期刊文献+
共找到2,106篇文章
< 1 2 106 >
每页显示 20 50 100
A Novel High-Efficiency Transaction Verification Scheme for Blockchain Systems
1
作者 Jingyu Zhang Pian Zhou +3 位作者 Jin Wang Osama Alfarraj Saurabh Singh Min Zhu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第5期1613-1633,共21页
Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the system.This technology has been widely used and has developed rapidly in big data systems... Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the system.This technology has been widely used and has developed rapidly in big data systems across various fields.An increasing number of users are participating in application systems that use blockchain as their underlying architecture.As the number of transactions and the capital involved in blockchain grow,ensuring information security becomes imperative.Addressing the verification of transactional information security and privacy has emerged as a critical challenge.Blockchain-based verification methods can effectively eliminate the need for centralized third-party organizations.However,the efficiency of nodes in storing and verifying blockchain data faces unprecedented challenges.To address this issue,this paper introduces an efficient verification scheme for transaction security.Initially,it presents a node evaluation module to estimate the activity level of user nodes participating in transactions,accompanied by a probabilistic analysis for all transactions.Subsequently,this paper optimizes the conventional transaction organization form,introduces a heterogeneous Merkle tree storage structure,and designs algorithms for constructing these heterogeneous trees.Theoretical analyses and simulation experiments conclusively demonstrate the superior performance of this scheme.When verifying the same number of transactions,the heterogeneous Merkle tree transmits less data and is more efficient than traditional methods.The findings indicate that the heterogeneous Merkle tree structure is suitable for various blockchain applications,including the Internet of Things.This scheme can markedly enhance the efficiency of information verification and bolster the security of distributed systems. 展开更多
关键词 blockchain architecture transaction verification information security heterogeneous Merkle tree distributed systems
在线阅读 下载PDF
Vehicle-oriented ridesharing package delivery in blockchain system
2
作者 Xuefei Zhang Junjie Liu +4 位作者 Yijing Li Qimei Cui Xiaofeng Tao Ren Ping Liu Wenzheng Li 《Digital Communications and Networks》 SCIE CSCD 2024年第4期1014-1023,共10页
Package delivery via ridesharing provides appealing benefits of lower delivery cost and efficient vehicle usage.Most existing ridesharing systems operate the matching of ridesharing in a centralized manner,which may r... Package delivery via ridesharing provides appealing benefits of lower delivery cost and efficient vehicle usage.Most existing ridesharing systems operate the matching of ridesharing in a centralized manner,which may result in the single point of failure once the controller breaks down or is under attack.To tackle such problems,our goal in this paper is to develop a blockchain-based package delivery ridesharing system,where decentralization is adopted to remove intermediaries and direct transactions between the providers and the requestors are allowed.To complete the matching process under decentralized structure,an Event-Triggered Distributed Deep Reinforcement Learning(ETDDRL)algorithm is proposed to generate/update the real-time ridesharing orders for the new coming ridesharing requests from a local view.Simulation results reveal the vast potential of the ETDDRL matching algorithm under the blockchain framework for the promotion of the ridesharing profits.Finally,we develop an application for Android-based terminals to verify the ETDDRL matching algorithm. 展开更多
关键词 blockchain Dynamic matching Ridesharing package delivery
在线阅读 下载PDF
Cryptanalysis on an organization-friendly blockchain system
3
作者 Zhang Ying Jiang Rui 《Journal of Southeast University(English Edition)》 EI CAS 2022年第1期36-41,共6页
To verify that an organization-friendly blockchain system may suffer from forgery and collusion attacks,forgery and collusion attacks were theoretically carried out according to the phase sequence of an organization-f... To verify that an organization-friendly blockchain system may suffer from forgery and collusion attacks,forgery and collusion attacks were theoretically carried out according to the phase sequence of an organization-friendly blockchain system.Then,the organization-friendly blockchain system was improved and based on the phase sequence forgery and collusion attacks were conducted.The results show that the attacker can obtain illegal transaction data from forgery and collusion attacks on the organization-friendly blockchain system.However,for the improved organization-friendly blockchain,the attacker s forgery and collusion attacks cannot be completed.Therefore,the organization-friendly blockchain system may be subject to forgery and collusion attacks,but the improved organization-friendly blockchain system can prevent such attacks. 展开更多
