Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (475)

Search Parameters:
Keywords = decentralized blockchain networks

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
35 pages, 3811 KB  
Review
The Impact of Data Analytics Based on Internet of Things, Edge Computing, and Artificial Intelligence on Energy Efficiency in Smart Environment
by Izabela Rojek, Piotr Prokopowicz, Maciej Piechowiak, Piotr Kotlarz, Nataša Náprstková and Dariusz Mikołajewski
Appl. Sci. 2026, 16(1), 225; https://doi.org/10.3390/app16010225 (registering DOI) - 25 Dec 2025
Abstract
This review examines the impact of data analytics powered by the Internet of Things (IoT), edge computing, and artificial intelligence (AI) on improving energy efficiency in smart environments, with a focus on smart factories, smart cities, and smart territories. Advanced AI, machine learning [...] Read more.
This review examines the impact of data analytics powered by the Internet of Things (IoT), edge computing, and artificial intelligence (AI) on improving energy efficiency in smart environments, with a focus on smart factories, smart cities, and smart territories. Advanced AI, machine learning (ML), and deep learning (DL) techniques enable real-time energy optimization and intelligent decision-making in complex, data-intensive systems. Integrating edge computing reduces latency and improves responsiveness in IoT and Industrial Internet of Things (IIoT) networks, enabling local energy management and reducing grid load. Federated learning further enhances data privacy and efficiency by enabling decentralized model training across distributed smart nodes without exposing sensitive information or personal data. Emerging 5G and 6G technologies provide the necessary bandwidth and speed for seamless data exchange and control across energy-intensive, connected infrastructures. Blockchain increases transparency, security, and trust in energy transactions and decentralized energy trading in smart grids. Together, these technologies support dynamic demand response mechanisms, predictive maintenance, and self-regulating systems, leading to significant improvements in energy sustainability. Case studies of smart cities and industrial ecosystems within Industry 4.0/5.0/6.0 demonstrate measurable reductions in energy consumption and carbon emissions through these synergistic approaches. Despite significant progress, challenges remain in interoperability, scalability, and regulatory frameworks. This review demonstrates that AI-based edge computing, supported by robust connectivity and secure IoT and IIoT architectures, has a transformative potential for creating energy-efficient and sustainable smart environments. Full article
(This article belongs to the Special Issue Applications of Artificial Intelligence in the IoT)
Show Figures

Figure 1

32 pages, 1964 KB  
Article
An Optimized Gasper Consensus Protocol Resistant to Adversarial Bias Attacks
by Xi Lin and Junfeng Tian
Appl. Sci. 2026, 16(1), 171; https://doi.org/10.3390/app16010171 - 23 Dec 2025
Abstract
Blockchain consensus mechanisms are fundamental to the security and decentralization of distributed ledgers. In Proof-of-Stake (PoS) systems, which are lauded for their energy efficiency, the fair and unpredictable selection of block proposers is paramount and relies heavily on secure random number generation. The [...] Read more.
Blockchain consensus mechanisms are fundamental to the security and decentralization of distributed ledgers. In Proof-of-Stake (PoS) systems, which are lauded for their energy efficiency, the fair and unpredictable selection of block proposers is paramount and relies heavily on secure random number generation. The RANDAO random number generation mechanism in the Gasper protocol is susceptible to hash collision attack, which can introduce adversarial bias in the block proposer selection process. From the perspective of resisting adversarial bias attacks, this paper examines the optimization of the Gasper consensus protocol, focusing on security issues such as vulnerabilities to hash collisions in RANDAO and high latency in asynchronous network environments. By analyzing the spatial–temporal distribution of historical block hashes, we propose a dual-round random number verification mechanism that enhances reliability through multiple validation models. We develop a dynamic game-theoretic model under incomplete information to analyze node strategy selection and interaction dynamics. Our experimental results demonstrate that the improved protocol (RABA-Gasper) offers superior resistance to attacks, fairness, and efficiency compared to conventional protocols. RABA-Gasper outperforms conventional ones, achieving a 6.8% attack success rate (vs. 32.7% for RANDAO and 18.2% for Two Look-Back) with 94.3% hash collision detection, a proposer Gini coefficient below 0.23, 2.3x higher throughput retention than RANDAO in asynchronous networks, and a slightly increased random number generation latency of 125 ms. Supported by a game-theoretic model, it guarantees security when honest nodes account for ≥2/3 of the total. Full article
21 pages, 2541 KB  
Article
Blockchain Variables and Possible Attacks: A Technical Survey
by Andrei Alexandru Bordeianu and Daniela Elena Popescu
Computers 2025, 14(12), 567; https://doi.org/10.3390/computers14120567 - 18 Dec 2025
Viewed by 361
Abstract
Blockchain technology has rapidly evolved as a cornerstone of decentralized computing, transforming how trust, data integrity, and transparency are achieved in digital ecosystems. However, despite extensive adoption, significant gaps remain in understanding how key blockchain variables, such as block size, consensus mechanisms, and [...] Read more.
Blockchain technology has rapidly evolved as a cornerstone of decentralized computing, transforming how trust, data integrity, and transparency are achieved in digital ecosystems. However, despite extensive adoption, significant gaps remain in understanding how key blockchain variables, such as block size, consensus mechanisms, and network latency, affect system vulnerabilities and susceptibility to cyberattacks. This survey addresses this gap by combining qualitative and quantitative analyses across multiple blockchain environments. Using simulation tools such as Ganache and Bitcoin Core, and reviewing peer-reviewed studies from 2016 to 2024, the research systematically maps blockchain parameters to cyberattack vectors including 51% attacks, Sybil attacks, and double-spending. Findings indicate that design choices like block size, block interval, and consensus type substantially influence resilience against attacks. The Blockchain Variable Quantitative Risk Framework (BVQRF) introduced here integrates NIST’s cybersecurity principles with quantitative scoring to assess risks. This framework represents a novel contribution by operationalizing theoretical security constructs into actionable evaluation metrics, enabling predictive modeling and adaptive risk mitigation strategies for blockchain systems. Full article
Show Figures

