首页 > 最新文献

IET Blockchain最新文献

英文 中文
ChainKeeper: A cross-chain scheme for governing the chain by chain ChainKeeper:一种跨链方案,用于逐链管理
Pub Date : 2023-09-08 DOI: 10.1049/blc2.12047
Yuwei Xu, Ran He, Shengjiang Dai, Yujian Zhang

With the rapid application of consortium chains, supervising these systems has become a challenge for governments. The centralized model fails to deliver supervision services that are both open and transparent. Given the benefits of decentralization, non-tampering, and traceability offered by blockchains, researchers propose the concept of ‘governing the chain by chain’, which involves supervising multiple consortium chains by constructing a blockchain. Under this idea, the cross-chain scheme becomes the key to achieving excellent supervision. Existing studies have shortcomings and cannot meet the requirements of universality, security, and efficiency in cross-chain supervision scenarios. Aiming at the challenges, we propose ChainKeeper, a cross-chain scheme for governing the chain by chain. The innovation of our work lies in three points. First, a modular node proxy program is designed to adapt to various implementations of consortium chains. Second, a verifiable node random selection method is put forward to improve the throughput of cross-chain data transmission. Finally, a verifiable identity threshold signature method is proposed to prevent the cheating behavior of malicious nodes. To verify the universality of ChainKeeper, we built a prototype system on three types of consortium chains. The experimental results show that ChainKeeper can achieve high throughput, outperforming two state-of-the-art cross-chain schemes.

随着联合链的快速应用,监管这些系统已成为政府面临的挑战。集中式监管模式无法提供公开透明的监管服务。考虑到区块链提供的去中心化、不可篡改和可追溯性的好处,研究人员提出了“逐链治理”的概念,即通过构建区块链来监督多个财团链。在这种思想下,跨链方案成为实现卓越监管的关键。现有的研究存在不足,不能满足跨链监管场景下的普适性、安全性和高效性的要求。针对这些挑战,我们提出了一种跨链方案ChainKeeper,用于逐链管理。我们工作的创新在于三点。首先,设计了模块化节点代理程序,以适应财团链的各种实现。其次,提出了一种可验证的节点随机选择方法,提高了跨链数据传输的吞吐量。最后,提出了一种可验证的身份阈值签名方法,以防止恶意节点的欺骗行为。为了验证ChainKeeper的通用性,我们在三种类型的联盟链上构建了原型系统。实验结果表明,ChainKeeper可以实现高吞吐量,优于两种最先进的交叉链方案。
{"title":"ChainKeeper: A cross-chain scheme for governing the chain by chain","authors":"Yuwei Xu,&nbsp;Ran He,&nbsp;Shengjiang Dai,&nbsp;Yujian Zhang","doi":"10.1049/blc2.12047","DOIUrl":"10.1049/blc2.12047","url":null,"abstract":"<p>With the rapid application of consortium chains, supervising these systems has become a challenge for governments. The centralized model fails to deliver supervision services that are both open and transparent. Given the benefits of decentralization, non-tampering, and traceability offered by blockchains, researchers propose the concept of ‘governing the chain by chain’, which involves supervising multiple consortium chains by constructing a blockchain. Under this idea, the cross-chain scheme becomes the key to achieving excellent supervision. Existing studies have shortcomings and cannot meet the requirements of universality, security, and efficiency in cross-chain supervision scenarios. Aiming at the challenges, we propose ChainKeeper, a cross-chain scheme for governing the chain by chain. The innovation of our work lies in three points. First, a modular node proxy program is designed to adapt to various implementations of consortium chains. Second, a verifiable node random selection method is put forward to improve the throughput of cross-chain data transmission. Finally, a verifiable identity threshold signature method is proposed to prevent the cheating behavior of malicious nodes. To verify the universality of ChainKeeper, we built a prototype system on three types of consortium chains. The experimental results show that ChainKeeper can achieve high throughput, outperforming two state-of-the-art cross-chain schemes.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"3 4","pages":"249-264"},"PeriodicalIF":0.0,"publicationDate":"2023-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12047","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77016801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SCGformer: Smart contract vulnerability detection based on control flow graph and transformer SCGformer:基于控制流图和变压器的智能合约漏洞检测
Pub Date : 2023-09-06 DOI: 10.1049/blc2.12046
KeXin Gong, Xiangmei Song, Na Wang, Chunyang Wang, Huijuan Zhu

The security of smart contract has always been one of the significant problems in blockchain. As shown in previous studies, vulnerabilities in smart contracts can lead to unpredictable losses. With the rapid growth of the number of smart contracts, more and more data driven detection technologies based on machine learning have been proposed. However, some state-of-the-art approaches mainly rely on the source code of smart contract. These methods are limited by the openness of the source code and the version of the programming language. To address this problem, we propose a novel vulnerability detection method based on transformer by constructing the control flow graph (CFG) of smart contracts operation codes (opcodes), which shields the difference of various versions of program language. Extensive experiments are conducted to evaluate the effectiveness of the proposed method on the authors' own collected dataset. The experimental results show that the proposed method achieves 94.36% accuracy in vulnerability detection, which performs better than other state-of-the-art methods.

