首页 > 最新文献

IET Blockchain最新文献

英文 中文
An efficient secure predictive demand forecasting system using Ethereum virtual machine 使用以太坊虚拟机的高效安全需求预测系统
Pub Date : 2024-02-26 DOI: 10.1049/blc2.12068
Himani Saraswat, Mahesh Manchanda, Sanjay Jasola
Predictive demand forecasting plays a pivotal role in optimizing supply chain management, enabling businesses to effectively allocate resources and minimize operational inefficiencies. This paper introduces a novel approach to enhancing demand forecasting processes by leveraging the Ethereum virtual machine within a blockchain framework. The proposed system capitalizes on the inherent security, transparency, and decentralized nature of blockchain technology to create a secure and efficient platform for predictive demand forecasting. The system leverages the Ethereum virtual machine to establish a secure, decentralized, and tamper‐resistant platform for demand prediction while ensuring data integrity and privacy. By utilizing the capabilities of smart contracts and decentralized applications within the Ethereum ecosystem, the proposed system offers an efficient and transparent solution for demand forecasting challenges. The current research focused on Ethereum virtual machine characteristics, features, components, and implementation details. A secured framework for the prediction of demand forecasting systems is proposed. Finally, the authors tried to validate and optimize the gas cost by using distinguished statistics and analysis.
预测性需求预测在优化供应链管理方面发挥着举足轻重的作用,使企业能够有效地分配资源,最大限度地减少运营低效。本文介绍了一种在区块链框架内利用以太坊虚拟机加强需求预测流程的新方法。拟议的系统利用区块链技术固有的安全性、透明度和去中心化特性,为预测性需求预测创建了一个安全高效的平台。该系统利用以太坊虚拟机建立了一个安全、去中心化、防篡改的需求预测平台,同时确保了数据的完整性和隐私性。通过利用以太坊生态系统中智能合约和去中心化应用程序的功能,拟议系统为需求预测挑战提供了一个高效、透明的解决方案。当前的研究重点是以太坊虚拟机的特点、功能、组件和实施细节。作者提出了一个用于预测需求预测系统的安全框架。最后,作者试图通过使用不同的统计和分析方法来验证和优化气体成本。
{"title":"An efficient secure predictive demand forecasting system using Ethereum virtual machine","authors":"Himani Saraswat, Mahesh Manchanda, Sanjay Jasola","doi":"10.1049/blc2.12068","DOIUrl":"https://doi.org/10.1049/blc2.12068","url":null,"abstract":"Predictive demand forecasting plays a pivotal role in optimizing supply chain management, enabling businesses to effectively allocate resources and minimize operational inefficiencies. This paper introduces a novel approach to enhancing demand forecasting processes by leveraging the Ethereum virtual machine within a blockchain framework. The proposed system capitalizes on the inherent security, transparency, and decentralized nature of blockchain technology to create a secure and efficient platform for predictive demand forecasting. The system leverages the Ethereum virtual machine to establish a secure, decentralized, and tamper‐resistant platform for demand prediction while ensuring data integrity and privacy. By utilizing the capabilities of smart contracts and decentralized applications within the Ethereum ecosystem, the proposed system offers an efficient and transparent solution for demand forecasting challenges. The current research focused on Ethereum virtual machine characteristics, features, components, and implementation details. A secured framework for the prediction of demand forecasting systems is proposed. Finally, the authors tried to validate and optimize the gas cost by using distinguished statistics and analysis.","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"28 30","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140430098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ISTVP: Independent single transaction verification protocol for light node using fraud proofs without collaborator ISTVP:使用无合作者欺诈证明的轻节点独立单一交易验证协议
Pub Date : 2024-02-13 DOI: 10.1049/blc2.12066
Minghao Lee, Binhao Ma, Di Han, Dejun Wang, Bo Meng

Most blockchain users run light nodes on mobile devices. Due to limited storage and computation, light nodes cannot perform transaction validation. This shortage makes opportunities for malicious nodes to produce blocks containing invalid transactions, which results in the loss of funds for light nodes. Fraud proofs play a significant role in ensuring transaction security for light nodes. However, existing fraud proof schemes require honest collaborators and the processing of entire blocks. To address these limitations, Independent Single Transaction Verification Protocol for Light node Using Fraud Proofs without Collaborator called ISTVP is proposed that enables light nodes to independently verify transactions and generate fraud proofs without relying on collaborators or processing the entire block. To support ISTVP, SVST is introduced, an efficient block structure for single-transaction verification. SVST not only efficiently indexes historical transaction outputs to improve verification efficiency, but also significantly reduces the storage requirements for verifying transactions to O(h+logn)${mathrm{O}}( {{mathrm{h}} + log {mathrm{n}}} )$. Furthermore, the authors analyze the security of ISTVP and demonstrate that it satisfies both persistence and liveness, while maintaining the level of security of full node.

