Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (17)

Search Parameters:
Keywords = intellectual property transactions

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
20 pages, 5684 KiB  
Article
Blockchain-Based Information Security Protection Mechanism for the Traceability of Intellectual Property Transactions
by Zheng Wang, Wenlong Feng, Mengxing Huang, Siling Feng, Shilong Mo and Yunhong Li
Sensors 2025, 25(10), 3064; https://doi.org/10.3390/s25103064 - 13 May 2025
Viewed by 602
Abstract
Traditional intellectual property transaction traceability has problems such as information asymmetry, traceability information storage methods relying on centralized databases, and easy tampering of transaction information, etc. A blockchain-based information security mechanism for intellectual property transaction traceability is proposed. Firstly, through the analysis of [...] Read more.
Traditional intellectual property transaction traceability has problems such as information asymmetry, traceability information storage methods relying on centralized databases, and easy tampering of transaction information, etc. A blockchain-based information security mechanism for intellectual property transaction traceability is proposed. Firstly, through the analysis of massive intellectual property transaction case information, the commonality and individuality data are studied, and the structure and scope of data collection requirements for traceability information are established; secondly, the traceability information structure is constructed based on the smart contract and PROV data origin model, the signature verification of traceability information is completed based on the BLS threshold signature of the Dynamic DKG protocol, and the signature process integrates the PROV model and constructs a chained signature structure. The multi-level traceability information verification strategy and process are developed to achieve the security protection of traceability information throughout the entire life cycle of intellectual property transactions. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

21 pages, 2432 KiB  
Article
Research on Consensus Algorithm for Intellectual Property Transactions Based on Practical Byzantine Fault Tolerant (PBFT) Algorithm
by Dan Du, Wenlong Feng, Mengxing Huang, Siling Feng and Jing Wang
Electronics 2025, 14(8), 1665; https://doi.org/10.3390/electronics14081665 - 20 Apr 2025
Viewed by 450
Abstract
Aiming at the problems of significant communication overheads, the low reliability of primary nodes, and the insufficient dynamic adaptability of traditional consensus algorithms in intellectual property transaction scenarios, an Improved Practical Byzantine Fault Tolerant (IPBFT) algorithm based on the Chord algorithm and entropy [...] Read more.
Aiming at the problems of significant communication overheads, the low reliability of primary nodes, and the insufficient dynamic adaptability of traditional consensus algorithms in intellectual property transaction scenarios, an Improved Practical Byzantine Fault Tolerant (IPBFT) algorithm based on the Chord algorithm and entropy weight method is proposed. Firstly, the Chord algorithm is employed to map nodes onto a hash ring, enabling dynamic grouping. Secondly, an entropy-based dynamic reputation model is constructed, quantifying the evaluation of node behaviors and calculating the overall reputation value. A three-level reputation classification mechanism is used to dynamically select primary and supervisory nodes, thereby reducing the probability of Byzantine nodes being elected. Then, a three-phase monitoring strategy for supervisory nodes is developed, which includes collection, review, and blackout. This improves the Raft consensus process, enhancing the detection and fault tolerance against malicious leaders. Finally, a grouped dual-layer consensus architecture is proposed. The lower layer uses an improved Raft algorithm for efficient consensus within groups, while the upper layer uses the PBFT algorithm for cross-group global consistency verification. Experimental findings demonstrate that the IPBFT algorithm is able to balance security, scalability, and consensus efficiency in a dynamic network environment, providing a better consensus solution for intellectual property transactions. Full article
Show Figures

