-
41
6G oriented blockchain based Internet of things data sharing and storage mechanism
Published 2020-10-01“…Considering the heterogeneity of various IoT system and the single point failure of centralized data-processing platform,a decentralized IoT data sharing and storage method based on blockchain technology was proposed.The block consensus and decentralized storage of shared data were realized through the PoS consensus mechanism.A block layered propagation mechanism between consensus node and verified node was proposed based on the Gossip protocol.The block propagation delay model and decentralization evaluation model of blockchain networks were derived.The trade-off between the block propagation delay and the decentralization degree of networks was analyzed.The simulation results demonstrate that the block propagation delay and degree of network decentralization decrease with the increase of minimal capabilities of consensus nodes.As an application example,in the trajectory data sharing scenario of confirmed patients,the data sharing smart contract is implemented and tested based on the Ethereum development platform.…”
Get full text
Article -
42
DeTEcT: dynamic and probabilistic parameters extension
Published 2025-01-01“…The motivation for studying dynamic money supply is that it enables DeTEcT to be applied to modelling token economies without maximum supply (i.e., Ethereum) and it adds constraints to the framework in the form of symmetries.…”
Get full text
Article -
43
Causal estimation of FTX collapse on cryptocurrency: a counterfactual prediction analysis
Published 2025-01-01“…In relative terms, the collapse of FTX has been highly detrimental to Solana and Ethereum. Furthermore, the outcomes show that cryptocurrencies would not have been negatively affected if the intervention had not occurred. …”
Get full text
Article -
44
Secure vehicular digital forensics system based on blockchain
Published 2020-06-01“…The emergence of vehicular big data has brought a great promotion to better understand characteristics of vehicular networks,grasp needs of users and improve service qualities.However,malicious users and criminals leverage vehicular networks to conduct illegal behaviors,resulting in a decline in the service quality and difficulties in determining the liability in vehicle accidents.At the same time,there are still some security and privacy issues in the vehicular digital forensics,such as the identity privacy of the data provider and the request control of the data requester.Therefore,a secure vehicular digital forensics scheme based on blockchain was proposed.Firstly,a data requester registered with a certificate authority and an anonymous certificate was obtained for the subsequent data uploading.Then,the data user obtained the public-private key pair and user key in registration,which were respectively used for the data requesting and data decryption.Only if certain attributes were held,the right plaintext could be decrypted.Next,a consortium blockchain was jointly established by several institutions with high credibility to record all data transactions.Finally,the security and privacy were experimentally analyzed,and the performance was tested based on the Ethereum platform.…”
Get full text
Article -
45
A dataset of Uniswap daily transaction indices by network
Published 2025-01-01“…We created a set of daily indices from blockchain data on Ethereum, Optimism, Arbitrum, and Polygon, offering insights into DeFi adoption, scalability, decentralization, and wealth distribution. …”
Get full text
Article -
46
Anomaly detection and location of malicious node for IoT based on smart contract in blockchain network
Published 2020-06-01“…With the explosive growth of the number of distributed devices in the Internet of things (IoT) network,the security of decentralized multi-agent optimization algorithm has become the forefront problem.The distributed algorithms in the IoT network are vulnerable to data injection attacks from internal malicious node because each agent locally estimates its state without any supervision.In general,the detection methods for malicious node run independently in each agent,inducing issues such as closed data,single points of failure,opaque detection processes,and so on.The proposed strategy considered detecting via an aid of blockchain technology and smart contracts in Ethereum to detect malicious node in the network.Based on the decentralized and multiple backup features of blockchain technology,the multi-site backup features of the blockchain technology enabled data sharing and avoided single point failure.In addition,the contract code,execution process and result of the smart contract were open and transparent,and the contract code and result could not be tampered to ensure that the detection process could be traced and verified.Finally,the average consensus algorithm was adopted as an example,and the proposed strategy was verified on a simplified IoT network implemented by Raspberry Pi.…”
Get full text
Article -
47
A blockchain architecture with master-slave blockchain
