Engaging in blockchain domain projects offers various advantages, as blockchain technology has unique features that can be beneficial in different contexts. Here are some key advantages:
Decentralization: Blockchain operates on a decentralized network of nodes, eliminating the need for a central authority. This can enhance security, reduce the risk of a single point of failure, and promote trust among participants in a network.
Transparency: Transactions on a blockchain are recorded in a transparent and immutable ledger. This transparency reduces the risk of fraud and increases accountability as all participants can verify the history of transactions.
Security: Blockchain uses cryptographic techniques to secure transactions and control access to information. The decentralized and tamper-resistant nature of blockchain makes it resistant to hacking and unauthorized alterations.
Smart Contracts: Smart contracts are self-executing contracts with the terms of the agreement directly written into code. They automate and enforce the execution of contractual agreements, reducing the need for intermediaries and the associated costs.
Immutable Record: Once data is added to a blockchain, it becomes extremely difficult to alter or delete. This immutability ensures the integrity of the data, which is particularly valuable in applications where data tampering is a concern.
Efficiency and Cost Reduction: Blockchain can streamline processes and reduce the need for intermediaries in various industries, leading to increased efficiency and cost savings. For example, in financial transactions, blockchain can eliminate the need for multiple intermediaries and reduce transaction times.
Cross-Border Transactions: Blockchain facilitates cross-border transactions by providing a decentralized and standardized platform for transactions. This can reduce the complexities and delays associated with traditional cross-border transactions.
Data Ownership and Privacy: Users have more control over their personal data on a blockchain. They can grant permission for specific entities to access their data, enhancing privacy and giving individuals more ownership and control over their information.
Traceability and Supply Chain Management: Blockchain enables end-to-end traceability of products in supply chains. This can help in verifying the authenticity of products, preventing fraud, and ensuring the quality and safety of goods.
Tokenization of Assets: Blockchain allows for the tokenization of physical and digital assets, enabling fractional ownership and making it easier to trade and transfer ownership of assets. This has implications for real estate, art, and other asset classes.
Incentive Mechanisms: Some blockchain networks use tokens and incentive mechanisms to encourage network participants to contribute resources, validate transactions, or perform other functions. This can create a self-sustaining ecosystem.
Improved Particle Swarm Optimization Based on Blockchain Mechanism for Flexib...BRNSSPublicationHubI
This document summarizes a research article about developing an improved particle swarm optimization algorithm using blockchain for flexible job shop scheduling and online gambling applications. It discusses how blockchain collects data from IoT devices and uses machine learning to analyze the data in real-time. The paper presents a blockchain-based betting application that was developed using Node.js, Web3 API, and Remix IDE. Key aspects of developing and testing the application are described, including user registration, login, and placing bets processes. The conclusion recommends further enhancing the system by fully implementing it on the blockchain for improved security and reliability.
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...IRJET Journal
This document proposes a blockchain-based fingerprint authentication scheme to securely retrieve citizen card details. The scheme involves encrypting fingerprint data before transferring it to the cloud for storage. When identity verification is needed, an encrypted query is sent to the cloud to find a fingerprint match. Any changes to the fingerprint data would generate a new hash, preventing tampering. The proposed method aims to provide effective and privacy-preserving biometric identification using blockchain technology.
NextGen Chain White Paper Final - Paul LalovichTesanovic
Pink Panda network NextGen Chain aims to empower businesses and individuals globally with technology sovereignty and become the go-to blockchain platform for growth markets. It envisions a future in which blockchain technology has widespread adoption, leading to new opportunities to bring together people across the digital highway from the Atlantic to the Pacific.
Yao Yao, Jack Rasmus-Vorrath, Ivelin Angelov
https://github.com/yaowser/basic_blockchain
https://www.slideshare.net/YaoYao44/blockchain-security-and-demonstration/
Distributed ledger technology over a network of computers, which provides an alternative to the centralized system
Distributed Database
Peer-to-Peer Transmission
Transparency with Pseudonymity
Records are immutable
Computational Logic
https://www.youtube.com/watch?v=5ArZxRdhyPc
A decentralized consensus application using blockchain ecosystem IJECEIAES
This document summarizes a research paper that proposes developing a secure decentralized consensus application using blockchain technology. The paper identifies limitations in traditional centralized consensus systems, such as availability issues if the central server fails and potential for data manipulation. The proposed application aims to address these issues by building a decentralized application on the Ethereum blockchain that uses smart contracts to securely store data and ensure integrity. The application architecture involves a front-end hosted on IPFS and a backend on the Ethereum blockchain network, where each node maintains a copy of the ledger and smart contracts. The paper provides an overview of blockchain technology and consensus mechanisms to provide context for the proposed application.
The fundamental security properties of blockchain originate from both bitcoin architecture and cryptography advances. the proficiency of the cryptographic chain of blocks was advanced giving birth to various inborn security qualities.
Creating An E-Commerce web application using BlockchainIRJET Journal
This document summarizes a research paper that explores using blockchain technology to develop e-commerce platforms. It discusses how blockchain can solve security issues, lack of trust in intermediaries, intermediary fees, and high transaction costs that are problems in the e-commerce sector. The paper describes using the Truffle framework, Solidity programming language, and Ethereum smart contracts to build a blockchain-based e-commerce application. It also discusses integrating the application with front-end tools like React JS and Web3.js. In summary, the paper proposes that a blockchain-powered e-commerce platform can provide a secure, trustworthy and cost-effective solution for online shopping.
An interactive Study on secure data sharing in the IOT through BlockchainIRJET Journal
This document summarizes a research paper that proposes using blockchain technology to securely share data in the Internet of Things (IoT). It first discusses the growing amounts of user data and issues with cloud-based data storage solutions regarding user privacy and access control. It then introduces blockchain as a decentralized solution and reviews previous research on using techniques like proxy re-encryption and attribute-based encryption to realize fine-grained access control of encrypted data. However, most existing solutions have high computational costs or security issues. The document concludes by stating the research will further elaborate on a proposed approach using blockchain and proxy re-encryption to securely store IoT medical data on public clouds.
Improved Particle Swarm Optimization Based on Blockchain Mechanism for Flexib...BRNSSPublicationHubI
This document summarizes a research article about developing an improved particle swarm optimization algorithm using blockchain for flexible job shop scheduling and online gambling applications. It discusses how blockchain collects data from IoT devices and uses machine learning to analyze the data in real-time. The paper presents a blockchain-based betting application that was developed using Node.js, Web3 API, and Remix IDE. Key aspects of developing and testing the application are described, including user registration, login, and placing bets processes. The conclusion recommends further enhancing the system by fully implementing it on the blockchain for improved security and reliability.
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...IRJET Journal
This document proposes a blockchain-based fingerprint authentication scheme to securely retrieve citizen card details. The scheme involves encrypting fingerprint data before transferring it to the cloud for storage. When identity verification is needed, an encrypted query is sent to the cloud to find a fingerprint match. Any changes to the fingerprint data would generate a new hash, preventing tampering. The proposed method aims to provide effective and privacy-preserving biometric identification using blockchain technology.
NextGen Chain White Paper Final - Paul LalovichTesanovic
Pink Panda network NextGen Chain aims to empower businesses and individuals globally with technology sovereignty and become the go-to blockchain platform for growth markets. It envisions a future in which blockchain technology has widespread adoption, leading to new opportunities to bring together people across the digital highway from the Atlantic to the Pacific.
Yao Yao, Jack Rasmus-Vorrath, Ivelin Angelov
https://github.com/yaowser/basic_blockchain
https://www.slideshare.net/YaoYao44/blockchain-security-and-demonstration/
Distributed ledger technology over a network of computers, which provides an alternative to the centralized system
Distributed Database
Peer-to-Peer Transmission
Transparency with Pseudonymity
Records are immutable
Computational Logic
https://www.youtube.com/watch?v=5ArZxRdhyPc
A decentralized consensus application using blockchain ecosystem IJECEIAES
This document summarizes a research paper that proposes developing a secure decentralized consensus application using blockchain technology. The paper identifies limitations in traditional centralized consensus systems, such as availability issues if the central server fails and potential for data manipulation. The proposed application aims to address these issues by building a decentralized application on the Ethereum blockchain that uses smart contracts to securely store data and ensure integrity. The application architecture involves a front-end hosted on IPFS and a backend on the Ethereum blockchain network, where each node maintains a copy of the ledger and smart contracts. The paper provides an overview of blockchain technology and consensus mechanisms to provide context for the proposed application.
The fundamental security properties of blockchain originate from both bitcoin architecture and cryptography advances. the proficiency of the cryptographic chain of blocks was advanced giving birth to various inborn security qualities.
Creating An E-Commerce web application using BlockchainIRJET Journal
This document summarizes a research paper that explores using blockchain technology to develop e-commerce platforms. It discusses how blockchain can solve security issues, lack of trust in intermediaries, intermediary fees, and high transaction costs that are problems in the e-commerce sector. The paper describes using the Truffle framework, Solidity programming language, and Ethereum smart contracts to build a blockchain-based e-commerce application. It also discusses integrating the application with front-end tools like React JS and Web3.js. In summary, the paper proposes that a blockchain-powered e-commerce platform can provide a secure, trustworthy and cost-effective solution for online shopping.
