Computer Science Information Systems

Blockchain Technology Applications and Security

Description

This cluster of papers explores the integration of blockchain technology with the Internet of Things (IoT), focusing on topics such as smart contracts, security, supply chain management, decentralization, cryptocurrencies, privacy, energy sector applications, and healthcare. The papers cover a wide range of applications and challenges in utilizing blockchain for IoT-related scenarios.

Keywords

Blockchain; Internet of Things; Smart Contracts; Security; Supply Chain Management; Decentralization; Cryptocurrencies; Privacy; Energy Sector; Healthcare

Bit coin has emerged as the most successful cryptographic currency in history. Within two years of its quiet launch in 2009, Bit coin grew to comprise billions of dollars of … Bit coin has emerged as the most successful cryptographic currency in history. Within two years of its quiet launch in 2009, Bit coin grew to comprise billions of dollars of economic value despite only cursory analysis of the system's design. Since then a growing literature has identified hidden-but-important properties of the system, discovered attacks, proposed promising alternatives, and singled out difficult future challenges. Meanwhile a large and vibrant open-source community has proposed and deployed numerous modifications and extensions. We provide the first systematic exposition Bit coin and the many related crypto currencies or 'altcoins.' Drawing from a scattered body of knowledge, we identify three key components of Bit coin's design that can be decoupled. This enables a more insightful analysis of Bit coin's properties and future stability. We map the design space for numerous proposed modifications, providing comparative analyses for alternative consensus mechanisms, currency allocation mechanisms, computational puzzles, and key management tools. We survey anonymity issues in Bit coin and provide an evaluation framework for analyzing a variety of privacy-enhancing proposals. Finally we provide new insights on what we term disinter mediation protocols, which absolve the need for trusted intermediaries in an interesting set of applications. We identify three general disinter mediation strategies and provide a detailed comparison.
Smart contracts combine protocols with user interfaces to formalize and secure relationships over computer networks. Objectives and principles for the design of these systems are derived from legal principles, economic … Smart contracts combine protocols with user interfaces to formalize and secure relationships over computer networks. Objectives and principles for the design of these systems are derived from legal principles, economic theory, and theories of reliable and secure protocols. Similarities and differences between smart contracts and traditional business procedures based on written contracts, controls, and static forms are discussed. By using cryptographic and other security mechanisms, we can secure many algorithmically specifiable relationships from breach by principals, and from eavesdropping or malicious interference by third parties, up to considerations of time, user interface, and completeness of the algorithmic specification. This article discusses protocols with application in important contracting areas, including credit, content rights management, payment systems, and contracts with bearer.
The large-scale automated transaction systems of the near future can be designed to protect the privacy and maintain the security of both individuals and organizations. The large-scale automated transaction systems of the near future can be designed to protect the privacy and maintain the security of both individuals and organizations.
Bit coin is the first digital currency to see widespread adoption. While payments are conducted between pseudonyms, Bit coin cannot offer strong privacy guarantees: payment transactions are recorded in a … Bit coin is the first digital currency to see widespread adoption. While payments are conducted between pseudonyms, Bit coin cannot offer strong privacy guarantees: payment transactions are recorded in a public decentralized ledger, from which much information can be deduced. Zero coin (Miers et al., IEEE S&P 2013) tackles some of these privacy issues by unlinking transactions from the payment's origin. Yet, it still reveals payments' destinations and amounts, and is limited in functionality. In this paper, we construct a full-fledged ledger-based digital currency with strong privacy guarantees. Our results leverage recent advances in zero-knowledge Succinct Non-interactive Arguments of Knowledge (zk-SNARKs). First, we formulate and construct decentralized anonymous payment schemes (DAP schemes). A DAP scheme enables users to directly pay each other privately: the corresponding transaction hides the payment's origin, destination, and transferred amount. We provide formal definitions and proofs of the construction's security. Second, we build Zero cash, a practical instantiation of our DAP scheme construction. In Zero cash, transactions are less than 1 kB and take under 6 ms to verify - orders of magnitude more efficient than the less-anonymous Zero coin and competitive with plain Bit coin.
Besides attracting a billion dollar economy, Bitcoin revolutionized the field of digital currencies and influenced many adjacent areas. This also induced significant scientific interest. In this survey, we unroll and … Besides attracting a billion dollar economy, Bitcoin revolutionized the field of digital currencies and influenced many adjacent areas. This also induced significant scientific interest. In this survey, we unroll and structure the manyfold results and research directions. We start by introducing the Bitcoin protocol and its building blocks. From there we continue to explore the design space by discussing existing contributions and results. In the process, we deduce the fundamental structures and insights at the core of the Bitcoin protocol and its applications. As we show and discuss, many key ideas are likewise applicable in various other fields, so that their impact reaches far beyond Bitcoin itself.
Motivated by the recent explosion of interest around blockchains, we examine whether they make a good fit for the Internet of Things (IoT) sector. Blockchains allow us to have a … Motivated by the recent explosion of interest around blockchains, we examine whether they make a good fit for the Internet of Things (IoT) sector. Blockchains allow us to have a distributed peer-to-peer network where non-trusting members can interact with each other without a trusted intermediary, in a verifiable manner. We review how this mechanism works and also look into smart contracts-scripts that reside on the blockchain that allow for the automation of multi-step processes. We then move into the IoT domain, and describe how a blockchain-IoT combination: 1) facilitates the sharing of services and resources leading to the creation of a marketplace of services between devices and 2) allows us to automate in a cryptographically verifiable manner several existing, time-consuming workflows. We also point out certain issues that should be considered before the deployment of a blockchain network in an IoT setting: from transactional privacy to the expected value of the digitized assets traded on the network. Wherever applicable, we identify solutions and workarounds. Our conclusion is that the blockchain-IoT combination is powerful and can cause significant transformations across several industries, paving the way for new business models and novel, distributed applications.
Emerging smart contract systems over decentralized cryptocurrencies allow mutually distrustful parties to transact safely without trusted third parties. In the event of contractual breaches or aborts, the decentralized blockchain ensures … Emerging smart contract systems over decentralized cryptocurrencies allow mutually distrustful parties to transact safely without trusted third parties. In the event of contractual breaches or aborts, the decentralized blockchain ensures that honest parties obtain commensurate compensation. Existing systems, however, lack transactional privacy. All transactions, including flow of money between pseudonyms and amount transacted, are exposed on the blockchain. We present Hawk, a decentralized smart contract system that does not store financial transactions in the clear on the blockchain, thus retaining transactional privacy from the public's view. A Hawk programmer can write a private smart contract in an intuitive manner without having to implement cryptography, and our compiler automatically generates an efficient cryptographic protocol where contractual parties interact with the blockchain, using cryptographic primitives such as zero-knowledge proofs. To formally define and reason about the security of our protocols, we are the first to formalize the blockchain model of cryptography. The formal modeling is of independent interest. We advocate the community to adopt such a formal model when designing applications atop decentralized blockchains.
