首页 > 最新文献

International Journal of Network Management最新文献

英文 中文
IGXSS: XSS payload detection model based on inductive GCN IGXSS:基于感应式 GCN 的 XSS 有效载荷检测模型
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-02-11 DOI: 10.1002/nem.2264
Qiuhua Wang, Chuangchuang Li, Dong Wang, Lifeng Yuan, Gaoning Pan, Yanyu Cheng, Mingde Hu, Yizhi Ren

To facilitate the management, Internet of Things (IoT) vendors usually apply remote ways such as HTTP services to uniformly manage IoT devices, leading to traditional web application vulnerabilities that also endanger the cloud interfaces of IoT, such as cross-site scripting (XSS), code injection, and Remote Command/Code Execute (RCE). XSS is one of the most common web application attacks, which allows the attacker to obtain private user information or attack IoT devices and IoT cloud platforms. Most of the existing XSS payload detection models are based on machine learning or deep learning, which usually require a lot of external resources, such as pretrained word vectors, to achieve a better performance on unknown samples. But in the field of XSS payload detection, high-quality vector representations of samples are often difficult to obtain. In addition, existing models all perform substantially worse when the distribution of XSS payloads and benign samples in the test dataset is extremely unbalanced (e.g., XSS payloads: benign samples = 1: 20). While in the real XSS attack scenario against IoT, an XSS payload is often hidden in a massive amount of normal user requests, indicating that these models are not practical. In response to the above issues, we propose an XSS payload detection model based on inductive graph neural networks, IGXSS (XSS payload detection model based on inductive GCN), to detect XSS payloads targeting IoT. Firstly, we treat the samples and words obtained from segmenting the samples as nodes and attach lines between them in order to form a graph. Then, we obtain the feature matrix of nodes and edges utilizing information between nodes only (instead of external resources such as pretrained word vectors). Finally, we feed the obtained feature matrix into a two-layer GCN for training and validate the performance of models in several datasets with different sample distributions. Extensive experiments on the real datasets show that IGXSS performs better compared to other models under various sample distributions. In particular, when the sample distribution is extremely unbalanced, the recall and F1 score of IGXSS still reach 1.000 and 0.846, demonstrating that IGXSS is more robust and more suitable for practical scenarios.

为方便管理,物联网(IoT)厂商通常采用 HTTP 服务等远程方式统一管理物联网设备,导致传统的 Web 应用程序漏洞也危及物联网云接口,如跨站脚本(XSS)、代码注入和远程命令/代码执行(RCE)等。XSS 是最常见的网络应用程序攻击之一,攻击者可借此获取用户隐私信息或攻击物联网设备和物联网云平台。现有的 XSS 有效载荷检测模型大多基于机器学习或深度学习,通常需要大量外部资源(如预训练的词向量)才能在未知样本上取得更好的性能。但在 XSS 有效载荷检测领域,通常很难获得高质量的样本向量表示。此外,当测试数据集中 XSS 有效载荷和良性样本的分布极不平衡时(例如,XSS 有效载荷:良性样本 = 1:20),现有模型的性能都会大大降低。而在针对物联网的真实 XSS 攻击场景中,XSS 有效载荷往往隐藏在大量正常用户请求中,这表明这些模型并不实用。针对上述问题,我们提出了一种基于归纳图神经网络的 XSS 有效载荷检测模型 IGXSS(基于归纳图神经网络的 XSS 有效载荷检测模型),用于检测针对物联网的 XSS 有效载荷。首先,我们将样本和样本分割后得到的单词视为节点,并在它们之间添加线段以形成图。然后,我们仅利用节点之间的信息(而不是预训练词向量等外部资源)获得节点和边的特征矩阵。最后,我们将获得的特征矩阵输入双层 GCN 进行训练,并在多个具有不同样本分布的数据集上验证模型的性能。在真实数据集上进行的大量实验表明,IGXSS 在各种样本分布情况下的表现都优于其他模型。特别是在样本分布极不平衡的情况下,IGXSS 的召回率和 F1 得分仍能达到 1.000 和 0.846,这表明 IGXSS 更稳健,更适合实际应用场景。
{"title":"IGXSS: XSS payload detection model based on inductive GCN","authors":"Qiuhua Wang,&nbsp;Chuangchuang Li,&nbsp;Dong Wang,&nbsp;Lifeng Yuan,&nbsp;Gaoning Pan,&nbsp;Yanyu Cheng,&nbsp;Mingde Hu,&nbsp;Yizhi Ren","doi":"10.1002/nem.2264","DOIUrl":"10.1002/nem.2264","url":null,"abstract":"<p>To facilitate the management, Internet of Things (IoT) vendors usually apply remote ways such as HTTP services to uniformly manage IoT devices, leading to traditional web application vulnerabilities that also endanger the cloud interfaces of IoT, such as cross-site scripting (XSS), code injection, and Remote Command/Code Execute (RCE). XSS is one of the most common web application attacks, which allows the attacker to obtain private user information or attack IoT devices and IoT cloud platforms. Most of the existing XSS payload detection models are based on machine learning or deep learning, which usually require a lot of external resources, such as pretrained word vectors, to achieve a better performance on unknown samples. But in the field of XSS payload detection, high-quality vector representations of samples are often difficult to obtain. In addition, existing models all perform substantially worse when the distribution of XSS payloads and benign samples in the test dataset is extremely unbalanced (e.g., XSS payloads: benign samples = 1: 20). While in the real XSS attack scenario against IoT, an XSS payload is often hidden in a massive amount of normal user requests, indicating that these models are not practical. In response to the above issues, we propose an XSS payload detection model based on inductive graph neural networks, IGXSS (XSS payload detection model based on inductive GCN), to detect XSS payloads targeting IoT. Firstly, we treat the samples and words obtained from segmenting the samples as nodes and attach lines between them in order to form a graph. Then, we obtain the feature matrix of nodes and edges utilizing information between nodes only (instead of external resources such as pretrained word vectors). Finally, we feed the obtained feature matrix into a two-layer GCN for training and validate the performance of models in several datasets with different sample distributions. Extensive experiments on the real datasets show that IGXSS performs better compared to other models under various sample distributions. In particular, when the sample distribution is extremely unbalanced, the recall and F1 score of IGXSS still reach 1.000 and 0.846, demonstrating that IGXSS is more robust and more suitable for practical scenarios.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 6","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139773683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reducing the propagation delay of compact block in Bitcoin network 减少紧凑型区块在比特币网络中的传播延迟
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-25 DOI: 10.1002/nem.2262
Aeri Kim, Meryam Essaid, Sejin Park, Hongtaek Ju

