• 首页
  • 每日更新
  • 文献
  • 会议文献
  • 政策法规
  • 研究专题
  • 区块链游戏
logo 区块链前沿
  • 区块链前沿
  • 首页
  • 每日更新
  • 文献
  • 会议文献
  • 政策法规
  • 研究专题
  • 区块链游戏
  • 文章创新角色
  • 科研创新指数
  • 区块链领域本体
  • 热点主题挖掘
  • 主题展示
  • 专利文献
  • 排行榜
  • DAO治理
  • 文献上传
  • 积分获取规则
  • 大语言模型解析
  • 期刊发文分布
注册 登录

2024年11月06日 12篇

文献来源

  • 12

主题分类

      • 1
      • 1
      • 1
      • 1
      • 1
      • 1
      • 1
      • 1
      • 1
      • 1
      • 1
      • 1
      • 1

文献类型

  • 4
  • 4
  • 3
  • 1
筛选
订阅
<< 前一天 后一天 >>

Synthesizing complexity: Trends, challenges, and future directions in fuzzy-based multicriteria decision-making (FMCDM) methods

【Author】 Shahmohammad, Farshad Nezhad Pourrahimian, Yashar Akbari-Gharalari, Naeimeh

【影响因子】8.263

【主题类别】

区块链应用-实体经济-研究方法

【Abstract】This paper explores the significance of fuzzy-based multicriteria decision-making (FMCDM) methods in addressing intricate decision-making (DM) scenarios. In response to the increasing demand for effective DM processes amidst uncertainty, this study investigates trends, challenges, and future directions in FMCDM from 2021-2023. Traditional methods often struggle with the complexity and uncertainty of real-world issues. Conversely, FMCDM methods, which incorporate fuzzy logic (FL), provide an innovative solution by addressing ambiguity and imprecision, thus improving DM clarity and effectiveness. This paper emphasizes the practical applications of FMCDM across various fields, highlighting its ability to enhance decision quality amid complexity and uncertainty. FMCDM methods are categorized into standalone fuzzy methods (SFMs) and nonstandalone fuzzy methods (NSFMs). SFMs independently offer robust solutions, whereas NSFMs combine FL with other techniques to address intricate decision problems. Despite their increasing prominence, challenges such as computational complexity and the need for greater scalability remain. Integrating advanced technologies such as artificial intelligence, machine learning, blockchain, and big data analytics holds promise for further improving FMCDM performance. By offering insights into implementation and addressing challenges, this review provides decision-makers (DMRs) with the necessary tools to confidently and clearly navigate modern complexities. In the future, this study suggests future directions, including the incorporation of evolving expert opinions and comprehensive comparative analyses. These findings contribute to the continuous improvement of FMCDM methodologies, promoting informed DM in a rapidly changing world.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】(FMCDM); Standalone fuzzy methods (SFMs); Standalone fuzzy methods (NSFM); Evolutionary computing in decision-making; (MADM)

