首页 > 最新文献

IET Blockchain最新文献

英文 中文
Blockchain-based reliable image copyright protection 基于区块链的可靠图像版权保护
Pub Date : 2023-03-02 DOI: 10.1049/blc2.12027
Xiangli Xiao, Xiaotong He, Yushu Zhang, Xuewen Dong, Lu-Xing Yang, Yong Xiang

The indiscriminate distribution of a large number of unlicensed images through the Internet seriously harms the benefits of image owners, which prompts the study of image copyright protection solutions. Existing blockchain-free solutions are limited to using centralized servers to store copyright information, leaving data vulnerable to being lost or tampered with by external attacks. Although the blockchain-based image copyright protection solutions are capable of addressing the above problem, improvements are needed in choosing a suitable blockchain platform and supporting integrated copyright life cycle management. To this end, this paper designs a blockchain-based reliable image copyright protection system named BB-RICP using Hyperledger Fabric. For one thing, the adoption of Fabric mitigates the limitations of other blockchain platforms represented by Ethereum in terms of efficiency, economy, and availability. For another, BB-RICP successes in achieving integrated copyright lifecycle management. In addition, BB-RICP achieves enhanced applicability performance by firstly introducing GM algorithms recommended by Chinese national standard and adapting the more consortium blockchain-oriented practical byzantine fault tolerance algorithm. Moreover, the adoption of spread spectrum watermarking brings convenience to users. Finally, Kubernetes is used to assist in the simulation of BB-RICP to verify that users can operate reliably in the blockchain network.

大量未经许可的图像通过互联网肆意传播,严重损害了图像所有者的利益,这促使人们研究图像版权保护的解决方案。现有的无区块链解决方案仅限于使用集中式服务器存储版权信息,使数据容易丢失或被外部攻击篡改。虽然基于区块链的图像版权保护解决方案能够解决上述问题,但在选择合适的区块链平台和支持集成版权生命周期管理方面还需要改进。为此,本文利用Hyperledger Fabric设计了一个基于区块链的可靠图像版权保护系统BB-RICP。一方面,Fabric的采用减轻了以以太坊为代表的其他区块链平台在效率、经济性和可用性方面的局限性。另一方面,bb - icp成功地实现了集成版权生命周期管理。此外,BB-RICP首先引入了中国国家标准推荐的GM算法,并采用了更面向联盟区块链的实用拜占庭容错算法,提高了适用性。此外,扩频水印的采用给用户带来了方便。最后,使用Kubernetes协助模拟BB-RICP,以验证用户可以在区块链网络中可靠地运行。
{"title":"Blockchain-based reliable image copyright protection","authors":"Xiangli Xiao,&nbsp;Xiaotong He,&nbsp;Yushu Zhang,&nbsp;Xuewen Dong,&nbsp;Lu-Xing Yang,&nbsp;Yong Xiang","doi":"10.1049/blc2.12027","DOIUrl":"10.1049/blc2.12027","url":null,"abstract":"<p>The indiscriminate distribution of a large number of unlicensed images through the Internet seriously harms the benefits of image owners, which prompts the study of image copyright protection solutions. Existing blockchain-free solutions are limited to using centralized servers to store copyright information, leaving data vulnerable to being lost or tampered with by external attacks. Although the blockchain-based image copyright protection solutions are capable of addressing the above problem, improvements are needed in choosing a suitable blockchain platform and supporting integrated copyright life cycle management. To this end, this paper designs a blockchain-based reliable image copyright protection system named BB-RICP using Hyperledger Fabric. For one thing, the adoption of Fabric mitigates the limitations of other blockchain platforms represented by Ethereum in terms of efficiency, economy, and availability. For another, BB-RICP successes in achieving integrated copyright lifecycle management. In addition, BB-RICP achieves enhanced applicability performance by firstly introducing GM algorithms recommended by Chinese national standard and adapting the more consortium blockchain-oriented practical byzantine fault tolerance algorithm. Moreover, the adoption of spread spectrum watermarking brings convenience to users. Finally, Kubernetes is used to assist in the simulation of BB-RICP to verify that users can operate reliably in the blockchain network.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"3 4","pages":"222-237"},"PeriodicalIF":0.0,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12027","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82819508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A decentralized crypto network with dynamic threshold change 具有动态阈值变化的去中心化加密网络
Pub Date : 2023-02-21 DOI: 10.1049/blc2.12026
Wenpeng Song, Xin Pei, Ming Li