An interactive Study on secure data sharing in the IOT through BlockchainIRJET Journal
This document summarizes a research paper that proposes using blockchain technology to securely share data in the Internet of Things (IoT). It first discusses the growing amounts of user data and issues with cloud-based data storage solutions regarding user privacy and access control. It then introduces blockchain as a decentralized solution and reviews previous research on using techniques like proxy re-encryption and attribute-based encryption to realize fine-grained access control of encrypted data. However, most existing solutions have high computational costs or security issues. The document concludes by stating the research will further elaborate on a proposed approach using blockchain and proxy re-encryption to securely store IoT medical data on public clouds.
Application of Blockchain and Smart Contracts on the Internet of ThingsCSCJournals
With the recent peak in interest regarding the concepts of bitcoin and the associated Blockchain (BC) network, this paper seeks to examine current implementations of using peer-to-peer based transaction system and the technology behind it. Due to the inherent trustless transaction model incorporated within a BC based system, members are able to transact with other members without the use of a middleman. Additionally, this paper explores the concepts of smart contracts, scripts embedded into the BC system to execute specified external functions following a successful transaction on the network. This decentralized system appears to be the perfect fit for the growing Internet of Things (IoT), the network of devices that can facilitate a growing market between devices and services across the internet. The paper explores the various difficulties associated with setting up such a system, while also exploring the benefits solutions that a decentralized IoT BC system would provide to the current technological landscape. The findings of the paper indicate that there is a demand and a place for an IoT BC through the implementations of smart contracts and careful planning. This type of network could help to revolutionize the current industrial landscape across a variety of sectors in the near future.
This slide is about 'Blockchain Technology'. Blockchain is a method of recording information that makes it impossible or difficult for the system to be changed, hacked, or manipulated. A blockchain is a distributed ledger that duplicates and distributes transactions across the network of computers participating in the blockchain. Blockchain helps verify and trace multistep transactions needing verification and traceability. Cryptocurrencies are usually built using blockchain technology. Blockchain describes the way transactions are recorded into "blocks" and time stamped. It's a fairly complex, technical process, but the result is a digital ledger of cryptocurrency transactions that's hard for hackers to tamper with.
Blockchain technology provides several benefits for finance applications:
1. It enables more efficient processes, reduced costs, and new services in banking through open and secure networks.
2. It allows digital securities to be issued faster and at lower costs with more customization.
3. Applications include reducing fraud, improving security and trust through transparency and smart contracts, and enabling new tools for activities like clearing and settlement, collateral management, and insurance claims processing.
Cryptographically Secured Communication With Extraterrestrial Intelligence Us...IRJET Journal
Blockchain technology could enable secure communication with extraterrestrial intelligence. It provides data security, integrity, and a decentralized consensus mechanism. This allows for encrypting messages and ensuring their authenticity and tamper-resistance. Challenges include developing protocols that address delays from long distances in space and differences in potential alien languages and cultures. The paper explores how tokenizing space assets and using blockchain could help manage satellite mission data and secure satellite swarm communications. Experimental and simulation studies are still needed to validate proposed models.
IRJET- Consensus Mechanism on Secure Challenges in Blockchain NetworksIRJET Journal
This document discusses consensus mechanisms for blockchain networks and the security challenges they present. It begins with an introduction to blockchain technology and its applications like Bitcoin and Ethereum. The properties of blockchain like decentralization and tamper-proof records are described. The document then examines the consensus algorithm used to validate transactions and adds new blocks. It evaluates the performance of different consensus mechanisms and discusses issues like scalability, costs, and attacks. The conclusion is that consensus algorithms need to be tailored to specific blockchain applications and further work is still needed to solve challenges of reliability, throughput, and delays simultaneously.
Unlocking the Potential of Cross-Chain Bridging_ A Deep Dive.docxAnalog3
In the ever-evolving world of blockchain technology, interoperability has emerged as a crucial concept. As the number of blockchain networks grows, each with its own unique features and capabilities, the need for seamless communication between these networks becomes apparent. Enter cross-chain bridging, a groundbreaking solution that is revolutionizing the blockchain landscape. In this comprehensive guide, we'll explore what cross chain bridging is, its significance, and how it's reshaping the future of decentralized finance (DeFi) and blockchain applications.
IRJET- Photogroup: Decentralized Web Application using Ethereum BlockchainIRJET Journal
This document describes a proposed decentralized photo sharing application called Photogroup that is built using blockchain technology. Photogroup allows users to view, like, comment on and share photos in a peer-to-peer network without a central server. It uses Ethereum for the blockchain platform and smart contracts to manage transactions and the addition of new blocks. When a user shares a photo, the transaction is added to the blockchain through smart contracts to ensure the data is distributed and immutable across all nodes. The system aims to provide more security than centralized social networks by avoiding single points of failure and making the data difficult to hack or tamper with.
Blockchain-based Security Mechanisms for Internet of Medical Things (IOMT)IJCNCJournal
Traditional standards and security protocols are recognized as unable to solve the security, privacy, and availability of services of the Internet of Medical Things (IoMT) ecosystem, especially during the Coronavirus (COVID-19) pandemic. Blockchain technology has then emerged as a distributed ledger technology that can manage many intelligent transactions and ensure greater security in data management. The Blockchain-based security mechanisms with specific adaptation and additional layers of authentication and verification can offer a complete resources' management system. It has demonstrated it’s superlatively as the core component of the Bitcoin cryptocurrency. In this paper, we propose a ThreeTier Blockchain Architecture in a hierarchical clustering network, with a lightweight authentication system-based API Gateway model that provides network and communication security. Reasonable implementation is proposed and the obtained results demonstrate that our approach shows satisfactory performances in terms of transfer time, energy consumption, and CPU impacts. The traffic analysis also shows that the proposed model can meet the requested security, integrity, and confidentiality of user data.
BLOCKCHAIN-BASED SECURITY MECHANISMS FOR INTERNET OF MEDICAL THINGS (IOMT)IJCNCJournal
Traditional standards and security protocols are recognized as unable to solve the security, privacy, and
availability of services of the Internet of Medical Things (IoMT) ecosystem, especially during the
Coronavirus (COVID-19) pandemic. Blockchain technology has then emerged as a distributed ledger
technology that can manage many intelligent transactions and ensure greater security in data
management. The Blockchain-based security mechanisms with specific adaptation and additional layers of
authentication and verification can offer a complete resources' management system. It has demonstrated
it’s superlatively as the core component of the Bitcoin cryptocurrency. In this paper, we propose a ThreeTier Blockchain Architecture in a hierarchical clustering network, with a lightweight authentication
system-based API Gateway model that provides network and communication security.
Reasonable implementation is proposed and the obtained results demonstrate that our approach shows
satisfactory performances in terms of transfer time, energy consumption, and CPU impacts. The traffic
analysis also shows that the proposed model can meet the requested security, integrity, and confidentiality
of user data.
A survey on security and policy aspects of blockchain technologyTELKOMNIKA JOURNAL
This survey talks about the problem of security and privacy in the blockchain ecosystem which is currently a hot issue in the blockchain community. The survey intended to study this problem by considering different types of attacks in the blockchain network with respect to algorithms presented. After a preliminary literature review it seems that some focus has been given to study the first use case while, to the best of my knowledge, the second use case requires more attention when blockchain is applied to study it. The research is also interested in exploring the link between these two use cases to study the overall data ownership preserving accountable system which will be a novel contribution of this work. However, due to the subsequent government mandated secrecy around the implementation of data encryption standard (DES), and the distrust of the academic community because of this, a movement was spawned that put a premium on individual privacy and decentralized control. This movement brought together the top minds in encryption and spawned the technology we know of as blockchain today. This survey explores the genesis of encryption, its early adoption, and the government meddling which eventually spawned a movement which gave birth to the ideas behind blockchain.
How Integrated Process Management Completes the Blockchain JigsawCognizant
Blockchains, or distributed ledger technology, makes digital transactions safer for all parties, assuming that organizations apply traditional business orchestration and integrated process management to tightly connect legacy systems of record with emerging blockchain networks, promoting trust and true collaboration across their value chains.
