2024年11月09日 38篇
文献来源
- 33
- 5
主题分类
-
-
- 2
- 1
- 1
- 1
- 1
- 1
- 2
- 1
- 1
- 1
- 1
- 2
- 1
- 1
- 1
-
- 1
-
-
-
- 1
- 1
- 2
- 1
- 1
- 1
-
- 1
-
-
-
- 1
- 1
- 1
- 1
- 1
- 1
-
- 2
- 1
- 1
- 1
-
文献类型
- 34
- 2
- 1
- 1
【影响因子】17.564
【主题类别】
区块链应用-实体经济-车联网
【Abstract】The emerging proportion of renewable energy resources penetration and the rapid popularity of Electric Vehicles (EVs) have promoted the development of the Internet of Electric Vehicles (IoEV), which enables seamless EV' information collection and energy delivery by leveraging wireless power transfer. However, vulnerabilities in internet infrastructure and the self-interested behavior of EVs pose significant security and privacy risks during energy delivery in IoEV. In addition, EVs often lack the incentive to cooperate for regional energy balance. To tackle these questions, this paper proposes a blockchain-based privacy-preserving incentive mechanism for energy delivery in IoEV. Based on cryptographic technology, this paper introduces a group signature scheme with self-controlled and sequential linkability, which safeguards the privacy of EV users and ensures transaction records maintain exact sequence during energy delivery. Furthermore, an incentive mechanism based on co-utile reputation management is presented to encourage EV users to participate honestly and cooperatively in energy delivery. Moreover, a comprehensive security analysis of the proposed group signature scheme and incentive mechanism is given. Finally, extensive experimental results demonstrate the feasibility and efficiency of the proposed approach compared to existing schemes.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Cryptographic technology; Security & privacy; Group signature; Internet of electric vehicles; Co-utile reputation management
【发表时间】2025
【收录时间】2024-11-09
【文献类型】 案例研究
【Author】 Kim, Jungkeun Cho, Areum Lee, Daniel Chaein Park, Jooyoung Kim, Aekyoung Jhang, Jihoon Kim, Changju
【影响因子】10.972
【主题类别】
区块链应用-虚拟经济-NFT
【Abstract】Non-fungible tokens (NFTs) are increasingly used to safeguard luxury products from counterfeits. Despite their increasing adoption, limited research has investigated how brands should communicate the use of NFTs-a novel and complex concept for consumers to comprehend-to maximize their benefits. This research aims to examine this gap by highlighting that the ease of visualization is critical for effective communication. Study 1A demonstrated that consumers prefer a visualized NFT to a non-visualized one for authenticating a luxury product. Study 1B further demonstrated that consumers place greater trust in a visualized NFT and are willing to pay higher prices for luxury products that utilize it. Study 2 demonstrated that consumers have more favorable attitudes toward a luxury product that features an easy-to-visualize NFT than those with a difficult-to-visualize NFT and that perceived authenticity mediates this effect. Finally, Study 3 demonstrated that the positive impacts of easy-to-visualize NFT cues were more significant for luxury than non-luxury products. Subsequently, this study suggests an effective communication strategy for NFT use and provides managerial implications for luxury brands aiming to maximize the benefits of using NFTs.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Non-fungible tokens; Blockchain; Visual cues; Visualization; Authenticity; Luxury
【发表时间】2025
【收录时间】2024-11-09
【文献类型】 案例研究
【Author】 Gregory, Gadzinski Vito, Liuzzi
【影响因子】9.848
【主题类别】
区块链治理-技术治理-欺诈犯罪
【Abstract】Does the paradigm shift brought by Large Language Models (LLMs) hold the promise of revolutionizing financial analysis? Our article tackles this question by exploring fraud detection in cryptocurrency exchanges, with a focus on FTX. We study the abilities of generative artificial intelligence tools like ChatGPT to serve as early-warning systems of fraud and identify red flags in the particular and difficult case where no financial information is available. We recognize several challenges to provide insights beyond human knowledge. To achieve a higher degree of scrutiny, we highlight the role of sequential interactions between the AI Chatbot and the researcher as well as the inclusion of external contents, a technique known as Retrieval Augmented Generation (RAG). Therefore, this article serves as a cautionary tale on the necessary conditions to achieve augmented intelligence.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】LLMs; FTX; Fraud detection; RAG
【发表时间】2024
【收录时间】2024-11-09
【文献类型】 案例研究
【Author】 Gulistan, Muhammad Hongbin, Ying Pedrycz, Witold Rahim, Muhammad Amin, Fazli Khalifa, Hamiden Abd El-Wahed
【影响因子】9.588
【主题类别】
区块链治理-技术治理-区块链韧性
【Abstract】Using p, q, r- fractional fuzzy sets ( p, q, r- FFS) to demonstrate the stability of cryptocurrencies is considered due to the complex and volatile nature of cryptocurrency markets, where traditional models may fall short in capturing nuances and uncertainties. p, q, r- FFS provides a flexible framework for modeling cryptocurrency stability by accommodating imprecise data, multidimensional analysis of various market factors, and adaptability to the unique characteristics of the cryptocurrency space, potentially offering a more comprehensive understanding of the factors influencing stability. Existing studies have explored Picture Fuzzy Sets and Spherical Fuzzy Sets, built on membership, neutrality, and nonmembership grades. However, these sets can't reach the maximum value (equal to 1 ) due to grade constraints. For example, when considering P = ( h, < 0.9,0.8,1.0 >|h is an element of H ), these sets fall short. This is obvious when a decision-maker possesses complete confidence in an alternative, they have the option to assign a value of 1 as the assessment score for that alternative. This signifies that they harbor no doubts or uncertainties regarding the chosen option. To address this, p, q, r- Fractional Fuzzy Sets ( p, q, r- FFSs) are introduced, using new parameters p , q , and r . These parameters abide by p , q >= 1 and r as the least common multiple of p and q . We establish operational laws for p, q, r- FFSs. Based on these operational laws, we proposed a series of aggregation operators (AOs) to aggregate the information in context of p, q, r- fractional fuzzy numbers. Furthermore, we constructed a novel multi-criteria group decision-making (MCGDM) method to deal with real-world decision- making problems. A numerical example is provided to demonstrate the proposed approach.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Operational laws; Aggregation operators; Decision making; p,q,r-Fractional fuzzy sets; Operational laws; Aggregation operators; Decision making
【发表时间】2024
【收录时间】2024-11-09
【文献类型】 理论模型
【Author】 Zheng, Guhan Ni, Qiang Lu, Yang
CCF-B
【影响因子】9.551
【主题类别】
区块链应用-实体经济-汽车领域
【Abstract】Collaborative Intrusion Detection System (CIDS) is an essential technology that enables vehicular ad hoc networks (VANET) to protect against malicious intrusions. CIDS, however, is unable to prevent accidents if an anomalous vehicle is detected. Detecting anomalies and notifying vehicles in the VANET rapidly is thus essential, considering technical challenges such as communication efficiency, vehicle velocity and privacy. In this paper, we propose a novel two-layer privacy-aware trust evaluation CIDS framework, termed 2PT-CIDS, tailored to VANET. In 2PT-CIDS, vehicles and roadside units (RSUs) cooperate efficiently to enhance anomalous vehicle detection and notification. Considering its potential privacy leakage, we then present two types of game-theoretic information incentive mechanisms. In the case of traffic congestion, the privacy-aware incentive mechanism is presented based on the Stackelberg game. A Barycentric Lagrange interpolation (BLI) based algorithm is then proposed to speedy achieve the Nash equilibrium (NE). In the case of traffic smooth, the varying high velocities of vehicles are involved and a noncooperative game-based mechanism is proposed. The optimal NE decision selection is reconstructed as a Markov decision process (MDP) and the NE point is obtained via the designed novel reward-shaping double duelling deep Q network (D3QN) learning algorithm. Simulation results highlight the superiority of 2PT-CIDS over existing CIDS and potential application algorithms for VANET, effectively enhancing anomaly detection and notification considering communication cost and vehicle privacy.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Vehicular ad hoc networks; Intrusion detection; Privacy; Blockchains; Roads; Games; Trust management; Nash equilibrium; Collaboration; Accuracy; trust evaluation; information incentive mechanism
