【Author】 Zhang, Xiuxian Zhu, Xiaorong
CCF-C
【影响因子】10.238
【主题类别】
区块链技术-协同技术-去中心化机器学习
【Abstract】In 6G, the communication cost of large-scale distributed machine learning (DML) will be much higher than the computing cost, which will become a bottleneck restricting the development of DML. To solve this problem, a wireless large-scale DML architecture combined with blockchain (WLDMLB) for 6G networks is proposed, where the distributed nodes involved in DML are divided into shards and a layered adaptive cascaded architecture is used in each shard to reduce the communication overhead. To reduce the system energy, improve training efficiency and achieve on-demand networking, a joint optimization model of the number of shards, network topology, and allocation of computing resources is established to ensure that the model can run efficiently on different devices. Then, a closed-form expression of one-round training delay and energy is derived. The optimal number of shards, the optimal network topology and the optimal computing resource allocation are further analysed. In addition, a main-shards blockchain architecture with the directed acyclic graph (DAG) and practical Byzantine fault tolerance (PBFT) consensus is proposed to ensure the trusted sharing of model and ensure system scalability. Simulation results show that the algorithm can greatly reduce the communication overhead, one round-training delay and energy of DML.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】6G; blockchain; directed acyclic graph (DAG); distributed machine learning (DML); practical Byzantine fault tolerance (PBFT); wireless largescale DML architecture combined with blockchain (WLDMLB); 6G; blockchain; directed acyclic graph (DAG); distributed machine learning (DML); practical Byzantine fault tolerance (PBFT); wireless largescale DML architecture combined with blockchain (WLDMLB)
【发表时间】2024
【收录时间】2024-10-15
【文献类型】 理论模型
【Author】 Zhang, Hanwen Leng, Supeng Yin, Hongbo Yu, Shui
CCF-C
【影响因子】10.238
【主题类别】
区块链技术-核心技术-共识机制
【Abstract】The coexistence of sixth-generation (6G) and other wireless networks in the large-scale environment is challenged by the problem of the efficient sharing of the unlicensed spectrum band, as well as the fair and reliable access of heterogeneous users. Blockchain with the advantages of trustworthiness and decentralization is supposed to be a potential solution. An intelligent two-layer blockchain framework is developed, consisting of an upper layer administrator blockchain (UAB) and multiple lower layer spectrum allocation blockchains (LSB). The LSB is an adjustable local blockchain to form a fast and lightweight consensus on spectrum allocation, and the UAB controls the adaptation for regional dynamic Quality-of-Service requirements. Moreover, the theoretical model is proposed to analyze the effect of different communication delays of wireless blockchain networks on the block confirmation delay of the directed acyclic graph (DAG) blockchain. Considering the wireless blockchain node must compete for scarce spectrum resources to broadcast transactions, we analyze the optimal spectrum allocation ratio for an LSB through mathematical modeling. Furthermore, the deep Q network (DQN) is used by UAB to form a consensus on the adjustment strategy for the blockchain model of LSB. Test results demonstrate that the proposed intelligent blockchain model can significantly improve spectrum efficiency and adapt to the dynamic environment.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchains; Delays; Quality of service; Wireless fidelity; Heterogeneous networks; Resource management; Consensus protocol; Blockchain; spectrum sharing; unlicensed spectrum
【发表时间】2024
【收录时间】2024-10-15
【文献类型】 案例研究
CCF-C
【影响因子】10.238
【主题类别】
区块链应用-实体经济-交通领域
【Abstract】In vehicular ad-hoc networks (VANETs), existing traffic accident handling schemes are adoptable only in the scenario with roadside unit (RSU) deployment, and the generation of accident reports relies on RSUs and witness vehicles. Without the confirmation from involved vehicles in the accident, it will probably cause disputes afterward, and RSU captured attacks may also affect authentication of vehicles and correctness of accident reports. To address the above issues, we propose a vehicle to vehicle (V2V) and vehicle to RSU (V2R) authentication and traffic accident handling protocol, in which accident vehicles are sufficient to generate accident reports, thereby enhancing autonomy of the vehicular communication system and reducing reliance on external infrastructure. Furthermore, for ensuring integrity and traceability of accident reports, we utilize blockchain to keep registration information and jointly signed reports, which realizes efficient and secure mutual authentications in V2V and V2R protocols. Finally, for preserving privacy of vehicles, we integrate elliptic curve cryptosystem (ECC) and symmetric encryption to design a dynamic pseudo-identity strategy, which still allows the registration center to track malicious vehicles. The formal security proof and comparative analysis validate that our protocol preserves higher security and lower overhead by comparison with related schemes.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Accidents; Protocols; Authentication; Blockchains; Security; Vehicular ad hoc networks; Privacy; Authentication protocol; privacy protection; signature; traffic accident handling; vehicle to vehicle (V2V); vehicular ad-hoc networks (VANETs)
【发表时间】2024
【收录时间】2024-10-15
【文献类型】 案例研究
CCF-C
【影响因子】10.238
【主题类别】
区块链技术-核心技术-共识机制
