Nothing Special   »   [go: up one dir, main page]

You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (425)

Search Parameters:
Keywords = ethereum

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
43 pages, 6561 KiB  
Review
Exploring Perspectives of Blockchain Technology and Traditional Centralized Technology in Organ Donation Management: A Comprehensive Review
by Geet Bawa, Harmeet Singh, Sita Rani, Aman Kataria and Hong Min
Information 2024, 15(11), 703; https://doi.org/10.3390/info15110703 - 4 Nov 2024
Viewed by 590
Abstract
Background/Objectives: The healthcare sector is rapidly growing, aiming to promote health, provide treatment, and enhance well-being. This paper focuses on the organ donation and transplantation system, a vital aspect of healthcare. It offers a comprehensive review of challenges in global organ donation [...] Read more.
Background/Objectives: The healthcare sector is rapidly growing, aiming to promote health, provide treatment, and enhance well-being. This paper focuses on the organ donation and transplantation system, a vital aspect of healthcare. It offers a comprehensive review of challenges in global organ donation and transplantation, highlighting issues of fairness and transparency, and compares centralized architecture-based models and blockchain-based decentralized models. Methods: This work reviews 370 publications from 2016 to 2023 on organ donation management systems. Out of these, 85 publications met the inclusion criteria, including 67 journal articles, 2 doctoral theses, and 16 conference papers. About 50.6% of these publications focus on global challenges in the system. Additionally, 12.9% of the publications examine centralized architecture-based models, and 36.5% of the publications explore blockchain-based decentralized models. Results: Concerns about organ trafficking, illicit trade, system distrust, and unethical allocation are highlighted, with a lack of transparency as the primary catalyst in organ donation and transplantation. It has been observed that centralized architecture-based models use technologies such as Python, Java, SQL, and Android Technology but face data storage issues. In contrast, blockchain-based decentralized models, mainly using Ethereum and a subset on Hyperledger Fabric, benefit from decentralized data storage, ensure transparency, and address these concerns efficiently. Conclusions: It has been observed that blockchain technology-based models are the better option for organ donation management systems. Further, suggestions for future directions for researchers in the field of organ donation management systems have been presented. Full article
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>Organ donation and transplantation process flowchart.</p>
Full article ">Figure 2
<p>Publication search results in the initial search phase. (<b>a</b>) Journal and Conference Publications; (<b>b</b>) Post-Doctorate Dissertations.</p>
Full article ">Figure 3
<p>Types of publications explored in the initial search phase.</p>
Full article ">Figure 4
<p>Publication search results after the application of exclusion and inclusion criteria. (<b>a</b>) Journal Publications and Conference Publications; (<b>b</b>) Post-Doctorate Dissertations.</p>
Full article ">Figure 5
<p>Types of publications explored after the application of exclusion and inclusion criteria.</p>
Full article ">Figure 6
<p>Year-wise publications selected.</p>
Full article ">Figure 7
<p>Year-wise publications selected to address RQ1, RQ2, and RQ3.</p>
Full article ">Figure 8
<p>The Review Process Phase.</p>
Full article ">Figure 9
<p>Distribution of publications on organ donation issues by year.</p>
Full article ">Figure 10
<p>A chronological display of countries investigated to analyze issues in their organ donation systems.</p>
Full article ">Figure 11
<p>A timeline of the publications that have been reviewed to address RQ1 [<a href="#B50-information-15-00703" class="html-bibr">50</a>,<a href="#B51-information-15-00703" class="html-bibr">51</a>,<a href="#B52-information-15-00703" class="html-bibr">52</a>,<a href="#B53-information-15-00703" class="html-bibr">53</a>,<a href="#B54-information-15-00703" class="html-bibr">54</a>,<a href="#B55-information-15-00703" class="html-bibr">55</a>,<a href="#B56-information-15-00703" class="html-bibr">56</a>,<a href="#B57-information-15-00703" class="html-bibr">57</a>,<a href="#B58-information-15-00703" class="html-bibr">58</a>,<a href="#B59-information-15-00703" class="html-bibr">59</a>,<a href="#B60-information-15-00703" class="html-bibr">60</a>,<a href="#B61-information-15-00703" class="html-bibr">61</a>,<a href="#B62-information-15-00703" class="html-bibr">62</a>,<a href="#B63-information-15-00703" class="html-bibr">63</a>,<a href="#B64-information-15-00703" class="html-bibr">64</a>,<a href="#B65-information-15-00703" class="html-bibr">65</a>,<a href="#B66-information-15-00703" class="html-bibr">66</a>,<a href="#B67-information-15-00703" class="html-bibr">67</a>,<a href="#B68-information-15-00703" class="html-bibr">68</a>,<a href="#B69-information-15-00703" class="html-bibr">69</a>,<a href="#B70-information-15-00703" class="html-bibr">70</a>,<a href="#B71-information-15-00703" class="html-bibr">71</a>,<a href="#B72-information-15-00703" class="html-bibr">72</a>,<a href="#B73-information-15-00703" class="html-bibr">73</a>,<a href="#B74-information-15-00703" class="html-bibr">74</a>,<a href="#B75-information-15-00703" class="html-bibr">75</a>,<a href="#B76-information-15-00703" class="html-bibr">76</a>,<a href="#B77-information-15-00703" class="html-bibr">77</a>,<a href="#B78-information-15-00703" class="html-bibr">78</a>,<a href="#B79-information-15-00703" class="html-bibr">79</a>,<a href="#B80-information-15-00703" class="html-bibr">80</a>,<a href="#B81-information-15-00703" class="html-bibr">81</a>,<a href="#B82-information-15-00703" class="html-bibr">82</a>,<a href="#B83-information-15-00703" class="html-bibr">83</a>,<a href="#B84-information-15-00703" class="html-bibr">84</a>,<a href="#B85-information-15-00703" class="html-bibr">85</a>,<a href="#B86-information-15-00703" class="html-bibr">86</a>,<a href="#B87-information-15-00703" class="html-bibr">87</a>,<a href="#B88-information-15-00703" class="html-bibr">88</a>,<a href="#B89-information-15-00703" class="html-bibr">89</a>,<a href="#B90-information-15-00703" class="html-bibr">90</a>,<a href="#B91-information-15-00703" class="html-bibr">91</a>,<a href="#B92-information-15-00703" class="html-bibr">92</a>].</p>
Full article ">Figure 12
<p>Studies reviewed by publication year addressing RQ2.</p>
Full article ">Figure 13
<p>Studies reviewed by publication year addressing RQ3.</p>
Full article ">Figure 14
<p>A year-wise exploration of global organ donation management system challenges.</p>
Full article ">Figure 15
<p>Blockchain usage: Ethereum (ETH) vs. Hyperledger Fabric (HLF) vs. InterPlanetary File System (IPFS) vs. Polygon (PLYGN) vs. Not Mentioned (NM).</p>
Full article ">Figure 16
<p>Blockchain type: Private Blockchain (PR_B) vs. Public Blockchain (PB_B) vs. Not Mentioned (NM).</p>
Full article ">Figure 17
<p>Smart contracts coded vs. not coded.</p>
Full article ">Figure 18
<p>Decentralized application (DApp) designed vs. not designed.</p>
Full article ">Figure 19
<p>An annual examination of studies in two categories.</p>
Full article ">Figure 20
<p>A comparative assessment of the issue assessing capabilities of both solutions.</p>
Full article ">Figure 21
<p>IoT sensors embedded inside an organ container.</p>
Full article ">
20 pages, 8132 KiB  
Article
A Blockchain and Zero Knowledge Proof Based Data Security Transaction Method in Distributed Computing
by Bowei Zhang, Heng Pan, Kunyang Li, Ying Xing, Jiaxiang Wang, Dongdong Fan and Wenjie Zhang
Electronics 2024, 13(21), 4260; https://doi.org/10.3390/electronics13214260 - 30 Oct 2024
Viewed by 648
Abstract
In distributed computing, data trading mechanisms are essential for ensuring the sharing of data across multiple computing nodes. Nevertheless, they currently encounter considerable obstacles, including low accuracy in matching trading parties, ensuring fairness in transactions, and safeguarding data privacy throughout the trading process. [...] Read more.
In distributed computing, data trading mechanisms are essential for ensuring the sharing of data across multiple computing nodes. Nevertheless, they currently encounter considerable obstacles, including low accuracy in matching trading parties, ensuring fairness in transactions, and safeguarding data privacy throughout the trading process. In order to address these issues, we put forward a data trading security scheme based on zero-knowledge proofs and smart contracts. In the phase of preparing the security parameters, the objective is to reduce the complexity of generating non-interactive zero-knowledge proofs and to enhance the efficiency of data trading. In the pre-trading phase, we devise attribute atomic matching smart contracts based on precise data property alignment, with the objective of achieving fine-grained matching of data attributes between trading parties. In the trading execution phase, lightweight cryptographic algorithms based on elliptic curve cryptography (ECC) and non-interactive zero-knowledge proofs are employed for the dual encryption of trading data and the generation of attribute proof contracts, thus ensuring the security and privacy of the data. The results of experiments conducted on the Ethereum platform in an industrial IoT scenario demonstrate that our scheme maintains stable and low-cost consumption while ensuring accuracy in matching and privacy protection. Full article
(This article belongs to the Special Issue New Advances in Distributed Computing and Its Applications)
Show Figures

