[go: up one dir, main page]

 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (437)

Search Parameters:
Keywords = distributed ledger

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
22 pages, 2481 KiB  
Review
Blockchain Technology and Its Potential to Benefit Public Services Provision: A Short Survey
by Giorgio Piccardo, Lorenzo Conti and Alessio Martino
Future Internet 2024, 16(8), 290; https://doi.org/10.3390/fi16080290 - 9 Aug 2024
Viewed by 358
Abstract
In the last few years, blockchain has emerged as a cutting-edge technology whose main advantages are transparency, traceability, immutability, enhanced efficiency, and trust, thanks to its decentralized nature. Although many people still identify blockchain with cryptocurrencies and the financial sector, it has many [...] Read more.
In the last few years, blockchain has emerged as a cutting-edge technology whose main advantages are transparency, traceability, immutability, enhanced efficiency, and trust, thanks to its decentralized nature. Although many people still identify blockchain with cryptocurrencies and the financial sector, it has many prospective applications beyond digital currency that can serve as use cases for which traditional infrastructures have become obsolete. Governments have started exploring its potential application to public services provision, as confirmed by the increasing number of adoption initiatives, projects, and tests. As the current public administration is often perceived as slow, bureaucratic, lacking transparency, and failing to involve citizens in decision-making processes, blockchain can establish itself as a tool that enables a process of disintermediation, which can revolutionize the way in which public services are managed and provided. In this paper, we will provide a survey of the main application areas which are likely to benefit from blockchain implementation, together with examples of practical implementations carried out by both state and local governments. Later, we will discuss the main challenges that may prevent its widespread adoption, such as government expenditure, technological maturity, and lack of public awareness. Finally, we will wrap up by providing indications on future areas of research for blockchain-based technologies. Full article
Show Figures

Figure 1

Figure 1
<p>The supporting PRISMA flow diagram behind our survey.</p>
Full article ">Figure 2
<p>Distribution of the sources across the identified four main technologies.</p>
Full article ">Figure 3
<p>Distribution of the sources across the three geographical areas.</p>
Full article ">Figure 4
<p>Frequency heatmap for the number of sources (Italy and Europe).</p>
Full article ">Figure 5
<p>Frequency heatmap for the number of sources (the rest of the world).</p>
Full article ">Figure 6
<p>Distribution of the sources according to their functionalities.</p>
Full article ">
21 pages, 2503 KiB  
Review
Blockchain and Smart Cities for Inclusive and Sustainable Communities: A Bibliometric and Systematic Literature Review
by Massimo Biasin and Andrea Delle Foglie
Sustainability 2024, 16(15), 6669; https://doi.org/10.3390/su16156669 (registering DOI) - 4 Aug 2024
Viewed by 970
Abstract
Smart cities are urban areas that leverage technological solutions to enhance traditional network management and efficiency to benefit residents and businesses. Based on the Scientific Procedures and Rationales for Systematic Literature Reviews (SPAR-4-SLR) protocol, this study presents a systematic literature review aimed at [...] Read more.
Smart cities are urban areas that leverage technological solutions to enhance traditional network management and efficiency to benefit residents and businesses. Based on the Scientific Procedures and Rationales for Systematic Literature Reviews (SPAR-4-SLR) protocol, this study presents a systematic literature review aimed at analyzing the existing literature on smart cities research. The literature review specifically focuses on the impact of blockchain technology on the urban environment and its potential to contribute to the development of inclusive and sustainable communities, including financial systems and infrastructures with similar characteristics to serve these societies. The findings reveal a lack of studies on the practical applications of distributed ledger technologies (DLTs), particularly blockchain, that specifically focus on the urban context capable of developing the (financial) ecosystem of smart cities. To address this gap, a future research agenda is proposed, highlighting several research questions that could guide academics and practitioners interested in exploring the development of smart city systems, with particular attention on the financial framework. Full article
(This article belongs to the Special Issue Sustainable Smart Cities and Societies Using Emerging Technologies)
Show Figures

Figure 1

Figure 1
<p>Research design using the SPAR-4-SLR protocol.</p>
Full article ">Figure 2
<p>Citations and publications over time. Source: WoS citation report.</p>
Full article ">Figure 3
<p>Chart of the co-authorship analysis by authors using VOSviewer software.</p>
Full article ">Figure 4
<p>Chart of co-citation analysis of cited references using VOSviewer software.</p>
Full article ">Figure 5
<p>Cartographic analysis through VOSviewer software. Source: Authors’ elaboration from VOSviewer.</p>
Full article ">
15 pages, 1550 KiB  
Article
Secure and Privacy-Protected Bioinformation Implementation in Air Passenger Transport Based on DLT
by Yuhan Chen, Mingmei Lyu, Ho Yin Kan, Mei Pou Chan, Wei Ke and Giovanni Pau
Appl. Sci. 2024, 14(15), 6426; https://doi.org/10.3390/app14156426 - 23 Jul 2024
Viewed by 495
Abstract
Aviation information systems are a key component in ensuring efficient and smooth air transport operations. In this regard, the transfer of passenger information between parties is of paramount importance. With the continuous improvement of biometrics technology, this kind of individual identification that can [...] Read more.
Aviation information systems are a key component in ensuring efficient and smooth air transport operations. In this regard, the transfer of passenger information between parties is of paramount importance. With the continuous improvement of biometrics technology, this kind of individual identification that can provide accurate and unforgeable identification is widely used in various fields. This research presents the significance and effective application scenarios of facial recognition in biometrics in air transport operations. Due to the characteristics of aviation information systems, Distributed Ledger Technology (DLT) is used in this study for secure and private transmission of facial recognition information. Distributed systems can give a transparent and secure platform to multiple parties to access sensitive passenger data. This study uses the Corda framework as the DLT that supports CorDapp development. Based on the above techniques, this study proposes two feasible application scenarios. One is a baggage match detection system to prevent misplaced baggage, and the other is an iAPIS system that transmits passenger information in real-time communication between airlines and border control agencies. This article details how to apply the research in these two scenarios, as well as the benefits and implications of the applications. Finally, this article presents an outlook for future development and feasible directions for improvement. Full article
(This article belongs to the Special Issue Data Science and Machine Learning in Logistics and Transport)
Show Figures

