• 首页
  • 每日更新
  • 文献
  • 会议文献
  • 政策法规
  • 研究专题
  • 区块链游戏
logo 区块链前沿
  • 区块链前沿
  • 首页
  • 每日更新
  • 文献
  • 会议文献
  • 政策法规
  • 研究专题
  • 区块链游戏
  • 文章创新角色
  • 科研创新指数
  • 区块链领域本体
  • 热点主题挖掘
  • 主题展示
  • 专利文献
  • 排行榜
  • DAO治理
  • 文献上传
  • 积分获取规则
  • 大语言模型解析
  • 期刊发文分布
注册 登录

2024年10月20日 27篇

文献来源

  • 27

主题分类

      • 2
      • 1
      • 1
      • 4
      • 1
      • 1
      • 1
      • 1
      • 2
      • 2
      • 1
      • 2
      • 1
      • 1
      • 1
      • 1
      • 1
      • 1
      • 3
      • 2
      • 1
      • 1
      • 1
      • 1

文献类型

  • 10
  • 10
  • 1
  • 6
筛选
订阅
<< 前一天 后一天 >>

Online travel agency or blockchain-based platform?

【Author】 Gao, Guang-Xin Bi, Jian-Wu

【影响因子】12.853

【主题类别】

区块链应用-实体经济-酒店领域

区块链应用-实体经济-酒店领域

【Abstract】Online travel agency has been used by most hotels to attract customers. However, hefty commissions and unverified reviews reduce hotels' cooperation intentions. Armed with unique advantages, blockchain-based platforms with higher blockchain-adoption costs can alternatively offer peer-to-peer booking service. This paper investigates the hotels' choice strategies on online travel platforms, blockchain-adoption conditions, and effects of blockchain-based platform. The results show that marginal blockchain cost, commission rate and customers' perceived distrust value of online reviews have great influence on the hotels' decisions. Although blockchain-based platforms can create win-win situations for hotel(s) and customers, they are not widely available as it is considered imperfect and costly. Alarmingly, there exists an invalidation effect of online travel platforms in a competitive market, resulting in non-equilibrium. (c) 2024 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Online travel platform selection; Online travel agency; Blockchain-based platform; Hotel's profit; Optimal and equilibrium strategies

【发表时间】2024

【收录时间】2024-10-20

【文献类型】 实证数据

【DOI】 10.1016/j.annals.2024.103846

Blockchain-enabled downward traceability to combat gray market

【Author】 Wu, Jianghua Cheng, Hongya Li, Luyao

【影响因子】11.251

【主题类别】

区块链治理-市场治理-技术采用

区块链应用-实体经济-商业领域

【Abstract】Cross-market brand owners have long been troubled by the gray market issues. This study examines a dual distribution channel model involving one brand owner, two retailers, and two independent markets. In this model, low-end retailers privately transfer products from the low-end to high-end markets, creating a gray market. The brand addresses this behavior by adopting blockchain. We examine the impact of blockchain on gray market invasion, firm decisions, consumer surplus, and social welfare through downward traceability. The results show that gray market invasion consistently benefits low-end market retailers while disadvantaging highend market retailers. It is profitable for the brand to allow gray market invasion when the willingness to pay in the low-end market is substantial. Blockchain adoption can effectively inhibit gray market invasion, benefiting high-end market retailers while harming low-end market retailers and the brand, depending on the cost and penalty fee involved with blockchain implementation. When the cost of blockchain adoption is relatively low, brand adopting blockchain may achieve a win-win-win market situation. However, although consumer surplus and social welfare can benefit from a gray market invasion, adopting blockchain reduces this impact, especially when cost of blockchain adoption and penalty fee are both relatively high.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; Gray market; Dual distribution channels; Game theory

【发表时间】2024

【收录时间】2024-10-20

【文献类型】 实证数据

【DOI】 10.1016/j.ijpe.2024.109415

A framework for modeling and simulating blockchain-based supply chain traceability systems

【Author】 Risso, Lucas Antonio Ganga, Gilberto Miller Devos de Santa-Eulalia, Luis Antonio Godinho Filho, Moacir Chikhi, Tinhinane Mosconi, Elaine Zhang, Kaiwen

【影响因子】11.251

【主题类别】

区块链应用-实体经济-供应链

【Abstract】Traceability improves supply chain operations transparency, benefiting the overall performance and the end customer perception. Blockchain technology is a promising alternative to create robust traceability systems, as it promotes trust and supports information sharing based on data immutability. Despite the hype surrounding blockchain technology and the vast literature in the field, the effectiveness and efficiency of blockchain-based supply chain traceability systems remain uncertain across multiple industry sectors, due to the lack of empirical evidence. Considering its characteristics, simulation is a valuable tool to evaluate the performance of supply chain management processes and technology alternatives. However, a structured guide to support the building process of simulation models regarding blockchain in the supply chain is still missing, making it hard for modelers to create realistic simulation models. Thus, this work proposes a novel methodological framework with guidelines to develop HS models regarding supply chain traceability capable of integrating the main blockchain concepts for managerial purposes. Scenarios with different granularity levels may be designed through the combination of both discrete-event and agent-based simulation paradigms. The proposed approach integrates concepts and terminologies from foundational references, including the Supply Chain Operations Reference (SCOR) model and the Global Traceability Standard (GTS). In addition, it is anchored on the ADACOR holonic architecture for the agentification process. Following the Design Science Research methodology, a proof-of-concept application is presented, based on a real-scale industrial case of a lobster supply chain from Canada. Results obtained reflect the framework's versatility to assist the development of a hybrid simulation model, as traceability is explored through the perspectives of time to react, item separation, temporal screening, and blockchain participation rate.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; Supply chain traceability; SCOR; GTS; Simulation modeling

【发表时间】2024

【收录时间】2024-10-20

【文献类型】 实证数据

【DOI】 10.1016/j.ijpe.2024.109408

A Reputation Awareness Randomization Consensus Mechanism in Blockchain Systems

【Author】 Zhang, Jingyu Sun, Yongtao Guo, Deke Luo, Lailong Li, Liyao Nian, Qifeng Zhu, Shi Yang, Fangliao