【Abstract】With the rapid emergence of Internet of Things (IoT) technology, cross-domain collaboration and information sharing among IoT devices have become increasingly critical. However, the security and privacy risks associated with cross-domain communication have also escalated. Establishing efficient and secure authentication mechanisms for cross-domain collaboration among IoT devices remains a complex challenge, particularly in the context of bandwidth-constrained wide-area networks. Most recent cross-domain authentication solutions rely heavily on emerging blockchain technology. However, in bandwidth-constrained scenarios, they may suffer from efficiency losses. Consequently, an effective resolution of cross-domain authentication issues in bandwidth-limited conditions has become a pressing concern. In this article, we introduce an efficient blockchain-assisted cross-domain authentication mechanism, named EBCA, designed for bandwidth-constrained wide area IoT networks. To enhance authentication efficiency, we design a highly efficient multiblockchain architecture, which optimally leverages the underlying network bandwidth, significantly improving throughput and reducing latency for cross-domain authentication. Additionally, threshold signatures are incorporated to minimize communication overhead, further enhancing authentication efficiency. Extensive experiments have been conducted to demonstrate the efficiency of our approach. Our scheme has been shown to increase throughput by approximately 34% when compared to existing methods.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Authentication; Blockchains; Internet of Things; Security; Bandwidth; Performance evaluation; Privacy; Blockchain; cross-domain authentication; efficiency improvement; Internet of Things (IoT); multichain; parallelization
【发表时间】2024
【收录时间】2024-10-15
【文献类型】 理论模型
CCF-C
【影响因子】10.238
【主题类别】
区块链应用-实体经济-能源领域
【Abstract】Currently, power data trading typically relies on Web pages as the conventional mode of mediation. Nevertheless, dishonest trading Web may secretly resell the data sets of grid companies or have no way of knowing what the buyer has done with the power data, thereby compromising the privacy of power user. This article proposes a privacy-preserving supply-demand consistency matching service scheme (PPMSE) to address the problem of whether the power data provided by the seller aligns with the requirements of the buyer in power data trading. The scheme utilizes enhanced public-key searchable encryption (PKSE) to establish a matching environment that fulfills privacy protection needs, thereby facilitating consistency matching between supply and demand, all while preserving user privacy. Then, the PPMSE ensures that matching service can only occur within the designated platform by equipping the power data trading cloud platform with public and private keys. Additionally, by applying ciphertext policy attribute-based encryption (CP-ABE) to the data processing tasks of the buyer, the scheme enables the seller to decrypt and obtain what the buyer has done with the data after successful matching and meeting specific attributes. Ultimately, a comprehensive analysis and performance evaluation are provided, validating the feasibility and superiority of the proposed scheme.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Data models; Internet of Things; Data privacy; Blockchains; Task analysis; Encryption; Data processing; Cipher policy attribute-based encryption (CP-ABE); privacy preserving; public-key searchable encryption (PKSE); security; trading
【发表时间】2024
【收录时间】2024-10-15
【文献类型】 案例研究
【Author】 Liu, Xueyan Li, Linpeng Li, Xiliang Qi, Yujiao
CCF-C
【影响因子】10.238
【主题类别】
区块链应用-实体经济-环境领域
【Abstract】Since the signing of the Paris Agreement, "combating climate change and reducing carbon emissions" has emerged as a global focal point. The transportation industry, as a substantial contributor to carbon emissions, has posed a critical research challenge of efficiently and accurately quantifying vehicle carbon emissions while safeguarding vehicle privacy. Therefore, to realize lightweight conditional anonymous authentication, accurate statistics of vehicle carbon emissions and to inspire vehicle owners to travel with low carbon, this study proposes a lightweight conditional anonymous authentication scheme for vehicular carbon emissions environment. In this work, we introduce a lightweight certificate authorization mechanism for issuing vehicle certificates that avoids problems, such as key escrow, certificate management, and public key replacement attacks. Additionally, we combine the chameleon hash functions and elliptic curve digital signatures to devise an efficient anonymous identity authentication algorithm. This algorithm aims to authenticate vehicle anonymous identities while verifying the integrity of messages. Simultaneously, each vehicle possesses both long-term and short-term anonymity. Nevertheless, system administrators can trace short-term anonymity to obtain long-term anonymity. The lite certificate authority can use long-term anonymity to recover the real identity of vehicles, thus achieving conditional identity privacy. Furthermore, we use blockchain to record the carbon emissions of vehicles and achieve accurate carbon emissions statistics. To promote public participation and encourage low-carbon travel, we design an incentive mechanism allowing vehicles to sell their excess carbon quotas for financial gain. Finally, through theoretical analysis and experimental simulation, we demonstrate that the scheme has advantages in communication and computation.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Carbon emissions; Climate change; Contracts; Government policies; Authentication; Carbon dioxide; Privacy; Transportation industry; Public key; Hash functions; Elliptic curves; Digital signatures; Anonymous authentication; blockchain (BC); carbon emissions; conditional privacy preservation; lightweight certificate authorization mechanism; vehicular ad hoc networks (VANETs)