【发表时间】2024
【收录时间】2024-11-09
【文献类型】 理论模型
【Author】 Yu, Sungjin Das, Ashok Kumar Park, Youngho
CCF-B
【影响因子】9.551
【主题类别】
区块链应用-实体经济-跨域认证
【Abstract】Unmanned aerial vehicles (UAVs) integrated with the internet of things (IoT) guarantee useful advantages such as facilitating ground communications in regions where the availability of connectivity is restricted owing to physical obstacles. However, the data transmitted by sensors and IoT embedded in UAVs are facing new security issues and privacy challenges with the known security attacks over time. To address these security attacks and threats and meet lightweight UAV communication requirements, a secure and lightweight authentication and key agreement (AKA) scheme is essential. Recently, researchers have designed a lightweight blockchain-enabled AKA scheme with privacy-preserving for UAVs to provide useful and reliable services. However, we prove that the existing scheme is fragile to various security attacks and does not ensure mutual authentication. Thus, we propose a robust and lightweight blockchain-based AKA scheme for PUF-enabled UAVs, called RLBA-UAV to enhance the security problems of the existing scheme. We demonstrate the security of RLBA-UAV by using informal/formal security analyses such as the ROR oracle model and AVISPA simulation. Moreover, we demonstrate the performance comparison analysis between RLBA-UAV and related schemes for UAVs. We demonstrate an implementation of a network simulator (NS) 3 compliant with IEEE 802.11p standards to show its validation and feasibility that RLBA-UAV is appropriate for practical UAVs. Thus, RLBA-UAV offers enhanced security and operational efficiency compared to related schemes and can be applied to practical blockchain-based AKA systems for UAVs.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Unmanned aerial vehicles (UAVs); blockchain; physical unclonable functions (PUF); authentication; Unmanned aerial vehicles (UAVs); blockchain; physical unclonable functions (PUF); authentication
【发表时间】2024
【收录时间】2024-11-09
【文献类型】 案例研究
CCF-C
【影响因子】7.802
【主题类别】
区块链技术-协同技术-雾计算
【Abstract】The utilization of edge devices in fog computing services is increasing every day to achieve effective communication between edge devices as it reduces the latency and processing time. When the number of edge devices increases and operate in various applications, it is seen an increase in malfunctioning of devices due to compromises in security aspects. An increase in the number of un-trustworthy activities leads to loosing of end users to any service provider. So all edge devices must be labeled as trustworthy or not, based on their previous transactions, leading to effective communications. Finding and maintaining the trust score of edge devices is the most pressing concern in the distributed communication environment. Considering all the issues, this paper propose a Machine Learning-based Trust Prediction for Edge Devices in the Blockchain enabled Fog Computing Environment (MLTPED-BFC). The proposed scheme uses an ensemble of Support Vector Regression (SVR) and Multivariable Logistic Regression (MLR) for predicting the trust score of each edge device and updates it after every successful communication. The prediction and updating of the trust score is carried out by the fog server without any biasing. This Artificial Intelligence driven approach enhances communication effectiveness and security by classifying devices as trustworthy or not, improving the overall reliability of the distributed system. The proposed scheme is proved to be secured based on informal security analysis. Extensive simulations are carried out to validate the proposed scheme's effectiveness and compare it with existing schemes. The proposed MLTPED-BFC mechanism have attained 98.91% of accuracy, 0.0048 loss rate, 98.92% of precision, 98.32% of recall, 98.96% of F-Measure and took 356 s for 100 iterations.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Edge devices; Fog computing; Trust prediction; Support vector regression; Multivariable logistic regression
【发表时间】2025
【收录时间】2024-11-09
【文献类型】 案例研究
CCF-A
【影响因子】7.231
【主题类别】
区块链技术-协同技术-联邦学习
【Abstract】The decentralized Federated Learning (FL) paradigm built upon blockchain architectures leverages distributed node clusters to replace the single server for executing FL model aggregation. This paradigm tackles the vulnerability of the centralized malicious server in vanilla FL and inherits the trustfulness and robustness offered by blockchain. However, existing blockchain-enabled schemes face challenges related to inadequate confidentiality on models and limited computational resources of blockchains. In this paper, we present Voltran, an innovative hybrid platform designed to achieve trust, confidentiality, and robustness for FL based on the combination of the Trusted Execution Environment (TEE) and blockchain technology. We offload the FL aggregation computation into TEE to provide an isolated, trusted and customizable off-chain execution and then guarantee the authenticity and verifiability of aggregation results on the blockchain. Moreover, we provide strong scalability on multiple FL scenarios by introducing a multi-SGX parallel execution strategy to amortize the large-scale FL workload. We implement a prototype of Voltran and conduct a comprehensive performance evaluation. Extensive experimental results demonstrate that Voltran incurs minimal additional overhead while guaranteeing trust, confidentiality, and authenticity, and it significantly brings a significant speed-up compared to state-of-the-art ciphertext aggregation schemes.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchains; Servers; Computational modeling; Cryptography; Codes; Software; Scalability; Data models; Throughput; Smart contracts; Federated learning; secure aggregation; privacy-preserving; blockchain; trusted execution environment
【发表时间】2024
【收录时间】2024-11-09
【文献类型】 案例研究
CCF-A
【影响因子】7.231
【主题类别】
区块链治理-技术治理-异常检测
【Abstract】Covert channels in blockchain networks achieve undetectable and reliable communication, while transactions incorporating secret data are perpetually stored on the chain, thereby leaving the secret data continuously susceptible to extraction. MTMM (IEEE Transactions on Computers 2023) is a state-of-the-art blockchain-based covert channel. It utilizes Bitcoin network traffic that will not be recorded on the chain to embed data, thus mitigating the above issues. However, we identify a distinctive pattern in MTMM, based on which we propose a comparison attack to accurately detect MTMM traffic. To defend against the attack, we present an improvement named ORIM, which exploits the permutation of transaction hashes within inventory messages to transmit secret data. ORIM leverages a pseudo-random function to obscure the transaction hashes involved in the permutation to ensure unobservability. The obfuscated values, rather than the original transaction hashes, are utilized to encode the confidential data. Furthermore, we introduce a variable-length encoding scheme predicated on complete binary trees. This scheme considerably amplifies the bandwidth and facilitates efficient encoding and decoding of secret data. Experimental results indicate that ORIM maintains unobservability and that ORIM's bandwidth is approximately 3.7 x of MTMM.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Bitcoin; Blockchain; covert communication; covert channel; covert channel; Bitcoin; covert channel; inventory message; inventory message
