期刊文献+
共找到11,243篇文章
< 1 2 250 >
每页显示 20 50 100
Technologies of blockchain interoperability:A survey 被引量:2
1
作者 Haonan Yuan Shufan Fei Zheng Yan 《Digital Communications and Networks》 2025年第1期210-224,共15页
Blockchain technology is increasingly popular and has been widely applied in many industrial fields,due to its unique properties of decentralization,immutability,and traceability.Blockchain systems in different fields... Blockchain technology is increasingly popular and has been widely applied in many industrial fields,due to its unique properties of decentralization,immutability,and traceability.Blockchain systems in different fields vary,with different block structures,consensus mechanisms and access permission models.These differences make it hard for different blockchain systems to interoperate with each other,which isolates them.Cross-chain technologies have been developed to solve this isolation problem in order to improve the interoperability of blockchains.Although some surveys on cross-chain technologies can be found,they are unable to keep up with the latest research progress due to their extremely fast pace of development.Moreover,the literature misses general criteria to evaluate the quality of cross-chain technologies.In this paper,a comprehensive literature review of cross-chain technologies is conducted by employing a comprehensive set of evaluation criteria.The preliminaries on blockchain interoperability are first presented.Then,a set of evaluation criteria is proposed in terms of security,privacy,performance,and functionality.The latest cutting-edge works are reviewed based on the proposed taxonomy of cross-chain technologies and their performance is evaluated against our proposed criteria.Finally,some open issues and future directions of cross-chain research are pointed out. 展开更多
关键词 blockchain blockchain interoperability Cross-chain technology
在线阅读 下载PDF
From Pilot to Planet: Scaling United Nations’ Blockchain Projects for a Sustainable Future 被引量:1
2
作者 Roberta Pisani 《Chinese Business Review》 2025年第3期87-98,共12页
Within the framework of the 2030 Agenda and to achieve the Sustainable Development Goals(SDGs),science,technology and innovation play an even more central role.Building on this foundation,the primary objective of this... Within the framework of the 2030 Agenda and to achieve the Sustainable Development Goals(SDGs),science,technology and innovation play an even more central role.Building on this foundation,the primary objective of this paper is to explore the potential applications of blockchain in supporting the achievement of these sustainability goals.Starting from a review of the relevant literature on this topic,the main fields in which blockchain can contribute to sustainable development will be identified.The main blockchain applications will then be analyzed and categorized according to these SDGs.This research will then critically present the main blockchain-based projects that emerged in the first stage of the study and were implemented by the United Nations.The main objectives and benefits of each project will be analyzed.This is where the originality of this paper lies.To the best of the author’s knowledge,this is one of the first attempts to present a comprehensive overview of the United Nations’projects related to SDGs 1,2,5,7,9,13,and 16.This paper,which bridges the gap between innovation management and the sustainability field,will contribute to the increasingly current debate on sustainability issues and be beneficial to scholars,practitioners,and policymakers alike. 展开更多
关键词 blockchain SDGs SUSTAINABILITY sustainable development innovation management case studies blockchain-based projects
在线阅读 下载PDF
Navigating the Blockchain Trilemma:A Review of Recent Advances and Emerging Solutions in Decentralization,Security,and Scalability Optimization
3
作者 Saha Reno Koushik Roy 《Computers, Materials & Continua》 2025年第8期2061-2119,共59页
The blockchain trilemma—balancing decentralization,security,and scalability—remains a critical challenge in distributed ledger technology.Despite significant advancements,achieving all three attributes simultaneousl... The blockchain trilemma—balancing decentralization,security,and scalability—remains a critical challenge in distributed ledger technology.Despite significant advancements,achieving all three attributes simultaneously continues to elude most blockchain systems,often forcing trade-offs that limit their real-world applicability.This review paper synthesizes current research efforts aimed at resolving the trilemma,focusing on innovative consensus mechanisms,sharding techniques,layer-2 protocols,and hybrid architectural models.We critically analyze recent breakthroughs,including Directed Acyclic Graph(DAG)-based structures,cross-chain interoperability frameworks,and zero-knowledge proof(ZKP)enhancements,which aimto reconcile scalability with robust security and decentralization.Furthermore,we evaluate the trade-offs inherent in these approaches,highlighting their practical implications for enterprise adoption,decentralized finance(DeFi),and Web3 ecosystems.By mapping the evolving landscape of solutions,this review identifies gaps in currentmethodologies and proposes future research directions,such as adaptive consensus algorithms and artificial intelligence-driven(AI-driven)governance models.Our analysis underscores that while no universal solution exists,interdisciplinary innovations are progressively narrowing the trilemma’s constraints,paving the way for next-generation blockchain infrastructures. 展开更多
