-
Deciphering the Crypto-shopper: Knowledge and Preferences of Consumers Using Cryptocurrencies for Purchases
Authors:
Massimiliano Silenzi,
Umut Can Cabuk,
Enis Karaarslan,
Omer Aydin
Abstract:
The fast-growing cryptocurrency sector presents both challenges and opportunities for businesses and consumers alike. This study investigates the knowledge, expertise, and buying habits of people who shop using cryptocurrencies. Our survey of 516 participants shows that knowledge levels vary from beginners to experts. Interestingly, a segment of respondents, nearly 30%, showed high purchase freque…
▽ More
The fast-growing cryptocurrency sector presents both challenges and opportunities for businesses and consumers alike. This study investigates the knowledge, expertise, and buying habits of people who shop using cryptocurrencies. Our survey of 516 participants shows that knowledge levels vary from beginners to experts. Interestingly, a segment of respondents, nearly 30%, showed high purchase frequency despite their limited knowledge. Regression analyses indicated that while domain knowledge plays a role, it only accounts for 11.6% of the factors affecting purchasing frequency. A K-means cluster analysis further segmented the respondents into three distinct groups, each having unique knowledge levels and purchasing tendencies. These results challenge the conventional idea linking extensive knowledge to increased cryptocurrency usage, suggesting other factors at play. Understanding this varying crypto-shopper demographic is pivotal for businesses, emphasizing the need for tailored strategies and user-friendly experiences. This study offers insights into current crypto-shopping behaviors and discusses future research exploring the broader impacts and potential shifts in the crypto-consumer landscape.
△ Less
Submitted 27 December, 2023; v1 submitted 4 October, 2023;
originally announced October 2023.
-
Accumulate: An identity-based blockchain protocol with cross-chain support, human-readable addresses, and key management capabilities
Authors:
Kyle Michelson,
Anjali Sridharan,
Umut Can Cabuk,
Ethan Reesor,
Ben Stolman,
Drew Mailen,
Dennis Bunfield,
Jay Smith,
Paul Snow
Abstract:
The Accumulate Protocol ("Accumulate") is an identity-based, Delegated Proof of Stake (DPoS) blockchain designed to power the digital economy through interoperability with Layer-1 blockchains, integration with enterprise tech stacks, and interfacing with the World Wide Web. Accumulate bypasses the trilemma of security, scalability, and decentralization by implementing a chain-of-chains architectur…
▽ More
The Accumulate Protocol ("Accumulate") is an identity-based, Delegated Proof of Stake (DPoS) blockchain designed to power the digital economy through interoperability with Layer-1 blockchains, integration with enterprise tech stacks, and interfacing with the World Wide Web. Accumulate bypasses the trilemma of security, scalability, and decentralization by implementing a chain-of-chains architecture in which digital identities with the ability to manage keys, tokens, data, and other identities are treated as their own independent blockchains. This architecture allows these identities, known as Accumulate Digital Identifiers (ADIs), to be processed and validated in parallel over the Accumulate network. Each ADI also possesses a hierarchical set of keys with different priority levels that allow users to manage their security over time and create complex signature authorization schemes that expand the utility of multi-signature transactions. A two token system provides predictable costs for enterprise users, while anchoring all transactions to Layer-1 blockchains provides enterprise-grade security to everyone.
△ Less
Submitted 14 April, 2022; v1 submitted 14 April, 2022;
originally announced April 2022.
-
Non-Repudiation for VoIP Communication in UMTS and LTE Networks
Authors:
Umut Can Cabuk
Abstract:
This thesis work presents an architectural design of a system to bring non-repudiation concept into the IP based digital voice conversations (VoIP) in LTE and UMTS networks, using electronic signatures, by considering a centralized approach. Moreover, functionalities and technical methods to support such a system are researched. Last but not least, ways to introduce this system as a public and com…
▽ More
This thesis work presents an architectural design of a system to bring non-repudiation concept into the IP based digital voice conversations (VoIP) in LTE and UMTS networks, using electronic signatures, by considering a centralized approach. Moreover, functionalities and technical methods to support such a system are researched. Last but not least, ways to introduce this system as a public and commercial service are discussed. Non-repudiation concept provided by electronic signatures and related cryptographic functions, as introduced in this study, allow using digital records of these voice conversations as legally binding statements or proofs likewise and even instead of traditional wet signatures. The system is designed as a subsystem to IMS based 3G and 4G networks and maximum compatibility with current configurations, components and interfaces of these networks is intended. On the other hand non-repudiation is achieved by special signature, storage and verification units located in the IMS core network. Voice data is proposed to be processed in MRF unit of the IMS. Additionally, a USSD/USSI based special solution to initiate these signed calls is developed. According to the proposed scheme; during a signed call, two unidirectional voice streams originating from two parties of the call, which are transferred in IP and UDP encapsulated RTP packages, are received by the signature unit and interweaved using their arrival times, so that they become a unified stream. Signature unit generates hashes of groups of received packages and signs them using PKI algorithms and applying hash/signature chaining to increase integrity protection and to empower non-repudiation. Then, it forwards packages and signature information to the storage unit. Storage unit keeps all the call records, signature data and metadata of these calls. Verification unit later gathers relevant data from the storage unit...
