IET Blockchain最新文献

筛选
英文 中文
Non-fungible token-based health record marketplace 基于令牌的非传染性健康记录市场
IET Blockchain Pub Date : 2023-11-13 DOI: 10.1049/blc2.12057
Valli S Kumar, John J. Lee, Qin Hu
{"title":"Non-fungible token-based health record marketplace","authors":"Valli S Kumar,&nbsp;John J. Lee,&nbsp;Qin Hu","doi":"10.1049/blc2.12057","DOIUrl":"10.1049/blc2.12057","url":null,"abstract":"<p>With an increasing affinity towards patient-centric care, sharing real-time sensitive data for collaboration between multiple parties with finer access control becomes critical. Most existing studies based on the blockchain technology in the medical field discuss various application scenarios and security aspects, without focusing on data ownership, secure data sharing, or finer access control. In this work, a non-fungible token (NFT)-based system is proposed to implement a health record marketplace. The system leverages the NFT technology to provide dual ownership along with finer access control and efficiency in data sharing. The advantage of permissioned blockchain along with InterPlanetary File System (IPFS) are taken for off-chain data storage to improve security and efficiency. Because price determination is critical in the market, Stackelberg game theory is utilized to determine pricing strategies for both data owners and consumers. Also, to efficiently achieve finer access control, a popularity-based adaptive NFT management scheme using reinforcement learning is proposed. Simulation experiments are carried out to demonstrate accuracy and efficiency of our proposed schemes.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 2","pages":"169-184"},"PeriodicalIF":0.0,"publicationDate":"2023-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12057","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136346707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain privacy: Fundamental aspects and challenges for the future Internet data sharing 区块链隐私:未来互联网数据共享的基本方面和挑战
IET Blockchain Pub Date : 2023-11-08 DOI: 10.1049/blc2.12058
Nikolaos Kapsoulis, Alexandros Psychas, Antonios Litke, Theodora Varvarigou
{"title":"Blockchain privacy: Fundamental aspects and challenges for the future Internet data sharing","authors":"Nikolaos Kapsoulis,&nbsp;Alexandros Psychas,&nbsp;Antonios Litke,&nbsp;Theodora Varvarigou","doi":"10.1049/blc2.12058","DOIUrl":"10.1049/blc2.12058","url":null,"abstract":"<p>Privacy concerns the majority of individuals, governments, and organizations that share data over dissimilar networks of nodes. Every kind of participant requires awareness of the data journey that unfolds inside a blockchain network with its own trustworthy rules of data management and accessibility. This paper provides a methodological approach on privacy for data sharing within blockchain environments. Specific technological aspects of blockchains that relate to on-chain privacy such as network nature, party join, smart contracts, blockchain states, transactions, and ledger flows, are analysed with respect to the involvement and impact of privacy in distributed ledgers. A high-level architectural approach is suggested that is intended to address significant privacy concerns on data sharing among different kinds of users in the context of blockchain networks deployment and the broader Web 3.0 ecosystem building. Simultaneously, many pertinent challenges are discussed regarding network nature, configurable privacy, ownership, confidentiality, secured computation, and data monetization that appear in the field and ought to be carefully tackled for the future mass adoption of privacy-matured distributed ledgers that interconnect delivering the future Internet.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 2","pages":"152-168"},"PeriodicalIF":0.0,"publicationDate":"2023-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12058","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135393308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Empowering young learners to explore blockchain with user‐friendly tools: a method using Google Blockly and NFTs 授权年轻学习者使用用户友好的工具探索区块链:使用Google Blockly和nft的方法
IET Blockchain Pub Date : 2023-11-07 DOI: 10.1049/blc2.12055
Yun‐Cheng Tsai, Jiun‐Yu Huang, Da‐Ru Chiou