Blockchain is a decentralized transaction and data management technology developed first for Bitcoin cryptocurrency. The interest in Blockchain technology has been increasing since the idea was coined in 2008. The … Blockchain is a decentralized transaction and data management technology developed first for Bitcoin cryptocurrency. The interest in Blockchain technology has been increasing since the idea was coined in 2008. The reason for the interest in Blockchain is its central attributes that provide security, anonymity and data integrity without any third party organization in control of the transactions, and therefore it creates interesting research areas, especially from the perspective of technical challenges and limitations. In this research, we have conducted a systematic mapping study with the goal of collecting all relevant research on Blockchain technology. Our objective is to understand the current research topics, challenges and future directions regarding Blockchain technology from the technical perspective. We have extracted 41 primary papers from scientific databases. The results show that focus in over 80% of the papers is on Bitcoin system and less than 20% deals with other Blockchain applications including e.g. smart contracts and licensing. The majority of research is focusing on revealing and improving limitations of Blockchain from privacy and security perspectives, but many of the proposed solutions lack concrete evaluation on their effectiveness. Many other Blockchain scalability related challenges including throughput and latency have been left unstudied. On the basis of this study, recommendations on future research directions are provided for researchers.
Smart grids equipped with bi-directional communication flow are expected to provide more sophisticated consumption monitoring and energy trading. However, the issues related to the security and privacy of consumption and … Smart grids equipped with bi-directional communication flow are expected to provide more sophisticated consumption monitoring and energy trading. However, the issues related to the security and privacy of consumption and trading data present serious challenges. In this paper we address the problem of providing transaction security in decentralized smart grid energy trading without reliance on trusted third parties. We have implemented a proof-of-concept for decentralized energy trading system using blockchain technology, multi-signatures, and anonymous encrypted messaging streams, enabling peers to anonymously negotiate energy prices and securely perform trading transactions. We conducted case studies to perform security analysis and performance evaluation within the context of the elicited security and privacy requirements.
Proof of Work (PoW) powered blockchains currently account for more than 90% of the total market capitalization of existing digital cryptocurrencies. Although the security provisions of Bitcoin have been thoroughly … Proof of Work (PoW) powered blockchains currently account for more than 90% of the total market capitalization of existing digital cryptocurrencies. Although the security provisions of Bitcoin have been thoroughly analysed, the security guarantees of variant (forked) PoW blockchains (which were instantiated with different parameters) have not received much attention in the literature. This opens the question whether existing security analysis of Bitcoin's PoW applies to other implementations which have been instantiated with different consensus and/or network parameters.
Cryptocurrencies record transactions in a decentralized data structure called a blockchain. Two of the most popular cryptocurrencies, Bitcoin and Ethereum, support the feature to encode rules or scripts for processing … Cryptocurrencies record transactions in a decentralized data structure called a blockchain. Two of the most popular cryptocurrencies, Bitcoin and Ethereum, support the feature to encode rules or scripts for processing transactions. This feature has evolved to give practical shape to the ideas of smart contracts, or full-fledged programs that are run on blockchains. Recently, Ethereum's smart contract system has seen steady adoption, supporting tens of thousands of contracts, holding millions dollars worth of virtual coins.
Blockchain technology has the potential to revolutionize applications and redefine the digital economy. Blockchain technology has the potential to revolutionize applications and redefine the digital economy.
The dissemination of patients' medical records results in diverse risks to patients' privacy as malicious activities on these records cause severe damage to the reputation, finances, and so on of … The dissemination of patients' medical records results in diverse risks to patients' privacy as malicious activities on these records cause severe damage to the reputation, finances, and so on of all parties related directly or indirectly to the data. Current methods to effectively manage and protect medical records have been proved to be insufficient. In this paper, we propose MeDShare, a system that addresses the issue of medical data sharing among medical big data custodians in a trust-less environment. The system is blockchain-based and provides data provenance, auditing, and control for shared medical data in cloud repositories among big data entities. MeDShare monitors entities that access data for malicious use from a data custodian system. In MeDShare, data transitions and sharing from one entity to the other, along with all actions performed on the MeDShare system, are recorded in a tamper-proof manner. The design employs smart contracts and an access control mechanism to effectively track the behavior of the data and revoke access to offending entities on detection of violation of permissions on data. The performance of MeDShare is comparable to current cutting edge solutions to data sharing among cloud service providers. By implementing MeDShare, cloud service providers and other data guardians will be able to achieve data provenance and auditing while sharing medical data with entities such as research and medical institutions with minimal risk to data privacy.
Abstract Objectives To introduce blockchain technologies, including their benefits, pitfalls, and the latest applications, to the biomedical and health care domains. Target Audience Biomedical and health care informatics researchers who … Abstract Objectives To introduce blockchain technologies, including their benefits, pitfalls, and the latest applications, to the biomedical and health care domains. Target Audience Biomedical and health care informatics researchers who would like to learn about blockchain technologies and their applications in the biomedical/health care domains. Scope The covered topics include: (1) introduction to the famous Bitcoin crypto-currency and the underlying blockchain technology; (2) features of blockchain; (3) review of alternative blockchain technologies; (4) emerging nonfinancial distributed ledger technologies and applications; (5) benefits of blockchain for biomedical/health care applications when compared to traditional distributed databases; (6) overview of the latest biomedical/health care applications of blockchain technologies; and (7) discussion of the potential challenges and proposed solutions of adopting blockchain technologies in biomedical/health care domains.
Algorand is a new cryptocurrency that confirms transactions with latency on the order of a minute while scaling to many users. Algorand ensures that users never have divergent views of … Algorand is a new cryptocurrency that confirms transactions with latency on the order of a minute while scaling to many users. Algorand ensures that users never have divergent views of confirmed transactions, even if some of the users are malicious and the network is temporarily partitioned. In contrast, existing cryptocurrencies allow for temporary forks and therefore require a long time, on the order of an hour, to confirm transactions with high confidence.
The Internet of Things (IoT) is stepping out of its infancy into full maturity and establishing itself as a part of the future Internet. One of the technical challenges of … The Internet of Things (IoT) is stepping out of its infancy into full maturity and establishing itself as a part of the future Internet. One of the technical challenges of having billions of devices deployed worldwide is the ability to manage them. Although access management technologies exist in IoT, they are based on centralized models which introduce a new variety of technical limitations to manage them globally. In this paper, we propose a new architecture for arbitrating roles and permissions in IoT. The new architecture is a fully distributed access control system for IoT based on blockchain technology. The architecture is backed by a proof of concept implementation and evaluated in realistic IoT scenarios. The results show that the blockchain technology could be used as access management technology in specific scalable IoT scenarios.
In the Internet of Things (IoT) vision, conventional devices become smart and autonomous. This vision is turning into a reality thanks to advances in technology, but there are still challenges … In the Internet of Things (IoT) vision, conventional devices become smart and autonomous. This vision is turning into a reality thanks to advances in technology, but there are still challenges to address, particularly in the security domain e.g., data reliability. Taking into account the predicted evolution of the IoT in the coming years, it is necessary to provide confidence in this huge incoming information source. Blockchain has emerged as a key technology that will transform the way in which we share information. Building trust in distributed environments without the need for authorities is a technological advance that has the potential to change many industries, the IoT among them. Disruptive technologies such as big data and cloud computing have been leveraged by IoT to overcome its limitations since its conception, and we think blockchain will be one of the next ones. This paper focuses on this relationship, investigates challenges in blockchain IoT applications, and surveys the most relevant work in order to analyze how blockchain could potentially improve the IoT.