Bitcoin is a Blockchain-based network in which thousands of nodes are directly connected and communicate via a gossip-based flooding protocol. Mined blocks are propagated to all participating nodes in the network through a CBR (compact block relay) protocol developed to reduce the block propagation delay. However, propagation delay persists. The relay time between nodes must be measured and analyzed to determine the cause of the delay and provide solutions for reducing block propagation time. Previously, we measured the relay time and investigated the cause of the delay. According to the findings of the previous study, the delay of the relay time occurs when assembling compact blocks, depending on whether transactions are requested. In this paper, we find the reasons for requesting transactions. The reasons are due to the transaction propagation method and the characteristics of the transaction itself. We propose a solution based on this. It is a method of reducing probability of requesting transactions by using the compact block's “PREFILLEDTXN” to send the transactions expected to be requested with the block. The probability of requesting is reduced by up to 67% when transactions that have just entered the memory pool are propagated by PREFILLEDTXN. The block relay time is reduced by up to 44% as a result. Finally, this research reduces block relay time between nodes.

比特币是一个基于区块链的网络,在这个网络中,成千上万的节点直接相连,并通过基于流言的泛洪协议进行通信。挖出的区块通过 CBR(紧凑型区块中继)协议传播到网络中的所有参与节点,以减少区块传播延迟。然而,传播延迟依然存在。必须测量和分析节点之间的中继时间,以确定延迟的原因,并提供缩短区块传播时间的解决方案。此前,我们测量了中继时间,并调查了延迟的原因。根据之前的研究结果,中继时间的延迟发生在组装紧凑块时,取决于是否有事务请求。在本文中,我们找到了请求事务的原因。原因在于事务传播方式和事务本身的特性。在此基础上,我们提出了一种解决方案。这是一种通过使用紧凑区块的 "PREFILLEDTXN "来发送预计与该区块一起被请求的事务,从而降低请求事务概率的方法。通过 PREFILLEDTXN 传播刚进入内存池的事务时,请求概率最多可降低 67%。因此,区块中继时间最多可减少 44%。最后,这项研究缩短了节点之间的区块中继时间。
{"title":"Reducing the propagation delay of compact block in Bitcoin network","authors":"Aeri Kim,&nbsp;Meryam Essaid,&nbsp;Sejin Park,&nbsp;Hongtaek Ju","doi":"10.1002/nem.2262","DOIUrl":"10.1002/nem.2262","url":null,"abstract":"<div>\u0000 \u0000 <p>Bitcoin is a Blockchain-based network in which thousands of nodes are directly connected and communicate via a gossip-based flooding protocol. Mined blocks are propagated to all participating nodes in the network through a CBR (compact block relay) protocol developed to reduce the block propagation delay. However, propagation delay persists. The relay time between nodes must be measured and analyzed to determine the cause of the delay and provide solutions for reducing block propagation time. Previously, we measured the relay time and investigated the cause of the delay. According to the findings of the previous study, the delay of the relay time occurs when assembling compact blocks, depending on whether transactions are requested. In this paper, we find the reasons for requesting transactions. The reasons are due to the transaction propagation method and the characteristics of the transaction itself. We propose a solution based on this. It is a method of reducing probability of requesting transactions by using the compact block's “PREFILLEDTXN” to send the transactions expected to be requested with the block. The probability of requesting is reduced by up to 67% when transactions that have just entered the memory pool are propagated by PREFILLEDTXN. The block relay time is reduced by up to 44% as a result. Finally, this research reduces block relay time between nodes.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 3","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139590560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deeper: A shared liquidity decentralized exchange design for low trading volume tokens to enhance average liquidity 更深入:针对低交易量代币的共享流动性去中心化交易所设计,以提高平均流动性
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-17 DOI: 10.1002/nem.2261
Srisht Fateh Singh, Panagiotis Michalopoulos, Andreas Veneris

This paper presents Deeper, a design for a decentralized exchange that enhances liquidity via reserve sharing. By doing this, it addresses the problem of shallow liquidity in low trading volume token pairs. Shallow liquidity impairs the functioning of on-chain markets by creating room for unwanted phenomena such as high slippage and sandwich attacks. Deeper solves this by allowing liquidity providers of multiple trading pairs against a common token to share liquidity. This is achieved by creating a common reserve pool for the shared token that is accessible by each trading pair. Independent from the shared liquidity, providers are free to add liquidity to individual token pairs without any restriction. The trading between one token pair does not affect the price of other token pairs even though the reserve of the shared token changes. The proposed design is an extension of concentrated liquidity automated market maker DEXs that is simple enough to be implemented on smart contracts. This is demonstrated by providing a template for a hook-based smart contract that adds our custom functionality to Uniswap V4. Experiments on historical prices show that for a batch consisting of eight trading pairs, Deeper enhances liquidity by over 2.6–5.9×. The enhancement in liquidity can be increased further by increasing the participating tokens in the shared pool. While providing shared liquidity, liquidity providers should be cautious of certain risks and pitfalls, which are described. Overall, Deeper enables the creation of fair markets for low trading volume token pairs.

