IET Blockchain最新文献

筛选
英文 中文
Phishing detection on Ethereum via transaction subgraphs embedding 基于交易子图嵌入的以太坊网络钓鱼检测
IET Blockchain Pub Date : 2023-10-04 DOI: 10.1049/blc2.12034
Haifeng Lv, Yong Ding
{"title":"Phishing detection on Ethereum via transaction subgraphs embedding","authors":"Haifeng Lv,&nbsp;Yong Ding","doi":"10.1049/blc2.12034","DOIUrl":"10.1049/blc2.12034","url":null,"abstract":"<p>With the rapid development of blockchain technology in the financial sector, the security of blockchain is being put to the test due to an increase in phishing fraud. Therefore, it is essential to study more effective measures and better solutions. Graph models have been proven to provide abundant information for downstream assignments. In this study, a graph-based embedding classification method is proposed for phishing detection on Ethereum by modeling its transaction records using subgraphs. Initially, the transaction data of normal addresses and an equal number of confirmed phishing addresses are collected through web crawling. Multiple subgraphs using the collected transaction records are constructed, with each subgraph containing a target address and its nearby transaction network. To extract features of the addresses, a modified Graph2Vec model called imgraph2vec is designed, which considers block height, timestamp, and amount of transactions. Finally, the Extreme Gradient Boosting (XGBoost) algorithm is employed to detect phishing and normal addresses. The experimental results show that the proposed method achieves good performance in phishing detection, indicating the effectiveness of imgraph2vec in feature acquisition of transaction networks compared to existing models.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"3 4","pages":"194-203"},"PeriodicalIF":0.0,"publicationDate":"2023-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12034","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135645045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The offline cash puzzle solved by a local blockchain 本地区块链破解离线现金难题
IET Blockchain Pub Date : 2023-09-24 DOI: 10.1049/blc2.12049
Henrique de Carvalho Videira
{"title":"The offline cash puzzle solved by a local blockchain","authors":"Henrique de Carvalho Videira","doi":"10.1049/blc2.12049","DOIUrl":"10.1049/blc2.12049","url":null,"abstract":"<p>A major drawback in deploying central bank digital currencies (CBDC) is the offline puzzle, which requires that a CBDC must keep the liquidity provision given by cash, and, simultaneously, avoid double-spending, cloning, and other issues. The puzzle is solved by minting the coins in serial numbers, which are stored on a local blockchain inside a smartphone or EMV card. The local blockchain is strengthened by a two-stage approval architecture that mitigates attacks and enables non-repudiation handling. The coins are protected by hardware keys embedded in the microchip and can be continuously mined by the wallet to enhance security. The coins can be either minted as hot coins, which can be retrieved in case of loss, or minted as cold coins, like physical cash.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 1","pages":"43-58"},"PeriodicalIF":0.0,"publicationDate":"2023-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12049","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135926225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ChainKeeper: A cross-chain scheme for governing the chain by chain ChainKeeper:一种跨链方案,用于逐链管理
IET Blockchain Pub Date : 2023-09-08 DOI: 10.1049/blc2.12047
Yuwei Xu, Ran He, Shengjiang Dai, Yujian Zhang
{"title":"ChainKeeper: A cross-chain scheme for governing the chain by chain","authors":"Yuwei Xu,&nbsp;Ran He,&nbsp;Shengjiang Dai,&nbsp;Yujian Zhang","doi":"10.1049/blc2.12047","DOIUrl":"10.1049/blc2.12047","url":null,"abstract":"<p>With the rapid application of consortium chains, supervising these systems has become a challenge for governments. The centralized model fails to deliver supervision services that are both open and transparent. Given the benefits of decentralization, non-tampering, and traceability offered by blockchains, researchers propose the concept of ‘governing the chain by chain’, which involves supervising multiple consortium chains by constructing a blockchain. Under this idea, the cross-chain scheme becomes the key to achieving excellent supervision. Existing studies have shortcomings and cannot meet the requirements of universality, security, and efficiency in cross-chain supervision scenarios. Aiming at the challenges, we propose ChainKeeper, a cross-chain scheme for governing the chain by chain. The innovation of our work lies in three points. First, a modular node proxy program is designed to adapt to various implementations of consortium chains. Second, a verifiable node random selection method is put forward to improve the throughput of cross-chain data transmission. Finally, a verifiable identity threshold signature method is proposed to prevent the cheating behavior of malicious nodes. To verify the universality of ChainKeeper, we built a prototype system on three types of consortium chains. The experimental results show that ChainKeeper can achieve high throughput, outperforming two state-of-the-art cross-chain schemes.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"3 4","pages":"249-264"},"PeriodicalIF":0.0,"publicationDate":"2023-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12047","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77016801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SCGformer: Smart contract vulnerability detection based on control flow graph and transformer SCGformer:基于控制流图和变压器的智能合约漏洞检测
