期刊文献+
共找到748篇文章
< 1 2 38 >
每页显示 20 50 100
Secure and Trusted Interoperability Scheme of Heterogeneous Blockchains Platform in IoT Networks
1
作者 Xiao Liu Mingyuan Li +1 位作者 Haipeng Peng Shoushan Luo 《China Communications》 SCIE CSCD 2023年第11期225-241,共17页
With the rapid development of the Internet of Things(IoT),there is an increasing need for interac-tion between different networks.In order to improve the level of interconnection,especially the interoper-ability of us... With the rapid development of the Internet of Things(IoT),there is an increasing need for interac-tion between different networks.In order to improve the level of interconnection,especially the interoper-ability of users/devices between different nodes is very important.In the IoT heterogeneous blockchain sce-nario,how to ensure the legitimacy of the chain and how to confirm the identity of cross-chain informa-tion users/devices become the key issues to be solved for blockchain interoperability.In this paper,we pro-pose a secure and trusted interoperability mechanism for IoT based on heterogeneous chains to improve the security of blockchain interoperability.In this mecha-nism,a primary sidechain architecture supporting au-thentication at both ends of the heterogeneous chain is designed.In addition,a distributed gateway archi-tecture is proposed for cross-chain authentication and protocol conversion.The security and performance analysis shows that our scheme is feasible and effec-tive in improving the security of cross-chain opera-tions in IoT. 展开更多
关键词 AUTHENTICATION blockchain Interoperabil-ity heterogeneous chain IOT
下载PDF
Performance analysis and comparison of PoW,PoS and DAG based blockchains 被引量:16
2
作者 Bin Cao Zhenghui Zhang +4 位作者 Daquan Feng Shengli Zhang Lei Zhang Mugen Peng Yun Li 《Digital Communications and Networks》 SCIE 2020年第4期480-485,共6页
In the blockchain,the consensus mechanism plays a key role in maintaining the security and legitimation of contents recorded in the blocks.Various blockchain consensus mechanisms have been proposed.However,there is no... In the blockchain,the consensus mechanism plays a key role in maintaining the security and legitimation of contents recorded in the blocks.Various blockchain consensus mechanisms have been proposed.However,there is no technical analysis and comparison as a guideline to determine which type of consensus mechanism should be adopted in a specific scenario/application.To this end,this work investigates three mainstream consensus mechanisms in the blockchain,namely,Proof of Work(PoW),Proof of Stake(PoS),and Direct Acyclic Graph(DAG),and identifies their performances in terms of the average time to generate a new block,the confirmation delay,the Transaction Per Second(TPS)and the confirmation failure probability.The results show that the consensus process is affected by both network resource(computation power/coin age,buffer size)and network load conditions.In addition,it shows that PoW and PoS are more sensitive to the change of network resource while DAG is more sensitive to network load conditions. 展开更多
关键词 Blockchain Proof of work Proof of stake Direct acyclic graph Performance comparison
下载PDF
Elastic Smart Contracts in Blockchains 被引量:3
3
作者 Schahram Dustdar Pablo Fernández +1 位作者 JoséMaría García Antonio Ruiz-Cortés 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第12期1901-1912,共12页
In this paper,we deal with questions related to blockchains in complex Internet of Things(IoT)-based ecosystems.Such ecosystems are typically composed of IoT devices,edge devices,cloud computing software services,as w... In this paper,we deal with questions related to blockchains in complex Internet of Things(IoT)-based ecosystems.Such ecosystems are typically composed of IoT devices,edge devices,cloud computing software services,as well as people,who are decision makers in scenarios such as smart cities.Many decisions related to analytics can be based on data coming from IoT sensors,software services,and people.However,they are typically based on different levels of abstraction and granularity.This poses a number of challenges when multiple blockchains are used together with smart contracts.This work proposes to apply our concept of elasticity to smart contracts and thereby enabling analytics in and between multiple blockchains in the context of IoT.We propose a reference architecture for Elastic Smart Contracts and evaluate the approach in a smart city scenario,discussing the benefits in terms of performance and self-adaptability of our solution. 展开更多
关键词 Blockchain ELASTICITY Internet of Things(IoT) smart cities smart contracts virtual chains
下载PDF
Privacy Protection for Blockchains with Account and Multi-Asset Model 被引量:2
4
作者 Donghui Ding Kang Li +3 位作者 Linpeng Jia Zhongcheng Li Jun Li Yi Sun 《China Communications》 SCIE CSCD 2019年第6期69-79,共11页