大多数区块链用户在移动设备上运行轻节点。由于存储和计算能力有限,轻节点无法进行交易验证。这种不足为恶意节点制造包含无效交易的区块提供了机会,从而导致轻节点的资金损失。欺诈证明在确保轻节点交易安全方面发挥着重要作用。然而,现有的欺诈证明方案需要诚实的合作者和对整个区块的处理。为了解决这些局限性,我们提出了名为 ISTVP 的轻节点使用无协作者欺诈证明的独立单笔交易验证协议,它使轻节点能够独立验证交易并生成欺诈证明,而无需依赖协作者或处理整个区块。为支持 ISTVP,引入了 SVST,这是一种用于单笔交易验证的高效区块结构。SVST 不仅能有效地索引历史交易输出以提高验证效率,还能将验证交易的存储要求大幅降低到 .NET。此外,作者还分析了 ISTVP 的安全性,并证明它既能满足持久性和有效性,又能保持全节点的安全等级。
{"title":"ISTVP: Independent single transaction verification protocol for light node using fraud proofs without collaborator","authors":"Minghao Lee,&nbsp;Binhao Ma,&nbsp;Di Han,&nbsp;Dejun Wang,&nbsp;Bo Meng","doi":"10.1049/blc2.12066","DOIUrl":"10.1049/blc2.12066","url":null,"abstract":"<p>Most blockchain users run light nodes on mobile devices. Due to limited storage and computation, light nodes cannot perform transaction validation. This shortage makes opportunities for malicious nodes to produce blocks containing invalid transactions, which results in the loss of funds for light nodes. Fraud proofs play a significant role in ensuring transaction security for light nodes. However, existing fraud proof schemes require honest collaborators and the processing of entire blocks. To address these limitations, Independent Single Transaction Verification Protocol for Light node Using Fraud Proofs without Collaborator called ISTVP is proposed that enables light nodes to independently verify transactions and generate fraud proofs without relying on collaborators or processing the entire block. To support ISTVP, SVST is introduced, an efficient block structure for single-transaction verification. SVST not only efficiently indexes historical transaction outputs to improve verification efficiency, but also significantly reduces the storage requirements for verifying transactions to <span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mi>O</mi>\u0000 <mo>(</mo>\u0000 <mrow>\u0000 <mi>h</mi>\u0000 <mo>+</mo>\u0000 <mi>log</mi>\u0000 <mi>n</mi>\u0000 </mrow>\u0000 <mo>)</mo>\u0000 </mrow>\u0000 <annotation>${mathrm{O}}( {{mathrm{h}} + log {mathrm{n}}} )$</annotation>\u0000 </semantics></math>. Furthermore, the authors analyze the security of ISTVP and demonstrate that it satisfies both persistence and liveness, while maintaining the level of security of full node.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 2","pages":"209-221"},"PeriodicalIF":0.0,"publicationDate":"2024-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12066","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139840002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-hop anonymous payment channel network based on onion routing 基于洋葱路由的多跳匿名支付通道网络
Pub Date : 2024-02-04 DOI: 10.1049/blc2.12065
Caimei Wang, Yudong Ren, Zhize Wu

Payment channel networks (PCNs) are one of the most promising off-chain solutions to the blockchain scalability problem. However, most current payment channel schemes suffer from overly ideal routing assumptions or fail to provide complete path privacy protection. To address the above problems, the multi-hop anonymous and privacy-preserving PCN scheme are analyzed and a multi-hop anonymous PCN based on onion routing is proposed based on it. The scheme removes the routing assumptions of the original scheme, designs an onion routing-based payment channel network, and modifies the way relay nodes construct elliptic curve discrete logarithmic problems to resist wormhole attacks. Finally, the security analysis shows that the scheme in this paper has atomicity, relational anonymity and resistance to wormhole attacks. The latest bilinear pairing anonymous multi-hop payment (EAMHL+) scheme is used to compare communication and computing overhead. The results show that the scheme in this paper requires less communication overhead and is more efficient in terms of computational overhead when the average hop number of the payment channel network is 3 hops and the network diameter is 6 hops.