关键词 blockchain trilemma SCALABILITY DECENTRALIZATION SECURITY consensus algorithms sharding layer-2 solutions DAG-based architectures cross-chain interoperability blockchain optimization
在线阅读 下载PDF
Machine Learning on Blockchain (MLOB): A New Paradigm for Computational Security in Engineering
4
作者 Zhiming Dong Weisheng Lu 《Engineering》 2025年第4期250-263,共14页
Machine learning(ML)has been increasingly adopted to solve engineering problems with performance gauged by accuracy,efficiency,and security.Notably,blockchain technology(BT)has been added to ML when security is a part... Machine learning(ML)has been increasingly adopted to solve engineering problems with performance gauged by accuracy,efficiency,and security.Notably,blockchain technology(BT)has been added to ML when security is a particular concern.Nevertheless,there is a research gap that prevailing solutions focus primarily on data security using blockchain but ignore computational security,making the traditional ML process vulnerable to off-chain risks.Therefore,the research objective is to develop a novel ML on blockchain(MLOB)framework to ensure both the data and computational process security.The central tenet is to place them both on the blockchain,execute them as blockchain smart contracts,and protect the execution records on-chain.The framework is established by developing a prototype and further calibrated using a case study of industrial inspection.It is shown that the MLOB framework,compared with existing ML and BT isolated solutions,is superior in terms of security(successfully defending against corruption on six designed attack scenario),maintaining accuracy(0.01%difference with baseline),albeit with a slightly compromised efficiency(0.231 second latency increased).The key finding is MLOB can significantly enhances the computational security of engineering computing without increasing computing power demands.This finding can alleviate concerns regarding the computational resource requirements of ML-BT integration.With proper adaption,the MLOB framework can inform various novel solutions to achieve computational security in broader engineering challenges. 展开更多
关键词 Engineering computing Machine learning blockchain blockchain smart contract Deployable framework
在线阅读 下载PDF
ACSarF:a DRL-based adaptive consortium blockchain sharding framework for supply chain finance
5
作者 Shijing Hu Junxiong Lin +4 位作者 Xin Du Wenbin Huang Zhihui Lu Qiang Duan Jie Wu 《Digital Communications and Networks》 2025年第1期26-34,共9页
Blockchain technologies have been used to facilitate Web 3.0 and FinTech applications.However,conventional blockchain technologies suffer from long transaction delays and low transaction success rates in some Web 3.0 ... Blockchain technologies have been used to facilitate Web 3.0 and FinTech applications.However,conventional blockchain technologies suffer from long transaction delays and low transaction success rates in some Web 3.0 and FinTech applications such as Supply Chain Finance(SCF).Blockchain sharding has been proposed to improve blockchain performance.However,the existing sharding methods either use a static sharding strategy,which lacks the adaptability for the dynamic SCF environment,or are designed for public chains,which are not applicable to consortium blockchain-based SCF.To address these issues,we propose an adaptive consortium blockchain sharding framework named ACSarF,which is based on the deep reinforcement learning algorithm.The proposed framework can improve consortium blockchain sharding to effectively reduce transaction delay and adaptively adjust the sharding and blockout strategies to increase the transaction success rate in a dynamic SCF environment.Furthermore,we propose to use a consistent hash algorithm in the ACSarF framework to ensure transaction load balancing in the adaptive sharding system to further improve the performance of blockchain sharding in dynamic SCF scenarios.To evaluate the proposed framework,we conducted extensive experiments in a typical SCF scenario.The obtained experimental results show that the ACSarF framework achieves a more than 60%improvement in user experience compared to other state-of-the-art blockchain systems. 展开更多
关键词 Web 3.0 Consortium blockchain blockchain sharding Supply chain finance FinTech regulation
在线阅读 下载PDF
Relationship between environmental performance indices and blockchain-based sustainability-focused companies:Evidence from countries in Europe and America
6
作者 Hussain Mohi-ud-Din QADRI Hassnian ALI Atta UL MUSTAFA 《Regional Sustainability》 2025年第2期81-101,共21页