Figure 1

37 pages, 3696 KiB  
Article
Design Analysis for a Distributed Business Innovation System Employing Generated Expert Profiles, Matchmaking, and Blockchain Technology
by Adrian Alexandrescu, Delia-Elena Bărbuță, Cristian Nicolae Buțincu, Alexandru Archip, Silviu-Dumitru Pavăl, Cătălin Mironeanu and Gabriel-Alexandru Scînteie
Future Internet 2025, 17(4), 171; https://doi.org/10.3390/fi17040171 - 14 Apr 2025
Viewed by 599
Abstract
Innovation ecosystems often face challenges such as inadequate coordination, insufficient protection of intellectual property, limited access to quality expertise, and inefficient matchmaking between innovators and experts. This paper provides an in-depth design analysis of SPARK-IT, a novel business innovation platform specifically addressing these [...] Read more.
Innovation ecosystems often face challenges such as inadequate coordination, insufficient protection of intellectual property, limited access to quality expertise, and inefficient matchmaking between innovators and experts. This paper provides an in-depth design analysis of SPARK-IT, a novel business innovation platform specifically addressing these challenges. The platform leverages advanced AI to precisely match innovators with suitable mentors, supported by a distributed web scraper that constructs expert profiles from reliable sources (e.g., LinkedIn and BrainMap). Data privacy and security are prioritized through robust encryption that restricts sensitive content exclusively to innovators and mentors, preventing unauthorized access even by platform administrators. Additionally, documents are stored encrypted on decentralized storage, with their cryptographic hashes anchored on blockchain to ensure transparency, traceability, non-repudiation, and immutability. To incentivize active participation, SPARK-IT utilizes a dual-token approach comprising reward and reputation tokens. The reward tokens, SparkCoins, are wrapped stablecoins with tangible monetary value, enabling seamless internal transactions and external exchanges. Finally, the paper discusses key design challenges and critical architectural trade-offs and evaluates the socio-economic impacts of implementing this innovative solution. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

14 pages, 7901 KiB  
Article
Secure and Transparent Craftwork Authentication and Transaction System: Integrating Digital Fingerprinting and Blockchain Technologies
by Ji Hyun Yi and Jinsoo Moon
Appl. Sci. 2024, 14(19), 9054; https://doi.org/10.3390/app14199054 - 7 Oct 2024
Viewed by 1455
Abstract
This study proposes a method that enables craftsmen to define and apply the unique characteristics of their craftworks to distinguish between originals and imitations and to protect and trade their intellectual property rights. In the first step, a digital fingerprint that enables the [...] Read more.
This study proposes a method that enables craftsmen to define and apply the unique characteristics of their craftworks to distinguish between originals and imitations and to protect and trade their intellectual property rights. In the first step, a digital fingerprint that enables the authentication of the original craftworks was generated by applying hash functions that can digitize various attributes of the craftworks and create a unique ID. In the second step, a blockchain transaction system for the original authentication of the craftwork was developed by applying consortium blockchain technology. This system allows multiple craft-related organizations to participate together, and when a transaction occurs, a smart contract is created and stored on the blockchain, thereby enabling the tracking and management of transaction histories. Furthermore, a DApp was developed that enables buyers to verify the craftwork authentication and access detailed information by scanning the digital fingerprint (QR code) of the craftwork, which is integrated with the blockchain system. In the third step, the research results were evaluated through a satisfaction survey conducted with 121 participants and a usability evaluation with 10 craftsmen, both of which yielded positive feedback. This study successfully realizes a secure and transparent craftwork transaction system that guarantees both security and efficiency through the integration of digital fingerprinting and blockchain technologies. Full article
Show Figures

