Computer Science ›› 2025, Vol. 52 ›› Issue (5): 366-374.doi: 10.11896/jsjkx.240300018
• Information Security • Previous Articles Next Articles
WANG Pu1, GAO Zhanyun1, WANG Zhenfei1, SONG Zheli2
CLC Number:
[1]AL-SADAWI A,HASSAN M S,NDIAYE M.A survey on the integration of blockchain with IoT to enhance performance and eliminate challenges[J].IEEE Access,2021,9:54478-54497. [2]RAJASEKARAN A S,AZEES M,AL-TURJMAN F.A com-prehensive survey on blockchain technology[J].Sustainable Energy Technologies and Assessments,2022,52:102039. [3]ABED S E,JAFFAL R,MOHD B J.A review on blockchain and IoT integration from energy,security and hardware perspectives[J].Wireless Personal Communications,2023,129(3):2079-2122. [4]CHEN Y,LU Y,BULYSHEVA L,et al.Applications of blockchain in industry 4.0:A review[J].Information Systems Frontiers,2024,26(5):1715-17291. [5]ZEKIYE A,ÖZKASAP Ö.The Internet of Energy Systems:Blockchain and Smart Contracts meet Federated Learning[C]//2023 IEEE International Conference on Blockchain and Cryptocurrency(ICBC).IEEE,2023:1-3. [6]SINGH D S,DWIVEDI R K.Blockchain Enabled Autonomous Vehicle Based Vehicular IoT System[C]//2023 International Conference on Intelligent and Innovative Technologies in Computing,Electrical and Electronics(IITCEE).IEEE,2023:762-767. [7]ABDELLATIF A A,SAMARA L,MOHAMED A,et al.Medge-chain:Leveraging edge computing and blockchain for efficient medical data exchange[J].IEEE Internet of Things Journal,2021,8(21):15762-15775. [8]TAN P L,WANG R S,ZENG W H,et al.Overview of Blockchain Consensus Algorithms[J].Computer Science,2023,50(S1):691-702. [9]GERVAIS A,KARAME G O,WÜST K,et al.On the security and performance of proof of work blockchains[C]//Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security.2016:3-16. [10]SALEH F.Blockchain without waste:Proof-of-stake[J].The Review of Financial Studies,2021,34(3):1156-1190. [11]LI C,XU R H,LI D.Characterizing Coin-Based Voting Governance in DPoS Blockchains[C]//Proceedings of the International AAAI Conference on Web and Social Media.2023:1148-1152. [12]ZHANG G,PAN F,MAO Y,et al.Reaching consensus in the Byzantine empire:A comprehensive review of bft consensus algorithms[J].ACM Computing Surveys,2024,56(5):1-41. [13]WANG Q,YU J S,PENG Z N,et al.Security Analysis on dBFT protocol of NEO[C]//International Conference on Financial Cryptography and Data Security.Cham:Springer,2020:20-31. [14]LI W Y,FENG C L,ZHANG L,et al.A scalable multi-layerPBFT consensus for blockchain[J].IEEE Transactions on Parallel and Distributed Systems,2020,32(5):1146-1160. [15]QUSHTOM H,MIIĆ J,MIIĆ V B,et al. A Two-Stage PBFT Architecture With Trust and Reward Incentive Mechanism[J].IEEE Internet of Things Journal,2023,10(13):11440-114524. [16]XU J,ZHAO Y,CHEN H,et al.ABC-GSPBFT:PBFT withgrouping score mechanism and optimized consensus process for flight operation data-sharing[J].Information Sciences,2023,624:110-127. [17]WANG Z F,REN Y W,CAO Z Y,et al.LRBFT:Improvement of practical Byzantine fault tolerance consensus protocol for blockchains based on Lagrange interpolation[J].Peer-to-Peer Networking and Applications,2023,16(2):690-708. [18]WANG Z F,LIU S Q,WANG P,et al.BW-PBFT:PracticalByzantine fault tolerance consensus algorithm based on credit bidirectionally waning[J].Peer-to-Peer Networking and Applications,2023,16(6):2915-2928. [19]XU G Q,BAI H P,XING J,et al.SG-PBFT:A secure and highly efficient distributed blockchain PBFT consensus algorithm for intelligent Internet of vehicles[J].Journal of Parallel and Distributed Computing,2022,164:1-11. [20]HUANG