CCF-C

【影响因子】10.238

【主题类别】

区块链技术-协同技术-共识机制

【Abstract】Blockchain, as an emerging technology, has gained widespread research in academia and industry due to its decentralization and traceability. As an important form of blockchain, consortium chains are often applied in the Internet of Things (IoT) to ensure the authenticity and reliability of data. Within consortium chains, the practical Byzantine fault tolerance (PBFT) method is a key technology for ensuring the data consistency. It plays a central role in enhancing the system performance, security, and scalability. However, with the increase in the number of user nodes and the diversification of application scenarios, PBFT faces significant challenges in maintaining performance and security, particularly due to the increased communication overhead, longer consensus latency (CL), and risks of malicious attacks on the leader node. To overcome these challenges, this article proposes a new blockchain consensus mechanism, namely the reputation awareness randomization consensus mechanism in the blockchain systems (RARCs). This mechanism first builds an evaluation model for the nodes, dividing them into ordinary nodes and candidate nodes through the reputation assessment. Second, it constructs a consensus node selection strategy to select the high-quality consensus nodes from the candidate nodes. Finally, RARC establishes a leader node randomization selection mechanism, increasing the unpredictability of the leader node and reducing the probability of the malicious attacks. Through the theoretical analysis and simulation experiments, we demonstrate that the RARC can significantly reduce the CL, enhance the throughput, and increase the unpredictability of the leader node, thereby improving the performance and security of the blockchain systems.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Internet of Things; Consensus protocol; Consensus algorithm; Security; Peer-to-peer computing; Genetic algorithms; Throughput; Blockchain systems; consensus mechanism; genetic algorithm (GA); node evaluation; verifiable random function (VRF)

【发表时间】2024

【收录时间】2024-10-20

【文献类型】 实验仿真

【DOI】 10.1109/JIOT.2024.3408846

EPDB: An Efficient and Privacy-Preserving Electric Charging Scheme in Internet of Robotic Things

【Author】 Zhai, Di Liu, Jiqiang Zhang, Tao Wang, Jian Du, Hongyang Liu, Tianhao Wang, Tianxi Zhang, Chuan Kang, Jiawen Niyato, Dusit

CCF-C

【影响因子】10.238

【主题类别】

区块链应用-实体经济-汽车领域

区块链技术-协同技术-物联网

【Abstract】In recent years, electric vehicles (EVs) have emerged as a promising mode of transportation. With the development of Internet of Robotic Things (IoRT) technology, charging stations are employing interconnected robots to charge EVs, automating the collection and transmission of user charging information. However, charging processes pose risks of privacy leakage to users, as malicious attackers could potentially exploit the collected charging information to infer the real identities and behavioral habits of EV users. Existing studies leverage the decentralization and anonymity of blockchain to achieve privacy-preserving charging management. Due to the increasing number of users and limited battery capacity, there is a large volume of charging requests demand to be processed. However, the consensus mechanism of blockchain limits the system throughput. Therefore, it is a challenge to preserve the privacy of EV users and simultaneously improve the system processing efficiency. To address these concerns, we propose an efficient and privacy-preserving EV charging scheme (EPDB), which leverages decentralized identifier (DID) and Pedersen commitment scheme to achieve reliable charging reservations while hiding EV User's charging information. Additionally, we propose an efficient blockchain consensus protocol, which serves as the underlying storage for DID, thus significantly improving the system throughput. Furthermore, our proposed consensus protocol maintains high throughput even when encountering Byzantine attacks. Our theoretical analysis indicates that EPDB scheme effectively mitigate Byzantine attacks, preserve privacy and prevents deception of charging services, and our experimental results demonstrate the high efficiency of EPDB scheme.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Electric vehicles; Consensus protocol; Peer-to-peer computing; Throughput; Privacy; Robots; Internet of Things; Blockchain; consensus protocol; decentralized identifier (DID); Internet of Robotic Things (IoRT); privacy preserving

【发表时间】2024

【收录时间】2024-10-20

【文献类型】 实验仿真

【DOI】 10.1109/JIOT.2024.3426536

The Achilles Heel of License Plate Recognition Parking Enforcement: Balancing Privacy Protection and Enforcement

【Author】 Xue, Liang Gan, Rundong Lin, Xiaodong

CCF-C

【影响因子】10.238

【主题类别】

区块链治理-技术治理-隐私保护

【Abstract】Parking enforcement is crucial for addressing illegal parking in urban areas. In smart cities, the license plate recognition (LPR) systems have been adopted to enhance parking enforcement by enabling automated monitoring and detection of parking violations. However, the extensive information collection raises public privacy concerns about how the data are processed and stored on a central server. To address the privacy issue during parking enforcement and enable flexible data access control with the user consent, we propose a novel privacy-preserving and access-control-enhanced parking enforcement scheme, where the central server cannot obtain the license plate information of vehicles that follow the parking rules and can provide encrypted evidence for detected violations in case of disputes. Specifically, by utilizing the keyed-hash message authentication code, parking enforcement vehicles can generate a parking record based on the location and the license plate number of a vehicle, which is then used to identify whether there is a parking violation for the vehicle. Moreover, by integrating the designed time-based conditional proxy re-encryption scheme, the distributed key generation technique, and the blockchain technology, a central server can provide encrypted and tamper-proof evidence for violations. The evidence can only be decrypted by the corresponding vehicle owners (VOs), and the owners can grant the decryption permission to a judge when there is a dispute. The security analysis demonstrates that our scheme can achieve the privacy preservation of VOs and consent-based data access control. Simulation results show the efficiency and practicability of the proposed scheme.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Servers; Privacy; License plate recognition; Data privacy; Blockchains; Monitoring; Internet of Things; Access control; parking enforcement; privacy preservation; smart city

【发表时间】2024

【收录时间】2024-10-20

【文献类型】 实验仿真

【DOI】 10.1109/JIOT.2024.3429409

H2CT: Asynchronous Distributed Key Generation With High-Computational Efficiency and Threshold Security in Blockchain Network

