首页 > 最新文献

Blockchain-Research and Applications最新文献

英文 中文
Investigating the impact of structural and temporal behaviors in Ethereum phishing users detection 研究结构和时间行为对以太坊网络钓鱼用户检测的影响
IF 5.6 3区 计算机科学 Pub Date : 2023-12-01 DOI: 10.1016/j.bcra.2023.100153
Medhasree Ghosh , Dyuti Ghosh , Raju Halder , Joydeep Chandra

The recent surge of Ethereum in prominence has made it an attractive target for various kinds of crypto crimes. Phishing scams, for example, are an increasingly prevalent cybercrime in which malicious users attempt to steal funds from a user's crypto wallet. This research investigates the effects of network architectural features as well as the temporal aspects of user activities on the performance of detecting phishing users on the Ethereum transaction network. We employ traditional machine learning algorithms to evaluate our model on real-world Ethereum transaction data. The experimental results demonstrate that our proposed features identify phishing accounts efficiently and outperform the baseline models by 4% in Recall and 5% in F1-score.

最近,以太坊的地位急剧上升,使其成为各种加密货币犯罪的目标。例如,网络钓鱼诈骗是一种日益猖獗的网络犯罪,恶意用户试图从用户的加密货币钱包中窃取资金。本研究调查了网络架构特征以及用户活动的时间方面对以太坊交易网络上检测网络钓鱼用户性能的影响。我们采用传统的机器学习算法,在真实的以太坊交易数据上评估我们的模型。实验结果表明,我们提出的特征能有效识别钓鱼账户,并且在召回率和 F1 分数上分别比基线模型高出 4% 和 5%。
{"title":"Investigating the impact of structural and temporal behaviors in Ethereum phishing users detection","authors":"Medhasree Ghosh ,&nbsp;Dyuti Ghosh ,&nbsp;Raju Halder ,&nbsp;Joydeep Chandra","doi":"10.1016/j.bcra.2023.100153","DOIUrl":"10.1016/j.bcra.2023.100153","url":null,"abstract":"<div><p>The recent surge of Ethereum in prominence has made it an attractive target for various kinds of crypto crimes. Phishing scams, for example, are an increasingly prevalent cybercrime in which malicious users attempt to steal funds from a user's crypto wallet. This research investigates the effects of network architectural features as well as the temporal aspects of user activities on the performance of detecting phishing users on the Ethereum transaction network. We employ traditional machine learning algorithms to evaluate our model on real-world Ethereum transaction data. The experimental results demonstrate that our proposed features identify phishing accounts efficiently and outperform the baseline models by 4% in Recall and 5% in F1-score.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":null,"pages":null},"PeriodicalIF":5.6,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720923000283/pdfft?md5=50e4e3c3baf2b450bd9efc03570baefa&pid=1-s2.0-S2096720923000283-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49005027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The impact of fundamental factors and sentiments on the valuation of cryptocurrencies 基本面因素和市场情绪对加密货币估值的影响
IF 5.6 3区 计算机科学 Pub Date : 2023-12-01 DOI: 10.1016/j.bcra.2023.100154
Tiam Bakhtiar, Xiaojun Luo, Ismail Adelopo

The valuation of cryptocurrencies is important given the increasing significance of this potential asset class. However, most state-of-the-art cryptocurrency valuation methods only focus on one of the fundamental factors or sentiments and use out-of-date data sources. In this study, a robust cryptocurrency valuation method is developed using up-to-date datasets. Using various panel regression models and moving-window regression tests, the impacts of fundamental factors and sentiments in the valuation of cryptocurrencies are explored with data covering from January 1, 2009 to April 30, 2023. The research shows the importance of sentiments and suggests that the fear and greed index can indicate when to make a cryptocurrency investment, while Google search interest in cryptocurrency is crucial when choosing the appropriate type of cryptocurrency. Moreover, consensus mechanism and initial coin offering have significant effects on cryptocurrencies without stablecoins, while their impacts on cryptocurrencies with stablecoins are insignificant. Other fundamental factors, such as the type of supply and the presence of smart contracts, do not have a significant influence on cryptocurrency. Findings from this study can enhance cryptocurrency marketisation and provide insightful guidance for investors, portfolio managers, and policymakers in assessing the utility level of each cryptocurrency.

