期刊文献+
共找到2,251篇文章
< 1 2 113 >
每页显示 20 50 100
Key Agreement and Management Scheme Based on Blockchain for 5G-Enabled Vehicular Networks
1
作者 Wang Zhihua Wang Shuaibo +4 位作者 Wang Haofan Li Jiaze Yao Yizhe Wang Yongjian Yang Xiaolong 《China Communications》 2025年第3期270-287,共18页
5G technology has endowed mobile communication terminals with features such as ultrawideband access,low latency,and high reliability transmission,which can complete the network access and interconnection of a large nu... 5G technology has endowed mobile communication terminals with features such as ultrawideband access,low latency,and high reliability transmission,which can complete the network access and interconnection of a large number of devices,thus realizing richer application scenarios and constructing 5G-enabled vehicular networks.However,due to the vulnerability of wireless communication,vehicle privacy and communication security have become the key problems to be solved in vehicular networks.Moreover,the large-scale communication in the vehicular networks also makes the higher communication efficiency an inevitable requirement.In order to achieve efficient and secure communication while protecting vehicle privacy,this paper proposes a lightweight key agreement and key update scheme for 5G vehicular networks based on blockchain.Firstly,the key agreement is accomplished using certificateless public key cryptography,and based on the aggregate signature and the cooperation between the vehicle and the trusted authority,an efficient key updating method is proposed,which reduces the overhead and protects the privacy of the vehicle while ensuring the communication security.Secondly,by introducing blockchain and using smart contracts to load the vehicle public key table for key management,this meets the requirements of vehicle traceability and can dynamically track and revoke misbehaving vehicles.Finally,the formal security proof under the eck security model and the informal security analysis is conducted,it turns out that our scheme is more secure than other authentication schemes in the vehicular networks.Performance analysis shows that our scheme has lower overhead than existing schemes in terms of communication and computation. 展开更多
关键词 blockchain certificateless public key cryptography 5G vehicular networks key agreement key management
在线阅读 下载PDF
For Mega-Constellations: Edge Computing and Safety Management Based on Blockchain Technology 被引量:1
2
作者 Zhen Zhang Bing Guo Chengjie Li 《China Communications》 SCIE CSCD 2024年第2期59-73,共15页
In mega-constellation Communication Systems, efficient routing algorithms and data transmission technologies are employed to ensure fast and reliable data transfer. However, the limited computational resources of sate... In mega-constellation Communication Systems, efficient routing algorithms and data transmission technologies are employed to ensure fast and reliable data transfer. However, the limited computational resources of satellites necessitate the use of edge computing to enhance secure communication.While edge computing reduces the burden on cloud computing, it introduces security and reliability challenges in open satellite communication channels. To address these challenges, we propose a blockchain architecture specifically designed for edge computing in mega-constellation communication systems. This architecture narrows down the consensus scope of the blockchain to meet the requirements of edge computing while ensuring comprehensive log storage across the network. Additionally, we introduce a reputation management mechanism for nodes within the blockchain, evaluating their trustworthiness, workload, and efficiency. Nodes with higher reputation scores are selected to participate in tasks and are appropriately incentivized. Simulation results demonstrate that our approach achieves a task result reliability of 95% while improving computational speed. 展开更多
关键词 blockchain consensus mechanism edge computing mega-constellation reputation management
在线阅读 下载PDF
Automated Vulnerability Detection of Blockchain Smart Contacts Based on BERT Artificial Intelligent Model 被引量:1
3
作者 Feng Yiting Ma Zhaofeng +1 位作者 Duan Pengfei Luo Shoushan 《China Communications》 SCIE CSCD 2024年第7期237-251,共15页
The widespread adoption of blockchain technology has led to the exploration of its numerous applications in various fields.Cryptographic algorithms and smart contracts are critical components of blockchain security.De... The widespread adoption of blockchain technology has led to the exploration of its numerous applications in various fields.Cryptographic algorithms and smart contracts are critical components of blockchain security.Despite the benefits of virtual currency,vulnerabilities in smart contracts have resulted in substantial losses to users.While researchers have identified these vulnerabilities and developed tools for detecting them,the accuracy of these tools is still far from satisfactory,with high false positive and false negative rates.In this paper,we propose a new method for detecting vulnerabilities in smart contracts using the BERT pre-training model,which can quickly and effectively process and detect smart contracts.More specifically,we preprocess and make symbol substitution in the contract,which can make the pre-training model better obtain contract features.We evaluate our method on four datasets and compare its performance with other deep learning models and vulnerability detection tools,demonstrating its superior accuracy. 展开更多