The threshold proxy re-encryption (tPRE) algorithm not only ensures the separation of data ownership and use right, but also prevents a single data proxy from doing evil. In order to avoid collusion of multiple data proxies, this paper constructs a decentralized crypto network (DCN) based on blockchain technology and tPRE. DCN is more than a key management system, while expanding the data storage capacity of blockchain network. Combined with existing distributed storage schemes, it can store massive data. Due to Byzantine failure in distributed networks, the data proxy nodes can join or leave at will. In order to ensure that the number of data proxy nodes in the DCN network meets the requirements of the re-encryption threshold, and the data authorization operation can be carried out smoothly, this paper presents a dynamic refresh method of tPRE fragments. When there are fragments that meet the threshold number in the network, the allocation of encrypted fragments can be adjusted non-interactivity and self-adaptively. Non-interactivity means that each data proxy node independently refreshes its old fragments into new fragments without collecting old fragments from other nodes in the DCN, and then distributes the new fragments to other data proxy nodes in the DCN. Self-adaptability refers to monitoring the changes of data proxy node sets in the DCN, and automatically refreshing fragments. Finally, the performance of critical algorithms is calculated in the proposal.

阈值代理重新加密(tPRE)算法不仅保证了数据所有权和使用权的分离,而且防止了单个数据代理的邪恶行为。为了避免多个数据代理的合谋,本文构建了一个基于区块链技术和tPRE的去中心化加密网络。DCN不仅仅是一个密钥管理系统,同时扩展了区块链网络的数据存储能力。结合现有的分布式存储方案,它可以存储大量数据。由于分布式网络中拜占庭式的故障,数据代理节点可以随意加入或离开。为了确保DCN网络中数据代理节点的数量满足重新加密阈值的要求,并且数据授权操作能够顺利进行,本文提出了一种tPRE片段的动态刷新方法。当网络中存在满足阈值数量的片段时,加密片段的分配可以进行非交互性和自适应调整。非交互性是指每个数据代理节点在不收集DCN中其他节点的旧片段的情况下,将其旧片段独立刷新为新片段,然后将新片段分发给DCN中的其他数据代理节点。自适应是指监控DCN中数据代理节点集的变化,并自动刷新碎片。最后,对关键算法的性能进行了计算。
{"title":"A decentralized crypto network with dynamic threshold change","authors":"Wenpeng Song,&nbsp;Xin Pei,&nbsp;Ming Li","doi":"10.1049/blc2.12026","DOIUrl":"https://doi.org/10.1049/blc2.12026","url":null,"abstract":"<p>The threshold proxy re-encryption (tPRE) algorithm not only ensures the separation of data ownership and use right, but also prevents a single data proxy from doing evil. In order to avoid collusion of multiple data proxies, this paper constructs a decentralized crypto network (DCN) based on blockchain technology and tPRE. DCN is more than a key management system, while expanding the data storage capacity of blockchain network. Combined with existing distributed storage schemes, it can store massive data. Due to Byzantine failure in distributed networks, the data proxy nodes can join or leave at will. In order to ensure that the number of data proxy nodes in the DCN network meets the requirements of the re-encryption threshold, and the data authorization operation can be carried out smoothly, this paper presents a dynamic refresh method of tPRE fragments. When there are fragments that meet the threshold number in the network, the allocation of encrypted fragments can be adjusted non-interactivity and self-adaptively. Non-interactivity means that each data proxy node independently refreshes its old fragments into new fragments without collecting old fragments from other nodes in the DCN, and then distributes the new fragments to other data proxy nodes in the DCN. Self-adaptability refers to monitoring the changes of data proxy node sets in the DCN, and automatically refreshing fragments. Finally, the performance of critical algorithms is calculated in the proposal.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"3 2","pages":"116-122"},"PeriodicalIF":0.0,"publicationDate":"2023-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12026","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50152998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-oriented location privacy preserving for cooperative spectrum sensing in 6G wireless networks 面向区块链的6G无线网络协同频谱感知位置隐私保护
Pub Date : 2023-02-15 DOI: 10.1049/blc2.12025
Roopa Vuppula, Himansu Shekhar Pradhan

