The confidentiality of pseudonymous authentication and secure data transmission is essential for the protection of information and mitigating risks posed by compromised vehicles.The Internet of Vehicles has meaningful...The confidentiality of pseudonymous authentication and secure data transmission is essential for the protection of information and mitigating risks posed by compromised vehicles.The Internet of Vehicles has meaningful applications,enabling connected and autonomous vehicles to interact with infrastructure,sensors,computing nodes,humans,and fellow vehicles.Vehicular hoc networks play an essential role in enhancing driving efficiency and safety by reducing traffic congestion while adhering to cryptographic security standards.This paper introduces a privacy-preserving Vehicle-to-Infrastructure authentication,utilizing encryption and the Moore curve.The proposed approach enables a vehicle to deduce the planned itinerary of Roadside Units(RSUs)before embarking on a journey.Crucially,the Certification Authority remains unaware of the specific route design,ensuring privacy.The method involves transforming all Roadside Units(RSUs)in a region into a vector,allowing for instant authentication of a vehicle’s route using RSU information.Real-world performance evaluations affirm the effectiveness of the proposed model.展开更多
Internet of Medical Things (IoMT) is a breakthrough technologyin the transfer of medical data via a communication system. Wearable sensordevices collect patient data and transfer them through mobile internet, thatis, ...Internet of Medical Things (IoMT) is a breakthrough technologyin the transfer of medical data via a communication system. Wearable sensordevices collect patient data and transfer them through mobile internet, thatis, the IoMT. Recently, the shift in paradigm from manual data storage toelectronic health recording on fog, edge, and cloud computing has been noted.These advanced computing technologies have facilitated medical services withminimum cost and available conditions. However, the IoMT raises a highconcern on network security and patient data privacy in the health caresystem. The main issue is the transmission of health data with high security inthe fog computing model. In today’s market, the best solution is blockchaintechnology. This technology provides high-end security and authenticationin storing and transferring data. In this research, a blockchain-based fogcomputing model is proposed for the IoMT. The proposed technique embedsa block chain with the yet another consensus (YAC) protocol building securityinfrastructure into fog computing for storing and transferring IoMT data inthe network. YAC is a consensus protocol that authenticates the input datain the block chain. In this scenario, the patients and their family membersare allowed to access the data. The empirical outcome of the proposedtechnique indicates high reliability and security against dangerous threats.The major advantages of using the blockchain model are high transparency,good traceability, and high processing speed. The technique also exhibitshigh reliability and efficiency in accessing data with secure transmission. Theproposed technique achieves 95% reliability in transferring a large number offiles up to 10,000.展开更多
The risk assessment system has been applied to the information security,energy,medical and other industries.Through the risk assessment system,it is possible to quantify the possibility of the impact or loss caused by...The risk assessment system has been applied to the information security,energy,medical and other industries.Through the risk assessment system,it is possible to quantify the possibility of the impact or loss caused by an event before or after an event,thereby avoiding the risk or reducing the loss.However,the existing risk assessment system architecture is mostly a centralized architecture,which could lead to problems such as data leakage,tampering,and central cheating.Combined with the technology of block chain,which has the characteristics of decentralization,security and credibility,collective maintenance,and untamperability.This paper proposes a new block chainbased risk assessment system architecture and a consensus mechanism algorithm based on DPOS improvement.This architecture uses an improved consensus mechanism to achieve a safe and efficient risk assessment solving the problem of data tampering in the risk assessment process,avoiding data leakage caused by improper data storage.A convenient,safe and fast risk assessment is achieved in conjunction with the improved consensus mechanism.In addition,by comparing existing risk assessment architecture,the advantages and impacts of the new block chain-based risk assessment system architecture are analyzed.展开更多
Supply chain finance has played a positive role in solving the financing difficulties of small and medium-sized enterprises.However,in the actual implementation process,there are still problems such as information asy...Supply chain finance has played a positive role in solving the financing difficulties of small and medium-sized enterprises.However,in the actual implementation process,there are still problems such as information asymmetry,doubts about the authenticity of trade background,and high operational risks,which seriously restrict the development of supply chain finance.However,block chain technology has the characteristics of de-centralization,data transparency,common maintenance and non-tampering.Applying this technology to supply chain finance can effectively solve the existing problems.Based on the research on the development status of traditional supply chain finance,this paper puts forward a new development mode of supply chain finance based on block chain technology,and through the analysis of typical cases,finally gives some policy suggestions for the development of block chain supply chain finance.展开更多
In the shipping industry, significant part of the documents exchange still have the traditional paper form, mainly due to security concerns, despite the size and modernization efforts of this market. We explore the ad...In the shipping industry, significant part of the documents exchange still have the traditional paper form, mainly due to security concerns, despite the size and modernization efforts of this market. We explore the adoption of the blockchain and Distributed Ledger Technologies to address document exchange in a fast and secure way.展开更多