As the world grapples with increasing environmental challenges,innovative technologies are essential for promoting sustainability and accountability.This study examined the impact of environmental performance indices(... As the world grapples with increasing environmental challenges,innovative technologies are essential for promoting sustainability and accountability.This study examined the impact of environmental performance indices(EPIs)on the growth and investment trends of blockchain-based sustainability-focused companies in 15 countries(Belgium,Czechia,Denmark,Estonia,Finland,France,Germany,Italy,Norway,Poland,Sweden,Spain,Switzerland,the United Kingdom,and the United States)from Europe and America during 2010-2022.This study used the negative binomial regression model to assess the relationship between EPIs and blockchain-based sustainability-focused companies based on the data from the CrunchBase and EarthData.Results indicated that in ecosystem vitality,national terrestrial biome protection efforts were negatively correlated the formation of blockchain-based sustainability-focused companies,while global terrestrial biome protection efforts and marine protected areas had a positive impact on the formation of these companies and the number of funding rounds.In environmental health,PM2.5 exposure had a positive impact on the number of funding rounds.Conversely,pollutants such as sulfur dioxide(SO_(2))and ocean plastics deterred the formation of blockchain-based sustainability-focused companies and reduced the number of funding rounds.In climate change performance,adjusted emission growth rate for carbon dioxide(CO_(2)),adjusted emission growth rate for F-gases,and adjusted emission growth rate for black carbon had a significantly positive impact on the formation of blockchain-based sustainability-focused companies.Conversely,adjusted emission growth rate for Nitrous Oxide(N_(2)O)and projected greenhouse gas emissions in 2050 negatively affected the formation of these companies.These findings highlight the dual role of EPIs as driving factors and barriers in the development and investment of blockchain-based sustainability-focused companies in countries from Europe and America. 展开更多
关键词 blockchain technology Environmental performance indices blockchain-based sustainability-focused companies Negative binomial regression model EUROPE AMERICA
在线阅读 下载PDF
BCDH:Blockchain-based covert Diffie-Hellman key exchange scheme
7
作者 Qinghua Hu Chunxiang Xu Wanpeng Li 《Defence Technology(防务技术)》 2025年第10期24-31,共8页
The purpose of the covert communication scheme is to conceal the communication behavior entirely.In such schemes,the sender and receiver rely on secret keys to establish a covert channel.However,conventional key excha... The purpose of the covert communication scheme is to conceal the communication behavior entirely.In such schemes,the sender and receiver rely on secret keys to establish a covert channel.However,conventional key exchange protocols would expose the key exchange process between them.An adversary who observes the key exchange would be aware of the existence of communication behavior.The keys used in covert communication are not suitable to be generated through conventional key exchange schemes.To address this,we propose a blockchain-based covert elliptic-curve Diffie-Hellman key exchange scheme(BCDH)to conceal the process of the key exchange in blockchain transactions.Following a straightforward setup,BCDH allows the sender and receiver to covertly exchange a secret key on a blockchain without direct communication.Furthermore,we expand the BCDH approach to operate across multiple blockchains,further enhancing its covertness and stability.We analyze BCDH from several perspectives,including covertness,security,randomness,etc.Additionally,we implement a prototype of BCDH on the Ethereum platform to assess its feasibility and performance.Our evaluation demonstrates that BCDH is efficient and well-suited for real-world applications. 展开更多
关键词 Diffie-Hellman key exchange Digital signature Covert communication blockchain blockchain-based covert communication
在线阅读 下载PDF
A blockchain-based anonymous and regulated e-taxing protocol for art trading 被引量:1
8
作者 Xuejing Liu Hongli Liu +1 位作者 Xingyu Liang Yuchao Yao 《Digital Communications and Networks》 2025年第3期681-688,共8页
Taxation,the primary source of fiscal revenue,has profound implications in guiding resource allocation,promoting economic growth,adjusting social wealth distribution,and enhancing cultural influence.The development of... Taxation,the primary source of fiscal revenue,has profound implications in guiding resource allocation,promoting economic growth,adjusting social wealth distribution,and enhancing cultural influence.The development of e-taxation provides a enhanced security for taxation,but it still faces the risk of inefficiency and tax data leakage.As a decentralized ledger,blockchain provides an effective solution for protecting tax data and avoiding tax-related errors and fraud.The introduction of blockchain into e-taxation protocols can ensure the public verification of taxes.However,balancing taxpayer identity privacy with regulation remains a challenge.In this paper,we propose a blockchain-based anonymous and regulatory e-taxation protocol.This protocol ensures the supervision and tracking of malicious taxpayers while maintaining honest taxpayer identity privacy,reduces the storage needs for public key certificates in the public key infrastructure,and enables selfcertification of taxpayers’public keys and addresses.We formalize the security model of unforgeability for transactions,anonymity for honest taxpayers,and traceability for malicious taxpayers.Security analysis shows that the proposed protocol satisfies unforgeability,anonymity,and traceability.The experimental results of time consumption show that the protocol is feasible in practical applications. 展开更多