【Author】 Xiang, Axin Gao, Hongfeng Tian, Youliang Xiong, Jinbo Wang, Linjie Peng, Changgen

CCF-C

【影响因子】10.238

【主题类别】

区块链技术-核心技术-加密算法

【Abstract】-Asynchronous distributed key generation (ADKG) is a strong-robustness key management technology to bootstrap threshold cryptosystems without a global clock, which can enable decentralized security management for threshold digital wallets in blockchain network. However, the high-computational cost of existing ADKG protocols makes it difficult to remove the "slow" connotation from the word "asynchronous" in a high-threshold security context. In this article, we propose a simpler "two- high" ADKG protocol ((HCT)-C-2) 2 CT) for blockchain to improve the computational efficiency of asynchronous communications while balancing it with threshold security. Concretely, we first construct a computationally efficient asynchronous complete secret sharing (ACSS) scheme using number theory transformation, reducing the computational complexity of share evaluation from O(n(2)) to O(n log n) ) in the dealing phase. To eliminate the negative impact of up to t biased secrets brought by the implicate messages in the agreement phase, we extend the verifiable ACSS scheme to a publicly verifiable ACSS scheme (pvACSS) using Feldman polynomial commitment. Leveraging this enhanced randomness, the matrix computation cost and message size in the remaining phases are reduced to about half that of the existing works, i.e., O (n(2)) . Finally, considering the high-scalability requirements, the network size n is increased to up to 1024 nodes and the results show that our pvACSS and the derived (HCT)-C-2 reduce the runtime by approximately 33.96 s and 824.46 s, respectively, over the stateof-the-art. Moreover, we perform simulations on an open-source

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Protocols; Blockchains; Computational efficiency; Security; Polynomials; Public key; Costs; Asynchronous complete secret sharing (ACSS); asynchronous distributed key generation; blockchain; number theory transformation; public verifiability

【发表时间】2024

【收录时间】2024-10-20

【文献类型】 实验仿真

【DOI】 10.1109/JIOT.2024.3431554

Securing IoT Data: FDUP-RDICA Fully Decentralized Approach for Privacy-Preserving and Efficient Data Integrity

【Author】 Peng, Su Kumar, Neeraj Alsamhi, Saeed Hamood He, Qiang Zhao, Liang

CCF-C

【影响因子】10.238

【主题类别】

区块链应用-实体经济-物联网

【Abstract】By the limitations of storage capacity and computing power, Internet of Things (IoT) devices may prefer to outsource their valuable and sensitive data to cloud storage providers (CSPs) for further analysis, so it is critical to design protocols that can verify the integrity of these data remotely, while preserving the privacy of their owners. This article proposes a novel remote data integrity checking method for IoT, namely, FDUP-remote data integrity checking (RDIC), which achieves fully decentralized, efficient, and unconditionally privacy-preserving checking simultaneously, that is, the proof-checking is performed efficiently on the blockchain by the smart contracts integrated with native C/C++ codes, while the blockchain or any other entity cannot learn any information about the data content, even they have unbounded computing power. Furthermore, it is optimized for low-power IoT devices by greatly reducing the exponentiations of generating homomorphic verifiable tags to be nearly independent of the block size of the outsourced data. To defend against untrusted IoT and CSP, we present strict proofs and analyses in the aspect of correctness, soundness, and unconditionally privacy-preserving. The evaluation of theoretical performance and the prototype system deployed on a blockchain platform indicate that FDUP-RDIC is suitable for real-world IoT applications.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Internet of Things; Blockchains; Cloud computing; Performance evaluation; Security; Data integrity; Computer architecture; Blockchain; data integrity; Internet of Things (IoT); privacy-preserving

【发表时间】2024

【收录时间】2024-10-20

【文献类型】 实验仿真

【DOI】 10.1109/JIOT.2024.3412224

Clustering-Based Collaborative Storage for Blockchain in IoT Systems

【Author】 Peng, Kai Xie, Jiangshan Wei, Lan Hu, Jiaxing Hu, Xueyan Deng, Tianping Hu, Menglan

CCF-C

【影响因子】10.238

【主题类别】

区块链应用-实体经济-物联网

【Abstract】Recently, blockchain is introduced to ensure the security of the device data in Internet of Things (IoT) systems. However, storing the entire blockchain ledger in resource-constrained IoT devices is impractical. A few existing papers attempt to mitigate the storage issues of the blockchain ledgers through the collaborative storage. Nonetheless, these studies solely consider collaborative storing of the entire blockchain ledger in a single consensus unit, treating all the nodes as an individual peer but ignoring which nodes should be assigned to form a consensus unit together. This may lead to significant latency in block invocations among the nodes. To this end, this article innovatively explores the grouping of all the devices in the IoT network into multipeers at a global level which significantly reduces the access latency. In this article, we propose a clustering-based collaborative storage scheme for the blockchain in storage-limited IoT systems. The proposed algorithm takes storage and communication latency into consideration and clusters various IoT nodes into multiple peers, ensuring that the entire blockchain stays updated within these clusters. Furthermore, we propose a series of effective block allocation and replacement strategies in both the static and dynamic scenarios. The experimental results verify that our algorithm effectively solves the problem of insufficient storage in blockchain systems.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchains; Internet of Things; Peer-to-peer computing; Collaboration; Resource management; Security; Sharding; Blockchain; clustering; collaborative storage; Internet of Things (IoT)