The blockchain technology has been applied to wide areas.However,the open and transparent properties of the blockchains pose serious challenges to users’privacy.Among all the schemes for the privacy protection,the ze... The blockchain technology has been applied to wide areas.However,the open and transparent properties of the blockchains pose serious challenges to users’privacy.Among all the schemes for the privacy protection,the zero-knowledge proof algorithm conceals most of the private information in a transaction,while participants of the blockchain can validate this transaction without the private information.However,current schemes are only aimed at blockchains with the UTXO model,and only one type of assets circulates on these blockchains.Based on the zero-knowledge proof algorithm,this paper proposes a privacy protection scheme for blockchains that use the account and multi-asset model.We design the transaction structure,anonymous addresses and anonymous asset metadata,and also propose the methods of the asset transfer and double-spending detection.The zk-SNARKs algorithm is used to generate and to verify the zero-knowledge proof.And finally,we conduct the experiments to evaluate our scheme. 展开更多
关键词 blockchain PRIVACY protection ZERO-KNOWLEDGE proof algorithm ACCOUNT and multi-asset MODEL
下载PDF
Are blockchains immune to all malicious attacks? 被引量:3
5
作者 Jennifer J.Xu 《Financial Innovation》 2016年第1期319-327,共9页
Background:In recent years,blockchain technology has attracted considerable attention.It records cryptographic transactions in a public ledger that is difficult to alter and compromise because of the distributed conse... Background:In recent years,blockchain technology has attracted considerable attention.It records cryptographic transactions in a public ledger that is difficult to alter and compromise because of the distributed consensus.As a result,blockchain is believed to resist fraud and hacking.Results:This work explores the types of fraud and malicious activities that can be prevented by blockchain technology and identifies attacks to which blockchain remains vulnerable.Conclusions:This study recommends appropriate defensive measures and calls for further research into the techniques for fighting malicious activities related to blockchains. 展开更多
关键词 Blockchain Online malicious attacks Fraud detection Hacking prevention
下载PDF
User Centric Block-Level Attribute Based Encryption in Cloud Using Blockchains 被引量:1
6
作者 S.Godfrey Winster A.Siva Kumar R.Ramesh 《Computer Systems Science & Engineering》 SCIE EI 2022年第8期605-618,共14页
Cloud computing is a collection of distributed storage Network which can provide various services and store the data in the efficient manner.The advantages of cloud computing is its remote access where data can access... Cloud computing is a collection of distributed storage Network which can provide various services and store the data in the efficient manner.The advantages of cloud computing is its remote access where data can accessed in real time using Remote Method Innovation(RMI).The problem of data security in cloud environment is a major concern since the data can be accessed by any time by any user.Due to the lack of providing the efficient security the cloud computing they fail to achieve higher performance in providing the efficient service.To improve the performance in data security,the block chains are used for securing the data in the cloud environment.However,the traditional block chain technique are not suitable to provide efficient security to the cloud data stored in the cloud.In this paper,an efficient user centric block level Attribute Based Encryption(UCBL-ABE)scheme is presented to provide the efficient security of cloud data in cloud environment.The proposed approach performs data transaction by employing the block chain.The proposed system provides efficient privacy with access control to the user access according to the behavior of cloud user using Data Level Access Trust(DLAT).Based on DLAT,the user access has been restricted in the cloud environment.The proposed protocol is implemented in real time using Java programming language and uses IBM cloud.The implementation results justifies that the proposed system can able to provide efficient security to the data present in and cloud and also enhances the cloud performance. 展开更多
关键词 CLOUD blockchain data security ABE block-level
下载PDF
Throughput-oriented associated transaction assignment in sharding blockchains for IoT social data storage
7
作者 Liping Tao Yang Lu +2 位作者 Xu Ding Yuqi Fan Jung Yoon Kim 《Digital Communications and Networks》 SCIE CSCD 2022年第6期885-899,共15页
Blockchain is a viable solution to provide data integrity for the enormous volume of 5G IoT social data, while we need to break through the throughput bottleneck of blockchain. Sharding is a promising technology to so... Blockchain is a viable solution to provide data integrity for the enormous volume of 5G IoT social data, while we need to break through the throughput bottleneck of blockchain. Sharding is a promising technology to solve the problem of low throughput in blockchains. However, cross-shard communication hinders the effective improvement of blockchain throughput. Therefore, it is critical to reasonably allocate transactions to different shards to improve blockchain throughput. Existing research on blockchain sharding mainly focuses on shards formation, configuration, and consensus, while ignoring the negative impact of cross-shard communication on blockchain throughput. Aiming