Globalisation of supply chains makes their management and control more difficult. Blockchain technology, as a distributed digital ledger technology which ensures transparency, traceability, and security, is showing promise for easing … Globalisation of supply chains makes their management and control more difficult. Blockchain technology, as a distributed digital ledger technology which ensures transparency, traceability, and security, is showing promise for easing some global supply chain management problems. In this paper, blockchain technology and smart contracts are critically examined with potential application to supply chain management. Local and global government, community, and consumer pressures to meet sustainability goals prompt us to further investigate how blockchain can address and aid supply chain sustainability. Part of this critical examination is how blockchains, a potentially disruptive technology that is early in its evolution, can overcome many potential barriers. Four blockchain technology adoption barriers categories are introduced; inter-organisational, intra-organisational, technical, and external barriers. True blockchain-led transformation of business and supply chain is still in progress and in its early stages; we propose future research propositions and directions that can provide insights into overcoming barriers and adoption of blockchain technology for supply chain management.
Blockchains or distributed ledgers are an emerging technology that has drawn considerable interest from energy supply firms, startups, technology developers, financial institutions, national governments and the academic community. Numerous sources … Blockchains or distributed ledgers are an emerging technology that has drawn considerable interest from energy supply firms, startups, technology developers, financial institutions, national governments and the academic community. Numerous sources coming from these backgrounds identify blockchains as having the potential to bring significant benefits and innovation. Blockchains promise transparent, tamper-proof and secure systems that can enable novel business solutions, especially when combined with smart contracts. This work provides a comprehensive overview of fundamental principles that underpin blockchain technologies, such as system architectures and distributed consensus algorithms. Next, we focus on blockchain solutions for the energy industry and inform the state-of-the-art by thoroughly reviewing the literature and current business cases. To our knowledge, this is one of the first academic, peer-reviewed works to provide a systematic review of blockchain activities and initiatives in the energy sector. Our study reviews 140 blockchain research projects and startups from which we construct a map of the potential and relevance of blockchains for energy applications. These initiatives were systematically classified into different groups according to the field of activity, implementation platform and consensus strategy used.1 Opportunities, potential challenges and limitations for a number of use cases are discussed, ranging from emerging peer-to-peer (P2P) energy trading and Internet of Things (IoT) applications, to decentralised marketplaces, electric vehicle charging and e-mobility. For each of these use cases, our contribution is twofold: first, in identifying the technical challenges that blockchain technology can solve for that application as well as its potential drawbacks, and second in briefly presenting the research and industrial projects and startups that are currently applying blockchain technology to that area. The paper ends with a discussion of challenges and market barriers the technology needs to overcome to get past the hype phase, prove its commercial viability and finally be adopted in the mainstream.
This work provides a systematic literature review of blockchain-based applications across multiple domains. The aim is to investigate the current state of blockchain technology and its applications and to highlight … This work provides a systematic literature review of blockchain-based applications across multiple domains. The aim is to investigate the current state of blockchain technology and its applications and to highlight how specific characteristics of this disruptive technology can revolutionise "business-as-usual" practices. To this end, the theoretical underpinnings of numerous research papers published in high ranked scientific journals during the last decade, along with several reports from grey literature as a means of streamlining our assessment and capturing the continuously expanding blockchain domain, are included in this review. Based on a structured, systematic review and thematic content analysis of the discovered literature, we present a comprehensive classification of blockchain-enabled applications across diverse sectors such as supply chain, business, healthcare, IoT, privacy, and data management, and we establish key themes, trends and emerging areas for research. We also point to the shortcomings identified in the relevant literature, particularly limitations the blockchain technology presents and how these limitations spawn across different sectors and industries. Building on these findings, we identify various research gaps and future exploratory directions that are anticipated to be of significant value both for academics and practitioners.
Internet of Things (IoT) is reshaping the incumbent industry to smart industry featured with data-driven decision-making. However, intrinsic features of IoT result in a number of challenges, such as decentralization, … Internet of Things (IoT) is reshaping the incumbent industry to smart industry featured with data-driven decision-making. However, intrinsic features of IoT result in a number of challenges, such as decentralization, poor interoperability, privacy, and security vulnerabilities. Blockchain technology brings the opportunities in addressing the challenges of IoT. In this paper, we investigate the integration of blockchain technology with IoT. We name such synthesis of blockchain and IoT as blockchain of things (BCoT). This paper presents an in-depth survey of BCoT and discusses the insights of this new paradigm. In particular, we first briefly introduce IoT and discuss the challenges of IoT. Then, we give an overview of blockchain technology. We next concentrate on introducing the convergence of blockchain and IoT and presenting the proposal of BCoT architecture. We further discuss the issues about using blockchain for fifth generation beyond in IoT as well as industrial applications of BCoT. Finally, we outline the open research directions in this promising area.
Fabric is a modular and extensible open-source system for deploying and operating permissioned blockchains and one of the Hyperledger projects hosted by the Linux Foundation (www.hyperledger.org). Fabric is the first … Fabric is a modular and extensible open-source system for deploying and operating permissioned blockchains and one of the Hyperledger projects hosted by the Linux Foundation (www.hyperledger.org). Fabric is the first truly extensible blockchain system for running distributed applications. It supports modular consensus protocols, which allows the system to be tailored to particular use cases and trust models. Fabric is also the first blockchain system that runs distributed applications written in standard, general-purpose programming languages, without systemic dependency on a native cryptocurrency. This stands in sharp contrast to existing block-chain platforms that require smart-contracts to be written in domain-specific languages or rely on a cryptocurrency. Fabric realizes the permissioned model using a portable notion of membership, which may be integrated with industry-standard identity management. To support such flexibility, Fabric introduces an entirely novel blockchain design and revamps the way blockchains cope with non-determinism, resource exhaustion, and performance attacks. This paper describes Fabric, its architecture, the rationale behind various design decisions, its most prominent implementation aspects, as well as its distributed application programming model. We further evaluate Fabric by implementing and benchmarking a Bitcoin-inspired digital currency. We show that Fabric achieves end-to-end throughput of more than 3500 transactions per second in certain popular deployment configurations, with sub-second latency, scaling well to over 100 peers.
Bitcoin is an online communication protocol that facilitates the use of a virtual currency, including electronic payments. Bitcoin's rules were designed by engineers with no apparent influence from lawyers or … Bitcoin is an online communication protocol that facilitates the use of a virtual currency, including electronic payments. Bitcoin's rules were designed by engineers with no apparent influence from lawyers or regulators. Bitcoin is built on a transaction log that is distributed across a network of participating computers. It includes mechanisms to reward honest participation, to bootstrap acceptance by early adopters, and to guard against concentrations of power. Bitcoin's design allows for irreversible transactions, a prescribed path of money creation over time, and a public transaction history. Anyone can create a Bitcoin account, without charge and without any centralized vetting procedure—or even a requirement to provide a real name. Collectively, these rules yield a system that is understood to be more flexible, more private, and less amenable to regulatory oversight than other forms of payment—though as we discuss, all these benefits face important limits. Bitcoin is of interest to economists as a virtual currency with potential to disrupt existing payment systems and perhaps even monetary systems. This article presents the platform's design principles and properties for a nontechnical audience; reviews its past, present, and future uses; and points out risks and regulatory issues as Bitcoin interacts with the conventional financial system and the real economy.
A purely peer-to-peer version of electronic cash would allow online payments to be sent directly from one party to another without the burdens of going through a financial institution. Digital … A purely peer-to-peer version of electronic cash would allow online payments to be sent directly from one party to another without the burdens of going through a financial institution. Digital signatures provide part of the solution, but the main benefits are lost if a trusted third party is still required to prevent double-spending. We propose a solution to the double-spending problem using a peer-to-peer network. The network timestamps transactions by hashing them into an ongoing chain of hash-based proof-of-work, forming a record that cannot be changed without redoing the proof-of-work. The longest chain not only serves as proof of the sequence of events witnessed, but proof that it came from the largest pool of CPU power. As long as honest nodes control the most CPU power on the network, they can generate the longest chain and outpace any attackers. The network itself requires minimal structure. Messages are broadcast on a best effort basis, and nodes can leave and rejoin the network at will, accepting the longest proof-of-work chain as proof of what happened while they were gone.
