2024年10月21日 39篇
文献来源
- 38
- 1
主题分类
-
-
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
-
- 1
- 1
- 1
- 1
- 2
- 1
- 1
- 1
-
- 1
-
-
-
- 1
- 1
- 2
- 1
- 1
- 1
- 1
- 1
- 3
- 1
- 1
- 1
- 2
- 1
-
- 1
-
-
-
- 1
- 1
- 1
-
- 1
-
- 1
-
文献类型
- 7
- 16
- 13
- 2
- 1
【影响因子】8.839
【主题类别】
区块链技术-核心技术-零知识证明
区块链技术-协同技术-机器学习
【Abstract】Zero-knowledge proofs introduce a mechanism to prove that certain computations were performed without revealing any underlying information and are used commonly in blockchain-based decentralized apps (dapps). This cryptographic technique addresses trust issues prevalent in blockchain applications, and has now been adapted for machine learning (ML) services, known as Zero-Knowledge Machine Learning (ZKML). By leveraging the distributed nature of blockchains, this approach enhances the trustworthiness of ML deployments, and opens up new possibilities for privacy-preserving and robust ML applications within dapps. This paper provides a comprehensive overview of the ZKML process and its critical components for verifying ML services on-chain. Furthermore, this paper explores how blockchain technology and smart contracts can offer verifiable, trustless proof that a specific ML model has been used correctly to perform inference, all without relying on a single trusted entity. Additionally, the paper compares and reviews existing frameworks for implementing ZKML in dapps, serving as a reference point for researchers interested in this emerging field.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Zero-knowledge proofs; Machine learning; ZKML; Decentralized AI
【发表时间】2024
【收录时间】2024-10-21
【文献类型】 综述
【Author】 Alabdan, Rana Alabduallah, Bayan Alruwais, Nuha Arasi, Munya A. Asklany, Somia A. Alghushairy, Omar Alallah, Fouad Shoie Alshareef, Abdulrhman
【影响因子】6.626
【主题类别】
区块链技术-协同技术-物联网
【Abstract】The Internet of Things (IoTs) revolutionizes the consumer electronics landscape by presenting a degree of personalization and interactivity that was previously unimaginable. Interconnected devices are now familiar with user characteristics, giving custom skills that improve the user's satisfaction. Still, IoT remains to transform the consumer electronics field; security in IoT becomes critical, and it is utilized by cyber attackers to pose risks to public safety, compromise data privacy, gain unauthorized access, and even disrupt operations. Robust security measures are crucial for maintaining trust in the proliferation and adoption of interconnected technologies, mitigating those risks, protecting sensitive data, and certifying the integrity of the IoT ecosystem. An intrusion detection system (IDS) is paramount in IoT security, as it dynamically monitors device behaviours and network traffic to detect and mitigate any possible cyber threats. Using machine learning (ML) methods and anomaly detection algorithms, IDS can rapidly identify abnormal activities, unauthorized access, or malicious behaviours within the IoT ecosystem, thus preserving the integrity of interconnected devices and networks, safeguarding sensitive data, and protecting against cyber-attacks. This work presents an Improved Crayfish Optimization Algorithm with Interval Type-2 Fuzzy Deep Learning (ICOA-IT2FDL) technique for Intrusion Detection on IoT infrastructure. The main intention of the ICOA-IT2FDL technique is to utilize a hyperparametertuned improved deep learning (DL) method for intrusion detection, thereby improving safety in the IoT infrastructure. BC technology can be used to accomplish security among consumer electronics. The ICOA-IT2FDL technique employs a linear scaling normalization (LSN) approach for data normalization. In addition, features are selected using an improved crayfish optimization algorithm (ICOA). This is followed by the ICOA-IT2FDL technique, which applies the interval type-2 fuzzy deep belief network (IT2-FDBN) model to identify intrusions. Finally, the bald eagle search (BES) model strategy improves the intrusion recognition rate. A series of investigations is accomplished to ensure the enhanced accomplishment of the ICOA-IT2FDL model. The experimentation results specified that the ICOA-IT2FDL model shows better recognition results compared to recent models.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Consumer electronics; Blockchain; Internet of things; Deep learning; Intrusion detection system; Crayfish optimization algorithm
【发表时间】2025
【收录时间】2024-10-21
【文献类型】 综述
CCF-B
【影响因子】5.493
【主题类别】
区块链技术-协同技术-强化学习
【Abstract】The necessities of security and data sharing have focused on federated learning because of using decentralized data sources. The existing works used federated learning for security, however, it still faces many challenges such as poor security and privacy, computational complexity, etc. In this research, we propose adaptive vertical federated learning using a reinforcement learning approach and blockchain. The proposed work includes three phases: user registration and authentication, machine learning-based client selection, and adaptive secure federated learning. Initially, all the users register their credentials to the cognitive agent, which generates a private key, public key, and random number using a Chaotic Isogenic Post Quantum Cryptography (CIPQC) algorithm. Second, optimal clients are selected for participating in federated learning which improves learning rate and reduces complexity. Here, optimal clients are selected by the Enhanced Multilayer Feed Forward Neural Network (EMFFN) algorithm by considering CSI, RSSI, bandwidth, energy, communication efficiency, and statistical efficiency. Finally, adaptive secure federated learning is performed by the Distributed Distributional Deep Deterministic Policy Gradient (D4PG) 4 PG) algorithm, where the local models are adaptively used by the private strategy based on its sensitivity. The aggregated global models are stored in DT-block (dendrimer tree-based blockchain) which stores the data in a dendrimer tree structure for increasing scalability and reducing search time during data retrieval. The simulation of this research is conducted by NS- 3.26 network simulator and the performance of the proposed DT-Block model is estimated based on various performance metrics such as accuracy, delay, loss, f1-score, and security strength this demonstrated that the suggested effort produced better results both in terms of quantitative and qualitative aspects.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Federated learning; 6G; Blockchain; Reinforcement learning; Client selection; Authentication
【发表时间】2024
【收录时间】2024-10-21
【文献类型】 理论模型
【Author】 Sharaf, Sanaa A. Ragab, Mahmoud Albogami, Nasser AL-Ghamdi, Abdullah AL-Malaise Sabir, Maha Farouk Maghrabi, Louai A. Ashary, Ehab Bahaudien Alaidaros, Hashem
【影响因子】4.996
【主题类别】
区块链技术-协同技术-深度学习
【Abstract】A smart grid (SG) is a cutting-edge electrical grid that utilizes digital communication technology and automation to effectively handle electricity consumption, distribution, and generation. It incorporates energy storage systems, smart meters, and renewable energy sources for bidirectional communication and enhanced energy flow between grid modules. Due to their cyberattack vulnerability, SGs need robust safety measures to protect sensitive data, ensure public safety, and maintain a reliable power supply. Robust safety measures, comprising intrusion detection systems (IDSs), are significant to protect against malicious manipulation, unauthorized access, and data breaches in grid operations, confirming the electricity supply chain's integrity, resilience, and reliability. Deep learning (DL) improves intrusion recognition in SGs by effectually analyzing network data, recognizing complex attack patterns, and adjusting to dynamic threats in real-time, thereby strengthening the reliability and resilience of the grid against cyber-attacks. This study develops a novel Mountain Gazelle Optimization with Deep Ensemble Learning based intrusion detection (MGODEL-ID) technique on SG environment. The MGODEL-ID methodology exploits ensemble learning with metaheuristic approaches to identify intrusions in the SG environment. Primarily, the MGODEL-ID approach utilizes Z-score normalization to convert the input data into a uniform format. Besides, the MGODEL-ID approach employs the MGO model for feature subset selection. Meanwhile, the detection of intrusions is performed by an ensemble of three classifiers such as long short-term memory (LSTM), deep autoencoder (DAE), and extreme learning machine (ELM). Eventually, the dung beetle optimizer (DBO) is utilized to tune the hyperparameter tuning of the classifiers. A widespread simulation outcome is made to demonstrate the improved security outcomes of the MGODEL-ID model. The experimental values implied that the MGODEL-ID model performs better than other models.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Smart Grid; Mathematical models; Deep learning; Intrusion detection system; Artificial Intelligence
