Professional Documents
Culture Documents
5 Blockchain Enabled Wireless Communications
5 Blockchain Enabled Wireless Communications
INFORMATION SCIENCE
C The Author(s) 2021. Published by Oxford University Press on behalf of China Science Publishing & Media Ltd. This is an Open Access article distributed under the terms of the Creative
Commons Attribution License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted reuse, distribution, and reproduction in any medium, provided the original
work is properly cited.
Natl Sci Rev, 2021, Vol. 8, nwab069
satellite, maritime and unmanned aerial vehicle ate the first successful worldwide payment system
communications, exploring the full spectrum of sub- known as Bitcoin [13]. In a mere decade, the suc-
6 gigahertz, mmWave, terahertz and optical bands, cess of Bitcoin as the first practical cryptocurrency
and supporting a plethora of applications, such as has been remarkable [14,15]. As the backbone of
virtual and augmented reality, holographic commu- Bitcoin, blockchain was first designed as a grow-
nications, ultra-high-resolution video streaming, en- ing list of data records that are linked using cryp-
hanced by big data and artificial intelligence (AI). tographic mechanisms. It creates an open and im-
The 6G networks will comprise numerous het- mutable ledger and lends itself to store, secure and
erogeneous devices and infrastructures to provide manipulate data in a distributed way, while having
ubiquitous wireless connections with ultra-high high credibility in interests protecting and record
rates, ultra reliability and extremely low latency and tracing. In recent years, blockchain has evolved from
facilitate the Internet of Things (IoT) and the future the original version in Bitcoin to a number of en-
Page 2 of 25
Natl Sci Rev, 2021, Vol. 8, nwab069
45%
ACM journals In this paper we aim to present a comprehen-
40%
Science China sive investigation of the most recent advances and
Percentage of increased articles in a single year
Google Scholar
IEEE challenges in incorporating blockchain into wire-
35%
less communications, and more importantly estab-
30%
lish a unified framework of the blockchain radio ac-
25% cess network for upcoming 6G networks as a novel
20% paradigm shift. We first provide a brief introduc-
tion to the fundamentals of blockchain, including
15%
its concept and architecture, mining and consen-
10%
sus protocols, smart contracts and possible security
5% risks. Then, we provide a comprehensive survey of
0% state-of-the-art works on integrating blockchain into
2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020
Page 3 of 25
Natl Sci Rev, 2021, Vol. 8, nwab069
Blockchain
#0 #1 #2 #k #k+1 #k+2 Time
Mining
BlockHash BlockHash
Miner 3 P2P PrevBlockHash PrevBlockHash
Miner 1 con
nec Timestamp Timestamp Block header
tion
Page 5 of 25
Natl Sci Rev, 2021, Vol. 8, nwab069
actions (e.g. transactions, fees, interests) can eas- consistency in blockchains. By collecting the private
ily be authorized and authenticated by digital sig- keys of older accounts that have accrued a major-
natures and key pairs in smart contracts. With the ity stake in history, the attacker can construct a fork
popularity of Ethereum, smart contracts have be- chain to overlay the current main blockchain. To re-
come an indispensable component of various emerg- sist this attack, the authors of Ref. [32] suggested us-
ing blockchains and the functionalities of smart con- ing checkpoints (blocks until which the blockchain
tracts have also been significantly expanded [46]. is regarded as ‘finalized’ and immutable) to limit the
Despite the benefits of smart contracts, there range of long-range attacks.
are security and implementation issues with smart
contracts. Several prominent risks of implementing Selfish mining
smart contracts were examined in Harris [47], who The key idea of selfish mining is to increase an attack-
put forward three key properties (deterministic, iso- ers’ winning probability by letting the honest min-
Page 6 of 25
Natl Sci Rev, 2021, Vol. 8, nwab069
Privacy protection
Blockchain
Blockchain
Blockchain
Tracing
Page 7 of 25
Natl Sci Rev, 2021, Vol. 8, nwab069
separated network entities, thus leading to more ef- diting scheme was proposed to provide reliable net-
ficient resource sharing. work storage services.