智能合约的安全性一直是区块链的重要问题之一。正如之前的研究表明,智能合约中的漏洞可能导致不可预测的损失。随着智能合约数量的快速增长,越来越多基于机器学习的数据驱动检测技术被提出。然而,一些最先进的方法主要依赖于智能合约的源代码。这些方法受到源代码的开放性和编程语言版本的限制。针对这一问题,本文提出了一种基于变压器的漏洞检测方法,通过构建智能合约操作码(opcodes)的控制流图(CFG)来屏蔽不同版本程序语言的差异。在作者自己收集的数据集上进行了大量的实验来评估所提出方法的有效性。实验结果表明,该方法的漏洞检测准确率达到94.36%,优于现有的漏洞检测方法。
{"title":"SCGformer: Smart contract vulnerability detection based on control flow graph and transformer","authors":"KeXin Gong,&nbsp;Xiangmei Song,&nbsp;Na Wang,&nbsp;Chunyang Wang,&nbsp;Huijuan Zhu","doi":"10.1049/blc2.12046","DOIUrl":"10.1049/blc2.12046","url":null,"abstract":"<p>The security of smart contract has always been one of the significant problems in blockchain. As shown in previous studies, vulnerabilities in smart contracts can lead to unpredictable losses. With the rapid growth of the number of smart contracts, more and more data driven detection technologies based on machine learning have been proposed. However, some state-of-the-art approaches mainly rely on the source code of smart contract. These methods are limited by the openness of the source code and the version of the programming language. To address this problem, we propose a novel vulnerability detection method based on transformer by constructing the control flow graph (CFG) of smart contracts operation codes (opcodes), which shields the difference of various versions of program language. Extensive experiments are conducted to evaluate the effectiveness of the proposed method on the authors' own collected dataset. The experimental results show that the proposed method achieves 94.36% accuracy in vulnerability detection, which performs better than other state-of-the-art methods.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"3 4","pages":"213-221"},"PeriodicalIF":0.0,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12046","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72942803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An on‐chain trading model of real world asset backed digital assets 一个真实世界资产支持数字资产的链上交易模型
Pub Date : 2023-09-05 DOI: 10.1049/blc2.12045
Dongsheng Hou, Wenjing Ma, Wei Zhang, Yixuan Li, Yu Du, Yukun Hao
Metaverse is a digital value interaction network based on blockchain technology, with an important economic system component. While both traditional financial industries and crypto‐native industries have made significant progress by leveraging blockchain, the value stream of each remains limited to separate ecosystems. To bridge this gap between off‐chain and on‐chain economic systems, an on‐chain trading model was proposed using HD key derivation technique for direct uploading onto chains without going through centralized services for IoT data transmission. To improve the current status of NFTs as static assets, a token protocol binding each NFT with a unique account address was proposed. Additionally, oracle technique was leveraged with a decentralized and distributed trust model spanning across on‐chain and off‐chain components which securely pushes data between smart contracts and Web‐APIs. A decentralized trading model was developed based on smart contracts implementing automated market makers according to CFMM algorithm. Parallel transaction computing was executed based on the DAG model to ensure high operational performance and security standards of underlying blockchain. Finally, the on‐chain trading system of real world asset backed digital assets was developed integrating all the above key techniques that correspond to crucial functions of a complete economic system in Metaverse.
元宇宙是基于区块链技术的数字价值交互网络,是经济系统的重要组成部分。虽然传统金融行业和加密原生行业都通过利用区块链取得了重大进展,但每个行业的价值流仍然局限于单独的生态系统。为了弥合链下和链上经济系统之间的差距,提出了一种链上交易模型,该模型使用HD密钥派生技术直接上传到链上,而无需通过物联网数据传输的集中服务。为了改善NFT作为静态资产的现状,提出了一种令牌协议,将每个NFT与唯一的帐户地址绑定。此外,oracle技术与跨链上和链下组件的分散和分布式信任模型相结合,可以安全地在智能合约和Web api之间推送数据。基于基于CFMM算法实现自动做市商的智能合约,开发了去中心化交易模型。基于DAG模型进行并行事务计算,保证了底层区块链的高运行性能和安全标准。最后,开发了真实世界资产支持数字资产的链上交易系统,集成了上述所有关键技术,这些技术对应于虚拟世界中完整经济系统的关键功能。
{"title":"An on‐chain trading model of real world asset backed digital assets","authors":"Dongsheng Hou, Wenjing Ma, Wei Zhang, Yixuan Li, Yu Du, Yukun Hao","doi":"10.1049/blc2.12045","DOIUrl":"https://doi.org/10.1049/blc2.12045","url":null,"abstract":"Metaverse is a digital value interaction network based on blockchain technology, with an important economic system component. While both traditional financial industries and crypto‐native industries have made significant progress by leveraging blockchain, the value stream of each remains limited to separate ecosystems. To bridge this gap between off‐chain and on‐chain economic systems, an on‐chain trading model was proposed using HD key derivation technique for direct uploading onto chains without going through centralized services for IoT data transmission. To improve the current status of NFTs as static assets, a token protocol binding each NFT with a unique account address was proposed. Additionally, oracle technique was leveraged with a decentralized and distributed trust model spanning across on‐chain and off‐chain components which securely pushes data between smart contracts and Web‐APIs. A decentralized trading model was developed based on smart contracts implementing automated market makers according to CFMM algorithm. Parallel transaction computing was executed based on the DAG model to ensure high operational performance and security standards of underlying blockchain. Finally, the on‐chain trading system of real world asset backed digital assets was developed integrating all the above key techniques that correspond to crucial functions of a complete economic system in Metaverse.","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"33 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82429059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
BlockDetective: A GCN-based student–teacher framework for blockchain anomaly detection BlockDetective:用于区块链异常检测的基于gcn的师生框架
Pub Date : 2023-09-05 DOI: 10.1049/blc2.12044
Jinglin Li, Yihang Zhang, Chun Yang