鉴于这一潜在资产类别的重要性日益增加,加密货币的估值非常重要。然而,大多数最先进的加密货币估值方法只关注一个基本因素或情绪,并使用过时的数据源。在本研究中,使用最新数据集开发了一种强大的加密货币估值方法。利用各种面板回归模型和移动窗口回归测试,研究了2009年1月1日至2023年4月30日的数据,探讨了基本面因素和情绪对加密货币估值的影响。该研究显示了情绪的重要性,并表明恐惧和贪婪指数可以指示何时进行加密货币投资,而在选择适当类型的加密货币时,谷歌搜索对加密货币的兴趣至关重要。此外,共识机制和首次代币发行对没有稳定币的加密货币有显著影响,而对有稳定币的加密货币影响不显著。其他基本因素,如供应类型和智能合约的存在,对加密货币没有重大影响。本研究的结果可以促进加密货币的市场化,并为投资者、投资组合经理和政策制定者评估每种加密货币的效用水平提供有见地的指导。
{"title":"The impact of fundamental factors and sentiments on the valuation of cryptocurrencies","authors":"Tiam Bakhtiar,&nbsp;Xiaojun Luo,&nbsp;Ismail Adelopo","doi":"10.1016/j.bcra.2023.100154","DOIUrl":"10.1016/j.bcra.2023.100154","url":null,"abstract":"<div><p>The valuation of cryptocurrencies is important given the increasing significance of this potential asset class. However, most state-of-the-art cryptocurrency valuation methods only focus on one of the fundamental factors or sentiments and use out-of-date data sources. In this study, a robust cryptocurrency valuation method is developed using up-to-date datasets. Using various panel regression models and moving-window regression tests, the impacts of fundamental factors and sentiments in the valuation of cryptocurrencies are explored with data covering from January 1, 2009 to April 30, 2023. The research shows the importance of sentiments and suggests that the fear and greed index can indicate when to make a cryptocurrency investment, while Google search interest in cryptocurrency is crucial when choosing the appropriate type of cryptocurrency. Moreover, consensus mechanism and initial coin offering have significant effects on cryptocurrencies without stablecoins, while their impacts on cryptocurrencies with stablecoins are insignificant. Other fundamental factors, such as the type of supply and the presence of smart contracts, do not have a significant influence on cryptocurrency. Findings from this study can enhance cryptocurrency marketisation and provide insightful guidance for investors, portfolio managers, and policymakers in assessing the utility level of each cryptocurrency.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":null,"pages":null},"PeriodicalIF":5.6,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720923000295/pdfft?md5=c59a4ee198fce4778ae906f334cef529&pid=1-s2.0-S2096720923000295-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46399228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain protocols, data analysis, and applications 区块链协议、数据分析和应用
IF 5.6 3区 计算机科学 Pub Date : 2023-12-01 DOI: 10.1016/j.bcra.2023.100164
Damiano Di Francesco Maesa, Laura Ricci
{"title":"Blockchain protocols, data analysis, and applications","authors":"Damiano Di Francesco Maesa,&nbsp;Laura Ricci","doi":"10.1016/j.bcra.2023.100164","DOIUrl":"10.1016/j.bcra.2023.100164","url":null,"abstract":"","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":null,"pages":null},"PeriodicalIF":5.6,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720923000398/pdfft?md5=ba0cca1cec506668d9bfb6bcfed91946&pid=1-s2.0-S2096720923000398-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135371981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A decentralized data evaluation framework in federated learning 联邦学习中的分散式数据评估框架
IF 5.6 3区 计算机科学 Pub Date : 2023-12-01 DOI: 10.1016/j.bcra.2023.100152
Laveen Bhatia, Saeed Samet

Federated Learning (FL) is a type of distributed deep learning framework in which multiple devices train a local model using local data, and the gradients of the local model are then sent to a central server that aggregates them to create a global model. This type of framework is ideal where data privacy is of utmost importance because the data never leave the local device. However, a major concern in FL is ensuring the data quality of local training data. Since there is no control over the local training data, ensuring that the local model is trained on clean data becomes challenging. A model trained on poor-quality data can have a significant impact on its accuracy. In this paper, we propose a decentralized approach using blockchain to ensure local model data quality. We use miners to validate each local model by checking its accuracy against a secret testing dataset. This is done using a smart contract that the miners invoke during the mining process. The local model is aggregated with the global model only if it passes a preset accuracy threshold. We test our proposed method on two datasets: the Brain Tumor Classification dataset from Kaggle, comprised of 7000 MRI images divided into two classes (Tumor/No Tumor), and the Medical MNIST dataset, which includes 58,954 images classified into six different classes: AbdomenCT, BreastMRI, ChestCT, Chest X-ray, Hand X-ray, and HeadCT. Our results show that our method outperforms the original FL approach in all experiments.

