Nothing Special   »   [go: up one dir, main page]

You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (289)

Search Parameters:
Keywords = private blockchain

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
15 pages, 2751 KiB  
Article
Improving the Effectiveness of a Stock Simulation Trading Course via Blockchain and Social Networking: A Taiwanese Study
by Shuchih Ernest Chang, Hueimin Luo and Liwen Tseng
Electronics 2024, 13(22), 4338; https://doi.org/10.3390/electronics13224338 - 5 Nov 2024
Viewed by 450
Abstract
Online courses in higher education became prevalent during the COVID-19 pandemic; however, their application requires technology to be fully integrated into the curriculum. This study explores the integration of a blockchain-based platform in a private online stock simulation trading course during the COVID-19 [...] Read more.
Online courses in higher education became prevalent during the COVID-19 pandemic; however, their application requires technology to be fully integrated into the curriculum. This study explores the integration of a blockchain-based platform in a private online stock simulation trading course during the COVID-19 pandemic. Using a pre–post experimental design with 142 college students, it assessed learning behaviors and outcomes. Students collaborated with teaching assistants via LINE groups, fostering discussion and engagement. They received cryptocurrency rewards, which enhanced motivation and connected the course to their career goals. The findings suggest that combining blockchain and social networking is an effective approach to improving online education. This contributes to the literature on educational technology and online learning by exploring the integration of blockchain and social networking in higher education, specifically within the context of stock simulation trading courses, and demonstrates its impact on student motivation and learning outcomes. Full article
Show Figures

Figure 1

Figure 1
<p>Blockchain framework in three layers.</p>
Full article ">Figure 2
<p>Pathway of stock simulation trading platform using blockchain architecture.</p>
Full article ">Figure 3
<p>Web-based server design. (A four-layer structure for the platform).</p>
Full article ">Figure 4
<p>Architecture of a smart contract in the blockchain-based stock trading application.</p>
Full article ">Figure 5
<p>Group members (S1, S2, S3…) share authorized records through LB smart contracts.</p>
Full article ">Figure 6
<p>Relationship between stock trading balance and trading numbers.</p>
Full article ">Figure 7
<p>Standard deviation, mean, and median of the core question for reliability.</p>
Full article ">
27 pages, 1808 KiB  
Review
Transforming Agricultural Productivity with AI-Driven Forecasting: Innovations in Food Security and Supply Chain Optimization
by Sambandh Bhusan Dhal and Debashish Kar
Forecasting 2024, 6(4), 925-951; https://doi.org/10.3390/forecast6040046 - 19 Oct 2024
Viewed by 2121
Abstract
Global food security is under significant threat from climate change, population growth, and resource scarcity. This review examines how advanced AI-driven forecasting models, including machine learning (ML), deep learning (DL), and time-series forecasting models like SARIMA/ARIMA, are transforming regional agricultural practices and food [...] Read more.
Global food security is under significant threat from climate change, population growth, and resource scarcity. This review examines how advanced AI-driven forecasting models, including machine learning (ML), deep learning (DL), and time-series forecasting models like SARIMA/ARIMA, are transforming regional agricultural practices and food supply chains. Through the integration of Internet of Things (IoT), remote sensing, and blockchain technologies, these models facilitate the real-time monitoring of crop growth, resource allocation, and market dynamics, enhancing decision making and sustainability. The study adopts a mixed-methods approach, including systematic literature analysis and regional case studies. Highlights include AI-driven yield forecasting in European hydroponic systems and resource optimization in southeast Asian aquaponics, showcasing localized efficiency gains. Furthermore, AI applications in food processing, such as plasma, ozone and Pulsed Electric Field (PEF) treatments, are shown to improve food preservation and reduce spoilage. Key challenges—such as data quality, model scalability, and prediction accuracy—are discussed, particularly in the context of data-poor environments, limiting broader model applicability. The paper concludes by outlining future directions, emphasizing context-specific AI implementations, the need for public–private collaboration, and policy interventions to enhance scalability and adoption in food security contexts. Full article
Show Figures

