Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the system.This technology has been widely used and has developed rapidly in big data systems...Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the system.This technology has been widely used and has developed rapidly in big data systems across various fields.An increasing number of users are participating in application systems that use blockchain as their underlying architecture.As the number of transactions and the capital involved in blockchain grow,ensuring information security becomes imperative.Addressing the verification of transactional information security and privacy has emerged as a critical challenge.Blockchain-based verification methods can effectively eliminate the need for centralized third-party organizations.However,the efficiency of nodes in storing and verifying blockchain data faces unprecedented challenges.To address this issue,this paper introduces an efficient verification scheme for transaction security.Initially,it presents a node evaluation module to estimate the activity level of user nodes participating in transactions,accompanied by a probabilistic analysis for all transactions.Subsequently,this paper optimizes the conventional transaction organization form,introduces a heterogeneous Merkle tree storage structure,and designs algorithms for constructing these heterogeneous trees.Theoretical analyses and simulation experiments conclusively demonstrate the superior performance of this scheme.When verifying the same number of transactions,the heterogeneous Merkle tree transmits less data and is more efficient than traditional methods.The findings indicate that the heterogeneous Merkle tree structure is suitable for various blockchain applications,including the Internet of Things.This scheme can markedly enhance the efficiency of information verification and bolster the security of distributed systems.展开更多
Package delivery via ridesharing provides appealing benefits of lower delivery cost and efficient vehicle usage.Most existing ridesharing systems operate the matching of ridesharing in a centralized manner,which may r...Package delivery via ridesharing provides appealing benefits of lower delivery cost and efficient vehicle usage.Most existing ridesharing systems operate the matching of ridesharing in a centralized manner,which may result in the single point of failure once the controller breaks down or is under attack.To tackle such problems,our goal in this paper is to develop a blockchain-based package delivery ridesharing system,where decentralization is adopted to remove intermediaries and direct transactions between the providers and the requestors are allowed.To complete the matching process under decentralized structure,an Event-Triggered Distributed Deep Reinforcement Learning(ETDDRL)algorithm is proposed to generate/update the real-time ridesharing orders for the new coming ridesharing requests from a local view.Simulation results reveal the vast potential of the ETDDRL matching algorithm under the blockchain framework for the promotion of the ridesharing profits.Finally,we develop an application for Android-based terminals to verify the ETDDRL matching algorithm.展开更多
To verify that an organization-friendly blockchain system may suffer from forgery and collusion attacks,forgery and collusion attacks were theoretically carried out according to the phase sequence of an organization-f...To verify that an organization-friendly blockchain system may suffer from forgery and collusion attacks,forgery and collusion attacks were theoretically carried out according to the phase sequence of an organization-friendly blockchain system.Then,the organization-friendly blockchain system was improved and based on the phase sequence forgery and collusion attacks were conducted.The results show that the attacker can obtain illegal transaction data from forgery and collusion attacks on the organization-friendly blockchain system.However,for the improved organization-friendly blockchain,the attacker s forgery and collusion attacks cannot be completed.Therefore,the organization-friendly blockchain system may be subject to forgery and collusion attacks,but the improved organization-friendly blockchain system can prevent such attacks.展开更多
Distributed Federated Learning(DFL)technology enables participants to cooperatively train a shared model while preserving the privacy of their local datasets,making it a desirable solution for decentralized and privac...Distributed Federated Learning(DFL)technology enables participants to cooperatively train a shared model while preserving the privacy of their local datasets,making it a desirable solution for decentralized and privacy-preserving Web3 scenarios.However,DFL faces incentive and security challenges in the decentralized framework.To address these issues,this paper presents a Hierarchical Blockchain-enabled DFL(HBDFL)system,which provides a generic solution framework for the DFL-related applications.The proposed system consists of four major components,including a model contribution-based reward mechanism,a Proof of Elapsed Time and Accuracy(PoETA)consensus algorithm,a Distributed Reputation-based Verification Mechanism(DRTM)and an Accuracy-Dependent Throughput Management(ADTM)mechanism.The model contribution-based rewarding mechanism incentivizes network nodes to train models with their local datasets,while the PoETA consensus algorithm optimizes the tradeoff between the shared model accuracy and system throughput.The DRTM improves the system efficiency in consensus,and the ADTM mechanism guarantees that the throughput performance remains within a predefined range while improving the shared model accuracy.The performance of the proposed HBDFL system is evaluated by numerical simulations,with the results showing that the system improves the accuracy of the shared model while maintaining high throughput and ensuring security.展开更多
Blockchain interoperability enables seamless communication and asset transfer across isolated permissioned blockchain systems,but it introduces significant security and privacy vulnerabilities.This review aims to syst...Blockchain interoperability enables seamless communication and asset transfer across isolated permissioned blockchain systems,but it introduces significant security and privacy vulnerabilities.This review aims to systematically assess the security and privacy landscape of interoperability protocols for permissioned blockchains,identifying key properties,attack vectors,and countermeasures.Using PRISMA 2020 guidelines,we analysed 56 peerreviewed studies published between 2020 and 2025,retrieved from Scopus,ScienceDirect,Web of Science,and IEEE Xplore.The review focused on interoperability protocols for permissioned blockchains with security and privacy analyses,including only English-language journal articles and conference proceedings.Risk of bias in the included studies was assessed using the MMAT.Methods for presenting and synthesizing results included descriptive analysis,bibliometric analysis,and content analysis,with findings organized into tables,charts,and comparative summaries.The review classifies interoperability protocols into relay,sidechain,notary scheme,HTLC,and hybrid types and identifies 18 security and privacy properties along with 31 known attack types.Relay-based protocols showed the broadest security coverage,while HTLC and notary schemes demonstrated significant security gaps.Notably,93% of studies examined fewer than four properties or attack types,indicating a fragmented research landscape.The review identifies underexplored areas such as ACID properties,decentralization,and cross-chain attack resilience.It further highlights effective countermeasures,including cryptographic techniques,trusted execution environments,zero-knowledge proofs,and decentralized identity schemes.The findings suggest that despite growing adoption,current interoperability protocols lack comprehensive security evaluations.More holistic research is needed to ensure the resilience,trustworthiness,and scalability of cross-chain operations in permissioned blockchain ecosystems.展开更多
