4.6 Article

A blockchain-empowered crowdsourcing system for 5G-enabled smart cities *

期刊

COMPUTER STANDARDS & INTERFACES
卷 76, 期 -, 页码 -

出版社

ELSEVIER
DOI: 10.1016/j.csi.2021.103517

关键词

Blockchain; Edge-enabled; Crowdsourcing; Smart contract; 5G

资金

  1. National Natural Science Foundation of China [61373162]
  2. Sichuan Provincial Science and Technology Department Project [2019YFG0183]
  3. Sichuan Provincial Key Laboratory Project [KJ201402]
  4. Japan Society for the Promotion of Science (JSPS) [JP18K18044]

向作者/读者索取更多资源

With the advancement of 5G technology, smart city services have become essential for modern city development. However, existing crowdsourcing systems pose security risks due to reliance on centralized payment institutions. To address this issue, a blockchain-empowered and decentralized trusted service mechanism has been proposed for 5G-enabled smart cities, showing effectiveness in experiments.
With the development of 5G(5th generation mobile networks) technology, smart cities are an inevitable trend in modern city development. Among them, smart city services are the foundation of 5G-enabled smart cities. As an emerging and informational city service model, crowdsourcing has been widely used in our daily life. However, in the existing crowdsourcing systems, the requesters and the workers are usually required to use the crowd sourcing platform as the trust center, and the payment depends on the third-party central payment institutions, which have a massive security risk. Once these centers are attacked or do evil, it will bring higher losses to the crowdsourcing parties. These problems will negatively affect the further development of 5G-enabled smart cities. To address these issues, we propose a blockchain-empowered and decentralized trusted service mechanism for the crowdsourcing system in 5G-enabled smart cities. In the proposed mechanism, the crowdsourcing service process is divided into nine stages: initialization, task submission, task publication, task reception, scheme submission, scheme arbitration, payment, task rollback, and service compensation. The smart contract controls the execution of each step in each stage, and the payment is completed by blockchain without the involvement of third-party central institutions. Finally, we develop smart contracts to conduct experiments based on Ethereum and compare it with the existing crowdsourcing system. The experimental results show the effectiveness and applicability of the crowdsourcing system service mechanism without the central institutions.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Artificial Intelligence

Toward real-time and efficient cardiovascular monitoring for COVID-19 patients by 5G-enabled wearable medical devices: a deep learning approach

Liang Tan, Keping Yu, Ali Kashif Bashir, Xiaofan Cheng, Fangpeng Ming, Liang Zhao, Xiaokang Zhou

Summary: This paper proposes a real-time cardiovascular monitoring system using 5G and deep learning to predict the cardiovascular health of COVID-19 patients. Experimental results show that the proposed system can address technical limitations and improve the prediction accuracy of cardiovascular disease.

NEURAL COMPUTING & APPLICATIONS (2023)

Article Computer Science, Artificial Intelligence

Aggregated decentralized down-sampling-based ResNet for smart healthcare systems

Zhiwen Jiang, Ziji Ma, Yaonan Wang, Xun Shao, Keping Yu, Alireza Jolfaei

Summary: With the rapid growth of population and urbanization, there is an increasing demand for higher-quality medical services. In this study, a classification method based on deep convolutional neural networks (CNNs) is proposed to address the issue of feature information loss. The newly proposed strategy of aggregation decentralized down-sampling prevents the loss of feature information and improves the accuracy of the classification system.

NEURAL COMPUTING & APPLICATIONS (2023)

Article Computer Science, Artificial Intelligence

Knowledge and data-driven hybrid system for modeling fuzzy wastewater treatment process

Xuhong Cheng, Zhiwei Guo, Yu Shen, Keping Yu, Xu Gao

Summary: This paper proposes a hybrid control and prediction system for wastewater treatment processes (WTP) called AS-CL, which combines the Activated Sludge model, Convolutional neural network, and Long short-term memory neural networks. The AS-CL model improves modeling efficiency and reduces the impact of fuzziness on WTP.

