• 首页
  • 每日更新
  • 文献
  • 会议文献
  • 政策法规
  • 研究专题
  • 区块链游戏
logo 区块链前沿
  • 区块链前沿
  • 首页
  • 每日更新
  • 文献
  • 会议文献
  • 政策法规
  • 研究专题
  • 区块链游戏
  • 文章创新角色
  • 科研创新指数
  • 区块链领域本体
  • 热点主题挖掘
  • 主题展示
  • 专利文献
  • 排行榜
  • DAO治理
  • 文献上传
  • 积分获取规则
  • 大语言模型解析
  • 期刊发文分布
注册 登录

2024年10月17日 12篇

文献来源

  • 12

主题分类

      • 1
      • 1
      • 1
      • 1
      • 2
      • 1
      • 1
      • 1
      • 2
      • 1

文献类型

  • 10
  • 1
  • 1
筛选
订阅
<< 前一天 后一天 >>

Access Control Framework for Cross-Platform Interoperability in the Industrial Internet of Things

【Author】 Koo, Jahoon Kang, Giluk Kim, Young-Gab

CCF-C

【影响因子】11.648

【主题类别】

区块链应用-实体经济-工业互联网

【Abstract】The rapid advancement of the industrial Internet of things (IIoTs) has facilitated the development of diverse platforms and management technologies. However, the lack of standardized protocols and interoperability between platforms developed by various organizations hinders seamless integration. These limitations represent the primary challenge in access control between different IIoT platforms, resulting in limited service utilization across heterogeneous platforms. This study addresses the challenges of effectively sharing user attributes and representations for access control between heterogeneous IIoT platforms using blockchain and a metadata registry (MDR). Utilizing blockchain ensures tamper-proof and transparent attribute sharing, whereas the MDR facilitates the accurate mapping of user attributes for cross-platform resource access control. We demonstrated the feasibility of the proposed framework by successfully implementing access control between two representative standard platforms, namely oneM2M and FIWARE. Our results indicate that enhancing service utilization through access control between heterogeneous IIoT platforms can improve security and efficiency across various industries.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Access control; Industrial Internet of Things; Security; Interoperability; Authentication; Semantics; Ontologies; Blockchains; Authorization; Organizations; cross-platform; industrial Internet of things (IIoTs); interoperability; metadata registry (MDR)

【发表时间】2024

【收录时间】2024-10-17

【文献类型】 实验仿真

【DOI】 10.1109/TII.2024.3461783

Accountable Secret Committee Election and Anonymous Sharding Blockchain Consensus

【Author】 Zhai, Mingzhe Liu, Yizhong Wu, Qianhong Qin, Bo Zheng, Haibin Dai, Xiaopeng Ding, Zhenyang Susilo, Willy

CCF-A

【影响因子】7.231

【主题类别】

区块链技术-核心技术-共识机制

【Abstract】Consensus protocols play a crucial role in determining the security and performance of blockchain systems, with committee-based consensus protocols being particularly important, especially in sharding consensus protocols. Anonymous election of committee nodes can mitigate DDoS attacks and bribery attempts. This approach can also be applied to sharding systems to mitigate the risk associated with a single vulnerable shard. However, current node secret selection schemes still present remaining issues. Single secret leader election schemes struggle to elect multiple leaders with equal anonymity, and existing secret committee election schemes lack adequate measures for tracking malicious nodes. To address these issues, we propose accountable secret committee election schemes that not only regulate the number of nodes but also maintain anonymity during the phases of leader proposal and verifier voting. Furthermore, our schemes enable the tracing of malicious nodes in a threshold way. In addition, we introduce two efficient threshold traceable membership proof schemes for both ad hoc and interactive scenarios. Unlike traceable ring signatures, our scheme can trace malicious nodes even after a single malicious behavior. Subsequently, we apply the accountable secret committee election scheme to sharding blockchains and devise a fully accountable anonymous consensus protocol. The experiment demonstrates that this protocol can elevate the difficulty of corrupting a single shard to the level of compromising the entire system, thereby significantly enhancing the security of the sharding system.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Voting; Sharding; Protocols; Blockchains; Security; Consensus protocol; Polynomials; Traceable membership proof; secret committee election; anonymous sharding consensus; instant threshold traceability