【发表时间】2024
【收录时间】2024-10-21
【文献类型】 理论模型
【Author】 Li, Zhaobin Liu, Xiantao Zhang, Nan Wei, Zhanzhen
【影响因子】3.860
【主题类别】
区块链技术-核心技术-认证机制
【Abstract】The Industrial Internet of Things (IIoT) consists of massive devices in different management domains, and the lack of trust among cross-domain entities leads to risks of data security and privacy leakage during information exchange. To address the above challenges, a viable solution that combines Certificateless Public Key Cryptography (CL-PKC) with blockchain technology can be utilized. However, as many existing schemes rely on a single Key Generation Center (KGC), they are prone to problems such as single points of failure and high computational overhead. In this case, this paper proposes a novel blockchain-based certificateless cross-domain authentication scheme, that integrates the threshold secret sharing mechanism without a trusted center, meanwhile, adopts blockchain technology to enable cross-domain entities to authenticate with each other and to negotiate session keys securely. This scheme also supports the dynamic joining and removing of multiple KGCs, ensuring secure and efficient cross-domain authentication and key negotiation. Comparative analysis with other protocols demonstrates that the proposed cross-domain authentication protocol can achieve high security with relatively low computational overhead. Moreover, this paper evaluates the scheme based on Hyperledger Fabric blockchain environment and simulates the performance of the certificateless scheme under different threshold parameters, and the simulation results show that the scheme has high performance.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】IIoT; blockchain; certificateless; cross-domain authentication
【发表时间】2024
【收录时间】2024-10-21
【文献类型】 理论模型
【DOI】 10.32604/cmc.2024.053950
【影响因子】3.860
【主题类别】
区块链应用-实体经济-工业领域
【Abstract】The advent of Industry 5.0 marks a transformative era where Cyber-Physical Systems (CPSs) seamlessly integrate physical processes with advanced digital technologies. However, as industries become increasingly interconnected and reliant on smart digital technologies, the intersection of physical and cyber domains introduces novel security considerations, endangering the entire industrial ecosystem. The transition towards a more cooperative setting, including humans and machines in Industry 5.0, together with the growing intricacy and interconnection of CPSs, presents distinct and diverse security and privacy challenges. In this regard, this study provides a comprehensive review of security and privacy concerns pertaining to CPSs in the context of Industry 5.0. The review commences by providing an outline of the role of CPSs in Industry 5.0 and then proceeds to conduct a thorough review of the different security risks associated with CPSs in the context of Industry 5.0. Afterward, the study also presents the privacy implications inherent in these systems, particularly in light of the massive data collection and processing required. In addition, the paper delineates potential avenues for future research and provides countermeasures to surmount these challenges. Overall, the study underscores the imperative of adopting comprehensive security and privacy strategies within the context of Industry 5.0.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Cyber-physical systems; CPS; Industry 5.0; security; data privacy; human-machine collaboration; data protection
【发表时间】2024
【收录时间】2024-10-21
【文献类型】 理论模型
【DOI】 10.32604/cmc.2024.054150
【Author】 Psarra, Evgenia Apostolou, Dimitris Verginadis, Yiannis Patiniotakis, Ioannis Mentzas, Gregoris
【影响因子】3.298
【主题类别】
区块链技术-核心技术-访问控制
【Abstract】BackgroundAs digital healthcare services handle increasingly more sensitive health data, robust access control methods are required. Especially in emergency conditions, where the patient's health situation is in peril, different healthcare providers associated with critical cases may need to be granted permission to acquire access to Electronic Health Records (EHRs) of patients. The research objective of this work is to develop a proactive access control method that can grant emergency clinicians access to sensitive health data, guaranteeing the integrity and security of the data, and generating trust without the need for a trusted third party.MethodsA contextual and blockchain-based mechanism is proposed that allows access to sensitive EHRs by applying prognostic procedures where information based on context, is utilized to identify critical situations and grant access to medical data. Specifically, to enable proactivity, Long Short Term Memory (LSTM) Neural Networks (NNs) are applied that utilize patient's recent health history to prognose the next two-hour health metrics values. Fuzzy logic is used to evaluate the severity of the patient's health state. These techniques are incorporated in a private and permissioned Hyperledger-Fabric blockchain network, capable of securing patient's sensitive information in the blockchain network.ResultsThe developed access control method provides secure access for emergency clinicians to sensitive information and simultaneously safeguards the patient's well-being. Integrating this predictive mechanism within the blockchain network proved to be a robust tool to enhance the performance of the access control mechanism. Furthermore, the blockchain network of this work can record the history of who and when had access to a specific patient's sensitive EHRs, guaranteeing the integrity and security of the data, as well as recording the latency of this mechanism, where three different access control cases are evaluated. This access control mechanism is to be enforced in a real-life scenario in hospitals.ConclusionsThe proposed mechanism informs proactively the emergency team of professional clinicians about patients' critical situations by combining fuzzy and predictive machine learning techniques incorporated in the private and permissioned blockchain network, and it exploits the distributed data of the blockchain architecture, guaranteeing the integrity and security of the data, and thus, enhancing the users' trust to the access control mechanism.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Private and permissioned blockchain; Hyperledger fabric blockchain technology; Smart contacts; Personalized policies; Decision making; Emergency services; Attribute-based access control policies; Medical prognosis; Electronic health records; Machine learning
【发表时间】2024
【收录时间】2024-10-21
【文献类型】 理论模型
【影响因子】3.252
【主题类别】
区块链应用-实体经济-汽车领域
【Abstract】This survey paper explores the cybersecurity certification requirements defined by the SunSpec Alliance for Distributed Energy Resource (DER) devices, focusing on aspects such as software updates, device communications, authentication mechanisms, device security, logging, and test procedures. The SunSpec cybersecurity standards mandate support for remote and automated software updates, secure communication protocols, stringent authentication practices, and robust logging mechanisms to ensure operational integrity. Furthermore, the paper discusses the implementation of the SAE J3072 standard using the IEEE 2030.5 protocol, emphasizing the secure interactions between electric vehicle supply equipment (EVSE) and plug-in electric vehicles (PEVs) for functionalities like vehicle-to-grid (V2G) capabilities. This research also examines the SunSpec Modbus standard, which enhances the interoperability among DER system components, facilitating compliance with grid interconnection standards. This paper also analyzes the existing SunSpec Device Information Models, which standardize data exchange formats for DER systems across communication interfaces. Finally, this paper concludes with a detailed discussion of the energy storage cybersecurity specification and the blockchain cybersecurity requirements as proposed by SunSpec Alliance.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】distributed energy resources; SunSpec; electric vehicles; cybersecurity
【发表时间】2024
【收录时间】2024-10-21
【文献类型】 综述
【DOI】 10.3390/en17195017
【影响因子】3.252
【主题类别】
区块链应用-实体经济-能源领域
