I-Te Chou, Hung-Han Su, Yuling Hsueh, Chih-wen Hsueh
The blockchain technology has obtained significant success in the past decades. However, a serious underlying problem still exists in the blockchain system - data bloating. In the blockchain system, each (full) node must store the full data set in blockchain history, incurring significant storage pressure in the initial synchronization process and the following maintenance of the blockchain system. Data bloating is a challenging problem to be confronted in the immediate future of blockchain. To address this problem, in this paper, we introduce the BC-Store framework that deploys a data accessing model on an IPFS-cluster system to classify the hot and cold blockchain data. The hot data are stored in the local cache, whereas the cold data are stored in the IPFS cluster, thereby substantially shortening the blockchain initial synchronization time and saving a considerable amount of data storage. Empirical experimentation shows that our framework can reduce the local storage size from over 265GB to 4GB with a hit ratio of 77% for Bitcoin without significant performance degradation with the whole data shared in an IPFS cluster.
{"title":"BC-Store: A Scalable Design for Blockchain Storage","authors":"I-Te Chou, Hung-Han Su, Yuling Hsueh, Chih-wen Hsueh","doi":"10.1145/3409934.3409940","DOIUrl":"https://doi.org/10.1145/3409934.3409940","url":null,"abstract":"The blockchain technology has obtained significant success in the past decades. However, a serious underlying problem still exists in the blockchain system - data bloating. In the blockchain system, each (full) node must store the full data set in blockchain history, incurring significant storage pressure in the initial synchronization process and the following maintenance of the blockchain system. Data bloating is a challenging problem to be confronted in the immediate future of blockchain. To address this problem, in this paper, we introduce the BC-Store framework that deploys a data accessing model on an IPFS-cluster system to classify the hot and cold blockchain data. The hot data are stored in the local cache, whereas the cold data are stored in the IPFS cluster, thereby substantially shortening the blockchain initial synchronization time and saving a considerable amount of data storage. Empirical experimentation shows that our framework can reduce the local storage size from over 265GB to 4GB with a hit ratio of 77% for Bitcoin without significant performance degradation with the whole data shared in an IPFS cluster.","PeriodicalId":145384,"journal":{"name":"Proceedings of the 2nd International Electronics Communication Conference","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123208797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As a promising feature in 5G, device-to-device (D2D) communication is the technology allowing adjacent mobile devices to communicate directly without relaying the data over base stations. D2D technology can potentially increase the network capacity by offloading network traffic in a distributed manner. However, there are also new security challenges such as free-riding attack prevention, device anonymity protection and end-to-end data secrecy. Also, since there are many mobile devices which have limited computational resources in 5G cellular network, there is a need to develop a lightweight authentication protocol which addresses all these security requirements with low computational overhead. In this paper, we propose a lightweight D2D authentication and key agreement protocol based on elliptic curve cryptography (ECC). Specifically, our proposed scheme makes use of the elliptic curve digital signature algorithm (ECDSA), elliptic curve Diffie-Hellman (ECDH) and authenticated encryption with associate data (AEAD) to provide secure device discovery, mutual authentication, key agreement and data transmission for all 5G D2D devices. Our scheme is computationally lightweight to be supported in any resource-constrained 5G devices, and it can resist several active and passive protocol attacks including eavesdropping, replay attack, man-in-the-middle attack and free-riding attack. We analyze the security of our protocol with Scyther to show our scheme is resistant to these attacks. Finally, performance evaluation shows our scheme is efficient for both UEs and CN with rationally low computational costs.