【发表时间】2024

【收录时间】2024-10-17

【文献类型】 实验仿真

【DOI】 10.1109/TIFS.2024.3459608

BASUV: A Blockchain-Enabled UAV Authentication Scheme for Internet of Vehicles

【Author】 Xie, Mingyue Chang, Zheng Li, Hongwei Min, Geyong

CCF-A

【影响因子】7.231

【主题类别】

区块链应用-实体经济-身份验证

【Abstract】Unmanned aerial vehicles (UAVs) have emerged as pivotal roles within internet of vehicles (IoV), serving as mobile base stations. However, while expanding coverage and improving mobility, the deployment of UAVs also poses a threat to the integrity and privacy of sensitive data due to open wireless communication channels in IoV. Therefore, preventing unauthorized access and data tampering is critically important between UAVs and vehicles. For the authenticity and legitimacy of the UAV certificate, existing authentication approaches may lead to significant challenges in key management overhead or dependence on a trusted third party. In this paper, a blockchain-based authentication scheme for UAV-assisted IoV system (BASUV) is proposed. This solution enables dependable UAV registration and authentication services, and permits the dynamic addition and removal. Specifically, blockchain is introduced to achieve the decentralized management and distributed trust of the UAV certificate ledger. Furthermore, to prevent information tampering and identity deception, we design CMPES, a novel combined scheme based on multiple public key generators (PKGs) for encryption and signature. Identical key pair in encryption and signature can reduce key generation and management overhead. The security and experimental analysis demonstrates the effectiveness and efficiency of the proposed scheme.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Autonomous aerial vehicles; Blockchains; Security; Public key; Wireless communication; Smart contracts; Unmanned aerial vehicle (UAV) network; blockchain; authentication; Internet of Vehicles (IoV); Internet of Vehicles (IoV)

【发表时间】2024

【收录时间】2024-10-17

【文献类型】 实验仿真

【DOI】 10.1109/TIFS.2024.3465847

Reinventing Multi-User Authentication Security From Cross-Chain Perspective

【Author】 Lv, Yongyang Feng, Ruitao Ma, Maode Zhu, Manqing Wu, Hanwei Li, Xiaohong

CCF-A

【影响因子】7.231

【主题类别】

区块链技术-协同技术-身份验证

【Abstract】Blockchain systems encompass many distinct and autonomous entities, each utilizing its own self-contained identity authentication algorithm. Unlike identity authentication within a singular blockchain, cross-chain scenarios demand special attention due to their pivotal role in enabling the acknowledgment of users' identities across diverse domains. This capability is the foundational prerequisite for the circulation of resources across different chains. Consequently, the central challenge for cross-chain systems lies in establishing mutual recognition and trust in users' digital identities. This paper proposes a Multi-User Proxy Re-Signature (MU-PRS) algorithm, facilitating the cross-chain conversion of signatures from multiple users. Concurrently, This paper propose the Multi-Notary Signature Conversion (MN-SC) mechanism, designed to address the challenge posed by disparate system mechanisms across blockchains during cross-chain authentication. Leveraging the MU-PRS algorithm and MN-SC mechanism, we present a Multi-User Cross-Chain Authentication Scheme (MU-CCAS) within a heterogeneous blockchain environment. This scheme enables the verification of identities of multiple cross-chain users through a single signature verification. This innovative approach not only addresses the centralization issues inherent in third-party cross-chain authentication but also significantly enhances the efficiency of identity authentication. The evaluation results demonstrate MU-CCAS's superior security over existing solutions in three dimensions: BAN logic, Scyther verification, and security attribute analysis. Additionally, it establishes that MU-PRS and MU-CCAS have low computational overhead, easy implementation, and excel in algorithm, scheme, and cross-chain performance. Overall, our work provides a robust and efficient framework for cross-chain authentication, addressing centralization challenges and enhancing digital security.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Authentication; Security; Blockchains; Logic; Public key; Protocols; Hospitals; Blockchain; cross-chain authentication; heterogeneous; proxy re-signature