Blockchain has numerous benefits such as decentralisation, persistency, anonymity and auditability. There is a wide spectrum of blockchain applications ranging from cryptocurrency, financial services, risk management, internet of things (IoT) … Blockchain has numerous benefits such as decentralisation, persistency, anonymity and auditability. There is a wide spectrum of blockchain applications ranging from cryptocurrency, financial services, risk management, internet of things (IoT) to public and social services. Although a number of studies focus on using the blockchain technology in various application aspects, there is no comprehensive survey on the blockchain technology in both technological and application perspectives. To fill this gap, we conduct a comprehensive survey on the blockchain technology. In particular, this paper gives the blockchain taxonomy, introduces typical blockchain consensus algorithms, reviews blockchain applications and discusses technical challenges as well as recent advances in tackling the challenges. Moreover, this paper also points out the future directions in the blockchain technology.
Fabric is a modular and extensible open-source system for deploying and operating permissioned blockchains and one of the Hyperledger projects hosted by the Linux Foundation (www.hyperledger.org). Fabric is the first … Fabric is a modular and extensible open-source system for deploying and operating permissioned blockchains and one of the Hyperledger projects hosted by the Linux Foundation (www.hyperledger.org). Fabric is the first truly extensible blockchain system for running distributed applications. It supports modular consensus protocols, which allows the system to be tailored to particular use cases and trust models. Fabric is also the first blockchain system that runs distributed applications written in standard, general-purpose programming languages, without systemic dependency on a native cryptocurrency. This stands in sharp contrast to existing blockchain platforms that require "smart-contracts" to be written in domain-specific languages or rely on a cryptocurrency. Fabric realizes the permissioned model using a portable notion of membership, which may be integrated with industry-standard identity management. To support such flexibility, Fabric introduces an entirely novel blockchain design and revamps the way blockchains cope with non-determinism, resource exhaustion, and performance attacks. This paper describes Fabric, its architecture, the rationale behind various design decisions, its most prominent implementation aspects, as well as its distributed application programming model. We further evaluate Fabric by implementing and benchmarking a Bitcoin-inspired digital currency. We show that Fabric achieves end-to-end throughput of more than 3500 transactions per second in certain popular deployment configurations, with sub-second latency, scaling well to over 100 peers.
ABSTRACT In recent times, the Automated Teller Machine (ATM) scam has increased widely in this society. The technology has emerged to steal money or hack the service during the ATM … ABSTRACT In recent times, the Automated Teller Machine (ATM) scam has increased widely in this society. The technology has emerged to steal money or hack the service during the ATM transaction. Many thieves are using the strategy of skimming and trapping to steal money from ATM devices. In order to secure the transaction in ATMs, several authentication frameworks with recognition have been implemented. This safety work could be dealt with through biometric identification such as face, retina, and fingerprint recognition of the user. Due to high demand for security and reliable authentication schemes, the multimodal biometric system has emerged. The multimodal biometric system needs more than one biometric trait of an individual for identification and security purposes. Therefore, an integrated bank ATM transactions security model using a deep learning‐based multi‐modal biometric authentication system is developed to provide higher security during ATM transactions. Initially, the ATM card with Personal Identification Number (PIN) is given as the input for making ATM transactions in integrated banks. If the PIN is verified, then the appropriate person is identified through the biometric information of the user. The biometric information of the users includes Fingerprint, Face recognition, Retina, and speech. The speech information is in the format of signal, and hence the de‐noising is performed to eliminate the noises from the input signal. The de‐noised signal is given to Short Time Fourier Transform (STFT) to perform a signal transformation. After applying STFT, the spectrogram of images is attained. Finally, both the fingerprint, face, Retina, and spectrogram images are combined and given as the input for the recognition stage. Here, the Adaptive and Attentive‐based Mobilenet‐v3 (AAMNet) network is used for the recognition of input images, where the parameters from the Mobilenet‐v3 are optimized using the Enhanced Archerfish Hunting Optimizer (EAHO) to improve the recognition performance. After recognizing the biometric information of the users, the money transactions in ATMs are completed. Therefore, the security of the integrated banking ATM transaction is highly improved, and the illegal transaction is avoided. The experimental result of the developed security model in ATM transactions is validated with the traditional models to ensure the effectiveness of the developed system. Hence, the effective results of the proposed model attain nearly 93% for accuracy, sensitivity, specificity, and also nearly 6% for FPR and FNR, respectively. This result could be used for practical applications like banking and the financial sector, money transactions, funding management, and so forth.
Blockchain technology has transformed how data are stored and transactions are processed in a distributed environment. Blockchain assures data integrity by validating transactions through the consensus of a distributed ledger … Blockchain technology has transformed how data are stored and transactions are processed in a distributed environment. Blockchain assures data integrity by validating transactions through the consensus of a distributed ledger involving several miners as validators. Although blockchain provides multiple advantages, it has also been subject to some malicious attacks, such as a 51% attack, which is considered a potential risk to data integrity. These attacks can be detected by analyzing the anomalous node behavior of miner nodes in the network, and data analysis plays a vital role in detecting and overcoming these attacks to make a secure blockchain. Integrating machine learning algorithms with blockchain has become a significant approach to detecting anomalies such as a 51% attack and double spending. This study comprehensively analyzes various machine learning (ML) methods to detect anomalies in blockchain networks. It presents a Systematic Literature Review (SLR) and a classification to explore the integration of blockchain and ML for anomaly detection in blockchain networks. We implemented Random Forest, AdaBoost, XGBoost, K-means, and Isolation Forest ML models to evaluate their performance in detecting Blockchain anomalies, such as a 51% attack. Additionally, we identified future research directions, including challenges related to scalability, network latency, imbalanced datasets, the dynamic nature of anomalies, and the lack of standardization in blockchain protocols. This study acts as a benchmark for additional research on how ML algorithms identify anomalies in blockchain technology and aids ongoing studies in this rapidly evolving field.
This paper investigates the transformative shift in marketing from mass communication to hyper-personalization, specifically examining how Indian companies are leveraging Artificial Intelligence (AI) tools to redefine customer experience. As consumer … This paper investigates the transformative shift in marketing from mass communication to hyper-personalization, specifically examining how Indian companies are leveraging Artificial Intelligence (AI) tools to redefine customer experience. As consumer expectations for tailored interactions grow, traditional segmentation proves insufficient, prompting brands to adopt AI for real-time data analysis, predictive analytics, and dynamic content generation to achieve a "segment-of-one" approach. The review explores various AI-enabled strategies, including personalized recommendations, intelligent chatbots, and customized loyalty programs, highlighting their successful implementation by leading Indian firms. While these strategies yield significant benefits in terms of enhanced customer engagement, loyalty, and operational efficiency, the paper also addresses critical challenges such as data privacy, algorithmic bias, and the potential for over-personalization within the evolving Indian regulatory landscape. Ultimately, this research underscores AI's pivotal role in enabling Indian marketers to deliver truly individualized customer journeys, fostering stronger relationships and competitive advantage
This entry reviews the evolution from Digital Twins (DT) to Predictive Digital Twins (PDT) and Digital Triplets (DTr), culminating in Predictive Digital Ecosystems, which focus on economic and financial decision-making. … This entry reviews the evolution from Digital Twins (DT) to Predictive Digital Twins (PDT) and Digital Triplets (DTr), culminating in Predictive Digital Ecosystems, which focus on economic and financial decision-making. It discusses historical developments, technical foundations, practical applications, ethical and regulatory challenges, and future directions. The overview integrates mature knowledge from engineering, data science, and economic domains to provide a structured reference framework for understanding and deploying Predictive Digital Ecosystems.
