期刊文献+
共找到1,164篇文章
< 1 2 59 >
每页显示 20 50 100
HATLedger:An Approach to Hybrid Account and Transaction Partitioning for Sharded Permissioned Blockchains
1
作者 Shuai Zhao Zhiwei Zhang +2 位作者 Junkai Wang Ye Yuan Guoren Wang 《Computers, Materials & Continua》 2026年第3期1589-1607,共19页
With the development of sharded blockchains,high cross-shard rates and load imbalance have emerged as major challenges.Account partitioning based on hashing and real-time load faces the issue of high cross-shard rates... With the development of sharded blockchains,high cross-shard rates and load imbalance have emerged as major challenges.Account partitioning based on hashing and real-time load faces the issue of high cross-shard rates.Account partitioning based on historical transaction graphs is effective in reducing cross-shard rates but suffers from load imbalance and limited adaptability to dynamic workloads.Meanwhile,because of the coupling between consensus and execution,a target shard must receive both the partitioned transactions and the partitioned accounts before initiating consensus and execution.However,we observe that transaction partitioning and subsequent consensus do not require actual account data but only need to determine the relative partition order between shards.Therefore,we propose a novel sharded blockchain,called HATLedger,based on Hybrid Account and Transaction partitioning.First,HATLedger proposes building a future transaction graph to detect upcoming hotspot accounts and making more precise account partitioning to reduce transaction cross-shard rates.In the event of an impending overload,the source shard employs simulated partition transactions to specify the partition order across multiple target shards,thereby rapidly partitioning the pending transactions.The target shards can reach consensus on received transactions without waiting for account data.The source shard subsequently sends the account data to the corresponding target shards in the order specified by the previously simulated partition transactions.Based on real transaction history from Ethereum,we conducted extensive sharding scalability experiments.By maintaining low cross-shard rates and a relatively balanced load distribution,HATLedger achieves throughput improvements of 2.2x,1.9x,and 1.8x over SharPer,Shard Scheduler,and TxAllo,respectively,significantly enhancing efficiency and scalability. 展开更多
关键词 Sharded blockchain account partitioning cross-shard transaction rate load imbalance
在线阅读 下载PDF
Edge-intelligent semantic aggregation in blockchainsecured 6G UAV-assisted Internet of vehicles
2
作者 Zeeshan Ali Haider Inam Ullah +3 位作者 Akmalbek Abdusalomov Mohsin Shah Muhammad Zubair Khan Basem Abu Zneid 《Journal of Electronic Science and Technology》 2026年第1期14-28,共15页
The intelligent transportation systems require secure,low-latency,and reliable communication architectures to enable the real-time vehicular application.This paper proposes an edge-intelligent semantic aggregation(EIS... The intelligent transportation systems require secure,low-latency,and reliable communication architectures to enable the real-time vehicular application.This paper proposes an edge-intelligent semantic aggregation(EISA)framework for 6G unmanned aerial vehicle(UAV)-assisted Internet of vehicles(IoV)networks that integrates task-driven semantic communication,deep reinforcement learning(DRL)-based edge intelligence,and blockchain-based semantic validation across 6G terahertz(THz)links.UAVs in the proposed architecture serve as adaptive edge nodes that receive semantically vital information about the vehicle at any given stage,optimize aggregation and transmission parameters dynamically,and guarantee data integrity through a structured,lightweight consortium blockchain that signs semantically detailed representations rather than raw packets.Simulation results from a hybrid NS-3,MATLAB,and Python environment indicate that the proposed framework can achieve up to 45%reduction in end-to-end latency,an approximately 70%increase in throughput,and semantic efficiency with blockchain verification delays of less than 20 ms(more than 98%).These findings support the effectiveness of the proposed co-design for achieving context-aware,energy-efficient,and reliable communication under heavy-traffic conditions.The proposed framework provides a flexible and scalable foundation for next-generation 6G-enabled automotive networks,with subsequent growth toward federated learning-based collaborative intelligence,digital-twinassisted traffic modeling,and quantum-safe blockchain mechanisms to enhance scalability,intelligence,and long-term security. 展开更多
