With the development of sharded blockchains,high cross-shard rates and load imbalance have emerged as major challenges.Account partitioning based on hashing and real-time load faces the issue of high cross-shard rates...With the development of sharded blockchains,high cross-shard rates and load imbalance have emerged as major challenges.Account partitioning based on hashing and real-time load faces the issue of high cross-shard rates.Account partitioning based on historical transaction graphs is effective in reducing cross-shard rates but suffers from load imbalance and limited adaptability to dynamic workloads.Meanwhile,because of the coupling between consensus and execution,a target shard must receive both the partitioned transactions and the partitioned accounts before initiating consensus and execution.However,we observe that transaction partitioning and subsequent consensus do not require actual account data but only need to determine the relative partition order between shards.Therefore,we propose a novel sharded blockchain,called HATLedger,based on Hybrid Account and Transaction partitioning.First,HATLedger proposes building a future transaction graph to detect upcoming hotspot accounts and making more precise account partitioning to reduce transaction cross-shard rates.In the event of an impending overload,the source shard employs simulated partition transactions to specify the partition order across multiple target shards,thereby rapidly partitioning the pending transactions.The target shards can reach consensus on received transactions without waiting for account data.The source shard subsequently sends the account data to the corresponding target shards in the order specified by the previously simulated partition transactions.Based on real transaction history from Ethereum,we conducted extensive sharding scalability experiments.By maintaining low cross-shard rates and a relatively balanced load distribution,HATLedger achieves throughput improvements of 2.2x,1.9x,and 1.8x over SharPer,Shard Scheduler,and TxAllo,respectively,significantly enhancing efficiency and scalability.展开更多
The intelligent transportation systems require secure,low-latency,and reliable communication architectures to enable the real-time vehicular application.This paper proposes an edge-intelligent semantic aggregation(EIS...The intelligent transportation systems require secure,low-latency,and reliable communication architectures to enable the real-time vehicular application.This paper proposes an edge-intelligent semantic aggregation(EISA)framework for 6G unmanned aerial vehicle(UAV)-assisted Internet of vehicles(IoV)networks that integrates task-driven semantic communication,deep reinforcement learning(DRL)-based edge intelligence,and blockchain-based semantic validation across 6G terahertz(THz)links.UAVs in the proposed architecture serve as adaptive edge nodes that receive semantically vital information about the vehicle at any given stage,optimize aggregation and transmission parameters dynamically,and guarantee data integrity through a structured,lightweight consortium blockchain that signs semantically detailed representations rather than raw packets.Simulation results from a hybrid NS-3,MATLAB,and Python environment indicate that the proposed framework can achieve up to 45%reduction in end-to-end latency,an approximately 70%increase in throughput,and semantic efficiency with blockchain verification delays of less than 20 ms(more than 98%).These findings support the effectiveness of the proposed co-design for achieving context-aware,energy-efficient,and reliable communication under heavy-traffic conditions.The proposed framework provides a flexible and scalable foundation for next-generation 6G-enabled automotive networks,with subsequent growth toward federated learning-based collaborative intelligence,digital-twinassisted traffic modeling,and quantum-safe blockchain mechanisms to enhance scalability,intelligence,and long-term security.展开更多
In the blockchain,the consensus mechanism plays a key role in maintaining the security and legitimation of contents recorded in the blocks.Various blockchain consensus mechanisms have been proposed.However,there is no...In the blockchain,the consensus mechanism plays a key role in maintaining the security and legitimation of contents recorded in the blocks.Various blockchain consensus mechanisms have been proposed.However,there is no technical analysis and comparison as a guideline to determine which type of consensus mechanism should be adopted in a specific scenario/application.To this end,this work investigates three mainstream consensus mechanisms in the blockchain,namely,Proof of Work(PoW),Proof of Stake(PoS),and Direct Acyclic Graph(DAG),and identifies their performances in terms of the average time to generate a new block,the confirmation delay,the Transaction Per Second(TPS)and the confirmation failure probability.The results show that the consensus process is affected by both network resource(computation power/coin age,buffer size)and network load conditions.In addition,it shows that PoW and PoS are more sensitive to the change of network resource while DAG is more sensitive to network load conditions.展开更多
In this paper,we deal with questions related to blockchains in complex Internet of Things(IoT)-based ecosystems.Such ecosystems are typically composed of IoT devices,edge devices,cloud computing software services,as w...In this paper,we deal with questions related to blockchains in complex Internet of Things(IoT)-based ecosystems.Such ecosystems are typically composed of IoT devices,edge devices,cloud computing software services,as well as people,who are decision makers in scenarios such as smart cities.Many decisions related to analytics can be based on data coming from IoT sensors,software services,and people.However,they are typically based on different levels of abstraction and granularity.This poses a number of challenges when multiple blockchains are used together with smart contracts.This work proposes to apply our concept of elasticity to smart contracts and thereby enabling analytics in and between multiple blockchains in the context of IoT.We propose a reference architecture for Elastic Smart Contracts and evaluate the approach in a smart city scenario,discussing the benefits in terms of performance and self-adaptability of our solution.展开更多
The blockchain technology has been applied to wide areas.However,the open and transparent properties of the blockchains pose serious challenges to users’privacy.Among all the schemes for the privacy protection,the ze...The blockchain technology has been applied to wide areas.However,the open and transparent properties of the blockchains pose serious challenges to users’privacy.Among all the schemes for the privacy protection,the zero-knowledge proof algorithm conceals most of the private information in a transaction,while participants of the blockchain can validate this transaction without the private information.However,current schemes are only aimed at blockchains with the UTXO model,and only one type of assets circulates on these blockchains.Based on the zero-knowledge proof algorithm,this paper proposes a privacy protection scheme for blockchains that use the account and multi-asset model.We design the transaction structure,anonymous addresses and anonymous asset metadata,and also propose the methods of the asset transfer and double-spending detection.The zk-SNARKs algorithm is used to generate and to verify the zero-knowledge proof.And finally,we conduct the experiments to evaluate our scheme.展开更多
Background:In recent years,blockchain technology has attracted considerable attention.It records cryptographic transactions in a public ledger that is difficult to alter and compromise because of the distributed conse...Background:In recent years,blockchain technology has attracted considerable attention.It records cryptographic transactions in a public ledger that is difficult to alter and compromise because of the distributed consensus.As a result,blockchain is believed to resist fraud and hacking.Results:This work explores the types of fraud and malicious activities that can be prevented by blockchain technology and identifies attacks to which blockchain remains vulnerable.Conclusions:This study recommends appropriate defensive measures and calls for further research into the techniques for fighting malicious activities related to blockchains.展开更多
