vMixing coins strategy can realize the anonymity of user information, thereby protecting the user's privacy. Ideally, the blacklist is public information and all bad coins are recorded in it. However, due to the failure of some bad
The blockchain, with its key characteristics of decentralization, persistence, anonymity, and auditability, has become a solution to overcome the overdependence and lack of trust for a traditional public key infrastructure on third-party institutions. Because of these characteristics, the blockchain is suitable for solving certain open problems in the service-oriented social network, where the unreliability of submitted reviews of service vendors can cause serious security problems. To solve the unreliability problems of submitted reviews, this paper first proposes a blockchain-based identity authentication scheme and a new trusted service evaluation model by introducing the scheme into a service evaluation model. The new trusted service evaluation model consists of the blockchain-based identity authentication scheme, evaluation submission module, and evaluation publicity module. In the proposed evaluation model, only users who have successfully been authenticated can submit reviews to service vendors. The registration and authentication records of users' identity and the reviews for service vendors are all stored in the blockchain network. The security analysis shows that this model can ensure the credibility of users' reviews for service vendors, and other users can obtain credible reviews of service vendors via the review publicity module. The experimental results also show that the proposed model has a lower review submission delay than other models.
Deployed in the monitoring environment, Wireless Sensor Network (WSN) is a measurement and control network composed of miniature and low-cost sensors with sensing, computing, and communication capabilities. The design of the Directed Dif-fusion (DD) routing protocol is one of the key problems in WSN. In order to obtain the confidentiality of sensing data and solve the unreliability of relay nodes in the existing DD routing protocols, this paper designs an Energy Trust Model (ETM) by introducing the remaining energy and trust of a node. We further propose a Trust-based Secure Directed Diffusion Rout-ing protocol (TSDDR) based on the model. The proposed protocol achieves the establishment of a credible communication path and the transmission of confidential data in WSN. Meanwhile, the balance of energy consumption and the privacy of sensing data can be ensured. The performance analysis results show that the TSDDR protocol can effectively defeat against MITM attacks and prevent the malicious nodes' impersonation. At the same time, the protocol achieves secure end-to-end anonymous communication with acceptable energy overhead and computational complexity.
Perpetrators leverage the untraceable feature to conduct illegal behaviors leading security issues with respect to mixing coins. Generally, bad coins are blocked based on a common blacklist. However, the blacklist may not be updated in time, which results in that bad coins escape the blocking. Consequently, perpetrators can still conduct illicit behaviors such as money laundering. In this paper, we apply game theory under imperfect information to study how coins' quality restrain these illicit behaviors under the incomplete scenario. More specifically, we propose a strategy for participants to submit deposits if they hope to mix coins with others even if they are not in blacklist at this time. The deposits will not be refunded when participants are included in the blacklist after mixing. Therefore, no participants have incentives to mix with bad coins. At the last part of this paper, we also simulate the incomes for participants, which indicates that deposits strategy is effective to prevent illicit behaviors.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.