【发表时间】2024

【收录时间】2024-10-20

【文献类型】 实验仿真

【DOI】 10.1109/JIOT.2024.3434583

RT-DAG: DAG-Based Blockchain Supporting Real-Time Transactions

【Author】 Liao, Guoqiong Ding, Hao Zhong, Chuanling Lei, Yinxiang

CCF-C

【影响因子】10.238

【主题类别】

区块链技术-核心技术-DAG

【Abstract】The nonlinear structure of a directed acyclic graph (DAG)-based blockchain facilitates parallel transaction processing, improving the overall scalability and throughput of the system. Compared with chain-based structures, DAG-based blockchains offer more flexibility in transaction processing. However, current research predominantly concentrates on improving throughput and reducing latency, with insufficient attention given to the real-time characteristics of transactions. Consequently, these systems struggle to effectively support business scenarios with deadlines, such as supply chain management and engineering manufacturing. In this article, we present a prototype of a DAG-based blockchain called RT-DAG, which supports the execution of real-time transactions. Specifically, RT-DAG assigns priorities to transactions based on deadlines and captures address utilization during transaction execution via an address resource graph (ARG). To enhance address utilization efficiency and provide additional opportunities to commit transactions before deadlines, we introduce a concurrency control scheme based on ARG called opportunity seizing (OS), which involves reordering transactions to replenish available addresses. Additionally, we propose a load-balancing grouping strategy to alleviate single-node workload pressures. The strategy assesses each group's workload based on transaction quantity and type. Leveraging the bat algorithm, the algorithm strives to balance the workload distribution among groups, ultimately improving transaction execution efficiency. Numerous experiments have shown that RT-DAG performs well under different conflict rates and deadline ranges, effectively meeting the transaction timeliness requirements.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Real-time systems; Blockchains; Throughput; Internet of Things; Concurrency control; Finance; Supply chains; Conflict graph (CG); concurrency control; DAG-based blockchain; real-time transactions; transaction grouping; transaction processing framework

【发表时间】2024

【收录时间】2024-10-20

【文献类型】 实验仿真

【DOI】 10.1109/JIOT.2024.3409025

An Efficient Multiparty Payment Protocol for IoT Micro-Payments

【Author】 He, Jinchun Qiu, Wangjie Zhuo, Shengda Xu, Minghui Zhang, Qinnan Xiong, Zehui Zheng, Zhiming

CCF-C

【影响因子】10.238

【主题类别】

区块链应用-实体经济-物联网

【Abstract】The blockchain can offer a dependable and secure platform for Internet of Things (IoT) transactions with its distributed and secure network architecture. Unfortunately, it faces challenges, such as limited throughput, excessive computational costs, and high-transaction fees. Off-chain scaling protocols are used to address the scalability of blockchain for their outstanding performance and efficiency. To mitigate the high-cost interactions with blockchain, previous studies only considered moving transactions of payment hubs (PHs) off-chain, utilizing off-chain operators to aggregate multiple transactions. However, existing PHs overly rely on central operators for system maintenance, greatly increasing the risk of central operator failure (COF). Previous solutions allowed operators to submit unsettled state commitments (USCs) to the blockchain and overlooked the pessimistic scenario that could lead to state rollbacks. To address these issues, this article proposes an efficient multiparty payment protocol (HyperPay), aimed at utilizing the off-chain scaling technique to enhance transaction throughput and reduce on-chain cost. Specifically, we first propose a novel off-chain committee and collateral-based verifiable random leader election (C-VRE) to elect leaders fairly, thus mitigating the COF problem. Additionally, we design a new state validation mechanism and one-step fraud challenge (OSFC), enabling verifiers to directly construct fraud proofs and challenges on-chain, thereby preventing leaders from submitting USC. Our evaluation indicates that HyperPay reduces on-chain costs of challenge by 80% and boosts peak throughput by a factor of 10X-283X. A comprehensive theoretical analysis and experimental results substantiate the security and effectiveness of our proposed approach.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchains; Internet of Things; Scalability; Protocols; Fraud; Routing; Throughput; Blockchain; Internet of Things (IoT); multiparty; off-chain scaling; payment hub (PH)

【发表时间】2024

【收录时间】2024-10-20

【文献类型】 实验仿真

【DOI】 10.1109/JIOT.2024.3421245

A Certificateless Threshold Proxy Re-Encrypted Data-Sharing Scheme With Cloud-Chain Collaboration in Industrial Internet Environments

【Author】 Feng, Jingyu Li, Yue Wang, Teng Liu, Shuanggen

CCF-C

【影响因子】10.238

【主题类别】

区块链应用-实体经济-物联网

【Abstract】The industrial Internet information system has become the key to protecting the new generation of information infrastructure, and its data security storage and sharing are crucial for platform construction and alliance development. In response to security challenges, such as privacy leakage, data tampering, and lack of effective isolation in the current industrial Internet data storage and sharing process, this article proposes an industrial Internet data-sharing scheme based on multiclouds and multichains collaborative storage mode. The proposed scheme supports keyword search and utilizes certificateless threshold proxy re-encryption (PRE) technology. Our scheme allows industrial enterprises to securely store a large amount of sensitive data ciphertext in private clouds, while classifying and storing metadata ciphertext on different blockchains. A data protection algorithm that avoids private key escrow and supports ciphertext retrieval is constructed by combining certificateless PRE, threshold secret sharing, and searchable encryption techniques. In addition, a trust evaluation consensus algorithm is designed to select nodes with high trust as proxies in blockchain networks, solving the trust problem in traditional PRE schemes. Security analysis shows that our scheme can effectively resist collusion attacks and data tampering. Performance and simulation comparison analysis show that the main algorithms in our scheme have a lower time cost compared to the other typical schemes involved in comparison.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchains; Cloud computing; Security; Data privacy; Internet of Things; Cryptography; Encryption; Certificateless proxy re-encryption (CL-PRE); cloud-chain collaboration; data security sharing; industrial Internet

【发表时间】2024

【收录时间】2024-10-20

【文献类型】 实验仿真

【DOI】 10.1109/JIOT.2024.3425450

Trusted Execution Environment With Rollback Protection for Smart Contract-Based IoT Data Trading

【Author】 Lu, Xin Zhang, Zijian Ma, Teng Li, Meng Zhou, Tyler Shen, Wei Zhu, Liehuang