本文介绍的 Deeper 是一种去中心化交易所的设计,它通过储备金共享来提高流动性。通过这种方式,它可以解决低交易量代币对的浅层流动性问题。浅层流动性为高滑点和三明治攻击等不必要的现象创造了空间,从而损害了链上市场的运作。Deeper 允许针对共同代币的多个交易对的流动性提供者共享流动性,从而解决了这一问题。这是通过为共享代币创建一个每个交易对都能访问的共同储备池来实现的。独立于共享流动性,流动性提供者可以自由地为单个代币对增加流动性,不受任何限制。即使共享代币的储备发生变化,一个代币对之间的交易也不会影响其他代币对的价格。所提出的设计是集中流动性自动做市商 DEX 的扩展,简单得足以在智能合约上实现。我们提供了一个基于钩子的智能合约模板,将我们的定制功能添加到 Uniswap V4 中,从而证明了这一点。对历史价格的实验表明,对于由 8 个交易对组成的批量交易,Deeper 可将流动性提高 2.6-5.9×$$ 5.9/times $$。通过增加共享池中的参与代币,可以进一步提高流动性。在提供共享流动性的同时,流动性提供者应谨慎对待某些风险和陷阱,下文将对此进行介绍。总体而言,Deeper 能够为低交易量的代币对创建公平的市场。
{"title":"Deeper: A shared liquidity decentralized exchange design for low trading volume tokens to enhance average liquidity","authors":"Srisht Fateh Singh,&nbsp;Panagiotis Michalopoulos,&nbsp;Andreas Veneris","doi":"10.1002/nem.2261","DOIUrl":"10.1002/nem.2261","url":null,"abstract":"<p>This paper presents <span>Deeper</span>, a design for a decentralized exchange that enhances liquidity via reserve sharing. By doing this, it addresses the problem of shallow liquidity in low trading volume token pairs. Shallow liquidity impairs the functioning of on-chain markets by creating room for unwanted phenomena such as high slippage and sandwich attacks. <span>Deeper</span> solves this by allowing liquidity providers of multiple trading pairs against a common token to share liquidity. This is achieved by creating a common reserve pool for the shared token that is accessible by each trading pair. Independent from the shared liquidity, providers are free to add liquidity to individual token pairs without any restriction. The trading between one token pair does not affect the price of other token pairs even though the reserve of the shared token changes. The proposed design is an extension of concentrated liquidity automated market maker DEXs that is simple enough to be implemented on smart contracts. This is demonstrated by providing a template for a hook-based smart contract that adds our custom functionality to <span>Uniswap V4</span>. Experiments on historical prices show that for a batch consisting of eight trading pairs, <span>Deeper</span> enhances liquidity by over 2.6–\u0000<span></span><math>\u0000 <mn>5</mn>\u0000 <mo>.</mo>\u0000 <mn>9</mn>\u0000 <mo>×</mo></math>. The enhancement in liquidity can be increased further by increasing the participating tokens in the shared pool. While providing shared liquidity, liquidity providers should be cautious of certain risks and pitfalls, which are described. Overall, <span>Deeper</span> enables the creation of fair markets for low trading volume token pairs.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 4","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.2261","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139498570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The next phase of identifying illicit activity in Bitcoin 识别比特币非法活动的下一阶段
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-15 DOI: 10.1002/nem.2259
Jack Nicholls, Aditya Kuppa, Nhien-An Le-Khac

Identifying illicit behavior in the Bitcoin network is a well-explored topic. The methods proposed over time have generated great insights into the deanonymization of the Bitcoin user base through the clustering of inputs and outputs. With advanced techniques being deployed by Bitcoin users, these heuristics are now being challenged in their ability to aid in the detection of illicit activity. In this paper, we provide a comprehensive list of methods deployed by malicious actors on the network and illicit transaction mining methods. We detail the evolution of the heuristics that are used to deanonymize Bitcoin transactions. We highlight the issues associated with conducting law enforcement investigations and propose recommendations for the research community to address these issues. Our recommendations include the release of public data by exchanges to allow researchers and law enforcement to further protect the network from malicious users. We recommend the enhancement of current heuristics through machine learning methods and discuss how researchers can take the fight head-on against expert cybercriminals.

