Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (302)
  • Open Access

    ARTICLE

    A Blockchain-Assisted Distributed Edge Intelligence for Privacy-Preserving Vehicular Networks

    Muhammad Firdaus1, Harashta Tatimma Larasati2, Kyung-Hyune Rhee3,*

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 2959-2978, 2023, DOI:10.32604/cmc.2023.039487

    Abstract The enormous volume of heterogeneous data from various smart device-based applications has growingly increased a deeply interlaced cyber-physical system. In order to deliver smart cloud services that require low latency with strong computational processing capabilities, the Edge Intelligence System (EIS) idea is now being employed, which takes advantage of Artificial Intelligence (AI) and Edge Computing Technology (ECT). Thus, EIS presents a potential approach to enforcing future Intelligent Transportation Systems (ITS), particularly within a context of a Vehicular Network (VNets). However, the current EIS framework meets some issues and is conceivably vulnerable to multiple adversarial attacks because the central aggregator server… More >

  • Open Access

    ARTICLE

    A Data Consistency Insurance Method for Smart Contract

    Jing Deng1, Xiaofei Xing1, Guoqiang Deng2,*, Ning Hu3, Shen Su3, Le Wang3, Md Zakirul Alam Bhuiyan4

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3783-3795, 2023, DOI:10.32604/cmc.2023.034116

    Abstract As one of the major threats to the current DeFi (Decentralized Finance) ecosystem, reentrant attack induces data inconsistency of the victim smart contract, enabling attackers to steal on-chain assets from DeFi projects, which could terribly do harm to the confidence of the blockchain investors. However, protecting DeFi projects from the reentrant attack is very difficult, since generating a call loop within the highly automatic DeFi ecosystem could be very practicable. Existing researchers mainly focus on the detection of the reentrant vulnerabilities in the code testing, and no method could promise the non-existent of reentrant vulnerabilities. In this paper, we introduce… More >

  • Open Access

    ARTICLE

    Research on Multi-Blockchain Electronic Archives Sharing Model

    Fang Yu1, Wenbin Bi2, Ning Cao3,*, Jun Luo4, Diantang An5, Liqiang Ding4, Russell Higgs6

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3921-3931, 2023, DOI:10.32604/cmc.2023.028330

    Abstract The purpose of introducing blockchain into electronic archives sharing and utilization is to break the information barrier between electronic archives sharing departments by relying on technologies such as smart contract and asymmetric encryption. Aiming at the problem of dynamic permission management in common access control methods, a new access control method based on smart contract under blockchain is proposed, which improves the intelligence level under blockchain technology. Firstly, the Internet attribute access control model based on smart contract is established. For the dynamic access of heterogeneous devices, the management contract, permission judgment contract and access control contract are designed; Secondly,… More >

  • Open Access

    Time-Efficient Blockchain Framework for Improved Data Transmission in Autonomous Systems

    Abdulrahman M. Abdulghani, Wilbur L. Walters, Khalid H. Abed*

    Journal of Blockchain and Intelligent Computing, Vol.1, pp. 1-13, 2023, DOI:10.32604/jbic.2023.041340

    Abstract Blockchain technology is increasingly used to design trustworthy and reliable platforms for sharing information in a plethora of industries. It is a decentralized system that acts as an immutable record for storing data. It has the potential to disrupt a range of fields that rely on data, including autonomous systems like Unmanned Aerial Vehicles (UAVs). In this paper, we propose a framework based on blockchain and distributed ledger technology to improve transmission time and provide a secured and trusted method for UAVs to transfer data to the consumer efficiently while maintaining data reliability. The results show that our framework enables… More >

  • Open Access

    ARTICLE

    A Blockchain-Based Game Approach to Multi-Microgrid Energy Dispatch

    Zhikang Wang#, Chengxuan Wang#, Wendi Wu, Cheng Sun, Zhengtian Wu*

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 845-863, 2024, DOI:10.32604/cmes.2023.029442

    Abstract As the current global environment is deteriorating, distributed renewable energy is gradually becoming an important member of the energy internet. Blockchain, as a decentralized distributed ledger with decentralization, traceability and tamper-proof features, is an important way to achieve efficient consumption and multi-party supply of new energy. In this article, we establish a blockchain-based mathematical model of multiple microgrids and microgrid aggregators’ revenue, consider the degree of microgrid users’ preference for electricity thus increasing users’ reliance on the blockchain market, and apply the one-master-multiple-slave Stackelberg game theory to solve the energy dispatching strategy when each market entity pursues the maximum revenue.… More >