【发表时间】2024
【收录时间】2024-10-15
【文献类型】 案例研究
CCF-C
【影响因子】10.238
【主题类别】
区块链应用-实体经济-工业领域
区块链技术-核心技术-加密算法
【Abstract】Various sensors are utilized to gather data for the Industrial Internet of Things (IIoT) environments and stored in an adaptable and affordable cloud computing infrastructure. The cloud server performs data analytics intelligently using AI-enabled applications. IIoT data must be encrypted to protect privacy because it is kept on a cloud server, which is untrusted. Nevertheless, there is a difficulty with searching encrypted data, which may be resolved by using a Public key Encryption with Keyword Search (PEKS) method. Furthermore, most existing PEKS schemes are vulnerable to Inside/Outside Keyword Guessing Attacks (IKGAs/OKGAs). Recently, some Certificateless PEKS (CL-PEKS) schemes have been proposed to circumvent certificate management issues, key escrow problems, and IKGA/OKGA. However, they are vulnerable to a malicious Key Generation Center (KGC) attack as they do not satisfy the Girault's level-3 security. We proposed a private blockchain-assisted CL-PEKS for Multikeyword (BCT-CL-PEMKS) search in a fog-based IIoT environment. The BCT-CL-PEMKS scheme meets the Girault's level-3 security. It used a private blockchain to manage all the fog nodes. The BCT-CL-PEMKS provides ciphertext indistinguishability, trapdoor indistinguishability, and designated-server testability in the random oracle model. We estimated the computation and communication overheads of BCT-CL-PEMKS and compared them with the other PEKS schemes for 80, 112, 128, 192, and 256-bit security levels.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Certificateless public key cryptography (CL-PKC); cloud server; fog-enabled industrial Internet of Things (IIoT); forward security; multikeyword search; Certificateless public key cryptography (CL-PKC); cloud server; fog-enabled industrial Internet of Things (IIoT); forward security; multikeyword search
【发表时间】2024
【收录时间】2024-10-15
【文献类型】 实证数据
CCF-C
【影响因子】10.238
【主题类别】
区块链技术-协同技术-联邦学习
【Abstract】The ever-growing Internet of Things (IoT) connections drive a new type of organization, the intelligent enterprise. In intelligent enterprises, machine learning-based models are adopted to extract insights from data. Due to these traditional models' efficiency and privacy challenges, a new federated learning (FL) paradigm has emerged. In FL, multiple enterprises can jointly train a model to update a final model. However, first, FL-trained models usually perform worse than centralized models, especially when enterprises' training data are nonindependent and identically distributed (IID). Second, due to the centrality of FL and the untrustworthiness of local enterprises, traditional FL solutions are vulnerable to poisoning and inference attacks and violate privacy. Third, the continuous transfer of parameters between enterprises and servers increases communication costs. Therefore, to this end, the FedAnil+ model is proposed, a novel, lightweight, and secure Federated Deep Learning Model that includes three main phases. In the first phase, the goal is to solve the data type distribution skew challenge. Addressing privacy concerns against poisoning and inference attacks is given in the second phase. Finally, to alleviate the communication overhead, a novel compression approach is proposed that significantly reduces the size of the updates. The experiment results validate that FedAnil+ is secure against inference and poisoning attacks with better accuracy. In addition, in terms of model accuracy (13%, 16%, and 26%), communication cost (17%, 21%, and 25%), and computation cost (7%, 9%, and 11%) improvements over existing approaches. The FedAnil+ code is available on GitHub.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Data models; Vectors; Blockchains; Servers; Internet of Things; Computational modeling; Accuracy; Blockchain; communication efficiency; federated learning (FL); nonindependent and identically distributed (IID); privacy-preserving
【发表时间】2024
【收录时间】2024-10-15
【文献类型】 理论模型
CCF-C
【影响因子】10.238
【主题类别】
区块链技术-协同技术-物联网
【Abstract】With the booming of Internet of Things (IoT), a content provider (CP) traditionally supported by the storage resources of a network service provider (NSP) can provide content services through the resources of IoT devices to significantly reduce the service latency. The CP, NSP, and IoT devices constitute an edge caching system, and it is crucial to efficiently utilize the storage resources in the system. Most existing studies ignore the idle storage resources of IoT devices. The few studies that consider the storage resources of IoT devices either are based on the assumption of complete information, or only utilize the storage resources of part of the IoT devices. In this article, we propose a contract theory and Stackelberg game-based storage resource allocation method to effectively utilize the storage resources in edge caching systems under information asymmetry. The interaction between the CP and the IoT is formalized as a contract design problem, and the interaction between the NSP and the CP is formulated as a two-stage Stackelberg game with a single leader and a single follower. We analyze the constraints in contract design and the Nash equilibrium of the Stackelberg game. We also propose a golden section search-based optimal contract design and pricing (GSSCP) algorithm to obtain the optimal contract of the CP and optimal price of the NSP storage resources. Simulation results demonstrate that the proposed method can make effective use of the storage resources and improve the CP utility in edge caching systems under information asymmetry.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Internet of Things; Contracts; Resource management; Games; Costs; Pricing; Optimization; Contract theory; edge caching; Stackelberg game; storage resource allocation