关键词 blockchain identity privacy transaction supervision forgery attack collusion attack
在线阅读 下载PDF
Dynamic Evolutionary Game-Based Staking Pool Selection Modeling and Decentralization Enhancement for Blockchain System
4
作者 Shasha Yu Yanan Qiao +2 位作者 Fan Yang Wenjia Zhao Junge Bo 《IEEE/CAA Journal of Automatica Sinica》 2025年第9期1850-1865,共16页
The proof-of-stake(PoS)mechanism is a consensus protocol within blockchain technology that determines the validation of transactions and the minting of new blocks based on the participant’s stake in the cryptocurrenc... The proof-of-stake(PoS)mechanism is a consensus protocol within blockchain technology that determines the validation of transactions and the minting of new blocks based on the participant’s stake in the cryptocurrency network.In contrast to proof-of-work(PoW),which relies on computational power to validate transactions,PoS employs a deterministic and resourceefficient approach to elect validators.Whereas,an inherent risk of PoS is the potential for centralization among a small cohort of network participants possessing substantial stakes,jeopardizing system decentralization and posing security threats.To mitigate centralization issues within PoS,this study introduces an incentive-aligned mechanism named decentralized proof-of-stake(DePoS),wherein the second-largest stakeholder is chosen as the final validator with a higher probability.Integrated with the verifiable random function(VRF),DePoS rewards the largest stakeholder with uncertainty,thus disincentivizing stakeholders from accumulating the largest stake.Additionally,a dynamic evolutionary game model is innovatively developed to simulate the evolution of staking pools,thus facilitating the investigation of staking pool selection dynamics and equilibrium stability across PoS and DePoS systems.The findings demonstrate that DePoS generally fosters wealth decentralization by discouraging the accumulation of significant cryptocurrency holdings.Through theoretical analysis of stakeholder predilection in staking pool selection and the simulation of the evolutionary tendency in pool scale,this research demonstrates the comparative advantage in decentralization offered by DePoS over the conventional PoS. 展开更多
关键词 blockchain consensus mechanism decentralization evolutionary game proof-of-stake(PoS)
在线阅读 下载PDF
A hierarchical blockchain-enabled distributed federated learning system with model contribution based rewarding 被引量:1
5
作者 Haibo Wang Hongwei Gao +2 位作者 Teng Ma Chong Li Tao Jing 《Digital Communications and Networks》 2025年第1期35-42,共8页
Distributed Federated Learning(DFL)technology enables participants to cooperatively train a shared model while preserving the privacy of their local datasets,making it a desirable solution for decentralized and privac... Distributed Federated Learning(DFL)technology enables participants to cooperatively train a shared model while preserving the privacy of their local datasets,making it a desirable solution for decentralized and privacy-preserving Web3 scenarios.However,DFL faces incentive and security challenges in the decentralized framework.To address these issues,this paper presents a Hierarchical Blockchain-enabled DFL(HBDFL)system,which provides a generic solution framework for the DFL-related applications.The proposed system consists of four major components,including a model contribution-based reward mechanism,a Proof of Elapsed Time and Accuracy(PoETA)consensus algorithm,a Distributed Reputation-based Verification Mechanism(DRTM)and an Accuracy-Dependent Throughput Management(ADTM)mechanism.The model contribution-based rewarding mechanism incentivizes network nodes to train models with their local datasets,while the PoETA consensus algorithm optimizes the tradeoff between the shared model accuracy and system throughput.The DRTM improves the system efficiency in consensus,and the ADTM mechanism guarantees that the throughput performance remains within a predefined range while improving the shared model accuracy.The performance of the proposed HBDFL system is evaluated by numerical simulations,with the results showing that the system improves the accuracy of the shared model while maintaining high throughput and ensuring security. 展开更多
关键词 blockchain Federated learning Consensus scheme Accuracy dependent throughput management
在线阅读 下载PDF
From portfolio optimization to quantum blockchain and security: a systematic review of quantum computing in finance
6
作者 Abha Satyavan Naik Esra Yeniaras +2 位作者 Gerhard Hellstern Grishma Prasad Sanjay Kumar Lalta Prasad Vishwakarma 《Financial Innovation》 2025年第1期2536-2602,共67页
