• OpenAccess
    • List of Articles Blockchain

      • Open Access Article

        1 - Employing a meta-synthesis to present a framework for commercial banks’ preparedness indicators in use of blockchain technology
        Zahra Khalili Masoud Keimasi Javad Abbasi Mohammadali Shahhosseini
        Present study aimed at presenting a framework for commercial banks’ preparedness indicators in use of blockchain technology. To this end, the meta-synthesis research method was employed. Among from 306 resources found over meta-synthesis steps, a number of 38 papers inc More
        Present study aimed at presenting a framework for commercial banks’ preparedness indicators in use of blockchain technology. To this end, the meta-synthesis research method was employed. Among from 306 resources found over meta-synthesis steps, a number of 38 papers included our acceptance criteria. The four organizational, technical, individual and environmental factors were identified as indicators of commercial banks’ preparedness to use Blockchain technology. Organizational indicators included infrastructures development, managerial skills, human resources development, company or organization size, financial resources, receptive organizational culture, organizational policies, and senior management support. The technical indicators included complexity, technological security, access to technology, use of technology and specialized manpower. In addition, individual indicators included attitudes toward use, ease of use, perceived usefulness, and understanding of Blockchain technology. Finally, environmental indicators included rules and regulations, technology maturity, information exchange, compatibility, market dynamics, and governmental supports. Manuscript profile
      • Open Access Article

        2 - Intrusion Detection Based on Cooperation on the Permissioned Blockchain Platform in the Internet of Things Using Machine Learning
        Mohammad Mahdi  Abdian majid ghayori Seyed Ahmad  Eftekhari
        Intrusion detection systems seek to realize several objectives, such as increasing the true detection rate, reducing the detection time, reducing the computational load, and preserving the resulting logs in such a way that they cannot be manipulated or deleted by unauth More
        Intrusion detection systems seek to realize several objectives, such as increasing the true detection rate, reducing the detection time, reducing the computational load, and preserving the resulting logs in such a way that they cannot be manipulated or deleted by unauthorized people. Therefore, this study seeks to solve the challenges by benefiting from the advantages of blockchain technology, its durability, and relying on IDS architecture based on multi-node cooperation. The proposed model is an intrusion detection engine based on the decision tree algorithm implemented in the nodes of the architecture. The architecture consists of several connected nodes on the blockchain platform. The resulting model and logs are stored on the blockchain platform and cannot be manipulated. In addition to the benefits of using blockchain, reduced occupied memory, the speed, and time of transactions are also improved by blockchain. In this research, several evaluation models have been designed for single-node and multi-node architectures on the blockchain platform. Finally, proof of architecture, possible threats to architecture, and defensive ways are explained. The most important advantages of the proposed scheme are the elimination of the single point of failure, maintaining trust between nodes, and ensuring the integrity of the model, and discovered logs. Manuscript profile
      • Open Access Article

        3 - Intrusion Detection Based on Cooperation on the Permissioned Blockchain Platform in the Internet of Things Using Machine Learning
        Mohammad Mahdi  Abdian majid ghayori Seyed Ahmad  Eftekhari
        Intrusion detection systems seek to realize several objectives, such as increasing the true detection rate, reducing the detection time, reducing the computational load, and preserving the resulting logs in such a way that they cannot be manipulated or deleted by unauth More
        Intrusion detection systems seek to realize several objectives, such as increasing the true detection rate, reducing the detection time, reducing the computational load, and preserving the resulting logs in such a way that they cannot be manipulated or deleted by unauthorized people. Therefore, this study seeks to solve the challenges by benefiting from the advantages of blockchain technology, its durability, and relying on IDS architecture based on multi-node cooperation. The proposed model is an intrusion detection engine based on the decision tree algorithm implemented in the nodes of the architecture. The architecture consists of several connected nodes on the blockchain platform. The resulting model and logs are stored on the blockchain platform and cannot be manipulated. In addition to the benefits of using blockchain, reduced occupied memory, the speed, and time of transactions are also improved by blockchain. In this research, several evaluation models have been designed for single-node and multi-node architectures on the blockchain platform. Finally, proof of architecture, possible threats to architecture, and defensive ways are explained. The most important advantages of the proposed scheme are the elimination of the single point of failure, maintaining trust between nodes, and ensuring the integrity of the model, and discovered logs. Manuscript profile