Computer Science ›› 2021, Vol. 48 ›› Issue (1): 287-294.doi: 10.11896/jsjkx.191200124

• Information Security • Previous Articles     Next Articles

Integrated Emergency-Defense System Based on Blockchain

SHAO Wei-hui1, WANG Ning1, HAN Chuan-feng2, XU Wei-sheng3   

  1. 1 Education Technology and Computing Center,Tongji University,Shanghai 200092,China
    2 Sustainable Development and New-type Urbanization Think-tank,Tongji University,Shanghai 200092,China
    3 School of Electronics and Information Engineering,Tongji University,Shanghai 201804,China
  • Received:2019-12-20 Revised:2020-06-05 Online:2021-01-15 Published:2021-01-15
  • About author:SHAO Wei-hui,born in 1988,Ph.D,Engineer.His main research interests include educational informatization,big data and blockchain.
  • Supported by:
    National Natural Science Foundation of China(61773292,71841036,61973238) and Research Project of Shanghai Science and Technology Commission(19DZ1209200).

Abstract: The emergency-defense system of China is decentralized,lacking information communication channels and coordination mechanisms.This condition results to low mobilization efficiency,resource scheduling conflicts and poor coordination perfor-mance,which highlights the urgency to upgrade the capacity of integrated emergency-defense system.In response to this situation,this paper studies the integrated emergency-defense mechanism with the expert system as the supervisory decision-making layer and the P2P(Peer-to-Peer) network as the autonomous decision-making layer.Based on the location,time and category of emergency response events or national defense events,a three-dimensional blockchain model is established to describe resource scheduling problems in different situations.Considering the difference between the integrated emergency-defense scenario and the conventional peer-to-peer transaction scenario,a consensus mechanism based on credit certificate is designed.Finally,an integrated emergency-defense blockchain prototype system of limited nodes to participate is built on Ethereum.Simulation results of the prototype system prove that the blockchain based integrated emergency-defense mechanism is reasonable and feasible.

Key words: Integrated emergency-defense system, Fusion mechanism, Resource allocation, Blockchain

CLC Number: 