【发表时间】2024
【收录时间】2024-11-09
【文献类型】 案例研究
CCF-C
【影响因子】5.883
【主题类别】
区块链应用-实体经济-航空航天
【Abstract】Aviation Internet of Things (AIoT) data sharing can create tremendous value for participants. With the development of AIoT and intelligent civil aviation, data security and privacy protection have become more prominent. To improve the data security and privacy of AIoT, and allow heterogeneous devices to participate in federated training, in this article, a blockchain-based federated knowledge distillation (BFKD) is proposed. First, federated knowledge distillation is used for knowledge transferring between clients to protect client data privacy. Second, a clustering algorithm is used to select aggregated soft labels to enhance Byzantine resistance. Finally, the consortium blockchain validates the data exchange process of federated knowledge distillation. In addition, a federated score grouping practical Byzantine fault-tolerant algorithm is proposed for improving consensus efficiency and to encourage participants to contribute more public data and honestly participate in federated training. Theoretical analysis and experimental results show that BFKD boasts high data mining performance and communication efficiency while safeguarding data privacy and security.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchains; Data privacy; Internet of Things; Data models; Training; Servers; Resistance; Data security; Accuracy; Resilience; Aviation Internet of Things (AIoT); blockchain; federated knowledge distillation (FKD); federated score grouping practical Byzantine fault-tolerant (FSGPBFT); incentive mechanism
【发表时间】2024
【收录时间】2024-11-09
【文献类型】 案例研究
【DOI】 10.1109/TR.2024.3474710
【Author】 Anthony Jr, Bokolo
【影响因子】5.711
【主题类别】
区块链应用-实体经济-智慧城市
【Abstract】The society is witnessing an accelerated large-scale adoption of technology with transformative effects on daily transport operations, with cities now depending on data driven mobility services. Disruptive technologies such as Artificial Intelligence (AI), the Internet of Things (IoT), and decentralized technologies for example Distributed Ledger Technologies (DLT) are being deployed in smart cities. However, AI is faced with data security and privacy issues due to its centralized mode of deployment. Conversely, DLT which employs a decentralized architecture can be converged with AI to provide a secure data sharing across various IoT thereby overcoming the existing setbacks faced in deploying AI in smart cities. Evidently, the convergence of AI and IoT as AIoT and DLT have great potential to create novel business models for improved data driven services such as intelligent mobility in smart cities. Although research on the convergence of AI, IoT and DLT exists, our understanding of its integration in achieving intelligent mobility services in smart cities remains fragmented as current research in this area remains scarce. This study bridges the gap between theory and practice by providing researchers and practitioners with insights on the potential benefits of converging AIoT and DLT. Grounded on the Technology Organization Environment (TOE) framework this study presents the technological, organizational, and environmental factors that impacts the convergence of AIoT and DLT in smart cities. Additionally, findings from this study present use cases on the applicability of AIoT and DLT to support intelligent mobility services in smart cities.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Sustainable mobility; Intelligent mobility; Urban intelligence; AI and smart cities; Artificial intelligence of things; Distributed ledger technologies
【发表时间】2024
【收录时间】2024-11-09
【文献类型】 综述
【Author】 Hobeck, Richard Klinkmuller, Christopher Bandara, H. M. N. Dilum Weber, Ingo van der Aalst, Wil
【影响因子】5.675
【主题类别】
区块链技术-核心技术-挖矿策略
【Abstract】Blockchain technology is known for its transparency properties due to its publicly available, immutable data. Yet, as data availability does not inherently ensure transparency, further analytical methods may be required for human interpretation of data traces. Process mining has emerged as a popular toolbox for understanding processes and how they are executed in practice. The paper studies process mining as a method to enhance the transparency of blockchain data. To this end, two popular Ethereum applications were analyzed using process mining: the prediction and betting marketplace Augur and the network marketing platform Forsage. Observations from the process-mining analyses are used to discuss if process mining can serve as a method to establish transparency of a blockchain. For both applications, new insights are generated for usage scenarios such as application redesign, security analysis, user behavior analysis, and revealing blind spots in Augur's and Forsage's documentation. The paper concludes that there is evidence that process mining can serve as a method to enhance transparency in blockchains at the cost of technical setup and knowledge acquisition.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain; Process mining; Transparency; Process discovery; Conformance checking; Process enhancement; Ethereum
【发表时间】2024
【收录时间】2024-11-09
【文献类型】 案例研究
【影响因子】5.005
【主题类别】
区块链应用-实体经济-食品供应链
【Abstract】As a high-value agricultural product, the cold chain logistics management of Gannan navel oranges has global significance. Especially in Africa and Europe, food safety and supply chain quality are critical issues. However, the existing Gannan navel orange logistics information management system relies on traditional databases and information systems, with insufficient data sharing and transparency, affecting the overall coordination of the supply chain and customer satisfaction. In addition, the traditional system is vulnerable to hacker attacks and malicious tampering of data by insiders, resulting in serious economic losses and reputation damage. So the blockchain platform constructed in this study improves the transparency and traceability of logistics data through the SMART-PBFT algorithm of the alliance chain, which optimizes the logistics management process, improves the quality of logistics services, and reduces operating costs. It improves the logistics efficiency and data transparency of local agricultural products, and also provides a demonstrative case for the cold chain management of other high-value agricultural products around the world, with broad application potential and reference value.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Gannan navel orange; cold chain logistics; information management; blockchain; supply chain management
【发表时间】2024
【收录时间】2024-11-09
【文献类型】 案例研究
【Author】 Singh, Puneeta Sagar, Shrddha Singh, Sofia Alshahrani, Haya Mesfer Getahun, Masresha Soufiene, Ben Othman
【影响因子】4.996
【主题类别】
区块链技术-协同技术-云计算
【Abstract】The Crucial and costly process of verifying medical documents frequently depends on centralized databases. Nevertheless, manual validation of document verification wastes a great deal of time and energy. The application of Blockchain technology could potentially alleviate the problem by reducing fraud and increasing efficiency. Non-transferable Soul-bound tokens (SBTs) can be a safe and unbreakable way to authenticate medical records by generating encrypted code, which allows the user to authenticate a portion of data. Within the paper, we provide a blockchain-based SBT-based automatic mechanism for authentication and verification of records. Soul-bound tokens generate a decentralized, immutable identity or credential system that is tied to a record. Through cloud computing, the system can reduce the verification time by accessing a decentralized database. Blockchain systems can lower platform costs and determine the optimal allocation of resources across a dispersed network by utilizing deep learning algorithms. Two advantages of utilizing blockchain technology are less fraud and increased efficiency. SBTs and cloud computing enable the procedure to be expedited and decentralized databases to be readily available. The suggested system's scalability and potential uses in other industries may be the subject of future research.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain technology; Soul-bound tokens (SBTs); Medical document authentication; Decentralized database; Cloud computing
