Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (15)
  • Open Access

    ARTICLE

    A Blockchain-Based Access Control Scheme for Reputation Value Attributes of the Internet of Things

    Hongliang Tian, Junyuan Tian*

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1297-1310, 2024, DOI:10.32604/cmc.2024.047058

    Abstract The Internet of Things (IoT) access control mechanism may encounter security issues such as single point of failure and data tampering. To address these issues, a blockchain-based IoT reputation value attribute access control scheme is proposed. Firstly, writing the reputation value as an attribute into the access control policy, and then deploying the access control policy in the smart contract of the blockchain system can enable the system to provide more fine-grained access control; Secondly, storing a large amount of resources from the Internet of Things in Inter Planetary File System (IPFS) to improve system throughput; Finally, map resource access… More >

  • Open Access

    ARTICLE

    On Designs of Decentralized Reputation Management for Permissioned Blockchain Networks

    Jinyu Chen1, Long Shi1,*, Qisheng Huang2, Taotao Wang3, Daojing He4

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.2, pp. 1755-1773, 2024, DOI:10.32604/cmes.2023.046826

    Abstract In permissioned blockchain networks, the Proof of Authority (PoA) consensus, which uses the election of authorized nodes to validate transactions and blocks, has been widely advocated thanks to its high transaction throughput and fault tolerance. However, PoA suffers from the drawback of centralization dominated by a limited number of authorized nodes and the lack of anonymity due to the round-robin block proposal mechanism. As a result, traditional PoA is vulnerable to a single point of failure that compromises the security of the blockchain network. To address these issues, we propose a novel decentralized reputation management mechanism for permissioned blockchain networks… More > Graphic Abstract

    On Designs of Decentralized Reputation Management for Permissioned Blockchain Networks

  • Open Access

    ARTICLE

    Blockchain-Empowered Token-Based Access Control System with User Reputation Evaluation

    Yuzheng Yang*, Zhe Tu, Ying Liu, Huachun Zhou

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3163-3184, 2023, DOI:10.32604/cmc.2023.043974

    Abstract Currently, data security and privacy protection are becoming more and more important. Access control is a method of authorization for users through predefined policies. Token-based access control (TBAC) enhances the manageability of authorization through the token. However, traditional access control policies lack the ability to dynamically adjust based on user access behavior. Incorporating user reputation evaluation into access control can provide valuable feedback to enhance system security and flexibility. As a result, this paper proposes a blockchain-empowered TBAC system and introduces a user reputation evaluation module to provide feedback on access control. The TBAC system divides the access control process… More >

  • Open Access

    ARTICLE

    PoIR: A Node Selection Mechanism in Reputation-Based Blockchain Consensus Using Bidirectional LSTM Regression Model

    Jauzak Hussaini Windiatmaja, Delphi Hanggoro, Muhammad Salman, Riri Fitri Sari*

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2309-2339, 2023, DOI:10.32604/cmc.2023.041152

    Abstract This research presents a reputation-based blockchain consensus mechanism called Proof of Intelligent Reputation (PoIR) as an alternative to traditional Proof of Work (PoW). PoIR addresses the limitations of existing reputation-based consensus mechanisms by proposing a more decentralized and fair node selection process. The proposed PoIR consensus combines Bidirectional Long Short-Term Memory (BiLSTM) with the Network Entity Reputation Database (NERD) to generate reputation scores for network entities and select authoritative nodes. NERD records network entity profiles based on various sources, i.e., Warden, Blacklists, DShield, AlienVault Open Threat Exchange (OTX), and MISP (Malware Information Sharing Platform). It summarizes these profile records into… More >

  • Open Access

    ARTICLE

    A Machine Learning-Based Attack Detection and Prevention System in Vehicular Named Data Networking

    Arif Hussain Magsi1,*, Ali Ghulam2, Saifullah Memon1, Khalid Javeed3, Musaed Alhussein4, Imad Rida5

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 1445-1465, 2023, DOI:10.32604/cmc.2023.040290

    Abstract Named Data Networking (NDN) is gaining a significant attention in Vehicular Ad-hoc Networks (VANET) due to its in-network content caching, name-based routing, and mobility-supporting characteristics. Nevertheless, existing NDN faces three significant challenges, including security, privacy, and routing. In particular, security attacks, such as Content Poisoning Attacks (CPA), can jeopardize legitimate vehicles with malicious content. For instance, attacker host vehicles can serve consumers with invalid information, which has dire consequences, including road accidents. In such a situation, trust in the content-providing vehicles brings a new challenge. On the other hand, ensuring privacy and preventing unauthorized access in vehicular (VNDN) is another… More >

  • Open Access

    ARTICLE

    How Do Young Children Manage Their Reputation among Peers?