联合学习(FL)是一种分布式深度学习框架,其中多个设备使用本地数据训练一个本地模型,然后将本地模型的梯度发送到中央服务器,由服务器汇总后创建一个全局模型。在数据隐私至关重要的情况下,这种框架是理想的选择,因为数据永远不会离开本地设备。不过,FL 的一个主要问题是确保本地训练数据的质量。由于无法控制本地训练数据,因此确保本地模型是在干净的数据上训练出来的就变得非常具有挑战性。在劣质数据上训练出来的模型会对其准确性产生重大影响。在本文中,我们提出了一种利用区块链确保本地模型数据质量的去中心化方法。我们利用矿工根据秘密测试数据集检查每个本地模型的准确性,从而对其进行验证。这是通过矿工在挖矿过程中调用的智能合约完成的。局部模型只有通过预设的准确度阈值,才能与全局模型聚合。我们在两个数据集上测试了我们提出的方法:来自 Kaggle 的脑肿瘤分类数据集和医学 MNIST 数据集,前者由 7000 张 MRI 图像组成,分为两个类别(肿瘤/无肿瘤),后者包括 58954 张图像,分为六个不同的类别:腹部 CT、乳腺 MRI、胸部 CT、胸部 X 光、手部 X 光和头部 CT。结果表明,我们的方法在所有实验中都优于原始的 FL 方法。
{"title":"A decentralized data evaluation framework in federated learning","authors":"Laveen Bhatia,&nbsp;Saeed Samet","doi":"10.1016/j.bcra.2023.100152","DOIUrl":"10.1016/j.bcra.2023.100152","url":null,"abstract":"<div><p>Federated Learning (FL) is a type of distributed deep learning framework in which multiple devices train a local model using local data, and the gradients of the local model are then sent to a central server that aggregates them to create a global model. This type of framework is ideal where data privacy is of utmost importance because the data never leave the local device. However, a major concern in FL is ensuring the data quality of local training data. Since there is no control over the local training data, ensuring that the local model is trained on clean data becomes challenging. A model trained on poor-quality data can have a significant impact on its accuracy. In this paper, we propose a decentralized approach using blockchain to ensure local model data quality. We use miners to validate each local model by checking its accuracy against a secret testing dataset. This is done using a smart contract that the miners invoke during the mining process. The local model is aggregated with the global model only if it passes a preset accuracy threshold. We test our proposed method on two datasets: the Brain Tumor Classification dataset from Kaggle, comprised of 7000 MRI images divided into two classes (Tumor/No Tumor), and the Medical MNIST dataset, which includes 58,954 images classified into six different classes: AbdomenCT, BreastMRI, ChestCT, Chest X-ray, Hand X-ray, and HeadCT. Our results show that our method outperforms the original FL approach in all experiments.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":null,"pages":null},"PeriodicalIF":5.6,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720923000271/pdfft?md5=07c936a02b62c7c930cf9c4b0cd364c5&pid=1-s2.0-S2096720923000271-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47498130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
MQTT and blockchain sharding: An approach to user-controlled data access with improved security and efficiency MQTT和区块链分片:一种提高安全性和效率的用户控制数据访问方法
IF 5.6 3区 计算机科学 Pub Date : 2023-12-01 DOI: 10.1016/j.bcra.2023.100158
P.S. Akshatha, S.M. Dilip Kumar

The rapid growth of the Internet of Things (IoT) has raised security concerns, including MQTT protocol-based applications that lack built-in security features and rely on resource-intensive Transport Layer Security (TLS) protocols. This paper presents an approach that utilizes blockchain technology to enhance the security of MQTT communication while maintaining efficiency. This approach involves using blockchain sharding, which enables higher scalability, improved performance, and reduced computational overhead compared to traditional blockchain approaches, making it well-suited for resource-constrained IoT environments. This approach leverages Ethereum blockchain's smart contract mechanism to ensure trust, accountability, and user privacy. Specifically, we introduce a shard-based consensus mechanism that enables improved security while minimizing computational overhead. We also provide a user-controlled and secured algorithm using Proof-of-Access implementation to decentralize user access control to data stored in the blockchain network. The proposed approach is analyzed for usability, including metrics such as bandwidth consumption, CPU usage, memory usage, delay, access time, storage time, and jitter, which are essential for IoT application requirements. The analysis demonstrated that the approach reduces resource consumption, and the proposed system outperforms TLS and existing blockchain approaches in these metrics, regardless of the choice of the MQTT broker. Additionally, thoroughly addressing future research directions, including issues and challenges, ensures careful consideration of potential advancements in this domain.