【Abstract】The energy transition toward Net Zero Emission by 2060 hinges on the renewable energy power plants in Indonesia. Good practices in several countries suggest a peer-to-peer (P2P) energy trading system using blockchain technology, supported by renewable energy (solar panels), an innovation to provide equal access to sustainable electricity while reducing the impact of climate change. The P2P energy trading concept has a higher social potential than the conventional electricity buying and selling approach, such as that of PLN (the state-owned electricity company in Indonesia), which applies the network management concept but does not have a sharing element. This model implements a solar-powered mini-grid system and produces a smart contract that facilitates electricity network users to buy, sell, and trade electricity in rural areas via smartphones. This study aims to measure the stakeholders' perceptions of the peer-to-peer (P2P) energy trading model using blockchain technology in the Gumelar District, Banyumas Regency, Central Java Province, Indonesia. The stakeholders in question are representatives of Households (producers and consumers), Government, State Electricity Company (PLN), Non-Governmental Organizations, Private Sector and Academician. Measurement of perception in this study used a questionnaire approach with a Likert scale. The results of filling out the questionnaire were analyzed using four methods: IFE/EFE matrix; IE matrix; SWOT matrix; and SPACE matrix to assess the results and their suitability to each other. The results of the stakeholder perception assessment show that there are 44 internal factors and 33 external factors that can influence this model. We obtained an IFE and EFE score of 2.92 and 2.83 for the internal and external results using the IE matrix. These place the model in quadrant V, meaning the P2P model can survive in the long term to generate profits. Based on the SWOT analysis results, this model is located at the coordinate point -0.40, 0.31, placing it in quadrant II. This means that the P2P model is in a competitive situation and faces threats but still has internal strengths. Based on the SPACE matrix, stakeholder perception states that the P2P model is at coordinate point 1, -0.3. This shows that the P2P model has the potential to be a competitive advantage in its type of activity that continues to grow. In conclusion, our findings show that stakeholders' perceptions of P2P models using blockchain technology can be implemented effectively and provide social, economic, and environmental incentives.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】blockchain; energy trading; peer-to-peer; net zero emissions; stakeholders' perceptions
【发表时间】2024
【收录时间】2024-10-21
【文献类型】 案例研究
【DOI】 10.3390/en17194956
【影响因子】3.160
【主题类别】
区块链技术-核心技术-分布式账本
【Abstract】The management and exchange of electronic health records (EHRs) remain critical challenges in healthcare, with fragmented systems, varied standards, and security concerns hindering seamless interoperability. These challenges compromise patient care and operational efficiency. This paper proposes a novel solution to address these issues by leveraging distributed ledger technology (DLT), including blockchain, to enhance data security, integrity, and transparency in healthcare systems. The decentralized and immutable nature of DLT enables more efficient and secure information exchange across platforms, improving decision-making and coordination of care. This paper outlines a strategic implementation approach, detailing timelines, resource requirements, and stakeholder involvement while addressing crucial privacy and security concerns like encryption and access control. In addition, it explores standards and protocols necessary for achieving interoperability, offering case studies that demonstrate the framework's effectiveness. This work contributes by introducing a DLT-based solution to the persistent issue of EHR interoperability, providing a novel pathway to secure and efficient health data exchanges. It also identifies the standards and protocols essential for integrating DLT with existing health information systems, thereby facilitating a smoother transition toward enhanced interoperability.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】electronic health records (EHRs); distributed ledger technology (DLT); health data interoperability; data security in healthcare; medical data integration
【发表时间】2024
【收录时间】2024-10-21
【文献类型】 理论模型
【Author】 Iovane, Gerardo Benedetto, Elmo Gallo, Carmine
【影响因子】2.838
【主题类别】
区块链技术-核心技术-密码学
【Abstract】The huge computational cost required to test whether a number is prime and the inefficiency of the known sieving algorithms for extremely large inputs have posed significant challenges in computational number theory. Traditional deterministic prime generation methods struggle to maintain performance when the input sizes increase exponentially. In this work, we show that, through multiscale distribution and deterministic prime number generation, it is possible to create a multiscale sieve with drastically better performance than the deterministic algorithms known to date, providing a more efficient solution for large-scale prime number generation, demonstrated by several benchmarks that highlight the potential of our approach. Consequently, we can gain some advantages in cryptography and in info-security, such as in IoT and blockchain environments.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】prime number; sieve algorithms; multiscale distribution; cryptography; IoT; blockchain
【发表时间】2024
【收录时间】2024-10-21
【文献类型】 理论模型
【DOI】 10.3390/app14198983
【影响因子】2.838
【主题类别】
区块链应用-实体经济-食品供应链
【Abstract】This systematic review critically examines the diverse applications of Blockchain technology in the food supply chain and identifies areas where its potential remains underutilized. By analysing 60 Blockchain-based frameworks, the study highlights the most frequently employed drivers such as transparency, traceability, and security within food supply chains. Additionally, underexplored applications such as food donation and redistribution, supply chain financing, animal welfare, food waste management, and data analysis are identified, revealing opportunities for further innovation. The research employed NVivo 14 to analyze the extent of Blockchain's implementation in various food supply chain drivers, and the findings informed the development of a more diverse framework for Blockchain integration. Key insights demonstrate Blockchain's transformative potential, particularly in enhancing data integrity, trust, and operational efficiency through its immutable ledger and smart contracts, which streamline transactions, cut administrative costs, and reduce fraud. In terms of sustainability and safety, Blockchain improves traceability, accelerates safety responses, promotes environmental sustainability by tracking resource usage, and enhances humanitarian efforts with transparent, efficient resource distribution. Additionally, Blockchain facilitates food waste reduction by optimizing inventory and distribution, while ensuring surplus food reaches those in need. The study concludes by offering a roadmap for future research, pointing toward untapped dimensions of Blockchain's application in food traceability, sustainable supply chain management, and environmental & social impact. While the review provides a comprehensive understanding of Blockchain's current usage in food supply chains, the scope is limited by the systematic review process and specific inclusion criteria. This study serves as a foundation for exploring Blockchain's broader potential in shaping the future of food supply chains.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain; Industry 4.0; precision farming; Agriculture 4.0; Livestock 4.0; food supply chain; smart waste management; animal welfare; supply chain finance; sustainability; circular economy
【发表时间】2024
【收录时间】2024-10-21
【文献类型】 案例研究
【DOI】 10.3390/app14198944
【Author】 Benzinho, Jose Ferreira, Joao Batista, Joel Pereira, Leandro Maximiano, Marisa Tavora, Vitor Gomes, Ricardo Remedios, Orlando
【影响因子】2.838
【主题类别】
区块链技术-协同技术-大模型