Cyber-Physical System (CPS) devices are increasing exponentially. Lacking confidentiality creates a vulnerable network. Thus, demanding the overall system with the latest and robust solutions for the defence mechanism...Cyber-Physical System (CPS) devices are increasing exponentially. Lacking confidentiality creates a vulnerable network. Thus, demanding the overall system with the latest and robust solutions for the defence mechanisms with low computation cost, increased integrity, and surveillance. The proposal of a mechanism that utilizes the features of authenticity measures using the Destination Sequence Distance Vector (DSDV) routing protocol which applies to the multi-WSN (Wireless Sensor Network) of IoT devices in CPS which is developed for the Device-to-Device (D2D) authentication developed from the local-chain and public chain respectively combined with the Software Defined Networking (SDN) control and monitoring system using switches and controllers that will route the packets through the network, identify any false nodes, take preventive measures against them and preventing them for any future problems. Next, the system is powered by Blockchain cryptographic features by utilizing the TrustChain features to create a private, secure, and temper-free ledger of the transactions performed inside the network. Results are achieved in the legitimate devices connecting to the network, transferring their packets to their destination under supervision, reporting whenever a false node is causing hurdles, and recording the transactions for temper-proof records. Evaluation results based on 1000+ transactions illustrate that the proposed mechanism not only outshines most aspects of Cyber-Physical systems but also consumes less computation power with a low latency of 0.1 seconds only.展开更多
This paper presents a novel blockchain-embedded cybersecurity framework for industrial solar power systems,integrating immutable machine learning(ML)with distributed ledger technology.Our contribution focused on three...This paper presents a novel blockchain-embedded cybersecurity framework for industrial solar power systems,integrating immutable machine learning(ML)with distributed ledger technology.Our contribution focused on three factors,Quantum-resistant feature engineering using theUNSW-NB15 dataset adapted for solar infrastructure anomalies.An enhanced Light Gradient Boosting Machine(LightGBM)classifier with blockchain-validated decision thresholds,and A cryptographic proof-of-threat(PoT)consensus mechanism for cyber attack verification.The proposed Immutable LightGBM model with majority voting and cryptographic feature encoding achieves 96.9% detection accuracy with 0.97 weighted average of precision,recall and F1-score,outperforming conventional intrusion detection systems(IDSs)by 12.7% in false positive reduction.The blockchain layer demonstrates a 2.4-s average block confirmation time with 256-bit SHA-3 hashing,enabling real-time threat logging in photovoltaic networks.Experimental results improve in attack traceability compared to centralized security systems,establishing new benchmarks for trustworthy anomaly detection in smart grid infrastructures.This study also compared traditional and hybrid ML based blockchian driven IDSs and attained better classification results.The proposed framework not only delivers a resilient,adaptable threat mitigation system(TMS)for Industry 4.0 solar powered infrastructure but also attains high explainability,scalability with tamper-proof logs,and remarkably exceptional ability of endurance to cyber attacks.展开更多
Cloud-based setups are intertwined with the Internet of Things and advanced,and technologies such as blockchain revolutionize conventional healthcare infrastructure.This digitization has major advantages,mainly enhanc...Cloud-based setups are intertwined with the Internet of Things and advanced,and technologies such as blockchain revolutionize conventional healthcare infrastructure.This digitization has major advantages,mainly enhancing the security barriers of the green tree infrastructure.In this study,we conducted a systematic review of over 150 articles that focused exclusively on blockchain-based healthcare systems,security vulnerabilities,cyberattacks,and system limitations.In addition,we considered several solutions proposed by thousands of researchers worldwide.Our results mostly delineate sustained threats and security concerns in blockchain-based medical health infrastructures for data management,transmission,and processing.Here,we describe 17 security threats that violate the privacy and data integrity of a system,over 21 cyber-attacks on security and QoS,and some system implementation problems such as node compromise,scalability,efficiency,regulatory issues,computation speed,and power consumption.We propose a multi-layered architecture for the future healthcare infrastructure.Second,we classify all threats and security concerns based on these layers and assess suggested solutions in terms of these contingencies.Our thorough theoretical examination of several performance criteria—including confidentiality,access control,interoperability problems,and energy efficiency—as well as mathematical verifications establishes the superiority of security,privacy maintenance,reliability,and efficiency over conventional systems.We conducted in-depth comparative studies on different interoperability parameters in the blockchain models.Our research justifies the use of various positive protocols and optimization methods to improve the quality of services in e-healthcare and overcome problems arising fromlaws and ethics.Determining the theoretical aspects,their scope,and future expectations encourages us to design reliable,secure,and privacy-preserving systems.展开更多
Blockchain as a decentralized storage technology is widely used in many fields.It has extremely strict requirements for reliability because there are many potentially malicious nodes.Generally,blockchain is a chain st...Blockchain as a decentralized storage technology is widely used in many fields.It has extremely strict requirements for reliability because there are many potentially malicious nodes.Generally,blockchain is a chain storage structure formed by interconnecting blocks1),which are stored by full replication method,where each node stores a replica of all blocks and the data consistency is maintained by the consensus protocol.To decrease the storage overhead,previous approaches such as BFT-Store and Partition Chain store blocks via erasure codes.However,existing erasure coding based methods utilize static encoding schema to tolerant f malicious nodes,but in the typical cases,the number of malicious nodes is much smaller than f as described in previous literatures.Using redundant parities to tolerate excessive malicious nodes introduces unnecessary storage overhead.To solve the above problem,we propose Dynamic-EC,which is a Dynamic Erasure Coding method in permissioned blockchain systems.The key idea of Dynamic-EC is to reduce the storage overhead by dynamically adjusting the total number of parities according to the risk level of the whole system,which is determined by the number of perceived malicious nodes,while ensuring the system reliability.To demonstrate the effectiveness of Dynamic-EC,we conduct several experiments on an open source blockchain software Tendermint.The results show that,compared to the state-of-the-art erasure coding methods,Dynamic-EC reduces the storage overhead by up to 42%,and decreases the average write latency of blocks by up to 25%,respectively.展开更多
As an innovative approach, Direct Acyclic Graph (DAG)-based blockchain is designed to overcome the scalability and performance limitations of traditional blockchain systems, which rely on sequential structures. The gr...As an innovative approach, Direct Acyclic Graph (DAG)-based blockchain is designed to overcome the scalability and performance limitations of traditional blockchain systems, which rely on sequential structures. The graph-based architecture of DAG allows for faster transactions and parallel processing, making it a compelling option across various industries. To enhance the analytical understanding of DAG-based blockchains, this paper begins by introducing a Markov model tailored for a DAG-based blockchain system, specifically focusing on the Tangle structure and the interaction between tips and newly arrived transactions. We then establish a continuous-time Markov process to analyze the DAG-based blockchain, demonstrating that this process is a level-dependent quasi-birth-and-death (QBD) process. We further prove that the QBD process is both irreducible and positively recurrent. Building on this foundation, we conduct a performance analysis of the DAG-based blockchain system by deriving the stationary probability vector of the QBD process. Notably, we introduce a novel method to calculate the average sojourn time of any arriving internal tip within the system using first passage times and Phase-type (PH) distributions. Finally, numerical examples are provided to validate our theoretical findings and to illustrate the influence of system parameters on the performance metrics.展开更多
