IET BlockchainPub Date : 2024-02-26DOI: 10.1049/blc2.12068
Himani Saraswat, Mahesh Manchanda, Sanjay Jasola
{"title":"An efficient secure predictive demand forecasting system using Ethereum virtual machine","authors":"Himani Saraswat, Mahesh Manchanda, Sanjay Jasola","doi":"10.1049/blc2.12068","DOIUrl":"https://doi.org/10.1049/blc2.12068","url":null,"abstract":"Predictive demand forecasting plays a pivotal role in optimizing supply chain management, enabling businesses to effectively allocate resources and minimize operational inefficiencies. This paper introduces a novel approach to enhancing demand forecasting processes by leveraging the Ethereum virtual machine within a blockchain framework. The proposed system capitalizes on the inherent security, transparency, and decentralized nature of blockchain technology to create a secure and efficient platform for predictive demand forecasting. The system leverages the Ethereum virtual machine to establish a secure, decentralized, and tamper‐resistant platform for demand prediction while ensuring data integrity and privacy. By utilizing the capabilities of smart contracts and decentralized applications within the Ethereum ecosystem, the proposed system offers an efficient and transparent solution for demand forecasting challenges. The current research focused on Ethereum virtual machine characteristics, features, components, and implementation details. A secured framework for the prediction of demand forecasting systems is proposed. Finally, the authors tried to validate and optimize the gas cost by using distinguished statistics and analysis.","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"28 30","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140430098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET BlockchainPub Date : 2024-02-13DOI: 10.1049/blc2.12066
Minghao Lee, Binhao Ma, Di Han, Dejun Wang, Bo Meng
{"title":"ISTVP: Independent single transaction verification protocol for light node using fraud proofs without collaborator","authors":"Minghao Lee, Binhao Ma, Di Han, Dejun Wang, Bo Meng","doi":"10.1049/blc2.12066","DOIUrl":"10.1049/blc2.12066","url":null,"abstract":"<p>Most blockchain users run light nodes on mobile devices. Due to limited storage and computation, light nodes cannot perform transaction validation. This shortage makes opportunities for malicious nodes to produce blocks containing invalid transactions, which results in the loss of funds for light nodes. Fraud proofs play a significant role in ensuring transaction security for light nodes. However, existing fraud proof schemes require honest collaborators and the processing of entire blocks. To address these limitations, Independent Single Transaction Verification Protocol for Light node Using Fraud Proofs without Collaborator called ISTVP is proposed that enables light nodes to independently verify transactions and generate fraud proofs without relying on collaborators or processing the entire block. To support ISTVP, SVST is introduced, an efficient block structure for single-transaction verification. SVST not only efficiently indexes historical transaction outputs to improve verification efficiency, but also significantly reduces the storage requirements for verifying transactions to <span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mi>O</mi>\u0000 <mo>(</mo>\u0000 <mrow>\u0000 <mi>h</mi>\u0000 <mo>+</mo>\u0000 <mi>log</mi>\u0000 <mi>n</mi>\u0000 </mrow>\u0000 <mo>)</mo>\u0000 </mrow>\u0000 <annotation>${mathrm{O}}( {{mathrm{h}} + log {mathrm{n}}} )$</annotation>\u0000 </semantics></math>. Furthermore, the authors analyze the security of ISTVP and demonstrate that it satisfies both persistence and liveness, while maintaining the level of security of full node.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 2","pages":"209-221"},"PeriodicalIF":0.0,"publicationDate":"2024-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12066","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139840002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET BlockchainPub Date : 2024-02-04DOI: 10.1049/blc2.12065
Caimei Wang, Yudong Ren, Zhize Wu