识别比特币网络中的非法行为是一个经过深入探讨的课题。随着时间的推移,所提出的方法通过对输入和输出的聚类,对比特币用户群的去匿名化产生了深刻的见解。随着比特币用户采用先进技术,这些启发式方法在帮助检测非法活动方面的能力受到了挑战。在本文中,我们提供了一份恶意行为者在网络上部署的方法和非法交易挖掘方法的综合清单。我们详细介绍了用于比特币交易去匿名化的启发式方法的演变。我们强调了与开展执法调查相关的问题,并为研究界提出了解决这些问题的建议。我们的建议包括由交易所发布公共数据,以便研究人员和执法部门进一步保护网络免受恶意用户的侵害。我们建议通过机器学习方法增强当前的启发式方法,并讨论了研究人员如何与网络犯罪专家正面交锋。
{"title":"The next phase of identifying illicit activity in Bitcoin","authors":"Jack Nicholls,&nbsp;Aditya Kuppa,&nbsp;Nhien-An Le-Khac","doi":"10.1002/nem.2259","DOIUrl":"10.1002/nem.2259","url":null,"abstract":"<p>Identifying illicit behavior in the Bitcoin network is a well-explored topic. The methods proposed over time have generated great insights into the deanonymization of the Bitcoin user base through the clustering of inputs and outputs. With advanced techniques being deployed by Bitcoin users, these heuristics are now being challenged in their ability to aid in the detection of illicit activity. In this paper, we provide a comprehensive list of methods deployed by malicious actors on the network and illicit transaction mining methods. We detail the evolution of the heuristics that are used to deanonymize Bitcoin transactions. We highlight the issues associated with conducting law enforcement investigations and propose recommendations for the research community to address these issues. Our recommendations include the release of public data by exchanges to allow researchers and law enforcement to further protect the network from malicious users. We recommend the enhancement of current heuristics through machine learning methods and discuss how researchers can take the fight head-on against expert cybercriminals.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 5","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.2259","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139499005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TPAAD: Two-phase authentication system for denial of service attack detection and mitigation using machine learning in software-defined network TPAAD:在软件定义网络中利用机器学习检测和缓解拒绝服务攻击的两阶段认证系统
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-12 DOI: 10.1002/nem.2258
Najmun Nisa, Adnan Shahid Khan, Zeeshan Ahmad, Johari Abdullah

Software-defined networking (SDN) has received considerable attention and adoption owing to its inherent advantages, such as enhanced scalability, increased adaptability, and the ability to exercise centralized control. However, the control plane of the system is vulnerable to denial-of-service (DoS) attacks, which are a primary focus for attackers. These attacks have the potential to result in substantial delays and packet loss. In this study, we present a novel system called Two-Phase Authentication for Attack Detection that aims to enhance the security of SDN by mitigating DoS attacks. The methodology utilized in our study involves the implementation of packet filtration and machine learning classification techniques, which are subsequently followed by the targeted restriction of malevolent network traffic. Instead of completely deactivating the host, the emphasis lies on preventing harmful communication. Support vector machine and K-nearest neighbours algorithms were utilized for efficient detection on the CICDoS 2017 dataset. The deployed model was utilized within an environment designed for the identification of threats in SDN. Based on the observations of the banned queue, our system allows a host to reconnect when it is no longer contributing to malicious traffic. The experiments were run on a VMware Ubuntu, and an SDN environment was created using Mininet and the RYU controller. The results of the tests demonstrated enhanced performance in various aspects, including the reduction of false positives, the minimization of central processing unit utilization and control channel bandwidth consumption, the improvement of packet delivery ratio, and the decrease in the number of flow requests submitted to the controller. These results confirm that our Two-Phase Authentication for Attack Detection architecture identifies and mitigates SDN DoS attacks with low overhead.

软件定义网络(SDN)因其固有的优势(如增强的可扩展性、更高的适应性和集中控制能力)而受到广泛关注和采用。然而,系统的控制平面容易受到拒绝服务(DoS)攻击,这是攻击者的主要关注点。这些攻击有可能导致严重的延迟和数据包丢失。在本研究中,我们提出了一种名为 "攻击检测两阶段认证 "的新型系统,旨在通过缓解 DoS 攻击来增强 SDN 的安全性。我们的研究采用的方法包括实施数据包过滤和机器学习分类技术,随后有针对性地限制恶意网络流量。重点在于防止有害通信,而不是完全停用主机。支持向量机和 K-nearest neighbours 算法被用于对 CICDoS 2017 数据集进行高效检测。部署的模型是在为识别 SDN 中的威胁而设计的环境中使用的。根据对禁止队列的观察,我们的系统允许主机在不再产生恶意流量时重新连接。实验在 VMware Ubuntu 上运行,并使用 Mininet 和 RYU 控制器创建了 SDN 环境。测试结果表明各方面的性能都有所提高,包括减少误报、最大限度地降低中央处理单元利用率和控制通道带宽消耗、提高数据包交付率以及减少提交给控制器的流量请求数量。这些结果证实了我们的攻击检测两阶段认证架构能以较低的开销识别和缓解 SDN DoS 攻击。
{"title":"TPAAD: Two-phase authentication system for denial of service attack detection and mitigation using machine learning in software-defined network","authors":"Najmun Nisa,&nbsp;Adnan Shahid Khan,&nbsp;Zeeshan Ahmad,&nbsp;Johari Abdullah","doi":"10.1002/nem.2258","DOIUrl":"10.1002/nem.2258","url":null,"abstract":"<p>Software-defined networking (SDN) has received considerable attention and adoption owing to its inherent advantages, such as enhanced scalability, increased adaptability, and the ability to exercise centralized control. However, the control plane of the system is vulnerable to denial-of-service (DoS) attacks, which are a primary focus for attackers. These attacks have the potential to result in substantial delays and packet loss. In this study, we present a novel system called Two-Phase Authentication for Attack Detection that aims to enhance the security of SDN by mitigating DoS attacks. The methodology utilized in our study involves the implementation of packet filtration and machine learning classification techniques, which are subsequently followed by the targeted restriction of malevolent network traffic. Instead of completely deactivating the host, the emphasis lies on preventing harmful communication. Support vector machine and K-nearest neighbours algorithms were utilized for efficient detection on the CICDoS 2017 dataset. The deployed model was utilized within an environment designed for the identification of threats in SDN. Based on the observations of the banned queue, our system allows a host to reconnect when it is no longer contributing to malicious traffic. The experiments were run on a VMware Ubuntu, and an SDN environment was created using Mininet and the RYU controller. The results of the tests demonstrated enhanced performance in various aspects, including the reduction of false positives, the minimization of central processing unit utilization and control channel bandwidth consumption, the improvement of packet delivery ratio, and the decrease in the number of flow requests submitted to the controller. These results confirm that our Two-Phase Authentication for Attack Detection architecture identifies and mitigates SDN DoS attacks with low overhead.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 3","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.2258","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139515576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fractional non-fungible tokens: Overview, evaluation, marketplaces, and challenges 分数型不可兑换代币:概述、评估、市场和挑战
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-11 DOI: 10.1002/nem.2260
Wonseok Choi, Jongsoo Woo, James Won-Ki Hong