【发表时间】2024
【收录时间】2024-10-15
【文献类型】 实验仿真
CCF-C
【影响因子】10.238
【主题类别】
区块链技术-协同技术-物联网
【Abstract】In the 6G era, space-air-ground integrated networks (SAGINs) can provide ubiquitous coverage for Internet of Things (IoT) devices. Multiaccess edge computing (MEC) and blockchain are two enabling technologies, which can further enhance the services capabilities of SAGINs, where MEC demonstrates a notable capability in efficiently minimizing both the task execution delays and system energy consumption, and blockchain can provide trust guarantee for task offloading and wireless data transmission among the entities operated by different operators in SAGIN. In this article, we present an MEC and blockchain enabled SAGIN architecture, which consists of two subsystems. In the MEC subsystem, a satellite and multiple unmanned aerial vehicles (UAVs) act as the edge nodes to provide IoT devices with computing power. Moreover, the satellite serves as the block generator and the client, and the UAVs serve as the consensus nodes of the blockchain subsystem. We intend to minimize the energy consumption within the network, which is achieved through the IoT devices' task segmentation, the UAVs, and satellite's bandwidth allocation among their served IoT devices. And moreover, the computing power of UAVs and the satellite also allocated in task processing and blockchain consensus. Considering the high dynamics of the network, it is impossible to obtain real-time and accurate channel information, so we remodel this problem as a Markov decision process, and propose a low-complexity adaptive optimization algorithm based on the deep deterministic policy gradient (DDPG). Our simulation results indicate that the proposed algorithm exhibits commendable performance in minimizing the network energy consumption and DDPG agent's accumulated reward maximization.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Internet of Things; Task analysis; Blockchains; Satellites; Autonomous aerial vehicles; Optimization; Servers; Blockchain; computational offloading; deep deterministic policy gradient (DDPG); resource allocation; space-air-ground integrated networks (SAGINs)
【发表时间】2024
【收录时间】2024-10-15
【文献类型】 实验仿真
CCF-C
【影响因子】10.238
【主题类别】
区块链应用-实体经济-食品领域
【Abstract】Internet of Things (IoT) technology has revolutionized the industrial sector. This research article focuses on the development of Food Industry 4.0, which was made possible by advancements in edge-cloud computing and IoT technologies. The study presents an IoT-based smart framework that uses the Bayesian belief network (BBN) on the edge-cloud platform to analyze data in the food industry. The acquired data is assessed to estimate the probability of food quality (PFQ) and evaluate food outlets using the food quality analysis measure (FQAM). Additionally, a Bi-level decision-tree modeling is presented to assess food quality. Food-oriented data security is ensured using blockchain. The proposed model is tested on a complex data set containing data about four restaurants with about 43 520 individual instances. Simulations show effective results of temporal delay (94.41 s), decision-making efficacy (99.64%), classification efficiency (precision (96.67%), specificity (96.97%), and sensitivity (97.55%)), stability (74.25%), and reliability (93.70%).
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Internet of Things; Digital twins; Wireless sensor networks; Decision trees; Wireless communication; Temperature measurement; Sensor phenomena and characterization; Decision tree; food quality; Internet of Things (IoT)
【发表时间】2024
【收录时间】2024-10-15
【文献类型】 理论模型
CCF-C
【影响因子】10.238
【主题类别】
区块链技术-协同技术-支付通道网络
【Abstract】Payment channel networks (PCNs) have emerged as a leading solution to address the scalability problem of blockchain-based cryptocurrencies. Within a PCN, two parties can efficiently conduct path-based off-chain transactions using the funds held in payment channels. Intermediaries involved in transaction routing charge a fee for their services. However, since transaction routing leads to highly dynamic and irreversible changes in channel balances, the success of transaction routing is difficult to guarantee, especially in the presence of concurrent transactions. Existing solutions for PCN routing either overlook the routing of concurrent transactions or impose high fees. In this article, we propose a novel routing protocol Deter-Pay for concurrent PCNs, which improves the success rate of the transaction routing and minimizes transaction fees. Our protocol adopts the idea of the deterministic transaction request declaration and reserved balance feedback. By reserving a sufficient balance during the path probing process, we mitigate the risk of transaction failure caused by fluctuations in channel balances during transaction routing. Additionally, our protocol employs the cheapest path first strategy to select paths, thereby minimizing transaction fees. Extensive simulations show that Deter-Pay can significantly increase the successful transaction volume and reduce the transaction fee compared to the comparison algorithms.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Routing; Routing protocols; Probes; Blockchains; Bitcoin; Throughput; Sun; Blockchain; concurrent; cryptocurrency; payment channel network (PCN); routing