Figure 1

Figure 1
<p>Application network structure.</p>
Full article ">Figure 2
<p>Interactions of nodes based on CorDapp.</p>
Full article ">Figure 3
<p>Baggage mismatch avoidance sequence diagram.</p>
Full article ">Figure 4
<p>Baggage ownership information sharing CorDapp.</p>
Full article ">Figure 5
<p>Passenger information sharing sequence diagram.</p>
Full article ">Figure 6
<p>Passenger information sharing CorDapp.</p>
Full article ">
24 pages, 1006 KiB  
Systematic Review
Healthcare and the Internet of Medical Things: Applications, Trends, Key Challenges, and Proposed Resolutions
by Inas Al Khatib, Abdulrahim Shamayleh and Malick Ndiaye
Informatics 2024, 11(3), 47; https://doi.org/10.3390/informatics11030047 - 16 Jul 2024
Viewed by 640
Abstract
In recent years, the Internet of medical things (IoMT) has become a significant technological advancement in the healthcare sector. This systematic review aims to identify and summarize the various applications, key challenges, and proposed technical solutions within this domain, based on a comprehensive [...] Read more.
In recent years, the Internet of medical things (IoMT) has become a significant technological advancement in the healthcare sector. This systematic review aims to identify and summarize the various applications, key challenges, and proposed technical solutions within this domain, based on a comprehensive analysis of the existing literature. This review highlights diverse applications of the IoMT, including mobile health (mHealth) applications, remote biomarker detection, hybrid RFID-IoT solutions for scrub distribution in operating rooms, IoT-based disease prediction using machine learning, and the efficient sharing of personal health records through searchable symmetric encryption, blockchain, and IPFS. Other notable applications include remote healthcare management systems, non-invasive real-time blood glucose measurement devices, distributed ledger technology (DLT) platforms, ultra-wideband (UWB) radar systems, IoT-based pulse oximeters, accident and emergency informatics (A&EI), and integrated wearable smart patches. The key challenges identified include privacy protection, sustainable power sources, sensor intelligence, human adaptation to sensors, data speed, device reliability, and storage efficiency. The proposed mitigations encompass network control, cryptography, edge-fog computing, and blockchain, alongside rigorous risk planning. The review also identifies trends and advancements in the IoMT architecture, remote monitoring innovations, the integration of machine learning and AI, and enhanced security measures. This review makes several novel contributions compared to the existing literature, including (1) a comprehensive categorization of IoMT applications, extending beyond the traditional use cases to include emerging technologies such as UWB radar systems and DLT platforms; (2) an in-depth analysis of the integration of machine learning and AI in IoMT, highlighting innovative approaches in disease prediction and remote monitoring; (3) a detailed examination of privacy and security measures, proposing advanced cryptographic solutions and blockchain implementations to enhance data protection; and (4) the identification of future research directions, providing a roadmap for addressing current limitations and advancing the scientific understanding of IoMT in healthcare. By addressing current limitations and suggesting future research directions, this work aims to advance scientific understanding of the IoMT in healthcare. Full article
Show Figures

Figure 1

Figure 1
<p>The systematic article selection process for this review.</p>
Full article ">Figure 2
<p>Network visualization.</p>
Full article ">
23 pages, 2181 KiB  
Article
The Role of Blockchain-Secured Digital Twins in Promoting Smart Energy Performance-Based Contracts for Buildings
by Mohamed Nour El-Din, João Poças Martins, Nuno M. M. Ramos and Pedro F. Pereira
Energies 2024, 17(14), 3392; https://doi.org/10.3390/en17143392 - 10 Jul 2024
Viewed by 434
Abstract
Energy performance-based contracts (EPCs) offer a promising solution for enhancing the energy performance of buildings, which is an overarching step towards achieving Net Zero Carbon Buildings, addressing climate change and improving occupants’ comfort. Despite their potential, their execution is constrained by difficulties that [...] Read more.
Energy performance-based contracts (EPCs) offer a promising solution for enhancing the energy performance of buildings, which is an overarching step towards achieving Net Zero Carbon Buildings, addressing climate change and improving occupants’ comfort. Despite their potential, their execution is constrained by difficulties that hinder their diffusion in the architecture, engineering, construction, and operation industry. Notably, the Measurement and Verification process is considered a significant impediment due to data sharing, storage, and security challenges. Nevertheless, there have been minimal efforts to analyze research conducted in this field systematically. A systematic analysis of 113 identified journal articles was conducted to fill this gap. A paucity of research tackling the utilization of digital technologies to enhance the implementation of EPCs was found. Consequently, this article proposes a framework integrating Digital Twin and Blockchain technologies to provide an enhanced EPC execution environment. Digital Twin technology leverages the system by monitoring and evaluating energy performance in real-time, predicting future performance, and facilitating informed decisions. Blockchain technology ensures the integrity, transparency, and accountability of information. Moreover, a private Blockchain infrastructure was originally introduced in the framework to eliminate high transaction costs related to on-chain storage and potential concerns regarding the confidentiality of information in open distributed ledgers. Full article
(This article belongs to the Special Issue Solutions towards Zero Carbon Buildings)
Show Figures