{"title":"Multi-hop anonymous payment channel network based on onion routing","authors":"Caimei Wang, Yudong Ren, Zhize Wu","doi":"10.1049/blc2.12065","DOIUrl":"10.1049/blc2.12065","url":null,"abstract":"<p>Payment channel networks (PCNs) are one of the most promising off-chain solutions to the blockchain scalability problem. However, most current payment channel schemes suffer from overly ideal routing assumptions or fail to provide complete path privacy protection. To address the above problems, the multi-hop anonymous and privacy-preserving PCN scheme are analyzed and a multi-hop anonymous PCN based on onion routing is proposed based on it. The scheme removes the routing assumptions of the original scheme, designs an onion routing-based payment channel network, and modifies the way relay nodes construct elliptic curve discrete logarithmic problems to resist wormhole attacks. Finally, the security analysis shows that the scheme in this paper has atomicity, relational anonymity and resistance to wormhole attacks. The latest bilinear pairing anonymous multi-hop payment (EAMHL+) scheme is used to compare communication and computing overhead. The results show that the scheme in this paper requires less communication overhead and is more efficient in terms of computational overhead when the average hop number of the payment channel network is 3 hops and the network diameter is 6 hops.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 2","pages":"197-208"},"PeriodicalIF":0.0,"publicationDate":"2024-02-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12065","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139807242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET BlockchainPub Date : 2024-02-01DOI: 10.1049/blc2.12063
Surbhi Sharma, Rudresh Dwivedi
{"title":"A survey on blockchain deployment for biometric systems","authors":"Surbhi Sharma, Rudresh Dwivedi","doi":"10.1049/blc2.12063","DOIUrl":"10.1049/blc2.12063","url":null,"abstract":"<p>Blockchain technology has become an emerging area in recent years due to its capacity to improve the security, dependability, and resilience of distributed systems. Research based on this technique has impacted several firms, including banking, healthcare, data processing, remote sensing, and many others. The key characteristics of blockchain technology that make it appealing are data immutability, transparency, privacy, decentralization, and distributed ledgers. However, there is a chance of a privacy breach with sensitive biometric data. The purpose of this investigation is to examine blockchain-based biometric applications research. It begins by determining the myriad ways that biometrics and blockchain may work together, including the storage and protection of biometric templates, identity management, and biometric authentication systems. Different biometric applications with respect to blockchain technology are also identified, along with the types of biometric data taken into account, features and capabilities of blockchain technology exploited, and blockchain technology frameworks employed. Finally, the authors seek to investigate blockchain concepts in the biometric domain by evaluating their pros and cons and summarizing the methods developed on blockchain for diverse biometric applications. Additionally, the applications of blockchain-based biometric systems are highlighted before moving on to open research questions and potential future research areas.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 2","pages":"124-151"},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12063","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139877877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET BlockchainPub Date : 2024-01-26DOI: 10.1049/blc2.12062
James Cunningham, Nigel Davies, Sarah Devaney, Søren Holm, Mike Harding, Victoria Neumann, John Ainsworth
{"title":"The application of distributed autonomous organization governance mechanisms to civic medical data management","authors":"James Cunningham, Nigel Davies, Sarah Devaney, Søren Holm, Mike Harding, Victoria Neumann, John Ainsworth","doi":"10.1049/blc2.12062","DOIUrl":"https://doi.org/10.1049/blc2.12062","url":null,"abstract":"Decentralized autonomous organizations (DAOs) have emerged as a novel governance mechanism that operates through distributed ledgers and smart contracts, enabling members to direct an organization's actions. The widespread adoption of DAOs has occurred in response to their utility in managing emergent semi‐structured projects and has led to the development of various innovative governance mechanisms. The mechanisms employed by DAOs has the potential to be generalized beyond their core financial domain to a wide range of use cases. In the medical field the use of blockchain and DAOs can provide secure and transparent access to medical data, while ensuring patient privacy. Civic access to medical data is a growing area of interest, where individuals have control over their own medical data and can share it with healthcare providers, researchers, and other stakeholders. DAOs can facilitate this civic access, enabling individuals to share their data securely and selectively with authorized parties for research and other purposes. This paper explores the use of DAOs to medical data sharing, with a focus on ownership, governance, and transaction models. An application framework and API that enables the deployment of DAO‐like organizations is derived and this approach is applied to