IET Blockchain Pub Date : 2023-09-06 DOI: 10.1049/blc2.12046
KeXin Gong, Xiangmei Song, Na Wang, Chunyang Wang, Huijuan Zhu
{"title":"SCGformer: Smart contract vulnerability detection based on control flow graph and transformer","authors":"KeXin Gong,&nbsp;Xiangmei Song,&nbsp;Na Wang,&nbsp;Chunyang Wang,&nbsp;Huijuan Zhu","doi":"10.1049/blc2.12046","DOIUrl":"10.1049/blc2.12046","url":null,"abstract":"<p>The security of smart contract has always been one of the significant problems in blockchain. As shown in previous studies, vulnerabilities in smart contracts can lead to unpredictable losses. With the rapid growth of the number of smart contracts, more and more data driven detection technologies based on machine learning have been proposed. However, some state-of-the-art approaches mainly rely on the source code of smart contract. These methods are limited by the openness of the source code and the version of the programming language. To address this problem, we propose a novel vulnerability detection method based on transformer by constructing the control flow graph (CFG) of smart contracts operation codes (opcodes), which shields the difference of various versions of program language. Extensive experiments are conducted to evaluate the effectiveness of the proposed method on the authors' own collected dataset. The experimental results show that the proposed method achieves 94.36% accuracy in vulnerability detection, which performs better than other state-of-the-art methods.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"3 4","pages":"213-221"},"PeriodicalIF":0.0,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12046","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72942803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BlockDetective: A GCN-based student–teacher framework for blockchain anomaly detection BlockDetective:用于区块链异常检测的基于gcn的师生框架
IET Blockchain Pub Date : 2023-09-05 DOI: 10.1049/blc2.12044
Jinglin Li, Yihang Zhang, Chun Yang
{"title":"BlockDetective: A GCN-based student–teacher framework for blockchain anomaly detection","authors":"Jinglin Li,&nbsp;Yihang Zhang,&nbsp;Chun Yang","doi":"10.1049/blc2.12044","DOIUrl":"10.1049/blc2.12044","url":null,"abstract":"<p>The anonymous and tamper-proof nature of the blockchain poses significant challenges in auditing and regulating the behaviour and data on the chain. Criminal activities and anomalies are frequently changing, and fraudsters are devising new ways to evade detection. Moreover, the high volume and complexity of transactions and asymmetric errors make data classification more challenging. Also, class imbalances and high labelling costs are hindering the development of effective algorithms. In response to these issues, the authors present BlockDetective, a novel framework based on GCN that utilizes student–teacher architecture to detect fraudulent cryptocurrency transactions that are related to money laundering. The authors’ method leverages pre-training and fine-tuning, allowing the pre-trained model (teacher) to adapt better to the new data distribution and enhance the prediction performance while teaching a new, light-weight model (student) that provides abstract and top-level information. The authors’ experimental results show that BlockDetective outperforms state-of-the-art research methods by achieving top-notch performance in detecting fraudulent transactions on the blockchain. This framework can assist regulators and auditors in detecting and preventing fraudulent activities on the blockchain, thereby promoting a more secure and transparent financial system.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"3 4","pages":"204-212"},"PeriodicalIF":0.0,"publicationDate":"2023-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12044","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78749929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An on-chain trading model of real world asset backed digital assets 一个真实世界资产支持数字资产的链上交易模型
IET Blockchain Pub Date : 2023-09-05 DOI: 10.1049/blc2.12045
Dongsheng Hou, Wenjing Ma, Wei Zhang, Yixuan Li, Yu Du, Yukun Hao
