{"title":"A bitcoin service community classification method based on Random Forest and improved KNN algorithm","authors":"Muyun Gao, Shenwen Lin, Xin Tian, Xi He, Ketai He, Shifeng Chen","doi":"10.1049/blc2.12064","DOIUrl":"10.1049/blc2.12064","url":null,"abstract":"<p>There are service communities with different functions in the Bitcoin transactions system. Identifying community categories helps to further understand the Bitcoin transactions system and facilitates targeted regulation of anonymized Bitcoin transactions. To this end, a Bitcoin service community classification method based on Random Forest and improved K-Nearest Neighbor (KNN) algorithm is proposed. First, the transaction characteristics of different types of communities are analyzed and summarized, and the corresponding transaction features are extracted from the address and entity levels; then multiple classification algorithms are compared, the optimal model to filter the effective features is selected, and the feature vector of entity addresses is constructed. Finally, a classification model is constructed based on Random Forest and improved KNN algorithm to classify the entities. By constructing different classification models for experimental comparison, the accuracy and stability advantages of the proposed method for classification in service community classification research are verified.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 3","pages":"276-286"},"PeriodicalIF":0.0,"publicationDate":"2024-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12064","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140493426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET BlockchainPub Date : 2024-01-24DOI: 10.1049/blc2.12060
Ivan Tuma, Edouard Lansiaux
{"title":"Folding at home: Artificial intelligence and crypto symbiosis for the science","authors":"Ivan Tuma, Edouard Lansiaux","doi":"10.1049/blc2.12060","DOIUrl":"10.1049/blc2.12060","url":null,"abstract":"<p>Folding at Home community gathers pecuniary crypto interest to an altruist cause (medical drugs research participation). There are many possibilities of ‘teams’ for folding, some of which allow compensation in cryptomonies. The authors will therefore study the three major communities in order to compare them, in a cost-benefit study logic. A cost-benefit analysis was performed between CURECOIN, BANANO, DOGECOIN folding, DOGECOIN mining and their communities on social platforms based on several outcomes: ‘Points Per Day (PPD)’, ‘Whattomine Mh/s Equivalent’, ‘Graphics Processing Units (GPU) Thermal Design Power/Typical Board Power Watts’, ‘Coins per 1,000,000 PPD’, ‘Coins per Day’, ‘Cost Per Coin’, ‘Cost Per Day’, ‘kWh Used Per Day’. Actually, BANANO, thanks to a large community and bots, has the highest PPD production and the lowest energetic cost on Central Processing Unit per week. On GPUs, DOGECOIN folding has the lowest weekly cost. However, the DOGECOIN community cannot produce as many PPD as the Banano team. CURECOIN offers a good compromise between the environmental point of view and the profitability one. To ensure fairness, the choice of the crypto and the way to earn it that has to be solved should be a pure public good, that is, perfectly non-rival in consumption and non-excludable. Indeed, the primary goal of those three communities is to allow scientific progress (thanks to Folding at Home) before allowing a return on investment.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 3","pages":"263-275"},"PeriodicalIF":0.0,"publicationDate":"2024-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12060","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139600539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET BlockchainPub Date : 2024-01-17DOI: 10.1049/blc2.12061
Jing Lu, Weidong Yu, Shihong Wu
{"title":"Automatic monitoring and early warning method for power grid infrastructure investment progress using building information model and blockchain","authors":"Jing Lu, Weidong Yu, Shihong Wu","doi":"10.1049/blc2.12061","DOIUrl":"https://doi.org/10.1049/blc2.12061","url":null,"abstract":"In order to improve the precise control level of power grid infrastructure investment, this paper proposes a monitoring and early warning method of power grid infrastructure investment progress based on building information model and blockchain. By capturing the project construction progress images, the features of the power grid infrastructure are extracted automatically. Combined with the technical characteristics of distributed, tamper‐proof, and traceable blockchain, statistical indicators are generated automatically, monitoring and early warning of the investment progress execution deviation are triggered by the rules running on the smart contracts. The case study results show that the mean absolute error of the target image recognition method based on the image features is 4.32%, and the prediction accuracy of the incoming line is better than that of the engineering civil and substation. The early warning model of investment statistics based on smart contracts can automatically monitor the investment progress and generate early warnings, which provides a basis for the dynamic adjustment of the investment plan, and effectively improves the refined management level of power grid infrastructure investment projects.","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":" 1094","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139617502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET BlockchainPub Date : 2023-12-27DOI: 10.1049/blc2.12056
Shibao Chen, Fei Li
