首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
In order to meet various challenges in the Internet of things (IoT), such as identity authentication, privacy preservation of distributed data and network security, the integration of blockchain and IoT became a new trend in recent years. As the key supporting technology of blockchain, the consensus algorithm is a hotspot of distributed system research. At present, the research direction of the consensus algorithm is mainly focused on improving throughput and reducing delay. However, when blockchain is applied to IoT scenario, the storage capacity of lightweight IoT devices is limited, and the normal operations of blockchain system cannot be guaranteed. To solve this problem, an improved version of Raft (Imp Raft) based on Raft and the storage compression consensus (SCC) algorithm is proposed, where initialization process and compression process are added into the flow of Raft. Moreover, the data validation process aims to ensure that blockchain data cannot be tampered with. It is obtained from experiments and analysis that the new proposed algorithm can effectively reduce the size of the blockchain and the storage burden of lightweight IoT devices.  相似文献   

2.
时晔 《电子测试》2021,(6):73-74,100
区块链技术在物联网中的应用在很大程度上缓解了数据隐私、网络安全等现象,为了拓展区块链技术的应用,需要相关人员重视技术研究。本文阐述了区块链技术概述、区块链技术在物联网中的应用、针对物联网的区块链底层技术研究以及区块链为物联网带来的诸多挑战,希望能够促进区块链技术的应用,从而创造更大的效益。  相似文献   

3.
陈露  相峰  孙知信 《电子学报》2021,49(1):192-200
区块链是一种集合了分布式存储、点对点传输、共识机制、密码学算法和智能合约等关键技术的分布式账本,具有去中心化、不可篡改、透明化等特性.近年来区块链技术的安全性问题逐渐显露,阻碍了区块链应用的发展.本文介绍了区块链的基本概念与安全模型,分析了区块链的安全性问题;然后,基于属性密码体制,从访问控制、密钥管理、数据隐私保护这...  相似文献   

4.
Blockchain technology has attracted considerable attention owing to its wide range of potential applications. It first appeared as a cryptocurrency, called Bitcoin, but has since been used in many other business and nonbusiness applications. Unlike most existing systems that are based on centralized frameworks, this new technology utilizes peer‐to‐peer networks and distributed systems which includes blockchain registers to store transactions. Its structure is designed as a digital log file and stored as a series of linked groups, called blocks. Each individual block is locked cryptographically with the previous block. Once a block has been added, it cannot be altered. Many security experts speculate that the inherent cryptographic nature of the blockchain system is sufficient to withstand constant hacking and security threats. However, previous studies on the security and privacy of blockchain technology have shown that many applications have fallen victim to successful cyberattacks. Owing to the increasing demand for cryptocurrency and its current security challenges, previous studies have not focused on blockchain technology cybersecurity vulnerabilities extensively. Here, our study extends upon the previous studies on vulnerabilities and investigates the types of potential attacks. Our study then provides further direction to highlight possible countermeasures against blockchain technology vulnerability to cybersecurity.  相似文献   

5.
Privacy is a necessary component of any security discussion. Privacy and security must be considered separately as well as together. Threads of privacy are visible throughout the procedure of building security solutions for any system. The notions for privacy also play an important role in the technical implications of privacy preservation within any network or its subsystems. Analyzing the mitigations and protections for privacy are considered in privacy notions. The privacy notions being theoretical systems and identified vulnerabilities in the sensor networks not being mapped to such privacy preservation notions necessities the analytical review of privacy provisioning in wireless sensor network (WSN) being formalized within a framework consisting or the vulnerabilities associated with each component of the network and mechanisms of privacy preservation along with the privacy notions. The current research paper provides an analytical review of the privacy provisioning in WSNs with the perspective of development of a proposed framework for privacy notions and quantitative as well as qualitative measures associated with the privacy preservation in sensor network mapped with the various techniques implemented for privacy preservation of different components of the network and the network as a whole. This analytical review has been done on the basis of set of beliefs that an adversary has while launching an attack on the network. Further the existing techniques for privacy preservation of receiver and source node location, location of sink node, traffic analysis prevention and preserving temporal privacy in WSN have been analyses on the basis of adversary’s set of beliefs’ mitigated by them and the notion of privacy implemented by these techniques like k-anonymity, l-diversity or t-closeness. The present effort aims to provide the researchers with an insight of the new concept of belief mitigation for privacy provisioning in WSN.  相似文献   