【Abstract】Blockchain technology has been used with great effect in farm-to-fork traceability projects. However, this technology has a steep learning curve when it comes to its user interface. To minimize this difficulty, we created a solution based on a Large Language Model (LLM) conversational agent. Our implementation, starting with an existing knowledge base that is prepared and processed with an embedding model to be stored in a vector database, follows a Retrieval-Augmented Generation (RAG) approach. Other non-textual media like images and videos are aggregated with the embeddings to enrich the user experience. User queries are combined with a proximity search in the vector database and feed into an LLM that considers the conversation history with the user in its replies. Given the asynchronous nature of these models, we implemented a similarly asynchronous scheme using Server-Sent Events that deliver the models' replies to a UI that supports multimodal media types such as images and videos by providing the visualization of these resources. The end solution allows users to interact with advanced technologies using a natural language interface; this in turn empowers food traceability projects to overcome their natural difficulty in engaging early adopters.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】chatbot; large language model; user support; vector databases; RAG
【发表时间】2024
【收录时间】2024-10-21
【文献类型】 理论模型
【DOI】 10.3390/app14198856
【Author】 Yi, Ji Hyun Moon, Jinsoo
【影响因子】2.838
【主题类别】
区块链应用-实体经济-知识产权
【Abstract】This study proposes a method that enables craftsmen to define and apply the unique characteristics of their craftworks to distinguish between originals and imitations and to protect and trade their intellectual property rights. In the first step, a digital fingerprint that enables the authentication of the original craftworks was generated by applying hash functions that can digitize various attributes of the craftworks and create a unique ID. In the second step, a blockchain transaction system for the original authentication of the craftwork was developed by applying consortium blockchain technology. This system allows multiple craft-related organizations to participate together, and when a transaction occurs, a smart contract is created and stored on the blockchain, thereby enabling the tracking and management of transaction histories. Furthermore, a DApp was developed that enables buyers to verify the craftwork authentication and access detailed information by scanning the digital fingerprint (QR code) of the craftwork, which is integrated with the blockchain system. In the third step, the research results were evaluated through a satisfaction survey conducted with 121 participants and a usability evaluation with 10 craftsmen, both of which yielded positive feedback. This study successfully realizes a secure and transparent craftwork transaction system that guarantees both security and efficiency through the integration of digital fingerprinting and blockchain technologies.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】craftwork authentication; digital fingerprint for craftworks; blockchain in craftwork trade; craftsmen intellectual property protection; smart contracts for crafts
【发表时间】2024
【收录时间】2024-10-21
【文献类型】 实验仿真
【DOI】 10.3390/app14199054
【影响因子】2.690
【主题类别】
区块链技术-核心技术-去中心化身份
区块链应用-虚拟经济-元宇宙
【Abstract】As we transition into the era of Web 3.0, where decentralized information and user privacy are paramount, emerging technologies are reshaping the way in which personal data are managed. This paper focuses on decentralized identity management (DID) in the metaverse, particularly within the education sector, which has rapidly embraced digital tools for e-learning, especially since the COVID-19 pandemic. Technologies such as blockchain, artificial intelligence (AI), and virtual and augmented reality (VR/AR) are increasingly integrated into educational platforms, raising questions about privacy, security, and interoperability. This literature review examines the current landscape of DID in metaverse-based educational applications. Through a systematic methodology, relevant academic papers were identified, filtered, and analyzed based on four key criteria: standardization, interoperability, application scalability, and security/privacy considerations. The paper provides a comparative analysis of these papers to assess the maturity of DID implementations, highlight existing challenges, and suggest future research directions in the intersection of decentralized identity and educational metaverse applications.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】decentralized identity management; metaverse; education; scalability; interoperability; standardization; literature review
【发表时间】2024
【收录时间】2024-10-21
【文献类型】 综述
【Author】 Kabashkin, Igor
【影响因子】2.690
【主题类别】
区块链应用-实体经济-航空航天
【Abstract】The increasing complexity of modern aircraft systems necessitates advanced monitoring solutions to ensure operational safety and efficiency. Traditional aircraft health monitoring systems (AHMS) often rely on reactive maintenance strategies, detecting only visible faults while leaving underlying issues unaddressed. This gap can lead to critical failures and unplanned downtime, resulting in significant operational costs. To address this issue, this paper proposes the integration of artificial intelligence (AI) and blockchain technologies within an enhanced AHMS, utilizing the iceberg model as a conceptual framework to illustrate both visible and hidden defects. The model highlights the importance of detecting and addressing issues at the earliest possible stages, ensuring that hidden defects are identified and mitigated before they evolve into significant failures. The rationale behind this approach lies in the need for a predictive maintenance system capable of identifying and mitigating hidden risks before they escalate. Key tasks completed in this study include: a comparative analysis of the proposed system with existing monitoring solutions, the selection of AI algorithms for fault prediction, and the development of a blockchain-based infrastructure for secure, transparent data sharing. The evolution of AHMS is discussed, emphasizing the shift from traditional monitoring to advanced, predictive, and prescriptive maintenance approaches. This integrated approach demonstrates the potential to significantly improve fault detection, optimize maintenance schedules, and enhance data security across the aviation industry.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】aircraft health monitoring systems; iceberg model; aviation health management; predictive maintenance; artificial intelligence; blockchain; federated learning; data analytics; prescriptive maintenance
【发表时间】2024
【收录时间】2024-10-21
【文献类型】 综述
【影响因子】2.690
【主题类别】
区块链技术-核心技术-隐私保护
区块链应用-实体经济-药物领域
【Abstract】The Internet of Medical Things (IoMT) is a rapidly expanding network comprising medical devices, sensors, and software that collect and exchange patient health data. Today, the IoMT has the potential to revolutionize healthcare by offering more personalized care to patients and improving the efficiency of healthcare delivery. However, the IoMT also introduces significant privacy concerns, particularly regarding data privacy. IoMT devices often collect and store large amounts of data about patients' health. These data could be used to track patients' movements, monitor their health habits, and even predict their future health risks. This extensive data collection and surveillance could be a major invasion of patient privacy. Thus, privacy-preserving research in an IoMT context is an important area of research that aims to mitigate these privacy issues. This review paper comprehensively applies the PRISMA methodology to analyze, review, classify, and compare current approaches of preserving patient data privacy within IoMT blockchain-based healthcare environments.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】blockchain; data protection; IoMT; privacy preservation
【发表时间】2024
【收录时间】2024-10-21
【文献类型】 综述
【影响因子】2.690
【主题类别】
区块链应用-实体经济-网络安全
【Abstract】Software-Defined Networking (SDN) has emerged as a revolutionary architecture in computer networks, offering comprehensive network control and monitoring capabilities. However, securing the east-west interface, which is crucial for communication between distributed SDN controllers, remains a significant challenge. This study proposes a novel blockchain-based security framework that integrates Ethereum technology with customized blockchain algorithms for authentication, encryption, and access control. The framework introduces decentralized mechanisms to protect against diverse attacks, including false data injection, man-in-the-middle (MitM), and unauthorized access. Experimental results demonstrate the effectiveness of this framework in securing distributed controllers while maintaining high network performance and low latency, paving the way for more resilient and trustworthy SDN infrastructures.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】SDN East-West Interface; Securing Distributed SDN Controllers; SDN and Blockchain; Decentralized SDN
【发表时间】2024
【收录时间】2024-10-21
【文献类型】 理论模型
【Author】 Kiani, Rasoul Sheng, Victor S.