Figure 1

19 pages, 4065 KB  
Article
STK: A Salted Temporal Key Scheme for Dynamic Swarm Security
by Zhongtao Zou, Ting Yang and Ping Wang
Drones 2025, 9(12), 856; https://doi.org/10.3390/drones9120856 - 13 Dec 2025
Viewed by 176
Abstract
Securing the reintegration of outlier nodes in dynamic UAV networks is challenging. This challenge arises from the lack of time-sensitive access control in existing key management schemes. We propose the Salted Temporal Key scheme (STK), which combines blockchain-based dynamic key management with temporal [...] Read more.
Securing the reintegration of outlier nodes in dynamic UAV networks is challenging. This challenge arises from the lack of time-sensitive access control in existing key management schemes. We propose the Salted Temporal Key scheme (STK), which combines blockchain-based dynamic key management with temporal validation. This work addresses the absence of a time-sensitive admission policy by coupling reintegration cost to a UAV’s verifiable disconnection time: short-term outliers reintegrate quickly, while long-duration, high-risk outliers face increasing barriers. STK binds reintegration difficulty to the block-broadcast interval τ, making reintegration a computational challenge proportional to the number of missed consensus cycles. Experiments on swarms with 50–100 nodes show that STK efficiently manages reintegration latency, providing scalable and adaptable security for decentralized UAV networks. The results demonstrate that by adjusting τ, operators can isolate UAVs with excessive delays and ensure reliable swarm communication. STK offers a flexible, non-interactive solution, significantly enhancing security and scalability for UAV swarm reintegration in diverse environments. Full article
(This article belongs to the Special Issue IoT-Enabled UAV Networks for Secure Communication)
Show Figures