Fractional non-fungible tokens (NFTs) have emerged at the forefront of blockchain innovation, merging tokenization, NFTs, and fractional ownership to democratize access to high-value digital assets. In this paper, we explore the fundamental concepts of blockchain technology, smart contracts, NFTs, and tokenization to lay the groundwork for understanding fractional NFTs. We investigate key ERC standards, including ERC-20, ERC-721, and ERC-1155, which are pivotal in enabling the creation and management of fractional NFTs on the Ethereum blockchain. Then, we present two major processes in fractional NFTs, minting and reconstitution. We develop fractional NFTs based on ERC standards and evaluate their gas consumption. Furthermore, through a comprehensive review of existing platforms, we analyze their minting and reconstitution processes and underlying ERC standards. Challenges, such as regulatory compliance and security, are also examined. We highlight the significance of robust security measures and transparency to build trust in fractional NFT ecosystems. While the field is still evolving, fractional NFTs have the potential to disrupt traditional ownership models and revolutionize industries. We envision fractional NFTs fostering a more inclusive and decentralized digital economy as technology advances and adoption grows.

分式不可兑换代币(NFTs)已成为区块链创新的前沿,它将代币化、NFTs 和分式所有权融合在一起,实现了高价值数字资产获取的民主化。在本文中,我们将探讨区块链技术、智能合约、NFT 和代币化的基本概念,为理解部分 NFT 奠定基础。我们研究了主要的ERC标准,包括ERC-20、ERC-721和ERC-1155,这些标准在以太坊区块链上创建和管理分数NFT方面起着关键作用。然后,我们介绍了分数 NFT 的两个主要过程:铸币和重组。我们根据 ERC 标准开发了分数 NFT,并对其耗气量进行了评估。此外,通过对现有平台的全面审查,我们分析了它们的铸币和重组流程以及底层 ERC 标准。我们还研究了监管合规性和安全性等挑战。我们强调了稳健的安全措施和透明度对于在分数 NFT 生态系统中建立信任的重要意义。虽然该领域仍在不断发展,但部分式 NFT 有可能颠覆传统的所有权模式,为各行各业带来变革。我们设想,随着技术的进步和应用的增加,部分式 NFT 将促进更具包容性和去中心化的数字经济。
{"title":"Fractional non-fungible tokens: Overview, evaluation, marketplaces, and challenges","authors":"Wonseok Choi,&nbsp;Jongsoo Woo,&nbsp;James Won-Ki Hong","doi":"10.1002/nem.2260","DOIUrl":"10.1002/nem.2260","url":null,"abstract":"<p>Fractional non-fungible tokens (NFTs) have emerged at the forefront of blockchain innovation, merging tokenization, NFTs, and fractional ownership to democratize access to high-value digital assets. In this paper, we explore the fundamental concepts of blockchain technology, smart contracts, NFTs, and tokenization to lay the groundwork for understanding fractional NFTs. We investigate key ERC standards, including ERC-20, ERC-721, and ERC-1155, which are pivotal in enabling the creation and management of fractional NFTs on the Ethereum blockchain. Then, we present two major processes in fractional NFTs, minting and reconstitution. We develop fractional NFTs based on ERC standards and evaluate their gas consumption. Furthermore, through a comprehensive review of existing platforms, we analyze their minting and reconstitution processes and underlying ERC standards. Challenges, such as regulatory compliance and security, are also examined. We highlight the significance of robust security measures and transparency to build trust in fractional NFT ecosystems. While the field is still evolving, fractional NFTs have the potential to disrupt traditional ownership models and revolutionize industries. We envision fractional NFTs fostering a more inclusive and decentralized digital economy as technology advances and adoption grows.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 4","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139462401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel eviction policy based on shortest remaining time for software defined networking flow tables 基于软件定义网络流表最短剩余时间的新型驱逐策略
IF 1.5 4区 计算机科学 Q2 Computer Science Pub Date : 2023-12-21 DOI: 10.1002/nem.2257
Kavi Priya Dhandapani, Mirnalinee Thanganadar Thangathai, Shahul Hamead Haja Moinudeen

Software defined networking is a modern paradigm that divides the control plane from the data plane for improved network manageability. A flow table in the data plane has limited and expensive memory called TCAM. The presence of unwanted flow rules would lead to flow bloat conditions and make the lookup operation inefficient. Eviction schemes based on LRU policy have been widely studied in the literature which preempts the life of the least recently used flow rule and reduces the occupancy of the flow table. LRU considers the past behavior for the eviction of a flow rule. This paper proposes a novel policy that preempts a flow rule by considering its future characteristic, the shortest remaining time (SRT). A rule with a higher probability of being used is avoided from eviction to mitigate the degradation of performance. The modeling of the SRT technique exhibits better utilization of a flow rule that has higher probability of being used. On the other hand, LRU does not guarantee that the evicted flow rule will not be used frequently in the future and it has been shown that an incorrectly evicted flow rule incurs controller delay. The experimental results show that for different traffic rates, SRT has reduced the delay by 15%, reinstallation count by 25%, and jitter by 40%. SRT has increased utilization by 22% compared to LRU.