Figure 1

Figure 1
<p>Energy Performance-based Contracting.</p>
Full article ">Figure 2
<p>Systematic review methodological flowchart.</p>
Full article ">Figure 3
<p>Grouping of articles under study.</p>
Full article ">Figure 4
<p>Number of energy performance-based contract-related publications in the AECO industry by year, from 2013 to 2023.</p>
Full article ">Figure 5
<p>Distribution of studies according to building type.</p>
Full article ">Figure 6
<p>EPC main research topics in the AECO industry.</p>
Full article ">Figure 7
<p>Blockchain-secured Digital Twin framework for smart EPCs.</p>
Full article ">
20 pages, 4927 KiB  
Article
Blockchain-Based Control Plane Attack Detection Mechanisms for Multi-Controller Software-Defined Networks
by Abrar Alkhamisi, Iyad Katib and Seyed M. Buhari
Electronics 2024, 13(12), 2279; https://doi.org/10.3390/electronics13122279 - 11 Jun 2024
Viewed by 655
Abstract
A Multi-Controller Software-Defined Network (MC-SDN) is a revolutionary concept comprising multiple controllers and switches separated using programmable features, enhancing network availability, management, scalability, and performance. The MC-SDN is a potential choice for managing large, heterogeneous, complex industrial networks. Despite the rich operational flexibility [...] Read more.
A Multi-Controller Software-Defined Network (MC-SDN) is a revolutionary concept comprising multiple controllers and switches separated using programmable features, enhancing network availability, management, scalability, and performance. The MC-SDN is a potential choice for managing large, heterogeneous, complex industrial networks. Despite the rich operational flexibility of MC-SDN, it is imperative to protect the network deployment with proper protection against potential vulnerabilities that lead to misuse and malicious activities on the MC-SDN structure. The security holes in the MC-SDN structure significantly impact network survivability and performance efficiency. Hence, detecting MC-SDN security attacks is crucial to improving network performance. Accordingly, this work intended to design blockchain-based controller security (BCS) that exploits the advantages of immutable and distributed ledger technology among multiple controllers and securely manages the controller communications against various attacks. Thereby, it enables the controllers to maintain consistent network view and accurate flow tables among themselves and also neglects the controller failure issues. Finally, the experimental results of the proposed BCS approach demonstrated superior performance under various scenarios, such as attack detection, number of attackers, number of controllers, and number of compromised controllers, by applying different performance metrics. Full article
Show Figures

Figure 1

Figure 1
<p>Overview of proposed BCS.</p>
Full article ">Figure 2
<p>Attack model for the MC-SDN control layer.</p>
Full article ">Figure 3
<p>Design process of BCS for MC-SDN.</p>
Full article ">Figure 4
<p>Digit-coin assignment of BCS.</p>
Full article ">Figure 5
<p>Digit-coin rPBFT consensus and block validation.</p>
Full article ">Figure 6
<p>Simulation environment creation.</p>
Full article ">Figure 7
<p>Compromised controller attack (CCA) performance metrics.</p>
Full article ">Figure 8
<p>False injection attack (FIA) performance metrics.</p>
Full article ">Figure 9
<p>Man-in-the-Middle Attack (MiMA) performance metrics.</p>
Full article ">Figure 10
<p>Number of controllers vs. attack detection rate.</p>
Full article ">Figure 11
<p>Number of controllers vs. detection time.</p>
Full article ">Figure 12
<p>Number of validators vs. consensus delay.</p>
Full article ">Figure 13
<p>Number of attackers vs. attack detection rate.</p>
Full article ">Figure 14
<p>Number of compromised controllers vs. attack detection rate.</p>
Full article ">Figure 15
<p>Number of attackers vs. detection time.</p>
Full article ">
28 pages, 789 KiB  
Article
Unlocking Blockchain UTXO Transactional Patterns and Their Effect on Storage and Throughput Trade-Offs
by David Melo, Saúl Eduardo Pomares-Hernández, Lil María Xibai Rodríguez-Henríquez and Julio César Pérez-Sansalvador
Computers 2024, 13(6), 146; https://doi.org/10.3390/computers13060146 - 7 Jun 2024
Viewed by 787
Abstract
Blockchain technology ensures record-keeping by redundantly storing and verifying transactions on a distributed network of nodes. Permissionless blockchains have pushed the development of decentralized applications (DApps) characterized by distributed business logic, resilience to centralized failures, and data immutability. However, storage scalability without sacrificing [...] Read more.
Blockchain technology ensures record-keeping by redundantly storing and verifying transactions on a distributed network of nodes. Permissionless blockchains have pushed the development of decentralized applications (DApps) characterized by distributed business logic, resilience to centralized failures, and data immutability. However, storage scalability without sacrificing throughput is one of the remaining open challenges in permissionless blockchains. Enhancing throughput often compromises storage, as seen in projects such as Elastico, OmniLedger, and RapidChain. On the other hand, solutions seeking to save storage, such as CUB, Jidar, SASLedger, and SE-Chain, reduce the transactional throughput. To our knowledge, no analysis has been performed that relates storage growth to transactional throughput. In this article, we delve into the execution of the Bitcoin and Ethereum transactional models, unlocking patterns that represent any transaction on the blockchain. We reveal the trade-off between transactional throughput and storage. To achieve this, we introduce the spent-by relation, a new abstraction of the UTXO model that utilizes a directed acyclic graph (DAG) to reveal the patterns and allows for a graph with granular information. We then analyze the transactional patterns to identify the most storage-intensive ones and those that offer greater flexibility in the throughput/storage trade-off. Finally, we present an analytical study showing that the UTXO model is more storage-intensive than the account model but scales better in transactional throughput. Full article
Show Figures