Figure 1

Figure 1
<p>System model.</p>
Full article ">Figure 2
<p>System flow chart.</p>
Full article ">Figure 3
<p>Security parameter distribution phase.</p>
Full article ">Figure 4
<p>Matching of trading groups.</p>
Full article ">Figure 5
<p>Transaction execution.</p>
Full article ">Figure 6
<p>Data ownership requirements.</p>
Full article ">Figure 7
<p>Data prices.</p>
Full article ">Figure 8
<p>Registration cost.</p>
Full article ">Figure 9
<p>Matching phase costs.</p>
Full article ">Figure 10
<p>Proof file.</p>
Full article ">Figure 11
<p>Verification of Contract Overview.</p>
Full article ">Figure 12
<p>Verifier result.</p>
Full article ">Figure 13
<p>Verification cost.</p>
Full article ">
30 pages, 738 KiB  
Article
Blockchain Tokens, Price Volatility, and Active User Base: An Empirical Analysis Based on Tokenomics
by Roberto Moncada, Enrico Ferro, Maurizio Fiaschetti and Francesca Medda
Int. J. Financial Stud. 2024, 12(4), 107; https://doi.org/10.3390/ijfs12040107 - 23 Oct 2024
Viewed by 844
Abstract
Blockchain tokens have accumulated tremendous market value but remain highly controversial, given their price volatility and seemingly speculative nature. Ironically, this very characteristic can foster token retention as users wait for occasions of appreciation. In this paper, we conduct an empirical analysis with [...] Read more.
Blockchain tokens have accumulated tremendous market value but remain highly controversial, given their price volatility and seemingly speculative nature. Ironically, this very characteristic can foster token retention as users wait for occasions of appreciation. In this paper, we conduct an empirical analysis with 58 tokens in two steps: first, an investigation of the drivers of user activity and token price volatility using a new blockchain token classification framework, searching for possible tokenomics links. Our findings suggest that there is an intrinsic relationship between the way tokens are used as a means of exchange and how token usage dynamics influence user engagement oppositely to market stability. Only some features, such as earning potential and voting rights, foster token-holding strategies, while only Ethereum ecosystem membership has positive effects on price volatility. Second, we analyze the direct relationship between price volatility and active users. Results show that, on average, a 10% increase in volatility is related to a decrease in active addresses ranging between 3.96% and 5.88%. The finding is supportive of the hypothesis that token price volatility may be treated as an opportunity to increase token retention. Full article
Show Figures