关键词 BERT blockchain smart contract vulnerability detection
在线阅读 下载PDF
Joint Task Allocation and Resource Optimization for Blockchain Enabled Collaborative Edge Computing 被引量:1
4
作者 Xu Wenjing Wang Wei +2 位作者 Li Zuguang Wu Qihui Wang Xianbin 《China Communications》 SCIE CSCD 2024年第4期218-229,共12页
Collaborative edge computing is a promising direction to handle the computation intensive tasks in B5G wireless networks.However,edge computing servers(ECSs)from different operators may not trust each other,and thus t... Collaborative edge computing is a promising direction to handle the computation intensive tasks in B5G wireless networks.However,edge computing servers(ECSs)from different operators may not trust each other,and thus the incentives for collaboration cannot be guaranteed.In this paper,we propose a consortium blockchain enabled collaborative edge computing framework,where users can offload computing tasks to ECSs from different operators.To minimize the total delay of users,we formulate a joint task offloading and resource optimization problem,under the constraint of the computing capability of each ECS.We apply the Tammer decomposition method and heuristic optimization algorithms to obtain the optimal solution.Finally,we propose a reputation based node selection approach to facilitate the consensus process,and also consider a completion time based primary node selection to avoid monopolization of certain edge node and enhance the security of the blockchain.Simulation results validate the effectiveness of the proposed algorithm,and the total delay can be reduced by up to 40%compared with the non-cooperative case. 展开更多
关键词 blockchain collaborative edge computing resource optimization task allocation
在线阅读 下载PDF
Redundant Data Detection and Deletion to Meet Privacy Protection Requirements in Blockchain-Based Edge Computing Environment
5
作者 Zhang Lejun Peng Minghui +6 位作者 Su Shen Wang Weizheng Jin Zilong Su Yansen Chen Huiling Guo Ran Sergey Gataullin 《China Communications》 SCIE CSCD 2024年第3期149-159,共11页
With the rapid development of information technology,IoT devices play a huge role in physiological health data detection.The exponential growth of medical data requires us to reasonably allocate storage space for clou... With the rapid development of information technology,IoT devices play a huge role in physiological health data detection.The exponential growth of medical data requires us to reasonably allocate storage space for cloud servers and edge nodes.The storage capacity of edge nodes close to users is limited.We should store hotspot data in edge nodes as much as possible,so as to ensure response timeliness and access hit rate;However,the current scheme cannot guarantee that every sub-message in a complete data stored by the edge node meets the requirements of hot data;How to complete the detection and deletion of redundant data in edge nodes under the premise of protecting user privacy and data dynamic integrity has become a challenging problem.Our paper proposes a redundant data detection method that meets the privacy protection requirements.By scanning the cipher text,it is determined whether each sub-message of the data in the edge node meets the requirements of the hot data.It has the same effect as zero-knowledge proof,and it will not reveal the privacy of users.In addition,for redundant sub-data that does not meet the requirements of hot data,our paper proposes a redundant data deletion scheme that meets the dynamic integrity of the data.We use Content Extraction Signature(CES)to generate the remaining hot data signature after the redundant data is deleted.The feasibility of the scheme is proved through safety analysis and efficiency analysis. 展开更多
关键词 blockchain data integrity edge computing privacy protection redundant data
在线阅读 下载PDF
Joint Optimization of Energy Consumption and Network Latency in Blockchain-Enabled Fog Computing Networks
6
作者 Huang Xiaoge Yin Hongbo +3 位作者 Cao Bin Wang Yongsheng Chen Qianbin Zhang Jie 《China Communications》 SCIE CSCD 2024年第4期104-119,共16页