Figure 1

43 pages, 2472 KB  
Article
Privacy-Preserving Federated Learning for Distributed Financial IoT: A Blockchain-Based Framework for Secure Cryptocurrency Market Analytics
by Oleksandr Kuznetsov, Saltanat Adilzhanova, Serhiy Florov, Valerii Bushkov and Danylo Peremetchyk
IoT 2025, 6(4), 78; https://doi.org/10.3390/iot6040078 - 11 Dec 2025
Viewed by 457
Abstract
The proliferation of Internet of Things (IoT) devices in financial markets has created distributed ecosystems where cryptocurrency exchanges, trading platforms, and market data providers operate as autonomous edge nodes generating massive volumes of sensitive financial data. Collaborative machine learning across these distributed financial [...] Read more.
The proliferation of Internet of Things (IoT) devices in financial markets has created distributed ecosystems where cryptocurrency exchanges, trading platforms, and market data providers operate as autonomous edge nodes generating massive volumes of sensitive financial data. Collaborative machine learning across these distributed financial IoT nodes faces fundamental challenges: institutions possess valuable proprietary data but cannot share it directly due to competitive concerns, regulatory constraints, and trust management requirements in decentralized networks. This study presents a privacy-preserving federated learning framework tailored for distributed financial IoT systems, combining differential privacy with Shamir secret sharing to enable secure collaborative intelligence across blockchain-based cryptocurrency trading networks. We implement per-layer gradient clipping and Rényi differential privacy composition to minimize utility loss while maintaining formal privacy guarantees in edge computing scenarios. Using 5.6 million orderbook observations from 11 cryptocurrency pairs collected across distributed exchange nodes, we evaluate three data partitioning strategies simulating realistic heterogeneity patterns in financial IoT deployments. Our experiments reveal that federated edge learning imposes 9–15 percentage point accuracy degradation compared to centralized cloud processing, driven primarily by data distribution heterogeneity across autonomous nodes. Critically, adding differential privacy (ε = 3.0) and cryptographic secret sharing increases this degradation by less than 0.3 percentage points when mechanisms are calibrated appropriately for edge devices. The framework achieves 62–66.5% direction accuracy on cryptocurrency price movements, with confidence-based execution generating 71–137 basis points average profit per trade. These results demonstrate the practical viability of privacy-preserving collaborative intelligence for distributed financial IoT while identifying that the federated optimization gap dominates privacy mechanism costs. Our findings offer architectural insights for designing trustworthy distributed systems in blockchain-enabled financial IoT ecosystems. Full article
(This article belongs to the Special Issue Blockchain-Based Trusted IoT)
Show Figures

Figure 1

15 pages, 741 KB  
Article
Spatializing Trust: A GeoAI-Based Model for Mapping Digital Trust Ecosystems in Mediterranean Smart Regions
by Simona Epasto
ISPRS Int. J. Geo-Inf. 2025, 14(12), 491; https://doi.org/10.3390/ijgi14120491 - 10 Dec 2025
Viewed by 314
Abstract
As digital transformation intensifies, the governance of spatial data infrastructures is becoming increasingly dependent on the capacity to generate and sustain trust—technological, institutional and civic. This challenge is particularly acute in the Mediterranean region, where disparities in how geospatial data are produced, accessed, [...] Read more.
As digital transformation intensifies, the governance of spatial data infrastructures is becoming increasingly dependent on the capacity to generate and sustain trust—technological, institutional and civic. This challenge is particularly acute in the Mediterranean region, where disparities in how geospatial data are produced, accessed, and validated are created by uneven digital development and fragmented governance structures. In response to this, this paper introduces an integrated framework combining geospatial artificial intelligence (GeoAI) and blockchain technologies to support transparent, verifiable and spatially explicit models of digital trust. Based on case studies from the Horizon 2020 TRUST project, the framework defines trust through territorial indicators across three dimensions: digital infrastructure, institutional transparency, and civic engagement. The system uses interpretable AI models, such as Random Forests, K-means clustering and convolutional neural networks, to classify regions into trust typologies based on multi-source geospatial data. These outputs are then transformed into semantically structured spatial products and anchored to the Ethereum blockchain via smart contracts and decentralized storage (IPFS), thereby ensuring data integrity, auditability and version control. Experimental results from pilot regions in Italy, Greece, Spain and Israel demonstrate the effectiveness of the framework in detecting spatial patterns of trust and producing interoperable, reusable datasets. The findings highlight significant spatial asymmetries in digital trust across the Mediterranean region, suggesting that trust is a measurable territorial condition, not merely a normative ideal. By combining GeoAI with decentralized verification mechanisms, the proposed approach helps to develop accountable, explainable and inclusive spatial data infrastructures, which are essential for democratic digital governance in complex regional environments. Full article
Show Figures

