scholarly journals A Blockchain System Based on Quantum-Resistant Digital Signature

2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Peijun Zhang ◽  
Lianhai Wang ◽  
Wei Wang ◽  
Kunlun Fu ◽  
Jinpeng Wang

Blockchain, which has a distributed structure, has been widely used in many areas. Especially in the area of smart cities, blockchain technology shows great potential. The security issues of blockchain affect the construction of smart cities to varying degrees. With the rapid development of quantum computation, elliptic curves cryptosystems used in blockchain are not secure enough. This paper presents a blockchain system based on lattice cipher, which can resist the attack of quantum computation. The most challenge is that the size of public keys and signatures used by lattice cryptosystems is typically very large. As a result, each block in a blockchain can only accommodate a small number of transactions. It will affect the running speed and performance of the blockchain. For overcoming this problem, we proposed a way that we only put the hash values of public keys and signatures on the blockchain and store the complete content of them on an IPFS (interplanetary file system). In this way, the number of bytes occupied by each transaction is greatly reduced. We design a bitcoin exchange scheme to evaluate the performance of the proposed quantum-resistant blockchain system. The simulation platform is verified to be available and effective.

Sensors ◽  
2020 ◽  
Vol 20 (7) ◽  
pp. 2061 ◽  
Author(s):  
Xuesong Xu ◽  
Zhi Zeng ◽  
Shengjie Yang ◽  
Hongyan Shao

With the rapid development of industrial internet of thing (IIoT), the distributed topology of IIoT and resource constraints of edge computing conduct new challenges to traditional data storage, transmission, and security protection. A distributed trust and allocated ledger of blockchain technology are suitable for the distributed IIoT, which also becomes an effective method for edge computing applications. This paper proposes a resource constrained Layered Lightweight Blockchain Framework (LLBF) and implementation mechanism. The framework consists of a resource constrained layer (RCL) and a resource extended layer (REL) blockchain used in IIoT. We redesign the block structure and size to suit to IIoT edge computing devices. A lightweight consensus algorithm and a dynamic trust right algorithm is developed to improve the throughput of blockchain and reduce the number of transactions validated in new blocks respectively. Through a high throughput management to guarantee the transaction load balance of blockchain. Finally, we conducted kinds of blockchain simulation and performance experiments, the outcome indicated that the method have a good performance in IIoT edge application.


2021 ◽  
Vol 7 (5) ◽  
pp. 1036-1048
Author(s):  
Jun Li ◽  
Kai Zou ◽  
Shang Xiang ◽  
Zhen Wan ◽  
Lining Xing

With the rapid development of technologies, such as big data, artificial intelligence, and cloud computing, the work cooperation among cities and the resources involved in business exchanges are deeply complementary. At the same time, information security has become one of the challenges for smart cities, which is ubiquitous and easy to cause public security issues. For this reason, this research modeled the actual problems and then made decisions on resource allocation by considering full cooperation and non-cooperation situations. Their influence with respect to city size, probability of intrusion by illegal users, and propagation probability of one-time intrusion were analyzed. Based on these foundation works, this research proposed incentive mechanisms to ensure the optimized information security for smart cities. These mechanisms ensure that cities not only voluntarily increase the intensity of resource allocation to information security, but also make the co-operation in line with the reality. Therefore, this balances the advantages and disadvantages of non-cooperation and full cooperation, so as to ensure that the information security level of urban agglomerations reaches the optimal state.


2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Junsong Zhang ◽  
Qikun Zhang ◽  
Xianling Lu ◽  
Yong Gan

With the rapid development of communication and microelectronic technology, the vehicular ad hoc network (VANET) has received extensive attention. However, due to the open nature of wireless communication links, it will cause VANET to generate many network security issues such as data leakage, network hijacking, and eavesdropping. To solve the above problem, this paper proposes a new authentication protocol which uses bilinear pairings and temporary pseudonyms. The proposed authentication protocol can realize functions such as the identity authentication of the vehicle and the verification of the message sent by the vehicle. Moreover, the proposed authentication protocol is capable of preventing any party (peer vehicles, service providers, etc.) from tracking the vehicle. To improve the efficiency of message verification, this paper also presents a batch authentication method for the vehicle to verify all messages received within a certain period of time. Finally, through security and performance analysis, it is actually easy to find that the proposed authentication protocol can not only resist various security threats but also have good computing and communication performance in the VANET environment.