to maximize the throughput of transaction processing, we study how to allocate blockchain transactions to shards in this paper. We propose an Associated Transaction assignment algorithm based on Closest Fit (ATCF). ATCF classifies associated transactions into transaction groups which are then assigned to different shards in the non-ascending order of transaction group sizes periodically. Within each epoch, ATCF tries to select a shard that can handle all the transactions for each transaction group. If there are multiple such shards, ATCF selects the shard with the remaining processing capacity closest to the number of transactions in the transaction group. When no such shard exists, ATCF chooses the shard with the largest remaining processing capacity for the transaction group. The transaction groups that cannot be completely processed within the current epoch will be allocated in the subsequent epochs. We prove that ATCF is a 2-approximation algorithm for the associated transaction assignment problem. Simulation results show that ATCF can effectively improve the blockchain throughput and reduce the number of cross-shard transactions. 展开更多
关键词 IoT social data Blockchain Shar ding Associated transactions Transaction assi gnment
下载PDF
Security in Edge Blockchains:Attacks and Countermeasures
8
作者 CAO Yinfeng CAO Jiannong +2 位作者 WANG Yuqin WANG Kaile LIU Xun 《ZTE Communications》 2022年第4期3-14,共12页
Edge blockchains,the blockchains running on edge computing infrastructures,have attracted a lot of attention in recent years.Thanks to data privacy,scalable computing resources,and distributed topology nature of edge ... Edge blockchains,the blockchains running on edge computing infrastructures,have attracted a lot of attention in recent years.Thanks to data privacy,scalable computing resources,and distributed topology nature of edge computing,edge blockchains are considered promising solutions to facilitating future blockchain applications.However,edge blockchains face unique security issues caused by the de⁃ployment of vulnerable edge devices and networks,including supply chain attacks and insecure consensus offloading,which are mostly not well studied in previous literature.This paper is the first survey that discusses the attacks and countermeasures of edge blockchains.We first summarize the three-layer architecture of edge blockchains:blockchain management,blockchain consensus,and blockchain lightweight cli⁃ent.We then describe seven specific attacks on edge blockchain components and discuss the countermeasures.At last,we provide future re⁃search directions on securing edge blockchains.This survey will act as a guideline for researchers and developers to design and implement se⁃cure edge blockchains. 展开更多
关键词 blockchain edge computing SECURITY SURVEY
下载PDF
HBRO: A Registration Oracle Scheme for Digital Rights Management Based on Heterogeneous Blockchains
9
作者 Ri Ouyang 《Communications and Network》 2022年第1期45-67,共23页
As the Internet enters the era of big data, massive amounts of data are flooding people’s mobile phones and computers. The emerging self-media industry produces many videos every day, which also exposes many security... As the Internet enters the era of big data, massive amounts of data are flooding people’s mobile phones and computers. The emerging self-media industry produces many videos every day, which also exposes many security issues in digital rights management (DRM). The works of original creators can easily be infringed on public networks, and it is urgent to protect the copyright of digital content. Traditional digital rights management (TDRM) has many problems, including unqualified copyright confirmation, difficulty obtaining evidence, long time-consuming, high price, and high centralization. The combination of blockchain technology and digital rights management is one of the most popular blockchain application scenarios, the characteristics of the blockchain match DRM market demand. This paper proposes a registration oracle scheme for digital rights management based on heterogeneous blockchains, HBRO, which uses review and voting as a means to judge whether a work can be registered for copyright. HBRO is more rigorous than TDRM and DDRM in the copyright confirmation stage, rejecting many unnecessary and unqualified contents. In addition, a secure cross-chain solution is used to ensure the integrity and correctness of data transmission on heterogeneous blockchains. 展开更多
关键词 Blockchain DRM Cross-Chain Blockchain Oracle Smart Contract
下载PDF
A Review of Consensus Protocols in Permissioned Blockchains
10
作者 Nenad Zoran Tomić 《Journal of Computer Science Research》 2021年第2期19-26,共8页
