{"title":"An on-chain trading model of real world asset backed digital assets","authors":"Dongsheng Hou, Wenjing Ma, Wei Zhang, Yixuan Li, Yu Du, Yukun Hao","doi":"10.1049/blc2.12045","DOIUrl":"10.1049/blc2.12045","url":null,"abstract":"<p>Metaverse is a digital value interaction network based on blockchain technology, with an important economic system component. While both traditional financial industries and crypto-native industries have made significant progress by leveraging blockchain, the value stream of each remains limited to separate ecosystems. To bridge this gap between off-chain and on-chain economic systems, an on-chain trading model was proposed using HD key derivation technique for direct uploading onto chains without going through centralized services for IoT data transmission. To improve the current status of NFTs as static assets, a token protocol binding each NFT with a unique account address was proposed. Additionally, oracle technique was leveraged with a decentralized and distributed trust model spanning across on-chain and off-chain components which securely pushes data between smart contracts and Web-APIs. A decentralized trading model was developed based on smart contracts implementing automated market makers according to CFMM algorithm. Parallel transaction computing was executed based on the DAG model to ensure high operational performance and security standards of underlying blockchain. Finally, the on-chain trading system of real world asset backed digital assets was developed integrating all the above key techniques that correspond to crucial functions of a complete economic system in Metaverse.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 4","pages":"315-323"},"PeriodicalIF":0.0,"publicationDate":"2023-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12045","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82429059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A bytecode-based integrated detection and repair method for reentrancy vulnerabilities in smart contracts","authors":"Zijun Feng, Yuming Feng, Hui He, Weizhe Zhang, Yu Zhang","doi":"10.1049/blc2.12043","DOIUrl":"10.1049/blc2.12043","url":null,"abstract":"<p>The reentrancy vulnerability in smart contracts has caused significant losses in the digital currency economy. Existing solutions for detecting and repairing this vulnerability are limited in scope and lack a comprehensive framework. Additionally, there is currently a lack of guidance methods for effectively pinpointing the location of vulnerabilities. The proposed bytecode-level method addresses these challenges by incorporating a detection module, an auxiliary localization module, and a repair module. An opcode classification method is introduced using vulnerability features and a BiLSTM-Attention-based sequence model to enhance detection accuracy. To overcome difficulties in vulnerability localization, an auxiliary localization method based on data flow and control flow analysis is proposed, enabling developers to better locate vulnerabilities. Current reentrancy vulnerability repair methods are analyzed and strategies for three reachable patterns are proposed. The bytecode rewriting strategy utilizes Trampoline technology for repair, while a fuel optimization method reduces bytecode generation length to optimize gas costs. Through extensive experimental validation, the effectiveness and superiority of the proposed methods are confirmed, further validating the feasibility of the entire framework. Experimental results demonstrate that the framework offers enhanced protection against reentrancy vulnerability attacks in smart contracts.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 3","pages":"235-251"},"PeriodicalIF":0.0,"publicationDate":"2023-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12043","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89085066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multisecret-sharing scheme with two-level security and its applications in blockchain","authors":"Rajendra Kumar Sharma, Ritumoni Sarma, Neha Arora, Vidya Sagar","doi":"10.1049/blc2.12042","DOIUrl":"10.1049/blc2.12042","url":null,"abstract":"<p>A <math>\u0000 <semantics>\u0000 <mrow>\u0000 <mo>(</mo>\u0000 <mi>t</mi>\u0000 <mo>,</mo>\u0000 <mi>m</mi>\u0000 <mo>)</mo>\u0000 </mrow>\u0000 <annotation>$(t,m)$</annotation>\u0000 </semantics></math>-threshold secret sharing and multisecret-sharing scheme based on Shamir's secret sharing scheme are introduced with two-level security using a one-way function. Besides, its application in a smart contract-enabled consortium blockchain network is discussed. The proposed scheme is thoroughly examined in terms of security and efficiency. Privacy, security, integrity, and scalability are also analyzed while applying it to the blockchain network.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 1","pages":"30-42"},"PeriodicalIF":0.0,"publicationDate":"2023-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12042","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135181533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET BlockchainPub Date : 2023-08-26DOI: 10.1049/blc2.12041