Blockchain is a viable solution to provide data integrity for the enormous volume of 5G IoT social data, while we need to break through the throughput bottleneck of blockchain. Sharding is a promising technology to so...Blockchain is a viable solution to provide data integrity for the enormous volume of 5G IoT social data, while we need to break through the throughput bottleneck of blockchain. Sharding is a promising technology to solve the problem of low throughput in blockchains. However, cross-shard communication hinders the effective improvement of blockchain throughput. Therefore, it is critical to reasonably allocate transactions to different shards to improve blockchain throughput. Existing research on blockchain sharding mainly focuses on shards formation, configuration, and consensus, while ignoring the negative impact of cross-shard communication on blockchain throughput. Aiming to maximize the throughput of transaction processing, we study how to allocate blockchain transactions to shards in this paper. We propose an Associated Transaction assignment algorithm based on Closest Fit (ATCF). ATCF classifies associated transactions into transaction groups which are then assigned to different shards in the non-ascending order of transaction group sizes periodically. Within each epoch, ATCF tries to select a shard that can handle all the transactions for each transaction group. If there are multiple such shards, ATCF selects the shard with the remaining processing capacity closest to the number of transactions in the transaction group. When no such shard exists, ATCF chooses the shard with the largest remaining processing capacity for the transaction group. The transaction groups that cannot be completely processed within the current epoch will be allocated in the subsequent epochs. We prove that ATCF is a 2-approximation algorithm for the associated transaction assignment problem. Simulation results show that ATCF can effectively improve the blockchain throughput and reduce the number of cross-shard transactions.展开更多
Cloud computing is a collection of distributed storage Network which can provide various services and store the data in the efficient manner.The advantages of cloud computing is its remote access where data can access...Cloud computing is a collection of distributed storage Network which can provide various services and store the data in the efficient manner.The advantages of cloud computing is its remote access where data can accessed in real time using Remote Method Innovation(RMI).The problem of data security in cloud environment is a major concern since the data can be accessed by any time by any user.Due to the lack of providing the efficient security the cloud computing they fail to achieve higher performance in providing the efficient service.To improve the performance in data security,the block chains are used for securing the data in the cloud environment.However,the traditional block chain technique are not suitable to provide efficient security to the cloud data stored in the cloud.In this paper,an efficient user centric block level Attribute Based Encryption(UCBL-ABE)scheme is presented to provide the efficient security of cloud data in cloud environment.The proposed approach performs data transaction by employing the block chain.The proposed system provides efficient privacy with access control to the user access according to the behavior of cloud user using Data Level Access Trust(DLAT).Based on DLAT,the user access has been restricted in the cloud environment.The proposed protocol is implemented in real time using Java programming language and uses IBM cloud.The implementation results justifies that the proposed system can able to provide efficient security to the data present in and cloud and also enhances the cloud performance.展开更多
As the Internet enters the era of big data, massive amounts of data are flooding people’s mobile phones and computers. The emerging self-media industry produces many videos every day, which also exposes many security...As the Internet enters the era of big data, massive amounts of data are flooding people’s mobile phones and computers. The emerging self-media industry produces many videos every day, which also exposes many security issues in digital rights management (DRM). The works of original creators can easily be infringed on public networks, and it is urgent to protect the copyright of digital content. Traditional digital rights management (TDRM) has many problems, including unqualified copyright confirmation, difficulty obtaining evidence, long time-consuming, high price, and high centralization. The combination of blockchain technology and digital rights management is one of the most popular blockchain application scenarios, the characteristics of the blockchain match DRM market demand. This paper proposes a registration oracle scheme for digital rights management based on heterogeneous blockchains, HBRO, which uses review and voting as a means to judge whether a work can be registered for copyright. HBRO is more rigorous than TDRM and DDRM in the copyright confirmation stage, rejecting many unnecessary and unqualified contents. In addition, a secure cross-chain solution is used to ensure the integrity and correctness of data transmission on heterogeneous blockchains.展开更多
Blockchain has been widely used in finance,the Internet of Things(IoT),supply chains,and other scenarios as a revolutionary technology.Consensus protocol plays a vital role in blockchain,which helps all participants t...Blockchain has been widely used in finance,the Internet of Things(IoT),supply chains,and other scenarios as a revolutionary technology.Consensus protocol plays a vital role in blockchain,which helps all participants to maintain the storage state consistently.However,with the improvement of network environment complexity and system scale,blockchain development is limited by the performance,security,and scalability of the consensus protocol.To address this problem,this paper introduces the collaborative filtering mechanism commonly used in the recommendation system into the Practical Byzantine Fault Tolerance(PBFT)and proposes a Byzantine fault-tolerant(BFT)consensus protocol based on collaborative filtering recommendation(CRBFT).Specifically,an improved collaborative filtering recommendation method is designed to use the similarity between a node’s recommendation opinions and those of the recommender as a basis for determining whether to adopt the recommendation opinions.This can amplify the recommendation voice of good nodes,weaken the impact of cunningmalicious nodes on the trust value calculation,andmake the calculated resultsmore accurate.In addition,the nodes are given voting power according to their trust value,and a weight randomelection algorithm is designed and implemented to reduce the risk of attack.The experimental results show that CRBFT can effectively eliminate various malicious nodes and improve the performance of blockchain systems in complex network environments,and the feasibility of CRBFT is also proven by theoretical analysis.展开更多
With the rapid development of the Internet of Things(IoT),there is an increasing need for interac-tion between different networks.In order to improve the level of interconnection,especially the interoper-ability of us...With the rapid development of the Internet of Things(IoT),there is an increasing need for interac-tion between different networks.In order to improve the level of interconnection,especially the interoper-ability of users/devices between different nodes is very important.In the IoT heterogeneous blockchain sce-nario,how to ensure the legitimacy of the chain and how to confirm the identity of cross-chain informa-tion users/devices become the key issues to be solved for blockchain interoperability.In this paper,we pro-pose a secure and trusted interoperability mechanism for IoT based on heterogeneous chains to improve the security of blockchain interoperability.In this mecha-nism,a primary sidechain architecture supporting au-thentication at both ends of the heterogeneous chain is designed.In addition,a distributed gateway archi-tecture is proposed for cross-chain authentication and protocol conversion.The security and performance analysis shows that our scheme is feasible and effec-tive in improving the security of cross-chain opera-tions in IoT.展开更多