The rapid advancement of quantum computing has sparked a considerable increase in research attention to quantum technologies.These advances span fundamental theoretical inquiries into quantum information and the explo... The rapid advancement of quantum computing has sparked a considerable increase in research attention to quantum technologies.These advances span fundamental theoretical inquiries into quantum information and the exploration of diverse applications arising from this evolving quantum computing paradigm.The scope of the related research is notably diverse.This paper consolidates and presents quantum computing research related to the financial sector.The finance applications considered in this study include portfolio optimization,fraud detection,and Monte Carlo methods for derivative pricing and risk calculation.In addition,we provide a comprehensive analysis of quantum computing’s applications and effects on blockchain technologies,particularly in relation to cryptocurrencies,which are central to financial technology research.As discussed in this study,quantum computing applications in finance are based on fundamental quantum physics principles and key quantum algorithms.This review aims to bridge the research gap between quantum computing and finance.We adopt a two-fold methodology,involving an analysis of quantum algorithms,followed by a discussion of their applications in specific financial contexts.Our study is based on an extensive review of online academic databases,search tools,online journal repositories,and whitepapers from 1952 to 2023,including CiteSeerX,DBLP,Research-Gate,Semantic Scholar,and scientific conference publications.We present state-of-theart findings at the intersection of finance and quantum technology and highlight open research questions that will be valuable for industry practitioners and academicians as they shape future research agendas. 展开更多
关键词 Portfolio optimization Fraud detection Derivative pricing Risk calculation Monte carlo Quantum blockchain Quantum-resistant blockchain Digital signature algorithms Post-quantum cryptography SECURITY Privacy-preserving blockchain Quantum computing
在线阅读 下载PDF
Security and Privacy in Permissioned Blockchain Interoperability:A Systematic Review
7
作者 Alsoudi Dua TanFong Ang +5 位作者 Chin Soon Ku Okmi Mohammed Yu Luo Jiahui Chen Uzair Aslam Bhatti Lip Yee Por 《Computers, Materials & Continua》 2025年第11期2579-2624,共46页
Blockchain interoperability enables seamless communication and asset transfer across isolated permissioned blockchain systems,but it introduces significant security and privacy vulnerabilities.This review aims to syst... Blockchain interoperability enables seamless communication and asset transfer across isolated permissioned blockchain systems,but it introduces significant security and privacy vulnerabilities.This review aims to systematically assess the security and privacy landscape of interoperability protocols for permissioned blockchains,identifying key properties,attack vectors,and countermeasures.Using PRISMA 2020 guidelines,we analysed 56 peerreviewed studies published between 2020 and 2025,retrieved from Scopus,ScienceDirect,Web of Science,and IEEE Xplore.The review focused on interoperability protocols for permissioned blockchains with security and privacy analyses,including only English-language journal articles and conference proceedings.Risk of bias in the included studies was assessed using the MMAT.Methods for presenting and synthesizing results included descriptive analysis,bibliometric analysis,and content analysis,with findings organized into tables,charts,and comparative summaries.The review classifies interoperability protocols into relay,sidechain,notary scheme,HTLC,and hybrid types and identifies 18 security and privacy properties along with 31 known attack types.Relay-based protocols showed the broadest security coverage,while HTLC and notary schemes demonstrated significant security gaps.Notably,93% of studies examined fewer than four properties or attack types,indicating a fragmented research landscape.The review identifies underexplored areas such as ACID properties,decentralization,and cross-chain attack resilience.It further highlights effective countermeasures,including cryptographic techniques,trusted execution environments,zero-knowledge proofs,and decentralized identity schemes.The findings suggest that despite growing adoption,current interoperability protocols lack comprehensive security evaluations.More holistic research is needed to ensure the resilience,trustworthiness,and scalability of cross-chain operations in permissioned blockchain ecosystems. 展开更多
关键词 blockchain security PRIVACY ATTACK THREAT INTEROPERABILITY cross-chain
在线阅读 下载PDF
Combined Architecture of Destination Sequence Distance Vector (DSDV) Routing with Software Defined Networking (SDN) and Blockchain in Cyber-Physical Systems
8
作者 Jawad Ahmad Ansari Mohamad Khairi Ishak Khalid Ammar 《Computers, Materials & Continua》 2025年第2期2311-2330,共20页