{"title":"An on-chain trading model of real world asset backed digital assets","authors":"Dongsheng Hou,&nbsp;Wenjing Ma,&nbsp;Wei Zhang,&nbsp;Yixuan Li,&nbsp;Yu Du,&nbsp;Yukun Hao","doi":"10.1049/blc2.12045","DOIUrl":"10.1049/blc2.12045","url":null,"abstract":"<p>Metaverse is a digital value interaction network based on blockchain technology, with an important economic system component. While both traditional financial industries and crypto-native industries have made significant progress by leveraging blockchain, the value stream of each remains limited to separate ecosystems. To bridge this gap between off-chain and on-chain economic systems, an on-chain trading model was proposed using HD key derivation technique for direct uploading onto chains without going through centralized services for IoT data transmission. To improve the current status of NFTs as static assets, a token protocol binding each NFT with a unique account address was proposed. Additionally, oracle technique was leveraged with a decentralized and distributed trust model spanning across on-chain and off-chain components which securely pushes data between smart contracts and Web-APIs. A decentralized trading model was developed based on smart contracts implementing automated market makers according to CFMM algorithm. Parallel transaction computing was executed based on the DAG model to ensure high operational performance and security standards of underlying blockchain. Finally, the on-chain trading system of real world asset backed digital assets was developed integrating all the above key techniques that correspond to crucial functions of a complete economic system in Metaverse.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 4","pages":"315-323"},"PeriodicalIF":0.0,"publicationDate":"2023-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12045","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82429059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A bytecode-based integrated detection and repair method for reentrancy vulnerabilities in smart contracts 基于字节码的智能合约重入漏洞综合检测与修复方法
IET Blockchain Pub Date : 2023-09-04 DOI: 10.1049/blc2.12043
Zijun Feng, Yuming Feng, Hui He, Weizhe Zhang, Yu Zhang
{"title":"A bytecode-based integrated detection and repair method for reentrancy vulnerabilities in smart contracts","authors":"Zijun Feng,&nbsp;Yuming Feng,&nbsp;Hui He,&nbsp;Weizhe Zhang,&nbsp;Yu Zhang","doi":"10.1049/blc2.12043","DOIUrl":"10.1049/blc2.12043","url":null,"abstract":"<p>The reentrancy vulnerability in smart contracts has caused significant losses in the digital currency economy. Existing solutions for detecting and repairing this vulnerability are limited in scope and lack a comprehensive framework. Additionally, there is currently a lack of guidance methods for effectively pinpointing the location of vulnerabilities. The proposed bytecode-level method addresses these challenges by incorporating a detection module, an auxiliary localization module, and a repair module. An opcode classification method is introduced using vulnerability features and a BiLSTM-Attention-based sequence model to enhance detection accuracy. To overcome difficulties in vulnerability localization, an auxiliary localization method based on data flow and control flow analysis is proposed, enabling developers to better locate vulnerabilities. Current reentrancy vulnerability repair methods are analyzed and strategies for three reachable patterns are proposed. The bytecode rewriting strategy utilizes Trampoline technology for repair, while a fuel optimization method reduces bytecode generation length to optimize gas costs. Through extensive experimental validation, the effectiveness and superiority of the proposed methods are confirmed, further validating the feasibility of the entire framework. Experimental results demonstrate that the framework offers enhanced protection against reentrancy vulnerability attacks in smart contracts.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 3","pages":"235-251"},"PeriodicalIF":0.0,"publicationDate":"2023-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12043","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89085066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multisecret-sharing scheme with two-level security and its applications in blockchain 具有两级安全的多存储空间共享方案及其在区块链中的应用
IET Blockchain Pub Date : 2023-08-26 DOI: 10.1049/blc2.12042
Rajendra Kumar Sharma, Ritumoni Sarma, Neha Arora, Vidya Sagar
{"title":"Multisecret-sharing scheme with two-level security and its applications in blockchain","authors":"Rajendra Kumar Sharma,&nbsp;Ritumoni Sarma,&nbsp;Neha Arora,&nbsp;Vidya Sagar","doi":"10.1049/blc2.12042","DOIUrl":"10.1049/blc2.12042","url":null,"abstract":"<p>A <math>\u0000 <semantics>\u0000 <mrow>\u0000 <mo>(</mo>\u0000 <mi>t</mi>\u0000 <mo>,</mo>\u0000 <mi>m</mi>\u0000 <mo>)</mo>\u0000 </mrow>\u0000 <annotation>$(t,m)$</annotation>\u0000 </semantics></math>-threshold secret sharing and multisecret-sharing scheme based on Shamir's secret sharing scheme are introduced with two-level security using a one-way function. Besides, its application in a smart contract-enabled consortium blockchain network is discussed. The proposed scheme is thoroughly examined in terms of security and efficiency. Privacy, security, integrity, and scalability are also analyzed while applying it to the blockchain network.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 1","pages":"30-42"},"PeriodicalIF":0.0,"publicationDate":"2023-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12042","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135181533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Asynchronous blockchain-based federated learning for tokenized smart power contract of heterogeneous networked microgrid system 基于异步区块链的异构网络化微电网令牌化智能电力合约联邦学习