关键词 Blockchain Edge intelligence Internet of vehicles(IoV) Reinforcement learning Semantic communication Unmanned aerial vehicle(UAV) 6G
在线阅读 下载PDF
Performance analysis and comparison of PoW,PoS and DAG based blockchains 被引量:29
3
作者 Bin Cao Zhenghui Zhang +4 位作者 Daquan Feng Shengli Zhang Lei Zhang Mugen Peng Yun Li 《Digital Communications and Networks》 SCIE 2020年第4期480-485,共6页
In the blockchain,the consensus mechanism plays a key role in maintaining the security and legitimation of contents recorded in the blocks.Various blockchain consensus mechanisms have been proposed.However,there is no... In the blockchain,the consensus mechanism plays a key role in maintaining the security and legitimation of contents recorded in the blocks.Various blockchain consensus mechanisms have been proposed.However,there is no technical analysis and comparison as a guideline to determine which type of consensus mechanism should be adopted in a specific scenario/application.To this end,this work investigates three mainstream consensus mechanisms in the blockchain,namely,Proof of Work(PoW),Proof of Stake(PoS),and Direct Acyclic Graph(DAG),and identifies their performances in terms of the average time to generate a new block,the confirmation delay,the Transaction Per Second(TPS)and the confirmation failure probability.The results show that the consensus process is affected by both network resource(computation power/coin age,buffer size)and network load conditions.In addition,it shows that PoW and PoS are more sensitive to the change of network resource while DAG is more sensitive to network load conditions. 展开更多
关键词 Blockchain Proof of work Proof of stake Direct acyclic graph Performance comparison
在线阅读 下载PDF
Elastic Smart Contracts in Blockchains 被引量:5
4
作者 Schahram Dustdar Pablo Fernández +1 位作者 JoséMaría García Antonio Ruiz-Cortés 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第12期1901-1912,共12页
In this paper,we deal with questions related to blockchains in complex Internet of Things(IoT)-based ecosystems.Such ecosystems are typically composed of IoT devices,edge devices,cloud computing software services,as w... In this paper,we deal with questions related to blockchains in complex Internet of Things(IoT)-based ecosystems.Such ecosystems are typically composed of IoT devices,edge devices,cloud computing software services,as well as people,who are decision makers in scenarios such as smart cities.Many decisions related to analytics can be based on data coming from IoT sensors,software services,and people.However,they are typically based on different levels of abstraction and granularity.This poses a number of challenges when multiple blockchains are used together with smart contracts.This work proposes to apply our concept of elasticity to smart contracts and thereby enabling analytics in and between multiple blockchains in the context of IoT.We propose a reference architecture for Elastic Smart Contracts and evaluate the approach in a smart city scenario,discussing the benefits in terms of performance and self-adaptability of our solution. 展开更多
关键词 Blockchain ELASTICITY Internet of Things(IoT) smart cities smart contracts virtual chains
在线阅读 下载PDF
Privacy Protection for Blockchains with Account and Multi-Asset Model 被引量:3
5
作者 Donghui Ding Kang Li +3 位作者 Linpeng Jia Zhongcheng Li Jun Li Yi Sun 《China Communications》 SCIE CSCD 2019年第6期69-79,共11页
The blockchain technology has been applied to wide areas.However,the open and transparent properties of the blockchains pose serious challenges to users’privacy.Among all the schemes for the privacy protection,the ze... The blockchain technology has been applied to wide areas.However,the open and transparent properties of the blockchains pose serious challenges to users’privacy.Among all the schemes for the privacy protection,the zero-knowledge proof algorithm conceals most of the private information in a transaction,while participants of the blockchain can validate this transaction without the private information.However,current schemes are only aimed at blockchains with the UTXO model,and only one type of assets circulates on these blockchains.Based on the zero-knowledge proof algorithm,this paper proposes a privacy protection scheme for blockchains that use the account and multi-asset model.We design the transaction structure,anonymous addresses and anonymous asset metadata,and also propose the methods of the asset transfer and double-spending detection.The zk-SNARKs algorithm is used to generate and to verify the zero-knowledge proof.And finally,we conduct the experiments to evaluate our scheme. 展开更多