【发表时间】2024

【收录时间】2024-10-17

【文献类型】 实验仿真

【DOI】 10.1109/TIFS.2024.3463533

Fair and Privacy-Preserved Data Trading Protocol by Exploiting Blockchain

【Author】 Abla, Parhat Li, Taotao He, Debiao Huang, Huawei Yu, Songsen Zhang, Yan

CCF-A

【影响因子】7.231

【主题类别】

区块链技术-协同技术-数据管理

【Abstract】With the popularity of the mobile Internet, data is increasingly becoming a new resource. Therefore, the trading of such data resources has become an increasing demand. In this paper, we propose a fair privacy-preserving data trading protocol based on blockchain. Firstly, our data trading protocol achieves fairness by carefully combining the probabilistic approaches and the fully homomorphic encryption techniques. Moreover, our protocol allows online arbitration when misbehavior occurs in the trading process is detected. Note that previous data trading protocols need a Trusted Third Party (TTP) or an offline arbitrator to solve disputes, weakening the trust of those protocols. Secondly, the data validity verification process of our protocol is more flexible. Most Importantly, different from all previous designs which only achieve privacy against communication channel eavesdroppers, our protocol achieves privacy against any eavesdropper and the passive arbitrator. The above-distinguishing properties of our protocol are mainly benefited from the homomorphic encryption and double encryption techniques. In addition, our data trading protocol can be instantiated with post-quantum primitives and thus achieves post-quantum security. To demonstrate the feasibility of the proposed protocol, we conduct a comprehensive evaluation with the instantiated cryptographic primitives based on the Ethereum test network.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Protocols; Probabilistic logic; Data privacy; Blockchains; Data integrity; Organizations; Privacy; Data trading; blockchain; fairness; privacy; FHE

【发表时间】2024

【收录时间】2024-10-17

【文献类型】 实验仿真

【DOI】 10.1109/TIFS.2024.3398535

SAMCU: Secure and Anonymous Multi-Channel Updates in Payment Channel Networks

【Author】 Wang, Jianhuan Gao, Shang Li, Guyue Gai, Keke Xiao, Bin

CCF-A

【影响因子】7.231

【主题类别】

区块链应用-实体经济-支付领域

【Abstract】The Payment Channel Network (PCN) has emerged as an extensively adopted solution to address the scalability issues of Bitcoin by efficient off-chain updates. However, conflicts arise while existing update protocols are pursuing multiple goals of security, privacy, and expressiveness. In this work, we propose a new off-chain update protocol, Secure and Anonymous Multi-Channel Updates (SAMCU), which is developed on the basis of Unspent Transaction Output (UTXO). SAMCU aims at achieving goals of internal anonymity, balance security, and multi-channel updates simultaneously, which has not been done before. To achieve these goals, we exploit the technique of updating graph splitting (UGS) to make participants aware of only the identities of their neighboring sub-graphs, thereby ensuring internal anonymity in multi-channel updates. Then, to avoid security issues arising from equal sub-graphs, we further propose an Enable Payment Transaction Tree (EPTT) to guarantee balance security for each honest protocol participant. Moreover, we optimize the performance of our solution, reducing transaction fees by splitting transactions and the number of communication connections by hierarchical communication. To evaluate the performance of the SAMCU, we implement a prototype involving up to 100 updating payment channels. Experimental results demonstrate that SAMCU outperforms the state-of-the-art, resulting in approximately 70% savings in communication connections and a 66% reduction in on-chain transaction fees when the number of updating payment channels is 100.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Protocols; Blockchains; Security; Receivers; Privacy; Bitcoin; Scalability; Anonymity; multi-channel updates; payment channel networks (PCNs); blockchain

【发表时间】2024

【收录时间】2024-10-17

【文献类型】 实验仿真

【DOI】 10.1109/TIFS.2024.3451366

Unified Feature Engineering for Detection of Malicious Entities in Blockchain Networks

【Author】 Tharani, Jeyakumar Samantha Hou, Zhe Yugarajah Andrew Charles, Eugene Rathore, Punit Palaniswami, Marimuthu Muthukkumarasamy, Vallipuram

CCF-A

【影响因子】7.231

【主题类别】

区块链治理-技术治理-异常/非法交易识别

【Abstract】Blockchain technology has been integrated into a wide range of applications in various sectors, such as finance, supply chain, health, and governance. However, the participation of a few actors with malicious intentions challenges law enforcement authorities, regulators and other users. These challenges revolve around dealing with an array of illegal activities such as asset trades in dark markets, receiving payments for cyber-attacks, and facilitating money laundering. Developing an efficient mechanism to identify malicious actors in blockchain networks is a pressing need to build confidence among the stakeholders and ensure regulatory adherence. The raw data of blockchain transactions do not readily reveal the dynamic behavioural changes and their interconnection between transactions and accounts. These behavioural patterns can be useful for identifying malicious actors. Machine Learning (ML)-based models for early warning and/or detection are considered one of the potential approaches. In ML, feature engineering plays a crucial role in enhancing the predictive performance of a model. This study proposes different categories of features and unified feature extraction approaches for raw Bitcoin and Ethereum transaction data and their interconnection information. As far as we are aware, there has been no study that considered a feature engineering approach for identifying malicious activities. The significance of the engineered features was validated against eight classifiers, including Random Forest (RF), XG-boost (XG), Silas, and neural network-based classifiers. The results showed that these features contribute to higher classification accuracy and higher Area Under the Receiver Operating Characteristic Curve (AUC) value for both Bitcoin and Ethereum transactions. This work also analysed the influence of engineered features in classification using the eXplainable Artificial Intelligence (XAI) technique SHapley Additive exPlanations (SHAP) values. The feature importance scores confirmed the significance of the proposed engineered features towards implementing classification models to identify, target and disrupt malicious activities in blockchain networks.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; explainable artificial intelligence; cryptocurrency; anomaly detection; graph embedding; Blockchain; explainable artificial intelligence; cryptocurrency; anomaly detection; graph embedding

