Iakovos Pittaras , Nikos Fotiou , Christos Karapapas , Vasilios A. Siris , George C. Polyzos
{"title":"Secure smart contract-based digital twins for the Internet of Things","authors":"Iakovos Pittaras , Nikos Fotiou , Christos Karapapas , Vasilios A. Siris , George C. Polyzos","doi":"10.1016/j.bcra.2023.100168","DOIUrl":"10.1016/j.bcra.2023.100168","url":null,"abstract":"<div><p>The proliferation of Internet of Things (IoT) devices that operate unattended providing a multitude of important and often sensitive services highlights the need for seamless interoperability and increased security. We argue that digital twins of IoT devices, with the right design, can enhance the security, reliability, auditability, and interoperability of IoT systems. The salient features of digital twins have made them key elements for the IoT and Industry 4.0. In this paper, we leverage advances in W3C's Web of Things (WoT) standards and distributed ledger technologies (DLTs) to present a novel design of the smart contract-based digital twins with enhanced security, transparency, interoperability, and reliability. We provide two different variations of that general design using two different blockchains (one public and one private, permissioned blockchain), and we present design trade-offs. Furthermore, we introduce an architecture for accessing and controlling IoT devices securely and reliably, providing full auditability, while at the same time using the proposed digital twins as an indirection mechanism (proxy). The proposed architecture leverages the blockchain to offer notable properties, namely,decentralization, immutability, auditability, non-repudiation, availability, and reliability. Moreover, it introduces mass actuation, easier management of IoT devices, and enhanced security to the IoT gateways, enables new business models, and makes consumer devices (vendor-)agnostic.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"5 1","pages":"Article 100168"},"PeriodicalIF":5.6,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S209672092300043X/pdfft?md5=0376a47ce6ca0b86a9111441dca241b3&pid=1-s2.0-S209672092300043X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139291335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shereen Ismail , Muhammad Nouman , Diana W. Dawoud , Hassan Reza
{"title":"Towards a lightweight security framework using blockchain and machine learning","authors":"Shereen Ismail , Muhammad Nouman , Diana W. Dawoud , Hassan Reza","doi":"10.1016/j.bcra.2023.100174","DOIUrl":"10.1016/j.bcra.2023.100174","url":null,"abstract":"<div><p>Cyber-attacks pose a significant challenge to the security of Internet of Things (IoT) sensor networks, necessitating the development of robust countermeasures tailored to their unique characteristics and limitations. Various prevention and detection techniques have been proposed to mitigate these attacks. In this paper, we propose an integrated security framework using blockchain and Machine Learning (ML) to protect IoT sensor networks. The framework consists of two modules: a blockchain prevention module and an ML detection module. The blockchain prevention module has two lightweight mechanisms: identity management and trust management. Identity management employs a lightweight Smart Contract (SC) to manage node registration and authentication, ensuring that unauthorized entities are prohibited from engaging in any tasks, while trust management uses a lightweight SC that is responsible for maintaining trust and credibility between sensor nodes throughout the network's lifetime and tracking historical node behaviors. Consensus and transaction validation are achieved through a Verifiable Byzantine Fault Tolerance (VBFT) mechanism to ensure network reliability and integrity. The ML detection module utilizes the Light Gradient Boosting Machine (LightGBM) algorithm to classify malicious nodes and notify the blockchain network if it must make decisions to mitigate their impacts. We investigate the performance of several off-the-shelf ML algorithms, including Logistic Regression, Complement Naive Bayes, Nearest Centroid, and Stacking, using the WSN-DS dataset. LightGBM is selected following a detailed comparative analysis conducted using accuracy, precision, recall, F1-score, processing time, training time, prediction time, computational complexity, and Matthews Correlation Coefficient (MCC) evaluation metrics.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"5 1","pages":"Article 100174"},"PeriodicalIF":5.6,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720923000490/pdfft?md5=d3e04ef409a1e66ba5a5635dc01318e7&pid=1-s2.0-S2096720923000490-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139295793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Renke Huang , Jiachi Chen , Yanlin Wang , Tingting Bi , Liming Nie , Zibin Zheng
