Internet has become one of the most important technologies in the world, and hackers use various methods to launch cyber attacks to profit from it. Phishing is one of famous social engineering attacks, it is often use...
详细信息
Internet has become one of the most important technologies in the world, and hackers use various methods to launch cyber attacks to profit from it. Phishing is one of famous social engineering attacks, it is often used to steal user data, including login credentials and credit card numbers. Although the Transport Layer Security certificate is used to verify the trust of websites, there are still a series of vulnerabilities. The demand for trusted IP addresses has led a lot of research, including IP whitelisting, DNS filtering and so on. However, these technologies still have many shortcomings. In view of this, we proposed a novel mechanism for verifying websites using blockchain technology. The URL and IP address of a permissioned website are recorded in blockchain through a specific smart contract. A DNS query is executed through a smart contract designed to avoid URL redirection attacks. With the help of immutable nature of blockchian, phishing websites can be detected. The mechanism will not add any load to users and provides tamperproof functions based on the characteristics of blockchain. The comparison of related works shows that the proposed mechanism is more secure. We also provided a reference implementation of the proposed mechanism on Ethereum Quorum simulation platform, which proves the effectiveness and practicability of the mechanism.
The 6G wireless network aims to forge a new spectrum, high technical standards of high time and phase synchronization accuracy, and 100% geographic coverage to connect trillions of devices flexibly and efficiently in ...
详细信息
The 6G wireless network aims to forge a new spectrum, high technical standards of high time and phase synchronization accuracy, and 100% geographic coverage to connect trillions of devices flexibly and efficiently in the future. However, as connectivity increases and applications become novel, it is a challenge to ensure the privacy and security of networks and applications. blockchain is seen as a promising technology that can improve efficiency, reduce costs, mitigate security, and privacy threats, and establish a trusted data-sharing environment. This article presents a trusted framework based on blockchain technology from the perspective of how to build a trusted software-defined content delivery network. As the peer node of the blockchain, the software-defined network (SDN) controller establishes trust between different regions and a wide range of participants, realizing peer autonomy and flexible business orchestration. The two main purposes of the architecture are to enhance the security of network communications and establish trust relationships between entities in different domains. It includes trusted communication based on routing sandbox, service choreography based on blockchain, proxy server selection strategy based on model predictive control (MPC), and optimization consensus based on practical Byzantine fault tolerance. Some simulation experiments verify the effectiveness of the theoretical method.
Recently, blockchain radio access network (B-RAN) arises as an innovative paradigm for the sixth-generation (6G) wireless communications to build cooperative trust, aggregate wireless resources, and schedule inter- an...
详细信息
Recently, blockchain radio access network (B-RAN) arises as an innovative paradigm for the sixth-generation (6G) wireless communications to build cooperative trust, aggregate wireless resources, and schedule inter- and intra-network tasks among independent network entities. It establishes an open platform based on blockchain to provide diverse wireless services and applications, such as radio access, Internet of Things (IoT), and mobile-edge computing, via trusted interactions with enhanced security and efficiency. As a distinctive feature, B-RAN enables secure and efficient resource sharing and trading by aggregating, pooling, and coordinating resources from multiple resource hosts and owners across subnetworks. Therefore, an implementable architecture along with various functional modules shall be delicately designed. This work aims to establish a unified architecture with enhanced efficiency, security, compatibility, and flexibility for resource sharing and trading in B-RAN. Specifically, we develop a six-layer architecture that incorporates a number of novel features, such as enhanced blockchain structures, secure interaction methods, efficient service mechanisms, and scalable transaction patterns. We design a number of pluggable functional modules in each layer to support diverse functions, services, and applications of resource sharing and trading. Finally, we implement a practical prototype based on the layered architecture for resource-limited devices. Multiple experiments are presented to verify the performance of the proposed architecture from different aspects.
In 5G and B5G networks, real-time and secure resource allocation with the common telecom infrastructure is challenging. This problem may be more severe when mobile users are growing and connectivity is interrupted by ...