Published 2021-06-01“…With the continuous development of blockchain technology, different chains are derived due to different adaptation scenarios.Each chain has its own characteristics, such as public chains like bitcoin and ethereum, a large number of private chains and alliance chains.But as far as the current Internet is concerned, the implementation of many application scenarios on traditional blockchains has become particularly inconvenient.A master-slave blockchain (MSBC) architecture was proposed, which was mainly composed of a master block, a subordinate master block and a subordinate micro block.The master chain was composed of master blocks.Each master block has a slave master block and multiple slave micro block on its side chain.In addition, the master block and the master block were directly connected by the Hash of the previous block, the master block and the slave master block were connected by the Hash of the unique information, and the slave micro block and the previous block (whatever the slave master block or the slave micro block) was also connected by the Hash of the previous block.In talent chain, this kind of structure could put a person’s fixed resume information on the master chain, but updated resume information constantly on the slave side chain.MSBC architecture was more scalable, and it could improve the efficiency of data query.The experimental results show that the framework in the similar applications such as talent chain is feasible and the query efficiency has been improved greatly.…”
Get full text
Article -
48
Research on Multiparty Payment Technology Based on Blockchain and Smart Contract Mechanism
Published 2022-01-01“…Therefore, many users are willing to conduct transactions in blockchain cryptocurrency systems such as Bitcoin and Ethereum. However, the throughput of traditional blockchain is extremely low, and the transaction is so delayed. …”
Get full text
Article -
49
Blockchain-Based Secure Traceable Scheme for Food Supply Chain
Published 2023-01-01“…A blockchain-based food tracking system is created as a solution to these issues. On the Ethereum platform, the system was created. It was also employed in the blockchain system, in addition to its features of decentralization, tamper-proof, and traceability. …”
Get full text
Article -
50
Simulasi Penggunaan Blockchain Pada Keamanan Jaringan Internet Of Things Menggunakan Pin Emulator: Model Public Blockchain
Published 2024-08-01“…Penelitian ini menggunakan jejaring Ethereum yang termasuk dalam jaringan pengujian yang dapat digunakan tanpa adanya biaya transaksi yang perlu dibayar. …”
Get full text
Article -
51
Comparative Analysis of Machine Learning Techniques for Cryptocurrency Price Prediction
Published 2024-01-01“…The aim of this research is to deal with the challenging task of predicting the closing prices of two prominent cryptocurrencies, Binance Coin (BNB) and Ethereum (ETH), utilizing machine-learning techniques. …”
Get full text
Article -
52
Blockchain-Based Anonymous Reputation System for Performance Appraisal
Published 2025-01-01“…We validate the security of ARSPA through analysis and demonstrate its feasibility through proof-of-concept on Ethereum test networks. ARSPA provides a secure and efficient approach to improve the reliability and fairness of performance appraisal.…”
Get full text
Article -
53
Blockchain‐Enabled Car Sharing: Enhancing Reliability and Vehicle History Management
Published 2025-01-01“…To demonstrate the feasibility of our approach, we have developed a prototype utilizing a private Ethereum blockchain with Proof of Authority (PoA) consensus. …”
Get full text
Article -
54
Analysis of Revenue Incentive Dynamic Mechanism of Financial Supply Chain from the Perspective of the Internet of Things
Published 2021-01-01“…This article integrates blockchain technology with supply chain finance and builds a supply chain financial alliance architecture based on blockchain technology and an underlying model of the Ethereum blockchain system suitable for supply chain finance. …”
Get full text
Article -
55
Blockchain-Assisted Generation Rescheduling in Imperfect Market Environments
Published 2025-01-01“…Python library (PYPSA) and Ethereum Testnet are being used for grid simulation and BC platform implementation respectively. …”
Get full text
Article -
56
Convergence of Blockchain, IoT, and AI for Enhanced Traceability Systems: A Comprehensive Review
Published 2025-01-01“…The analysis shows a predominance of experimental and hybrid methodologies, using Ethereum and Hyperledger Fabric as key platforms. Key trends include AI-driven analytics, real-time IoT data collection, and the need for secure, tamper-proof data by BC. …”
Get full text
Article -
57
Blockchain-Driven Optimized Chaotic Encryption Scheme for Medical Image Transmission in IoT-Edge Environment
Published 2025-01-01“…The complete framework was experimented using Ethereum using Ganache API and Python3.19 are utilized as the major programs for designing the varied interfaces of the recommended model. …”
Get full text
Article -
58
Ciphertext policy hidden access control scheme based on blockchain and supporting data sharing
Published 2022-06-01“…Secondly, the distributed management of ciphertext is realized by using Ethereum and Interstellar file system.Afterwards,the use of prime order bilinear groups improves the pairing efficiency of bilinear pairs and realizes data sharing by combining proxy re-encryption technology.…”
Get full text
Article