支付通道网络(PCN)是解决区块链可扩展性问题最有前景的链外解决方案之一。然而,目前大多数支付通道方案都存在过于理想的路由假设,或者无法提供完整的路径隐私保护。针对上述问题,本文分析了多跳匿名和隐私保护 PCN 方案,并在此基础上提出了一种基于洋葱路由的多跳匿名 PCN。该方案取消了原方案的路由假设,设计了基于洋葱路由的支付通道网络,并修改了中继节点构造椭圆曲线离散对数问题的方式,以抵御虫洞攻击。最后,安全分析表明,本文的方案具有原子性、关系匿名性和抗虫洞攻击性。本文使用最新的双线性配对匿名多跳支付(EAMHL+)方案来比较通信和计算开销。结果表明,当支付通道网络的平均跳数为 3 跳、网络直径为 6 跳时,本文的方案需要的通信开销更少,计算开销更高效。
{"title":"Multi-hop anonymous payment channel network based on onion routing","authors":"Caimei Wang,&nbsp;Yudong Ren,&nbsp;Zhize Wu","doi":"10.1049/blc2.12065","DOIUrl":"10.1049/blc2.12065","url":null,"abstract":"<p>Payment channel networks (PCNs) are one of the most promising off-chain solutions to the blockchain scalability problem. However, most current payment channel schemes suffer from overly ideal routing assumptions or fail to provide complete path privacy protection. To address the above problems, the multi-hop anonymous and privacy-preserving PCN scheme are analyzed and a multi-hop anonymous PCN based on onion routing is proposed based on it. The scheme removes the routing assumptions of the original scheme, designs an onion routing-based payment channel network, and modifies the way relay nodes construct elliptic curve discrete logarithmic problems to resist wormhole attacks. Finally, the security analysis shows that the scheme in this paper has atomicity, relational anonymity and resistance to wormhole attacks. The latest bilinear pairing anonymous multi-hop payment (EAMHL+) scheme is used to compare communication and computing overhead. The results show that the scheme in this paper requires less communication overhead and is more efficient in terms of computational overhead when the average hop number of the payment channel network is 3 hops and the network diameter is 6 hops.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 2","pages":"197-208"},"PeriodicalIF":0.0,"publicationDate":"2024-02-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12065","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139807242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey on blockchain deployment for biometric systems 生物识别系统区块链部署调查
Pub Date : 2024-02-01 DOI: 10.1049/blc2.12063
Surbhi Sharma, Rudresh Dwivedi

Blockchain technology has become an emerging area in recent years due to its capacity to improve the security, dependability, and resilience of distributed systems. Research based on this technique has impacted several firms, including banking, healthcare, data processing, remote sensing, and many others. The key characteristics of blockchain technology that make it appealing are data immutability, transparency, privacy, decentralization, and distributed ledgers. However, there is a chance of a privacy breach with sensitive biometric data. The purpose of this investigation is to examine blockchain-based biometric applications research. It begins by determining the myriad ways that biometrics and blockchain may work together, including the storage and protection of biometric templates, identity management, and biometric authentication systems. Different biometric applications with respect to blockchain technology are also identified, along with the types of biometric data taken into account, features and capabilities of blockchain technology exploited, and blockchain technology frameworks employed. Finally, the authors seek to investigate blockchain concepts in the biometric domain by evaluating their pros and cons and summarizing the methods developed on blockchain for diverse biometric applications. Additionally, the applications of blockchain-based biometric systems are highlighted before moving on to open research questions and potential future research areas.