In recent years, several research and development initiatives have focused on developing secure and trustworthy systems for the healthcare industry via pervasive and mobile healthcare (mHealth) solutions. State-of-the-art mHealth solutions … In recent years, several research and development initiatives have focused on developing secure and trustworthy systems for the healthcare industry via pervasive and mobile healthcare (mHealth) solutions. State-of-the-art mHealth solutions primarily rely on centralized storage, such as cloud computing servers, which may escalate the maintenance costs, require ever-increasing storage infrastructure, and pose privacy and security risks to the health-critical data produced, consumed, and transmitted over ad hoc networks. To overcome these limitations, we conducted this study intending to synergize mobile computing (devices to process health-critical data) and blockchain technology (infrastructure to secure storage and retrieval of health-critical data), specifically addressing data security and privacy using a blockchain mHealth system. The research employs an incremental method by (i) developing a framework that acts as a blueprint to architect blockchain-enabled mHealth systems, (ii) implementing a suite of algorithms as a proof-of-concept to automate the framework, and (iii) experimental evaluations to validate the scalability, computation, and energy efficiency of the proposed solution. The proposed framework has been implemented as a frontend using a mobile application interface that exploits the backend via the InterPlanetary File System (IPFS) system and Ethereum blockchain for secure management of mHealth data. We use a case-study-based approach demonstrating how health units, medics, and patients can securely access and distribute health-critical data. For evaluation, we deployed a smart contract prototype on the Ethereum TESTNET network in a Windows environment to test the proposed framework. Results of the evaluation indicate (a) scalability with query response time (range: 10–41 ms), (b) computational performance (CPU utilization: 1.5% – 2.5%), and (c) energy efficiency (gas consumption: 40000 units for 1000 bytes). The proposed solution – framework, algorithms, and experimental evaluation – aims to advance state-of-the-art architecting and implementing cybersecurity mHealth solutions using blockchain technology.
Woosik Moon | Routledge eBooks
This paper is a critical review of the change-making capacity of blockchain as a solution for securing and optimizing the efficiency of oil and gas supply chains. The industry has … This paper is a critical review of the change-making capacity of blockchain as a solution for securing and optimizing the efficiency of oil and gas supply chains. The industry has inefficiencies through unresolved processes, manual documentation, prevalence of issues related to traceability, and mistrust between actors. Blockchain offers a decentralized immutable ledger system facilitating transparency, security, traceability, and coordination of operations in upstream, midstream, and downstream operations. From extensive case studies of ADNOC, Shell, Repsol, and Komgo implementations, the paper documents real instances where blockchain has enhanced cost-efficiency, compliance regulations, and operations in supply chains. Comparative trials demonstrate blockchain-empowered supply chains far outstrip traditional supply chains by reducing fraud by as much as 92%, administrative turnaround times by as much as 85%, and operation costs by as much as 35%. Despite these, challenges brought about by legacy system integration, regulatory ambiguity, and organizational resistance remain to be roadblocks to scalability. The paper calls out technical trends in the shape of AI, IoT, digital twins, and quantum-resistant encryption as the driving forces for scalability and function of blockchain. The strategic recommendations for industry executives, academics and policymakers are then presented by calling for standardization, regulatory clarity, talents development and sustainability. It concludes that blockchain if utilized strategically, is a building block toward a resilient, efficient and fail-proof oil and gas supply chain.
This paper explores the convergence of quantum-accelerated intelligence, artificial intelligence (AI), machine learning (ML), and blockchain technology to revolutionize digital trade within the eCommerce sector. With the rise of quantum … This paper explores the convergence of quantum-accelerated intelligence, artificial intelligence (AI), machine learning (ML), and blockchain technology to revolutionize digital trade within the eCommerce sector. With the rise of quantum computing, AI and ML techniques are poised for enhanced scalability, enabling more efficient decision-making, personalized customer experiences, and optimized supply chain management. The paper examines how quantum computing can dramatically improve data processing capabilities, allowing for faster and more accurate AI-driven algorithms in real-time eCommerce environments. Furthermore, blockchain technology is discussed in terms of its potential to ensure transparent, secure, and immutable transaction records, fostering trust between consumers and vendors. The integration of quantum computing into AI and blockchain could mitigate existing limitations in computational power and data security, offering transformative benefits for eCommerce platforms. Through an in-depth analysis of current advancements and theoretical models, this study demonstrates how these technologies, when synergized, can create a robust ecosystem for secure, scalable, and efficient digital trade, ultimately reshaping the future of global commerce.
To address the latency and security challenges inherent in traditional cloud-based systems, this project introduces a Lightweight Cryptographic Framework designed for secure and efficient data exchange in edge-assisted IoT networks. … To address the latency and security challenges inherent in traditional cloud-based systems, this project introduces a Lightweight Cryptographic Framework designed for secure and efficient data exchange in edge-assisted IoT networks. The core of the system is an Edge-Based Blockchain Secure Data Sharing Scheme (EB-SDSS), which decentralizes data processing by enabling edge servers to interact directly with IoT devices. This significantly reduces data transfer delays and enhances performance compared to conventional cloud-centric models. The integration of blockchain technology ensures tamper-proof and transparent data storage through hash-based transaction records. This guarantees data integrity and trust in the system. To protect sensitive IoT data, AES symmetric encryption is employed for robust and lightweight encryption, while Locality-Sensitive Hashing (LSH) facilitates fast and efficient data retrieval across the blockchain. To eliminate the overhead of certificate management, a certificate-less signature scheme is implemented to authenticate IoT devices and verify data legitimacy. In addition, Shamir’s Secret Sharing method is utilized to protect cryptographic keys, enhancing the secure exchange and storage of sensitive information. As an extension, the project incorporates Elliptic Curve Cryptography (ECC) to offer strong encryption with smaller key sizes, optimizing resource usage on constrained IoT devices. Furthermore, cache memory is leveraged to accelerate LSH operations, reducing the computational burden for repeated queries. By combining these cryptographic techniques and edge-computing principles, the framework enhances the security, efficiency, and responsiveness of IoT data sharing. It is especially suitable for sectors such as industrial automation, healthcare systems, and smart cities, where real-time data integrity and confidentiality are critical. This innovative approach lays the groundwork for scalable and trustworthy IoT ecosystems, supporting more agile and secure applications in next-generation smart environments.