Figure 1

Figure 1
<p>Growth trend of Ethereum storage capacity. The bar chart illustrates the exponential growth in Ethereum’s storage demand over time, peaking at 12,483 nodes and requiring nearly 6000 terabytes of storage.</p>
Full article ">Figure 2
<p>Graphical representation of a DAG showing the flow of transactions in the UTXO model from a Coinbase output (1) to a single input (8), noting the divergence and convergence of paths.</p>
Full article ">Figure 3
<p>Serialized graph, illustrating the transaction sequence in the account model from the origin node (1) to the end node (4).</p>
Full article ">Figure 4
<p>Scatter plot showing the dilemma faced by blockchain environments in the parameters of transactional throughput and storage efficiency. The dots indicate proposals to improve one of the two parameters, including decentralization, centralization, block size, off-chain strategies, and sharding.</p>
Full article ">Figure 5
<p>Transaction scenarios in the UTXO model: (<b>a</b>) Alice splits a single output of BTC 0.2 to pay Bob BTC 0.1 and returns BTC 0.1 to herself; (<b>b</b>) Alice consolidates several smaller outputs, summing up to BTC 0.1 for Bob’s payment, and (<b>c</b>) Alice directly transfers an output of BTC 0.1 to pay Bob the exact amount due for the coffee, illustrating the flexibility in transaction structuring within the UTXO model.</p>
Full article ">Figure 6
<p>Illustration of the account model: The transition from State N to State N + 1 via a transaction where Alice sends 0.1 Ether to Bob, updating both their wallet balances.</p>
Full article ">Figure 7
<p>Histogram showing the distribution of Bitcoin transaction sizes on a logarithmic scale, compiled from a dataset of 84,474,947 transactions, highlighting the frequency of transaction sizes in megabytes.</p>
Full article ">Figure 8
<p>Histogram illustrating the size distribution of Ethereum transactions on a logarithmic scale, showing the variation in transaction sizes up to 0.3 megabytes.</p>
Full article ">Figure 9
<p>Visualization of a UTXO model’s subset represented as a DAG, where the highlighted subgraph <span class="html-italic">H</span> delineates the relation between spent and unspent outputs within the system.</p>
Full article ">Figure 10
<p>Splitting pattern, where a single input from A is divided into multiple outputs B, C, …, representing an n-number of possible outputs.</p>
Full article ">Figure 11
<p>Merging pattern, where multiple outputs from nodes B, C, …, converge into a single output at node A.</p>
Full article ">Figure 12
<p>Transferring pattern, showing a direct relation from X to receiver Y.</p>
Full article ">Figure 13
<p>Flowchart of the experimental framework used for analyzing transactional patterns in the UTXO Model, starting from data extraction using Bitcoin Core 0.22, processing with BlockSci 0.7.0 and Python 3/C++, to the final stage of converting data into figures for result interpretation and feedback iteration.</p>
Full article ">Figure 14
<p>Pie chart showing the relative distribution of splitting, merging, and transferring patterns within Bitcoin, with numerical and percentage breakdowns for each category.</p>
Full article ">Figure 15
<p>Scatter plot correlating transaction size in megabytes (MB) to the number of outputs for transactions that follow the splitting pattern, where each point represents a single transaction.</p>
Full article ">Figure 16
<p>Scatter plot showing the relation between transaction size (MB) and the corresponding number of outputs for the transferring pattern, maintaining a one-to-one spent-by relation, where each data point represents a single transaction with an equal number of inputs and outputs.</p>
Full article ">Figure 17
<p>Scatter plot showing the relation between transaction size in megabytes (MB) and the number of outputs for transactions characterized by the merging pattern, illustrating the consolidation of multiple inputs into fewer outputs.</p>
Full article ">Figure A1
<p>The illustration shows a directed acyclic graph where each vertex <span class="html-italic">S</span>, <span class="html-italic">S</span>′, <span class="html-italic">S</span>′′, <span class="html-italic">S</span>′′′ symbolizes a state in a distributed virtual machine environment.</p>
Full article ">Figure A2
<p>This figure demonstrates the transition of state from <math display="inline"><semantics> <mrow> <mi>U</mi> <mi>S</mi> <mi>e</mi> <mi>t</mi> </mrow> </semantics></math> to <math display="inline"><semantics> <mrow> <mi>U</mi> <mi>S</mi> <mi>e</mi> <msup> <mi>t</mi> <mo>′</mo> </msup> </mrow> </semantics></math> upon execution of transaction <span class="html-italic">t</span>. Each state, represented by a vertex (e.g., <math display="inline"><semantics> <mrow> <mo>(</mo> <mi>A</mi> <mo>,</mo> <mn>5</mn> <mo>)</mo> </mrow> </semantics></math>), indicates an ownership state with an associated value.</p>
Full article ">
24 pages, 1082 KiB  
Article
Improving Supply Chain Management Processes Using Smart Contracts in the Ethereum Network Written in Solidity
by Eren Yigit and Tamer Dag
Appl. Sci. 2024, 14(11), 4738; https://doi.org/10.3390/app14114738 - 30 May 2024
Viewed by 777
Abstract
This paper investigates the potential of integrating supply chain management with blockchain technology, specifically by implementing smart contracts on the Ethereum network using Solidity. The paper explores supply chain management concepts, blockchain, distributed ledger technology, and smart contracts in the context of their [...] Read more.
This paper investigates the potential of integrating supply chain management with blockchain technology, specifically by implementing smart contracts on the Ethereum network using Solidity. The paper explores supply chain management concepts, blockchain, distributed ledger technology, and smart contracts in the context of their integration into supply chains to increase traceability, transparency, and accountability with faster processing times. After investigating these technologies’ applications and potential use cases, a framework for smart contract implementation for supply chain management is constructed. Potential data models and functions of a smart contract implementation improving supply chain management processes are discussed. After constructing a framework, the effects of the proposed system on supply chain processes are explained. The proposed framework increases the reliability of the supply chain history due to the usage of DLT (distributed ledger technology). It utilizes smart contracts to increase the manageability and traceability of the supply chain. The proposed framework also eliminates the SPoF (Single Point of Failure) vulnerabilities and external alteration of the transactional data. However, due to the ever-changing and variable nature of the supply chains, the proposed architecture might not be a one-size-fits-all solution, and tailor-made solutions might be necessary for different supply chain management implementations. Full article
(This article belongs to the Special Issue Blockchain and Intelligent Networking for Smart Applications)
Show Figures