As Internet of Vehicles(IoV)technology continues to advance,edge computing has become an important tool for assisting vehicles in handling complex tasks.However,the process of offloading tasks to edge servers may expo...As Internet of Vehicles(IoV)technology continues to advance,edge computing has become an important tool for assisting vehicles in handling complex tasks.However,the process of offloading tasks to edge servers may expose vehicles to malicious external attacks,resulting in information loss or even tampering,thereby creating serious security vulnerabilities.Blockchain technology can maintain a shared ledger among servers.In the Raft consensus mechanism,as long as more than half of the nodes remain operational,the system will not collapse,effectively maintaining the system’s robustness and security.To protect vehicle information,we propose a security framework that integrates the Raft consensus mechanism from blockchain technology with edge computing.To address the additional latency introduced by blockchain,we derived a theoretical formula for system delay and proposed a convex optimization solution to minimize the system latency,ensuring that the system meets the requirements for low latency and high reliability.Simulation results demonstrate that the optimized data extraction rate significantly reduces systemdelay,with relatively stable variations in latency.Moreover,the proposed optimization solution based on this model can provide valuable insights for enhancing security and efficiency in future network environments,such as 5G and next-generation smart city systems.展开更多
As the volume of healthcare and medical data increases from diverse sources,real-world scenarios involving data sharing and collaboration have certain challenges,including the risk of privacy leakage,difficulty in dat...As the volume of healthcare and medical data increases from diverse sources,real-world scenarios involving data sharing and collaboration have certain challenges,including the risk of privacy leakage,difficulty in data fusion,low reliability of data storage,low effectiveness of data sharing,etc.To guarantee the service quality of data collaboration,this paper presents a privacy-preserving Healthcare and Medical Data Collaboration Service System combining Blockchain with Federated Learning,termed FL-HMChain.This system is composed of three layers:Data extraction and storage,data management,and data application.Focusing on healthcare and medical data,a healthcare and medical blockchain is constructed to realize data storage,transfer,processing,and access with security,real-time,reliability,and integrity.An improved master node selection consensus mechanism is presented to detect and prevent dishonest behavior,ensuring the overall reliability and trustworthiness of the collaborative model training process.Furthermore,healthcare and medical data collaboration services in real-world scenarios have been discussed and developed.To further validate the performance of FL-HMChain,a Convolutional Neural Network-based Federated Learning(FL-CNN-HMChain)model is investigated for medical image identification.This model achieves better performance compared to the baseline Convolutional Neural Network(CNN),having an average improvement of 4.7%on Area Under Curve(AUC)and 7%on Accuracy(ACC),respectively.Furthermore,the probability of privacy leakage can be effectively reduced by the blockchain-based parameter transfer mechanism in federated learning between local and global models.展开更多
To enable precision medicine and remote patient monitoring,internet of healthcare things(IoHT)has gained significant interest as a promising technique.With the widespread use of IoHT,nonetheless,privacy infringements ...To enable precision medicine and remote patient monitoring,internet of healthcare things(IoHT)has gained significant interest as a promising technique.With the widespread use of IoHT,nonetheless,privacy infringements such as IoHT data leakage have raised serious public concerns.On the other side,blockchain and distributed ledger technologies have demonstrated great potential for enhancing trustworthiness and privacy protection for IoHT systems.In this survey,a holistic review of existing blockchain-based IoHT systems is conducted to indicate the feasibility of combining blockchain and IoHT in privacy protection.In addition,various types of privacy challenges in IoHT are identified by examining general data protection regulation(GDPR).More importantly,an associated study of cutting-edge privacy-preserving techniques for the identified IoHT privacy challenges is presented.Finally,several challenges in four promising research areas for blockchain-based IoHT systems are pointed out,with the intent of motivating researchers working in these fields to develop possible solutions.展开更多
After the Ethereum DAO attack in 2016,which resulted in significant economic losses,blockchain governance has become a prominent research area.However,there is a lack of comprehensive and systematic literature review ...After the Ethereum DAO attack in 2016,which resulted in significant economic losses,blockchain governance has become a prominent research area.However,there is a lack of comprehensive and systematic literature review on blockchain governance.To deeply understand the process of blockchain governance and provide guidance for the future design of the blockchain governance model,we provide an in-depth review of blockchain governance.In this paper,first we introduce the consensus algorithms currently used in blockchain and relate them to governance theory.Second,we present the main content of off-chain governance and investigate two well-known off-chain governance projects.Third,we investigate four common on-chain governance voting techniques,then summarize the seven attributes that the on-chain governance voting process should meet,and finally analyze four well-known on-chain governance blockchain projects based on the previous research.We hope this survey will provide an in-depth insight into the potential development direction of blockchain governance and device future research agenda.展开更多
The use of privacy-enhanced facial recognition has increased in response to growing concerns about data securityand privacy in the digital age. This trend is spurred by rising demand for face recognition technology in...The use of privacy-enhanced facial recognition has increased in response to growing concerns about data securityand privacy in the digital age. This trend is spurred by rising demand for face recognition technology in a varietyof industries, including access control, law enforcement, surveillance, and internet communication. However,the growing usage of face recognition technology has created serious concerns about data monitoring and userprivacy preferences, especially in context-aware systems. In response to these problems, this study provides a novelframework that integrates sophisticated approaches such as Generative Adversarial Networks (GANs), Blockchain,and distributed computing to solve privacy concerns while maintaining exact face recognition. The framework’spainstaking design and execution strive to strike a compromise between precise face recognition and protectingpersonal data integrity in an increasingly interconnected environment. Using cutting-edge tools like Dlib for faceanalysis,Ray Cluster for distributed computing, and Blockchain for decentralized identity verification, the proposedsystem provides scalable and secure facial analysis while protecting user privacy. The study’s contributions includethe creation of a sustainable and scalable solution for privacy-aware face recognition, the implementation of flexibleprivacy computing approaches based on Blockchain networks, and the demonstration of higher performanceover previous methods. Specifically, the proposed StyleGAN model has an outstanding accuracy rate of 93.84%while processing high-resolution images from the CelebA-HQ dataset, beating other evaluated models such asProgressive GAN 90.27%, CycleGAN 89.80%, and MGAN 80.80%. With improvements in accuracy, speed, andprivacy protection, the framework has great promise for practical use in a variety of fields that need face recognitiontechnology. This study paves the way for future research in privacy-enhanced face recognition systems, emphasizingthe significance of using cutting-edge technology to meet rising privacy issues in digital identity.展开更多