{"title":"Empowering young learners to explore blockchain with user‐friendly tools: a method using Google Blockly and NFTs","authors":"Yun‐Cheng Tsai, Jiun‐Yu Huang, Da‐Ru Chiou","doi":"10.1049/blc2.12055","DOIUrl":"https://doi.org/10.1049/blc2.12055","url":null,"abstract":"Abstract This paper presents a novel architecture utilizing blockchain technology to enhance educational systems. A method is proposed that empowers non‐fungible tokens by updating their metadata through an API layer, making blockchain technology more accessible to K‐12 students. Leveraging Google Blockly, a visual programming language, the aim is to engage students in computational thinking and foster their understanding of blockchain concepts. The approach promotes student engagement, facilitates the comprehension of digital ownership and value, and develops essential skills for the digital age. Through the method, the contribution is in the advancing of blockchain in education. The demo video can be seen using the following link, https://youtu.be/ZPVKgWtSb6U .","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"64 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135540130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards secure and resilient unmanned aerial vehicles swarm network based on blockchain 基于区块链的安全弹性无人机群网络
IET Blockchain Pub Date : 2023-10-28 DOI: 10.1049/blc2.12050
Xin Zhou, Lin Yang, Linru MA, Huasen He
{"title":"Towards secure and resilient unmanned aerial vehicles swarm network based on blockchain","authors":"Xin Zhou, Lin Yang, Linru MA, Huasen He","doi":"10.1049/blc2.12050","DOIUrl":"https://doi.org/10.1049/blc2.12050","url":null,"abstract":"Abstract Blockchain, as an emerging technology, has found diverse applications in solving trust issues in multi‐party cooperation. The field of Unmanned Aerial Vehicle (UAV) swarm networks is no exception, as UAVs are susceptible to attacks from malicious counterparts due to limited computing and storage resources. In this paper, the authors present an adaptive networking mechanism for UAVs based on blockchain technology, which incorporates three key technologies. Utilizing Global Unique Identifier (GUID) and block storage, UAVs can achieve rapid identity authentication and efficient swarm switching. By evaluating node participation in block consensus, malicious nodes within the UAV swarm can be accurately identified. Additionally, routing learning based on node security attributes and link quality ensures secure and efficient data transmission. Simulation test results demonstrate the practicality and applicability of the proposed blockchain‐based adaptive networking mechanism for UAV swarm networks.","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136233187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Personalized federated learning via directed acyclic graph based blockchain 通过基于有向无环图的区块链实现个性化联合学习
IET Blockchain Pub Date : 2023-10-25 DOI: 10.1049/blc2.12054
Chenglong Huang, Erwu Liu, Rui Wang, Yan Liu, Hanfu Zhang, Yuanzhe Geng, Jie Wang, Shaoyi Han
{"title":"Personalized federated learning via directed acyclic graph based blockchain","authors":"Chenglong Huang,&nbsp;Erwu Liu,&nbsp;Rui Wang,&nbsp;Yan Liu,&nbsp;Hanfu Zhang,&nbsp;Yuanzhe Geng,&nbsp;Jie Wang,&nbsp;Shaoyi Han","doi":"10.1049/blc2.12054","DOIUrl":"10.1049/blc2.12054","url":null,"abstract":"<p>Common federated learning (FL) lacks consideration of clients' personalized requirements, which performs poorly for the scenario with data and resource heterogeneity. In order to overcome the challenge of heterogeneous characteristics, this letter proposes a novel decentralized personalized federated learning (PFL) architecture that first utilizes a directed acyclic graph (DAG) blockchain technology to achieve PFL efficiently, which is called PFLDAG. Simulation results demonstrate that PFLDAG approximately improves accuracy by 80% compared with the classic Google FedAvg algorithm, and by 10% compared with IFCA cluster PFL which considers personalized requirements. In addition, the approach also substantially improves the convergence speed.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 1","pages":"73-82"},"PeriodicalIF":0.0,"publicationDate":"2023-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12054","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135218227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security and privacy issues in blockchain and its applications 区块链及其应用中的安全和隐私问题
IET Blockchain Pub Date : 2023-10-21 DOI: 10.1049/blc2.12051
Liangmin Wang, Victor S. Sheng, Boris Düdder, Haiqin Wu, Huijuan Zhu