NEURAL COMPUTING & APPLICATIONS (2023)

Article Engineering, Multidisciplinary

IIoT Based Trustworthy Demographic Dynamics Tracking With Advanced Bayesian Learning

Peiran Li, Haoran Zhang, Wenjing Li, Keping Yu, Ali Kashif Bashir, Ahmad Ali Alzubi, Jinyu Chen, Xuan Song, Ryosuke Shibasaki

Summary: Tracking demographic dynamics is important for smart city development. We proposed a reliable approach based on the Industrial Internet of Things to track the demographic dynamics in the built environment, and inferred demographic data based on life-pattern features.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2023)

Article Engineering, Electrical & Electronic

The IMU Augment SLAM on Unmanned Vehicle for Detection of Protective Measures in COVID-19

Siyuan Liang, Weiyue Zhu, Chinmay Chakraborty, Jianbo Du, Keping Yu

Summary: This paper introduces a method for detecting protective measures using unmanned devices based on SLAM and fusion technology, which is more efficient, economical and safe than traditional manual detection. By enhancing the visual feature extraction of SLAM with the gyroscope of the IMU, a high-precision visual inertial system for joint position and pose estimation is achieved. The proposed method recovers missing point features from line features and adds residuals to optimize the point-line features in real time, improving the tracking and matching accuracy.

IEEE SENSORS JOURNAL (2023)

Article Automation & Control Systems

An Intelligent Deterministic Scheduling Method for Ultralow Latency Communication in Edge Enabled Industrial Internet of Things

Yinzhi Lu, Liu Yang, Simon X. Yang, Qiaozhi Hua, Arun Kumar Sangaiah, Tan Guo, Keping Yu

Summary: The edge-enabled Industrial Internet of Things (IIoT) platform is crucial in the acceleration of smart industry development. However, as real-time IIoT applications increase, it becomes challenging to achieve fast response time, low latency, and efficient bandwidth utilization. To address this issue, researchers have recently studied time-sensitive network (TSN) to enable low latency communication through deterministic scheduling. This article analyzes the combinability problem and proposes the noncollision theory-based deterministic scheduling (NDS) method for achieving ultralow latency communication for time-sensitive flows. Additionally, a dynamic queue scheduling (DQS) method is presented to improve bandwidth utilization for best-effort flows. Experimental results demonstrate the effectiveness of NDS/DQS in supporting deterministic ultralow latency services and efficient bandwidth utilization.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2023)

Article Computer Science, Information Systems

On-Body Device Clustering for Security Preserving in Internet of Things

Bingxian Lu, Lei Wang, Wei Wang, Keping Yu, Sahil Garg, Md. Jalil Piran, Atif Alamri

Summary: The ability to identify which wireless devices belong to the same person from Wi-Fi access point (AP) enables various IoT applications. Existing cryptographic-based solutions are not suitable for IoT devices with limited power and computing capabilities. This article proposes an on-body device clustering (OBDC) scheme that extracts trajectory and gait patterns from wireless signals and utilizes a hierarchical clustering algorithm to measure the similarity between devices. Experimental results show that about 90% of users' devices can be accurately clustered, with a low 0.7% misclustering rate.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Computer Science, Information Systems

Deep-Distributed-Learning-Based POI Recommendation Under Mobile-Edge Networks

Zhiwei Guo, Keping Yu, Neeraj Kumar, Wei Wei, Shahid Mumtaz, Mohsen Guizani

Summary: With the rapid development of edge intelligence in wireless communication networks, mobile-edge networks (MENs) have been widely discussed in academia. The article proposes a deep distributed-learning-based POI recommendation (Deep-PR) method for MENs, which effectively considers both internal and latent external features of users. Experimental results on real-world data sets show that Deep-PR outperforms seven typical baselines in terms of overall performance.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Automation & Control Systems

Securing Facial Bioinformation by Eliminating Adversarial Perturbations

Feng Ding, Bing Fan, Zhangyi Shen, Keping Yu, Gautam Srivastava, Kapal Dev, Shaohua Wan

Summary: Falsified faces generated by DeepFake pose severe threats to our community, especially to smart systems relying on bioinformation authentication. Despite promising results on DeepFake forensics, new security challenges arise from antiforensics attacks. To protect biometric data, particularly facial information, a countermeasure against DeepFake antiforensics attacks is proposed.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2023)

Article Engineering, Civil

Reliable Uplink Synchronization Maintenance for Satellite-Ground Integrated Vehicular Networks: A High-Order Statistics-Based Timing Advance Update Approach

Li Zhen, Yue Wang, Keping Yu, Guangyue Lu, Zahid Mumtaz, Wei Wei

Summary: This paper proposes an efficient timing advance update approach to maintain reliable uplink synchronization in the satellite-ground integrated vehicular network. The proposed approach achieves low signaling overhead, increased correlation length, and improved performance in terms of class distance, multi-path effect, and carrier frequency offset.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2023)