{"title":"A Lightweight D2D Authentication Scheme against Free-riding Attacks in 5G Cellular Network","authors":"M. Chow, M. Ma","doi":"10.1145/3409934.3409952","DOIUrl":"https://doi.org/10.1145/3409934.3409952","url":null,"abstract":"As a promising feature in 5G, device-to-device (D2D) communication is the technology allowing adjacent mobile devices to communicate directly without relaying the data over base stations. D2D technology can potentially increase the network capacity by offloading network traffic in a distributed manner. However, there are also new security challenges such as free-riding attack prevention, device anonymity protection and end-to-end data secrecy. Also, since there are many mobile devices which have limited computational resources in 5G cellular network, there is a need to develop a lightweight authentication protocol which addresses all these security requirements with low computational overhead. In this paper, we propose a lightweight D2D authentication and key agreement protocol based on elliptic curve cryptography (ECC). Specifically, our proposed scheme makes use of the elliptic curve digital signature algorithm (ECDSA), elliptic curve Diffie-Hellman (ECDH) and authenticated encryption with associate data (AEAD) to provide secure device discovery, mutual authentication, key agreement and data transmission for all 5G D2D devices. Our scheme is computationally lightweight to be supported in any resource-constrained 5G devices, and it can resist several active and passive protocol attacks including eavesdropping, replay attack, man-in-the-middle attack and free-riding attack. We analyze the security of our protocol with Scyther to show our scheme is resistant to these attacks. Finally, performance evaluation shows our scheme is efficient for both UEs and CN with rationally low computational costs.","PeriodicalId":145384,"journal":{"name":"Proceedings of the 2nd International Electronics Communication Conference","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132529519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Blockchain systems make use of the Internet infrastructure to connect thousands of nodes in peer-to-peer (P2P) networks. These connected nodes form complex ecosystems encompassing various technologies that collaborate to offer millions of users distributed, decentralized, secure, and read-only data stores. With the proliferation of various private and public platforms and applications that are built on top of blockchain technology, rich sources of several types of simple or complex datasets have been created. Consequently, new requirements for managing these rich data sources, integrating them with their hosting environment, and making them discoverable have emerged. Fulfilling these requirements calls for extending the architecture of current blockchain systems by adding different layers that offer dedicated services for handling the data and allowing for integrating the blockchain-based platforms and applications with other systems, including Web-based applications. In this paper, we present a novel approach aiming at extending the architecture of current blockchain systems by adding new service layers for processing the data and offering new services to provide a bridge between blockchain systems and Web-based external applications enabling them to query, retrieve, and access the datasets managed by robust permission-based access control.
{"title":"From Blockchain to Web: Paving the Last Mile for Releasing Chained Data from the Blocks","authors":"Belal Abu-Naim, Martin Hronsky, W. Klas","doi":"10.1145/3409934.3409938","DOIUrl":"https://doi.org/10.1145/3409934.3409938","url":null,"abstract":"Blockchain systems make use of the Internet infrastructure to connect thousands of nodes in peer-to-peer (P2P) networks. These connected nodes form complex ecosystems encompassing various technologies that collaborate to offer millions of users distributed, decentralized, secure, and read-only data stores. With the proliferation of various private and public platforms and applications that are built on top of blockchain technology, rich sources of several types of simple or complex datasets have been created. Consequently, new requirements for managing these rich data sources, integrating them with their hosting environment, and making them discoverable have emerged. Fulfilling these requirements calls for extending the architecture of current blockchain systems by adding different layers that offer dedicated services for handling the data and allowing for integrating the blockchain-based platforms and applications with other systems, including Web-based applications. In this paper, we present a novel approach aiming at extending the architecture of current blockchain systems by adding new service layers for processing the data and offering new services to provide a bridge between blockchain systems and Web-based external applications enabling them to query, retrieve, and access the datasets managed by robust permission-based access control.","PeriodicalId":145384,"journal":{"name":"Proceedings of the 2nd International Electronics Communication Conference","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133794850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Letters of Credit (Letter-of-Credit) frauds are deceptive attempts against financial institutions, primarily by providing availing false/falsify documentation as a proof of shipment of goods when, either, inferior goods were shipped, or no delivery was made at all. Letter-of-Credit also maybe forged to be provided to the supplier to supply goods. Whereas parties can forfeit the Letter-of-Credit by someone with vast experience and expertise in finance commerce laws, and international laws and business processes. In this research, we aspire to come up with an option of incorporating NFC-enabled mobile application into Letter-of-credit. The application is powered by blockchain technology and would be crucial in helping the recipient of the Letter-of-credit to achieve easy verification of the legitimacy of the document. The idea of using blockchain to prevent Letter-of-Credit fraud may not be novel where some have already been put into reality. However, not much work done in combining an NFC enabled mobile application leveraging on blockchain technology to prevent Letter-of-Credits frauds. The study is intended for banks who are still in migration to paperless business and still depending on a physical Letter-of-Credit for their business transactions.