CCF-C

【影响因子】10.238

【主题类别】

区块链技术-协同技术-物联网

【Abstract】Blockchain uses smart contract technology to automate the execution of Internet of Things (IoT) data trading and facilitate the flow and application of IoT data. The verifiability of the blockchain system requires data to be open and transparent. Directly using smart contracts for IoT data trading may expose sensitive data generated by IoT devices, thereby increasing the risk of data leakage and abuse. The trusted execution environment represented by software guard extension (SGX) provides new ideas for trusted execution of IoT data trading based on smart contracts. SGXs is a set of hardware security enhancement technologies launched by Intel, which aims to protect the execution of sensitive data and code through the hardware isolation and security encryption capabilities provided by the processor. However, we found that due to SGX's lack of a checksum mechanism for the execution state of smart contracts, a rollback attack can lead to errors when the account state of IoT data trading is replayed. To address the above issues, we propose a trusted execution environment for IoT data trading with rollback protection. First, we design a freshness checking mechanism for the execution state of IoT data trading contracts for rollback protection. In addition, we propose a "chain-of-trust"-based authentication model to realize trust metrics and remote proofs for the proposed trusted execution environment for IoT data trading. Finally, we then provide a formal security analysis and comprehensive performance evaluation.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Smart contracts; Internet of Things; Protection; Security; Privacy; Operating systems; Software; Internet of Things (IoT); privacy protection; rollback attack; smart contracts; trusted execution environment

【发表时间】2024

【收录时间】2024-10-20

【文献类型】 实验仿真

【DOI】 10.1109/JIOT.2024.3422005

Sustainable energy practices and cryptocurrency market behavior

【Author】 Ben Omrane, Walid Saadi, Samir Savaser, Tanseli

【影响因子】9.252

【主题类别】

区块链治理-市场治理-市场分析

【Abstract】We examine the effects of energy usage on the return, volatility and jump processes in the Bitcoin (BTC) and Ethereum (ETH) markets. Our main finding indicates that while BTC returns respond significantly to changes in electricity consumption, the effect of electricity consumption on ETH returns is negligible. We attribute this discrepancy to BTC's relative energy inefficiency, which contrasts with ETH's commitment to transitioning to a more energy-efficient mining protocol over our sample period. Additionally, we show that the effect of electricity consumption on cryptocurrencies is mitigated by media coverage and policy uncertainty regarding the state of the economy, environment, and cryptocurrency markets. Our results suggest that when trading cryptocurrencies, investors consider their relative energy efficiency and price electricity consumption differently, highlighting the influence of the transition towards more sustainable energy practices on investor preferences and investment decisions in cryptocurrency markets.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Energy transition; Sustainable energy practices; Cryptocurrencies; Bitcoin; Ethereum

【发表时间】2024

【收录时间】2024-10-20

【文献类型】 实证数据

【DOI】 10.1016/j.eneco.2024.107937

Unleashing the prospective of blockchain-federated learning fusion for IoT security: A comprehensive review

【Author】 Gupta, Mansi Kumar, Mohit Dhir, Renu

【影响因子】8.757

【主题类别】

区块链技术-协同技术-联邦学习

区块链技术-协同技术-物联网

【Abstract】Internet-of-things (IoT) is a revolutionary paragon that brings automation and easiness to human lives and improves their experience. Smart Homes, Healthcare, and Agriculture are some of their amazing use cases. These IoT applications often employ Machine Learning (ML) techniques to strengthen their functionality. ML can be used to analyze sensor data for various, including optimizing energy usage in smart homes, predicting maintenance needs in industrial equipment, personalized user experiences in wearable devices, and detecting anomalies for security monitoring. However, implementing centralized ML techniques is not viable because of the high cost of computing power and privacy issues since so much data is stored over a cloud server. To safeguard data privacy, Federated Learning (FL) has become a new paragon for centralized ML methods where FL,an ML variation sends a model to the user devices without the need to give private data to the third-party or central server, it is one of the promising solutions to address data leakage concerns. By saving raw data to the client itself and transferring only model updates or parameters to the central server, FL helps to reduce privacy leakage. However, it is still not attack-resistant. Blockchain offers a solution to protect FL-enabled IoT networks using smart contracts and consensus mechanisms. This manuscript reviews IoT applications and challenges, discusses FL techniques that can be used to train IoT networks while ensuring privacy, and analyzes existing work. To ensure the security and privacy of IoT applications, an integrated Blockchain-powered FL-based framework was introduced and studies existing research were done using these three powerful paradigms. Finally, the research challenges faced by the integrated platform are explored for future scope, along with the potential applications of IoT in conjunction with other cutting-edge technologies.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; Internet-of-Things; Security; Federated learning; Decentralization

【发表时间】2024

【收录时间】2024-10-20

【文献类型】 综述

【DOI】 10.1016/j.cosrev.2024.100685

CARROT: Simultaneous prediction of anomalies from groups of correlated cryptocurrency trends

【Author】 Pellicani, Antonio Pio, Gianvito Ceci, Michelangelo

CCF-C

【影响因子】8.665

【主题类别】

区块链治理-市场治理-价格预测

【Abstract】Cryptocurrencies are virtual currencies that exploit cryptography to perform secure financial transactions. They gained widespread popularity in recent years due to their decentralized nature, (pseudo-)anonymity, and ability to facilitate cross-border transactions without the need for intermediaries. However, their price on the market exhibits a huge volatility, that makes them prone to market anomalies. Therefore, predicting anomalies in cryptocurrency time series can be considered an important task for financial institutions, traders, and investors, to maximize their profit or minimize losses. In this paper, we propose a novel approach for predicting anomalies in cryptocurrency time series by exploiting temporal correlations among different cryptocurrencies. Our approach, called CARROT, is based on the idea that groups of cryptocurrencies exhibit similar trends, possibly due to common influencing factors. CARROT analyzes the temporal correlation between different cryptocurrencies, and identifies clusters showing similar patterns that can be useful for gaining insights into future anomalies. Subsequently, CARROT exploits multiple (i.e., one for each cluster) multi-target LSTM models to predict anomalies. Our experiments, performed on a dataset of 17 cryptocurrencies, proved that CARROT outperforms single- target LSTM models of up to 20%, as well as other approaches based on neural networks, i.e., MLP and CNN, in terms of macro F1-score. Therefore, the proposed approach can be considered as a promising tool for predicting anomalies in cryptocurrency time series data and can potentially be used to improve risk management and trading strategies in the cryptocurrency market.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Anomaly prediction; Temporal clustering; Long short-term memory; Cryptocurrencies