区块链技术能够提高分布式系统的安全性、可靠性和弹性,因此近年来已成为一个新兴领域。基于该技术的研究已经影响了多家公司,包括银行、医疗保健、数据处理、遥感等。区块链技术吸引人的主要特点是数据不变性、透明性、隐私性、去中心化和分布式账本。然而,敏感的生物识别数据存在隐私泄露的可能性。本调查旨在研究基于区块链的生物识别应用研究。它首先确定了生物识别和区块链的无数合作方式,包括生物识别模板的存储和保护、身份管理和生物识别认证系统。此外,还确定了区块链技术的不同生物识别应用,以及所考虑的生物识别数据类型、所利用的区块链技术特征和能力,以及所采用的区块链技术框架。最后,作者试图研究生物识别领域的区块链概念,评估其利弊,并总结区块链在各种生物识别应用中开发的方法。此外,作者还重点介绍了基于区块链的生物识别系统的应用,然后探讨了开放式研究问题和潜在的未来研究领域。
{"title":"A survey on blockchain deployment for biometric systems","authors":"Surbhi Sharma,&nbsp;Rudresh Dwivedi","doi":"10.1049/blc2.12063","DOIUrl":"10.1049/blc2.12063","url":null,"abstract":"<p>Blockchain technology has become an emerging area in recent years due to its capacity to improve the security, dependability, and resilience of distributed systems. Research based on this technique has impacted several firms, including banking, healthcare, data processing, remote sensing, and many others. The key characteristics of blockchain technology that make it appealing are data immutability, transparency, privacy, decentralization, and distributed ledgers. However, there is a chance of a privacy breach with sensitive biometric data. The purpose of this investigation is to examine blockchain-based biometric applications research. It begins by determining the myriad ways that biometrics and blockchain may work together, including the storage and protection of biometric templates, identity management, and biometric authentication systems. Different biometric applications with respect to blockchain technology are also identified, along with the types of biometric data taken into account, features and capabilities of blockchain technology exploited, and blockchain technology frameworks employed. Finally, the authors seek to investigate blockchain concepts in the biometric domain by evaluating their pros and cons and summarizing the methods developed on blockchain for diverse biometric applications. Additionally, the applications of blockchain-based biometric systems are highlighted before moving on to open research questions and potential future research areas.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 2","pages":"124-151"},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12063","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139877877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The application of distributed autonomous organization governance mechanisms to civic medical data management 分布式自治组织治理机制在公民医疗数据管理中的应用
Pub Date : 2024-01-26 DOI: 10.1049/blc2.12062
James Cunningham, Nigel Davies, Sarah Devaney, Søren Holm, Mike Harding, Victoria Neumann, John Ainsworth
Decentralized autonomous organizations (DAOs) have emerged as a novel governance mechanism that operates through distributed ledgers and smart contracts, enabling members to direct an organization's actions. The widespread adoption of DAOs has occurred in response to their utility in managing emergent semi‐structured projects and has led to the development of various innovative governance mechanisms. The mechanisms employed by DAOs has the potential to be generalized beyond their core financial domain to a wide range of use cases. In the medical field the use of blockchain and DAOs can provide secure and transparent access to medical data, while ensuring patient privacy. Civic access to medical data is a growing area of interest, where individuals have control over their own medical data and can share it with healthcare providers, researchers, and other stakeholders. DAOs can facilitate this civic access, enabling individuals to share their data securely and selectively with authorized parties for research and other purposes. This paper explores the use of DAOs to medical data sharing, with a focus on ownership, governance, and transaction models. An application framework and API that enables the deployment of DAO‐like organizations is derived and this approach is applied to the patient‐centric management of medical data.
去中心化自治组织(DAOs)是一种新型治理机制,通过分布式账本和智能合约运作,使成员能够指导组织的行动。由于 DAOs 在管理新兴的半结构化项目方面非常有用,因此得到了广泛采用,并促成了各种创新治理机制的发展。DAO 采用的机制有可能从其核心的金融领域推广到广泛的使用案例中。在医疗领域,使用区块链和 DAO 可以安全、透明地访问医疗数据,同时确保患者隐私。公民访问医疗数据是一个日益受到关注的领域,个人可以控制自己的医疗数据,并与医疗保健提供者、研究人员和其他利益相关者共享。DAO 可以促进这种公民访问,使个人能够安全、有选择性地与授权方共享数据,用于研究和其他目的。本文探讨了如何将 DAOs 用于医疗数据共享,重点关注所有权、治理和交易模式。本文提出了一种应用框架和应用程序接口,可用于部署类似 DAO 的组织,并将这种方法应用于以患者为中心的医疗数据管理。
{"title":"The application of distributed autonomous organization governance mechanisms to civic medical data management","authors":"James Cunningham, Nigel Davies, Sarah Devaney, Søren Holm, Mike Harding, Victoria Neumann, John Ainsworth","doi":"10.1049/blc2.12062","DOIUrl":"https://doi.org/10.1049/blc2.12062","url":null,"abstract":"Decentralized autonomous organizations (DAOs) have emerged as a novel governance mechanism that operates through distributed ledgers and smart contracts, enabling members to direct an organization's actions. The widespread adoption of DAOs has occurred in response to their utility in managing emergent semi‐structured projects and has led to the development of various innovative governance mechanisms. The mechanisms employed by DAOs has the potential to be generalized beyond their core financial domain to a wide range of use cases. In the medical field the use of blockchain and DAOs can provide secure and transparent access to medical data, while ensuring patient privacy. Civic access to medical data is a growing area of interest, where individuals have control over their own medical data and can share it with healthcare providers, researchers, and other stakeholders. DAOs can facilitate this civic access, enabling individuals to share their data securely and selectively with authorized parties for research and other purposes. This paper explores the use of DAOs to medical data sharing, with a focus on ownership, governance, and transaction models. An application framework and API that enables the deployment of DAO‐like organizations is derived and this approach is applied to the patient‐centric management of medical data.","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"54 11","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139594066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A bitcoin service community classification method based on Random Forest and improved KNN algorithm 基于随机森林和改进的 KNN 算法的比特币服务社区分类方法
Pub Date : 2024-01-26 DOI: 10.1049/blc2.12064
Muyun Gao, Shenwen Lin, Xin Tian, Xi He, Ketai He, Shifeng Chen