物联网(IoT)的快速发展引发了安全问题,包括基于MQTT协议的应用程序缺乏内置安全功能,并且依赖于资源密集型传输层安全(TLS)协议。本文提出了一种利用区块链技术在保持效率的同时增强MQTT通信安全性的方法。这种方法涉及使用区块链分片,与传统的区块链方法相比,它具有更高的可扩展性,提高了性能,减少了计算开销,使其非常适合资源受限的物联网环境。这种方法利用以太坊区块链的智能合约机制来确保信任、问责制和用户隐私。具体来说,我们引入了一种基于分片的共识机制,可以在最大限度地减少计算开销的同时提高安全性。我们还提供了一种用户控制和安全的算法,使用访问证明实现将用户访问控制分散到存储在区块链网络中的数据。对提出的方法进行了可用性分析,包括带宽消耗、CPU使用、内存使用、延迟、访问时间、存储时间和抖动等指标,这些指标对物联网应用需求至关重要。分析表明,该方法减少了资源消耗,并且无论选择MQTT代理,所提议的系统在这些指标中都优于TLS和现有的区块链方法。此外,彻底解决未来的研究方向,包括问题和挑战,确保仔细考虑该领域的潜在进展。
{"title":"MQTT and blockchain sharding: An approach to user-controlled data access with improved security and efficiency","authors":"P.S. Akshatha,&nbsp;S.M. Dilip Kumar","doi":"10.1016/j.bcra.2023.100158","DOIUrl":"10.1016/j.bcra.2023.100158","url":null,"abstract":"<div><p>The rapid growth of the Internet of Things (IoT) has raised security concerns, including MQTT protocol-based applications that lack built-in security features and rely on resource-intensive Transport Layer Security (TLS) protocols. This paper presents an approach that utilizes blockchain technology to enhance the security of MQTT communication while maintaining efficiency. This approach involves using blockchain sharding, which enables higher scalability, improved performance, and reduced computational overhead compared to traditional blockchain approaches, making it well-suited for resource-constrained IoT environments. This approach leverages Ethereum blockchain's smart contract mechanism to ensure trust, accountability, and user privacy. Specifically, we introduce a shard-based consensus mechanism that enables improved security while minimizing computational overhead. We also provide a user-controlled and secured algorithm using Proof-of-Access implementation to decentralize user access control to data stored in the blockchain network. The proposed approach is analyzed for usability, including metrics such as bandwidth consumption, CPU usage, memory usage, delay, access time, storage time, and jitter, which are essential for IoT application requirements. The analysis demonstrated that the approach reduces resource consumption, and the proposed system outperforms TLS and existing blockchain approaches in these metrics, regardless of the choice of the MQTT broker. Additionally, thoroughly addressing future research directions, including issues and challenges, ensures careful consideration of potential advancements in this domain.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":null,"pages":null},"PeriodicalIF":5.6,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720923000337/pdfft?md5=a87db6be992926cd057321b8bd24cf25&pid=1-s2.0-S2096720923000337-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134934676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ULS-PBFT: An ultra-low storage overhead PBFT consensus for blockchain ULS-PBFT:区块链的超低存储开销PBFT共识
IF 5.6 3区 计算机科学 Pub Date : 2023-12-01 DOI: 10.1016/j.bcra.2023.100155
Haoxiang Luo

Since the Practical Byzantine Fault Tolerance (PBFT) consensus mechanism can avoid the performance bottleneck of blockchain systems caused by Proof of Work (PoW), it has been widely used in many scenarios. However, in the blockchain system, each node is required to back up all transactions and block data of the system, which will waste a lot of storage resources. It is difficult to apply to scenarios with limited storage resources such as unmanned aerial vehicle networks and smart security protection; thus, it is often used in small-scale networks. In order to deploy PBFT-based blockchain systems in large-scale network scenarios, we propose an ultra-low storage overhead PBFT consensus (ULS-PBFT), which groups nodes hierarchically to limit the storage overhead within the group. In this paper, we first propose an optimal double-layer PBFT consensus from the perspective of minimizing the storage overhead, and prove that this consensus can significantly reduce the storage overhead. In addition, we also investigate the superiority of ULS-PBFT in terms of communication overhead while setting the security threshold in the presence of the possibility of Byzantine nodes. The simulation results demonstrate the advantages of ULS-PBFT. Then, we extend such grouping idea to the blockchain system with X-layer PBFT and analyze its storage and communication overhead. Finally, the node grouping strategy of double-layer PBFT is studied for four application scenarios when the performance of storage overhead, communication overhead, and security are considered comprehensively.