【发表时间】2024
【收录时间】2024-11-09
【文献类型】 案例研究
【影响因子】4.152
【主题类别】
区块链应用-实体经济-能源领域
【Abstract】The major problems in the power system network of the South Asian Association for Regional Cooperation (SAARC) region include the utilization of substantial fossil fuels, which leads to significant emissions of CO2. Moreover, due to the depletion of fossil fuels, it is very difficult to manage the demand requirement of the SAARC regions, which leads to significant power shortage issues. These problems would be resolved through the integration of the substantial amount of renewable energy resources (RERs) that are available in excess in the SAARC regions into the power system networks. This will provide a futuristic roadmap to a sustainable and green energy environment in the SAARC region. In this regard, the SAARC region has devised a new plan to transform its smart grid infrastructure into the super smart grid (SSG), which would connect the SAARC countries using the high voltage transmission lines utilizing each country's substantial RERs. To accelerate this ecofriendly effort, the key objective of this review study is to evaluate the potential of the SAARC SSG for demand management and emissions reduction. This study provides a comprehensive overview of SSG technology, covering its technical background, management, power flow improvement techniques, power stability techniques, simulation models, and future steps for development in the SAARC region. First, the regional conflicts, energy deficiency, and potential of the SAARC region have been discussed. Second, a potential architecture of the SAARC SSG has been simulated. Third, a novel Markov chain modeling has been presented for demand management in the SAARC regions. The results and discussions section presents findings from simulations and models. The paper also discusses CO2 reduction techniques, including methods for capturing, storing, and utilizing carbon in biofuel. The study also discusses futuristic optimization techniques in SSG, including blockchain, federated learning, reinforcement learning, the metaverse, digital twin technology, artificial intelligence, and cloud computing. The SSG challenges and limitations section summarizes the challenges and limitations faced by SSG. Finally, a roadmap to a sustainable and green energy environment for the SAARC power grids has been identified to support the implementation of the futuristic SAARC SSG. The results exhibited that there is a good potential for successful demand management and emissions reduction through the SAARC SSG.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Carbon dioxide emissions; Demand and response management; High voltage transmission; Renewable energy; Super smart grid; Power flow control; SAARC; FACTs; Clean energy
【发表时间】2024
【收录时间】2024-11-09
【文献类型】 案例研究
【Author】 Kruger, Jordan Vernaleo, John Mann, Dominic Lang, Min Pokuri, Jaya Marshall, Zwade Robinson, Christopher L.
【影响因子】3.904
【主题类别】
区块链应用-实体经济-数据管理
【Abstract】Purpose of ReviewThe COVID-19 pandemic accelerated the surge in medical data utilization, notably impacting chronic pain management given its enormous economist cost. While the collection and use of data enhances research and care quality, data exchange risks compromising integrity and privacy, exemplified by the Change Healthcare cyberattack. Here, we review the potential of blockchain for the utilization for cybersecurity in the healthcare system with an emphasis on the field of chronic pain.Recent FindingsBlockchain technology emerges as a potential solution, offering decentralized, secure, and immutable data management. Blockchain ensures transparency, integrity, and data privacy, which is crucial in healthcare. Smart contracts may offer automated, secure management of implantable neuromodulation devices such as spinal cord stimulators and intrathecal pumps. Blockchain's potential in pharmaceutical supply chain integrity is exemplified in preliminary efforts ensuring that the medication retrieved by the patient is indeed the intended medication.SummaryDespite limitations such as speed of transactions, blockchain presents innovative avenues for healthcare security and quality improvement, necessitating further development for widespread implementation. Blockchain's applicability is not only applicable to chronic pain management, but can be used in medicine as a whole.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Smart contracts; Transparency; Cybersecurity; Ethereum; Data privacy
【发表时间】2024
【收录时间】2024-11-09
【文献类型】 案例研究
【Author】 Wang, Keyuan Jia, Linpeng Song, Zhaoxiong Sun, Yi
CCF-A
【影响因子】3.757
【主题类别】
区块链技术-核心技术-核心技术集
【Abstract】Sharding is a prevalent approach for addressing performance issues in blockchain. To reduce governance complexities and ensure system security, a common practice involves a relay chain to coordinate cross-shard transactions. However, with a growing number of shards and cross-shard transactions, the single relay chain usually first suffers from performance bottleneck and shows poor scalability, thus making the relay chain's scalability vital for sharding systems. To solve this, we propose Mitosis, the first multi-relay architecture to improve the relay chain's scalability by sharding the relay chain itself. Our proposed relay sharding algorithm dynamically adjusts the number of relays or optimizes the topology between relays and shards to adaptively scale up relay chain's performance. Furthermore, to guarantee the security of the multi-relay architecture, a new validator reconfiguration scheme is designed, accompanied by a comprehensive security analysis of Mitosis. Through simulation experiments on two mainstream relay chain paradigms, we demonstrate that Mitosis can achieve high scalability and outperform state-of-the-art baselines in terms of workload of relays, relay chain throughput, and transaction latency.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain; sharding; relay chain; relay chain; scalability; scalability; scalability
【发表时间】2024
【收录时间】2024-11-09
【文献类型】 案例研究
【影响因子】3.752
【主题类别】
区块链应用-实体经济-能源领域
【Abstract】The oil port logistics involves multiple parties including oil tanker owners, port authorities, customs, oil suppliers, and shipping companies. These parties need to exchange a significant amount of data and documentation related to cargo, such as bills of lading, customs declarations, and cargo manifests. This huge amount of data and documentation provides ample opportunities for data manipulation and corruption. Moreover, physical documentation is slow and prone to errors and manipulation. This data can be securely stored and shared between different parties in a tamper-proof and transparent manner using blockchain. Blockchain is a decentralized technology that employs secure hashing and consensus algorithms that can detect any data modification. Hence, this work proposes a blockchain-enabled immutable, and efficient framework for trade documentation in oil port logistics. The proposed framework provides timely processing of oil trade documents and ensures immutability while increasing trust among the trade entities. In addition, this work implements a private blockchain for the execution of smart contracts, which can ensure that all parties involved in the logistics process comply with pre-agreed rules and regulations. Simulation results validate the effectiveness of the proposed framework in terms of transparency, immutability, network latency, throughput, and resource utilization.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】
【发表时间】2024
【收录时间】2024-11-09
【文献类型】 案例研究
【Author】 Zyoud, S. Zyoud, A. H.
