A Blockchain-based carbon emission security accounting scheme DOI Creative Commons
Yunhua He, Shuang Wang, Zhihao Zhou

et al.

Computer Networks, Journal Year: 2024, Volume and Issue: 243, P. 110304 - 110304

Published: March 5, 2024

To solve the problem of climate warming, countries around world have paid special attention to construction carbon governance. Carbon emission accounting is an important policy tool control vented CO2. But at present, there are third-party agencies in that cannot ensure fairness and impartiality accounting, may be risks such as illegal use leakage sensitive information process data transmission. Therefore, We design blockchain-based security scheme (BCESAS) propose cross-chain verification contract efficiency accounting. In addition, bilinear pairing used integrity, we encrypt private using improved more secure homomorphic encryption algorithm privacy not leaked during transfer data, which efficent than other algorithms. also reputation mechanism regulate behavior auditors. The theoretical experimental analysis demonstrates BCESAS can verify correctness calculation result effectively, realizing reliable expansion blockchain.

Language: Английский

Blockchain Applications in Sustainable Smart Cities DOI
Zaib Ullah, Muddasar Naeem, Antonio Coronato

et al.

Sustainable Cities and Society, Journal Year: 2023, Volume and Issue: 97, P. 104697 - 104697

Published: June 7, 2023

Language: Английский

Citations

58

An enhanced self-learning-based clustering scheme for real-time traffic data distribution in wireless networks DOI Creative Commons
Arpit Jain, Tushar Mehrotra,

Ankur Sisodia

et al.

Heliyon, Journal Year: 2023, Volume and Issue: 9(7), P. e17530 - e17530

Published: June 28, 2023

The process of examining the data flow over internet to identify abnormalities in wireless network performance is known as traffic analysis. When analyzing data, classification becomes an important task. used determine whether real-time or not. This analysis controls a and allows for efficient improvement. Real-time non-real-time are effectively classified from given input set using mining clustering algorithms. proposed work focuses on with high accuracy low Classification Time (CT). research carried out fill gap existing However, remained unaddressed performing effectively. Then, we Enhanced Self-Learning-based Clustering Scheme (ESLCS) enhanced unsupervised algorithm adaptive seeding approach improve while distribution networks. Test-bed results demonstrate that model enhances True Positive Rate (TPR) well reduces CT time Communication Overhead (CO) substantially compare peer-existing routing techniques.

Language: Английский

Citations

28

Secure and Lightweight Blockchain-Enabled Access Control for Fog-Assisted IoT Cloud Based Electronic Medical Records Sharing DOI Creative Commons
Somchart Fugkeaw,

Leon Wirz,

Lyhour Hak

et al.

IEEE Access, Journal Year: 2023, Volume and Issue: 11, P. 62998 - 63012

Published: Jan. 1, 2023

As for the advancement of IoT and cloud computing in healthcare, outsourcing encrypted Electronic medical records (EMRs) created by aggregation treatment applications health data collected from devices enables high accessibility, effective collaboration, zero computational operation cost. Current research works generally concern privacy finest EMRs that are with secure lightweight cryptographic protocols before they outsourced to cloud. However, this process does not consider security devices, where being transferred can be leaked aggregated. Furthermore, existing IoT-cloud based access control solutions have addressed encryption, transmission aggregation, policy update an integrated manner. In paper, we propose scheme called LightMED which provides secure, fine-grained, scalable EMR sharing a cloud-based environment fog computing, CP-ABE, blockchain technology. We method on encryption digital signing. At core, introduce privacy-preserving decryption algorithm leveraged collaboration between nodes blockchain. addition, novel enable owners effectively manage their policies Finally, performed comparative analysis illustrate computation cost conducted experiments evaluate performance our related works. The experimental results showed outperformed since it yielded least processing both at end-users' demonstrates higher efficiency practicality scheme.

Language: Английский

Citations

27

A Survey on Intelligent Internet of Things: Applications, Security, Privacy, and Future Directions DOI Creative Commons
Ons Aouedi, Thai-Hoc Vu, Alessio Sacco

et al.

IEEE Communications Surveys & Tutorials, Journal Year: 2024, Volume and Issue: unknown, P. 1 - 1

Published: Jan. 1, 2024

The rapid advances in the Internet of Things (IoT) have promoted a revolution communication technology and offered various customer services. Artificial intelligence (AI) techniques been exploited to facilitate IoT operations maximize their potential modern application scenarios. In particular, convergence AI has led new networking paradigm called Intelligent (IIoT), which significantly transform businesses industrial domains. This paper presents comprehensive survey IIoT by investigating its significant applications mobile networks, as well associated security privacy issues. Specifically, we explore discuss roles wide range key domains, from smart healthcare cities transportation industries. Through such extensive discussions, investigate important issues where network attacks, confidentiality, integrity, intrusion are analyzed, along with discussion countermeasures. Privacy networks were also surveyed discussed, including data, location, model leakage. Finally, outline several challenges highlight research directions this area.