Figure 1

Figure 1
<p>Schematic diagram providing a comprehensive review of global food security challenges and limitations.</p>
Full article ">Figure 2
<p>Applications of AI-Driven forecasting models in agriculture, supply chain, and food processing.</p>
Full article ">Figure 3
<p>Challenges and opportunities for AI forecasting technologies in agriculture.</p>
Full article ">
23 pages, 1539 KiB  
Article
Stakeholders’ Perceptions of the Peer-to-Peer Energy Trading Model Using Blockchain Technology in Indonesia
by Faisal Yusuf, Riri Fitri Sari, Purnomo Yusgiantoro and Tri Edhi Budhi Soesilo
Energies 2024, 17(19), 4956; https://doi.org/10.3390/en17194956 - 3 Oct 2024
Viewed by 940
Abstract
The energy transition toward Net Zero Emission by 2060 hinges on the renewable energy power plants in Indonesia. Good practices in several countries suggest a peer-to-peer (P2P) energy trading system using blockchain technology, supported by renewable energy (solar panels), an innovation to provide [...] Read more.
The energy transition toward Net Zero Emission by 2060 hinges on the renewable energy power plants in Indonesia. Good practices in several countries suggest a peer-to-peer (P2P) energy trading system using blockchain technology, supported by renewable energy (solar panels), an innovation to provide equal access to sustainable electricity while reducing the impact of climate change. The P2P energy trading concept has a higher social potential than the conventional electricity buying and selling approach, such as that of PLN (the state-owned electricity company in Indonesia), which applies the network management concept but does not have a sharing element. This model implements a solar-powered mini-grid system and produces a smart contract that facilitates electricity network users to buy, sell, and trade electricity in rural areas via smartphones. This study aims to measure the stakeholders’ perceptions of the peer-to-peer (P2P) energy trading model using blockchain technology in the Gumelar District, Banyumas Regency, Central Java Province, Indonesia. The stakeholders in question are representatives of Households (producers and consumers), Government, State Electricity Company (PLN), Non-Governmental Organizations, Private Sector and Academician. Measurement of perception in this study used a questionnaire approach with a Likert scale. The results of filling out the questionnaire were analyzed using four methods: IFE/EFE matrix; IE matrix; SWOT matrix; and SPACE matrix to assess the results and their suitability to each other. The results of the stakeholder perception assessment show that there are 44 internal factors and 33 external factors that can influence this model. We obtained an IFE and EFE score of 2.92 and 2.83 for the internal and external results using the IE matrix. These place the model in quadrant V, meaning the P2P model can survive in the long term to generate profits. Based on the SWOT analysis results, this model is located at the coordinate point −0.40, 0.31, placing it in quadrant II. This means that the P2P model is in a competitive situation and faces threats but still has internal strengths. Based on the SPACE matrix, stakeholder perception states that the P2P model is at coordinate point 1, −0.3. This shows that the P2P model has the potential to be a competitive advantage in its type of activity that continues to grow. In conclusion, our findings show that stakeholders’ perceptions of P2P models using blockchain technology can be implemented effectively and provide social, economic, and environmental incentives. Full article
(This article belongs to the Section C: Energy Economics and Policy)
Show Figures

Figure 1

Figure 1
<p>Peer-to-Peer Energy Trading System Design in Gumelar.</p>
Full article ">Figure 2
<p>Implementation of a peer-to-peer energy trading model using blockchain technology in the Gumelar District, Banyumas Regency, Central Java Province. (<b>a</b>) Gumelar District office. (<b>b</b>) Solar panel. (<b>c</b>) Battery. (<b>d</b>) Solar-powered mini-grid system. (<b>e</b>) Smart meter. (<b>f</b>) Installation process.</p>
Full article ">Figure 3
<p>Participants Profile. (<b>a</b>) Gender category. (<b>b</b>) Age category. (<b>c</b>) Education category. (<b>d</b>) Work category. (<b>e</b>) Income category.</p>
Full article ">Figure 4
<p>Internal–external matrix.</p>
Full article ">Figure 5
<p>SWOT matrix.</p>
Full article ">Figure 6
<p>SPACE matrix.</p>
Full article ">
35 pages, 6382 KiB  
Article
Blockchain-Driven Generalization of Policy Management for Multiproduct Insurance Companies
by Abraham Romero and Roberto Hernandez
Future Internet 2024, 16(10), 356; https://doi.org/10.3390/fi16100356 - 30 Sep 2024
Viewed by 1769
Abstract
This article presents a Blockchain-based solution for the management of multipolicies in insurance companies, introducing a standardized policy model to facilitate streamlined operations and enhance collaboration between entities. The model ensures uniform policy management, providing scalability and flexibility to adapt to new market [...] Read more.
This article presents a Blockchain-based solution for the management of multipolicies in insurance companies, introducing a standardized policy model to facilitate streamlined operations and enhance collaboration between entities. The model ensures uniform policy management, providing scalability and flexibility to adapt to new market demands. The solution leverages Merkle trees for secure data management, with each policy represented by an independent Merkle tree, enabling updates and additions without altering existing policies. The architecture, implemented on a private Ethereum network using Hyperledger Besu and Tessera, ensures secure and transparent transactions, robust dispute resolution, and fraud prevention mechanisms. The validation phase demonstrated the model’s efficiency in reducing data redundancy and ensuring the consistency and integrity of policy information. Additionally, the system’s technical management has been simplified, operational redundancies have been eliminated, and privacy is enhanced. Full article
Show Figures