{"title":"Enhanced Security Approach Powered by Blockchain Technology with NFC to Prevent Fraudulence in Bank Letter of Credits","authors":"R. Subramaniam, S. Azzuhri, Ying Wah Teh","doi":"10.1145/3409934.3409945","DOIUrl":"https://doi.org/10.1145/3409934.3409945","url":null,"abstract":"Letters of Credit (Letter-of-Credit) frauds are deceptive attempts against financial institutions, primarily by providing availing false/falsify documentation as a proof of shipment of goods when, either, inferior goods were shipped, or no delivery was made at all. Letter-of-Credit also maybe forged to be provided to the supplier to supply goods. Whereas parties can forfeit the Letter-of-Credit by someone with vast experience and expertise in finance commerce laws, and international laws and business processes. In this research, we aspire to come up with an option of incorporating NFC-enabled mobile application into Letter-of-credit. The application is powered by blockchain technology and would be crucial in helping the recipient of the Letter-of-credit to achieve easy verification of the legitimacy of the document. The idea of using blockchain to prevent Letter-of-Credit fraud may not be novel where some have already been put into reality. However, not much work done in combining an NFC enabled mobile application leveraging on blockchain technology to prevent Letter-of-Credits frauds. The study is intended for banks who are still in migration to paperless business and still depending on a physical Letter-of-Credit for their business transactions.","PeriodicalId":145384,"journal":{"name":"Proceedings of the 2nd International Electronics Communication Conference","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123767928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
There is a great interest in many approaches towards blockchain in providing a solution to record transactions in a decentralized way. However, there are some limitations when storing large files or documents on the blockchain. In order to meet the requirements of storing relatively large data, a decentralized storage medium is produced. IPFS is a distributed file system which is content-addressable. It works very similar to the blockchain network. There are some attempts which take advantage of the blockchain concept and IPFS to design new approaches. Unfortunately, there are some inefficiencies in sharing data using the combination of IPFS and blockchain. In this paper, we proposed a secure file sharing system that brings a distributed access control and group key management by the adoption of the IPFS proxy. The IPFS proxy which plays an important role in the design is adopted to take responsibility for the control policies. The combination of the IPFS server and the blockchain network with the adoption of the IPFS proxy make a secure file sharing system which the members on the system can create new groups or join different groups by their own choice. Although there is no access control mechanism in IPFS server and blockchain network, the secure file sharing system manages the access control policies. The members access files only belong to the group they authorized.