【影响因子】3.519
【主题类别】
区块链应用-实体经济-可持续发展领域
【Abstract】Sustainable solid waste management is a critical component of the infrastructure essential for developing smart cities. Technological innovations, the Internet of Things in particular, are significant enablers for smart city applications, including solid waste management. The present analysis is dedicated to quantifying and assessing research progress in solid waste management via IoT applications, recognizing research dynamics as a crucial innovation metric. The objective is to offer invaluable insights to both practitioners and researchers, thereby guiding future research directions. The Scopus database was used to perform an in-depth investigation of scientific publications on IoT supporting solid waste management. VOSviewer software was employed to investigate knowledge networks and prominent topics. The study identified 325 documents, with India leading the field with 160 documents (49.2%). Developing countries, mostly ones in the Asiatic region, have contributed significantly. Motor themes shaping the future of the field including more integration of artificial intelligence and blockchain techniques within IoT-enabled solid waste management systems, and IoT potential in advancing circular economy principles. The COVID-19 pandemic has revealed an increased demand for innovative IoT-based frameworks. Key challenges, especially for developing countries, include the lack of benchmarking systems, security concerns, standardization, and shifts in social behavior. Major prerequisites include raising funds, making major investments, promoting environmental education, enabling conservation initiatives, and having a highly skilled staff with competence in developing and utilizing cutting-edge IoT technologies. This analysis concludes IoT's potential to swiftly advance Sustainable Development Goals and drive major advances in IoT-based solid waste management research and applications.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Circular economy; Social behavior; Sustainable development; Community engagement; Smart city; COVID-19; Blockchain
【发表时间】2024
【收录时间】2024-11-09
【文献类型】 案例研究
【Author】 Vedachalam, Saraswathi Raj, Dayana
【影响因子】3.476
【主题类别】
区块链技术-协同技术-机器学习
【Abstract】Generally, Cooperative Spectrum Sensing (CSS) in Cognitive Radio Networks (CRN) recognizes the available spectrums to improve their utilization. However, CRN may lead to major security concerns. The existing studies didn't concentrate on various privacy attacks during Spectrum Sensing (SS) in CRN. Therefore, this paper presents Format Pareto Preserving Distributed Encryption Standard (FPPDES) and Adjustable Trainable Sigmoid Nesterov-accelerated Recurrent Neural Network (ATSNRNN) - enabled privacy preserved secure cooperative SS in CRN. Initially, the primary users (PUs) and secondary users (SUs) are registered in the blockchain. Here, the Elliptic Curve Iterated Summed Cryptography (ECISC) is employed to generate the keys. Afterward, for SUs, the Fusion Center (FC) is selected using the GaussIT Skilled Optimization Algorithm (GIT-SOA) and stored in the blockchain. At this point, FC details are hashed by using Secure Lagrange Multiplied Hash Algorithm-256 (SLMHA-256). Then, spectrum sensing is performed by feature extraction, spatiotemporal evaluation, and spectrum sensing via ATSNRNN. Next, the sensing results are encrypted by using FPPDES. Afterward, the encrypted outcome is transmitted to the FC by authenticating the FC. If FC authentication verification is passed, then the encrypted information is fed to FC; otherwise, FC is reselected and updated in the blockchain. Subsequently, by using SLMHA-256, the location matching for PU and SU is done. If the location is matched, then spectrum allocation for SU is done by using GIT-SOA; otherwise, the allocation is declined. The results proved that the proposed model obtained a high accuracy of 98.88%, which outperformed the prevailing techniques.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Sensors; Security; Privacy; Blockchains; Public key; Throughput; Elliptic curve cryptography; Cognitive radio; Accuracy; Standards; Pareto optimization; Spectrum sensing (SS); cognitive radio networks (CRN); fusion center (FC); format Pareto preserving distributed encryption standard (FPPDES); adjustable trainable sigmoid Nesterov-accelerated recurrent neural network (ATSNRNN); GaussIT skilled optimization algorithm (GIT-SOA); secure Lagrange multiplied hash algorithm-256 (SLMHA-256); elliptic curve iterated summed cryptography (ECISC)
【发表时间】2024
【收录时间】2024-11-09
【文献类型】 案例研究
【影响因子】3.476
【主题类别】
区块链应用-实体经济-通信领域
【Abstract】The sixth generation (6G) is the next generation of wireless communication technology, is not limited to cellular networks but can be used to provide better services in all areas of wireless communication, including vehicles, drones, and smart homes. However, these advancements in 6G technology require further security considerations. In earlier networks, authentication schemes were designed to rely on a secure channel between the core network and access points. The 6G network is an open, distributed network that integrates multiple domains and entities and cannot guarantee secure channels in the network. The 6G network requires a new security authentication scheme that applies the zero-trust model. Therefore, this study proposes a zero-trust authentication scheme with access control for 6G-enabled Internet of Things environments. The scheme uses blockchain technology for mutual authentication in a distributed environment and lightweight attribute-based encryption to ensure dynamic access control and network efficiency. This study compares the proposed authentication method with existing methods and demonstrates that this scheme has better performance and security. To the best of our knowledge, this paper is the first to propose a specific authentication protocol with access control considering the zero-trust model in a 6G environment.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】6G mobile communication; Authentication; Security; Access control; Internet of Things; Blockchains; Protocols; 5G mobile communication; Drones; Base stations; Encryption; Zero Trust; attribute-based encryption; authentication; blockchain; key agreement; sixth generation (6G); zero-trust
【发表时间】2024
【收录时间】2024-11-09
【文献类型】 案例研究
【Author】 Sinha, Shyam Kumar Mukhopadhyay, Debarka
【影响因子】3.476
【主题类别】
区块链技术-核心技术-密码学