Figure 1

Figure 1
<p>Client use cases.</p>
Full article ">Figure 2
<p>Architecture comprehensive management system current model.</p>
Full article ">Figure 3
<p>Policy modeling.</p>
Full article ">Figure 4
<p>Leaf node as policy.</p>
Full article ">Figure 5
<p>Tree root as a policy.</p>
Full article ">Figure 6
<p>Architecture design Blockchain.</p>
Full article ">Figure 7
<p>Merkle example.</p>
Full article ">Figure 8
<p>Blockchain example.</p>
Full article ">Figure 9
<p>Technology stack.</p>
Full article ">Figure 10
<p>ibftConfigFile.</p>
Full article ">Figure 11
<p>Besu project structure definition.</p>
Full article ">Figure 12
<p>Tessera operation.</p>
Full article ">Figure 13
<p>Tessera node configuration.</p>
Full article ">Figure 14
<p>Anchoring protocol.</p>
Full article ">Figure 15
<p>UML class diagram modeling multi-product insurance policy.</p>
Full article ">Figure 16
<p>UML smart-contract representation.</p>
Full article ">Figure 17
<p>Smart-contract operations sequence diagram.</p>
Full article ">Figure 18
<p>DAPP Design.</p>
Full article ">Figure A1
<p>DAPP Login.</p>
Full article ">Figure A2
<p>DAPP initial view.</p>
Full article ">Figure A3
<p>Conctract Policy operation.</p>
Full article ">Figure A4
<p>Conctract Policy operation successive step.</p>
Full article ">Figure A5
<p>Blockchain transaction log.</p>
Full article ">Figure A6
<p>View policy action.</p>
Full article ">
14 pages, 377 KiB  
Article
Anonymous Access System with Limited Number of Uses in a Trustless Environment
by Francesc Garcia-Grau, Jordi Herrera-Joancomartí and Aleix Dorca Josa
Appl. Sci. 2024, 14(19), 8581; https://doi.org/10.3390/app14198581 - 24 Sep 2024
Viewed by 595
Abstract
This article proposes a novel method for managing usage counters within an anonymous credential system, addressing the limitation of traditional anonymous credentials in tracking repeated use. The method takes advantage of blockchain technology through Smart Contracts deployed on the Ethereum network to enforce [...] Read more.
This article proposes a novel method for managing usage counters within an anonymous credential system, addressing the limitation of traditional anonymous credentials in tracking repeated use. The method takes advantage of blockchain technology through Smart Contracts deployed on the Ethereum network to enforce a predetermined maximum number of uses for a given credential. Users retain control over increments by providing zero-knowledge proofs (ZKPs) demonstrating private key possession and agreement on the increment value. This approach prevents replay attacks and ensures transparency and security. A prototype implementation on a private Ethereum blockchain demonstrates the feasibility and efficiency of the proposed method, paving the way for its potential deployment in real-world applications requiring both anonymity and usage tracking. Full article
(This article belongs to the Collection Innovation in Information Security)
Show Figures

Figure 1

Figure 1
<p>Overview of the protocol interactions.</p>
Full article ">Figure 2
<p>Data and call flow between <math display="inline"><semantics> <mi mathvariant="script">U</mi> </semantics></math>, <math display="inline"><semantics> <mi mathvariant="script">SP</mi> </semantics></math> and the blockchain during the access counter creation protocol.</p>
Full article ">Figure 3
<p>Message exchange between <math display="inline"><semantics> <mi mathvariant="script">U</mi> </semantics></math> and <math display="inline"><semantics> <mi mathvariant="script">SP</mi> </semantics></math> during the <span class="html-italic">i</span>-th iteration of the access counter usage protocol.</p>
Full article ">
24 pages, 1530 KiB  
Article
DFly: A Publicly Auditable and Privacy-Preserving UAS Traffic Management System on Blockchain
by Frederico Baptista, Marina Dehez-Clementi and Jonathan Detchart
Drones 2024, 8(8), 410; https://doi.org/10.3390/drones8080410 - 21 Aug 2024
Viewed by 863
Abstract
The integration of Unmanned Aircraft Systems (UASs) into the current airspace poses significant challenges in terms of safety, security, and operability. As an example, in 2019, the European Union defined a set of rules to support the digitalization of UAS traffic management (UTM) [...] Read more.
The integration of Unmanned Aircraft Systems (UASs) into the current airspace poses significant challenges in terms of safety, security, and operability. As an example, in 2019, the European Union defined a set of rules to support the digitalization of UAS traffic management (UTM) systems and services, namely the U-Space regulations. Current propositions opted for a centralized and private model, concentrated around governmental authorities (e.g., AlphaTango provides the Registration service and depends on the French government). In this paper, we advocate in favor of a more decentralized and transparent model in order to improve safety, security, operability among UTM stakeholders, and legal compliance. As such, we propose DFly, a publicly auditable and privacy-preserving UAS traffic management system on Blockchain, with two initial services: Registration and Flight Authorization. We demonstrate that the use of a blockchain guarantees the public auditability of the two services and corresponding service providers’ actions. In addition, it facilitates the comprehensive and distributed monitoring of airspace occupation and the integration of additional functionalities (e.g., the creation of a live UAS tracker). The combination with zero-knowledge proofs enables the deployment of an automated, distributed, transparent, and privacy-preserving Flight Authorization service, performed on-chain thanks to the blockchain logic. In addition to its construction, this paper details the instantiation of the proposed UTM system with the Ethereum Sepolia’s testnet and the Groth16 ZK-SNARK protocol. On-chain (gas cost) and off-chain (execution time) performance analyses confirm that the proposed solution is a viable and efficient alternative in the spirit of digitalization and offers additional security guarantees. Full article
(This article belongs to the Section Innovative Urban Mobility)
Show Figures