关键词 E-taxing blockchain Schnorr signature Regulation ANONYMITY
在线阅读 下载PDF
Adaptor signature based on randomized EdDSA in blockchain 被引量:1
9
作者 Yixing Zhu Huilin Li +1 位作者 Mengze Li Yong Yu 《Digital Communications and Networks》 2025年第3期689-699,共11页
Adaptor signature,a new primitive that alleviates the scalability issue of blockchain to some extent,has been widely adopted in the off-chain payment channel and atomic swap.As an extension of standard digital signatu... Adaptor signature,a new primitive that alleviates the scalability issue of blockchain to some extent,has been widely adopted in the off-chain payment channel and atomic swap.As an extension of standard digital signature,adaptor signature can bind the release of a complete digital signature with the exchange of a secret value.Existing constructions of adaptor signatures are mainly based on Schnorr or ECDSA signature algorithms,which suffer low signing efficiency and long signature length.In this paper,to address these issues,we propose a new construction of adaptor signature using randomized EdDSA,which has Schnorr-like structure with higher signing efficiency and shorter signature length.We prove the required security properties,including unforgeability,witness extractability and pre-signature adaptability,of the new adaptor signature scheme in the random oracle model.We conduct a comparative analysis with an ECDSA-based adaptor signature scheme to demonstrate the effectiveness and feasibility of our new proposal. 展开更多
关键词 blockchain Adaptor signature Randomized EdDSA Payment channel
在线阅读 下载PDF
A Lightweight IoT Data Security Sharing Scheme Based on Attribute-Based Encryption and Blockchain 被引量:1
10
作者 Hongliang Tian Meiruo Li 《Computers, Materials & Continua》 2025年第6期5539-5559,共21页
The accelerated advancement of the Internet of Things(IoT)has generated substantial data,including sensitive and private information.Consequently,it is imperative to guarantee the security of data sharing.While facili... The accelerated advancement of the Internet of Things(IoT)has generated substantial data,including sensitive and private information.Consequently,it is imperative to guarantee the security of data sharing.While facilitating fine-grained access control,Ciphertext Policy Attribute-Based Encryption(CP-ABE)can effectively ensure the confidentiality of shared data.Nevertheless,the conventional centralized CP-ABE scheme is plagued by the issues of keymisuse,key escrow,and large computation,which will result in security risks.This paper suggests a lightweight IoT data security sharing scheme that integrates blockchain technology and CP-ABE to address the abovementioned issues.The integrity and traceability of shared data are guaranteed by the use of blockchain technology to store and verify access transactions.The encryption and decryption operations of the CP-ABE algorithm have been implemented using elliptic curve scalarmultiplication to accommodate lightweight IoT devices,as opposed to themore arithmetic bilinear pairing found in the traditional CP-ABE algorithm.Additionally,a portion of the computation is delegated to the edge nodes to alleviate the computational burden on users.A distributed key management method is proposed to address the issues of key escrow andmisuse.Thismethod employs the edge blockchain to facilitate the storage and distribution of attribute private keys.Meanwhile,data security sharing is enhanced by combining off-chain and on-chain ciphertext storage.The security and performance analysis indicates that the proposed scheme is more efficient and secure. 展开更多
关键词 Edge blockchain CP-ABE data security sharing IOT
在线阅读 下载PDF
A hierarchical blockchain-enabled distributed federated learning system with model contribution based rewarding 被引量:1
11
作者 Haibo Wang Hongwei Gao +2 位作者 Teng Ma Chong Li Tao Jing 《Digital Communications and Networks》 2025年第1期35-42,共8页
Distributed Federated Learning(DFL)technology enables participants to cooperatively train a shared model while preserving the privacy of their local datasets,making it a desirable solution for decentralized and privac... Distributed Federated Learning(DFL)technology enables participants to cooperatively train a shared model while preserving the privacy of their local datasets,making it a desirable solution for decentralized and privacy-preserving Web3 scenarios.However,DFL faces incentive and security challenges in the decentralized framework.To address these issues,this paper presents a Hierarchical Blockchain-enabled DFL(HBDFL)system,which provides a generic solution framework for the DFL-related applications.The proposed system consists of four major components,including a model contribution-based reward mechanism,a Proof of Elapsed Time and Accuracy(PoETA)consensus algorithm,a Distributed Reputation-based Verification Mechanism(DRTM)and an Accuracy-Dependent Throughput Management(ADTM)mechanism.The model contribution-based rewarding mechanism incentivizes network nodes to train models with their local datasets,while the PoETA consensus algorithm optimizes the tradeoff between the shared model accuracy and system throughput.The DRTM improves the system efficiency in consensus,and the ADTM mechanism guarantees that the throughput performance remains within a predefined range while improving the shared model accuracy.The performance of the proposed HBDFL system is evaluated by numerical simulations,with the results showing that the system improves the accuracy of the shared model while maintaining high throughput and ensuring security. 展开更多