{"title":"An overview of Web3 technology: Infrastructure, applications, and popularity","authors":"Renke Huang , Jiachi Chen , Yanlin Wang , Tingting Bi , Liming Nie , Zibin Zheng","doi":"10.1016/j.bcra.2023.100173","DOIUrl":"10.1016/j.bcra.2023.100173","url":null,"abstract":"<div><p>Web3, the next generation of the Internet, represents a decentralized and democratized web. Although it has garnered significant public interest and found numerous real-world applications, there is a limited understanding of people's perceptions and experiences with Web3. In this study, we conducted an empirical study to investigate the categories of Web3 applications and their popularity, as well as the potential challenges and opportunities within this emerging landscape. Our research was carried out in two phases. In the first phase, we analyzed 200 popular Web3 projects associated with 10 leading Web3 venture capital firms. In the second phase, we collected and examined code-related data from GitHub and market-related data from blockchain browsers (e.g., Etherscan) for these projects. Our analysis revealed that the Web3 ecosystem can be categorized into two groups, i.e., Web3 infrastructure and Web3 applications, with each consisting of several subcategories or subdomains. We also gained insights into the popularity of these Web3 projects at both the code and market levels and pointed out the challenges in the Web3 ecosystem at the system, developer, and user levels, as well as the opportunities it presents. Our findings contribute to a better understanding of Web3 for researchers and developers, which in turn promotes further exploration and advancement in this innovative field.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"5 1","pages":"Article 100173"},"PeriodicalIF":5.6,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720923000489/pdfft?md5=9aa14a7904cbf749ffa73e8e3272e865&pid=1-s2.0-S2096720923000489-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139299917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The real estate time-stamping and registration system based on Ethereum blockchain","authors":"Liyuan Zhang , Limian Ci , Yonghong Wu , Benchawan Wiwatanapataphee","doi":"10.1016/j.bcra.2023.100175","DOIUrl":"10.1016/j.bcra.2023.100175","url":null,"abstract":"<div><p>In recent years, there has been a growing interest in real estate investments that utilize blockchain technology. Traditional real estate investments usually involve third-party intermediaries for verifying and recording informal real estate transactions. This paper proposes a blockchain-based real estate investment model and presents a detailed description of the real estate register authentication aspect of the model. The model uses blockchain technology to create tamper-evident records of real estate transactions and provide secure authentication and verification for informal real estate transactions. Meanwhile, each real estate transaction is recorded in a block, and all transaction records are kept on the blockchain. This means that inventors can access these transaction records and verify their authenticity and validity. The system can also use smart contracts to automate the process of real estate transactions, which further improves transaction efficiency and reduces costs. Furthermore, the model's timestamp and authentication mechanism can eliminate third-party intermediaries and ensure the authenticity and validity of real estate transactions through distributed ledgers and verification mechanisms. Overall, blockchain-based real estate systems offer advantages of security, transparency, efficiency, and cost reduction. With ongoing blockchain advancements, these systems are expected to play a crucial role in future real estate investment transactions.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"5 1","pages":"Article 100175"},"PeriodicalIF":5.6,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720923000507/pdfft?md5=07595a3d1efac47aedba338504fed54e&pid=1-s2.0-S2096720923000507-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139190490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Utilizing blockchains in opportunistic networks for integrity and confidentiality","authors":"Samaneh Rashidibajgan, Thomas Hupperich","doi":"10.1016/j.bcra.2023.100167","DOIUrl":"10.1016/j.bcra.2023.100167","url":null,"abstract":"<div><p>Opportunistic networks (OppNets) are usually a set of smart, wearable, and portable devices or entities with mobility that connect wirelessly without requiring infrastructure. Such a network is of great importance in data transmission, particularly in incidents and disasters, whether man-made or natural. However, message integrity and confidentiality are of concern when dealing with vital and physiological data transmission under strict privacy regulations. In this work, we propose a structure to classify messages based on their priority in different queues. Furthermore, due to the decentralized architecture of OppNets, we propose a blockchain-based structure for providing security for high-priority messages. It contains three sequences of functional blocks with a light and simplified implementation that make it suitable for battery-powered wearable devices that are limited in energy consumption and computational units. The simulation results show that by increasing the number of nodes in the network, the average of the changes in block sizes is neglectable, which addresses the computation bottleneck. Furthermore, we analyze the performance of the proposed structure in terms of message delivery and network overhead compared with the Epidemic and Prophet routing algorithms. These results indicate advancing the overall performance of the proposed algorithm.