Article Engineering, Civil

AI-Empowered Speed Extraction via Port-Like Videos for Vehicular Trajectory Analysis

Xinqiang Chen, Zichuang Wang, Qiaozhi Hua, Wen-Long Shang, Qiang Luo, Keping Yu

Summary: Automated container terminals are the future of the port industry, and accurate kinematic data is crucial for improving efficiency and safety. Analyzing vehicle trajectories and speeds from port surveillance videos can provide valuable information. This study proposes an ensemble framework that uses computer vision and AI techniques to extract vehicle speeds from port videos, helping participants in port traffic make more informed decisions. Experimental results show that the framework achieves accurate vehicle kinematic data in typical port traffic scenarios.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2023)

Article Computer Science, Cybernetics

Rumors Suppression in Healthcare System: Opinion-Based Comprehensive Learning Particle Swarm Optimization

Qiang He, Wei Qiao, Ali Kashif Bashir, Yuliang Cai, Laisen Nie, Yasser D. Al-Otaibi, Keping Yu

Summary: Rumors in the healthcare system are characterized by fast spread and severe social influence, which can lead to the collapse of medical services and the death of many patients. To prevent its serious impact on society, the objective of rumor suppression is to restrain the spread of negative opinions and maximize the spread of positive opinions.

IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS (2023)

Article Computer Science, Cybernetics

Autonomous Behavioral Decision for Vehicular Agents Based on Cyber-Physical Social Intelligence

Zhiwei Guo, Dian Meng, Chinmay Chakraborty, Xing-Rong Fan, Arpit Bhardwaj, Keping Yu

Summary: In future smart cities, autonomous behavioral decision for vehicular agents supported by cyber-physical social intelligence is in demand. However, the existing works are only suitable for short-distance decision scenarios and cannot meet the challenges of long-distance decision tasks in realistic cyber-physical environments. This article proposes an autonomous behavioral decision framework using social intelligence and an iterative search algorithm to find optimal solutions. Simulation models demonstrate the effectiveness of the proposed method, which is compared with a universal optimization search algorithm.

IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS (2023)

Article Computer Science, Cybernetics

A Privacy-Preserving Social Computing Framework for Health Management Using Federated Learning

Zhangyi Shen, Feng Ding, Ye Yao, Arpit Bhardwaj, Zhiwei Guo, Keping Yu

Summary: Currently, there is a general demand for health management driven by intelligent means in social systems. Researchers have mainly focused on improving the performance of intelligent algorithms, which are mostly based on the central computing mode. However, this poses a threat to personal privacy. To address this challenge, this work proposes a privacy-preserving social computing framework using federated learning, where user data are stored in different terminals to prevent exposure. The proposed approach shows promising overall performance according to experiments conducted on a real-world dataset.

IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS (2023)

Article Engineering, Civil

Distributed Maritime Transport Communication System With Reliability and Safety Based on Blockchain and Edge Computing

Tingting Yang, Zhengqi Cui, Asma Hassan Alshehri, Miao Wang, Kun Gao, Keping Yu

Summary: This article introduces an IoT-enabled maritime transport communication system that addresses network security and reliability issues using blockchain technology, while also improving energy efficiency and performance through edge computing.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2023)

Article Computer Science, Hardware & Architecture

SM2-DualRing: Efficient SM2-based ring signature schemes with logarithmic size

Mengqi Feng, Chao Lin, Wei Wu, Debiao He

Summary: Digital signature provides resistance against information tampering and identity impersonation, but lacks specific anonymity requirement for scenarios such as voting and whistle-blowing. Ring signature was introduced for achieving anonymity, but existing schemes face size limitations. In this paper, a novel construction paradigm called DualRing is proposed for logarithmic-sized ring signature. The SM2 digital signature is transformed into Type-T and integrated with DualRing technology, proving unforgeability and anonymity. Optimized and linkable schemes are proposed, and the performance in communication and computation costs are demonstrated.

COMPUTER STANDARDS & INTERFACES (2024)

Article Computer Science, Hardware & Architecture

Enhancing cyber security in WSN using optimized self-attention-based provisional variational auto-encoder generative adversarial network

B. Meenakshi, D. Karunkuzhali

Summary: Wireless Sensor Network (WSN) is a crucial component of the cyber physical system, consisting of fixed or moving sensors that collectively sense, gather, analyze, and transfer data of detected objects. Intrusion detection schemes in WSNs often suffer from poor identification rate, high computation overhead, and higher false alarm rate. This study proposes an innovative approach that combines advanced techniques such as self-attention, provisional learning, and generative adversarial networks to improve security and adaptability in WSNs.