【影响因子】2.690
【主题类别】
区块链治理-技术治理-智能合约漏洞检测
【Abstract】The substantial value held by smart contracts (SCs) makes them an enticing target for malicious attacks. The process of fixing vulnerabilities in SCs is intricate, primarily due to the immutability of blockchain technology. This research paper introduces a systematic literature review (SLR) that evaluates rectification systems designed to patch vulnerabilities in SCs. Following the guidelines set forth by the PRISMA statement, this SLR meticulously reviews a total of 31 papers. In this context, we classify recently published SC automated repair frameworks based on their methodologies for automatic program repair (APR), rewriting strategies, and tools for vulnerability detection. We argue that automated patching enhances the reliability and adoption of SCs, thereby allowing developers to promptly address identified vulnerabilities. Furthermore, existing automated repair tools are capable of addressing only a restricted range of vulnerabilities, and in some cases, patches may not be effective in preventing the targeted vulnerabilities. Another key point that should be taken into account is the simplicity of the patch and the gas consumption of the modified program. Alternatively, large language models (LLMs) have opened new avenues for automatic patch generation, and their performance can be improved by innovative methodologies.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】smart contract; APR; vulnerability
【发表时间】2024
【收录时间】2024-10-21
【文献类型】 综述
【影响因子】2.690
【主题类别】
区块链应用-实体经济-软件开发
【Abstract】Cryptocurrency software implements cryptocurrency operations (including the distributed consensus protocol and peer-to-peer networking) and often involves the open-source community. We design a software assurance scheme for cryptocurrency and advance the cryptocurrency handshaking protocol by providing the verification capability of the Bitcoin software by peers and preventing any potential peer from establishing a connection with modified Bitcoin software. Since we focus on Bitcoin (the most popular cryptocurrency) for implementation and integration, we call our scheme Version++, built on and advancing the current Bitcoin handshaking protocol based on the Version message. Our Version++ protocol providing software assurance is distinguishable from previous research because it is permissionless, distributed, and lightweight for its cryptocurrency application. Our scheme is permissionless since it does not require a centralized trusted authority (unlike the remote software attestation techniques from trusted computing); it is distributed since the peer checks the software assurances of its own peer connections; and it is designed for efficiency/lightweight to support the dynamic nature of the peer connections and large-scale broadcasting in cryptocurrency networking. Utilizing Merkle Tree for the efficiency of the proof verification, we implement and test Version++ on Bitcoin software and conduct experiments in an active Bitcoin node prototype connected to the Bitcoin Mainnet. Our prototype-based performance analyses demonstrate the lightweight design of Version++. The peer-specific verification grows logarithmically with the number of software files in processing time and in storage. Furthermore, the Version++ verification overhead is small compared to the version-verack handshaking process; we measure the overhead to be 0.524% in our local networking environment between virtual machines and between 0.057% and 0.282% (depending on the peer location) in our more realistic cloud-based experiments with remote peer machines.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Bitcoin; software assurance; permissionless; distributed; Merkle Tree; Bitcoin Core
【发表时间】2024
【收录时间】2024-10-21
【文献类型】 实验仿真
【影响因子】2.592
【主题类别】
区块链技术-协同技术-联邦学习
【Abstract】Federated learning facilitates collaborative computation among multiple participants while safeguarding user privacy. However, current federated learning algorithms operate under the assumption that all participants are trustworthy and their systems are secure. Nonetheless, real-world scenarios present several challenges: (1) Malicious clients disrupt federated learning through model poisoning and data poisoning attacks. Although some research has proposed secure aggregation methods to address this issue, many methods have inherent limitations. (2) Clients may refuse or passively participate in the training process due to considerations of self-interest, and may even interfere with the training process due to competitive relationships. To overcome these obstacles, we have devised a reliable federated framework aimed at ensuring secure computing throughout the entirety of federated task processes. Initially, we propose a method for detecting malicious models to safeguard the integrity of model aggregation. Furthermore, we have proposed a fair contribution assessment method and awarded the right to write blocks to the creator of the optimal model, ensuring the active participation of participants in both local training and model aggregation. Finally, we establish a computational framework grounded in blockchain and smart contracts to uphold the integrity and fairness of federated tasks. To assess the efficacy of our framework, we conduct simulations involving various types of client attacks and contribution assessment scenarios using multiple open-source datasets. Results from these experiments demonstrate that our framework effectively ensures the credibility of federated tasks while achieving impartial evaluation of client contributions.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】federated learning; blockchain; malicious model detection; contribution evaluation
【发表时间】2024
【收录时间】2024-10-21
【文献类型】 理论模型
【DOI】 10.3390/math12193068
【影响因子】2.592
【主题类别】
区块链应用-实体经济-物联网
【Abstract】In the Internet of Things (IoT), the selection of mobile users with IoT-enabled devices plays a crucial role in ensuring the efficiency and accuracy of data collection. The reputation of these mobile users is a key indicator in selecting high-quality participants, as it directly reflects the reliability of the data they submit and their past performance. However, existing approaches often rely on a trusted centralized server, which can lead to single points of failure and increased vulnerability to attacks. Additionally, they may not adequately address the potential manipulation of reputation scores by malicious entities, leading to unreliable and potentially compromised user selection. To address these challenges, we propose PRUS, a privacy-preserving and quality-aware user selection scheme for IoT. By leveraging the decentralized and immutable nature of the blockchain, PRUS enhances the reliability of the user selection process. The scheme utilizes a public-key cryptosystem with distributed decryption to protect the privacy of users' data and reputation, while truth discovery techniques are employed to ensure the accuracy of the collected data. Furthermore, a privacy-preserving verification algorithm using reputation commitment is developed to safeguard against the malicious tampering of reputation scores. Finally, the Dirichlet distribution is used to predict future reputation values, further improving the robustness of the selection process. Security analysis demonstrates that PRUS effectively protects user privacy, and experimental results indicate that the scheme offers significant advantages in terms of communication and computational efficiency.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】crowdsensing; privacy-preserving; quality-aware reputation; user selection
【发表时间】2024
【收录时间】2024-10-21
【文献类型】 案例研究
【DOI】 10.3390/math12192961
【影响因子】2.592
【主题类别】
区块链应用-实体经济-健康领域
【Abstract】Healthcare 4.0 is considered the most promising technology for gathering data from humans and strongly couples with a communication system for precise clinical and diagnosis performance. Though sensor-driven devices have largely made our everyday lives easier, these technologies have been suffering from various security challenges. Because of data breaches and privacy issues, this heightens the demand for a comprehensive healthcare solution. Since most healthcare data are sensitive and valuable and transferred mostly via the Internet, the safety and confidentiality of patient data remain an important concern. To face the security challenges in Healthcare 4.0, Web 3.0 and blockchain technology have been increasingly deployed to resolve the security breaches due to their immutability and decentralized properties. In this research article, a Web 3.0 ensemble hybrid chaotic blockchain framework is proposed for effective and secure authentication in the Healthcare 4.0 industry. The proposed framework uses the Infura Web API, Web 3.0, hybrid chaotic keys, Ganache interfaces, and MongoDB. To allow for more secure authentication, an ensemble of scroll and Henon maps is deployed to formulate the high dynamic hashes during the formation of genesis blocks, and all of the data are backed in the proposed model. The complete framework was tested in Ethereum blockchain using Web 3.0, in which Python 3.19 is used as the major programming tool for developing the different interfaces. Formal analysis is carried out with Burrows-Abadi-Needham Logic (BAN) to assess the cybersecurity reliability of the suggested framework, and NIST standard tests are used for a thorough review. Furthermore, the robustness of the proposed blockchain is also measured and compared with the other secured blockchain frameworks. Experimental results demonstrate that the proposed model exhibited more defensive characteristics against multiple attacks and outperformed the other models in terms of complexity and robustness. Finally, the paper gives a panoramic view of integrating Web 3.0 with the blockchain and the inevitable directions of a secured authentication framework for Healthcare 4.0.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Healthcare 4.0; Web 3.0; hybrid chaotic keys; Ethereum; BAN; NIST; scroll; Henon maps; blockchain
