Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (331)
  • Open Access

    ARTICLE

    Efficient Digital Twin Placement for Blockchain-Empowered Wireless Computing Power Network

    Wei Wu, Liang Yu, Liping Yang*, Yadong Zhang, Peng Wang

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 587-603, 2024, DOI:10.32604/cmc.2024.052655 - 18 July 2024

    Abstract As an open network architecture, Wireless Computing Power Networks (WCPN) pose new challenges for achieving efficient and secure resource management in networks, because of issues such as insecure communication channels and untrusted device terminals. Blockchain, as a shared, immutable distributed ledger, provides a secure resource management solution for WCPN. However, integrating blockchain into WCPN faces challenges like device heterogeneity, monitoring communication states, and dynamic network nature. Whereas Digital Twins (DT) can accurately maintain digital models of physical entities through real-time data updates and self-learning, enabling continuous optimization of WCPN, improving synchronization performance, ensuring real-time accuracy, More >

  • Open Access

    ARTICLE

    A Blockchain-Based Efficient Cross-Domain Authentication Scheme for Internet of Vehicles

    Feng Zhao1, Hongtao Ding2, Chunhai Li1,*, Zhaoyu Su2, Guoling Liang2, Changsong Yang3

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 567-585, 2024, DOI:10.32604/cmc.2024.052233 - 18 July 2024

    Abstract The Internet of Vehicles (IoV) is extensively deployed in outdoor and open environments to effectively address traffic efficiency and safety issues by connecting vehicles to the network. However, due to the open and variable nature of its network topology, vehicles frequently engage in cross-domain interactions. During such processes, directly uploading sensitive information to roadside units for interaction may expose it to malicious tampering or interception by attackers, thus compromising the security of the cross-domain authentication process. Additionally, IoV imposes high real-time requirements, and existing cross-domain authentication schemes for IoV often encounter efficiency issues. To mitigate More >

  • Open Access

    ARTICLE

    QBIoT: A Quantum Blockchain Framework for IoT with an Improved Proof-of-Authority Consensus Algorithm and a Public-Key Quantum Signature

    Ang Liu1, Qing Zhang2, Shengwei Xu3,*, Huamin Feng4, Xiu-bo Chen5, Wen Liu1

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1727-1751, 2024, DOI:10.32604/cmc.2024.051233 - 18 July 2024

    Abstract The Internet of Things (IoT) is a network system that connects physical devices through the Internet, allowing them to interact. Nowadays, IoT has become an integral part of our lives, offering convenience and smart functionality. However, the growing number of IoT devices has brought about a corresponding increase in cybersecurity threats, such as device vulnerabilities, data privacy concerns, and network susceptibilities. Integrating blockchain technology with IoT has proven to be a promising approach to enhance IoT security. Nevertheless, the emergence of quantum computing poses a significant challenge to the security of traditional classical cryptography used… More >

  • Open Access

    ARTICLE

    Energy Blockchain in Smart Communities: Towards Affordable Clean Energy Supply for the Built Environment

    Mingguan Zhao1,4, Lida Liao2,*, Penglong Liang1, Meng Li1, Xinsheng Dong1, Yang Yang1, Hongxia Wang1, Zhenhao Zhang3

    Energy Engineering, Vol.121, No.8, pp. 2313-2330, 2024, DOI:10.32604/ee.2024.048261 - 19 July 2024

    Abstract The rapid growth of distributed renewable energy penetration is promoting the evolution of the energy system toward decentralization and decentralized and digitized smart grids. This study was based on energy blockchain, and developed a dual-biding mechanism based on the real-time energy surplus and demand in the local smart grid, which is expected to enable reliable, affordable, and clean energy supply in smart communities. In the proposed system, economic benefits could be achieved by replacing fossil-fuel-based electricity with the high penetration of affordable solar PV electricity. The reduction of energy surplus realized by distributed energy production More >

  • Open Access

    ARTICLE

    A Framework Based on the DAO and NFT in Blockchain for Electronic Document Sharing

    Lin Chen1, Jiaming Zhu1, Yuting Xu1, Huanqin Zheng1, Shen Su1,2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2373-2395, 2024, DOI:10.32604/cmes.2024.049996 - 08 July 2024

    Abstract In the information age, electronic documents (e-documents) have become a popular alternative to paper documents due to their lower costs, higher dissemination rates, and ease of knowledge sharing. However, digital copyright infringements occur frequently due to the ease of copying, which not only infringes on the rights of creators but also weakens their creative enthusiasm. Therefore, it is crucial to establish an e-document sharing system that enforces copyright protection. However, the existing centralized system has outstanding vulnerabilities, and the plagiarism detection algorithm used cannot fully detect the context, semantics, style, and other factors of the… More >