详细信息
In 5G and B5G networks, real-time and secure resource allocation with the common telecom infrastructure is challenging. This problem may be more severe when mobile users are growing and connectivity is interrupted by natural disasters or other emergencies. To address the resource allocation problem, the network slicing technique has been applied to assign virtualized resources to multiple network slices, guaranteeing the 5G-RAN quality of service. Moreover, to tackle connectivity interruptions during emergencies, UAVs have been deployed as airborne base stations, providing various services to ground networks. However, this increases the complexity of resource allocation in the shared infrastructure of 5G-RAN. Therefore, this paper proposes a dynamic resource allocation framework that synergies blockchain and multi-agent deep reinforcement learning for multi-UAV-enabled 5G-RAN to allocate resources to smart mobile user equipment (SMUE) with optimal costs. The blockchain ensures the security of virtual resource transactions between SMUEs, infrastructure providers (InPs), and virtual network operators (VNOs). We formulate a virtualized resource allocation problem as a hierarchical Stackelberg game containing InPs, VNOs, and SMUEs, and then transform it into a stochastic game model. Then, we adopt a Multi-agent Deep Deterministic Policy Gradient (MADDPG) algorithm to solve the formulated problem and obtain the optimal resource allocation policies that maximize the utility function. The simulation results show that the MADDPG method outperforms the state-of-the-art methods in terms of utility optimization and quality of service satisfaction.
With the widespread application of real-time embedded systems (ESs), the contradiction between the energy consumption requirements of modern processors and the limited battery capacity becomes more obvious. Dynamic vo...
详细信息
With the widespread application of real-time embedded systems (ESs), the contradiction between the energy consumption requirements of modern processors and the limited battery capacity becomes more obvious. Dynamic voltage scaling (DVS) has been proven to be one of the most effective technologies for energy management. However, recent studies have shown that the use of DVS leads to a significant increase in the transient fault rate of processors as the characteristic size of logic gates (or transistors) gets smaller and smaller. In this article, we consider the problem of assigning processing frequencies to a group of periodic real-time tasks so as to minimize the overall energy consumption under the constraints of time and reliability. First, under the DVS, we take the reliability of the ESs into consideration through the regularization terms and present the energy consumption optimization model based on the metaheuristic algorithms. Second, a novel algorithm for adaptive differential whale swarm optimization (ADWOA) is proposed according to the optimization requirements. Finally, the optimized data are saved on the chain through the storable feature of the blockchain for the necessary queries. It is worth noting that the on-chain data contains the intrinsic characteristics of the ES, which may give rise to the disclosure of processor privacy. Therefore, we come up with the differential privacy on-chain creating algorithm (DPCA) to protect the privacy of data on the chain. Experimental results show that ADWOA can minimize the energy consumption in real-time ES on the premise of ensuring system reliability and privacy.
With the increasing ubiquity of autonomous robotic solutions, the interest in their connectivity and in the cooperation within multirobot systems is rising. Two aspects that are a matter of current research are robot ...
详细信息
With the increasing ubiquity of autonomous robotic solutions, the interest in their connectivity and in the cooperation within multirobot systems is rising. Two aspects that are a matter of current research are robot security and secure multirobot collaboration robust to Byzantine agents. blockchain and other distributed ledger technologies (DLTs) have been proposed to address the challenges in both domains. Nonetheless, some key challenges include scalability and deployment within real-world networks. This article presents an approach to integrating IOTA and ROS2 for more scalable DLT-based robotic systems while allowing for network partition tolerance after deployment. This is, to the best of our knowledge, the first implementation of IOTA smart contracts for robotic systems, and the first integrated design with ROS2. This is in comparison to the vast majority of the literature which relies on Ethereum. We present a general IOTA+ROS2 architecture leading to partition-tolerant decision-making processes that also inherit Byzantine tolerance properties from the embedded blockchain structures. We demonstrate the effectiveness of the proposed framework for a cooperative mapping application in a system with intermittent network connectivity. We show both superior performance with respect to Ethereum in the presence of network partitions, and a low impact in terms of computational resource utilization. These results open the path for wider integration of blockchain solutions in distributed robotic systems with less stringent connectivity and computational requirements.
Multiple autonomous underwater vehicles(AUVs)have been widely used in various of missions in underwater environment,such as tracking and ***,multi-AUV search targets in local area face to security challenges *** solve...
详细信息
Multiple autonomous underwater vehicles(AUVs)have been widely used in various of missions in underwater environment,such as tracking and ***,multi-AUV search targets in local area face to security challenges *** solve this issue,in this paper,we propose a secure,energy-saving multi-AUV cooperative operation scheme *** order to enhance the security,control commands and state information are packaged into blocks by encryption algorithm of *** energy-efficient of the entire network,we present an improved Raft consensus algorithm based on energy model,named *** the excess of leader's energy consumption by setting *** proposed approach not only guarantees the security of data,but extends working time of the network and the energy *** results justify the effectiveness of the scheme.
暂无评论