Desh Deepak Sharma
{"title":"Asynchronous blockchain-based federated learning for tokenized smart power contract of heterogeneous networked microgrid system","authors":"Desh Deepak Sharma","doi":"10.1049/blc2.12041","DOIUrl":"10.1049/blc2.12041","url":null,"abstract":"<p>In a networked microgrid system (NMS), various heterogeneous microgrids are interconnected. A networked microgrid system facilitates a new kind of physical design that provides numerous advantages such as distributed economic optimization, reliability, resiliency, and focusing on distributed generations and customers. Designing the secure and privacy-protected smart power contract between electricity suppliers and consumers, considered as agents, of different microgrids, is a challenging task in the networked- microgrid system. Each microgrid implements a heterogeneous or isomorphic blockchain based platform. The blockchain interoperability, inherently, presents in different blockchains implemented by various microgrids. This paper reviews the interoperability issues and smart contract designs in blockchain-based systems and proposes new mechanisms to cater blockchain interoperability challenges to facilitate the design of secure and seamless smart contracts among different blockchains of microgrids. A network hub of heterogeneous blockchains of network microgrids has been proposed. A methodology has been developed to transfer tokens between interoperable blockchains. A distributed identity-based microgrid (DIBM) scheme is incorporated to make the networked microgrid system secure and trustworthy. This paper suggests an effective consensus protocol for cross-chain architecture that improves the tokenization system and smart power contract designs. Asynchronous blockchain based federated learning for peer-to-peer smart power exchange has been implemented in learning process of interoperable and heterogeneous blockchain based network hub of microgrid. For simulation purposes, MATLAB and python programming have been used with real-time data of microgrids.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 4","pages":"302-314"},"PeriodicalIF":0.0,"publicationDate":"2023-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12041","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86011639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET BlockchainPub Date : 2023-08-23DOI: 10.1049/blc2.12040
Li Ming, Song Wenpeng, Li Ankai, Zhou Ziming, Liu Mianchen
{"title":"A research on cross-chain and interoperation methods of fusion protocol","authors":"Li Ming, Song Wenpeng, Li Ankai, Zhou Ziming, Liu Mianchen","doi":"10.1049/blc2.12040","DOIUrl":"10.1049/blc2.12040","url":null,"abstract":"<p>At present, cross-chain technology and cross-chain system pay more attention to cross-chain security and performance, and have shown great improvement in security, scalability and efficiency. However, the generality of cross-chain technology in different scenarios is poor, and it may not fit in different business fields. In order to solve the generality problem of cross-chain technology, this paper sorts out and analyzes the research of blockchain cross-chain protocol, and proposes a fusion protocol cross-chain method based on relay-chain technology. This paper will introduce the cross-chain framework and cross-chain transaction process of fusion protocol. Cross-chain framework includes blockchain cross-chain interaction architecture, cross-chain interaction governance mechanism and cross-chain privacy protection scheme. The transaction process is divided into three different stages. Finally, combined with cross-chain key technologies and landing application requirements, the future research direction of blockchain cross-chain technology is given. The fusion protocol cross-chain method based on relay-chain technology proposed here is a groundbreaking innovation in the field of blockchain cross-chain technology. By integrating the advantages of different blockchain systems and protocols, the fusion protocol is able to achieve a high degree of generality and compatibility, making it suitable for various business scenarios and applications.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 1","pages":"18-29"},"PeriodicalIF":0.0,"publicationDate":"2023-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12040","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85892893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET BlockchainPub Date : 2023-08-14DOI: 10.1049/blc2.12036
Ardeshir Shojaeinasab, Amir Pasha Motamed, Behnam Bahrak