软件定义网络是一种现代范式,它将控制平面与数据平面分开,以提高网络的可管理性。数据平面中的流量表内存有限且昂贵,称为 TCAM。不需要的流量规则的存在会导致流量膨胀,使查找操作效率低下。基于 LRU 策略的驱逐方案已在文献中得到广泛研究,该方案会抢占最近使用最少的流规则的生命周期,减少流表的占用率。LRU 在驱逐流量规则时考虑了过去的行为。本文提出了一种新策略,即通过考虑流量规则的未来特性--最短剩余时间(SRT)--来抢占流量规则。避免驱逐使用概率较高的规则,以减轻性能下降。SRT 技术的建模表明,被使用概率较高的流量规则能得到更好的利用。另一方面,LRU 并不能保证被驱逐的流量规则在未来不会被频繁使用,而且事实证明,错误驱逐的流量规则会造成控制器延迟。实验结果表明,对于不同的流量,SRT 将延迟减少了 15%,重新安装次数减少了 25%,抖动减少了 40%。与 LRU 相比,SRT 提高了 22% 的利用率。
{"title":"A novel eviction policy based on shortest remaining time for software defined networking flow tables","authors":"Kavi Priya Dhandapani,&nbsp;Mirnalinee Thanganadar Thangathai,&nbsp;Shahul Hamead Haja Moinudeen","doi":"10.1002/nem.2257","DOIUrl":"10.1002/nem.2257","url":null,"abstract":"<div>\u0000 \u0000 <p>Software defined networking is a modern paradigm that divides the control plane from the data plane for improved network manageability. A flow table in the data plane has limited and expensive memory called TCAM. The presence of unwanted flow rules would lead to flow bloat conditions and make the lookup operation inefficient. Eviction schemes based on LRU policy have been widely studied in the literature which preempts the life of the least recently used flow rule and reduces the occupancy of the flow table. LRU considers the past behavior for the eviction of a flow rule. This paper proposes a novel policy that preempts a flow rule by considering its future characteristic, the shortest remaining time (SRT). A rule with a higher probability of being used is avoided from eviction to mitigate the degradation of performance. The modeling of the SRT technique exhibits better utilization of a flow rule that has higher probability of being used. On the other hand, LRU does not guarantee that the evicted flow rule will not be used frequently in the future and it has been shown that an incorrectly evicted flow rule incurs controller delay. The experimental results show that for different traffic rates, SRT has reduced the delay by 15%, reinstallation count by 25%, and jitter by 40%. SRT has increased utilization by 22% compared to LRU.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 3","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138825536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain and crypto forensics: Investigating crypto frauds 区块链和加密货币取证:调查加密货币欺诈
IF 1.5 4区 计算机科学 Q2 Computer Science Pub Date : 2023-12-07 DOI: 10.1002/nem.2255
Udit Agarwal, Vinay Rishiwal, Sudeep Tanwar, Mano Yadav

In the past few years, cryptocurrency has gained widespread acceptance because of its decentralized nature, quick and secure transactions, and potential for investment and speculation. But the increased popularity has also led to increased cryptocurrency fraud, including scams, phishing attacks, Ponzi schemes, and other criminal activities. Although there is little documentation of cryptocurrency fraud, an in-depth study is essential to recognize various scams in different cryptocurrencies. To fill this gap, a study investigated cryptocurrency-related fraud in various cryptocurrencies and provided a taxonomy of crypto-forensics and forensic blockchain. In addition, we have introduced an architecture that integrates artificial intelligence (AI) and blockchain technologies to investigate and protect against instances of cryptocurrency fraud. The suggested design's effectiveness was evaluated using several machine learning (ML) classification algorithms. The conclusion of the evaluation confirmed that the random forest (RF) classifier performed the best, delivering the highest level of accuracy, that is, 97.5%. Once the ML classifiers detect cryptocurrency fraud, the information is securely stored in the InterPlanetary File System (IPFS); the document's hash is also stored in the blockchain using smart contracts. Law enforcement can leverage blockchain technology to secure access to fraudulent cryptographic transactions. The proposed architecture was tested for bandwidth utilization. Despite the potential benefits of blockchain and crypto-forensics, several issues and challenges remain, including privacy concerns, standardization, and difficulty identifying fraud between crypto-currencies. Finally, the paper discusses various problems and challenges in blockchain and crypto forensics to investigate cryptocurrency fraud.

