• 首页
  • 每日更新
  • 文献
  • 会议文献
  • 政策法规
  • 研究专题
  • 区块链游戏
logo 区块链前沿
  • 区块链前沿
  • 首页
  • 每日更新
  • 文献
  • 会议文献
  • 政策法规
  • 研究专题
  • 区块链游戏
  • 文章创新角色
  • 科研创新指数
  • 区块链领域本体
  • 热点主题挖掘
  • 主题展示
  • 专利文献
  • 排行榜
  • DAO治理
  • 文献上传
  • 积分获取规则
  • 大语言模型解析
  • 期刊发文分布
注册 登录

2024年11月28日 50篇

文献来源

  • 50

主题分类

      • 50

文献类型

  • 50
筛选
订阅
<< 前一天 后一天 >>

Trustworthy V2G scheduling and energy trading: A blockchain-based framework

【Author】 Chen, Yunwang Lei, Xiang Niu, Songyan Jian, Linni

【影响因子】13.661

【主题类别】

--

【Abstract】The rapid growth of electric vehicles (EVs) and the deployment of vehicle-to-grid (V2G) technology pose significant challenges for distributed power grids, particularly in fostering trust and ensuring effective coordination among stakeholders. Establishing a trustworthy V2G operation environment is crucial for enabling large-scale EV user participation and realizing V2G's potential in real-world applications. In this paper, an integrated scheduling and trading framework is developed to conduct transparent and efficacious coordination in V2G operations. In blockchain implementation, a cyber-physical blockchain architecture is proposed to enhance transaction efficiency and scalability by leveraging smart charging points (SCPs) for rapid transaction validation through a fast-path practical byzantine fault tolerance (fast-path PBFT) consensus mechanism. From the energy dispatching perspective, a game-theoretical pricing strategy is employed and smart contracts are utilized for autonomous decision-making between EVs and operators, aiming to optimize the trading process and maximize economic benefits. Numerical evaluation of blockchain consensus shows the effect of the fast-path PBFT consensus in improving systems scalability with a balanced trade-off in robustness. A case study, utilizing real-world data from the Southern University of Science and Technology (SUSTech), demonstrates significant reductions in EV charging costs and the framework's potential to support auxiliary grid services.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Electric vehicle; Vehicle-to-grid; Energy blockchain; Game theory; Pricing strategy

【发表时间】2024

【收录时间】2024-11-28

【文献类型】

【DOI】 10.1016/j.etran.2024.100376

Matching supply chain management challenges with blockchain applications

【Author】 Berneis, Moritz Winkler, Herwig

【影响因子】11.263

【主题类别】

--

【Abstract】Purpose - This study aims to explore the potential of blockchain technology in the field of supply chain management (SCM). The research is motivated by the emerging significance of blockchain as a disruptive technology that can potentially address a range of challenges faced by SCM professionals globally. Design/methodology/approach - In our approach, this paper utilized a knock-out criteria approach to break down 150 identified challenges in SCM to a more manageable number of 12. The Analytic Hierarchy Process (AHP) was then used to prioritize these challenges in order of their relative importance and suitability for resolution through blockchain. Findings - The analysis identified key challenges to be addressed by blockchain technology in SCM. Most notably, it highlighted concerns related to price stability and global financial flows, which closely intertwine. Another significant group of issues pertains to tracking, tracing and the demonstration of sustainability, thus suggesting a substantial potential for blockchain application in these areas. The fifth notable challenge revolves around establishing ownership rights over digital assets or software. Originality/value - This study identified key challenges in SCM with significant potential for blockchain intervention including price stability, global financial flows, tracking, tracing and the establishment of digital asset ownership. Research gaps exist despite notable progress in applications such as inflation control and tracking - especially in areas like ownership rights and e-commerce. The findings indicate that blockchain has the potential to address SCM challenges and that further exploration and implementation are necessary.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Decision making; Supply-chain management; Analytical hierarchy process; Logistics management; SCM practices; Global supply chain

【发表时间】2024

【收录时间】2024-11-28

【文献类型】

【DOI】 10.1108/SCM-12-2023-0615

A Large-Scale Node Lightweight Consensus Algorithm of Blockchain for Internet of Things

【Author】 Zhuang, Yubo Chen, Yourong Zhang, Xudong Ren, Tiaojuan Han, Meng Alam, Muhammad Hong, Zhen

CCF-C

【影响因子】10.238

【主题类别】

--

【Abstract】In order to solve the problems in the blockchain consensus algorithm, such as slow consensus speed, high resource consumption, and low consensus security due to excessive large-scale node data volume and Byzantine attacks in the Internet of Things (IoT) system, we propose a large-scale node lightweight consensus algorithm of blockchain for IoT (LNLCA). First, a transaction set construction mechanism is proposed to improve consensus efficiency and security. The mechanism packages multiple data monitored by IoT nodes into data transactions, and builds the transaction set. Then, it constructs nonconflict subsets and conflict subsets. Second, an adjacent parent node sampling and response mechanism is proposed to reduce the consumption of communication resources. The new transaction set selects nearby parent nodes based on the time distance summation method and collaborates to batch verify each transaction in the transaction set. Finally, an efficient consistent consensus based on transaction set directed acyclic graph (DAG) is proposed to quickly vote for each transaction in the transaction set, thereby constructing the transaction set DAG for batch uploading to the chain, and achieving a secure and lightweight consensus on IoT data. The experimental results show that no matter how the number of Byzantine nodes changes, LNLCA can improve transaction throughput, and reduce transaction delay and communication overhead, which outperforms the credit-delegated Byzantine fault tolerance, Avalanche, and Hashgraph.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Internet of Things; Consensus algorithm; Blockchains; Peer-to-peer computing; Delays; Data security; Data privacy; Blockchain; directed acyclic graph (DAG); Internet of Things (IoT); large-scale nodes; lightweight consensus

【发表时间】2024

【收录时间】2024-11-28

【文献类型】

【DOI】 10.1109/JIOT.2024.3439866

Personalized Privacy-Preserving Distributed Artificial Intelligence for Digital-Twin-Driven Vehicle Road Cooperation

【Author】 Sun, Kangkang Wu, Jun Bashir, Ali Kashif Li, Jianhua Xu, Hansong Pan, Qianqian Al-Otaibi, Yasser D.

CCF-C

【影响因子】10.238

【主题类别】

--

【Abstract】The technology of the Internet of Vehicles (IoV) and digital twins (DTs) is driving deeper connectivity between vehicles and road infrastructure. Through the data exchange of IoV and the simulation of DT technology, vehicle driving decisions, traffic management, and road planning are optimized. However, DT models contain a large amount of private vehicle data, causing the risk of privacy leakage. Distributed artificial intelligence (AI) methods, particularly federated learning (FL) algorithms, ensure data security and privacy by sharing data models rather than sharing private data. Current mainstream algorithms use FL and local differential privacy (LDP) or blockchain approaches to protect data security at the cost of lower model accuracy and larger computation time. In the vehicle road cooperation, we designed a three-layer DT-driven personalized privacy-preserving framework, which includes a physical layer, a DT layer, and an application layer. In our proposed framework, to improve the security and performance of DT models, a time-sensitive PLDP-based FL (TimeSenFLDP) mechanism is proposed to achieve different privacy levels of the DT model of vehicles over sharing time steps. Compared with the mainstream algorithm (e.g., DP-SGD), the experiments prove that our proposed algorithm has 18.07%, 16.32%, and 7.5% accuracy improvement in FedAvg, FedProx, and FedDyn, respectively.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Roads; Data models; Privacy; Computational modeling; Training; Artificial intelligence; Blockchains; Digital-twin-driven vehicle road cooperation; federated learning (FL); personalized local differential privacy (LDP); time-sensitive

【发表时间】2024

【收录时间】2024-11-28

【文献类型】

【DOI】 10.1109/JIOT.2024.3389656

Augmented IoT Cooperative Vehicular Framework Based on Distributed Deep Blockchain Networks

【Author】 Lakhan, Abdullah Mohammed, Mazin Abed Zebari, Dilovan Asaad Abdulkareem, Karrar Hameed Deveci, Muhammet Marhoon, Haydar Abdulameer Nedoma, Jan Martinek, Radek

CCF-C

【影响因子】10.238

【主题类别】

--

【Abstract】This article presents the Augmented Internet of Things (AIoT) framework for cooperatively distributed deep blockchain-assisted vehicle networks. AIoT framework splits the vehicle application into various tasks while executing them on different computing nodes. The vehicle application has different constraints, such as security, time, and accuracy, which are considered during processing them on parallel computing nodes (e.g., fog and cloud). We propose a partitioned AIoT scheme, dividing vehicular tasks into local and remote tasks. The objective is to minimize delays and efficiently execute urgent tasks, such as vehicle, pedestrian, and traffic signals on local vehicles. The existing blockchain technologies suffer from many security issues, such as anonymous node issues and malware attacks in blockchain blocks. This is why we present the combined deep convolutional neural network (DCNN)-assisted Proof-of-Trust Miner (PoTM) scheme. It safely handles tasks in different blocks. The smart contract is a human-written piece of code in blockchain technologies so that malicious code can be integrated into blockchain blocks during the registration of vehicles among nodes. The main limitation of smart contracts is that they are not changeable and cannot be changed once executed for any block. To avoid this situation, we present an augmented adaptive trust management credibility score scheme (TMCSS) scheme that registers the vehicles before starting any services at blockchain miners. These registration certificates are changeable once DCNN detects any malicious activity in the vehicle data. Simulation results show that the proposed schemes improved delays by 35%, reduced the failure ratio of transactions by 39%, and enhanced overall transactions with the minimum failure compared to existing blockchain technologies for road-cooperation services in networks.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchains; Cloud computing; Trust management; Smart contracts; Task analysis; Peer-to-peer computing; Malware; Augmented Internet of Things (AIoT); blockchain; malicious; Proof of Work (PoW); sustainability; trust management; trust management credibility score scheme (TMCSS); vehicular