Edge blockchains,the blockchains running on edge computing infrastructures,have attracted a lot of attention in recent years.Thanks to data privacy,scalable computing resources,and distributed topology nature of edge ...Edge blockchains,the blockchains running on edge computing infrastructures,have attracted a lot of attention in recent years.Thanks to data privacy,scalable computing resources,and distributed topology nature of edge computing,edge blockchains are considered promising solutions to facilitating future blockchain applications.However,edge blockchains face unique security issues caused by the de⁃ployment of vulnerable edge devices and networks,including supply chain attacks and insecure consensus offloading,which are mostly not well studied in previous literature.This paper is the first survey that discusses the attacks and countermeasures of edge blockchains.We first summarize the three-layer architecture of edge blockchains:blockchain management,blockchain consensus,and blockchain lightweight cli⁃ent.We then describe seven specific attacks on edge blockchain components and discuss the countermeasures.At last,we provide future re⁃search directions on securing edge blockchains.This survey will act as a guideline for researchers and developers to design and implement se⁃cure edge blockchains.展开更多
Consensus protocols are used for the distributed management of large databases in an environment without trust among participants.The choice of a specific protocol depends on the purpose and characteristics of the sys...Consensus protocols are used for the distributed management of large databases in an environment without trust among participants.The choice of a specific protocol depends on the purpose and characteristics of the system itself.The subjects of the paper are consensus protocols in permissioned blockchains.The objective of this paper is to identify functional advantages and disadvantages of observed protocol.The analysis covers a total of six consensus protocols for permissioned blockchains.The following characteristics were compared:security,trust among participants,throughput and scalability.The results show that no protocol shows absolute dominance in all aspects of the comparison.Paxos and Raft are intended for systems in which there is no suspicion of unreliable users,but only the problem of a temporary shutdown.Practical Byzantine Fault Tolerance is intended for systems with a small number of nodes.Federated Byzantine Fault Tolerance shows better scalability and is more suitable for large systems,but can withstand a smaller number of malicious nodes.Proof-of-authority can withstand the largest number of malicious nodes without interfering with the functioning of the system.When choosing a consensus protocol for a blockchain application,one should take into account priority characteristics.展开更多
Despite the growing attention on blockchain,phishing activities have surged,particularly on newly established chains.Acknowledging the challenge of limited intelligence in the early stages of new chains,we propose ADA...Despite the growing attention on blockchain,phishing activities have surged,particularly on newly established chains.Acknowledging the challenge of limited intelligence in the early stages of new chains,we propose ADA-Spearan automatic phishing detection model utilizing adversarial domain adaptive learning which symbolizes the method’s ability to penetrate various heterogeneous blockchains for phishing detection.The model effectively identifies phishing behavior in new chains with limited reliable labels,addressing challenges such as significant distribution drift,low attribute overlap,and limited inter-chain connections.Our approach includes a subgraph construction strategy to align heterogeneous chains,a layered deep learning encoder capturing both temporal and spatial information,and integrated adversarial domain adaptive learning in end-to-end model training.Validation in Ethereum,Bitcoin,and EOSIO environments demonstrates ADA-Spear’s effectiveness,achieving an average F1 score of 77.41 on new chains after knowledge transfer,surpassing existing detection methods.展开更多
As healthcare systems increasingly embrace digitalization,effective management of electronic health records(EHRs)has emerged as a critical priority,particularly in inpatient settings where data sensitivity and realtim...As healthcare systems increasingly embrace digitalization,effective management of electronic health records(EHRs)has emerged as a critical priority,particularly in inpatient settings where data sensitivity and realtime access are paramount.Traditional EHR systems face significant challenges,including unauthorized access,data breaches,and inefficiencies in tracking follow-up appointments,which heighten the risk of misdiagnosis and medication errors.To address these issues,this research proposes a hybrid blockchain-based solution for securely managing EHRs,specifically designed as a framework for tracking inpatient follow-ups.By integrating QR codeenabled data access with a blockchain architecture,this innovative approach enhances privacy protection,data integrity,and auditing capabilities,while facilitating swift and real-time data retrieval.The architecture adheres to Role-Based Access Control(RBAC)principles and utilizes robust encryption techniques,including SHA-256 and AES-256-CBC,to secure sensitive information.A comprehensive threat model outlines trust boundaries and potential adversaries,complemented by a validated data transmission protocol.Experimental results demonstrate that the framework remains reliable in concurrent access scenarios,highlighting its efficiency and responsiveness in real-world applications.This study emphasizes the necessity for hybrid solutions in managing sensitive medical information and advocates for integrating blockchain technology and QR code innovations into contemporary healthcare systems.展开更多
Practical byzantine fault tolerance(PBFT)can reduce energy consumption and achieve high throughput compared with the traditional PoW algorithm,which is more suitable for a strongly consistent consortium blockchain.How...Practical byzantine fault tolerance(PBFT)can reduce energy consumption and achieve high throughput compared with the traditional PoW algorithm,which is more suitable for a strongly consistent consortium blockchain.However,due to the frequent communication among nodes,PBFT cannot realize scalability in large-scale networks.Existing PBFTbased algorithms still ignore performance and security.Therefore,we propose a secure and efficient practical byzantine fault tolerance based on double layers and multi copies(DM-PBFT).We design a reputation evaluation and node scheduling method for DMPBFT.And then we propose an adaptive node scheduling strategy based on the derived threshold values after analyzing the system communication complexity and security.Combining the above research,a node dynamic adjustment mechanism is proposed to freeze or adjust the node operation status according to the system environment.Simulation experiments show that the proposed mechanism can improve efficiency and increase the system’s throughput.展开更多