【发表时间】2024

【收录时间】2024-11-06

【文献类型】 综述

【DOI】 10.1016/j.asoc.2024.112362

LGTDA: Bandwidth exhaustion attack on Ethereum via dust transactions

【Author】 Sun, Qunhong Wang, Chang Hu, Yifan Su, Shen Cui, Ting

【影响因子】7.307

【主题类别】

区块链应用-实体经济-攻击检测

【Abstract】Dust attacks typically involve sending a large number of low-value transactions to numerous addresses, aiming to facilitate transaction tracking and undermine privacy, while simultaneously disrupting the market and increasing transaction delays. These transactions not only impact the network but also incur significant costs. This paper introduces a low-cost attack method called LGTDA, which achieves network partitioning through dust attacks. This method hinders block synchronization by consuming node bandwidth, leading to denial of service (DoS) for nodes and eventually causing large-scale network partitioning. In LGTDA, the attacker does not need to have real control over the nodes in the network, nor is there a requirement for the number of peer connections to the nodes; the attack can even be initiated by simply invoking RPC services to send transactions. Under the condition of ensuring the validity of the attack transactions, the LGTDA attack sends a large volume of low-value, high-frequency dust transactions to the network, relying on nodes for global broadcasting. This sustained attack can significantly impede the growth of block heights among nodes, resulting in network partitioning. We discuss the implications of the LGTDA attack, including its destructive capability, low cost, and ease of execution. Additionally, we analyze the limitations of this attack. Compared to grid lighting attacks, the LGTDA attack has a broader impact range and is not limited by the positional relationship with the victim node. Through experimental validation in a controlled environment, we confirm the effectiveness of this attack.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; Network attack; Memory pool; Dust attack

【发表时间】2025

【收录时间】2024-11-06

【文献类型】 实验仿真

【DOI】 10.1016/j.future.2024.107549

Performance analysis and evaluation of postquantum secure blockchained federated learning

【Author】 Gurung, Dev Pokhrel, Shiva Raj Li, Gang

CCF-B

【影响因子】5.493

【主题类别】

区块链技术-协同技术-联邦学习

【Abstract】As the field of quantum computing progresses, traditional cryptographic algorithms such as RSA and ECDSA are becoming increasingly vulnerable to quantum-based attacks, underscoring the need for robust post-quantum security in critical systems like Federated Learning (FL) and Blockchain. In light of this, we propose a novel hybrid approach for blockchain-based FL (BFL) that integrates a stateless signature scheme, such as Dilithium or Falcon, with a stateful hash-based scheme like XMSS. This combination leverages the complementary strengths of both schemes to provide enhanced security. To further optimize performance, we introduce a linear formula- based device role selection method that takes into account key factors such as computational power and stake accumulation. This selection process is reinforced by a verifiable random function (VRF), which strengthens the blockchain consensus mechanism. Our extensive experimental results demonstrate that this hybrid approach significantly enhances both the security and efficiency of BFL systems, establishing a robust framework for the integration of post-quantum cryptography as we transition into the quantum computing era.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Post quantum cryptography (PQC); Federated learning (FL); Blockchain; Distributed systems

【发表时间】2024

【收录时间】2024-11-06

【文献类型】 实验仿真

【DOI】 10.1016/j.comnet.2024.110849

An efficient Proof-of-Authority consensus scheme against cloning attacks

【Author】 Lu, Shu-Ping Lei, Chin-Laung Tsai, Meng-Han

CCF-C

【影响因子】5.047

【主题类别】

区块链技术-协同技术-共识机制

【Abstract】Proof-of-Authorization (PoA) consensus algorithms are widely used in permissioned blockchain networks due to their high throughput, security, and efficiency. However, PoA is susceptible to cloning attacks, where attackers copy the authenticator identity and key, thereby compromising the consensus integrity. This study proposes a novel randomized authenticator within the PoA framework to mitigate cloning attacks and solve the leader selection bottleneck. The main contributions include 1) Introducing unpredictability in leader selection through Verifiable Random Functions (VRFs) to prevent identity duplication.2) Dynamic group management using a hierarchical decentralized architecture of distributed ledgers that balances security and performance.3) Using threshold signatures to avoid a single point of failure among validators.4) Comprehensively analyzing attacks, security, randomness, and availability.5) Evaluating the effectiveness of a randomized authenticator by means of OMNET++ simulations to assess efficiency. By integrating randomness into leader selection and robust consensus design, the approach enables reliable and secure dynamic group management in decentralized networks.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Distributed ledger technology; Proof of authority; Consensus; Cloning attack; Network security; Cryptography

【发表时间】2024

【收录时间】2024-11-06

【文献类型】 实验仿真

【DOI】 10.1016/j.comcom.2024.107975

Exploring the Integration of Industry 4.0 Technologies in Agriculture: A Comprehensive Bibliometric Review