Page 8 of 25
Natl Sci Rev, 2021, Vol. 8, nwab069
reliability [92]. Recently, researchers have been us- security risk due to the single point of failure and data
ing blockchain to establish mutual trust between di- security risk resulting from data leakage. Built on its
verse devices and create a trusted channel for se- inherent nature, such as tamper resistance, decen-
cure data interactions [92,93]. The efforts of using tralization and fine-grained auditability, blockchain
blockchain to support trusted data interactions in presents a promising remedy to address these secu-
wireless networks have mainly been in two direc- rity risks in wireless networks.
tions: to ensure the credibility of each network iden-
tity and to improve the authenticity of the transmit- Device access control
ted data. Given the massive number of various devices in the
mobile communication network, there are inevitably
Identity credibility malicious devices attempting to compromise the se-
To ascertain identity credibility, each entity can ob- curity of the system. Several works have considered
Page 9 of 25
Natl Sci Rev, 2021, Vol. 8, nwab069
the blockchain to hide key information for data ity. In another example, in Ref. [115], permissioned
sharing and delegation to ensure data security. blockchain is used to retrieve the related data and
Also, Cha et al. [107] designed a novel blockchain- manage the accessibility of data, while raw data is
enabled gateway, which acts as an intermediary be- stored locally by each data provider in industrial IoT.
tween users and IoT devices, thereby enhancing data Guan et al. [110] proposed a scheme in which the
security in IoT access control. mining node is chosen according to the average con-
sumption data and individual private data will not
be disclosed for power grid communications. Differ-
Privacy protection ent from the aforementioned mechanisms, Cha et al.
When different entities communicate with each [107] presented a blockchain-enabled IoT gateway
other through wireless links, the openness of wireless to enhance privacy and security, by which users
transmission and mobility of wireless devices may can manage their privacy preferences and determine
Page 10 of 25
Natl Sci Rev, 2021, Vol. 8, nwab069
Energy
Figure 4. Blockchain radio access network (B-RAN): a panorama of blockchain-enabled wireless communications.
Page 11 of 25
Natl Sci Rev, 2021, Vol. 8, nwab069
the critical issues of blockchain in wireless envi- per data center (ESDC) consists of powerful base-
ronments, such as security, latency, scalability, cost, band units (BBUs) and edge servers (EDGE) and
power consumption and so on. There is also a lack adopts a number of innovative technologies such
of mathematical models to characterize blockchain- as blockchain, AI and big data. An ESDC along
based wireless networks as well as the correspond- with a number of remote radio units (RRUs) acts
ing experimental results. Therefore, it is impera- as a super base station, i.e. an enhanced counter-
tive to address these issues and integrate advanced part of eNodeB in 5G, and supports not only wire-
blockchain technologies into a unified framework less services but also various local applications and
for upcoming 6G. the network market. Within an ESDC, blockchain
The concept of B-RAN offers a novel paradigm guarantees endogenous safety with the help of cryp-
for large-scale, heterogeneous and trustworthy wire- tography, and assisted by AI and big data, facil-
less networks [25]. As illustrated in Fig. 4, B-RAN itates many important functionalities such as se-
acts as an open and unified framework for diverse cure access control, tracking and supervision of
applications to achieve resource pooling and shar- mobile terminals. Multiple EDSCs, which may be-
ing across sectors and presents an attractive solu- long to different parties, are interlinked via su-
tion for future 6G networks. B-RAN unites inher- per optical connections for high speed data ex-
ently untrustworthy network entities without any change, and wherein, blockchain enables trusted and
middleman and manages network access, authen- reliable interactions among them. In addition to
tication, authorization and accounting via trustful ESDCs, blockchain also interconnects massive dis-
interactions. Via B-RAN, an MSP is established to similar terminal units (through RRUs), edge nodes
connect different parties and facilitate resource and and core networks, defining and governing their
data sharing in a cooperative, flexible and secure rights and obligations, and eventually achieves the
way. B-RAN cannot only dynamically share com- network orchestration through on/off-chain smart
puting, caching and communicating capabilities, but contracts.