    Jingmiao Zhang1,2, Yuning Zhu2, Xiuli Liu2,*

    International Journal of Mental Health Promotion, Vol.25, No.7, pp. 847-854, 2023, DOI:10.32604/ijmhp.2023.028166

    Abstract Young children’s reputation management is closely related to their social development. The purpose of our study is to examine the interaction between theory of mind and partner choice on children’s reputation management. Participants consisted of 270 children who were 3 to 5 years old. First, we measured participants’ theory of mind capabilities using the unexpected location task and unexpected content task and then randomly divided the participants into the control group, non-partner–choice group, and partner-choice group. We measured reputation management by comparing children’s willingness to share and sharing behavior between these groups. The findings are as follows: (1) Children from… More > Graphic Abstract

    How Do Young Children Manage Their Reputation among Peers?

  • Open Access

    ARTICLE

    Fuzzy Reputation Based Trust Mechanism for Mitigating Attacks in MANET

    S. Maheswari, R. Vijayabhasker*

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3677-3692, 2023, DOI:10.32604/iasc.2023.031422

    Abstract Mobile Ad-hoc Networks (MANET) usage across the globe is increasing by the day. Evaluating a node’s trust value has significant advantages since such network applications only run efficiently by involving trustable nodes. The trust values are estimated based on the reputation values of each node in the network by using different mechanisms. However, these mechanisms have various challenging issues which degrade the network performance. Hence, a novel Quality of Service (QoS) Trust Estimation with Black/Gray hole Attack Detection approach is proposed in this research work. Initially, the QoS-based trust estimation is proposed by using a Fuzzy logic scheme. The trust… More >

  • Open Access

    ARTICLE

    Hybrid Trust Based Reputation Mechanism for Discovering Malevolent Node in MANET

    S. Neelavathy Pari1,*, K. Sudharson2

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2775-2789, 2023, DOI:10.32604/csse.2023.029345

    Abstract A self-contained connection of wireless links that functions without any infrastructure is known as Mobile Ad Hoc Network (MANET). A MANET’s nodes could engage actively and dynamically with one another. However, MANETs, from the other side, are exposed to severe potential threats that are difficult to counter with present security methods. As a result, several safe communication protocols designed to enhance the secure interaction among MANET nodes. In this research, we offer a reputed optimal routing value among network nodes, secure computations, and misbehavior detection predicated on node’s trust levels with a Hybrid Trust based Reputation Mechanism (HTRM). In addition,… More >

  • Open Access

    ARTICLE

    A Dynamic Reputation–based Consensus Mechanism for Blockchain

    Xiaofang Qiu1,2, Zhi Qin1,2,*, Wunan Wan1,2, Jinquan Zhang1,2, Jinliang Guo1,2, Shibin Zhang1,2, Jinyue Xia3

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2577-2589, 2022, DOI:10.32604/cmc.2022.028757

    Abstract In recent years, Blockchain is gaining prominence as a hot topic in academic research. However, the consensus mechanism of blockchain has been criticized in terms of energy consumption and performance. Although Proof-of-Authority (PoA) consensus mechanism, as a lightweight consensus mechanism, is more efficient than traditional Proof-of-Work (PoW) and Proof-of-Stake (PoS), it suffers from the problem of centralization. To this end, on account of analyzing the shortcomings of existing consensus mechanisms, this paper proposes a dynamic reputation-based consensus mechanism for blockchain. This scheme allows nodes with reputation value higher than a threshold apply to become a monitoring node, which can monitor… More >

  • Open Access

    ARTICLE

    Blockchain-Based Decentralized Reputation Management System for Internet of Everything in 6G-Enabled Cybertwin Architecture

    Meimin Wang, Zhili Zhou*, Chun Ding

    Journal of New Media, Vol.3, No.4, pp. 137-150, 2021, DOI:10.32604/jnm.2021.024543

    Abstract Internet of Everything (IoE) has emerged as a promising paradigm for the purpose of connecting and exchanging data among physical objects and humans over the Internet, and it can be widely applied in the fields of industry, transportation, commerce, and education. Recently, the emergence of 6G-enabled cybertwin network architecture provides the technical and theoretical foundation for the realization of IoE paradigm. However, the IoE has three open issues in the 6G-enabled cybertwin architecture, i.e., data authenticity, data storage and node reliability. To address these issues, we propose a blockchain-based decentralized reputation management system (BC-DRMS) for IoE in 6G-enabled Cybertwin architecture.… More >

Displaying 1-10 on page 1 of 15. Per Page