final Year Projects, Final Year Projects in Chennai, Software Projects, Embedded Projects, Microcontrollers Projects, DSP Projects, VLSI Projects, Matlab Projects, Java Projects, .NET Projects, IEEE Projects, IEEE 2009 Projects, IEEE 2009 Projects, Software, IEEE 2009 Projects, Embedded, Software IEEE 2009 Projects, Embedded IEEE 2009 Projects, Final Year Project Titles, Final Year Project Reports, Final Year Project Review, Robotics Projects, Mechanical Projects, Electrical Projects, Power Electronics Projects, Power System Projects, Model Projects, Java Projects, J2EE Projects, Engineering Projects, Student Projects, Engineering College Projects, MCA Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, Wireless Networks Projects, Network Security Projects, Networking Projects, final year projects, ieee projects, student projects, college projects, ieee projects in chennai, java projects, software ieee projects, embedded ieee projects, "ieee2009projects", "final year projects", "ieee projects", "Engineering Projects", "Final Year Projects in Chennai", "Final year Projects at Chennai", Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, Final Year Java Projects, Final Year ASP.NET Projects, Final Year VB.NET Projects, Final Year C# Projects, Final Year Visual C++ Projects, Final Year Matlab Projects, Final Year NS2 Projects, Final Year C Projects, Final Year Microcontroller Projects, Final Year ATMEL Projects, Final Year PIC Projects, Final Year ARM Projects, Final Year DSP Projects, Final Year VLSI Projects, Final Year FPGA Projects, Final Year CPLD Projects, Final Year Power Electronics Projects, Final Year Electrical Projects, Final Year Robotics Projects, Final Year Solor Projects, Final Year MEMS Projects, Final Year J2EE Projects, Final Year J2ME Projects, Final Year AJAX Projects, Final Year Structs Projects, Final Year EJB Projects, Final Year Real Time Projects, Final Year Live Projects, Final Year Student Projects, Final Year Engineering Projects, Final Year MCA Projects, Final Year MBA Projects, Final Year College Projects, Final Year BE Projects, Final Year BTech Projects, Final Year ME Projects, Final Year MTech Projects, Final Year M.Sc Projects, IEEE Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, IEEE 2009 Java Projects, IEEE 2009 ASP.NET Projects, IEEE 2009 VB.NET Projects, IEEE 2009 C# Projects, IEEE 2009 Visual C++ Projects, IEEE 2009 Matlab Projects, IEEE 2009 NS2 Projects, IEEE 2009 C Projects, IEEE 2009 Microcontroller Projects, IEEE 2009 ATMEL Projects, IEEE 2009 PIC Projects, IEEE 2009 ARM Projects, IEEE 2009 DSP Projects, IEEE 2009 VLSI Projects, IEEE 2009 FPGA Projects, IEEE 2009 CPLD Projects, IEEE 2009 Power Electronics Projects, IEEE 2009 Electrical Projects, IEEE 2009 Robotics Projects, IEEE 2009 Solor Projects, IEEE 2009 MEMS Projects, IEEE 2009 J2EE P
Blockchain based electronic voting systemIRJET Journal
The document discusses using blockchain technology to create an electronic voting system. It begins by explaining some of the issues with current centralized electronic voting systems, such as the database being hackable and susceptible to manipulation. Blockchain provides a solution by using a decentralized, distributed ledger that makes tampering virtually impossible. The rest of the document discusses how a blockchain-based e-voting system would work, including how votes would be cast and recorded on the blockchain, ensuring security, transparency and immutability of votes. It also reviews some literature on previous research into blockchain voting systems.
Blockchain and Its Applications in the Real WorldIRJET Journal
This document discusses the applications of blockchain technology in various real-world sectors. It begins by providing background on blockchain and describing its architecture including block headers, timestamps, hashes, and Merkle roots. It then examines some key applications of blockchain including cryptocurrency and finance, healthcare, and e-governance. In finance, blockchain enables secure and transparent transactions. In healthcare, it allows for secure sharing of electronic health records. In e-governance, blockchain can provide transparent voting systems and secure digital identities. The document explores how blockchain improves areas like supply chain management, property rights, and decentralized finance through increased transparency, security, and integrity of data and transactions.
Merkle Trees, widely utilized in various computer science applications, including blockchain technology, offer several advantages, including the Simplified Payment Verification (SPV) feature. They enhance the effectiveness and security of data within networks like Bitcoin, providing a reliable and secure method for running and verifying blockchains. By utilizing a Merkle Tree database, block contents are securely divided, ensuring integrity and protection against loss, damage, or tampering. This data management technique allows for the validation of specific transactions without the need to download the entire terabytes-sized blockchain. The Merkle tree is a mathematical data structure based on hashing that serves as a summary of all transactions within a block, as shown in Fig. 2. It offers a decentralized and efficient approach to verify data accuracy. Given their unique characteristics, Merkle trees play a crucial role in enhancing the security and efficiency of encrypting blockchain data, particularly in Peer-to-Peer (P2P) networks where information exchange and independent evaluation are necessary. Merkle trees have a binary tree structure, with the top hash known as the "Root" and the transactional data hashes in the bottom row referred to as "Leaf Nodes." While most hash tree implementations are binary, with each node having two child nodes, Merkle trees have the flexibility to accommodate any number of child nodes without limitations.
Implementing Blockchain based Architecture for Securing Electronic Health Rec...IRJET Journal
The document proposes implementing a blockchain-based architecture to secure electronic health record (EHR) systems. Key benefits of using blockchain for EHRs include improved data sharing and interoperability between healthcare providers, increased data access for patients, and enhanced security and privacy of patient medical records and data. The proposed system would use blockchain instead of a traditional client-server architecture for EHRs to increase efficiency and security. It discusses related work applying blockchain to healthcare and EHR systems and potential issues that need to be addressed.
Blockchain Study(1) - What is Blockchain?Fermat Jade
This document discusses blockchain technology and provides examples of its applications. It begins by defining blockchain as a continuously growing list of records called blocks, linked using cryptography. Each block contains a cryptographic hash of the previous block, a timestamp, and transaction data. This makes blockchain resistant to modification of past data. The document then provides examples of how blockchain is being used in various industries like healthcare, finance, manufacturing, government, and more. It aims to show the vast potential applications of this new technology.
IRJET- Secure Online Voting Systems using Block of ChunksIRJET Journal
This document proposes a blockchain-based online voting system called Blockchain Voting System (BVS) to address the issues of slow voting processes and corruption in existing systems. BVS allows voters to simultaneously transmit their votes by assigning votes to pre-defined blocks on the blockchain. This significantly reduces delays in vote collection and tallying. BVS uses cryptography and message authentication to secure votes against hacking or manipulation. Analytical models show that BVS voting robustness increases with larger block parameters. The system could help achieve secure and transparent election results in less time.
This document discusses incorporating blockchain technology into supply chain management for tracking items through the supply chain and beyond. It begins with an executive overview, then provides background on blockchain including how it uses distributed databases of linked blocks to securely record transactions and share information. The document outlines potential applications of blockchain for supply chain management, as well as current commercial uses and alternative blockchain designs being developed.
This document provides an overview of wound healing, its functions, stages, mechanisms, factors affecting it, and complications.
A wound is a break in the integrity of the skin or tissues, which may be associated with disruption of the structure and function.
Healing is the body’s response to injury in an attempt to restore normal structure and functions.
Healing can occur in two ways: Regeneration and Repair
There are 4 phases of wound healing: hemostasis, inflammation, proliferation, and remodeling. This document also describes the mechanism of wound healing. Factors that affect healing include infection, uncontrolled diabetes, poor nutrition, age, anemia, the presence of foreign bodies, etc.
Complications of wound healing like infection, hyperpigmentation of scar, contractures, and keloid formation.
More Related Content
Similar to Titles with Abstracts_2023-2024_Block Chain.pdf
Application of Blockchain and Smart Contracts on the Internet of ThingsCSCJournals
With the recent peak in interest regarding the concepts of bitcoin and the associated Blockchain (BC) network, this paper seeks to examine current implementations of using peer-to-peer based transaction system and the technology behind it. Due to the inherent trustless transaction model incorporated within a BC based system, members are able to transact with other members without the use of a middleman. Additionally, this paper explores the concepts of smart contracts, scripts embedded into the BC system to execute specified external functions following a successful transaction on the network. This decentralized system appears to be the perfect fit for the growing Internet of Things (IoT), the network of devices that can facilitate a growing market between devices and services across the internet. The paper explores the various difficulties associated with setting up such a system, while also exploring the benefits solutions that a decentralized IoT BC system would provide to the current technological landscape. The findings of the paper indicate that there is a demand and a place for an IoT BC through the implementations of smart contracts and careful planning. This type of network could help to revolutionize the current industrial landscape across a variety of sectors in the near future.
This slide is about 'Blockchain Technology'. Blockchain is a method of recording information that makes it impossible or difficult for the system to be changed, hacked, or manipulated. A blockchain is a distributed ledger that duplicates and distributes transactions across the network of computers participating in the blockchain. Blockchain helps verify and trace multistep transactions needing verification and traceability. Cryptocurrencies are usually built using blockchain technology. Blockchain describes the way transactions are recorded into "blocks" and time stamped. It's a fairly complex, technical process, but the result is a digital ledger of cryptocurrency transactions that's hard for hackers to tamper with.
Blockchain technology provides several benefits for finance applications:
1. It enables more efficient processes, reduced costs, and new services in banking through open and secure networks.
2. It allows digital securities to be issued faster and at lower costs with more customization.
3. Applications include reducing fraud, improving security and trust through transparency and smart contracts, and enabling new tools for activities like clearing and settlement, collateral management, and insurance claims processing.
Cryptographically Secured Communication With Extraterrestrial Intelligence Us...IRJET Journal
Blockchain technology could enable secure communication with extraterrestrial intelligence. It provides data security, integrity, and a decentralized consensus mechanism. This allows for encrypting messages and ensuring their authenticity and tamper-resistance. Challenges include developing protocols that address delays from long distances in space and differences in potential alien languages and cultures. The paper explores how tokenizing space assets and using blockchain could help manage satellite mission data and secure satellite swarm communications. Experimental and simulation studies are still needed to validate proposed models.
IRJET- Consensus Mechanism on Secure Challenges in Blockchain NetworksIRJET Journal
This document discusses consensus mechanisms for blockchain networks and the security challenges they present. It begins with an introduction to blockchain technology and its applications like Bitcoin and Ethereum. The properties of blockchain like decentralization and tamper-proof records are described. The document then examines the consensus algorithm used to validate transactions and adds new blocks. It evaluates the performance of different consensus mechanisms and discusses issues like scalability, costs, and attacks. The conclusion is that consensus algorithms need to be tailored to specific blockchain applications and further work is still needed to solve challenges of reliability, throughput, and delays simultaneously.
