ACM Transactions on Internet of Things,
Journal Year:
2024,
Volume and Issue:
5(4), P. 1 - 25
Published: Oct. 14, 2024
The
development
of
the
Digital
Twin
(DT)
approach
is
tilting
research
from
initial
approaches
that
aim
at
promoting
early
adoption
to
sophisticated
attempts
develop,
deploy,
and
maintain
applications
based
on
DTs.
In
this
context,
we
propose
a
highly
dynamic
distributed
ecosystem
where
containerized
DTs
co-evolve
with
an
orchestration
middleware.
provide
digitalized
representations
targeted
physical
systems,
while
middleware
monitors
re-configures
deployed
in
light
application
constraints,
available
resources,
quality
cyber-physical
entanglement.
First,
lay
out
reference
scenario.
Then,
discuss
limitations
current
identify
set
requirements
shape
both
Subsequently,
describe
blueprint
architecture
meets
those
requirements.
Finally,
report
empirical
evidence
feasibility
effectiveness
proof-of-concept
implementation
proposed
ecosystem.
Transactions on Emerging Telecommunications Technologies,
Journal Year:
2025,
Volume and Issue:
36(3)
Published: March 1, 2025
ABSTRACT
The
rapid
integration
of
Internet
Things
(IoT)
devices
into
healthcare
systems
has
revolutionized
medical
care
delivery
but
also
introduced
significant
security
challenges.
Ensuring
secure
communication,
privacy
preservation,
and
system
resilience
in
resource‐constrained
IoT
networks
is
critical,
given
the
sensitivity
data
involved
potential
for
malicious
attacks.
This
research
addresses
these
concerns
by
proposing
a
Multi‐cluster
Security
Framework
Healthcare
IoT,
designed
to
overcome
existing
limitations
scalability.
framework
combines
Redundant
Byzantine
Fault
Tolerance
with
Extensions
(RB‐BFT
X)
CoatiNet,
leveraging
lightweight
cryptographic
techniques,
role‐based
access
control,
dynamic
routing
algorithms.
RB‐BFT
X
enhances
intra‐cluster
through
fault
tolerance
anomaly
detection,
while
CoatiNet
optimizes
inter‐cluster
communication
using
adaptive
self‐recovery
mechanisms
inspired
coatis'
natural
behavior.
Experimental
results
demonstrate
framework's
efficacy,
achieving
high
detection
rate
98.20%,
minimal
latency,
stable
throughput
under
various
adversarial
conditions.
Compared
methods,
it
outperforms
maintaining
network
lifetime
reducing
false
positives,
even
increased
activity.
These
findings
have
implications
enhancing
efficiency
networks.
proposed
methodology
ensures
robust
protection,
efficient
adaptability
evolving
threats,
contributing
safer
more
reliable
systems.
IGI Global eBooks,
Journal Year:
2025,
Volume and Issue:
unknown, P. 249 - 276
Published: March 14, 2025
The
incorporation
of
advanced
technologies
offers
transformative
possibility
in
the
evolving
landscape
insurance
industry.
present
chapter
is
an
attempt
to
explore
impact
digital
revolution
and
applications
blockchain
technology
sector.
This
will
integration
Blockchain
technology,
machine
language
(ML),
Internet
Things
(IoT)
artificial
intelligence
(AI)
streamlining
operations
examine
role
Artificial
Technologies
driven
Smart
Contract
industry,
benefits
same
insurer-customer
relationship
challenges
implement
same.
provide
future
direction
adoption
industry
across
globe.
Applied Sciences,
Journal Year:
2025,
Volume and Issue:
15(6), P. 3225 - 3225
Published: March 15, 2025
Blockchain-based
data
storage
methods
offer
strong
integrity,
decentralized
security,
and
transparent
access
control
but
also
face
scalability
challenges,
high
computational
costs,
complex
management.
This
study
provides
a
comprehensive
review
of
on-chain,
off-chain,
hybrid
architectures,
analyzing
their
security
vulnerabilities,
performance
trade-offs,
industry-specific
applications.
On-chain
ensures
immutability,
by
storing
directly
on
the
blockchain;
however,
it
is
associated
with
transaction
costs
limitations.