Figure 1

25 pages, 2858 KB  
Article
Blockchain-Enabled Synchromodal Transport Network Optimization: Toward Enhanced Transparency
by Shuxia Li, Hui Jiang, Liping Liu, Yuanqing Liu and Mengling Wang
Mathematics 2025, 13(23), 3829; https://doi.org/10.3390/math13233829 - 29 Nov 2025
Viewed by 419
Abstract
Blockchain technology, with its inherent decentralization and transparency, offers innovative solutions to current information-sharing challenges in synchromodal transport systems. This study first examines a synchromodal transport network under deterministic demand and investigates whether blockchain technology can enhance the connectivity among entities. An optimization [...] Read more.
Blockchain technology, with its inherent decentralization and transparency, offers innovative solutions to current information-sharing challenges in synchromodal transport systems. This study first examines a synchromodal transport network under deterministic demand and investigates whether blockchain technology can enhance the connectivity among entities. An optimization model is developed to balance transparency and cost efficiency. The analysis is then extended to scenarios with uncertain demand, modeled using triangular fuzzy numbers. Chance-constrained programming and fuzzy goal programming are employed to address demand uncertainty while balancing the model’s dual objectives. Using an Asia–Europe transportation dataset, the model is solved via the CPLEX solver. The results indicate that blockchain significantly improves transparency in synchromodal transport networks, albeit with a moderate increase in operational costs. Under uncertain demand conditions, blockchain is effective in mitigating the adverse effects of demand fluctuations. From a managerial perspective, the findings suggest that governments should promote blockchain adoption in transportation, while enterprises should carefully evaluate their operational needs before implementation. Full article
Show Figures

Figure 1

39 pages, 1506 KB  
Article
Permissionless Blockchain Recent Trends, Privacy Concerns, Potential Solutions and Secure Development Lifecycle
by Talgar Bayan, Adnan Yazici and Richard Banach
Future Internet 2025, 17(12), 547; https://doi.org/10.3390/fi17120547 - 28 Nov 2025
Viewed by 1839
Abstract
Permissionless blockchains have evolved beyond cryptocurrency into foundations for Web3 applications, decentralized finance (DeFi), and digital asset ownership, yet this rapid expansion has intensified privacy vulnerabilities. This study provides a comprehensive review of recent trends, emerging privacy threats, and mitigation strategies in permissionless [...] Read more.
Permissionless blockchains have evolved beyond cryptocurrency into foundations for Web3 applications, decentralized finance (DeFi), and digital asset ownership, yet this rapid expansion has intensified privacy vulnerabilities. This study provides a comprehensive review of recent trends, emerging privacy threats, and mitigation strategies in permissionless blockchain ecosystems. We examine six developments reshaping the landscape: meme coin proliferation on high-throughput networks, real-world asset tokenization linking on-chain activity to regulated identities, perpetual derivatives exposing trading strategies, institutional adoption concentrating holdings under regulatory oversight, prediction markets creating permanent records of beliefs, and blockchain–AI integration enabling both privacy-preserving analytics and advanced deanonymization. Through this work and forensic analysis of documented incidents, we analyze seven critical privacy threats grounded in verifiable 2024–2025 transaction data: dust attacks, private key management failures, transaction linking, remote procedure call exposure, maximal extractable value extraction, signature hijacking, and smart contract vulnerabilities. Blockchain exploits reached $2.36 billion in 2024 and $2.47 billion in the first half of 2025, with over 80% attributed to compromised private keys and signature vulnerabilities. We evaluate privacy-enhancing technologies, including zero-knowledge proofs, ring signatures, and stealth addresses, identifying the gap between academic proposals and production deployment. We further propose a Secure Development Lifecycle framework incorporating measurable security controls validated against incident data. This work bridges the disconnect between privacy research and industrial practice by synthesizing current trends, providing insights, documenting real-world threats with forensic evidence, and providing actionable insights for both researchers advancing privacy-preserving techniques and developers building secure blockchain applications. Full article
(This article belongs to the Special Issue Security and Privacy in Blockchains and the IoT—3rd Edition)
Show Figures