The anonymous and tamper-proof nature of the blockchain poses significant challenges in auditing and regulating the behaviour and data on the chain. Criminal activities and anomalies are frequently changing, and fraudsters are devising new ways to evade detection. Moreover, the high volume and complexity of transactions and asymmetric errors make data classification more challenging. Also, class imbalances and high labelling costs are hindering the development of effective algorithms. In response to these issues, the authors present BlockDetective, a novel framework based on GCN that utilizes student–teacher architecture to detect fraudulent cryptocurrency transactions that are related to money laundering. The authors’ method leverages pre-training and fine-tuning, allowing the pre-trained model (teacher) to adapt better to the new data distribution and enhance the prediction performance while teaching a new, light-weight model (student) that provides abstract and top-level information. The authors’ experimental results show that BlockDetective outperforms state-of-the-art research methods by achieving top-notch performance in detecting fraudulent transactions on the blockchain. This framework can assist regulators and auditors in detecting and preventing fraudulent activities on the blockchain, thereby promoting a more secure and transparent financial system.

区块链的匿名性和防篡改性在审计和监管链上的行为和数据方面提出了重大挑战。犯罪活动和异常情况经常发生变化,诈骗者正在设计新的方法来逃避侦查。此外,事务的高容量和复杂性以及不对称错误使数据分类更具挑战性。此外,阶级不平衡和高标签成本阻碍了有效算法的发展。针对这些问题,作者提出了BlockDetective,这是一个基于GCN的新框架,利用学生-教师架构来检测与洗钱有关的欺诈性加密货币交易。作者的方法利用预训练和微调,允许预训练的模型(教师)更好地适应新的数据分布,提高预测性能,同时教授一个新的轻量级模型(学生),提供抽象和顶层信息。作者的实验结果表明,BlockDetective在检测区块链上的欺诈交易方面取得了一流的性能,超过了最先进的研究方法。该框架可以帮助监管机构和审计人员发现和防止区块链上的欺诈活动,从而促进一个更加安全和透明的金融体系。
{"title":"BlockDetective: A GCN-based student–teacher framework for blockchain anomaly detection","authors":"Jinglin Li,&nbsp;Yihang Zhang,&nbsp;Chun Yang","doi":"10.1049/blc2.12044","DOIUrl":"10.1049/blc2.12044","url":null,"abstract":"<p>The anonymous and tamper-proof nature of the blockchain poses significant challenges in auditing and regulating the behaviour and data on the chain. Criminal activities and anomalies are frequently changing, and fraudsters are devising new ways to evade detection. Moreover, the high volume and complexity of transactions and asymmetric errors make data classification more challenging. Also, class imbalances and high labelling costs are hindering the development of effective algorithms. In response to these issues, the authors present BlockDetective, a novel framework based on GCN that utilizes student–teacher architecture to detect fraudulent cryptocurrency transactions that are related to money laundering. The authors’ method leverages pre-training and fine-tuning, allowing the pre-trained model (teacher) to adapt better to the new data distribution and enhance the prediction performance while teaching a new, light-weight model (student) that provides abstract and top-level information. The authors’ experimental results show that BlockDetective outperforms state-of-the-art research methods by achieving top-notch performance in detecting fraudulent transactions on the blockchain. This framework can assist regulators and auditors in detecting and preventing fraudulent activities on the blockchain, thereby promoting a more secure and transparent financial system.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"3 4","pages":"204-212"},"PeriodicalIF":0.0,"publicationDate":"2023-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12044","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78749929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A bytecode-based integrated detection and repair method for reentrancy vulnerabilities in smart contracts 基于字节码的智能合约重入漏洞综合检测与修复方法
Pub Date : 2023-09-04 DOI: 10.1049/blc2.12043
Zijun Feng, Yuming Feng, Hui He, Weizhe Zhang, Yu Zhang