{"title":"Security and privacy issues in blockchain and its applications","authors":"Liangmin Wang,&nbsp;Victor S. Sheng,&nbsp;Boris Düdder,&nbsp;Haiqin Wu,&nbsp;Huijuan Zhu","doi":"10.1049/blc2.12051","DOIUrl":"10.1049/blc2.12051","url":null,"abstract":"<p>Blockchain technology has emerged and evolved as a disruptive technology with the potential to be applied in various fields, including digital finance, healthcare, and the Internet of Things (IoT). Besides being a distributed ledger, blockchain enables decentralized and trusted storage/computation without relying on a central trusted party. However, the growing heterogeneity of blockchain platforms and the expanding range of applications have resulted in escalating security and privacy concerns. These concerns encompass persistent privacy breaches, vulnerabilities in smart contracts, and the “impossible triangle” problem. These challenges have emerged as the primary obstacles to the development and seamless integration of blockchain technology with industry applications.</p><p>To address the security and privacy challenges in blockchain platforms and its applications, numerous researchers have conducted extensive studies in this field by leveraging advanced technologies, including new cryptographic protocols and deep learning techniques. This special issue aims to highlight research perspectives, articles, and experimental studies pertaining to “Security and Privacy Issues in Blockchain and Its Applications”.</p><p>In this special issue, we received a total of 19 papers, out of which 17 underwent a rigorous peer-review process. However, two papers were excluded from the peer-reviewed selection because one was submitted in a draft form and the other was voluntarily withdrawn by the authors. Out of the 17 papers submitted for review, 10 were accepted for publication, six were rejected without being transferred, and one was rejected and referred to a transfer service. The exceptional quality of all the submissions played a crucial role in ensuring the success of this special issue.</p><p>These accepted papers can be classified into two categories, namely blockchain application security and cross-chain interaction security. The papers in the first category focus on analyzing and providing insights into the security of blockchain applications. Their objective is to keep readers informed about the latest trends, developments, challenges, and opportunities in blockchain application security. Moreover, significant research efforts have been dedicated to security analysis and detection in typical blockchain applications. The papers in this category are of Zhou et al., Grybniak et al., Lv et al., Li et al., Gong et al., Xiao et al. and Videira et al. These contributions further enhance our understanding and capability to safeguard blockchain applications from potential security threats. The second category of papers presents novel solutions that target the enhancement of security in cross-system interactions. These papers are of Feng et al., Xu et al. and Yu et al. By addressing the specific challenges associated with cross-system communication, these solutions contribute to the development of robust and secure blockchain networks. A brief presentation ","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"3 4","pages":"169-171"},"PeriodicalIF":0.0,"publicationDate":"2023-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12051","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135511811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decentralized trustworthiness score management with smart contracts on the trustlend platform 利用 trustlend 平台上的智能合约进行去中心化可信度评分管理
IET Blockchain Pub Date : 2023-10-19 DOI: 10.1049/blc2.12053
Wisnu Uriawan, Youakim Badr, Omar Hasan, Lionel Brunie
{"title":"Decentralized trustworthiness score management with smart contracts on the trustlend platform","authors":"Wisnu Uriawan,&nbsp;Youakim Badr,&nbsp;Omar Hasan,&nbsp;Lionel Brunie","doi":"10.1049/blc2.12053","DOIUrl":"10.1049/blc2.12053","url":null,"abstract":"<p>The personal lending marketplace, known as Peer-to-Peer (P2P) lending, has increased globally. However, providing unsecured loans to peers without requiring collateral remains a challenge. A platform called TrustLend is proposed to enable trustworthy transactions in the personal lending application. The platform attempts to eliminate or minimize the collateral requirement. The trustworthiness score adds to this platform's variable selection rules and can help lenders decide on reliable candidates as borrowers. The prototype implementing the TrustLend platform based on Ethereum smart contracts that use the trustworthiness score is also described and it is illustrated with a Decentralized Application (DApp) case study and customized smart contracts. The prototype demonstrates fundamental features and supports borrowers, lenders, and recommenders in establishing proposals and approvals. Finally, the prototype shows how end-users can easily access loans with reduced collateral without hidden costs and swift transactions.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 1","pages":"59-72"},"PeriodicalIF":0.0,"publicationDate":"2023-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12053","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135730786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A blockchain‐based user authorization management method for information exchanging of federation of industry and commerce 一种基于区块链的工商联信息交换用户授权管理方法