also deliver and spread intelligence across subnet- More specifically, in an IoT scenario, B-RAN
works. Federated-style learning can further optimize can establish mutual trust between IoT devices and
under-utilized resource allocation and network ser- access points (APs) in a distrusted environment
vices in B-RAN. As a blockchain-as-a-service (BaaS) through the underlying blockchain, and provide a
platform, B-RAN has distinctive security properties scheme for future IoT/IoE in a multioperator net-
and is expected to provide enhanced functionalities work [132]. This establishment of trust can avoid
of data exchange, privacy protection, tracking, super- possibly selfish behaviors between untrustworthy
vision, etc. devices and promote cooperation among individ-
Figure 5 demonstrates a promising architec- ual IoT networks. By re-organizing multiple indi-
ture of 6G embedded with B-RAN. The edge su- vidual networks into a joint multi-operator network
Page 12 of 25
Natl Sci Rev, 2021, Vol. 8, nwab069
based on blockchain, B-RAN can efficiently inte- embed the HSM into the devices in B-RAN to pre-
grate and utilize cross-network resources, such as vent ID forgery and counterfeiting. As the unique de-
spectra, APs, IoT devices and user data. Thus, in vice ID and other indispensable information is put
B-RAN, the IoT devices are not restricted to services into the device’s HSM, the users can only perform
from one subscribing SP, but can obtain resources verifications without modifying the information in
and services across networks via effective incentive the HSM. Attackers can hardly alter the built-in de-
mechanisms. vice ID safeguarded by the HSM physically or digi-
Another imbedded application of B-RAN is tally. The HSM may even erase the key information
blockchain-empowered MEC that can realize multi- and render itself permanently inoperable if misbe-
party resource scheduling for an open and dis- haviors are detected.
tributed network while providing privacy protection In addition, a novel satellite-aided blockchain
and data security for users. B-RAN enables direct consensus protocol was devised in Ref. [133]. It
Page 13 of 25
Natl Sci Rev, 2021, Vol. 8, nwab069
resource sharing, data exchange and user access. random access to reduce access latency. As the num-
The verifiable software codes in smart contracts en- ber of selfish devices increases, there will be disas-
sure the consistent and automatic program execu- trous congestion in the network, which is named the
tion for these services across the B-RAN network, Rogue’s Dilemma [132].
and prevent backdoor viruses from being planted in To eliminate mistrust among client devices
the B-RAN system. Here, we introduce two smart- and address the Rogue’s Dilemma in grant-free
contract-based mechanisms for enhancing the secu- scenarios, a trustworthy access scheme named Hash
rity and efficiency of B-RAN. Access was proposed in Ref. [132], along with
Fast smart contract deployment (FSCD) is an ad- its mathematical analysis and evaluation [139],
vanced mechanism proposed for accelerating and se- within the B-RAN framework. As shown in Fig. 6,
curing the service in B-RAN [137]. By implement- each device is required to solve a hash puzzle by
ing the concept of template in smart contracts, the finding a hash value below a given threshold before
Page 14 of 25
Natl Sci Rev, 2021, Vol. 8, nwab069
Access contract
Service fee
Access difficulty Winner Device 1
Control message
Hash Device 2
Signature AP1
Ope
rator 1
Device 3
Device 4
Hash ( Timestamp Contract ID Device ID ) Op Device 5
erat AP2
or 2
Device 6 AN
B-R
Figure 6. The illustration of Hash Access (adapted from Ref. [132] with permission from IEEE).
Attacked
block State 1 State 4
Security
State 3
Attacker
wins Latency
introducing blockchain, which, however, should be by further deriving tight upper and lower bounds.
analytically characterized and accurately quantified. Meanwhile, we assessed the security level of B-RAN
Very few works have noted that service latency will by considering the attacker’s strategy.