IET Blockchain Pub Date : 2023-08-26 DOI: 10.1049/blc2.12041
Desh Deepak Sharma
{"title":"Asynchronous blockchain-based federated learning for tokenized smart power contract of heterogeneous networked microgrid system","authors":"Desh Deepak Sharma","doi":"10.1049/blc2.12041","DOIUrl":"10.1049/blc2.12041","url":null,"abstract":"<p>In a networked microgrid system (NMS), various heterogeneous microgrids are interconnected. A networked microgrid system facilitates a new kind of physical design that provides numerous advantages such as distributed economic optimization, reliability, resiliency, and focusing on distributed generations and customers. Designing the secure and privacy-protected smart power contract between electricity suppliers and consumers, considered as agents, of different microgrids, is a challenging task in the networked- microgrid system. Each microgrid implements a heterogeneous or isomorphic blockchain based platform. The blockchain interoperability, inherently, presents in different blockchains implemented by various microgrids. This paper reviews the interoperability issues and smart contract designs in blockchain-based systems and proposes new mechanisms to cater blockchain interoperability challenges to facilitate the design of secure and seamless smart contracts among different blockchains of microgrids. A network hub of heterogeneous blockchains of network microgrids has been proposed. A methodology has been developed to transfer tokens between interoperable blockchains. A distributed identity-based microgrid (DIBM) scheme is incorporated to make the networked microgrid system secure and trustworthy. This paper suggests an effective consensus protocol for cross-chain architecture that improves the tokenization system and smart power contract designs. Asynchronous blockchain based federated learning for peer-to-peer smart power exchange has been implemented in learning process of interoperable and heterogeneous blockchain based network hub of microgrid. For simulation purposes, MATLAB and python programming have been used with real-time data of microgrids.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 4","pages":"302-314"},"PeriodicalIF":0.0,"publicationDate":"2023-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12041","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86011639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A research on cross-chain and interoperation methods of fusion protocol 融合协议的跨链和互操作方法研究
IET Blockchain Pub Date : 2023-08-23 DOI: 10.1049/blc2.12040
Li Ming, Song Wenpeng, Li Ankai, Zhou Ziming, Liu Mianchen
{"title":"A research on cross-chain and interoperation methods of fusion protocol","authors":"Li Ming,&nbsp;Song Wenpeng,&nbsp;Li Ankai,&nbsp;Zhou Ziming,&nbsp;Liu Mianchen","doi":"10.1049/blc2.12040","DOIUrl":"10.1049/blc2.12040","url":null,"abstract":"<p>At present, cross-chain technology and cross-chain system pay more attention to cross-chain security and performance, and have shown great improvement in security, scalability and efficiency. However, the generality of cross-chain technology in different scenarios is poor, and it may not fit in different business fields. In order to solve the generality problem of cross-chain technology, this paper sorts out and analyzes the research of blockchain cross-chain protocol, and proposes a fusion protocol cross-chain method based on relay-chain technology. This paper will introduce the cross-chain framework and cross-chain transaction process of fusion protocol. Cross-chain framework includes blockchain cross-chain interaction architecture, cross-chain interaction governance mechanism and cross-chain privacy protection scheme. The transaction process is divided into three different stages. Finally, combined with cross-chain key technologies and landing application requirements, the future research direction of blockchain cross-chain technology is given. The fusion protocol cross-chain method based on relay-chain technology proposed here is a groundbreaking innovation in the field of blockchain cross-chain technology. By integrating the advantages of different blockchain systems and protocols, the fusion protocol is able to achieve a high degree of generality and compatibility, making it suitable for various business scenarios and applications.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 1","pages":"18-29"},"PeriodicalIF":0.0,"publicationDate":"2023-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12040","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85892893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信