关键词 blockchain privacy protection ZERO-KNOWLEDGE PROOF algorithm ACCOUNT and multi-asset MODEL
在线阅读 下载PDF
Are blockchains immune to all malicious attacks? 被引量:5
6
作者 Jennifer J.Xu 《Financial Innovation》 2016年第1期319-327,共9页
Background:In recent years,blockchain technology has attracted considerable attention.It records cryptographic transactions in a public ledger that is difficult to alter and compromise because of the distributed conse... Background:In recent years,blockchain technology has attracted considerable attention.It records cryptographic transactions in a public ledger that is difficult to alter and compromise because of the distributed consensus.As a result,blockchain is believed to resist fraud and hacking.Results:This work explores the types of fraud and malicious activities that can be prevented by blockchain technology and identifies attacks to which blockchain remains vulnerable.Conclusions:This study recommends appropriate defensive measures and calls for further research into the techniques for fighting malicious activities related to blockchains. 展开更多
关键词 Blockchain Online malicious attacks Fraud detection Hacking prevention
暂未订购
Throughput-oriented associated transaction assignment in sharding blockchains for IoT social data storage 被引量:1
7
作者 Liping Tao Yang Lu +2 位作者 Xu Ding Yuqi Fan Jung Yoon Kim 《Digital Communications and Networks》 SCIE CSCD 2022年第6期885-899,共15页
Blockchain is a viable solution to provide data integrity for the enormous volume of 5G IoT social data, while we need to break through the throughput bottleneck of blockchain. Sharding is a promising technology to so... Blockchain is a viable solution to provide data integrity for the enormous volume of 5G IoT social data, while we need to break through the throughput bottleneck of blockchain. Sharding is a promising technology to solve the problem of low throughput in blockchains. However, cross-shard communication hinders the effective improvement of blockchain throughput. Therefore, it is critical to reasonably allocate transactions to different shards to improve blockchain throughput. Existing research on blockchain sharding mainly focuses on shards formation, configuration, and consensus, while ignoring the negative impact of cross-shard communication on blockchain throughput. Aiming to maximize the throughput of transaction processing, we study how to allocate blockchain transactions to shards in this paper. We propose an Associated Transaction assignment algorithm based on Closest Fit (ATCF). ATCF classifies associated transactions into transaction groups which are then assigned to different shards in the non-ascending order of transaction group sizes periodically. Within each epoch, ATCF tries to select a shard that can handle all the transactions for each transaction group. If there are multiple such shards, ATCF selects the shard with the remaining processing capacity closest to the number of transactions in the transaction group. When no such shard exists, ATCF chooses the shard with the largest remaining processing capacity for the transaction group. The transaction groups that cannot be completely processed within the current epoch will be allocated in the subsequent epochs. We prove that ATCF is a 2-approximation algorithm for the associated transaction assignment problem. Simulation results show that ATCF can effectively improve the blockchain throughput and reduce the number of cross-shard transactions. 展开更多
关键词 IoT social data Blockchain Shar ding Associated transactions Transaction assi gnment
在线阅读 下载PDF
User Centric Block-Level Attribute Based Encryption in Cloud Using Blockchains 被引量:1
8
作者 S.Godfrey Winster A.Siva Kumar R.Ramesh 《Computer Systems Science & Engineering》 SCIE EI 2022年第8期605-618,共14页
Cloud computing is a collection of distributed storage Network which can provide various services and store the data in the efficient manner.The advantages of cloud computing is its remote access where data can access... Cloud computing is a collection of distributed storage Network which can provide various services and store the data in the efficient manner.The advantages of cloud computing is its remote access where data can accessed in real time using Remote Method Innovation(RMI).The problem of data security in cloud environment is a major concern since the data can be accessed by any time by any user.Due to the lack of providing the efficient security the cloud computing they fail to achieve higher performance in providing the efficient service.To improve the performance in data security,the block chains are used for securing the data in the cloud environment.However,the traditional block chain technique are not