Unlocking the Potential of Cross-Chain Bridging_ A Deep Dive.docxAnalog3
In the ever-evolving world of blockchain technology, interoperability has emerged as a crucial concept. As the number of blockchain networks grows, each with its own unique features and capabilities, the need for seamless communication between these networks becomes apparent. Enter cross-chain bridging, a groundbreaking solution that is revolutionizing the blockchain landscape. In this comprehensive guide, we'll explore what cross chain bridging is, its significance, and how it's reshaping the future of decentralized finance (DeFi) and blockchain applications.
IRJET- Photogroup: Decentralized Web Application using Ethereum BlockchainIRJET Journal
This document describes a proposed decentralized photo sharing application called Photogroup that is built using blockchain technology. Photogroup allows users to view, like, comment on and share photos in a peer-to-peer network without a central server. It uses Ethereum for the blockchain platform and smart contracts to manage transactions and the addition of new blocks. When a user shares a photo, the transaction is added to the blockchain through smart contracts to ensure the data is distributed and immutable across all nodes. The system aims to provide more security than centralized social networks by avoiding single points of failure and making the data difficult to hack or tamper with.
Blockchain-based Security Mechanisms for Internet of Medical Things (IOMT)IJCNCJournal
Traditional standards and security protocols are recognized as unable to solve the security, privacy, and availability of services of the Internet of Medical Things (IoMT) ecosystem, especially during the Coronavirus (COVID-19) pandemic. Blockchain technology has then emerged as a distributed ledger technology that can manage many intelligent transactions and ensure greater security in data management. The Blockchain-based security mechanisms with specific adaptation and additional layers of authentication and verification can offer a complete resources' management system. It has demonstrated it’s superlatively as the core component of the Bitcoin cryptocurrency. In this paper, we propose a ThreeTier Blockchain Architecture in a hierarchical clustering network, with a lightweight authentication system-based API Gateway model that provides network and communication security. Reasonable implementation is proposed and the obtained results demonstrate that our approach shows satisfactory performances in terms of transfer time, energy consumption, and CPU impacts. The traffic analysis also shows that the proposed model can meet the requested security, integrity, and confidentiality of user data.
BLOCKCHAIN-BASED SECURITY MECHANISMS FOR INTERNET OF MEDICAL THINGS (IOMT)IJCNCJournal
Traditional standards and security protocols are recognized as unable to solve the security, privacy, and
availability of services of the Internet of Medical Things (IoMT) ecosystem, especially during the
Coronavirus (COVID-19) pandemic. Blockchain technology has then emerged as a distributed ledger
technology that can manage many intelligent transactions and ensure greater security in data
management. The Blockchain-based security mechanisms with specific adaptation and additional layers of
authentication and verification can offer a complete resources' management system. It has demonstrated
it’s superlatively as the core component of the Bitcoin cryptocurrency. In this paper, we propose a ThreeTier Blockchain Architecture in a hierarchical clustering network, with a lightweight authentication
system-based API Gateway model that provides network and communication security.
Reasonable implementation is proposed and the obtained results demonstrate that our approach shows
satisfactory performances in terms of transfer time, energy consumption, and CPU impacts. The traffic
analysis also shows that the proposed model can meet the requested security, integrity, and confidentiality
of user data.
A survey on security and policy aspects of blockchain technologyTELKOMNIKA JOURNAL
This survey talks about the problem of security and privacy in the blockchain ecosystem which is currently a hot issue in the blockchain community. The survey intended to study this problem by considering different types of attacks in the blockchain network with respect to algorithms presented. After a preliminary literature review it seems that some focus has been given to study the first use case while, to the best of my knowledge, the second use case requires more attention when blockchain is applied to study it. The research is also interested in exploring the link between these two use cases to study the overall data ownership preserving accountable system which will be a novel contribution of this work. However, due to the subsequent government mandated secrecy around the implementation of data encryption standard (DES), and the distrust of the academic community because of this, a movement was spawned that put a premium on individual privacy and decentralized control. This movement brought together the top minds in encryption and spawned the technology we know of as blockchain today. This survey explores the genesis of encryption, its early adoption, and the government meddling which eventually spawned a movement which gave birth to the ideas behind blockchain.
How Integrated Process Management Completes the Blockchain JigsawCognizant
Blockchains, or distributed ledger technology, makes digital transactions safer for all parties, assuming that organizations apply traditional business orchestration and integrated process management to tightly connect legacy systems of record with emerging blockchain networks, promoting trust and true collaboration across their value chains.
final Year Projects, Final Year Projects in Chennai, Software Projects, Embedded Projects, Microcontrollers Projects, DSP Projects, VLSI Projects, Matlab Projects, Java Projects, .NET Projects, IEEE Projects, IEEE 2009 Projects, IEEE 2009 Projects, Software, IEEE 2009 Projects, Embedded, Software IEEE 2009 Projects, Embedded IEEE 2009 Projects, Final Year Project Titles, Final Year Project Reports, Final Year Project Review, Robotics Projects, Mechanical Projects, Electrical Projects, Power Electronics Projects, Power System Projects, Model Projects, Java Projects, J2EE Projects, Engineering Projects, Student Projects, Engineering College Projects, MCA Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, Wireless Networks Projects, Network Security Projects, Networking Projects, final year projects, ieee projects, student projects, college projects, ieee projects in chennai, java projects, software ieee projects, embedded ieee projects, "ieee2009projects", "final year projects", "ieee projects", "Engineering Projects", "Final Year Projects in Chennai", "Final year Projects at Chennai", Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, Final Year Java Projects, Final Year ASP.NET Projects, Final Year VB.NET Projects, Final Year C# Projects, Final Year Visual C++ Projects, Final Year Matlab Projects, Final Year NS2 Projects, Final Year C Projects, Final Year Microcontroller Projects, Final Year ATMEL Projects, Final Year PIC Projects, Final Year ARM Projects, Final Year DSP Projects, Final Year VLSI Projects, Final Year FPGA Projects, Final Year CPLD Projects, Final Year Power Electronics Projects, Final Year Electrical Projects, Final Year Robotics Projects, Final Year Solor Projects, Final Year MEMS Projects, Final Year J2EE Projects, Final Year J2ME Projects, Final Year AJAX Projects, Final Year Structs Projects, Final Year EJB Projects, Final Year Real Time Projects, Final Year Live Projects, Final Year Student Projects, Final Year Engineering Projects, Final Year MCA Projects, Final Year MBA Projects, Final Year College Projects, Final Year BE Projects, Final Year BTech Projects, Final Year ME Projects, Final Year MTech Projects, Final Year M.Sc Projects, IEEE Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, IEEE 2009 Java Projects, IEEE 2009 ASP.NET Projects, IEEE 2009 VB.NET Projects, IEEE 2009 C# Projects, IEEE 2009 Visual C++ Projects, IEEE 2009 Matlab Projects, IEEE 2009 NS2 Projects, IEEE 2009 C Projects, IEEE 2009 Microcontroller Projects, IEEE 2009 ATMEL Projects, IEEE 2009 PIC Projects, IEEE 2009 ARM Projects, IEEE 2009 DSP Projects, IEEE 2009 VLSI Projects, IEEE 2009 FPGA Projects, IEEE 2009 CPLD Projects, IEEE 2009 Power Electronics Projects, IEEE 2009 Electrical Projects, IEEE 2009 Robotics Projects, IEEE 2009 Solor Projects, IEEE 2009 MEMS Projects, IEEE 2009 J2EE P
Blockchain based electronic voting systemIRJET Journal
The document discusses using blockchain technology to create an electronic voting system. It begins by explaining some of the issues with current centralized electronic voting systems, such as the database being hackable and susceptible to manipulation. Blockchain provides a solution by using a decentralized, distributed ledger that makes tampering virtually impossible. The rest of the document discusses how a blockchain-based e-voting system would work, including how votes would be cast and recorded on the blockchain, ensuring security, transparency and immutability of votes. It also reviews some literature on previous research into blockchain voting systems.
Blockchain and Its Applications in the Real WorldIRJET Journal
This document discusses the applications of blockchain technology in various real-world sectors. It begins by providing background on blockchain and describing its architecture including block headers, timestamps, hashes, and Merkle roots. It then examines some key applications of blockchain including cryptocurrency and finance, healthcare, and e-governance. In finance, blockchain enables secure and transparent transactions. In healthcare, it allows for secure sharing of electronic health records. In e-governance, blockchain can provide transparent voting systems and secure digital identities. The document explores how blockchain improves areas like supply chain management, property rights, and decentralized finance through increased transparency, security, and integrity of data and transactions.