COMPUTER STANDARDS & INTERFACES (2024)

Article Computer Science, Hardware & Architecture

Assessment of the quality of the text of safety standards with industrial semantic technologies

Jose Luis de la Vara, Hector Bahamonde, Clara Ayora

Summary: Most safety-critical systems undergo rigorous assurance processes to ensure dependability, often in compliance with standards like DO-178C for aerospace software. However, following these standards can be challenging due to issues in their text, such as imprecision and ambiguity. This study introduces an approach using RQA - Quality Studio for evaluating the text quality of safety standards, identifying common issues like passive voice and imprecise modal verbs in DO-178C.

COMPUTER STANDARDS & INTERFACES (2024)

Article Computer Science, Hardware & Architecture

Is it worth adopting DevOps practices in Global Software Engineering? Possible challenges and benefits

Ruben Grande, Aurora Vizcaino, Felix O. Garcia

Summary: The adoption of DevOps in global and distributed settings can bring several advantages to software companies, but it also presents challenges that need to be overcome.

COMPUTER STANDARDS & INTERFACES (2024)

Article Computer Science, Hardware & Architecture

Lattice based distributed threshold additive homomorphic encryption with application in federated learning

Haibo Tian, Yanchuan Wen, Fangguo Zhang, Yunfeng Shao, Bingshuai Li

Summary: In this paper, a lattice-based distributed threshold additive homomorphic encryption (DTAHE) scheme is proposed and its applications in federated learning are demonstrated. The DTAHE scheme saves communication bandwidth compared to other lattice-based DTAHE schemes. Two secure aggregation protocols are obtained when embedding the scheme into federated learning, one against semi-honest adversary and the other against active adversary using a smart contract in a ledger.

COMPUTER STANDARDS & INTERFACES (2024)

Article Computer Science, Hardware & Architecture

Enhanced S-boxes for the Advanced Encryption Standard with maximal periodicity and better avalanche property

Abderrahmane Nitaj, Willy Susilo, Joseph Tonien

Summary: This paper investigates a specific family of enhanced substitution boxes for the Advanced Encryption Standard. These modified S-boxes have the maximal periodicity property, with each input having the maximum orbit length of 256. The parameters for achieving this maximal periodicity property are completely determined. The new enhanced S-boxes also exhibit improved bit avalanche property.

COMPUTER STANDARDS & INTERFACES (2024)

Article Computer Science, Hardware & Architecture

Efficient multi-party private set intersection protocols for large participants and small sets

Lifei Wei, Jihai Liu, Lei Zhang, Qin Wang, Wuji Zhang, Xiansong Qian

Summary: Private set intersection (PSI) is widely studied for preserving privacy in collaborative data analytics. However, existing multi-party PSI (MP-PSI) protocols often face performance and scalability issues when the number of participants increases. To address this, we propose two efficient MP-PSI protocols for scenarios with a large number of participants and small set size.

COMPUTER STANDARDS & INTERFACES (2024)

Article Computer Science, Hardware & Architecture

A BERT-Based Sequential POI Recommender system in Social Media

A. Noorian

Summary: This paper proposes a novel personalized sequential recommendation model, BERTSeqHybrid, which utilizes Bidirectional Encoder Representations from Transformers (BERT) to improve user-user similarity model. The model also employs asymmetric schemas and topic modeling to enhance contextual data from Points of Interest (POIs). Furthermore, a novel method for evaluating user preferences utilizing explicit demographic data is proposed to solve the cold start problem. Experimental evaluation demonstrates the superiority of the developed methodology in terms of RMSE, F-Score, MAP, and NDCG indexes on two different datasets (Yelp and Flickr).

COMPUTER STANDARDS & INTERFACES (2024)

Article Computer Science, Hardware & Architecture

Intelligent and trusted metaheuristic optimization model for reliable agricultural network

Amjad Rehman, Ibrahim Abunadi, Khalid Haseeb, Tanzila Saba, Jaime Lloret

Summary: Artificial intelligence (AI) is experiencing significant growth in the areas of smart cities, agriculture, food management, and weather forecasting, primarily due to the limitations of computing power on sensing devices. The integration of AI with IoT and ubiquitous sensors has led to improvements in the agricultural sector and reduced management costs. However, optimizing resource management and data load for forwarding nodes near edge boundaries remains a challenging issue due to limited wireless technology resources.