【Abstract】Blockchain, in general, helps organizations to improve the transparency and governance by removing its shortfalls and building better control overall. Blockchain network, public or private, is a competent technology when used in order with an optimized hashing technique. In a blockchain network, one of the common issues is performance while registering any transactions. Blockchain must need to do some preliminary checks to avoid double-spending before registering the transaction. Here, we implement one of the optimization aspects of the hashing technique, which can contribute to the blockchain mining processes and save time. It enables the blockchain to perform efficiently and reliably. In addition, we examine how well different hashing algorithms perform when added to the blockchain network's processes. In this research, we analyze several hashing techniques that are employed in the blockchain and are also applied in the supply chain domain due to their efficacy in mitigating past attacks. Our proposed hashing technique allows a blockchain network to improve security and its overall processes. The proposed hashing technique achieves approx. 10-90% performance gain improvements over other existing technique. Our proposed hashing technique allows a blockchain network to improve security and its overall processes. The study also examines how the supply chain management contributes in increasing of overall lead time where process optimization or technological enhancement plays key roles in minimizing the time of some or all the processes. Lead time is one of the common issues of supply chain which impacts on overall order delivery time. We address on how the conjunction of blockchain with optimized hashing technique can address supply chain lead time issues.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchains; Cryptography; Supply chains; Encryption; Organizations; Optimization; Hash functions; Reliability; Optical fibers; Optical fiber networks; Blockchain; hashing; hashing function; hashing key; blockchain optimization; supply chain framework; supply chain lead time
【发表时间】2024
【收录时间】2024-11-09
【文献类型】 案例研究
CCF-C
【影响因子】3.317
【主题类别】
区块链应用-实体经济-健康领域
【Abstract】Smart contract applications are currently implemented in healthcare, but further research is needed to investigate their adoption by embracing a privacy perspective. This study fills this research gap by exploring smart contracts' adoption in healthcare through a privacy calculus model integrated with technical, legal, and social factors. The authors explore two specific applications: smart contracts implementing immune certificates (SC-ICs) to fight a healthcare crisis and smart contracts encoding and storing electronic health records (SC-EHRs) in the absence of such a crisis. Data are collected through a survey, and partial least square modeling is used to test the research hypotheses. The results provide significant contributions for academics and practitioners by showing how the influence of technical, legal, and social factors on privacy evaluations and privacy calculus evaluations themselves differ in the case of different applications of the same technology, i.e. SC-ICs and SC-EHRs because of the peculiar healthcare scenario.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Smart contracts; healthcare; privacy calculus; social, legal, and technical factors
【发表时间】2024
【收录时间】2024-11-09
【文献类型】 案例研究
【Author】 Wu, Huaiguang Peng, Yibo He, Yaqiong Lu, Siqi
【影响因子】2.940
【主题类别】
区块链治理-技术治理-漏洞检测
【Abstract】Ensuring the absence of vulnerabilities or flaws in smart contracts before their deployment is crucial for the smooth progress of subsequent work. Existing detection methods heavily rely on expert rules, resulting in low robustness and accuracy. Therefore, we propose EDSCVD, an enhanced deep learning vulnerability detection model based on dual-channel networks. Firstly, the contract fragments are preprocessed by BERT into the required word embeddings. Next, we utilized adversarial training FGM to the word embeddings to generate perturbations, thereby producing symmetric adversarial samples and enhancing the robustness of the model. Then, the dual-channel model combining BiLSTM and CNN is utilized for feature training to obtain more comprehensive and symmetric information on temporal and local contract features.Finally, the combined output features are passed through a classifier to classify and detect contract vulnerabilities. Experimental results show that our EDSCVD exhibits excellent detection performance in the detection of classical reentrancy vulnerabilities, timestamp dependencies, and integer overflow vulnerabilities.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】smart contracts; vulnerability detection; adversarial training; dual-channel
【发表时间】2024
【收录时间】2024-11-09
【文献类型】 案例研究
【DOI】 10.3390/sym16101381
【Author】 Yang, Minda Min, Shi Qing, Ping
【影响因子】2.628
【主题类别】
区块链应用-实体经济-食品领域
【Abstract】Blockchain-based traceability systems offer significant potential for enhancing food safety. This study investigated consumer preferences and willingness to pay (WTP) for a blockchain-based traceability system for fresh pork, and examined preferences for certification agencies. Data were gathered through an online choice experiment conducted in 5 Chinese cities. The results show favorable preferences and higher WTP for a blockchain-based traceability system, with the information intervention group demonstrating a higher mean WTP than the control group. The highest WTP is observed for a blockchain food traceability system combined with government certification. These findings provide valuable insights for promoting blockchain-based food traceability in developing countries and hold important policy implications for food safety regulation and consumer protection.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain food traceability system; Choice experiment; Fresh pork; Willingness to pay; Information intervention
【发表时间】2024
【收录时间】2024-11-09
【文献类型】 案例研究
【影响因子】2.557
【主题类别】
区块链应用-实体经济-医疗领域
【Abstract】This paper proposes an online medical pre-diagnosis scheme based on blockchain. It mainly focuses on the problems faced in the medical diagnosis scheme nowadays, such as the huge scale of medical treatment, the lack of data sharing, the impossibility of pursuing responsibility, etc., and constructs a safe and reliable online medical diagnosis scheme by using the characteristics of blockchain technology, such as traceability, decentralization, and openness and transparency. In this paper, the existing homomorphic encryption algorithm is first improved, and the algorithm homomorphism is utilized to generate a public key, which is able to diagnose the data in an encrypted state and ensure the security of the private key. When storing medical data, the original medical data are stored with the help of IPFS file system, and the hash value of medical records is chosen to be stored on the blockchain, which realizes the openness, transparency, and traceability of the data, which can effectively protect the privacy of the data, and also realize the effective pursuit of medical accidents. The specific security analysis, functional comparison, and performance analysis of the scheme further demonstrate that the scheme can safely and efficiently execute online medical pre-diagnosis programs.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Privacy protection; Encryption algorithm; Blockchain; Medical diagnosis