Figure 1

Figure 1
<p>DLT database.</p>
Full article ">Figure 2
<p>Traditional centralized database.</p>
Full article ">Figure 3
<p>An overview of project flow diagram [<a href="#B30-applsci-14-04738" class="html-bibr">30</a>].</p>
Full article ">Figure 4
<p>Relation map of functions of Products.sol.</p>
Full article ">Figure 5
<p>UML diagram of Products.sol.</p>
Full article ">Figure 6
<p>Relation map of functions of Parties.sol.</p>
Full article ">Figure 7
<p>UML diagram of Parties.sol.</p>
Full article ">Figure 8
<p>Relation Map of functions of Handler.sol.</p>
Full article ">Figure 9
<p>UML diagram of Handler.sol.</p>
Full article ">Figure 10
<p>Flow of handling of the sensor data.</p>
Full article ">Figure 11
<p>Sequence diagram for transfer flow.</p>
Full article ">Figure 12
<p>Sequence diagram for return transfer flow.</p>
Full article ">Figure 13
<p>Contract initiation gas fee.</p>
Full article ">Figure 14
<p>Flow tests pre-checking test gas fees.</p>
Full article ">Figure 15
<p>Gas fee for AddProduct function.</p>
Full article ">Figure 16
<p>Gas fee for AddParty function.</p>
Full article ">Figure 17
<p>Gas cost for product transfer.</p>
Full article ">Figure 18
<p>Gas cost for return transfer.</p>
Full article ">Figure 19
<p>Results for flow test cases.</p>
Full article ">Figure 20
<p>Results for edge case tests.</p>
Full article ">Figure 21
<p>Truffle config.</p>
Full article ">Figure 22
<p>Contract testnet deployment.</p>
Full article ">
24 pages, 8764 KiB  
Article
Overcoming the Technological Barriers in the Blockchain Supply Chain for Small Carriers
by Marian Gogola, Dominika Rovnanikova and Mikulas Cerny
Appl. Sci. 2024, 14(11), 4452; https://doi.org/10.3390/app14114452 - 23 May 2024
Cited by 1 | Viewed by 578
Abstract
The current trend in supply chain development requires the application of new knowledge to meet the challenges posed by new technologies. One such technology is blockchain, which facilitates supply chain solutions through the use of innovative data transfer, storage, and verification systems. However, [...] Read more.
The current trend in supply chain development requires the application of new knowledge to meet the challenges posed by new technologies. One such technology is blockchain, which facilitates supply chain solutions through the use of innovative data transfer, storage, and verification systems. However, the use of blockchain can be challenging for certain stakeholders, such as small carriers, who may lack the necessary technical expertise or access to the technology. In this paper, we explore the potential for engaging small carriers that provide services within the blockchain supply chain but face technological barriers. We identify the technological barriers and opportunities for these carriers to participate, focusing on a case study of a small carrier that transports temperature-sensitive cargo. As one of the innovations, we proposed a classification according to three types of control levels, which are of fundamental importance in blockchain applications. In addition, we tested in-vehicle temperature measurement for use in cold chains and stored the transaction in a distributive ledger application in blockchain. Full article
Show Figures