关键词 blockchain Federated learning Consensus scheme Accuracy dependent throughput management
在线阅读 下载PDF
Optimal Production Capacity Matching for Blockchain-Enabled Manufacturing Collaboration With the Iterative Double Auction Method 被引量:1
12
作者 Ying Chen Feilong Lin +2 位作者 Zhongyu Chen Changbing Tang Cailian Chen 《IEEE/CAA Journal of Automatica Sinica》 2025年第3期550-562,共13页
The increased demand for personalized customization calls for new production modes to enhance collaborations among a wide range of manufacturing practitioners who unnecessarily trust each other.In this article,a block... The increased demand for personalized customization calls for new production modes to enhance collaborations among a wide range of manufacturing practitioners who unnecessarily trust each other.In this article,a blockchain-enabled manufacturing collaboration framework is proposed,with a focus on the production capacity matching problem for blockchainbased peer-to-peer(P2P)collaboration.First,a digital model of production capacity description is built for trustworthy and transparent sharing over the blockchain.Second,an optimization problem is formulated for P2P production capacity matching with objectives to maximize both social welfare and individual benefits of all participants.Third,a feasible solution based on an iterative double auction mechanism is designed to determine the optimal price and quantity for production capacity matching with a lack of personal information.It facilitates automation of the matching process while protecting users'privacy via blockchainbased smart contracts.Finally,simulation results from the Hyperledger Fabric-based prototype show that the proposed approach increases social welfare by 1.4%compared to the Bayesian game-based approach,makes all participants profitable,and achieves 90%fairness of enterprises. 展开更多
关键词 blockchain iterative double auction manufacturing collaboration production capacity matching
在线阅读 下载PDF
Lightweight consensus mechanisms in the Internet of Blockchained Things:Thorough analysis and research directions 被引量:1
13
作者 Somia Sahraoui Abdelmalik Bachir 《Digital Communications and Networks》 2025年第4期1245-1260,共16页
The Internet of Things(IoT)has gained substantial attention in both academic research and real-world applications.The proliferation of interconnected devices across various domains promises to deliver intelligent and ... The Internet of Things(IoT)has gained substantial attention in both academic research and real-world applications.The proliferation of interconnected devices across various domains promises to deliver intelligent and advanced services.However,this rapid expansion also heightens the vulnerability of the IoT ecosystem to security threats.Consequently,innovative solutions capable of effectively mitigating risks while accommodating the unique constraints of IoT environments are urgently needed.Recently,the convergence of Blockchain technology and IoT has introduced a decentralized and robust framework for securing data and interactions,commonly referred to as the Internet of Blockchained Things(IoBT).Extensive research efforts have been devoted to adapting Blockchain technology to meet the specific requirements of IoT deployments.Within this context,consensus algorithms play a critical role in assessing the feasibility of integrating Blockchain into IoT ecosystems.The adoption of efficient and lightweight consensus mechanisms for block validation has become increasingly essential.This paper presents a comprehensive examination of lightweight,constraint-aware consensus algorithms tailored for IoBT.The study categorizes these consensus mechanisms based on their core operations,the security of the block validation process,the incorporation of AI techniques,and the specific applications they are designed to support. 展开更多
关键词 blockchain Internet of Things Lightweight consensus
在线阅读 下载PDF
Security Strategy of Digital Medical Contents Based on Blockchain in Generative AI Model
14
作者 Hoon Ko Marek R.Ogiela 《Computers, Materials & Continua》 SCIE EI 2025年第1期259-278,共20页