【发表时间】2024

【收录时间】2024-11-28

【文献类型】

【DOI】 10.1109/JIOT.2024.3362981

BAKAS-UAV: A Secure Blockchain-Assisted Authentication and Key Agreement Scheme for Unmanned Aerial Vehicles Networks

【Author】 Huang, Keke Hu, Huidan Lin, Changlu

CCF-C

【影响因子】10.238

【主题类别】

--

【Abstract】Unmanned aerial vehicles (UAVs, also known as Drones) have been widely employed in military defense and civilian service. However, as UAVs communicate over insecure open wireless channels, the security challenges and privacy concerns are becoming increasingly prominent. Moreover, some existing schemes to achieve authentication and key agreement (AKA) among UAVs are spliced with the assistance of two UAV-2-GCS mechanisms, which are not flexible enough to be applied in the Internet of Drones (IoD) scenarios. This article proposes a blockchain-assisted AKA scheme for UAVs networks (BAKAS-UAV) referred to as BAKAS-UAV, which addresses security and privacy concerns and overcomes high computational and communication costs in the IoD. A blockchain-based network model is presented in which the ground station acts as an edge node and manages the blockchain, which assists AKA. Based on the network model, both types of AKA mechanisms, UAV-2-GCS and UAV-2-UAV, are proposed, respectively. In particular, the ground control station (GCS) does not participate in the AKA of UAV-2-UAV process; only upon the process is completed the two UAVs synchronize the updated information with GCS. We also implement a smart contract as the authentication service, and the experimental implementation demonstrates the availability of our scheme in IoD. Physical unclonable functions (PUFs) is introduced on the UAVs side to defend against physical capture attacks and also to implement AKA mechanisms. The semantic security is proved formally based on the real-or-random (ROR) model, and the informal analysis shows that the scheme satisfies the demanded security requirements. The scheme's performance is evaluated by simulating the UAVs and GCS settings with Raspberry Pi 4B and MacOS platforms, respectively, with implementation of several cryptographic primitives. The experimental results show that BAKAS-UAV achieves high efficiency.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Task analysis; Authentication; Security; Autonomous aerial vehicles; Internet of Things; Drones; Costs; Authentication and key agreement (AKA); blockchain; physical unclonable functions (PUFs); real-or-random (ROR) model; unmanned aerial vehicles (UAVs)

【发表时间】2024

【收录时间】2024-11-28

【文献类型】

【DOI】 10.1109/JIOT.2024.3431879

AIFL: Ensuring Unlinkable Anonymity and Robust Incentive in Cross-Device Federated Learning

【Author】 Chen, Xiaofeng Gao, Ying Deng, Huanghao

CCF-C

【影响因子】10.238

【主题类别】

--

【Abstract】While cross-device federated learning (FL) offers a privacy-preserving data processing approach for Internet of Things (IoT) devices, it introduces fresh privacy risks and elevated computational expenses. Current solutions prioritize data privacy, often overlooking identity privacy vulnerabilities that may lead to personal information disclosure. In addition, achieving personalized client incentives while protecting identity privacy is a serious challenge. In this article, we propose AIFL, an unlinkable anonymity and robust incentive mechanism in cross-device FL. We design a threshold-based accountable ring signature (TARS) protocol that achieves unlinkable anonymity between identity and model updates and ensures accuracy and cost-effectiveness. AIFL identifies dishonest clients by incorporating a detection mechanism that leverages entropy weighting and cosine similarity for malicious update identification. Moreover, our robust incentive mechanism, grounded in the Stackelberg game, adopts differential pricing strategies that take into account clients' anonymity budgets, ensuring equitable rewards. Performance evaluation reveals that AIFL achieves superior accuracy and robustness compared to Krum, even under 50% Byzantine attackers. Specifically, AIFL outperforms Krum by 0.32%, 29.1%, 79.17%, and 11.86% on MNIST, CIFAR-10, CIFAR-100, and Tiny-ImageNet data sets in nonindependent identically distributed, respectively. Additionally, AIFL effectively imposes costly penalties on dishonest clients and enhances the overall utility for honest clients. Consequently, the proposed AIFL holds significant implications for promoting secure and trustworthy machine learning in the IoT domain.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Privacy; Federated learning; Internet of Things; Computational modeling; Training; Data models; Blockchains; Accountability; anonymity; federated learning (FL); incentive mechanism; Stackelberg game

【发表时间】2024

【收录时间】2024-11-28

【文献类型】

【DOI】 10.1109/JIOT.2024.3417003

The spillover effects of the "Binance Incident" on financial markets: A study based on machine learning approach

【Author】 Feng, Lingbing Qi, Jiajun Liu, Ye Wang, Wei

【影响因子】9.848

【主题类别】

--

【Abstract】This paper analyzes the spillover effects of the "Binance Incident" in the cryptocurrency market on financial markets. We integrate event study with Lasso to predict the normal returns during the event window, which outperforms traditional market models. Based on the new approach, we find positive effects on precious metal markets due to their safe-haven nature. In contrast, energy markets exhibit negative effects due to reduced investor confidence and weaker safe-haven attributes, and fiat currencies show negligible reactions. Finally, we document that the overall impact of the "Binance Incident" on financial markets is negative.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Cryptocurrency; Financial markets; Event study; Machine learning; Lasso

【发表时间】2025

【收录时间】2024-11-28

【文献类型】

【DOI】 10.1016/j.frl.2024.106383

Bitcoin arbitrage and exchange default risk

【Author】 Guo, Weiwei Intini, Silvia Jahanshahloo, Hossein

【影响因子】9.848

【主题类别】

--

【Abstract】We investigate how exchange default risk and liquidity affect Bitcoin cross-exchange arbitrage opportunities. Analysing minute-level data from 16 cryptocurrency exchanges (April 2013-April 2024), we find arbitrage opportunities last longer when higher-risk exchanges have higher prices, as traders are cautious of default risks. There is a strong positive relation between capital flows from high-risk to low-risk exchanges and arbitrage opportunities, showing a preference for safer exchanges. Liquidity accelerates arbitrage by enabling faster execution, but high transaction fees and blockchain congestion slow capital transfers. The paper highlights exchange risk, liquidity, and transaction costs as key factors in Bitcoin market efficiency.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Bitcoin; Cryptocurrencies; Default risk; Exchanges; Arbitrage

【发表时间】2025

【收录时间】2024-11-28

【文献类型】

【DOI】 10.1016/j.frl.2024.106364

BTC2PA: A Blockchain-Assisted Trust Computation With Conditional Privacy-Preserving Authentication for Connected Vehicles

【Author】 Rawat, Gopal Singh Singh, Karan Shariq, Mohd Das, Ashok Kumar Chaudhry, Shehzad Ashraf Lorenz, Pascal

CCF-B

【影响因子】9.551

【主题类别】

--

【Abstract】Intelligent Transportation Systems (ITS) dwell on Vehicular Ad-hoc NETworks (VANETs) for message dissemination to achieve the goal of traffic safety and efficiency. VANETs achieve communication among vehicles and roadside units via wireless communication. Hence, security and privacy are significant concerns to be addressed for an effective application of secure VANETs in any ITS. Researchers have addressed these issues with trust management-based schemes or cryptography-based schemes. While these schemes can secure VANETs, they have various limitations presenting hindrances in their deployment. In this context, we have proposed a Blockchain-assisted Trust Computation with a Conditional Privacy-preserving Authentication (BTC2PA) scheme for connected vehicles. The BTC2PA scheme uses a blockchain (Ethereum) assisted PKI infrastructure with digital signatures to achieve authentication for secure communication. Furthermore, it integrates a trust score computation scheme based on a reward and punishment mechanism to provide resistance against internal attacks. The feasibility and validity of the proposed BTC2PA scheme have been studied by implementation work in Rinkeby (Ethereum test network) and extensive simulations using NS-3. The results obtained show that the proposed BTC2PA scheme meets the security and privacy requirements while significantly improving the performance metrics such as communication, storage, computation cost, and end-to-end delay when compared to existing schemes.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Security; Authentication; Protocols; Vehicular ad hoc networks; Privacy; Cryptography; Electronic mail; Resists; Computer science; Transportation; VANET; smart contract; blockchain; conditional privacy-preserving authentication; security and privacy; trust management

【发表时间】2024

【收录时间】2024-11-28

【文献类型】

【DOI】 10.1109/TITS.2024.3488184

Evaluating manufacturing plants readiness for distributed ledger technology: a network framework for ambiguity levels

【Author】 Babaei, Ardavan Tirkolaee, Erfan Babaee Ali, Sadia Samar

【影响因子】9.040

【主题类别】

--

【Abstract】The utilisation of blockchain technology has gained significant traction within contemporary supply chains owing to its ability to enhance transparency, security, and traceability. Manufacturing plants, as pivotal components of the supply chain, stand to benefit from improved tracking and transparency of goods movement, real-time visibility, quality control processes, and adherence to industry standards through blockchain implementation. Nonetheless, without a comprehensive assessment of manufacturing plants' readiness to embrace blockchain technology, the anticipated benefits may give way to unforeseen challenges. In this study, a novel network framework is offered to evaluate manufacturing plants' readiness for adopting distributed ledger technology, specifically blockchain, under varying levels of ambiguity, including high (fuzzy) and low (scenario) ambiguity. This framework is distinguished by its ability to address uncertainty in evaluations, incorporating both scenario-based and fuzzy programming approaches. Furthermore, the framework treats evaluation criteria as interconnected entities, fostering a network perspective rather than a black-box approach. The proposed framework is then validated through a case study involving five manufacturing plants and twenty-four evaluation criteria. Our findings underscore the pivotal role of uncertainty considerations in ranking manufacturing plants, with the fifth plant emerging as the frontrunner across both fuzzy and scenario-based assessments in most instances.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain adoption; manufacturing; supply chain management; fuzzy programming; scenario programming