Location-Based Services(LBS)have greatly improved efficiency and functionality in various domains,but privacy and security concerns remain due to the centralized nature of many existing systems.To address these issues...Location-Based Services(LBS)have greatly improved efficiency and functionality in various domains,but privacy and security concerns remain due to the centralized nature of many existing systems.To address these issues,this paper introduces the V-Track system,a decentralized architecture using blockchain technology for reliable vehicle location verification.By integrating GPS devices(Spark Fun GPS NEO-M9),IoT-enabled sensors,and a Cosmos blockchain-based ledger(network of interconnected blockchains),V-Track aims to solve centralized LBS problems.Through rigorous simulation experiments,this paper evaluates the performance and security of the V-Track system and demonstrates its potential to provide reliable location verification while preserving user privacy.This paper makes significant contributions by presenting V-Track as a decentralized solution to centralized LBS privacy and security problems,enhancing reliability and trustworthiness through blockchain integration,improving tracking mechanisms with GPS devices and IoT sensors for improved accuracy,and providing a privacy-preserving alternative to centralized LBS through its decentralized design and use of blockchain technology.These advancements hold promise for applications across multiple sectors,including logistics,supply chain management,urban planning,and emerging fields such as autonomous vehicles and augmented reality.展开更多
With the growing deployment of unmanned aerial vehicles(UAVs)swarms in national defense,military operations,and emergency response,secure and reliable intra-swarm identity authentication has become critical for ensuri...With the growing deployment of unmanned aerial vehicles(UAVs)swarms in national defense,military operations,and emergency response,secure and reliable intra-swarm identity authentication has become critical for ensuring coordinated action and mission reliability.To address the drawbacks of public key infrastructure(PKI)based authentication in UAV swarms,namely,complex certificate management,strong dependence on centralized authorities,and authentication latency.We propose a certificateless identity authentication scheme for UAV swarms built on blockchain sharding.The scheme leverages sharding to execute authentication in parallel across multiple shards,significantly improving efficiency.Each UAV locally generates its public/private key pair and then adopts a registration-based encryption(RBE)mechanism:A registration algorithm binds the device identity to its key on the blockchain,ensuring public verifiability and immutability of identity mapping.On this basis,an authentication algorithm runs in which the initiator produces an authentication signature using a common reference string(CRS),on-chain public-key registration information,and its local private key,and the verifier rapidly validates the authentication message using the on-chain registration data and the identity of the initiator.The experimental results demonstrate that the proposed scheme achieves low-latency and high-throughput identity authentication in large-scale UAV swarm environments,providing a solid technical foundation and broad application prospects for trustworthy UAV swarm identity authentication.展开更多
Industrial Cyber-Physical Systems(ICPSs)play a vital role in modern industries by providing an intellectual foundation for automated operations.With the increasing integration of information-driven processes,ensuring ...Industrial Cyber-Physical Systems(ICPSs)play a vital role in modern industries by providing an intellectual foundation for automated operations.With the increasing integration of information-driven processes,ensuring the security of Industrial Control Production Systems(ICPSs)has become a critical challenge.These systems are highly vulnerable to attacks such as denial-of-service(DoS),eclipse,and Sybil attacks,which can significantly disrupt industrial operations.This work proposes an effective protection strategy using an Artificial Intelligence(AI)-enabled Smart Contract(SC)framework combined with the Heterogeneous Barzilai-Borwein Support Vector(HBBSV)method for industrial-based CPS environments.The approach reduces run time and minimizes the probability of attacks.Initially,secured ICPSs are achieved through a comprehensive exchange of views on production plant strategies for condition monitoring using SC and blockchain(BC)integrated within a BC network.The SC executes the HBBSV strategy to verify the security consensus.The Barzilai-Borwein Support Vectorized algorithm computes abnormal attack occurrence probabilities to ensure that components operate within acceptable production line conditions.When a component remains within these conditions,no security breach occurs.Conversely,if a component does not satisfy the condition boundaries,a security lapse is detected,and those components are isolated.The HBBSV method thus strengthens protection against DoS,eclipse,and Sybil attacks.Experimental results demonstrate that the proposed HBBSV approach significantly improves security by enhancing authentication accuracy while reducing run time and authentication time compared to existing techniques.展开更多
In recent years,Blockchain Technology has become a paradigm shift,providing Transparent,Secure,and Decentralized platforms for diverse applications,ranging from Cryptocurrency to supply chain management.Nevertheless,t...In recent years,Blockchain Technology has become a paradigm shift,providing Transparent,Secure,and Decentralized platforms for diverse applications,ranging from Cryptocurrency to supply chain management.Nevertheless,the optimization of blockchain networks remains a critical challenge due to persistent issues such as latency,scalability,and energy consumption.This study proposes an innovative approach to Blockchain network optimization,drawing inspiration from principles of biological evolution and natural selection through evolutionary algorithms.Specifically,we explore the application of genetic algorithms,particle swarm optimization,and related evolutionary techniques to enhance the performance of blockchain networks.The proposed methodologies aim to optimize consensus mechanisms,improve transaction throughput,and reduce resource consumption.Through extensive simulations and real-world experiments,our findings demonstrate significant improvements in network efficiency,scalability,and stability.This research offers a thorough analysis of existing optimization techniques,introduces novel strategies,and assesses their efficacy based on empirical outputs.展开更多
基金funded by the National Key Research and Development Program of China(Grant No.2024YFE0209000)the NSFC(Grant No.U23B2019)。
文摘With the development of sharded blockchains,high cross-shard rates and load imbalance have emerged as major challenges.Account partitioning based on hashing and real-time load faces the issue of high cross-shard rates.Account partitioning based on historical transaction graphs is effective in reducing cross-shard rates but suffers from load imbalance and limited adaptability to dynamic workloads.Meanwhile,because of the coupling between consensus and execution,a target shard must receive both the partitioned transactions and the partitioned accounts before initiating consensus and execution.However,we observe that transaction partitioning and subsequent consensus do not require actual account data but only need to determine the relative partition order between shards.Therefore,we propose a novel sharded blockchain,called HATLedger,based on Hybrid Account and Transaction partitioning.First,HATLedger proposes building a future transaction graph to detect upcoming hotspot accounts and making more precise account partitioning to reduce transaction cross-shard rates.In the event of an impending overload,the source shard employs simulated partition transactions to specify the partition order across multiple target shards,thereby rapidly partitioning the pending transactions.The target shards can reach consensus on received transactions without waiting for account data.The source shard subsequently sends the account data to the corresponding target shards in the order specified by the previously simulated partition transactions.Based on real transaction history from Ethereum,we conducted extensive sharding scalability experiments.By maintaining low cross-shard rates and a relatively balanced load distribution,HATLedger achieves throughput improvements of 2.2x,1.9x,and 1.8x over SharPer,Shard Scheduler,and TxAllo,respectively,significantly enhancing efficiency and scalability.