【发表时间】2025
【收录时间】2024-11-09
【文献类型】 案例研究
【影响因子】2.557
【主题类别】
区块链技术-核心技术-共识机制
【Abstract】The Variational Onsager Neural Networks-based Fair proof-of-reputation consensus for blockchain with Transaction Prioritisation for Smart Cities (VONN-FPORC-TP-SC) is proposed for transaction prioritisation in smart cities. Blockchain, as a decentralised immutable ledger, has potential to boost smart city growth by ensuring transparency, data safety, dependability, efficacy, interoperability, and privacy, making it promising match for smart cities. Such instance, if existing fee-dependent or first-come-first-served processing is applied, emergency events delayed owing to competition, risking people's lives. Here, the use of Variational Onsager Neural Networks (VONN) approach is to accomplish efficient leader election and build a Weighted Byzantine Fault Tolerance consensus algorithm mechanism in this consensus protocol. A peer-prediction-based verification technique is also presented to verify that followers 'assessments of the leaders' created blocks are honest. Also, because the leader will assure transaction prioritization through creating blocks, leader rotation, and the correct election method, it becomes critical for the transaction prioritization process to take place honestly and quickly on FPoR. fair proof-of-reputation consensus for blockchain. The proposed VONN-FPORC-TP-SC method is implemented on MATLAB R2019b. Then, performance of proposed method is analysed with other existing techniques. The proposed method attains 28.86%, 24.47% and 31.79% higher accuracy, 18.25%, 32.27% and 26.89% higher efficiency, and 23.21%, 17.36% and 32.35% higher robustness comparing with the existing methods such as a ML-improved blockchain consensus with transaction prioritisation for smart cities (ML-BC-TP-SC), blockchain and smart contracts to secure property transactions in smart cities (BCS-TP-SC), presented an Edge TC-a PBFT blockchain-dependent ETC system for smart cities (PBFT-ETC-TP-SC), respectively.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】FPoR: fair proof-of-reputation consensus; Variational Onsager Neural Network; Weighted Byzantine fault tolerance consensus algorithm; Transaction prioritisation; Smart city
【发表时间】2025
【收录时间】2024-11-09
【文献类型】 案例研究
【影响因子】2.032
【主题类别】
区块链治理-技术治理-区块链安全
【Abstract】Aiming at the problems such as scattered subjects, static mode and single function, this paper explores a dynamic synergistic risk prevention mode of agricultural crowdfunding that adapts to the age of data intelligence. Based on multiple prevention subjects, the blockchain technology and cohesion principle are introduced into agricultural crowdfunding prevention, and then a risk prevention dynamic model of "blockchain + agricultural crowdfunding" is constructed from the synergistic perspective. Fuzzy cognitive map model and its reasoning mechanism are used to simulate four scenarios of 1-subject, 2-subjects, 3-subjects, and 4-subjects respectively in the dynamic model and the static model. The results show that: as the number of risk prevention subjects increases, so does the cohesion, and the cohesion of multi-subjects reaches a higher state in less time and the steady-state faster, even though the fluctuation range reduces. The risk value for the multi-agent reduces rapidly and reaches a lower risk value in a shorter period of time. Overall, cohesion increases while risk reduces. In the same scenario, dynamic mode cohesion is stronger than static mode cohesion, and it takes less time to attain the steady-state value. Under various scenarios, the dynamic model's cohesiveness steady-state value increases with the number of subjects, which is stronger than the static model's. This study not only enriches and develops the theory of risk management of agricultural crowdfunding, but also provides a decision-making basis for the enterprises and the government, etc., to formulate, adjust, and implement risk prevention measures.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】blockchain; agricultural crowdfunding; synergy; risk prevention dynamic model; fuzzy cognition map
【发表时间】2024
【收录时间】2024-11-09
【文献类型】 实验仿真
【影响因子】1.914
【主题类别】
区块链技术-协同技术-数据管理
【Abstract】The acceleration of the digitalization process in enterprise and university education management has generated a massive amount of electronic archive data. In order to improve the intelligence, storage quality, and efficiency of electronic records management and achieve efficient storage and fast retrieval of data storage models, this study proposes a massive data storage model based on HBase and its retrieval optimization scheme design. In addition, HDFS is introduced to construct a two-level storage structure and optimize values to improve the scalability and load balancing of HBase, and the retrieval efficiency of the HBase storage model is improved through SL-TCR and BF filters. The results indicated that HDFS could automatically recover data after node, network partition, and NameNode failures. The write time of HBase was 56 s, which was 132 and 246 s less than Cassandra and CockroachDB. The query latency was reduced by 23% and 32%, and the query time was reduced by 9988.51 ms, demonstrating high reliability and efficiency. The delay of BF-SL-TCL was 1379.28 s after 1000 searches, which was 224.78 and 212.74 s less than SL-TCL and Blockchain Retrieval Acceleration and reduced the delay under high search times. In summary, this storage model has obvious advantages in storing massive amounts of electronic archive data and has high security and retrieval efficiency, which provides important reference for the design of storage models for future electronic archive management. The storage model designed by the research institute has obvious advantages in storing massive electronic archive data, solving the problem of lack of scalability in electronic archive management when facing massive data, and has high security and retrieval efficiency. It has important reference for the design of storage models for future electronic archive management.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】data compression; distributed storage; electronic archive management; HBase; HDFS; massive data