【发表时间】2025

【收录时间】2024-10-20

【文献类型】 实证数据

【DOI】 10.1016/j.eswa.2024.125457

The power of electronic Word of Mouth in inducing adoption of emerging technologies

【Author】 Mladenovic, Dusan Bruni, Roberto Filieri, Raffaele Ismagilova, Elvira Kalia, Prateek Jirasek, Michal

【影响因子】6.879

【主题类别】

区块链应用-实体经济-支付领域

【Abstract】This study examines the influence of electronic Word-of-Mouth (eWOM) on consumer expectations and intentions to adopt emerging technologies, specifically focusing on cryptocurrency payment methods. Employing the Elaboration Likelihood Model (ELM), the research utilizes Partial Least Squares Structural Equation Modeling (PLS-SEM) and Multi-Group Analysis (PLS-MGA) to analyze data from a diverse sample of 505 respondents sourced from MTurk. The findings reveal that the quality, consistency, and volume of eWOM significantly shape consumer expectations. Notably, the two-sidedness of online reviews does not have any substantial impact on both expectations and adoption behaviors toward cryptocurrency payment methods. Furthermore, factors such as the time spent online, and the frequency of online shopping were found to partially moderate the effects of eWOM on adoption behavior. This research contributes pioneering insights into the role of eWOM in influencing consumer attitudes towards cutting-edge technologies, extending existing knowledge beyond traditional consumer decisions to include technological adoption, particularly in digital finance. This offers valuable implications for technology firms and digital marketers aiming to harness eWOM to promote new technological solutions.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】eWOM; cryptocurrency adoption; Elaboration likelihood model; Argument quality; Review volume; Review consistency

【发表时间】2024

【收录时间】2024-10-20

【文献类型】 实证数据

【DOI】 10.1016/j.techsoc.2024.102724

Federated learning: A cutting-edge survey of the latest advancements and applications

【Author】 Akhtarshenas, Azim Vahedifar, Mohammad Ali Ayoobi, Navid Maham, Behrouz Alizadeh, Tohid Ebrahimi, Sina Lopez-Perez, David

CCF-C

【影响因子】5.047

【主题类别】

区块链技术-协同技术-联邦学习

【Abstract】Robust machine learning (ML) models can be developed by leveraging large volumes of data and distributing the computational tasks across numerous devices or servers. Federated learning (FL) is a technique in the realm of ML that facilitates this goal by utilizing cloud infrastructure to enable collaborative model training among a network of decentralized devices. Beyond distributing the computational load, FL targets the resolution of privacy issues and the reduction of communication costs simultaneously. To protect user privacy, FL requires users to send model updates rather than transmitting large quantities of raw and potentially confidential data. Specifically, individuals train ML models locally using their own data and then upload the results in the form of weights and gradients to the cloud for aggregation into the global model. This strategy is also advantageous in environments with limited bandwidth or high communication costs, as it prevents the transmission of large data volumes. With the increasing volume of data and rising privacy concerns, alongside the emergence of large-scale ML models like Large Language Models (LLMs), FL presents itself as a timely and relevant solution. It is therefore essential to review current FL algorithms to guide future research that meets the rapidly evolving ML demands. This survey provides a comprehensive analysis and comparison of the most recent FL algorithms, evaluating them on various fronts including mathematical frameworks, privacy protection, resource allocation, and applications. Beyond summarizing existing FL methods, this survey identifies potential gaps, open areas, and future challenges based on the performance reports and algorithms used in recent studies. This survey enables researchers to readily identify existing limitations in the FL field for further exploration.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Artificial intelligence; 6G; Machine learning; Federated learning; Deep reinforcement learning; Neural network; Internet of things; Edge computing; Block-chain; Privacy preserving; Resource allocation

【发表时间】2024

【收录时间】2024-10-20

【文献类型】 理论模型

【DOI】 10.1016/j.comcom.2024.107964

Good vs. bad volatility in major cryptocurrencies: The dichotomy and drivers of connectedness

【Author】 Sila, Jan Kocenda, Evzen Kristoufek, Ladislav Kukacka, Jiri

【影响因子】4.217

【主题类别】

区块链治理-市场治理-数字货币

【Abstract】Cryptocurrencies exhibit unique statistical and dynamic properties compared to those of traditional financial assets, making the study of their volatility crucial for portfolio managers and traders. We investigate the volatility connectedness dynamics of a representative set of eight major crypto assets. Methodologically, we decompose the measured volatility into positive and negative components and employ the time-varying parameters vector autoregression (TVP-VAR) framework to show distinct dynamics associated with market booms and downturns. Our findings indicate that crypto connectedness reflects important events and oscillates substantially while reaching lower limit values when compared to traditional financial markets. Periods of extremely high or low connectedness are clearly linked to specific events in the crypto market and macroeconomic or monetary history. Furthermore, existing asymmetry from good and bad volatility indicates that market downturns spill over substantially faster than comparable market surges. Overall, the connectedness dynamics are driven by a combination of both crypto (momentum, on-chain activity, off-chain activity) and legacy financial and economic (financial and economic uncertainty, and financial market performance) factors, while the asymmetry is more connected to the off-chain crypto activity and the combination of economic, financial, and monetary factors. In both the total connectedness and asymmetry modeling, these can serve as hands-on indicators to be further translated into specific portfolio re-balancing decisions, risk management, and regulatory frameworks.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Volatility; Dynamic connectedness; Asymmetric effects; Cryptocurrency

【发表时间】2024

【收录时间】2024-10-20

【文献类型】 实证数据

【DOI】 10.1016/j.intfin.2024.102062

A bibliometric survey on impact of Blockchain in Robotics: Trends and Applications

