traceability and transparency. Recent studies have elaborated on demystifying the Dark Web ecosystem by analyzing real-world data acquired from well-known underground marketplaces and forums. However, previous assessments are less effective in understanding the most up-to-date trends and interrelationships between illegal activities because they do not efficiently deal with the ever-changing status of the Tor hidden services and cryptocurrencies, such as uniform resource locator (URL) policy updates and diverse Bitcoin address types. To this end, we propose a Dark Web data collection framework that automatically gathers .onion addresses operated by suspicious vendors and the corresponding Bitcoin addresses based on criminal-related keywords. Our framework aims to understand the interrelationship between illicit activities by analyzing the dependency between the keywords based on the seed .onions that appear in common. We also explore the trends in the life cycle of .onion domains for each keyword. To demonstrate the versatility of our framework, we provide various case studies to achieve potential clues for dark vendor profiling and alias attribution and how to discriminate mixed Bitcoin addresses from the universal Bitcoin usage patterns.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Bitcoin mixing; Bitcoin mixing; cybersecurity; cybersecurity; dark web; dark web; dark web forensics; dark web forensics; hidden service; hidden service; tor network; tor network

【发表时间】2024

【收录时间】2024-10-13

【文献类型】 理论模型

【DOI】 10.1109/ACCESS.2024.3465629

BlockDLO: Blockchain Computing With Deep Learning Orchestration for Secure Data Communication in IoT Environment

【Author】 Kokila, M. Reddy, K. Srinivasa

【影响因子】3.476

【主题类别】

区块链技术-协同技术-机器学习

【Abstract】Internet of Things (IoT) has more security issues due to the data being shared in an open platform. Integrating blockchain into IoT for security is a new development in computational communication systems. However, attackers are adapting their methods and creating new vulnerabilities in blockchain-based IoT platforms. Furthermore, when the blockchain is integrated with IoT networks, vulnerabilities, privacy issues, and security threats are amplified due to malicious transactions and active attacks. This paper proposes BlockDLO, an approach to IoT security that combines blockchain technology with deep learning. A five-phase architecture is proposed for the edge computing blockchain. In its first phase, network localization is resolved with chaotic map-based identification and authentication. The second phase proposes page rank-based clustering for edge computing. Then, BlockDLO combines the shared-chain technique with a deep distributed file system to address issues with block creation and ledger distribution, and an ethereum smart contract to address data security concerns. The communication route optimization is done with page rank centrality search optimization in its next phase. Finally, the integration of deep learning model to detect malicious data in the IoT network is done using the authenticated received data. BlockDLO creates an efficient intrusion detection system by combining a deep convolution neural network with blockchain. The proposed system is trained using public data sources and tested using an in-house network testbed. The results demonstrate that the proposed system outperforms existing work in terms of energy usage, packet loss rate, end-to-end delay, routing overhead, network lifetime, accuracy, and security strength.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Internet of Things; Security; Blockchains; Deep learning; Cryptography; Privacy; Optimization; Data security; Clustering methods; Search methods; Optimization methods; blockchain; deep learning; data security; clustering; search optimization

【发表时间】2024

【收录时间】2024-10-13

【文献类型】 理论模型

【DOI】 10.1109/ACCESS.2024.3462735

Large Language Models and Sentiment Analysis in Financial Markets: A Review, Datasets, and Case Study

【Author】 Liu, Chenghao Arulappan, Arunkumar Naha, Ranesh Mahanti, Aniket Kamruzzaman, Joarder Ra, In-Ho

【影响因子】3.476

【主题类别】

区块链治理-市场治理-情感分析

区块链技术-协同技术-大模型

区块链技术-协同技术-情感分析

【Abstract】This paper comprehensively examines Large Language Models (LLMs) in sentiment analysis, specifically focusing on financial markets and exploring the correlation between news sentiment and Bitcoin prices. We systematically categorize various LLMs used in financial sentiment analysis, highlighting their unique applications and features. We also investigate the methodologies for effective data collection and categorization, underscoring the need for diverse and comprehensive datasets. Our research features a case study investigating the correlation between news sentiment and Bitcoin prices, utilizing advanced sentiment analysis and financial analysis methods to demonstrate the practical application of LLMs. The findings reveal a modest but discernible correlation between news sentiment and Bitcoin price fluctuations, with historical news patterns showing a more substantial impact on Bitcoin's longer-term price than immediate news events. This highlights LLMs' potential in market trend prediction and informed investment decision-making.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Sentiment analysis; Bitcoin; Analytical models; Predictive models; Large language models; Correlation; Quality assessment; Large language model; Bitcoin price; sentiment analysis; machine learning; market dynamics