In
contrast,
off-chain
solutions
reduce
enhance
outside
blockchain
introduce
risks
related
to
integrity
in
environments.
Hybrid
approaches
aim
balance
cost,
integrating
strengths
both
on-chain
solutions.
examines
fundamental
components
blockchain-based
systems,
sector-specific
applications,
technical
challenges
they
present.
Additionally,
explores
trade-offs
between
decentralization,
offering
insights
into
optimization
strategies.
As
result,
this
evaluates
protocols,
efficiency
sustainability
distributed
solutions,
contributing
future
research
field.
The
concept
of
Digital
Twins
has
been
in
the
field
for
a
long
time,
constantly
challenging
specification,
modeling,
design,
implementation,
and
exploitation
complex
cyber-physical
systems.
Despite
various
foundations,
standards,
platforms
Systems
Engineering,
there
are
ongoing
challenges
with
Verification
Validation
methodology.
This
study
aims
to
establish
generic
framework
that
addresses
aspects
Twinning.
multifaceted
nature
problem
requires
raising
abstraction
level
both
Real
(Actual)
Virtual
domains,
effective
dissemination
information
resources,
design
inspired
by
verification
validation.
proposed
combines
Quintuple
Helix
model
Problem
Operational
Domains
Twin,
Solution
Implementation
Execution
Domain
as
bridge
links
them.
dimensions
follow
Meta
Object
Facility
layers
(Instance,
Model,
Meta-model,
Meta-meta-model)
mapping
over
five
Helices.
Embedding
complexity
reduction
mechanisms
builds
suite
extendible
verifiable
digital
twinning
simulation
real-time
scenarios.
African Journal of Biological Sciences,
Journal Year:
2024,
Volume and Issue:
6(12), P. 2650 - 2658
Published: July 5, 2024
This
paper
delves
into
integrating
Machine
Learning
(ML)
algorithms
Access
Control
Mechanisms
(ACM)
within
Data
Warehouses
(DW)
to
enhance
both
security
and
operational
efficiency.
Traditional
ACMs,
notably
role-based
access
control
(RBAC),
often
struggle
with
adapting
dynamic
threats
complex
patterns.
ML
tackles
these
issues
by
improving
decision
accuracy
through
real-time
anomaly
detection
adaptive
based
on
user
behavior
contextual
insights.
The
study
examines
the
implementation
benefits
of
ML-enhanced
ACMs
in
DW
environments,
highlighting
their
effectiveness
mitigating
unauthorized
insider
threats.
research
also
addresses
critical
considerations,
such
as
privacy
protections
interpretability
models,
crucial
for
maintaining
regulatory
compliance
stakeholder
trust.
Ultimately,
this
emphasizes
ML's
pivotal
contribution
advancing
practices
(DWs)
proposes
future
directions
measures
evolving
digital
landscapes.
Electronics,
Journal Year:
2024,
Volume and Issue:
13(16), P. 3303 - 3303
Published: Aug. 20, 2024
The
concept
of
digital
twins
has
been
in
the
field
for
a
long
time,
constantly
challenging
specification,
modeling,
design,
implementation,
and
exploitation
complex
cyber–physical
systems.
Despite
various
foundations,
standards,
platforms
systems
engineering,
there
are
ongoing
challenges
with
verification
validation
methodology.
This
study
aims
to
establish
generic
framework
that
addresses
aspects
twinning.
multifaceted
nature
problem
requires
raising
abstraction
level
both
real
(actual)
virtual
domains,
effective
dissemination
information
resources,
design
inspired
by
validation.
proposed
combines
quintuple
helix
model
operational
domains
twin,
solution
implementation
execution
domain
as
bridge
links
them.
Verification
dimensions
follow
meta
object
facility
layers
(instance,
model,
meta-model,
meta-meta-model)
mapping
over
five
helices.
Embedding
complexity
reduction
mechanisms
builds
suite
extendible
verifiable
twinning
simulation
real-time
scenarios.
application
main
conceptual
real-world
example
aids
this
research’s
intentions.
is
matter
further
research
endeavors.