Figure 1

Figure 1
<p>Workflow for flight authorization service.</p>
Full article ">Figure 2
<p>Use case diagram of the proposed U-Space-compliant Blockchain-based ZKP-enhanced flight authorization service and identification of the items relevant for performance evaluation.</p>
Full article ">Figure 3
<p>All possible configuration combinations of a flight request.</p>
Full article ">Figure 4
<p>Sequence diagram of the request UAS/operator functionality.</p>
Full article ">Figure 5
<p>Sequence diagram of the flight request functionality.</p>
Full article ">Figure 6
<p>Management of different Merkle Trees in the architecture.</p>
Full article ">Figure 7
<p>Event Information on Etherscan Block Explorer.</p>
Full article ">Figure 8
<p>Proof generation time.</p>
Full article ">Figure 9
<p>Number of constraints according to Merkle Tree depth and the hash function used (here, Poseidon and Anemoi).</p>
Full article ">
20 pages, 3294 KiB  
Article
Blockchain-Based Model for Incentivized Cyber Threat Intelligence Sharing
by Algimantas Venčkauskas, Vacius Jusas, Dominykas Barisas and Boriss Misnevs
Appl. Sci. 2024, 14(16), 6872; https://doi.org/10.3390/app14166872 - 6 Aug 2024
Viewed by 814
Abstract
Sharing cyber threat intelligence (CTI) can significantly improve the security of information technology (IT) in organizations. However, stakeholders and practitioners are not keen on sharing CTI data due to the risk of exposing their private data and possibly losing value as an organization [...] Read more.
Sharing cyber threat intelligence (CTI) can significantly improve the security of information technology (IT) in organizations. However, stakeholders and practitioners are not keen on sharing CTI data due to the risk of exposing their private data and possibly losing value as an organization on the market. We present a model for CTI data sharing that maintains trust and confidentiality and incentivizes the sharing process. The novelty of the proposed model is that it combines two incentive mechanisms: money and reputation. The reputation incentive is important for ensuring trust in the shared CTI data. The monetary incentive is important for motivating the sharing and consumption of CTI data. The incentives are based on a subscription fee and a reward score for activities performed by a user. User activities are considered in the following three fields: producing CTI data, consuming CTI data, and reviewing CTI data. Each instance of user activity is rewarded with a score, and this score generates some value for reputation. An algorithm is proposed for assigning reward scores and for recording the accumulated reputation of the user. This model is implemented on the Hyperledger Fabric blockchain and the Interplanetary File System for storing data off-chain. The implemented prototype demonstrates the feasibility of the proposed model. The provided simulation shows that the selected values and the proposed algorithm used to calculate the reward scores are in accordance with economic laws. Full article
Show Figures

Figure 1

Figure 1
<p>Pillars of the model.</p>
Full article ">Figure 2
<p>View of Hyperledger Fabric network and client.</p>
Full article ">Figure 3
<p>Data structures used in smart contracts.</p>
Full article ">Figure 4
<p>The general process of uploading and retrieving CTI data.</p>
Full article ">Figure 5
<p>The process of uploading CTI data into IPFS.</p>
Full article ">Figure 6
<p>Workflow of review of CTI data.</p>
Full article ">Figure 7
<p>The user interface of the designed application.</p>
Full article ">Figure 8
<p>The user interface for the reviewer.</p>
Full article ">Figure 9
<p>Value of reward score based on the number of participants.</p>
Full article ">
13 pages, 3978 KiB  
Proceeding Paper
Analysis of Data Sharing Systems in the Context of Industry 4.0 via Blockchain in 5G Mobile Networks
by Teodora Hristova, Grigor Mihaylov, Peyo Hristov and Albena Taneva
Eng. Proc. 2024, 70(1), 2; https://doi.org/10.3390/engproc2024070002 - 23 Jul 2024
Viewed by 582
Abstract
The article discusses the advantages and disadvantages of Blockchain technologies. The types of distributed networks are defined and established as open, closed, consortium, and hybrid. Due to the variety of platforms in the Industry 4.0 society, which cannot be distinguished exactly as one [...] Read more.
The article discusses the advantages and disadvantages of Blockchain technologies. The types of distributed networks are defined and established as open, closed, consortium, and hybrid. Due to the variety of platforms in the Industry 4.0 society, which cannot be distinguished exactly as one type among those listed, the advantages and disadvantages of public and private networks are analyzed. Creating a real project requires compliance with various criteria. The synergism of standard and specialized environmental factors suggests difficulty in developing a techno-economic analysis for a specific task. Therefore, a SWOT analysis is proposed through which strengths and weaknesses, threats, and challenges are determined. To reduce the impact of threats and weaknesses when implementing technology in the industry, a combination of an Enterprise Resource Planning (shortly ERP) software platform and a fast data-transfer environment (such as 5G) is proposed. For this purpose, the features of the latter, which overcome threats and weaknesses, are established. It is established that the collaborative integration of technologies fosters business growth enhances economic impact, and serves as a strong foundation for long-term development across various fronts, positioning ahead of competitors. Full article
Show Figures