Cyber-Physical System (CPS) devices are increasing exponentially. Lacking confidentiality creates a vulnerable network. Thus, demanding the overall system with the latest and robust solutions for the defence mechanism... Cyber-Physical System (CPS) devices are increasing exponentially. Lacking confidentiality creates a vulnerable network. Thus, demanding the overall system with the latest and robust solutions for the defence mechanisms with low computation cost, increased integrity, and surveillance. The proposal of a mechanism that utilizes the features of authenticity measures using the Destination Sequence Distance Vector (DSDV) routing protocol which applies to the multi-WSN (Wireless Sensor Network) of IoT devices in CPS which is developed for the Device-to-Device (D2D) authentication developed from the local-chain and public chain respectively combined with the Software Defined Networking (SDN) control and monitoring system using switches and controllers that will route the packets through the network, identify any false nodes, take preventive measures against them and preventing them for any future problems. Next, the system is powered by Blockchain cryptographic features by utilizing the TrustChain features to create a private, secure, and temper-free ledger of the transactions performed inside the network. Results are achieved in the legitimate devices connecting to the network, transferring their packets to their destination under supervision, reporting whenever a false node is causing hurdles, and recording the transactions for temper-proof records. Evaluation results based on 1000+ transactions illustrate that the proposed mechanism not only outshines most aspects of Cyber-Physical systems but also consumes less computation power with a low latency of 0.1 seconds only. 展开更多
关键词 DSDV intelligent authentication SDN control&monitoring blockchain recording of transactions
在线阅读 下载PDF
A novel sharding algorithm based on TOPSIS method for blockchain systems
9
作者 Siqi Xiang Xiaohua Xiang 《International Journal of Intelligent Computing and Cybernetics》 2025年第1期112-132,共21页
Purpose-Performance optimization algorithms based on node attributes are of great importance for sharding blockchain systems.Currently,existing studies on blockchain sharding algorithms consider only random selection ... Purpose-Performance optimization algorithms based on node attributes are of great importance for sharding blockchain systems.Currently,existing studies on blockchain sharding algorithms consider only random selection sharding strategies.However,the random selection strategy does not perfectly utilize the performance of a node to break the bottleneck of blockchain performance.Design/methodology/approach-This paper proposes a blockchain sharding algorithm called TOPSIS Optimization Sharding System(TOSS),which is based on entropy weight method,relative Euclidean distance and the Technique for Order Preference by Similarity to Ideal Solution(TOPSIS).It defines a multi-attribute matrix to assess node performance and applies TOPSIS for scoring nodes.Then,an algorithm based on the TOPSIS method is proposed to calculate the performance score of each data node.In addition,an entropy weighting method is introduced to obtain the weights of each attribute to balance the impact of dimensional differences of attributes on the attribute weights.Nodes are ranked by composite scores to guide partitioning.Findings-The effectiveness of the proposed algorithm in this paper is verified by comparing it with various comparative algorithms.The experimental results show that the TOSS algorithm outperforms the comparison algorithms in terms of performance improvement for the blockchain system,and the throughput metrics are improved by about 20%in comparison.Originality/value-This study introduces a novel approach to blockchain sharding by incorporating the entropy weight method and relative Euclidean distance TOPSIS into the sharding process.This approach allows for a more effective utilization of node performance attributes,leading to significant improvements in system throughput and overall performance,addressing the limitations of the random selection strategy commonly used in existing algorithms. 展开更多
关键词 blockchain TOPSIS Fuzzy decision-making Decision analysis
在线阅读 下载PDF
Fortifying Industry 4.0 Solar Power Systems:A Blockchain-Driven Cybersecurity Framework with Immutable LightGBM
10
作者 Asrar Mahboob Muhammad Rashad +3 位作者 Ghulam Abbas Zohaib Mushtaq Tehseen Mazhar Ateeq Ur Rehman 《Computers, Materials & Continua》 2025年第11期3805-3823,共19页