This study presents an innovative approach to enhancing the security of visual medical data in the generative AI environment through the integration of blockchain technology.By combining the strengths of blockchain an... This study presents an innovative approach to enhancing the security of visual medical data in the generative AI environment through the integration of blockchain technology.By combining the strengths of blockchain and generative AI,the research team aimed to address the timely challenge of safeguarding visual medical content.The participating researchers conducted a comprehensive analysis,examining the vulnerabilities of medical AI services,personal information protection issues,and overall security weaknesses.This multi faceted exploration led to an indepth evaluation of the model’s performance and security.Notably,the correlation between accuracy,detection rate,and error rate was scrutinized.This analysis revealed insights into the model’s strengths and limitations,while the consideration of standard deviation shed light on the model’s stability and performance variability.The study proposed practical improvements,emphasizing the reduction of false negatives to enhance detection rate and leveraging blockchain technology to ensure visual data integrity in medical applications.Applying blockchain to generative AI-created medical content addresses key personal information protection issues.By utilizing the distributed ledger system of blockchain,the research team aimed to protect the privacy and integrity of medical data especially medical images.This approach not only enhances security but also enables transparent and tamperproof record-keeping.Additionally,the use of generative AI models ensures the creation of novel medical content without compromising personal information,further safeguarding patient privacy.In conclusion,this study showcases the potential of blockchain-based solutions in the medical field,particularly in securing sensitive medical data and protecting patient privacy.The proposed approach,combining blockchain and generative AI,offers a promising direction toward more robust and secure medical content management.Further research and advancements in this area will undoubtedly contribute to the development of robust and privacy-preserving healthcare systems,and visual diagnostic systems. 展开更多
关键词 Digitalmedical content medical diagnostic visualization security analysis generativeAI blockchain VULNERABILITY pattern recognition
在线阅读 下载PDF
Security and Privacy in Permissioned Blockchain Interoperability:A Systematic Review
15
作者 Alsoudi Dua TanFong Ang +5 位作者 Chin Soon Ku Okmi Mohammed Yu Luo Jiahui Chen Uzair Aslam Bhatti Lip Yee Por 《Computers, Materials & Continua》 2025年第11期2579-2624,共46页
Blockchain interoperability enables seamless communication and asset transfer across isolated permissioned blockchain systems,but it introduces significant security and privacy vulnerabilities.This review aims to syst... Blockchain interoperability enables seamless communication and asset transfer across isolated permissioned blockchain systems,but it introduces significant security and privacy vulnerabilities.This review aims to systematically assess the security and privacy landscape of interoperability protocols for permissioned blockchains,identifying key properties,attack vectors,and countermeasures.Using PRISMA 2020 guidelines,we analysed 56 peerreviewed studies published between 2020 and 2025,retrieved from Scopus,ScienceDirect,Web of Science,and IEEE Xplore.The review focused on interoperability protocols for permissioned blockchains with security and privacy analyses,including only English-language journal articles and conference proceedings.Risk of bias in the included studies was assessed using the MMAT.Methods for presenting and synthesizing results included descriptive analysis,bibliometric analysis,and content analysis,with findings organized into tables,charts,and comparative summaries.The review classifies interoperability protocols into relay,sidechain,notary scheme,HTLC,and hybrid types and identifies 18 security and privacy properties along with 31 known attack types.Relay-based protocols showed the broadest security coverage,while HTLC and notary schemes demonstrated significant security gaps.Notably,93% of studies examined fewer than four properties or attack types,indicating a fragmented research landscape.The review identifies underexplored areas such as ACID properties,decentralization,and cross-chain attack resilience.It further highlights effective countermeasures,including cryptographic techniques,trusted execution environments,zero-knowledge proofs,and decentralized identity schemes.The findings suggest that despite growing adoption,current interoperability protocols lack comprehensive security evaluations.More holistic research is needed to ensure the resilience,trustworthiness,and scalability of cross-chain operations in permissioned blockchain ecosystems. 展开更多
关键词 blockchain security PRIVACY ATTACK THREAT INTEROPERABILITY cross-chain
在线阅读 下载PDF
Unleashing the Potential of Metaverse in Social IoV:An Authentication Protocol Based on Blockchain
16
作者 Tsu-Yang Wu Haozhi Wu +2 位作者 Maoxin Tang Saru Kumari Chien-Ming Chen 《Computers, Materials & Continua》 2025年第8期3175-3192,共18页