【Author】 Sharma, Shreyansh Dubey, Richa Chaudhury, Santanu

【影响因子】4.152

【主题类别】

区块链治理-市场治理-技术采用

【Abstract】Integrating blockchain technology within robotic systems holds great potential for substantial breakthroughs, not only in industrial environments but in several avenues such as agriculture, healthcare, supply chain, and so on, which require increased levels of autonomy and security. This bibliometric survey comprehensively examines the evolution and interplay between blockchain technology and robotics. Addressing the inception of this domain, the study analyses research trends, publication shifts, influential academic articles, authors, countries, and so on. The influence of emerging themes, such as Industry 4.0, Artificial intelligence, and the Internet of Things, are also explored, elucidating their impact on the research trajectory. Utilizing bibliometric techniques, the review offers insights into the current state of blockchain applications in robotic systems and suggests potential future directions warranting in-depth exploration. For a holistic overview covering both literature and technological advancements, we also present patent landscaping on blockchain in robotics, bridging the gap between theoretical results and real-world applications. To the best of our knowledge, this is the first work to present the bibliometric approach of reviewing the literature and patents for blockchain in robotics, precisely via bibliometric techniques such as keyword co-occurrence network, co-citation network, thematic evolution, and Sankey graph.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; Robotics; Artificial intelligence; Internet of Things; Industry 4.0

【发表时间】2024

【收录时间】2024-10-20

【文献类型】 实证数据

【DOI】 10.1016/j.compeleceng.2024.109744

A privacy-preserving traceability system for self-sovereign identity-based inter-organizational business processes

【Author】 Abid, Amal Cheikhrouhou, Saoussen Kallel, Slim Jmaiel, Mohamed

【影响因子】3.721

【主题类别】

区块链技术-协同技术-隐私保护

【Abstract】Blockchain is a potential technology for collaborating organizations, notably for executing their Inter- Organizational Business Processes (IOBPs). While Blockchain's transparency and decentralized characteristics address the lack-of-trust issue in IOBPs, many existing Blockchain solutions share this data on the ledger, often at the expense of serious privacy concerns. Alternatively, Self-Sovereign Identity (SSI) systems are revolutionary Blockchain-based solutions that provide complete data control. Unlike traditional Blockchain solutions, many SSI systems do not record the exchange of transactional data between entities on the ledger in order to comply with privacy regulations. However, this can imply a gap in cases where legal traceability is required for audit purposes. To address traceability issues in SSI-based IOBP, this paper leverages Zero-Knowledge Proof (ZKP) and Fully Homomorphic Encryption (FHE) to provide an efficient privacy-preserving traceability solution. The purpose of this paper is to achieve traceability that strikes a balance between privacy and transparency. This paper also provides a proof-of-concept implementation and a comparative evaluation. The evaluation shows that the proposed ZKP approach provides better financial cost and performance results compared to traditional Blockchain-based traceability solutions.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; Fully Homomorphic Encryption; Inter-organizational business process; Privacy; Self-sovereign identity; Traceability; Zero-Knowledge Proof

【发表时间】2025

【收录时间】2024-10-20

【文献类型】 理论模型

【DOI】 10.1016/j.csi.2024.103930

FunFuzz: A Function-Oriented Fuzzer for Smart Contract Vulnerability Detection with High Effectiveness and Efficiency

【Author】 Ye, Mingxi Nan, Yuhong Dai, Hong-Ning Yang, Shuo luo, Xiapu Zheng, Zibin

CCF-A

【影响因子】3.685

【主题类别】

区块链技术-核心技术-智能合约

区块链治理-技术治理-智能合约

【Abstract】With the increasing popularity of Decentralized Applications (DApps) in blockchain, securing smart contracts has been a long-term, high-priority subject in the domain. Among the various research directions for vulnerability detection, fuzzing has received extensive attention because of its high effectiveness. However, with the increasing complexity of smart contracts, existing fuzzers may waste substantial time exploring locations irrelevant to smart contract vulnerabilities. In this article, we present FunFuzz, a function-oriented fuzzer, which is dedicatedly tailored for detecting smart contract vulnerability with high effectiveness and efficiency. The key observation in our research is that most smart contract vulnerabilities exist in specific functions rather than randomly distributed in all program code like other traditional software. To this end, unlike traditional fuzzers which mainly target code coverage, FunFuzz identifies risky functions while pruning non-risky ones in smart contracts. In this way, it significantly narrows down the exploration scope during the fuzzing process. In addition, FunFuzz employs three unique strategies to direct itself toward effectively discovering vulnerabilities specific to smart contracts (e.g., reentrancy, block dependency, and gasless send). Extensive experiments on 170 real-world contracts demonstrate that FunFuzz outperforms state-of-the-art fuzzers in terms of effectiveness and efficiency.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Fuzz testing; smart contract; blockchain; vulnerability detection

【发表时间】2024

【收录时间】2024-10-20

【文献类型】 理论模型

【DOI】 10.1145/3674725

Investigation and Modelling of Barriers in Adoption of Blockchain Technology for Accounting and Finance: An ISM Approach

【Author】 Chavali, Kavita Kumar, V. V. Ajith Mavuri, Sudha Tiwari, Chandan Kumar Pal, Abhinav

【影响因子】3.474

【主题类别】

区块链应用-实体经济-财会领域

【Abstract】Blockchain technology has attracted considerable attention from both academicians and industry players in different industries, such as accounting and finance, because of its transformative potential of re-engineering the process of operation and enhancing the level of required transparency in these industries. However, despite the various possibilities of transforming the accounting and finance sectors, there are still numerous challenges that hinder the further development of blockchain technology in the domain. The various obstacles to the adoption of blockchain in accounting and finance are interconnected and include a diverse set of issues related to technology, organization, regulations, and knowledge. To overcome these obstacles, it is necessary to take a comprehensive approach that includes improving technical proficiency, encouraging cooperation among stakeholders, negotiating intricate regulations, and cultivating a culture of innovation and adaptation within enterprises.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; Blockchain Technology; Accounting; Finance; ISM; Interpretative Structural Modelling; Blockchain Adoption Barriers