在过去几年中,加密货币因其去中心化的特性、快速安全的交易以及投资和投机的潜力而获得了广泛的认可。但是,加密货币的普及也导致了加密货币欺诈的增加,包括诈骗、网络钓鱼攻击、庞氏骗局和其他犯罪活动。虽然有关加密货币欺诈的文献很少,但深入研究对于识别不同加密货币的各种欺诈行为至关重要。为了填补这一空白,一项研究调查了各种加密货币中与加密货币相关的欺诈行为,并提供了加密取证和区块链取证的分类标准。此外,我们还介绍了一种集成人工智能(AI)和区块链技术的架构,用于调查和防范加密货币欺诈事件。我们使用几种机器学习(ML)分类算法对建议设计的有效性进行了评估。评估结论证实,随机森林(RF)分类器表现最佳,准确率最高,达到 97.5%。一旦 ML 分类器检测到加密货币欺诈,信息就会被安全地存储在跨行星文件系统(IPFS)中;文件的哈希值也会通过智能合约存储在区块链中。执法部门可以利用区块链技术确保对欺诈性加密交易的访问。对拟议的架构进行了带宽利用率测试。尽管区块链和加密取证具有潜在优势,但仍存在一些问题和挑战,包括隐私问题、标准化以及难以识别加密货币之间的欺诈行为。最后,本文讨论了区块链和加密取证在调查加密货币欺诈方面存在的各种问题和挑战。
{"title":"Blockchain and crypto forensics: Investigating crypto frauds","authors":"Udit Agarwal,&nbsp;Vinay Rishiwal,&nbsp;Sudeep Tanwar,&nbsp;Mano Yadav","doi":"10.1002/nem.2255","DOIUrl":"10.1002/nem.2255","url":null,"abstract":"<p>In the past few years, cryptocurrency has gained widespread acceptance because of its decentralized nature, quick and secure transactions, and potential for investment and speculation. But the increased popularity has also led to increased cryptocurrency fraud, including scams, phishing attacks, Ponzi schemes, and other criminal activities. Although there is little documentation of cryptocurrency fraud, an in-depth study is essential to recognize various scams in different cryptocurrencies. To fill this gap, a study investigated cryptocurrency-related fraud in various cryptocurrencies and provided a taxonomy of crypto-forensics and forensic blockchain. In addition, we have introduced an architecture that integrates artificial intelligence (AI) and blockchain technologies to investigate and protect against instances of cryptocurrency fraud. The suggested design's effectiveness was evaluated using several machine learning (ML) classification algorithms. The conclusion of the evaluation confirmed that the random forest (RF) classifier performed the best, delivering the highest level of accuracy, that is, 97.5%. Once the ML classifiers detect cryptocurrency fraud, the information is securely stored in the InterPlanetary File System (IPFS); the document's hash is also stored in the blockchain using smart contracts. Law enforcement can leverage blockchain technology to secure access to fraudulent cryptographic transactions. The proposed architecture was tested for bandwidth utilization. Despite the potential benefits of blockchain and crypto-forensics, several issues and challenges remain, including privacy concerns, standardization, and difficulty identifying fraud between crypto-currencies. Finally, the paper discusses various problems and challenges in blockchain and crypto forensics to investigate cryptocurrency fraud.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 2","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138561650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Residual based temporal attention convolutional neural network for detection of distributed denial of service attacks in software defined network integrated vehicular adhoc network 基于残差的时空注意力卷积神经网络用于检测软件定义网络集成车载 adhoc 网络中的分布式拒绝服务攻击
IF 1.5 4区 计算机科学 Q2 Computer Science Pub Date : 2023-12-06 DOI: 10.1002/nem.2256
V. Karthik, R. Lakshmi, Salini Abraham, M. Ramkumar

Software defined network (SDN) integrated vehicular ad hoc network (VANET) is a magnificent technique for smart transportation as it raises the efficiency, safety, manageability, and comfort of traffic. SDN-integrated VANET (SDN-int-VANET) has numerous benefits, but it is susceptible to threats like distributed denial of service (DDoS). Several methods were suggested for DDoS attack detection (AD), but the existing approaches to optimization have given a base for enhancing the parameters. An incorrect selection of parameters results in a poor performance and poor fit to the data. To overcome these issues, residual-based temporal attention red fox-convolutional neural network (RTARF-CNN) for detecting DDoS attacks in SDN-int-VANET is introduced in this manuscript. The input data is taken from the SDN DDoS attack dataset. For restoring redundancy and missing value, developed random forest and local least squares (DRFLLS) are applied. Then the important features are selected from the pre-processed data with the help of stacked contractive autoencoders (St-CAE), which reduces the processing time of the introduced method. The selected features are classified by residual-based temporal attention-convolutional neural network (RTA-CNN). The weight parameter of RTA-CNN is optimized with the help of red fox optimization (RFO) for better classification. The introduced method is implemented in the PYTHON platform. The RTARF-CNN attains 99.8% accuracy, 99.5% sensitivity, 99.80% precision, and 99.8% specificity. The effectiveness of the introduced technique is compared with the existing approaches.