  • Open Access

    ARTICLE

    Blockchain-Assisted Unsupervised Learning Method for Crowdsourcing Reputation Management

    Tianyu Wang1,2, Kongyang Chen2,3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2297-2314, 2024, DOI:10.32604/cmes.2024.049964 - 08 July 2024

    Abstract Crowdsourcing holds broad applications in information acquisition and dissemination, yet encounters challenges pertaining to data quality assessment and user reputation management. Reputation mechanisms stand as crucial solutions for appraising and updating participant reputation scores, thereby elevating the quality and dependability of crowdsourced data. However, these mechanisms face several challenges in traditional crowdsourcing systems: 1) platform security lacks robust guarantees and may be susceptible to attacks; 2) there exists a potential for large-scale privacy breaches; and 3) incentive mechanisms relying on reputation scores may encounter issues as reputation updates hinge on task demander evaluations, occasionally lacking… More >

  • Open Access

    ARTICLE

    A Federated Learning Framework with Blockchain-Based Auditable Participant Selection

    Huang Zeng, Mingtian Zhang, Tengfei Liu, Anjia Yang*

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 5125-5142, 2024, DOI:10.32604/cmc.2024.052846 - 20 June 2024

    Abstract Federated learning is an important distributed model training technique in Internet of Things (IoT), in which participant selection is a key component that plays a role in improving training efficiency and model accuracy. This module enables a central server to select a subset of participants to perform model training based on data and device information. By doing so, selected participants are rewarded and actively perform model training, while participants that are detrimental to training efficiency and model accuracy are excluded. However, in practice, participants may suspect that the central server may have miscalculated and thus… More >

  • Open Access

    ARTICLE

    AnonymousTollPass: A Blockchain-Based Privacy-Preserving Electronic Toll Payment Model

    Jane Kim1, Soojin Lee1, Chan Yeob Yeun2, Seung-Hyun Seo1,3,*

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 3495-3518, 2024, DOI:10.32604/cmc.2024.050461 - 20 June 2024

    Abstract As big data, Artificial Intelligence, and Vehicle-to-Everything (V2X) communication have advanced, Intelligent Transportation Systems (ITS) are being developed to enable efficient and safe transportation systems. Electronic Toll Collection (ETC), which is one of the services included in ITS systems, is an automated system that allows vehicles to pass through toll plazas without stopping for manual payment. The ETC system is widely deployed on highways due to its contribution to stabilizing the overall traffic system flow. To ensure secure and efficient toll payments, designing a distributed model for sharing toll payment information among untrusted toll service… More >

  • Open Access

    ARTICLE

    A New Solution to Intrusion Detection Systems Based on Improved Federated-Learning Chain

    Chunhui Li1,*, Hua Jiang2

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4491-4512, 2024, DOI:10.32604/cmc.2024.048431 - 20 June 2024

    Abstract In the context of enterprise systems, intrusion detection (ID) emerges as a critical element driving the digital transformation of enterprises. With systems spanning various sectors of enterprises geographically dispersed, the necessity for seamless information exchange has surged significantly. The existing cross-domain solutions are challenged by such issues as insufficient security, high communication overhead, and a lack of effective update mechanisms, rendering them less feasible for prolonged application on resource-limited devices. This study proposes a new cross-domain collaboration scheme based on federated chains to streamline the server-side workload. Within this framework, individual nodes solely engage in… More >

  • Open Access

    ARTICLE

    Machine Learning Empowered Security and Privacy Architecture for IoT Networks with the Integration of Blockchain

    Sohaib Latif1,*, M. Saad Bin Ilyas1, Azhar Imran2, Hamad Ali Abosaq3, Abdulaziz Alzubaidi4, Vincent Karovič Jr.5

    Intelligent Automation & Soft Computing, Vol.39, No.2, pp. 353-379, 2024, DOI:10.32604/iasc.2024.047080 - 21 May 2024

    Abstract The Internet of Things (IoT) is growing rapidly and impacting almost every aspect of our lives, from wearables and healthcare to security, traffic management, and fleet management systems. This has generated massive volumes of data and security, and data privacy risks are increasing with the advancement of technology and network connections. Traditional access control solutions are inadequate for establishing access control in IoT systems to provide data protection owing to their vulnerability to single-point OF failure. Additionally, conventional privacy preservation methods have high latency costs and overhead for resource-constrained devices. Previous machine learning approaches were… More >

Displaying 21-30 on page 3 of 331. Per Page