{"title":"Mixing detection on Bitcoin transactions using statistical patterns","authors":"Ardeshir Shojaeinasab, Amir Pasha Motamed, Behnam Bahrak","doi":"10.1049/blc2.12036","DOIUrl":"https://doi.org/10.1049/blc2.12036","url":null,"abstract":"<p>Cryptocurrencies, particularly Bitcoin, have garnered attention for their potential in anonymous transactions. However, their anonymity has often been compromised by deanonymization attacks. To counter this, mixing services have been introduced. While they enhance privacy, they obscure fund traceability. This study seeks to demystify transactions linked to these services, shedding light on pathways of concealed and laundered money. We propose a method to identify and classify transactions and addresses of major mixing services in Bitcoin. Unlike previous research focusing on older techniques like CoinJoin, we emphasize modern mixing services. We gathered labelled data by transacting with three prominent mixers (MixTum, Blemder, and CryptoMixer) and identified recurring patterns. Using these patterns, an algorithm was created to pinpoint mixing transactions and distinguish mixer-related addresses.</p><p>The algorithm achieved a remarkable recall rate of 100%. Given the lack of clear ground truth and the vast number of unlabelled transactions, ensuring accuracy was a challenge. However, by analyzing a set of non-mixing transactions with our model, it was confirmed that the high recall rate was not misleading. This work provides a significant advancement in monitoring mixing transactions, presenting a valuable tool against fraud and money laundering in cryptocurrency networks.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"3 3","pages":"136-148"},"PeriodicalIF":0.0,"publicationDate":"2023-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12036","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50132435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET BlockchainPub Date : 2023-08-07DOI: 10.1049/blc2.12039
Linqing Xiao, Juntao Gao, Baocang Wang, Xuelian Li
{"title":"Optimized byzantine fault tolerant algorithm for improving performance and security with trust values","authors":"Linqing Xiao, Juntao Gao, Baocang Wang, Xuelian Li","doi":"10.1049/blc2.12039","DOIUrl":"10.1049/blc2.12039","url":null,"abstract":"<p>Blockchain is considered to be a promising technology due to its decentralization, open, and non tamperation. Nevertheless, the current blockchain system cannot replace traditional financial institutions because its performance and security indicators in the consensus algorithm are not perfect. As one of the emerging capacity expansion technologies, sharding technology improves throughput by grouping users and processing transactions in parallel. This paper proposes an improved Byzantine Fault Tolerance algorithm TV-BRAFT. TV-BRAFT calculates a trust value for each user through an incentive mechanism. The sharding scheme based on the trust value is adopted to reduce the probability of malicious nodes being allocated to the same partition, thus improving the security of the system. In the consensus, the system selects users with qualified trust values to form a verification group to supervise the consensus process and avoid submitting error transactions to the blockchain. In order to prove that the TV-BRAFT can resist Byzantine attacks, a recursive formula is used to prove the security of sharding and the security of consensus within one shard. Finally, the simulation results show that the TV-BRAFT not only guarantees the fairness of incentives but is also better than the Raft and PBFT algorithms in efficiency and throughput.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 1","pages":"1-17"},"PeriodicalIF":0.0,"publicationDate":"2023-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12039","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78808009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET BlockchainPub Date : 2023-07-29DOI: 10.1049/blc2.12038
Pouyan Jahanbin, Ravi S. Sharma, Stephen T. Wingreen, Nir Kshetri, Kim-Kwang Raymond Choo
{"title":"Towards CRISP-BC: 3TIC specification framework for Blockchain use-cases","authors":"Pouyan Jahanbin, Ravi S. Sharma, Stephen T. Wingreen, Nir Kshetri, Kim-Kwang Raymond Choo","doi":"10.1049/blc2.12038","DOIUrl":"https://doi.org/10.1049/blc2.12038","url":null,"abstract":"<p>The application of Blockchain and augmented technologies such as IoT, AI, and Big Data platforms present a feasible approach for resolving the implementation challenges of trusted, decentralized platforms. This article proposes a DevOps framework for the specification of Blockchain use-cases that enables evaluation, replication, and benchmarking. Specifically, it could be applied to specify the requirements and design characteristics of Blockchain applications in terms of key attributes such as: (i) transparency; (ii) traceability; (iii) tamper-resistance; (iv) immutability; and (v) compliance. The article first introduces the design characteristics of Blockchain as a Platform and then examines successful use-cases for its implementation using the above attributes. It may be conjectured that the 3TIC framework would serve as the basis of a cross industry process for Blockchain. The intended contribution is that such a standard process will support industry-academia collaboration in the development of Blockchain platforms and services of relevance and utility as it can be applied by firms to structure their requirements and design specifications.