Security and Communication Networks

Advances in Security and Performance of Blockchain Systems


Publishing date
01 Jul 2022
Status
Closed
Submission deadline
25 Feb 2022

Lead Editor

1Guizhou University, Guiyang, China

2Fujian Normal University, Fuzhou, China

3Waterloo University, Waterloo, Canada

4Beijing University of Posts and Telecommunications, Beijing, China

This issue is now closed for submissions.

Advances in Security and Performance of Blockchain Systems

This issue is now closed for submissions.

Description

Blockchain is a new model of application for distributed ledgers, peer-to-peer transmission, consensus mechanisms, encryption algorithms, and other computer technologies. A blockchain, a significant aspect of many cryptocurrencies, is essentially a decentralized database, where a set of sequenced blocks are associated with each other through cryptographic methods. Each block contains a batch of information of network transactions, which is devoted to verifying the validity of its information and generating the next block. The application of blockchain technology has been extended to digital finance, Internet of Things, intelligent manufacturing, supply chain management, and digital asset trading, among many other fields.

Due to the wide application of blockchain, the security and performance of blockchain systems have drawn much attention and are the focus of significant research. The security of blockchain systems faces many challenges, for example, there are many ¬¬leaks in its mechanism, such as algorithm leaks, protocol leaks, user leaks, implementation leaks, or system leaks. Another challenge is the various attacks on the blockchain system, such as 51% attacks, eclipse attacks, routing attacks, or DDoS attacks. The privacy risk for blockchain systems is increasingly prominent. All transaction information records in the blockchain must be open to all nodes, which should be recorded and stored synchronously on all user sides. Through attacks in the network layer, transaction layer, or application layer, the attacker can obtain the data to analyze and extract the users’ information. In addition, data security and supervision are also faced with challenges. The data storage structure of blockchains determines that the blockchain is difficult to tamper with. In addition, the anonymity of blockchain brings great challenges to data security and network supervision.

The aim of this Special Issue is to make a point of the current situation as well as to evaluate the state of the art in blockchain systems and solicit original research articles to provide a forum for researchers working on the security and performance of blockchain systems. Review articles discussing the state of the art are also welcome.

Potential topics include but are not limited to the following:

  • Attacks in blockchain systems
  • Optimization of consensus mechanisms
  • New consensus algorithms
  • Blockchain transaction execution process optimization
  • Cryptographic algorithm security
  • Blockchain system encryption privacy protocol design
  • Blockchain data structure optimization
  • Blockchain system query optimization
  • Blockchain system data model design
  • Smart contract security
  • Optimization of smart contract virtual machines
  • Application system security based on blockchain
  • Blockchain regulation and governance technologies
  • Cross-chain transaction security

Articles

  • Special Issue
  • - Volume 2022
  • - Article ID 1554752
  • - Research Article

CTRF: Ethereum-Based Ponzi Contract Identification

Xuezhi He | Tan Yang | Liping Chen
  • Special Issue
  • - Volume 2022
  • - Article ID 3368819
  • - Research Article

PPSEB: A Postquantum Public-Key Searchable Encryption Scheme on Blockchain for E-Healthcare Scenarios

Gang Xu | Shiyuan Xu | ... | Ke Xiao
  • Special Issue
  • - Volume 2022
  • - Article ID 6923610
  • - Research Article

Research on the Millionaires’ Problem under the Malicious Model Based on the Elliptic Curve Cryptography

Xin Liu | Yang Xu | ... | Baoshan Li
  • Special Issue
  • - Volume 2022
  • - Article ID 4095427
  • - Research Article

A Privacy Protection Scheme for Facial Recognition and Resolution Based on Edge Computing

Junhua wu | Wenzhen Feng | ... | Yuanwang Zheng
  • Special Issue
  • - Volume 2022
  • - Article ID 3068199
  • - Research Article

Privacy-Preserving Minority Oversampling Protocols with Fully Homomorphic Encryption

Maohua Sun | Ruidi Yang | Mengying Liu
  • Special Issue
  • - Volume 2022
  • - Article ID 8542876
  • - Research Article

ATMChain: Blockchain-Based Security Framework for Cyber-Physics System in Air Traffic Management

Xin Lu | Zhijun Wu
  • Special Issue
  • - Volume 2022
  • - Article ID 9428610
  • - Research Article

Privacy-Preserving Collaborative Computation for Human Activity Recognition

Lin Wang | Chuan Zhao | ... | Kuiheng Sun
  • Special Issue
  • - Volume 2022
  • - Article ID 5307697
  • - Research Article

Multiple-Layer Security Threats on the Ethereum Blockchain and Their Countermeasures

Li Duan | Yangyang Sun | ... | Yong Ding
  • Special Issue
  • - Volume 2022
  • - Article ID 5424395
  • - Research Article

A Decentralized Electronic Reporting Scheme with Privacy Protection Based on Proxy Signature and Blockchain

Huiying Zou | Xiaofan Liu | ... | Tianqing Zhu
  • Special Issue
  • - Volume 2022
  • - Article ID 1417607
  • - Research Article

A Hybrid Design of Linkable Ring Signature Scheme with Stealth Addresses

Weizhou Li | Zhiqiang Lin | Qi Chen
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.