{"title":"A Secure File Sharing System Based on IPFS and Blockchain","authors":"Hsiao-Shan Huang, Tian-Sheuan Chang, Jhih-Yi Wu","doi":"10.1145/3409934.3409948","DOIUrl":"https://doi.org/10.1145/3409934.3409948","url":null,"abstract":"There is a great interest in many approaches towards blockchain in providing a solution to record transactions in a decentralized way. However, there are some limitations when storing large files or documents on the blockchain. In order to meet the requirements of storing relatively large data, a decentralized storage medium is produced. IPFS is a distributed file system which is content-addressable. It works very similar to the blockchain network. There are some attempts which take advantage of the blockchain concept and IPFS to design new approaches. Unfortunately, there are some inefficiencies in sharing data using the combination of IPFS and blockchain. In this paper, we proposed a secure file sharing system that brings a distributed access control and group key management by the adoption of the IPFS proxy. The IPFS proxy which plays an important role in the design is adopted to take responsibility for the control policies. The combination of the IPFS server and the blockchain network with the adoption of the IPFS proxy make a secure file sharing system which the members on the system can create new groups or join different groups by their own choice. Although there is no access control mechanism in IPFS server and blockchain network, the secure file sharing system manages the access control policies. The members access files only belong to the group they authorized.","PeriodicalId":145384,"journal":{"name":"Proceedings of the 2nd International Electronics Communication Conference","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126988214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Decentralized voting and self-funding allow cryptocurrencies to make joint decisions and finance their development. Dash cryptocurrency has a working self-funding and decision-making system for supporting event and improvement proposals---the Dash Governance System. While it is fully operational, as currently designed, it does not incentivize voting efficiency. The Dash Governance System struggles to scale, with the number of proposals rising, as each participant needs to review each proposal. This work introduces a new mechanism for processing proposals. It meets scalability and makes thoughtful voting the most profitable strategy.
{"title":"Responsible Self-Funding in Dash Governance System","authors":"I. Chistiakov, Y. Yanovich","doi":"10.1145/3409934.3409939","DOIUrl":"https://doi.org/10.1145/3409934.3409939","url":null,"abstract":"Decentralized voting and self-funding allow cryptocurrencies to make joint decisions and finance their development. Dash cryptocurrency has a working self-funding and decision-making system for supporting event and improvement proposals---the Dash Governance System. While it is fully operational, as currently designed, it does not incentivize voting efficiency. The Dash Governance System struggles to scale, with the number of proposals rising, as each participant needs to review each proposal. This work introduces a new mechanism for processing proposals. It meets scalability and makes thoughtful voting the most profitable strategy.","PeriodicalId":145384,"journal":{"name":"Proceedings of the 2nd International Electronics Communication Conference","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117287325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Blockchain is viewed as one of the most promising and disruptive inventions and is considered to have the potential to significantly change current auditing profession and reshape the business ecosystem. With the advancement of blockchain, it has been concerned in some studies that auditing could be significantly impacted and eventually replaced. Meanwhile, another viewpoint argues that blockchain technology would push the existing auditing industry to a new direction rather than eliminating the need for auditing in the immediate future. This discussion can hardly be settled without evaluation, however, studies exploring how blockchain technology can be employed in auditing practice or how continuous auditing can be conducted using blockchain technology are limited. This paper analyses the impact of blockchain features on existing audit processes and discusses the possibility of applying blockchain characteristics including immutability, distributed ledger, real-time settlement to the auditing domain. Based on the systematic analysis, this study proposes a conceptual model for blockchain-based auditing information system, which provides solutions to employ blockchain technology in auditing profession, significantly improving the efficiency and effectiveness of auditing and promoting the transformation of the auditing paradigm to real-time, continuous and intelligent auditing.
