Proceedings of the 2nd International Electronics Communication Conference最新文献

筛选
英文 中文
Secure Hierarchical Deterministic Key Generation Scheme in Blockchain-based Medical Environment 基于区块链医疗环境的安全分层确定性密钥生成方案
Proceedings of the 2nd International Electronics Communication Conference Pub Date : 2020-07-08 DOI: 10.1145/3409934.3409958
Taehoon Kim, Imyeong Lee
{"title":"Secure Hierarchical Deterministic Key Generation Scheme in Blockchain-based Medical Environment","authors":"Taehoon Kim, Imyeong Lee","doi":"10.1145/3409934.3409958","DOIUrl":"https://doi.org/10.1145/3409934.3409958","url":null,"abstract":"Blockchain is essentially a form of distributed data storage technology. It is designed to prevent arbitrary manipulation by operators of distributed nodes and contains a list of changes that records the continuously changing data on the participating nodes. Currently, various blockchain-based services are appearing. in particular, blockchain-based medical convergence services are emerging worldwide. In a blockchain-based medical environment, hospitals, departments, doctors and patients must frequently update and use all public and private key pairs to minimize the leakage of personal information. As such, key pairs management is of great importance. To securely manage keys in such a medical environment, hierarchical deterministic wallet is used. Defined as Bitcoin's BIP32 standard, it is currently the most commonly used technology and allows hospitals to easily derive and manage the key of departments, doctors and patients. In addition, if the hospital, which is at the root level, backs up the first seed value, the doctor and patient can easily recover the key in the future, in case it is lost. However, problems have been found with hierarchical deterministic wallets. The attacker can infer the doctor's private key by obtaining doctor's public key, chain code, or the patient's index and private key. In addition, there is a privilege escalation attack that can be acquired up to the department or hospital's private key. Subsequently, an attacker can leak personal information, such as the personal information of doctors or medical records of managed patients. That is why the current BIP32 standard does not include the function to derive lower public keys from the higher public keys. In this scheme, we maintain the functionality removed from BIP32. In addition, we propose a secure scheme of hierarchical deterministic key generation scheme in blockchain-based medical environment by preventing privilege escalation attack.","PeriodicalId":145384,"journal":{"name":"Proceedings of the 2nd International Electronics Communication Conference","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130115221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Evaluation of a Patient-Centric Blockchain-based Healthcare Records Management Framework 以患者为中心的基于区块链的医疗记录管理框架的性能评估
Proceedings of the 2nd International Electronics Communication Conference Pub Date : 2020-07-08 DOI: 10.1145/3409934.3409941
L. Ismail, Huned Materwala, Moien A B Khan
{"title":"Performance Evaluation of a Patient-Centric Blockchain-based Healthcare Records Management Framework","authors":"L. Ismail, Huned Materwala, Moien A B Khan","doi":"10.1145/3409934.3409941","DOIUrl":"https://doi.org/10.1145/3409934.3409941","url":null,"abstract":"Healthcare records management system has been revolutionized over the last decade aiming to provide accurate, efficient and enhanced patient care. The existing management system is either based on a client/server approach where each hospital maintains its own database or on a cloud approach where the health records are stored in a cloud server and managed by a third-party cloud service provider. However, these approaches suffer from the issues of security, privacy, data vulnerability and fragmentation. Furthermore, healthcare providers and patients are unable to have a unified view of a patient's medical history from all visited medical care centers. This results in additional treatment costs, repeated medical tests and increased time to diagnosis. The data traceability, immutability, transparency, replication, security and privacy traits of the emerging blockchain technology have a promising potential in the healthcare domain addressing these issues. In this paper, we propose BlockHR, a patient-centric healthcare records management system for efficient medical care at an optimal cost. The system enables healthcare providers to enter the patients' medical record data to the blockchain network and allows patients to enter their social data such as sleeping habits, physical activities, and current location. Consequently, BlockHR provides support to doctors for better diagnosis and prognosis. We evaluate the performance of BlockHR in terms of execution time and the total amount of data transferred for ledger update with an increasing number of hospitals and blocks in the network.","PeriodicalId":145384,"journal":{"name":"Proceedings of the 2nd International Electronics Communication Conference","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126703219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Decentralised Compliant Data Trading for Banks 银行的去中心化合规数据交易