【发表时间】2024
【收录时间】2024-10-15
【文献类型】 理论模型
CCF-C
【影响因子】10.238
【主题类别】
区块链技术-核心技术-分片区块链
【Abstract】Proposals for ultralarge-scale-system (ULSS), particularly the grid's energy management systems (EMSs), to adopt the Ethereum blockchain are increasing as its support for privacy-preserving, encrypted, decentralized computing via sharding, rollups, smart contracts (SCs), and zero-knowledge-proofs (ZKs) address the increasing topological, behavioral, and data-processing challenges. In this context, the aggregation and verification of aggregated, ZK Kate-Zaverucha-Goldberg (KZG) constant-sized polynomials commitments are a bottleneck limiting deployment to Internet of Things (IoT) nodes used by the EMS due to high O(b G+b log(2 )b F) computation incurred when aggregating or verifying by recreation. The alternative, expensive pairing checks involve two pairings, three exponentiations (Exp), three multiplications (Mul), and one addition (Add), a security factor S times for the n aggregated KZG. The proposed pairing checks significantly reduce costs for both: 1) Verifiers: two pairings, no Exp, one Mul, and one Add and 2) Provers: one pairing check, no Exp, four Mul, and one Add. The aggregation method, based on multidimensional differential addition chains, costs only O(l) computation, where l is the bit length of the scalars. This approach demonstrates the feasibility of operating a KZG-centric blockchain with KZG rollups on IoT networks, marking a significant advancement in ULSS.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchains; Smart contracts; Open source software; Cryptocurrency; Polynomials; Internet of Things; Sharding; Cross-shard transactions; Ethereum 2.0; Kate-Zaverucha-Goldberg (KZG) commitments; multidimensional differential addition chains; pairing friendly elliptic curves; scalability
【发表时间】2024
【收录时间】2024-10-15
【文献类型】 实验仿真
CCF-C
【影响因子】10.238
【主题类别】
区块链治理-技术治理-异常检测
【Abstract】Ethereum is the second-largest blockchain platform, and the financial value of its cryptocurrency has constantly increased. Unfortunately, regulatory challenges have resulted in a surge of scams, particularly phishing, which now accounts for over 50% of fraudulent funds. Therefore, phishing scam issues have become a top priority, thus calling for dynamic early warning and accurate identification to achieve effective market regulation. However, the existing works focusing on phishing address detection do not consider early warnings for phishing scams. Furthermore, these methods depend on static graphs to extract node information and overlook the dynamic evolution process of the Ethereum network. In this article, we propose EWDPS, a novel framework to achieve dynamic early warning and effectively identify phishing scams on Ethereum. Specifically, we create a new network called the dynamic temporal transaction network (DTTN), which effectively models the dynamic temporal evolution of transactions. In DTTN, we propose the concepts of temporal evolution interaction network and account feature interaction network. Next, we design a novel feature extraction module to capture temporal sequential patterns effectively. This module takes full advantage of the dynamic interaction process of node-related transactions. Finally, we innovatively use the extracted account, network, and temporal features to enhance transaction representation in multiple dimensions. Extensive experiments show that our proposed scheme effectively achieves dynamic early warning and accurately identifies phishing scams. EWDPS achieves 92.20% accuracy, 95.90% precision, 96.77% recall, and 96.53% F1-score, and outperforms the state-of-the-art methods in phishing address identification.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Phishing; Feature extraction; Blockchains; Biological system modeling; Fraud; Machine learning; Internet of Things; Blockchain; Ethereum; phishing scams detection
【发表时间】2024
【收录时间】2024-10-15
【文献类型】 理论模型
【影响因子】8.702
【主题类别】
区块链治理-市场治理-技术采用
区块链应用-实体经济-供应链
【Abstract】The integration of global supply chains allows for exchanging innovative ideas, knowledge, crafts, and technology across borders. However, it also poses a significant risk of experiencing irregular disruptions. To address these concerns, resilient systems require innovative technology-based solutions, such as blockchain. This comprehensive study involved conducting a systematic literature review and utilizing qualitative input-based decision-making trial and evaluation laboratory (methodology to identify the key enablers and barriers for blockchain-enabled resilient supply chains. A total of 11 enablers and 12 barriers were identified. A panel of 15 experts from various backgrounds was utilized to provide the input through the online instrument. Based on the results, transparency followed by trust and collaboration as the top three crucial enablers, and lack of acceptance in the industry, complexity, and lack of standardization as the top three crucial barriers for blockchain-enabled resilient supply chain. The study also identified shared databases, smart contracts, and real-time information as key causal enablers and lack of standardization, complexity, and government support as key causal barriers for blockchain enabled resilient supply chain. This study further suggests practitioners and policymakers to prioritize promoting the adoption of blockchain technology (BT) to ensure the resilience of supply chains by launching awareness programs, conducting world-class training of employees, and implementing blockchain favoring policies. The study further provides a critical insight suggesting that the pillars that promote blockchain adoption inherently favor the resilience strategies/pillars (visibility, collaboration, traceability, risk management, security and real-time data sharing) and hence, indicates that adoption of BT would implicitly enhance resilience. The study concludes with limitations, future research directions and conclusion.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain technology (BT); decision-making trial and evaluation laboratory (DEMATEL); risk management; supply chain (SC); supply chain resilience (SCRES)