Merkle Trees, widely utilized in various computer science applications, including blockchain technology, offer several advantages, including the Simplified Payment Verification (SPV) feature. They enhance the effectiveness and security of data within networks like Bitcoin, providing a reliable and secure method for running and verifying blockchains. By utilizing a Merkle Tree database, block contents are securely divided, ensuring integrity and protection against loss, damage, or tampering. This data management technique allows for the validation of specific transactions without the need to download the entire terabytes-sized blockchain. The Merkle tree is a mathematical data structure based on hashing that serves as a summary of all transactions within a block, as shown in Fig. 2. It offers a decentralized and efficient approach to verify data accuracy. Given their unique characteristics, Merkle trees play a crucial role in enhancing the security and efficiency of encrypting blockchain data, particularly in Peer-to-Peer (P2P) networks where information exchange and independent evaluation are necessary. Merkle trees have a binary tree structure, with the top hash known as the "Root" and the transactional data hashes in the bottom row referred to as "Leaf Nodes." While most hash tree implementations are binary, with each node having two child nodes, Merkle trees have the flexibility to accommodate any number of child nodes without limitations.
Implementing Blockchain based Architecture for Securing Electronic Health Rec...IRJET Journal
The document proposes implementing a blockchain-based architecture to secure electronic health record (EHR) systems. Key benefits of using blockchain for EHRs include improved data sharing and interoperability between healthcare providers, increased data access for patients, and enhanced security and privacy of patient medical records and data. The proposed system would use blockchain instead of a traditional client-server architecture for EHRs to increase efficiency and security. It discusses related work applying blockchain to healthcare and EHR systems and potential issues that need to be addressed.
Blockchain Study(1) - What is Blockchain?Fermat Jade
This document discusses blockchain technology and provides examples of its applications. It begins by defining blockchain as a continuously growing list of records called blocks, linked using cryptography. Each block contains a cryptographic hash of the previous block, a timestamp, and transaction data. This makes blockchain resistant to modification of past data. The document then provides examples of how blockchain is being used in various industries like healthcare, finance, manufacturing, government, and more. It aims to show the vast potential applications of this new technology.
IRJET- Secure Online Voting Systems using Block of ChunksIRJET Journal
This document proposes a blockchain-based online voting system called Blockchain Voting System (BVS) to address the issues of slow voting processes and corruption in existing systems. BVS allows voters to simultaneously transmit their votes by assigning votes to pre-defined blocks on the blockchain. This significantly reduces delays in vote collection and tallying. BVS uses cryptography and message authentication to secure votes against hacking or manipulation. Analytical models show that BVS voting robustness increases with larger block parameters. The system could help achieve secure and transparent election results in less time.
This document discusses incorporating blockchain technology into supply chain management for tracking items through the supply chain and beyond. It begins with an executive overview, then provides background on blockchain including how it uses distributed databases of linked blocks to securely record transactions and share information. The document outlines potential applications of blockchain for supply chain management, as well as current commercial uses and alternative blockchain designs being developed.
Similar to Titles with Abstracts_2023-2024_Block Chain.pdf (20)
This document provides an overview of wound healing, its functions, stages, mechanisms, factors affecting it, and complications.
A wound is a break in the integrity of the skin or tissues, which may be associated with disruption of the structure and function.
Healing is the body’s response to injury in an attempt to restore normal structure and functions.
Healing can occur in two ways: Regeneration and Repair
There are 4 phases of wound healing: hemostasis, inflammation, proliferation, and remodeling. This document also describes the mechanism of wound healing. Factors that affect healing include infection, uncontrolled diabetes, poor nutrition, age, anemia, the presence of foreign bodies, etc.
Complications of wound healing like infection, hyperpigmentation of scar, contractures, and keloid formation.
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...EduSkills OECD
Andreas Schleicher, Director of Education and Skills at the OECD presents at the launch of PISA 2022 Volume III - Creative Minds, Creative Schools on 18 June 2024.
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...TechSoup
Whether you're new to SEO or looking to refine your existing strategies, this webinar will provide you with actionable insights and practical tips to elevate your nonprofit's online presence.
How to Setup Default Value for a Field in Odoo 17Celine George
In Odoo, we can set a default value for a field during the creation of a record for a model. We have many methods in odoo for setting a default value to the field.
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.pptHenry Hollis
The History of NZ 1870-1900.
Making of a Nation.
From the NZ Wars to Liberals,
Richard Seddon, George Grey,
Social Laboratory, New Zealand,
Confiscations, Kotahitanga, Kingitanga, Parliament, Suffrage, Repudiation, Economic Change, Agriculture, Gold Mining, Timber, Flax, Sheep, Dairying,
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...indexPub
The recent surge in pro-Palestine student activism has prompted significant responses from universities, ranging from negotiations and divestment commitments to increased transparency about investments in companies supporting the war on Gaza. This activism has led to the cessation of student encampments but also highlighted the substantial sacrifices made by students, including academic disruptions and personal risks. The primary drivers of these protests are poor university administration, lack of transparency, and inadequate communication between officials and students. This study examines the profound emotional, psychological, and professional impacts on students engaged in pro-Palestine protests, focusing on Generation Z's (Gen-Z) activism dynamics. This paper explores the significant sacrifices made by these students and even the professors supporting the pro-Palestine movement, with a focus on recent global movements. Through an in-depth analysis of printed and electronic media, the study examines the impacts of these sacrifices on the academic and personal lives of those involved. The paper highlights examples from various universities, demonstrating student activism's long-term and short-term effects, including disciplinary actions, social backlash, and career implications. The researchers also explore the broader implications of student sacrifices. The findings reveal that these sacrifices are driven by a profound commitment to justice and human rights, and are influenced by the increasing availability of information, peer interactions, and personal convictions. The study also discusses the broader implications of this activism, comparing it to historical precedents and assessing its potential to influence policy and public opinion. The emotional and psychological toll on student activists is significant, but their sense of purpose and community support mitigates some of these challenges. However, the researchers call for acknowledging the broader Impact of these sacrifices on the future global movement of FreePalestine.
3. ELYSIUMPRO TITLES WITH ABSTRACTS 2023-2024
EPRO_BC_001 A Low-Cost Cross-Border Payment SystemBased on Auditable Cryptocurrency With
Consortium Blockchain: Joint Digital Currency
Due to the involvement of a large number of intermediaries across different time zones in the correspondent
banking process, existing interbank payment systems cannot provide cost-effective cross-border transactions.
They also suffer from lack of transparency and long transaction delays. These issues can be solved by designing
a cryptocurrency in an auditable manner using a permissioned blockchain where a group of authorities can
govern the network. In this article, we propose a low-cost, seamless cross-border payment system based on an
auditable cryptocurrency that enables unspent transaction output-based transactions in a consortium blockchain
network. To manage the blockchain, participating countries execute the energy-efficient proof of authority
consensus algorithm with equal rights. Unlike conventional cryptocurrencies, dynamic decentralized identifiers
(DIDs) are used as transacting addresses so that self-manageable authentication can be performed on-chain
without any interaction with a trusted third party. The identity of transacting parties is known to respective DID
issuers only.
EPRO_BC_002 A Light Blockchain for Behind-the-Meter Peer-to-Peer Energy Transactions in Cyber-
Physical Power Systems
Household-level distributed energy sources, such as rooftop photovoltaic, microturbines, and energy storage,
become important behind-the-meter (BTM) resources. BTM resources can meet all or part of users’ demands.
Establishing a peer-to-peer (P2P) energy trading network among these users will further promote the utilization
of BTM resources. However, such a proposal faces the problem that cyber trading and physical dispatching are
difficult to coordinate. Therefore, this paper proposes the architecture of the behind-the-meter peer-to-peer
(BTM-P2P) energy trading system, including the cyber layer and physical layer. To ensure that users strictly
execute the cyber trading results in the physical layer, a trading mechanism considering credit is designed, and
the user’s credit has an impact on the bidding priority, which in turn urges the user to strictly execute in
subsequent tradings. Then, a light blockchain suitable for energy trading is developed, ensuring that both the
trading results and the actual dispatching results are not tampered with. Database technology is inserted in the
light blockchain to improve efficiency. Finally, a BTM-P2P cyber-physical testbed coupling physical
dispatching with cyber trading is built, providing technical support for the implementation of BTM-P2P.
4. ELYSIUMPRO TITLES WITH ABSTRACTS 2023-2024
EPRO_BC_003 Malicious Node Detection Using Machine Learning and Distributed Data Storage
Using Blockchain in WSNs
In the proposed work, blockchain is implemented on the Base Stations (BSs) and Cluster Heads (CHs) to register
the nodes using their credentials and also to tackle various security issues. Moreover, a Machine Learning (ML)
classifier, termed as Histogram Gradient Boost (HGB), is employed on the BSs to classify the nodes as
malicious or legitimate. In case, the node is found to be malicious, its registration is revoked from the network.
Whereas, if a node is found to be legitimate, then its data is stored in an Interplanetary File System (IPFS). IPFS
stores the data in the form of chunks and generates hash for the data, which is then stored in blockchain. In
addition, Verifiable Byzantine Fault Tolerance (VBFT) is used instead of Proof of Work (PoW) to perform
consensus and validate transactions. Also, extensive simulations are performed using the Wireless Sensor
Network (WSN) dataset, referred as WSN-DS. The proposed model is evaluated both on the original dataset
and the balanced dataset. Furthermore, HGB is compared with other existing classifiers, Adaptive Boost
(AdaBoost), Gradient Boost (GB), Linear Discriminant Analysis (LDA), Extreme Gradient Boost (XGB) and
ridge, using different performance metrics like accuracy, precision, recall, micro-F1 score and macro-F1 score.