  • Open Access

    REVIEW

    Blockchain-Enabled Cybersecurity Provision for Scalable Heterogeneous Network: A Comprehensive Survey

    Md. Shohidul Islam1,*, Md. Arafatur Rahman2, Mohamed Ariff Bin Ameedeen1, Husnul Ajra1, Zahian Binti Ismail1, Jasni Mohamad Zain3

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 43-123, 2024, DOI:10.32604/cmes.2023.028687

    Abstract Blockchain-enabled cybersecurity system to ensure and strengthen decentralized digital transaction is gradually gaining popularity in the digital era for various areas like finance, transportation, healthcare, education, and supply chain management. Blockchain interactions in the heterogeneous network have fascinated more attention due to the authentication of their digital application exchanges. However, the exponential development of storage space capabilities across the blockchain-based heterogeneous network has become an important issue in preventing blockchain distribution and the extension of blockchain nodes. There is the biggest challenge of data integrity and scalability, including significant computing complexity and inapplicable latency on regional network diversity, operating system… More > Graphic Abstract

    Blockchain-Enabled Cybersecurity Provision for Scalable Heterogeneous Network: A Comprehensive Survey

  • Open Access

    ARTICLE

    A Secure Microgrid Data Storage Strategy with Directed Acyclic Graph Consensus Mechanism

    Jian Shang1,2,*, Runmin Guan2, Wei Wang2

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 2609-2626, 2023, DOI:10.32604/iasc.2023.037694

    Abstract The wide application of intelligent terminals in microgrids has fueled the surge of data amount in recent years. In real-world scenarios, microgrids must store large amounts of data efficiently while also being able to withstand malicious cyberattacks. To meet the high hardware resource requirements, address the vulnerability to network attacks and poor reliability in the traditional centralized data storage schemes, this paper proposes a secure storage management method for microgrid data that considers node trust and directed acyclic graph (DAG) consensus mechanism. Firstly, the microgrid data storage model is designed based on the edge computing technology. The blockchain, deployed on… More >

  • Open Access

    ARTICLE

    Cross-Domain Data Traceability Mechanism Based on Blockchain

    Shoucai Zhao, Lifeng Cao*, Jinhui Li, Jiling Wan, Jinlong Bai

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2531-2549, 2023, DOI:10.32604/cmc.2023.040776

    Abstract With the application and development of blockchain technology, many problems faced by blockchain traceability are gradually exposed. Such as cross-chain information collaboration, data separation and storage, multi-system, multi-security domain collaboration, etc. To solve these problems, it is proposed to construct trust domains based on federated chains. The public chain is used as the authorization chain to build a cross-domain data traceability mechanism applicable to multi-domain collaboration. First, the architecture of the blockchain cross-domain model is designed. Combined with the data access strategy and the decision mechanism, the open and transparent judgment of cross-domain permission and cross-domain identity authentication is realized.… More >

  • Open Access

    ARTICLE

    Blockchain-Based Secure and Fair IoT Data Trading System with Bilateral Authorization

    Youngho Park1, Mi Hyeon Jeon2, Sang Uk Shin3,*

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1871-1890, 2023, DOI:10.32604/cmc.2023.039462

    Abstract These days, data is regarded as a valuable asset in the era of the data economy, which demands a trading platform for buying and selling data. However, online data trading poses challenges in terms of security and fairness because the seller and the buyer may not fully trust each other. Therefore, in this paper, a blockchain-based secure and fair data trading system is proposed by taking advantage of the smart contract and matchmaking encryption. The proposed system enables bilateral authorization, where data trading between a seller and a buyer is accomplished only if their policies, required by each other, are… More >

  • Open Access

    ARTICLE

    Enhancement of UAV Data Security and Privacy via Ethereum Blockchain Technology

    Sur Singh Rawat1,*, Youseef Alotaibi2, Nitima Malsa1, Vimal Gupta1

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1797-1815, 2023, DOI:10.32604/cmc.2023.039381

    Abstract Unmanned aerial vehicles (UAVs), or drones, have revolutionized a wide range of industries, including monitoring, agriculture, surveillance, and supply chain. However, their widespread use also poses significant challenges, such as public safety, privacy, and cybersecurity. Cyberattacks, targeting UAVs have become more frequent, which highlights the need for robust security solutions. Blockchain technology, the foundation of cryptocurrencies has the potential to address these challenges. This study suggests a platform that utilizes blockchain technology to manage drone operations securely and confidentially. By incorporating blockchain technology, the proposed method aims to increase the security and privacy of drone data. The suggested platform stores… More >

Displaying 61-70 on page 7 of 302. Per Page