B H,PENG L,ZHAO W H,et al.Practical Byzantine Consensus Algorithm Based on Verifiable Random Functions[J].Computer Science,2023,50(S1):737-742. [21]KUMAR A,VISHWAKARMA L,DAS D.R-PBFT:A secure and intelligent consensus algorithm for Internet of vehicles[J].Vehicular Communications,2023,41:100609. [22]LIU S N,ZHANG R H,LIU C Z,et al.P-PBFT:An improved blockchain algorithm to support large-scale pharmaceutical traceability[J].Computers in Biology and Medicine,2023,154:106590. [23]MA W G,WANG Y C,HU D F,et al.E-PBFT:An Improved Consensus Mechanism Based on PBFT[C]//2023 International Conference on Networking and Network Applications(NaNA).IEEE,2023:143-149. [24]CHEN Y X,JIA Y P.DT-PBFT:A Double-Layer Group Consensus Algorithm of Credibility for IoT Blockchain[C]//2023 2nd International Conference on Big Data,Information and Computer Network(BDICN).IEEE,2023:292-299. |
[1] | YANG Fan, SUN Yi, LIN Wei, GAO Qi. Blockchain-based Highly Trusted Query Verification Scheme for Streaming Data [J]. Computer Science, 2025, 52(4): 352-361. |
[2] | JIAO Jian, CHEN Ruixiang, HE Qiang, QU Kaiyang, ZHANG Ziyi. Study on Smart Contract Vulnerability Repair Based on T5 Model [J]. Computer Science, 2025, 52(4): 362-368. |
[3] | XIONG Keqin, RUAN Sijie, YANG Qianyu, XU Changwei , YUAN Hanning. Mobility Data-driven Location Type Inference Based on Crowd Voting [J]. Computer Science, 2025, 52(3): 169-179. |
[4] | DU Likuan, LIU Chen, WANG Junlu, SONG Baoyan. Self-learning Star Chain Space Adaptive Allocation Method [J]. Computer Science, 2025, 52(3): 359-365. |
[5] | WANG Tianyi, LIN Youfang, GONG Letian, CHEN Wei, GUO Shengnan, WAN Huaiyu. Check-in Trajectory and User Linking Based on Natural Language Augmentation [J]. Computer Science, 2025, 52(2): 99-106. |
[6] | WANG Dong, LI Xiaoruo, ZHU Bingnan. Transaction Granularity Modifiable Consortium Blockchain Scheme Based on Dual Merkel Trees Block Structure [J]. Computer Science, 2024, 51(9): 408-415. |
[7] | LU Xulin, LI Zhihua. IoT Device Recognition Method Combining Multimodal IoT Device Fingerprint and Ensemble Learning [J]. Computer Science, 2024, 51(9): 371-382. |
[8] | ZANG Wenyang, LYU Jinlai. Study on Time Rotation Notary Group Model Based on Threshold Signature [J]. Computer Science, 2024, 51(8): 403-411. |
[9] | XIANG Yanjie, HUANG Xiaofang, XIANG Kefeng, ZHENG Ji’nan. Blockchain Certificateless Encryption Mechanism Based on National Secret Algorithm [J]. Computer Science, 2024, 51(8): 440-446. |
[10] | SUN Li. Application,Challenge and New Strategy of Block Chain Technology in Metaverse [J]. Computer Science, 2024, 51(7): 373-379. |
[11] | LI Zhiyuan, XU Binglei, ZHOU Yingyi. Blockchain Anonymous Transaction Tracking Method Based on Node Influence [J]. Computer Science, 2024, 51(7): 422-429. |
[12] | ZHAO Ziqi, YANG Bin, ZHANG Yuanguang. Hierarchical Traffic Flow Prediction Model Based on Graph Autoencoder and GRU Network [J]. Computer Science, 2024, 51(6A): 230400148-6. |
[13] | ZHU Jun, ZHANG Guoyin, WAN Jingjing. Study on Data Security Framework Based on Identity and Blockchain Integration [J]. Computer Science, 2024, 51(6A): 230400056-5. |
[14] | LAN Yajie, MA Ziqiang, CHEN Jiali, MIAO Li, XU Xin. Survey on Application of Searchable Attribute-based Encryption Technology Based on Blockchain [J]. Computer Science, 2024, 51(6A): 230800016-14. |
[15] | TAN Jingqi, XUE Lingyan, HUANG Haiping, CHEN Long, LI Yixuan. Data Security Management Scheme Based on Editable Medical Consortium Chain [J]. Computer Science, 2024, 51(6A): 240400056-8. |
|