This paper presents a novel blockchain-embedded cybersecurity framework for industrial solar power systems,integrating immutable machine learning(ML)with distributed ledger technology.Our contribution focused on three... This paper presents a novel blockchain-embedded cybersecurity framework for industrial solar power systems,integrating immutable machine learning(ML)with distributed ledger technology.Our contribution focused on three factors,Quantum-resistant feature engineering using theUNSW-NB15 dataset adapted for solar infrastructure anomalies.An enhanced Light Gradient Boosting Machine(LightGBM)classifier with blockchain-validated decision thresholds,and A cryptographic proof-of-threat(PoT)consensus mechanism for cyber attack verification.The proposed Immutable LightGBM model with majority voting and cryptographic feature encoding achieves 96.9% detection accuracy with 0.97 weighted average of precision,recall and F1-score,outperforming conventional intrusion detection systems(IDSs)by 12.7% in false positive reduction.The blockchain layer demonstrates a 2.4-s average block confirmation time with 256-bit SHA-3 hashing,enabling real-time threat logging in photovoltaic networks.Experimental results improve in attack traceability compared to centralized security systems,establishing new benchmarks for trustworthy anomaly detection in smart grid infrastructures.This study also compared traditional and hybrid ML based blockchian driven IDSs and attained better classification results.The proposed framework not only delivers a resilient,adaptable threat mitigation system(TMS)for Industry 4.0 solar powered infrastructure but also attains high explainability,scalability with tamper-proof logs,and remarkably exceptional ability of endurance to cyber attacks. 展开更多
关键词 blockchain LightGBM solar cybersecurity industrial IoT threat intelligence
在线阅读 下载PDF
MediGuard:A Survey on Security Attacks in Blockchain-IoT Ecosystems for e-Healthcare Applications
11
作者 Shrabani Sutradhar Rajesh Bose +4 位作者 Sudipta Majumder Arfat Ahmad Khan Sandip Roy Fasee Ullah Deepak Prashar 《Computers, Materials & Continua》 2025年第6期3975-4029,共55页
Cloud-based setups are intertwined with the Internet of Things and advanced,and technologies such as blockchain revolutionize conventional healthcare infrastructure.This digitization has major advantages,mainly enhanc... Cloud-based setups are intertwined with the Internet of Things and advanced,and technologies such as blockchain revolutionize conventional healthcare infrastructure.This digitization has major advantages,mainly enhancing the security barriers of the green tree infrastructure.In this study,we conducted a systematic review of over 150 articles that focused exclusively on blockchain-based healthcare systems,security vulnerabilities,cyberattacks,and system limitations.In addition,we considered several solutions proposed by thousands of researchers worldwide.Our results mostly delineate sustained threats and security concerns in blockchain-based medical health infrastructures for data management,transmission,and processing.Here,we describe 17 security threats that violate the privacy and data integrity of a system,over 21 cyber-attacks on security and QoS,and some system implementation problems such as node compromise,scalability,efficiency,regulatory issues,computation speed,and power consumption.We propose a multi-layered architecture for the future healthcare infrastructure.Second,we classify all threats and security concerns based on these layers and assess suggested solutions in terms of these contingencies.Our thorough theoretical examination of several performance criteria—including confidentiality,access control,interoperability problems,and energy efficiency—as well as mathematical verifications establishes the superiority of security,privacy maintenance,reliability,and efficiency over conventional systems.We conducted in-depth comparative studies on different interoperability parameters in the blockchain models.Our research justifies the use of various positive protocols and optimization methods to improve the quality of services in e-healthcare and overcome problems arising fromlaws and ethics.Determining the theoretical aspects,their scope,and future expectations encourages us to design reliable,secure,and privacy-preserving systems. 展开更多
关键词 blockchain internet of medical things cloud infrastructure cyber-attacks privacy issues
在线阅读 下载PDF
Dynamic-EC:an efficient dynamic erasure coding method for permissioned blockchain systems
12
作者 Mizhipeng ZHANG Chentao WU +1 位作者 Jie LI Minyi GUO 《Frontiers of Computer Science》 2025年第1期15-28,共14页