Figure 1

Figure 1
<p>Token features classification.</p>
Full article ">Figure 2
<p>Dataset market dominance and distribution per token features.</p>
Full article ">Figure 3
<p>Token dummies effect on active address count—coefficients chart.</p>
Full article ">Figure 4
<p>Token dummies effect on price volatility—coefficients chart.</p>
Full article ">Figure 5
<p>Price volatility effect on active address count—coefficients chart.</p>
Full article ">Figure 6
<p>Price volatility effect on active address count—FGLS estimator—coefficients chart.</p>
Full article ">Figure A1
<p>Token features classification process.</p>
Full article ">Figure A2
<p>Morphological token classification framework. Source: <a href="#B18-ijfs-12-00107" class="html-bibr">Freni et al.</a> (<a href="#B18-ijfs-12-00107" class="html-bibr">2022</a>).</p>
Full article ">
22 pages, 2750 KiB  
Article
Advanced Security Auditing Methods for Solidity-Based Smart Contracts
by Meihua Xiao, Yangping Xu, Zehuan Li and Hongbin Wan
Electronics 2024, 13(20), 4093; https://doi.org/10.3390/electronics13204093 - 17 Oct 2024
Viewed by 751
Abstract
The development of smart contracts remains in its early stages, with significant differences in underlying programming languages and application platforms resulting in a lack of standardization. This lack of standardization increases the susceptibility to vulnerabilities and associated financial losses. To address security vulnerabilities [...] Read more.
The development of smart contracts remains in its early stages, with significant differences in underlying programming languages and application platforms resulting in a lack of standardization. This lack of standardization increases the susceptibility to vulnerabilities and associated financial losses. To address security vulnerabilities in smart contracts on the Ethereum blockchain platform, this paper proposes a security audit method based on formal verification. The method integrates an input module, static analysis module, formal verification module, analog execution module, and report and recommendation module, which can accurately discover the security vulnerabilities and logical flaws of smart contracts through formal verification and other analysis techniques, thus realizing correctness detection. During the experiment, the method detects 8 types of common vulnerabilities in 148 smart contracts and marks 21 smart contracts with vulnerabilities. After manual review and analysis, it is found that 17 of these 21 marked smart contracts do have security vulnerabilities. The experimental results show that the proposed method can accurately detect security vulnerabilities and logic flaws in smart contracts through formal verification and other analysis techniques before smart contracts are deployed, thus significantly improving the security of smart contracts and reducing the economic losses that may be caused by code defects. Full article
(This article belongs to the Section Computer Science & Engineering)
Show Figures

Figure 1

Figure 1
<p>Schematic diagram of smart contract security audit method.</p>
Full article ">Figure 2
<p>Source code of a solidity contract.</p>
Full article ">Figure 3
<p>Promela model of a smart contract.</p>
Full article ">Figure 4
<p>Promela model verification result.</p>
Full article ">Figure 5
<p>Analog execution module workflow.</p>
Full article ">Figure 6
<p>An issue after detection.</p>
Full article ">Figure 7
<p>Suggestion for the issue.</p>
Full article ">
29 pages, 8573 KiB  
Review
Blockchain Consensus Mechanisms: A Bibliometric Analysis (2014–2024) Using VOSviewer and R Bibliometrix
by Joongho Ahn, Eojin Yi and Moonsoo Kim
Information 2024, 15(10), 644; https://doi.org/10.3390/info15100644 - 16 Oct 2024
Viewed by 1225
Abstract
Blockchain consensus mechanisms play a critical role in ensuring the security, decentralization, and integrity of distributed networks. As blockchain technology expands beyond cryptocurrencies into broader applications such as supply chain management and healthcare, the importance of efficient and scalable consensus algorithms has grown [...] Read more.
Blockchain consensus mechanisms play a critical role in ensuring the security, decentralization, and integrity of distributed networks. As blockchain technology expands beyond cryptocurrencies into broader applications such as supply chain management and healthcare, the importance of efficient and scalable consensus algorithms has grown significantly. This study provides a comprehensive bibliometric analysis of blockchain and consensus mechanism research from 2014 to 2024, using tools such as VOSviewer and R’s Bibliometrix package. The analysis traces the evolution from foundational mechanisms like Proof of ork (PoW) to more advanced models such as Proof of Stake (PoS) and Byzantine Fault Tolerance (BFT), with particular emphasis on Ethereum’s “The Merge” in 2022, which marked the historic shift from PoW to PoS. Key findings highlight emerging themes, including scalability, security, and the integration of blockchain with state-of-the-art technologies like artificial intelligence (AI), the Internet of Things (IoT), and energy trading. The study also identifies influential authors, institutions, and countries, emphasizing the collaborative and interdisciplinary nature of blockchain research. Through thematic analysis, this review uncovers the challenges and opportunities in decentralized systems, underscoring the need for continued innovation in consensus mechanisms to address efficiency, sustainability, scalability, and privacy concerns. These insights offer a valuable foundation for future research aimed at advancing blockchain technology across various industries. Full article
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>Analytical framework and workflow of the study of blockchain consensus mechanisms.</p>
Full article ">Figure 2
<p>Annual scientific productions per year (the number of publications in 2024 is based on data collected up to 2 August 2024).</p>
Full article ">Figure 3
<p>Countries’ production over time.</p>
Full article ">Figure 4
<p>Affiliated production over time.</p>
Full article ">Figure 5
<p>Most relevant affiliations.</p>
Full article ">Figure 6
<p>Most relevant authors.</p>
Full article ">Figure 7
<p>Word cloud for most frequent keywords in blockchain and consensus research.</p>
Full article ">Figure 8
<p>Bibliometric analysis of the citations: (<b>a</b>) Citations of authors. Eight clusters are shown in different colors. Marko Vukolić in the blue cluster was the most cited author (2455 citations); (<b>b</b>) Citations of organizations. IBM Corporation in yellow cluster was the most cited organization (2377 citations); (<b>c</b>) Citations of countries. The USA, represented by the green cluster, was the most cited country (9198 citations).</p>
Full article ">Figure 8 Cont.
<p>Bibliometric analysis of the citations: (<b>a</b>) Citations of authors. Eight clusters are shown in different colors. Marko Vukolić in the blue cluster was the most cited author (2455 citations); (<b>b</b>) Citations of organizations. IBM Corporation in yellow cluster was the most cited organization (2377 citations); (<b>c</b>) Citations of countries. The USA, represented by the green cluster, was the most cited country (9198 citations).</p>
Full article ">Figure 9
<p>Bibliometric analysis of co-authorship: (<b>a</b>) The co-authorship map of authors, indicating the authors that have cooperated in the field of blockchain and consensus; (<b>b</b>) The co-authorship map of organizations. The Chinese Academy of Sciences produced 30 related papers and collaborated with 13 other institutions.</p>
Full article ">Figure 10
<p>Co-authorship map of countries in blockchain and consensus research: (<b>a</b>) Network view shows clusters and collaboration links between countries, with node size representing the number of documents; (<b>b</b>) Overlay view displays changes over time, with circle size indicating document count and color gradient (purple to yellow) showing the average publication year from 2014 to 2024.</p>
Full article ">Figure 11
<p>Co-occurrence analysis of keywords within the blockchain research field: (<b>a</b>) Network cluster visualization displays the relationships and clustering of keywords based on their co-occurrence in the literature, emphasizing the main research themes and their interconnections. (<b>b</b>) Overlay visualization illustrates the temporal progression of research topics, with colors representing different periods of focus.</p>
Full article ">Figure 11 Cont.
<p>Co-occurrence analysis of keywords within the blockchain research field: (<b>a</b>) Network cluster visualization displays the relationships and clustering of keywords based on their co-occurrence in the literature, emphasizing the main research themes and their interconnections. (<b>b</b>) Overlay visualization illustrates the temporal progression of research topics, with colors representing different periods of focus.</p>
Full article ">Figure 12
<p>Thematic evolution of blockchain and consensus research: a three-period Sankey diagram.</p>
Full article ">Figure 13
<p>Number of articles analyzed per period (the number of publications in 2024 is based on data collected up to 2 August 2024).</p>
Full article ">Figure 14
<p>Strategic thematic map for blockchain and consensus research across three periods: (<b>a</b>) 2014–2019; (<b>b</b>) 2020–2021; (<b>c</b>) 2022–2024.</p>
Full article ">Figure 14 Cont.
<p>Strategic thematic map for blockchain and consensus research across three periods: (<b>a</b>) 2014–2019; (<b>b</b>) 2020–2021; (<b>c</b>) 2022–2024.</p>
Full article ">
21 pages, 3001 KiB  
Article
Security Analysis of Smart Contract Migration from Ethereum to Arbitrum
by Xueyan Tang and Lingzhi Shi
Blockchains 2024, 2(4), 424-444; https://doi.org/10.3390/blockchains2040018 - 15 Oct 2024
Viewed by 624
Abstract
When migrating smart contracts from one blockchain platform to another, there are potential security risks. This is because different blockchain platforms have different environments and characteristics for executing smart contracts. The focus of this paper is to study the security risks associated with [...] Read more.
When migrating smart contracts from one blockchain platform to another, there are potential security risks. This is because different blockchain platforms have different environments and characteristics for executing smart contracts. The focus of this paper is to study the security risks associated with the migration of smart contracts from Ethereum to Arbitrum. We collected relevant data and analyzed smart contract migration cases to explore the differences between Ethereum and Arbitrum in areas such as Arbitrum cross-chain messaging, block properties, contract address alias, and gas fees. From the 36 types of smart contract migration cases we identified, we selected four typical types of cases and summarized their security risks. The research shows that smart contracts deployed on Ethereum may face certain potential security risks during migration to Arbitrum, mainly due to issues inherent in public blockchain characteristics, such as outdated off-chain data obtained by the inactive sequencer, logic errors based on time, failed permission checks, and denial of service (DOS) attacks. To mitigate these security risks, we proposed avoidance methods and provided considerations for users and developers to ensure a secure migration process. It is worth noting that this study is the first to conduct an in-depth analysis of the secure migration of smart contracts from Ethereum to Arbitrum. Full article
(This article belongs to the Special Issue Key Technologies for Security and Privacy in Web 3.0)
Show Figures