The reentrancy vulnerability in smart contracts has caused significant losses in the digital currency economy. Existing solutions for detecting and repairing this vulnerability are limited in scope and lack a comprehensive framework. Additionally, there is currently a lack of guidance methods for effectively pinpointing the location of vulnerabilities. The proposed bytecode-level method addresses these challenges by incorporating a detection module, an auxiliary localization module, and a repair module. An opcode classification method is introduced using vulnerability features and a BiLSTM-Attention-based sequence model to enhance detection accuracy. To overcome difficulties in vulnerability localization, an auxiliary localization method based on data flow and control flow analysis is proposed, enabling developers to better locate vulnerabilities. Current reentrancy vulnerability repair methods are analyzed and strategies for three reachable patterns are proposed. The bytecode rewriting strategy utilizes Trampoline technology for repair, while a fuel optimization method reduces bytecode generation length to optimize gas costs. Through extensive experimental validation, the effectiveness and superiority of the proposed methods are confirmed, further validating the feasibility of the entire framework. Experimental results demonstrate that the framework offers enhanced protection against reentrancy vulnerability attacks in smart contracts.

智能合约中的重入性漏洞给数字货币经济造成了巨大损失。现有的检测和修复该漏洞的解决方案范围有限,缺乏全面的框架。此外,目前还缺乏有效定位漏洞位置的指导方法。拟议的字节码级方法通过整合检测模块、辅助定位模块和修复模块来应对这些挑战。为了提高检测的准确性,引入了一种使用漏洞特征和基于 BiLSTM-Attention 序列模型的操作码分类方法。为了克服漏洞定位的困难,提出了一种基于数据流和控制流分析的辅助定位方法,使开发人员能够更好地定位漏洞。分析了当前的重入漏洞修复方法,并提出了三种可达模式的策略。字节码重写策略利用了 Trampoline 技术进行修复,而燃料优化方法则减少了字节码生成长度,以优化气体成本。通过广泛的实验验证,确认了所提方法的有效性和优越性,进一步验证了整个框架的可行性。实验结果表明,该框架可增强对智能合约中重入漏洞攻击的防护。
{"title":"A bytecode-based integrated detection and repair method for reentrancy vulnerabilities in smart contracts","authors":"Zijun Feng,&nbsp;Yuming Feng,&nbsp;Hui He,&nbsp;Weizhe Zhang,&nbsp;Yu Zhang","doi":"10.1049/blc2.12043","DOIUrl":"10.1049/blc2.12043","url":null,"abstract":"<p>The reentrancy vulnerability in smart contracts has caused significant losses in the digital currency economy. Existing solutions for detecting and repairing this vulnerability are limited in scope and lack a comprehensive framework. Additionally, there is currently a lack of guidance methods for effectively pinpointing the location of vulnerabilities. The proposed bytecode-level method addresses these challenges by incorporating a detection module, an auxiliary localization module, and a repair module. An opcode classification method is introduced using vulnerability features and a BiLSTM-Attention-based sequence model to enhance detection accuracy. To overcome difficulties in vulnerability localization, an auxiliary localization method based on data flow and control flow analysis is proposed, enabling developers to better locate vulnerabilities. Current reentrancy vulnerability repair methods are analyzed and strategies for three reachable patterns are proposed. The bytecode rewriting strategy utilizes Trampoline technology for repair, while a fuel optimization method reduces bytecode generation length to optimize gas costs. Through extensive experimental validation, the effectiveness and superiority of the proposed methods are confirmed, further validating the feasibility of the entire framework. Experimental results demonstrate that the framework offers enhanced protection against reentrancy vulnerability attacks in smart contracts.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 3","pages":"235-251"},"PeriodicalIF":0.0,"publicationDate":"2023-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12043","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89085066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Asynchronous blockchain‐based federated learning for tokenized smart power contract of heterogeneous networked microgrid system 基于异步区块链的异构网络化微电网系统token化智能电力合约联邦学习
Pub Date : 2023-08-26 DOI: 10.1049/blc2.12041
D. Sharma