In this article, the authors proposed a novel blockchain-oriented location privacy-preserving (BoLPP) for the Cooperative Spectrum Sensing (CSS) in 6G networks. In order to attain the sustainability of privacy and security for 6G wireless networks, it is a great challenge in this sensing as it faces various malicious attacks while the secondary user (SU) is active. To tackle these issues, the authors proposed a novel framework for blockchain-oriented Cognitive Radio Networks (CRNs) for CSS using an energy detection technique. Moreover, the authors implemented another novel paradigm BoLPP, to attain the privacy of SUs location for CSS in 6G networks. This approach preserves the SUs’ location and makes the BoLPP framework immune to all malicious attackers. The simulation results have been undergone based on the performance metrics such as response time, consistency, probability of false alarm, frame loss (%), average network throughput, energy efficiency, and security. The outcomes reveal that the proposed scheme achieves high security, privacy, energy efficiency, average network throughput, and low probability of false alarm and frame loss (%) when compared with the existing frameworks such as Friend or Foe (FoF) and Tidal Trust Algorithm (TTA) mechanisms. It is observed that the proposed BoLPP mechanism provides better security and privacy in 6G wireless networks.

在本文中,作者提出了一种新的面向区块链的位置隐私保护(BoLPP),用于6G网络中的协同频谱感知(CSS)。为了实现6G无线网络隐私和安全的可持续性,在二次用户(SU)活跃的情况下,它面临着各种恶意攻击,这是一个巨大的挑战。为了解决这些问题,作者使用能量检测技术为CSS提出了一个面向区块链的认知无线电网络(CRN)的新框架。此外,作者实现了另一种新的范式BoLPP,以获得6G网络中CSS的SU位置的隐私。这种方法保留了SU的位置,并使BoLPP框架免受所有恶意攻击者的攻击。仿真结果是基于响应时间、一致性、误报概率、帧丢失(%)、平均网络吞吐量、能效和安全性等性能指标得出的。结果表明,与现有的框架(如Friend or Foe(FoF)和Tidal Trust Algorithm(TTA)机制)相比,该方案具有较高的安全性、私密性、能效、平均网络吞吐量以及较低的虚警和帧丢失概率(%)。观察到,所提出的BoLPP机制在6G无线网络中提供了更好的安全性和私密性。
{"title":"Blockchain-oriented location privacy preserving for cooperative spectrum sensing in 6G wireless networks","authors":"Roopa Vuppula,&nbsp;Himansu Shekhar Pradhan","doi":"10.1049/blc2.12025","DOIUrl":"https://doi.org/10.1049/blc2.12025","url":null,"abstract":"<p>In this article, the authors proposed a novel blockchain-oriented location privacy-preserving (BoLPP) for the Cooperative Spectrum Sensing (CSS) in 6G networks. In order to attain the sustainability of privacy and security for 6G wireless networks, it is a great challenge in this sensing as it faces various malicious attacks while the secondary user (SU) is active. To tackle these issues, the authors proposed a novel framework for blockchain-oriented Cognitive Radio Networks (CRNs) for CSS using an energy detection technique. Moreover, the authors implemented another novel paradigm BoLPP, to attain the privacy of SUs location for CSS in 6G networks. This approach preserves the SUs’ location and makes the BoLPP framework immune to all malicious attackers. The simulation results have been undergone based on the performance metrics such as response time, consistency, probability of false alarm, frame loss (%), average network throughput, energy efficiency, and security. The outcomes reveal that the proposed scheme achieves high security, privacy, energy efficiency, average network throughput, and low probability of false alarm and frame loss (%) when compared with the existing frameworks such as Friend or Foe (FoF) and Tidal Trust Algorithm (TTA) mechanisms. It is observed that the proposed BoLPP mechanism provides better security and privacy in 6G wireless networks.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"3 2","pages":"74-97"},"PeriodicalIF":0.0,"publicationDate":"2023-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12025","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50133219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Waterfall: Gozalandia. Distributed protocol with fast finality and proven safety and liveness 瀑布:Gozalandia。分布式协议,快速终结,安全性和活跃性
Pub Date : 2023-01-28 DOI: 10.1049/blc2.12023
Sergii Grybniak, Yevhen Leonchyk, Igor Mazurok, Oleksandr Nashyvan, Ruslan Shanin

A consensus protocol is a crucial mechanism of distributed networks by which nodes can coordinate their actions and the current state of data. This article describes a BlockDAG consensus algorithm based on the Proof of Stake approach. The protocol provides network participants with cross-voting for the order of blocks, which, in the case of a fair vote, guarantees a quick consensus. Under conditions of dishonest behavior, cross-voting ensures that violations will be quickly detected. In addition, the protocol assumes the existence of a Coordinating network containing information about the approved ordering, which qualitatively increases security and also serves to improve network synchronization.