Figure 1

Figure 1
<p>Distribution of TVL in L2. Arbitrum One has the largest share, followed by Polygon Pos and Optimism.</p>
Full article ">Figure 2
<p>Smart contract migration process diagram. Migrating smart contracts deployed on Ethereum to Arbitrum, where Ethereum is the source blockchain for migration and Arbitrum is the target blockchain.</p>
Full article ">Figure 3
<p>Transaction classification diagram. L2-to-L1 transactions require the involvement of the Arbitrum sequencer, while L1-to-L2 transactions are implemented through the bridge and retryable tickets.</p>
Full article ">Figure 4
<p>Transaction delay execution diagram. The sequencer’s downtime results in transaction accumulation and delayed execution, compromising the real-time nature of transaction execution.</p>
Full article ">Figure 5
<p>Illustration of L1-to-L2 messaging invocation. Asset transfer is achieved based on ticket generation on L1 and the redeem operation on L2.</p>
Full article ">Figure 6
<p>Block packaging illustration. Among the data dependencies for block packaging, three aspects are relevant to our research: L1 block number, local timestamp, and Txs (transactions).</p>
Full article ">Figure 7
<p>Diagram of retrieving “msg.sender”. The ‘msg.sender’ returns the address of the message sender. However, it is important to note that on Arbitrum, the message sender may have an alias address.</p>
Full article ">
16 pages, 632 KiB  
Article
Distributed Software Build Assurance for Software Supply Chain Integrity
by Ken Lew, Arijet Sarker, Simeon Wuthier, Jinoh Kim, Jonghyun Kim and Sang-Yoon Chang
Appl. Sci. 2024, 14(20), 9262; https://doi.org/10.3390/app14209262 - 11 Oct 2024
Viewed by 705
Abstract
Computing and networking are increasingly implemented in software. We design and build a software build assurance scheme detecting if there have been injections or modifications in the various steps in the software supply chain, including the source code, compiling, and distribution. Building on [...] Read more.
Computing and networking are increasingly implemented in software. We design and build a software build assurance scheme detecting if there have been injections or modifications in the various steps in the software supply chain, including the source code, compiling, and distribution. Building on the reproducible build and software bill of materials (SBOM), our work is distinguished from previous research in assuring multiple software artifacts across the software supply chain. Reproducible build, in particular, enables our scheme, as our scheme requires the software materials/artifacts to be consistent across machines with the same operating system/specifications. Furthermore, we use blockchain to deliver the proof reference, which enables our scheme to be distributed so that the assurance beneficiary and verifier are the same, i.e., the node downloading the software verifies its own materials, artifacts, and outputs. Blockchain also significantly improves the assurance efficiency. We first describe and explain our scheme using abstraction and then implement our scheme to assure Ethereum as the target software to provide concrete proof-of-concept implementation, validation, and experimental analyses. Our scheme enables more significant performance gains than relying on a centralized server thanks to the use of blockchain (e.g., two to three orders of magnitude quicker in verification) and adds small overheads (e.g., generating and verifying proof have an overhead of approximately one second, which is two orders of magnitude smaller than the software download or build processes). Full article
Show Figures