【发表时间】2024
【收录时间】2024-10-15
【文献类型】 实证数据
【DOI】 10.1109/TEM.2024.3358722
【影响因子】3.515
【主题类别】
区块链技术-核心技术-共识机制
【Abstract】As the device complexity keeps increasing, the blockchain networks have been celebrated as the cornerstone of numerous prominent platforms owing to their ability to provide distributed and immutable ledgers and data-driven autonomous organizations. The distributed consensus algorithm is the core component that directly dictates the performance and properties of blockchain networks. However, the inherent characteristics of the shared wireless medium, such as fading, interference, and openness, pose significant challenges to achieving consensus within these networks, especially in the presence of malicious jamming attacks. To cope with the severe consensus problem, in this paper, we present a distributed jamming-resilient consensus algorithm for blockchain networks in wireless environments, where the adversary can jam the communication channel by injecting jamming signals. Based on a non-binary slight jamming model, we propose a distributed four-stage algorithm to achieve consensus in the wireless blockchain network, including leader election, leader broadcast, leader aggregation, and leader announcement stages. With high probability, we prove that our jamming-resilient algorithm can ensure the validity, agreement, termination, and total order properties of consensus with the time complexity of $O(n)$. Both theoretical analyses and empirical simulations are conducted to verify the consistency and efficiency of our algorithm.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Wireless communication; Performance evaluation; Fading channels; Voting; Consensus algorithm; Organizations; Interference; consensus in blockchain; jamming attacks; distributed algorithm
【发表时间】2025
【收录时间】2024-10-15
【文献类型】 案例研究
【影响因子】3.515
【主题类别】
区块链技术-协同技术-联邦学习
【Abstract】The data asset is emerging as a crucial component in both industrial and commercial applications. Mining valuable knowledge from the data benefits decision-making and business. However, the usage of data assets raises tension between sensitive information protection and value estimation. As an emerging machine learning paradigm, Federated Learning (FL) allows multiple clients to jointly train a global model based on their data without revealing it. This approach harnesses the power of multiple data assets while ensuring their privacy. Despite the benefits, it relies on a central server to manage the training process and lacks quantification of the quality of data assets, which raises privacy and fairness concerns. In this work, we present a novel framework that combines Federated Learning and Blockchain by Shapley value (FLBS) to achieve a good trade-off between privacy and fairness. Specifically, we introduce blockchain in each training round to elect aggregation and evaluation nodes for training, enabling decentralization and contribution-aware incentive distribution, with these nodes functionally separated and able to supervise each other. The experimental results validate the effectiveness of FLBS in estimating contribution even in the presence of heterogeneity and noisy data.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Training; Data privacy; Privacy; Federated learning; Scalability; Data models; Blockchains; Federated Learning (FL); blockchain; fairness
【发表时间】2025
【收录时间】2024-10-15
【文献类型】 实验仿真
【影响因子】3.515
【主题类别】
区块链应用-实体经济-公共管理
【Abstract】Blockchain is one of the most influential technologies in the new round of digital economy development. In order to promote the prosperity of the digital economy with blockchain technology, we need to understand the essence of blockchain and the actual demands of relevant business. This paper delves into the nature of blockchain as a broadcast transmission technology from the perspective of technology evolution and analyzes the necessity of building a blockchain-based public Information Technology (IT) system. In addition, this paper analyzes the architecture, characteristics, and applications regarding trusted public IT system construction by drawing on the design ideas and architecture of Blockchain-based Service Network (BSN).
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Architecture; Operating systems; Buildings; Globalization; Blockchains; Internet; Information technology; Blockchain-based Service Network (BSN); broadcast transmission protocols; public Information Technology (IT) systems
【发表时间】2025
【收录时间】2024-10-15
【文献类型】 实验仿真
【影响因子】3.418
【主题类别】
区块链技术-协同技术-联邦学习