Consensus protocols are used for the distributed management of large databases in an environment without trust among participants.The choice of a specific protocol depends on the purpose and characteristics of the sys... Consensus protocols are used for the distributed management of large databases in an environment without trust among participants.The choice of a specific protocol depends on the purpose and characteristics of the system itself.The subjects of the paper are consensus protocols in permissioned blockchains.The objective of this paper is to identify functional advantages and disadvantages of observed protocol.The analysis covers a total of six consensus protocols for permissioned blockchains.The following characteristics were compared:security,trust among participants,throughput and scalability.The results show that no protocol shows absolute dominance in all aspects of the comparison.Paxos and Raft are intended for systems in which there is no suspicion of unreliable users,but only the problem of a temporary shutdown.Practical Byzantine Fault Tolerance is intended for systems with a small number of nodes.Federated Byzantine Fault Tolerance shows better scalability and is more suitable for large systems,but can withstand a smaller number of malicious nodes.Proof-of-authority can withstand the largest number of malicious nodes without interfering with the functioning of the system.When choosing a consensus protocol for a blockchain application,one should take into account priority characteristics. 展开更多
关键词 Permissioned blockchain Consensus protocols Byzantine Fault Tolerance Crash fault tolerance
下载PDF
Privacy-Preserving Searchable Encryption Scheme Based on Public and Private Blockchains
11
作者 Ruizhong Du Caixia Ma Mingyue Li 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2023年第1期13-26,共14页
While users enjoy the convenience of data outsourcing in the cloud,they also face the risks of data modification and private information leakage.Searchable encryption technology can perform keyword searches over encry... While users enjoy the convenience of data outsourcing in the cloud,they also face the risks of data modification and private information leakage.Searchable encryption technology can perform keyword searches over encrypted data while protecting their privacy and guaranteeing the integrity of the data by verifying the search results.However,some associated problems are still encountered,such as the low efficiency of verification and uncontrollable query results.Accordingly,this paper proposes a Privacy-Preserving Searchable Encryption(PPSE)scheme based on public and private blockchains.First,we store an encrypted index in a private blockchain while outsourcing corresponding encrypted documents to a public blockchain.The encrypted documents are located through the encrypted index.This method can reduce the storage overhead on the blockchains,and improve the efficiency of transaction execution and the security of stored data.Moreover,we adopt a smart contract to introduce a secondary verification access control mechanism and restrict data users’access to the private blockchain through authorization for the purpose of guaranteeing data privacy and the correctness of access control verification.Finally,the security analysis and experimental results indicate that compared with existing schemes,the proposed scheme can not only improve the security of encrypted data but also guarantee the efficiency of the query. 展开更多
关键词 private blockchain public blockchain access control forward privacy backward privacy
原文传递
Identifying malicious accounts in blockchains using domain names and associated temporal properties
12
作者 Rohit Kumar Sachan Rachit Agarwal Sandeep Kumar Shukla 《Blockchain(Research and Applications)》 EI 2023年第3期39-51,共13页
The rise in the adoption of blockchain technology has led to increased illegal activities by cybercriminals costing billions of dollars.Many machine learning algorithms are applied to detect such illegal behavior.Thes... The rise in the adoption of blockchain technology has led to increased illegal activities by cybercriminals costing billions of dollars.Many machine learning algorithms are applied to detect such illegal behavior.These algorithms are often trained on the transaction behavior and,in some cases,trained on the vulnerabilities that exist in the system.In our approach,we study the feasibility of using the Domain Name(DN)associated with the account in the blockchain and identify whether an account should be tagged malicious or not.Here,we leverage the temporal aspects attached to the DN.Our approach achieves 89.53%balanced-accuracy in detecting malicious blockchain DNs.While our results identify 73769 blockchain DNs that show malicious behavior at least once,out of these,34171 blockchain DNs show persistent malicious behavior,resulting in 2479 malicious blockchain DNs over time.Nonetheless,none of these identified malicious DNs were reported in new officially tagged malicious blockchain DNs. 展开更多
关键词 Blockchain Machine learning Suspect identification Domain name Temporal properties
原文传递
Smart contract-enabled consortium blockchains for the control of supply chain information distortion
13
作者 Corban Allenbrand 《Blockchain(Research and Applications)》 EI 2023年第3期11-17,共7页