Figure 1

Figure 1
<p>Software supply chain involving SBOM and reproducible build. This diagram illustrates the distribution-platform path, while the other user-direct path without the distribution is not illustrated due to space constraint.</p>
Full article ">Figure 2
<p>Our scheme overview, including information sources and inputs from the authority (providing the assurance reference) and the repository ecosystem. The authority’s reference information delivery is implemented in blockchain in our scheme, while the centralized server approach relies on the online, real-time networking with a remote centralized server.</p>
Full article ">Figure 3
<p>Online process from source code <span class="html-italic">s</span> to build/compilation <span class="html-italic">b</span> to the generation of proof <span class="html-italic">p</span>.</p>
Full article ">Figure 4
<p>Merkle tree application for our scheme, where <math display="inline"><semantics> <msub> <mi>F</mi> <mi>i</mi> </msub> </semantics></math> are the source code <span class="html-italic">s</span> files and the Root is the proof <span class="html-italic">p</span>.</p>
Full article ">Figure 5
<p>The proof verification time between our scheme using distributed blockchain vs. centralized remote servers.</p>
Full article ">Figure 6
<p>Bandwidth performance in assurance resolutions per second in comparison between our scheme and remote server locations.</p>
Full article ">
14 pages, 865 KiB  
Article
Estimating Tail Risk in Ultra-High-Frequency Cryptocurrency Data
by Kostas Giannopoulos, Ramzi Nekhili and Christos Christodoulou-Volos
Int. J. Financial Stud. 2024, 12(4), 99; https://doi.org/10.3390/ijfs12040099 - 8 Oct 2024
Viewed by 763
Abstract
Understanding the density of possible prices in one-minute intervals provides traders, investors, and financial institutions with the data necessary for making informed decisions, managing risk, optimizing trading strategies, and enhancing the overall efficiency of the cryptocurrency market. While high accuracy is critical for [...] Read more.
Understanding the density of possible prices in one-minute intervals provides traders, investors, and financial institutions with the data necessary for making informed decisions, managing risk, optimizing trading strategies, and enhancing the overall efficiency of the cryptocurrency market. While high accuracy is critical for researchers and investors, market nonlinearity and hidden dependencies pose challenges. In this study, the filtered historical simulation is used to generate pathways for the next hour on the one-minute step for Bitcoin and Ethereum quotes. The innovations in the simulation are standardized historical returns resampled with the method of block bootstrapping, which helps to capture any hidden dependencies in the residuals of a conditional parameterization in the mean and variance. Ordinary bootstrapping requires the feed innovations to be free of any dependencies. To deal with complex data structures and dependencies found in ultra-high-frequency data, this study employs block bootstrap to resample contiguous segments, thereby preserving the sequential dependencies and sectoral clustering within the market. These techniques enhance decision-making and risk measures in investment strategies despite the complexities inherent in financial data. This offers a new dimension in measuring the market risk of cryptocurrency prices and can help market participants price these assets, as well as improve the timing of their entry and exit trades. Full article
(This article belongs to the Special Issue Digital and Conventional Assets (2nd Edition))
Show Figures

Figure 1

Figure 1
<p>Bootstrap mean squared error at different block lengths panel. The red dot corresponds to the optimal block length that minimizes the MSE. Panel (<b>a</b>) shows that the optimal block length for Bitcoin is five (5), and that of Ethereum is two (2) (Panel <b>b</b>).</p>
Full article ">Figure 2
<p>Forecast confidence bands: block vs. regular bootstrap. For both panels (<b>a</b>,<b>b</b>), the forecasted bands are at 99.9% and 0.1% confidence levels.</p>
Full article ">
32 pages, 8458 KiB  
Article
Cutting-Edge Amalgamation of Web 3.0 and Hybrid Chaotic Blockchain Authentication for Healthcare 4.0
by Ajay Kumar, Kumar Abhishek, Surbhi Bhatia Khan, Saeed Alzahrani and Mohammed Alojail
Mathematics 2024, 12(19), 3067; https://doi.org/10.3390/math12193067 - 30 Sep 2024
Viewed by 794
Abstract
Healthcare 4.0 is considered the most promising technology for gathering data from humans and strongly couples with a communication system for precise clinical and diagnosis performance. Though sensor-driven devices have largely made our everyday lives easier, these technologies have been suffering from various [...] Read more.
Healthcare 4.0 is considered the most promising technology for gathering data from humans and strongly couples with a communication system for precise clinical and diagnosis performance. Though sensor-driven devices have largely made our everyday lives easier, these technologies have been suffering from various security challenges. Because of data breaches and privacy issues, this heightens the demand for a comprehensive healthcare solution. Since most healthcare data are sensitive and valuable and transferred mostly via the Internet, the safety and confidentiality of patient data remain an important concern. To face the security challenges in Healthcare 4.0, Web 3.0 and blockchain technology have been increasingly deployed to resolve the security breaches due to their immutability and decentralized properties. In this research article, a Web 3.0 ensemble hybrid chaotic blockchain framework is proposed for effective and secure authentication in the Healthcare 4.0 industry. The proposed framework uses the Infura Web API, Web 3.0, hybrid chaotic keys, Ganache interfaces, and MongoDB. To allow for more secure authentication, an ensemble of scroll and Henon maps is deployed to formulate the high dynamic hashes during the formation of genesis blocks, and all of the data are backed in the proposed model. The complete framework was tested in Ethereum blockchain using Web 3.0, in which Python 3.19 is used as the major programming tool for developing the different interfaces. Formal analysis is carried out with Burrows–Abadi–Needham Logic (BAN) to assess the cybersecurity reliability of the suggested framework, and NIST standard tests are used for a thorough review. Furthermore, the robustness of the proposed blockchain is also measured and compared with the other secured blockchain frameworks. Experimental results demonstrate that the proposed model exhibited more defensive characteristics against multiple attacks and outperformed the other models in terms of complexity and robustness. Finally, the paper gives a panoramic view of integrating Web 3.0 with the blockchain and the inevitable directions of a secured authentication framework for Healthcare 4.0. Full article
Show Figures