【Abstract】In the rapidly evolving landscape of Industry 4.0, the complex computational tasks and the associated massive data volumes present substantial opportunities for advancements in machine learning at industry edges. Federated learning (FL), which is a variant of distributed machine learning for edge-cloud computing, presents itself as a persuasive resolution for these industrial edges, with its main objectives being the mitigation of privacy breaches and the resolution of data privacy concerns. However, traditional FL methodologies encounter difficulties in effectively overseeing extensive undertakings in Industry 4.0 as a result of challenges including wireless communications with high latency, substantial heterogeneity, and insufficient security protocols. As a consequence of these obstacles, blockchain technology has garnered acclaim for its secure, decentralized, and transparent data storage functionalities. A novel blockchain-enabled group federated learning (BGFL) framework designed specifically for wireless industrial edges is presented in this paper. By strategically dividing industrial devices into multiple groups, the BGFL framework simultaneously reduces the wireless traffic loads required for convergence and improves the accuracy of collaborative learning. Moreover, to optimize aggregation procedures and reduce communication resource utilization, the BGFL employs a hierarchical aggregation strategy that consists of both local and global aggregation off-chain and on-chain, respectively. The integration of a smart contract mechanism serves to fortify the security framework. The results of comparative experimental analyses demonstrate that the BGFL framework enhances the resilience of the learning framework and effectively reduces wireless communication latency. Thus, it offers a scalable and efficient solution for offloading tasks in edge-cloud computing environments.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Federated learning; Blockchain; Edge-cloud cooperation; Wireless traffic
【发表时间】2024
【收录时间】2024-10-15
【文献类型】 理论模型
【影响因子】2.259
【主题类别】
区块链技术-协同技术-深度学习
【Abstract】Nowadays, fingerprints as biometrics are among the most popular means of identity verification for various applications. However, they are susceptible to theft, tampering, or alteration by attackers after storage. Hence, it is critical to guarantee the privacy of these fingerprint templates because standard privacy techniques are not secure enough. Additionally, fingerprint templates are verified using a deep learning model to distinguish between authentic and fake fingerprints, making them more protected and secure by storing them inside a blockchain, which has become the most common secure technique in recent years. This paper implements the proposed efficient and secure biometric system for verification based on blockchain technology and hyperparameter optimization. First, for the storing phase, each user's authentic fingerprint template, private, and public keys are saved in the block and linked to the previous block in the chain by a hash function. If a hacker attempts to assault a fingerprint, all prior blocks must be changed. Second, for the authentication phase, the user logs in with his fingerprint and looks up the required template in the chain. If the required fingerprint exists, it creates a new block with the login details, and the number 1 is returned, which means that the authentication is valid; if it does not exist, it is verified to see if it is authentic or fake using the proposed biometric convolutional neural network (CNN). The proposed CNN uses the Grid Search (GS) algorithm to tune hyperparameters to distinguish between authentic and fake fingerprints. The SOCOFing dataset is used for evaluating our experiment. According to the experimental results, the proposed CNN model achieved the highest accuracy of 99.52%. As a result of the blockchain, our system can return authentication information after looking up the chain in 300 ms.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Biometrics; Fingerprint; Authentication; Blockchain; Deep learning; Grid search optimization; Hyperparameter; Verification
【发表时间】2024
【收录时间】2024-10-15
【文献类型】 理论模型
【作者】 朱盼盼; 高甜村; 张颖; 邓俊锋; 梅付春
【作者单位】河南农业大学经济与管理学院;
【文献来源】农业工程学报
【复合影响因子】3.446
【综合影响因子】2.615
【主题类别】
区块链应用-实体经济-产品管理
【摘要】为了解决供应链信息不对称问题,缩短流通时间,保持产品新鲜度,增加消费者剩余,生鲜零售商应用区块链技术。但是,技术应用收益程度受到产品新鲜度和消费者风险规避水平的影响。该研究构建由供应商、零售商和消费者组成的二级生鲜供应链,对比分析区块链技术应用前后供应商与零售商的博弈均衡解,探讨零售商区块链技术应用意愿。结果发现,当产品初始新鲜度较高时,零售商愿意应用区块链技术以带来更高的利润,增加消费者剩余。相反,当产品初始新鲜度较低时,应用区块链技术会导致零售商利润受损,零售商技术应用意愿低。而当产品初始新鲜度处于一般水平时,零售商技术应用意愿随着消费者风险规避水平的提高而增强。
【关键词】区块链;;风险规避;;零售商;;产品新鲜度;;技术应用意愿
【文献类型】 案例研究
【发表时间】2024-10-15
【作者】 陈宇轩; 郑海彬; 关振宇; 苏泊衡; 王玉珏; 郭振纬
【作者单位】北京航空航天大学网络空间安全学院;北京航空航天大学杭州创新研究院网络空间安全研究中心;
【文献来源】计算机应用
【复合影响因子】2.197
【综合影响因子】1.475
【主题类别】
区块链技术-核心技术-分片区块链
【摘要】近年来,区块链技术迅猛发展,在金融、供应链、工业互联网等多个领域得到了广泛地应用。然而,区块链技术也面临着一系列挑战,特别是在区块链系统的扩展性方面,其网络规模受限、网络环境强依赖、存储成本高以及交易吞吐量低下等问题日益凸显。针对区块链扩展性存在的问题,提出了一种适应异步网络环境并且支持交易并行处理的分片机制。所提机制采用HoneyBadgerBFT共识在异步网络环境下达成数据一致性,通过分片技术实现区块链系统线性扩展,通过DAG(Directed Acyclic Graph)技术进一步增强片内交易及不相交跨片交易并行处理能力。仿真结果表明,所提系统机制在异步网络环境下仍能保持活性;在半同步网络环境中,通信开销相比SharPer方案可以降低超过49.9%;在由16个节点组成的区块链网络中,所提机制TPS与SharPer方案相差16.7%,而在64个节点的区块链网络中,所提机制超过SharPer方案6.7%,拥有比SharPer更高的吞吐量;在含有20%跨片交易且使用相同网络环境及硬件资源的条件下,分片数及节点数每翻一倍,该机制交易吞吐量增长比SharPer分别多30.0%、10.5%,拥有比SharPer更好的扩展性。
【关键词】区块链;;分片;;异步网络;;HoneyBadgerBFT;;DAG(Directed Acyclic Graph)
【文献类型】 理论模型
【发表时间】2024-10-15
【作者】 顾锡国; 王志伟; 陈翔; 何启帆; 崔展齐
【作者单位】北京信息科技大学计算机学院;国家网信办数据与技术保障中心;南通大学信息科学技术学院;
【文献来源】电子学报
【复合影响因子】1.804
【综合影响因子】1.355
【主题类别】
区块链治理-技术治理-智能合约漏洞检测
【摘要】随着智能合约被广泛使用,其处理的业务逻辑更加复杂,代码复杂度越来越高,引发了大量安全漏洞.为避免潜在安全漏洞造成的危害,研究人员提出了一系列智能合约漏洞检测方法 .但现有方法对合约特征表征不完整,未将合约的语义及结构特征进行统一表征,难以准确、全面地检测和识别智能合约中的潜在漏洞和安全风险.为此,本文提出了基于图注意力网络的智能合约漏洞检测方法 SCG-Detector(Smart Contract Graph Detector).首先,通过解析合约源代码构建抽象语法树(Abstract Syntax Tree,AST)以表征合约语法结构信息,并在AST上添加表示语义信息的数据依赖关系和控制依赖关系,以构建合约图(Smart Contract Graph,SCG)同时表征合约的语法结构及语义信息;然后,将SCG输入到图注意网络模型中进行训练,利用注意力机制学习合约中漏洞的特征;最后,利用训练好的图注意力网络模型检测合约中是否存在漏洞及所存在漏洞的类型. SCG-Detector在12616个智能合约上进行的实验结果表明,相比于sFuzz、Conkas、ConFuzzius、Mythril、Osiris、Slither、Oyente、MANDO-GURU等8种广泛使用的方法,SCG-Detector的Precision最高提升了26.46%,Recall最高提升了69.64%,F1最高提升了59.57%.