【发表时间】2024

【收录时间】2024-10-20

【文献类型】 理论模型

【DOI】 10.4018/JGIM.353960

Dynamic spillover between green cryptocurrencies and stocks: A portfolio implication

【Author】 Yousaf, Imran Cui, Jinxin Ali, Shoaib

【影响因子】3.399

【主题类别】

区块链治理-市场治理-数字货币

区块链治理-市场治理-投资风险

【Abstract】Using the novel TVP-VAR connectedness approach, we investigate the spillovers of return and volatility as well as the portfolio diversifications between green cryptocurrencies and green stocks. The empirical findings demonstrate that there are considerable return and volatility spillovers across green cryptocurrencies and stocks. Stock indices such as Alternative Energy, Sustainable World Index, and Pollution Prevention act as net transmitters whereas Green Building stock and green cryptocurrencies act as net recipients of return and volatility spillovers. Sustainable World Index and Pollution Prevention stocks spread relatively stronger net spillovers to other green stocks and cryptocurrencies. The overall spillover effects and hedging costs become higher during the COVID-19 pandemic and the Russia-Ukraine war. Utilizing green cryptocurrencies like Cardano and Stellar Lumens as hedges for green stocks can provide superior risk reduction effectiveness. Our findings can offer practical implications for investors, portfolio managers, and regulators in developing their optimal investment and risk management strategies.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Green cryptocurrencies; Green stocks; TVP-VAR connectedness; Return and volatility spillovers; Hedging effectiveness

【发表时间】2024

【收录时间】2024-10-20

【文献类型】 实证数据

【DOI】 10.1016/j.iref.2024.103661

Multiscale tail risk integration between safe-haven assets and Africa's emerging equity market

【Author】 Amponsah, Dan Owusu Abdullah, Mohammad Abakah, Emmanuel Joel Aikins Abor, Joshua Yindenaba Lee, Chi-Chuan

【影响因子】3.136

【主题类别】

区块链治理-市场治理-市场分析

【Abstract】This study examines the multiscale tail risk integration between safe-haven assets and top equity markets in Africa (South Africa, Kenya, Egypt, Ghana, Nigeria, Botswana, Zambia, and Morocco) as well as portfolio implications. We further investigate the role of global economic factors in these relationships by employing Conditional Autoregressive Value at Risk and Complete Ensemble Empirical Mode Decomposition with Adaptive Noise-based TVP-VAR with data spanning from January 2010 to September 2024. Our findings show that while the equity market in South Africa is a net transmitter of tail risk spillovers, the rest of the equity markets are net receivers. They also reveal that while gold and silver transmit significant shocks to the other assets, Bitcoin receives considerable shocks from the other assets. We conclude that global economic factors and spillovers from safe-haven assets significantly affect the tail risk exposures of Africa's equity markets. Our findings have significant implications for investment decision-making.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Multiscale tail risk; Safe-haven assets; Africa; Stock market; Connectedness; Portfolio

【发表时间】2025

【收录时间】2024-10-20

【文献类型】 实证数据

【DOI】 10.1016/j.najef.2024.102294

The Blockchain Trilemma: An Evaluation Framework

【Author】 Quattrocchi, Giovanni Scaramuzza, Filippo Tamburri, Damian A.

【影响因子】3.000

【主题类别】

区块链治理-技术治理-主题识别

区块链治理-技术治理-其他

【Abstract】We present a validated framework for the evaluation and comparison of three main third-generation blockchain categories, based on the three main nonfunctional aspects that discriminate their use for the design and orchestration of complex blockchain-oriented service applications, namely: scalability, decentralization, and security.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchains; Scalability; Security; Computer architecture; Smart contracts; Throughput; Telecommunication traffic

【发表时间】2024

【收录时间】2024-10-20

【文献类型】 理论模型

【DOI】 10.1109/MS.2024.3417341

AI-FEED: Prototyping an AI-Powered Platform for the Food Charity Ecosystem

【Author】 Sammer, Marcus Seong, Kijin Olvera, Norma Gronseth, Susie L. Anderson-Fletcher, Elizabeth Jiao, Junfeng Reese, Alison Kakadiaris, Ioannis A.

【影响因子】2.259

【主题类别】

区块链应用-实体经济-慈善领域

【Abstract】This paper presents the development and functionalities of the AI-FEED web-based platform (ai-feed.ai), designed to address food and nutrition insecurity challenges within the food charity ecosystem. AI-FEED leverages advancements in artificial intelligence (AI) and blockchain technology to facilitate improved access to nutritious food and efficient resource allocation, aiming to reduce food waste and bolster community health. The initial phase involved comprehensive interviews with various stakeholders to gather insights into the ecosystem's unique challenges and requirements. This informed the design of four distinct modules in the AI-FEED platform, each targeting the needs of one of four stakeholder groups (food charities, donors, clients, and community leaders). Prototyping and iterative feedback processes were integral to refining these modules. The food charity module assists charities in generating educational content and predicting client needs through AI-driven tools. Based on blockchain technology, the food donor module streamlines donation processes, enhances donor engagement, and provides donor recognition. The client module provides real-time information on food charity services and offers a centralized repository for nutritional information. The platform includes a comprehensive mapping and proposal system for community leaders to strategically address local food insecurity issues. AI-FEED's integrated platform approach allows data sharing across modules, enhancing overall functionality and impact. The paper also discusses ethical considerations, potential biases in AI systems, and the transformation of AI-FEED from a research project to a sustainable entity. The AI-FEED platform exemplifies the potential of interdisciplinary collaboration and technological innovation in addressing societal challenges, particularly in improving food security and community health.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Healthy food access; AI solutions for food charities; Food charity ecosystem; Non-profit blockchain application

【发表时间】2024

【收录时间】2024-10-20

【文献类型】 理论模型

【DOI】 10.1007/s44196-024-00656-9

在线标注

备案号: 苏ICP备17025947号-5

评论回复