{"title":"Ponzi scheme detection in smart contracts using the integration of deep learning and formal verification","authors":"Shibao Chen, Fei Li","doi":"10.1049/blc2.12056","DOIUrl":"https://doi.org/10.1049/blc2.12056","url":null,"abstract":"<p>Blockchain smart contracts are codes that can execute and enforce rules for blockchain digital transactions. However, smart contracts may contain numerous subtle vulnerabilities, among which Ponzi vulnerabilities are notable. Existing Ponzi scheme contract detection approaches often rely on machine learning models trained on manually extracted features to achieve satisfactory classification results. Nonetheless, the code of a smart contract potentially harbours elusive semantics and characteristics, which compromises the precision and accuracy of vulnerability detection. Therefore, this paper proposes a method of converting operation codes into sequences to process data to avoid losing unnecessary important information, and uses a one-dimensional convolutional neural network combined with formal verification. This method is named PZ-C1DZ3(Ponzi-Conv1D-Z3) and is used for Ponzi scheme detection. Four types of machine learning models, namely Conv1D, Conv1D-LSTM, Conv1D-MLP, and Conv1D-transformer, are employed for improvement and comparative validation experiments. Additionally, formal verification tool Z3 solver is utilized to conduct formal security verification on the final model, ensuring its safety. Experimental results demonstrate that the improved Conv1D model outperforms other existing models in terms of detection efficiency and accuracy while also meeting the requirements of formal security verification.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 2","pages":"185-196"},"PeriodicalIF":0.0,"publicationDate":"2023-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12056","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141251517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"QIoTChain: Quantum IoT-blockchain fusion for advanced data protection in Industry 4.0","authors":"Aditya Kumar Sharma, Mritunjay Shall Peelam, Brijesh Kumar Chauasia, Vinay Chamola","doi":"10.1049/blc2.12059","DOIUrl":"https://doi.org/10.1049/blc2.12059","url":null,"abstract":"<p>The modern world has its foundation built on data. Data is generated all the time, and many aspects of the society and economy are built upon it. In today's world, data is employed in better decision-making, innovation, and improving the efficiency of systems. It becomes essential to protect it from being tampered with or misused. Encryptions based on cryptographic systems are used in mainstream data protection these days. There have been newer iterations of mechanisms based on new techniques using blockchain and the zero trust model and even systems that employ fog computing along with content delivery networks. The advent of computation through quantum technologies also helped in developing data security with post-quantum mechanisms. The critical conditions for the working of these mechanisms hinder their adoption primarily. This also leads current systems to lack one or more of these technologies. Thus, the importance of a unified system that can employ quantum technologies effectively becomes prominent and requires a definitive investigation. In this article, a Quantum-IoT-based data protection scheme that can be of value to Industry 4.0 is analyzed. Light is also shed on innovations in quantum computing that can help solve not just current problems but also the future.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 3","pages":"252-262"},"PeriodicalIF":0.0,"publicationDate":"2023-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12059","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142160203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET BlockchainPub Date : 2023-11-13DOI: 10.1049/blc2.12057
Valli S Kumar, John J. Lee, Qin Hu
{"title":"Non-fungible token-based health record marketplace","authors":"Valli S Kumar, John J. Lee, Qin Hu","doi":"10.1049/blc2.12057","DOIUrl":"10.1049/blc2.12057","url":null,"abstract":"<p>With an increasing affinity towards patient-centric care, sharing real-time sensitive data for collaboration between multiple parties with finer access control becomes critical. Most existing studies based on the blockchain technology in the medical field discuss various application scenarios and security aspects, without focusing on data ownership, secure data sharing, or finer access control. In this work, a non-fungible token (NFT)-based system is proposed to implement a health record marketplace. The system leverages the NFT technology to provide dual ownership along with finer access control and efficiency in data sharing. The advantage of permissioned blockchain along with InterPlanetary File System (IPFS) are taken for off-chain data storage to improve security and efficiency. Because price determination is critical in the market, Stackelberg game theory is utilized to determine pricing strategies for both data owners and consumers. Also, to efficiently achieve finer access control, a popularity-based adaptive NFT management scheme using reinforcement learning is proposed. Simulation experiments are carried out to demonstrate accuracy and efficiency of our proposed schemes.