be a crucial problem for B-RAN as a price of decen- From the above analysis on latency and secu-
tralization, the length and controllability of which, rity, we discovered an inherent relationship between
unfortunately, is still unknown. As another critical them, which can be described by the latency-security
aspect of B-RAN, security has not been thoroughly trade-off curve shown in Fig. 7. On the one hand,
looked into yet. Therefore, an analytical model is ur- the request latency of B-RAN is quasi-linear to the
gent to explore the characteristics of B-RAN (such as block generation time, and it grows as the number
latency and security) and to provide insightful guide- of confirmations for verification or the block gener-
lines for real-world implementations further. ation time increases. On the other hand, more con-
In Ref. [140], we made an original attempt to firmations are required to reduce the probability of
mathematically model B-RAN and analytically char- a successful attack. The confirmation number be-
acterize its properties and performances. Specif- comes the key factor in balancing the service latency
ically, we modeled the block generation via a and system security in B-RAN and shall be carefully
Poisson process and verified it by real data. We then selected. It is worth pointing out that such a trade-
established a queueing model embedded by a con- off characterizes the achievable performance of B-
tinuous time-homogeneous Markov process for B- RAN comprehensively. Our analytical model in Ref.
RAN. Based on the queueing model, we presented a [140] provides meaningful inspirations for design-
general state transition graph, evaluated the service- ing blockchain-based wireless networks with both
level latency in the average sense and revealed the enough security against malicious miners and afford-
impact of critical parameters on the B-RAN latency able access latency.
Page 15 of 25
Natl Sci Rev, 2021, Vol. 8, nwab069
UE
AP Blockchain 3 Assemble into block
Smart
contract
2
1 Sign P2P
Commit to connection
maintainer network
Smart Commit
AP
Wait for assembling Wait for confirmations Wait for service In service
UE AP
Page 16 of 25
Natl Sci Rev, 2021, Vol. 8, nwab069
payment. Energy prosumers and consumers can Data tracking and auditing
interact with each other securely and fairly in
In the era of big data, the expeditious growth
B-RAN.
of data has brought many challenges for enter-
(7) Intelligence. Intelligence in B-RAN represents
prises, societies and governments. Data breaches oc-
trusted learning models and capabilities, such as
cur more frequently than ever and are now caus-
computing, caching and communicating, to per-
ing serious security risks [141]. Wireless networks,
form learning algorithms. In B-RAN, learning
due to openness and mobility, are more vulnera-
models can be performed in a federated manner
ble to data leakage and malicious intrusion. The
on heterogeneous devices and the data confi-
increasing demand of data security and user pri-
dentiality of such collaborative learning process
vacy calls for necessary data tracking and audit-
will be ensured. Reliable intelligence will be dis-
ing approaches to detect data leakage and prevent
tributed efficiently in B-RAN.
unauthorized access and usage of sensitive data.
Page 17 of 25
Natl Sci Rev, 2021, Vol. 8, nwab069
Smart
Label contract 5
2
1 6
Data
Source 3 4 Destination
Blockchain
Page 18 of 25
Natl Sci Rev, 2021, Vol. 8, nwab069
Capability requirements Architecture layers maintainers in B-RAN follow the rules in the
consensus layer to determine which block will
Blockchain
User application Application layer be added to the ledger.
(5) Resources/assets trading. The execution of re-
Resources/assets trade Trading layer sources/assets trading is performed with the un-
derlying rules in B-RAN to keep the fairness be-
Blockchain consensus Consensus layer tween SPs and clients. Such fairness is ensured
by smart-contract-enabled service-level agree-
Network Network layer ments in the trading layer.
(6) User application. User applications on top of the
Tunnel layer blockchain are designed for clients to interact
Secure link with the blockchain and smart contract. Appli-
Access control layer
Figure 10. Basic capability needs and architecture layer design of B-RAN.
Experimental results
In this section, several experiments are presented
network layer and application layer) to support basic to evaluate the performance of B-RAN under var-
operations of our prototype. Considering the unique ied circumstances. We implement the prototype us-
application scenarios of B-RAN, we further incorpo- ing Python and test its packed binary executables
rate the mechanisms FSCD, HTLC and Hash Ac- on a cluster of single-board computers running un-
cess into the architecture to improve the overall per- der the same local area network. The data are col-
formance of the prototype system. We now provide lected automatically through a pre-designed script.
more details about the basic capability needs and the Furthermore, to verify the B-RAN performance, we
design of the architecture layers shown in Fig. 10. take normal RANs and PoW-based blockchains as
(1) Physical storage and data. All the blockchain the benchmark, and compare the collected data
data or information associated with B-RAN with those of existing schemes. In the following, we
such as the ordered transactions, digital actions mainly introduce and analyse the results of three ex-
and cryptographic keys form the structure layer. periments regarding service latency, resource utiliza-
Such data are stored by servers or any active tion and request processing.