【发表时间】2024
【收录时间】2024-10-21
【文献类型】 案例研究
【DOI】 10.3390/math12193067
【影响因子】2.592
【主题类别】
区块链技术-协同技术-钱包技术
【Abstract】The transportation industry has been recognized as one of the industries that can benefit from investment in blockchain-based systems and services that enable distributed data management and improve the effectiveness and efficiency of the transportation sector. However, the literature needs a guiding framework for integrating blockchain in issuing and preserving public transportation transactions in a technical environment that is secure, efficient, and transparent. This study proposes a blockchain-based transportation wallet (BTW) framework that facilitates the main digital transactions across diverse public transportation services. BTW embodies leveraging blockchain technology, which provides a decentralized and immutable ledger that records and verifies transactions, ensuring trust and reducing the risk of fraud. The framework has been validated by developing a blockchain-based public transportation smart wallet named "RideChain". This serves as a single decentralized point for making public transportation transactions and payments, as well as identity authorizations and management. RideChain enhances passengers' and service providers' experience through a secure and authentic platform for offering several reliable public transportation transactions efficiently. In this study, we implemented a smart contract to establish a protocol between passengers and journey services. The testing methodologies used in this study comprise unit testing, integration testing, performance testing, and user acceptance testing. The findings suggest that BTW has been successfully verified to demonstrate its capability for secure transactions, authenticity of monetary transactions, automated smart contracts, decentralized identity authentication, and effortless payments.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】blockchain technology; public transportation; DLT; decentralized application DApp; smart contract; identity management; e-wallet; mobile application
【发表时间】2024
【收录时间】2024-10-21
【文献类型】 理论模型
【DOI】 10.3390/math12193033
【影响因子】2.303
【主题类别】
区块链应用-实体经济-物联网
【Abstract】The Internet of Things (IoT) is rapidly growing, providing convenience in daily life. However, ensuring the security of IoT systems is crucial, especially as they generate vast amounts of data, often containing personal and private information. To address these issues, we propose a quantum-safe blockchain attested encryption scheme that uses lattice-based encryption with blockchain technology. This consensus process removes reliance on third-party central service providers and uses consensus nodes as proxy service nodes to encrypt data and aggregate translated ciphertext. This approach mitigates the limitations of using a decentralized network for secure storage and dissemination of private encrypted data. Moreover, the security analysis demonstrates security against attacks from polynomial-time adversaries and probabilistic polynomial-time adversaries. Additionally, the performance evaluation shows that the proposed scheme outperforms existing ones in terms of computational and communication costs. The encryption and decryption costs are minimized to T & lowast;1+(T & lowast;2+T & lowast;3+T+1)approximate to 3.096\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$T_{*1} + (T_{*2} + T_{*3} + T_{+1}) \approx 3.096$$\end{document}, and T & lowast;6 approximate to 0.010\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$T_{*6} \approx 0.010$$\end{document}, respectively, demonstrating its efficiency. A comparison of properties and features with other protocols highlights the proposed scheme's advantages, such as quantum resistance, multi-authority support, and collision resistance. This combination establishes the proposed scheme as a robust solution. The proposed protocol employs lattice-based encryption and blockchain consensus algorithms to facilitate IoT data exchange, making it highly efficient and secure for the transfer of information in IoT systems.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Identity-based encryption; Post-quantum security; Internet of Things (IoT); Blockchain; Learning with error
【发表时间】2025
【收录时间】2024-10-21
【文献类型】 案例研究
【Author】 Ye, Guodong Chen, Zhuozhao
【影响因子】2.303
【主题类别】
区块链技术-协同技术-图分析
【Abstract】An authenticated reversible image hiding algorithm based on blockchain framework is presented in this paper. First, global eigenvalues of the plain image are extracted as plaintext keys. Meanwhile, a novel key transformation model is built, combining with public key cryptography RSA and random numbers to compute the initial values for Lorenz system. Thereby, chaotic sequences are produced. Secondly, a preprocessed model and an integer getting model are constructed to process these chaotic sequences and generate preprocessed sequences. The digital signature image and the plain image are then encrypted to obtain a cipher signature image and a cipher image. Thirdly, integer wavelet transform is executed on the carrier image to embed the cipher signature image and the cipher image in the frequency domain matrices by the least significant bit. Next, 2k\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2<^>{k}$$\end{document} correction method is employed to correct these coefficient matrices. Finally, inverse integer wavelet transform is performed on the coefficient matrices to generate the carrier image containing secrets. Especially, cipher signature image is stored in an interplanetary file system, producing content identifier hash value. Then content identifier hash value is written into smart contract and saved on Ethereum blockchain. In the stages of decryption and authentication, the receiver inquires the corresponding transaction file from blockchain by the transaction address, obtaining content identifier hash value and downloading cipher signature image from interplanetary file system. Consequently, the receiver extracts cipher signature image from carrier image containing secrets to do decryption and authentication. Experimental results show that the proposed image hiding algorithm has strong sensitivity to both key and plaintext, can resist clipping attack, and etc.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain; Carrier image containing secrets; Correction; Image hiding; Least significant bit
【发表时间】2025
【收录时间】2024-10-21
【文献类型】 理论模型
【Author】 Goswami, Bidisha Choudhury, Hiten
【影响因子】2.017
【主题类别】
区块链应用-实体经济-物联网
【Abstract】5G cellular network is becoming a preferred choice for future deployments of IoT, due to its flexibility, low latency and high bandwidth. It has introduced small cells like femtocells, picocells and microcells to provide higher bandwidth. However, small cells have less signalling coverage, which leads to frequent handover authentication. Therefore, for seamless mobility in 5G cellular network, the existing handover authentication process, which is referred to as '5G-Handover-AKA' in this paper and illustrated in section 6.9.2.3.2 of the 3GPP technical specification TS 33.501, should be made faster. It also has to be made efficient, considering the resource constraints of IoT devices. In this paper, we propose a blockchain based fast and secure handover authentication scheme for 5G cellular network. Unlike 5G-Handover-AKA, the proposed protocol is designed to be robust against security attacks like false base station attack and key compromise attack. While informal security analysis shows the scheme to be robust against various security attacks like de-synchronization attack, eavesdropping attack, denial of service attack, etc., formal security analysis using BAN logic and Scyther tool shows that the scheme meets all the security goals. Performance analysis of the scheme shows that it achieves its goals with 15.84% lesser communication overhead and 18.08% lesser computation overhead at the resource constrained IoT device in comparison to 5G-Handover-AKA.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Internet of Things; 5G cellular network; Blockchain; Handover authentication; Security
【发表时间】2024
【收录时间】2024-10-21
【文献类型】 理论模型
【Author】 Haldar, Paranjay Roy, Rajdeep Biswas, Utpal
【影响因子】2.017
【主题类别】
区块链应用-实体经济-投票领域