Figure 1

14 pages, 498 KiB  
Article
Barriers to Digital Services Trade and Export Efficiency of Digital Services
by Xiaomei Wang, Jia Zhang and Yixin Zhu
Sustainability 2024, 16(17), 7517; https://doi.org/10.3390/su16177517 - 30 Aug 2024
Cited by 1 | Viewed by 3500
Abstract
An international rules system on digital trade that can satisfy multilateral interest appeal has not been formed yet despite the rapid growth of digital services trade. Using the panel data of 39 countries from 2010 to 2019, this study applied the stochastic frontier [...] Read more.
An international rules system on digital trade that can satisfy multilateral interest appeal has not been formed yet despite the rapid growth of digital services trade. Using the panel data of 39 countries from 2010 to 2019, this study applied the stochastic frontier gravity model to analyze the influence of five types of barriers to digital services trade on the export efficiency of digital services. The research results show that infrastructure and connectivity barriers had no significant effect on the export efficiency of digital services. The barriers to electronic transactions and other barriers that affected the trade of digital services were conducive to improving the export efficiency of digital services. In contrast, the barriers to payment systems and intellectual property rights had a restraining effect on the export efficiency of digital services. The results also show that most countries were more efficient when exporting digital services to their major trade partner countries, which indicates a demand-driven characteristic. Based on these conclusions, we propose five recommendations that are helpful to enhance the export efficiency of digital services. Full article
Show Figures

Figure 1

16 pages, 1617 KiB  
Article
Improvement of PBFT Consensus Algorithm Based on Affinity Propagation Clustering in Intellectual Property Transaction Scenarios
by Dan Du, Wenlong Feng, Mengxing Huang, Siling Feng and Jing Wang
Electronics 2024, 13(10), 1809; https://doi.org/10.3390/electronics13101809 - 7 May 2024
Cited by 3 | Viewed by 1659
Abstract
In response to the problems of random selection of primary nodes, high communication complexity, and low consensus efficiency in the current consensus mechanism for intellectual property transactions, a Practical Byzantine Fault Tolerance (PBFT) consensus algorithm based on the Affinity-Propagation (AP) clustering algorithm, termed [...] Read more.
In response to the problems of random selection of primary nodes, high communication complexity, and low consensus efficiency in the current consensus mechanism for intellectual property transactions, a Practical Byzantine Fault Tolerance (PBFT) consensus algorithm based on the Affinity-Propagation (AP) clustering algorithm, termed AP-PBFT, is proposed. Firstly, the election strategy of the leader node is constructed based on the reputation mechanism; the reward and punishment mechanism is designed to achieve the dynamic adjustment of the reputation value of the nodes in the PBFT consensus process, and the number of votes among the nodes is introduced to determine the node’s reputation value in collaboration with the reward and punishment mechanism to guarantee the precise ordering of the nodes. Secondly, nodes with high reputation values are selected as cluster centers to run the AP clustering algorithm, and clustering groups of knowledge property transaction nodes are constructed based on responsibility and availability. Finally, the three-stage consensus process of the PBFT consensus algorithm is optimized, and the consensus task is decomposed into two layers: the intra-consensus group and the inter-leader node group, reducing the communication complexity of transaction data in the blockchain. Experimental findings indicate a significant performance improvement of the algorithm over the PBFT consensus algorithm in communication complexity, throughput, and consensus efficiency in the simulation environment of multiple types of transactions in intellectual property transactions, including different types of large-scale transaction scenarios, such as purchases, sales, licenses, and transfers. Full article
Show Figures

Figure 1

18 pages, 3098 KiB  
Article
Improvement of Practical Byzantine Fault Tolerance Consensus Algorithm Based on DIANA in Intellectual Property Environment Transactions
by Jing Wang, Wenlong Feng, Mengxing Huang, Siling Feng and Dan Du
Electronics 2024, 13(9), 1634; https://doi.org/10.3390/electronics13091634 - 24 Apr 2024
Viewed by 1708
Abstract
In response to the shortcomings of the consensus algorithm for intellectual property transactions, such as high communication overhead, random primary node selection, and prolonged consensus time, a Practical Byzantine Fault Tolerance (PBFT) improvement algorithm based on Divisive Analysis (DIANA) D-PBFT algorithm is proposed. [...] Read more.
In response to the shortcomings of the consensus algorithm for intellectual property transactions, such as high communication overhead, random primary node selection, and prolonged consensus time, a Practical Byzantine Fault Tolerance (PBFT) improvement algorithm based on Divisive Analysis (DIANA) D-PBFT algorithm is proposed. Firstly, the algorithm adopts the hierarchical clustering mechanism of DIANA to cluster nodes based on similarity, enhancing node partition accuracy and reducing the number of participating consensus nodes. Secondly, it designs a reward and punishment system based on node ranking, to achieve consistency between node status and permissions, timely evaluation, and feedback on node behaviours, thereby enhancing node enthusiasm. Then, the election method of the primary node is improved by constructing proxy and alternate nodes and adopting a majority voting strategy to achieve the selection and reliability of the primary node. Finally, the consistency protocol is optimised to perform consensus once within the cluster and once between all primary nodes, to ensure the accuracy of the consensus results. Experimental results demonstrate that the D-PBFT algorithm shows a better performance, in terms of communication complexity, throughput, and latency. Full article
Show Figures