基金supported by the Institute of Information&Communications Technology Planning&Evaluation(IITP)-Information Technology Research Center(ITRC)under Grant No.IITP-2025-RS-2023-00259004the Basic Science Research Program through the National Research Foundation of Korea(NRF)under Grant No.RS-2025-25434261.
文摘The intelligent transportation systems require secure,low-latency,and reliable communication architectures to enable the real-time vehicular application.This paper proposes an edge-intelligent semantic aggregation(EISA)framework for 6G unmanned aerial vehicle(UAV)-assisted Internet of vehicles(IoV)networks that integrates task-driven semantic communication,deep reinforcement learning(DRL)-based edge intelligence,and blockchain-based semantic validation across 6G terahertz(THz)links.UAVs in the proposed architecture serve as adaptive edge nodes that receive semantically vital information about the vehicle at any given stage,optimize aggregation and transmission parameters dynamically,and guarantee data integrity through a structured,lightweight consortium blockchain that signs semantically detailed representations rather than raw packets.Simulation results from a hybrid NS-3,MATLAB,and Python environment indicate that the proposed framework can achieve up to 45%reduction in end-to-end latency,an approximately 70%increase in throughput,and semantic efficiency with blockchain verification delays of less than 20 ms(more than 98%).These findings support the effectiveness of the proposed co-design for achieving context-aware,energy-efficient,and reliable communication under heavy-traffic conditions.The proposed framework provides a flexible and scalable foundation for next-generation 6G-enabled automotive networks,with subsequent growth toward federated learning-based collaborative intelligence,digital-twinassisted traffic modeling,and quantum-safe blockchain mechanisms to enhance scalability,intelligence,and long-term security.
基金the National Natural Science Foundation of China under Grant 61701059,Grant 61941114,and Grant 61831002,in part by the Fundamental Research Funds for the Central Universities of New TeachersProject,in part by the Chongqing Technological Innovation and Application Development Projects under Grant cstc2019jscx-msxm1322,and in part by the Eighteentg Open Foundation of State Key Lab of Integrated Services Networks of Xidian University under Grant ISN20-05.
文摘In the blockchain,the consensus mechanism plays a key role in maintaining the security and legitimation of contents recorded in the blocks.Various blockchain consensus mechanisms have been proposed.However,there is no technical analysis and comparison as a guideline to determine which type of consensus mechanism should be adopted in a specific scenario/application.To this end,this work investigates three mainstream consensus mechanisms in the blockchain,namely,Proof of Work(PoW),Proof of Stake(PoS),and Direct Acyclic Graph(DAG),and identifies their performances in terms of the average time to generate a new block,the confirmation delay,the Transaction Per Second(TPS)and the confirmation failure probability.The results show that the consensus process is affected by both network resource(computation power/coin age,buffer size)and network load conditions.In addition,it shows that PoW and PoS are more sensitive to the change of network resource while DAG is more sensitive to network load conditions.
基金This work was partially supported by FEDER/Ministerio de Ciencia e Innovación-Agencia Estatal de Investigación under project HORATIO(RTI2018-101204-B-C21)by Junta de Andalucía under projects APOLO(US-1264651)and EKIPMENT-PLUS(P18-FR-2895)by the TU Wien Research Cluster Smart CT.
文摘In this paper,we deal with questions related to blockchains in complex Internet of Things(IoT)-based ecosystems.Such ecosystems are typically composed of IoT devices,edge devices,cloud computing software services,as well as people,who are decision makers in scenarios such as smart cities.Many decisions related to analytics can be based on data coming from IoT sensors,software services,and people.However,they are typically based on different levels of abstraction and granularity.This poses a number of challenges when multiple blockchains are used together with smart contracts.This work proposes to apply our concept of elasticity to smart contracts and thereby enabling analytics in and between multiple blockchains in the context of IoT.We propose a reference architecture for Elastic Smart Contracts and evaluate the approach in a smart city scenario,discussing the benefits in terms of performance and self-adaptability of our solution.
基金supported by National Natural Science Foundation of China(61672499,61772502)Key Special Project of Beijing Municipal Science&Technology Commission(Z181100003218018)+1 种基金Natural Science Foundation of Inner Mongolia,Open Foundation of State key Laboratory of Networking and Switching Technology(Beijing University of Posts and Telecommunications,SKLNST-2016-2-09)SV-ICT Blockchain&DAPP Joint Lab
文摘The blockchain technology has been applied to wide areas.However,the open and transparent properties of the blockchains pose serious challenges to users’privacy.Among all the schemes for the privacy protection,the zero-knowledge proof algorithm conceals most of the private information in a transaction,while participants of the blockchain can validate this transaction without the private information.However,current schemes are only aimed at blockchains with the UTXO model,and only one type of assets circulates on these blockchains.Based on the zero-knowledge proof algorithm,this paper proposes a privacy protection scheme for blockchains that use the account and multi-asset model.We design the transaction structure,anonymous addresses and anonymous asset metadata,and also propose the methods of the asset transfer and double-spending detection.The zk-SNARKs algorithm is used to generate and to verify the zero-knowledge proof.And finally,we conduct the experiments to evaluate our scheme.