Data trading enables data owners and data requesters to sell and purchase data.With the emergence of blockchain technology,research on blockchain-based data trading systems is receiving a lot of attention.Particularly...Data trading enables data owners and data requesters to sell and purchase data.With the emergence of blockchain technology,research on blockchain-based data trading systems is receiving a lot of attention.Particularly,to reduce the on-chain storage cost,a novel paradigm of blockchain and cloud fusion has been widely considered as a promising data trading platform.Moreover,the fact that data can be used for commercial purposes will encourage users and organizations from various fields to participate in the data marketplace.In the data marketplace,it is a challenge how to trade the data securely outsourced to the external cloud in a way that restricts access to the data only to authorized users across multiple domains.In this paper,we propose a cross-domain bilateral access control protocol for blockchain-cloud based data trading systems.We consider a system model that consists of domain authorities,data senders,data receivers,a blockchain layer,and a cloud provider.The proposed protocol enables access control and source identification of the outsourced data by leveraging identity-based cryptographic techniques.In the proposed protocol,the outsourced data of the sender is encrypted under the target receiver’s identity,and the cloud provider performs policy-match verification on the authorization tags of the sender and receiver generated by the identity-based signature scheme.Therefore,data trading can be achieved only if the identities of the data sender and receiver simultaneously meet the policies specified by each other.To demonstrate efficiency,we evaluate the performance of the proposed protocol and compare it with existing studies.展开更多
In blockchain-based unmanned aerial vehicle(UAV)communication systems,the length of a block affects the performance of the blockchain.The transmission performance of blocks in the form of finite character segments is ...In blockchain-based unmanned aerial vehicle(UAV)communication systems,the length of a block affects the performance of the blockchain.The transmission performance of blocks in the form of finite character segments is also affected by the block length.Therefore,it is crucial to balance the transmission performance and blockchain performance of blockchain communication systems,especially in wireless environments involving UAVs.This paper investigates a secure transmission scheme for blocks in blockchain-based UAV communication systems to prevent the information contained in blocks from being completely eavesdropped during transmission.In our scheme,using a friendly jamming UAV to emit jamming signals diminishes the quality of the eavesdropping channel,thus enhancing the communication security performance of the source UAV.Under the constraints of maneuverability and transmission power of the UAV,the joint design of UAV trajectories,transmission power,and block length are proposed to maximize the average minimum secrecy rate(AMSR).Since the optimization problem is non-convex and difficult to solve directly,we first decompose the optimization problem into subproblems of trajectory optimization,transmission power optimization,and block length optimization.Then,based on firstorder approximation techniques,these subproblems are reformulated as convex optimization problems.Finally,we utilize an alternating iteration algorithm based on the successive convex approximation(SCA)technique to solve these subproblems iteratively.The simulation results demonstrate that our proposed scheme can achieve secure transmission for blocks while maintaining the performance of the blockchain.展开更多
In recent years,blockchain technology integration and application has gradually become an important driving force for new technological innovation and industrial transformation.While blockchain technology and applicat...In recent years,blockchain technology integration and application has gradually become an important driving force for new technological innovation and industrial transformation.While blockchain technology and applications are developing rapidly,the emerging security risks and obstacles have gradually become prominent.Attackers can still find security issues in blockchain systems and conduct attacks,causing increasing losses from network attacks every year.In response to the current demand for blockchain application security detection and assessment in all industries,and the insufficient coverage of existing detection technologies such as smart contract detectiontechnology,this paper proposes a blockchain core technology security assessment system model,and studies the relevant detection and assessment key technologies and systems.A security assessment scheme based on a smart contract and consensus mechanism detection scheme is designed.And the underlying blockchain architecture supports the traceability of detection results using super blockchains.Finally,the functionality and performance of the system were tested,and the test results show that the model and solutions proposed in this paper have good feasibility.展开更多
This study conducts a systematic literature review(SLR)of blockchain consensus mechanisms,an essential protocols that maintain the integrity,reliability,and decentralization of distributed ledger networks.The aim is t...This study conducts a systematic literature review(SLR)of blockchain consensus mechanisms,an essential protocols that maintain the integrity,reliability,and decentralization of distributed ledger networks.The aim is to comprehensively investigate prominent mechanisms’security features and vulnerabilities,emphasizing their security considerations,applications,challenges,and future directions.The existing literature offers valuable insights into various consensus mechanisms’strengths,limitations,and security vulnerabilities and their real-world applications.However,there remains a gap in synthesizing and analyzing this knowledge systematically.Addressing this gap would facilitate a structured approach to understanding consensus mechanisms’security and vulnerabilities comprehensively.The study adheres to Preferred Reporting Items for Systematic Reviews and Meta-Analyses(PRISMA)guidelines and computer science standards and reviewed 3749 research papers from 2016 to 2024,excluding grey literature,resulting in 290 articles for descriptive analysis.The research highlights an increased focus on blockchain consensus security,energy efficiency,and hybrid mechanisms within 60%of research papers post-2019,identifying gaps in scalability,privacy,and interoperability for future exploration.By synthesizing the existing research and identifying the key trends,this SLR contributes to advancing the understanding of blockchain consensus mechanisms’security and guiding future research and structured innovation in blockchain systems and applications.展开更多
Blockchain technology is increasingly popular and has been widely applied in many industrial fields,due to its unique properties of decentralization,immutability,and traceability.Blockchain systems in different fields...Blockchain technology is increasingly popular and has been widely applied in many industrial fields,due to its unique properties of decentralization,immutability,and traceability.Blockchain systems in different fields vary,with different block structures,consensus mechanisms and access permission models.These differences make it hard for different blockchain systems to interoperate with each other,which isolates them.Cross-chain technologies have been developed to solve this isolation problem in order to improve the interoperability of blockchains.Although some surveys on cross-chain technologies can be found,they are unable to keep up with the latest research progress due to their extremely fast pace of development.Moreover,the literature misses general criteria to evaluate the quality of cross-chain technologies.In this paper,a comprehensive literature review of cross-chain technologies is conducted by employing a comprehensive set of evaluation criteria.The preliminaries on blockchain interoperability are first presented.Then,a set of evaluation criteria is proposed in terms of security,privacy,performance,and functionality.The latest cutting-edge works are reviewed based on the proposed taxonomy of cross-chain technologies and their performance is evaluated against our proposed criteria.Finally,some open issues and future directions of cross-chain research are pointed out.展开更多
基金funded by the National Natural Science Foundation of China(62072056,62172058)the Researchers Supporting Project Number(RSP2023R102)King Saud University,Riyadh,Saudi Arabia+4 种基金funded by the Hunan Provincial Key Research and Development Program(2022SK2107,2022GK2019)the Natural Science Foundation of Hunan Province(2023JJ30054)the Foundation of State Key Laboratory of Public Big Data(PBD2021-15)the Young Doctor Innovation Program of Zhejiang Shuren University(2019QC30)Postgraduate Scientific Research Innovation Project of Hunan Province(CX20220940,CX20220941).