Proceedings of the 2nd International Electronics Communication Conference Pub Date : 2020-07-08 DOI: 10.1145/3409934.3409947
Robert Norvill, Jean Hilger, Irfan-Ullah Awan, A. Cullen, R. State
{"title":"Decentralised Compliant Data Trading for Banks","authors":"Robert Norvill, Jean Hilger, Irfan-Ullah Awan, A. Cullen, R. State","doi":"10.1145/3409934.3409947","DOIUrl":"https://doi.org/10.1145/3409934.3409947","url":null,"abstract":"Banks must comply with a complex set of regulatory and legislative requirements in order to be sure they know who they are doing business with. Current Know Your Customer processes are inefficient and costly, often being repeated by multiple banks. As such, financial institutions have a need to reduce the cost of compliance. Banks can reduce their costs through inter-bank Know Your Customer data trading. In this paper, we build upon an industry-strength, blockchain-based, Know Your Customer data sharing platform to facilitate a novel data marketplace by detailing a method of pricing data such that banks save money and are suitably incentivised to trade their data. The pricing model we detail enables banks to reduce the cost of document acquisition and verification by at least 45%, and even profit by providing documents. In addition, we discuss how decentralised pricing is realised through the use of smart contracts.","PeriodicalId":145384,"journal":{"name":"Proceedings of the 2nd International Electronics Communication Conference","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125170236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Blockchain-Based Smart Network for IoT-Driven Smart Cities 面向物联网驱动的智慧城市的基于区块链的智能网络
Proceedings of the 2nd International Electronics Communication Conference Pub Date : 2020-07-08 DOI: 10.1145/3409934.3409957
Nada Alasbali, S. Azzuhri, R. Salleh
{"title":"A Blockchain-Based Smart Network for IoT-Driven Smart Cities","authors":"Nada Alasbali, S. Azzuhri, R. Salleh","doi":"10.1145/3409934.3409957","DOIUrl":"https://doi.org/10.1145/3409934.3409957","url":null,"abstract":"Internet-of-Things (IoT) networks interoperability is of a crucial role in driving innovation to achieve smart city agenda. However, the potential for a unified and connective digital linkage is undermined by competitive private sector standards and protocols that are dissociated and disunited. In this paper, we propose a blockchain-based standard for IoT integration which is democratized, scalable, and decentralized. As a transactional ledger, the blockchain serves as a central data warehouse capable of monitoring the entrance and exit of user-triggered information. Network interchange and authentication can be facilitated through blockchain-relegation of network communication and security protocol. The outcome is linked with integrated communications, efficiency and a highly functional user experience as the constructs of interoperability develops.","PeriodicalId":145384,"journal":{"name":"Proceedings of the 2nd International Electronics Communication Conference","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131456495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Performance Evaluation of TCP and UDP over IPv4 and IPv6 for the ESP8266 Module ESP8266模块基于IPv4和IPv6的TCP和UDP性能评估
Proceedings of the 2nd International Electronics Communication Conference Pub Date : 2020-07-08 DOI: 10.1145/3409934.3409956
Eric Gamess, Brody Smith
{"title":"Performance Evaluation of TCP and UDP over IPv4 and IPv6 for the ESP8266 Module","authors":"Eric Gamess, Brody Smith","doi":"10.1145/3409934.3409956","DOIUrl":"https://doi.org/10.1145/3409934.3409956","url":null,"abstract":"Due to the increasing popularity of the Internet of Things (IoT), several modules, development boards, and single-board computers have been proposed by the community and manufacturers. In this paper, we selected the ESP8266, an inexpensive module, to make a performance evaluation of its networking subsystem. Since the popular benchmarking tools of the area have not been ported for the ESP8266, we wrote several benchmarks to evaluate its TCP and UDP performance over IPv4 and IPv6, as an end-point device or as an access point. In our tests, we report parameters such as one-way delay and throughput. To cover a wider range of developers, we give performance measurements for two development tools: Arduino IDE and Espressif SDK.","PeriodicalId":145384,"journal":{"name":"Proceedings of the 2nd International Electronics Communication Conference","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127182070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
TheChain: A Fast, Secure and Parallel Treatment of Transactions 链:一个快速、安全、并行的交易处理