【Abstract】This paper displays the architecture and implementation of an online voting system that employs Blockchain technology and the InterPlanetary File System (IPFS) to assure safe, transparent, and tamper-proof elections. The offered framework utilizes IPFS to record and supervises voter details, such as name, father's name, address, constituency, and date of birth. IPFS gives a Content Identifier (CID) based on these attributes. The Election Commission (EC) hashes these CIDs with SHA256 to avail authentication and then records them on the smart contract. Voters issues their particulars to IPFS to achieve a CID, which is then encrypted and validated against the data recorded in the smart contract to warrant its legitimacy. On successful validation, voters produce additional credentials, including their wallet address and password, which are then thoroughly stored on IPFS. The repossessed CID is afresh encrypted with the EC's private key before being sent storing on the smart contract. During the voting procedure, voters present their wallet address and password. These particulars are directed to IPFS to recoup the CID. Once the CID is picked up, it is encrypted and verified in provision of the smart contract. If the verification is successful, the voter is treated genuine and licensed to cast their votes. To forbid fraud and unauthorized access, the system's architecture assures vigorous security through encryption and Blockchain verification. The incorporation of Blockchain technology into the voting process also strengthens both transparency and integrity. This paper circumferences the implementation dares, security considerations, and potential enhancement for scalability and efficiency in large-scale elections.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain; CID; Encryption; IPFS; Online voting; Smart contracts; Voter authentication
【发表时间】2024
【收录时间】2024-10-21
【文献类型】 案例研究
【影响因子】0.000
【主题类别】
区块链技术-核心技术-跨链与多链
【Abstract】Liquidity is critical for a healthy and thriving blockchain ecosystem, enabling value exchange between participants. However, achieving unified liquidity across heterogeneous blockchain platforms remains challenging due to disparities in architecture, virtual machines, and asset management logic. These disparities force assets to be wrapped into other formats to ensure compatibility with underlying systems, thus fragmenting liquidity into multiple pools. This paper proposes LiquiSpell, a novel protocol that aims to unify liquidity across multiple parachains within the Polkadot ecosystem. By leveraging the cross-chain message passing (XCMP), LiquiSpell introduces the concept of a universal transaction that can be constructed to be compatible with any parachain, regardless of its underlying architecture or asset management pallet. This approach overcomes the obstacles posed by the diverse nature of parachains, enabling seamless asset sharing and enhancing cross-chain interoperability. The proposed solution mitigates liquidity fragmentation within the Polkadot ecosystem. It presents a framework that can be extended to other multichain environments outside Polkadot. Ultimately, LiquiSpell aims to foster a thriving ecosystem by facilitating the introduction of new assets and increasing overall liquidity, thereby driving innovation and adoption within the decentralized finance (DeFi) landscape.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】cross-chain; liquidity; ASSETS; XCM; XCMP; interoperability; Polkadot
【发表时间】2024
【收录时间】2024-10-21
【文献类型】 案例研究
【Author】 Giannakopoulos, Nikolaos T. Reklitis, Dimitrios P. Terzi, Marina C. Sakas, Damianos P. Kanellos, Nikos
【影响因子】0.000
【主题类别】
区块链应用-实体经济-金融领域
【Abstract】In the continuously evolving environment of blockchain applications, decentralized finance (DeFi) has been discerned as a favorable application among internet users. In this point of view, DeFi platforms have known increased competition with multiple similar platforms constantly emerging. Therefore, DeFi platforms should seek to promote digitally their financial services and increase the visibility of their website. This study examines the potential utilization of DeFi YouTube channel metrics for enhancing their digital marketing performance (website visibility and campaign efficiency), through statistical analyses, system dynamics (SD), and eye-tracking models. From the paper's outcomes, it becomes clear that only the YouTube metrics of the number of videos, number of comments, video interaction, channel views, and views per video can affect DeFi platforms' website visibility and campaigns' efficiency. Toward this purpose, neuromarketing applications (eye tracking and heatmaps) indicated that DeFi YouTube channels should select an engaging video (high interaction rate) and provide little but clear information on their home page. Apart from that, the rest of the channel's pages should be enriched with a logical number of highly interactive short-duration videos, and not with an increasing number of videos.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Strategic digital marketing; Video marketing; Decentralized finance (DeFi); Big data; Neuromarketing; Decision support systems (DSSs)
【发表时间】2024
【收录时间】2024-10-21
【文献类型】 案例研究
【Author】 Hamdi, Imen Toumi, Said
【影响因子】0.000
【主题类别】
区块链治理-市场治理-技术采用
区块链应用-实体经济-供应链
区块链应用-实体经济-药物领域
【Abstract】PurposeIn the context of digitalizing the supply chain of different sectors, the blockchain technology (BT) is emerged and becomes one of the most interesting and debated research topics. A few years ago, this technology was implemented for the first time in the financial sector, which is currently extended to be used in many other areas, mainly the health-care sector. The success of this technology stems from its ability to enhance the performance, security, consistency of sharing medical data within the whole system and the analysis of medical records. Technically, the BT is defined as a decentralized digital ledger that records transactions between the stakeholders in a supply chain. Thus, they could gain better control and find severe mistakes and the unsafe ones in the medical field. The purpose of this paper is to address a preliminary study of the BT adoption in a real pharmaceutical supply chain (PSC) of the Tunisian case.Design/methodology/approachIndeed, the authors propose an interpretive structural modeling (ISM) combined with the cross-impact matrix multiplication applied to classification (MICMAC) analysis. This methodology is known as an effective one used to identify the criteria that influence the implementation of the BT, analyze the relationships between them and delighting the most impactful ones.FindingsThe readiness criteria for the adoption of the BT for the considered system are identified which are 10 ones and the structural relationship between them is uncovered through many interviews with experts. Hence, the found results define the most crucial criteria that should be valorized amongst the other criteria.Originality/valueThe originality of this study stems from its theoretical and practical relevance regarding the potential of the pharmaceutical system and the importance of the integration of new technologies as the BT. The ISM-MICMAC approach seems to be very performant for such preliminary study of the BT adoption in the Tunisian pharmaceutical system.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain; Supply chain management; Tunisian pharmaceutical system; Interpretive structural modeling; Cross-impact matrix multiplication; Logistics; Healthcare; Data analysis
【发表时间】2024
【收录时间】2024-10-21
【文献类型】 案例研究
【DOI】 10.1108/JM2-01-2024-0020
【Author】 Wu, Huiyu Klabjan, Diego
【影响因子】
【主题类别】
区块链技术-协同技术-联邦学习
【Abstract】Blockchain based federated learning is a distributed learning scheme that allows model training without participants sharing their local data sets, where the blockchain components eliminate the need for a trusted central server. In this paper we propose a softmax aggregation blockchain based federated learning framework. First, we propose a new blockchain based federated learning architecture that utilizes the well-tested proof-of-stake consensus mechanism on an existing blockchain network to select validators and miners to aggregate the participants' updates and compute the blocks. Second, to ensure the robustness of the aggregation process, we design a novel softmax aggregation method based on approximated population loss values. Additionally, we show our softmax aggregation technique converges to the global minimum in the convex setting with non-restricting assumptions. Our comprehensive experiments show that our framework outperforms existing robust aggregation algorithms in various settings by large margins.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Federated learning; Blockchain; Robust aggregation
【发表时间】2024
【收录时间】2024-10-21
【文献类型】 理论模型
【影响因子】
【主题类别】
区块链治理-技术治理-其他
【Abstract】In the evolving landscape of blockchain and distributed ledger technologies, the quest for decentralized governance has led to the advent of Decentralized Autonomous Organizations (DAOs). DAOs offer a groundbreaking framework where token holders directly influence the management and strategic direction of decentralized structures. This study delves into the concept of DAO through the lens of No1s1, an experimental project embodying a self-sustaining architecture governed autonomously. No1s1 stands out as a physical space that operates independently, rewarding participants with tokens for performing maintenance tasks crucial for its upkeep. In this contribution, we employ agent-based modelling to simulate interactions between participants and No1s1, exploring the dynamics of the token economy, participatory governance, and the sustainability of such an autonomous entity. By examining the reciprocal maintenance relationship and its impact on No1s1's longevity and wealth, this study sheds light on the potential and challenges of DAO-governed structures.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Decentralised Autonomous Organisations (DAOs); Blockchain; Agent-Based Modeling; Governance
