This man-in-the-middle attack (Figure 2: arrow 1) can lead to an inconsistent network view, which leads to routing errors such as routing loops (Figure 2: arrow 2), firewall leaks, poor and false routing decision, and congestion of critical links when the majority of the false flow ...
Even though a number of solutions are recently proposed in the literature, they lack in several aspects: (1) lack of proper regulatory interface, (2) absence of proper agricultural supply chain, (3) absence of adequate storage facilities, (4) absence of a fair payment system, (5) poor ...
contracts are automatically loaded and then executed according to their predefined logic (as specified bycodeHash). In Fig.1, we show a simple contract namedEtherBankin Solidity. Solidity is the statically typed object-oriented high-level programming language dedicated...
This architecture is simple, will not leak privacy due to communication, and will not affect network bandwidth. However, this method has poor scalability and configurability. On the other hand, the analysis engine and the distributed intrusion detection system are two systems that can be operated ...
Based on the existing topology graph of stations, as well as the latitude and longitude information of stations and intersection nodes, the distances between each edge of the topology graph are calculated using the Python programming language and then saved. The distance calculation formulas from ...
A common use case for blockchain smart contracts (SC) is that of governing interaction amongst mutually untrusted parties, by automatically enforcing rules for interaction. However, while many contributions in the literature assess SC computational expre
Aiming at the problems of the traditional centralized data sharing platform, such as poor data privacy protection ability, insufficient scalability of the system and poor interaction ability, this paper proposes a distributed data sharing system architec
The blockchain portal uses the Hyperledger framework, a node-red programming platform, different IoT communication protocols, and embedded electronic systems with communication interfaces. In addition, two cloud service platforms are used. With UBIDOTS, monitoring and processing dashboards of sensorization...
Therefore, the comparison algorithm is poor at identifying Copy-move and Modify attack tampering for the interior of gently sloping regions with sparse features such as marine and desert. The algorithm proposed in this paper is based on the statistical features of image texture, which has more ...
The increasing volume of motorized traffic not only negatively impacts the structural preservation and overall planning of individual buildings within the block but also disrupts the originally harmonious and pleasant spatial environment of the area. Wal