ABSTRACT This paper proposes a novel decentralized healthcare data management framework that distinctly integrates blockchain, IPFS, and The Graph protocol to address long‐standing challenges related to secure data storage, efficient … ABSTRACT This paper proposes a novel decentralized healthcare data management framework that distinctly integrates blockchain, IPFS, and The Graph protocol to address long‐standing challenges related to secure data storage, efficient retrieval, scalability, and patient‐centric control in medical systems. Although the combination of blockchain and IPFS has become relatively standard for decentralized storage and security, our work introduces a key innovation by incorporating The Graph protocol to enable real‐time, decentralized indexing and querying of medical records—a capability that is critically lacking in many current approaches. By linking encrypted healthcare data stored in IPFS with blockchain‐based smart contracts via cryptographic hashes, the system ensures tamper‐proof integrity, privacy preservation, and access traceability. What sets our architecture apart is the use of subgraph‐based GraphQL APIs through The Graph, which allows seamless and structured data discovery without compromising decentralization. Performance evaluations demonstrate significant improvements, including reduced latency, higher query speed, and enhanced throughput when compared to conventional blockchain–IPFS architectures. Additionally, the framework empowers patients with data ownership and fine‐grained access control while promoting interoperability across decentralized applications. This integrated approach meaningfully advances the state of the art by bridging decentralized storage with intelligent data querying, paving the way for the next generation of secure, responsive, and scalable digital healthcare ecosystems.
B. S. Anupama , N. R. Sunitha | African Journal of Science Technology Innovation and Development
Joshua J. DAstoli , Marinos Themistocleous | International Journal of Operations Research and Information Systems
The Handbook of Blockchain Technology, edited by Marinos Themistocleous, offers a clear and engaging overview of blockchain's growing impact across technology, business, and society. The book is organized into four … The Handbook of Blockchain Technology, edited by Marinos Themistocleous, offers a clear and engaging overview of blockchain's growing impact across technology, business, and society. The book is organized into four parts, covering blockchain's role in the Metaverse, the rise of NFTs and tokenization, decentralized governance through DAOs, and the challenges of global adoption. With contributions from both academics and industry experts, it blends theory with practical insights, highlighting how blockchain is reshaping ideas of ownership, trust, and digital infrastructure. This handbook is a timely and accessible resource for researchers, professionals, and policymakers seeking to understand the evolving blockchain landscape.
This study introduces Fort2BCK, an advanced security framework designed to mitigate critical vulnerabilities in healthcare blockchain implementation, specifically data manipulation, unauthorised access and weaknesses in consensus protocols. Fort2BCK employs a … This study introduces Fort2BCK, an advanced security framework designed to mitigate critical vulnerabilities in healthcare blockchain implementation, specifically data manipulation, unauthorised access and weaknesses in consensus protocols. Fort2BCK employs a dual verification mechanism, combining native consensus algorithm validation with the application of advanced cryptographic signatures (RSA, ECDSA and zero knowledge proofs, ZKPs), thus providing an additional layer of authentication, auditing and resistance to malicious attacks. In contrast to traditional approaches, Fort2BCK significantly reduces the risks of fraud and forgery by independently cryptographically verifying each block before it is integrated into the blockchain, strengthening security in scenarios where conventional consensus models may be vulnerable. In addition, its interoperability with multiple blockchain architectures, including proof of work (PoW), proof of stake (PoS) and delegated proof of stake (DPoS), allows it to effectively mitigate attacks such as the 51% attack in PoW and the nothing-at-stake problem in PoS, through an integrated external validation layer. To evaluate the effectiveness of Fort2BCK, experiments were conducted on a simulated hybrid blockchain network with 100 nodes and 50,000 transactions. The results revealed that Fort2BCK increases security by 35% against block rewrite attacks and decreases the rate of fraudulent transactions by 42%, compared to conventional blockchain systems, while maintaining a computational overhead of less than 8%. Additionally, Fort2BCK ensures compliance with regulations such as HIPAA and GDPR, ensuring that blockchain systems for the healthcare sector meet legal and privacy requirements. These findings demonstrate that Fort2BCK optimises the security, scalability and privacy of medical blockchains, facilitating the secure digitisation of healthcare systems and strengthening trust in clinical data management.
Günümüzde dijital teknolojilerin hızla gelişmesi, bireylerin iletişim yöntemlerinden işletmelerin pazarlama stratejilerine kadar pek çok alanda köklü değişimlere yol açmaktadır. Bu değişimin merkezinde bulunan Metaverse, Blockchain (blok zincir) sistemleri ve yapay … Günümüzde dijital teknolojilerin hızla gelişmesi, bireylerin iletişim yöntemlerinden işletmelerin pazarlama stratejilerine kadar pek çok alanda köklü değişimlere yol açmaktadır. Bu değişimin merkezinde bulunan Metaverse, Blockchain (blok zincir) sistemleri ve yapay zekâ gibi yenilikçi teknolojiler, pazarlamayı daha etkileşimli, kişiselleştirilmiş ve sürükleyici bir hale getirmektedir. Özellikle Metaverse, kullanıcıların sanal ortamdaki duygu, düşünce ve davranışlarını analiz ederek onlara özel deneyimler sunmakta ve bu sayede marka ile kullanıcı arasında daha sağlam bir ilişki kurulmasına olanak tanımaktadır. Metaverse, üç boyutlu yapısı ve sanal keşif alanlarıyla geleneksel pazarlama yöntemlerinin ötesine geçmekte; fiziksel ve dijital dünyayı birleştirerek tüketiciye zengin bir deneyim sunmaktadır. Bu çalışma, dijital dönüşüm çağında geleceğin teknolojilerinin pazarlama alanındaki uygulamalarını ve potansiyel etkilerini sistematik olarak incelemeyi amaçlamaktadır. Bu teknolojiler aracılığıyla işletmeler, coğrafi sınırlardan bağımsız şekilde çeşitli kitlelere ulaşabilmekte ve pazarlama stratejilerini küresel düzeyde yeniden tasarlayabilmektedir. Tüketim alışkanlıklarının gelişmesi ve değişmesiyle birlikte pazarlama anlayışı da evrilmiş; bu gelişmelerin sonucunda endüstriyel yapı farklılaşmıştır. Bu çalışmada, Metaverse, kavramı, özellikleri ve onu mümkün kılan teknolojik altyapılar, Metaverse mimarisi ve Metaverse ilişkili teknolojiler detaylı biçimde ele alınmıştır. Ayrıca bu teknolojilerin pazarlama alanına etkileri ve geleceğin dijital pazarlama anlayışını nasıl dönüştürdüğü kapsamlı bir şekilde incelenmiştir.
| Journal of Transportation Science and Technology
Federated Machine Learning, or in short Federated Learning (FL), has emerged as a promising paradigm for decentralized, privacy-preserving machine learning, with significant potential in transportation and logistics. This survey provides … Federated Machine Learning, or in short Federated Learning (FL), has emerged as a promising paradigm for decentralized, privacy-preserving machine learning, with significant potential in transportation and logistics. This survey provides a comprehensive review of FL applications in Smart Logistics such as supply chain optimization, warehouse management, and efficient delivery. We discuss core principles of FL, alongside challenges when applying to Smart Logistics domain. We provide a comprehensive clustering of methodologies to tackle the problem. Finally, we highlight future research directions, emphasizing the integration of FL with IoT and edge computing, personalized and adaptive models, privacy, security, and sustainability to enhance smart transportation systems.
