Proceedings of the 2nd International Electronics Communication Conference最新文献

筛选
英文 中文
BC-Store: A Scalable Design for Blockchain Storage BC-Store:区块链存储的可扩展设计
Proceedings of the 2nd International Electronics Communication Conference Pub Date : 2020-07-08 DOI: 10.1145/3409934.3409940
I-Te Chou, Hung-Han Su, Yuling Hsueh, Chih-wen Hsueh
{"title":"BC-Store: A Scalable Design for Blockchain Storage","authors":"I-Te Chou, Hung-Han Su, Yuling Hsueh, Chih-wen Hsueh","doi":"10.1145/3409934.3409940","DOIUrl":"https://doi.org/10.1145/3409934.3409940","url":null,"abstract":"The blockchain technology has obtained significant success in the past decades. However, a serious underlying problem still exists in the blockchain system - data bloating. In the blockchain system, each (full) node must store the full data set in blockchain history, incurring significant storage pressure in the initial synchronization process and the following maintenance of the blockchain system. Data bloating is a challenging problem to be confronted in the immediate future of blockchain. To address this problem, in this paper, we introduce the BC-Store framework that deploys a data accessing model on an IPFS-cluster system to classify the hot and cold blockchain data. The hot data are stored in the local cache, whereas the cold data are stored in the IPFS cluster, thereby substantially shortening the blockchain initial synchronization time and saving a considerable amount of data storage. Empirical experimentation shows that our framework can reduce the local storage size from over 265GB to 4GB with a hit ratio of 77% for Bitcoin without significant performance degradation with the whole data shared in an IPFS cluster.","PeriodicalId":145384,"journal":{"name":"Proceedings of the 2nd International Electronics Communication Conference","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123208797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Lightweight D2D Authentication Scheme against Free-riding Attacks in 5G Cellular Network 5G蜂窝网络中抗搭便车攻击的轻量级D2D认证方案
Proceedings of the 2nd International Electronics Communication Conference Pub Date : 2020-07-08 DOI: 10.1145/3409934.3409952
M. Chow, M. Ma
{"title":"A Lightweight D2D Authentication Scheme against Free-riding Attacks in 5G Cellular Network","authors":"M. Chow, M. Ma","doi":"10.1145/3409934.3409952","DOIUrl":"https://doi.org/10.1145/3409934.3409952","url":null,"abstract":"As a promising feature in 5G, device-to-device (D2D) communication is the technology allowing adjacent mobile devices to communicate directly without relaying the data over base stations. D2D technology can potentially increase the network capacity by offloading network traffic in a distributed manner. However, there are also new security challenges such as free-riding attack prevention, device anonymity protection and end-to-end data secrecy. Also, since there are many mobile devices which have limited computational resources in 5G cellular network, there is a need to develop a lightweight authentication protocol which addresses all these security requirements with low computational overhead. In this paper, we propose a lightweight D2D authentication and key agreement protocol based on elliptic curve cryptography (ECC). Specifically, our proposed scheme makes use of the elliptic curve digital signature algorithm (ECDSA), elliptic curve Diffie-Hellman (ECDH) and authenticated encryption with associate data (AEAD) to provide secure device discovery, mutual authentication, key agreement and data transmission for all 5G D2D devices. Our scheme is computationally lightweight to be supported in any resource-constrained 5G devices, and it can resist several active and passive protocol attacks including eavesdropping, replay attack, man-in-the-middle attack and free-riding attack. We analyze the security of our protocol with Scyther to show our scheme is resistant to these attacks. Finally, performance evaluation shows our scheme is efficient for both UEs and CN with rationally low computational costs.","PeriodicalId":145384,"journal":{"name":"Proceedings of the 2nd International Electronics Communication Conference","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132529519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
From Blockchain to Web: Paving the Last Mile for Releasing Chained Data from the Blocks 从区块链到网络:为从区块中释放链式数据铺平最后一英里
Proceedings of the 2nd International Electronics Communication Conference Pub Date : 2020-07-08 DOI: 10.1145/3409934.3409938
Belal Abu-Naim, Martin Hronsky, W. Klas