Figure 1

Figure 1
<p>Human control within the process of transport or delivery.</p>
Full article ">Figure 2
<p>The decentralised supply chain based on the blockchain.</p>
Full article ">Figure 3
<p>Manual temperature control of goods.</p>
Full article ">Figure 4
<p>Semi-Manual temperature control of goods.</p>
Full article ">Figure 5
<p>Automatic control within the blockchain.</p>
Full article ">Figure 6
<p>Activities performed throughout the supply chain.</p>
Full article ">Figure 7
<p>The control measuring equipment was Hadex and Testo H2D.</p>
Full article ">Figure 8
<p>Adjusting the ALEX Original TRE24 vehicle-mounted refrigeration unit.</p>
Full article ">Figure 9
<p>The load compartment of the vehicle.</p>
Full article ">Figure 10
<p>Overview of temperature during the transport process.</p>
Full article ">Figure 11
<p>Principles of the data flow from various types of control.</p>
Full article ">Figure 12
<p>Principles of measuring data processing to transaction into a blockchain.</p>
Full article ">Figure 13
<p>The account information with private and public keys.</p>
Full article ">Figure 14
<p>The verification of transactions in Hashscan.io.</p>
Full article ">
1 pages, 162 KiB  
Correction
Correction: Gligoric et al. IOTA-Based Distributed Ledger in the Mining Industry: Efficiency, Sustainability and Transparency. Sensors 2024, 24, 923
by Nenad Gligoric, David Escuín, Lorena Polo, Angelos Amditis, Tasos Georgakopoulos and Alberto Fraile
Sensors 2024, 24(11), 3308; https://doi.org/10.3390/s24113308 - 22 May 2024
Viewed by 380
Abstract
In the original publication [...] Full article
(This article belongs to the Section Industrial Sensors)
18 pages, 2413 KiB  
Article
Carbon and Energy Trading Integration within a Blockchain-Powered Peer-to-Peer Framework
by Ameni Boumaiza
Energies 2024, 17(11), 2473; https://doi.org/10.3390/en17112473 - 22 May 2024
Cited by 1 | Viewed by 946
Abstract
In the ever-changing global energy landscape, the emergence of ‘prosumers’, individuals who both produce and consume energy, has blurred traditional boundaries. Driven by the growing demand for sustainability and renewable energy, prosumers play a critical role in bridging the gap between energy production [...] Read more.
In the ever-changing global energy landscape, the emergence of ‘prosumers’, individuals who both produce and consume energy, has blurred traditional boundaries. Driven by the growing demand for sustainability and renewable energy, prosumers play a critical role in bridging the gap between energy production and consumption. They can generate their own energy through decentralized sources like solar panels and wind turbines, and sell excess energy back to the grid. However, tracking carbon emissions and pricing strategies for prosumers pose challenges. To address this, we developed an innovative blockchain-driven peer-to-peer (P2P) trading platform for carbon allowances. This platform empowers prosumers to influence pricing and promotes a more equitable distribution of energy. The P2P platform leverages blockchain technology, a decentralized digital ledger, to provide transparency and security in carbon emission tracking and energy transactions. By eliminating intermediaries, blockchain ensures the accuracy of data and creates a tamper-proof record of energy production and consumption. This study employed a modified IEEE 37-bus test system to evaluate the efficacy of the proposed blockchain-based trading framework. The IEEE 37-bus system is a well-established benchmark for power system analysis, comprising 37 nodes, 13 generators, and 37 transmission lines. By leveraging this test system, this study demonstrated the framework’s ability to optimize energy consumption patterns and mitigate carbon emissions, highlighting the transformative potential of blockchain technology in the energy sector. The proposed P2P trading platform offers several benefits for prosumers: (1) Transparency: The blockchain-based platform provides a transparent record of all energy transactions, ensuring that prosumers are compensated fairly for the energy they produce. (2) Security: Blockchain technology makes it impossible to tamper with or counterfeit carbon allowances, ensuring the integrity of the trading system. (3) Efficiency: The P2P trading platform eliminates the need for intermediaries, reducing the cost and complexity of energy transactions. (4) Empowerment: The platform gives prosumers a greater say in how their energy is priced and distributed, promoting a more equitable energy system. Full article
(This article belongs to the Section B: Energy and Environment)
Show Figures

Figure 1

Figure 1
<p>Proposed trading framework architecture.</p>
Full article ">Figure 2
<p>IEEE Bus 37.</p>
Full article ">Figure 3
<p>Trading System Components.</p>
Full article ">Figure 4
<p>Comparison of daily transmission of energy and reduction in daily carbon emissions in three scenarios: (1) centralized trading, (2) trading based on aggregation, (3) proposed system.</p>
Full article ">Figure 5
<p>Surplus carbon allocation of IEEE Bus for different trading scenarios: (1) centralized trading. (2) aggregator-based trading. (3) proposed trading framework.</p>
Full article ">Figure 6
<p>Optimal power allocation and costs for four prosumers.</p>
Full article ">Figure 7
<p>Optimal Energy Auctions in Microgrid 5.</p>
Full article ">Figure 8
<p>Developed renewable energy and carbon trading web-based application.</p>
Full article ">
35 pages, 9178 KiB  
Article
Lightweight, Trust-Managing, and Privacy-Preserving Collaborative Intrusion Detection for Internet of Things
by Aulia Arif Wardana, Grzegorz Kołaczek and Parman Sukarno
Appl. Sci. 2024, 14(10), 4109; https://doi.org/10.3390/app14104109 - 12 May 2024
Cited by 1 | Viewed by 1018
Abstract
This research introduces a comprehensive collaborative intrusion detection system (CIDS) framework aimed at bolstering the security of Internet of Things (IoT) environments by synergistically integrating lightweight architecture, trust management, and privacy-preserving mechanisms. The proposed hierarchical architecture spans edge, fog, and cloud layers, ensuring [...] Read more.
This research introduces a comprehensive collaborative intrusion detection system (CIDS) framework aimed at bolstering the security of Internet of Things (IoT) environments by synergistically integrating lightweight architecture, trust management, and privacy-preserving mechanisms. The proposed hierarchical architecture spans edge, fog, and cloud layers, ensuring efficient and scalable collaborative intrusion detection. Trustworthiness is established through the incorporation of distributed ledger technology (DLT), leveraging blockchain frameworks to enhance the reliability and transparency of communication among IoT devices. Furthermore, the research adopts federated learning (FL) techniques to address privacy concerns, allowing devices to collaboratively learn from decentralized data sources while preserving individual data privacy. Validation of the proposed approach is conducted using the CICIoT2023 dataset, demonstrating its effectiveness in enhancing the security posture of IoT ecosystems. This research contributes to the advancement of secure and resilient IoT infrastructures, addressing the imperative need for lightweight, trust-managing, and privacy-preserving solutions in the face of evolving cybersecurity challenges. According to our experiments, the proposed model achieved an average accuracy of 97.65%, precision of 97.65%, recall of 100%, and F1-score of 98.81% when detecting various attacks on IoT systems with heterogeneous devices and networks. The system is a lightweight system when compared with traditional intrusion detection that uses centralized learning in terms of network latency and memory consumption. The proposed system shows trust and can keep private data in an IoT environment. Full article
Show Figures