【发表时间】2024

【收录时间】2024-11-28

【文献类型】

【DOI】 10.1080/23302674.2024.2426732

The State-of-the-Art and Promising Future of Blockchain Sharding

【Author】 Yang, Qinglin Huang, Huawei Yin, Zhaokang Lin, Yue Chen, Qinde Luo, Xiaofei Li, Taotao Liu, Xiulong Zheng, Zhibin

【影响因子】9.030

【主题类别】

--

【Abstract】Blockchain sharding is a significant technical area, improving the scalability of blockchain systems. It is regarded as one of the potential solutions that can achieve on-chain scaling, and significantly improve the scalability of blockchains without alleviating the decentralization feature of blockchain. To provide a reference and inspire participation from both the academic and industrial sectors in the area of blockchain sharding, we have researched the state-of-the-art studies published in the past three years. We have also conducted experiments to show the performance of representative sharding protocols such as Monoxide, LBF, Metis, and BrokerChain. We envision the potential challenges and promising future of sharding techniques in terms of the urgent demands of high throughput required by emerging applications such as Web3, Metaverse, and Decentralized Finance (DeFi). We hope that this article is helpful to researchers, engineers, and educators, and will inspire subsequent studies in the field of blockchain sharding.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Sharding; Blockchains; Relays; Scalability; Security; Smart contracts; Throughput; Finance; Surveys; Metaverse

【发表时间】2024

【收录时间】2024-11-28

【文献类型】

【DOI】 10.1109/MCOM.004.2400026

Unraveling the dynamic nexus: Green cryptocurrencies and their role in sustainable market evolution

【Author】 Peng, Pin Liang, Feifei Fu, Yaping Chen, Yanan Qiu, Lin-shu Qi, Haozhi

【影响因子】8.857

【主题类别】

--

【Abstract】This study explores the intricate relationships between green cryptocurrencies, traditional energy, and renewable energy stock markets using an innovative approach that combines time-frequency spillover analysis with crossquantile dependence methodologies. Our findings show a complicated network of market interactions that change over time and vary widely. In the short term, green cryptocurrencies and new energy equities emerge as pivotal drivers of market dynamics, showcasing their growing influence within traditional energy sectors. This interplay, however, is marked by significant temporal variations, with green cryptocurrencies demonstrating remarkable resilience to external shocks and increasingly becoming transmitters of volatility over time. The cross-quantile dependence analysis further highlights the conditional nature of these interactions, shedding light on the nuanced impact of green cryptocurrencies across different market conditions, particularly during periods of extreme market stress. These insights underscore the transformative role of green financial instruments in the context of the energy transition and sustainable development, offering important implications for investors, policymakers, and the strategic orientation of financial markets toward sustainability.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Green cryptocurrencies; Energy; Renewable energy stock; Oil; Interdependencies

【发表时间】2024

【收录时间】2024-11-28

【文献类型】

【DOI】 10.1016/j.energy.2024.133660

Private Metering in EV Charging Infrastructure: An OCPP Extension

【Author】 Kamal, Naheel Faisal Sharida, Ali Bayhan, Sertac Alnuweiri, Hussein Abu-Rub, Haitham

【影响因子】6.239

【主题类别】

--

【Abstract】The security of electrical vehicle (EV) charging systems has been improving over the past years. However, privacy concerns are yet to be addressed as profiling attacks can be accomplished on EV charging meter readings. This paper proposes a new communication protocol that preserves the privacy of users while retaining the aggregate metering values to be used by the EV charging management system. The proposed protocol extends the existing Open Charge Point Protocol (OCPP) specifications. OCPP is an open and widely used protocol for EV chargers but it provides no privacy-preserving mechanisms. Differential privacy concepts are applied in the proposed paper along with key masking to hide private data from different kinds of adversaries. A lightweight implementation of the proposed approach is implemented and tested on a hardware testbed to ensure the practicality of the implemented system. Experimental results and analysis show that this method is able to preserve the confidentiality of metering values with minimal computation.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Privacy; Electric vehicle charging; Security; Protocols; Vehicles; Meters; Differential privacy; EV charging; differential privacy; security; OCPP

【发表时间】2024

【收录时间】2024-11-28

【文献类型】

【DOI】 10.1109/TVT.2024.3403455

Modular-Based Compression Scheme for Address Data in the Blockchain System for IoV Applications

【Author】 Guo, Zhaohui Liu, Qiang Gao, Zhen Liu, Lei Gong, Yi Liu, Ximeng Kumar, Neeraj Guizani, Mohsen

【影响因子】6.239

【主题类别】

--

【Abstract】Asan emerging distributed ledger technology, blockchain provides multi-party trust between unreliable devices to share data and resources cooperatively, which facilitates the Internet of Vehicles (IoVs) applications. In the typical blockchain-enabled IoV (BIoV) scenarios, based on the data of common interest collected by various sensors, the IoV devices jointly maintain the world state in the form of address-balance pairs as the proof for transaction issuing and validation, where Ethereum-like blockchain is used as the finite-state machine driven by the transactions. However, with the extension of the IoV network, an enormous number of accounts leads to the explosive growth of the state data, which has been the main challenge for BIoV with resource-limited devices. This paper proposes a modular-based adaptive bit-width compression (ABC) scheme to reduce the state data storage on each device by representing the address as a remainder with a shorter bit-width. Besides, a new transaction validation method is designed with the support of the XOR filter, which guarantees that the core functions of the blockchain can still be performed normally with the proposed scheme applied. Theoretical analysis and simulation results show that the compression ratio for the address data could be more than 80%, which dramatically improves the scalability of BIoV system. In addition, the extra privacy-preserving property is introduced with the compression scheme because the account information is unrecoverable from the remainders.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchains; Real-time systems; Distributed ledger; Data structures; Smart contracts; Scalability; Proposals; Address compression; Blockchain-enabled Internet of Vehicles (BIoVs); modular arithmetic; privacy-preserving

【发表时间】2024

【收录时间】2024-11-28

【文献类型】

【DOI】 10.1109/TVT.2024.3411568

An innovative method for short-term forecasting of blockchain cryptocurrency price

【Author】 Yang, Yunfei Wang, Xiaomei Xiong, Jiamei Wu, Lifeng Zhang, Yifang

【影响因子】5.336

【主题类别】

--

【Abstract】Cryptocurrency market sentiment is relatively unstable, which makes cryptocurrency price an attribute of high volatility. Accurate forecasting methods help to clarify the volatility trend of the cryptocurrency price, thereby reducing the investment risk of participants in the cryptocurrency market. Therefore, this research proposed a new method for short-term forecasting of the cryptocurrency price based on a small sample. This study took three typical blockchain cryptocurrencies (Bitcoin, Ethereum, Litecoin) as experimental objects, chose data intervals with different volatility trends in the U.S. stock indices between 2022 and 2023 as sample data, and used grey correlation analysis to select core affecting variables. Furthermore, this study built a grey multivariate convolution model with prioritized accumulating novel information for conducting prediction experiments on blockchain cryptocurrency price. The research findings demonstrate that the proposed model achieves high prediction accuracy in all experiments, and the model accuracy is superior to the comparison models. This study proposes a scientific prediction approach for blockchain cryptocurrency price, which can guide financial investors in developing and analyzing quantitative financial trading strategies to a certain extent. Meanwhile, this study provides a specific reference for relevant government departments to strengthen cryptocurrency regulation, prevent financial risks, and maintain financial stability.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain cryptocurrency; Price forecasting; Grey convolution model; Grey correlation analysis; Short-term prediction

【发表时间】2025

【收录时间】2024-11-28

【文献类型】

【DOI】 10.1016/j.apm.2024.115795

Blockchain for supply chain: performance implications and contingencies

【Author】 Liu, Yan Wang, Qiang

【影响因子】4.803

【主题类别】

--

【Abstract】Purpose - This study aims to examine the performance implications of blockchain implementation in the supply chain and explore how blockchain functions and supply chain processes of blockchain implementation moderate the effect on firm performance. Design/methodology/approach - Using 220 blockchain implementations announced between January 2015 and December 2022, we use the event study methodology to estimate the effects of blockchain implementation on the firm value. Regression analyses are conducted to examine the moderating effects of blockchain functions and supply chain processes. Findings - First, there is a positive and statistically significant relationship between blockchain implementation in the supply chain and firm value. Second, we find that abnormal returns from blockchain implementation are higher when used with blockchain's contract automation function and applied in downstream processes, supporting the moderation effects. Originality/value - The study provides empirical evidence on the effects of the blockchain implementation on firm performance, taking into account the complexity of blockchain functions and supply chain processes. It enriches the current understanding of how blockchain implementation in the supply chain contributes to firm value.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain implementation; Supply chain processes; Blockchain functions; Event study; Signaling theory

【发表时间】2024

【收录时间】2024-11-28

【文献类型】

【DOI】 10.1108/IMDS-05-2024-0457

HARNESSING BLOCKCHAIN WITH ENSEMBLE DEEP LEARNING-BASED DISTRIBUTED DOS ATTACK DETECTION IN IOT-ASSISTED SECURE CONSUMER ELECTRONICS SYSTEMS