COMPUTER STANDARDS & INTERFACES (2024)

Article Computer Science, Hardware & Architecture

Privacy leakage of certificateless public key authenticated searchable encryption via frequency analysis: Attacks and revises

Leixiao Cheng, Jing Qin, Fei Meng

Summary: This paper analyzes the vulnerability of existing CLPASE schemes to frequency analysis, which compromises user's search privacy. A concrete CLPASE scheme against frequency analysis is proposed, which provides higher guarantee for user's search privacy with comparable efficiency compared to previous schemes.

COMPUTER STANDARDS & INTERFACES (2024)

Article Computer Science, Hardware & Architecture

Abuse-resistant deniable encryption

Yanmei Cao, Jianghong Wei, Yang Xiang, Willy Susilo, Xiaofeng Chen

Summary: Deniable encryption (DE) allows private communication even when adversaries force participants to reveal their secret keys. However, existing DE systems do not consider potential abuse by malicious users. This paper proposes an abuse-resistant DE scheme and provides formal definitions and security analysis. The proposed scheme outperforms existing work in terms of functionality and ciphertext rate.

COMPUTER STANDARDS & INTERFACES (2024)

Article Computer Science, Hardware & Architecture

A lightweight delegated private set intersection cardinality protocol

Xiaoyi Yang, Yanqi Zhao, Sufang Zhou, Lianhai Wang

Summary: This paper proposes a lightweight delegated PSI-CA protocol based on multi-point oblivious pseudorandom function and collision-resistant hash function, and utilizes it to build a privacy-preserving contact tracing system. Experimental results show that our system is more practical and advantageous for densely populated areas.

COMPUTER STANDARDS & INTERFACES (2024)

Article Computer Science, Hardware & Architecture

A lattice-based public key encryption scheme with delegated equality test

Kaifeng Xiao, Xinjian Chen, Jianye Huang, Hongbo Li, Qiong Huang

Summary: Ordinary encryption techniques cannot meet the needs of comparing, sharing, and classifying data hidden in ciphertexts in the face of growing threats to data security. The advent of the quantum computing era has brought unprecedented challenges to traditional cryptography. Fortunately, a lattice-based PKEET scheme can solve these problems by providing satisfying anti-quantum computing security and resisting OMRA attacks. This paper presents a lattice-based PKE-DET scheme that supports delegated tester function and demonstrates security under the LWE hardness assumption in the standard model. The scheme offers advantages such as high security, delegated tester authorization, and small storage space compared to existing schemes.

COMPUTER STANDARDS & INTERFACES (2024)

Article Computer Science, Hardware & Architecture

An Identity-Based Encryption with Equality Test scheme for healthcare social apps

Jingwei Lu, Hongbo Li, Jianye Huang, Sha Ma, Man Ho Allen Au, Qiong Huang

Summary: This paper introduces public key encryption with equality test (PKEET) and identity-based encryption with equality test (IBEET) to address the problem of determining whether two ciphertexts contain the same message encrypted with different public keys, without decryption. The proposed IBEET scheme resists offline message recovery attacks (OMRA) and does not require the dual-tester setting or group mechanism. Security is demonstrated through mathematical assumptions, and experiment results show the efficiency of the scheme. From a usability perspective, the paper explains why the scheme is more suitable for healthcare social Apps compared to other OMRA-resistant schemes.

COMPUTER STANDARDS & INTERFACES (2024)

Article Computer Science, Hardware & Architecture

On Stablecoin: Ecosystem, architecture, mechanism and applicability as payment method

Dun Li, Dezhi Han, Tien-Hsiung Weng, Zibin Zheng, Hongzhi Li, Kuan-Ching Li

Summary: Stablecoins have facilitated the growth of decentralized payments and the emergence of a new generation of payment systems using cryptocurrencies and Blockchain technology. However, the existing research lacks a comprehensive overview of Stablecoins that focuses on their full context, stabilization mechanisms, and payment applicability. This paper provides a thorough summary of the definition, current state, and ecosystem of Stablecoins. It discusses the system structure, stability mechanisms, and their applicability in payment scenarios. The study identifies asset-backed Stablecoins as the most efficient and widely used, while cryptocurrency-backed Stablecoins are more balanced in relation to the original concept. Algorithm-backed Stablecoins show significant potential for development but are hesitant due to the lack of collateral or deposit reserves, making them prone to collapse. The paper concludes by presenting possible future trends for Stablecoins.

COMPUTER STANDARDS & INTERFACES (2024)