Recent rapid advancements in communication technology have brought forth the era of Web 3.0, representing a substantial transformation in the Internet landscape. This shift has led to the emergence of various decentralized metaverse applications that leverage blockchain as their underlying technology to enable users to exchange value directly from point to point. However, blockchains are blind to the real world, and smart contracts cannot directly access data from the external world. To address this limitation, the technology of oracles has been introduced to provide real-world data for smart contracts and other blockchain applications. In this paper, we focus on mitigating the risks associated with oracles providing corrupt or incorrect data. We propose a novel Web 3.0 architecture for the Metaverse based on the multi-identifier network (MIN), and its decentralized blockchain oracle model called MetaOracle. The experimental results show that the proposed scheme can achieve minor time investment in return for significantly more reliable data and increased throughput.
With the advancement of the Industrial Internet of Things (IoT), the rapidly growing demand for data collection and processing poses a huge challenge to the design of data transmission and computation resources in the industrial scenario. Taking advantage of improved model accuracy by machine learning algorithms, we investigate the inner relationship of system performance and data transmission and computation resources, and then analyze the impacts of bandwidth allocation and computation resources on the accuracy of the system model in this paper. A joint bandwidth allocation and computation resource configuration scheme is proposed and the Karush-Kuhn-Tucker (KKT) conditions are used to get an optimal bandwidth allocation and computation configuration decision, which can minimize the total computation resource requirement and ensure the system accuracy meets the industrial requirements. Simulation results show that the proposed bandwidth allocation and computation resource configuration scheme can reduce the computing resource usage by 10% when compared to the average allocation strategy.
In architecture of cloud storage, the deduplication technology encrypted with the convergent key is one of the important data compression technologies, which effectively improves the utilization of space and bandwidth. To further refine the usage scenarios for various user permissions and enhance user’s data security, we propose a blockchain-based differential authorized deduplication system. The proposed system optimizes the traditional Proof of Vote (PoV) consensus algorithm and simplifies the existing differential authorization process to realize credible management and dynamic update of authority. Based on the decentralized property of blockchain, we overcome the centralized single point fault problem of traditional differentially authorized deduplication system. Besides, the operations of legitimate users are recorded in blocks to ensure the traceability of behaviors.
The industrial Internet realizes intelligent control and optimized operation of the industrial system through network interconnection. The industrial Internet identifier is the core element to accomplish this task. The traditional industrial Internet identifier resolution technologies depend excessively on IP networks, and cannot meet the requirements of ubiquitous resource-restraint Internet of Things (IoT) devices. An industrial Internet identifier resolution management strategy based on multi-identifier network architecture is proposed in this paper, which supports content names, identities, locations, apart from the traditional IP address. The application of multiple types of identifiers not only solves the problem of IP addresses exhaustion, but also enhances the security, credibility, and availability of the industrial Internet identification resolution system. An inter-translation scheme between multiple identifiers is designed to support multiple identifiers and the standard ones. We present an addressing and routing algorithm for identifier resolution to make it convenient to put our strategy into practice.
With the rapid development of the Internet, the expansion of identifiers and data brings a huge challenge to the network system. However, the network resources such as Domain Name System (DNS) are monopolized by a single agency which brings a potential threat to cyberspace. The existing network architecture cannot fundamentally solve the problems of resource monopoly and low performance. Based on the blockchain, this paper designs and implements a new Multi-Identifier System (MIS), providing the analysis and management for different identifiers in the multi-identifier network. Our preliminary emulation results prove the correctness and efficiency of the algorithm. Besides, the prototype system of MIS has been tested on the real operators’ network, realizing the function of co-governing, security supervision and data protection.
The rapid growth of IP traffic has contributed to wide deployment of optical devices in elastic optical network. However, the passband shape of wavelength selective switches (WSSs) that are used in reconfigurable optical add-drop multiplexer (ROADM)/optical cross connect (OXC) is not ideal, causing the narrowing of spectrum. Spectral narrowing will lead to signal impairment. Therefore, guard-bands need to be inserted between adjacent paths which will cause the waste of resources. In this paper, we propose a service-based intelligent aggregation node selection and area division (ANS-AD) algorithm. For the rationality of the aggregation node selection, the ANS-AD algorithm chooses the aggregation nodes according to historical traffic information based on big data analysis. Then the ANS-AD algorithm divides the topology into areas according to the result of the aggregation node selection. Based on the ANS-AD algorithm, we propose a time-domain and spectral-domain flow aggregation (TS-FA) algorithm. For the purpose of reducing resources’ waste, the TS-FA algorithm attempts to reduce the insertion of guard-bands by time-domain and spectral-domain flow aggregation. Moreover, we design a time-domain and spectral-domain flow aggregation module on software defined optical network (SDON) architecture. Finally, a simulation is designed to evaluate the performance of the proposed algorithms and the results show that our proposed algorithms can effectively reduce the resource waste.
Since Dalvik Executable (DEX) files are prone to be reversed to the Java source code using some decompiling tools, how to protect the DEX files from attackers becomes an important research issue. The traditional way to protect the DEX files from reverse engineering is to encrypt the entire DEX file, but after the complete plain code has been loaded into the memory while the application is running, the attackers can retrieve the code by using memory dump attack. This paper presents a novel DEX protection scheme to withstand memory dump attack on the Android platform with the name of DexDefender, which adopts the dynamic class-restoration method to ensure that the complete plain DEX data not appear in the memory while the application is being loaded into the memory. Experimental results show that the proposed scheme can protect the DEX files from both reverse engineering and memory dump attacks with an acceptable performance.