【Author】 Alrayes, Fatma S. Aljebreen, Mohammed Alghamdi, Mohammed Alrslani, Faheed A. F. Alshuhail, Asma Almukadi, Wafa Sulaiman Basheti, Iman Sharif, Mahir Mohammed

【影响因子】4.555

【主题类别】

--

【Abstract】Consumer electronics (CE) and the Internet of Things (IoTs) are transforming daily routines by integrating smart technology into household gadgets. IoT allows devices to link and communicate from the Internet with better functions, remote control, and automation of various complex systems simulation platforms. The quick progress in IoT technology has continuously driven the progress of further connected and intelligent CEs, shaping more smart cities and homes. Blockchain (BC) technology is emerging as a promising technology offering immutable distributed ledgers that improve the security and integrity of data. However, even with BC resilience, the IoT ecosystem remains vulnerable to Distributed Denial of Service (DDoS) attacks. In contrast, the malicious actor overwhelms the network with traffic, disrupting services and compromising device functionality. Incorporating BC with IoT infrastructure presents groundbreaking techniques to alleviate these threats. IoT networks can better detect and respond to DDoS attacks in real time by leveraging BC cryptographic techniques and decentralized consensus mechanisms, which safeguard against disruptions and enhance resilience. There must be a reliable mechanism of recognition based on adequate techniques to detect and identify whether these attacks have happened or not in the system. Artificial intelligence (A) is the most common technique that uses machine learning (ML) and deep learning (DL) to recognize cyber threats. This research presents a new Blockchain with Ensemble Deep Learning-based Distributed DoS Attack Detection (BCEDL-DDoSD) approach in the IoT platform. The primary intention of the BCEDL-DDoSD approach is to leverage BC with a DL-based attack recognition process in the IoT platform. BC technology is utilized to enable a secure data transmission process. In the BCEDL-DDoSD approach, Z-score normalization is initially employed to measure the input data. Besides, the selection of features takes place using the Fractal Wombat optimization algorithm (WOA). For attack recognition, the BCDL-DDoSD technique applies an ensemble of three models, namely denoising autoencoder (DAE), gated recurrent unit (GRU), and long short-term memory (LSTM). Lastly, an orca predator algorithm (OPA)-based hyperparameter tuning procedure has been implemented to select the parameter value of DL models. A sequence of simulations is made on the benchmark database to authorize the performance of the BCDL-DDoSD approach. The simulation results showed that the BCDL-DDoSD approach performs better than other DL techniques.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Consumer Electronics; Internet of Things; Cyberattacks; IDS; Distributed DoS Attack; Orca Predators Algorithm; Deep Learning; Blockchain; Complex Systems

【发表时间】2024

【收录时间】2024-11-28

【文献类型】

【DOI】 10.1142/S0218348X25400444

Reviewing the progress of infectious disease early warning systems and planning for the future

【Author】 Li, Ziqi Meng, Fancun Wu, Bing Kong, Dekun Geng, Mengying Qiu, Xintong Cao, Zicheng Li, Tiancheng Su, Yaqian Liu, Suyang

【影响因子】4.135

【主题类别】

--

【Abstract】BackgroundPast reviews of infectious disease early warning systems have encountered some limitations, such as a focus on specific diseases or regions in certain studies and constraints imposed by time delays in others. This study conducts a comprehensive analysis of infectious disease early warning systems, with a particular emphasis on assessing the development of these systems in the recent five years (2019 to 2023). The goal is to provide insights for future related research.MethodsA comprehensive retrospective review was undertaken, utilizing data sourced from four prominent databases: WanFang Data, China National Knowledge Infrastructure (CNKI), Web of Science, and PubMed. Following a meticulous classification process, a total of 49 articles aligning with our inclusion criteria were identified. To streamline the data collection and organization process, standardized extraction forms were employed, and data were efficiently organized using Microsoft Excel spreadsheet.ResultsThis study uncovered various warning systems, including health departments, hospitals, social media platforms, statistical bureaus, meteorological departments, and wastewater monitoring systems. Drawbacks of traditional manual and statistical models included slow responsiveness and a surge in suspected cases. In contrast, hospital-based systems utilizing blockchain and smart contract technologies efficiently shared patient data, facilitating precise disease identification. Social media systems harnessed sentiment analysis for outbreak prediction, while statistical bureau systems integrated economic and population data for a novel perspective. Meteorological systems served as valuable complements, particularly for locally transmitted diseases. Wastewater monitoring systems added support by detecting crucial biological markers.ConclusionThis article conducts an in-depth analysis of infectious disease early warning systems, including systems based on various data sources. Future efforts should integrate new technologies, along with healthcare and social data, to enhance the capabilities of early warning and prediction.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Infectious diseases; Early warning systems; Artificial intelligence; Public health surveillance

【发表时间】2024

【收录时间】2024-11-28

【文献类型】

【DOI】 10.1186/s12889-024-20537-2

Blockchain Technology and Corporate Performance: Empirical Evidence from Listed Companies in China

【Author】 Zhang, Jie Ruan, Chen

【影响因子】3.889

【主题类别】

--

【Abstract】Blockchain technology is widely recognized and adopted by many organizations, as it serves as a fundamental technological infrastructure for the digital economy. This has led to a rapid acceleration of industrial transformation and digital innovation. This study employs empirical data from a substantial sample to investigate the potential applications, strategies, and advantages of blockchain technology. This paper examines A-share listed companies in China from 2015 to 2021, offering valuable empirical insights that demonstrate how the implementation of blockchain technology can markedly improve corporate performance in a major global economy. The research in this paper examines the differential effects of blockchain technology by innovatively integrating financial and environmental performance metrics into an empirical model, revealing that implementing blockchain technology significantly enhances environmental performance. Furthermore, it has been observed that blockchain technology adoption can contribute to corporate performance by improving information transparency. It is worth noting that blockchain technology's influence on enterprises' performance exhibits discernible variations based on the ownership structure, environmental sensitivity, and technical features of said enterprises. This paper can be used as a guide for enterprises looking to implement blockchain technology and for governments seeking to develop digitalization legislation.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】blockchain technology; financial performance; environmental performance; information transparency

【发表时间】2024

【收录时间】2024-11-28

【文献类型】

【DOI】 10.3390/su16219177

Mechanism Analysis and Path Study of Digital Transformation on Corporate Governance: Evidence from Chinese Listed Companies

【Author】 Yang, Songling Tai, Yafei Liu, Jianing

【影响因子】3.889

【主题类别】

--

【Abstract】Corporate digital transformation, primarily driven by data and leveraging digital technologies and mathematical algorithms such as Internet+, big data, cloud computing, artificial intelligence, and blockchain, is a crucial enabler of sustainable development. This transformation integrates various aspects of corporate production and operations, enhancing the level of digital operations and ultimately contributing to high-quality and sustainable development. This paper, based on data from listed companies in China's A-shares from 2007 to 2021, theoretically articulates the intrinsic mechanism between corporate digital transformation and corporate governance level, with a focus on sustainability. It empirically finds that a higher degree of digital transformation correlates with an improved level of corporate governance, fostering sustainable practices. Further investigation reveals that digital transformation elevates corporate governance by enhancing innovation capabilities, reducing information asymmetry, and promoting sustainable strategies. This paper provides policy insights for promoting corporate digital transformation as a means to achieve sustainability goals and optimizing management's corporate governance level for long-term sustainable success.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】digital transformation; corporate governance; innovation capability; information asymmetry; sustainability

【发表时间】2024

【收录时间】2024-11-28

【文献类型】

【DOI】 10.3390/su16219245

Promoting Sustainable Household Engagement in Recycling via Blockchain-Based Loyalty Program

【Author】 Saeedi, Kawther

【影响因子】3.889

【主题类别】

--

【Abstract】Recycling plays a crucial role in impacting national GDP and environmental sustainability. Given the complexities inherent in recycling processes, technology serves as a driving force for advancing and optimizing these practices. In the Kingdom of Saudi Arabia, substantial initiatives are underway to foster a green environment and promote a circular economy. However, at the time of writing this paper, existing regulations mandate recycling primarily for business sectors, with no corresponding requirements for household waste collection or segregation. As a result, a significant portion of recyclable waste remains unprocessed. This paper expands upon earlier studies carried out in Jeddah, analyzing the obstacles and variables impacting sustainable recycling solutions, along with the essential conditions to boost household involvement in recycling. This study explores the potential of blockchain technology to improve household engagement by developing a blockchain-based loyalty program. The proposed system leverages the decentralized, immutable, and transparent features of blockchain technology to reward individuals with tokens for the recycling waste they produce, thereby facilitating token tracking across the recycling value chain and enhancing transparency in the circular economy. This article delves into the technical architecture of the loyalty program, aligning its domain model elements with blockchain design heuristics and integrating it with a mobile application that aims to boost recycling engagement by applying social economy principles. This innovative approach promises to overcome the current regulatory and motivational barriers, as well as promote sustainable recycling habits at the household level.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】tokenization; DApp; recycling value chain; rewording system; circular economy

【发表时间】2024

【收录时间】2024-11-28

【文献类型】

【DOI】 10.3390/su16219191

Artificial Intelligence in Logistics Optimization with Sustainable Criteria: A Review

【Author】 Chen, Wenwen Men, Yangchongyi Fuster, Noelia Osorio, Celia Juan, Angel A.