Objective To analyze the current problems in drug traceability and supply chain management,and build the drug traceability system based on the block chain technology so as to provide authenticity assurance for the rea...Objective To analyze the current problems in drug traceability and supply chain management,and build the drug traceability system based on the block chain technology so as to provide authenticity assurance for the real data in the whole life cycle of drugs.Methods A new drug regulatory traceability protocol was designed based on block chain technology.The database of drug production,circulation and use was linked closely.A traceability system was set up according to the traceability protocol,and the consensus complexity and safety performance of the system were analyzed.Results and Conclusion The distributed account book and tamper-proof functions of the block chain platform were used to establish a double-chain system based on the combination of public chain and private chain,which could make the data of drugs more reliable,transparent and traceable with good application value.The establishment of a double-chain traceability system is studied so that drug market license holders,manufacturers,operating enterprises and users can verify the data to form an interconnected drug traceability data chain.展开更多
Radio frequency identification (RFID) has emerged as a pivotal technology in supply chain management (SCM), significantly enhancing its efficiency and effectiveness. When integrated with the internet of things (IoT) t...Radio frequency identification (RFID) has emerged as a pivotal technology in supply chain management (SCM), significantly enhancing its efficiency and effectiveness. When integrated with the internet of things (IoT) to form RFID-IoT, this technology brings transformative advancements to SCM, enabling automated sensing, pervasive computing, and ubiquitous data access across the entire supply chain, from manufacturers and distributors to retailers and consumers. This integration facilitates real-time identification and monitoring of products, enhances various processes, improves logistic tracking, and ensures better product quality management. Despite its promising benefits, the adoption of RFID-IoT in SCM faces several challenges, including technical complexities, data security concerns, and high implementation costs. However, the future potential of RFID-IoT technology remains substantial. It is anticipated that further integration with other emerging technologies, such as block chain and artificial intelligence, will lead to more comprehensive and robust SCM solutions, offering unprecedented levels of transparency, efficiency, and automation in supply chain operations.展开更多
In today’s digital economy,new technologies such as artificial intelligence,big data,and the internet of things(IoT)have stronger influence on global value chains(GVCs).As GVCs overcome physical boundaries,the space ...In today’s digital economy,new technologies such as artificial intelligence,big data,and the internet of things(IoT)have stronger influence on global value chains(GVCs).As GVCs overcome physical boundaries,the space economy is becoming a new agent of growth.Developed countries dominate the rules of regional trade agreements,leading to endogenous restructuring in GVCs.In multi-tiered GVCs,certain countries garner a large portion of value-added.With the new trend in GVCs in mind,China should consolidate its strengths in the digital economy as new growth agents replace old ones,gain a favorable position in the space economy with the Chinese space station,create a global trading network through the Belt and Road Initiative(BRI),and acquire more value-added by capitalizing on the sophisticated global value chain.展开更多
文摘The confidentiality of pseudonymous authentication and secure data transmission is essential for the protection of information and mitigating risks posed by compromised vehicles.The Internet of Vehicles has meaningful applications,enabling connected and autonomous vehicles to interact with infrastructure,sensors,computing nodes,humans,and fellow vehicles.Vehicular hoc networks play an essential role in enhancing driving efficiency and safety by reducing traffic congestion while adhering to cryptographic security standards.This paper introduces a privacy-preserving Vehicle-to-Infrastructure authentication,utilizing encryption and the Moore curve.The proposed approach enables a vehicle to deduce the planned itinerary of Roadside Units(RSUs)before embarking on a journey.Crucially,the Certification Authority remains unaware of the specific route design,ensuring privacy.The method involves transforming all Roadside Units(RSUs)in a region into a vector,allowing for instant authentication of a vehicle’s route using RSU information.Real-world performance evaluations affirm the effectiveness of the proposed model.
文摘Internet of Medical Things (IoMT) is a breakthrough technologyin the transfer of medical data via a communication system. Wearable sensordevices collect patient data and transfer them through mobile internet, thatis, the IoMT. Recently, the shift in paradigm from manual data storage toelectronic health recording on fog, edge, and cloud computing has been noted.These advanced computing technologies have facilitated medical services withminimum cost and available conditions. However, the IoMT raises a highconcern on network security and patient data privacy in the health caresystem. The main issue is the transmission of health data with high security inthe fog computing model. In today’s market, the best solution is blockchaintechnology. This technology provides high-end security and authenticationin storing and transferring data. In this research, a blockchain-based fogcomputing model is proposed for the IoMT. The proposed technique embedsa block chain with the yet another consensus (YAC) protocol building securityinfrastructure into fog computing for storing and transferring IoMT data inthe network. YAC is a consensus protocol that authenticates the input datain the block chain. In this scenario, the patients and their family membersare allowed to access the data. The empirical outcome of the proposedtechnique indicates high reliability and security against dangerous threats.The major advantages of using the blockchain model are high transparency,good traceability, and high processing speed. The technique also exhibitshigh reliability and efficiency in accessing data with secure transmission. Theproposed technique achieves 95% reliability in transferring a large number offiles up to 10,000.