共识协议是分布式网络的一个关键机制,节点可以通过它来协调它们的行为和数据的当前状态。本文描述了一种基于权益证明方法的BlockDAG共识算法。该协议为网络参与者提供了对区块顺序的交叉投票,在公平投票的情况下,保证了快速达成共识。在不诚实行为的情况下,交叉投票确保违规行为将被迅速发现。此外,该协议假定存在一个协调网络,其中包含有关批准的排序的信息,这从质量上提高了安全性,也有助于改善网络同步。
{"title":"Waterfall: Gozalandia. Distributed protocol with fast finality and proven safety and liveness","authors":"Sergii Grybniak,&nbsp;Yevhen Leonchyk,&nbsp;Igor Mazurok,&nbsp;Oleksandr Nashyvan,&nbsp;Ruslan Shanin","doi":"10.1049/blc2.12023","DOIUrl":"10.1049/blc2.12023","url":null,"abstract":"<p>A consensus protocol is a crucial mechanism of distributed networks by which nodes can coordinate their actions and the current state of data. This article describes a BlockDAG consensus algorithm based on the Proof of Stake approach. The protocol provides network participants with cross-voting for the order of blocks, which, in the case of a fair vote, guarantees a quick consensus. Under conditions of dishonest behavior, cross-voting ensures that violations will be quickly detected. In addition, the protocol assumes the existence of a Coordinating network containing information about the approved ordering, which qualitatively increases security and also serves to improve network synchronization.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"3 4","pages":"182-193"},"PeriodicalIF":0.0,"publicationDate":"2023-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12023","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89577277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An access control model for data security sharing cross-domain in consortium blockchain 联盟区块链中跨域数据安全共享的访问控制模型
Pub Date : 2023-01-06 DOI: 10.1049/blc2.12022
Yang Liu, Weidong Yang, Yanlin Wang, Yang Liu

With the rapid increment of the demand for data sharing among parties, data is considered a cornerstone component to provide value in the big data environment. Concerns regarding sharing data security have impeded the development of cross-domain data interaction. Therefore, an access control model for data security sharing cross-domain is proposed, Fabric-ABAC, that is based on Hyperledger Fabric and Attribute-based Access Control (ABAC). In order to solve the data security challenges caused by a trusted central organization implementation, a distributed environment is constructed that consists of stakeholders among parties. The unified attribute model is designed for multi-environment combined with smart contracts. Fabric-ABAC realizes multi-level, fine-grained, and auditable access control, enabling data security through automatic permission verification. Considering the ledger is visible to all participants in consortium blockchain, it is necessary to protect the confidentiality of sensitive data. Thus, Proxy Re-Encryption (PRE), which is implemented by smart contracts, is adopted in the scheme to realize the ciphertext interaction without the third party. The security of PRE and the access control model used in Fabric-ABAC is discussed to show that a secure environment for data sharing is provided. Moreover, the completeness of the implementation and effectiveness of the system performance in the multi-domain environment is demonstrated in the experimental results.