{"title":"From Blockchain to Web: Paving the Last Mile for Releasing Chained Data from the Blocks","authors":"Belal Abu-Naim, Martin Hronsky, W. Klas","doi":"10.1145/3409934.3409938","DOIUrl":"https://doi.org/10.1145/3409934.3409938","url":null,"abstract":"Blockchain systems make use of the Internet infrastructure to connect thousands of nodes in peer-to-peer (P2P) networks. These connected nodes form complex ecosystems encompassing various technologies that collaborate to offer millions of users distributed, decentralized, secure, and read-only data stores. With the proliferation of various private and public platforms and applications that are built on top of blockchain technology, rich sources of several types of simple or complex datasets have been created. Consequently, new requirements for managing these rich data sources, integrating them with their hosting environment, and making them discoverable have emerged. Fulfilling these requirements calls for extending the architecture of current blockchain systems by adding different layers that offer dedicated services for handling the data and allowing for integrating the blockchain-based platforms and applications with other systems, including Web-based applications. In this paper, we present a novel approach aiming at extending the architecture of current blockchain systems by adding new service layers for processing the data and offering new services to provide a bridge between blockchain systems and Web-based external applications enabling them to query, retrieve, and access the datasets managed by robust permission-based access control.","PeriodicalId":145384,"journal":{"name":"Proceedings of the 2nd International Electronics Communication Conference","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133794850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Enhanced Security Approach Powered by Blockchain Technology with NFC to Prevent Fraudulence in Bank Letter of Credits 基于区块链技术和近场通信技术的增强安全方法,防止银行信用证欺诈
Proceedings of the 2nd International Electronics Communication Conference Pub Date : 2020-07-08 DOI: 10.1145/3409934.3409945
R. Subramaniam, S. Azzuhri, Ying Wah Teh
{"title":"Enhanced Security Approach Powered by Blockchain Technology with NFC to Prevent Fraudulence in Bank Letter of Credits","authors":"R. Subramaniam, S. Azzuhri, Ying Wah Teh","doi":"10.1145/3409934.3409945","DOIUrl":"https://doi.org/10.1145/3409934.3409945","url":null,"abstract":"Letters of Credit (Letter-of-Credit) frauds are deceptive attempts against financial institutions, primarily by providing availing false/falsify documentation as a proof of shipment of goods when, either, inferior goods were shipped, or no delivery was made at all. Letter-of-Credit also maybe forged to be provided to the supplier to supply goods. Whereas parties can forfeit the Letter-of-Credit by someone with vast experience and expertise in finance commerce laws, and international laws and business processes. In this research, we aspire to come up with an option of incorporating NFC-enabled mobile application into Letter-of-credit. The application is powered by blockchain technology and would be crucial in helping the recipient of the Letter-of-credit to achieve easy verification of the legitimacy of the document. The idea of using blockchain to prevent Letter-of-Credit fraud may not be novel where some have already been put into reality. However, not much work done in combining an NFC enabled mobile application leveraging on blockchain technology to prevent Letter-of-Credits frauds. The study is intended for banks who are still in migration to paperless business and still depending on a physical Letter-of-Credit for their business transactions.","PeriodicalId":145384,"journal":{"name":"Proceedings of the 2nd International Electronics Communication Conference","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123767928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Secure File Sharing System Based on IPFS and Blockchain 基于IPFS和区块链的安全文件共享系统
Proceedings of the 2nd International Electronics Communication Conference Pub Date : 2020-07-08 DOI: 10.1145/3409934.3409948
Hsiao-Shan Huang, Tian-Sheuan Chang, Jhih-Yi Wu
{"title":"A Secure File Sharing System Based on IPFS and Blockchain","authors":"Hsiao-Shan Huang, Tian-Sheuan Chang, Jhih-Yi Wu","doi":"10.1145/3409934.3409948","DOIUrl":"https://doi.org/10.1145/3409934.3409948","url":null,"abstract":"There is a great interest in many approaches towards blockchain in providing a solution to record transactions in a decentralized way. However, there are some limitations when storing large files or documents on the blockchain. In order to meet the requirements of storing relatively large data, a decentralized storage medium is produced. IPFS is a distributed file system which is content-addressable. It works very similar to the blockchain network. There are some attempts which take advantage of the blockchain concept and IPFS to design new approaches. Unfortunately, there are some inefficiencies in sharing data using the combination of IPFS and blockchain. In this paper, we proposed a