Key Technologies for Security and Privacy in Web 3.0

A special issue of Blockchains (ISSN 2813-5288).

Deadline for manuscript submissions: 31 January 2025 | Viewed by 6164

Special Issue Editors


E-Mail Website
Guest Editor
Department of Computer Science and Technology, Nanjing University, Nanjing 210023, China
Interests: network security; data security; artificial intelligence (AI) security

E-Mail Website
Guest Editor
Department of Computer Science and Engineering, Shanghai Jiaotong University, Shanghai 200240, China
Interests: blockchain; network security; privacy protection; AI security

Special Issue Information

Dear Colleagues,

Web 3.0 is often referred to as the third generation of the Internet, encompassing the concept of a distributed network and decentralized applications, with the aim of creating a more open, interconnected, and intelligent network environment. Web 3.0 advances blockchain applications by addressing scalability, improving interoperability, fostering decentralized finance, enhancing smart contract capabilities, and prioritizing user-centric experiences. These advancements contribute to the broader adoption and integration of blockchain technology in various industries and use cases.

The open and autonomous nature of Web 3.0 brings about new innovation opportunities; however, it also poses new challenges to the security and privacy of the research community. The key research focus for security and privacy in the context of Web 3.0 is how to protect data security and user privacy in a distributed and decentralized network environment. This includes specific areas such as blockchain technology, decentralized identity authentication, advanced encryption techniques, and secure smart contract development.

Dr. Jingyu Hua
Dr. Na Ruan
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Blockchains is an international peer-reviewed open access quarterly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1000 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • blockchain security
  • decentralized identity
  • secure smart contracts
  • decentralized trust management
  • privacy preservation in Web 3.0
  • DeFi (decentralized finance)
  • NFT (non-fungible token)
  • cryptography for Web 3.0
  • incentive mechanism for Web 3.0
  • machine learning in Web 3.0
  • secure transaction verification in Web 3.0.

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (4 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

24 pages, 25658 KiB  
Article
AI Threats to Politics, Elections, and Democracy: A Blockchain-Based Deepfake Authenticity Verification Framework
by Masabah Bint E. Islam, Muhammad Haseeb, Hina Batool, Nasir Ahtasham and Zia Muhammad
Blockchains 2024, 2(4), 458-481; https://doi.org/10.3390/blockchains2040020 - 21 Nov 2024
Viewed by 1000
Abstract
The integrity of global elections is increasingly under threat from artificial intelligence (AI) technologies. As AI continues to permeate various aspects of society, its influence on political processes and elections has become a critical area of concern. This is because AI language models [...] Read more.
The integrity of global elections is increasingly under threat from artificial intelligence (AI) technologies. As AI continues to permeate various aspects of society, its influence on political processes and elections has become a critical area of concern. This is because AI language models are far from neutral or objective; they inherit biases from their training data and the individuals who design and utilize them, which can sway voter decisions and affect global elections and democracy. In this research paper, we explore how AI can directly impact election outcomes through various techniques. These include the use of generative AI for disseminating false political information, favoring certain parties over others, and creating fake narratives, content, images, videos, and voice clones to undermine opposition. We highlight how AI threats can influence voter behavior and election outcomes, focusing on critical areas, including political polarization, deepfakes, disinformation, propaganda, and biased campaigns. In response to these challenges, we propose a Blockchain-based Deepfake Authenticity Verification Framework (B-DAVF) designed to detect and authenticate deepfake content in real time. It leverages the transparency of blockchain technology to reinforce electoral integrity. Finally, we also propose comprehensive countermeasures, including enhanced legislation, technological solutions, and public education initiatives, to mitigate the risks associated with AI in electoral contexts, proactively safeguard democracy, and promote fair elections. Full article
(This article belongs to the Special Issue Key Technologies for Security and Privacy in Web 3.0)
Show Figures