文摘Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the system.This technology has been widely used and has developed rapidly in big data systems across various fields.An increasing number of users are participating in application systems that use blockchain as their underlying architecture.As the number of transactions and the capital involved in blockchain grow,ensuring information security becomes imperative.Addressing the verification of transactional information security and privacy has emerged as a critical challenge.Blockchain-based verification methods can effectively eliminate the need for centralized third-party organizations.However,the efficiency of nodes in storing and verifying blockchain data faces unprecedented challenges.To address this issue,this paper introduces an efficient verification scheme for transaction security.Initially,it presents a node evaluation module to estimate the activity level of user nodes participating in transactions,accompanied by a probabilistic analysis for all transactions.Subsequently,this paper optimizes the conventional transaction organization form,introduces a heterogeneous Merkle tree storage structure,and designs algorithms for constructing these heterogeneous trees.Theoretical analyses and simulation experiments conclusively demonstrate the superior performance of this scheme.When verifying the same number of transactions,the heterogeneous Merkle tree transmits less data and is more efficient than traditional methods.The findings indicate that the heterogeneous Merkle tree structure is suitable for various blockchain applications,including the Internet of Things.This scheme can markedly enhance the efficiency of information verification and bolster the security of distributed systems.
基金supported by National Natural Science Foundation of China(Grant No.62271073 and 61971066)Beijing Natural Science Foundation(L212003)the National Youth Top-notch Talent Support Program.
文摘Package delivery via ridesharing provides appealing benefits of lower delivery cost and efficient vehicle usage.Most existing ridesharing systems operate the matching of ridesharing in a centralized manner,which may result in the single point of failure once the controller breaks down or is under attack.To tackle such problems,our goal in this paper is to develop a blockchain-based package delivery ridesharing system,where decentralization is adopted to remove intermediaries and direct transactions between the providers and the requestors are allowed.To complete the matching process under decentralized structure,an Event-Triggered Distributed Deep Reinforcement Learning(ETDDRL)algorithm is proposed to generate/update the real-time ridesharing orders for the new coming ridesharing requests from a local view.Simulation results reveal the vast potential of the ETDDRL matching algorithm under the blockchain framework for the promotion of the ridesharing profits.Finally,we develop an application for Android-based terminals to verify the ETDDRL matching algorithm.
基金The National Natural Science Foundation of China(No.61372103)the Natural Science Foundation of Jiangsu Province(No.BK20201265)the Key Laboratory of Computer Network Technology of Jiangsu Province。
文摘To verify that an organization-friendly blockchain system may suffer from forgery and collusion attacks,forgery and collusion attacks were theoretically carried out according to the phase sequence of an organization-friendly blockchain system.Then,the organization-friendly blockchain system was improved and based on the phase sequence forgery and collusion attacks were conducted.The results show that the attacker can obtain illegal transaction data from forgery and collusion attacks on the organization-friendly blockchain system.However,for the improved organization-friendly blockchain,the attacker s forgery and collusion attacks cannot be completed.Therefore,the organization-friendly blockchain system may be subject to forgery and collusion attacks,but the improved organization-friendly blockchain system can prevent such attacks.
文摘Distributed Federated Learning(DFL)technology enables participants to cooperatively train a shared model while preserving the privacy of their local datasets,making it a desirable solution for decentralized and privacy-preserving Web3 scenarios.However,DFL faces incentive and security challenges in the decentralized framework.To address these issues,this paper presents a Hierarchical Blockchain-enabled DFL(HBDFL)system,which provides a generic solution framework for the DFL-related applications.The proposed system consists of four major components,including a model contribution-based reward mechanism,a Proof of Elapsed Time and Accuracy(PoETA)consensus algorithm,a Distributed Reputation-based Verification Mechanism(DRTM)and an Accuracy-Dependent Throughput Management(ADTM)mechanism.The model contribution-based rewarding mechanism incentivizes network nodes to train models with their local datasets,while the PoETA consensus algorithm optimizes the tradeoff between the shared model accuracy and system throughput.The DRTM improves the system efficiency in consensus,and the ADTM mechanism guarantees that the throughput performance remains within a predefined range while improving the shared model accuracy.The performance of the proposed HBDFL system is evaluated by numerical simulations,with the results showing that the system improves the accuracy of the shared model while maintaining high throughput and ensuring security.
基金supported by the International Scientific and Technological Cooperation Project of Huangpu and Development Districts in Guangzhou(2023GH17)the National Science and Technology Council in Taiwan under grant number NSTC-113-2224-E-027-001,Private Funding(PV009-2023)the KW IPPP(Research Maintenance Fee)Individual/Centre/Group(RMF1506-2021)at Universiti Malaya,Malaysia.
文摘Blockchain interoperability enables seamless communication and asset transfer across isolated permissioned blockchain systems,but it introduces significant security and privacy vulnerabilities.This review aims to systematically assess the security and privacy landscape of interoperability protocols for permissioned blockchains,identifying key properties,attack vectors,and countermeasures.Using PRISMA 2020 guidelines,we analysed 56 peerreviewed studies published between 2020 and 2025,retrieved from Scopus,ScienceDirect,Web of Science,and IEEE Xplore.The review focused on interoperability protocols for permissioned blockchains with security and privacy analyses,including only English-language journal articles and conference proceedings.Risk of bias in the included studies was assessed using the MMAT.Methods for presenting and synthesizing results included descriptive analysis,bibliometric analysis,and content analysis,with findings organized into tables,charts,and comparative summaries.The review classifies interoperability protocols into relay,sidechain,notary scheme,HTLC,and hybrid types and identifies 18 security and privacy properties along with 31 known attack types.Relay-based protocols showed the broadest security coverage,while HTLC and notary schemes demonstrated significant security gaps.Notably,93% of studies examined fewer than four properties or attack types,indicating a fragmented research landscape.The review identifies underexplored areas such as ACID properties,decentralization,and cross-chain attack resilience.It further highlights effective countermeasures,including cryptographic techniques,trusted execution environments,zero-knowledge proofs,and decentralized identity schemes.The findings suggest that despite growing adoption,current interoperability protocols lack comprehensive security evaluations.More holistic research is needed to ensure the resilience,trustworthiness,and scalability of cross-chain operations in permissioned blockchain ecosystems.
基金funded by Ajman University,AU-Funded Research Grant 2023-IRG-ENIT-22.