suitable to provide efficient security to the cloud data stored in the cloud.In this paper,an efficient user centric block level Attribute Based Encryption(UCBL-ABE)scheme is presented to provide the efficient security of cloud data in cloud environment.The proposed approach performs data transaction by employing the block chain.The proposed system provides efficient privacy with access control to the user access according to the behavior of cloud user using Data Level Access Trust(DLAT).Based on DLAT,the user access has been restricted in the cloud environment.The proposed protocol is implemented in real time using Java programming language and uses IBM cloud.The implementation results justifies that the proposed system can able to provide efficient security to the data present in and cloud and also enhances the cloud performance. 展开更多
关键词 CLOUD blockchain data security ABE block-level
在线阅读 下载PDF
HBRO: A Registration Oracle Scheme for Digital Rights Management Based on Heterogeneous Blockchains 被引量:1
9
作者 Ri Ouyang 《Communications and Network》 2022年第1期45-67,共23页
As the Internet enters the era of big data, massive amounts of data are flooding people’s mobile phones and computers. The emerging self-media industry produces many videos every day, which also exposes many security... As the Internet enters the era of big data, massive amounts of data are flooding people’s mobile phones and computers. The emerging self-media industry produces many videos every day, which also exposes many security issues in digital rights management (DRM). The works of original creators can easily be infringed on public networks, and it is urgent to protect the copyright of digital content. Traditional digital rights management (TDRM) has many problems, including unqualified copyright confirmation, difficulty obtaining evidence, long time-consuming, high price, and high centralization. The combination of blockchain technology and digital rights management is one of the most popular blockchain application scenarios, the characteristics of the blockchain match DRM market demand. This paper proposes a registration oracle scheme for digital rights management based on heterogeneous blockchains, HBRO, which uses review and voting as a means to judge whether a work can be registered for copyright. HBRO is more rigorous than TDRM and DDRM in the copyright confirmation stage, rejecting many unnecessary and unqualified contents. In addition, a secure cross-chain solution is used to ensure the integrity and correctness of data transmission on heterogeneous blockchains. 展开更多
关键词 Blockchain DRM Cross-Chain Blockchain Oracle Smart Contract
在线阅读 下载PDF
CRBFT:A Byzantine Fault-Tolerant Consensus Protocol Based on Collaborative Filtering Recommendation for Blockchains
10
作者 Xiangyu Wu Xuehui Du +3 位作者 Qiantao Yang Aodi Liu Na Wang Wenjuan Wang 《Computers, Materials & Continua》 SCIE EI 2024年第7期1491-1519,共29页
Blockchain has been widely used in finance,the Internet of Things(IoT),supply chains,and other scenarios as a revolutionary technology.Consensus protocol plays a vital role in blockchain,which helps all participants t... Blockchain has been widely used in finance,the Internet of Things(IoT),supply chains,and other scenarios as a revolutionary technology.Consensus protocol plays a vital role in blockchain,which helps all participants to maintain the storage state consistently.However,with the improvement of network environment complexity and system scale,blockchain development is limited by the performance,security,and scalability of the consensus protocol.To address this problem,this paper introduces the collaborative filtering mechanism commonly used in the recommendation system into the Practical Byzantine Fault Tolerance(PBFT)and proposes a Byzantine fault-tolerant(BFT)consensus protocol based on collaborative filtering recommendation(CRBFT).Specifically,an improved collaborative filtering recommendation method is designed to use the similarity between a node’s recommendation opinions and those of the recommender as a basis for determining whether to adopt the recommendation opinions.This can amplify the recommendation voice of good nodes,weaken the impact of cunningmalicious nodes on the trust value calculation,andmake the calculated resultsmore accurate.In addition,the nodes are given voting power according to their trust value,and a weight randomelection algorithm is designed and implemented to reduce the risk of attack.The experimental results show that CRBFT can effectively eliminate various malicious nodes and improve the performance of blockchain systems in complex network environments,and the feasibility of CRBFT is also proven by theoretical analysis. 展开更多