Conflicts between supply chain members emerge because individual strategic actions may not be jointly optimal.Efforts to forecast consumer demand represent a source of conflict.The coordination of forecasts requires a... Conflicts between supply chain members emerge because individual strategic actions may not be jointly optimal.Efforts to forecast consumer demand represent a source of conflict.The coordination of forecasts requires a powerful incentive alignment approach.This work proposes a smart contract equipped consortium blockchain system that creates an incentive structure that makes coordination with respect to forecasts economically appealing.Distortions of demand information due to uncoordinated forecasting are captured by a bullwhip measure that factors both forecast error and variance.Cooperation under the system is shown to help minimize this bullwhip measure,thus generating new outcomes for the participants that allow for a higher reward.Under a fixed payout structure,the system achieves credibility of continued cooperation,thus promoting an optimally coordinated equilibrium between the retailer and supplier.Blockchain technology represents a novel information system and consensus formation mechanism that can intermediate the behavior of a supply chain network. 展开更多
关键词 Game theory BULLWHIP Information systems Supply chain coordination Demand forecasting Blockchain applications
原文传递
UAV-Assisted Dynamic Avatar Task Migration for Vehicular Metaverse Services: A Multi-Agent Deep Reinforcement Learning Approach 被引量:1
14
作者 Jiawen Kang Junlong Chen +6 位作者 Minrui Xu Zehui Xiong Yutao Jiao Luchao Han Dusit Niyato Yongju Tong Shengli Xie 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第2期430-445,共16页
Avatars, as promising digital representations and service assistants of users in Metaverses, can enable drivers and passengers to immerse themselves in 3D virtual services and spaces of UAV-assisted vehicular Metavers... Avatars, as promising digital representations and service assistants of users in Metaverses, can enable drivers and passengers to immerse themselves in 3D virtual services and spaces of UAV-assisted vehicular Metaverses. However, avatar tasks include a multitude of human-to-avatar and avatar-to-avatar interactive applications, e.g., augmented reality navigation,which consumes intensive computing resources. It is inefficient and impractical for vehicles to process avatar tasks locally. Fortunately, migrating avatar tasks to the nearest roadside units(RSU)or unmanned aerial vehicles(UAV) for execution is a promising solution to decrease computation overhead and reduce task processing latency, while the high mobility of vehicles brings challenges for vehicles to independently perform avatar migration decisions depending on current and future vehicle status. To address these challenges, in this paper, we propose a novel avatar task migration system based on multi-agent deep reinforcement learning(MADRL) to execute immersive vehicular avatar tasks dynamically. Specifically, we first formulate the problem of avatar task migration from vehicles to RSUs/UAVs as a partially observable Markov decision process that can be solved by MADRL algorithms. We then design the multi-agent proximal policy optimization(MAPPO) approach as the MADRL algorithm for the avatar task migration problem. To overcome slow convergence resulting from the curse of dimensionality and non-stationary issues caused by shared parameters in MAPPO, we further propose a transformer-based MAPPO approach via sequential decision-making models for the efficient representation of relationships among agents. Finally, to motivate terrestrial or non-terrestrial edge servers(e.g., RSUs or UAVs) to share computation resources and ensure traceability of the sharing records, we apply smart contracts and blockchain technologies to achieve secure sharing management. Numerical results demonstrate that the proposed approach outperforms the MAPPO approach by around 2% and effectively reduces approximately 20% of the latency of avatar task execution in UAV-assisted vehicular Metaverses. 展开更多
关键词 AVATAR blockchain metaverses multi-agent deep reinforcement learning transformer UAVS
下载PDF
Data Secure Storage Mechanism for IIoT Based on Blockchain 被引量:1
15
作者 Jin Wang Guoshu Huang +2 位作者 R.Simon Sherratt Ding Huang Jia Ni 《Computers, Materials & Continua》 SCIE EI 2024年第3期4029-4048,共20页
With the development of Industry 4.0 and big data technology,the Industrial Internet of Things(IIoT)is hampered by inherent issues such as privacy,security,and fault tolerance,which pose certain challenges to the rapi... With the development of Industry 4.0 and big data technology,the Industrial Internet of Things(IIoT)is hampered by inherent issues such as privacy,security,and fault tolerance,which pose certain challenges to the rapid development of IIoT.Blockchain technology has immutability,decentralization,and autonomy,which can greatly improve the inherent defects of the IIoT.In the traditional blockchain,data is stored in a Merkle tree.As data continues to grow,the scale of proofs used to validate it grows,threatening the efficiency,security,and reliability of blockchain-based IIoT.Accordingly,this paper first analyzes the inefficiency of the traditional blockchain structure in verifying the integrity and correctness of data.To solve this problem,a new Vector Commitment(VC)structure,Partition Vector Commitment(PVC),is proposed by improving the traditional VC structure.Secondly,this paper uses PVC instead of the Merkle tree to store big data generated by IIoT.PVC can improve the efficiency of traditional VC in the process of commitment and opening.Finally,this paper uses PVC to build a blockchain-based IIoT data security storage mechanism and carries out a comparative analysis of experiments.This mechanism can greatly reduce communication loss and maximize the rational use of storage space,which is of great significance for maintaining the security and stability of blockchain-based IIoT. 展开更多