文摘Cyber-Physical System (CPS) devices are increasing exponentially. Lacking confidentiality creates a vulnerable network. Thus, demanding the overall system with the latest and robust solutions for the defence mechanisms with low computation cost, increased integrity, and surveillance. The proposal of a mechanism that utilizes the features of authenticity measures using the Destination Sequence Distance Vector (DSDV) routing protocol which applies to the multi-WSN (Wireless Sensor Network) of IoT devices in CPS which is developed for the Device-to-Device (D2D) authentication developed from the local-chain and public chain respectively combined with the Software Defined Networking (SDN) control and monitoring system using switches and controllers that will route the packets through the network, identify any false nodes, take preventive measures against them and preventing them for any future problems. Next, the system is powered by Blockchain cryptographic features by utilizing the TrustChain features to create a private, secure, and temper-free ledger of the transactions performed inside the network. Results are achieved in the legitimate devices connecting to the network, transferring their packets to their destination under supervision, reporting whenever a false node is causing hurdles, and recording the transactions for temper-proof records. Evaluation results based on 1000+ transactions illustrate that the proposed mechanism not only outshines most aspects of Cyber-Physical systems but also consumes less computation power with a low latency of 0.1 seconds only.
文摘This paper presents a novel blockchain-embedded cybersecurity framework for industrial solar power systems,integrating immutable machine learning(ML)with distributed ledger technology.Our contribution focused on three factors,Quantum-resistant feature engineering using theUNSW-NB15 dataset adapted for solar infrastructure anomalies.An enhanced Light Gradient Boosting Machine(LightGBM)classifier with blockchain-validated decision thresholds,and A cryptographic proof-of-threat(PoT)consensus mechanism for cyber attack verification.The proposed Immutable LightGBM model with majority voting and cryptographic feature encoding achieves 96.9% detection accuracy with 0.97 weighted average of precision,recall and F1-score,outperforming conventional intrusion detection systems(IDSs)by 12.7% in false positive reduction.The blockchain layer demonstrates a 2.4-s average block confirmation time with 256-bit SHA-3 hashing,enabling real-time threat logging in photovoltaic networks.Experimental results improve in attack traceability compared to centralized security systems,establishing new benchmarks for trustworthy anomaly detection in smart grid infrastructures.This study also compared traditional and hybrid ML based blockchian driven IDSs and attained better classification results.The proposed framework not only delivers a resilient,adaptable threat mitigation system(TMS)for Industry 4.0 solar powered infrastructure but also attains high explainability,scalability with tamper-proof logs,and remarkably exceptional ability of endurance to cyber attacks.
文摘Cloud-based setups are intertwined with the Internet of Things and advanced,and technologies such as blockchain revolutionize conventional healthcare infrastructure.This digitization has major advantages,mainly enhancing the security barriers of the green tree infrastructure.In this study,we conducted a systematic review of over 150 articles that focused exclusively on blockchain-based healthcare systems,security vulnerabilities,cyberattacks,and system limitations.In addition,we considered several solutions proposed by thousands of researchers worldwide.Our results mostly delineate sustained threats and security concerns in blockchain-based medical health infrastructures for data management,transmission,and processing.Here,we describe 17 security threats that violate the privacy and data integrity of a system,over 21 cyber-attacks on security and QoS,and some system implementation problems such as node compromise,scalability,efficiency,regulatory issues,computation speed,and power consumption.We propose a multi-layered architecture for the future healthcare infrastructure.Second,we classify all threats and security concerns based on these layers and assess suggested solutions in terms of these contingencies.Our thorough theoretical examination of several performance criteria—including confidentiality,access control,interoperability problems,and energy efficiency—as well as mathematical verifications establishes the superiority of security,privacy maintenance,reliability,and efficiency over conventional systems.We conducted in-depth comparative studies on different interoperability parameters in the blockchain models.Our research justifies the use of various positive protocols and optimization methods to improve the quality of services in e-healthcare and overcome problems arising fromlaws and ethics.Determining the theoretical aspects,their scope,and future expectations encourages us to design reliable,secure,and privacy-preserving systems.
基金the National Key R&D Program of China(No.2020YFB1806700),the National Natural Science Foundation of China(Grant Nos.61972246,61932014).
文摘Blockchain as a decentralized storage technology is widely used in many fields.It has extremely strict requirements for reliability because there are many potentially malicious nodes.Generally,blockchain is a chain storage structure formed by interconnecting blocks1),which are stored by full replication method,where each node stores a replica of all blocks and the data consistency is maintained by the consensus protocol.To decrease the storage overhead,previous approaches such as BFT-Store and Partition Chain store blocks via erasure codes.However,existing erasure coding based methods utilize static encoding schema to tolerant f malicious nodes,but in the typical cases,the number of malicious nodes is much smaller than f as described in previous literatures.Using redundant parities to tolerate excessive malicious nodes introduces unnecessary storage overhead.To solve the above problem,we propose Dynamic-EC,which is a Dynamic Erasure Coding method in permissioned blockchain systems.The key idea of Dynamic-EC is to reduce the storage overhead by dynamically adjusting the total number of parities according to the risk level of the whole system,which is determined by the number of perceived malicious nodes,while ensuring the system reliability.To demonstrate the effectiveness of Dynamic-EC,we conduct several experiments on an open source blockchain software Tendermint.The results show that,compared to the state-of-the-art erasure coding methods,Dynamic-EC reduces the storage overhead by up to 42%,and decreases the average write latency of blocks by up to 25%,respectively.
基金supported in part by the National Natural Science Foundation of China(NSFC),under Grant Nos.71932002,71971188Humanity and Social Science Foundation of Ministry of Education of China,under Grant No.22YJCZH086.
文摘As an innovative approach, Direct Acyclic Graph (DAG)-based blockchain is designed to overcome the scalability and performance limitations of traditional blockchain systems, which rely on sequential structures. The graph-based architecture of DAG allows for faster transactions and parallel processing, making it a compelling option across various industries. To enhance the analytical understanding of DAG-based blockchains, this paper begins by introducing a Markov model tailored for a DAG-based blockchain system, specifically focusing on the Tangle structure and the interaction between tips and newly arrived transactions. We then establish a continuous-time Markov process to analyze the DAG-based blockchain, demonstrating that this process is a level-dependent quasi-birth-and-death (QBD) process. We further prove that the QBD process is both irreducible and positively recurrent. Building on this foundation, we conduct a performance analysis of the DAG-based blockchain system by deriving the stationary probability vector of the QBD process. Notably, we introduce a novel method to calculate the average sojourn time of any arriving internal tip within the system using first passage times and Phase-type (PH) distributions. Finally, numerical examples are provided to validate our theoretical findings and to illustrate the influence of system parameters on the performance metrics.