Figure 1

20 pages, 3045 KiB  
Article
Blockchain Architectures for the Digital Economy: Trends and Opportunities
by Magda Pineda, Daladier Jabba and Wilson Nieto-Bernal
Sustainability 2024, 16(1), 442; https://doi.org/10.3390/su16010442 - 4 Jan 2024
Cited by 20 | Viewed by 11327
Abstract
The digital economy, driven by information and communication technologies (ICT), has profoundly transformed in recent decades. The digitalization of society has given rise to an economic environment in which information, connectivity, and innovation play fundamental roles. In this context, a technology that has [...] Read more.
The digital economy, driven by information and communication technologies (ICT), has profoundly transformed in recent decades. The digitalization of society has given rise to an economic environment in which information, connectivity, and innovation play fundamental roles. In this context, a technology that has emerged as a fundamental pillar of the digital economy is the chain of blocks, commonly known as blockchain. Blockchain is a technology that has revolutionized the way online data and transactions are managed and shared. Through its ability to create secure, transparent, and decentralized ledgers, blockchain has paved the way for the digital economy, facilitating trust in digital transactions and enabling various applications ranging from cryptocurrencies to supply chain management and intellectual property. This study will delve into blockchain and its influence on the digital economy. It will explore how this technology has reshaped how companies interact, how consumers access services, and how new business models are developed in a constantly evolving digital environment. Additionally, the challenges and opportunities that blockchain presents in the context of the digital economy will be analyzed, and how it is helping to shape the future of business and society in general. As the exploration of blockchain and its impact on the digital economy progresses, it becomes evident how these two forces converge, generating a promising digital landscape full of significant opportunities and transformations. This phenomenon is consistently supported by a growing body of research and analysis, which underlines the growing influence of blockchain on the global economy. The dynamic interplay between these two spheres, blockchain and the digital economy, is constantly evolving and offers an exciting glimpse into the future regarding innovation and disruption across a wide range of sectors. As a result, significant opportunities are looming for those seeking to understand and capitalize on these emerging trends. Throughout this study, the current trends and most intriguing perspectives that shape this landscape will be broken down, offering a deeper insight into how blockchain and the digital economy are shaping an extraordinary digital future. Full article
Show Figures