关键词 Blockchain IIoT data storage cryptographic commitment
下载PDF
Enhancing IoT Data Security with Lightweight Blockchain and Okamoto Uchiyama Homomorphic Encryption
16
作者 Mohanad A.Mohammed Hala B.Abdul Wahab 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1731-1748,共18页
Blockchain technology has garnered significant attention from global organizations and researchers due to its potential as a solution for centralized system challenges.Concurrently,the Internet of Things(IoT)has revol... Blockchain technology has garnered significant attention from global organizations and researchers due to its potential as a solution for centralized system challenges.Concurrently,the Internet of Things(IoT)has revolutionized the Fourth Industrial Revolution by enabling interconnected devices to offer innovative services,ultimately enhancing human lives.This paper presents a new approach utilizing lightweight blockchain technology,effectively reducing the computational burden typically associated with conventional blockchain systems.By integrating this lightweight blockchain with IoT systems,substantial reductions in implementation time and computational complexity can be achieved.Moreover,the paper proposes the utilization of the Okamoto Uchiyama encryption algorithm,renowned for its homomorphic characteristics,to reinforce the privacy and security of IoT-generated data.The integration of homomorphic encryption and blockchain technology establishes a secure and decentralized platformfor storing and analyzing sensitive data of the supply chain data.This platformfacilitates the development of some business models and empowers decentralized applications to perform computations on encrypted data while maintaining data privacy.The results validate the robust security of the proposed system,comparable to standard blockchain implementations,leveraging the distinctive homomorphic attributes of the Okamoto Uchiyama algorithm and the lightweight blockchain paradigm. 展开更多
关键词 Blockchain IOT integration of IoT and blockchain consensus algorithm Okamoto Uchiyama homomorphic encryption lightweight blockchain
下载PDF
On Designs of Decentralized Reputation Management for Permissioned Blockchain Networks
17
作者 Jinyu Chen Long Shi +2 位作者 Qisheng Huang Taotao Wang Daojing He 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第5期1755-1773,共19页
In permissioned blockchain networks,the Proof of Authority(PoA)consensus,which uses the election of authorized nodes to validate transactions and blocks,has beenwidely advocated thanks to its high transaction throughp... In permissioned blockchain networks,the Proof of Authority(PoA)consensus,which uses the election of authorized nodes to validate transactions and blocks,has beenwidely advocated thanks to its high transaction throughput and fault tolerance.However,PoA suffers from the drawback of centralization dominated by a limited number of authorized nodes and the lack of anonymity due to the round-robin block proposal mechanism.As a result,traditional PoA is vulnerable to a single point of failure that compromises the security of the blockchain network.To address these issues,we propose a novel decentralized reputation management mechanism for permissioned blockchain networks to enhance security,promote liveness,and mitigate centralization while retaining the same throughput as traditional PoA.This paper aims to design an off-chain reputation evaluation and an on-chain reputation-aided consensus.First,we evaluate the nodes’reputation in the context of the blockchain networks and make the reputation globally verifiable through smart contracts.Second,building upon traditional PoA,we propose a reputation-aided PoA(rPoA)consensus to enhance securitywithout sacrificing throughput.In particular,rPoA can incentivize nodes to autonomously form committees based on reputation authority,which prevents block generation from being tracked through the randomness of reputation variation.Moreover,we develop a reputation-aided fork-choice rule for rPoA to promote the network’s liveness.Finally,experimental results show that the proposed rPoA achieves higher security performance while retaining transaction throughput compared to traditional PoA. 展开更多
关键词 Blockchain reputation management POA THROUGHPUT SECURITY DECENTRALIZATION
下载PDF
For Mega-Constellations: Edge Computing and Safety Management Based on Blockchain Technology
18
作者 Zhen Zhang Bing Guo Chengjie Li 《China Communications》 SCIE CSCD 2024年第2期59-73,共15页