Blockchain as a decentralized storage technology is widely used in many fields.It has extremely strict requirements for reliability because there are many potentially malicious nodes.Generally,blockchain is a chain st... Blockchain as a decentralized storage technology is widely used in many fields.It has extremely strict requirements for reliability because there are many potentially malicious nodes.Generally,blockchain is a chain storage structure formed by interconnecting blocks1),which are stored by full replication method,where each node stores a replica of all blocks and the data consistency is maintained by the consensus protocol.To decrease the storage overhead,previous approaches such as BFT-Store and Partition Chain store blocks via erasure codes.However,existing erasure coding based methods utilize static encoding schema to tolerant f malicious nodes,but in the typical cases,the number of malicious nodes is much smaller than f as described in previous literatures.Using redundant parities to tolerate excessive malicious nodes introduces unnecessary storage overhead.To solve the above problem,we propose Dynamic-EC,which is a Dynamic Erasure Coding method in permissioned blockchain systems.The key idea of Dynamic-EC is to reduce the storage overhead by dynamically adjusting the total number of parities according to the risk level of the whole system,which is determined by the number of perceived malicious nodes,while ensuring the system reliability.To demonstrate the effectiveness of Dynamic-EC,we conduct several experiments on an open source blockchain software Tendermint.The results show that,compared to the state-of-the-art erasure coding methods,Dynamic-EC reduces the storage overhead by up to 42%,and decreases the average write latency of blocks by up to 25%,respectively. 展开更多
关键词 blockchain Byzantine Fault Tolerance(BFT) erasure coding CONSENSUS reputation evaluation
原文传递
Optimizing System Latency for Blockchain-Encrypted Edge Computing in Internet of Vehicles
13
作者 Cui Zhang Maoxin Ji +2 位作者 Qiong Wu Pingyi Fan Qiang Fan 《Computers, Materials & Continua》 2025年第5期3519-3536,共18页
As Internet of Vehicles(IoV)technology continues to advance,edge computing has become an important tool for assisting vehicles in handling complex tasks.However,the process of offloading tasks to edge servers may expo... As Internet of Vehicles(IoV)technology continues to advance,edge computing has become an important tool for assisting vehicles in handling complex tasks.However,the process of offloading tasks to edge servers may expose vehicles to malicious external attacks,resulting in information loss or even tampering,thereby creating serious security vulnerabilities.Blockchain technology can maintain a shared ledger among servers.In the Raft consensus mechanism,as long as more than half of the nodes remain operational,the system will not collapse,effectively maintaining the system’s robustness and security.To protect vehicle information,we propose a security framework that integrates the Raft consensus mechanism from blockchain technology with edge computing.To address the additional latency introduced by blockchain,we derived a theoretical formula for system delay and proposed a convex optimization solution to minimize the system latency,ensuring that the system meets the requirements for low latency and high reliability.Simulation results demonstrate that the optimized data extraction rate significantly reduces systemdelay,with relatively stable variations in latency.Moreover,the proposed optimization solution based on this model can provide valuable insights for enhancing security and efficiency in future network environments,such as 5G and next-generation smart city systems. 展开更多
关键词 blockchain edge computing internet of vehicles latency optimization
在线阅读 下载PDF
Performance Analysis for DAG-based Blockchain Systems Based on the Markov Process
14
作者 Xingshuo Song Shiyong Li +2 位作者 Yanxia Chang Chi Zhang Quanlin Li 《Journal of Systems Science and Systems Engineering》 2025年第1期29-54,共26页
As an innovative approach, Direct Acyclic Graph (DAG)-based blockchain is designed to overcome the scalability and performance limitations of traditional blockchain systems, which rely on sequential structures. The gr... As an innovative approach, Direct Acyclic Graph (DAG)-based blockchain is designed to overcome the scalability and performance limitations of traditional blockchain systems, which rely on sequential structures. The graph-based architecture of DAG allows for faster transactions and parallel processing, making it a compelling option across various industries. To enhance the analytical understanding of DAG-based blockchains, this paper begins by introducing a Markov model tailored for a DAG-based blockchain system, specifically focusing on the Tangle structure and the interaction between tips and newly arrived transactions. We then establish a continuous-time Markov process to analyze the DAG-based blockchain, demonstrating that this process is a level-dependent quasi-birth-and-death (QBD) process. We further prove that the QBD process is both irreducible and positively recurrent. Building on this foundation, we conduct a performance analysis of the DAG-based blockchain system by deriving the stationary probability vector of the QBD process. Notably, we introduce a novel method to calculate the average sojourn time of any arriving internal tip within the system using first passage times and Phase-type (PH) distributions. Finally, numerical examples are provided to validate our theoretical findings and to illustrate the influence of system parameters on the performance metrics. 展开更多
