Lecture notes in electrical engineering, Journal Year: 2024, Volume and Issue: unknown, P. 323 - 328
Published: Oct. 19, 2024
Language: Английский
Lecture notes in electrical engineering, Journal Year: 2024, Volume and Issue: unknown, P. 323 - 328
Published: Oct. 19, 2024
Language: Английский
IEEE Access, Journal Year: 2022, Volume and Issue: 10, P. 122679 - 122695
Published: Jan. 1, 2022
With the rapid enhancement in design and development of Internet Things creates a new research interest adaptation industrial domains. It is due to impact distributed emerging technology topology security-related resource constraints 5.0. This conducts paradigm along with critical challenges existing information preservation, node transactions communication, transmission, trust privacy, security protection related problems. These aspects pose serious limitations issues for industry provide data integrity, exchange reliability, provenance, trustworthiness overall activities service delivery prospects. In addition, intersection blockchain IoT has gained more consideration interest. However, there an limitation between inadequate performance connected nodes, high requirement permissioned private ledger not yet been tackled complete solution. Due introductions NuCypher Re-Encryption infrastructure, hashing tree allocation, deployment proof-of-work required computational power as well. paper divided into three different folds; first, we studied various literature blockchain-enabling its implementation challenging Secondly, proposed hyperledger sawtooth-enabled framework. framework provides secure trusted execution environment, which mechanisms protocols are designed acknowledgment, including immutable storage security, peer-to-peer network on-chain off-chain communication activities. Thirdly, pseudo-chain codes consensus smooth streamline broadcast content. The multiple investigated simulated using Hyperledger Sawtooth-enabled docker testing devices within limited usage constraints.
Language: Английский
Citations
137Computers & Electrical Engineering, Journal Year: 2022, Volume and Issue: 102, P. 108234 - 108234
Published: July 25, 2022
Language: Английский
Citations
110Sustainable Energy Technologies and Assessments, Journal Year: 2023, Volume and Issue: 57, P. 103282 - 103282
Published: May 12, 2023
Language: Английский
Citations
92IEEE Access, Journal Year: 2022, Volume and Issue: 10, P. 78887 - 78898
Published: Jan. 1, 2022
Owing to the sensitive nature of healthcare data, aforementioned approach transferring patient data central servers creates serious security and privacy issues. In addition, blockchain distributed ledger technology has introduced immutable storage decentralized management capability, which handles a large number nodes E-Healthcare transactions via serverless network, but in limited manner because blockchain-enabled resources. this scenario, medical industries are concerned about constituting an innovation health information preservation exchanging service delivery protocols without connectivity untrusted third-party infrastructure. study, we proposed hyperledger fabric-enabled consortium architecture called BIoMT, provides security, integrity, transparency, provenance health-related exchanges clinical peer-to-peer (P2P) secure network environment. A consensus is designed created reduce rate resource constraints on Internet Medical Things (IoMT). The individual before sharing protected using NuCypher Re-Encryption mechanism, increases integrity transparency. Smart contracts deployed automate device registration, exchange transactions, (filecoin) after cross verification validation. experimental results show that BIoMT reduces computational cost by 26.13%, robust node generation 60.37%. Thus, only 31.79% 74.21% IoMT-related P2P usage maintained saved, respectively.
Language: Английский
Citations
84Electronics, Journal Year: 2023, Volume and Issue: 12(3), P. 677 - 677
Published: Jan. 29, 2023
The vast enhancement in the development of Internet Vehicles (IoV) is due to impact distributed emerging technology and topology industrial IoV. It has created a new paradigm, such as security-related resource constraints Industry 5.0. A revolution dimension IoV popup raise various critical challenges existing information preservation, especially node transactions communication, transmission, trust privacy, security-protection-related problems, which have been analyzed. These aspects pose serious problems for industry provide vehicular-related data integrity, availability, exchange reliability, provenance, trustworthiness overall activities service delivery prospects against increasing number multiple transactions. In addition, there lot research interest that intersects with blockchain association. this regard, inadequate performance connected nodes high requirements consortium ledger not yet tackled complete solution. introduction NuCypher Re-encryption infrastructure, hashing tree allocation, proof-of-work require more computational power well. This paper contributes two different folds. First, it proposes sawtooth-enabled modular architecture protected, secure, trusted execution, delivery, acknowledgment immutable storage security peer-to-peer (P2P) network on-chain off-chain inter-communication vehicular activities. Secondly, we design create smart contract-enabled structure order smooth streamlined broadcast content. Substantially, develop deploy hyperledger sawtooth-aware customized consensus investigations. For validation purposes, simulate related details between devices on simulation results show proposed BIoV reduces cost down 37.21% robust generation up 56.33%. Therefore, only 41.93% 47.31% Vehicles-related resources are kept used, respectively.