Figure 1

Figure 1
<p>Traditional CIDS architecture.</p>
Full article ">Figure 2
<p>Our view on this research about edge–fog–cloud DLT-based CIDS architecture in IoT system.</p>
Full article ">Figure 3
<p>Collaborative anomaly detection process in CIDS based on FL-DNN and DLT.</p>
Full article ">Figure 4
<p>The loss value trend across the edge layer. Figures (<b>a</b>–<b>e</b>) present the trend of loss values in edge devices grouped by fog devices.</p>
Full article ">Figure 5
<p>The accuracy value trend across the edge layer. Figures (<b>a</b>–<b>e</b>) present the trend of accuracy values in edge devices grouped by fog devices.</p>
Full article ">Figure 6
<p>The precision value trend across the edge layer. Figures (<b>a</b>–<b>e</b>) present the trend of precision values in edge devices grouped by fog devices.</p>
Full article ">Figure 7
<p>The recall value trend across the edge layer. Figures (<b>a</b>–<b>e</b>) present the trend of recall values in edge devices grouped by fog devices.</p>
Full article ">Figure 8
<p>The F1-score value trend across the edge layer. Figures (<b>a</b>–<b>e</b>) present the trend of F1-score values in edge devices grouped by fog devices.</p>
Full article ">Figure 9
<p>Loss, accuracy, precision, recall, and F1-score across fog layer; Figure (<b>a</b>) represents the trend of loss value in Fog Devices 1–5; Figure (<b>b</b>) represents the trend of accuracy value in Fog Devices 1–5; Figure (<b>c</b>) represents the trend of precision value in Fog Devices 1–5; Figure (<b>d</b>) represents the trend of recall value in Fog Devices 1–5; Figure (<b>e</b>) represents the trend of F1-score value in Fog Devices 1–5.</p>
Full article ">Figure 10
<p>Loss, accuracy, precision, recall, and F1-score across cloud layer or global model.</p>
Full article ">Figure 11
<p>The training time result across the edge layer. Figures (<b>a</b>–<b>e</b>) present the trend of training time results in edge devices grouped by fog devices.</p>
Full article ">Figure 12
<p>The CPU usage from the training process across the edge layer. Figures (<b>a</b>–<b>e</b>) present the trend of CPU usage from the training process in edge devices grouped by fog devices.</p>
Full article ">Figure 13
<p>The memory usage from the training process across the edge layer. Figures (<b>a</b>–<b>e</b>) present the trend of memory usage from the training process in edge devices grouped by fog devices.</p>
Full article ">Figure 14
<p>Transmission speed in the CICIoT2023 dataset.</p>
Full article ">Figure 15
<p>Latency in edge–fog architecture.</p>
Full article ">Figure 16
<p>Latency in fog–cloud architecture.</p>
Full article ">Figure 17
<p>Latency in cloud-centric architecture.</p>
Full article ">
23 pages, 1877 KiB  
Review
Blockchain for Organ Transplantation: A Survey
by Elif Calik and Malika Bendechache
Blockchains 2024, 2(2), 150-172; https://doi.org/10.3390/blockchains2020008 - 9 May 2024
Viewed by 830
Abstract
As blockchain becomes more widely used, a growing number of application fields are becoming interested in blockchain to benefit from its decentralised nature, invariability, security, transparency, quick transaction capabilities, and cost-effectiveness. Blockchain has a wide range of applications and uses in healthcare. Distributed [...] Read more.
As blockchain becomes more widely used, a growing number of application fields are becoming interested in blockchain to benefit from its decentralised nature, invariability, security, transparency, quick transaction capabilities, and cost-effectiveness. Blockchain has a wide range of applications and uses in healthcare. Distributed ledger technology facilitates the secure transfer of patient medical records, manages the medicine supply chain, and creates an efficient, transparent, safe, and effective way of communicating data across global healthcare. The organ transplantation process (OTP) is one of the healthcare areas that benefit from the use of such technology to make its process more secure and transparent. In this article, we put forward a systematic literature review analysis on the application of blockchain to the OTP. Additionally, we address and highlight the barriers and challenges that arise while using blockchain technology for the OTP. We also offer some suggestions for future developments that would enhance blockchain’s implementation in the OTP domain. Full article
(This article belongs to the Special Issue Feature Papers in Blockchains)
Show Figures