As a model for the next generation of the Internet,the metaverse—a fully immersive,hyper-temporal virtual shared space—is transitioning from imagination to reality.At present,the metaverse has been widely applied in... As a model for the next generation of the Internet,the metaverse—a fully immersive,hyper-temporal virtual shared space—is transitioning from imagination to reality.At present,the metaverse has been widely applied in a variety of fields,including education,social entertainment,Internet of vehicles(IoV),healthcare,and virtual tours.In IoVs,researchers primarily focus on using the metaverse to improve the traffic safety of vehicles,while paying limited attention to passengers’social needs.At the same time,Social Internet ofVehicles(SIoV)introduces the concept of social networks in IoV to provide better resources and services for users.However,the problem of single interaction between SIoVand users has become increasingly prominent.In this paper,we first introduce a SIoVenvironment combined with the metaverse.In this environment,we adopt blockchain as the platform of the metaverse to provide a decentralized environment.Concerning passengers’social data may contain sensitive/private information,we then design an authentication and key agreement protocol calledMSIoV-AKAto protect the communications.Through formal security verifications in the real-or-random(ROR)model and using the AVISPA(Automated Validation of Internet Security Protocols and Applications)tool,we firmly verify the security of the protocol.Finally,detailed comparisons are made between our protocol and robust protocols/schemes in terms of computational cost and communication cost.In addition,we implement the MSIoV-AKA protocol in the Ethereum test network and Hyperledger Sawtooth to show the practicality. 展开更多
关键词 AUTHENTICATION key agreement SIoV metaverse blockchain
在线阅读 下载PDF
Blockchain and Smart Contracts:An Effective Approach for the Transaction Security&Privacy in Electronic Medical Records
17
作者 Amal Al-Rasheed Hashim Ali +1 位作者 Rahim Khan Aamir Saeed 《Computers, Materials & Continua》 2025年第11期3419-3436,共18页
In the domain of Electronic Medical Records(EMRs),emerging technologies are crucial to addressing longstanding concerns surrounding transaction security and patient privacy.This paper explores the integration of smart... In the domain of Electronic Medical Records(EMRs),emerging technologies are crucial to addressing longstanding concerns surrounding transaction security and patient privacy.This paper explores the integration of smart contracts and blockchain technology as a robust framework for securing sensitive healthcare data.By leveraging the decentralized and immutable nature of blockchain,the proposed approach ensures transparency,integrity,and traceability of EMR transactions,effectivelymitigating risks of unauthorized access and data tampering.Smart contracts further enhance this framework by enabling the automation and enforcement of secure transactions,eliminating reliance on intermediaries and reducing the potential for human error.This integration marks a paradigm shift in management and exchange of healthcare information,fostering a secure and privacy-preserving ecosystem for all stakeholders.The research also evaluates the practical implementation of blockchain and smart contracts within healthcare systems,examining their real-world effectiveness in enhancing transactional security,safeguarding patient privacy,and maintaining data integrity.Findings from the study contribute valuable insights to the growing body of work on digital healthcare innovation,underscoring the potential of these technologies to transform EMR systems with high accuracy and precision.As global healthcare systems continue to face the challenge of protecting sensitive patient data,the proposed framework offers a forward-looking,scalable,and effective solution aligned with the evolving digital healthcare landscape. 展开更多
关键词 Smart-contracts internet of things PRIVACY SECURITY blockchain EMR
在线阅读 下载PDF
Blockchain Integration in IoT:Applications,Opportunities,and Challenges
18
作者 Mozhgan Gholami Ali Ghaffari +2 位作者 Nahideh Derakhshanfard Nadir iBRAHIMO GLU Ali Asghar Pourhaji Kazem 《Computers, Materials & Continua》 2025年第5期1561-1605,共45页
The Internet has been enhanced recently by blockchain and Internet of Things(IoT)networks.The Internet of Things is a network of various sensor-equipped devices.It gradually integrates the Internet,sensors,and cloud c... The Internet has been enhanced recently by blockchain and Internet of Things(IoT)networks.The Internet of Things is a network of various sensor-equipped devices.It gradually integrates the Internet,sensors,and cloud computing.Blockchain is based on encryption algorithms,which are shared database technologies on the Internet.Blockchain technology has grown significantly because of its features,such as flexibility,support for integration,anonymity,decentralization,and independent control.Computational nodes in the blockchain network are used to verify online transactions.However,this integration creates scalability,interoperability,and security challenges.Over the last decade,several advancements in blockchain technology have drawn attention fromresearch communities and industries.Blockchain technology helps IoT networks become more reliable and enhance security and privacy.It also removes single points of failure and lowers the cost.In recent years,there has been an increasing amount of literature on IoT and blockchain technology applications.This paper extensively examines the current state of blockchain technologies,focusing specifically on their integration into the Internet of Things.Additionally,it highlights the benefits,drawbacks,and opportunities of recent studies on security issues based on blockchain solutions into categories.The survey examined various research papers fromdifferent types of publications.Also,a review of the other IoT applications has been included,focusing on the security requirements and challenges in IoT-based systems.Future research directions are gathered for the effective integration of Blockchain and IoT. 展开更多