  • TP312
[1] WEI Z Y,TANG W H,AN L.On the Construction of China's National Defense Mobilization Emergency Response Integration System from the Mobilization Practice of Major Countries in the World [J].Technology Foundation of National Defence,2009(8):59-62.
[2] MIAO Y,SU P.Construction of the Integration of Meeting an Emergency and an Enemy Attack in the USA and the Enlightenment[J].Military Economic Research,2010(5):30-33.
[3] CORREIA A,SEVERINO I,NUNES I L,et al.Knowledgemanagement in the development of an intelligent system to support emergency response[C]//International Conference on Applied Human Factors and Ergonomics.Cham:Springer,2017:109-120.
[4] DORASAMY M,RAMAN M,KALIANNAN M.Integratedcommunity emergency management and awareness system:A knowledge management system for disaster support[J].Technological Forecasting and Social Change,2017,121:139-167.
[5] SONG Z C,GE Y Z,DUAN H,et al.Agent-based simulation systems for emergency management[J].International Journal of Automation and Computing,2016,13(2):89-98.
[6] JIA T T,YANG L C.Main Practices and Enlightenment of integrated emergency-defense system in American and Japanese[J].Dual Use Technologies & Products,2014(7):185-186.
[7] KANEBERG E,HERTZ S,JENSEN L M.Voluntary defense networks in emergency preparedness in developed countries:the case of Sweden[J].Revista Científica General José María Córdova,2019,17(26):228-250.
[8] ARAGHIZADEH H,PEYRAVI M,SHARIFIFAR S,et al.Civil-Military Coordination in Natural Disasters:A Qualitative Study[J].Iranian Red Crescent Medical Journal,2020,22(1).
[9] SWAN M.Blockchain:Blueprint for a New Ec-onomy[M].O'Reilly Media.Inc.,2015.
[10] YUAN Y,WNG F Y.Blockchain:The State of the Art and Future Trends[J].Acta Automatica Sinica,2016,42(4):481-494.
[11] Bitcoin Sourcecode[EB/OL].https://github.com/bitcoin/bit-coin/,2016.
[12] Antonopoulos A M.Mastering Bitcoin:Unlocking Digital Crypto-Currencies[M].O'Reilly Media,Inc.,2014.
[13] LARIMER D.Transactions as proof-of-stake[EB/OL].http://7fvhfe.com1.z0.glb.clouddn.com/@/wp-content/uploads/2014/01/TransactionsAsProofOfStake10.pdf,2013.
[14] SCHWARTZ D,YOUNGS N,BRITTO A.The ripple protocol consensus algorithm[EB/OL].https://ripple.com/files/ripple_consensus_whitepaper.pdf,2014.
[15] LARIMER D.Delegated proof-of-stake white paper[EB/OL].http://www.bts.hk/dpos-baipishu.ht-ml,2014.
[16] Ethereum White Paper.A next-generation smart contract and decentralized application platform[EB/OL].https://github.com/ethereum/wiki/wiki/WhitePaper,2015.
[1] LIU Tong, FANG Lu, GAO Hong-hao. Survey of Task Offloading in Edge Computing [J]. Computer Science, 2021, 48(1): 11-15.
[2] LIANG Jun-bin, TIAN Feng-sen, JIANG Chan, WANG Tian-shu. Survey on Task Offloading Techniques for Mobile Edge Computing with Multi-devices and Multi-servers in Internet of Things [J]. Computer Science, 2021, 48(1): 16-25.
[3] YANG Zi-qi, CAI Ying, ZHANG Hao-chen, FAN Yan-fang. Computational Task Offloading Scheme Based on Load Balance for Cooperative VEC Servers [J]. Computer Science, 2021, 48(1): 81-88.
[4] ZHANG Yan-mei, LOU Yin-cheng. Deep Neural Network Based Ponzi Scheme Contract Detection Method [J]. Computer Science, 2021, 48(1): 273-279.
[5] LI Ying, YU Ya-xin, ZHANG Hong-yu, LI Zhen-guo. High Trusted Cloud Storage Model Based on TBchain Blockchain [J]. Computer Science, 2020, 47(9): 330-338.
[6] WANG Guo-peng, YANG Jian-xin, YIN Fei, JIANG Sheng-jian. Computing Resources Allocation with Load Balance in Modern Processor [J]. Computer Science, 2020, 47(8): 41-48.
[7] LIU Shuai, GAN Guo-hua, LIU Ming-xi, FANG Yong, WANG Shou-yang. Multi-subblock Incentive Consensus Mechanism Based on Topology and Distribution Mechanism [J]. Computer Science, 2020, 47(7): 268-277.
[8] LU Ge-hao, XIE Li-hong and LI Xi-yu. Comparative Research of Blockchain Consensus Algorithm [J]. Computer Science, 2020, 47(6A): 332-339.
[9] LIN Xu-dan, BAO Shi-Jian, ZHAO Li-xin and ZHAO Chen-lin. Design and Performance Analysis of Automotive Supply Chain System Based on Hyperledger Fabric [J]. Computer Science, 2020, 47(6A): 546-551.
[10] ZHANG Qi-ming, LU Jian-hua, LI Shou-zhi and XU Jian-dong. Building Innovative Enterprise Customer Service Technology Platform Based on Blockchain [J]. Computer Science, 2020, 47(6A): 639-642.
[11] YE Shao-jie, WANG Xiao-yi, XU Cai-chao, SUN Jian-ling. BitXHub:Side-relay Chain Based Heterogeneous Blockchain Interoperable Platform [J]. Computer Science, 2020, 47(6): 294-302.
[12] XIE Ying-ying, SHI Jian, HUANG Shuo-kang, LEI Kai. Survey on Internet of Things Based on Named Data Networking Facing 5G [J]. Computer Science, 2020, 47(4): 217-225.
[13] ZHANG Ji-rong, JIA Chen-qing. Non-orthogonal Random Access Resource Allocation Scheme Based on Terminal Grouping [J]. Computer Science, 2020, 47(4): 243-248.
[14] WANG Hui, LIU Yu-xiang, CAO Shun-xiang, ZHOU Ming-ming. Medical Data Storage Mechanism Integrating Blockchain Technology [J]. Computer Science, 2020, 47(4): 285-291.
[15] FENG Tao, JIAO Ying, FANG Jun-li, TIAN Ye. Medical Health Data Security Model Based on Alliance Blockchain [J]. Computer Science, 2020, 47(4): 305-311.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[2] ZHU Shu-qin, WANG Wen-hong and LI Jun-qing. Chosen Plaintext Attack on Chaotic Image Encryption Algorithm Based on Perceptron Model[J]. Computer Science, 2018, 45(4): 178 -181 .
[3] LI Hang, ZANG Lie, GAN Lu. Search of Speculative Symbolic Execution Path Based on Ant Colony Algorithm[J]. Computer Science, 2018, 45(6): 145 -150 .
[4] CHEN Jin-yin, XIONG Hui, ZHENG Hai-bin. Parameters Optimization for SVM Based on Particle Swarm Algorithm[J]. Computer Science, 2018, 45(6): 197 -203 .
[5] ZHOU Feng, LI Rong-yu. Convolutional Neural Network Model for Text Classification Based on BGRU Pooling[J]. Computer Science, 2018, 45(6): 235 -240 .
[6] LIN Wei-jun, ZHAO Liao-ying, LI Xiao-run. Real-time Sub-pixel Object Detection for Hyperspectral Image Based on Pixel-by-pixel Processing[J]. Computer Science, 2018, 45(6): 259 -264 .
[7] ZHANG Xiao-hua, HUANG Bo. 3D Geometric Reconstruction Based on Bayes-MeTiS Mesh Partition[J]. Computer Science, 2018, 45(6): 265 -269 .
[8] XU Li-li, DONG Yi-hong, PAN Jian-fei and CHEN Hua-hui. Survey of Graph Sparsification Algorithms for Complex Networks[J]. Computer Science, 2018, 45(5): 24 -30 .
[9] LI Tong-yue and MA Wen-ping. Clustering Method in Wireless Sensor Networks Using Nonlinear Adaptive PSO Algorithm[J]. Computer Science, 2018, 45(5): 44 -48 .
[10] ZHANG Jie, WEN Min-hua, Jame LIN, MENG De-long and LU Hao. Implementation and Optimization of Historical VaR on GPU[J]. Computer Science, 2018, 45(5): 291 -294 .