【发表时间】2024

【收录时间】2024-10-17

【文献类型】 案例研究

【DOI】 10.1109/TIFS.2024.3412421

Comparative performance of cryptocurrencies through the Aumann-Serrano economic index of riskiness

【Author】 Yamawake, Toshiyuki Sheely, Joseph Serrano, Roberto Hodoshima, Jiro

【影响因子】4.820

【主题类别】

区块链治理-市场治理-市场分析

【Abstract】We present evaluations of cryptocurrencies based on the performance index derived from the Aumann-Serrano-henceforth, AS-economic index of riskiness. Bitcoin is rated quite poorly-much riskier-compared to other cryptocurrencies, although it is the most popular and has the largest market capitalization among all the cryptocurrencies. On the other hand, the stock market ETF, SPY, is rated the best-least risky-and much better than cryptocurrencies by the AS performance index, contrasting sharply to the evaluation made by the Sharpe ratio.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Cryptocurrencies; Performance index; Aumann-Serrano index; Multi-period gambles; One-period gambles; G11; C22; C46

【发表时间】2024

【收录时间】2024-10-17

【文献类型】 实验仿真

【DOI】 10.1007/s10479-024-06333-6

SpaTeD: Sparsity-Aware Tensor Decomposition-Based Representation Learning Framework for Phishing Scams Detection

【Author】 Ghosh, Medhasree Halder, Raju Chandra, Joydeep

【影响因子】4.747

【主题类别】

区块链治理-技术治理-异常/非法交易识别

【Abstract】In recent years, the consequences of phishing scams on Ethereum have adversely affected the stability of the crypto-currency environment. Numerous incidents have been reported that have resulted in a substantial loss of cryptocurrency. The existing literature in this area primarily leverages traditional feature engineering or network representation learning to recover crucial information from transaction records to identify suspected users. However, these methods mainly rely on handcrafted feature engineering or conventional node representation learning from a static network while ignoring the network dynamism and inherent temporal sparsity in the user behavior that results in underperformance after an extended period. This article proposes a novel sparsity-aware tensor decomposition-based architecture: SpaTeD, which retrieves efficient user representation utilizing the evolving transaction and structural information and subsequently mitigates the temporal sparsity problem. Our model is evaluated on a real-world Ethereum phishing scam dataset and reports a significant performance improvement over the baselines (96% recall and 96% F1-score). We have conducted an extensive set of experiments to verify the temporal robustness of the model. Additionally, we have provided the ablation study to demonstrate the contribution of each component of the framework.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Tensors; Blockchains; Cryptocurrency; Smart contracts; Open source software; Phishing; Feature extraction; Representation learning; Computer architecture; Security; Ethereum transaction network; phishing users; representation learning; sparsity

【发表时间】2024

【收录时间】2024-10-17

【文献类型】 实证数据

【DOI】 10.1109/TCSS.2024.3462552

Social-Aware Clustered Federated Learning With Customized Privacy Preservation

【Author】 Wang, Yuntao Su, Zhou Pan, Yanghe Luan, Tom H. Li, Ruidong Yu, Shui

【影响因子】3.796

【主题类别】

区块链技术-协同技术-联邦学习

【Abstract】A key feature of federated learning (FL) is to preserve the data privacy of end users. However, there still exist potential privacy leakage in exchanging gradients under FL. As a result, recent research often explores the differential privacy (DP) approaches to add noises to the computing results to address privacy concerns with low overheads, which however degrade the model performance. In this paper, we strike the balance of data privacy and efficiency by utilizing the pervasive social connections between users. Specifically, we propose SCFL, a novel Social-aware Clustered Federated Learning scheme, where mutually trusted individuals can freely form a social cluster and aggregate their raw model updates (e.g., gradients) inside each cluster before uploading to the cloud for global aggregation. By mixing model updates in a social group, adversaries can only eavesdrop the social-layer combined results, but not the privacy of individuals. As such, SCFL considerably enhances model utility without sacrificing privacy in a low-cost and highly feasible manner. We unfold the design of SCFL in three steps. i) Stable social cluster formation. Considering users' heterogeneous training samples and data distributions, we formulate the optimal social cluster formation problem as a federation game and devise a fair revenue allocation mechanism to resist free-riders. ii) Differentiated trust-privacy mapping. For the clusters with low mutual trust, we design a customizable privacy preservation mechanism to adaptively sanitize participants' model updates depending on social trust degrees. iii) Distributed convergence. A distributed two-sided matching algorithm is devised to attain an optimized disjoint partition with Nash-stable convergence. Experiments on Facebook network and MNIST/CIFAR-10 datasets validate that our SCFL can effectively enhance learning utility, improve user payoff, and enforce customizable privacy protection.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Privacy; Cloud computing; Perturbation methods; Federated learning; Social networking (online); Protection; Data models; Artificial intelligence; Training; Servers; Social trust; federated learning; differential privacy; federation game