由于实用拜占庭容错(PBFT)共识机制可以避免工作量证明(PoW)带来的区块链系统性能瓶颈,因此在许多场景中得到了广泛应用。然而,在区块链系统中,每个节点都需要备份系统的所有事务和块数据,这将浪费大量的存储资源。难以应用于无人机网络、智能安防等存储资源有限的场景;因此,它通常用于小规模网络。为了在大规模网络场景中部署基于PBFT的区块链系统,我们提出了一种超低存储开销的PBFT共识(ULS-PBFT),它将节点分层分组以限制组内的存储开销。本文首先从最小化存储开销的角度提出了一种最优的双层PBFT共识,并证明了该共识可以显著降低存储开销。此外,我们还研究了ULS-PBFT在存在拜占庭节点可能性的情况下设置安全阈值时在通信开销方面的优势。仿真结果验证了ULS-PBFT的优越性。然后,我们将这种分组思想扩展到x层PBFT的区块链系统中,并分析了其存储和通信开销。最后,在综合考虑存储开销、通信开销和安全性能的四种应用场景下,研究了双层PBFT的节点分组策略。
{"title":"ULS-PBFT: An ultra-low storage overhead PBFT consensus for blockchain","authors":"Haoxiang Luo","doi":"10.1016/j.bcra.2023.100155","DOIUrl":"10.1016/j.bcra.2023.100155","url":null,"abstract":"<div><p>Since the Practical Byzantine Fault Tolerance (PBFT) consensus mechanism can avoid the performance bottleneck of blockchain systems caused by Proof of Work (PoW), it has been widely used in many scenarios. However, in the blockchain system, each node is required to back up all transactions and block data of the system, which will waste a lot of storage resources. It is difficult to apply to scenarios with limited storage resources such as unmanned aerial vehicle networks and smart security protection; thus, it is often used in small-scale networks. In order to deploy PBFT-based blockchain systems in large-scale network scenarios, we propose an ultra-low storage overhead PBFT consensus (ULS-PBFT), which groups nodes hierarchically to limit the storage overhead within the group. In this paper, we first propose an optimal double-layer PBFT consensus from the perspective of minimizing the storage overhead, and prove that this consensus can significantly reduce the storage overhead. In addition, we also investigate the superiority of ULS-PBFT in terms of communication overhead while setting the security threshold in the presence of the possibility of Byzantine nodes. The simulation results demonstrate the advantages of ULS-PBFT. Then, we extend such grouping idea to the blockchain system with <em>X</em>-layer PBFT and analyze its storage and communication overhead. Finally, the node grouping strategy of double-layer PBFT is studied for four application scenarios when the performance of storage overhead, communication overhead, and security are considered comprehensively.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":null,"pages":null},"PeriodicalIF":5.6,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720923000301/pdfft?md5=156a29459a07f06b4350a52f6b079a43&pid=1-s2.0-S2096720923000301-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44214334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Janus: Toward preventing counterfeits in supply chains utilizing a multi-quorum blockchain Janus:利用多群体区块链防止供应链中的假冒
IF 5.6 3区 计算机科学 Pub Date : 2023-12-01 DOI: 10.1016/j.bcra.2023.100157
Vika Crossland , Connor Dellwo , Golam Bashar , Gaby G. Dagher

The modern pharmaceutical supply chain lacks transparency and traceability, resulting in alarming rates of counterfeit products entering the market. These illegitimate products cause harm to end users and wreak havoc on the supply chain itself, costing billions of dollars in profit loss. In this paper, in response to the Drug Supply Chain Security Act (DSCSA), we introduce Janus, a novel pharmaceutical track-and-trace system that utilizes blockchain and cloning-resistant hologram tags to prevent counterfeits from entering the pharmaceutical supply chain. We design a multi-quorum consensus protocol that achieves load balancing across the network. We perform a security analysis to show robustness against various threats and attacks. The implementation of Janus proves that the system is fair, scalable, and resilient.

现代药品供应链缺乏透明度和可追溯性,导致假冒产品进入市场的比率惊人。这些非法产品对最终用户造成伤害,并对供应链本身造成严重破坏,导致数十亿美元的利润损失。为响应《药品供应链安全法案》(DSCSA),我们在本文中介绍了 Janus,这是一种新型的药品跟踪与追踪系统,它利用区块链和抗克隆全息图标签来防止假冒产品进入药品供应链。我们设计了一种多法定人数共识协议,可实现整个网络的负载平衡。我们进行了安全分析,以显示对各种威胁和攻击的稳健性。Janus 的实现证明了系统的公平性、可扩展性和弹性。
{"title":"Janus: Toward preventing counterfeits in supply chains utilizing a multi-quorum blockchain","authors":"Vika Crossland ,&nbsp;Connor Dellwo ,&nbsp;Golam Bashar ,&nbsp;Gaby G. Dagher","doi":"10.1016/j.bcra.2023.100157","DOIUrl":"10.1016/j.bcra.2023.100157","url":null,"abstract":"<div><p>The modern pharmaceutical supply chain lacks transparency and traceability, resulting in alarming rates of counterfeit products entering the market. These illegitimate products cause harm to end users and wreak havoc on the supply chain itself, costing billions of dollars in profit loss. In this paper, in response to the Drug Supply Chain Security Act (DSCSA), we introduce Janus, a novel pharmaceutical track-and-trace system that utilizes blockchain and cloning-resistant hologram tags to prevent counterfeits from entering the pharmaceutical supply chain. We design a multi-quorum consensus protocol that achieves load balancing across the network. We perform a security analysis to show robustness against various threats and attacks. The implementation of Janus proves that the system is fair, scalable, and resilient.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":null,"pages":null},"PeriodicalIF":5.6,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720923000325/pdfft?md5=32e36d92a323a5ee29c977c97650f026&pid=1-s2.0-S2096720923000325-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48459524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unlocking the power of blockchain in education: An overview of innovations and outcomes 释放区块链在教育领域的力量:创新和成果概述
IF 5.6 3区 计算机科学 Pub Date : 2023-12-01 DOI: 10.1016/j.bcra.2023.100165
Amr El Koshiry , Entesar Eliwa , Tarek Abd El-Hafeez , Mahmoud Y. Shams

