Computer Networks,
Journal Year:
2024,
Volume and Issue:
243, P. 110304 - 110304
Published: March 5, 2024
To
solve
the
problem
of
climate
warming,
countries
around
world
have
paid
special
attention
to
construction
carbon
governance.
Carbon
emission
accounting
is
an
important
policy
tool
control
vented
CO2.
But
at
present,
there
are
third-party
agencies
in
that
cannot
ensure
fairness
and
impartiality
accounting,
may
be
risks
such
as
illegal
use
leakage
sensitive
information
process
data
transmission.
Therefore,
We
design
blockchain-based
security
scheme
(BCESAS)
propose
cross-chain
verification
contract
efficiency
accounting.
In
addition,
bilinear
pairing
used
integrity,
we
encrypt
private
using
improved
more
secure
homomorphic
encryption
algorithm
privacy
not
leaked
during
transfer
data,
which
efficent
than
other
algorithms.
also
reputation
mechanism
regulate
behavior
auditors.
The
theoretical
experimental
analysis
demonstrates
BCESAS
can
verify
correctness
calculation
result
effectively,
realizing
reliable
expansion
blockchain.
Heliyon,
Journal Year:
2023,
Volume and Issue:
9(7), P. e17530 - e17530
Published: June 28, 2023
The
process
of
examining
the
data
flow
over
internet
to
identify
abnormalities
in
wireless
network
performance
is
known
as
traffic
analysis.
When
analyzing
data,
classification
becomes
an
important
task.
used
determine
whether
real-time
or
not.
This
analysis
controls
a
and
allows
for
efficient
improvement.
Real-time
non-real-time
are
effectively
classified
from
given
input
set
using
mining
clustering
algorithms.
proposed
work
focuses
on
with
high
accuracy
low
Classification
Time
(CT).
research
carried
out
fill
gap
existing
However,
remained
unaddressed
performing
effectively.
Then,
we
Enhanced
Self-Learning-based
Clustering
Scheme
(ESLCS)
enhanced
unsupervised
algorithm
adaptive
seeding
approach
improve
while
distribution
networks.
Test-bed
results
demonstrate
that
model
enhances
True
Positive
Rate
(TPR)
well
reduces
CT
time
Communication
Overhead
(CO)
substantially
compare
peer-existing
routing
techniques.
IEEE Access,
Journal Year:
2023,
Volume and Issue:
11, P. 62998 - 63012
Published: Jan. 1, 2023
As
for
the
advancement
of
IoT
and
cloud
computing
in
healthcare,
outsourcing
encrypted
Electronic
medical
records
(EMRs)
created
by
aggregation
treatment
applications
health
data
collected
from
devices
enables
high
accessibility,
effective
collaboration,
zero
computational
operation
cost.
Current
research
works
generally
concern
privacy
finest
EMRs
that
are
with
secure
lightweight
cryptographic
protocols
before
they
outsourced
to
cloud.
However,
this
process
does
not
consider
security
devices,
where
being
transferred
can
be
leaked
aggregated.
Furthermore,
existing
IoT-cloud
based
access
control
solutions
have
addressed
encryption,
transmission
aggregation,
policy
update
an
integrated
manner.
In
paper,
we
propose
scheme
called
LightMED
which
provides
secure,
fine-grained,
scalable
EMR
sharing
a
cloud-based
environment
fog
computing,
CP-ABE,
blockchain
technology.
We
method
on
encryption
digital
signing.
At
core,
introduce
privacy-preserving
decryption
algorithm
leveraged
collaboration
between
nodes
blockchain.
addition,
novel
enable
owners
effectively
manage
their
policies
Finally,
performed
comparative
analysis
illustrate
computation
cost
conducted
experiments
evaluate
performance
our
related
works.
The
experimental
results
showed
outperformed
since
it
yielded
least
processing
both
at
end-users'
demonstrates
higher
efficiency
practicality
scheme.
IEEE Communications Surveys & Tutorials,
Journal Year:
2024,
Volume and Issue:
unknown, P. 1 - 1
Published: Jan. 1, 2024
The
rapid
advances
in
the
Internet
of
Things
(IoT)
have
promoted
a
revolution
communication
technology
and
offered
various
customer
services.
Artificial
intelligence
(AI)
techniques
been
exploited
to
facilitate
IoT
operations
maximize
their
potential
modern
application
scenarios.
In
particular,
convergence
AI
has
led
new
networking
paradigm
called
Intelligent
(IIoT),
which
significantly
transform
businesses
industrial
domains.
This
paper
presents
comprehensive
survey
IIoT
by
investigating
its
significant
applications
mobile
networks,
as
well
associated
security
privacy
issues.
Specifically,
we
explore
discuss
roles
wide
range
key
domains,
from
smart
healthcare
cities
transportation
industries.
Through
such
extensive
discussions,
investigate
important
issues
where
network
attacks,
confidentiality,
integrity,
intrusion
are
analyzed,
along
with
discussion
countermeasures.
Privacy
networks
were
also
surveyed
discussed,
including
data,
location,
model
leakage.
Finally,
outline
several
challenges
highlight
research
directions
this
area.