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 2","pages":"169-184"},"PeriodicalIF":0.0,"publicationDate":"2023-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12057","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136346707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blockchain privacy: Fundamental aspects and challenges for the future Internet data sharing","authors":"Nikolaos Kapsoulis, Alexandros Psychas, Antonios Litke, Theodora Varvarigou","doi":"10.1049/blc2.12058","DOIUrl":"10.1049/blc2.12058","url":null,"abstract":"<p>Privacy concerns the majority of individuals, governments, and organizations that share data over dissimilar networks of nodes. Every kind of participant requires awareness of the data journey that unfolds inside a blockchain network with its own trustworthy rules of data management and accessibility. This paper provides a methodological approach on privacy for data sharing within blockchain environments. Specific technological aspects of blockchains that relate to on-chain privacy such as network nature, party join, smart contracts, blockchain states, transactions, and ledger flows, are analysed with respect to the involvement and impact of privacy in distributed ledgers. A high-level architectural approach is suggested that is intended to address significant privacy concerns on data sharing among different kinds of users in the context of blockchain networks deployment and the broader Web 3.0 ecosystem building. Simultaneously, many pertinent challenges are discussed regarding network nature, configurable privacy, ownership, confidentiality, secured computation, and data monetization that appear in the field and ought to be carefully tackled for the future mass adoption of privacy-matured distributed ledgers that interconnect delivering the future Internet.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 2","pages":"152-168"},"PeriodicalIF":0.0,"publicationDate":"2023-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12058","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135393308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET BlockchainPub Date : 2023-11-07DOI: 10.1049/blc2.12055
Yun-Cheng Tsai, Jiun-Yu Huang, Da-Ru Chiou
{"title":"Empowering young learners to explore blockchain with user-friendly tools: a method using Google Blockly and NFTs","authors":"Yun-Cheng Tsai, Jiun-Yu Huang, Da-Ru Chiou","doi":"10.1049/blc2.12055","DOIUrl":"10.1049/blc2.12055","url":null,"abstract":"<p>This paper presents a novel architecture utilizing blockchain technology to enhance educational systems. A method is proposed that empowers non-fungible tokens by updating their metadata through an API layer, making blockchain technology more accessible to K-12 students. Leveraging Google Blockly, a visual programming language, the aim is to engage students in computational thinking and foster their understanding of blockchain concepts. The approach promotes student engagement, facilitates the comprehension of digital ownership and value, and develops essential skills for the digital age. Through the method, the contribution is in the advancing of blockchain in education. The demo video can be seen using the following link, https://youtu.be/ZPVKgWtSb6U.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 4","pages":"324-334"},"PeriodicalIF":0.0,"publicationDate":"2023-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12055","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135540130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET BlockchainPub Date : 2023-10-28DOI: 10.1049/blc2.12050
Xin Zhou, Lin Yang, Linru MA, Huasen He
{"title":"Towards secure and resilient unmanned aerial vehicles swarm network based on blockchain","authors":"Xin Zhou, Lin Yang, Linru MA, Huasen He","doi":"10.1049/blc2.12050","DOIUrl":"https://doi.org/10.1049/blc2.12050","url":null,"abstract":"Abstract Blockchain, as an emerging technology, has found diverse applications in solving trust issues in multi‐party cooperation. The field of Unmanned Aerial Vehicle (UAV) swarm networks is no exception, as UAVs are susceptible to attacks from malicious counterparts due to limited computing and storage resources. In this paper, the authors present an adaptive networking mechanism for UAVs based on blockchain technology, which incorporates three key technologies. Utilizing Global Unique Identifier (GUID) and block storage, UAVs can achieve rapid identity authentication and efficient swarm switching. By evaluating node participation in block consensus, malicious nodes within the UAV swarm can be accurately identified. Additionally, routing learning based on node security attributes and link quality ensures secure and efficient data transmission. Simulation test results demonstrate the practicality and applicability of the proposed blockchain‐based adaptive networking mechanism for UAV swarm networks.","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136233187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET BlockchainPub Date : 2023-10-25DOI: 10.1049/blc2.12054
Chenglong Huang, Erwu Liu, Rui Wang, Yan Liu, Hanfu Zhang, Yuanzhe Geng, Jie Wang, Shaoyi Han
{"title":"Personalized federated learning via directed acyclic graph based blockchain","authors":"Chenglong Huang, Erwu Liu, Rui Wang, Yan Liu, Hanfu Zhang, Yuanzhe Geng, Jie Wang, Shaoyi Han","doi":"10.1049/blc2.12054","DOIUrl":"10.1049/blc2.12054","url":null,"abstract":"<p>Common federated learning (FL) lacks consideration of clients' personalized requirements, which performs poorly for the scenario with data and resource heterogeneity. In order to overcome the challenge of heterogeneous characteristics, this letter proposes a novel decentralized personalized federated learning (PFL) architecture that first utilizes a directed acyclic graph (DAG) blockchain technology to achieve PFL efficiently, which is called PFLDAG. Simulation results demonstrate that PFLDAG approximately improves accuracy by 80% compared with the classic Google FedAvg algorithm, and by 10% compared with IFCA cluster PFL which considers personalized requirements. In addition, the approach also substantially improves the convergence speed.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 1","pages":"73-82"},"PeriodicalIF":0.0,"publicationDate":"2023-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12054","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135218227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}