【影响因子】3.889

【主题类别】

--

【Abstract】In recent years, the integration of artificial intelligence (AI) into logistics optimization has gained significant attention, particularly concerning sustainability criteria. This article provides an overview of the diverse AI models and algorithms employed in logistics optimization, with a focus on sustainable practices. The discussion covers several techniques, including generative models, machine learning methods, metaheuristic algorithms, and their synergistic combinations with traditional optimization and simulation methods. By employing AI capabilities, logistics stakeholders can enhance decision-making processes, optimize resource utilization, and minimize environmental impacts. Moreover, this paper identifies and analyzes prominent challenges within sustainable logistics, such as reducing carbon emissions, minimizing waste generation, and optimizing transportation routes while considering ecological factors. Furthermore, the paper explores emerging trends in AI-driven logistics optimization, such as the integration of real-time data analytics, blockchain technology, and autonomous systems, which hold immense potential for enhancing efficiency and sustainability. Finally, the paper outlines future research directions, emphasizing the need for further exploration of hybrid AI approaches, robust optimization frameworks, and scalable solutions that accommodate dynamic and uncertain logistics environments.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】logistics; artificial intelligence; sustainability; optimization

【发表时间】2024

【收录时间】2024-11-28

【文献类型】

【DOI】 10.3390/su16219145

Adopting Circular Economy Principles: How Do Conflict Management Strategies Help Adopt Smart Technology in Jordanian SMEs?

【Author】 Almasri, Aydah Ying, Ma

【影响因子】3.889

【主题类别】

--

【Abstract】Smart technology is essential for integrating circular economy principles. This research investigates how conflict management strategies (collaboration, accommodation, avoidance, compromise, and competition) impact the adoption of smart technology, particularly blockchain, in Jordanian SMEs. Additionally, the study explores the moderating role of customer-centric green supply chain management in the relationship between blockchain adoption and circular economy principles. This research addresses a gap in the literature by focusing on Jordanian SMEs, an under-explored context. Data were collected from 421 senior managers, department heads, and executives of Jordanian SMEs, and analyzed using Partial Least Squares Structural Equation Modeling (PLS-SEM), to test the hypotheses and analyze complex relationships. The findings reveal that conflict management strategies are critical in blockchain adoption, with collaboration and compromise emerging as the most influential. Moreover, blockchain adoption positively impacts the implementation of circular economy principles. The moderating effect of customer-centric green supply chain management enhances the sustainability and competitiveness of SMEs through blockchain technology. This research contributes to theory and practice by providing valuable insights into the strategic role of conflict management in driving technological innovation and sustainability within the circular economy framework, particularly in the context of Jordanian SMEs.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】circular economy principles; blockchain adoption; conflict management strategies; customer-centric GSCM; Jordan; small and medium-sized enterprises (SMEs); green supply chain management

【发表时间】2024

【收录时间】2024-11-28

【文献类型】

【DOI】 10.3390/su16219475

Proof of Work with Random Selection (PoWR): An Energy Saving Consensus Algorithm with Proof of Work and the Random Selection Function

【Author】 Jung, Jin Woo Islam, Md. Mainul In, Hoh Peter

【影响因子】3.889

【主题类别】

--

【Abstract】Bitcoin, which has been used for 13 years, has a role in transactions and investments as a major cryptocurrency. However, as the number of users increases, Bitcoin faces difficulties, such as scalability for transaction throughput and energy-consumption problems due to the concentration of the mining pool. When Bitcoin first started to come out, it began to develop gradually through the mining of individuals. Nevertheless, as the price of the cryptocurrency gradually climbed, large mining corporation groups entered the mining competition with integrated circuit (IC) chips. Consequently, the substantial increase in power consumption is raising concerns regarding energy expenditure. This paper confirms that the verifiable random selection consensus protocol based on proof of work facilitates a fair and efficient system, enabling the participation of numerous individual miners in the mining competition while counteracting the monopolization of the hash rate by large mining corporations, thereby preserving the decentralization of mining. The protocol demonstrates the potential to mitigate substantial energy consumption. Moreover, it embodies features that create barriers to the adoption of high-energy-consuming application-specific integrated circuit equipment, significantly diminishing the principal factors contributing to extensive power utilization.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】blockchain; proof of work; energy saving; random selection; public blockchain network; consensus algorithm; sustainable blockchain; inclusive blockchain

【发表时间】2024

【收录时间】2024-11-28

【文献类型】

【DOI】 10.3390/su16219342

Message Verification Protocol Based on Bilinear Pairings and Elliptic Curves for Enhanced Security in Vehicular Ad Hoc Networks

【Author】 Nyangaresi, Vincent Omollo Ghaib, Arkan A. Jasim, Hend Muslim Abduljabbar, Zaid Ameen Ma, Junchao Al Sibahee, Mustafa A. Aldarwish, Abdulla J. Y. Ali, Ali Hasan Neamah, Husam A.

【影响因子】3.860

【主题类别】

--

【Abstract】Vehicular ad hoc networks (VANETs) provide intelligent navigation and efficient route management, resulting in time savings and cost reductions in the transportation sector. However, the exchange of beacons and messages over public channels among vehicles and roadside units renders these networks vulnerable to numerous attacks and privacy violations. To address these challenges, several privacy and security preservation protocols based on blockchain and public key cryptography have been proposed recently. However, most of these schemes are limited by a long execution time and massive communication costs, which make them inefficient for on-board units (OBUs). Additionally, some of them are still susceptible to many attacks. As such, this study presents a novel protocol based on the fusion of elliptic curve cryptography (ECC) and bilinear pairing (BP) operations. The formal security analysis is accomplished using the Burrows-Abadi-Needham (BAN) logic, demonstrating that our scheme is verifiably secure. The proposed scheme's informal security assessment also shows that it provides salient security features, such as non-repudiation, anonymity, and unlinkability. Moreover, the scheme is shown to be resilient against attacks, such as packet replays, forgeries, message falsifications, and impersonations. From the performance perspective, this protocol yields a 37.88% reduction in communication overheads and a 44.44% improvement in the supported security features. Therefore, the proposed scheme can be deployed in VANETs to provide robust security at low overheads.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Attacks; bilinear; elliptic curve cryptography (ECC); privacy; security; vehicular ad hoc network (VANET)

【发表时间】2024

【收录时间】2024-11-28

【文献类型】

【DOI】 10.32604/cmc.2024.053854

Leveraging Sharding-Based Hybrid Consensus for Blockchain

【Author】 Baageel, Hind Rahman, Md Mahfuzur

【影响因子】3.860

【主题类别】

--

【Abstract】The advent of blockchain technology has transformed traditional methods of information exchange, shifting reliance from centralized data centers to decentralized frameworks. While blockchain's decentralization and security are strengths, traditional consensus mechanisms like Proof of Work (PoW) and Proof of Stake (PoS) face limitations in scalability.PoW achieves decentralization and security but struggles with scalability as transaction volumes grow, while PoS enhances scalability, but risks centralization due to monopolization by high-stake participants. Sharding, a recent advancement in blockchain technology, addresses scalability by partitioning the network into shards that process transactions independently, thereby improving throughput and reducing latency. However, cross-shard communication, essential for transactions involving multiple shards, introduces challenges in coordination and fault tolerance. This research introduces a shard-based hybrid consensus model, PoSW, which combines PoW and PoS to mitigate the limitations of both mechanisms. By integrating PoW's fairness with PoS's scalability in a shard-based blockchain, the proposed model addresses key issues of scalability and monopolization. We evaluate the model against state-of-the-art consensus algorithms, including Monoxide and Practical Byzantine Fault Tolerance (PBFT). The results show that the proposed PoSW model reduces communication overhead compared to PBFT and improves resource utilization over Monoxide. In addition to performance gains, the security analysis demonstrates that the PoSW model provides robust defense against common blockchain attacks such as the 51% and Sybil attacks, etc. The proposed approach is particularly suited for applications like decentralized finance (DeFi) and supply chain management, which require both high scalability and robust security. The contributions of this research include the development of the PoSW hybrid consensus mechanism, its comparative evaluation with leading algorithms, and a thorough security analysis. These contributions represent a significant step forward in addressing blockchain's scalability, fairness, and security challenges.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; consensus algorithm; decentralized network

【发表时间】2024

【收录时间】2024-11-28

【文献类型】

【DOI】 10.32604/cmc.2024.055908

Information flow in the FTX bankruptcy: A network approach

【Author】 De Blasis, Riccardo Galati, Luca Grassi, Rosanna Rizzini, Giorgio

【影响因子】3.778

【主题类别】

--

【Abstract】This paper investigates the cryptocurrency network of the FTX exchange during the collapse of its native token, FTT, to understand how network structures adapt to significant financial disruptions, by exploiting vertex centrality measures. Using proprietary data on the transactional relationships between various cryptocurrencies, we construct the filtered correlation matrix to identify the most significant relations in the FTX and Binance markets. By using suitable centrality measures - closeness and information centrality - we assess network stability during FTX's bankruptcy. The findings document the appropriateness of such vertex centralities in understanding the resilience and vulnerabilities of financial networks. By tracking the changes in centrality values before and during the FTX crisis, this study provides useful insights into the structural dynamics of the cryptocurrency market. Results reveal how different cryptocurrencies experienced shifts in their network roles due to the crisis. Moreover, our findings highlight the interconnectedness of cryptocurrency markets and how the failure of a single entity can lead to widespread repercussions that destabilize other nodes of the network.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Bankruptcy; Centrality measures; Cryptocurrency market; Decentralized finance; Complex networks

【发表时间】2024

【收录时间】2024-11-28

【文献类型】

【DOI】 10.1016/j.physa.2024.130167

On the Integration of Artificial Intelligence and Blockchain Technology: A Perspective About Security (vol 12, pg 3881, 2024)

【Author】 Kuznetsov, Oleksandr Sernani, Paolo Romeo, Luca Frontoni, Emanuele Mancini, Adriano

