{"title":"Blockchain-based reliable image copyright protection","authors":"Xiangli Xiao, Xiaotong He, Yushu Zhang, Xuewen Dong, Lu-Xing Yang, Yong Xiang","doi":"10.1049/blc2.12027","DOIUrl":"10.1049/blc2.12027","url":null,"abstract":"<p>The indiscriminate distribution of a large number of unlicensed images through the Internet seriously harms the benefits of image owners, which prompts the study of image copyright protection solutions. Existing blockchain-free solutions are limited to using centralized servers to store copyright information, leaving data vulnerable to being lost or tampered with by external attacks. Although the blockchain-based image copyright protection solutions are capable of addressing the above problem, improvements are needed in choosing a suitable blockchain platform and supporting integrated copyright life cycle management. To this end, this paper designs a blockchain-based reliable image copyright protection system named BB-RICP using Hyperledger Fabric. For one thing, the adoption of Fabric mitigates the limitations of other blockchain platforms represented by Ethereum in terms of efficiency, economy, and availability. For another, BB-RICP successes in achieving integrated copyright lifecycle management. In addition, BB-RICP achieves enhanced applicability performance by firstly introducing GM algorithms recommended by Chinese national standard and adapting the more consortium blockchain-oriented practical byzantine fault tolerance algorithm. Moreover, the adoption of spread spectrum watermarking brings convenience to users. Finally, Kubernetes is used to assist in the simulation of BB-RICP to verify that users can operate reliably in the blockchain network.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"3 4","pages":"222-237"},"PeriodicalIF":0.0,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12027","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82819508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET BlockchainPub Date : 2023-02-21DOI: 10.1049/blc2.12026
Wenpeng Song, Xin Pei, Ming Li
{"title":"A decentralized crypto network with dynamic threshold change","authors":"Wenpeng Song, Xin Pei, Ming Li","doi":"10.1049/blc2.12026","DOIUrl":"https://doi.org/10.1049/blc2.12026","url":null,"abstract":"<p>The threshold proxy re-encryption (tPRE) algorithm not only ensures the separation of data ownership and use right, but also prevents a single data proxy from doing evil. In order to avoid collusion of multiple data proxies, this paper constructs a decentralized crypto network (DCN) based on blockchain technology and tPRE. DCN is more than a key management system, while expanding the data storage capacity of blockchain network. Combined with existing distributed storage schemes, it can store massive data. Due to Byzantine failure in distributed networks, the data proxy nodes can join or leave at will. In order to ensure that the number of data proxy nodes in the DCN network meets the requirements of the re-encryption threshold, and the data authorization operation can be carried out smoothly, this paper presents a dynamic refresh method of tPRE fragments. When there are fragments that meet the threshold number in the network, the allocation of encrypted fragments can be adjusted non-interactivity and self-adaptively. Non-interactivity means that each data proxy node independently refreshes its old fragments into new fragments without collecting old fragments from other nodes in the DCN, and then distributes the new fragments to other data proxy nodes in the DCN. Self-adaptability refers to monitoring the changes of data proxy node sets in the DCN, and automatically refreshing fragments. Finally, the performance of critical algorithms is calculated in the proposal.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"3 2","pages":"116-122"},"PeriodicalIF":0.0,"publicationDate":"2023-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12026","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50152998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET BlockchainPub Date : 2023-02-15DOI: 10.1049/blc2.12025
Roopa Vuppula, Himansu Shekhar Pradhan
{"title":"Blockchain-oriented location privacy preserving for cooperative spectrum sensing in 6G wireless networks","authors":"Roopa Vuppula, Himansu Shekhar Pradhan","doi":"10.1049/blc2.12025","DOIUrl":"https://doi.org/10.1049/blc2.12025","url":null,"abstract":"<p>In this article, the authors proposed a novel blockchain-oriented location privacy-preserving (BoLPP) for the Cooperative Spectrum Sensing (CSS) in 6G networks. In order to attain the sustainability of privacy and security for 6G wireless networks, it is a great challenge in this sensing as it faces various malicious attacks while the secondary user (SU) is active. To tackle these issues, the authors proposed a novel framework for blockchain-oriented Cognitive Radio Networks (CRNs) for CSS using an energy detection technique. Moreover, the authors implemented another novel paradigm BoLPP, to attain the privacy of SUs location for CSS in 6G networks. This approach preserves the SUs’ location and makes the BoLPP framework immune to all malicious attackers. The simulation results have been undergone based on the performance metrics such as response time, consistency, probability of false alarm, frame loss (%), average network throughput, energy efficiency, and security. The outcomes reveal that the proposed scheme achieves high security, privacy, energy efficiency, average network throughput, and low probability of false alarm and frame loss (%) when compared with the existing frameworks such as Friend or Foe (FoF) and Tidal Trust Algorithm (TTA) mechanisms. It is observed that the proposed BoLPP mechanism provides better security and privacy in 6G wireless networks.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"3 2","pages":"74-97"},"PeriodicalIF":0.0,"publicationDate":"2023-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12025","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50133219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET BlockchainPub Date : 2023-01-28DOI: 10.1049/blc2.12023