There are service communities with different functions in the Bitcoin transactions system. Identifying community categories helps to further understand the Bitcoin transactions system and facilitates targeted regulation of anonymized Bitcoin transactions. To this end, a Bitcoin service community classification method based on Random Forest and improved K-Nearest Neighbor (KNN) algorithm is proposed. First, the transaction characteristics of different types of communities are analyzed and summarized, and the corresponding transaction features are extracted from the address and entity levels; then multiple classification algorithms are compared, the optimal model to filter the effective features is selected, and the feature vector of entity addresses is constructed. Finally, a classification model is constructed based on Random Forest and improved KNN algorithm to classify the entities. By constructing different classification models for experimental comparison, the accuracy and stability advantages of the proposed method for classification in service community classification research are verified.

比特币交易系统中有不同功能的服务社区。识别社区类别有助于进一步了解比特币交易系统,并便于对匿名比特币交易进行有针对性的监管。为此,本文提出了一种基于随机森林和改进的K-近邻(KNN)算法的比特币服务社区分类方法。首先,分析总结不同类型社区的交易特征,从地址和实体层面提取相应的交易特征;然后,比较多种分类算法,筛选出过滤有效特征的最优模型,构建实体地址的特征向量。最后,基于随机森林和改进的 KNN 算法构建分类模型,对实体进行分类。通过构建不同的分类模型进行实验对比,验证了所提方法在服务社区分类研究中的准确性和稳定性优势。
{"title":"A bitcoin service community classification method based on Random Forest and improved KNN algorithm","authors":"Muyun Gao,&nbsp;Shenwen Lin,&nbsp;Xin Tian,&nbsp;Xi He,&nbsp;Ketai He,&nbsp;Shifeng Chen","doi":"10.1049/blc2.12064","DOIUrl":"10.1049/blc2.12064","url":null,"abstract":"<p>There are service communities with different functions in the Bitcoin transactions system. Identifying community categories helps to further understand the Bitcoin transactions system and facilitates targeted regulation of anonymized Bitcoin transactions. To this end, a Bitcoin service community classification method based on Random Forest and improved K-Nearest Neighbor (KNN) algorithm is proposed. First, the transaction characteristics of different types of communities are analyzed and summarized, and the corresponding transaction features are extracted from the address and entity levels; then multiple classification algorithms are compared, the optimal model to filter the effective features is selected, and the feature vector of entity addresses is constructed. Finally, a classification model is constructed based on Random Forest and improved KNN algorithm to classify the entities. By constructing different classification models for experimental comparison, the accuracy and stability advantages of the proposed method for classification in service community classification research are verified.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 3","pages":"276-286"},"PeriodicalIF":0.0,"publicationDate":"2024-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12064","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140493426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Folding at home: Artificial intelligence and crypto symbiosis for the science 在家折叠人工智能与加密科学共生
Pub Date : 2024-01-24 DOI: 10.1049/blc2.12060
Ivan Tuma, Edouard Lansiaux

Folding at Home community gathers pecuniary crypto interest to an altruist cause (medical drugs research participation). There are many possibilities of ‘teams’ for folding, some of which allow compensation in cryptomonies. The authors will therefore study the three major communities in order to compare them, in a cost-benefit study logic. A cost-benefit analysis was performed between CURECOIN, BANANO, DOGECOIN folding, DOGECOIN mining and their communities on social platforms based on several outcomes: ‘Points Per Day (PPD)’, ‘Whattomine Mh/s Equivalent’, ‘Graphics Processing Units (GPU) Thermal Design Power/Typical Board Power Watts’, ‘Coins per 1,000,000 PPD’, ‘Coins per Day’, ‘Cost Per Coin’, ‘Cost Per Day’, ‘kWh Used Per Day’. Actually, BANANO, thanks to a large community and bots, has the highest PPD production and the lowest energetic cost on Central Processing Unit per week. On GPUs, DOGECOIN folding has the lowest weekly cost. However, the DOGECOIN community cannot produce as many PPD as the Banano team. CURECOIN offers a good compromise between the environmental point of view and the profitability one. To ensure fairness, the choice of the crypto and the way to earn it that has to be solved should be a pure public good, that is, perfectly non-rival in consumption and non-excludable. Indeed, the primary goal of those three communities is to allow scientific progress (thanks to Folding at Home) before allowing a return on investment.