In a networked microgrid system (NMS), various heterogeneous microgrids are interconnected. A networked microgrid system facilitates a new kind of physical design that provides numerous advantages such as distributed economic optimization, reliability, resiliency, and focusing on distributed generations and customers. Designing the secure and privacy‐protected smart power contract between electricity suppliers and consumers, considered as agents, of different microgrids, is a challenging task in the networked‐ microgrid system. Each microgrid implements a heterogeneous or isomorphic blockchain based platform. The blockchain interoperability, inherently, presents in different blockchains implemented by various microgrids. This paper reviews the interoperability issues and smart contract designs in blockchain‐based systems and proposes new mechanisms to cater blockchain interoperability challenges to facilitate the design of secure and seamless smart contracts among different blockchains of microgrids. A network hub of heterogeneous blockchains of network microgrids has been proposed. A methodology has been developed to transfer tokens between interoperable blockchains. A distributed identity‐based microgrid (DIBM) scheme is incorporated to make the networked microgrid system secure and trustworthy. This paper suggests an effective consensus protocol for cross‐chain architecture that improves the tokenization system and smart power contract designs. Asynchronous blockchain based federated learning for peer‐to‐peer smart power exchange has been implemented in learning process of interoperable and heterogeneous blockchain based network hub of microgrid. For simulation purposes, MATLAB and python programming have been used with real‐time data of microgrids.
在网络化微电网系统(NMS)中,各种异构微电网相互连接。网络化的微电网系统促进了一种新的物理设计,它提供了许多优势,如分布式经济优化、可靠性、弹性,以及关注分布式世代和客户。作为不同微电网的代理,在电力供应商和消费者之间设计安全和隐私保护的智能电力合同是网络化微电网系统中的一项具有挑战性的任务。每个微电网实现一个异构或同构的基于区块链的平台。区块链互操作性本质上体现在由各种微电网实现的不同区块链中。本文回顾了基于区块链的系统中的互操作性问题和智能合约设计,并提出了新的机制来应对区块链互操作性挑战,以促进在不同微电网区块链之间设计安全和无缝的智能合约。提出了一种网络微电网异构区块链网络枢纽。已经开发了一种方法来在可互操作的区块链之间传输令牌。采用分布式身份微电网(DIBM)方案,使网络化微电网系统安全可靠。本文提出了一种有效的跨链架构共识协议,改进了令牌化系统和智能电力合约设计。将基于异步区块链的点对点智能电力交换联邦学习应用于基于互操作和异构区块链的微电网网络集线器的学习过程。为了实现仿真目的,使用MATLAB和python编程处理微电网的实时数据。
{"title":"Asynchronous blockchain‐based federated learning for tokenized smart power contract of heterogeneous networked microgrid system","authors":"D. Sharma","doi":"10.1049/blc2.12041","DOIUrl":"https://doi.org/10.1049/blc2.12041","url":null,"abstract":"In a networked microgrid system (NMS), various heterogeneous microgrids are interconnected. A networked microgrid system facilitates a new kind of physical design that provides numerous advantages such as distributed economic optimization, reliability, resiliency, and focusing on distributed generations and customers. Designing the secure and privacy‐protected smart power contract between electricity suppliers and consumers, considered as agents, of different microgrids, is a challenging task in the networked‐ microgrid system. Each microgrid implements a heterogeneous or isomorphic blockchain based platform. The blockchain interoperability, inherently, presents in different blockchains implemented by various microgrids. This paper reviews the interoperability issues and smart contract designs in blockchain‐based systems and proposes new mechanisms to cater blockchain interoperability challenges to facilitate the design of secure and seamless smart contracts among different blockchains of microgrids. A network hub of heterogeneous blockchains of network microgrids has been proposed. A methodology has been developed to transfer tokens between interoperable blockchains. A distributed identity‐based microgrid (DIBM) scheme is incorporated to make the networked microgrid system secure and trustworthy. This paper suggests an effective consensus protocol for cross‐chain architecture that improves the tokenization system and smart power contract designs. Asynchronous blockchain based federated learning for peer‐to‐peer smart power exchange has been implemented in learning process of interoperable and heterogeneous blockchain based network hub of microgrid. For simulation purposes, MATLAB and python programming have been used with real‐time data of microgrids.","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86011639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multisecret-sharing scheme with two-level security and its applications in blockchain 具有两级安全的多存储空间共享方案及其在区块链中的应用
Pub Date : 2023-08-26 DOI: 10.1049/blc2.12042
Rajendra Kumar Sharma, Ritumoni Sarma, Neha Arora, Vidya Sagar

A (t,m)$(t,m)$-threshold secret sharing and multisecret-sharing scheme based on Shamir's secret sharing scheme are introduced with two-level security using a one-way function. Besides, its application in a smart contract-enabled consortium blockchain network is discussed. The proposed scheme is thoroughly examined in terms of security and efficiency. Privacy, security, integrity, and scalability are also analyzed while applying it to the blockchain network.