【发表时间】2024

【收录时间】2024-10-13

【文献类型】 综述

【DOI】 10.1109/ACCESS.2024.3445413

Measurement and Analysis of Blockchain Peers

【Author】 Phimmuang, Khajornphong Sripanidkulchai, Kunwadee

【影响因子】3.476

【主题类别】

区块链治理-技术治理-区块链安全

【Abstract】Blockchain's promise of an immutable distributed ledger, fully fault tolerant with no centralized control deployed in an untrusted decentralized peer-to-peer network has disrupted the financial and technical industry. Blockchains may vary in terms of their design goals and algorithms, but they all rely on one common premise: the blockchain network is a decentralized peer-to-peer system and the ledger is stored on these untrusted peers. In this paper, we measure the characteristics of blockchain peers in the top four blockchains with dominant market share, Bitcoin, Ethereum, Ripple, and Solana. All four blockchains have a common trend that they have moved away from the idealistic decentralized peer-to-peer systems in their original design, and have become more server-like, more centralized, and more vulnerable to certain attacks. Using our measurements, we quantify the amount of effort required to delay, disrupt, and attack these blockchains.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchains; Peer-to-peer computing; IP networks; Smart contracts; Open source software; Bitcoin; Crawlers; Blockchain; centralization; measurement; peer characteristics

【发表时间】2024

【收录时间】2024-10-13

【文献类型】 案例研究

【DOI】 10.1109/ACCESS.2024.3462969

DPTracer: Integrating Log-Driven Accountability into Data Provision Networks

【Author】 Lee, Jonghyup

【影响因子】2.838

【主题类别】

区块链应用-实体经济-数据管理

【Abstract】Emerging applications such as blockchain, autonomous vehicles, healthcare, federated learning, self-consistent large language models (LLMs), and multi-agent LLMs increasingly rely on the reliable acquisition and provision of data from external sources. Multi-component networks, which supply data to the applications, are defined as data provision networks (DPNs) and prioritize accuracy and reliability over delivery efficiency. However, the effectiveness of the security mechanisms of DPNs, such as self-correction, is limited without a fine-grained log of node activities. This paper presents DPTracer: a novel logging system designed for DPNs that uses tamper-evident logging to address the challenges of maintaining a reliable log in an untrusted environment of DPNs. By integrating logging and validation into the data provisioning process, DPTracer ensures comprehensive logs and continuous auditing. Our system uses Process Tree as a data structure to store log records and generate proofs. This structure permits validating node activities and reconstructing historical data provision processes, which are crucial for self-correction and verifying data sufficiency before results are finalized. We evaluate the overheads introduced by DPTracer regarding computation, memory, storage, and communication. The results demonstrate that DPTracer incurs reasonable overheads, making it practical for real-world applications. Despite these overheads, DPTracer enhances security by protecting DPNs from post-process and in-process tampering.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】data provision network; decentralized systems; tamper-evident logging

【发表时间】2024

【收录时间】2024-10-13

【文献类型】 案例研究

【DOI】 10.3390/app14188503

The impact of social media on the cryptocurrency markets during the COVID-19 pandemic and the Russia-Ukraine conflict

【Author】 Mgadmi, Nidhal Moussa, Wajdi Mohammedi, Walid Abidi, Ameni Wahada, Majdouline

CCF-B

【影响因子】2.531

【主题类别】

区块链治理-市场治理-数字货币

【Abstract】We investigate the impact of social media on the profitability of the cryptocurrency market during the COVID-19 pandemic and the Russia-Ukraine conflict. We employ a daily database spanning from April 22, 2018, to April 23, 2023, focusing on the prominent cryptocurrencies: Bitcoin, Ethereum, and Litecoin. Social Media is approximated using Google Trends, Twitter, and You-Tube. To assess the interconnectedness of the cryptocurrency market, we examine the symmetrical volatility of each cryptocurrency using the GARCH model. This allows us to identify assets that exhibit less vulnerability and can serve as safe-haven and hedging instruments. Additionally, we verify the bullish and bearish movements of this market using the EGARCH specification. Finally, we employ a causality test in the sense of Granger (1969) to determine the impact of Social Media on the dynamics of the cryptocurrency market. This test will elucidate whether Social Media data can effectively predict cryptocurrency price movements.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Crypto-currencies; Causality; Russia-Ukraine War; Social media; E21; E31; G12

【发表时间】2024

【收录时间】2024-10-13

【文献类型】 实证数据

【DOI】 10.1007/s10115-024-02236-x

Transforming academic assessment: The metaverse-backed Web 3 secure exam system

【Author】 Razzaq, Abdul Zhang, Tao Numair, Muhammad Alreshidi, Abdulrahman Jing, Cheng Aljaloud, Abdulaziz Ghayyur, Shahbaz A. K. Ahmed, Salman Qurat Ul Ain, Mumtaz