Sergii Grybniak, Yevhen Leonchyk, Igor Mazurok, Oleksandr Nashyvan, Ruslan Shanin
{"title":"Waterfall: Gozalandia. Distributed protocol with fast finality and proven safety and liveness","authors":"Sergii Grybniak, Yevhen Leonchyk, Igor Mazurok, Oleksandr Nashyvan, Ruslan Shanin","doi":"10.1049/blc2.12023","DOIUrl":"10.1049/blc2.12023","url":null,"abstract":"<p>A consensus protocol is a crucial mechanism of distributed networks by which nodes can coordinate their actions and the current state of data. This article describes a BlockDAG consensus algorithm based on the Proof of Stake approach. The protocol provides network participants with cross-voting for the order of blocks, which, in the case of a fair vote, guarantees a quick consensus. Under conditions of dishonest behavior, cross-voting ensures that violations will be quickly detected. In addition, the protocol assumes the existence of a Coordinating network containing information about the approved ordering, which qualitatively increases security and also serves to improve network synchronization.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"3 4","pages":"182-193"},"PeriodicalIF":0.0,"publicationDate":"2023-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12023","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89577277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET BlockchainPub Date : 2023-01-06DOI: 10.1049/blc2.12022
Yang Liu, Weidong Yang, Yanlin Wang, Yang Liu
{"title":"An access control model for data security sharing cross-domain in consortium blockchain","authors":"Yang Liu, Weidong Yang, Yanlin Wang, Yang Liu","doi":"10.1049/blc2.12022","DOIUrl":"https://doi.org/10.1049/blc2.12022","url":null,"abstract":"<p>With the rapid increment of the demand for data sharing among parties, data is considered a cornerstone component to provide value in the big data environment. Concerns regarding sharing data security have impeded the development of cross-domain data interaction. Therefore, an access control model for data security sharing cross-domain is proposed, Fabric-ABAC, that is based on Hyperledger Fabric and Attribute-based Access Control (ABAC). In order to solve the data security challenges caused by a trusted central organization implementation, a distributed environment is constructed that consists of stakeholders among parties. The unified attribute model is designed for multi-environment combined with smart contracts. Fabric-ABAC realizes multi-level, fine-grained, and auditable access control, enabling data security through automatic permission verification. Considering the ledger is visible to all participants in consortium blockchain, it is necessary to protect the confidentiality of sensitive data. Thus, Proxy Re-Encryption (PRE), which is implemented by smart contracts, is adopted in the scheme to realize the ciphertext interaction without the third party. The security of PRE and the access control model used in Fabric-ABAC is discussed to show that a secure environment for data sharing is provided. Moreover, the completeness of the implementation and effectiveness of the system performance in the multi-domain environment is demonstrated in the experimental results.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"3 1","pages":"18-34"},"PeriodicalIF":0.0,"publicationDate":"2023-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12022","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50133409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET BlockchainPub Date : 2023-01-05DOI: 10.1049/blc2.12021
Mohammad Nabiluzzaman Neloy, Md. Abdul Wahab, Sheikh Wasif, Abdulla All Noman, Mustafizur Rahaman, Tahmid Hasan Pranto, A. K. M. Bahalul Haque, Rashedur M. Rahman
{"title":"A remote and cost-optimized voting system using blockchain and smart contract","authors":"Mohammad Nabiluzzaman Neloy, Md. Abdul Wahab, Sheikh Wasif, Abdulla All Noman, Mustafizur Rahaman, Tahmid Hasan Pranto, A. K. M. Bahalul Haque, Rashedur M. Rahman","doi":"10.1049/blc2.12021","DOIUrl":"https://doi.org/10.1049/blc2.12021","url":null,"abstract":"<p>Traditional voting procedures are non-remote, time-consuming, and less secure. While the voter believes their vote was submitted successfully, the authority does not provide evidence that the vote was counted and tallied. In most cases, the anonymity of a voter is also not sure, as the voter's details are included in the ballot papers. Many voters consider this voting system untrustworthy and manipulative, discouraging them from voting, and consequently, an election loses a significant number of participants. Although the inclusion of electronic voting systems (EVS) has increased efficiency; however, it has raised concerns over security, legitimacy, and transparency. To mitigate these problems, blockchain technology has been leveraged and smart contract facilities with a combination of artificial intelligence (AI) to propose a remote voting system that makes the overall voting procedure transparent, semi-decentralized, and secure. In addition, a system that aids in boosting the number of turnouts in an election through an incentivization policy for the voters have also developed. Through the proposed virtual campaigning feature, the authority can generate a decent amount of revenue, which downsizes the overall cost of an election. To reduce the associated cost of transactions using smart contracts, this system implements a hybrid storage system where only a few cardinal data are stored in the blockchain network.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"3 1","pages":"1-17"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12021","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50130380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET BlockchainPub Date : 2022-12-21DOI: 10.1049/blc2.12020
Moein Choobineh, Ali Arabnya, Behrouz Sohrabi, Amin Khodaei, Aleksi Paaso