Folding at Home 社区为利他主义事业(参与医疗药物研究)收集金钱上的密码利益。折叠的 "团队 "有多种可能性,其中一些允许在加密货币中进行补偿。因此,作者将对三大社区进行研究,以便按照成本效益研究逻辑对它们进行比较。根据以下几种结果,对 CURECOIN、BANANO、DOGECOIN 折叠、DOGECOIN 挖矿和它们在社交平台上的社区进行了成本效益分析:"每天点数(PPD)"、"Whattomine Mh/s Equivalent"、"图形处理器(GPU)热设计功率/典型板功率瓦特"、"每 1,000,000 PPD 的硬币数"、"每天硬币数"、"每个硬币的成本"、"每天成本"、"每天使用的千瓦时"。事实上,得益于庞大的社区和机器人,BANANO 的 PPD 产量最高,每周中央处理器的能耗成本最低。在 GPU 上,DOGECOIN 折合的每周成本最低。但是,DOGECOIN 社区无法像 Banano 团队一样生产出那么多的 PPD。CURECOIN 在环境观点和盈利观点之间提供了一个很好的折中方案。为了确保公平,加密货币的选择以及必须解决的盈利方式应该是一种纯粹的公共产品,即完全无竞争性消费和无排他性消费。事实上,这三个社区的首要目标是在允许投资回报之前,允许科学进步(感谢《在家折叠》)。
{"title":"Folding at home: Artificial intelligence and crypto symbiosis for the science","authors":"Ivan Tuma,&nbsp;Edouard Lansiaux","doi":"10.1049/blc2.12060","DOIUrl":"10.1049/blc2.12060","url":null,"abstract":"<p>Folding at Home community gathers pecuniary crypto interest to an altruist cause (medical drugs research participation). There are many possibilities of ‘teams’ for folding, some of which allow compensation in cryptomonies. The authors will therefore study the three major communities in order to compare them, in a cost-benefit study logic. A cost-benefit analysis was performed between CURECOIN, BANANO, DOGECOIN folding, DOGECOIN mining and their communities on social platforms based on several outcomes: ‘Points Per Day (PPD)’, ‘Whattomine Mh/s Equivalent’, ‘Graphics Processing Units (GPU) Thermal Design Power/Typical Board Power Watts’, ‘Coins per 1,000,000 PPD’, ‘Coins per Day’, ‘Cost Per Coin’, ‘Cost Per Day’, ‘kWh Used Per Day’. Actually, BANANO, thanks to a large community and bots, has the highest PPD production and the lowest energetic cost on Central Processing Unit per week. On GPUs, DOGECOIN folding has the lowest weekly cost. However, the DOGECOIN community cannot produce as many PPD as the Banano team. CURECOIN offers a good compromise between the environmental point of view and the profitability one. To ensure fairness, the choice of the crypto and the way to earn it that has to be solved should be a pure public good, that is, perfectly non-rival in consumption and non-excludable. Indeed, the primary goal of those three communities is to allow scientific progress (thanks to Folding at Home) before allowing a return on investment.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 3","pages":"263-275"},"PeriodicalIF":0.0,"publicationDate":"2024-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12060","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139600539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic monitoring and early warning method for power grid infrastructure investment progress using building information model and blockchain 利用建筑信息模型和区块链的电网基础设施投资进度自动监测和预警方法
Pub Date : 2024-01-17 DOI: 10.1049/blc2.12061
Jing Lu, Weidong Yu, Shihong Wu
In order to improve the precise control level of power grid infrastructure investment, this paper proposes a monitoring and early warning method of power grid infrastructure investment progress based on building information model and blockchain. By capturing the project construction progress images, the features of the power grid infrastructure are extracted automatically. Combined with the technical characteristics of distributed, tamper‐proof, and traceable blockchain, statistical indicators are generated automatically, monitoring and early warning of the investment progress execution deviation are triggered by the rules running on the smart contracts. The case study results show that the mean absolute error of the target image recognition method based on the image features is 4.32%, and the prediction accuracy of the incoming line is better than that of the engineering civil and substation. The early warning model of investment statistics based on smart contracts can automatically monitor the investment progress and generate early warnings, which provides a basis for the dynamic adjustment of the investment plan, and effectively improves the refined management level of power grid infrastructure investment projects.
为了提高电网基建投资的精准管控水平,本文提出了一种基于建筑信息模型和区块链的电网基建投资进度监测预警方法。通过抓取项目建设进度图像,自动提取电网基建特征。结合区块链分布式、防篡改、可追溯的技术特点,自动生成统计指标,通过智能合约上运行的规则触发对投资进度执行偏差的监测和预警。案例研究结果表明,基于图像特征的目标图像识别方法的平均绝对误差为4.32%,进线预测精度优于工程土建和变电站。基于智能合约的投资统计预警模型能够自动监测投资进度并生成预警,为投资计划的动态调整提供依据,有效提高了电网基建投资项目的精细化管理水平。
{"title":"Automatic monitoring and early warning method for power grid infrastructure investment progress using building information model and blockchain","authors":"Jing Lu, Weidong Yu, Shihong Wu","doi":"10.1049/blc2.12061","DOIUrl":"https://doi.org/10.1049/blc2.12061","url":null,"abstract":"In order to improve the precise control level of power grid infrastructure investment, this paper proposes a monitoring and early warning method of power grid infrastructure investment progress based on building information model and blockchain. By capturing the project construction progress images, the features of the power grid infrastructure are extracted automatically. Combined with the technical characteristics of distributed, tamper‐proof, and traceable blockchain, statistical indicators are generated automatically, monitoring and early warning of the investment progress execution deviation are triggered by the rules running on the smart contracts. The case study results show that the mean absolute error of the target image recognition method based on the image features is 4.32%, and the prediction accuracy of the incoming line is better than that of the engineering civil and substation. The early warning model of investment statistics based on smart contracts can automatically monitor the investment progress and generate early warnings, which provides a basis for the dynamic adjustment of the investment plan, and effectively improves the refined management level of power grid infrastructure investment projects.","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":" 1094","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139617502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ponzi scheme detection in smart contracts using the integration of deep learning and formal verification 利用深度学习与形式验证的结合检测智能合约中的庞氏骗局
Pub Date : 2023-12-27 DOI: 10.1049/blc2.12056
Shibao Chen, Fei Li