EPRO_BC_004 Blockchain-Based Secure and Efficient Secret Image Sharing with Outsourcing
Computation inWireless Networks
Secret Image Sharing (SIS) is the technology that shares any given secret image by generating and distributing
n shadow images in the way that any subset of k shadow images can restore the secret image. However, in the
existing SIS schemes, the shadow images will be easily tampered and corrupted during the communication,
which will pose serious security issues. Recently, blockchain has emerged as a promising paradigm in the field
of data communication and information security. To securely communicate and effectively protect the secret
image data in wireless networks, we propose a Blockchain-based Secure and Efficient Secret Image Sharing
(BC-SESIS) scheme with outsourcing computation in wireless networks. In the proposed BC-SESIS scheme,
the shadow images are encrypted and stored in the blockchain to prevent them from being tampered and
corrupted.
5. ELYSIUMPRO TITLES WITH ABSTRACTS 2023-2024
EPRO_BC_005 Blockchain Mining with Multiple Selfish Miners
This paper studies a fundamental problem regarding the security of blockchain PoW consensus on how the
existence of multiple misbehaving miners influences the profitability of selfish mining. Each selfish miner
maintains a private chain and makes it public opportunistically for acquiring more rewards incommensurate to
his Hash power. We first establish a general Markov chain model to characterize the state transition of public
and private chains for Basic Selfish Mining (BSM), and derive the stationary profitable threshold of Hash power
in closed form. It reduces from 25% for a single attacker to below 21.48% for two symmetric attackers
theoretically, and further reduces to around 10% with eight symmetric attackers experimentally. We next
explore the profitable threshold when one of the attackers performs strategic mining based on Partially
Observable Markov Decision Process (POMDP) that only half of the attributes pertinent to a mining state are
observable to him. An online algorithm is presented to compute the nearly optimal policy efficiently despite the
large state space and high dimensional belief space.
EPRO_BC_006 Structural Identity Representation Learning forBlockchain-Enabled Metaverse Based
on Complex Network Analysis
The metaverse and its underlying blockchain technology have attracted extensive attention in the past few years.
How to mine, process, and analyze the tremendous data generated by the metaverse systems has posed a number
of challenges. Aiming to address them, we mainly focus on modeling and understanding the blockchain
transaction network from a structural identity perspective, which represents the entire network structure and
reveals the relations among multiple entities. In this article, we analyze three metaverse-related systems: non-
fungible token (NFT), Ethereum (ETH), and Bitcoin (BTC) from the structural-identity perspective. First, we
conduct the complex network analysis of the metaverse network and obtain several new insights (i.e., power-
law degree distribution, disconnection, disassortativity, preferential attachment, and non-rich-club effect).
Secondly, based on such findings, we propose a novel representation learning method named structure-to-vector
with random pace (SVRP) for learning both the latent representation and structural identity of the network.
6. ELYSIUMPRO TITLES WITH ABSTRACTS 2023-2024
EPRO_BC_007 Trust-Preserving Mechanism for Blockchain Assisted Mobile Crowdsensing
In today's complex Internet platform, online users need help to protect their online identity. Only sometimes,
websites are very transparent about how user data will be collected, stored and processed by them. Sometimes
Internet entities collect more online user information than required. These entities often share user identity-
related data with third parties without consent. Existing traditional identity schemes need to be improved to stop
and counter new ways of digital identity theft and fraud. Blockchain is a promising technology to strengthen
the preservation of online users' digital identity due to its decentralised nature and robust data security features.
In this paper, we proposed and implemented a generic blockchain- IoT-based self-sovereign identity
management framework called ChainDiscipline. We have demonstrated the framework's oper- ability and
functionality by implementing healthcare and smart home data management-based use cases.
EPRO_BC_008 ChainDiscipline - Towards A Blockchain-IoT-Based Self-Sovereign Identity
Management Framework
In today's complex Internet platform, online users need help to protect their online identity. Only sometimes,
websites are very transparent about how user data will be collected, stored and processed by them. Sometimes
Internet entities collect more online user information than required. These entities often share user identity-
related data with third parties without consent. Existing traditional identity schemes need to be improved to stop
and counter new ways of digital identity theft and fraud. Blockchain is a promising technology to strengthen
the preservation of online users' digital identity due to its decentralised nature and robust data security features.
In this paper, we proposed and implemented a generic blockchain- IoT-based self-sovereign identity
management framework called ChainDiscipline. We have demonstrated the framework's oper- ability and
functionality by implementing healthcare and smart home data management-based use cases.
7. ELYSIUMPRO TITLES WITH ABSTRACTS 2023-2024
EPRO_BC_009 Block chain-based Secure Storage and Access Scheme For Electronic Medical Records
in IPFS
Electronic medical records can help people prevent diseases, improve cure rates, provide a significant basis for
medical institutions and pharmaceutical companies, and provide legal evidence for medical negligence and
medical disputes. However, the integrity and security problems of electronic medical data still intractable. In
this paper, based on the ciphertext policy attribute-based encryption system and IPFS storage environment,
combined with blockchain technology, we constructed an attribute-based encryption scheme for secure storage
and efficient sharing of electronic medical records in IPFS storage environment. Our scheme is based on
ciphertext policy attribute encryption, which effectively controls the access of electronic medical data without
affecting efficient retrieval. Meanwhile, we store the encrypted electronic medical data in the decentralized
InterPlanetary File System (IPFS), which not only ensures the security of the storage platform but also solves
the problem of the single point of failure. Besides, we leverage the non-tamperable and traceable nature of
blockchain technology to achieve secure storage and search for medical data. The security proof shows that our
scheme achieves selective security for the choose keyword attacks. Performance analysis and real data set
simulation experiments shows that our scheme is efficient and feasible.
EPRO_BC_010 Privacy-preserving Blockchain based IoT Ecosystem using Attribute-based Encryption
The Internet of Things (IoT) has penetrated deeply into our lives and the number of IoT devices per person is
expected to increase substantially over the next few years. Due to the characteristics of IoT devices (i.e., low
power and low battery), usage of these devices in critical applications requires sophisticated security measures.
Researchers from academia and industry now increasingly exploit the concept of blockchains to achieve security
in IoT applications. The basic idea of the blockchain is that the data generated by users or devices in the past
are verified for correctness and cannot be tampered once it is updated on the blockchain. Even though the
blockchain supports integrity and non-repudiation to some extent, confidentiality and privacy of the data or the
devices are not preserved. The content of the data can be seen by anyone in the network for verification and
mining purposes. In order to address these privacy issues, we propose a new privacy-preserving blockchain
architecture for IoT applications based on attribute-based encryption (ABE) techniques. Security, privacy, and
numerical analyses are presented to validate the proposed model.
8. ELYSIUMPRO TITLES WITH ABSTRACTS 2023-2024
EPRO_BC_011 Blockchain technology for cybersecurity applications in the food supply chain
The food supply chain is a complex system responsible for the circulation of food products, and managing it
requires IT infrastructures and technologies that are free of cyber-risk and that are used to connect, build and
share information. Blockchain technology is a distributed ledger that can play an important role in providing
data transparency, trust, immutability, integrity, and traceability to all food supply chain members. The purpose
of this review is to depict a landscape of the scientific literature enriched by an author's keywords analysis to
develop and test blockchain’s capabilities for cyber-risks prevention in international food supply chains. This
paper combines a systematic literature review (SLR) process with the analysis of bibliographic networks.
EPRO_BC_012 A Blockchain-Based Machine Learning Framework for Edge Services in IIoT
Edge services provide an effective and superior means of real-time transmissions and rapid processing of
information in the Industrial Internet of Things (IIoT). However, the continuous increase of the number of smart
devices results in privacy leakage and insufficient model accuracy of edge services. To tackle these challenges,
in this article, we propose a blockchain-based machine learning framework for edge services (BML-ES) in IIoT.
Specifically, we construct novel smart contracts to encourage multiparty participation of edge services to
improve the efficiency of data processing. Moreover, we propose an aggregation strategy to verify and aggregate
model parameters to ensure the accuracy of decision tree models. Finally, based on the SM2 public key
cryptosystem, we protect data security and prevent data privacy leakage in edge services. Theoretical analysis
and simulation experiments indicate that the BML-ES framework is secure, effective, and efficient, and is better
suitable to improve the accuracy of edge services in IIoT.
9. ELYSIUMPRO TITLES WITH ABSTRACTS 2023-2024
EPRO_BC_013 A distributed computing framework based on lightweight variance reduction method
to accelerate machine learning training on blockchain
To security support large-scale intelligent applications, distributed machine learning based on blockchain is an
intuitive solution scheme. However, the distributed machine learning is difficult to train due to that the
corresponding optimization solver algorithms converge slowly, which highly demand on computing and
memory resources. To overcome the challenges, we propose a distributed computing framework for L-BFGS
optimization algorithm based on variance reduction method, which is a lightweight, few additional cost and
parallelized scheme for the model training process. To validate the claims, we have conducted several
experiments on multiple classical datasets. Results show that our proposed computing framework can steadily
accelerate the training process of solver in either local mode or distributed mode.