集成了软件定义网络(SDN)的车载临时网络(VANET)是智能交通的一项重要技术,因为它提高了交通的效率、安全性、可管理性和舒适性。集成了 SDN 的 VANET(SDN-int-VANET)好处多多,但也容易受到分布式拒绝服务(DDoS)等威胁。针对 DDoS 攻击检测(AD)提出了几种方法,但现有的优化方法为增强参数提供了基础。参数选择不正确会导致性能不佳和与数据拟合不良。为了克服这些问题,本稿件介绍了用于检测 SDN-int-VANET 中 DDoS 攻击的基于残差的时空注意力红狐卷积神经网络(RTARF-CNN)。输入数据来自 SDN DDoS 攻击数据集。为恢复冗余和缺失值,应用了开发的随机森林和局部最小二乘法(DRFLLS)。然后,在堆叠收缩自动编码器(St-CAE)的帮助下,从预处理数据中选取重要特征,从而缩短了引入方法的处理时间。所选特征由基于残差的时空注意力卷积神经网络(RTA-CNN)进行分类。RTA-CNN 的权重参数在红狐优化 (RFO) 的帮助下进行了优化,以获得更好的分类效果。引入的方法在PYTHON平台上实现。RTARF-CNN 的准确率达到 99.8%,灵敏度达到 99.5%,精确度达到 99.80%,特异性达到 99.8%。将引入技术的有效性与现有方法进行了比较。
{"title":"Residual based temporal attention convolutional neural network for detection of distributed denial of service attacks in software defined network integrated vehicular adhoc network","authors":"V. Karthik,&nbsp;R. Lakshmi,&nbsp;Salini Abraham,&nbsp;M. Ramkumar","doi":"10.1002/nem.2256","DOIUrl":"10.1002/nem.2256","url":null,"abstract":"<p>Software defined network (SDN) integrated vehicular ad hoc network (VANET) is a magnificent technique for smart transportation as it raises the efficiency, safety, manageability, and comfort of traffic. SDN-integrated VANET (SDN-int-VANET) has numerous benefits, but it is susceptible to threats like distributed denial of service (DDoS). Several methods were suggested for DDoS attack detection (AD), but the existing approaches to optimization have given a base for enhancing the parameters. An incorrect selection of parameters results in a poor performance and poor fit to the data. To overcome these issues, residual-based temporal attention red fox-convolutional neural network (RTARF-CNN) for detecting DDoS attacks in SDN-int-VANET is introduced in this manuscript. The input data is taken from the SDN DDoS attack dataset. For restoring redundancy and missing value, developed random forest and local least squares (DRFLLS) are applied. Then the important features are selected from the pre-processed data with the help of stacked contractive autoencoders (St-CAE), which reduces the processing time of the introduced method. The selected features are classified by residual-based temporal attention-convolutional neural network (RTA-CNN). The weight parameter of RTA-CNN is optimized with the help of red fox optimization (RFO) for better classification. The introduced method is implemented in the PYTHON platform. The RTARF-CNN attains 99.8% accuracy, 99.5% sensitivity, 99.80% precision, and 99.8% specificity. The effectiveness of the introduced technique is compared with the existing approaches.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 3","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138561627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comprehensive review of blockchain integration in remote patient monitoring for E-health 区块链集成在电子卫生远程患者监测中的全面审查
IF 1.5 4区 计算机科学 Q2 Computer Science Pub Date : 2023-11-14 DOI: 10.1002/nem.2254
Nedia Badri, Leïla Nasraoui, Leïla Azouz Saïdane

The integration of the Internet of Things (IoT) with blockchain technology has enabled a significant digital transformation in the areas of E-health, supply chain, financial services, smart grid, and automated contracts. Many E-health organizations take advantage of the game-changing power of blockchain and IoT to improve patient outcomes and optimize internal operational activities. In particular, it proposes a decentralized and evolutive way to model and acknowledge trust and data validity in a peer-to-peer network. Blockchain promises transparent and secure systems to provide new business solutions, especially when combined with smart contracts. In this paper, we provide a comprehensive survey of the literature involving blockchain technology applied to E-health. First, we present a brief background on blockchain and its fundamentals. Second, we review the opportunities and challenges of blockchain in the context of E-health. We then discuss popular consensus algorithms and smart contracts in blockchain in conjunction with E-health. Finally, blockchain platforms are evaluated for their suitability in the realm of IoT-based E-health, including electronic health records, electronic management records, and personal health records, from the perspective of remote patient monitoring.

物联网(IoT)与区块链技术的集成使电子医疗、供应链、金融服务、智能电网和自动化合同等领域实现了重大的数字化转型。许多电子卫生组织利用区块链和物联网改变游戏规则的力量来改善患者的治疗效果并优化内部运营活动。特别是,它提出了一种在点对点网络中建模和承认信任和数据有效性的分散和进化方法。区块链承诺提供透明和安全的系统,以提供新的业务解决方案,特别是与智能合约结合使用时。在本文中,我们对涉及区块链技术应用于电子健康的文献进行了全面的调查。首先,我们简要介绍区块链的背景及其基本原理。其次,我们回顾了电子医疗背景下区块链的机遇和挑战。然后,我们将结合电子健康讨论区块链中流行的共识算法和智能合约。最后,从远程患者监测的角度,评估了区块链平台在基于物联网的电子健康领域的适用性,包括电子健康记录、电子管理记录和个人健康记录。
{"title":"A comprehensive review of blockchain integration in remote patient monitoring for E-health","authors":"Nedia Badri,&nbsp;Leïla Nasraoui,&nbsp;Leïla Azouz Saïdane","doi":"10.1002/nem.2254","DOIUrl":"10.1002/nem.2254","url":null,"abstract":"<p>The integration of the Internet of Things (IoT) with blockchain technology has enabled a significant digital transformation in the areas of E-health, supply chain, financial services, smart grid, and automated contracts. Many E-health organizations take advantage of the <i>game-changing</i> power of blockchain and IoT to improve patient outcomes and optimize internal operational activities. In particular, it proposes a decentralized and evolutive way to model and acknowledge trust and data validity in a peer-to-peer network. Blockchain promises transparent and secure systems to provide new business solutions, especially when combined with smart contracts. In this paper, we provide a comprehensive survey of the literature involving blockchain technology applied to E-health. First, we present a brief background on blockchain and its fundamentals. Second, we review the opportunities and challenges of blockchain in the context of E-health. We then discuss popular consensus algorithms and smart contracts in blockchain in conjunction with E-health. Finally, blockchain platforms are evaluated for their suitability in the realm of IoT-based E-health, including electronic health records, electronic management records, and personal health records, from the perspective of remote patient monitoring.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 2","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138513418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Network Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1