关键词 Internet ofThings blockchain CYBERSECURITY PRIVACY SECURITY
在线阅读 下载PDF
Novel MITM attack scheme based on built-in negotiation for blockchain-based digital twins
19
作者 Xin Liu Rui Zhou +3 位作者 Shohei Shimizu Rui Chong Qingguo Zhou Xiaokang Zhou 《Digital Communications and Networks》 2025年第1期256-267,共12页
As smart contracts,represented by Solidity,become deeply integrated into the manufacturing industry,blockchain-based Digital Twins(DT)has gained momentum in recent years.Most of the blockchain infrastructures in wides... As smart contracts,represented by Solidity,become deeply integrated into the manufacturing industry,blockchain-based Digital Twins(DT)has gained momentum in recent years.Most of the blockchain infrastructures in widespread use today are based on the Proof-of-Work(PoW)mechanism,and the process of creating blocks is known as“mining”.Mining becomes increasingly difficult as the blockchain grows in size and the number of on-chain business systems increases.To lower the threshold of participation in the mining process,“mining pools”have been created.Miners can cooperate and share the mining rewards according to the hashrate they contributed to the pool.Stratum is the most widely used communication protocol between miners and mining pools.Its security is essential for the participants.In this paper,we propose two novel Man-In-The-Middle(MITM)attack schemes against Stratum,which allow attackers to steal miners'hashrate to any mining pool using hijacked TCP connections.Compared with existing attacks,our work is more secretive,more suitable for the real-world environment,and more harmful.The Proof-of-Concept(PoC)shows that our schemes work perfectly on most mining softwares and pools.Furthermore,we present a lightweight AI-driven approach based on protocol-level feature analysis to detect Stratum MITM for blockchain-based DTs.Its detection model consists of three layers:feature extraction layer,vectorization layer,and detection layer.Experiments prove that our detection approach can effectively detect Stratum MITM traffic with 98%accuracy.Our work alerts the communities and provides possible mitigation against these more hidden and profitable attack schemes. 展开更多
关键词 Digital twins MITM blockchain STRATUM Anomaly detection
在线阅读 下载PDF
Combined Architecture of Destination Sequence Distance Vector (DSDV) Routing with Software Defined Networking (SDN) and Blockchain in Cyber-Physical Systems
20
作者 Jawad Ahmad Ansari Mohamad Khairi Ishak Khalid Ammar 《Computers, Materials & Continua》 2025年第2期2311-2330,共20页
Cyber-Physical System (CPS) devices are increasing exponentially. Lacking confidentiality creates a vulnerable network. Thus, demanding the overall system with the latest and robust solutions for the defence mechanism... Cyber-Physical System (CPS) devices are increasing exponentially. Lacking confidentiality creates a vulnerable network. Thus, demanding the overall system with the latest and robust solutions for the defence mechanisms with low computation cost, increased integrity, and surveillance. The proposal of a mechanism that utilizes the features of authenticity measures using the Destination Sequence Distance Vector (DSDV) routing protocol which applies to the multi-WSN (Wireless Sensor Network) of IoT devices in CPS which is developed for the Device-to-Device (D2D) authentication developed from the local-chain and public chain respectively combined with the Software Defined Networking (SDN) control and monitoring system using switches and controllers that will route the packets through the network, identify any false nodes, take preventive measures against them and preventing them for any future problems. Next, the system is powered by Blockchain cryptographic features by utilizing the TrustChain features to create a private, secure, and temper-free ledger of the transactions performed inside the network. Results are achieved in the legitimate devices connecting to the network, transferring their packets to their destination under supervision, reporting whenever a false node is causing hurdles, and recording the transactions for temper-proof records. Evaluation results based on 1000+ transactions illustrate that the proposed mechanism not only outshines most aspects of Cyber-Physical systems but also consumes less computation power with a low latency of 0.1 seconds only. 展开更多
关键词 DSDV intelligent authentication SDN control&monitoring blockchain recording of transactions
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部