electronic devices in the storage layer. Not all Figure 11 compares the service latency distribu-
devices will store a full copy of a blockchain, as tion of the PoW-based B-RAN prototype with that
some mobile devices can store partial informa- of other PoW-based blockchains (e.g. Bitcoin and
tion as lightweight nodes. Ethereum). In the experiment, the block time is set
(2) Secure link. A secure link between different sides to 10 s, and two blocks are needed as blockchain
is established in B-RAN. By leveraging the prin-
ciple of HTLC in the tunnel layer, the payment 20
Other PoW-based blockchains
channel between terminals and APs is trust free. 18 B-RAN prototype
Page 19 of 25
Natl Sci Rev, 2021, Vol. 8, nwab069
confirmations. As shown in Fig. 11, B-RAN has RANs tested in our experiment share the same traffic
significantly lower service latency than ordinary load as B-RAN, but the requests are nonequally
PoW-based blockchains. In addition, under a va- allocated to their subnetworks with ratios of 40% to
riety of circumstances, service latency in ordinary 60% and 30% to 70%. The experimental results show
blockchains usually lasts for several minutes. By that the average effective throughput of B-RAN is
equipping the FSCD mechanism, B-RAN nearly the best in the three simulated scenarios. Because of
halves the required service period, and shortens the special capabilities of integrating subnetworks
the service latency down to seconds. Moreover, the and balancing traffic loads, B-RAN has a much
shortened service latency may have a positive impact higher effective throughput than the other two
on the user satisfaction of B-RAN, and further im- ‘unbalanced’ RANs when the incoming request rate
prove the system security (see the section entitled is higher.
‘Cross-network sharing’). The simulation demonstrates the advantages of
Figure 12a shows the influence of the average re- B-RAN in terms of low service latency, high resource
quest interarrival time on the resource utilization of utilization and prominent load balance. The remark-
B-RAN, where the resource utilization is measured able decrease in service latency gives credit to the
by the ratio of the busy time to the available time of FSCD mechanism that effectively increases the con-
the links, and indicates how effectively the links are tract deployment rate and guarantees that contracts
utilized against their availability. It can be clearly ob- and transactions are recorded in blockchain in one
served that, whatever the service time, the decrease step. In addition, the reduction in the contract de-
in the average request interarrival time always leads ployment delay extends the service time within a
to an obvious increase in the resource utilization. fixed period, consequently improving resource uti-
Furthermore, by comparing the trends of three dif- lization. Moreover, since B-RAN consists of multi-
ferent service time settings, one may conclude that, ple subnetworks, its request processing rate far ex-
when the average service time over a last time pe- ceeds that of a single network, and the increasing
riod is high, or is presenting an upward trend, the number of subnetworks accommodated by B-RAN
higher request intensity (or more engaged users) could also bring a more significant improvement in
will bring a greater growth to the resource utilization throughput performance.
than shorter service time scenarios. Thus, the further
growth of resource utilization is also closely related
to the expansion of network scale and the increase in
CONCLUSION
user engagement of B-RAN.
Figure 12b compares the average effective In this paper we have identified the critical trust-
throughput per subnetwork of B-RAN and the related issues in wireless networks that impede the
other two ‘unbalanced’ RANs at different incoming evolution of current 5G networks towards more
request frequencies. In this experiment, both B- efficient and secure 6G networks. Upon a brief intro-
RAN and RAN are composed of two subnetworks; duction of the fundamentals of blockchain, we com-
however, unlike the former, RANs are usually com- prehensively investigated the recent research works
posed of two independent subnetworks that have on applying blockchain to wireless networks from
different traffic loads. As can be seen in Fig. 12b, the several aspects, including resource sharing, trusted
Page 20 of 25
Natl Sci Rev, 2021, Vol. 8, nwab069
data interaction, secure access control, privacy 11. Mitola J and Maguire GQ. Cognitive radio: making software
protection, tracing, certification and supervision. radios more personal. IEEE Pers Commun 1999; 6: 13–8.