Figure 1

21 pages, 3001 KiB  
Article
Security Analysis of Smart Contract Migration from Ethereum to Arbitrum
by Xueyan Tang and Lingzhi Shi
Blockchains 2024, 2(4), 424-444; https://doi.org/10.3390/blockchains2040018 - 15 Oct 2024
Viewed by 779
Abstract
When migrating smart contracts from one blockchain platform to another, there are potential security risks. This is because different blockchain platforms have different environments and characteristics for executing smart contracts. The focus of this paper is to study the security risks associated with [...] Read more.
When migrating smart contracts from one blockchain platform to another, there are potential security risks. This is because different blockchain platforms have different environments and characteristics for executing smart contracts. The focus of this paper is to study the security risks associated with the migration of smart contracts from Ethereum to Arbitrum. We collected relevant data and analyzed smart contract migration cases to explore the differences between Ethereum and Arbitrum in areas such as Arbitrum cross-chain messaging, block properties, contract address alias, and gas fees. From the 36 types of smart contract migration cases we identified, we selected four typical types of cases and summarized their security risks. The research shows that smart contracts deployed on Ethereum may face certain potential security risks during migration to Arbitrum, mainly due to issues inherent in public blockchain characteristics, such as outdated off-chain data obtained by the inactive sequencer, logic errors based on time, failed permission checks, and denial of service (DOS) attacks. To mitigate these security risks, we proposed avoidance methods and provided considerations for users and developers to ensure a secure migration process. It is worth noting that this study is the first to conduct an in-depth analysis of the secure migration of smart contracts from Ethereum to Arbitrum. Full article
(This article belongs to the Special Issue Key Technologies for Security and Privacy in Web 3.0)
Show Figures

Figure 1

13 pages, 2325 KiB  
Article
User Acceptance of Blockchain Technology in Financial Applications: Information Security, Technology Awareness and Privacy Aspects
by Woon Kwan Tse, Xuechen Dai, Yat Ming Lee and Danqi Lu
Blockchains 2024, 2(3), 299-311; https://doi.org/10.3390/blockchains2030014 - 20 Aug 2024
Viewed by 1332
Abstract
Blockchain technology is now an advanced and innovative database technology and the attributes of blockchains are apparent in a variety of industries, especially in the financial industry. One of the most famous blockchain use cases, cryptocurrencies, has provoked much interest in social network [...] Read more.
Blockchain technology is now an advanced and innovative database technology and the attributes of blockchains are apparent in a variety of industries, especially in the financial industry. One of the most famous blockchain use cases, cryptocurrencies, has provoked much interest in social network users and customers. According to CoinMarketCap’s information, the global crypto market capitalization has reached around USD 2.37 T and there are around 9975 different cryptocurrencies available in the market. Despite the fact that academia and industry have paid much attention towards the blockchain direction, there is not much research on the factors that influence customer acceptability. This paper studies blockchains from a different angle, probing the factors prompting customers to use financial applications that utilize blockchain technology. We established the model and sorted the individual factors of perceived information security, technology awareness and privacy and found that users’ acceptance is significantly affected by information security and technology awareness, while privacy does not significantly influence users. According to the findings, we provide useful insights for application developers, conclude by presenting the limitations of the research and provide guidelines for future research. Full article
(This article belongs to the Special Issue Key Technologies for Security and Privacy in Web 3.0)
Show Figures

Figure 1

22 pages, 817 KiB  
Article
A Survey of Bug Bounty Programs in Strengthening Cybersecurity and Privacy in the Blockchain Industry
by Junaid Arshad, Muhammad Talha, Bilal Saleem, Zoha Shah, Huzaifa Zaman and Zia Muhammad
Blockchains 2024, 2(3), 195-216; https://doi.org/10.3390/blockchains2030010 - 8 Jul 2024
Cited by 1 | Viewed by 2216
Abstract
The increasing reliance on computer networks and blockchain technology has led to a growing concern for cybersecurity and privacy. The emergence of zero-day vulnerabilities and unexpected exploits has highlighted the need for innovative solutions to combat these threats. Bug bounty programs have gained [...] Read more.
The increasing reliance on computer networks and blockchain technology has led to a growing concern for cybersecurity and privacy. The emergence of zero-day vulnerabilities and unexpected exploits has highlighted the need for innovative solutions to combat these threats. Bug bounty programs have gained popularity as a cost-effective way to crowdsource the task of identifying vulnerabilities, providing a secure and efficient means of enhancing cybersecurity. This paper provides a comprehensive survey of various free and paid bug bounty programs in the computer networks and blockchain industry, evaluating their effectiveness, impact, and credibility. The study explores the structure, incentives, and nature of vulnerabilities uncovered by these programs, as well as their unique value proposition. A comparative analysis is conducted to identify advantages and disadvantages, highlighting the strengths and weaknesses of each program. The paper also examines the role of ethical hackers in bug bounty programs and their contributions to strengthening cybersecurity and privacy. Finally, the study concludes with recommendations for addressing the challenges faced by bug bounty programs and suggests potential future directions to enhance their impact on computer networks and blockchain security. Full article
(This article belongs to the Special Issue Key Technologies for Security and Privacy in Web 3.0)
Show Figures

Figure 1

Back to TopTop