随着各方对数据共享需求的快速增长,数据被认为是在大数据环境中提供价值的基石组成部分。对共享数据安全的担忧阻碍了跨领域数据交互的发展。因此,在Hyperledger Fabric和基于属性的访问控制(ABAC)的基础上,提出了一种跨域数据安全共享的访问控制模型Fabric ABAC。为了解决由可信的中央组织实现引起的数据安全挑战,构建了一个由各方利益相关者组成的分布式环境。统一属性模型是为多环境和智能合约相结合而设计的。Fabric ABAC实现了多级、细粒度和可审核的访问控制,通过自动权限验证实现了数据安全。考虑到联盟区块链的所有参与者都可以看到账本,因此有必要保护敏感数据的机密性。因此,该方案采用了由智能合约实现的代理再加密(PRE),实现了无需第三方的密文交互。讨论了PRE的安全性和Fabric ABAC中使用的访问控制模型,表明为数据共享提供了一个安全的环境。此外,实验结果证明了系统在多域环境中实现的完整性和性能的有效性。
{"title":"An access control model for data security sharing cross-domain in consortium blockchain","authors":"Yang Liu,&nbsp;Weidong Yang,&nbsp;Yanlin Wang,&nbsp;Yang Liu","doi":"10.1049/blc2.12022","DOIUrl":"https://doi.org/10.1049/blc2.12022","url":null,"abstract":"<p>With the rapid increment of the demand for data sharing among parties, data is considered a cornerstone component to provide value in the big data environment. Concerns regarding sharing data security have impeded the development of cross-domain data interaction. Therefore, an access control model for data security sharing cross-domain is proposed, Fabric-ABAC, that is based on Hyperledger Fabric and Attribute-based Access Control (ABAC). In order to solve the data security challenges caused by a trusted central organization implementation, a distributed environment is constructed that consists of stakeholders among parties. The unified attribute model is designed for multi-environment combined with smart contracts. Fabric-ABAC realizes multi-level, fine-grained, and auditable access control, enabling data security through automatic permission verification. Considering the ledger is visible to all participants in consortium blockchain, it is necessary to protect the confidentiality of sensitive data. Thus, Proxy Re-Encryption (PRE), which is implemented by smart contracts, is adopted in the scheme to realize the ciphertext interaction without the third party. The security of PRE and the access control model used in Fabric-ABAC is discussed to show that a secure environment for data sharing is provided. Moreover, the completeness of the implementation and effectiveness of the system performance in the multi-domain environment is demonstrated in the experimental results.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"3 1","pages":"18-34"},"PeriodicalIF":0.0,"publicationDate":"2023-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12022","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50133409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A remote and cost-optimized voting system using blockchain and smart contract 使用区块链和智能合约的远程成本优化投票系统
Pub Date : 2023-01-05 DOI: 10.1049/blc2.12021
Mohammad Nabiluzzaman Neloy, Md. Abdul Wahab, Sheikh Wasif, Abdulla All Noman, Mustafizur Rahaman, Tahmid Hasan Pranto, A. K. M. Bahalul Haque, Rashedur M. Rahman

Traditional voting procedures are non-remote, time-consuming, and less secure. While the voter believes their vote was submitted successfully, the authority does not provide evidence that the vote was counted and tallied. In most cases, the anonymity of a voter is also not sure, as the voter's details are included in the ballot papers. Many voters consider this voting system untrustworthy and manipulative, discouraging them from voting, and consequently, an election loses a significant number of participants. Although the inclusion of electronic voting systems (EVS) has increased efficiency; however, it has raised concerns over security, legitimacy, and transparency. To mitigate these problems, blockchain technology has been leveraged and smart contract facilities with a combination of artificial intelligence (AI) to propose a remote voting system that makes the overall voting procedure transparent, semi-decentralized, and secure. In addition, a system that aids in boosting the number of turnouts in an election through an incentivization policy for the voters have also developed. Through the proposed virtual campaigning feature, the authority can generate a decent amount of revenue, which downsizes the overall cost of an election. To reduce the associated cost of transactions using smart contracts, this system implements a hybrid storage system where only a few cardinal data are stored in the blockchain network.