the patient‐centric management of medical data.","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"54 11","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139594066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A bitcoin service community classification method based on Random Forest and improved KNN algorithm","authors":"Muyun Gao, Shenwen Lin, Xin Tian, Xi He, Ketai He, Shifeng Chen","doi":"10.1049/blc2.12064","DOIUrl":"10.1049/blc2.12064","url":null,"abstract":"<p>There are service communities with different functions in the Bitcoin transactions system. Identifying community categories helps to further understand the Bitcoin transactions system and facilitates targeted regulation of anonymized Bitcoin transactions. To this end, a Bitcoin service community classification method based on Random Forest and improved K-Nearest Neighbor (KNN) algorithm is proposed. First, the transaction characteristics of different types of communities are analyzed and summarized, and the corresponding transaction features are extracted from the address and entity levels; then multiple classification algorithms are compared, the optimal model to filter the effective features is selected, and the feature vector of entity addresses is constructed. Finally, a classification model is constructed based on Random Forest and improved KNN algorithm to classify the entities. By constructing different classification models for experimental comparison, the accuracy and stability advantages of the proposed method for classification in service community classification research are verified.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 3","pages":"276-286"},"PeriodicalIF":0.0,"publicationDate":"2024-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12064","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140493426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET BlockchainPub Date : 2024-01-24DOI: 10.1049/blc2.12060
Ivan Tuma, Edouard Lansiaux
{"title":"Folding at home: Artificial intelligence and crypto symbiosis for the science","authors":"Ivan Tuma, Edouard Lansiaux","doi":"10.1049/blc2.12060","DOIUrl":"10.1049/blc2.12060","url":null,"abstract":"<p>Folding at Home community gathers pecuniary crypto interest to an altruist cause (medical drugs research participation). There are many possibilities of ‘teams’ for folding, some of which allow compensation in cryptomonies. The authors will therefore study the three major communities in order to compare them, in a cost-benefit study logic. A cost-benefit analysis was performed between CURECOIN, BANANO, DOGECOIN folding, DOGECOIN mining and their communities on social platforms based on several outcomes: ‘Points Per Day (PPD)’, ‘Whattomine Mh/s Equivalent’, ‘Graphics Processing Units (GPU) Thermal Design Power/Typical Board Power Watts’, ‘Coins per 1,000,000 PPD’, ‘Coins per Day’, ‘Cost Per Coin’, ‘Cost Per Day’, ‘kWh Used Per Day’. Actually, BANANO, thanks to a large community and bots, has the highest PPD production and the lowest energetic cost on Central Processing Unit per week. On GPUs, DOGECOIN folding has the lowest weekly cost. However, the DOGECOIN community cannot produce as many PPD as the Banano team. CURECOIN offers a good compromise between the environmental point of view and the profitability one. To ensure fairness, the choice of the crypto and the way to earn it that has to be solved should be a pure public good, that is, perfectly non-rival in consumption and non-excludable. Indeed, the primary goal of those three communities is to allow scientific progress (thanks to Folding at Home) before allowing a return on investment.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 3","pages":"263-275"},"PeriodicalIF":0.0,"publicationDate":"2024-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12060","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139600539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET BlockchainPub Date : 2024-01-17DOI: 10.1049/blc2.12061
Jing Lu, Weidong Yu, Shihong Wu
{"title":"Automatic monitoring and early warning method for power grid infrastructure investment progress using building information model and blockchain","authors":"Jing Lu, Weidong Yu, Shihong Wu","doi":"10.1049/blc2.12061","DOIUrl":"https://doi.org/10.1049/blc2.12061","url":null,"abstract":"In order to improve the precise control level of power grid infrastructure investment, this paper proposes a monitoring and early warning method of power grid infrastructure investment progress based on building information model and blockchain. By capturing the project construction progress images, the features of the power grid infrastructure are extracted automatically. Combined with the technical characteristics of distributed, tamper‐proof, and traceable blockchain, statistical indicators are