基金supported by the National Key Research and Development Project of China(No.2017YFB0802302)the National Natural Science Foundation of China(No.61572086,No.61402058)+4 种基金the Innovation Team of Quantum Security Communication of Sichuan Province(No.17TD0009)the Academic and Technical Leaders Training Funding Support Projects of Sichuan Province(No.2016120080102643)the Application Foundation Project of Sichuan Province(No.2017JY0168)the Key Research and Development Project of Sichuan Province(No.2018TJPT0012)the Science and Technology Support Project of Sichuan Province(No.2016FZ0112,No.2018GZ0204).
文摘The risk assessment system has been applied to the information security,energy,medical and other industries.Through the risk assessment system,it is possible to quantify the possibility of the impact or loss caused by an event before or after an event,thereby avoiding the risk or reducing the loss.However,the existing risk assessment system architecture is mostly a centralized architecture,which could lead to problems such as data leakage,tampering,and central cheating.Combined with the technology of block chain,which has the characteristics of decentralization,security and credibility,collective maintenance,and untamperability.This paper proposes a new block chainbased risk assessment system architecture and a consensus mechanism algorithm based on DPOS improvement.This architecture uses an improved consensus mechanism to achieve a safe and efficient risk assessment solving the problem of data tampering in the risk assessment process,avoiding data leakage caused by improper data storage.A convenient,safe and fast risk assessment is achieved in conjunction with the improved consensus mechanism.In addition,by comparing existing risk assessment architecture,the advantages and impacts of the new block chain-based risk assessment system architecture are analyzed.
基金Shandong Key Research and Development Project(Soft Science):2019RKC20001。
文摘Supply chain finance has played a positive role in solving the financing difficulties of small and medium-sized enterprises.However,in the actual implementation process,there are still problems such as information asymmetry,doubts about the authenticity of trade background,and high operational risks,which seriously restrict the development of supply chain finance.However,block chain technology has the characteristics of de-centralization,data transparency,common maintenance and non-tampering.Applying this technology to supply chain finance can effectively solve the existing problems.Based on the research on the development status of traditional supply chain finance,this paper puts forward a new development mode of supply chain finance based on block chain technology,and through the analysis of typical cases,finally gives some policy suggestions for the development of block chain supply chain finance.
文摘In the shipping industry, significant part of the documents exchange still have the traditional paper form, mainly due to security concerns, despite the size and modernization efforts of this market. We explore the adoption of the blockchain and Distributed Ledger Technologies to address document exchange in a fast and secure way.
文摘Objective To analyze the current problems in drug traceability and supply chain management,and build the drug traceability system based on the block chain technology so as to provide authenticity assurance for the real data in the whole life cycle of drugs.Methods A new drug regulatory traceability protocol was designed based on block chain technology.The database of drug production,circulation and use was linked closely.A traceability system was set up according to the traceability protocol,and the consensus complexity and safety performance of the system were analyzed.Results and Conclusion The distributed account book and tamper-proof functions of the block chain platform were used to establish a double-chain system based on the combination of public chain and private chain,which could make the data of drugs more reliable,transparent and traceable with good application value.The establishment of a double-chain traceability system is studied so that drug market license holders,manufacturers,operating enterprises and users can verify the data to form an interconnected drug traceability data chain.
文摘Radio frequency identification (RFID) has emerged as a pivotal technology in supply chain management (SCM), significantly enhancing its efficiency and effectiveness. When integrated with the internet of things (IoT) to form RFID-IoT, this technology brings transformative advancements to SCM, enabling automated sensing, pervasive computing, and ubiquitous data access across the entire supply chain, from manufacturers and distributors to retailers and consumers. This integration facilitates real-time identification and monitoring of products, enhances various processes, improves logistic tracking, and ensures better product quality management. Despite its promising benefits, the adoption of RFID-IoT in SCM faces several challenges, including technical complexities, data security concerns, and high implementation costs. However, the future potential of RFID-IoT technology remains substantial. It is anticipated that further integration with other emerging technologies, such as block chain and artificial intelligence, will lead to more comprehensive and robust SCM solutions, offering unprecedented levels of transparency, efficiency, and automation in supply chain operations.
文摘In today’s digital economy,new technologies such as artificial intelligence,big data,and the internet of things(IoT)have stronger influence on global value chains(GVCs).As GVCs overcome physical boundaries,the space economy is becoming a new agent of growth.Developed countries dominate the rules of regional trade agreements,leading to endogenous restructuring in GVCs.In multi-tiered GVCs,certain countries garner a large portion of value-added.With the new trend in GVCs in mind,China should consolidate its strengths in the digital economy as new growth agents replace old ones,gain a favorable position in the space economy with the Chinese space station,create a global trading network through the Belt and Road Initiative(BRI),and acquire more value-added by capitalizing on the sophisticated global value chain.