Figure 1

22 pages, 1599 KiB  
Article
The Impact of R&D Subsidy and IPP on Global Supply Chain Networks System—A Technology Spillover Perspective
by Qiuyun Zhu, Xiaoyang Zhou, Die Li, Aijun Liu and Benjamin Lev
Systems 2023, 11(9), 460; https://doi.org/10.3390/systems11090460 - 4 Sep 2023
Cited by 2 | Viewed by 2278
Abstract
In the current globalized business environment, multinational competition has become the norm for companies. This paper considers technology spillovers among manufacturers and develops a global supply chain network equilibrium model. Firstly, the optimal decision-making behaviors of manufacturers, retailers, and demand markets are characterized [...] Read more.
In the current globalized business environment, multinational competition has become the norm for companies. This paper considers technology spillovers among manufacturers and develops a global supply chain network equilibrium model. Firstly, the optimal decision-making behaviors of manufacturers, retailers, and demand markets are characterized separately. Secondly, based on the variational inequality theory, the optimal decision-making behaviors of global supply chain members are transformed. Finally, the model is solved and analyzed using the Euler algorithm. The primary objective is to explore the impact of research and development (R&D) subsidies and intellectual property protection (IPP) strategies on manufacturers’ research and development technological levels. Furthermore, the study delves into their effects on the production and transactions of the global supply chain network and social welfare. The following conclusions are drawn: (1) Technology spillovers have a positive effect on the technological level achieved by manufacturers through research and development investment and social welfare. However, intense technological competition may harm manufacturers’ profits. (2) Under the symmetric subsidy policy, higher subsidies may lead to a decrease in social welfare. (3) Under symmetric intellectual property protection policies, increasing the intensity of intellectual property protection benefits manufacturers but is detrimental to retailers and social welfare. However, under an asymmetric intellectual property protection strategy, implementing high-intensity intellectual property protection by high-technology countries is advantageous for retailers and social welfare. This conclusion has contributed to the technical research and development and production operation decision making of global supply chain members, as well as government policy formulation, and has also provided a new perspective for theoretical research in the field of global supply networks. Full article
Show Figures

Figure 1

12 pages, 664 KiB  
Article
Triple-Entry Accounting as a Means of Auditing Large Language Models
by Konstantinos Sgantzos, Mohamed Al Hemairy, Panagiotis Tzavaras and Spyridon Stelios
J. Risk Financial Manag. 2023, 16(9), 383; https://doi.org/10.3390/jrfm16090383 - 27 Aug 2023
Cited by 5 | Viewed by 6259
Abstract
The usage of Large Language Models (LMMs) and their exponential progress has created a Cambrian Explosion in the development of new tools for almost every field of science and technology, but also presented significant concerns regarding the AI ethics and creation of sophisticated [...] Read more.
The usage of Large Language Models (LMMs) and their exponential progress has created a Cambrian Explosion in the development of new tools for almost every field of science and technology, but also presented significant concerns regarding the AI ethics and creation of sophisticated malware and phishing attacks. Moreover, several worries have arisen in the field of dataset collection and intellectual property in that many datasets may exist without the license of the respective owners. Triple-Entry Accounting (TEA) has been proposed by Ian Grigg to increase transparency, accountability, and security in financial transactions. This method expands upon the traditional double-entry accounting system, which records transactions as debits and credits in two separate ledgers, by incorporating a third ledger as an independent verifier via a digitally signed receipt. The utilization of a digital signature provides evidentiary power to the receipt, thus reducing the accounting problem to one of the presence or absence of the receipt. The integrity issues associated with double-entry accounting can be addressed by allowing the parties involved in the transaction to share the records with an external auditor. This manuscript proposes a novel methodology to apply triple-entry accounting records on a publicly accessed distributed ledger technology medium to control the queries of LLMs in order to discourage malicious acts and ensure intellectual property rights. Full article
(This article belongs to the Special Issue Triple Entry Accounting)
Show Figures

Figure 1

13 pages, 1666 KiB  
Article
ST-PBFT: An Optimized PBFT Consensus Algorithm for Intellectual Property Transaction Scenarios
by Wang Zhong, Wenlong Feng, Mengxing Huang and Siling Feng
Electronics 2023, 12(2), 325; https://doi.org/10.3390/electronics12020325 - 8 Jan 2023
Cited by 12 | Viewed by 3027
Abstract
For the current Intellectual Property (IP) transaction scenario, consensus nodes need to simultaneously consensus transactions of the same transaction type, resulting in low consensus efficiency, accuracy, and reliability, which seriously hinders the development of intellectual property. Based on the consortium chain, this paper [...] Read more.
For the current Intellectual Property (IP) transaction scenario, consensus nodes need to simultaneously consensus transactions of the same transaction type, resulting in low consensus efficiency, accuracy, and reliability, which seriously hinders the development of intellectual property. Based on the consortium chain, this paper proposes a secure and efficient blockchain-distributed consensus algorithm, ST-PBFT (Shard Transaction Practical Byzantine Fault Tolerance), applied to the IP transaction scenario. The main contributions of ST-PBFT include the following: first, a grouping method based on the principle of consistent hashing is proposed to group consensus nodes, and nodes group consensus, which reduces the complexity of communication. Second, the transaction consensus group can process IP transactions in parallel, which improves the throughput of the algorithm. Third, a node reputation evaluation model is proposed, which can prevent byzantine nodes from being repeatedly elected as primary nodes. The experimental results show that ST-PBFT can significantly improve the consensus efficiency and reliability and reduce consensus latency. Full article
Show Figures