IET Blockchain Pub Date : 2023-10-10 DOI: 10.1049/blc2.12052
Jingqi Yang, Hanqing Li
{"title":"A blockchain‐based user authorization management method for information exchanging of federation of industry and commerce","authors":"Jingqi Yang, Hanqing Li","doi":"10.1049/blc2.12052","DOIUrl":"https://doi.org/10.1049/blc2.12052","url":null,"abstract":"Abstract The blockchain does not need the central organization to make trust endorsement, which is suitable for large scale information exchange between different regions. In addition, blockchain has the characteristics of decentralization and tamper resistant, so that it no longer needs an intermediary platform. A blockchain‐based user authorization management method is proposed, which applies blockchain as an underlaying security mechanism for distributed user authorization management within a trusted community of a distributed information exchange sites of federation of industry and commerce. This method can ensure the reliability, consistency, and integrity of user authorization information. With this method, an elastic data exchange trusted community can be built between the data owner and the authorized data user according to the data exchange needs to achieve reliable distributed access authorization.","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136359387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Phishing detection on Ethereum via transaction subgraphs embedding 基于交易子图嵌入的以太坊网络钓鱼检测
IET Blockchain Pub Date : 2023-10-04 DOI: 10.1049/blc2.12034
Haifeng Lv, Yong Ding
{"title":"Phishing detection on Ethereum via transaction subgraphs embedding","authors":"Haifeng Lv,&nbsp;Yong Ding","doi":"10.1049/blc2.12034","DOIUrl":"10.1049/blc2.12034","url":null,"abstract":"<p>With the rapid development of blockchain technology in the financial sector, the security of blockchain is being put to the test due to an increase in phishing fraud. Therefore, it is essential to study more effective measures and better solutions. Graph models have been proven to provide abundant information for downstream assignments. In this study, a graph-based embedding classification method is proposed for phishing detection on Ethereum by modeling its transaction records using subgraphs. Initially, the transaction data of normal addresses and an equal number of confirmed phishing addresses are collected through web crawling. Multiple subgraphs using the collected transaction records are constructed, with each subgraph containing a target address and its nearby transaction network. To extract features of the addresses, a modified Graph2Vec model called imgraph2vec is designed, which considers block height, timestamp, and amount of transactions. Finally, the Extreme Gradient Boosting (XGBoost) algorithm is employed to detect phishing and normal addresses. The experimental results show that the proposed method achieves good performance in phishing detection, indicating the effectiveness of imgraph2vec in feature acquisition of transaction networks compared to existing models.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"3 4","pages":"194-203"},"PeriodicalIF":0.0,"publicationDate":"2023-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12034","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135645045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The offline cash puzzle solved by a local blockchain 本地区块链破解离线现金难题
IET Blockchain Pub Date : 2023-09-24 DOI: 10.1049/blc2.12049
Henrique de Carvalho Videira
{"title":"The offline cash puzzle solved by a local blockchain","authors":"Henrique de Carvalho Videira","doi":"10.1049/blc2.12049","DOIUrl":"10.1049/blc2.12049","url":null,"abstract":"<p>A major drawback in deploying central bank digital currencies (CBDC) is the offline puzzle, which requires that a CBDC must keep the liquidity provision given by cash, and, simultaneously, avoid double-spending, cloning, and other issues. The puzzle is solved by minting the coins in serial numbers, which are stored on a local blockchain inside a smartphone or EMV card. The local blockchain is strengthened by a two-stage approval architecture that mitigates attacks and enables non-repudiation handling. The coins are protected by hardware keys embedded in the microchip and can be continuously mined by the wallet to enhance security. The coins can be either minted as hot coins, which can be retrieved in case of loss, or minted as cold coins, like physical cash.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 1","pages":"43-58"},"PeriodicalIF":0.0,"publicationDate":"2023-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12049","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135926225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信