Author(s):  
Арпана Чатурведі

The  development  of  new  technologies  like  Hadoop,  Map  Reduce, used to store, manage, analyze vast amount of data, when associated with WSN (Wireless  Sensor  Network),  the  risk  factor  for  information  security  increases. When  it is  applied  in  various  applications  of  government  like  Aadhaar,  DigiLocker  etc.,  chances  of  hidden  security  issues  increased.  In  this  paper  AESXTS  encryption  mechanism  and  digital  signature  technology  is  used  with  AODV  (Ad  hoc  On-Demand  Distance  Vector)  routing  protocol  to  get  rid  of  various issues like DoS (Denial of Service),  eavesdropping, imitation, coaxing etc.  The theoretical  analysis  is  shown using NS2 simulator and implementation assures to provide better data security, reliability, transmission and energy efficiency.  This implementation shows that SAODV(Secure-AODV)  routing  protocol  when used in routing layer in these applications and  system,  it  increases its own self defensive ability to fight against  various challenging hidden security issues.


2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Jinxin Zhang ◽  
Meng Wu

With the rapid development of the mobile internet and intelligent technology of in-vehicle equipment, the Internet of Vehicles (IoV), centered on intelligent connected cars, has gradually entered people’s lives. However, these technologies also bring serious privacy risks and security issues in terms of data transmission and storage. In this article, we propose a blockchain-based authentication system to provide vehicle safety management. The privacy and security attributes of various vehicle authentication transactions are based on high-level cryptographic primitives, realizing temporary and formal authentication methods. At the same time, a fair blockchain consensus mechanism Auction of block generation Rights (AoR) is proposed. To demonstrate the feasibility and scalability of the proposed scheme, security and performance analyses are presented. The relevant experimental results show that the scheme can provide superior decentralized management for IoV.


2021 ◽  
Author(s):  
Xianfei Zhou ◽  
Jing Huang ◽  
Fulong Chen ◽  
Yuqing Tang ◽  
Canlin Wang

Abstract With the rapid development of medical information, the medical cyber system is rapidly transforming, and medical information sharing faces new challenges. Blockchain technology is a revolutionary technology. It has the characteristics of tamper-proof and privacy-preserving, and has natural protection for big data systems, that can be used in medical systems. In this paper,we proposed to store medical cyber physical data in a mixed blockchain with private blockchain and consortium blockchain in order to realize the secure storage of medical cyber physical data by the tamper-resistant and sharing of blockchain technology. In the system, a threshold signature system based on blockhain is also proposed. Aiming at the situation that medical accidents are easy to occur in multidisciplinary joint consultation in the medical process, this paper proposes to use threshold signature for joint consultation. Using the security and threshold of threshold signature, treatment can be carried out when the threshold number is reached, and medical data can be uploaded to the consortium blockchain. The security analysis and performance analysis show that the scheme has advantages in safety and performance and is suitable for the medical environment to a certain extent.


Sensors ◽  
2021 ◽  
Vol 21 (2) ◽  
pp. 434
Author(s):  
Qingqi Hong ◽  
Yiwei Ding ◽  
Jinpeng Lin ◽  
Meihong Wang ◽  
Qingyang Wei ◽  
...  

With the rapid development of artificial intelligence and fifth-generation mobile network technologies, automatic instrument reading has become an increasingly important topic for intelligent sensors in smart cities. We propose a full pipeline to automatically read watermeters based on a single image, using deep learning methods to provide new technical support for an intelligent water meter reading. To handle the various challenging environments where watermeters reside, our pipeline disentangled the task into individual subtasks based on the structures of typical watermeters. These subtasks include component localization, orientation alignment, spatial layout guidance reading, and regression-based pointer reading. The devised algorithms for orientation alignment and spatial layout guidance are tailored to improve the robustness of our neural network. We also collect images of watermeters in real scenes and build a dataset for training and evaluation. Experimental results demonstrate the effectiveness of the proposed method even under challenging environments with varying lighting, occlusions, and different orientations. Thanks to the lightweight algorithms adopted in our pipeline, the system can be easily deployed and fully automated.