【发表时间】2024

【收录时间】2024-10-17

【文献类型】 实验仿真

【DOI】 10.1109/TNET.2024.3379439

Blockchain technology for secure electronic healthcare record in cloud based cryptographic hash generator

【Author】 Mubarakali, Azath Basha, A. Alavudeen

CCF-C

【影响因子】3.488

【主题类别】

区块链应用-实体经济-医疗领域

【Abstract】Security and privacy concerns have emerged as significant challenges for enhancing Electronic Health Records (EHR) system for cloud settings. Even though cloud storage offers benefits such as scalability and accessibility, it has risks to the confidentiality and integrity of patients' medical information. Some encryption algorithms are proposed to secure EHR data in cloud, but its efficiency is low. Therefore, the Cryptographic Hash Generator based Blockchain Technology for Secure Electronic Healthcare Record in Cloud (SEHR-BC-CHG) is proposed in this manuscript to maximize the security and secrecy of EHRs. Initially, the data is gathered from the health care centre, which is separated as sensitive and insensitive. To validate transaction authentication, the block chain system employs Cryptographic hash algorithm (CHG) and sensitive medical data is encrypted using the Discrete Shearlet Transform (DST) to enhance security. At Block Chain scheme, the user must submit a request to the CHG for obtaining data from healthcare application. To request verification, the request is distributed from the queue and Hybrid Chaotic Atom Search Optimization Algorithm based tree seed algorithm with Levy flight optimization (HCASOA-TSA-LF) is used to find optimum request that derives via unanimity node to begin the verification procedure. The experimental outcomes shows that the SEHR-BC-CHG method achieves 16.38%, 27.28% and 20.21% lesser encryption time when analyzed with existing models, like Safety enhancement with blockchain based modified infinite chaotic elliptic cryptography in cloud (SEHR-BC-MICEC), Secure clinical data sharing depending on traceable ring signature and blockchain (SEHR-BC-TRSA), a blockchain based privacy aware medical data sharing utilizing smart contract with encryption scheme (SEHR-BC-LFCA) respectively.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Cloud computing; Cryptographic hash generator; Discrete Shear let transform and Levy flight optimization

【发表时间】2024

【收录时间】2024-10-17

【文献类型】 实验仿真

【DOI】 10.1007/s12083-024-01789-6

RGPBFT: A Reputation-Based PBFT Algorithm with Node Grouping Strategy

【Author】 Zhu, Xutong Hu, Xiaoxuan Zhu, Waiming

【影响因子】2.807

【主题类别】

区块链技术-核心技术-共识机制

【Abstract】The practical Byzantine fault tolerance (PBFT) algorithm stands out as one of the most frequently employed consensus algorithms in consortium blockchains. However, due to the frequent global communication mechanism, the PBFT's communication overhead increases exponentially with the number of nodes, resulting in poor scalability. Therefore, the PBFT is typically used only in small networks. To improve the PBFT's efficiency in large-scale systems such as massive smart grids and the Internet of Things, we put forward a reputation-based PBFT algorithm with node grouping strategy (RGPBFT). Specifically, we firstly develop an improved consistency subprotocol based on node grouping strategy to improve the consensus efficiency and the scalability of the PBFT. Then, we propose a reputation-based strategy to enhance the reliability of the elected master node. The simulated test results show that the node grouping strategy could significantly improve the consensus efficiency of the PBFT, and the reputation-based strategy could reduce the impact of Byzantine nodes on the throughput and consensus latency. Overall, the test results demonstrate that the RGPBFT outperforms the PBFT in consensus latency, throughput, communication overhead, and fault tolerance. The RGPBFT exhibits high consensus efficiency in large-scale networks.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Practical byzantine fault tolerance; Consensus algorithm; Consortium blockchain; Node grouping; Reputation-based strategy

【发表时间】2024

【收录时间】2024-10-17

【文献类型】 实验仿真

【DOI】 10.1007/s13369-024-09614-1

在线标注

备案号: 苏ICP备17025947号-5

评论回复