6.
朱娜  杜晓宇  梁冬杰 《移动信息》2024,46(3):133-135
随着互联网的快速发展,互联网数据的安全问题日益凸显,如数据泄露、隐私问题、中心化管理弊端、黑客攻击、数据篡改等。为解决这一问题,文中探讨了区块链技术在互联网数据安全中的潜在应用。通过分析区块链的基本原理,包括去中心化、不可篡改、智能合约等特性,以期为构建更加安全、透明和高效的互联网数据管理体系提供新的思路。  相似文献   

7.
多接入边缘计算(multi-access edge computing,MEC)能为城市轨道交通中的计算密集型业务和时延敏感型业务提供高质量的服务能力,然而轨道交通边缘计算网络中的大量边缘设施暴露在开放式环境中,其隐私保护和传输安全面临着很大的挑战。区块链(blockchain)具有分布式账本、共识机制、智能合约、去中心化应用等功能特性,因此,区块链技术可以为分布式轨道交通边缘计算网络构建系统性的安全防护机制,从而保障网络安全和数据安全,实现高质量的城市轨道交通服务。首先,介绍了区块链的基本概念;其次,设计了轨道交通边缘计算网络架构,提出了融合区块链的轨道交通边缘计算网络安全防护机制和应用实例;最后,对该安全防护机制面临的问题和挑战进行了分析和展望。  相似文献   

8.
数字金融是国家数字经济战略中的核心内容,持续创新是数字金融技术体系的本质属性.区块链作为数字金融技术体系中的核心技术之一,是我国数字金融领域重点应用和关注的技术方向.从数字金融的需求和问题导向出发,未来需要重点关注和突破区块链技术7个方面的挑战,包括区块链体系架构、隐私保护、监管和审计、信息安全、核心模块和技术、标准、...  相似文献   

9.
IoT/CPS的安全体系结构及关键技术   总被引:1,自引:0,他引:1  
物联网(IoT)和信息物理融合系统(CPS)作为下一代网络的核心技术,被业界广泛关注。与传统网络不同,IoT/CPS异构融合、协同自治、开放互连的网络特性带来了巨大的系统安全方面的挑战。挑战包括安全协议的无缝衔接、用户隐私保护等。研发新的安全模型、关键安全技术和方法是IoT/CPS发展中的重点。文章基于IoT/CPS安全需求和威胁模型,提出了一种层次化的安全体系结构,并针对隐私保护、跨网认证和安全控制等IoT/CPS的关键安全技术展开讨论。  相似文献   

10.
李伟 《移动信息》2024,46(3):157-159
随着网络和移动设备用户数量的增长,信息安全和隐私保护变得越来越重要。文中提出了一种基于区块链的解决方案,即隐私保护型区块链系统,以保护用户数据的安全性和隐私性。此外,设计并实施了一种利用区块链不可篡改性和分布式特性的系统,以确保数据的完整性和防止未经授权的访问。通过仿真实验,验证了该系统的有效性和效率。实验结果表明,该系统在提高用户数据安全性和隐私性方面表现优异,是一种值得推广的新型数据保护策略。  相似文献   

11.
区块链具有透明性、数据完整性、防篡改等优点,在金融、政府、军事等领域有重要应用价值。目前有越来越多的工作研究区块链的隐私保护问题,典型的包括门罗币、Zerocash, Mixcoin等等。这些隐私保护方法可以用于保护区块链上用户的身份和交易的金额。隐私保护方案是双刃剑,一方面是对合法用户隐私的完善保护,另一方面如果完全脱离监管,则是对洗钱、勒索等违法犯罪行为的姑息和纵容。针对区块链上各种层出不穷的隐私保护方案,监管也要与时俱进。该文研究区块链用户身份的隐私保护和监管方法,提出了用户匿名和可追踪的技术,旨在推动区块链在实际中的应用。  相似文献   

12.
Blockchain is a key technique which can support Bitcoin. Blockchain is a decentralized infrastructure that uses chained data structure to verify and store data, and uses distributed node consensus mechanism to generate and update data. Blockchain has become a hot research topic since its attributes of decentralization, verifiability and anti-tampering. To stimulate the development of Blockchain, we conduct a comprehensive research on Blockchain. Specifically, we discuss various mainstream consensus mechanisms used in blockchain technology, and thoroughly analyze anonymity and privacy protection in digital currency. Aiming at data encryption mechanism, we discuss existing anonymity and privacy protection schemes. Our discussion can further promote the development of Blockchain.  相似文献   

13.
王月红 《移动信息》2024,46(3):154-156
文中探讨了区块链技术在数字身份验证中的应用及其可行性。随着数字化进程的加速,传统的身份验证机制面临着日益严峻的挑战,包括数据安全、隐私保护、用户体验等。区块链技术以其独特的去中心化特性、不可篡改的数据记录以及高度的透明性和安全性,为解决这些问题提供了新的途径。  相似文献   