EPRO_BC_014 Efficient Privacy-Preserving Machine Learning for Blockchain Network
A blockchain as a trustworthy and secure decentralized and distributed network has been emerged for many
applications such as in banking, finance, insurance, healthcare and business. Recently, many communities in
blockchain networks want to deploy machine learning models to get meaningful knowledge from
geographically distributed large-scale data owned by each participant. To run a learning model without data
centralization, distributed machine learning (DML) for blockchain networks has been studied. While several
works have been proposed, privacy and security have not been sufficiently addressed, and as we show later,
there are vulnerabilities in the architecture and limitations in terms of efficiency. In this paper, we propose a
privacy-preserving DML model for a permissioned blockchain to resolve the privacy, security, and performance
issues in a systematic way. We develop a differentially private stochastic gradient descent method and an error-
based aggregation rule as core primitives. Our model can treat any type of differentially private learning
algorithm where non-deterministic functions should be defined.
10. ELYSIUMPRO TITLES WITH ABSTRACTS 2023-2024
EPRO_BC_015 Evolved PoW: Integrating the Matrix Computation in Machine Learning into
Blockchain Mining
Machine learning is an essential technology providing ubiquitous intelligence in Internet of Things (IoT).
However, the model training in machine learning demands tremendous computing resource, bringing heavy
burden to the IoT devices. Meanwhile, in the Proof-of-Work (PoW)-based blockchains, miners have to devote
large amount of computing resource to compete for generating valid blocks, which is frequently disputed for
tremendous computing resource waste. To address this dilemma, we propose an Evolved-PoW (E-PoW)
consensus that can integrate the matrix computations in machine learning into the process of blockchain mining.
The integrated architecture, the elaborated schemes of transferring matrix computations from machine learning
to blockchain mining, and the reward adjustment scheme to affect the activity of the miners are, respectively,
designed for E-PoW in detail. E-PoW can keep the advantages of PoW in blockchain and simultaneously
salvage the computing power of the miners for the model training in machine learning. We conduct experiments
to verify the availability and effect of E-PoW. The experimental results show that E-PoW can salvage by up to
80% computing power from pure blockchain mining for parallel model training in machine learning.
EPRO_BC_016 Networking Integrated Cloud–Edge–End in IoT: A Blockchain-Assisted Collective Q-
Learning Approach
Recently, the term “Internet of Things” (IoT) has elicited escalating attention. The flexibility, agility, and
ubiquitous accessibility have encouraged the integration between machine learning (ML) with IoT. However,
there are many challenges that present the key inhibitors in moving ML to the public solution, such as
centralized training, poor training efficiency, and heavy computing capabilities requirements. Therefore,
bringing learning intelligence to edge IoT nodes has been spotlighted for some researches. Meanwhile, how to
govern the use of learning results efficiently, reliably, scalably, and safely is hampered by the heterogeneity and
nonconfidence among IoT nodes. In this article, we propose a blockchain-based collective Q-learning (CQL)
approach to address the above issues, where lightweight IoT nodes are used to train parts of learning layers,
then employing blockchain to share learning results in a verifiable and permanent manner. We further improve
the traditional Proof of Work (PoW). Instead of solving a meaningless puzzle, we regard the learning process
in the IoT node as a piece of work.
11. ELYSIUMPRO TITLES WITH ABSTRACTS 2023-2024
EPRO_BC_017 Blockchain-based Federated Learning with Secure Aggregation in Trusted Execution
Environment for Internet-of-Things
This article proposes a blockchain-based federated learning (FL) framework with Intel Software Guard
Extension (SGX)-based trusted execution environment (TEE) to securely aggregate local models in Industrial
Internet-of-Things (IIoTs). In FL, local models can be tampered with by attackers. Hence, a global model
generated from the tampered local models can be erroneous. Therefore, the proposed framework leverages a
blockchain network for secure model aggregation. Each blockchain node hosts an SGX-enabled processor that
securely performs the FL-based aggregation tasks to generate a global model. Blockchain nodes can verify the
authenticity of the aggregated model, run a blockchain consensus mechanism to ensure the integrity of the
model, and add it to the distributed ledger for tamper-proof storage. Each cluster can obtain the aggregated
model from the blockchain and verify its integrity before using it. We conducted several experiments with
different CNN models and datasets to evaluate the performance of the proposed framework.
EPRO_BC_018 Blockchain-Based Event Detection and Trust Verification Using Natural Language
Processing and Machine Learning
Information sharing is one of the huge topics in social media platform regarding the daily news related to events
or disasters happens in nature or its human-made. The automatic urgent need identification and sharing posts
and information delivery with a short response are essential tasks in this area. The key goal of this research is
developing a solution for management of disasters and emergency response using social media platforms as a
core component. This process focuses on text analysis techniques to improve the process of authorities in terms
of emergency response and filter the information using the automatically gathered information to support the
relief efforts. Specifically, we used state-of-art Machine Learning (ML), Deep Learning (DL), and Natural
Language Processing (NLP) based on supervised and unsupervised learning using social media datasets to
extract real-time content related to the emergency events to comfort the fast response in a critical situation.
Similarly, the blockchain framework used in this process for trust verification of the detected events and
eliminating the single authority on the system. The main reason of using the integrated system is to improve the
system security and transparency to avoid sharing the wrong information related to an event in social media.
12. ELYSIUMPRO TITLES WITH ABSTRACTS 2023-2024
EPRO_BC_019 BCOOL: A Novel Blockchain Congestion Control Architecture Using Dynamic Service
Function Chaining and Machine Learning for Next Generation Vehicular Networks
This paper presents the first, novel, dynamic, resilient, and consistent Blockchain COngestion ContrOL
(BCOOL) system for vehicular networks that fills the gap of trustworthy Blockchain congestion prediction
systems. BCOOL relies on the heterogeneity of Machine Learning, Software-Defined Networks and Network
Function Virtualization that is customized in three hybrid cloud/edge-based On/Offchain smart contract
modules and ruled by an efficient and reliable communication protocol. BCOOL's first novel module aims at
managing message and vehicle trustworthiness using a novel, dynamic and hybrid Blockchain Fog-based
Distributed Trust Contract Strategy (FDTCS). The second novel module accurately and proactively predicts the
occurrence of congestion, ahead of time, using a novel Hybrid On/Off-Chain Multiple Linear Regression
Software-defined Contract Strategy (HOMLRCS). This module presents a virtualization facility layer to the
third novel K-means/Random Forest-based On/Off-Chain Dynamic Service Function Chaining Contract
Strategy (KRF-ODSFCS) that dynamically, securely and proactively predicts VNF placements and their
chaining order in the context of SFCs w.r.t users' dynamic QoS priority demands. BCOOL exhibits a linear
complexity and a strong resilience to failures.
EPRO_BC_020 Machine Learning Enhanced Blockchain Consensus with Transaction Prioritization
for Smart Cities
In the given technology-driven era, smart cities are the next frontier of technology, and these smart cities aim
to improve the quality of people’s lives. In this article, we introduce such future Internet of Things (IoT)-based
smart cities that leverage blockchain technology. Particularly, when there are multiple parties involved,
blockchain helps in improving the security and transparency of the system in an efficient manner. However, if
a current fee-based or first-come–first-serve-based processing is used, emergency events may get delayed and
even threaten people’s lives. Thus, there is a need for transaction prioritization based on the priority of
information and a dynamic block creation mechanism for efficient data recording and faster event response.
Also, our system focuses on the consortium blockchain maintained by a group of members working across
different organizations to provide more efficiency. The leader election procedure in such a consortium
blockchain becomes more important for the transaction prioritization process to take place honestly. Hence, in
our proposed consensus protocol, we deploy a machine-learning (ML) algorithm to achieve efficient leader
election, based on which a novel dynamic block creation algorithm is designed.
13. ELYSIUMPRO TITLES WITH ABSTRACTS 2023-2024
EPRO_BC_021 Cyber-Attack on P2P Energy Transaction Between Connected Electric Vehicles: A
False Data Injection Detection Based Machine Learning Model
When cybersecurity is neglected, any network system loses its efficiency, reliability, and resilience. With the
huge integration of the Information, Communication and Technology capabilities, the Connected Electric
Vehicle (CEV) as a transportation form in cities is becoming more and more efficient and able to reply to citizen
and environmental expectations which improve the quality of citizens’ life. However, this CEV technological
improvement increases the CEV vulnerabilities to cyber-attacks resulting to serious risks for citizens. Thus,
they can intensify their negative impact on societies and cause unexpected physical damage and economic
losses. This paper targets the cybersecurity issues for CEVs in parking lots where a peer-to-peer(P2P) energy
transaction system based on blockchain, and smart contract scheme is launched. A False Data Injection Attack
(FDIA) on the electricity price and power signal is proposed and a Machine Learning/SVM classification
protocol is used to detect and extract the right values. Simulation results are conducted to prove the effectiveness
of this proposed model.
EPRO_BC_022 A Decentralized Electricity Trading Framework (DETF) for Connected EVs: A
Blockchain and Machine Learning for Profit Margin Optimization
Connected electric vehicles (CEVs) can help cities to reduce road congestion and increase road safety. With the
technical improvement made to the battery system in terms of capacity and flexibility, CEVs, as mobile power
plants can be an important actor for the electricity markets. Especially, they can trade electricity between each
other when supply stations are full or temporarily not available. In this article, we propose an advanced
decentralized electricity trading framework between CEVs in parking lots based on consortium blockchain,
machine learning, and Game theoretic model. We design a distributed smart contract solution based on a
stochastic bidding process, which helps CEVs to sell and buy electricity with their maximum profitability.