Fog computing is considered as a solution to accommodate the emergence of booming requirements from a large variety of resource-limited Internet of Things(IoT)devices.To ensure the security of private data,in this pap... Fog computing is considered as a solution to accommodate the emergence of booming requirements from a large variety of resource-limited Internet of Things(IoT)devices.To ensure the security of private data,in this paper,we introduce a blockchain-enabled three-layer device-fog-cloud heterogeneous network.A reputation model is proposed to update the credibility of the fog nodes(FN),which is used to select blockchain nodes(BN)from FNs to participate in the consensus process.According to the Rivest-Shamir-Adleman(RSA)encryption algorithm applied to the blockchain system,FNs could verify the identity of the node through its public key to avoid malicious attacks.Additionally,to reduce the computation complexity of the consensus algorithms and the network overhead,we propose a dynamic offloading and resource allocation(DORA)algorithm and a reputation-based democratic byzantine fault tolerant(R-DBFT)algorithm to optimize the offloading decisions and decrease the number of BNs in the consensus algorithm while ensuring the network security.Simulation results demonstrate that the proposed algorithm could efficiently reduce the network overhead,and obtain a considerable performance improvement compared to the related algorithms in the previous literature. 展开更多
关键词 blockchain energy consumption fog computing network Internet of Things LATENCY
在线阅读 下载PDF
A Blockchain-Based Proxy Re-Encryption Scheme with Conditional Privacy Protection and Auditability
7
作者 Chen Guo PengWeijun +3 位作者 Wu Jing Fang Youxuan Ye Keke Xin Yanshuang 《China Communications》 SCIE CSCD 2024年第7期267-277,共11页
With the development of Internet of Things technology,intelligent door lock devices are widely used in the field of house leasing.In the traditional housing leasing scenario,problems of door lock information disclosur... With the development of Internet of Things technology,intelligent door lock devices are widely used in the field of house leasing.In the traditional housing leasing scenario,problems of door lock information disclosure,tenant privacy disclosure and rental contract disputes frequently occur,and the security,fairness and auditability of the housing leasing transaction cannot be guaranteed.To solve the above problems,a blockchain-based proxy re-encryption scheme with conditional privacy protection and auditability is proposed.The scheme implements fine-grained access control of door lock data based on attribute encryption technology with policy hiding,and uses proxy re-encryption technology to achieve auditable supervision of door lock information transactions.Homomorphic encryption technology and zero-knowledge proof technology are introduced to ensure the confidentiality of housing rent information and the fairness of rent payment.To construct a decentralized housing lease transaction architecture,the scheme realizes the efficient collaboration between the door lock data ciphertext stored under the chain and the key information ciphertext on the chain based on the blockchain and InterPlanetary File System.Finally,the security proof and computing performance analysis of the proposed scheme are carried out.The results show that the scheme can resist the chosen plaintext attack and has low computational cost. 展开更多
关键词 attribute encryption blockchain homomorphic encryption house leasing proxy re-encryption zero-knowledge proof
在线阅读 下载PDF
Blockchain-Based MCS Detection Framework of Abnormal Spectrum Usage for Satellite Spectrum Sharing Scenario
8
作者 Ning Yang Heng Wang +3 位作者 Jingming Hu Bangning Zhang Daoxing Guo Yuan Liu 《China Communications》 SCIE CSCD 2024年第2期32-48,共17页
In this paper, the problem of abnormal spectrum usage between satellite spectrum sharing systems is investigated to support multi-satellite spectrum coexistence. Given the cost of monitoring, the mobility of low-orbit... In this paper, the problem of abnormal spectrum usage between satellite spectrum sharing systems is investigated to support multi-satellite spectrum coexistence. Given the cost of monitoring, the mobility of low-orbit satellites, and the directional nature of their signals, traditional monitoring methods are no longer suitable, especially in the case of multiple power level. Mobile crowdsensing(MCS), as a new technology, can make full use of idle resources to complete a variety of perceptual tasks. However, traditional MCS heavily relies on a centralized server and is vulnerable to single point of failure attacks. Therefore, we replace the original centralized server with a blockchain-based distributed service provider to enable its security. Therefore, in this work, we propose a blockchain-based MCS framework, in which we explain in detail how this framework can achieve abnormal frequency behavior monitoring in an inter-satellite spectrum sharing system. Then, under certain false alarm probability, we propose an abnormal spectrum detection algorithm based on mixed hypothesis test to maximize detection probability in single power level and multiple power level scenarios, respectively. Finally, a Bad out of Good(BooG) detector is proposed to ease the computational pressure on the blockchain nodes. Simulation results show the effectiveness of the proposed framework. 展开更多
关键词 blockchain hypothesis test mobile crowdsensing satellite communication spectrum sharing
在线阅读 下载PDF