Figure 1

Figure 1
<p>Organ transplantation process based on blockchain.</p>
Full article ">Figure 2
<p>Basic blockchain architecture.</p>
Full article ">Figure 3
<p>Blockchain workflow diagram.</p>
Full article ">Figure 4
<p>Number of publication types per year.</p>
Full article ">Figure 5
<p>Level of maturity of solutions offered by the reviewed papers.</p>
Full article ">
14 pages, 448 KiB  
Review
Towards an ITU Standard for DLT Energy Consumption
by Ioannis Nikolaou and Leonidas Anthopoulos
Energies 2024, 17(9), 2222; https://doi.org/10.3390/en17092222 - 5 May 2024
Viewed by 597
Abstract
The emergence of Distributed Ledger Technologies (DLT) in the past decade has challenged our imagination to discover new, innovative and disruptive solutions to problems in domains ranging from finance and healthcare to supply chain and Smart Cities. However, the enormous energy consumption that [...] Read more.
The emergence of Distributed Ledger Technologies (DLT) in the past decade has challenged our imagination to discover new, innovative and disruptive solutions to problems in domains ranging from finance and healthcare to supply chain and Smart Cities. However, the enormous energy consumption that has been observed in some of the most successful DLT applications raises the question of their long term sustainability. This article reviews the standardization efforts of the International Telecommunications Union (ITU) to provide guidelines to regulators and policy makers for making informed decisions on the applicability and sustainability of DLT architectures from the point of view of energy consumption. Full article
(This article belongs to the Section B: Energy and Environment)
Show Figures

Figure 1

Figure 1
<p>High-level conceptual architecture of DLT [<a href="#B21-energies-17-02222" class="html-bibr">21</a>].</p>
Full article ">Figure 2
<p>Consensus algorithm impact on DLT operation.</p>
Full article ">
22 pages, 8538 KiB  
Article
Enhancing Data Preservation and Security in Industrial Control Systems through Integrated IOTA Implementation
by Iuon-Chang Lin, Pai-Ching Tseng, Pin-Hsiang Chen and Shean-Juinn Chiou
Processes 2024, 12(5), 921; https://doi.org/10.3390/pr12050921 - 30 Apr 2024
Viewed by 758
Abstract
Within the domain of industrial control systems, safeguarding data integrity stands as a pivotal endeavor, especially in light of the burgeoning menace posed by malicious tampering and potential data loss. Traditional data storage paradigms, tethered to physical hard disks, are fraught with inherent [...] Read more.
Within the domain of industrial control systems, safeguarding data integrity stands as a pivotal endeavor, especially in light of the burgeoning menace posed by malicious tampering and potential data loss. Traditional data storage paradigms, tethered to physical hard disks, are fraught with inherent susceptibilities, underscoring the pressing need for the deployment of resilient preservation frameworks. This study delves into the transformative potential offered by distributed ledger technology (DLT), with a specific focus on IOTA, within the expansive landscape of the Internet of Things (IoT). Through a meticulous examination of the intricacies inherent to data transmission protocols, we present a novel paradigm aimed at fortifying data security. Our approach advocates for the strategic placement of IOTA nodes on lower-level devices, thereby streamlining the transmission pathway and curtailing vulnerabilities. This concerted effort ensures the seamless preservation of data confidentiality and integrity from inception to storage, bolstering trust in the convergence of IoT and DLT technologies. By embracing proactive measures, organizations can navigate the labyrinthine terrain of data management, effectively mitigate risks, and cultivate an environment conducive to innovation and progress. Full article
(This article belongs to the Special Issue Process Automation and Smart Manufacturing in Industry 4.0/5.0)
Show Figures

Figure 1

Figure 1
<p>Cipher Feedback (CFB) mode encryption.</p>
Full article ">Figure 2
<p>The technique relationships of our proposed architecture.</p>
Full article ">Figure 3
<p>A flowchart of creating and setting up an IOTA node in a container.</p>
Full article ">Figure 4
<p>Proposed system architecture to ensure data integrity.</p>
Full article ">Figure 5
<p>Sequence diagram for non-confidential data upload.</p>
Full article ">Figure 6
<p>Proposed method based on CFB encryption.</p>
Full article ">Figure 7
<p>Sequence diagram for non-confidential data retrieval.</p>
Full article ">Figure 8
<p>Sequence diagram for uploading confidential data.</p>
Full article ">Figure 9
<p>Sequence diagram for confidential data retrieval.</p>
Full article ">Figure 10
<p>Sequence diagram for large data upload.</p>
Full article ">Figure 11
<p>Sequence diagram for large data retrieval.</p>
Full article ">Figure 12
<p>IOTA node built with Docker.</p>
Full article ">Figure 13
<p>Data on IOTA.</p>
Full article ">Figure 14
<p>ARP spoofing implementation by the attacker.</p>
Full article ">Figure 15
<p>Victim of ARP spoofing.</p>
Full article ">Figure 16
<p>The captured packet by the attacker.</p>
Full article ">Figure 17
<p>The computation time of data upload.</p>
Full article ">Figure 18
<p>The computational time of data retrieval.</p>
Full article ">
Back to TopTop