【关键词】智能合约;;图注意力网络;;合约图;;抽象语法树;;数据依赖关系;;控制依赖关系
【文献类型】 理论模型
【发表时间】2024-10-15
【作者】 刘欣悦; 刘平峰; 江珊
【作者单位】武汉理工大学经济学院;湖北省电子商务大数据工程技术研究中心;
【文献来源】系统科学与数学
【复合影响因子】
【综合影响因子】
【主题类别】
区块链应用-实体经济-供应链金融
【摘要】供应链中小企业普遍存在融资难的问题,阻碍了企业高质量发展.区块链技术驱动下的第三方金融服务平台为破解该问题提供了新思路.文章通过构建“政府-第三方金融服务平台-中小企业”三方演化博弈模型,探究了政府监管行为策略、第三方金融服务平台引入区块链共享信息行为策略和中小企业的融资守信行为策略,进行了三方演化博弈均衡点稳定性分析,并通过参数敏感性分析探讨了区块链技术成本、政府监管成本、政府奖惩力度与企业收益对三方演化博弈均衡的影响.结果表明:1)第三方金融服务平台是否选择区块链共享信息不仅取决于区块链技术成本,也与政府对平台和中小企业的奖惩措施及企业的违约风险收益大小有关.2)传统观念认为区块链驱动下的数字供应链金融势必优于传统供应链金融,但本研究发现只有当政府在特定情况下通过动态奖惩措施对平台进行激励以提升供应链金融信息透明度、对企业进行约束以降低融资违约率时,区块链供应链金融的融资效率才会优于传统供应链金融融资效率.
【关键词】第三方金融服务平台;;区块链供应链金融;;奖惩机制;;信息共享;;融资策略
【文献类型】 实证数据
【发表时间】2024-10-15
【作者】 董泽瑞
【作者单位】中国政法大学民商经济法学院;
【文献来源】西北民族大学学报(哲学社会科学版)
【复合影响因子】
【综合影响因子】
【主题类别】
区块链应用-实体经济-航运领域
【摘要】现代航运已步入数字化时代,区块链提单在成本、安全性和信用方面均具优越性,并可用于国际贸易担保,因为其在功能等同原则下可成为权利载体,具有流通性、可控制性和特定性。就体系定位而言,区块链提单担保应采取质押构造,效力模式应采取登记生效主义;就公示制度而言,区块链提单质押应“双重公示”——首先,担保主体在区块链平台对提单状态标识为“质押”,具有公示效果,其次,质权人通过控制私钥实现对货物的排他性控制;就实现进路而言,质权人有权根据《中华人民共和国民法典》第436条第2款或借鉴UCC“不打破和平”规则直接对区块链提单控制下的货物进行处分;如果同一区块链提单被重复设立担保,各担保权人的权利冲突可借鉴《中华人民共和国民法典》第414条处理。
【关键词】航运;;新质生产力;;数字化转型;;权利凭证;;区块链提单质押
【文献类型】 实证数据
【发表时间】2024-10-15
【作者】 曹栋; 赵婕; 李汶蔚; 兰静妤
【作者单位】西安电子科技大学经济与管理学院;
【文献来源】系统科学与数学
【复合影响因子】
【综合影响因子】
【主题类别】
区块链应用-实体经济-企业管理
【摘要】本文运用OP法和事件研究法,探讨区块链技术应用对企业全要素生产率和股票价格影响,分析企业区块链技术应用是否切实促进了企业全要素生产率的提高,或只是为公司股价制造了更多的“泡沫”?本文主要的结论有:区块链技术应用主要通过降低融资约束促进全要素生产率的提高,且对于大型企业和国有企业全要素生产率的提升更大:此外,企业公告区块链技术应用后,公司股票价格水平显著升高,即公司能够从基于区块链技术的公告中获取更高的股票溢价。
【关键词】区块链;;数字经济;;全要素生产率
【文献类型】 实证数据
【发表时间】2024-10-15