Blockchain is a revolutionary technology that has the potential to revolutionize various industries, including finance, supply chain management, healthcare, and education. Its decentralized, secure, and transparent nature makes it ideal for use in industries where trust, security, and efficiency are of paramount importance. The integration of blockchain technology into the education system has the potential to greatly improve the efficiency, security, and credibility of the educational process. By creating secure and transparent platforms for tracking and verifying students' academic achievements, blockchain technology can help to create a more accessible and trustworthy education system, making it easier for students to showcase their skills and knowledge to potential employers. While the potential benefits of blockchain in education are significant, there are also several challenges that must be addressed in order to fully realize the potential of this technology in the educational sector. Some of the major challenges include adoption, technical knowledge, interoperability, regulation, cost, data privacy and security, scalability, and accessibility. The necessary equipment for the implementation of blockchain technology in education is diverse and critical to the success of this innovative technology. Organizations should carefully consider this equipment when planning their implementation of blockchain technology in education to ensure the efficient and secure transfer of educational data and transactions within the blockchain network. Blockchain technology has the potential to play a significant role in promoting sustainability education and advancing the sustainability goals of both individuals and organizations. Organizations should consider incorporating blockchain technology into their sustainability education programs, in order to enhance the transparency, verifiability, and efficiency of their sustainability-related activities. While the use of blockchain technology in education is still in its early stages, the available data suggest that it has significant potential to transform the education sector and improve the efficiency and transparency of educational systems.

区块链是一项革命性的技术,有可能彻底改变包括金融、供应链管理、医疗保健和教育在内的各个行业。其分散、安全和透明的特性使其非常适合用于信任、安全和效率至关重要的行业。将区块链技术整合到教育系统中,有可能大大提高教育过程的效率、安全性和可信度。通过创建安全透明的平台来跟踪和验证学生的学业成就,区块链技术可以帮助创建一个更容易访问和值得信赖的教育系统,使学生更容易向潜在的雇主展示他们的技能和知识。虽然区块链在教育领域的潜在好处是巨大的,但为了充分发挥这项技术在教育领域的潜力,还必须解决一些挑战。一些主要的挑战包括采用、技术知识、互操作性、监管、成本、数据隐私和安全、可伸缩性和可访问性。在教育中实施区块链技术所需的设备多种多样,对这一创新技术的成功至关重要。组织在规划在教育中实施区块链技术时应仔细考虑该设备,以确保区块链网络内教育数据和交易的高效和安全传输。区块链技术有潜力在促进可持续发展教育和推进个人和组织的可持续发展目标方面发挥重要作用。组织应考虑将区块链技术纳入其可持续发展教育计划,以提高其可持续发展相关活动的透明度、可验证性和效率。虽然区块链技术在教育中的应用仍处于早期阶段,但现有数据表明,它具有改变教育部门、提高教育系统效率和透明度的巨大潜力。
{"title":"Unlocking the power of blockchain in education: An overview of innovations and outcomes","authors":"Amr El Koshiry ,&nbsp;Entesar Eliwa ,&nbsp;Tarek Abd El-Hafeez ,&nbsp;Mahmoud Y. Shams","doi":"10.1016/j.bcra.2023.100165","DOIUrl":"10.1016/j.bcra.2023.100165","url":null,"abstract":"<div><p>Blockchain is a revolutionary technology that has the potential to revolutionize various industries, including finance, supply chain management, healthcare, and education. Its decentralized, secure, and transparent nature makes it ideal for use in industries where trust, security, and efficiency are of paramount importance. The integration of blockchain technology into the education system has the potential to greatly improve the efficiency, security, and credibility of the educational process. By creating secure and transparent platforms for tracking and verifying students' academic achievements, blockchain technology can help to create a more accessible and trustworthy education system, making it easier for students to showcase their skills and knowledge to potential employers. While the potential benefits of blockchain in education are significant, there are also several challenges that must be addressed in order to fully realize the potential of this technology in the educational sector. Some of the major challenges include adoption, technical knowledge, interoperability, regulation, cost, data privacy and security, scalability, and accessibility. The necessary equipment for the implementation of blockchain technology in education is diverse and critical to the success of this innovative technology. Organizations should carefully consider this equipment when planning their implementation of blockchain technology in education to ensure the efficient and secure transfer of educational data and transactions within the blockchain network. Blockchain technology has the potential to play a significant role in promoting sustainability education and advancing the sustainability goals of both individuals and organizations. Organizations should consider incorporating blockchain technology into their sustainability education programs, in order to enhance the transparency, verifiability, and efficiency of their sustainability-related activities. While the use of blockchain technology in education is still in its early stages, the available data suggest that it has significant potential to transform the education sector and improve the efficiency and transparency of educational systems.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":null,"pages":null},"PeriodicalIF":5.6,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720923000404/pdfft?md5=cd97ade3a6e2f24bee393bddcd3c7235&pid=1-s2.0-S2096720923000404-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135412440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unveiling vulnerable smart contracts: Toward profiling vulnerable smart contracts using genetic algorithm and generating benchmark dataset 揭开脆弱智能合约的面纱:使用遗传算法剖析脆弱智能合约并生成基准数据集
IF 5.6 3区 计算机科学 Pub Date : 2023-11-23 DOI: 10.1016/j.bcra.2023.100171
Sepideh HajiHosseinKhani , Arash Habibi Lashkari , Ali Mizani Oskui