【影响因子】3.476

【主题类别】

--

【Abstract】

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchains; Security; Artificial intelligence

【发表时间】2024

【收录时间】2024-11-28

【文献类型】

【DOI】 10.1109/ACCESS.2024.3487273

Blockchain in Luxury Resale: The Impact of Blockchain Technology Through Regulatory Focus and Uncertainty Reduction Theories

【Author】 Swazan, Ishtehar Sharif Youn, Song-yi

【影响因子】3.199

【主题类别】

--

【Abstract】The exponential growth of the online luxury resale market has spurred a notable shift toward a circular economy, reflecting the increasing consumer preference for pre-owned luxury items. Nevertheless, this growth presents challenges related to product authenticity and seller credibility. In response to these concerns, blockchain technology (BT) emerges as a promising solution, leveraging a decentralized ledger to enhance transparency and reduce information asymmetry. This allows for the traceability of pre-owned luxury goods, addressing issues of provenance and authenticity in the online resale space. By incorporating regulatory focus theory into the uncertainty reduction theory, this study examines how approach and avoidance motivations impact evaluations of BT-enabled platforms to effectively mitigate consumer uncertainties and influence trust. The collected data (N= 511) was analyzed through partial least squares structural equation modeling (PLS-SEM; study 1), and a complementary qualitative study (study 2) was additionally conducted. Results reveal that distinct motivations coexist, each following separate pathways to build consumer trust. Findings indicate that an approach orientation mindset highly values the reliability of BT-enabled information, while an avoidance orientation focuses on risk mitigation and expresses heightened uncertainty in online transactions. Consequently, BT is found to be instrumental in reducing consumer concerns about purchasing pre-owned luxury products. The study contributes to the existing literature by shedding light on the psychological dynamics influencing consumer trust in BT-enabled platforms, has implications for luxury retailers contemplating BT integration, and offers insights into consumer behavior that can inform strategies to enhance perceived trust in online luxury resale.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】blockchain technology; circular economy; information traceability; regulatory focus theory; second-hand luxury

【发表时间】2024

【收录时间】2024-11-28

【文献类型】

【DOI】 10.1002/cb.2433

Digital surveillance capitalism and cities: data, democracy and activism

【Author】 Makanadar, Ashish

【影响因子】2.731

【主题类别】

--

【Abstract】The rapid convergence of urbanization and digital technologies is fundamentally reshaping city governance through data-driven systems. This transformation, however, is largely controlled by surveillance capitalist entities, raising profound concerns for democratic values and citizen rights. As private interests extract behavioral data from public spaces without adequate oversight, the principles of transparency and civic participation are increasingly threatened. This erosion of data sovereignty represents a critical juncture in urban development, demanding urgent interdisciplinary attention. This comment proposes a paradigm shift in urban data governance, advocating for the reclamation of data sovereignty to prioritize community interests over corporate profit motives. The paper explores socio-technical pathways to achieve this goal, focusing on grassroots approaches that assert 'data dignity' through privacy-enhancing technologies and digital anonymity tools. It argues for the creation of distributed digital commons as viable alternatives to proprietary data silos, thereby democratizing access to and control over urban data. The discussion extends to long-term strategies, examining the potential of blockchain technologies and decentralized autonomous organizations in enabling self-sovereign data economies. These emerging models offer a vision of 'crypto-cities' liberated from extractive data practices, fostering environments where residents retain autonomy over their digital footprints. By critically evaluating these approaches, the paper aims to catalyze a reimagining of smart city technologies aligned with principles of equity, shared prosperity, and citizen empowerment. This realignment is essential for preserving democratic values in an increasingly digitized urban landscape.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】

【发表时间】2024

【收录时间】2024-11-28

【文献类型】

【DOI】 10.1057/s41599-024-03941-2

Blockchain: for safer dental AI

【Author】 Sundararajan, P. Kaur, N. Moturi, K.

【影响因子】2.727

【主题类别】

--

【Abstract】

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】

【发表时间】2024

【收录时间】2024-11-28

【文献类型】

【DOI】 10.1038/s41415-024-7971-x

Dynamic-EC: an efficient dynamic erasure coding method for permissioned blockchain systems

【Author】 Zhang, Mizhipeng Wu, Chentao Li, Jie Guo, Minyi

CCF-B

【影响因子】2.669

【主题类别】

--

【Abstract】Blockchain as a decentralized storage technology is widely used in many fields. It has extremely strict requirements for reliability because there are many potentially malicious nodes. Generally, blockchain is a chain storage structure formed by interconnecting blocks, which are stored by full replication method, where each node stores a replica of all blocks and the data consistency is maintained by the consensus protocol. To decrease the storage overhead, previous approaches such as BFT-Store and Partition Chain store blocks via erasure codes. However, existing erasure coding based methods utilize static encoding schema to tolerant f malicious nodes, but in the typical cases, the number of malicious nodes is much smaller than f as described in previous literatures. Using redundant parities to tolerate excessive malicious nodes introduces unnecessary storage overhead.To solve the above problem, we propose Dynamic-EC, which is a Dynamic Erasure Coding method in permissioned blockchain systems. The key idea of Dynamic-EC is to reduce the storage overhead by dynamically adjusting the total number of parities according to the risk level of the whole system, which is determined by the number of perceived malicious nodes, while ensuring the system reliability. To demonstrate the effectiveness of Dynamic-EC, we conduct several experiments on an open source blockchain software Tendermint. The results show that, compared to the state-of-the-art erasure coding methods, Dynamic-EC reduces the storage overhead by up to 42%, and decreases the average write latency of blocks by up to 25%, respectively.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】blockchain; Byzantine Fault Tolerance (BFT); erasure coding; consensus; reputation evaluation

【发表时间】2025

【收录时间】2024-11-28

【文献类型】

【DOI】 10.1007/s11704-023-3209-3

DiabeticChain: a novel blockchain approach for patient-centric diabetic data management

【Author】 Mishra, Deepak Kumar Mehra, Pawan Singh

【影响因子】2.557

【主题类别】

--

【Abstract】While medical IoT data complexity surges, managing healthcare for chronic ailments like diabetes remains stagnant. Our innovative approach, DiabeticChain, not only addresses this but also introduces unique methodologies that set it apart in the realm of diabetic data management. Current healthcare architectures face significant research gaps including privacy and security concerns in sharing sensitive diabetic data, lack of patient data ownership, data fragmentation, interoperability issues, reliance on centralized authorities and ethical concerns laying the foundation for the novel solution DiabeticChain offers. Blockchain, a decentralized distributive ledger technology, can revolutionize data sharing with immutability, transparency and traceability. This paper proposes DiabeticChain, a permissioned blockchain-based, patient-centric healthcare architecture, addressing the key challenge of empowering patients to grant or revoke access to their diabetic data enabling secure sharing while safeguarding patient privacy. DiabeticChain allows data consumers to access patients' data as per their agreed-upon consent policy, using Solidity smart contracts, developed, tested and deployed using the truffle framework. A hybrid model is used for data storage to store confidential diabetic data in an off-chain secure database while keeping only metadata on the blockchain. The study includes a proof-of-concept using Go-Ethereum to establish a permissioned blockchain and ChainLink for secure smart contract connectivity to off-chain resources. Performance was evaluated using four Azure hosted VMs and Hyperledger Caliper utilizing throughput and latency as key performance metrics to validate effectiveness. Results depict the system's feasibility with an average Query throughput of 201.7 tps, an average Transaction throughput of 200.07 tps, an average Query latency of 0.24 s and an average Transaction latency of 1.31 s. The architecture is designed to seamlessly integrate with existing EHR systems, promoting efficient data sharing within the healthcare industry.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Permissioned blockchain; Patient-centric; Smart contracts; Electronic Health Records (EHRs); Diabetic data sharing

【发表时间】2025

【收录时间】2024-11-28

【文献类型】

【DOI】 10.1007/s11227-024-06589-6

A systematic review on federated learning system: a new paradigm to machine learning

【Author】 Chaudhary, Rajesh Kumar Kumar, Ravinder Saxena, Nitin

CCF-B

【影响因子】2.531

【主题类别】

--

【Abstract】Federated learning is a machine learning technique that permits clients to train the model at a local site in a collaborative manner. It builds a global shared model on the basis of updates of the local model without exchanging data among multiple devices. Federated learning was introduced in 2016 with the goal of enabling local training as well as distributed machine learning training at the edge node's level. It plays a vital role in terms of preserving the privacy of data while training the machine learning model on multiple devices. However, the introduction of federated learning into real-world applications exposes certain challenges in the training process, which affect the overall efficacy and efficiency of the federated learning model in real-world scenarios. As a result, an increasing number of researchers are now focusing on tackling the issues of FL and exploring various efficient research approaches to overcome these current obstacles. This paper systematically provides a detailed overview of federated learning, covering its definition, the need behind its development, privacy concepts, characteristics, and brief knowledge regarding different system components of federated learning. Different open-source frameworks that are available and used for implementing and solving problems related to federated learning have also been addressed in this article. Beyond this, the taxonomy of federated learning systems and different architectures for the same have also been discussed. In this paper, a brief comparison of related concepts with federated learning and a comparison among existing and popular federated learning studies proposed in different articles in the area of federated learning have also been summarized. In addition to the above-stated information, this article also provides brief information and a summary of various application areas of federated learning. Lastly, this paper briefly addresses the different challenges and prospects of research that lead to progress in this field.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Federated learning; Machine learning; Privacy; Data partitioning; Model; Heterogeneity