【Author】 Fasciolo, Benedetta Panza, Luigi Lombardi, Franco

【影响因子】3.889

【主题类别】

区块链应用-实体经济-农业领域

【Abstract】While it is essential to increase agricultural production to meet the needs of a growing global population, this task is becoming increasingly difficult due to the environmental challenges faced in recent decades. A promising solution to enhance the efficiency and sustainability of agricultural production is the integration of Industry 4.0 technologies, such as IoT, UAVs, AI, and Blockchain. However, despite their potential, there is a lack of comprehensive bibliometric analyses that cover the full range of these technologies in agriculture. This gap limits understanding of their integration and impact. This study aims to provide a holistic bibliometric analysis of the integration of Industry 4.0 technologies in agriculture, identifying key research trends and gaps. We analyzed relevant literature using the Scopus database and VOSviewer software (version 1.6.20, Centre for Science and Technology Studies, Leiden University, The Netherlands)and identified five major thematic clusters within Agriculture 4.0. These clusters were examined to understand the included technologies and their roles in promoting sustainable agricultural practices. The study also identified unexplored technologies that present opportunities for future research. This paper offers a comprehensive overview of the current research landscape in Agriculture 4.0, highlighting areas for innovation and development, and serves as a valuable resource for enhancing sustainable agricultural practices through technological integration.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】agriculture; industry 4.0; IoT; robotics; blockchain; digital twin; machine learning

【发表时间】2024

【收录时间】2024-11-06

【文献类型】 综述

【DOI】 10.3390/su16208948

AI Leads, Cybersecurity Follows: Unveiling Research Priorities in Sustainable Development Goal-Relevant Technologies across Nations

【Author】 Bran, Emanuela Rughinis, Razvan Turcanu, Dinu Radovici, Alexandru

【影响因子】3.889

【主题类别】

区块链应用-实体经济-可持续发展领域

【Abstract】This study presents a global analysis of research priorities for technologies relevant to Sustainable Development Goals (SDGs). We examine 18 technological domains across countries, introducing a novel within-country rank metric to normalize differences in research output. Using a combination of linear regression and K-means cluster analysis, we identify factors influencing overall productivity and reveal distinct patterns in research priorities among nations. Our analysis of Web of Science total publication data yields five country clusters with specific technological focus areas: Eco-Tech Innovators, Cyber-Digital Architects, Bio-Industrial Pioneers, Geo-Data Security Analysts, and Cyber-Sustainable Integrators. We find that while economic indicators strongly predict overall research productivity, countries with similar economic profiles often exhibit divergent research priorities. Artificial Intelligence emerges as a top priority across all clusters, while areas such as blockchain and digital twins show lower prioritization despite their theoretical importance. Our findings reveal unexpected similarities in research focus among geopolitically diverse countries and highlight regional patterns in technological emphasis. This study offers valuable information for policymakers and researchers, enhancing our understanding of the global landscape of SDG-relevant technological research and potential avenues for international collaboration.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Sustainable Development Goals; artificial intelligence; cybersecurity; augmented human development index; regression analysis; cluster analysis

【发表时间】2024

【收录时间】2024-11-06

【文献类型】 综述

【DOI】 10.3390/su16208886

Blockchain-Based Digital Asset Circulation: A Survey and Future Challenges

【Author】 Zhu, Konglin Wu, Fengjuan Wang, Fei Shen, Tingda Wu, Hao Xue, Bowei Liu, Yu

【影响因子】2.940

【主题类别】

区块链应用-虚拟经济-去中心化治理

【Abstract】The circulation of digital assets has become increasingly crucial in today's digital economy, reflecting both its growing importance and the challenges it faces. Blockchain technology, with its inherent symmetry, has emerged as a transformative force in facilitating digital asset circulation, addressing various issues related to security, efficiency, and transparency. This paper aims to advance the development of digital asset circulation technologies by focusing on four key blockchain-based technologies: smart contracts, consensus algorithms, cross-chain technology, and decentralized exchanges. These technologies embody symmetry in their structure and operation, ensuring balanced and secure asset management across decentralized networks. This paper reviews the evolution of these key technologies, highlighting their contributions to the digital asset ecosystem. It explores effective application cases and analyzes the current challenges each technology faces. Additionally, this paper provides insights into potential future developments and directions to address these challenges and enhance the overall efficiency and reliability of digital asset circulation.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】digital asset circulation; smart contact; consensus protocol; cross-chain; privacy protection; decentralized exchange; blockchain