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"3 3","pages":"159-168"},"PeriodicalIF":0.0,"publicationDate":"2023-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12038","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50155512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET BlockchainPub Date : 2023-07-25DOI: 10.1049/blc2.12037
Chuntang Yu, Yongzhao Zhan, Pujie Jing, Xiangmei Song
{"title":"SPRA: Scalable policy-based regulatory architecture for blockchain transactions","authors":"Chuntang Yu, Yongzhao Zhan, Pujie Jing, Xiangmei Song","doi":"10.1049/blc2.12037","DOIUrl":"10.1049/blc2.12037","url":null,"abstract":"<p>Implementing effective regulation of blockchain transactions has become a research hotspot in recent years. However, most of the current regulatory schemes are customized for specific blockchain applications and lack versatility and scalability. Meanwhile, these schemes cannot guarantee fairness due to the non-disclosure of regulatory policies and regulatory processes. To address these issues, a scalable policy-based regulatory architecture (SPRA) is proposed for blockchain transactions that separates regulation and application to provide sufficient scalability. SPRA is a four-layer model (permission layer, regulation layer, bridge layer, and business layer). A regulatory policy description language (XRPL) is designed to define the regulatory rules and specifications for interoperability between the layers. A decentralized jury mechanism (JuryBC) based on the Shamir threshold secret sharing algorithm and Pedersen commitment is proposed at the regulation layer to avoid regulatory arbitrariness and unfairness. We also construct a secure and efficient regulatory data sharing scheme (RDShare) at the business layer using an attribute-based encryption algorithm. The key parameters in both JuryBC and RDShare can be specified in the regulatory policy to suit different application scenarios. Finally, the security of the architecture is analyzed and the feasibility and scalability of the architecture through simulation experiments are demonstrated.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"3 4","pages":"265-282"},"PeriodicalIF":0.0,"publicationDate":"2023-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12037","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87572493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET BlockchainPub Date : 2023-07-14DOI: 10.1049/blc2.12035
Junfeng An, Yuanguang Jing, Mengmeng Lu, Lei Zheng, Yuting Li, Ti Zhang, Jiwei Zhang
{"title":"A blockchain database system for a rail transit equipment system","authors":"Junfeng An, Yuanguang Jing, Mengmeng Lu, Lei Zheng, Yuting Li, Ti Zhang, Jiwei Zhang","doi":"10.1049/blc2.12035","DOIUrl":"10.1049/blc2.12035","url":null,"abstract":"<p>As of today, blockchain technology is virtually absent from rail transit applications, however, it has promising potential. For cloud-based systems or conventional systems, there is too much information at the centre, resulting in a high level of data processing. However, if the data processing capability can be provided at the edge station or at the edge equipment, it greatly reduces the operation and maintenance pressure, at the same time, if the edge device takes the form of a blockchain, it is possible to increase the safety protection capability. It is important to reduce operating and maintenance risks for metro equipment systems by installing fault diagnosis and health management capabilities. This paper presents a blockchain-based platform for subway applications. The assistance includes design, construction, operation, and maintenance assistance, energy saving assistance, manpower reduction assistance, fire protection linkage assistance at transfer stations, federal learning analysis and artificial intelligence analysis, as well as specific implementation plans for implementing vent valve equipment as examples.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 1","pages":"83-100"},"PeriodicalIF":0.0,"publicationDate":"2023-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12035","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78842252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}