Language: Английский
Citations
68IEEE Sensors Journal, Journal Year: 2023, Volume and Issue: 23(20), P. 25144 - 25151
Published: May 11, 2023
The industrial Internet of Things (IIoT) has gained more attention because the self-governing nature system configuration with interoperable application connectivity. In E-healthcare environment, it cooperates medical sensors to capture, examine, analyze, preserve, and document day-to-day transactions patients in real-time. integration IIoT provides an analytical platform handle a large amount data low cost cloud-enabling scalable storage. Throughout transformation, patients' personal information is at risk while exchanging records over centralized server-based systems. Thus, rate node connectivity, failure parallel sharing, deliverance-related issues increase. this article, we present solutions three folds. First, article proposes novel secure architecture for security using blockchain-distributed ledger technology named BHIIoT. Second, transformation lifecycle wireless sensor networks (WSNs) management optimization distributed layered hierarchy developed, which enhances network resources increases trust blockchain-enabled peer-to-peer (P2P) environment. Third, proposed BHIIoT uses NuCypher threshold re-encryption mechanism encryption protects shared form blocks preserved blockchain immutable For instance, chain codes are deployed automate authentication, logging, index deliverance, trace resist illegal activities application. customized lightweight multi-proof-of-work (PoW) multi-proof-of-stake (PoS) designed digital signature improving consumption reducing load storage transaction process scheduled.
Language: Английский
Citations
64IEEE Access, Journal Year: 2024, Volume and Issue: 12, P. 69383 - 69396
Published: Jan. 1, 2024
Particularly in the context of smart cities, remote sensing data (RSD) has emerged as one hottest study topics information and communication technology (ICT) today. The development machine learning (ML) artificial intelligence (AI) made it possible to solve a number issues, including automation, control access, optimization, monitoring, management. Simultaneously, there are significant issues with design process hierarchy, inadequate training records, centralized architecture, privacy protection, overall resource consumption restrictions. Distributed Ledger Technology (DLT), on other hand, provides decentralized infrastructure that allows systems eliminate data-sharing procedures cities while transferring from network node node, third-party access solves issues. To an ideal delivery mechanism for analytical model, paper employs Partial Swam Optimization (POS) conjunction secure blockchain distributed consortium network. This work makes three contributions. Firstly, offers safe transmission method combines optimize path reliable across channels. Second, neighborhood encryption sequences carried out using NuCypher proxy re-encryption-enabled value encryption, public key cryptographic approach avoids cypher conversion. Third, Artificial Neural Networks (ANNs) can deliverance classification problem by optimizing record management preservation.
Language: Английский
Citations
26Engineering Applications of Artificial Intelligence, Journal Year: 2024, Volume and Issue: 141, P. 109838 - 109838
Published: Dec. 13, 2024
Language: Английский
Citations
15Drones, Journal Year: 2022, Volume and Issue: 6(12), P. 377 - 377
Published: Nov. 25, 2022
Due to globalization and advances in network technology, the Internet of Vehicles (IoV) with edge computing has gained increasingly more attention over last few years. The technology provides a new paradigm design interconnected distributed nodes Unmanned Aerial Vehicle (UAV)-assisted vehicle networks for communications between vehicles smart cities. process hierarchy current UAV-assisted is also becoming multifaceted as are connected, requiring accessing exchanging information, performing tasks, updating information securely. This poses serious issues limitations centralized networks, directly affecting computing-intensive tasks data offloading. paper bridges these gaps by providing novel, transparent, secure lifecycle communication using blockchain hyperledger technology. A modular infrastructure Vehicle-to-Everything (V2X) designed ‘B-UV2X’, fabric-enabled permissioned network-based consortium structure, proposed. participating others chain cities exchange different such movement, etc., preserving operational logs on blockchain-enabled immutable ledger. automates IoV transactions proposed vehicle-enabled doppler spread. Thus, this purpose, there four codes that deployed registration, adding transactions, ledger, monitoring resource management, customized multi-consensus proof-of-work. For lightweight authentication, B-UV2X uses two-way verification method defined fabric consensus mechanism. Transaction protection from acquisition deliverance storage NuCypher threshold proxy re-encryption Simulation results show reduction consumption 12.17% compared system, an increase security features up 9.76%, 7.93% computational load computed log storage.
Language: Английский
Citations
32IEEE Access, Journal Year: 2024, Volume and Issue: 12, P. 7156 - 7169
Published: Jan. 1, 2024
Malicious assaults and information leakage have grown in importance practically every area of communication technology (ICT) recent years. Enterprise ledger organization, preservation, security, protection are all greatly aided by security (IS). To maintain their positions the market, industries must safeguard data other vital assets. The main goals this paper's systematic review, which covers entire process privacy to introduce cryptographic IS for Industry 5.0 (the Fifth Industrial Revolution) as a comprehensive solution that provides regulatory compliance policies addition industrial goals. review four areas: (i) recognizing need frameworks be developed secure lifecycle; (ii) emphasizing guidelines, procedures, countermeasures 5.0; (iii) applying control, access, availability real-time; (iv) proposing futuristic architecture security. Furthermore, analysis previously published state-of-the-art techniques is presented paper. These survive with various limitations challenges, including intercommunication exchange, fine-grained control interconnectivity-related issues, affect adoption an programmes. At end we investigated few open research problems mentioned those involved design re-encryption-enabled future developments.
Language: Английский
Citations
9