传统的投票程序是非远程、耗时且不太安全的。虽然选民相信他们的选票被成功提交,但当局没有提供证据证明选票被清点和计票。在大多数情况下,选民的匿名性也不确定,因为选票中包含了选民的详细信息。许多选民认为这种投票系统不可信,操纵性强,阻碍了他们投票,因此,选举失去了大量参与者。尽管电子投票系统(EVS)的加入提高了效率;然而,它引发了人们对安全性、合法性和透明度的担忧。为了缓解这些问题,区块链技术和智能合约设施与人工智能(AI)相结合,提出了一种远程投票系统,使整个投票过程透明、半去中心化和安全。此外,还制定了一个系统,通过对选民的激励政策来帮助提高选举的投票率。通过拟议的虚拟竞选功能,当局可以产生可观的收入,从而降低选举的总体成本。为了降低使用智能合约进行交易的相关成本,该系统实现了一个混合存储系统,其中只有少数基本数据存储在区块链网络中。
{"title":"A remote and cost-optimized voting system using blockchain and smart contract","authors":"Mohammad Nabiluzzaman Neloy,&nbsp;Md. Abdul Wahab,&nbsp;Sheikh Wasif,&nbsp;Abdulla All Noman,&nbsp;Mustafizur Rahaman,&nbsp;Tahmid Hasan Pranto,&nbsp;A. K. M. Bahalul Haque,&nbsp;Rashedur M. Rahman","doi":"10.1049/blc2.12021","DOIUrl":"https://doi.org/10.1049/blc2.12021","url":null,"abstract":"<p>Traditional voting procedures are non-remote, time-consuming, and less secure. While the voter believes their vote was submitted successfully, the authority does not provide evidence that the vote was counted and tallied. In most cases, the anonymity of a voter is also not sure, as the voter's details are included in the ballot papers. Many voters consider this voting system untrustworthy and manipulative, discouraging them from voting, and consequently, an election loses a significant number of participants. Although the inclusion of electronic voting systems (EVS) has increased efficiency; however, it has raised concerns over security, legitimacy, and transparency. To mitigate these problems, blockchain technology has been leveraged and smart contract facilities with a combination of artificial intelligence (AI) to propose a remote voting system that makes the overall voting procedure transparent, semi-decentralized, and secure. In addition, a system that aids in boosting the number of turnouts in an election through an incentivization policy for the voters have also developed. Through the proposed virtual campaigning feature, the authority can generate a decent amount of revenue, which downsizes the overall cost of an election. To reduce the associated cost of transactions using smart contracts, this system implements a hybrid storage system where only a few cardinal data are stored in the blockchain network.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"3 1","pages":"1-17"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12021","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50130380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Blockchain technology in energy systems: A state-of-the-art review 能源系统中的区块链技术:最新综述
Pub Date : 2022-12-21 DOI: 10.1049/blc2.12020
Moein Choobineh, Ali Arabnya, Behrouz Sohrabi, Amin Khodaei, Aleksi Paaso

Blockchain is a powerful technology to facilitate decarbonization, decentralization, digitalization, and democratization (4D's) of the energy systems of the future. The 4D's are the driving forces of transition into new energy systems that are more sustainable, resilient, efficient, and equitable. Although this technology can be applied to a wide spectrum of applications in the power sector, a set of challenges and limitations still need to be addressed to facilitate a full-scope implementation in energy systems. This paper presents an overview of blockchain technology from its inception through its most recent evolution and presents a thematic review of state of the art in the application of this technology in power systems. Further, it addresses the barriers preventing the power sector from large-scale, full-scope adoption of this technology. Finally, the emerging blockchain trends in the near future will be discussed and its potential to facilitate a secure, decentralized energy trading platform will be investigated.

区块链是一种强大的技术,可以促进未来能源系统的脱碳、去中心化、数字化和民主化(4D)。4D是向更可持续、更有弹性、更高效、更公平的新能源系统过渡的驱动力。尽管这项技术可以应用于电力部门的广泛应用,但仍需要解决一系列挑战和限制,以促进在能源系统中的全面实施。本文概述了区块链技术从诞生到最近的发展,并对该技术在电力系统中的应用现状进行了专题回顾。此外,它还解决了阻碍电力部门大规模、全面采用这项技术的障碍。最后,将讨论近期新兴的区块链趋势,并研究其促进安全、去中心化能源交易平台的潜力。
{"title":"Blockchain technology in energy systems: A state-of-the-art review","authors":"Moein Choobineh,&nbsp;Ali Arabnya,&nbsp;Behrouz Sohrabi,&nbsp;Amin Khodaei,&nbsp;Aleksi Paaso","doi":"10.1049/blc2.12020","DOIUrl":"https://doi.org/10.1049/blc2.12020","url":null,"abstract":"<p>Blockchain is a powerful technology to facilitate decarbonization, decentralization, digitalization, and democratization (4D's) of the energy systems of the future. The 4D's are the driving forces of transition into new energy systems that are more sustainable, resilient, efficient, and equitable. Although this technology can be applied to a wide spectrum of applications in the power sector, a set of challenges and limitations still need to be addressed to facilitate a full-scope implementation in energy systems. This paper presents an overview of blockchain technology from its inception through its most recent evolution and presents a thematic review of state of the art in the application of this technology in power systems. Further, it addresses the barriers preventing the power sector from large-scale, full-scope adoption of this technology. Finally, the emerging blockchain trends in the near future will be discussed and its potential to facilitate a secure, decentralized energy trading platform will be investigated.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"3 1","pages":"35-59"},"PeriodicalIF":0.0,"publicationDate":"2022-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12020","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50148411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Building trust via blockchain in UAV-assisted ultra-dense 6G cellular networks 在无人机辅助的超密集6G蜂窝网络中通过区块链建立信任
Pub Date : 2022-12-05 DOI: 10.1049/blc2.12018
Taotao Wang, Long Shi, Jessie Hui Wang, Zhe Wang, Xiumei Deng, Jun Li, Shengli Zhang