基金supported in part by the National Natural Science Foundation of China under Grant No.61701197in part by the National Key Research and Development Program of China under Grant No.2021YFA1000500(4)in part by the 111 project under Grant No.B23008.
文摘As Internet of Vehicles(IoV)technology continues to advance,edge computing has become an important tool for assisting vehicles in handling complex tasks.However,the process of offloading tasks to edge servers may expose vehicles to malicious external attacks,resulting in information loss or even tampering,thereby creating serious security vulnerabilities.Blockchain technology can maintain a shared ledger among servers.In the Raft consensus mechanism,as long as more than half of the nodes remain operational,the system will not collapse,effectively maintaining the system’s robustness and security.To protect vehicle information,we propose a security framework that integrates the Raft consensus mechanism from blockchain technology with edge computing.To address the additional latency introduced by blockchain,we derived a theoretical formula for system delay and proposed a convex optimization solution to minimize the system latency,ensuring that the system meets the requirements for low latency and high reliability.Simulation results demonstrate that the optimized data extraction rate significantly reduces systemdelay,with relatively stable variations in latency.Moreover,the proposed optimization solution based on this model can provide valuable insights for enhancing security and efficiency in future network environments,such as 5G and next-generation smart city systems.
基金We are thankful for the funding support fromthe Science and Technology Projects of the National Archives Administration of China(Grant Number 2022-R-031)the Fundamental Research Funds for the Central Universities,Central China Normal University(Grant Number CCNU24CG014).
文摘As the volume of healthcare and medical data increases from diverse sources,real-world scenarios involving data sharing and collaboration have certain challenges,including the risk of privacy leakage,difficulty in data fusion,low reliability of data storage,low effectiveness of data sharing,etc.To guarantee the service quality of data collaboration,this paper presents a privacy-preserving Healthcare and Medical Data Collaboration Service System combining Blockchain with Federated Learning,termed FL-HMChain.This system is composed of three layers:Data extraction and storage,data management,and data application.Focusing on healthcare and medical data,a healthcare and medical blockchain is constructed to realize data storage,transfer,processing,and access with security,real-time,reliability,and integrity.An improved master node selection consensus mechanism is presented to detect and prevent dishonest behavior,ensuring the overall reliability and trustworthiness of the collaborative model training process.Furthermore,healthcare and medical data collaboration services in real-world scenarios have been discussed and developed.To further validate the performance of FL-HMChain,a Convolutional Neural Network-based Federated Learning(FL-CNN-HMChain)model is investigated for medical image identification.This model achieves better performance compared to the baseline Convolutional Neural Network(CNN),having an average improvement of 4.7%on Area Under Curve(AUC)and 7%on Accuracy(ACC),respectively.Furthermore,the probability of privacy leakage can be effectively reduced by the blockchain-based parameter transfer mechanism in federated learning between local and global models.
文摘To enable precision medicine and remote patient monitoring,internet of healthcare things(IoHT)has gained significant interest as a promising technique.With the widespread use of IoHT,nonetheless,privacy infringements such as IoHT data leakage have raised serious public concerns.On the other side,blockchain and distributed ledger technologies have demonstrated great potential for enhancing trustworthiness and privacy protection for IoHT systems.In this survey,a holistic review of existing blockchain-based IoHT systems is conducted to indicate the feasibility of combining blockchain and IoHT in privacy protection.In addition,various types of privacy challenges in IoHT are identified by examining general data protection regulation(GDPR).More importantly,an associated study of cutting-edge privacy-preserving techniques for the identified IoHT privacy challenges is presented.Finally,several challenges in four promising research areas for blockchain-based IoHT systems are pointed out,with the intent of motivating researchers working in these fields to develop possible solutions.
基金supported by the Shandong Provincial Key Research and Development Program (No.2021CXGC010107)the National Natural Science Foundation of China (Grant Nos.62172307,U21A20466,62272350)+2 种基金the New 20 Project of Higher Education of Jinan (No.202228017)the Special Project on Science and Technology Program of Hubei Provience (Nos.2020AEA013,2021BAA025)the Fundamental Research Funds for the Central Universities (No.2042023KF0203).
文摘After the Ethereum DAO attack in 2016,which resulted in significant economic losses,blockchain governance has become a prominent research area.However,there is a lack of comprehensive and systematic literature review on blockchain governance.To deeply understand the process of blockchain governance and provide guidance for the future design of the blockchain governance model,we provide an in-depth review of blockchain governance.In this paper,first we introduce the consensus algorithms currently used in blockchain and relate them to governance theory.Second,we present the main content of off-chain governance and investigate two well-known off-chain governance projects.Third,we investigate four common on-chain governance voting techniques,then summarize the seven attributes that the on-chain governance voting process should meet,and finally analyze four well-known on-chain governance blockchain projects based on the previous research.We hope this survey will provide an in-depth insight into the potential development direction of blockchain governance and device future research agenda.
文摘The use of privacy-enhanced facial recognition has increased in response to growing concerns about data securityand privacy in the digital age. This trend is spurred by rising demand for face recognition technology in a varietyof industries, including access control, law enforcement, surveillance, and internet communication. However,the growing usage of face recognition technology has created serious concerns about data monitoring and userprivacy preferences, especially in context-aware systems. In response to these problems, this study provides a novelframework that integrates sophisticated approaches such as Generative Adversarial Networks (GANs), Blockchain,and distributed computing to solve privacy concerns while maintaining exact face recognition. The framework’spainstaking design and execution strive to strike a compromise between precise face recognition and protectingpersonal data integrity in an increasingly interconnected environment. Using cutting-edge tools like Dlib for faceanalysis,Ray Cluster for distributed computing, and Blockchain for decentralized identity verification, the proposedsystem provides scalable and secure facial analysis while protecting user privacy. The study’s contributions includethe creation of a sustainable and scalable solution for privacy-aware face recognition, the implementation of flexibleprivacy computing approaches based on Blockchain networks, and the demonstration of higher performanceover previous methods. Specifically, the proposed StyleGAN model has an outstanding accuracy rate of 93.84%while processing high-resolution images from the CelebA-HQ dataset, beating other evaluated models such asProgressive GAN 90.27%, CycleGAN 89.80%, and MGAN 80.80%. With improvements in accuracy, speed, andprivacy protection, the framework has great promise for practical use in a variety of fields that need face recognitiontechnology. This study paves the way for future research in privacy-enhanced face recognition systems, emphasizingthe significance of using cutting-edge technology to meet rising privacy issues in digital identity.
基金supported by Basic Science Research Program through the National Research Foundation of Korea(NRF)funded by the Ministry of Education(No.2022R1I1A3063257)supported by the MSIT(Ministry of Science and ICT),Korea,under the Special R&D Zone Development Project(R&D)—Development of R&D Innovation Valley Support Program(2023-DD-RD-0152)supervised by the Innovation Foundation.