【发表时间】2024

【收录时间】2024-11-06

【文献类型】 综述

【DOI】 10.3390/sym16101287

BiometricIdentity dApp: Decentralized biometric authentication based on fuzzy commitment and blockchain

【Author】 Alzahab, Nibras Abo Rafaiani, Giulia Battaglioni, Massimo Cavalli, Ana Chiaraluce, Franco Baldi, Marco

【影响因子】2.868

【主题类别】

区块链应用-实体经济-身份验证

【Abstract】As biometric authentication has been increasingly integrated into cutting-edge technology, it is interesting to study how its level of trust and interoperability across multiple devices can be increased. They can actually be enhanced through decentralization, particularly by using blockchain technology. Since transaction data on the blockchain are open and readable by all parties, a high level of user trust is achieved, enhancing transparency and interoperability across the network. The software we propose bridges the gap between the security of biometric information and the transparency of blockchain and decentralized technologies. Specifically, the software is a decentralized application (dApp), based on the Ethereum blockchain, which relies on a smart contract to manage its logic. The logic of the smart contract employs the fuzzy commitment scheme (FCS) to securely hash biometric templates, while always maintaining fault tolerance thanks to error correction codes (ECC). This mechanism ensures data integrity within a transparent, decentralized framework. The proposed dApp enhances biometric authentication by supporting both the enrollment and authentication processes. Its smart contract enables managing access control within this decentralized infrastructure. In practical applications, the proposed system can demonstrate its potential as a secure and decentralized alternative to traditional centralized systems.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Biometrics; Blockchain; Decentralized authentication; Decentralized application; Fuzzy commitment scheme

【发表时间】2024

【收录时间】2024-11-06

【文献类型】 理论模型

【DOI】 10.1016/j.softx.2024.101932

Consensus algorithm for maintaining large-scale access-control views of education data

【Author】 Wu, Xianglin Meng, Tianhao Zhang, Jingwei Yang, Qing Chen, Jintao

【影响因子】2.557

【主题类别】

区块链应用-实体经济-教育领域

【Abstract】Exploring diverse education data applications through blockchain technology can offer innovative methods for smart education. Among them, storing multi-platform and multi-dimensional education data on the blockchain can enhance the system's ability to integrate and manage the data effectively. However, the system involves a large number of stakeholders. Furthermore, because the data are stored chronologically, relevant information may be distributed across multiple blocks. They will lead to security issues related to access and inefficient queries. We innovatively design an education data management system that combines access-control views with a consensus algorithm, effectively addressing the issue of low query performance for security data. Additionally, we propose a method that integrates main chain blocks and side blocks within a chained storage structure to recycle view blocks, effectively addressing the issue of block redundancy caused by non-periodic changes in the utilization of education data. For the proposed method, experiments are conducted on two education datasets to validate the efficiency of the proposed access-control view in query performance and the effectiveness of the view maintenance consensus algorithm.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; Education data; Consensus algorithm; Access-control view; Side block

【发表时间】2025

【收录时间】2024-11-06

【文献类型】 实验仿真

【DOI】 10.1007/s11227-024-06625-5

Novel mechanism for anonymous reporting and anonymous rewarding using blockchain technology

