2021
DOI: 10.1016/j.dcan.2020.06.004
|View full text |Cite
|
Sign up to set email alerts
|

A secure spectrum auction scheme without the trusted party based on the smart contract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(18 citation statements)
references
References 21 publications
0
18
0
Order By: Relevance
“…BAC-3: In no block and block backoff states, the expression of the one-step transition probabilities using BAC-3 are the same as BAC-1 in (2) and (3). On the other hand, in block transmitting states, the one-step transition probabilities of BAC-3 are different with BAC-1 in (7). Since without block queueing in BAC-3, a FN must return to no block state after the FN transmits or discards its block.…”
Section: Markov Chain Model For Bac-3 and Bac-4mentioning
confidence: 99%
See 1 more Smart Citation
“…BAC-3: In no block and block backoff states, the expression of the one-step transition probabilities using BAC-3 are the same as BAC-1 in (2) and (3). On the other hand, in block transmitting states, the one-step transition probabilities of BAC-3 are different with BAC-1 in (7). Since without block queueing in BAC-3, a FN must return to no block state after the FN transmits or discards its block.…”
Section: Markov Chain Model For Bac-3 and Bac-4mentioning
confidence: 99%
“…2) Improve the security and scalability of network, and reduce maintenance cost, especially for large scale scenarios such as Internet of Things (IoT) [5]. 3) Achieve adaptive matching and behavioral decision-making of users/terminals by involving smart contract [6], [7].…”
mentioning
confidence: 99%
“…at is to say, rival bidders could still observe the true bid of a bidder. To eliminate the hypothetical trusted auctioneer (in some studies, if the auctioneer is semitrusted, then a semitrusted auction agent would be introduced in the premises that they would not collude with each other), some Software Guard Extension (SGX) approaches were proposed [9]. Recently, Chen et al proposed SAFE, a general secure e-auction framework with privacy preservation [11].…”
Section: Related Workmentioning
confidence: 99%
“…Spectrum e-auction, which is considered to be one of the most effective ways of solving the spectrum allocation problem, has been widely researched in the past few years [4][5][6][7]. Recently, on account of the rise of the smart contract, some blockchain-based frameworks have also been constructed [8][9][10][11]. ere are three main entities participant in the spectrum e-auction process, namely, seller(s), auctioneers, and buyer(s).…”
Section: Introductionmentioning
confidence: 99%
“…According to Wang, J and other 4 scholars, they claimed that the potential menace exists due to the semi-honest agent that complete the auction process. Privacy reveals of bidders and the possibility of collusion to manipulate the whole auction led to the scholars' design of a secure spectrum auction protocol, and they finally did theoretical analysis and simulation experiments of it [1]. Similarly, a model designed by Dong, X, and the other 5 scholars, also made the auction system more reliable.…”
Section: Literature Reviewmentioning
confidence: 99%