Figure 1

26 pages, 3231 KB  
Article
Identifying Illicit Activities in Blockchain Transaction Graph Networks
by Tomáš Adam and František Babič
Electronics 2025, 14(23), 4599; https://doi.org/10.3390/electronics14234599 - 24 Nov 2025
Viewed by 1007
Abstract
In recent years, blockchain technology has gained widespread attention for its immutable and distributed ledger mechanism that ensures security and transparency among all participants. However, the decentralized nature of the blockchain network consequently presents its unique challenges in detecting fraudulent activities that may [...] Read more.
In recent years, blockchain technology has gained widespread attention for its immutable and distributed ledger mechanism that ensures security and transparency among all participants. However, the decentralized nature of the blockchain network consequently presents its unique challenges in detecting fraudulent activities that may be executed by malicious actors. The traditional detection methods, such as rule-based systems, may not be sufficient to capture the complex and evolving nature of these activities. This paper explores the application of machine learning and transaction graph representation to detect suspicious accounts on the World Asset Exchange (WAX) blockchain. By leveraging dynamic subgraph embedding generation and contrastive representation learning, the proposed approach primarily targets the identification of suspicious transaction behaviors indicative of fraudulent activity. The contrastive representation learning approach enhances the generation of subgraph embeddings through a contrastive loss function to effectively discriminate between potentially fraudulent and legitimate transaction behavior by optimizing the distances in the embedding space. This process significantly enhances the classification accuracy, particularly for the imbalanced minority class often seen in fraud detection scenarios. The results of the experimental validations indicate the presence of potentially fraudulent activities and highlight the effectiveness of the anomaly ranking mechanism in identifying new, previously unseen cases. Full article
Show Figures

Figure 1

25 pages, 1667 KB  
Article
A Bidirectional Bridge for Cross-Chain Revocation of Verifiable Credentials in Segregated Blockchains
by Matei Sofronie, Andrei Brînzea, Alexandru Bratu, Iulian Aciobăniței and Florin Pop
Algorithms 2025, 18(12), 734; https://doi.org/10.3390/a18120734 - 21 Nov 2025
Viewed by 473
Abstract
Verifiable Credentials (VCs) are a core component of decentralized identity systems, enabling individuals to prove claims without centralized intermediaries. However, managing VC revocation across segregated blockchain networks remains a key interoperability challenge. In this paper, we present a bidirectional blockchain bridge that enables [...] Read more.
Verifiable Credentials (VCs) are a core component of decentralized identity systems, enabling individuals to prove claims without centralized intermediaries. However, managing VC revocation across segregated blockchain networks remains a key interoperability challenge. In this paper, we present a bidirectional blockchain bridge that enables the cross-chain verification of VCs between two Ethereum-compatible private blockchain networks: Geth and Besu. The system allows credentials issued and revoked on one chain to be validated from another without duplicating infrastructure or compromising security. Our architecture combines on-chain smart contracts with an off-chain relay, ensuring auditable, low-latency credential checks across chains. Our proposal is validated through an open-source working prototype. It is particularly relevant for domains where independent organizations must validate shared credentials across segregated blockchain infrastructures, including education, healthcare, and governmental identity services. Full article
Show Figures

Figure 1

21 pages, 1980 KB  
Article
Symmetry-Preserving Federated Learning with Blockchain-Based Incentive Mechanisms for Decentralized AI Networks
by Weixiao Luo, Quanrong Fang and Wenhao Kang
Symmetry 2025, 17(11), 1977; https://doi.org/10.3390/sym17111977 - 15 Nov 2025
Viewed by 427
Abstract
With the development of decentralized artificial intelligence (AI) networks, federated learning (FL) has received extensive attention for its ability to enable collaborative modeling without sharing raw data. However, existing methods are prone to convergence instability under non-independent and identically distributed (non-IID) conditions, lack [...] Read more.
With the development of decentralized artificial intelligence (AI) networks, federated learning (FL) has received extensive attention for its ability to enable collaborative modeling without sharing raw data. However, existing methods are prone to convergence instability under non-independent and identically distributed (non-IID) conditions, lack robustness in adversarial settings, and have not yet sufficiently addressed fairness and incentive issues in multi-source heterogeneous environments. This paper proposes a Symmetry-Preserving Federated Learning (SPFL) framework that integrates blockchain auditing and fairness-aware incentive mechanisms. At the optimization layer, the framework employs group-theoretic regularization to maintain parameter symmetry and mitigate gradient conflicts; at the system layer, it leverages blockchain ledgers and smart contracts to verify and trace client updates; and at the incentive layer, it allocates rewards based on approximate Shapley values to ensure that the contributions of weaker clients are recognized. Experiments conducted on four datasets, MIMIC-IV ECG, AG News-Large, FEMNIST + Sketch, and IoT-SensorStream, show that SPFL improves average accuracy by about 7.7% compared to FedAvg, increases Jain’s Fairness Index by 0.05–0.06 compared to FairFed, and still maintains around 80% performance in the presence of 30% Byzantine clients. Convergence experiments further demonstrate that SPFL reduces the number of required rounds by about 30% compared to FedProx and exhibits lower performance degradation under high-noise conditions. These results confirm SPFL’s improvements in fairness and robustness, highlighting its application value in multi-source heterogeneous scenarios such as medical diagnosis, financial risk management, and IoT sensing. Full article
Show Figures