The ultra-dense deployment of unmanned aerial vehicles (UAVs) as mobile small cell base stations (SBS) is expected to support ultra-high-speed, ultra-reliable, and ultra-low-latency wireless connections in sixth generation (6G) wireless cellular networks. Inevitably, the explosively increasing number of SBSs each with ever-shrinking cell size will result in the spectrum scarcity and pose critical challenges to the spectrum management. Towards the centralized spectrum management system, a third-party authority is employed to coordinate the spectrum sensing, sharing, and allocation among participants. However, a centralized authority is vulnerable to numerous security threats, such as single point of failure, denial of service attacks, and privacy disclosure, and cannot guarantee fair and efficient spectrum management without mutual trusts among participants. To address these problems, a novel framework of blockchain-aided spectrum management is designed to securely record the spectrum auction data and spectrum allocation data in the decentralized spectrum sharing. Moreover, a trust management scheme is proposed to evaluate the trusts of all UAVs participating in the decentralized spectrum sharing, where the trust increase depends on legal use of spectrum allocation and honest report of spectrum sensing. In particular, it is shown that the proposed trust management can not only incentivize the UAVs to comply with the legal rule of spectrum sharing in blockchain, but also punish the malicious behaviour that either violates the spectrum sharing rule or provides misleading spectrum sensing results.

无人机(uav)作为移动小型蜂窝基站(SBS)的超密集部署预计将支持第六代(6G)无线蜂窝网络中的超高速、超可靠和超低延迟无线连接。随着基站数量的爆炸式增长和小区尺寸的不断缩小,不可避免地会导致频谱稀缺,给频谱管理带来严峻挑战。在集中式频谱管理系统中,通过第三方授权机构来协调参与者之间的频谱感知、共享和分配。但是,集中式机构容易受到单点故障、拒绝服务攻击、隐私泄露等安全威胁,如果参与者之间没有相互信任,就无法保证公平高效的频谱管理。为了解决这些问题,设计了一种新的区块链辅助频谱管理框架,以安全地记录分散频谱共享中的频谱拍卖数据和频谱分配数据。此外,提出了一种信任管理方案来评估参与分散频谱共享的所有无人机的信任,其中信任的增加取决于频谱分配的合法使用和频谱感知的诚实报告。具体而言,所提出的信任管理不仅可以激励无人机遵守区块链频谱共享的法律规则,还可以惩罚违反频谱共享规则或提供误导性频谱感知结果的恶意行为。
{"title":"Building trust via blockchain in UAV-assisted ultra-dense 6G cellular networks","authors":"Taotao Wang,&nbsp;Long Shi,&nbsp;Jessie Hui Wang,&nbsp;Zhe Wang,&nbsp;Xiumei Deng,&nbsp;Jun Li,&nbsp;Shengli Zhang","doi":"10.1049/blc2.12018","DOIUrl":"10.1049/blc2.12018","url":null,"abstract":"<p>The ultra-dense deployment of unmanned aerial vehicles (UAVs) as mobile small cell base stations (SBS) is expected to support ultra-high-speed, ultra-reliable, and ultra-low-latency wireless connections in sixth generation (6G) wireless cellular networks. Inevitably, the explosively increasing number of SBSs each with ever-shrinking cell size will result in the spectrum scarcity and pose critical challenges to the spectrum management. Towards the centralized spectrum management system, a third-party authority is employed to coordinate the spectrum sensing, sharing, and allocation among participants. However, a centralized authority is vulnerable to numerous security threats, such as single point of failure, denial of service attacks, and privacy disclosure, and cannot guarantee fair and efficient spectrum management without mutual trusts among participants. To address these problems, a novel framework of blockchain-aided spectrum management is designed to securely record the spectrum auction data and spectrum allocation data in the decentralized spectrum sharing. Moreover, a trust management scheme is proposed to evaluate the trusts of all UAVs participating in the decentralized spectrum sharing, where the trust increase depends on legal use of spectrum allocation and honest report of spectrum sensing. In particular, it is shown that the proposed trust management can not only incentivize the UAVs to comply with the legal rule of spectrum sharing in blockchain, but also punish the malicious behaviour that either violates the spectrum sharing rule or provides misleading spectrum sensing results.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"2 3-4","pages":"67-76"},"PeriodicalIF":0.0,"publicationDate":"2022-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12018","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83048462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A survey of cyber attacks on blockchain based IoT systems for industry 4.0 工业4.0基于区块链的物联网系统的网络攻击调查
Pub Date : 2022-11-19 DOI: 10.1049/blc2.12017
Aarju Dixit, A. Trivedi, W. W. Godfrey
{"title":"A survey of cyber attacks on blockchain based IoT systems for industry 4.0","authors":"Aarju Dixit, A. Trivedi, W. W. Godfrey","doi":"10.1049/blc2.12017","DOIUrl":"https://doi.org/10.1049/blc2.12017","url":null,"abstract":"","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"28 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89418153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Bitcoin transactions as a graph 比特币交易的图表
Pub Date : 2022-09-08 DOI: 10.1049/blc2.12016
Zhensheng Di, Guan Wang, Lili Jia, Zhuoyi Chen