Proceedings of the 2nd International Electronics Communication Conference Pub Date : 2020-07-08 DOI: 10.1145/3409934.3409944
Mohamed Ikbal Nacer, S. Prakoonwit, Ismail Alarab
{"title":"TheChain: A Fast, Secure and Parallel Treatment of Transactions","authors":"Mohamed Ikbal Nacer, S. Prakoonwit, Ismail Alarab","doi":"10.1145/3409934.3409944","DOIUrl":"https://doi.org/10.1145/3409934.3409944","url":null,"abstract":"The Smart Distributed Ledger (aka blockchain) has attracted much attention in recent years. According to the European Parliament, this technology has the potential to change the lives of many people. The blockchain is a data structure built upon a hashed function in a distributed network, enabled by an incentive mechanism to discourage malicious nodes from participation. The consensus is at the core of the blockchain technology, and is driven by information embedded into a data structure that takes many forms such as linear, tree, and graph chains. The found related information will be subject to various validation incentives among the miners, such as proof of stake and proof of work. However, all the existing solutions suffer from a heavy state transition before dealing with the problem of a validation mechanism which suffers from resource consumption, monopoly or attacks. This work raises the following question: \"Why is there a need for consensus where all participants can make a quick and correct decision?\", and underlines the fact that sometimes ledger is subject to maintenance from regional parties in the data that leads to partial territories and eliminates monopoly, which is the hurdle to eliminating the trusted party. The validity of the blockchain transaction comes from the related information scattered above the data structure, and the authenticity lies in the digital signature. The aim is to switch from a validator based on incentives to a broadcaster governed by an unsupervised clustering algorithm, and the integrity does lie in the intersection among regions. However, the data structure takes advantage of the Petri network regarding its suitability. Building the entire ledger in the Petri network model will allow parallel processing of the transactions and securing of the total order between the participants on the memory reference layer. Moreover, it takes account of validation criteria quickly and safely before adding the new transaction list using the graph reachability.","PeriodicalId":145384,"journal":{"name":"Proceedings of the 2nd International Electronics Communication Conference","volume":"47 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128372864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Traceability Blockchain Prototype for Regulated Manufacturing Industries 受监管制造业的可追溯性区块链原型
Proceedings of the 2nd International Electronics Communication Conference Pub Date : 2020-07-08 DOI: 10.1145/3409934.3409937
Utkan Eryilmaz, R. Dijkman, W. Jaarsveld, Wouter van Dis, K. Alizadeh
{"title":"Traceability Blockchain Prototype for Regulated Manufacturing Industries","authors":"Utkan Eryilmaz, R. Dijkman, W. Jaarsveld, Wouter van Dis, K. Alizadeh","doi":"10.1145/3409934.3409937","DOIUrl":"https://doi.org/10.1145/3409934.3409937","url":null,"abstract":"Blockchain emerged as a peer-to-peer trust platform for trading virtual currencies and evolved to be used for different problems including supply chain provenance. Due to stringent requirements of safety, regulated manufacturing and service industries such as aerospace, healthcare, and transportation require regulated traceability for parts, from source to the last customer, with detailed information requirements for each handover and operation. In this research, we analyzed the current traceability problem and list use cases of a traceability blockchain platform. A prototype platform is developed for the aerospace industry where every single part is required to have source and path traces recorded by certified supply chain actors. We evaluate the efficiency benefits of the platform in terms of duration and address future research topics.","PeriodicalId":145384,"journal":{"name":"Proceedings of the 2nd International Electronics Communication Conference","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116775389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A Group Authentication Scheme with Privacy-preserving for D2D Communications in 5G HetNets 5G HetNets中D2D通信的隐私保护组认证方案
Proceedings of the 2nd International Electronics Communication Conference Pub Date : 2020-07-08 DOI: 10.1145/3409934.3409955
Alican Ozhelvaci, M. Ma