关键词 blockchain direct acyclic graph(DAG) QBD process performance analysis sojourn time
原文传递
A systematic review of blockchain 被引量:37
15
作者 Min Xu Xingtong Chen Gang Kou 《Financial Innovation》 2019年第1期488-501,共14页
Blockchain is considered by many to be a disruptive core technology.Although many researchers have realized the importance of blockchain,the research of blockchain is still in its infancy.Consequently,this study revie... Blockchain is considered by many to be a disruptive core technology.Although many researchers have realized the importance of blockchain,the research of blockchain is still in its infancy.Consequently,this study reviews the current academic research on blockchain,especially in the subject area of business and economics.Based on a systematic review of the literature retrieved from the Web of Science service,we explore the top-cited articles,most productive countries,and most common keywords.Additionally,we conduct a clustering analysis and identify the following five research themes:“economic benefit,”“blockchain technology,”“initial coin offerings,”“fintech revolution,”and“sharing economy.”Recommendations on future research directions and practical applications are also provided in this paper. 展开更多
关键词 blockchain systematic literature review Business and economics CITESPACE
在线阅读 下载PDF
A systematic literature review of blockchain cyber security 被引量:16
16
作者 Paul J.Taylor Tooska Dargahi +2 位作者 Ali Dehghantanha Reza M.Parizi Kim-Kwang Raymond Choo 《Digital Communications and Networks》 SCIE 2020年第2期147-156,共10页
Since the publication of Satoshi Nakamoto's white paper on Bitcoin in 2008,blockchain has(slowly)become one of the most frequently discussed methods for securing data storage and transfer through decentralized,tru... Since the publication of Satoshi Nakamoto's white paper on Bitcoin in 2008,blockchain has(slowly)become one of the most frequently discussed methods for securing data storage and transfer through decentralized,trustless,peer-to-peer systems.This research identifies peer-reviewed literature that seeks to utilize blockchain for cyber security purposes and presents a systematic analysis of the most frequently adopted blockchain security applications.Our findings show that the Internet of Things(IoT)lends itself well to novel blockchain applications,as do networks and machine visualization,public-key cryptography,web applications,certification schemes and the secure storage of Personally Identifiable Information(PII).This timely systematic review also sheds light on future directions of research,education and practices in the blockchain and cyber security space,such as security of blockchain in IoT,security of blockchain for AI data,and sidechain security. 展开更多
关键词 blockchain Smart contracts Cyber security Distributed ledger technology IOT Cryptocurrency Bitcoin
在线阅读 下载PDF
Blockchain for transactive energy management in networked neighborhood microgrids
17
作者 Zhikun Hu Mingyu Yan +2 位作者 Chongyu Wang Ahmed Alabdulwahab Mohammad Shahidehpour 《iEnergy》 2025年第4期235-246,共12页
The proliferation of distributed and renewable energy resources introduces additional operational challenges to power distribution systems.Transactive energy management,which allows networked neighborhood communities ... The proliferation of distributed and renewable energy resources introduces additional operational challenges to power distribution systems.Transactive energy management,which allows networked neighborhood communities and houses to trade energy,is expected to be developed as an effective method for accommodating additional uncertainties and security mandates pertaining to distributed energy resources.This paper proposes and analyzes a two-layer transactive energy market in which houses in networked neighborhood community microgrids will trade energy in respective market layers.This paper studies the blockchain applications to satisfy socioeconomic and technological concerns of secure transactive energy management in a two-level power distribution system.The numerical results for practical networked microgrids located at IllinoisTech−Bronzeville in Chicago illustrate the validity of the proposed blockchain-based transactive energy management for devising a distributed,scalable,efficient,and cybersecured power grid operation.The conclusion of the paper summarizes the prospects for blockchain applications to transactive energy management in power distribution systems. 展开更多
关键词 Networked neighborhood microgrids blockchain system transactive energy management power distribution system distributed energy resources
在线阅读 下载PDF
A Consortium Blockchain Paradigm on Hyperledger-Based Peer-to-Peer Lending System 被引量:5
18
作者 Xueyun Zeng Ninghua Hao +1 位作者 Junchen Zheng Xuening Xu 《China Communications》 SCIE CSCD 2019年第8期38-50,共13页