{"title":"A Conceptual Model for Blockchain-based Auditing Information System","authors":"Ke Wang, Yu Zhang, Elizabeth Chang","doi":"10.1145/3409934.3409949","DOIUrl":"https://doi.org/10.1145/3409934.3409949","url":null,"abstract":"Blockchain is viewed as one of the most promising and disruptive inventions and is considered to have the potential to significantly change current auditing profession and reshape the business ecosystem. With the advancement of blockchain, it has been concerned in some studies that auditing could be significantly impacted and eventually replaced. Meanwhile, another viewpoint argues that blockchain technology would push the existing auditing industry to a new direction rather than eliminating the need for auditing in the immediate future. This discussion can hardly be settled without evaluation, however, studies exploring how blockchain technology can be employed in auditing practice or how continuous auditing can be conducted using blockchain technology are limited. This paper analyses the impact of blockchain features on existing audit processes and discusses the possibility of applying blockchain characteristics including immutability, distributed ledger, real-time settlement to the auditing domain. Based on the systematic analysis, this study proposes a conceptual model for blockchain-based auditing information system, which provides solutions to employ blockchain technology in auditing profession, significantly improving the efficiency and effectiveness of auditing and promoting the transformation of the auditing paradigm to real-time, continuous and intelligent auditing.","PeriodicalId":145384,"journal":{"name":"Proceedings of the 2nd International Electronics Communication Conference","volume":"246 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124300612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Intrusion detection systems (IDSs) is crucial for the security of Vehicle Ad Hoc Networks (VANETs), as it can accurately detect both the inner and outer attacks. However, the redundant features and the sparse samples of fatal attacks in VANETs datasets cause the heavy time-consumption and imbalanced problems respectively. In this paper, a feature selection algorithm based on a many-objective optimization algorithm (FS-MOEA) is proposed for IDSs in VANETs, in which Non-dominant Sorting Genetic Algorithm-III (NSGA-III) serves as the many-objective evolutionary algorithm. Two improvements, called Bias and Weighted (B&W) niche-preservation and Analytic Hierarchy Process (AHP) prioritizing, are further designed in FS-MOEA. B&W niche-preservation is used to counterbalance the imbalanced problem among the different classes of datasets by assigning rare classes higher priorities in the niching selection process. AHP prioritizing is employed to search the optimal feature subset from the non-dominant feature subsets in the Pareto Front of FS-MOEA. Experimental results show that the proposed FS-MOEA can not only improve the performance of IDSs in VANETs by decreasing the redundancy and irrelevances of features but also alleviate the negative impact of the imbalanced problem.
入侵检测系统(ids)是车辆自组织网络(vanet)安全的关键,因为它可以准确地检测到内部和外部的攻击。然而,VANETs数据集的致命攻击特征的冗余性和样本的稀疏性分别造成了大量的耗时和不平衡问题。本文提出了一种基于多目标优化算法(FS-MOEA)的多目标特征选择算法,其中非优势排序遗传算法- iii (NSGA-III)作为多目标进化算法。在FS-MOEA中进一步设计了两种改进,即偏置加权(B&W)生态位保存和层次分析法(AHP)优先级排序。采用B&W小生境保护方法,在小生境选择过程中为稀有类分配更高的优先级,以平衡不同类别数据集之间的不平衡问题。采用层次分析法从FS-MOEA Pareto Front的非优势特征子集中搜索最优特征子集。实验结果表明,所提出的FS-MOEA不仅可以通过减少特征的冗余和不相关来提高vanet中ids的性能,还可以缓解不平衡问题的负面影响。
{"title":"Design of Feature Selection Algorithm Based on MOEA for IDSs in VANETs","authors":"Junwei Liang, M. Ma","doi":"10.1145/3409934.3409953","DOIUrl":"https://doi.org/10.1145/3409934.3409953","url":null,"abstract":"Intrusion detection systems (IDSs) is crucial for the security of Vehicle Ad Hoc Networks (VANETs), as it can accurately detect both the inner and outer attacks. However, the redundant features and the sparse samples of fatal attacks in VANETs datasets cause the heavy time-consumption and imbalanced problems respectively. In this paper, a feature selection algorithm based on a many-objective optimization algorithm (FS-MOEA) is proposed for IDSs in VANETs, in which Non-dominant Sorting Genetic Algorithm-III (NSGA-III) serves as the many-objective evolutionary algorithm. Two improvements, called Bias and Weighted (B&W) niche-preservation and Analytic Hierarchy Process (AHP) prioritizing, are further designed in FS-MOEA. B&W niche-preservation is used to counterbalance the imbalanced problem among the different classes of datasets by assigning rare classes higher priorities in the niching selection process. AHP prioritizing is employed to search the optimal feature subset from the non-dominant feature subsets in the Pareto Front of FS-MOEA. Experimental results show that the proposed FS-MOEA can not only improve the performance of IDSs in VANETs by decreasing the redundancy and irrelevances of features but also alleviate the negative impact of the imbalanced problem.","PeriodicalId":145384,"journal":{"name":"Proceedings of the 2nd International Electronics Communication Conference","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129106072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Facing on bursting of the huge quantity of trade, the problem of finance by micro and small firms, the expansion of business development of core enterprise in supply chain, the development of comprehensive finance services, it is not well worked by traditional ways. Moreover it is more and more restricting the development of supply chain. Considering the advantages of automatic executing and high efficiency of smart contract, the feature of decentralization, security, trustworthiness and anti-tampering of blockchain, it was presented a novel supply chain model based on smart contract and blockchain for solving the problem totally. The model relied on the core enterprise of supply chain, integrated the upstream and downstream industries, constructed a consortium chain, that consisted of core enterprise, financial institutions, suppliers and dealers, formed an encrypted credit named ET (Electronic Trust) based on the trustworthiness of the trust industries chain. Actually, ET is equaled to the actual credit, it could be paid for the suppliers according to the cargo value before the last settlement. So the ET could combine the virtual and actual capital. Thus it also could further solve the common pain points of supply chain.