T-ATMChain:Blockchain-Based Identity Authentication for Air Traffic Management
9
作者 Lu Xin Wu Zhijun Yue Meng 《China Communications》 SCIE CSCD 2024年第12期186-202,共17页
The air traffic management(ATM)system is an intelligent system,which integrates the ground computer network,airborne network and space satellite(communication and navigation)network by the ground-air data link system.... The air traffic management(ATM)system is an intelligent system,which integrates the ground computer network,airborne network and space satellite(communication and navigation)network by the ground-air data link system.Due to the openness and widely distribution of ATM system,the trust relationship of all parties in the system is pretty complex.At present,public key infrastructure(PKI)based identity authentication method is more and more difficult to meet the growing demand of ATM service.First,through the analysis of the organizational structure and operation mode of ATM system,this paper points out the existing identity authentication security threats in ATM system,and discusses the advantages of adopting blockchain technology in ATM system.Further,we briefly analyze some shortcomings of the current PKI-based authentication system in ATM.Particularly,to address the authentication problem,this paper proposes and presents a trusted ATM Security Authentication Model and authentication protocol based on blockchain.Finally,this paper makes a comprehensive analysis and simulation of the proposed security authentication scheme,and gets the expected effect. 展开更多
关键词 air traffic management blockchain identity authentication security authentication
在线阅读 下载PDF
A General Framework for Intelligent IoT Data Acquisition and Sharing in an Untrusted Environment Based on Blockchain
10
作者 Lu Yin Xue Yongtao +4 位作者 Li Qingyuan Wu Luocheng Li Taosen Yang Peipei Zhu Hongbo 《China Communications》 SCIE CSCD 2024年第3期137-148,共12页
Traditional Io T systems suffer from high equipment management costs and difficulty in trustworthy data sharing caused by centralization.Blockchain provides a feasible research direction to solve these problems. The m... Traditional Io T systems suffer from high equipment management costs and difficulty in trustworthy data sharing caused by centralization.Blockchain provides a feasible research direction to solve these problems. The main challenge at this stage is to integrate the blockchain from the resourceconstrained Io T devices and ensure the data of Io T system is credible. We provide a general framework for intelligent Io T data acquisition and sharing in an untrusted environment based on the blockchain, where gateways become Oracles. A distributed Oracle network based on Byzantine Fault Tolerant algorithm is used to provide trusted data for the blockchain to make intelligent Io T data trustworthy. An aggregation contract is deployed to collect data from various Oracle and share the credible data to all on-chain users. We also propose a gateway data aggregation scheme based on the REST API event publishing/subscribing mechanism which uses SQL to achieve flexible data aggregation. The experimental results show that the proposed scheme can alleviate the problem of limited performance of Io T equipment, make data reliable, and meet the diverse data needs on the chain. 展开更多
关键词 blockchain data sharing Internet of Things ORACLE
在线阅读 下载PDF
Joint Task Allocation and Resource Optimization for Blockchain Enabled Collaborative Edge Computing
11
作者 Xu Wenjing Wang Wei +2 位作者 Li Zuguang Wu Qihui Wang Xianbin 《China Communications》 SCIE CSCD 2024年第12期231-242,共12页
Collaborative edge computing is a promising direction to handle the computation intensive tasks in B5G wireless networks.However,edge computing servers(ECSs)from different operators may not trust each other,and thus t... Collaborative edge computing is a promising direction to handle the computation intensive tasks in B5G wireless networks.However,edge computing servers(ECSs)from different operators may not trust each other,and thus the incentives for collaboration cannot be guaranteed.In this paper,we propose a consortium blockchain enabled collaborative edge computing framework,where users can offload computing tasks to ECSs from different operators.To minimize the total delay of users,we formulate a joint task offloading and resource optimization problem,under the constraint of the computing capability of each ECS.We apply the Tammer decomposition method and heuristic optimization algorithms to obtain the optimal solution.Finally,we propose a reputation based node selection approach to facilitate the consensus process,and also consider a completion time based primary node selection to avoid monopolization of certain edge node and enhance the security of the blockchain.Simulation results validate the effectiveness of the proposed algorithm,and the total delay can be reduced by up to 40%compared with the non-cooperative case. 展开更多
关键词 blockchain collaborative edge comput-ing resource optimization task allocation
在线阅读 下载PDF