介绍了一种 ( t , m ) $(t,m)$ -阈值秘密共享方案和基于沙米尔秘密共享方案的多阈值共享方案,该方案采用单向函数,具有两级安全性。此外,还讨论了该方案在支持智能合约的联盟区块链网络中的应用。从安全性和效率的角度对所提出的方案进行了深入研究。在将其应用于区块链网络时,还对其隐私性、安全性、完整性和可扩展性进行了分析。
{"title":"Multisecret-sharing scheme with two-level security and its applications in blockchain","authors":"Rajendra Kumar Sharma,&nbsp;Ritumoni Sarma,&nbsp;Neha Arora,&nbsp;Vidya Sagar","doi":"10.1049/blc2.12042","DOIUrl":"10.1049/blc2.12042","url":null,"abstract":"<p>A <math>\u0000 <semantics>\u0000 <mrow>\u0000 <mo>(</mo>\u0000 <mi>t</mi>\u0000 <mo>,</mo>\u0000 <mi>m</mi>\u0000 <mo>)</mo>\u0000 </mrow>\u0000 <annotation>$(t,m)$</annotation>\u0000 </semantics></math>-threshold secret sharing and multisecret-sharing scheme based on Shamir's secret sharing scheme are introduced with two-level security using a one-way function. Besides, its application in a smart contract-enabled consortium blockchain network is discussed. The proposed scheme is thoroughly examined in terms of security and efficiency. Privacy, security, integrity, and scalability are also analyzed while applying it to the blockchain network.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 1","pages":"30-42"},"PeriodicalIF":0.0,"publicationDate":"2023-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12042","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135181533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A research on cross-chain and interoperation methods of fusion protocol 融合协议的跨链和互操作方法研究
Pub Date : 2023-08-23 DOI: 10.1049/blc2.12040
Li Ming, Song Wenpeng, Li Ankai, Zhou Ziming, Liu Mianchen

At present, cross-chain technology and cross-chain system pay more attention to cross-chain security and performance, and have shown great improvement in security, scalability and efficiency. However, the generality of cross-chain technology in different scenarios is poor, and it may not fit in different business fields. In order to solve the generality problem of cross-chain technology, this paper sorts out and analyzes the research of blockchain cross-chain protocol, and proposes a fusion protocol cross-chain method based on relay-chain technology. This paper will introduce the cross-chain framework and cross-chain transaction process of fusion protocol. Cross-chain framework includes blockchain cross-chain interaction architecture, cross-chain interaction governance mechanism and cross-chain privacy protection scheme. The transaction process is divided into three different stages. Finally, combined with cross-chain key technologies and landing application requirements, the future research direction of blockchain cross-chain technology is given. The fusion protocol cross-chain method based on relay-chain technology proposed here is a groundbreaking innovation in the field of blockchain cross-chain technology. By integrating the advantages of different blockchain systems and protocols, the fusion protocol is able to achieve a high degree of generality and compatibility, making it suitable for various business scenarios and applications.