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"5 1","pages":"Article 100167"},"PeriodicalIF":5.6,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720923000428/pdfft?md5=a9274c10d6eeb9a8b8b681e8eddc5d3c&pid=1-s2.0-S2096720923000428-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139303453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blockchain-based refurbishment certification system for enhancing the circular economy","authors":"Cristina Regueiro , Aitor Gómez-Goiri , Nuno Pedrosa , Christos Semertzidis , Eider Iturbe , Jason Mansell","doi":"10.1016/j.bcra.2023.100172","DOIUrl":"10.1016/j.bcra.2023.100172","url":null,"abstract":"<div><p>As the global population continues to grow, the enormous stress on our environment and resources is becoming impossible to ignore. A focus on producing and consuming as cheaply as possible has created an economy in which objects are briefly used and then discarded as waste, featuring a linear lifecycle that creates an enormous amount of waste. The alternative to the linear economy “take-make-waste” is called the “circular economy”. Under this paradigm, materials are recycled to build new products or components that are designed and built to promote their reuse and refurbishment. This assures the continuous (re-)exploitation of existing resources, reducing the extraction of new raw materials. However, customers often reject these reused or refurbished products under the suspicion that they do not meet the same usability, safety, or performance levels of new products. In this sense, trustworthy records of historical details of refurbished products could increase consumers’ confidence in products and components of the “circular economy”, prioritizing trustworthiness, reliability, and transparency. This work presents a new certification tool based on blockchain technology to guarantee trusted, accurate, transparent, and traceable lifecycle information of products and their components and to generate trustworthy certificates to probe refurbished product historical details. This tool aims to enhance refurbished product visibility by creating the basis for making the circular economy a reality in any domain.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"5 1","pages":"Article 100172"},"PeriodicalIF":5.6,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720923000477/pdfft?md5=36bb137d913f9ca6646ddf6645fa26d7&pid=1-s2.0-S2096720923000477-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139303585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blockchain for secure and decentralized artificial intelligence in cybersecurity: A comprehensive review","authors":"","doi":"10.1016/j.bcra.2024.100193","DOIUrl":"10.1016/j.bcra.2024.100193","url":null,"abstract":"<div><p>As the use of artificial intelligence (AI) grows within the field of cybersecurity, so does the demand for secure and decentralized AI systems to protect against potential cyber threats. Blockchain technology has emerged as the ideal approach for increasing both the security and privacy of AI systems since it provides decentralized and immutable data storage. This systematic literature review focuses on the integration of blockchain technology with decentralized AI within cybersecurity. It provides a comprehensive taxonomy of blockchain technology and decentralized AI for cybersecurity, serving as the starting point for the study. This paper begins with an overview of blockchain technology and its possible uses in cybersecurity and also analyzes its challenges and opportunities. Decentralized AI is also covered in the study, along with its potential advantages and difficulties in decentralized AI cybersecurity. Building on that foundation, this study provides convincing findings highlighting the beneficial relationships between blockchain technology and decentralized AI for cybersecurity, contributing to a nuanced comprehension of their integration. Moreover, it offers real-world uses of blockchain-enabled, decentralized AI to discuss its usefulness in tackling cybersecurity concerns. Finally, this paper discusses future research directions for blockchain-enabled decentralized AI in cybersecurity, including potential applications and implications of this technology in the field, emphasizing the potential of blockchain-enabled decentralized AI in cybersecurity to enhance security, privacy, and trust in AI systems.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"5 3","pages":"Article 100193"},"PeriodicalIF":6.9,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S209672092400006X/pdfft?md5=3fe5d5283406aab834399c6c4a38dcd5&pid=1-s2.0-S209672092400006X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140465891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploring the relationship between rarity and price of profile picture NFT: A formal concept analysis on the BAYC NFT collection","authors":"Heejung Lee , Geun-Cheol Lee , Hoon-Young Koo","doi":"10.1016/j.bcra.2024.100191","DOIUrl":"10.1016/j.bcra.2024.100191","url":null,"abstract":"<div><p>Non-fungible token (NFT) is a digital asset whose ownership can be validated and controlled via blockchain technology. The NFT market is a rapidly growing field, and the