Blockchain smart contracts are codes that can execute and enforce rules for blockchain digital transactions. However, smart contracts may contain numerous subtle vulnerabilities, among which Ponzi vulnerabilities are notable. Existing Ponzi scheme contract detection approaches often rely on machine learning models trained on manually extracted features to achieve satisfactory classification results. Nonetheless, the code of a smart contract potentially harbours elusive semantics and characteristics, which compromises the precision and accuracy of vulnerability detection. Therefore, this paper proposes a method of converting operation codes into sequences to process data to avoid losing unnecessary important information, and uses a one-dimensional convolutional neural network combined with formal verification. This method is named PZ-C1DZ3(Ponzi-Conv1D-Z3) and is used for Ponzi scheme detection. Four types of machine learning models, namely Conv1D, Conv1D-LSTM, Conv1D-MLP, and Conv1D-transformer, are employed for improvement and comparative validation experiments. Additionally, formal verification tool Z3 solver is utilized to conduct formal security verification on the final model, ensuring its safety. Experimental results demonstrate that the improved Conv1D model outperforms other existing models in terms of detection efficiency and accuracy while also meeting the requirements of formal security verification.

区块链智能合约是可以执行和实施区块链数字交易规则的代码。然而,智能合约可能包含许多微妙的漏洞,其中庞氏骗局漏洞尤为突出。现有的庞氏骗局合约检测方法通常依赖于人工提取特征训练的机器学习模型,以获得令人满意的分类结果。然而,智能合约的代码可能隐藏着难以捉摸的语义和特征,这就影响了漏洞检测的精度和准确性。因此,本文提出了一种将操作码转换成序列来处理数据的方法,以避免丢失不必要的重要信息,并使用一维卷积神经网络结合形式验证。该方法被命名为 PZ-C1DZ3(Ponzi-Conv1D-Z3),用于庞氏骗局检测。在改进和比较验证实验中,采用了四种机器学习模型,即 Conv1D、Conv1D-LSTM、Conv1D-MLP 和 Conv1D-transformer。此外,还利用形式验证工具 Z3 求解器对最终模型进行形式安全验证,确保其安全性。实验结果表明,改进后的 Conv1D 模型在检测效率和准确性方面优于其他现有模型,同时也满足形式安全验证的要求。
{"title":"Ponzi scheme detection in smart contracts using the integration of deep learning and formal verification","authors":"Shibao Chen,&nbsp;Fei Li","doi":"10.1049/blc2.12056","DOIUrl":"https://doi.org/10.1049/blc2.12056","url":null,"abstract":"<p>Blockchain smart contracts are codes that can execute and enforce rules for blockchain digital transactions. However, smart contracts may contain numerous subtle vulnerabilities, among which Ponzi vulnerabilities are notable. Existing Ponzi scheme contract detection approaches often rely on machine learning models trained on manually extracted features to achieve satisfactory classification results. Nonetheless, the code of a smart contract potentially harbours elusive semantics and characteristics, which compromises the precision and accuracy of vulnerability detection. Therefore, this paper proposes a method of converting operation codes into sequences to process data to avoid losing unnecessary important information, and uses a one-dimensional convolutional neural network combined with formal verification. This method is named PZ-C1DZ3(Ponzi-Conv1D-Z3) and is used for Ponzi scheme detection. Four types of machine learning models, namely Conv1D, Conv1D-LSTM, Conv1D-MLP, and Conv1D-transformer, are employed for improvement and comparative validation experiments. Additionally, formal verification tool Z3 solver is utilized to conduct formal security verification on the final model, ensuring its safety. Experimental results demonstrate that the improved Conv1D model outperforms other existing models in terms of detection efficiency and accuracy while also meeting the requirements of formal security verification.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 2","pages":"185-196"},"PeriodicalIF":0.0,"publicationDate":"2023-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12056","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141251517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
QIoTChain: Quantum IoT-blockchain fusion for advanced data protection in Industry 4.0 QIoTChain:量子物联网-区块链融合,为工业 4.0 提供先进的数据保护
Pub Date : 2023-11-17 DOI: 10.1049/blc2.12059
Aditya Kumar Sharma, Mritunjay Shall Peelam, Brijesh Kumar Chauasia, Vinay Chamola