文摘Background:In recent years,blockchain technology has attracted considerable attention.It records cryptographic transactions in a public ledger that is difficult to alter and compromise because of the distributed consensus.As a result,blockchain is believed to resist fraud and hacking.Results:This work explores the types of fraud and malicious activities that can be prevented by blockchain technology and identifies attacks to which blockchain remains vulnerable.Conclusions:This study recommends appropriate defensive measures and calls for further research into the techniques for fighting malicious activities related to blockchains.
基金supported by Anhui Provincial Key R&D Program of China(202004a05020040),the open project of State Key Laboratory of Complex Electromagnetic Environment Effects on Electronics and Information System in China(CEMEE2018Z0102B)the open fund of Intelligent Interconnected Systems Laboratory of Anhui Province(PA2021AKSK0114),Hefei University of Technology.
文摘Blockchain is a viable solution to provide data integrity for the enormous volume of 5G IoT social data, while we need to break through the throughput bottleneck of blockchain. Sharding is a promising technology to solve the problem of low throughput in blockchains. However, cross-shard communication hinders the effective improvement of blockchain throughput. Therefore, it is critical to reasonably allocate transactions to different shards to improve blockchain throughput. Existing research on blockchain sharding mainly focuses on shards formation, configuration, and consensus, while ignoring the negative impact of cross-shard communication on blockchain throughput. Aiming to maximize the throughput of transaction processing, we study how to allocate blockchain transactions to shards in this paper. We propose an Associated Transaction assignment algorithm based on Closest Fit (ATCF). ATCF classifies associated transactions into transaction groups which are then assigned to different shards in the non-ascending order of transaction group sizes periodically. Within each epoch, ATCF tries to select a shard that can handle all the transactions for each transaction group. If there are multiple such shards, ATCF selects the shard with the remaining processing capacity closest to the number of transactions in the transaction group. When no such shard exists, ATCF chooses the shard with the largest remaining processing capacity for the transaction group. The transaction groups that cannot be completely processed within the current epoch will be allocated in the subsequent epochs. We prove that ATCF is a 2-approximation algorithm for the associated transaction assignment problem. Simulation results show that ATCF can effectively improve the blockchain throughput and reduce the number of cross-shard transactions.
文摘Cloud computing is a collection of distributed storage Network which can provide various services and store the data in the efficient manner.The advantages of cloud computing is its remote access where data can accessed in real time using Remote Method Innovation(RMI).The problem of data security in cloud environment is a major concern since the data can be accessed by any time by any user.Due to the lack of providing the efficient security the cloud computing they fail to achieve higher performance in providing the efficient service.To improve the performance in data security,the block chains are used for securing the data in the cloud environment.However,the traditional block chain technique are not suitable to provide efficient security to the cloud data stored in the cloud.In this paper,an efficient user centric block level Attribute Based Encryption(UCBL-ABE)scheme is presented to provide the efficient security of cloud data in cloud environment.The proposed approach performs data transaction by employing the block chain.The proposed system provides efficient privacy with access control to the user access according to the behavior of cloud user using Data Level Access Trust(DLAT).Based on DLAT,the user access has been restricted in the cloud environment.The proposed protocol is implemented in real time using Java programming language and uses IBM cloud.The implementation results justifies that the proposed system can able to provide efficient security to the data present in and cloud and also enhances the cloud performance.
文摘As the Internet enters the era of big data, massive amounts of data are flooding people’s mobile phones and computers. The emerging self-media industry produces many videos every day, which also exposes many security issues in digital rights management (DRM). The works of original creators can easily be infringed on public networks, and it is urgent to protect the copyright of digital content. Traditional digital rights management (TDRM) has many problems, including unqualified copyright confirmation, difficulty obtaining evidence, long time-consuming, high price, and high centralization. The combination of blockchain technology and digital rights management is one of the most popular blockchain application scenarios, the characteristics of the blockchain match DRM market demand. This paper proposes a registration oracle scheme for digital rights management based on heterogeneous blockchains, HBRO, which uses review and voting as a means to judge whether a work can be registered for copyright. HBRO is more rigorous than TDRM and DDRM in the copyright confirmation stage, rejecting many unnecessary and unqualified contents. In addition, a secure cross-chain solution is used to ensure the integrity and correctness of data transmission on heterogeneous blockchains.
基金supported by the National Natural Science Foundation of China(Grant No.62102449)awarded to W.J.Wang.
文摘Blockchain has been widely used in finance,the Internet of Things(IoT),supply chains,and other scenarios as a revolutionary technology.Consensus protocol plays a vital role in blockchain,which helps all participants to maintain the storage state consistently.However,with the improvement of network environment complexity and system scale,blockchain development is limited by the performance,security,and scalability of the consensus protocol.To address this problem,this paper introduces the collaborative filtering mechanism commonly used in the recommendation system into the Practical Byzantine Fault Tolerance(PBFT)and proposes a Byzantine fault-tolerant(BFT)consensus protocol based on collaborative filtering recommendation(CRBFT).Specifically,an improved collaborative filtering recommendation method is designed to use the similarity between a node’s recommendation opinions and those of the recommender as a basis for determining whether to adopt the recommendation opinions.This can amplify the recommendation voice of good nodes,weaken the impact of cunningmalicious nodes on the trust value calculation,andmake the calculated resultsmore accurate.In addition,the nodes are given voting power according to their trust value,and a weight randomelection algorithm is designed and implemented to reduce the risk of attack.The experimental results show that CRBFT can effectively eliminate various malicious nodes and improve the performance of blockchain systems in complex network environments,and the feasibility of CRBFT is also proven by theoretical analysis.