{"title":"Blockchain technology in energy systems: A state-of-the-art review","authors":"Moein Choobineh, Ali Arabnya, Behrouz Sohrabi, Amin Khodaei, Aleksi Paaso","doi":"10.1049/blc2.12020","DOIUrl":"https://doi.org/10.1049/blc2.12020","url":null,"abstract":"<p>Blockchain is a powerful technology to facilitate decarbonization, decentralization, digitalization, and democratization (4D's) of the energy systems of the future. The 4D's are the driving forces of transition into new energy systems that are more sustainable, resilient, efficient, and equitable. Although this technology can be applied to a wide spectrum of applications in the power sector, a set of challenges and limitations still need to be addressed to facilitate a full-scope implementation in energy systems. This paper presents an overview of blockchain technology from its inception through its most recent evolution and presents a thematic review of state of the art in the application of this technology in power systems. Further, it addresses the barriers preventing the power sector from large-scale, full-scope adoption of this technology. Finally, the emerging blockchain trends in the near future will be discussed and its potential to facilitate a secure, decentralized energy trading platform will be investigated.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"3 1","pages":"35-59"},"PeriodicalIF":0.0,"publicationDate":"2022-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12020","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50148411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET BlockchainPub Date : 2022-12-05DOI: 10.1049/blc2.12018
Taotao Wang, Long Shi, Jessie Hui Wang, Zhe Wang, Xiumei Deng, Jun Li, Shengli Zhang
{"title":"Building trust via blockchain in UAV-assisted ultra-dense 6G cellular networks","authors":"Taotao Wang, Long Shi, Jessie Hui Wang, Zhe Wang, Xiumei Deng, Jun Li, Shengli Zhang","doi":"10.1049/blc2.12018","DOIUrl":"10.1049/blc2.12018","url":null,"abstract":"<p>The ultra-dense deployment of unmanned aerial vehicles (UAVs) as mobile small cell base stations (SBS) is expected to support ultra-high-speed, ultra-reliable, and ultra-low-latency wireless connections in sixth generation (6G) wireless cellular networks. Inevitably, the explosively increasing number of SBSs each with ever-shrinking cell size will result in the spectrum scarcity and pose critical challenges to the spectrum management. Towards the centralized spectrum management system, a third-party authority is employed to coordinate the spectrum sensing, sharing, and allocation among participants. However, a centralized authority is vulnerable to numerous security threats, such as single point of failure, denial of service attacks, and privacy disclosure, and cannot guarantee fair and efficient spectrum management without mutual trusts among participants. To address these problems, a novel framework of blockchain-aided spectrum management is designed to securely record the spectrum auction data and spectrum allocation data in the decentralized spectrum sharing. Moreover, a trust management scheme is proposed to evaluate the trusts of all UAVs participating in the decentralized spectrum sharing, where the trust increase depends on legal use of spectrum allocation and honest report of spectrum sensing. In particular, it is shown that the proposed trust management can not only incentivize the UAVs to comply with the legal rule of spectrum sharing in blockchain, but also punish the malicious behaviour that either violates the spectrum sharing rule or provides misleading spectrum sensing results.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"2 3-4","pages":"67-76"},"PeriodicalIF":0.0,"publicationDate":"2022-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12018","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83048462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET BlockchainPub Date : 2022-11-19DOI: 10.1049/blc2.12017
Aarju Dixit, A. Trivedi, W. W. Godfrey
{"title":"A survey of cyber attacks on blockchain based IoT systems for industry 4.0","authors":"Aarju Dixit, A. Trivedi, W. W. Godfrey","doi":"10.1049/blc2.12017","DOIUrl":"https://doi.org/10.1049/blc2.12017","url":null,"abstract":"","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"28 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89418153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET BlockchainPub Date : 2022-09-08DOI: 10.1049/blc2.12016
Zhensheng Di, Guan Wang, Lili Jia, Zhuoyi Chen
{"title":"Bitcoin transactions as a graph","authors":"Zhensheng Di, Guan Wang, Lili Jia, Zhuoyi Chen","doi":"10.1049/blc2.12016","DOIUrl":"10.1049/blc2.12016","url":null,"abstract":"<p>Nowadays, blockchain is an upcoming area for researchers from different research fields. Bitcoin, as the first successful cryptocurrency, has accumulated numerous data after its existence. Here, the Bitcoin transaction graph from a graph theory perspective is investigated with more available data given now. This paper mainly focuses on the transaction graph and provides researchers with both practical and theoretical sides of the data. Several existent measurements and some newer ones are first computed and analysed. These measurements help to interpret the transaction graph more extensively. A new modified Buckley–Osthus random graph model is proposed, and a simulation of the Chung–Lu model is attempted to represent the Bitcoin transaction network. Some suggestions are given to improve the modified Buckley–Osthus model and point out the pros and cons of these random graph models. Moreover, the experiments show that scale-free networks are fundamentally not a good model for Bitcoin transaction networks considering all the data, but the mechanics of preferential attachment is crucial. How to proceed with Bitcoin transaction graph theory from both theoretical and experimental perspectives for future studies is also discussed and analysed.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"2 3-4","pages":"57-66"},"PeriodicalIF":0.0,"publicationDate":"2022-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12016","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75220088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}