Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

PDF

Journal of System Simulation

Blockchain

Publication Year

Articles 1 - 4 of 4

Full-Text Articles in Engineering

Reliable Emergency Rescue Model Of Uavs Based On Blockchain, Mengyao Du, Kai Xu, Miao Zhang, Xiang Fu, Quanjun Yin Dec 2023

Reliable Emergency Rescue Model Of Uavs Based On Blockchain, Mengyao Du, Kai Xu, Miao Zhang, Xiang Fu, Quanjun Yin

Journal of System Simulation

Abstract: Natural disasters may unpredictably disrupt ground communication infrastructure and transportation systems, and UAVs emergency response can deal with such uncertainties and highly dynamic scenarios. Aiming at the robustness requirements of decentralized rescue systems. UAV emergency rescue chain (UERChain) based on blockchain technology is proposed. By deploying UAV backbone nodes within a layered local network, the smart contracts for managing reputation considering UAV social relationships are designed. The blockchain is employed as a trust mechanism to realize the trustworthy interactions among distributed UAVs. Experimental results show that, UERChain has higher robustness, and within controllable resource constraints, the reputation management and …


Research On Collaborative Task Allocation Method Of Multiple Uavs Based On Blockchain, Shuangcheng Niu, Yuqiang Jin, Kunhu Kou May 2023

Research On Collaborative Task Allocation Method Of Multiple Uavs Based On Blockchain, Shuangcheng Niu, Yuqiang Jin, Kunhu Kou

Journal of System Simulation

Abstract: The autonomous collaborative control of a multi-unmanned aerial vehicle (UAV) system lacks a unified underlying technology platform and faces single point failure and information security threats. In order to solve these problems, an idea to build collaborative task planning platforms based on blockchain technology is proposed. With thecollaborative task allocation of multiple UAVs as research objects, an online, safe, high-efficiency, and real-time task allocation method is designed. The contract network task allocation algorithm is described as a smart contract, and system consensus is reached based on the blockchain consensus algorithm. In addition, …


Verification Of Transaction Ordering Dependence Vulnerability Of Smart Contract Based On Cpn, Hong Zheng, Zerun Liu, Jianhua Huang, Shihui Qian Jul 2022

Verification Of Transaction Ordering Dependence Vulnerability Of Smart Contract Based On Cpn, Hong Zheng, Zerun Liu, Jianhua Huang, Shihui Qian

Journal of System Simulation

Abstract: The formal verification of smart contracts researches mainly focus on programming language-level vulnerabilities, and the transaction ordering dependence is more difficult to be detected as a blockchain-level vulnerability.The latent transaction ordering dependence vulnerability in smart contracts is formally verified based on colored Petri nets.The latent vulnerability in the Decode reward contractis analyzed, anda colored Petri net model of the contract itself and its execution environment is established from top to bottom.The attacker model is introduced to consider the situation that the contract is attacked. By running the model to verify the existence of transaction ordering dependence vulnerability in …


Attribute Proxy Re-Encryption For Ciphertext Storage Sharing Scheme On Blockchain, Xiaohong Zhang, Lanlan Sun Jun 2020

Attribute Proxy Re-Encryption For Ciphertext Storage Sharing Scheme On Blockchain, Xiaohong Zhang, Lanlan Sun

Journal of System Simulation

Abstract: In order to implement the information storage sharing service safely and efficiently, a blockchain storage sharing scheme supporting the attribute proxy re-encryption and keyword retrieval is proposed. By the nodes classification and ciphertext storage separation, the anti-collusion attack is better implemented. The smart contract design of the information transaction is introduced and the information sharing parties can communicate spontaneously without the participation of the central organization. By the attribute-based proxy re-encryption algorithm, the information owner can share the information with other users without re-encrypting, uploading, and downloading information, and relieves the burden of the high-frequency access of the cloud …