基金The research work is supported by the Shandong Provincial Key Research and Development Program(2021CXGC010107).
文摘With the rapid development of the Internet of Things(IoT),there is an increasing need for interac-tion between different networks.In order to improve the level of interconnection,especially the interoper-ability of users/devices between different nodes is very important.In the IoT heterogeneous blockchain sce-nario,how to ensure the legitimacy of the chain and how to confirm the identity of cross-chain informa-tion users/devices become the key issues to be solved for blockchain interoperability.In this paper,we pro-pose a secure and trusted interoperability mechanism for IoT based on heterogeneous chains to improve the security of blockchain interoperability.In this mecha-nism,a primary sidechain architecture supporting au-thentication at both ends of the heterogeneous chain is designed.In addition,a distributed gateway archi-tecture is proposed for cross-chain authentication and protocol conversion.The security and performance analysis shows that our scheme is feasible and effec-tive in improving the security of cross-chain opera-tions in IoT.
基金supported by the Research Institute for Artificial Intelligence of Things,The Hong Kong Polytechnic University,HK RGC Collaborative Research Fund(CRF)under Grant No.C2004-21GF.
文摘Edge blockchains,the blockchains running on edge computing infrastructures,have attracted a lot of attention in recent years.Thanks to data privacy,scalable computing resources,and distributed topology nature of edge computing,edge blockchains are considered promising solutions to facilitating future blockchain applications.However,edge blockchains face unique security issues caused by the de⁃ployment of vulnerable edge devices and networks,including supply chain attacks and insecure consensus offloading,which are mostly not well studied in previous literature.This paper is the first survey that discusses the attacks and countermeasures of edge blockchains.We first summarize the three-layer architecture of edge blockchains:blockchain management,blockchain consensus,and blockchain lightweight cli⁃ent.We then describe seven specific attacks on edge blockchain components and discuss the countermeasures.At last,we provide future re⁃search directions on securing edge blockchains.This survey will act as a guideline for researchers and developers to design and implement se⁃cure edge blockchains.
文摘Consensus protocols are used for the distributed management of large databases in an environment without trust among participants.The choice of a specific protocol depends on the purpose and characteristics of the system itself.The subjects of the paper are consensus protocols in permissioned blockchains.The objective of this paper is to identify functional advantages and disadvantages of observed protocol.The analysis covers a total of six consensus protocols for permissioned blockchains.The following characteristics were compared:security,trust among participants,throughput and scalability.The results show that no protocol shows absolute dominance in all aspects of the comparison.Paxos and Raft are intended for systems in which there is no suspicion of unreliable users,but only the problem of a temporary shutdown.Practical Byzantine Fault Tolerance is intended for systems with a small number of nodes.Federated Byzantine Fault Tolerance shows better scalability and is more suitable for large systems,but can withstand a smaller number of malicious nodes.Proof-of-authority can withstand the largest number of malicious nodes without interfering with the functioning of the system.When choosing a consensus protocol for a blockchain application,one should take into account priority characteristics.
基金supported by National Key Research and Development Program of China(Nos.2023YFC3306305,2021YFF0307203,2019QY1300)Foundation Strengthening Program Technical Area Fund(No.2021-JCJQJJ-0908)+4 种基金technological project funding of the State Grid Corporation of China(Contract Number:SG270000YXJS2311060)Youth Innovation Promotion Association CAS(No.2021156)the Strategic Priority Research Program of Chinese Academy of Sciences(No.XDC02040100)National Natural Science Foundation of China(No.61802404)supported by the Program of Key Laboratory of Network Assessment Technology,the Chinese Academy of Sciences,Program of Beijing Key Laboratory of Network Security and Protection Technology.
文摘Despite the growing attention on blockchain,phishing activities have surged,particularly on newly established chains.Acknowledging the challenge of limited intelligence in the early stages of new chains,we propose ADA-Spearan automatic phishing detection model utilizing adversarial domain adaptive learning which symbolizes the method’s ability to penetrate various heterogeneous blockchains for phishing detection.The model effectively identifies phishing behavior in new chains with limited reliable labels,addressing challenges such as significant distribution drift,low attribute overlap,and limited inter-chain connections.Our approach includes a subgraph construction strategy to align heterogeneous chains,a layered deep learning encoder capturing both temporal and spatial information,and integrated adversarial domain adaptive learning in end-to-end model training.Validation in Ethereum,Bitcoin,and EOSIO environments demonstrates ADA-Spear’s effectiveness,achieving an average F1 score of 77.41 on new chains after knowledge transfer,surpassing existing detection methods.
基金funded by Multimedia University,Cyberjaya,Selangor,Malaysia(Grant Number:PostDoc(MMUI/240029)).
文摘As healthcare systems increasingly embrace digitalization,effective management of electronic health records(EHRs)has emerged as a critical priority,particularly in inpatient settings where data sensitivity and realtime access are paramount.Traditional EHR systems face significant challenges,including unauthorized access,data breaches,and inefficiencies in tracking follow-up appointments,which heighten the risk of misdiagnosis and medication errors.To address these issues,this research proposes a hybrid blockchain-based solution for securely managing EHRs,specifically designed as a framework for tracking inpatient follow-ups.By integrating QR codeenabled data access with a blockchain architecture,this innovative approach enhances privacy protection,data integrity,and auditing capabilities,while facilitating swift and real-time data retrieval.The architecture adheres to Role-Based Access Control(RBAC)principles and utilizes robust encryption techniques,including SHA-256 and AES-256-CBC,to secure sensitive information.A comprehensive threat model outlines trust boundaries and potential adversaries,complemented by a validated data transmission protocol.Experimental results demonstrate that the framework remains reliable in concurrent access scenarios,highlighting its efficiency and responsiveness in real-world applications.This study emphasizes the necessity for hybrid solutions in managing sensitive medical information and advocates for integrating blockchain technology and QR code innovations into contemporary healthcare systems.