Then, a unified B-RAN framework was proposed as a 12. Haykin S. Cognitive radio: brain-empowered wireless commu-
trustworthy and secure paradigm for 6G networking nications. IEEE J Sel Areas Commun 2005; 23: 201–20.
by utilizing blockchain technologies with enhanced 13. BTC Papers. Bitcoin: A Peer-to-Peer Electronic Cash System.
efficiency and security. We elaborated on the critical https://btcpapers.com/bitcoin.pdf (10 December 2020, date
elements of B-RAN, such as consensus mechanisms, last accessed).
smart contract, trustworthy access, mathematical 14. Tschorsch F and Scheuermann B. Bitcoin and beyond: a tech-
modeling, cross-network sharing, data tracking and nical survey on decentralized digital currencies. IEEE Commun
auditing, and intelligent networking, and provided Surv Tutorials 2016; 18: 2084–123.
the prototype design of B-RAN along with the latest 15. Tapscott D and Tapscott A. Blockchain Revolution: How the
experimental results. Technology Behind Bitcoin Is Changing Money, Business, and
Page 21 of 25
Natl Sci Rev, 2021, Vol. 8, nwab069
31. Bravo-Marquez F, Reeves S and Ugarte M. Proof-of-learning: a blockchain 49. Liu Y, Yu FR and Li X et al. Decentralized resource allocation for video transcod-
consensus mechanism based on machine learning competitions. In: 2019 IEEE ing and delivery in blockchain-based system with mobile edge computing.
International Conference on Decentralized Applications and Infrastructures, IEEE Trans Veh Technol 2019; 68: 11169–85.
San Francisco, CA, USA. Piscataway, NJ: IEEE Press, 2019, 119–24. 50. Qian P, Liu Z and He Q et al. Towards automated reentrancy detection for
32. Peercoin. Ppcoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake. smart contracts based on sequential models. IEEE Access 2020; 8: 19685–95.
https://docs.peercoin.net/#/proof-of-stake (10 December 2020, date last 51. Parizi RM and Amritraj Dehghantanha A. Smart contract programming lan-
accessed). guages on blockchains: an empirical evaluation of usability and security. In:
33. DPoS. BitShares Documentation. https://buildmedia.readthedocs.org/media/ Blockchain – ICBC 2018, Seattle, WA, USA. Cham: Springer, 2018, 75–91.
pdf/howbitsharesworks/master/howbitsharesworks.pdf (20 August 2021, 52. Pinna A, Ibba S and Baralla G et al. A massive analysis of ethereum smart
date last accessed). contracts empirical study and code metrics. IEEE Access 2019; 7: 78194–213.
34. Kiayias A, Russell A and David B et al. Ouroboros: a provably secure proof-of- 53. Kroll JA, Davey IC and Felten EW. The economics of Bitcoin mining, or Bit-
stake blockchain protocol. In: Advances in Cryptology – CRYPTO 2017, Santa coin in the presence of adversaries. In: 12th Workshop on the Economics of
Page 22 of 25
Natl Sci Rev, 2021, Vol. 8, nwab069
70. Fan X and Huo Y. Blockchain based dynamic spectrum access of non-real-time 89. Zanzi L, Albanese A and Sciancalepore V et al. Nsbchain: a secure blockchain
data in cyber-physical-social systems. IEEE Access 2020; 8: 64486–98. framework for network slicing brokerage. In: IEEE International Conference on
71. Maksymyuk T, Gazda J and Han L et al. Blockchain-based intelligent network Communications, Dublin, Ireland. Piscataway, NJ: IEEE Press, 2020, 1–7.
management for 5G and beyond. In: 3rd International Conference on Advanced 90. Togou MA, Bi T and Dev K et al. DBNS: a distributed blockchain-enabled net-
Information and Communications Technologies, Lviv, Ukraine. Piscataway, NJ: work slicing framework for 5G networks. IEEE Commun Mag 2020; 58: 90–6.