secure file sharing system that brings a distributed access control and group key management by the adoption of the IPFS proxy. The IPFS proxy which plays an important role in the design is adopted to take responsibility for the control policies. The combination of the IPFS server and the blockchain network with the adoption of the IPFS proxy make a secure file sharing system which the members on the system can create new groups or join different groups by their own choice. Although there is no access control mechanism in IPFS server and blockchain network, the secure file sharing system manages the access control policies. The members access files only belong to the group they authorized.","PeriodicalId":145384,"journal":{"name":"Proceedings of the 2nd International Electronics Communication Conference","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126988214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Responsible Self-Funding in Dash Governance System 达世币治理体系中的负责任自筹资金
Proceedings of the 2nd International Electronics Communication Conference Pub Date : 2020-07-08 DOI: 10.1145/3409934.3409939
I. Chistiakov, Y. Yanovich
{"title":"Responsible Self-Funding in Dash Governance System","authors":"I. Chistiakov, Y. Yanovich","doi":"10.1145/3409934.3409939","DOIUrl":"https://doi.org/10.1145/3409934.3409939","url":null,"abstract":"Decentralized voting and self-funding allow cryptocurrencies to make joint decisions and finance their development. Dash cryptocurrency has a working self-funding and decision-making system for supporting event and improvement proposals---the Dash Governance System. While it is fully operational, as currently designed, it does not incentivize voting efficiency. The Dash Governance System struggles to scale, with the number of proposals rising, as each participant needs to review each proposal. This work introduces a new mechanism for processing proposals. It meets scalability and makes thoughtful voting the most profitable strategy.","PeriodicalId":145384,"journal":{"name":"Proceedings of the 2nd International Electronics Communication Conference","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117287325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Conceptual Model for Blockchain-based Auditing Information System 基于区块链的审计信息系统概念模型
Proceedings of the 2nd International Electronics Communication Conference Pub Date : 2020-07-08 DOI: 10.1145/3409934.3409949
Ke Wang, Yu Zhang, Elizabeth Chang
{"title":"A Conceptual Model for Blockchain-based Auditing Information System","authors":"Ke Wang, Yu Zhang, Elizabeth Chang","doi":"10.1145/3409934.3409949","DOIUrl":"https://doi.org/10.1145/3409934.3409949","url":null,"abstract":"Blockchain is viewed as one of the most promising and disruptive inventions and is considered to have the potential to significantly change current auditing profession and reshape the business ecosystem. With the advancement of blockchain, it has been concerned in some studies that auditing could be significantly impacted and eventually replaced. Meanwhile, another viewpoint argues that blockchain technology would push the existing auditing industry to a new direction rather than eliminating the need for auditing in the immediate future. This discussion can hardly be settled without evaluation, however, studies exploring how blockchain technology can be employed in auditing practice or how continuous auditing can be conducted using blockchain technology are limited. This paper analyses the impact of blockchain features on existing audit processes and discusses the possibility of applying blockchain characteristics including immutability, distributed ledger, real-time settlement to the auditing domain. Based on the systematic analysis, this study proposes a conceptual model for blockchain-based auditing information system, which provides solutions to employ blockchain technology in auditing profession, significantly improving the efficiency and effectiveness of auditing and promoting the transformation of the auditing paradigm to real-time, continuous and intelligent auditing.","PeriodicalId":145384,"journal":{"name":"Proceedings of the 2nd International Electronics Communication Conference","volume":"246 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124300612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design of Feature Selection Algorithm Based on MOEA for IDSs in VANETs 基于MOEA的vanet中ids特征选择算法设计
Proceedings of the 2nd International Electronics Communication Conference Pub Date : 2020-07-08 DOI: 10.1145/3409934.3409953
Junwei Liang, M. Ma