Figure 1

Figure 1
<p>Proposed blockchain framework—B-WAKEN-CHAIN.</p>
Full article ">Figure 2
<p>Cubic nonlinear system phase pictures in first state with <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>p</mi> </mrow> <mrow> <mn>1</mn> </mrow> </msub> <mrow> <mrow> <mi mathvariant="italic">tanh</mi> </mrow> <mo>⁡</mo> <mrow> <mo>(</mo> </mrow> </mrow> <msub> <mrow> <mi>x</mi> </mrow> <mrow> <mn>2</mn> </mrow> </msub> <mo>+</mo> <mi>g</mi> <mo>)</mo> </mrow> </semantics></math> function.</p>
Full article ">Figure 3
<p>Cubic nonlinear structure phase pictures in second state with <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>p</mi> </mrow> <mrow> <mn>1</mn> </mrow> </msub> <mrow> <mrow> <mi mathvariant="italic">tanh</mi> </mrow> <mo>⁡</mo> <mrow> <mo>(</mo> </mrow> </mrow> <msub> <mrow> <mi>x</mi> </mrow> <mrow> <mn>2</mn> </mrow> </msub> <mo>+</mo> <mi>g</mi> <mo>)</mo> </mrow> </semantics></math> function.</p>
Full article ">Figure 4
<p>Cubic nonlinear system phase pictures in third state with <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>p</mi> </mrow> <mrow> <mn>1</mn> </mrow> </msub> <mrow> <mrow> <mi mathvariant="italic">tanh</mi> </mrow> <mo>⁡</mo> <mrow> <mo>(</mo> </mrow> </mrow> <msub> <mrow> <mi>x</mi> </mrow> <mrow> <mn>2</mn> </mrow> </msub> <mo>+</mo> <mi>g</mi> <mo>)</mo> </mrow> </semantics></math> function.</p>
Full article ">Figure 5
<p>The proposed multi-scroll chaotic systems’ fractional bifurcation structures.</p>
Full article ">Figure 6
<p>Henon map characteristics: <span class="html-italic">(</span><b>a</b>) a = 1.4 and b = 1.3; <span class="html-italic">(</span><b>b</b>) a = 2.0 and b = 1.78.</p>
Full article ">Figure 7
<p>Flowchart for the proposed key generation process.</p>
Full article ">Figure 8
<p>Authentication protocol using the proposed chaotic principles in the blockchain.</p>
Full article ">Figure 9
<p>Implementation stages for the deployment of proposed framework.</p>
Full article ">Figure 10
<p>Infura Web 3.0 login for the patients and doctors.</p>
Full article ">Figure 11
<p>Generated chaotic keys deployed in the Ethereum blockchain.</p>
Full article ">Figure 12
<p>Connecting to the Ethereum blockchain using the Infura API.</p>
Full article ">Figure 13
<p>Web 3.0 interfaces to access the Ethereum blockchain.</p>
Full article ">Figure 14
<p>Transaction time analysis for the proposed framework.</p>
Full article ">Figure 15
<p>Transaction time analysis for the different bit lengths using the proposed framework.</p>
Full article ">Figure 16
<p>Comparative analysis of the different frameworks for average of 100 transactions.</p>
Full article ">Figure 17
<p>Comparative analysis of the different frameworks for average of 200 transactions.</p>
Full article ">Figure 18
<p>AVISPA tool-generated output of proposed model.</p>
Full article ">Figure 19
<p>Authentication performance measurement: FAR and FRR.</p>
Full article ">
35 pages, 6382 KiB  
Article
Blockchain-Driven Generalization of Policy Management for Multiproduct Insurance Companies
by Abraham Romero and Roberto Hernandez
Future Internet 2024, 16(10), 356; https://doi.org/10.3390/fi16100356 - 30 Sep 2024
Viewed by 1756
Abstract
This article presents a Blockchain-based solution for the management of multipolicies in insurance companies, introducing a standardized policy model to facilitate streamlined operations and enhance collaboration between entities. The model ensures uniform policy management, providing scalability and flexibility to adapt to new market [...] Read more.
This article presents a Blockchain-based solution for the management of multipolicies in insurance companies, introducing a standardized policy model to facilitate streamlined operations and enhance collaboration between entities. The model ensures uniform policy management, providing scalability and flexibility to adapt to new market demands. The solution leverages Merkle trees for secure data management, with each policy represented by an independent Merkle tree, enabling updates and additions without altering existing policies. The architecture, implemented on a private Ethereum network using Hyperledger Besu and Tessera, ensures secure and transparent transactions, robust dispute resolution, and fraud prevention mechanisms. The validation phase demonstrated the model’s efficiency in reducing data redundancy and ensuring the consistency and integrity of policy information. Additionally, the system’s technical management has been simplified, operational redundancies have been eliminated, and privacy is enhanced. Full article
Show Figures

Figure 1

Figure 1
<p>Client use cases.</p>
Full article ">Figure 2
<p>Architecture comprehensive management system current model.</p>
Full article ">Figure 3
<p>Policy modeling.</p>
Full article ">Figure 4
<p>Leaf node as policy.</p>
Full article ">Figure 5
<p>Tree root as a policy.</p>
Full article ">Figure 6
<p>Architecture design Blockchain.</p>
Full article ">Figure 7
<p>Merkle example.</p>
Full article ">Figure 8
<p>Blockchain example.</p>
Full article ">Figure 9
<p>Technology stack.</p>
Full article ">Figure 10
<p>ibftConfigFile.</p>
Full article ">Figure 11
<p>Besu project structure definition.</p>
Full article ">Figure 12
<p>Tessera operation.</p>
Full article ">Figure 13
<p>Tessera node configuration.</p>
Full article ">Figure 14
<p>Anchoring protocol.</p>
Full article ">Figure 15
<p>UML class diagram modeling multi-product insurance policy.</p>
Full article ">Figure 16
<p>UML smart-contract representation.</p>
Full article ">Figure 17
<p>Smart-contract operations sequence diagram.</p>
Full article ">Figure 18
<p>DAPP Design.</p>
Full article ">Figure A1
<p>DAPP Login.</p>
Full article ">Figure A2
<p>DAPP initial view.</p>
Full article ">Figure A3
<p>Conctract Policy operation.</p>
Full article ">Figure A4
<p>Conctract Policy operation successive step.</p>
Full article ">Figure A5
<p>Blockchain transaction log.</p>
Full article ">Figure A6
<p>View policy action.</p>
Full article ">
29 pages, 8143 KiB  
Article
Inner Multifractal Dynamics in the Jumps of Cryptocurrency and Forex Markets
by Haider Ali, Muhammad Aftab, Faheem Aslam and Paulo Ferreira
Fractal Fract. 2024, 8(10), 571; https://doi.org/10.3390/fractalfract8100571 - 29 Sep 2024
Viewed by 1079
Abstract
Jump dynamics in financial markets exhibit significant complexity, often resulting in increased probabilities of subsequent jumps, akin to earthquake aftershocks. This study aims to understand these complexities within a multifractal framework. To do this, we employed the high-frequency intraday data from six major [...] Read more.
Jump dynamics in financial markets exhibit significant complexity, often resulting in increased probabilities of subsequent jumps, akin to earthquake aftershocks. This study aims to understand these complexities within a multifractal framework. To do this, we employed the high-frequency intraday data from six major cryptocurrencies (Bitcoin, Ethereum, Litecoin, Dashcoin, EOS, and Ripple) and six major forex markets (Euro, British pound, Canadian dollar, Australian dollar, Swiss franc, and Japanese yen) between 4 August 2019 and 4 October 2023, at 5 min intervals. We began by extracting daily jumps from realized volatility using a MinRV-based approach and then applying Multifractal Detrended Fluctuation Analysis (MFDFA) to those jumps to explore their multifractal characteristics. The results of the MFDFA—especially the fluctuation function, the varying Hurst exponent, and the Renyi exponent—confirm that all of these jump series exhibit significant multifractal properties. However, the range of the Hurst exponent values indicates that Dashcoin has the highest and Litecoin has the lowest multifractal strength. Moreover, all of the jump series show significant persistent behavior and a positive autocorrelation, indicating a higher probability of a positive/negative jump being followed by another positive/negative jump. Additionally, the findings of rolling-window MFDFA with a window length of 250 days reveal persistent behavior most of the time. These findings are useful for market participants, investors, and policymakers in developing portfolio diversification strategies and making important investment decisions, and they could enhance market efficiency and stability. Full article
(This article belongs to the Special Issue Complex Dynamics and Multifractal Analysis of Financial Markets)
Show Figures