Finally, numerical simulations with MATLAB and Solidity are conducted to prove the effectiveness of our
proposed solution. Also, a comparison with another method in terms of CEVs' profitability improvement and
energy trading management is provided.
14. ELYSIUMPRO TITLES WITH ABSTRACTS 2023-2024
EPRO_BC_023 Blockchain-Based Federated Learning for Device Failure Detection in Industrial IoT
Device failure detection is one of most essential problems in Industrial Internet of Things (IIoT). However, in
conventional IIoT device failure detection, client devices need to upload raw data to the central server for model
training, which might lead to disclosure of sensitive business data. Therefore, in this article, to ensure client
data privacy, we propose a blockchain-based federated learning approach for device failure detection in IIoT.
First, we present a platform architecture of blockchain-based federated learning systems for failure detection in
IIoT, which enables verifiable integrity of client data. In the architecture, each client periodically creates a
Merkle tree in which each leaf node represents a client data record, and stores the tree root on a blockchain.
Furthermore, to address the data heterogeneity issue in IIoT failure detection, we propose a novel centroid
distance weighted federated averaging (CDW_FedAvg) algorithm taking into account the distance between
positive class and negative class of each client data set.
EPRO_BC_024 A Blockchain Dynamic Sharding Scheme Based on Hidden Markov Model in
Collaborative IoT
Sharded blockchain offers scalability, decentralization, immutability, and linear improvement, making it a
promising solution for addressing the trust problem in large-scale collaborative IoT. However, a high proportion
of cross-shard transactions (CSTs) can severely limit the performance of decentralized blockchain. Furthermore,
the dynamic assemblage characteristic of collaborative sensing in sharded blockchain is often ignored. To
overcome these limitations, we propose HMMDShard, a dynamic blockchain sharding scheme based on the
hidden Markov model (HMM). HMMDShard leverages fine-grained blockchain sharding and fully embraces
the dynamic assemblage characteristic of IoT collaborative sensing. By integrating the HMM, we achieve
adaptive dynamic incremental updating of blockchain shards, effectively reducing CSTs across all shards. We
conduct a comprehensive analysis of the security issues and properties of HMMDShard, and evaluate its
performance through the implementation of a system prototype. The results demonstrate that HMMDShard
significantly reduces the proportion of CSTs and outperforms other baselines in terms of system throughput and
transaction confirmation latency.
15. ELYSIUMPRO TITLES WITH ABSTRACTS 2023-2024
EPRO_BC_025 A Blockchain-based Decentralized, Fair and Authenticated Information Sharing
Scheme in Zero Trust Internet-of-Things
Internet-of-Things (IoT) are increasingly operating in the zero-trust environments where any devices and
systems may be compromised and hence untrusted. In addition, data collected by and sent from IoT devices
may be shared with and processed by edge computing systems, in order to reduce the reliance on centralized
(cloud) servers, leading to further security and privacy issues. To cope with these challenges, this paper proposes
an innovative blockchain-enabled information sharing solution in zero-trust context to guarantee anonymity yet
entity authentication, data privacy yet data trustworthiness, and participant stimulation yet fairness. This new
solution is able to support filtering of fabricated information through smart contracts, effective voting, and
consensus mechanisms, which can prevent unauthenticated participants from sharing garbage information. We
also prove that the proposed solution is secure in the universal composability framework, and further evaluate
its performance over an Ethereum-based blockchain platform to demonstrate its utility.
EPRO_BC_026 SCEI: A Smart-Contract Driven Edge Intelligence Framework for IoT Systems
Federated learning (FL) enables collaborative training of a shared model on edge devices while maintaining
data privacy. FL is effective when dealing with independent and identically distributed (iid) datasets, but
struggles with non-iid datasets. Various personalized approaches have been proposed, but such approaches fail
to handle underlying shifts in data distribution, such as data distribution skew commonly observed in real-world
scenarios (e.g., driver behavior in smart transportation systems changing across time and location).
Additionally, trust concerns among unacquainted devices and security concerns with the centralized aggregator
pose additional challenges. To address these challenges, this paper presents a dynamically optimized personal
deep learning scheme based on blockchain and federated learning. Specifically, the innovative smart contract
implemented in the blockchain allows distributed edge devices to reach a consensus on the optimal weights of
personalized models. Experimental evaluations using multiple models and real-world datasets demonstrate that
the proposed scheme achieves higher accuracy and faster convergence compared to traditional federated and
personalized learning approaches
16. ELYSIUMPRO TITLES WITH ABSTRACTS 2023-2024
EPRO_BC_027 Privacy-Preserving Electricity Theft Detection based on Blockchain
In most electricity theft detection schemes, consumers’ power consumption data is directly input into the
detection center. Although it is valid in detecting the theft of consumers, the privacy of all consumers is at risk
unless the detection center is assumed to be trusted. In fact, it is impractical. Moreover, existing schemes may
result in some security problems, such as the collusion attack due to the presence of a trusted third party, and
malicious data tampering caused by the system operator (SO) being attacked. Aiming at the problems above,
we propose a blockchain-based privacy-preserving electricity theft detection scheme without a third party.
Specifically, the proposed scheme uses an improved functional encryption scheme to enable electricity theft
detection and load monitoring while preserving consumers’ privacy; distributed storage of consumers’ data with
blockchain to resolve security problems such as data tampering, etc. Meanwhile, we build a long short-term
memory network (LSTM) model to perform higher accuracy for electricity theft detection. The proposed
scheme is evaluated in a real environment, and the results show that it is more accurate in electricity theft
detection within acceptable communication and computational overhead. Our system analysis demonstrates that
the proposed scheme can resist various security attacks and preserve consumers’ privacy.
EPRO_BC_028 Blockchain-based Federated Learning with SMPC Model Verification Against
Poisoning Attack for Healthcare Systems
Due to the rising awareness of privacy and security in machine learning applications, federated learning (FL)
has received widespread attention and applied to several areas, e.g., intelligence healthcare systems, IoT-based
industries, and smart cities. FL enables clients to train a global model collaboratively without accessing their
local training data. However, the current FL schemes are vulnerable to adversarial attacks. Its architecture makes
detecting and defending against malicious model updates difficult. In addition, most recent studies to detect FL
from malicious updates while maintaining the model’s privacy have not been sufficiently explored. This paper
proposed blockchainbased federated learning with SMPC model verification against poisoning attacks for
healthcare systems. First, we check the machine learning model from the FL participants through an encrypted
inference process and remove the compromised model. Once the participants’ local models have been verified,
the models are sent to the blockchain node to be securely aggregated. We conducted several experiments with
different medical datasets to evaluate our proposed framework.
17. ELYSIUMPRO TITLES WITH ABSTRACTS 2023-2024
EPRO_BC_029 Self-Healing Secure Blockchain Framework in Microgrids
Blockchain has recently been depicted as a secure protocol for information exchange in cyber-physical
microgrids. However, it is still found vulnerable to consensus manipulation attacks. These stealth attacks are
often difficult to detect as they use kernel-level access to mask their actions. In this paper, we firstly build a
trusted and secured peer-to-peer network mechanism for physical DC microgrids’ validation of transactions
over Distributed Ledger. Secondly, we leverage from a physics-informed approach for detecting malware-
infected nodes and then recovering from stealth attacks using a self-healing recovery scheme augmented into
the microgrid Blockchain network. This scheme allows compromised nodes to adapt to a reconstructed
trustworthy signal in a multi-hop manner using corresponding measurements from the reliable nodes in the
network. Additionally, recognizing the possible threat of denial-of-service attacks and random time delays
(where information sharing via communication channels is blocked), we also integrate a model-free predictive
controller with the proposed system that can locally reconstruct an expected version of the attacked/delayed
signals.
EPRO_BC_030 A Fast and Secured Vehicle-to-Vehicle Energy Trading Based on Blockchain
Consensus in the Internet of Electric Vehicles
The organization and management of electricity markets worldwide are rapidly evolving, moving towards
decentralized, distributed, and renewable energy-based generation with solutions based on real-time data
exchange. A Vehicle-to-Vehicle (V2V) energy trading has emerged as one of the most promising alternatives
for relieving the load imposed on the traditional grid enabling two individuals to buy and sell energy directly
without intermediaries. However, the Internet of Electric Vehicles (IoE) environment is trustless, and such P2P
energy trading is prone to different kinds of cyber attacks. Blockchain technology has lately been proposed to
implement V2V energy trading to securely and fairly share energy. The consensus mechanism is one of the
most important modules of blockchain applied to the V2V network. It determines the efficiency and security
among untrustworthy EVs of the energy trading blockchain (ETB). Nevertheless, most works on ETB have
currently adopted traditional consensus mechanisms. Due to high computing power and communication
overhead, these consensus algorithms are unsuitable for applications requiring real-time services such as energy
trading.
18. ELYSIUMPRO TITLES WITH ABSTRACTS 2023-2024
ElysiumPro | IEEE Final Year Projects | Best Internship Training | Inplant Training in
Madurai.
Call Us: +91 9944 79 3398
Facebook @ http://surl.li/ktzsz
Chat Now @ https://wa.link/rq387s
Visit Our Channel: @ http://surl.li/ktzsc
Mail Us: @ info@elysiumpro.in
Visit Us: @ http://surl.li/ktzuu