【发表时间】2024
【收录时间】2024-10-21
【文献类型】 理论模型
【Author】 Paykari, Nasim Lyons, Damian Rahouti, Mohamed
【影响因子】
【主题类别】
区块链技术-核心技术-共识机制
【Abstract】This work examines the innovative combination of blockchain techniques with Wide Area Visual Navigation (WAVN) to tackle visual navigation issues in a diverse group of mobile robots used in unstructured sectors like agriculture and forestry. It focuses on addressing GPS reliance, adapting to environmental shifts, and reducing computational burdens by integrating RoboStake, a novel blockchain Proof of Stake (PoS) mechanism into the WAVN system. This solution seeks to bolster cooperative navigation by assessing the reliability of each robot's navigational input. With methods including a stake weight function, a PoS consensus score, and a navigability function, this strategy confronts the computational hurdles of coordinating robots and verifying data. Lastly, we showcase how the proposed approach upholds critical navigability features of the WAVN system and present results from scalable simulation experiments to highlight the improved efficiency achieved through enhanced cooperation.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain; consensus; PoS; navigation; robot; WAVN
【发表时间】2024
【收录时间】2024-10-21
【文献类型】 案例研究
【Author】 Grigoryan, Hakob
【影响因子】
【主题类别】
区块链应用-实体经济-能源领域
【Abstract】This paper explores the integration of Blockchain technologies into the Peer-to-Peer (P2P) energy trading systems, highlighting the challenges and advantages associated with their real-world use. A comprehensive literature review provides insights into the complex landscape of Blockchain technologies and their applications in energy trading. The study examines the functionalities of decentralized marketplaces, including components of the P2P energy trading ecosystem, from virtual trading platforms to physical infrastructure. Acknowledging the transformative potential of Blockchain in revolutionizing traditional energy marketplaces, we propose a pragmatic and cost-effective solution tailored specifically for P2P energy trading in small communities. The multi-layer architecture includes the energy marketplace layer, the off-chain transaction layer, and the Blockchain layer. The marketplace operates on a distributed architecture with multiple participating peers, conducting all trading activities within an off-chain Decentralized Application (DApp) layer for low-cost, rapid, and efficient implementation. Transactions are executed through Smart Contracts on the Blockchain and securely recorded on the distributed ledger. The semi-private Blockchain network is employed with the Proof of Authority (PoA) consensus mechanism, ensuring optimal performance and controlled transaction validation. The proposed design aims to establish a foundation for future developments and provide valuable insights for researchers and practitioners.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】blockchain; energy trading; P2P; decentralization; marketplace; smart contracts
【发表时间】2024
【收录时间】2024-10-21
【文献类型】 案例研究
【Author】 Harrigan, Martin Lloyd, Thomas O'Broin, Daire
【影响因子】
【主题类别】
区块链治理-元分析-代币经济学
【Abstract】Tokens have proliferated across blockchains in terms of number, market capitalisation and utility. Some tokens are tokenised versions of existing tokens - known variously as wrapped tokens, fractional tokens, or shares. The repeated application of this process creates matryoshkian tokens of arbitrary depth. We perform an empirical analysis of token composition on the Ethereum blockchain. We introduce a graph that represents the tokenisation of tokens by other tokens, and we show that the graph contains non-trivial topological structure. We relate properties of the graph, e.g., connected components and cyclic structure, to the tokenisation process. For example, we identify the longest directed path and its corresponding sequence of tokens, and we visualise the connected components relating to a stablecoin and an NFT protocol. Our goal is to explore and visualise what has been wrought with tokens, rather than add yet another brick to the edifice.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】blockchain; wrapped tokens; graph analysis
【发表时间】2024
【收录时间】2024-10-21
【文献类型】 案例研究
【Author】 Chung, Hao Shi, Elaine
【影响因子】
【主题类别】
区块链技术-平台项目-交易费
【Abstract】In blockchains such as Bitcoin and Ethereum, users compete in a transaction fee auction to get their transactions confirmed in the next block. A line of recent works set forth the desiderata for a \dream" transaction fee mechanism (TFM), and explored whether such a mechanism existed. A dream TFM should satisfy 1) user incentive compatibility (UIC), i.e., truthful bidding should be a user's dominant strategy; 2) miner incentive compatibility (MIC), i.e., the miner's dominant strategy is to faithfully implement the prescribed mechanism; and 3) miner-user side contract proofness (SCP), i.e., no coalition of the miner and one or more user(s) can increase their joint utility by deviating from the honest behavior. The weakest form of SCP is called 1-SCP, where we only aim to provide resilience against the collusion of the miner and a single user. Sadly, despite the various attempts, to the best of knowledge, no existing mechanism can satisfy all three properties in all situations. Since the TFM departs from classical mechanism design in modeling and assumptions, to date, our understanding of the design space is relatively little. In this paper, we further unravel the mathematical structure of transaction fee mechanism design by proving the following results: Can we have a dream TFM? We prove a new impossibility result: assuming finite block size, no singleparameter, non-trivial, possibly randomized TFM can simultaneously satisfy UIC and 1-SCP. Consequently, no non-trivial TFM can satisfy all three desired properties simultaneously. This answers an important open question raised by Roughgarden in his recent work. Rethinking the incentive compatibility notions. We observe that the prevalently adopted incentive compatibility notions may be too draconian and somewhat flawed. We rectify the existing modeling techniques, and suggest a relaxed incentive compatibility notion that captures additional hidden costs of strategic deviation. We construct a new mechanism called the "burning second-price auction", and show that it indeed satisfies the new incentive compatibility notions. We additionally prove that the use of randomness is necessary under the new incentive compatibility notions for "useful" mechanisms that resist the coalitions of the miner and at least 2 users. Do the new design elements make a difference? Unlike classical mechanisms, TFMs may employ a couple new design elements that are idiosyncratic to blockchains. For example, a burn rule (employed by Ethereum's EIP-1559) allows part to all of the payment from the users to be burnt rather than paid to the miner. Some mechanisms also allow unconfirmed transactions to be included in the block, to set the price for others. Our work unveils how these new design elements actually make a difference in TFM design, allowing us to achieve incentive compatible properties that would otherwise be impossible.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】
【发表时间】2023
【收录时间】2024-10-21
【文献类型】 观点阐述
【影响因子】
【主题类别】
区块链治理-技术治理-挖矿检测
【Abstract】Bitcoin, which was launched in 2009, is one of the most popular blockchains. To sustain and secure the system, enough mining power must be needed. However, various factors can encourage miners to leave the Bitcoin network. This risk should be assessed in advance by introducing metrics to detect hash rate changes. For this purpose, this paper proposes a statistical method to determine whether there is a significant difference in computational power for the two given periods. Our proposal consists of three hypothesis tests that consider Bitcoin difficulty adjustments. The first and second tests detect hash rate changes in the mining resources across the Bitcoin network. The third focuses on shifts in the distribution of mining power among different pools. We conducted simulations to elucidate the statistical properties of the detection power of the first and second methods. In addition, we apply our three statistical tests to the Bitcoin block data at height 756,000 through 836,640 (from September 28, 2022 to March 28, 2024). Based on the inference results, we discuss how the mining power had fluctuated by some intervention effects, such as the drop in the Bitcoin price. This provides insights to understand and evaluate the stability of Bitcoin.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】blockchain; distributed ledger technology; Bitcoin stability; mining incentives
【发表时间】2024
【收录时间】2024-10-21
【文献类型】 理论模型
【作者】 郑起鼎; 王贺祥; 张洪玮
【作者单位】天津理工大学,计算机科学与工程学院;智能计算机及软件新技术天津市重点实验室;计算机病毒防治技术国家工程实验室;
【文献来源】数据与计算发展前沿(中英文)
【复合影响因子】
【综合影响因子】
【主题类别】
区块链技术-核心技术-签名方案
【摘要】【目的】为解决工业互联网跨域溯源体系中节点身份认证的问题,本文提出基于分布式密钥的Dion跨域认证方案,该方案旨在克服当前跨域认证方案中存在的证书机构中心化及扩展性不足等问题。【方法】本研究以DID去中心化身份技术为基础,采用分布式密钥生成技术与BLS签名算法构建证书颁发模型,通过合约建立用户身份证书的撤销与更新机制,利用证书实现跨域溯源的身份认证。【结果】在以太坊平台上进行的实验模拟了该方案在跨域溯源认证流程中的应用。结果表明,该方案在满足工业互联网跨域溯源的认证需求前提下,实现了证书颁发机构的去中心化,同时增强了系统对单点故障的抵御能力。【结论】基于DID的身份认证模型在区块技术领域展现出显著的潜力与应用前景,为各节点间的交互提供有效的身份证明。然而,在验证效率以及身份更新与撤销方面还需要进一步研究。
【关键词】区块链;;跨域认证;;分布式密钥;;跨域溯源
【文献类型】 案例研究
【发表时间】2024-10-21