Figure 1

22 pages, 1664 KB  
Article
A Blockchain-Enabled Decentralized Zero-Trust Architecture for Anomaly Detection in Satellite Networks via Post-Quantum Cryptography and Federated Learning
by Sridhar Varadala and Hao Xu
Future Internet 2025, 17(11), 516; https://doi.org/10.3390/fi17110516 - 12 Nov 2025
Viewed by 456
Abstract
The rapid expansion of satellite networks for advanced communication and space exploration has ensured that robust cybersecurity for inter-satellite links has become a critical challenge. Traditional security models rely on centralized trust authorities, and node-specific protections are no longer sufficient, particularly when system [...] Read more.
The rapid expansion of satellite networks for advanced communication and space exploration has ensured that robust cybersecurity for inter-satellite links has become a critical challenge. Traditional security models rely on centralized trust authorities, and node-specific protections are no longer sufficient, particularly when system failures or attacks affect groups of satellites or agent clusters. To address this problem, we propose a blockchain-enabled decentralized zero-trust model based on post-quantum cryptography (BEDZTM-PQC) to improve the security of satellite communications via continuous authentication and anomaly detection. This model introduces a group-based security framework, where satellite teams operate under a zero-trust architecture (ZTA) enforced by blockchain smart contracts and threshold cryptographic mechanisms. Each group shares the responsibility for local anomaly detection and policy enforcement while maintaining decentralized coordination through hierarchical federated learning, allowing for collaborative model training without centralizing sensitive telemetry data. A post-quantum cryptography (PQC) algorithm is employed for future-proof communication and authentication protocols against quantum computing threats. Furthermore, the system enhances network reliability by incorporating redundant communication channels, consensus-based anomaly validation, and group trust scoring, thus eliminating single points of failure at both the node and team levels. The proposed BEDZTM-PQC is implemented in MATLAB, and its performance is evaluated using key metrics, including accuracy, latency, security robustness, trust management, anomaly detection accuracy, performance scalability, and security rate with respect to different numbers of input satellite users. Full article
Show Figures

Figure 1

24 pages, 1425 KB  
Article
Blockchain-Enabled Digital Supply Chain Regulation: Mitigating Greenwashing to Advance Sustainable Development
by Hua Pan, Pengcheng Wang and Shutong Zhang
Sustainability 2025, 17(22), 10019; https://doi.org/10.3390/su172210019 - 10 Nov 2025
Viewed by 795
Abstract
Environmental information fraud, such as greenwashing, severely impedes the achievement of global Sustainable Development Goals (SDGs). Blockchain technology, as an innovation tool with a sustainability orientation, offers new possibilities for improving the reliability of supply chain information oversight. However, its practical application mechanisms [...] Read more.
Environmental information fraud, such as greenwashing, severely impedes the achievement of global Sustainable Development Goals (SDGs). Blockchain technology, as an innovation tool with a sustainability orientation, offers new possibilities for improving the reliability of supply chain information oversight. However, its practical application mechanisms and policy value in green supply chain governance remain unclear. This study focuses on the greenwashing behavior of core enterprises and constructs an incomplete information game model to compare and analyze the inherent mechanisms of traditional regulation (TR) and blockchain-based digital supply chain regulation (DSCR). By simulating the strategic choices of enterprises between “genuine production” and “greenwashing” within a supply chain network, this research finds that when the quality of on-chain information reaches a certain threshold, the blockchain consensus mechanism can more accurately reveal corporate moral hazards, such as information manipulation, significantly reducing the incidence of greenwashing. As the number of enterprises participating in the blockchain network increases, the reliance on high-quality information in the DSCR model decreases, and regulatory efficiency is further enhanced through network effects. The findings provide theoretical support for designing regulatory strategies against greenwashing: Blockchain technology can build a trustworthy supply chain ecosystem through cross-enterprise data verification, directly supporting the SDG 12 goal of “Responsible Production.” Its decentralized nature helps optimize industrial infrastructure (SDG 9) and indirectly promotes climate action (SDG 13). This study suggests that regulatory agencies use policy tools such as “establishing on-chain information quality standards” and “incentivizing enterprises to join the blockchain network” to strengthen the practical application of the model, while also addressing implementation challenges such as data authenticity and digital infrastructure compatibility. Full article
Show Figures