Figure 1

Figure 1
<p>5 min high-frequency returns of cryptocurrency markets.</p>
Full article ">Figure 2
<p>5 min high-frequency returns of forex markets.</p>
Full article ">Figure 3
<p>Daily jump estimates of cryptocurrency markets derived from 5 min high-frequency data.</p>
Full article ">Figure 4
<p>Daily jump estimates of forex markets derived from 5 min high frequency data.</p>
Full article ">Figure 5
<p>This figure presents the MFDFA outcomes pertaining to the jumps observed in cryptocurrency markets. In the (<b>top-left</b>) section, fluctuation functions for <span class="html-italic">q</span> = 10, <span class="html-italic">q</span> = 0, and <span class="html-italic">q</span> = −10 are displayed. The (<b>top-right</b>) segment illustrates the GHE corresponding to each <span class="html-italic">q</span> value. Additionally, the (<b>bottom-left</b>) section showcases the Mass exponent, <span class="html-italic">τ</span>(<span class="html-italic">q</span>), while the (<b>bottom-right</b>) portion presents the Multifractal Spectrum.</p>
Full article ">Figure 6
<p>This figure presents the MFDFA outcomes pertaining to the jumps observed in forex markets. In the (<b>top-left</b>) section, fluctuation functions for <span class="html-italic">q</span> = 10, <span class="html-italic">q</span> = 0, and <span class="html-italic">q</span> = −10 are displayed. The (<b>top-right</b>) segment illustrates the GHE corresponding to each <span class="html-italic">q</span> value. Additionally, the (<b>bottom-left</b>) section showcases the Mass exponent, <span class="html-italic">τ</span>(<span class="html-italic">q</span>), while the (<b>bottom-right</b>) portion presents the Multifractal Spectrum.</p>
Full article ">Figure 7
<p>Dynamic Hurst exponent evolution of the jumps of cryptocurrencies (<math display="inline"><semantics> <mrow> <mi>q</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <mi>w</mi> <mi>i</mi> <mi>n</mi> <mi>d</mi> <mi>o</mi> <mi>w</mi> <mo>=</mo> <mn>250</mn> </mrow> </semantics></math>).</p>
Full article ">Figure 8
<p>Dynamic Hurst exponent evolution of the jumps of forex markets (<math display="inline"><semantics> <mrow> <mi>q</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <mi>w</mi> <mi>i</mi> <mi>n</mi> <mi>d</mi> <mi>o</mi> <mi>w</mi> <mo>=</mo> <mn>250</mn> </mrow> </semantics></math>).</p>
Full article ">
32 pages, 552 KiB  
Article
Bayesian Lower and Upper Estimates for Ether Option Prices with Conditional Heteroscedasticity and Model Uncertainty
by Tak Kuen Siu
J. Risk Financial Manag. 2024, 17(10), 436; https://doi.org/10.3390/jrfm17100436 - 29 Sep 2024
Viewed by 519
Abstract
This paper aims to leverage Bayesian nonlinear expectations to construct Bayesian lower and upper estimates for prices of Ether options, that is, options written on Ethereum, with conditional heteroscedasticity and model uncertainty. Specifically, a discrete-time generalized conditional autoregressive heteroscedastic (GARCH) model is used [...] Read more.
This paper aims to leverage Bayesian nonlinear expectations to construct Bayesian lower and upper estimates for prices of Ether options, that is, options written on Ethereum, with conditional heteroscedasticity and model uncertainty. Specifically, a discrete-time generalized conditional autoregressive heteroscedastic (GARCH) model is used to incorporate conditional heteroscedasticity in the logarithmic returns of Ethereum, and Bayesian nonlinear expectations are adopted to introduce model uncertainty, or ambiguity, about the conditional mean and volatility of the logarithmic returns of Ethereum. Extended Girsanov’s principle is employed to change probability measures for introducing a family of alternative GARCH models and their risk-neutral counterparts. The Bayesian credible intervals for “uncertain” drift and volatility parameters obtained from conjugate priors and residuals obtained from the estimated GARCH model are used to construct Bayesian superlinear and sublinear expectations giving the Bayesian lower and upper estimates for the price of an Ether option, respectively. Empirical and simulation studies are provided using real data on Ethereum in AUD. Comparisons with a model incorporating conditional heteroscedasticity only and a model capturing ambiguity only are presented. Full article
Show Figures

Figure 1

Figure 1
<p>Time series plots for adjusted close prices and log returns.</p>
Full article ">Figure 2
<p>SACF and SPACF plots for log returns.</p>
Full article ">
17 pages, 4088 KiB  
Article
A Blockchain-Based Security Framework for East-West Interface of SDN
by Hamad Alrashede, Fathy Eassa, Abdullah Marish Ali, Faisal Albalwy and Hosam Aljihani
Electronics 2024, 13(19), 3799; https://doi.org/10.3390/electronics13193799 - 25 Sep 2024
Viewed by 921
Abstract
Software-Defined Networking (SDN) has emerged as a revolutionary architecture in computer networks, offering comprehensive network control and monitoring capabilities. However, securing the east–west interface, which is crucial for communication between distributed SDN controllers, remains a significant challenge. This study proposes a novel blockchain-based [...] Read more.
Software-Defined Networking (SDN) has emerged as a revolutionary architecture in computer networks, offering comprehensive network control and monitoring capabilities. However, securing the east–west interface, which is crucial for communication between distributed SDN controllers, remains a significant challenge. This study proposes a novel blockchain-based security framework that integrates Ethereum technology with customized blockchain algorithms for authentication, encryption, and access control. The framework introduces decentralized mechanisms to protect against diverse attacks, including false data injection, man-in-the-middle (MitM), and unauthorized access. Experimental results demonstrate the effectiveness of this framework in securing distributed controllers while maintaining high network performance and low latency, paving the way for more resilient and trustworthy SDN infrastructures. Full article
Show Figures