△ Less
Submitted 21 November, 2020;
originally announced December 2020.
-
On Connectivity-Aware Distributed Mobility Models for Area Coverage in Drone Networks
Authors:
Mustafa Tosun,
Umut Can Cabuk,
Vahid Khalilpour Akram,
Orhan Dagdeviren
Abstract:
Drone networks are becoming increasingly popular in recent years and they are being used in many applications such as area coverage, delivery systems, military operations, etc. Area coverage is a broad family of applications where a group of connected drones collaboratively visit the whole or parts of an area to fulfill a specific objective and is widely being researched. Accordingly, different mo…
▽ More
Drone networks are becoming increasingly popular in recent years and they are being used in many applications such as area coverage, delivery systems, military operations, etc. Area coverage is a broad family of applications where a group of connected drones collaboratively visit the whole or parts of an area to fulfill a specific objective and is widely being researched. Accordingly, different mobility models have been designed to define the rules of movements of the participating drones. However, most of them do not consider the network connectivity which is crucial, plus many models lack the priorities and optimization strategies that are important for drone networks. Therefore within this study, three known connectivity-aware mobility models have been analyzed comparatively. Two non-connectivity-aware mobility models have further been implemented to catch the placebo effect if any. Per the detailed experiments on the mobility models, coverage rates, connectivity levels, and message traffic have been evaluated. The study shows that the Distributed Pheromone Repel (DPR) model provides a decent coverage performance, while the Connectivity-based model and the Connected Coverage model provide better connectivity and communication quality.
△ Less
Submitted 22 November, 2020;
originally announced November 2020.
-
Analysis of Movement-Based Connectivity Restoration Problem in Wireless Ad-Hoc and Sensor Networks
Authors:
Umut Can Cabuk,
Vahid Khalilpour Akram,
Orhan Dagdeviren
Abstract:
Topology control, including topology construction and maintenance phases, is a vital conception for wireless ad-hoc networks of any kind, expressly the wireless sensor networks (WSN). Topology maintenance, the latter phase, concerns several problems, such as optimizing the energy consumption, increasing the data rate, making clusters, and sustaining the connectivity. A disconnected network, among…
▽ More
Topology control, including topology construction and maintenance phases, is a vital conception for wireless ad-hoc networks of any kind, expressly the wireless sensor networks (WSN). Topology maintenance, the latter phase, concerns several problems, such as optimizing the energy consumption, increasing the data rate, making clusters, and sustaining the connectivity. A disconnected network, among other strategies, can efficiently be connected again using a Movement-based Connectivity Restoration (MCR) method, where a commensurate number of nodes move (or are moved) to the desired positions. However, finding an optimal route for the nodes to be moved can be a formidable problem. As a matter of fact, this paper presents details regarding a direct proof of the NP-Completeness of the MCR Problem by a reduction of the well-studied Steiner Tree Problem using the minimum number of Steiner points and the bounded edge length.
△ Less
Submitted 21 November, 2020;
originally announced November 2020.
-
A Survey on Feasibility and Suitability of Blockchain Techniques for the E-Voting Systems
Authors:
Umut Can Cabuk,
Eylul Adiguzel,
Enis Karaarslan
Abstract:
In the second decade of the 21st century, blockchain definitely became one of the most trending computational technologies. This research aims to question the feasibility and suitability of using blockchain technology within e-voting systems, regarding both technical and non-technical aspects. In today's world, although the course of this spreading is considerably slow, several countries already u…
▽ More
In the second decade of the 21st century, blockchain definitely became one of the most trending computational technologies. This research aims to question the feasibility and suitability of using blockchain technology within e-voting systems, regarding both technical and non-technical aspects. In today's world, although the course of this spreading is considerably slow, several countries already use means of e-voting due to many social and economic reasons, which we further investigated. Nevertheless, the number of countries offering various e-government solutions, apart from e-voting, is significantly high. E-voting systems, naturally, require much more attention and assurance regarding potential security and anonymity issues, since voting is one of the few extremely critical governmental processes. Nevertheless, e-voting is not purely a governmental service, but many companies and nonprofit organizations would benefit the cost-efficiency, scalability, remote accessibility, and ease of use that it provides. Blockchain technology is claimed to be able to address some, obviously not all, important security concerns, including anonymity, confidentiality, integrity, and non-repudiation. The analysis results presented in this article mostly confirm these claims.
△ Less
Submitted 11 February, 2020;
originally announced February 2020.