【影响因子】2.109

【主题类别】

区块链应用-虚拟经济-元宇宙

【Abstract】Metaverse-a three-dimensional computational environment-combines physical and virtual reality to enable social relationships and immersive experiences by mimicking real-world scenarios. Metaverse is considered the third wave of the internet revolution (exploiting Web 3.0), leveraging upcoming technologies such as extended reality and artificial intelligence shaping a new era of human--machine interactions. In recent years, increased research and development on educational technologies (EduTech) based on blockchain technology has seen substantial growth of metaverse-based solutions within the higher education context. This research aims to synergize blockchain technology and metaverse environments to conduct online exams (metaExam) in a trustworthy, reliable, and secure way. The synergy between blockchain and the metaverse brings various benefits, such as improved security, cost effectiveness, and increased efficiency in the online examination process. One of the central features of the proposed solution metaExam is to leverage cryptographic protocols via blockchain to control data access, making verification faster and protecting against misuse. Exam scores and grades are stored on a blockchain ledger using a digital signature method to enhance security. We validated the proposed solution by testing a prototype on the Ethereum platform using the Sepolia Testnet network using Microsoft Windows environment. Evaluation results indicate (i) query response time (10-50 ms), (ii) and query execution performance (CPU utilization between 1%-5%) offering computationally feasible solution. This research contributes by integrating blockchain and metaverse technologies to offer a solution metaExam that can offer improved security and immersive user experience for exam management. The proposed solution and its validation can provide insights into transforming online exams, offering a fresh perspective on addressing concerns about exam grade authenticity and verifying academic credentials in EduTech.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】blockchain; Ethereum; medical exam system; metaverse; online test; smart contract; virtual reality

【发表时间】2024

【收录时间】2024-10-13

【文献类型】 案例研究

【DOI】 10.1002/cae.22797

A Blockchain-Based Proxy Re-Encryption Scheme With Cryptographic Reverse Firewall for IoV

【Author】 Jin, Chunhua Chen, Zhiwei Qin, Wenyu Sun, Kaijun Chen, Guanhua Chen, Liqing

【影响因子】1.914

【主题类别】

区块链应用-实体经济-车联网

【Abstract】As the internet of vehicles (IoV) technology develops, it promotes the intelligent interaction among vehicles, roadside units, and the environment. Nevertheless, it also brings vehicle information security challenges. In recent years, vehicle data sharing is suffering to algorithm substitution attacks (ASA), which means backdoor adversaries can carry out filtering attacks through data sharing. Therefore, this paper designs a blockchain-based proxy re-encryption (PRE) scheme with cryptographic reverse firewall (BIBPR-CRF) for IoV. In our proposal, CRF can promise the internal safety of vehicle units. More specifically, it can prevent ASA attacks while ensuring chosen plaintext attack (CPA)-security. Meanwhile, the PRE algorithm can provide the confidential sharing and secure operation of data. Moreover, we use a consortium blockchain service center (CBSC) to store the first ciphertext and re-encrypt it with smart contracts on the blockchain, which can avoid single point of failure and achieve higher efficiency compared to proxy servers. Finally, we evaluate the performance of BIBPR-CRF with regard to communication cost, computational cost, and energy consumption. Our proposal is the most fitting for IoV application, in contrast with the other three schemes. image

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】blockchain-based; cryptographic reverse firewall; internet of vehicles; proxy re-encryption; security

【发表时间】2024

【收录时间】2024-10-13

【文献类型】 案例研究

【DOI】 10.1002/nem.2305

A smart surveillance system utilizing modified federated machine learning: Gossip-verifiable and quantum-safe approach