Figure 1

13 pages, 5037 KiB  
Article
Vbswp-CeaH: Vigorous Buyer-Seller Watermarking Protocol without Trusted Certificate Authority for Copyright Protection in Cloud Environment through Additive Homomorphism
by Ashwani Kumar, Mohit Kumar, Sahil Verma, Kavita, N. Z. Jhanjhi and Rania M. Ghoniem
Symmetry 2022, 14(11), 2441; https://doi.org/10.3390/sym14112441 - 17 Nov 2022
Cited by 12 | Viewed by 2058
Abstract
Cloud-based storage ensures the secure dissemination of media. Authentication and integrity are important aspects in the distribution of digital media. Encryption-based techniques shelter this media between the communicating parties which are involved in a transaction. The challenge is how to restrict the digital [...] Read more.
Cloud-based storage ensures the secure dissemination of media. Authentication and integrity are important aspects in the distribution of digital media. Encryption-based techniques shelter this media between the communicating parties which are involved in a transaction. The challenge is how to restrict the digital media which is illegally redistributed by the authorized users. However, the digital watermarking technique and encryption-based methods are also not sufficient enough to provide copyright protection. The watermarking protocol is used to provide intellectual property for the customer and the service provider. This research paper provides a vigorous buyer-seller watermarking protocol without trusted certificate authority for copyright protection in the cloud environment. This research work uses the cloud environment which enables the cloud as a service infrastructural provider for storing credentials such as public and private secret keys and the digital certificates of interacting parties. The scheme uses additive homomorphism encryption with an effective key exchange algorithm for exchanging digital media. This proposed approach addresses the problems of anonymity and copy deterrence and protects the digital rights of the buyer and seller; these most up-to-date issues are related to information security. Furthermore, the experiment results conclude that the proposed protocol is flexible and secure even in a non-secure communication channel. We have used performance measures such as PSNR, NCC and cost in time methods for checking the integrity of the proposed protocol. The conducted experiments show a stronger robustness and high imperceptibility for the watermark and watermarked images. Full article
Show Figures

Figure 1

24 pages, 4571 KiB  
Article
Knowledge Mapping Visualization Analysis of Research on Blockchain in Management and Economics
by Yunfei Yang, Guifei Qu, Lianlian Hua and Lifeng Wu
Sustainability 2022, 14(22), 14971; https://doi.org/10.3390/su142214971 - 12 Nov 2022
Cited by 9 | Viewed by 3107
Abstract
As an emerging technology enabling economic, social, and environmental sustainability, blockchain has drawn considerable attention from the academic community in management and economics. It is essential to clarify this field’s research status, hotspots, and evolution trends. This study took 642 pieces of literature [...] Read more.
As an emerging technology enabling economic, social, and environmental sustainability, blockchain has drawn considerable attention from the academic community in management and economics. It is essential to clarify this field’s research status, hotspots, and evolution trends. This study took 642 pieces of literature on blockchain in management and economics from the Web of Science (WoS) as data sources. It combined the bibliometric knowledge mapping visualization and statistical analysis methods to conduct a systematic analysis. It is found that the United States and China are the primary core strengths, and highly influential research organizations and authors have emerged in this field. The research of blockchain in management and economics has the property of being interdisciplinary. Research hotspots are mainly distributed in the combination and application of blockchain technology and emerging technologies and the research on blockchain in supply chain management (SCM), supply chain finance, intellectual property, digital currency, and transaction costs. The evolution trends of research hotspots show a rule of overlapping commonness and individuality. This study systematically revealed the overall research development situation on blockchain in management and economics to provide some reference and inspiration for relevant researchers. Full article
(This article belongs to the Collection Blockchain Technology)
Show Figures