关键词 Blockchain CONSENSUS byzantine fault-tolerant collaborative filtering TRUST
在线阅读 下载PDF
Secure and Trusted Interoperability Scheme of Heterogeneous Blockchains Platform in IoT Networks
11
作者 Xiao Liu Mingyuan Li +1 位作者 Haipeng Peng Shoushan Luo 《China Communications》 SCIE CSCD 2023年第11期225-241,共17页
With the rapid development of the Internet of Things(IoT),there is an increasing need for interac-tion between different networks.In order to improve the level of interconnection,especially the interoper-ability of us... With the rapid development of the Internet of Things(IoT),there is an increasing need for interac-tion between different networks.In order to improve the level of interconnection,especially the interoper-ability of users/devices between different nodes is very important.In the IoT heterogeneous blockchain sce-nario,how to ensure the legitimacy of the chain and how to confirm the identity of cross-chain informa-tion users/devices become the key issues to be solved for blockchain interoperability.In this paper,we pro-pose a secure and trusted interoperability mechanism for IoT based on heterogeneous chains to improve the security of blockchain interoperability.In this mecha-nism,a primary sidechain architecture supporting au-thentication at both ends of the heterogeneous chain is designed.In addition,a distributed gateway archi-tecture is proposed for cross-chain authentication and protocol conversion.The security and performance analysis shows that our scheme is feasible and effec-tive in improving the security of cross-chain opera-tions in IoT. 展开更多
关键词 AUTHENTICATION blockchain Interoperabil-ity heterogeneous chain IOT
在线阅读 下载PDF
Security in Edge Blockchains:Attacks and Countermeasures
12
作者 CAO Yinfeng CAO Jiannong +2 位作者 WANG Yuqin WANG Kaile LIU Xun 《ZTE Communications》 2022年第4期3-14,共12页
Edge blockchains,the blockchains running on edge computing infrastructures,have attracted a lot of attention in recent years.Thanks to data privacy,scalable computing resources,and distributed topology nature of edge ... Edge blockchains,the blockchains running on edge computing infrastructures,have attracted a lot of attention in recent years.Thanks to data privacy,scalable computing resources,and distributed topology nature of edge computing,edge blockchains are considered promising solutions to facilitating future blockchain applications.However,edge blockchains face unique security issues caused by the de⁃ployment of vulnerable edge devices and networks,including supply chain attacks and insecure consensus offloading,which are mostly not well studied in previous literature.This paper is the first survey that discusses the attacks and countermeasures of edge blockchains.We first summarize the three-layer architecture of edge blockchains:blockchain management,blockchain consensus,and blockchain lightweight cli⁃ent.We then describe seven specific attacks on edge blockchain components and discuss the countermeasures.At last,we provide future re⁃search directions on securing edge blockchains.This survey will act as a guideline for researchers and developers to design and implement se⁃cure edge blockchains. 展开更多
关键词 blockchain edge computing SECURITY SURVEY
在线阅读 下载PDF
A Review of Consensus Protocols in Permissioned Blockchains
13
作者 Nenad Zoran Tomić 《Journal of Computer Science Research》 2021年第2期19-26,共8页
Consensus protocols are used for the distributed management of large databases in an environment without trust among participants.The choice of a specific protocol depends on the purpose and characteristics of the sys... Consensus protocols are used for the distributed management of large databases in an environment without trust among participants.The choice of a specific protocol depends on the purpose and characteristics of the system itself.The subjects of the paper are consensus protocols in permissioned blockchains.The objective of this paper is to identify functional advantages and disadvantages of observed protocol.The analysis covers a total of six consensus protocols for permissioned blockchains.The following characteristics were compared:security,trust among participants,throughput and scalability.The results show that no protocol shows absolute dominance in all aspects of the comparison.Paxos and Raft are intended for systems in which there is no suspicion of unreliable users,but only the problem of a temporary shutdown.Practical Byzantine Fault Tolerance is intended for systems with a small number of nodes.Federated Byzantine Fault Tolerance shows better scalability and is more suitable for large systems,but can withstand a smaller number of malicious nodes.Proof-of-authority can withstand the largest number of malicious nodes without interfering with the functioning of the system.When choosing a consensus protocol for a blockchain application,one should take into account priority characteristics. 展开更多