In mega-constellation Communication Systems, efficient routing algorithms and data transmission technologies are employed to ensure fast and reliable data transfer. However, the limited computational resources of sate... In mega-constellation Communication Systems, efficient routing algorithms and data transmission technologies are employed to ensure fast and reliable data transfer. However, the limited computational resources of satellites necessitate the use of edge computing to enhance secure communication.While edge computing reduces the burden on cloud computing, it introduces security and reliability challenges in open satellite communication channels. To address these challenges, we propose a blockchain architecture specifically designed for edge computing in mega-constellation communication systems. This architecture narrows down the consensus scope of the blockchain to meet the requirements of edge computing while ensuring comprehensive log storage across the network. Additionally, we introduce a reputation management mechanism for nodes within the blockchain, evaluating their trustworthiness, workload, and efficiency. Nodes with higher reputation scores are selected to participate in tasks and are appropriately incentivized. Simulation results demonstrate that our approach achieves a task result reliability of 95% while improving computational speed. 展开更多
关键词 blockchain consensus mechanism edge computing mega-constellation reputation management
下载PDF
A Review on the Security of the Ethereum-Based DeFi Ecosystem
19
作者 Yue Xue Dunqiu Fan +4 位作者 Shen Su Jialu Fu Ning Hu Wenmao Liu Zhihong Tian 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第4期69-101,共33页
Decentralized finance(DeFi)is a general term for a series of financial products and services.It is based on blockchain technology and has attracted people’s attention because of its open,transparent,and intermediary ... Decentralized finance(DeFi)is a general term for a series of financial products and services.It is based on blockchain technology and has attracted people’s attention because of its open,transparent,and intermediary free.Among them,the DeFi ecosystem based on Ethereum-based blockchains attracts the most attention.However,the current decentralized financial system built on the Ethereum architecture has been exposed to many smart contract vulnerabilities during the last few years.Herein,we believe it is time to improve the understanding of the prevailing Ethereum-based DeFi ecosystem security issues.To that end,we investigate the Ethereum-based DeFi security issues:1)inherited from the real-world financial system,which can be solved by macro-control;2)induced by the problems of blockchain architecture,which require a better blockchain platform;3)caused by DeFi invented applications,which should be focused on during the project development.Based on that,we further discuss the current solutions and potential directions ofDeFi security.According to our research,we could provide a comprehensive vision to the research community for the improvement of Ethereum-basedDeFi ecosystem security. 展开更多
关键词 Blockchain smart contract decentralized finance DeFi SECURITY
下载PDF
A Framework for Enhancing Privacy and Anonymity in Blockchain-Enabled IoT Devices
20
作者 Muhammad Saad Muhammad Raheel Bhutta +1 位作者 Jongik Kim Tae-Sun Chung 《Computers, Materials & Continua》 SCIE EI 2024年第3期4263-4282,共20页
With the increase in IoT(Internet of Things)devices comes an inherent challenge of security.In the world today,privacy is the prime concern of every individual.Preserving one’s privacy and keeping anonymity throughou... With the increase in IoT(Internet of Things)devices comes an inherent challenge of security.In the world today,privacy is the prime concern of every individual.Preserving one’s privacy and keeping anonymity throughout the system is a desired functionality that does not come without inevitable trade-offs like scalability and increased complexity and is always exceedingly difficult to manage.The challenge is keeping confidentiality and continuing to make the person innominate throughout the system.To address this,we present our proposed architecture where we manage IoT devices using blockchain technology.Our proposed architecture works on and off blockchain integrated with the closed-circuit television(CCTV)security camera fixed at the rental property.In this framework,the CCTV security camera feed is redirected towards the owner and renter based on the smart contract conditions.One entity(owner or renter)can see the CCTV security camera feed at one time.There is no third-party dependence except for the CCTV security camera deployment phase.Our contributions include the proposition of framework architecture,a novel smart contract algorithm,and the modification to the ring signatures leveraging an existing cryptographic technique.Analyses are made based on different systems’security and key management areas.In an empirical study,our proposed algorithm performed better in key generation,proof generation,and verification times.By comparing similar existing schemes,we have shown the proposed architectures’advantages.Until now,we have developed this system for a specific area in the real world.However,this system is scalable and applicable to other areas like healthcare monitoring systems,which is part of our future work. 展开更多
关键词 PRIVACY ANONYMITY blockchain IOT smart contracts
下载PDF
上一页 1 2 38 下一页 到第
使用帮助 返回顶部