Figure 1

Figure 1
<p>Mutual influence of the three areas of sustainable development during digitization in the industry with Blockchain—ecological, social, and economic.</p>
Full article ">Figure 2
<p>Private or public Blockchain in the industry.</p>
Full article ">Figure 3
<p>Compact representation of the ERP element modules.</p>
Full article ">Figure 4
<p>Blockchain technology and ERP system.</p>
Full article ">Figure 5
<p>Blockchain integrated with 5G networks.</p>
Full article ">Figure 6
<p>Mutual influence of Blockchain, ERP, and 5G.</p>
Full article ">
28 pages, 3061 KiB  
Article
BFLIDS: Blockchain-Driven Federated Learning for Intrusion Detection in IoMT Networks
by Khadija Begum, Md Ariful Islam Mozumder, Moon-Il Joo and Hee-Cheol Kim
Sensors 2024, 24(14), 4591; https://doi.org/10.3390/s24144591 - 15 Jul 2024
Cited by 1 | Viewed by 1581
Abstract
The Internet of Medical Things (IoMT) has significantly advanced healthcare, but it has also brought about critical security challenges. Traditional security solutions struggle to keep pace with the dynamic and interconnected nature of IoMT systems. Machine learning (ML)-based Intrusion Detection Systems (IDS) have [...] Read more.
The Internet of Medical Things (IoMT) has significantly advanced healthcare, but it has also brought about critical security challenges. Traditional security solutions struggle to keep pace with the dynamic and interconnected nature of IoMT systems. Machine learning (ML)-based Intrusion Detection Systems (IDS) have been increasingly adopted to counter cyberattacks, but centralized ML approaches pose privacy risks due to the single points of failure (SPoFs). Federated Learning (FL) emerges as a promising solution, enabling model updates directly on end devices without sharing private data with a central server. This study introduces the BFLIDS, a Blockchain-empowered Federated Learning-based IDS designed to enhance security and intrusion detection in IoMT networks. Our approach leverages blockchain to secure transaction records, FL to maintain data privacy by training models locally, IPFS for decentralized storage, and MongoDB for efficient data management. Ethereum smart contracts (SCs) oversee and secure all interactions and transactions within the system. We modified the FedAvg algorithm with the Kullback–Leibler divergence estimation and adaptive weight calculation to boost model accuracy and robustness against adversarial attacks. For classification, we implemented an Adaptive Max Pooling-based Convolutional Neural Network (CNN) and a modified Bidirectional Long Short-Term Memory (BiLSTM) with attention and residual connections on Edge-IIoTSet and TON-IoT datasets. We achieved accuracies of 97.43% (for CNNs and Edge-IIoTSet), 96.02% (for BiLSTM and Edge-IIoTSet), 98.21% (for CNNs and TON-IoT), and 97.42% (for BiLSTM and TON-IoT) in FL scenarios, which are competitive with centralized methods. The proposed BFLIDS effectively detects intrusions, enhancing the security and privacy of IoMT networks. Full article
(This article belongs to the Special Issue Intelligent Solutions for Cybersecurity)
Show Figures

Figure 1

Figure 1
<p>Deployment and detection-based Intrusion Detection Systems.</p>
Full article ">Figure 2
<p>Proposed BC-enabled FL architecture for IoMT intrusion detection.</p>
Full article ">Figure 3
<p>CNN model used as an ML classifier at the local client’s end.</p>
Full article ">Figure 4
<p>BiLSTM model used as an ML classifier at the local client’s end.</p>
Full article ">Figure 5
<p>Rounds vs. accuracy of centralized vs. Federated Learning on the Edge-IIotSet dataset (<b>a</b>,<b>b</b>), and TON-IoT Dataset (<b>c</b>,<b>d</b>): (<b>a</b>) CNN Performance on Edge-IIoTSet; (<b>b</b>) BiLSTM Performance on Edge-IIoTSet; (<b>c</b>) CNN Performance on TON-IoT; and (<b>d</b>) BiLSTM Performance on TON-IoT.</p>
Full article ">Figure 5 Cont.
<p>Rounds vs. accuracy of centralized vs. Federated Learning on the Edge-IIotSet dataset (<b>a</b>,<b>b</b>), and TON-IoT Dataset (<b>c</b>,<b>d</b>): (<b>a</b>) CNN Performance on Edge-IIoTSet; (<b>b</b>) BiLSTM Performance on Edge-IIoTSet; (<b>c</b>) CNN Performance on TON-IoT; and (<b>d</b>) BiLSTM Performance on TON-IoT.</p>
Full article ">Figure 6
<p>ROC curve (True Positive rate vs. False Positive rate) for the Edge-IIotSet Dataset (<b>a</b>,<b>b</b>), and TON-IoT Dataset (<b>c</b>,<b>d</b>): (<b>a</b>) CNN Performance on Edge-IIoTSet; (<b>b</b>) BiLSTM Performance on Edge-IIoTSet; (<b>c</b>) CNN Performance on TON-IoT; and (<b>d</b>) BiLSTM Performance on TON-IoT.</p>
Full article ">Figure 6 Cont.
<p>ROC curve (True Positive rate vs. False Positive rate) for the Edge-IIotSet Dataset (<b>a</b>,<b>b</b>), and TON-IoT Dataset (<b>c</b>,<b>d</b>): (<b>a</b>) CNN Performance on Edge-IIoTSet; (<b>b</b>) BiLSTM Performance on Edge-IIoTSet; (<b>c</b>) CNN Performance on TON-IoT; and (<b>d</b>) BiLSTM Performance on TON-IoT.</p>
Full article ">Figure 7
<p>Successful deployment of smart contracts and functions.</p>
Full article ">Figure 8
<p>Decrease in latency with the progression of FL rounds.</p>
Full article ">Figure 9
<p>Security analysis of developed smart contracts using OYENTE.</p>
Full article ">
23 pages, 2181 KiB  
Article
The Role of Blockchain-Secured Digital Twins in Promoting Smart Energy Performance-Based Contracts for Buildings
by Mohamed Nour El-Din, João Poças Martins, Nuno M. M. Ramos and Pedro F. Pereira
Energies 2024, 17(14), 3392; https://doi.org/10.3390/en17143392 - 10 Jul 2024
Viewed by 863
Abstract
Energy performance-based contracts (EPCs) offer a promising solution for enhancing the energy performance of buildings, which is an overarching step towards achieving Net Zero Carbon Buildings, addressing climate change and improving occupants’ comfort. Despite their potential, their execution is constrained by difficulties that [...] Read more.
Energy performance-based contracts (EPCs) offer a promising solution for enhancing the energy performance of buildings, which is an overarching step towards achieving Net Zero Carbon Buildings, addressing climate change and improving occupants’ comfort. Despite their potential, their execution is constrained by difficulties that hinder their diffusion in the architecture, engineering, construction, and operation industry. Notably, the Measurement and Verification process is considered a significant impediment due to data sharing, storage, and security challenges. Nevertheless, there have been minimal efforts to analyze research conducted in this field systematically. A systematic analysis of 113 identified journal articles was conducted to fill this gap. A paucity of research tackling the utilization of digital technologies to enhance the implementation of EPCs was found. Consequently, this article proposes a framework integrating Digital Twin and Blockchain technologies to provide an enhanced EPC execution environment. Digital Twin technology leverages the system by monitoring and evaluating energy performance in real-time, predicting future performance, and facilitating informed decisions. Blockchain technology ensures the integrity, transparency, and accountability of information. Moreover, a private Blockchain infrastructure was originally introduced in the framework to eliminate high transaction costs related to on-chain storage and potential concerns regarding the confidentiality of information in open distributed ledgers. Full article
(This article belongs to the Special Issue Solutions towards Zero Carbon Buildings)
Show Figures