The modern world has its foundation built on data. Data is generated all the time, and many aspects of the society and economy are built upon it. In today's world, data is employed in better decision-making, innovation, and improving the efficiency of systems. It becomes essential to protect it from being tampered with or misused. Encryptions based on cryptographic systems are used in mainstream data protection these days. There have been newer iterations of mechanisms based on new techniques using blockchain and the zero trust model and even systems that employ fog computing along with content delivery networks. The advent of computation through quantum technologies also helped in developing data security with post-quantum mechanisms. The critical conditions for the working of these mechanisms hinder their adoption primarily. This also leads current systems to lack one or more of these technologies. Thus, the importance of a unified system that can employ quantum technologies effectively becomes prominent and requires a definitive investigation. In this article, a Quantum-IoT-based data protection scheme that can be of value to Industry 4.0 is analyzed. Light is also shed on innovations in quantum computing that can help solve not just current problems but also the future.

现代世界的基础是数据。数据无时无刻不在产生,社会和经济的许多方面都建立在数据之上。在当今世界,数据被用于更好的决策、创新和提高系统效率。保护数据不被篡改或滥用变得至关重要。如今,基于加密系统的加密技术已成为数据保护的主流。基于使用区块链和零信任模型的新技术,甚至是采用雾计算和内容交付网络的系统,已经有了更新的迭代机制。量子技术计算的出现也有助于利用后量子机制发展数据安全。这些机制工作的关键条件主要阻碍了它们的采用。这也导致当前的系统缺乏其中一种或多种技术。因此,建立一个能有效利用量子技术的统一系统就变得尤为重要,需要进行明确的研究。本文分析了一种基于量子物联网的数据保护方案,该方案可为工业 4.0 带来价值。此外,本文还介绍了量子计算的创新,这些创新不仅有助于解决当前的问题,还有助于解决未来的问题。
{"title":"QIoTChain: Quantum IoT-blockchain fusion for advanced data protection in Industry 4.0","authors":"Aditya Kumar Sharma,&nbsp;Mritunjay Shall Peelam,&nbsp;Brijesh Kumar Chauasia,&nbsp;Vinay Chamola","doi":"10.1049/blc2.12059","DOIUrl":"https://doi.org/10.1049/blc2.12059","url":null,"abstract":"<p>The modern world has its foundation built on data. Data is generated all the time, and many aspects of the society and economy are built upon it. In today's world, data is employed in better decision-making, innovation, and improving the efficiency of systems. It becomes essential to protect it from being tampered with or misused. Encryptions based on cryptographic systems are used in mainstream data protection these days. There have been newer iterations of mechanisms based on new techniques using blockchain and the zero trust model and even systems that employ fog computing along with content delivery networks. The advent of computation through quantum technologies also helped in developing data security with post-quantum mechanisms. The critical conditions for the working of these mechanisms hinder their adoption primarily. This also leads current systems to lack one or more of these technologies. Thus, the importance of a unified system that can employ quantum technologies effectively becomes prominent and requires a definitive investigation. In this article, a Quantum-IoT-based data protection scheme that can be of value to Industry 4.0 is analyzed. Light is also shed on innovations in quantum computing that can help solve not just current problems but also the future.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 3","pages":"252-262"},"PeriodicalIF":0.0,"publicationDate":"2023-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12059","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142160203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IET Blockchain
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1