High-Level Security Dimension Evaluation of Blockchain BaaS System and Key Technology
12
作者 Chen Wanfa Zheng Qing’an +2 位作者 Chen Shuzhen Fu Hongyi Chen Liang 《China Communications》 SCIE CSCD 2024年第6期176-191,共16页
In recent years,blockchain technology integration and application has gradually become an important driving force for new technological innovation and industrial transformation.While blockchain technology and applicat... In recent years,blockchain technology integration and application has gradually become an important driving force for new technological innovation and industrial transformation.While blockchain technology and applications are developing rapidly,the emerging security risks and obstacles have gradually become prominent.Attackers can still find security issues in blockchain systems and conduct attacks,causing increasing losses from network attacks every year.In response to the current demand for blockchain application security detection and assessment in all industries,and the insufficient coverage of existing detection technologies such as smart contract detectiontechnology,this paper proposes a blockchain core technology security assessment system model,and studies the relevant detection and assessment key technologies and systems.A security assessment scheme based on a smart contract and consensus mechanism detection scheme is designed.And the underlying blockchain architecture supports the traceability of detection results using super blockchains.Finally,the functionality and performance of the system were tested,and the test results show that the model and solutions proposed in this paper have good feasibility. 展开更多
关键词 blockchain security consensus mechanis smart contract
在线阅读 下载PDF
Optimization of High-Concurrency Conflict Issues in Execute-Order-Validate Blockchain
13
作者 MA Qianli ZHANG Shengli +2 位作者 WANG Taotao YANG Qing WANG Jigang 《ZTE Communications》 2024年第2期19-29,共11页
With the maturation and advancement of blockchain technology,a novel execute-order-validate(EOV)architecture has been proposed,allowing transactions to be executed in parallel during the execution phase.However,parall... With the maturation and advancement of blockchain technology,a novel execute-order-validate(EOV)architecture has been proposed,allowing transactions to be executed in parallel during the execution phase.However,parallel execution may lead to multi-version concurrency control(MVCC)conflicts during the validation phase,resulting in transaction invalidation.Based on different causes,we categorize conflicts in the EOV blockchain into two types:within-block conflicts and cross-block conflicts,and propose an optimization solution called FabricMan based on Fabric v2.4.For within-block conflicts,a reordering algorithm is designed to improve the transaction success rate and parallel validation is implemented based on the transaction conflict graph.We also merge transfer transactions to prevent triggering multiple version checks.For cross-block conflicts,a cache-based version validation mechanism is implemented to detect and terminate invalid transactions in advance.Experimental comparisons are conducted between FabricMan and two other systems,Fabric and Fabric++.The results show that FabricMan outperforms the other two systems in terms of throughput,transaction abort rate,algorithm execution time,and other experimental metrics. 展开更多
关键词 blockchain MVCC conflict REORDERING parallel validation transaction merging
在线阅读 下载PDF
Trust Access Authentication in Vehicular Network Based on Blockchain 被引量:12
14
作者 Shaoyong Guo Xing Hu +3 位作者 Ziqiang Zhou Xinyan Wang Feng Qi Lifang Gao 《China Communications》 SCIE CSCD 2019年第6期18-30,共13页
Data sharing and privacy securing present extensive opportunities and challenges in vehicular network.This paper introducestrust access authentication scheme’as a mechanism to achieve real-time monitoring and promote... Data sharing and privacy securing present extensive opportunities and challenges in vehicular network.This paper introducestrust access authentication scheme’as a mechanism to achieve real-time monitoring and promote collaborative sharing for vehicles.Blockchain,which can provide secure authentication and protected privacy,is a crucial technology.However,traditional cloud computing performs poorly in supplying low-latency and fast-response services for moving vehicles.In this situation,edge computing enabled Blockchain network appeals to be a promising method,where moving vehicles can access storage or computing resource and get authenticated from Blockchain edge nodes directly.In this paper,a hierarchical architecture is proposed consist of vehicular network layer,Blockchain edge layer and Blockchain network layer.Through a authentication mechanism adopting digital signature algorithm,it achieves trusted authentication and ensures valid verification.Moreover,a caching scheme based on many-to-many matching is proposed to minimize average delivery delay of vehicles.Simulation results prove that the proposed caching scheme has a better performance than existing schemes based on central-ized model or edge caching strategy in terms of hit ratio and average delay. 展开更多