关键词 Permissioned blockchain Consensus protocols Byzantine Fault Tolerance Crash fault tolerance
在线阅读 下载PDF
Phishing behavior detection on different blockchains via adversarial domain adaptation
14
作者 Chuyi Yan Xueying Han +3 位作者 Yan Zhu Dan Du Zhigang Lu Yuling Liu 《Cybersecurity》 2025年第3期244-265,共22页
Despite the growing attention on blockchain,phishing activities have surged,particularly on newly established chains.Acknowledging the challenge of limited intelligence in the early stages of new chains,we propose ADA... Despite the growing attention on blockchain,phishing activities have surged,particularly on newly established chains.Acknowledging the challenge of limited intelligence in the early stages of new chains,we propose ADA-Spearan automatic phishing detection model utilizing adversarial domain adaptive learning which symbolizes the method’s ability to penetrate various heterogeneous blockchains for phishing detection.The model effectively identifies phishing behavior in new chains with limited reliable labels,addressing challenges such as significant distribution drift,low attribute overlap,and limited inter-chain connections.Our approach includes a subgraph construction strategy to align heterogeneous chains,a layered deep learning encoder capturing both temporal and spatial information,and integrated adversarial domain adaptive learning in end-to-end model training.Validation in Ethereum,Bitcoin,and EOSIO environments demonstrates ADA-Spear’s effectiveness,achieving an average F1 score of 77.41 on new chains after knowledge transfer,surpassing existing detection methods. 展开更多
关键词 Blockchain Phishing detection Adversarial domain adaptation Graph/network transfer learning Hierarchical graph attention Network security
原文传递
A Blockchain-Based Hybrid Framework for Secure and Scalable Electronic Health Record Management in In-Patient Follow-Up Tracking
15
作者 Ahsan Habib Siam Md.Ehsanul Haque +3 位作者 Fahmid Al Farid Anindita Sutradhar Jia Uddin Sarina Mansor 《Computers, Materials & Continua》 2026年第3期798-822,共25页
As healthcare systems increasingly embrace digitalization,effective management of electronic health records(EHRs)has emerged as a critical priority,particularly in inpatient settings where data sensitivity and realtim... As healthcare systems increasingly embrace digitalization,effective management of electronic health records(EHRs)has emerged as a critical priority,particularly in inpatient settings where data sensitivity and realtime access are paramount.Traditional EHR systems face significant challenges,including unauthorized access,data breaches,and inefficiencies in tracking follow-up appointments,which heighten the risk of misdiagnosis and medication errors.To address these issues,this research proposes a hybrid blockchain-based solution for securely managing EHRs,specifically designed as a framework for tracking inpatient follow-ups.By integrating QR codeenabled data access with a blockchain architecture,this innovative approach enhances privacy protection,data integrity,and auditing capabilities,while facilitating swift and real-time data retrieval.The architecture adheres to Role-Based Access Control(RBAC)principles and utilizes robust encryption techniques,including SHA-256 and AES-256-CBC,to secure sensitive information.A comprehensive threat model outlines trust boundaries and potential adversaries,complemented by a validated data transmission protocol.Experimental results demonstrate that the framework remains reliable in concurrent access scenarios,highlighting its efficiency and responsiveness in real-world applications.This study emphasizes the necessity for hybrid solutions in managing sensitive medical information and advocates for integrating blockchain technology and QR code innovations into contemporary healthcare systems. 展开更多
关键词 Electronic health records blockchain data security user access control QR code blockchain in healthcare medical data privacy
在线阅读 下载PDF
DM-PBFT:Double Layers and Multi Copies-Enabled Secure and Efficient Practical Byzantine Fault Tolerance Consensus Algorithm
16
作者 Chai Ze Gao Zhipeng +3 位作者 Yang Yang Lin Yijing Li Huangqi Rui Lanlan 《China Communications》 2026年第1期204-217,共14页