rarity of NFT is an essential factor that affects its price, as scarcity leads to higher demand. This study focuses on the BAYC NFT collection, which is a successful and representative collection of profile picture NFT, and analyzes how rarity affects NFT prices. This paper investigates the relationship between the rarity and price of the BAYC NFT collection using formal concept analysis (FCA) method. The results show that rarity is a major factor influencing the price of NFT and the effect is more apparent in the medium rarity range. When rarity is very high or very low, other factors become significant determinants, such as the uniqueness and appeal of NFT, and even the naturalness of NFT images. This research highlights the importance of considering rarity when assessing NFT and underscores the need for a comprehensive evaluation of NFT rarity. This study also provides valuable insights into the NFT market and can be useful for NFT investors, creators, and collectors. Furthermore, the usefulness of FCA as a tool for quantifying NFT rarity and evaluating NFT price was demonstrated.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"5 2","pages":"Article 100191"},"PeriodicalIF":5.6,"publicationDate":"2024-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720924000046/pdfft?md5=a3727ad02fb8cd5636363857a588462e&pid=1-s2.0-S2096720924000046-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139540277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohammad Mustafa Ibrahimy , Alex Norta , Peeter Normak
{"title":"Blockchain-based governance models supporting corruption-transparency: A systematic literature review","authors":"Mohammad Mustafa Ibrahimy , Alex Norta , Peeter Normak","doi":"10.1016/j.bcra.2023.100186","DOIUrl":"10.1016/j.bcra.2023.100186","url":null,"abstract":"<div><p>Corruption and lack of transparency remain critical challenges in governance systems around the world. These issues are often perpetuated by centralized systems and their manipulation by system administrators. Furthermore, the lack of data ownership and the monetization of user data by tech companies further increase concerns about transparency. In light of these concerns, this study aims to review existing blockchain-based governance models and identify best-practice governance models focusing on corruption transparency, their characteristics, and components. The research will also examine the role of a token economy in addressing trusted third-party issues related to asset ownership management. Furthermore, we discuss the effect of smart contracts, blockchain, decentralized autonomous organizations (DAO), Web 3.0, and multifactor challenge set self-sovereign identity authentication (MFSSIA) as modern technologies to combat corruption and achieve transparency in the public sector. To achieve this, we conduct a systematic literature review (SLR) comprising peer-reviewed journals, proceedings, and book chapters published between 2012 and 2023. Using the SLR methodology, 45 primary and supporting studies have been selected for result extraction and analysis. Finally, we discovered seven blockchain-based governance models with their characteristics and primary components.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"5 2","pages":"Article 100186"},"PeriodicalIF":5.6,"publicationDate":"2023-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720923000611/pdfft?md5=edc96a4df5064b154bbd09e79a15db97&pid=1-s2.0-S2096720923000611-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139189440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vitalik Buterin , Jacob Illum , Matthias Nadler , Fabian Schär , Ameen Soleimani
{"title":"Blockchain privacy and regulatory compliance: Towards a practical equilibrium","authors":"Vitalik Buterin , Jacob Illum , Matthias Nadler , Fabian Schär , Ameen Soleimani","doi":"10.1016/j.bcra.2023.100176","DOIUrl":"https://doi.org/10.1016/j.bcra.2023.100176","url":null,"abstract":"<div><p>We study Privacy Pools, a novel smart contract-based privacy-enhancing protocol. The protocol introduces a mechanism for users to reveal certain properties of their transaction without having to reveal the transaction itself. The core concept involves allowing users to publish a zero-knowledge proof, demonstrating that their funds (do not) originate from known (un-)lawful sources, without publicly revealing their entire transaction history. This is achieved by proving membership in custom association sets, which are designed to demonstrate compliance with regulatory frameworks or social consensus. We illustrate how this mechanism can create a separating equilibrium between compliant and non-compliant withdrawals. Our work describes the technical underpinnings, incentives, and broader implications of this mechanism, highlighting how Privacy Pools-like protocols can create more private yet compliant blockchain transactions.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"5 1","pages":"Article 100176"},"PeriodicalIF":5.6,"publicationDate":"2023-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720923000519/pdfft?md5=96424812d842a99c154467c871701e85&pid=1-s2.0-S2096720923000519-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139935874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}