IEEE Access,
Journal Year:
2024,
Volume and Issue:
12, P. 12586 - 12601
Published: Jan. 1, 2024
The
edge
devices
will
produce
enormous
quantities
of
data
daily
as
the
Industrial
Internet
Things
(IIoT)
expands
in
scope.
Still,
most
IIoT
is
stored
centers,
making
it
challenging
to
transfer
between
domains
safely.
Smart
logistic
products
have
dramatically
changed
due
prevalence
decentralized
computing
and
blockchain
industry
sector.
To
address
need
exchange
logistics
networks,
we
proposed
a
novel
hierarchical
attribute-based
encryption
(HABE)
scheme
combining
blockchain.
begin,
offer
an
IoT
strategy
which
can
send
nearby
cloud
network
for
processing
while
maintaining
privacy.
In
addition,
developed
blockchain-integrated
data-sharing
that
makes
possible
users
share
via
use
storage.
particular,
device
incorporates
encryption-based
authentication
system
verify
users'
access
rights
at
network's
periphery
manner.
Using
HABE,
provide
architecture
protects
user
suggested
design
utilizes
paradigms
HABE
maintain
privacy
works
well
with
smart
applications.
time
model
reduced
by
1.5
times
compared
centralized
model.
analyses
experimental
findings
show
better
than
existing
schemes
terms
sharing,
privacy,
security.
ACM Computing Surveys,
Journal Year:
2025,
Volume and Issue:
unknown
Published: Jan. 25, 2025
Blockchain
applications
have
emerged
in
recent
decades,
among
which
blockchain
secured-networks
serve
as
a
prevalent
application.
This
paper
provides
the
potential
of
networks
secured
by
technology
to
enhance
various
domains
and
structured
view
current
landscape
applications,
capturing
practical
technology.
Followed
background
overview,
survey
analysis
latest
advancements
blockchain-secured
is
presented,
categorized
six
application
fields:
Vehicular
Ad-Hoc,
Health
Care,
Smart
Home,
Unmanned
Aerial
Vehicle
(UAV),
Internet
Things
(IoT),
Industrial
IoT
Networks.
An
in-depth
discussion
on
these
key
research
topics
within
provided,
enhancing
understanding
their
influence
across
multiple
disciplines.
The
study
overall
conveys
versatility
networks,
highlighting
immense
for
fields.
A
comprehensive
conducted,
By
providing
trends
application,
this
enables
readers
navigate
information
effectively
identify
areas
interest,
facilitating
further
exploration
opportunities
field
IEEE Access,
Journal Year:
2023,
Volume and Issue:
11, P. 25480 - 25491
Published: Jan. 1, 2023
Existing
single
sign-on
(SSO)
access
control
systems
typically
rely
on
the
traditional
protocols
requiring
additional
authentication
mechanism
and/or
identity
providers.
As
growing
demand
in
outsourcing
system
resources
such
as
data
and
applications
to
cloud
platform,
implementing
SSO
models
support
efficient
fine-grained
for
multi-user
multi-application
environment
is
not
practical.
In
this
paper,
we
propose
a
blockchain-based
identification
management
(IAM)
scheme
called
D
2
-IAM
provide
strong
security
measures
controlling
cloud.
At
core
of
-IAM,
all
processes
are
done
by
smart
contracts
blockchain
where
transactions
well
retained
accountability.
our
system,
based
highest
level
hashed-based
token
that
significantly
reduces
communication
overhead
multi-system
authentication.
For
authorization
enables
through
policy
modeled
document
database
written
enforced
each
customer.
Finally,
conducted
experiments
Google
show
implementation.
The
performance
test
showed
proposed
approximately
4
times
than
average
processing
time
three
existing
works.
IEEE Access,
Journal Year:
2023,
Volume and Issue:
11, P. 97318 - 97330
Published: Jan. 1, 2023
In
the
fire
scene
investigation,
firefighting
Internet
of
Things
(IoT)
data
is
key
electronic
evidence
for
event
analysis
and
responsibility
determination.
However,
traditional
centralized
storage
method
leads
to
easy
be
tampered
with
damaged.
To
solve
these
problems,
this
paper
designs
implements
a
secure,
reliable
low-cost
distributed
IoT
scheme
based
on
Fabric
framework,
combining
blockchain
technology,
Interplanetary
File
System
(IPFS)
Practical
Byzantine
Fault
Tolerance
(PBFT)
consensus
algorithm
provide
strong
support
accident
traceability.
This
mainly
includes
model,
algorithms
construction
improvement.
IPFS
stores
complete
data,
as
off-chain
system
blockchain,
only
address
(IPFS
hash)
returned
by
IPFS,
thus
reducing
space
overhead
ensuring
security.
Further,
we
adopt
framework
platform
embed
PBFT
into
ensure
reliability
nodes
in
Fabric,
improving
availability
blockchain.
addition,
use
AES
RSA
security
transmission.
Through
experimental
testing,
proposed
meets
need
secure
traceability
data.
Compared
using
combined
technology
has
advantages
occupation,
significantly
improved
throughput,
lower
latency
overhead.
Meanwhile,
compared
official
supports
fault
tolerance
better