Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5)
  • Open Access

    ARTICLE

    FPSblo: A Blockchain Network Transmission Model Utilizing Farthest Point Sampling

    Longle Cheng1,2, Xiru Li1, Shiyu Fang2, Wansu Pan1, He Zhao1,*, Haibo Tan1, Xiaofeng Li1,2

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2491-2509, 2024, DOI:10.32604/cmc.2024.047166

    Abstract Peer-to-peer (P2P) overlay networks provide message transmission capabilities for blockchain systems. Improving data transmission efficiency in P2P networks can greatly enhance the performance of blockchain systems. However, traditional blockchain P2P networks face a common challenge where there is often a mismatch between the upper-layer traffic requirements and the underlying physical network topology. This mismatch results in redundant data transmission and inefficient routing, severely constraining the scalability of blockchain systems. To address these pressing issues, we propose FPSblo, an efficient transmission method for blockchain networks. Our inspiration for FPSblo stems from the Farthest Point Sampling (FPS) algorithm, a well-established technique widely… More >

  • Open Access

    ARTICLE

    On Designs of Decentralized Reputation Management for Permissioned Blockchain Networks

    Jinyu Chen1, Long Shi1,*, Qisheng Huang2, Taotao Wang3, Daojing He4

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.2, pp. 1755-1773, 2024, DOI:10.32604/cmes.2023.046826

    Abstract In permissioned blockchain networks, the Proof of Authority (PoA) consensus, which uses the election of authorized nodes to validate transactions and blocks, has been widely advocated thanks to its high transaction throughput and fault tolerance. However, PoA suffers from the drawback of centralization dominated by a limited number of authorized nodes and the lack of anonymity due to the round-robin block proposal mechanism. As a result, traditional PoA is vulnerable to a single point of failure that compromises the security of the blockchain network. To address these issues, we propose a novel decentralized reputation management mechanism for permissioned blockchain networks… More > Graphic Abstract

    On Designs of Decentralized Reputation Management for Permissioned Blockchain Networks

  • Open Access

    ARTICLE

    An Erebus Attack Detection Method Oriented to Blockchain Network Layer

    Qianyi Dai1,2,*, Bin Zhang1,2, Kaiyong Xu1,2, Shuqin Dong1,2

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 5395-5431, 2023, DOI:10.32604/cmc.2023.036033

    Abstract Recently, the Erebus attack has proved to be a security threat to the blockchain network layer, and the existing research has faced challenges in detecting the Erebus attack on the blockchain network layer. The cloud-based active defense and one-sidedness detection strategies are the hindrances in detecting Erebus attacks. This study designs a detection approach by establishing a ReliefF_WMRmR-based two-stage feature selection algorithm and a deep learning-based multimodal classification detection model for Erebus attacks and responding to security threats to the blockchain network layer. The goal is to improve the performance of Erebus attack detection methods, by combining the traffic behavior… More >

  • Open Access

    ARTICLE

    Data Security Storage Mechanism Based on Blockchain Network

    Jin Wang1, Wei Ou1, Wenhai Wang2, R. Simon Sherratt3, Yongjun Ren4, Xiaofeng Yu5,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 4933-4950, 2023, DOI:10.32604/cmc.2023.034148

    Abstract With the rapid development of information technology, the development of blockchain technology has also been deeply impacted. When performing block verification in the blockchain network, if all transactions are verified on the chain, this will cause the accumulation of data on the chain, resulting in data storage problems. At the same time, the security of data is also challenged, which will put enormous pressure on the block, resulting in extremely low communication efficiency of the block. The traditional blockchain system uses the Merkle Tree method to store data. While verifying the integrity and correctness of the data, the amount of… More >

  • Open Access

    ARTICLE

    Trust Provision in the Internet of Things Using Transversal Blockchain Networks

    Borja Bordela, Ramon Alcarriab, Diego Martína, Álvaro Sánchez-Picota

    Intelligent Automation & Soft Computing, Vol.25, No.1, pp. 155-170, 2019, DOI:10.31209/2018.100000052

    Abstract The Internet-of-Things (IoT) paradigm faces new and genuine challenges and problems associated, mainly, with the ubiquitous access to the Internet, the huge number of devices involved and the heterogeneity of the components making up this new global network. In this context, protecting these systems against cyberattacks and cybercrimes has turn into a basic issue. In relation to this topic, most proposed solutions in the literature are focused on security; however other aspects have to be considered (such as privacy or trust). Therefore, in this paper we define a theoretical framework for trust in IoT scenarios, including a mathematical formalization and… More >

Displaying 1-10 on page 1 of 5. Per Page