【发表时间】2024

【收录时间】2024-11-28

【文献类型】

【DOI】 10.1007/s10115-024-02257-6

A sustainable net-zero approach to eco-friendly retail: Insights from psychology and blockchain

【Author】 Liu, Fangyi

【影响因子】2.291

【主题类别】

--

【Abstract】

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】

【发表时间】2024

【收录时间】2024-11-28

【文献类型】

【DOI】

A privacy-preserving quantum authentication for vehicular communication

【Author】 Challagundla, Koushik Sutradhar, Kartick

【影响因子】1.965

【主题类别】

--

【Abstract】Vehicular ad hoc networks (VANETs) involve the interconnection of numerous vehicles, enabling them to communicate vital information through a network designed for efficient vehicle-to-vehicle communication. This dynamic connectivity in VANETs allows for spontaneous communication among random vehicles, fostering real-time exchange of critical data such as traffic conditions, road hazards, and other relevant information. This cooperative network improves road safety and traffic efficiency by allowing vehicles to exchange information and respond to the ever-changing conditions in their proximity, leading to an overall enhancement in the transportation system. In this paper, we propose an authentication protocol that remains unconditionally secure against quantum attacks. This paper explores the integration of quantum authentication with blockchain technology to establish a secure framework for VANETs. We introduce a quantum blockchain framework aimed at augmenting the security of VANETs. The paper presents a comprehensive analysis of the quantum blockchain's potential to mitigate common security threats in VANETs, including data tampering, eavesdropping, and unauthorized access.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Quantum blockchain; vehicular ad hoc network; quantum teleportation; secure quantum communication

【发表时间】2024

【收录时间】2024-11-28

【文献类型】

【DOI】 10.1007/s11128-024-04582-9

Quantile correlation between fintech stocks and crypto-assets

【Author】 Abakah, Emmanuel Joel Aikins Tiwari, Aviral Kumar Karikari, Nana Kwasi Agbloyor, Elikplimi Komla Lee, Chi-Chuan

【影响因子】1.916

【主题类别】

--

【Abstract】This research explores the dependence, directional predictability and dynamic co-movement between fintech and cryptocurrency markets from July 2016 to March 2021 using a series of quantile-based coherency techniques. The causality-in-quantiles results show a considerable difference between causality-in-mean and in-variance under different market conditions. For cross-quantilogram analysis, we observe minimal directional predictability between cryptocurrencies and fintech both in the short-run and in the long-run under bearish and bullish market states. From wavelet multiple cross-correlation models, we show that cryptocurrencies maximize multiple correlation compared to fintech across all time scales, denoting that cryptocurrencies are most dependent on fintech for all wavelet scales.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Fintech; cryptocurrencies; quantile dependence; directional predictability; cross-quantilogram, wavelets; C32; C58; G11; G21

【发表时间】2024

【收录时间】2024-11-28

【文献类型】

【DOI】 10.1080/00036846.2024.2423898

Cloud edge integrated security architecture of new cloud manufacturing system

【Author】 Zhao, Longbo Li, Bohu Yuan, Haitao

【影响因子】1.363

【主题类别】

--

【Abstract】With the rapid development of cloud manufacturing technology and the new generation of artificial intelligence technology, the new cloud manufacturing system (NCMS) built on the connotation of cloud manufacturing 3.0 presents a new business model of "Internet of everything, intelligent leading, data driving, shared services, cross-border integration, and universal innovation". The network boundaries are becoming increasingly blurred, NCMS is facing security risks such as equipment unauthorized use, account theft, static and extensive access control policies, unauthorized access, supply chain attacks, sensitive data leaks, and industrial control vulnerability attacks. Traditional security architectures mainly use information security technology, which cannot meet the active security protection requirements of NCMS. In order to solve the above problems, this paper proposes an integrated cloud-edge-terminal security system architecture of NCMS. It adopts the zero trust concept and effectively integrates multiple security capabilities such as network, equipment, cloud computing environment, application, identity, and data. It adopts a new access control mode of "continuous verification + dynamic authorization", classified access control mechanisms such as attribute-based access control, role- based access control, policy-based access control, and a new data security protection system based on blockchain, achieving "trustworthy subject identity, controllable access behavior, and effective protection of subject and object resources". This architecture provides an active security protection method for NCMS in the digital transformation of large enterprises, and can effectively enhance network security protection capabilities and cope with increasingly severe network security situations.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】new cloud manufacturing system (NCMS); integrated cloud-edge-terminal; security system architecture; zero trust

【发表时间】2024

【收录时间】2024-11-28

【文献类型】

【DOI】 10.23919/JSEE.2024.000112

Public Verifiable Privacy-Preserving Multi-Party Computation on Blockchain

【Author】 Zhang, Ziyan Chen, Liquan Jiang, Xinzao Yang, Bo

【影响因子】

【主题类别】

--

【Abstract】This paper introduces a novel framework for verifiable privacy-preserving computation on the blockchain, addressing the challenges of managing confidential transactions within the transparent and distributed ledger. The proposed framework leverages Secure Multi-Party Computation (MPC) and integrates it with blockchain technology to ensure both privacy and public verifiability of computation results. Notably, in our framework, the primary computation occurs off-chain to avoid the inefficiencies of smart contracts, while the results are uploaded to the blockchain for immutability and public verification. Furthermore, through the adoption of a zkRollup-like design and the selection of an efficient MPC algorithm, our framework demonstrates robust structural scalability and low communication complexity compared to other similar approaches.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】secure multiparty computation; blockchain; honest majority; malicious-secure

【发表时间】2024

【收录时间】2024-11-28

【文献类型】

【DOI】 10.1109/ICSIP61881.2024.10671422

Research on Blockchain Enabled Supply Chain Financing Under Option Contracts

【Author】 Yang, Ke Huang, Jing Chen, LiHao

【影响因子】

【主题类别】

--

【Abstract】The development of enterprises can not be separated from the support of the financial industry, SMEs financing process is difficult, financing difficulties are many SMEs in the reality of the problem faced in the operation, due to many SMEs own credit is low, it is difficult to finance loans from banks and other third-party institutions, resulting in SMEs because of the lack of funds can not be production and business operations, affecting the development of SMEs, and the core business can provide trade credit financing to solve the financing difficulties of SMEs. Consider a secondary supply chain consisting of well-funded suppliers and capital-constrained retailers, with the suppliers as the leaders of the stackelberg game and the retailers as the followers. When the retailer is capital constrained, the supplier can provide trade credit financing for it, and the introduction of blockchain technology can facilitate the increase of market demand to some extent. In this paper, we study the retailer's optimal decision-making and the impact of blockchain technology on the profits of both parties by simultaneously introducing option contracts and establishing two models of traditional financing and blockchain financing.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】option contracts; blockchain technology; commercial credit financing

【发表时间】2024

【收录时间】2024-11-28

【文献类型】

【DOI】 10.1007/978-3-031-60324-2_36

SDN Based Network Path Planning Optimization for Printing Cloud Service

【Author】 Peng, Jiajun He, Qian Pan, Qi Liu, Yanbo

【影响因子】

【主题类别】

--

【Abstract】With the rapid development of information technology and the widespread application of cloud computing, cloud printing services have become an efficient and convenient printing solution, widely used in modern offices and corporate environments. However, as the scale of cloud printing services expands and users' expectations for service quality increase, the system faces several challenges. Among them, monitoring the status of resources such as computing, storage, and application services, as well as reliable data transmission path planning, have become critical issues. In response to these challenges, this paper aims to provide intelligent printing terminal routing strategies for ZhuhaiXinye Electronic Technology Company, ensuring comprehensive reliability for different levels of business transmission. This study proposes aQoS-aware path planning mechanism based on Software-Defined Networking (SDN) to address the prioritization and packet loss issues during the massive real-time data transmission in cloud-edge collaboration. The mechanism allows flexible adjustment of network resource demands and priorities for different levels of business through SDN. Additionally, it incorporates blockchain technology to store path planning and alert issuance flow table information, ensuring the traceability of business path and alert information.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Cloud-edge collaboration; SDN; Blockchain; Network resource optimization

【发表时间】2024

【收录时间】2024-11-28

【文献类型】

【DOI】 10.1007/978-981-97-3890-8_12

Credit Risk Management Innovation in Bank Based on Blockchain Technology

【Author】 Mutamimah, Mutamimah Alifah, Suryani Adnjani, Made Dwi

【影响因子】

【主题类别】

--

【Abstract】This study develops the concept of credit risk management innovation in banks based on blockchain technology. Credit risk management includes identification, measurement, assessment, and evaluation of creditworthiness for MSMEs. Asymmetric information between banks and MSMEs, as well as the requirements for applying for credit using traditional approaches that still use physical documents or photocopies, leads to the potential for MSMEs to do moral hazard and falsification data. This causes the assessment of eligibility to obtain credit based only on bank perceptions which are not based on real data so that MSME credit risk increases. Therefore, in the current digital era, it is necessary to develop a credit risk management concept for banks based on blockchain technology. The research method uses an integrative literature review by analyzing, reviewing, and critiquing articles as a basis for compiling a bank credit risk management framework based on blockchain technology. This study can conclude that the technology of blockchain can be used as a new approach to bank credit risk management, starting from the process of identifying, measuring, assessing, and making decisions about potential credit risks. Thus, blockchain technology can decrease asymmetric information, and increase transparency, and trust, because it uses smart contracts so all stakeholders can monitor the business activities of other stakeholders in the digital blockchain, there are no third parties and no one can falsify data, which can further reduce credit risk.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Credit risk management innovation; Asymmetric information; Blockchain technology

【发表时间】2024

【收录时间】2024-11-28

【文献类型】

【DOI】 10.1007/978-981-97-3556-3_3

Byzantine Fault Detection in Swarm-SLAM Using Blockchain and Geometric Constraints