Background. Silent duels and related timing games offer a surprisingly deep lens into certain core challenges in blockchain technology, especially when it comes to block proposal timing. Miners or validators … Background. Silent duels and related timing games offer a surprisingly deep lens into certain core challenges in blockchain technology, especially when it comes to block proposal timing. Miners or validators effectively “compete” in a race to propose the next block. The success of a block proposal depends not only on when it happens but also on whether others have already succeeded or interfered — very much like the tension in a one-shot duel with uncertain outcomes. In block proposal timing for decentralized consensus protocols, a one-shot timing game models a blockchain setting, where participants (e. g., validators or miners) choose when to attempt block proposal or transaction insertion under uncertainty. Objective. The paper aims to determine the best timing strategies for the participants. Considering two identical participants, the local objective is to find pure strategy solutions of a timing game (duel) with shooting uniform jitter. Methods. A finite zero-sum game is considered, which models competitive interaction between two subjects to make the best discrete-time decision by limited observability. The moments to make a decision (to take an action, to shoot a bullet) are scheduled beforehand, and each of the subjects, alternatively referred to as the duelists, has a single bullet to shoot. Shooting is only possible during a standardized time span, where the bullet can be shot at only specified time moments. In the base pattern, apart from the duel beginning and final time moments, every following time moment is obtained by adding the third of the remaining span to the current moment. However, the precise time moment specification is not always realizable (e. g., due to the distance between neighbouring time moments being measured with finite accuracy) and so the internal moments are uniformly jittered. This means that they can be slightly shifted within the duel span. The duelist benefits from shooting as late as possible, but only when the duelist shoots first. Both the duelists act within the same conditions by linear shooting accuracy, and so the one-bullet silent duel is symmetric, regardless of the jitter. Therefore, its optimal value is 0 and the duelists have the same optimal strategies, although they still can be non-symmetric. Results. By the one-third progression pattern with jitter, the 3 x 3 duel always has a pure strategy solution. The 4 x 4 duel is pure strategy solvable by any possible jitter except for jitter interval . Within this interval and interval (-11/54; -1/18) the 5 x 5 duel is pure strategy non-solvable. The 6 x 6 duel is pure strategy solvable by any possible jitter except for jitter intervals and (-49/162; -1/18). Duels with seven to nine time moments are pure strategy solvable only by a jitter interval of . Bigger N x N duels, having no fewer than 10 time moments, are pure strategy solvable only by a jitter interval of [-1/18; 2N-2/3N-2). The solutions for the one-third progression pattern are compared to the known solutions for the geometrical-progression pattern. Conclusions. The duel pure strategy solutions obtained suggest a clear one-step-action strategic behaviour in progressive block proposal timing for decentralized consensus protocols under uncertainty of time slots to act. The main benefit is full fairness and a potential reward if the opponent acts non-optimally, even in a single proposal.
<title>Abstract</title> This paper explores the impact of quantum computing on the efficiency of blockchain mining, focusing on three cryptographic hash algorithms: SHA-256, BLAKE2b, and Keccak-256. Through simulations, we compare the … <title>Abstract</title> This paper explores the impact of quantum computing on the efficiency of blockchain mining, focusing on three cryptographic hash algorithms: SHA-256, BLAKE2b, and Keccak-256. Through simulations, we compare the performance of these algorithms in both classical and quantum environments, with a specific emphasis on the effects of increasing qubit counts. The study also examines the potential of Grover’s algorithm to accelerate mining times and improve overall mining efficiency. Our findings indicate significant reductions in mining times when using quantum computing, particularly with the application of Grover’s algorithm. While classical mining techniques are widely used today, the introduction of quantum computing presents both opportunities and challenges for the future of blockchain technology. This paper provides valuable insights into how quantum advancements could reshape blockchain mining, highlighting the need for continued exploration of quantum-resistant cryptographic methods.
Nitya Sri Nellore | International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences
The increasing reliance on digital solutions for B2B procurement and gifting processes presents significant challenges in ensuring transparency, compliance, and efficiency in auditing practices, particularly within regulated industries such as … The increasing reliance on digital solutions for B2B procurement and gifting processes presents significant challenges in ensuring transparency, compliance, and efficiency in auditing practices, particularly within regulated industries such as healthcare, finance, and pharmaceuticals. Traditional auditing mechanisms, reliant on centralized databases and manual oversight, are increasingly inadequate in addressing the scale and complexity of modern business operations. This paper proposes a blockchain-based auditing framework for B2B transactions in digital procurement and gifting. By leveraging blockchain’s immutable, decentralized, and transparent nature, the proposed solution enhances real-time transaction tracking, regulatory compliance, and fraud prevention. We introduce a lightweight blockchain architecture, utilizing smart contracts and scalable consensus mechanisms, to ensure operational efficiency while addressing the specific needs of highly regulated industries. A case study in the pharmaceutical sector illustrates the practical application and benefits of this framework, highlighting its ability to streamline compliance, reduce fraud risk, and improve audit efficiency.
Shuai Liu , Benedict Jun , Weijian Zhang +3 more | Transportation Research Part E Logistics and Transportation Review
K Ashwini | INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT
The trend of counterfeit or replica products is becoming an issue in several industries including pharmaceuticals, fashion, electronics, etc. Because of this, a secure and transparent way to check the … The trend of counterfeit or replica products is becoming an issue in several industries including pharmaceuticals, fashion, electronics, etc. Because of this, a secure and transparent way to check the authenticity of these types of products is required. The system proposed in this paper implements product authentication, based on blockchain technology and QR code technology for instant verification of the legitimacy of a product. The system allows manufacturers to register their products on a secure and tamper-proof blockchain ledger. Once registered, each item is assigned a unique QR code. For shoppers or retailers wanting confirmation and disclosure on a product, scanning the QR code displays legitimacy, confirmed against the blockchain ledger. The system has a role based access control model, allowing secure interaction between manufacturers, retailers and admins. The QR code scanner app also provides scan history, re-verify, and review functionality for users that want to leave feedback about the verification practice. We believe this software approach provides full transparency, effective traceability, and trust, greatly reducing the chance or risk of counterfeit product, or replica product distribution in the supply chain. Keywords—Blockchain, Product Authentication, QR Code, Counterfeit Detection, Supply Chain, Traceability, Role-Based Access
The increasing demand for clean and reliable energy has driven the adoption of decentralized renewable power generation systems. Integrating Internet of Things (IoT) and blockchain technology can enhance efficiency, transparency, … The increasing demand for clean and reliable energy has driven the adoption of decentralized renewable power generation systems. Integrating Internet of Things (IoT) and blockchain technology can enhance efficiency, transparency, and security in distributed energy networks. IoT enables real-time monitoring and control of renewable energy sources (such as solar, wind, and microgrids), while blockchain ensures tamper-proof energy transactions, peer-to-peer (P2P) energy trading, and automated smart contracts. This study explores a decentralized energy framework where IoT devices collect data on energy production, consumption, and grid stability, while blockchain facilitates trustless energy exchanges among prosumers (producer-consumers). The proposed system eliminates intermediaries, reduces costs, and improves grid resilience by leveraging smart meters, distributed ledgers, and consensus algorithms. The future scope of power generation is based on Decentralized power generation depends on Renewable energy sources (solar, wind). By using decentralized power generation, we can be able to achieve bidirectional power flow, one can able to transmission as well as receiving electrical power. This new concept introduces blockchain technology in Distributed Generation for monitoring and recording energy transactions between two peers. These Peer-to-Peer energy transactions are done in the DC Microgrid using blockchain Technology with smart contracts for energy trading.