2021 ◽  
Vol 13 (5) ◽  
pp. 2705
Author(s):  
Hagen Deusch ◽  
Pantelis T. Nikolaidis ◽  
José Ramón Alvero-Cruz ◽  
Thomas Rosemann ◽  
Beat Knechtle

(1) Background: Compared with marathon races, pacing in time-limited ultramarathons has only been poorly discussed in the literature. The aim of the present study was to analyze the interaction of performance level, age and sex with pacing during 6 h, 12 h or 24 h time-limited ultramarathons. (2) Methods: Participants (n = 937, age 48.62 ± 11.80 years) were the finishers in 6 h (n = 40, 17 women and 23 men), 12 h (n = 232, 77 women and 155 men) and 24 h (n = 665, 166 women and 409 men) ultramarathons. The coefficient of variation (CV), calculated as SD/mean, was used to described pacing. Low scores of CV denoted a more even pacing, and vice versa. A two-way analysis of variance examined the main effects and interactions of sex and race duration on age, race speed and pacing. (3) Results: More men participated in the longer race distances than in the shorter ones and men were older and faster than women. Comparing the 6 h, 12 h and 24 h races, the finishers in the 6 h were the fastest, the finishers in the 12 h were the oldest and the finishers in the 24 h showed the most variable pacing. Furthermore, the faster running speed in the 12 h (women, r = −0.64; men, r = −0.49, p < 0.001) and the 24 h (r = −0.47 in women and men, p < 0.001) was related to less variable pacing. (4) Conclusions: These data might help runners and coaches to choose the the proper duration of a race and training programs for their athletes.


Author(s):  
Ou Ruan ◽  
Lixiao Zhang ◽  
Yuanyuan Zhang

AbstractLocation-based services are becoming more and more popular in mobile online social networks (mOSNs) for smart cities, but users’ privacy also has aroused widespread concern, such as locations, friend sets and other private information. At present, many protocols have been proposed, but these protocols are inefficient and ignore some security risks. In the paper, we present a new location-sharing protocol, which solves two issues by using symmetric/asymmetric encryption properly. We adopt the following methods to reduce the communication and computation costs: only setting up one location server; connecting social network server and location server directly instead of through cellular towers; avoiding broadcast encryption. We introduce dummy identities to protect users’ identity privacy, and prevent location server from inferring users’ activity tracks by updating dummy identities in time. The details of security and performance analysis with related protocols show that our protocol enjoys two advantages: (1) it’s more efficient than related protocols, which greatly reduces the computation and communication costs; (2) it satisfies all security goals; however, most previous protocols only meet some security goals.


Author(s):  
Ashutosh Srivastava ◽  
Sachin Kumar Gupta ◽  
Mohd Najim ◽  
Nitesh Sahu ◽  
Geetika Aggarwal ◽  
...  

AbstractMobile ad hoc network (MANET) is an infrastructure-less, self-motivated, arbitrary, self-configuring, rapidly changing, multi-hop network that is self-possessing wireless bandwidth-conscious links without centrally managed router support. In such a network, wireless media is easy to snoop. It is firm to the surety to access any node, easier to insertion of bad elements or attackers for malicious activities in the network. Therefore, security issues become one of the significant considerations for such kind of networks. The deployment of an effective intrusion detection system is important in order to provide protection against various attacks. In this paper, a Digitally Signed Secure Acknowledgement Method (DSSAM) with the use of the RSA digital signature has been proposed and simulated. Three different parameters are considered, namely secure acknowledgment, node authentication, and packet authentication for study. This article observes the DSSAM performance and compares it with two existing standard methods, namely Watchdog and 2-ACK under standard Dynamic Source Routing (DSR) routing environment. In the end, it is noticed that the rate of detection of malicious behaviour is better in the case of the proposed method. However, associated overheads are high. A trade-off between performance and overhead has been considered.


Sign in / Sign up

Export Citation Format

Share Document