IEEE Press, 2019, 36–9. 91. Huang Z, Su X and Zhang Y et al. A decentralized solution for IoT data trusted
72. Sevindik V. Autonomous 5G smallcell network deployment and optimization exchange based-on blockchain. In: 3rd IEEE International Conference on Com-
in unlicensed spectrum. In: IEEE 2nd 5G World Forum, Dresden, Germany. Pis- puter and Communications, Chengdu, China. Piscataway, NJ: IEEE Press,
cataway, NJ: IEEE Press, 2019, 446–51. 2017, 1180–4.
73. Guo S, Dai Y and Xu S et al. Trusted cloud-edge network resource manage- 92. Shi P, Wang H and Yang S et al. Blockchain-based trusted data sharing
ment: DRL-driven service function chain orchestration for IoT. IEEE Internet among trusted stakeholders in IoT. Software Pract Experience 2019; doi:
Things J 2020; 7: 6010–22. 10.1002/spe.2739.
Page 23 of 25
Natl Sci Rev, 2021, Vol. 8, nwab069
107. Cha S, Chen J and Su C et al. A blockchain connected gateway for BLE-based 127. Xie R, Wang Y and Tan M et al. Ethereum-blockchain-based technology
devices in the Internet of Things. IEEE Access 2018; 6: 24639–49. of decentralized smart contract certificate system. IEEE IoT Mag 2020; 3:
108. Xu H, He Q and Li X et al. BDSS-FA: a blockchain-based data secu- 44–50.
rity sharingslatform with fine-grained access control. IEEE Access 2020; 8: 128. Lin S, Li J and Liang W. Research on strong supervision algorithm model
87552–61. based on blockchain in e-government. In: 5th IEEE Information Technology
109. Dorri A, Steger M and Kanhere SS et al. BlockChain: a distributed solution to and Mechatronics Engineering Conference, Chongqing, China. Piscataway,
automotive security and privacy. IEEE Commun Mag 2017; 55: 119–25. NJ: IEEE Press, 2020, 345–9.
110. Guan Z, Si G and Zhang X et al. Privacy-preserving and efficient aggregation 129. Peng S, Hu X and Zhang J et al. An efficient double-layer blockchain method
based on blockchain for power grid communications in smart communities. for vaccine production supervision. IEEE Trans Nanobioscience 2020; 19:
IEEE Commun Mag 2018; 56: 82–8. 579–87.
111. Lei A, Cruickshank H and Cao Y et al. Blockchain-based dynamic key man- 130. Hassija V, Chamola V and Krishna DNG et al. A blockchain and edge
agement for heterogeneous intelligent transportation systems. IEEE Internet computing-based secure framework for government tender allocation. IEEE
Page 24 of 25
Natl Sci Rev, 2021, Vol. 8, nwab069
146. Yu W, Fu X and Graham S et al. DSSS-based flow marking technique for in- 149. Azaria A, Ekblaw A and Vieira T et al. MedRec: using blockchain for medical
visible traceback. In: IEEE Symposium on Security and Privacy, Berkeley, CA, data access and permission management. In: 2nd International Conference on
USA. Piscataway, NJ: IEEE Press, 2007, 18–32. Open Big Data, Vienna, Austria. Piscataway, NJ: IEEE Press, 2016, 25–30.
147. Luo J, Wang X and Yang M. An interval centroid based spread spectrum wa- 150. Yan F, Liu W and Tian L. LVQ neural network approach for fault location of
termarking scheme for multi-flow traceback. J Network Comput Appl 2012; distribution network. In: International Conference on Electrical and Control
35: 60–71. Engineering, Yichang, China. Piscataway, NJ: IEEE Press, 2011, 237–40.
148. Biryukov A and Tikhomirov S. Transaction clustering using network traffic anal- 151. Zhao X, Yang H and Guo H et al. Accurate fault location based on deep neural
ysis for bitcoin and derived blockchains. In: IEEE 38th Conference on Computer evolution network in optical networks for 5G and beyond. In: The Optical Fiber
Communications Workshops, Paris, France. Piscataway, NJ: IEEE Press, 2019, Communication Conference and Exhibition, San Diego, CA, USA. Washington
204–9. DC: Optical Society of America, 2019, 1–3.
Page 25 of 25