【Author】 Dharani, Dharmaraj Anitha Kumari, Kumarasamy

【影响因子】1.831

【主题类别】

区块链技术-协同技术-联邦学习

【Abstract】Edge computing has the capability to process data closer to its point of origin, leading to the development of critical autonomous infrastructures with frequently communicating peers. The proposed work aims to evaluate the effectiveness of security and privacy mechanisms tailored for distributed systems, particularly focusing on scenarios where the nodes are closed-circuit television (CCTV) systems. Ensuring public safety, object tracking in surveillance systems is a vital responsibility. The workflow has been specifically crafted and simulated for the purpose of weapon detection within public CCTV systems, utilizing sample edge devices. The system's primary objective is to detect any unauthorized use of weapons in public spaces while concurrently ensuring the integrity of video footage for use in criminal investigations. The outcomes of prior research on distributed machine learning (DML) techniques are compared with modified federated machine learning (FML) techniques, specifically designed for being Gossip verifiable and Quantum Safe. The conventional federated averaging algorithm is modified by incorporating the secret sharing principle, coupled with code-based McEliece cryptosystem. This adaptation is designed to fortify the system against quantum threats. The Gossip data dissemination protocol, executed via custom blockchain atop the distributed network, serves to authenticate and validate the learning model propagated among the peers in the network. It provides additional layer of integrity to the system. Potential threats to the proposed model are analyzed and the efficiency of the work is assessed using formal proofs. The outcomes of the proposed work demonstrate that the trustworthiness and consistency are meticulously preserved for both the model and data within the DML framework on the Edge computing platform.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】code based cryptosystem; edge computing; federated machine learning; gossip data dissemination protocol; secret sharing; security and privacy

【发表时间】2024

【收录时间】2024-10-13

【文献类型】 理论模型

【DOI】 10.1002/cpe.8238

Blockchain-IoT: A revolutionary model for secure data storage and fine-grained access control in internet of things

【Author】 Ullah, Zia Husnain, Ghassan Mohmand, Muhammad Ismail Qadir, Mansoor Alzahrani, Khalid J. Ghadi, Yazeed Yasin Alkahtani, Hend Khalid

CCF-C

【影响因子】1.345

【主题类别】

区块链应用-实体经济-数据管理

【Abstract】With the rapid expansion of the Internet of Things (IoT), cloud storage has emerged as one of the cornerstones of data management, facilitating ubiquitous access and seamless sharing of information. However, with the involvement of a third party, traditional cloud-based storage systems are plagued by security and availability concerns, stemming from centralized control and management architectures. A novel blockchain-IoT model that leverages blockchain technology and decentralized storage mechanisms to address these challenges is presented. The model combines the Ethereum blockchain, interplanetary file system, and attribute-based encryption to ensure secure and resilient storage and sharing of IoT data. Through an in-depth exploration of the system architecture and underlying mechanisms, it is demonstrated how the framework decouples storage functionality from resource-constrained IoT devices, mitigating security risks associated with on-device storage. In addition, data owners and users can easily exchange data with one another through the use of Ethereum smart contracts, fostering a collaborative environment and providing incentives for data sharing. Moreover, an incentive mechanism powered by the FileCoin cryptocurrency is introduced, which motivates and ensures data sharing transparency and integrity between stakeholders. Furthermore, in the proposed blockchain-IoT model, the proof-of-authority system consensus algorithm has been replaced by a delegated proof-of-capacity system, which reduces transaction costs and energy consumption. Using the Rinkby Ethereum official testing network, the proposed model has been demonstrated to be feasible and economical, emphasizing its potential to redefine IoT data management. The model combines the Ethereum blockchain, interplanetary file system, and attribute-based encryption to ensure secure and resilient storage and sharing of Internet of Things data. Through an in-depth exploration of the system architecture and underlying mechanisms, it is demonstrated how the framework decouples storage functionality from resource-constrained Internet of Things devices, mitigating security risks associated with on-device storage. image

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】access control; blockchain; internet of things

【发表时间】2024

【收录时间】2024-10-13

【文献类型】 案例研究

【DOI】 10.1049/cmu2.12845

A systematic literature review on dynamic testing of blockchain oriented software

【Author】 Lahami, Mariam Maalej, Afef Jmal Krichen, Moez

CCF-B

【影响因子】1.039

【主题类别】

区块链治理-技术治理-智能合约漏洞检测

【Abstract】This Systematic Literature Review (SLR) provides a thorough analysis of the most pertinent research with regard to testing Blockchain oriented Software (BoS). Indeed, it is highly required to test and check the correctness of such kind of software systems before their deployment since they are immutable and cannot be modified once deployed. All the selected primary studies, published between 2017 and October 2022, make use of dynamic testing techniques in order to ensure the trustworthiness and the quality of BoS and to check functional and non-functional aspects such as security and performance. First of all, we study 53 research papers from various electronic databases and classify them according to several factors including (i) the accessibility of smart contract code, (ii) the adopted testing techniques and (iii) the supported vulnerabilities. Then, we emphasize works' benefits and drawbacks while providing a summary about the work done on test generation and selection in this field. At the end, we identify research challenges and potential research opportunities with the aim of giving research lines not yet explored.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; Review; Dynamic testing; Smart contracts; Correctness; Security testing; Vulnerabilities

【发表时间】2025

【收录时间】2024-10-13

【文献类型】 综述

【DOI】 10.1016/j.scico.2024.103211

在线标注

备案号: 苏ICP备17025947号-5

评论回复