Figure 1

Figure 1
<p>Energy Performance-based Contracting.</p>
Full article ">Figure 2
<p>Systematic review methodological flowchart.</p>
Full article ">Figure 3
<p>Grouping of articles under study.</p>
Full article ">Figure 4
<p>Number of energy performance-based contract-related publications in the AECO industry by year, from 2013 to 2023.</p>
Full article ">Figure 5
<p>Distribution of studies according to building type.</p>
Full article ">Figure 6
<p>EPC main research topics in the AECO industry.</p>
Full article ">Figure 7
<p>Blockchain-secured Digital Twin framework for smart EPCs.</p>
Full article ">
26 pages, 2516 KiB  
Article
Visual Data and Pattern Analysis for Smart Education: A Robust DRL-Based Early Warning System for Student Performance Prediction
by Wala Bagunaid, Naveen Chilamkurti, Ahmad Salehi Shahraki and Saeed Bamashmos
Future Internet 2024, 16(6), 206; https://doi.org/10.3390/fi16060206 - 11 Jun 2024
Viewed by 1034
Abstract
Artificial Intelligence (AI) and Deep Reinforcement Learning (DRL) have revolutionised e-learning by creating personalised, adaptive, and secure environments. However, challenges such as privacy, bias, and data limitations persist. E-FedCloud aims to address these issues by providing more agile, personalised, and secure e-learning experiences. [...] Read more.
Artificial Intelligence (AI) and Deep Reinforcement Learning (DRL) have revolutionised e-learning by creating personalised, adaptive, and secure environments. However, challenges such as privacy, bias, and data limitations persist. E-FedCloud aims to address these issues by providing more agile, personalised, and secure e-learning experiences. This study introduces E-FedCloud, an AI-assisted, adaptive e-learning system that automates personalised recommendations and tracking, thereby enhancing student performance. It employs federated learning-based authentication to ensure secure and private access for both course instructors and students. Intelligent Software Agents (ISAs) evaluate weekly student engagement using the Shannon Entropy method, classifying students into either engaged or not-engaged clusters. E-FedCloud utilises weekly engagement status, demographic information, and an innovative DRL-based early warning system, specifically ID2QN, to predict the performance of not-engaged students. Based on these predictions, the system categorises students into three groups: risk of dropping out, risk of scoring lower in the final exam, and risk of failing the end exam. It employs a multi-disciplinary ontology graph and an attention-based capsule network for automated, personalised recommendations. The system also integrates performance tracking to enhance student engagement. Data are securely stored on a blockchain using the LWEA encryption method. Full article
Show Figures

Figure 1

Figure 1
<p>Overall system architecture.</p>
Full article ">Figure 2
<p>Number of epochs vs. accuracy.</p>
Full article ">Figure 3
<p>Number of epochs vs F1-Score.</p>
Full article ">Figure 4
<p>Precision vs. recall.</p>
Full article ">Figure 5
<p>True negative rates vs. false negative rates.</p>
Full article ">Figure 6
<p>True positive rates vs. false positive rates.</p>
Full article ">Figure 7
<p>Number of epochs vs. specificity.</p>
Full article ">
20 pages, 5829 KiB  
Article
Research on the Construction of a Blockchain-Based Industrial Product Full Life Cycle Information Traceability System
by Leifeng Xiao, Wenlei Sun, Saike Chang, Cheng Lu and Renben Jiang
Appl. Sci. 2024, 14(11), 4569; https://doi.org/10.3390/app14114569 - 26 May 2024
Viewed by 1121
Abstract
The application of blockchain technology in industrial product quality traceability is analyzed to construct a new model of product quality traceability that is mainly based on blockchain technology and supplemented by an identity system. The blockchain-enabled overall technical architecture of an industrial product [...] Read more.
The application of blockchain technology in industrial product quality traceability is analyzed to construct a new model of product quality traceability that is mainly based on blockchain technology and supplemented by an identity system. The blockchain-enabled overall technical architecture of an industrial product quality traceability system is explored, and a blockchain-based industrial product full life cycle information traceability system is constructed. First, the weights of the information indicators of different links of the industrial equipment information traceability system were calculated using the EAHP hierarchical analysis method. The manufacturing link had the largest weight, with a value of 18.8%. Second, the system’s functional module design is based on the weights. We designed and developed the industrial product information traceability platform based on the hybrid blockchain chain structure of private chain + alliance chain. Finally, a manufacturing enterprise in the Xinjiang region is taken as the research object, query validation is carried out for the products produced by the enterprise, and the average query time of the system is measured to be 65.376 ms. It can meet the traceability needs of consumers and enterprise users. The research can provide theoretical support and reference for the whole life cycle information traceability of industrial products. Full article
Show Figures