Security vulnerabilities in smart contracts can have severe economic consequences. Existing smart contract vulnerability detection methods rely primarily on rigid rules defined by experts and have difficulty in detecting unknown … Security vulnerabilities in smart contracts can have severe economic consequences. Existing smart contract vulnerability detection methods rely primarily on rigid rules defined by experts and have difficulty in detecting unknown vulnerabilities. This paper proposes a new Anomalous Smart Contract Detector, named ASCD, to effectively detect known and unknown vulnerabilities in smart contracts. This is achieved by interpreting unknown vulnerabilities as code anomalies and detecting them with an anomaly detection technique named DeepSVDD. This is also attributed to a new design of feature extraction, in which we compile smart contract source codes into opcodes, extract semantic features from opcode sequences, and control flow features from control flow graphs. By joining LSTM and GIN, the semantic and control flow features are fused to offer a comprehensive representation of smart contracts suitable for anomaly detection. Extensive experiments were conducted to verify the ASCD model, and more than 30,000 smart contracts were tested. The new model offers a significantly better F1-score than existing methods in detecting known vulnerabilities and achieves a high accuracy of 77% in detecting unknown vulnerabilities.
Blockchain has been widely recognized as a trusted computing paradigm underpinning decentralized applications (DApps). However, low performance and poor scalability of the existing mainstream blockchain designs and implementations render their … Blockchain has been widely recognized as a trusted computing paradigm underpinning decentralized applications (DApps). However, low performance and poor scalability of the existing mainstream blockchain designs and implementations render their prospects unattainable, so-called trilemma . DAG (Directed Acyclic Graph) emerged as an alternative blockchain architecture to address the performance and scalability issue. However, the capacity and feasibility of DAG-based blockchain systems still remain of concern, due to a lack of open-source implementations and convincing published experimental results. In this paper, we propose a DAG-based blockchain, named 3D-DAG , to greatly improve the scalability and performance without compromising security. The system addresses the trilemma of decentralization, scalability, and security. Technically, our 3D-DAG consists of two layers of chains: DAGchain and mainchain . The DAGchain organizes the transactions in DAG topology, without having to solve the forks. They select a small group of validators from a large number of miners to make up the committee for consensus procedures. The design of DAGchain improves scalability by enabling parallel transaction processing. Based on that, the mainchain plays the role of checkpoint, periodically packaging and recording received transactions from DAGchain for finality. We also provide a prototype implementation with detailed evaluations. Experiment results show our 3D-DAG can meet the performance (a peak value of \(9.82\times 10^{4}\) TPS) that is expected by DApps in the context of Web3.
This paper examines the serverless edge pattern using Amazon CloudFront Functions in the U.S. banking industry, focusing on its role in improving performance and security. By executing lightweight JavaScript functions … This paper examines the serverless edge pattern using Amazon CloudFront Functions in the U.S. banking industry, focusing on its role in improving performance and security. By executing lightweight JavaScript functions at CloudFront’s edge locations, banks can enhance content delivery, reduce latency, and bolster security through authentication and header validation. Benefits include serverless support, layered network strategies, and multi-language flexibility, demonstrated via U.S.-specific implementations. Challenges such as execution constraints, integration complexity, and regulatory compliance are addressed with practical solutions. Incorporating trends up to December 2024, including surging digital adoption and cyber threats, this study illustrates how CloudFront Functions enable U.S. banks to provide secure, efficient services in a competitive digital landscape.
Solana is an emerging blockchain platform, recognized for its high throughput and low transaction costs, positioning it as a preferred infrastructure for Decentralized Finance (DeFi), Non-Fungible Tokens (NFTs), and other … Solana is an emerging blockchain platform, recognized for its high throughput and low transaction costs, positioning it as a preferred infrastructure for Decentralized Finance (DeFi), Non-Fungible Tokens (NFTs), and other Web 3.0 applications. In the Solana ecosystem, transaction initiators submit various instructions to interact with a diverse range of Solana smart contracts, among which are decentralized exchanges (DEXs) that utilize automated market makers (AMMs), allowing users to trade cryptocurrencies directly on the blockchain without the need for intermediaries. Despite the high throughput and low transaction costs of Solana, the advantages have exposed Solana to bot spamming for financial exploitation, resulting in the prevalence of failed transactions and network congestion. Prior work on Solana has mainly focused on the evaluation of the performance of the Solana blockchain, particularly scalability and transaction throughput, as well as on the improvement of smart contract security, leaving a gap in understanding the characteristics and implications of failed transactions on Solana. To address this gap, we conducted a large-scale empirical study of failed transactions on Solana, using a curated dataset of over 1.5 billion failed transactions across more than 72 million blocks. Specifically, we first characterized the failed transactions in terms of their initiators, failure-triggering programs, and temporal patterns, and compared their block positions and transaction costs with those of successful transactions. We then categorized the failed transactions by the error messages in their error logs, and investigated how specific programs and transaction initiators are associated with these errors. We find that transaction failure rates on Solana exhibit recurring daily patterns, and demonstrate a strong positive correlation with the volume of failed transactions, with bots on Solana experiencing a high transaction failure rate of 58.43%. We identify ten distinct error types in the error logs of failed transactions, with price or profit not met and invalid status errors accounting for 67.18% of all failed transactions. AMMs primarily experience invalid status errors among failed transactions, while DEX aggregators are more commonly affected by price or profit not met errors. Among transaction initiators, bots encounter a broader range of errors due to their high-frequency trading and complex interactions with smart contracts. In contrast, human users experience a more limited range of errors. Based on our findings, we provide recommendations to mitigate transaction failures on Solana and outline future research directions.
Smart contract vulnerability detection is a critical challenge in the rapidly evolving blockchain landscape. Existing vulnerability detection methods face two main issues: (1) Existing datasets lack comprehensiveness and sufficient quality, … Smart contract vulnerability detection is a critical challenge in the rapidly evolving blockchain landscape. Existing vulnerability detection methods face two main issues: (1) Existing datasets lack comprehensiveness and sufficient quality, with limited vulnerability type coverage and insufficient distinction between high-quality and low-quality explanations for preference learning. (2) Large language models (LLMs) often struggle with accurately interpreting specific concepts in smart contract security. Through our empirical analysis, we found that even after continual pre-training and supervised fine-tuning, LLMs still exhibit limitations in precisely understanding the execution order of state changes in smart contracts, which can lead to incorrect vulnerability explanations despite making correct detection decisions. These limitations result in poor detection performance, leading to potentially severe financial losses. To address these challenges, we propose Smart-LLaMA-DPO, an advanced detection method based on the LLaMA-3.1-8B. First, we construct a comprehensive dataset covering four vulnerability types and machine-unauditable vulnerabilities, containing labels, detailed explanations, and precise vulnerability locations for Supervised Fine-Tuning (SFT), as well as paired high-quality and low-quality outputs for Direct Preference Optimization (DPO). Second, we perform continual pre-training using large-scale smart contract code to enhance the LLM's understanding of specific security practices in smart contracts. Futhermore, we conduct supervised fine-tuning with our comprehensive dataset. Finally, we apply DPO, which leverages human feedback to improve the quality of generated explanations. Smart-LLaMA-DPO utilizes a specially designed loss function that encourages the LLM to increase the probability of preferred outputs while decreasing the probability of non-preferred outputs, thereby enhancing the LLM's ability to generate high-quality explanations. We evaluate Smart-LLaMA-DPO on four major vulnerability types: reentrancy, timestamp dependence, integer overflow/underflow, and delegatecall, as well as machine-unauditable vulnerabilities. Our method significantly outperforms state-of-the-art baselines, with average improvements of 10.43% in F1 score and 7.87% in accuracy. Moreover, both LLM evaluation and human evaluation demonstrate the superior quality of explanations generated by Smart-LLaMA-DPO in terms of correctness, thoroughness, and clarity.