【发表时间】2024
【收录时间】2024-11-09
【文献类型】 案例研究
【DOI】 10.1002/nem.2308
【影响因子】1.861
【主题类别】
区块链技术-核心技术-挖矿策略
【Abstract】We present an analysis of the Proof-of-Work consensus algorithm, used on the Bitcoin blockchain, using a mean field game framework. Using a master equation, we provide an equilibrium characterization of the total computational power devoted to mining the blockchain (hashrate). This class of models allows us to adapt to many different situations. The essential structure of the game is preserved across all the enrichments. In deterministic settings, the hashrate ultimately reaches a steady state in which it increases at the rate of technological progress only. In stochastic settings, there exists a target for the hashrate for every possible random state. As a consequence, we show that in equilibrium the security of the underlying blockchain and the energy consumption either are constant or increase with the price of the underlying cryptocurrency.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】blockchain; mean field games; bitcoin mining
【发表时间】2024
【收录时间】2024-11-09
【文献类型】 案例研究
【DOI】 10.1137/23M1617813
【Author】 Lukic, Zikica Milosevic, Bojana
【影响因子】1.523
【主题类别】
区块链治理-技术治理-异常检测
【Abstract】In this study, we introduce the first-of-its-kind class of tests for detecting change-points in the distribution of a sequence of independent matrix-valued random variables. The tests are constructed using the weighted square integral difference of the empirical orthogonally invariant Hankel transforms. The test statistics have a convenient closed-form expression, making them easy to implement in practice. We present their limiting properties and demonstrate their quality through an extensive simulation study. We utilize these tests for change-point detection in cryptocurrency markets to showcase their practical use. The detection of change-points in this context can have various applications in constructing and analyzing novel trading systems.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Matrix distributions; Change-point detection; Integral transforms
【发表时间】2024
【收录时间】2024-11-09
【文献类型】 案例研究
【Author】 Wang, Jing Yuan, Xue Xu, Yingjie Zhang, Yudi
CCF-C
【影响因子】1.300
【主题类别】
区块链治理-技术治理-其他
【Abstract】Large language models (LLMs) have brought significant advancements to artificial intelligence, particularly in understanding and generating human language. However, concerns over management burden and data security have grown alongside their capabilities. To solve the problem, we design a blockchain-based distributed LLM framework, where LLM works in the distributed mode and its outputs can be stored and verified on a blockchain to ensure integrity, transparency, and traceability. In addition, a multiparty signature-based authentication mechanism is necessary to ensure stakeholder consensus before publication. To address these requirements, we propose a threshold elliptic curve digital signature algorithm that counters malicious adversaries in environments with three or more participants. Our approach relies on discrete logarithmic zero-knowledge proofs and Feldman verifiable secret sharing, reducing complexity by forgoing multiplication triple protocols. When compared with some related schemes, this optimization speeds up both the key generation and signing phases with constant rounds while maintaining security against malicious adversaries.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】
【发表时间】2024
【收录时间】2024-11-09
【文献类型】 案例研究
【DOI】 10.1049/2024/2252865
【Author】 Ledesma, German
【影响因子】0.000
【主题类别】
区块链治理-市场治理-市场分析
【Abstract】
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】
【发表时间】2024
【收录时间】2024-11-09
【文献类型】 案例研究
【DOI】 10.1353/hsf.2024.a937319
【作者】 李卓异; 龙和平
【作者单位】哈尔滨师范大学经济与管理学院;西安工商学院;
【文献来源】情报科学
【复合影响因子】3.367
【综合影响因子】2.220
【主题类别】
区块链应用-实体经济-情报领域
【摘要】【目的/意义】研究元宇宙视域下红色文献资源聚合的技术基础、体系框架和服务模式,挖掘红色文献资源价值、推动红色文化教育,为红色文献资源聚合服务提供参考。【方法/过程】利用数字孪生、区块链、虚拟现实等技术,从红色文献资源聚合、孪生场景构建、人机交互操作等环节设计红色资源聚合服务框架,探索元宇宙视域下红色资源聚合服务模式。【结果/结论】设计红色文献资源情境服务模式、红色文献资源智能服务模式以及红色资源生态服务模式,打通现实世界与虚拟数字世界的界限,实现红色文献资源深度开发和利用,提升用户的沉浸感和参与度。【创新/局限】从资源聚合技术的特征出发,分析元宇宙在红色资源聚合服务中的应用场景。由于红色文献资源聚合服务仍处于探索阶段,在实际应用中还需要企业、科研团队、高校图书馆等各主体积极参与和探讨。
【关键词】元宇宙;;红色文献资源;;资源聚合;;服务模式;;区块链
【文献类型】 案例研究
【发表时间】2024-11-09
【作者】 段凡华; 徐雅琼; 王迪; 米俊
【作者单位】山西晋中理工学院经济与管理学院;山西财经大学工商管理学院;山西财经大学管理科学与工程学院;
【文献来源】经济问题
【复合影响因子】
【综合影响因子】
【主题类别】
区块链应用-实体经济-物流领域
【摘要】保障受灾地区应急物资需求,需要建立高效协同的应急物资配送体系,区块链技术应用为解决应急物资协同配送中的第三方物流企业物资配送难题提供了良好契机。通过梳理区块链赋能应急物资协同配送的系统流程,构建政府、第三方物流企业、用户的三方演化博弈模型,并对关键因素进行仿真分析,研究发现:(1)存在三种均衡稳定点策略。政府的策略选择对用户策略的演化和稳定具有至关重要的影响,政府应该加快构建区块链紧急运输调度指挥平台,以实现对用户的有效引导。(2)政府对第三方物流企业不及时送达的惩罚成本、补贴成本以及企业加入平台的风险是影响第三方物流企业加入平台的重要因素。(3)平台服务费是影响用户选择加入平台的重要因素。为推动和加强第三方物流企业协同配送应急物资,政府应积极推广区块链技术应用,优化区块链紧急运输调度指挥平台。
【关键词】区块链;;应急物流;;协同配送
【文献类型】 案例研究
【发表时间】2024-11-09
【作者】 冯霞; 崔凯平; 李泽; 龚玲
【作者单位】江苏大学汽车与交通工程学院;江苏大学汽车工程研究院;
【文献来源】江苏大学学报(自然科学版)
【复合影响因子】
【综合影响因子】
【主题类别】
区块链应用-实体经济-车联网
【摘要】针对车联网中网络带宽和计算能力有限导致消息认证效率低的问题,提出一种车联网中的无证书批量认证方案.权威机构为每个注册车辆生成一个评估证明,并基于全部注册车辆计算一个全局承诺,车辆基于评估证明参与消息认证过程.在认证过程中,可信机构能够利用全局承诺通过双线性配对来检验车辆、评估证明的有效性,以实现认证消息的快速批量认证.在隐私安全方面,所提出方案在区块链架构的基础上引入零知识证明,为车辆提供匿名性、不可链接性等隐私保护属性,并通过区块链状态数据库实现对车辆身份的准确追溯与快速撤销.针对所提出方案进行了安全性分析、计算效率分析以及仿真试验.结果表明,所提出方案能够满足匿名性、不可链接性等多种安全需求,其平均认证时间为0.357 ms,至少优于现有同类方案12.46%.
【关键词】车联网;;消息认证;;无证书认证;;区块链;;批量认证;;隐私保护;;匿名追溯
【文献类型】 案例研究
【发表时间】2024-11-09
【作者】 何静; 蔡咏琪
【作者单位】上海海洋大学经济管理学院;
【文献来源】粮油食品科技
【复合影响因子】
【综合影响因子】
【主题类别】
区块链应用-实体经济-食品领域
【摘要】随着食品种类多元化以及消费者需求的提升,食品生产流程更加复杂,供应链之间交流越来越多,相关企业、食品供应链以及行业机构之间的交互形成了复杂的食品供需网结构。食品供需网成员之间信息共享有利于企业之间充分合作实现长期发展,但仍有许多企业共享信息意识较弱,无法进行有效信息沟通。区块链跨链技术的应用和发展,为食品供需网信息共享提供了新思路。根据食品供需网复杂性,引入区块链技术和声誉激励机制,将声誉进行量化管理,结合区块链智能合约技术实现声誉激励机制自动化。进一步引入区块链跨链技术,打破不同行业、地区区块链之间的交易壁垒,构建基于区块链跨链技术的食品供需网信息共享声誉激励模式,以猪肉供需网为例阐述跨链信息共享声誉激励流程。该激励模式不仅保障共享信息安全性与准确性,同时保护企业隐私,最大程度保护交易方自身利益,破解信息无法共享的障碍,激发食品供需网企业参与信息共享积极性。不仅实现食品供需网内部异构区块链之间的信息交流和价值互通,为食品供需网价值信息交流互通的发展提供新思路。
【关键词】食品供需网;;跨链技术;;信息共享;;声誉激励
【文献类型】 案例研究
【发表时间】2024-11-09
【作者】 孙昌霞; 张传虎; 刘冰杰; Yingjie Yang; Fernando Bacao; 刘倩
【作者单位】河南农业大学信息与管理科学学院;河南省农业大数据与人工智能国际联合实验室;德蒙特福特大学计算机工程和媒体学院;新里斯本大学信息管理学院里斯本市坎波利德校区;
【文献来源】电信科学
【复合影响因子】
【综合影响因子】
【主题类别】
区块链技术-协同技术-访问控制
【摘要】随着物联网设备数量激增,传统的集中式访问控制方案在面对当前大规模物联网环境时显得力不从心,现有的分布式访问控制方案存在高货币成本和处理访问请求的低吞吐量等问题。针对这些问题提出一种区块链智能合约结合密文策略属性基加密(ciphertext policy attribute based encryption,CP-ABE)实现对物联网资源的访问控制方案。以超级账本(Hyperledger Fabric)为底层网络,对功能令牌执行属性基加密,利用星际文件系统(interplanetary file system,IPFS)保存令牌密文,通过智能合约公开令牌获取地址实现1对多授权。进一步设计合约部署到区块链实现对令牌请求的去中心化权限评估,维护主体在特定资源对象上允许的操作,实现更为细粒度的属性访问控制。通过仿真实验及性能分析表明,所提方案与现有方案相比能够使数据所有者在更短的时间内完成对大量请求主体的安全访问授权,压力测试表明链码具有较好性能。
【关键词】物联网;;访问控制;;区块链;;智能合约;;密文策略属性基加密
【文献类型】 案例研究
【发表时间】2024-11-09