Practical byzantine fault tolerance(PBFT)can reduce energy consumption and achieve high throughput compared with the traditional PoW algorithm,which is more suitable for a strongly consistent consortium blockchain.How... Practical byzantine fault tolerance(PBFT)can reduce energy consumption and achieve high throughput compared with the traditional PoW algorithm,which is more suitable for a strongly consistent consortium blockchain.However,due to the frequent communication among nodes,PBFT cannot realize scalability in large-scale networks.Existing PBFTbased algorithms still ignore performance and security.Therefore,we propose a secure and efficient practical byzantine fault tolerance based on double layers and multi copies(DM-PBFT).We design a reputation evaluation and node scheduling method for DMPBFT.And then we propose an adaptive node scheduling strategy based on the derived threshold values after analyzing the system communication complexity and security.Combining the above research,a node dynamic adjustment mechanism is proposed to freeze or adjust the node operation status according to the system environment.Simulation experiments show that the proposed mechanism can improve efficiency and increase the system’s throughput. 展开更多
关键词 blockchain CONSENSUS PBFT REPUTATION
在线阅读 下载PDF
V-track:Blockchain-enabled IoT system for reliable vehicle location verification
17
作者 Mritunjay Shall Peelam Kunjan Shah Vinay Chamola 《Digital Communications and Networks》 2026年第1期119-133,共15页
Location-Based Services(LBS)have greatly improved efficiency and functionality in various domains,but privacy and security concerns remain due to the centralized nature of many existing systems.To address these issues... Location-Based Services(LBS)have greatly improved efficiency and functionality in various domains,but privacy and security concerns remain due to the centralized nature of many existing systems.To address these issues,this paper introduces the V-Track system,a decentralized architecture using blockchain technology for reliable vehicle location verification.By integrating GPS devices(Spark Fun GPS NEO-M9),IoT-enabled sensors,and a Cosmos blockchain-based ledger(network of interconnected blockchains),V-Track aims to solve centralized LBS problems.Through rigorous simulation experiments,this paper evaluates the performance and security of the V-Track system and demonstrates its potential to provide reliable location verification while preserving user privacy.This paper makes significant contributions by presenting V-Track as a decentralized solution to centralized LBS privacy and security problems,enhancing reliability and trustworthiness through blockchain integration,improving tracking mechanisms with GPS devices and IoT sensors for improved accuracy,and providing a privacy-preserving alternative to centralized LBS through its decentralized design and use of blockchain technology.These advancements hold promise for applications across multiple sectors,including logistics,supply chain management,urban planning,and emerging fields such as autonomous vehicles and augmented reality. 展开更多
关键词 GPS IoT Blockchain Proof-of-location GPS spoofing
在线阅读 下载PDF
A certificateless identity authentication scheme for UAVs via blockchain sharding
18
作者 Zhi-Peng Zhong Xiao Chen +3 位作者 Mu-Hong Huang Hao-Zhe Wang Sheng Cao Xiao-Song Zhang 《Journal of Electronic Science and Technology》 2026年第1期1-13,共13页
With the growing deployment of unmanned aerial vehicles(UAVs)swarms in national defense,military operations,and emergency response,secure and reliable intra-swarm identity authentication has become critical for ensuri... With the growing deployment of unmanned aerial vehicles(UAVs)swarms in national defense,military operations,and emergency response,secure and reliable intra-swarm identity authentication has become critical for ensuring coordinated action and mission reliability.To address the drawbacks of public key infrastructure(PKI)based authentication in UAV swarms,namely,complex certificate management,strong dependence on centralized authorities,and authentication latency.We propose a certificateless identity authentication scheme for UAV swarms built on blockchain sharding.The scheme leverages sharding to execute authentication in parallel across multiple shards,significantly improving efficiency.Each UAV locally generates its public/private key pair and then adopts a registration-based encryption(RBE)mechanism:A registration algorithm binds the device identity to its key on the blockchain,ensuring public verifiability and immutability of identity mapping.On this basis,an authentication algorithm runs in which the initiator produces an authentication signature using a common reference string(CRS),on-chain public-key registration information,and its local private key,and the verifier rapidly validates the authentication message using the on-chain registration data and the identity of the initiator.The experimental results demonstrate that the proposed scheme achieves low-latency and high-throughput identity authentication in large-scale UAV swarm environments,providing a solid technical foundation and broad application prospects for trustworthy UAV swarm identity authentication. 展开更多