This paper focuses on how to use consortium blockchain to improve the regulation of peer-to-peer(P2 P) lending market. The partial decentralized consortium blockchain with limited pre-set nodes can well improve transp... This paper focuses on how to use consortium blockchain to improve the regulation of peer-to-peer(P2 P) lending market. The partial decentralized consortium blockchain with limited pre-set nodes can well improve transparency and security, which is suitable for financial regulation. Considering irregularities of the P2P lending market, the Hyperledger-based Peer-to-Peer Lending System(HyperP2PLS) is proposed. First elaborate the application scenario and business logic of the system, where a national P2P Lending Trading Center will be established to integrate all transactions and information of P2P lending market. Then construct the system architecture consisting of the blockchain network, HTTP server, and applications. The algorithm of implementation process and the web application for users have been well illustrated. The performance analysis shows that HyperP2PLS can guarantee the reliability, safety, transparency and efficiency. 展开更多
关键词 CONSORTIUM blockchain hyperledger FINANCIAL REGULATION PEER-TO-PEER LENDING
在线阅读 下载PDF
DRRS-BC:Decentralized Routing Registration System Based on Blockchain 被引量:4
19
作者 Huimin Lu Yu Tang Yi Sun 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第12期1868-1876,共9页
The border gateway protocol(BGP)has become the indispensible infrastructure of the Internet as a typical inter-domain routing protocol.However,it is vulnerable to misconfigurations and malicious attacks since BGP does... The border gateway protocol(BGP)has become the indispensible infrastructure of the Internet as a typical inter-domain routing protocol.However,it is vulnerable to misconfigurations and malicious attacks since BGP does not provide enough authentication mechanism to the route advertisement.As a result,it has brought about many security incidents with huge economic losses.Exiting solutions to the routing security problem such as S-BGP,So-BGP,Ps-BGP,and RPKI,are based on the Public Key Infrastructure and face a high security risk from the centralized structure.In this paper,we propose the decentralized blockchain-based route registration framework-decentralized route registration system based on blockchain(DRRS-BC).In DRRS-BC,we produce a global transaction ledge by the information of address prefixes and autonomous system numbers between multiple organizations and ASs,which is maintained by all blockchain nodes and further used for authentication.By applying blockchain,DRRS-BC perfectly solves the problems of identity authentication,behavior authentication as well as the promotion and deployment problem rather than depending on the authentication center.Moreover,it resists to prefix and subprefix hijacking attacks and meets the performance and security requirements of route registration. 展开更多
关键词 blockchain DECENTRALIZED routing protocol routing registration
在线阅读 下载PDF
A Novel Post-Quantum Blind Signature for Log System in Blockchain 被引量:5
20
作者 Gang Xu Yibo Cao +4 位作者 Shiyuan Xu Ke Xiao Xin Liu Xiubo Chen Mianxiong Dong 《Computer Systems Science & Engineering》 SCIE EI 2022年第6期945-958,共14页
In recent decades, log system management has been widely studied fordata security management. System abnormalities or illegal operations can befound in time by analyzing the log and provide evidence for intrusions. In... In recent decades, log system management has been widely studied fordata security management. System abnormalities or illegal operations can befound in time by analyzing the log and provide evidence for intrusions. In orderto ensure the integrity of the log in the current system, many researchers havedesigned it based on blockchain. However, the emerging blockchain is facing significant security challenges with the increment of quantum computers. An attackerequipped with a quantum computer can extract the user's private key from thepublic key to generate a forged signature, destroy the structure of the blockchain,and threaten the security of the log system. Thus, blind signature on the lattice inpost-quantum blockchain brings new security features for log systems. In ourpaper, to address these, firstly, we propose a novel log system based on post-quantum blockchain that can resist quantum computing attacks. Secondly, we utilize apost-quantum blind signature on the lattice to ensure both security and blindnessof log system, which makes the privacy of log information to a large extent.Lastly, we enhance the security level of lattice-based blind signature under therandom oracle model, and the signature size grows slowly compared with others.We also implement our protocol and conduct an extensive analysis to prove theideas. The results show that our scheme signature size edges up subtly comparedwith others with the improvement of security level. 展开更多
关键词 Log system post-quantum blockchain LATTICE blind signature privacy protection
在线阅读 下载PDF
上一页 1 2 106 下一页 到第
使用帮助 返回顶部