Smart contracts (SCs) are crucial in maintaining trust within blockchain networks. However, existing methods for analyzing SC vulnerabilities often lack accuracy and effectiveness, while approaches based on Deep Neural Networks (DNNs) struggle with detecting complex vulnerabilities due to limited data availability. This paper proposes a novel approach for analyzing SC vulnerabilities. Our method leverages an advanced form of the Genetic Algorithm (GA) and includes the development of a comprehensive benchmark dataset consisting of 36,670 Solidity source code samples. The primary objective of our study is to profile vulnerable SCs effectively. To achieve this goal, we have devised an analyzer called SCsVulLyzer based on GAs, designed explicitly for profiling SCs. Additionally, we have carefully curated a new dataset encompassing a wide range of examples, ensuring the practical validation of our approach. Furthermore, we have established three distinct taxonomies that cover SCs, profiling techniques, and feature extraction. These taxonomies provide a systematic classification and analysis of information, improving the efficiency of our approach. Our methodology underwent rigorous testing through experimentation, and the results demonstrated the superior capabilities of our model in detecting vulnerabilities. Compared to traditional and DNN-based approaches, our approach achieved higher precision, recall, and F1-score, which are widely used metrics for evaluating model performance. Across all these metrics, our model showed exceptional results. The customization and adaptations we implemented within the GA significantly enhanced its effectiveness. Our approach detects SC vulnerabilities more efficiently and facilitates robust exploration. These promising results highlight the potential of GA-based profiling to improve the detection of SC vulnerabilities, contributing to enhanced security in blockchain networks.

智能合约(SC)对于维护区块链网络中的信任至关重要。然而,现有的分析 SC 漏洞的方法往往缺乏准确性和有效性,而基于深度神经网络(DNN)的方法由于数据可用性有限,在检测复杂漏洞方面举步维艰。本文提出了一种分析 SC 漏洞的新方法。我们的方法利用了遗传算法(GA)的高级形式,包括开发一个由 36,670 个 Solidity 源代码样本组成的综合基准数据集。我们研究的主要目标是有效地剖析易受攻击的 SC。为实现这一目标,我们设计了一种基于遗传算法的分析器 SCsVulLyzer,专门用于剖析 SC。此外,我们还精心设计了一个新的数据集,其中包含大量实例,确保我们的方法得到实际验证。此外,我们还建立了三个不同的分类标准,涵盖 SC、剖析技术和特征提取。这些分类法对信息进行了系统的分类和分析,提高了我们方法的效率。我们的方法通过实验进行了严格的测试,结果证明了我们的模型在检测漏洞方面的卓越能力。与传统方法和基于 DNN 的方法相比,我们的方法获得了更高的精确度、召回率和 F1 分数,这些都是广泛用于评估模型性能的指标。在所有这些指标中,我们的模型都取得了优异的成绩。我们在 GA 中实施的定制和调整大大提高了其有效性。我们的方法能更有效地检测 SC 漏洞,并促进稳健的探索。这些充满希望的结果凸显了基于 GA 的剖析技术在改进 SC 漏洞检测方面的潜力,有助于增强区块链网络的安全性。
{"title":"Unveiling vulnerable smart contracts: Toward profiling vulnerable smart contracts using genetic algorithm and generating benchmark dataset","authors":"Sepideh HajiHosseinKhani ,&nbsp;Arash Habibi Lashkari ,&nbsp;Ali Mizani Oskui","doi":"10.1016/j.bcra.2023.100171","DOIUrl":"10.1016/j.bcra.2023.100171","url":null,"abstract":"<div><p>Smart contracts (SCs) are crucial in maintaining trust within blockchain networks. However, existing methods for analyzing SC vulnerabilities often lack accuracy and effectiveness, while approaches based on Deep Neural Networks (DNNs) struggle with detecting complex vulnerabilities due to limited data availability. This paper proposes a novel approach for analyzing SC vulnerabilities. Our method leverages an advanced form of the Genetic Algorithm (GA) and includes the development of a comprehensive benchmark dataset consisting of 36,670 Solidity source code samples. The primary objective of our study is to profile vulnerable SCs effectively. To achieve this goal, we have devised an analyzer called SCsVulLyzer based on GAs, designed explicitly for profiling SCs. Additionally, we have carefully curated a new dataset encompassing a wide range of examples, ensuring the practical validation of our approach. Furthermore, we have established three distinct taxonomies that cover SCs, profiling techniques, and feature extraction. These taxonomies provide a systematic classification and analysis of information, improving the efficiency of our approach. Our methodology underwent rigorous testing through experimentation, and the results demonstrated the superior capabilities of our model in detecting vulnerabilities. Compared to traditional and DNN-based approaches, our approach achieved higher precision, recall, and F1-score, which are widely used metrics for evaluating model performance. Across all these metrics, our model showed exceptional results. The customization and adaptations we implemented within the GA significantly enhanced its effectiveness. Our approach detects SC vulnerabilities more efficiently and facilitates robust exploration. These promising results highlight the potential of GA-based profiling to improve the detection of SC vulnerabilities, contributing to enhanced security in blockchain networks.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":null,"pages":null},"PeriodicalIF":5.6,"publicationDate":"2023-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720923000465/pdfft?md5=3d59e17ff3aef14044707e48b0743a5f&pid=1-s2.0-S2096720923000465-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139295384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decentralized Proof-of-Burn auction for secure cryptocurrency upgrade 用于加密货币安全升级的去中心化燃烧证明拍卖
IF 5.6 3区 计算机科学 Pub Date : 2023-11-23 DOI: 10.1016/j.bcra.2023.100170
Mariia Rodinko , Roman Oliynykov , Andrii Nastenko