【Author】 Moroncelli, Angelo Pacheco, Alexandre Strobel, Volker Lajoie, Pierre-Yves Dorigo, Marco Reina, Andreagiovanni

【影响因子】

【主题类别】

--

【Abstract】Effective methods for Simultaneous Localisation And Mapping (SLAM) are key to enabling autonomous robots to navigate unknown environments. Multi-robot collaborative SLAM (C-SLAM) offers the opportunity for higher performance thanks to parallel execution of mapping and localisation by a distributed team of robots but it also introduces challenges in system scalability and consistent data aggregation, exposing the system to potential security risks. In particular, we show that the state-of-the-art decentralised C-SLAM framework for swarm robotics is vulnerable to Byzantine robots, which are robots that behave incorrectly, possibly due to malfunctioning or hacking. We propose a solution that uses a blockchain to achieve data consistency and a smart contract that manages robots' reputations to identify and neutralise Byzantine robots. Each robot's contribution to collaborative mapping is peer-reviewed by other robots by verifying its correctness through geometric constraints. Our multi-robot simulation results show the existence of a trade-off between fault tolerance and efficiency in terms of map generation speed. With this work, we also release open-source research software that interfaces a custom blockchain with the ROS 2 framework.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】

【发表时间】2024

【收录时间】2024-11-28

【文献类型】

【DOI】 10.1007/978-3-031-70932-6_4

Towards Atomicity and Composability in Cross-Chain NFTs

【Author】 Lim, Yong Zhi Perry, Wen Qing Ong Zhou, Jianying

【影响因子】

【主题类别】

--

【Abstract】Non-Fungible Tokens (NFTs) have created new and interesting ways to own digital assets. Our work defines non-fungible tokens as a pair and addresses challenges in cross-chain NFT transfers, particularly on interoperability between siloed blockchains. We develop a methodology and propose a Greed Factor to prioritize various hashing methods for detecting duplicates. Our practical approach marks an advancement over existing methods by using an analysis of over 400,000 real-world NFTs across 50 collections, which is easily applicable to existing bridges. The experimental results show the limitations of current implementations, and we offer insights to strengthen their functionality and foster the future growth of NFTs.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】blockchain; cross-chain bridges; non-fungible token

【发表时间】2024

【收录时间】2024-11-28

【文献类型】

【DOI】 10.1007/978-3-031-65172-4_6

The Impact of Blockchain Traceability Information on Product Sales in e-Commerce Platforms

【Author】 Li, Mingqian Du, Rong

【影响因子】

【主题类别】

--

【Abstract】Blockchain traceability system can address the problem of information asymmetry, thereby influencing consumer purchasing decisions. However, its efficacy within the context of e-commerce platforms remains unclear. To address this issue, we analyzed the impact of blockchain traceability on product sales based on cue utilization theory and using a quasi-natural experiment on the JD Mall e-commerce platform. Empirical analyses show that blockchain traceability information not only promotes product sales growth, but also alleviates consumers' reliance on electronic word-of-mouth. In addition, products with lower brand reputation benefit more from implementing blockchain traceability information. The findings of this study help retailers recognise the potential and application conditions of blockchain traceability information, and provide management insights for e-commerce platforms to adopt blockchain traceability systems.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain traceability information; Electronic word-of-mouth (eWOM); Brand reputation; Cue utilization theory

【发表时间】2024

【收录时间】2024-11-28

【文献类型】

【DOI】 10.1007/978-3-031-60324-2_4

Cryptocurrency Transaction Fraud Detection Based on Imbalanced Classification with Interpretable Analysis

【Author】 Jiang, Wenlong Yin, Pei Zhu, Wangwei

【影响因子】

【主题类别】

--

【Abstract】Given the significant distribution disparity between normal and fraudulent transaction data in cryptocurrency samples, as well as the complex high-dimensional nature of transaction data with non-linear relationships, this study introduces an interpretable imbalanced data classification method for detecting cryptocurrency transaction fraud. We address data imbalance using SMOTE over-sampling and data augmentation through contrastive learning. Next, we introduce a Transformer-based deep learning model that learns sample relevance. The model undergoes pre-training with a contrastive loss and fine-tuning through Bayesian optimization to effectively extract high-dimensional, higher-order, and fraud-related features. We employ a SHAP-based interpreter along with attention scores to elucidate the role of various transaction features in fraud detection. Comparative results demonstrate the model's remarkable recall performance in identifying cryptocurrency transaction fraud. Furthermore, it achieves an excellent F1 value, striking a balance between accuracy and recall. Ablation experiments affirm the necessity of the proposed data balancing and pre-training-fine-tuning strategies, highlighting their effectiveness in addressing imbalanced data classification issues. This research not only enriches financial fraud detection but also enhances cryptocurrency transaction security, promotes market development, and contributes to economic stability and social security.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】cryptocurrency; fraud detection; extremely imbalanced data classification; interpretable analysis

【发表时间】2024

【收录时间】2024-11-28

【文献类型】

【DOI】 10.1007/978-3-031-60260-3_32

Group-Level Behavioral Switch in a Robot Swarm Using Blockchain

【Author】 Gupta, Himank Strobel, Volker Pacheco, Alexandre Ferrante, Eliseo Natalizio, Enrico Dorigo, Marco

【影响因子】

【主题类别】

--

【Abstract】In this paper, we introduce the concept of group-level behavioral switch (GLBS) in a robot swarm. We consider two distinct types of GLBS that differ in whether or not the individual robots in the group need to switch their behavior at the same time: the Synchronous GLBS (S-GLBS) and the Asynchronous GLBS (A-GLBS). To implement these GLBSs, we propose a blockchain-based solution built on the Ethereum platform. We then study its performance in terms of required time and success rate in a series of simulation experiments.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】

【发表时间】2024

【收录时间】2024-11-28

【文献类型】

【DOI】 10.1007/978-3-031-70932-6_8

Analysis of Securing Edge-Cloud Computing and Network Based Deep Neural Intrusion Detection System as a Solution Model

【Author】 Girma, Anteneh Tamirat, Marshet

【影响因子】

【主题类别】

--

【Abstract】Edge cloud technologies have transformed the way enterprises handle data processing, disaster recovery, and data protection. Moving computing resources closer to the network's edge enables the edge cloud to deliver faster processing, lower latency, reliable data recovery and backups, enhanced scalability, and optimized bandwidth utilization. However, in comparison to traditional data-centers, this transition poses additional issues. A comparative analysis of business demands is required to guarantee that edge cloud computing meets specific criteria such as high performance, data protection, and data security. Nonetheless, there are challenges relating to disaster data recovery, network infrastructure, and standardization that must be overcome in order to fully exploit the potential of the edge cloud. In this context, the role of edge cloud solutions in disaster response and emergency management systems, as well as their impact on data backup, resource flexibility, and risk mitigation, requires further investigation. To ensure data security in edge cloud technology, blockchain plays a vital role; however, this architecture has limitations, specifically in disaster recovery scenarios. To address the limitations of blockchain architecture in edge cloud computing and to maintain data privacy and security in the edge cloud, we propose integrating a deep neural network (DNN) based intrusion detection system (IDS) model into the edge cloud architecture. This solution aims to enhance the security of the edge cloud while mitigating latency issues caused by blockchain, particularly in environments with high data recovery and emergency management requirements. We assessed our proposed DNN based IDS model using a publicly available intrusion dataset. Result shows that integrating DNN-based IDS into the edge cloud improves latency issues arising from the blockchain architecture during the data recovery and emergency management scenario.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Deep learning IDS; Edge-cloud computing; Data privacy; Security; Blockchain

【发表时间】2024

【收录时间】2024-11-28

【文献类型】

【DOI】 10.1007/978-3-031-66329-1_28

Incentivized Federated Learning with Local Differential Privacy Using Permissioned Blockchains

【Author】 De Chaudhury, Saptarshi Reddy, Likhith Varun, Matta Sengupta, Tirthankar Chakraborty, Sandip Sural, Shamik Vaidya, Jaideep Atluri, Vijayalakshmi

【影响因子】

【主题类别】

--

【Abstract】Federated Learning (FL) is a collaborative machine learning approach that enables data owning nodes to retain their data locally, preventing its transfer to a central server. It involves sharing only the local model parameters with the server to update a global model, which is then disseminated back to the local nodes. Despite its iterative convergence, FL has several limitations, such as the risk of single-point failure, inadequate incentives for participating nodes, and potential privacy breaches. While Local Differential Privacy (LDP) is often used to mitigate privacy concerns, the other challenges of FL have not yet been addressed comprehensively, even for Locally Differentially Private Federated Learning (LDP-FL). We propose an integrated approach that uses permissioned blockchains to guard against a single point of failure and a token-based incentivization (TBI) mechanism for encouraging participation in LDPFL. In our scheme, participating nodes receive tokens upon sharing their model parameters, which can subsequently be used to access updated global models. The number of tokens awarded for parameter sharing is determined by epsilon - the privacy factor of LDP, ensuring that the nodes do not overly obfuscate the data they share. We demonstrate the feasibility of our approach by developing the Blockchain-based TBI-LDP-FL framework (hereinafter, referred to as BTLF) on HyperLedger Fabric. Extensive results of experimentation establish the efficacy of BTLF.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Federated Learning; Blockchain; Local Differential Privacy; Incentivization; HyperLedger Fabric

【发表时间】2024

【收录时间】2024-11-28

【文献类型】

【DOI】 10.1007/978-3-031-65172-4_19

在线标注

备案号: 苏ICP备17025947号-5

评论回复