关键词 Blockchain CERTIFICATELESS Identity authentication Registration-based encryption UAV swarms
在线阅读 下载PDF
Blockchain and Smart Contracts with Barzilai-Borwein Intelligence for Industrial Cyber-Physical System
19
作者 Gowrishankar Jayaraman Ashok Kumar Munnangi +2 位作者 Ramesh Sekaran Arunkumar Gopu Manikandan Ramachandran 《Computers, Materials & Continua》 2026年第3期916-935,共20页
Industrial Cyber-Physical Systems(ICPSs)play a vital role in modern industries by providing an intellectual foundation for automated operations.With the increasing integration of information-driven processes,ensuring ... Industrial Cyber-Physical Systems(ICPSs)play a vital role in modern industries by providing an intellectual foundation for automated operations.With the increasing integration of information-driven processes,ensuring the security of Industrial Control Production Systems(ICPSs)has become a critical challenge.These systems are highly vulnerable to attacks such as denial-of-service(DoS),eclipse,and Sybil attacks,which can significantly disrupt industrial operations.This work proposes an effective protection strategy using an Artificial Intelligence(AI)-enabled Smart Contract(SC)framework combined with the Heterogeneous Barzilai-Borwein Support Vector(HBBSV)method for industrial-based CPS environments.The approach reduces run time and minimizes the probability of attacks.Initially,secured ICPSs are achieved through a comprehensive exchange of views on production plant strategies for condition monitoring using SC and blockchain(BC)integrated within a BC network.The SC executes the HBBSV strategy to verify the security consensus.The Barzilai-Borwein Support Vectorized algorithm computes abnormal attack occurrence probabilities to ensure that components operate within acceptable production line conditions.When a component remains within these conditions,no security breach occurs.Conversely,if a component does not satisfy the condition boundaries,a security lapse is detected,and those components are isolated.The HBBSV method thus strengthens protection against DoS,eclipse,and Sybil attacks.Experimental results demonstrate that the proposed HBBSV approach significantly improves security by enhancing authentication accuracy while reducing run time and authentication time compared to existing techniques. 展开更多
关键词 Industrial CPS security artificial intelligence blockchain smart contract heterogeneous
在线阅读 下载PDF
Optimizing Resource Allocation in Blockchain Networks Using Neural Genetic Algorithm
20
作者 Malvinder Singh Bali Weiwei Jiang +2 位作者 Saurav Verma Kanwalpreet Kour Ashwini Rao 《Computers, Materials & Continua》 2026年第2期1580-1598,共19页
In recent years,Blockchain Technology has become a paradigm shift,providing Transparent,Secure,and Decentralized platforms for diverse applications,ranging from Cryptocurrency to supply chain management.Nevertheless,t... In recent years,Blockchain Technology has become a paradigm shift,providing Transparent,Secure,and Decentralized platforms for diverse applications,ranging from Cryptocurrency to supply chain management.Nevertheless,the optimization of blockchain networks remains a critical challenge due to persistent issues such as latency,scalability,and energy consumption.This study proposes an innovative approach to Blockchain network optimization,drawing inspiration from principles of biological evolution and natural selection through evolutionary algorithms.Specifically,we explore the application of genetic algorithms,particle swarm optimization,and related evolutionary techniques to enhance the performance of blockchain networks.The proposed methodologies aim to optimize consensus mechanisms,improve transaction throughput,and reduce resource consumption.Through extensive simulations and real-world experiments,our findings demonstrate significant improvements in network efficiency,scalability,and stability.This research offers a thorough analysis of existing optimization techniques,introduces novel strategies,and assesses their efficacy based on empirical outputs. 展开更多
关键词 Blockchain technology energy efficiency environmental impact evolutionary algorithms optimization
在线阅读 下载PDF
上一页 1 2 59 下一页 到第
使用帮助 返回顶部