目前,跨链技术和跨链系统更加注重跨链的安全性和性能,在安全性、可扩展性和效率方面都有了很大的提升。但是,跨链技术在不同场景下的通用性较差,可能无法适应不同的业务领域。为了解决跨链技术的通用性问题,本文对区块链跨链协议的研究进行了梳理和分析,提出了一种基于中继链技术的融合协议跨链方法。本文将介绍融合协议的跨链框架和跨链交易流程。跨链框架包括区块链跨链交互架构、跨链交互治理机制和跨链隐私保护方案。交易过程分为三个不同阶段。最后,结合跨链关键技术和落地应用需求,给出了区块链跨链技术的未来研究方向。本文提出的基于中继链技术的融合协议跨链方法是区块链跨链技术领域的突破性创新。融合协议通过整合不同区块链系统和协议的优势,能够实现高度的通用性和兼容性,适用于各种业务场景和应用。
{"title":"A research on cross-chain and interoperation methods of fusion protocol","authors":"Li Ming,&nbsp;Song Wenpeng,&nbsp;Li Ankai,&nbsp;Zhou Ziming,&nbsp;Liu Mianchen","doi":"10.1049/blc2.12040","DOIUrl":"10.1049/blc2.12040","url":null,"abstract":"<p>At present, cross-chain technology and cross-chain system pay more attention to cross-chain security and performance, and have shown great improvement in security, scalability and efficiency. However, the generality of cross-chain technology in different scenarios is poor, and it may not fit in different business fields. In order to solve the generality problem of cross-chain technology, this paper sorts out and analyzes the research of blockchain cross-chain protocol, and proposes a fusion protocol cross-chain method based on relay-chain technology. This paper will introduce the cross-chain framework and cross-chain transaction process of fusion protocol. Cross-chain framework includes blockchain cross-chain interaction architecture, cross-chain interaction governance mechanism and cross-chain privacy protection scheme. The transaction process is divided into three different stages. Finally, combined with cross-chain key technologies and landing application requirements, the future research direction of blockchain cross-chain technology is given. The fusion protocol cross-chain method based on relay-chain technology proposed here is a groundbreaking innovation in the field of blockchain cross-chain technology. By integrating the advantages of different blockchain systems and protocols, the fusion protocol is able to achieve a high degree of generality and compatibility, making it suitable for various business scenarios and applications.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 1","pages":"18-29"},"PeriodicalIF":0.0,"publicationDate":"2023-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12040","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85892893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mixing detection on Bitcoin transactions using statistical patterns 使用统计模式对比特币交易进行混合检测
Pub Date : 2023-08-14 DOI: 10.1049/blc2.12036
Ardeshir Shojaeinasab, Amir Pasha Motamed, Behnam Bahrak

Cryptocurrencies, particularly Bitcoin, have garnered attention for their potential in anonymous transactions. However, their anonymity has often been compromised by deanonymization attacks. To counter this, mixing services have been introduced. While they enhance privacy, they obscure fund traceability. This study seeks to demystify transactions linked to these services, shedding light on pathways of concealed and laundered money. We propose a method to identify and classify transactions and addresses of major mixing services in Bitcoin. Unlike previous research focusing on older techniques like CoinJoin, we emphasize modern mixing services. We gathered labelled data by transacting with three prominent mixers (MixTum, Blemder, and CryptoMixer) and identified recurring patterns. Using these patterns, an algorithm was created to pinpoint mixing transactions and distinguish mixer-related addresses.

The algorithm achieved a remarkable recall rate of 100%. Given the lack of clear ground truth and the vast number of unlabelled transactions, ensuring accuracy was a challenge. However, by analyzing a set of non-mixing transactions with our model, it was confirmed that the high recall rate was not misleading. This work provides a significant advancement in monitoring mixing transactions, presenting a valuable tool against fraud and money laundering in cryptocurrency networks.

加密货币,尤其是比特币,因其在匿名交易中的潜力而备受关注。然而,他们的匿名性经常受到去匿名攻击的影响。为了应对这种情况,引入了混合服务。虽然它们增强了隐私,但却掩盖了资金的可追溯性。这项研究试图揭开与这些服务相关的交易的神秘面纱,揭示隐藏和洗钱的途径。我们提出了一种识别和分类比特币中主要混合服务的交易和地址的方法。与之前专注于CoinJoin等旧技术的研究不同,我们强调现代混合服务。我们通过与三个著名的混合器(MixTum、Blemder和CryptoMixer)进行交易来收集标记数据,并确定重复出现的模式。使用这些模式,创建了一种算法来精确定位混合事务并区分与混合器相关的地址。该算法实现了100%的显著召回率。鉴于缺乏明确的基本事实和大量未标记的交易,确保准确性是一项挑战。然而,通过用我们的模型分析一组非混合交易,证实了高召回率没有误导性。这项工作在监控混合交易方面取得了重大进展,为打击加密货币网络中的欺诈和洗钱提供了一个有价值的工具。
{"title":"Mixing detection on Bitcoin transactions using statistical patterns","authors":"Ardeshir Shojaeinasab,&nbsp;Amir Pasha Motamed,&nbsp;Behnam Bahrak","doi":"10.1049/blc2.12036","DOIUrl":"https://doi.org/10.1049/blc2.12036","url":null,"abstract":"<p>Cryptocurrencies, particularly Bitcoin, have garnered attention for their potential in anonymous transactions. However, their anonymity has often been compromised by deanonymization attacks. To counter this, mixing services have been introduced. While they enhance privacy, they obscure fund traceability. This study seeks to demystify transactions linked to these services, shedding light on pathways of concealed and laundered money. We propose a method to identify and classify transactions and addresses of major mixing services in Bitcoin. Unlike previous research focusing on older techniques like CoinJoin, we emphasize modern mixing services. We gathered labelled data by transacting with three prominent mixers (MixTum, Blemder, and CryptoMixer) and identified recurring patterns. Using these patterns, an algorithm was created to pinpoint mixing transactions and distinguish mixer-related addresses.</p><p>The algorithm achieved a remarkable recall rate of 100%. Given the lack of clear ground truth and the vast number of unlabelled transactions, ensuring accuracy was a challenge. However, by analyzing a set of non-mixing transactions with our model, it was confirmed that the high recall rate was not misleading. This work provides a significant advancement in monitoring mixing transactions, presenting a valuable tool against fraud and money laundering in cryptocurrency networks.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"3 3","pages":"136-148"},"PeriodicalIF":0.0,"publicationDate":"2023-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12036","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50132435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimized byzantine fault tolerant algorithm for improving performance and security with trust values 利用信任值提高性能和安全性的优化拜占庭容错算法
Pub Date : 2023-08-07 DOI: 10.1049/blc2.12039
Linqing Xiao, Juntao Gao, Baocang Wang, Xuelian Li