{"title":"A Novel Supply Chain Model Based on Smart Contract","authors":"Haitao Liu","doi":"10.1145/3409934.3409942","DOIUrl":"https://doi.org/10.1145/3409934.3409942","url":null,"abstract":"Facing on bursting of the huge quantity of trade, the problem of finance by micro and small firms, the expansion of business development of core enterprise in supply chain, the development of comprehensive finance services, it is not well worked by traditional ways. Moreover it is more and more restricting the development of supply chain. Considering the advantages of automatic executing and high efficiency of smart contract, the feature of decentralization, security, trustworthiness and anti-tampering of blockchain, it was presented a novel supply chain model based on smart contract and blockchain for solving the problem totally. The model relied on the core enterprise of supply chain, integrated the upstream and downstream industries, constructed a consortium chain, that consisted of core enterprise, financial institutions, suppliers and dealers, formed an encrypted credit named ET (Electronic Trust) based on the trustworthiness of the trust industries chain. Actually, ET is equaled to the actual credit, it could be paid for the suppliers according to the cargo value before the last settlement. So the ET could combine the virtual and actual capital. Thus it also could further solve the common pain points of supply chain.","PeriodicalId":145384,"journal":{"name":"Proceedings of the 2nd International Electronics Communication Conference","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124609383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Data dissemination is an important feature to enable reconfigurations and firmware updates in wireless sensor networks. Typically, data disseminations in modern wireless sensor networks are based on multicast-based algorithms which may not be the most efficient ways because they do not guarantee packet delivery. In this paper, we present a reliable data dissemination algorithm for distributed wireless sensor networks. It derives some features from BitTorrent such as segmented file transfer, choking, and optimistic unchoking to improve performance. The evaluation result shows that our algorithm performs better than multicast-based algorithms in term of download speed up to 58.97% and energy efficiency up to 79.39%.
{"title":"High Performance Peer-to-peer Data Dissemination for Decentralized Wireless Sensor Networks Firmware Updating","authors":"Natchanon Nuntanirund, N. Nupairoj","doi":"10.1145/3409934.3409951","DOIUrl":"https://doi.org/10.1145/3409934.3409951","url":null,"abstract":"Data dissemination is an important feature to enable reconfigurations and firmware updates in wireless sensor networks. Typically, data disseminations in modern wireless sensor networks are based on multicast-based algorithms which may not be the most efficient ways because they do not guarantee packet delivery. In this paper, we present a reliable data dissemination algorithm for distributed wireless sensor networks. It derives some features from BitTorrent such as segmented file transfer, choking, and optimistic unchoking to improve performance. The evaluation result shows that our algorithm performs better than multicast-based algorithms in term of download speed up to 58.97% and energy efficiency up to 79.39%.","PeriodicalId":145384,"journal":{"name":"Proceedings of the 2nd International Electronics Communication Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115416291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}