14.
Information security and privacy on the internet are critical issues in our society. In this research, we examine factors that influence internet users' private-information-sharing behavior. Based on a survey of 285 preteens and early teens, who are among the most vulnerable groups on the web, this study provides a research framework that explains an internet user's information privacy protection behavior. According to our study results, internet users' information privacy behaviors are affected by two significant factors: (1) users' perceived importance of information privacy and (2) information privacy self-efficacy. The study also found that users believe in the value of online information privacy and that information privacy protection behavior varies by gender. Our findings indicate that educational opportunities regarding internet privacy and computer security as well as concerns from other reference groups (e.g., peer, teacher, and parents) play an important role in positively affecting the internet users' protective behavior regarding online privacy.   相似文献   

15.
随着区块链技术的迅猛发展,区块链系统的安全问题正逐渐暴露出来,给区块链生态系统带来巨大风险.通过回顾区块链安全方面的相关工作,对区块链潜在的安全问题进行了系统的研究.将区块链框架分为数据层、网络层、共识层和应用层4层,分析其中的安全漏洞及攻击原理,并讨论了增强区块链安全的防御方案.最后,在现有研究的基础上展望了区块链安...  相似文献   

16.
With the advent of blockchain, smart contracts have become one of the most sought-after technologies because of the high customisability they add to transactions. This has given rise to many smart contract applications in areas ranging from financial services, life sciences and healthcare to energy resources and voting. However, due to their infancy, smart contracts still pose many challenges that encumber the stakeholders who interact with them: users, developers and the organisations that are built on top of smart contracts. This study aims to contribute to the body of knowledge of smart contracts within blockchain technology. Based on a systematic mapping study, we offer a broad perspective on their problems and corresponding solutions, present the research trends within the area and compile the 64 papers identified, grouped by top publication sources, channels, methods and approaches. We conclude that, since 2016, there has been an increasing trend towards the publication of blockchain-based smart contract articles at conferences and journals, mainly reflecting experiments and presenting methods, tools and models. According to the results, the most commonly discussed problems and solutions in the literature are related to the security, privacy and scalability of blockchain and the programmability of smart contracts.  相似文献   

17.
刘宗妹 《通信技术》2020,(1):142-149
区块链技术具有去中心化、可追溯性和去信任化等特性,已被广泛应用于诸多领域。然而,人们往往忽略区块链自身的安全问题,较少有相关问题研究及解决方案的成果。文章着重剖析区块链所受安全威胁问题并提出其安全保护措施,从技术风险、内容风险等不同视角阐释区块链所受的安全攻击,在多个层面给出了区块链的安全保护机制,尤其对日蚀攻击防御中IP地址信用评价模型进行了思索。最后,从技术和监管两个方面,对区块链技术的发展进行了展望。  相似文献   

18.
区块链技术具有去中心化、可追溯性和去信任化等特性,已被广泛应用于诸多领域.然而,人们往往忽略区块链自身的安全问题,较少有相关问题研究及解决方案的成果.文章着重剖析区块链所受安全威胁问题并提出其安全保护措施,从技术风险、内容风险等不同视角阐释区块链所受的安全攻击,在多个层面给出了区块链的安全保护机制,尤其对日蚀攻击防御中...  相似文献   

19.
提出了一种基于同态加密和环签名的区块链资产交易系统,通过同态加密技术可以对用户交易信息进行加密,使其对其他用户不可见,而环签名可以对同态加密后的密文进行业务合法性校验,保证交易合法性。该方法可以使区块链上原本公开透明的用户资产交易信息得到保护,具有去中心化、安全可靠和易用性高的特点,可以有效地起到保护用户隐私的作用,有利于促进增强区块链在金融资产交易场景中的用户交易信息隐私保护功能,有利于促进区块链隐私保护技术在金融场景中的落地和发展。  相似文献   

20.
左益平  金石  张胜利 《电信科学》2019,35(9):114-123
区块链本质上是分布式数据库,无需第三方中介机构即可安全更新状态。将区块链技术引入6G蜂窝移动通信系统中以保障用户的隐私安全,减少资源分配和通信服务成本,支持不同分布式应用,从而实现移动通信和区块链技术的有机结合,被预测为6G蜂窝移动通信的关键技术之一。从区块链结合物联网(IoT)、边缘计算、频谱分配、干扰管理方面展开了详细的介绍,阐述了近年来国际学术界在该方向的最新研究进展,并在此基础上对6G蜂窝移动通信中区块链技术的发展趋势进行了进一步的展望。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号