{"title":"Design of Feature Selection Algorithm Based on MOEA for IDSs in VANETs","authors":"Junwei Liang, M. Ma","doi":"10.1145/3409934.3409953","DOIUrl":"https://doi.org/10.1145/3409934.3409953","url":null,"abstract":"Intrusion detection systems (IDSs) is crucial for the security of Vehicle Ad Hoc Networks (VANETs), as it can accurately detect both the inner and outer attacks. However, the redundant features and the sparse samples of fatal attacks in VANETs datasets cause the heavy time-consumption and imbalanced problems respectively. In this paper, a feature selection algorithm based on a many-objective optimization algorithm (FS-MOEA) is proposed for IDSs in VANETs, in which Non-dominant Sorting Genetic Algorithm-III (NSGA-III) serves as the many-objective evolutionary algorithm. Two improvements, called Bias and Weighted (B&W) niche-preservation and Analytic Hierarchy Process (AHP) prioritizing, are further designed in FS-MOEA. B&W niche-preservation is used to counterbalance the imbalanced problem among the different classes of datasets by assigning rare classes higher priorities in the niching selection process. AHP prioritizing is employed to search the optimal feature subset from the non-dominant feature subsets in the Pareto Front of FS-MOEA. Experimental results show that the proposed FS-MOEA can not only improve the performance of IDSs in VANETs by decreasing the redundancy and irrelevances of features but also alleviate the negative impact of the imbalanced problem.","PeriodicalId":145384,"journal":{"name":"Proceedings of the 2nd International Electronics Communication Conference","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129106072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Supply Chain Model Based on Smart Contract 基于智能合约的新型供应链模型
Proceedings of the 2nd International Electronics Communication Conference Pub Date : 2020-07-08 DOI: 10.1145/3409934.3409942
Haitao Liu
{"title":"A Novel Supply Chain Model Based on Smart Contract","authors":"Haitao Liu","doi":"10.1145/3409934.3409942","DOIUrl":"https://doi.org/10.1145/3409934.3409942","url":null,"abstract":"Facing on bursting of the huge quantity of trade, the problem of finance by micro and small firms, the expansion of business development of core enterprise in supply chain, the development of comprehensive finance services, it is not well worked by traditional ways. Moreover it is more and more restricting the development of supply chain. Considering the advantages of automatic executing and high efficiency of smart contract, the feature of decentralization, security, trustworthiness and anti-tampering of blockchain, it was presented a novel supply chain model based on smart contract and blockchain for solving the problem totally. The model relied on the core enterprise of supply chain, integrated the upstream and downstream industries, constructed a consortium chain, that consisted of core enterprise, financial institutions, suppliers and dealers, formed an encrypted credit named ET (Electronic Trust) based on the trustworthiness of the trust industries chain. Actually, ET is equaled to the actual credit, it could be paid for the suppliers according to the cargo value before the last settlement. So the ET could combine the virtual and actual capital. Thus it also could further solve the common pain points of supply chain.","PeriodicalId":145384,"journal":{"name":"Proceedings of the 2nd International Electronics Communication Conference","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124609383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
High Performance Peer-to-peer Data Dissemination for Decentralized Wireless Sensor Networks Firmware Updating 分布式无线传感器网络固件更新的高性能点对点数据传播
Proceedings of the 2nd International Electronics Communication Conference Pub Date : 2020-07-08 DOI: 10.1145/3409934.3409951
Natchanon Nuntanirund, N. Nupairoj
{"title":"High Performance Peer-to-peer Data Dissemination for Decentralized Wireless Sensor Networks Firmware Updating","authors":"Natchanon Nuntanirund, N. Nupairoj","doi":"10.1145/3409934.3409951","DOIUrl":"https://doi.org/10.1145/3409934.3409951","url":null,"abstract":"Data dissemination is an important feature to enable reconfigurations and firmware updates in wireless sensor networks. Typically, data disseminations in modern wireless sensor networks are based on multicast-based algorithms which may not be the most efficient ways because they do not guarantee packet delivery. In this paper, we present a reliable data dissemination algorithm for distributed wireless sensor networks. It derives some features from BitTorrent such as segmented file transfer, choking, and optimistic unchoking to improve performance. The evaluation result shows that our algorithm performs better than multicast-based algorithms in term of download speed up to 58.97% and energy efficiency up to 79.39%.","PeriodicalId":145384,"journal":{"name":"Proceedings of the 2nd International Electronics Communication Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115416291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信