Figure 1

Figure 1
<p>Schematic diagram of industrial product information flow system interaction at the manufacturing stage.</p>
Full article ">Figure 2
<p>The overall technical architecture of blockchain-enabled industrial product quality traceability system.</p>
Full article ">Figure 3
<p>Industrial product quality traceability blockchain platform architecture.</p>
Full article ">Figure 4
<p>Operation process of industrial product quality traceability system based on blockchain.</p>
Full article ">Figure 5
<p>Example of test_mycc database.</p>
Full article ">Figure 6
<p>Large screen for monitoring industrial product quality information at the manufacturing stage.</p>
Full article ">Figure 7
<p>Example of a traceability query.</p>
Full article ">Figure 8
<p>Pumping machine part data writing and query time.</p>
Full article ">Figure 9
<p>Text data upload and download.</p>
Full article ">
18 pages, 823 KiB  
Article
Integrating Blockchain and Deep Learning for Enhanced Mobile VPN Forensics: A Comprehensive Framework
by Saad Said Alqahtany and Toqeer Ali Syed
Appl. Sci. 2024, 14(11), 4421; https://doi.org/10.3390/app14114421 - 23 May 2024
Cited by 1 | Viewed by 872
Abstract
In an era marked by technological advancement, the rising reliance on Virtual Private Networks (VPNs) necessitates sophisticated forensic analysis techniques to investigate VPN traffic, especially in mobile environments. This research introduces an innovative approach utilizing Convolutional Neural Networks (CNNs) and Graph Neural Networks [...] Read more.
In an era marked by technological advancement, the rising reliance on Virtual Private Networks (VPNs) necessitates sophisticated forensic analysis techniques to investigate VPN traffic, especially in mobile environments. This research introduces an innovative approach utilizing Convolutional Neural Networks (CNNs) and Graph Neural Networks (GNNs) for classifying VPN traffic, aiding forensic investigators in precisely identifying applications or websites accessed via VPN connections. By leveraging the combined strengths of CNNs and GNNs, our method provides an effective solution for discerning user activities during VPN sessions. Further extending this framework, we incorporate blockchain technology to meticulously record all mobile VPN transactions, ensuring a tamper-proof and transparent ledger that significantly bolsters the integrity and admissibility of forensic evidence in legal scenarios. A specific use-case demonstrates this methodology in mobile forensics, where our integrated approach not only accurately classifies data traffic but also securely logs transactional details on the blockchain, offering an unprecedented level of detail and reliability in forensic investigations. Extensive real-world VPN dataset experiments validate our approach, highlighting its potential to achieve high accuracy and offering invaluable insights for both technological and legal domains in the context of mobile VPN usage. Full article
(This article belongs to the Section Computing and Artificial Intelligence)
Show Figures

Figure 1

Figure 1
<p>A Convolutional Neural Network with three hidden layers and an output layer. Further explanation is provided in <a href="#sec3dot2-applsci-14-04421" class="html-sec">Section 3.2</a>.</p>
Full article ">Figure 2
<p>A comprehensive process of VPN forensic integrating with blockchain and deep learning models, explained with a use case.</p>
Full article ">Figure 3
<p>A complete process of CNN while training the dataset and finally the prediction.</p>
Full article ">Figure 4
<p>Accuracy score for CNN and GNN.</p>
Full article ">Figure 5
<p>F1 score for CNN and GNN.</p>
Full article ">Figure 6
<p>F1 score for CNN and GNN.</p>
Full article ">Figure 7
<p>Precision score for CNN and GNN.</p>
Full article ">
25 pages, 6739 KiB  
Article
QUMA: Quantum Unified Medical Architecture Using Blockchain
by Akoramurthy Balasubramaniam and B. Surendiran
Informatics 2024, 11(2), 33; https://doi.org/10.3390/informatics11020033 - 17 May 2024
Viewed by 1900
Abstract
A significant increase in the demand for quality healthcare has resulted from people becoming more aware of health issues. With blockchain, healthcare providers may safely share patient information electronically, which is especially important given the sensitive nature of the data contained inside them. [...] Read more.
A significant increase in the demand for quality healthcare has resulted from people becoming more aware of health issues. With blockchain, healthcare providers may safely share patient information electronically, which is especially important given the sensitive nature of the data contained inside them. However, flaws in the current blockchain design have surfaced since the dawn of quantum computing systems. The study proposes a novel quantum-inspired blockchain system (Qchain) and constructs a unique entangled quantum medical record (EQMR) system with an emphasis on privacy and security. This Qchain relies on entangled states to connect its blocks. The automated production of the chronology indicator reduces storage capacity requirements by connecting entangled BloQ (blocks with quantum properties) to controlled activities. We use one qubit to store the hash value of each block. A lot of information regarding the quantum internet is included in the protocol for the entangled quantum medical record (EQMR). The EQMR can be accessed in Medical Internet of Things (M-IoT) systems that are kept private and secure, and their whereabouts can be monitored in the event of an emergency. The protocol also uses quantum authentication in place of more conventional methods like encryption and digital signatures. Mathematical research shows that the quantum converged blockchain (QCB) is highly safe against attacks such as external attacks, intercept measure -repeat attacks, and entanglement measure attacks. We present the reliability and auditability evaluations of the entangled BloQ, along with the quantum circuit design for computing the hash value. There is also a comparison between the suggested approach and several other quantum blockchain designs. Full article
(This article belongs to the Section Health Informatics)
Show Figures