We propose a new approach for a secure, decentralized, and censorless upgrade of existing cryptocurrencies to newly created tokens without interaction with any external information sources (oracles). The proposed scheme is based on the burning of existing cryptocurrency tokens and implemented via the multi-currency auction. The auction is carried out on the blockchain of the new token and implemented using a smart contract that processes participants' bids of burnt tokens of other cryptocurrencies and supports a new token price discovery algorithm for each cryptocurrency with no oracles or any other trusted source of information. Contrary to traditional ways of getting the new asset, like centralized and decentralized exchanges, our method requires no user registration (as well as no KYC — “know your customer” procedure that requires obligatory client identification) and provides a predicted supply level of the new asset for an adequate price within a model with economically rational participants. We provide the results of decentralized auction simulations implemented for several strategies of user behavior (based on bid prices with normal and log-normal distribution laws), both under the normal operation and in the presence of an adversary who follows specific strategies.

我们提出了一种新方法,可以安全、分散、无审查地将现有加密货币升级为新创建的代币,而无需与任何外部信息源(谕令)进行交互。所提出的方案基于现有加密货币代币的燃烧,并通过多币种拍卖来实现。拍卖在新代币的区块链上进行,并使用智能合约实施,该合约处理参与者对其他加密货币的已烧毁代币的出价,并支持每种加密货币的新代币价格发现算法,而不需要传道者或任何其他可信信息源。与获取新资产的传统方式(如中心化和去中心化交易所)相反,我们的方法不需要用户注册(也不需要 KYC--"了解你的客户 "程序,该程序要求强制性客户身份验证),并在具有经济理性参与者的模型中,为适当的价格提供新资产的预测供应水平。我们提供了针对几种用户行为策略(基于具有正态分布和对数正态分布规律的出价)的分散式拍卖模拟结果,既包括正常运行情况下的结果,也包括在对手遵循特定策略的情况下的结果。
{"title":"Decentralized Proof-of-Burn auction for secure cryptocurrency upgrade","authors":"Mariia Rodinko ,&nbsp;Roman Oliynykov ,&nbsp;Andrii Nastenko","doi":"10.1016/j.bcra.2023.100170","DOIUrl":"10.1016/j.bcra.2023.100170","url":null,"abstract":"<div><p>We propose a new approach for a secure, decentralized, and censorless upgrade of existing cryptocurrencies to newly created tokens without interaction with any external information sources (oracles). The proposed scheme is based on the burning of existing cryptocurrency tokens and implemented via the multi-currency auction. The auction is carried out on the blockchain of the new token and implemented using a smart contract that processes participants' bids of burnt tokens of other cryptocurrencies and supports a new token price discovery algorithm for each cryptocurrency with no oracles or any other trusted source of information. Contrary to traditional ways of getting the new asset, like centralized and decentralized exchanges, our method requires no user registration (as well as no KYC — “know your customer” procedure that requires obligatory client identification) and provides a predicted supply level of the new asset for an adequate price within a model with economically rational participants. We provide the results of decentralized auction simulations implemented for several strategies of user behavior (based on bid prices with normal and log-normal distribution laws), both under the normal operation and in the presence of an adversary who follows specific strategies.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":null,"pages":null},"PeriodicalIF":5.6,"publicationDate":"2023-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720923000453/pdfft?md5=db85e4c2af2921213ed1b36ead8ae0c7&pid=1-s2.0-S2096720923000453-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139301375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Blockchain-Research and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1