{"title":"A Group Authentication Scheme with Privacy-preserving for D2D Communications in 5G HetNets","authors":"Alican Ozhelvaci, M. Ma","doi":"10.1145/3409934.3409955","DOIUrl":"https://doi.org/10.1145/3409934.3409955","url":null,"abstract":"The next-generation mobile communication, which is 5G wireless mobile networks, has become the paradigm to bring not only solutions for the rising demand for huge data traffic, and massively connected devices such as IoT but also new services. One of the promising solutions is that device-to-device communications are expected to play a key role to improve efficiency and have low latency. Most importantly, D2D communications will be the key enabler for group-based services. However, the new case scenarios and new system architecture of 5G Heterogeneous Networks are vulnerable against various attacks since the 5G is still in the early stage. It is utmost important to have a secure and privacy-preserving scheme for D2D communications in 5G HetNets. Even though various research studies have been done by the researchers for D2D communications but many of them fail to address the heterogenous access scenarios, identity protection, and group authentication. In this paper, we propose a certificateless privacy-preserving authentication and key agreement scheme for D2D communications in 5G HetNets using identity-based encryption and elliptic curve digital signature algorithm (ECDSA) to achieve secure and robust communication. The proposed scheme has been analyzed in terms of security and performance. The result of the formal verification using AVISPA and performance analysis shows that the scheme is secure, lightweight and efficient.","PeriodicalId":145384,"journal":{"name":"Proceedings of the 2nd International Electronics Communication Conference","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117239930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Impact of Interaction on the Travel Arrangement: Cultivating Serendipity and Reducing Psychological Distance in Tourism Platforms 互动对旅游安排的影响:旅游平台中培养偶然性与缩小心理距离
Proceedings of the 2nd International Electronics Communication Conference Pub Date : 2020-07-08 DOI: 10.1145/3409934.3409954
Anzhuo Xie, Dong Tan
{"title":"The Impact of Interaction on the Travel Arrangement: Cultivating Serendipity and Reducing Psychological Distance in Tourism Platforms","authors":"Anzhuo Xie, Dong Tan","doi":"10.1145/3409934.3409954","DOIUrl":"https://doi.org/10.1145/3409934.3409954","url":null,"abstract":"More and more people, in this age and day, choose to travel when they are in their convenience. At the same time, many tourism platforms appear to assist tourists to make their travel choices. For these platforms, the most efficient way to help tourists is to offer tourists relevant information concerning the destinations, so that tourists can acquire a better understanding of the resorts before making their decision. This article mainly studies what kind of information enables tourists to familiarize themselves with the destinations to more extent from the perspective of psychological distance and serendipity. Based on the method of group experiment, this paper studies five kinds of information, including VR, and the interaction before tourists, and finally finds that the high level of serendipity and the low level of psychological distance can higher tourists' decision-making satisfaction and decision outcome satisfaction, which is conductive to making a better final decision.","PeriodicalId":145384,"journal":{"name":"Proceedings of the 2nd International Electronics Communication Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130948500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sybil Tolerant Consensus Method Using Mutual Proof of Validation 使用相互验证证明的Sybil容忍共识方法
Proceedings of the 2nd International Electronics Communication Conference Pub Date : 2020-07-08 DOI: 10.1145/3409934.3409936
Hoon Shin, K. Son, Dongsoo Han
{"title":"Sybil Tolerant Consensus Method Using Mutual Proof of Validation","authors":"Hoon Shin, K. Son, Dongsoo Han","doi":"10.1145/3409934.3409936","DOIUrl":"https://doi.org/10.1145/3409934.3409936","url":null,"abstract":"This paper introduces a method to make a consensus by recording proof of block validation, which operates in a public blockchain environment, with a consensus algorithm named Sybil Tolerant Equality Protocol (STEP). To solve the problem of centralization, which is pointed out as a problem of existing consensus algorithms, all nodes are given the same power. Also, methods to prevent Sybil attack in which one principal creates multiple nodes are proposed. To this end, STEP randomly selects nodes to create blocks, divides the validation process into two stages, and provides a reward for rapid and correct validation. Through simulations and experiments on STEP, we confirmed whether the random number generation method, the incentive function for block validation, and the network following this consensus algorithm work correctly within the practicable scope of execution time.","PeriodicalId":145384,"journal":{"name":"Proceedings of the 2nd International Electronics Communication Conference","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128890702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信