关键词 blockchain vehicular network EDGE COMPUTING AUTHENTICATION MECHANISM many-to-many MATCHING
在线阅读 下载PDF
Blockchain-Based Secure Distributed Control for Software Defined Optical Networking 被引量:5
15
作者 Hui Yang Yongshen Liang +3 位作者 Qiuyan Yao Shaoyong Guo Ao Yu Jie Zhang 《China Communications》 SCIE CSCD 2019年第6期42-54,共13页
Software defined optical networking(SDON)is a critical technology for the next generation network with the advantages of programmable control and etc.As one of the key issues of SDON,the security of control plane has ... Software defined optical networking(SDON)is a critical technology for the next generation network with the advantages of programmable control and etc.As one of the key issues of SDON,the security of control plane has also received extensive attention,especially in certain network scenarios with high security requirement.Due to the existence of vulnerabilities and heavy overhead,the existing firewalls and distributed control technologies cannot solve the control plane security problem well.In this paper,we propose a distributed control architecture for SDON using the blockchain technique(BlockCtrl).The proposed BlockCtrl model introduces the advantages of blockchain into SDON to achieve a high-efficiency fault tolerant control.We have evaluated the performance of our proposed architecture and compared it to the existing models with respect to various metrics including processing rate,recovery latency and etc.The numerical results show that the BlockCtrl is capable of attacks detection and fault tolerant control in SDON with high performance on resource utilization and service correlation. 展开更多
关键词 blockchain FAULT TOLERANT control network SECURITY SOFTWARE defined NETWORKING
在线阅读 下载PDF
A Consortium Blockchain Paradigm on Hyperledger-Based Peer-to-Peer Lending System 被引量:5
16
作者 Xueyun Zeng Ninghua Hao +1 位作者 Junchen Zheng Xuening Xu 《China Communications》 SCIE CSCD 2019年第8期38-50,共13页
This paper focuses on how to use consortium blockchain to improve the regulation of peer-to-peer(P2 P) lending market. The partial decentralized consortium blockchain with limited pre-set nodes can well improve transp... This paper focuses on how to use consortium blockchain to improve the regulation of peer-to-peer(P2 P) lending market. The partial decentralized consortium blockchain with limited pre-set nodes can well improve transparency and security, which is suitable for financial regulation. Considering irregularities of the P2P lending market, the Hyperledger-based Peer-to-Peer Lending System(HyperP2PLS) is proposed. First elaborate the application scenario and business logic of the system, where a national P2P Lending Trading Center will be established to integrate all transactions and information of P2P lending market. Then construct the system architecture consisting of the blockchain network, HTTP server, and applications. The algorithm of implementation process and the web application for users have been well illustrated. The performance analysis shows that HyperP2PLS can guarantee the reliability, safety, transparency and efficiency. 展开更多
关键词 CONSORTIUM blockchain hyperledger FINANCIAL REGULATION PEER-TO-PEER LENDING
在线阅读 下载PDF
Edgence: A Blockchain-Enabled Edge-Computing Platform for Intelligent IoT-Based dApps 被引量:8
17
作者 Jinliang Xu Shangguang Wang +1 位作者 Ao Zhou Fangchun Yang 《China Communications》 SCIE CSCD 2020年第4期78-87,共10页
Nowadays scalable Io T management is a bottleneck of Io T development due to the geographically dispersed distribution, fragmented ownerships, and ever-growing population of Io T devices. To intelligently manage massi... Nowadays scalable Io T management is a bottleneck of Io T development due to the geographically dispersed distribution, fragmented ownerships, and ever-growing population of Io T devices. To intelligently manage massive decentralized applications(d Apps) in Io T usecases, Edgence(EDGe + intellig ENCE) is proposed to use edge clouds to access Io T devices and users, and then use its in-built blockchain to realize self-governing and self-supervision of the edge clouds. Edgence proposes to use masternode technology to introduce Io T devices and users into a closed blockchain system, which can extend the range of blockchain to Io T-based d Apps. Further, masternodes do good to scalability by raising the TPS(transactions per second) of the blockchain network. To support various d Apps, a three-tier validation is proposed, namely script validation, smartcontract validation, and masternode validation. To avoid energy consumption resulted by blockchain consensus, Edgence proposes a random but verifiable way to elect a masternode to generate each new block. The potential of the tailored Edgence is shown by examples of decentralized crowdsourcing and AI training. 展开更多
关键词 mobile EDGE computing IOT crowd-intelligence blockchain dApp
在线阅读 下载PDF
Privacy Protection for Blockchains with Account and Multi-Asset Model 被引量:3