文摘Data trading enables data owners and data requesters to sell and purchase data.With the emergence of blockchain technology,research on blockchain-based data trading systems is receiving a lot of attention.Particularly,to reduce the on-chain storage cost,a novel paradigm of blockchain and cloud fusion has been widely considered as a promising data trading platform.Moreover,the fact that data can be used for commercial purposes will encourage users and organizations from various fields to participate in the data marketplace.In the data marketplace,it is a challenge how to trade the data securely outsourced to the external cloud in a way that restricts access to the data only to authorized users across multiple domains.In this paper,we propose a cross-domain bilateral access control protocol for blockchain-cloud based data trading systems.We consider a system model that consists of domain authorities,data senders,data receivers,a blockchain layer,and a cloud provider.The proposed protocol enables access control and source identification of the outsourced data by leveraging identity-based cryptographic techniques.In the proposed protocol,the outsourced data of the sender is encrypted under the target receiver’s identity,and the cloud provider performs policy-match verification on the authorization tags of the sender and receiver generated by the identity-based signature scheme.Therefore,data trading can be achieved only if the identities of the data sender and receiver simultaneously meet the policies specified by each other.To demonstrate efficiency,we evaluate the performance of the proposed protocol and compare it with existing studies.
基金supported in part by the National Key R&D Program of China under Grant 2022YFB3104503in part by the China Postdoctoral Science Foundation under Grant 2024M750199+1 种基金in part by the National Natural Science Foundation of China under Grants 62202054,62002022 and 62472251in part by the Fundamental Research Funds for the Central Universities under Grant BLX202360.
文摘In blockchain-based unmanned aerial vehicle(UAV)communication systems,the length of a block affects the performance of the blockchain.The transmission performance of blocks in the form of finite character segments is also affected by the block length.Therefore,it is crucial to balance the transmission performance and blockchain performance of blockchain communication systems,especially in wireless environments involving UAVs.This paper investigates a secure transmission scheme for blocks in blockchain-based UAV communication systems to prevent the information contained in blocks from being completely eavesdropped during transmission.In our scheme,using a friendly jamming UAV to emit jamming signals diminishes the quality of the eavesdropping channel,thus enhancing the communication security performance of the source UAV.Under the constraints of maneuverability and transmission power of the UAV,the joint design of UAV trajectories,transmission power,and block length are proposed to maximize the average minimum secrecy rate(AMSR).Since the optimization problem is non-convex and difficult to solve directly,we first decompose the optimization problem into subproblems of trajectory optimization,transmission power optimization,and block length optimization.Then,based on firstorder approximation techniques,these subproblems are reformulated as convex optimization problems.Finally,we utilize an alternating iteration algorithm based on the successive convex approximation(SCA)technique to solve these subproblems iteratively.The simulation results demonstrate that our proposed scheme can achieve secure transmission for blocks while maintaining the performance of the blockchain.
基金supported by Education and Scientific Research Special Project of Fujian Provincial Department of Finance(Research on the Application of Blockchain Technology in Prison Law Enforcement Management),Fujian Provincial Social Science Foundation Public Security Theory Research Project(FJ2023TWGA004).
文摘In recent years,blockchain technology integration and application has gradually become an important driving force for new technological innovation and industrial transformation.While blockchain technology and applications are developing rapidly,the emerging security risks and obstacles have gradually become prominent.Attackers can still find security issues in blockchain systems and conduct attacks,causing increasing losses from network attacks every year.In response to the current demand for blockchain application security detection and assessment in all industries,and the insufficient coverage of existing detection technologies such as smart contract detectiontechnology,this paper proposes a blockchain core technology security assessment system model,and studies the relevant detection and assessment key technologies and systems.A security assessment scheme based on a smart contract and consensus mechanism detection scheme is designed.And the underlying blockchain architecture supports the traceability of detection results using super blockchains.Finally,the functionality and performance of the system were tested,and the test results show that the model and solutions proposed in this paper have good feasibility.
基金funded by Universiti Teknologi PETRONAS and grants(YUTP-PRG:015PBC-011).
文摘This study conducts a systematic literature review(SLR)of blockchain consensus mechanisms,an essential protocols that maintain the integrity,reliability,and decentralization of distributed ledger networks.The aim is to comprehensively investigate prominent mechanisms’security features and vulnerabilities,emphasizing their security considerations,applications,challenges,and future directions.The existing literature offers valuable insights into various consensus mechanisms’strengths,limitations,and security vulnerabilities and their real-world applications.However,there remains a gap in synthesizing and analyzing this knowledge systematically.Addressing this gap would facilitate a structured approach to understanding consensus mechanisms’security and vulnerabilities comprehensively.The study adheres to Preferred Reporting Items for Systematic Reviews and Meta-Analyses(PRISMA)guidelines and computer science standards and reviewed 3749 research papers from 2016 to 2024,excluding grey literature,resulting in 290 articles for descriptive analysis.The research highlights an increased focus on blockchain consensus security,energy efficiency,and hybrid mechanisms within 60%of research papers post-2019,identifying gaps in scalability,privacy,and interoperability for future exploration.By synthesizing the existing research and identifying the key trends,this SLR contributes to advancing the understanding of blockchain consensus mechanisms’security and guiding future research and structured innovation in blockchain systems and applications.
基金supported in part by the National Natural Science Foundation of China under Grant 62072351in part by the Key Research Project of Shaanxi Natural Science Foundation under Grant 2023-JCZD-35in part by the open research project of ZheJiang Lab under grant 2021PD0AB01。
文摘Blockchain technology is increasingly popular and has been widely applied in many industrial fields,due to its unique properties of decentralization,immutability,and traceability.Blockchain systems in different fields vary,with different block structures,consensus mechanisms and access permission models.These differences make it hard for different blockchain systems to interoperate with each other,which isolates them.Cross-chain technologies have been developed to solve this isolation problem in order to improve the interoperability of blockchains.Although some surveys on cross-chain technologies can be found,they are unable to keep up with the latest research progress due to their extremely fast pace of development.Moreover,the literature misses general criteria to evaluate the quality of cross-chain technologies.In this paper,a comprehensive literature review of cross-chain technologies is conducted by employing a comprehensive set of evaluation criteria.The preliminaries on blockchain interoperability are first presented.Then,a set of evaluation criteria is proposed in terms of security,privacy,performance,and functionality.The latest cutting-edge works are reviewed based on the proposed taxonomy of cross-chain technologies and their performance is evaluated against our proposed criteria.Finally,some open issues and future directions of cross-chain research are pointed out.