基金supported in part by Beijing Natural Science Foundation(L244010,251038)National Natural Science Foundation of China(92467203,62372050,62502041)+2 种基金CCF-Huawei Populus Grove Fund(TC202418)Fellowship of China National Postdoctoral Program for Innovative Talents(BX20240045)China Postdoctoral Science Foundation General Program(2025M773481).
文摘Practical byzantine fault tolerance(PBFT)can reduce energy consumption and achieve high throughput compared with the traditional PoW algorithm,which is more suitable for a strongly consistent consortium blockchain.However,due to the frequent communication among nodes,PBFT cannot realize scalability in large-scale networks.Existing PBFTbased algorithms still ignore performance and security.Therefore,we propose a secure and efficient practical byzantine fault tolerance based on double layers and multi copies(DM-PBFT).We design a reputation evaluation and node scheduling method for DMPBFT.And then we propose an adaptive node scheduling strategy based on the derived threshold values after analyzing the system communication complexity and security.Combining the above research,a node dynamic adjustment mechanism is proposed to freeze or adjust the node operation status according to the system environment.Simulation experiments show that the proposed mechanism can improve efficiency and increase the system’s throughput.
文摘Location-Based Services(LBS)have greatly improved efficiency and functionality in various domains,but privacy and security concerns remain due to the centralized nature of many existing systems.To address these issues,this paper introduces the V-Track system,a decentralized architecture using blockchain technology for reliable vehicle location verification.By integrating GPS devices(Spark Fun GPS NEO-M9),IoT-enabled sensors,and a Cosmos blockchain-based ledger(network of interconnected blockchains),V-Track aims to solve centralized LBS problems.Through rigorous simulation experiments,this paper evaluates the performance and security of the V-Track system and demonstrates its potential to provide reliable location verification while preserving user privacy.This paper makes significant contributions by presenting V-Track as a decentralized solution to centralized LBS privacy and security problems,enhancing reliability and trustworthiness through blockchain integration,improving tracking mechanisms with GPS devices and IoT sensors for improved accuracy,and providing a privacy-preserving alternative to centralized LBS through its decentralized design and use of blockchain technology.These advancements hold promise for applications across multiple sectors,including logistics,supply chain management,urban planning,and emerging fields such as autonomous vehicles and augmented reality.
基金supported by the National Natural Science Foundation of China under Grant No.62472075the Innovation Theory and Technology Group Fund of the Southwest China Institute of Electronic Technology under Grant No.2024jsq0207.
文摘With the growing deployment of unmanned aerial vehicles(UAVs)swarms in national defense,military operations,and emergency response,secure and reliable intra-swarm identity authentication has become critical for ensuring coordinated action and mission reliability.To address the drawbacks of public key infrastructure(PKI)based authentication in UAV swarms,namely,complex certificate management,strong dependence on centralized authorities,and authentication latency.We propose a certificateless identity authentication scheme for UAV swarms built on blockchain sharding.The scheme leverages sharding to execute authentication in parallel across multiple shards,significantly improving efficiency.Each UAV locally generates its public/private key pair and then adopts a registration-based encryption(RBE)mechanism:A registration algorithm binds the device identity to its key on the blockchain,ensuring public verifiability and immutability of identity mapping.On this basis,an authentication algorithm runs in which the initiator produces an authentication signature using a common reference string(CRS),on-chain public-key registration information,and its local private key,and the verifier rapidly validates the authentication message using the on-chain registration data and the identity of the initiator.The experimental results demonstrate that the proposed scheme achieves low-latency and high-throughput identity authentication in large-scale UAV swarm environments,providing a solid technical foundation and broad application prospects for trustworthy UAV swarm identity authentication.
文摘Industrial Cyber-Physical Systems(ICPSs)play a vital role in modern industries by providing an intellectual foundation for automated operations.With the increasing integration of information-driven processes,ensuring the security of Industrial Control Production Systems(ICPSs)has become a critical challenge.These systems are highly vulnerable to attacks such as denial-of-service(DoS),eclipse,and Sybil attacks,which can significantly disrupt industrial operations.This work proposes an effective protection strategy using an Artificial Intelligence(AI)-enabled Smart Contract(SC)framework combined with the Heterogeneous Barzilai-Borwein Support Vector(HBBSV)method for industrial-based CPS environments.The approach reduces run time and minimizes the probability of attacks.Initially,secured ICPSs are achieved through a comprehensive exchange of views on production plant strategies for condition monitoring using SC and blockchain(BC)integrated within a BC network.The SC executes the HBBSV strategy to verify the security consensus.The Barzilai-Borwein Support Vectorized algorithm computes abnormal attack occurrence probabilities to ensure that components operate within acceptable production line conditions.When a component remains within these conditions,no security breach occurs.Conversely,if a component does not satisfy the condition boundaries,a security lapse is detected,and those components are isolated.The HBBSV method thus strengthens protection against DoS,eclipse,and Sybil attacks.Experimental results demonstrate that the proposed HBBSV approach significantly improves security by enhancing authentication accuracy while reducing run time and authentication time compared to existing techniques.
文摘In recent years,Blockchain Technology has become a paradigm shift,providing Transparent,Secure,and Decentralized platforms for diverse applications,ranging from Cryptocurrency to supply chain management.Nevertheless,the optimization of blockchain networks remains a critical challenge due to persistent issues such as latency,scalability,and energy consumption.This study proposes an innovative approach to Blockchain network optimization,drawing inspiration from principles of biological evolution and natural selection through evolutionary algorithms.Specifically,we explore the application of genetic algorithms,particle swarm optimization,and related evolutionary techniques to enhance the performance of blockchain networks.The proposed methodologies aim to optimize consensus mechanisms,improve transaction throughput,and reduce resource consumption.Through extensive simulations and real-world experiments,our findings demonstrate significant improvements in network efficiency,scalability,and stability.This research offers a thorough analysis of existing optimization techniques,introduces novel strategies,and assesses their efficacy based on empirical outputs.