generated automatically, monitoring and early warning of the investment progress execution deviation are triggered by the rules running on the smart contracts. The case study results show that the mean absolute error of the target image recognition method based on the image features is 4.32%, and the prediction accuracy of the incoming line is better than that of the engineering civil and substation. The early warning model of investment statistics based on smart contracts can automatically monitor the investment progress and generate early warnings, which provides a basis for the dynamic adjustment of the investment plan, and effectively improves the refined management level of power grid infrastructure investment projects.","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":" 1094","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139617502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET BlockchainPub Date : 2023-12-27DOI: 10.1049/blc2.12056
Shibao Chen, Fei Li
{"title":"Ponzi scheme detection in smart contracts using the integration of deep learning and formal verification","authors":"Shibao Chen, Fei Li","doi":"10.1049/blc2.12056","DOIUrl":"https://doi.org/10.1049/blc2.12056","url":null,"abstract":"<p>Blockchain smart contracts are codes that can execute and enforce rules for blockchain digital transactions. However, smart contracts may contain numerous subtle vulnerabilities, among which Ponzi vulnerabilities are notable. Existing Ponzi scheme contract detection approaches often rely on machine learning models trained on manually extracted features to achieve satisfactory classification results. Nonetheless, the code of a smart contract potentially harbours elusive semantics and characteristics, which compromises the precision and accuracy of vulnerability detection. Therefore, this paper proposes a method of converting operation codes into sequences to process data to avoid losing unnecessary important information, and uses a one-dimensional convolutional neural network combined with formal verification. This method is named PZ-C1DZ3(Ponzi-Conv1D-Z3) and is used for Ponzi scheme detection. Four types of machine learning models, namely Conv1D, Conv1D-LSTM, Conv1D-MLP, and Conv1D-transformer, are employed for improvement and comparative validation experiments. Additionally, formal verification tool Z3 solver is utilized to conduct formal security verification on the final model, ensuring its safety. Experimental results demonstrate that the improved Conv1D model outperforms other existing models in terms of detection efficiency and accuracy while also meeting the requirements of formal security verification.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 2","pages":"185-196"},"PeriodicalIF":0.0,"publicationDate":"2023-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12056","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141251517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"QIoTChain: Quantum IoT-blockchain fusion for advanced data protection in Industry 4.0","authors":"Aditya Kumar Sharma, Mritunjay Shall Peelam, Brijesh Kumar Chauasia, Vinay Chamola","doi":"10.1049/blc2.12059","DOIUrl":"https://doi.org/10.1049/blc2.12059","url":null,"abstract":"<p>The modern world has its foundation built on data. Data is generated all the time, and many aspects of the society and economy are built upon it. In today's world, data is employed in better decision-making, innovation, and improving the efficiency of systems. It becomes essential to protect it from being tampered with or misused. Encryptions based on cryptographic systems are used in mainstream data protection these days. There have been newer iterations of mechanisms based on new techniques using blockchain and the zero trust model and even systems that employ fog computing along with content delivery networks. The advent of computation through quantum technologies also helped in developing data security with post-quantum mechanisms. The critical conditions for the working of these mechanisms hinder their adoption primarily. This also leads current systems to lack one or more of these technologies. Thus, the importance of a unified system that can employ quantum technologies effectively becomes prominent and requires a definitive investigation. In this article, a Quantum-IoT-based data protection scheme that can be of value to Industry 4.0 is analyzed. Light is also shed on innovations in quantum computing that can help solve not just current problems but also the future.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 3","pages":"252-262"},"PeriodicalIF":0.0,"publicationDate":"2023-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12059","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142160203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}