Blockchain is considered to be a promising technology due to its decentralization, open, and non tamperation. Nevertheless, the current blockchain system cannot replace traditional financial institutions because its performance and security indicators in the consensus algorithm are not perfect. As one of the emerging capacity expansion technologies, sharding technology improves throughput by grouping users and processing transactions in parallel. This paper proposes an improved Byzantine Fault Tolerance algorithm TV-BRAFT. TV-BRAFT calculates a trust value for each user through an incentive mechanism. The sharding scheme based on the trust value is adopted to reduce the probability of malicious nodes being allocated to the same partition, thus improving the security of the system. In the consensus, the system selects users with qualified trust values to form a verification group to supervise the consensus process and avoid submitting error transactions to the blockchain. In order to prove that the TV-BRAFT can resist Byzantine attacks, a recursive formula is used to prove the security of sharding and the security of consensus within one shard. Finally, the simulation results show that the TV-BRAFT not only guarantees the fairness of incentives but is also better than the Raft and PBFT algorithms in efficiency and throughput.

区块链因其去中心化、开放性和不可篡改性而被认为是一种前景广阔的技术。然而,目前的区块链系统还不能取代传统金融机构,因为其共识算法的性能和安全指标并不完善。作为新兴的扩容技术之一,分片技术通过将用户分组并行处理交易,提高了吞吐量。本文提出了一种改进的拜占庭容错算法 TV-BRAFT。TV-BRAFT 通过激励机制为每个用户计算信任值。采用基于信任值的分区方案,降低恶意节点被分配到同一分区的概率,从而提高系统的安全性。在共识中,系统选择信任值合格的用户组成验证组,监督共识过程,避免向区块链提交错误交易。为了证明 TV-BRAFT 能够抵御拜占庭攻击,使用递归公式证明了分片的安全性和一个分片内共识的安全性。最后,仿真结果表明,TV-BRAFT 不仅保证了激励的公平性,而且在效率和吞吐量方面优于 Raft 和 PBFT 算法。
{"title":"Optimized byzantine fault tolerant algorithm for improving performance and security with trust values","authors":"Linqing Xiao,&nbsp;Juntao Gao,&nbsp;Baocang Wang,&nbsp;Xuelian Li","doi":"10.1049/blc2.12039","DOIUrl":"10.1049/blc2.12039","url":null,"abstract":"<p>Blockchain is considered to be a promising technology due to its decentralization, open, and non tamperation. Nevertheless, the current blockchain system cannot replace traditional financial institutions because its performance and security indicators in the consensus algorithm are not perfect. As one of the emerging capacity expansion technologies, sharding technology improves throughput by grouping users and processing transactions in parallel. This paper proposes an improved Byzantine Fault Tolerance algorithm TV-BRAFT. TV-BRAFT calculates a trust value for each user through an incentive mechanism. The sharding scheme based on the trust value is adopted to reduce the probability of malicious nodes being allocated to the same partition, thus improving the security of the system. In the consensus, the system selects users with qualified trust values to form a verification group to supervise the consensus process and avoid submitting error transactions to the blockchain. In order to prove that the TV-BRAFT can resist Byzantine attacks, a recursive formula is used to prove the security of sharding and the security of consensus within one shard. Finally, the simulation results show that the TV-BRAFT not only guarantees the fairness of incentives but is also better than the Raft and PBFT algorithms in efficiency and throughput.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 1","pages":"1-17"},"PeriodicalIF":0.0,"publicationDate":"2023-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12039","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78808009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IET Blockchain
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1