Figure 1

18 pages, 786 KiB  
Article
Data Usage and the Legal Stability of Transactions for the Commercial Operation of Autonomous Vessels Based on Digital Ownership in Korean Civil Law
by Changhee Lee, Yulseong Kim and Youngran Shin
Sustainability 2021, 13(15), 8134; https://doi.org/10.3390/su13158134 - 21 Jul 2021
Cited by 7 | Viewed by 3344
Abstract
Stakeholders in the maritime industry have agreed to expand commercial operations by developing autonomous vessels, the epitome of innovative technologies. However, they are still concerned about the risks of infringing on the rights and interests of individuals or organizations linked to data transactions. [...] Read more.
Stakeholders in the maritime industry have agreed to expand commercial operations by developing autonomous vessels, the epitome of innovative technologies. However, they are still concerned about the risks of infringing on the rights and interests of individuals or organizations linked to data transactions. Based on Locke’s theory of property ownership, and the assurance of absolute ownership as specified in the Constitution of the Republic of Korea, the business model is still in its early stages. This study examined the concept, transaction structure, and application scope of data activating digital platforms to support data transactions, and aid in advancing the new business sector for commercial operations of maritime autonomous surface ships (MASSs). Consequently, this study contributes to and recognizes the future value of knowledge and intellectual property related to maritime data. This is achieved by defining the intellectual property emerging from newer avenues, such as MASSs, blockchain technology, and smart ports, that are consequential to the rapid development of the maritime industry. Full article
Show Figures

Figure 1

18 pages, 3964 KiB  
Article
Towards a Secure Signature Scheme Based on Multimodal Biometric Technology: Application for IOT Blockchain Network
by Oday A. Hassen, Ansam A. Abdulhussein, Saad M. Darwish, Zulaiha Ali Othman, Sabrina Tiun and Yasmin A. Lotfy
Symmetry 2020, 12(10), 1699; https://doi.org/10.3390/sym12101699 - 15 Oct 2020
Cited by 27 | Viewed by 4319
Abstract
Blockchain technology has been commonly used in the last years in numerous fields, such as transactions documenting and monitoring real assets (house, cash) or intangible assets (copyright, intellectual property). The internet of things (IoT) technology, on the other hand, has become the main [...] Read more.
Blockchain technology has been commonly used in the last years in numerous fields, such as transactions documenting and monitoring real assets (house, cash) or intangible assets (copyright, intellectual property). The internet of things (IoT) technology, on the other hand, has become the main driver of the fourth industrial revolution, and is currently utilized in diverse fields of industry. New approaches have been established through improving the authentication methods in the blockchain to address the constraints of scalability and protection in IoT operating environments of distributed blockchain technology by control of a private key. However, these authentication mechanisms do not consider security when applying IoT to the network, as the nature of IoT communication with numerous entities all the time in various locations increases security risks resulting in extreme asset damage. This posed many difficulties in finding harmony between security and scalability. To address this gap, the work suggested in this paper adapts multimodal biometrics to strengthen network security by extracting a private key with high entropy. Additionally, via a whitelist, the suggested scheme evaluates the security score for the IoT system with a blockchain smart contract to guarantee that highly secured applications authenticate easily and restrict compromised devices. Experimental results indicate that our system is existentially unforgeable to an efficient message attack, and therefore, decreases the expansion of infected devices to the network by up to 49 percent relative to traditional schemes. Full article
Show Figures

Figure 1

Back to TopTop