Figure 1

Figure 1
<p>Conceptualization of M-IoT systems as a layer.</p>
Full article ">Figure 2
<p>Quantum threats to blockchain.</p>
Full article ">Figure 3
<p>Collapse of |qb1⟩ into |0⟩ and |1⟩.</p>
Full article ">Figure 4
<p>An abstract representation of the conversion of classical blockchains to quantumized blockchains.</p>
Full article ">Figure 5
<p>A tangible illustration of quantum embedding with 4 qubits and its computational basis states.</p>
Full article ">Figure 6
<p>A flowchart of the EQHR protocol’s procedure.</p>
Full article ">Figure 7
<p>A six-node quantum network for verification process.</p>
Full article ">Figure 8
<p>A flowchart for Ram seeking validation from Sita.</p>
Full article ">Figure 9
<p>PQC benchmarks and their collision response to different batch sizes. Run on fake kolkatav2 [27 qubit].</p>
Full article ">Figure 10
<p>Quantum walk one step forward, on a 4-noded cycle.</p>
Full article ">Figure 11
<p>Plots of various quantum hash values (Mrand, Mfirst, Mlast, M100, M1000).</p>
Full article ">Figure 11 Cont.
<p>Plots of various quantum hash values (Mrand, Mfirst, Mlast, M100, M1000).</p>
Full article ">Figure 12
<p>Intercept–resend attack of the system.</p>
Full article ">Figure 13
<p>Probability of Ravan being identified or detected under intercept–resend attacks. Orange line: <span class="html-italic">t</span> = 0.1, yellow line: <span class="html-italic">t</span> = 0.2, green line: <span class="html-italic">t</span> = 0.4.</p>
Full article ">Figure 14
<p>The schematic representation of the quantum circuit to determine the phase distribution of a quantum state.</p>
Full article ">Figure 15
<p>Transformation of data existing inside the system’s context. The unitary is almost the same as a generalized swap at a propagation length of 10.01 cm, with a maximum trace distance of 2.0 in an ideal setting. Orange line: Best case, blue line: worst case.</p>
Full article ">
20 pages, 602 KiB  
Article
Blockchain-Based Unbalanced PSI with Public Verification and Financial Security
by Zhanshan Wang and Xiaofeng Ma
Mathematics 2024, 12(10), 1544; https://doi.org/10.3390/math12101544 - 15 May 2024
Cited by 2 | Viewed by 1167
Abstract
Private set intersection (PSI) enables two parties to determine the intersection of their respective datasets without revealing any information beyond the intersection itself. This paper particularly focuses on the scenario of unbalanced PSI, where the sizes of datasets possessed by the parties can [...] Read more.
Private set intersection (PSI) enables two parties to determine the intersection of their respective datasets without revealing any information beyond the intersection itself. This paper particularly focuses on the scenario of unbalanced PSI, where the sizes of datasets possessed by the parties can significantly differ. Current protocols for unbalanced PSI under the malicious security model exhibit low efficiency, rendering them impractical in real-world applications. By contrast, most efficient unbalanced PSI protocols fail to guarantee the correctness of the intersection against a malicious server and cannot even ensure the client’s privacy. The present study proposes a blockchain-based unbalanced PSI protocol with public verification and financial security that enables the client to detect malicious behavior from the server (if any) and then generate an irrefutable and publicly verifiable proof without compromising its secret. The proof can be verified through smart contracts, and some economic incentive and penalty measures are executed automatically to achieve financial security. Furthermore, we implement the proposed protocol, and experimental results demonstrate that our scheme exhibits low online communication complexity and computational overhead for the client. At the same time, the size of the generated proof and its verification complexity are both O(logn), enabling cost-effective validation on the blockchain. Full article
(This article belongs to the Special Issue Applied Mathematics in Blockchain and Intelligent Systems)
Show Figures

Figure 1

Figure 1
<p>Basic protocol proposed in [<a href="#B37-mathematics-12-01544" class="html-bibr">37</a>].</p>
Full article ">Figure 2
<p>Overall system architecture diagram.</p>
Full article ">Figure 3
<p>Our full protocol.</p>
Full article ">Figure 4
<p>Online communication costs for different sizes of the client’s set.</p>
Full article ">Figure 5
<p>Computation time for different sizes of the client’s set.</p>
Full article ">Figure 6
<p>Size of proofs and gas cost for verification for different sizes of the client’s set.</p>
Full article ">
Back to TopTop