【Author】 Patil, Shriniwas Parmar, Keyur

【影响因子】2.427

【主题类别】

区块链应用-实体经济-犯罪领域

【Abstract】A person can report a crime anonymously. However, without sufficient motivation, individuals are reluctant to report the crime. To encourage individuals who can provide evidence of a crime, reporting a crime is closely associated with the rewarding mechanism. Anonymous crime reporting is not a challenging issue. We can use a conventional security mechanism to protect individuals' identities. However, it becomes a challenging issue when the objective is to ensure anonymous crime reporting and anonymous rewarding. With the help of a trusted third-party, such as a security agency, conventional mechanisms collect crime-related evidence and reward whistleblowers. However, a trusted third-party may disclose the whistleblower's identity and become an insider adversary. Therefore, to collect evidence related to a crime and reward anonymous whistleblowers for their services, we need a mechanism that eliminates the requirement of a trusted third-party. In this article, we propose a mechanism for anonymous reporting and anonymous rewarding (ARAR) using blockchain technology. We use the public blockchain to timestamp the collected evidence securely and reward the individuals who first submit the evidence. We evaluated the security strength of the proposed mechanism in the presence of active insider and outsider adversaries. The proposed mechanism is significantly reliable in identifying the order in which the evidence of a crime is reported by individuals and associating individuals with their reported information without revealing their identities. Finally, we analyze the efficiency of the proposed mechanism and provide a prototype implementation. Security and performance analysis shows that the proposed mechanism is secure, privacy-preserving, feasible, and efficient.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Anonymity; Security; Reporting and Rewarding; Blockchain; Smart contract

【发表时间】2025

【收录时间】2024-11-06

【文献类型】 理论模型

【DOI】 10.1007/s10207-024-00913-0

Securing supply chain through blockchain-integrated algorithmic system: ensuring product quality and counterfeiting tags detection

【Author】 Jahani, Meysam Raji, Fatemeh Zojaji, Zahra

【影响因子】2.303

【主题类别】

区块链应用-实体经济-供应链

【Abstract】Poor-quality products and counterfeit tags within the supply chains pose major challenges. Although several approaches have been suggested, they do not address all the challenges. This paper proposes a blockchain-integrated supply chain to tackle the poor-quality products and counterfeiting tags issues. In this way, the requirements for secure supply chain system are identified, and several algorithms are proposed. The reliable manufacturer selection algorithm improves product quality using participant opinions. Smart traceability algorithm monitors the product path using sensors, preventing the distribution of poor-quality products in the supply chain. Additionally, two counterfeit tag detection algorithms employ a weighted graph to simulate the shortest paths for product distribution to identify cloning, application, and modification attacks on the products tags. Detailed security, scalability, performance, and comparative analyses for the drug supply chain shows the proposed system successfully improves product quality and accurately detects counterfeit tags without a significant drop in performance.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Securing supply chain; Reliable manufacturers selection; Product quality; Counterfeit tags detection

【发表时间】2025

【收录时间】2024-11-06

【文献类型】 理论模型

【DOI】 10.1007/s10586-024-04764-1

Larger supply, shorter life? Exploring evidence from alternative cryptocurrencies on decentralized exchanges

【Author】 Hua, Xia Chang, Zhuoran Ye, Wenqiang

【影响因子】1.469

【主题类别】

区块链治理-市场治理-数字货币

区块链治理-市场治理-市场分析

【Abstract】Since the advent of Bitcoin, numerous alternative cryptocurrencies have surfaced. Despite their proliferation and increasing popularity, these alternatives often experience brief lifespans, contrasting with Bitcoin's enduring presence. Our analysis of more than 800 alternative cryptocurrencies traded on decentralized exchanges (Dex) has shown that cryptocurrencies with larger supplies generally demonstrate shorter lifespans. The findings remain robust across different definitions of the term "lifespan". We attribute this trend primarily to short-term speculation, stemming from the absence of intrinsic asset value. These findings hold significant implications for comprehending the risk and investor behavior associated with cryptocurrencies on decentralized exchanges.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Alternative cryptocurrencies; Decentralized exchanges; Credit risk; Investor speculation

【发表时间】2024

【收录时间】2024-11-06

【文献类型】 实证数据

【DOI】 10.1016/j.econlet.2024.112029

在线标注

备案号: 苏ICP备17025947号-5

评论回复