Nowadays, blockchain is an upcoming area for researchers from different research fields. Bitcoin, as the first successful cryptocurrency, has accumulated numerous data after its existence. Here, the Bitcoin transaction graph from a graph theory perspective is investigated with more available data given now. This paper mainly focuses on the transaction graph and provides researchers with both practical and theoretical sides of the data. Several existent measurements and some newer ones are first computed and analysed. These measurements help to interpret the transaction graph more extensively. A new modified Buckley–Osthus random graph model is proposed, and a simulation of the Chung–Lu model is attempted to represent the Bitcoin transaction network. Some suggestions are given to improve the modified Buckley–Osthus model and point out the pros and cons of these random graph models. Moreover, the experiments show that scale-free networks are fundamentally not a good model for Bitcoin transaction networks considering all the data, but the mechanics of preferential attachment is crucial. How to proceed with Bitcoin transaction graph theory from both theoretical and experimental perspectives for future studies is also discussed and analysed.

如今,区块链是来自不同研究领域的研究人员的一个即将到来的领域。比特币作为第一个成功的加密货币,自诞生以来积累了大量的数据。在这里,从图论的角度研究了比特币交易图,并给出了更多的可用数据。本文主要关注交易图,为研究人员提供了数据的实践和理论两个方面。首先计算和分析了几种已有的测量值和一些较新的测量值。这些度量有助于更广泛地解释事务图。提出了一种新的改进的Buckley-Osthus随机图模型,并尝试模拟Chung-Lu模型来表示比特币交易网络。对改进后的Buckley-Osthus模型提出了改进建议,并指出了这些随机图模型的优缺点。此外,实验表明,考虑到所有数据,无标度网络从根本上来说不是比特币交易网络的好模型,但优先依恋机制至关重要。本文还对如何从理论和实验两方面着手比特币交易图理论进行了探讨和分析。
{"title":"Bitcoin transactions as a graph","authors":"Zhensheng Di,&nbsp;Guan Wang,&nbsp;Lili Jia,&nbsp;Zhuoyi Chen","doi":"10.1049/blc2.12016","DOIUrl":"10.1049/blc2.12016","url":null,"abstract":"<p>Nowadays, blockchain is an upcoming area for researchers from different research fields. Bitcoin, as the first successful cryptocurrency, has accumulated numerous data after its existence. Here, the Bitcoin transaction graph from a graph theory perspective is investigated with more available data given now. This paper mainly focuses on the transaction graph and provides researchers with both practical and theoretical sides of the data. Several existent measurements and some newer ones are first computed and analysed. These measurements help to interpret the transaction graph more extensively. A new modified Buckley–Osthus random graph model is proposed, and a simulation of the Chung–Lu model is attempted to represent the Bitcoin transaction network. Some suggestions are given to improve the modified Buckley–Osthus model and point out the pros and cons of these random graph models. Moreover, the experiments show that scale-free networks are fundamentally not a good model for Bitcoin transaction networks considering all the data, but the mechanics of preferential attachment is crucial. How to proceed with Bitcoin transaction graph theory from both theoretical and experimental perspectives for future studies is also discussed and analysed.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"2 3-4","pages":"57-66"},"PeriodicalIF":0.0,"publicationDate":"2022-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12016","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75220088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
IET Blockchain
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1