Figure 1

Figure 1
<p>Market Revenue of SDN Worldwide [<a href="#B3-electronics-13-03799" class="html-bibr">3</a>].</p>
Full article ">Figure 2
<p>Layered Architecture of SDN.</p>
Full article ">Figure 3
<p>Proposed Blockchain-Based Security Framework Architecture.</p>
Full article ">Figure 4
<p>Transactions within the distributed ledger. All identifications, public keys, and privileges of the participated controllers are stored in the distributed ledger.</p>
Full article ">Figure 5
<p>Registration phase Process.</p>
Full article ">Figure 6
<p>Mutual authentication Process.</p>
Full article ">Figure 7
<p>The process of messages Encryption/Decryption, Controller 1 signs a message with its private key, encrypts it using the recipient’s (Controller 2) public key, and transmits the encrypted message through the Ethereum blockchain. Once the transaction is read from the blockchain by Controller 2, it decrypts the message using its private key. Finally, Controller 2 validates the message using Controller 1’s public key.</p>
Full article ">Figure 8
<p>A smart contract deployed on Ganache, using Rimex. Controllers, equipped with public/private key pairs, registered on the blockchain and connected using web3.py API.</p>
Full article ">Figure 9
<p>Registration phase latency.</p>
Full article ">Figure 10
<p>Authentication phase latency.</p>
Full article ">Figure 11
<p>System throughput.</p>
Full article ">Figure 12
<p>Authentication time of the proposed scheme as compared to other schemes [<a href="#B14-electronics-13-03799" class="html-bibr">14</a>,<a href="#B15-electronics-13-03799" class="html-bibr">15</a>,<a href="#B16-electronics-13-03799" class="html-bibr">16</a>].</p>
Full article ">
14 pages, 377 KiB  
Article
Anonymous Access System with Limited Number of Uses in a Trustless Environment
by Francesc Garcia-Grau, Jordi Herrera-Joancomartí and Aleix Dorca Josa
Appl. Sci. 2024, 14(19), 8581; https://doi.org/10.3390/app14198581 - 24 Sep 2024
Viewed by 585
Abstract
This article proposes a novel method for managing usage counters within an anonymous credential system, addressing the limitation of traditional anonymous credentials in tracking repeated use. The method takes advantage of blockchain technology through Smart Contracts deployed on the Ethereum network to enforce [...] Read more.
This article proposes a novel method for managing usage counters within an anonymous credential system, addressing the limitation of traditional anonymous credentials in tracking repeated use. The method takes advantage of blockchain technology through Smart Contracts deployed on the Ethereum network to enforce a predetermined maximum number of uses for a given credential. Users retain control over increments by providing zero-knowledge proofs (ZKPs) demonstrating private key possession and agreement on the increment value. This approach prevents replay attacks and ensures transparency and security. A prototype implementation on a private Ethereum blockchain demonstrates the feasibility and efficiency of the proposed method, paving the way for its potential deployment in real-world applications requiring both anonymity and usage tracking. Full article
(This article belongs to the Collection Innovation in Information Security)
Show Figures

Figure 1

Figure 1
<p>Overview of the protocol interactions.</p>
Full article ">Figure 2
<p>Data and call flow between <math display="inline"><semantics> <mi mathvariant="script">U</mi> </semantics></math>, <math display="inline"><semantics> <mi mathvariant="script">SP</mi> </semantics></math> and the blockchain during the access counter creation protocol.</p>
Full article ">Figure 3
<p>Message exchange between <math display="inline"><semantics> <mi mathvariant="script">U</mi> </semantics></math> and <math display="inline"><semantics> <mi mathvariant="script">SP</mi> </semantics></math> during the <span class="html-italic">i</span>-th iteration of the access counter usage protocol.</p>
Full article ">
19 pages, 4850 KiB  
Article
IoT-GChain: Internet of Things-Assisted Secure and Tractable Grain Supply Chain Framework Leveraging Blockchain
by Karan Singh Thakur, Rohit Ahuja and Raman Singh
Electronics 2024, 13(18), 3740; https://doi.org/10.3390/electronics13183740 - 20 Sep 2024
Viewed by 844
Abstract
The grain supply chain is crucial for any nation’s self-sustainability due to its huge impact on food security, economic stability, and the livelihoods of several people. The path grain takes from farmers to consumers is opaque and complicated, due to which consumers cannot [...] Read more.
The grain supply chain is crucial for any nation’s self-sustainability due to its huge impact on food security, economic stability, and the livelihoods of several people. The path grain takes from farmers to consumers is opaque and complicated, due to which consumers cannot trust grain quality and its origin. Although blockchain is widely used for fair and secure transactions between farmers and buyers, issues related to transparency and traceability in the grain supply chain, such as counterfeiting and middlemen involvement, have not been adequately addressed. To tackle these issues, a blockchain-based solution is proposed that unites farmers, warehouses, government central and state agencies, transporters, and food corporations on a single platform to enhance transparency, traceability, and trust among all parties. This system involves minting a non-fungible token (NFT) corresponding to each lot of grain approved by government officials. The NFT comprises grain quality, type, temperature data from sensors, weight, and ownership information, which updates as the grain lot moves across the supply chain from central agencies to state agencies and so on. NFTs enable stakeholders to track the grain lot from cultivation to end-users, providing insights into grain conditions and quality. An Internet of Things-based circuit is designed using a Digital-output relative humidity & temperature (DHT22) sensor, which offers real-time temperature and humidity readings, and geolocation coordinates are gathered from the GPS module across the supply chain. Farmers can directly interact with warehouses to sell grains, eliminating the need for middlemen and fostering trust among all parties. The proposed four-tier framework is implemented and deployed on the Ethereum network, with smart contracts interacting with React-based web pages. Analysis and results of the proposed model illustrate that it is viable, secure, and superior to the existing grain supply chain system. Full article
Show Figures

Figure 1

Figure 1
<p>Existing grain distribution.</p>
Full article ">Figure 2
<p>Blockchain.</p>
Full article ">Figure 3
<p>Smart contract.</p>
Full article ">Figure 4
<p>Proposed framework.</p>
Full article ">Figure 5
<p>Blockchain nodes interaction.</p>
Full article ">Figure 6
<p>Algorithm flow.</p>
Full article ">Figure 7
<p>Proposed architecture.</p>
Full article ">Figure 8
<p>Temperature monitoring using sensors.</p>
Full article ">Figure 9
<p>Example of gas fees paid.</p>
Full article ">Figure 10
<p>SolidityScan security analysis.</p>
Full article ">
Back to TopTop