Figure 1

51 pages, 2099 KB  
Review
Secure and Intelligent Low-Altitude Infrastructures: Synergistic Integration of IoT Networks, AI Decision-Making and Blockchain Trust Mechanisms
by Yuwen Ye, Xirun Min, Xiangwen Liu, Xiangyi Chen, Kefan Cao, S. M. Ruhul Kabir Howlader and Xiao Chen
Sensors 2025, 25(21), 6751; https://doi.org/10.3390/s25216751 - 4 Nov 2025
Viewed by 1959
Abstract
The low-altitude economy (LAE), encompassing urban air mobility, drone logistics and sub 3000 m aerial surveillance, demands secure, intelligent infrastructures to manage increasingly complex, multi-stakeholder operations. This survey evaluates the integration of Internet of Things (IoT) networks, artificial intelligence (AI) decision-making and blockchain [...] Read more.
The low-altitude economy (LAE), encompassing urban air mobility, drone logistics and sub 3000 m aerial surveillance, demands secure, intelligent infrastructures to manage increasingly complex, multi-stakeholder operations. This survey evaluates the integration of Internet of Things (IoT) networks, artificial intelligence (AI) decision-making and blockchain trust mechanisms as foundational enablers for next-generation LAE ecosystems. IoT sensor arrays deployed at ground stations, unmanned aerial vehicles (UAVs) and vertiports form a real-time data fabric that records variables from air traffic density to environmental parameters. These continuous data streams empower AI models ranging from predictive analytics and computer vision (CV) to multi-agent reinforcement learning (MARL) and large language model (LLM) reasoning to optimize flight paths, identify anomalies and coordinate swarm behaviors autonomously. In parallel, blockchain architectures furnish immutable audit trails for regulatory compliance, support secure device authentication via decentralized identifiers (DIDs) and automate contractual exchanges for services such as airspace leasing or payload delivery. By examining current research and practical deployments, this review demonstrates how the synergistic application of IoT, AI and blockchain can bolster operational efficiency, resilience and trustworthiness across the LAE landscape. Full article
Show Figures

Figure 1

37 pages, 774 KB  
Article
Resilient Federated Learning for Vehicular Networks: A Digital Twin and Blockchain-Empowered Approach
by Jian Li, Chuntao Zheng and Ziyao Chen
Future Internet 2025, 17(11), 505; https://doi.org/10.3390/fi17110505 - 3 Nov 2025
Viewed by 705
Abstract
Federated learning (FL) is a foundational technology for enabling collaborative intelligence in vehicular edge computing (VEC). However, the volatile network topology caused by high vehicle mobility and the profound security risks of model poisoning attacks severely undermine its practical deployment. This paper introduces [...] Read more.
Federated learning (FL) is a foundational technology for enabling collaborative intelligence in vehicular edge computing (VEC). However, the volatile network topology caused by high vehicle mobility and the profound security risks of model poisoning attacks severely undermine its practical deployment. This paper introduces DTB-FL, a novel framework that synergistically integrates digital twin (DT) and blockchain technologies to establish a secure and efficient learning paradigm. DTB-FL leverages a digital twin to create a real-time virtual replica of the network, enabling a predictive, mobility-aware participant selection strategy that preemptively mitigates network instability. Concurrently, a private blockchain underpins a decentralized trust infrastructure, employing a dynamic reputation system to secure model aggregation and smart contracts to automate fair incentives. Crucially, these components are synergistic: The DT provides a stable cohort of participants, enhancing the accuracy of the blockchain’s reputation assessment, while the blockchain feeds reputation scores back to the DT to refine future selections. Extensive simulations demonstrate that DTB-FL accelerates model convergence by 43% compared to FedAvg and maintains 75% accuracy under poisoning attacks even when 40% of participants are malicious—a scenario where baseline FL methods degrade to below 40% accuracy. The framework also exhibits high resilience to network dynamics, sustaining performance at vehicle speeds up to 120 km/h. DTB-FL provides a comprehensive, cross-layer solution that transforms vehicular FL from a vulnerable theoretical model into a practical, robust, and scalable platform for next-generation intelligent transportation systems. Full article
Show Figures

Figure 1

Back to TopTop