18
作者 Donghui Ding Kang Li +3 位作者 Linpeng Jia Zhongcheng Li Jun Li Yi Sun 《China Communications》 SCIE CSCD 2019年第6期69-79,共11页
The blockchain technology has been applied to wide areas.However,the open and transparent properties of the blockchains pose serious challenges to users’privacy.Among all the schemes for the privacy protection,the ze... The blockchain technology has been applied to wide areas.However,the open and transparent properties of the blockchains pose serious challenges to users’privacy.Among all the schemes for the privacy protection,the zero-knowledge proof algorithm conceals most of the private information in a transaction,while participants of the blockchain can validate this transaction without the private information.However,current schemes are only aimed at blockchains with the UTXO model,and only one type of assets circulates on these blockchains.Based on the zero-knowledge proof algorithm,this paper proposes a privacy protection scheme for blockchains that use the account and multi-asset model.We design the transaction structure,anonymous addresses and anonymous asset metadata,and also propose the methods of the asset transfer and double-spending detection.The zk-SNARKs algorithm is used to generate and to verify the zero-knowledge proof.And finally,we conduct the experiments to evaluate our scheme. 展开更多
关键词 blockchain privacy protection ZERO-KNOWLEDGE PROOF algorithm ACCOUNT and multi-asset MODEL
在线阅读 下载PDF
Edge Caching in Blockchain Empowered 6G 被引量:8
19
作者 Wen Sun Sheng Li Yan Zhang 《China Communications》 SCIE CSCD 2021年第1期1-17,共17页
The sixth generation(6G)of wireless cellular networks is expected to incorporate the latest developments in network infrastructure and emerging advances in technology.In the age of 6G,edge caching technology will evol... The sixth generation(6G)of wireless cellular networks is expected to incorporate the latest developments in network infrastructure and emerging advances in technology.In the age of 6G,edge caching technology will evolve towards intelligence,dynamics,and security.However,the security problems of edge caching,including data tampering and eavesdropping,are seldomly considered in most literatures.In this paper,we consider the two-hop edge caching where the blockchain and physical layer security technologies are adopted to prevent data from being tampered with and eavesdropped.We design blockchain-based framework to guarantee the reliability of important data such as the frequency of contents and jointly optimize content caching probability and redundancy rate to maximize the secure transmission probability.Extensive simulation shows that our optimization scheme can significantly improve the secure transmission probability of edge cache network,whether facing the threat of independent eavesdropping or joint eavesdropping. 展开更多
关键词 blockchain 6G edge caching physical layer security
在线阅读 下载PDF
Blockchain Energy: Blockchain in Future Energy Systems 被引量:5
20
作者 Bernd Teufel Anton Sentic Mathias Barmet 《Journal of Electronic Science and Technology》 CAS CSCD 2019年第4期317-331,共15页
The ongoing,in-depth transformation of the electricity sector towards increased use of alternative,renewable energy sources extends beyond a simple decentralisation drive in the electricity market.The transformation p... The ongoing,in-depth transformation of the electricity sector towards increased use of alternative,renewable energy sources extends beyond a simple decentralisation drive in the electricity market.The transformation process is characterised by the interplay of old and new technologies from the energy sector as well as structural coupling with other sectors,such as the information and communications technology(ICT),enabling the technology transfer as well as market entry by information technology(IT)actors.Blockchain-based technologies have the potential to play a key role in this transition by offering decentralised interfaces and systems as well as an alternative approach to the current organisation form of the energy market.This paper discusses the applicability and prospects for blockchain-based technologies in the energy sector,which are described using the term“blockchain energy”.For the purposes of this study,blockchain energy encompasses all socio-technical and organisational configurations in the energy sector based on the utilisation of the blockchain principle for energy trading,information storage,and/or increased transparency of energy flows and energy services.In the following chapters,the authors present and discuss the current transformation in the electricity market,followed by a review of the different utilisation possibilities for blockchain technologies in the energy sector and a discussion of the barriers and potential for blockchain energy using a transition studies perspective.Finally,the opportunities and risks of blockchain energy are discussed. 展开更多
关键词 blockchain energy management crowd energy transition research.
在线阅读 下载PDF
上一页 1 2 113 下一页 到第
使用帮助 返回顶部