Language: Английский

Citations

15

Blockchain-Assisted Hierarchical Attribute-Based Encryption Scheme for Secure Information Sharing in Industrial Internet of Things DOI Creative Commons

A. Sasikumar,

Logesh Ravi,

Malathi Devarajan

et al.

IEEE Access, Journal Year: 2024, Volume and Issue: 12, P. 12586 - 12601

Published: Jan. 1, 2024

The edge devices will produce enormous quantities of data daily as the Industrial Internet Things (IIoT) expands in scope. Still, most IIoT is stored centers, making it challenging to transfer between domains safely. Smart logistic products have dramatically changed due prevalence decentralized computing and blockchain industry sector. To address need exchange logistics networks, we proposed a novel hierarchical attribute-based encryption (HABE) scheme combining blockchain. begin, offer an IoT strategy which can send nearby cloud network for processing while maintaining privacy. In addition, developed blockchain-integrated data-sharing that makes possible users share via use storage. particular, device incorporates encryption-based authentication system verify users' access rights at network's periphery manner. Using HABE, provide architecture protects user suggested design utilizes paradigms HABE maintain privacy works well with smart applications. time model reduced by 1.5 times compared centralized model. analyses experimental findings show better than existing schemes terms sharing, privacy, security.

Language: Английский

Citations

14

Secured Network Architectures Based on Blockchain Technologies: A Systematic Review DOI Open Access

Song-Kyoo Kim,

Hou Cheng Vong

ACM Computing Surveys, Journal Year: 2025, Volume and Issue: unknown

Published: Jan. 25, 2025

Blockchain applications have emerged in recent decades, among which blockchain secured-networks serve as a prevalent application. This paper provides the potential of networks secured by technology to enhance various domains and structured view current landscape applications, capturing practical technology. Followed background overview, survey analysis latest advancements blockchain-secured is presented, categorized six application fields: Vehicular Ad-Hoc, Health Care, Smart Home, Unmanned Aerial Vehicle (UAV), Internet Things (IoT), Industrial IoT Networks. An in-depth discussion on these key research topics within provided, enhancing understanding their influence across multiple disciplines. The study overall conveys versatility networks, highlighting immense for fields. A comprehensive conducted, By providing trends application, this enables readers navigate information effectively identify areas interest, facilitating further exploration opportunities field

Language: Английский

Citations

1

Blockchain aware proxy re-encryption algorithm-based data sharing scheme DOI
Ismail Keshta, Yassine Aoudni, Mukta Sandhu

et al.

Physical Communication, Journal Year: 2023, Volume and Issue: 58, P. 102048 - 102048

Published: March 10, 2023

Language: Английский

Citations

22

Achieving Decentralized and Dynamic SSO-Identity Access Management System for Multi-Application Outsourced in Cloud DOI Creative Commons
Somchart Fugkeaw

IEEE Access, Journal Year: 2023, Volume and Issue: 11, P. 25480 - 25491

Published: Jan. 1, 2023

Existing single sign-on (SSO) access control systems typically rely on the traditional protocols requiring additional authentication mechanism and/or identity providers. As growing demand in outsourcing system resources such as data and applications to cloud platform, implementing SSO models support efficient fine-grained for multi-user multi-application environment is not practical. In this paper, we propose a blockchain-based identification management (IAM) scheme called D 2 -IAM provide strong security measures controlling cloud. At core of -IAM, all processes are done by smart contracts blockchain where transactions well retained accountability. our system, based highest level hashed-based token that significantly reduces communication overhead multi-system authentication. For authorization enables through policy modeled document database written enforced each customer. Finally, conducted experiments Google show implementation. The performance test showed proposed approximately 4 times than average processing time three existing works.

Language: Английский

Citations

17

RETRACTED: An enhanced consortium blockchain diversity mining technique for IoT metadata aggregation DOI
Premkumar Chithaluru, Fadi Al‐Turjman, Raman Dugyala

et al.

Future Generation Computer Systems, Journal Year: 2023, Volume and Issue: 152, P. 239 - 253

Published: Nov. 1, 2023

Language: Английский

Citations

16

A Secure, Reliable and Low-Cost Distributed Storage Scheme Based on Blockchain and IPFS for Firefighting IoT Data DOI Creative Commons

Lina Li,

Dezheng Jin, Tingting Zhang

et al.

IEEE Access, Journal Year: 2023, Volume and Issue: 11, P. 97318 - 97330

Published: Jan. 1, 2023

In the fire scene investigation, firefighting Internet of Things (IoT) data is key electronic evidence for event analysis and responsibility determination. However, traditional centralized storage method leads to easy be tampered with damaged. To solve these problems, this paper designs implements a secure, reliable low-cost distributed IoT scheme based on Fabric framework, combining blockchain technology, Interplanetary File System (IPFS) Practical Byzantine Fault Tolerance (PBFT) consensus algorithm provide strong support accident traceability. This mainly includes model, algorithms construction improvement. IPFS stores complete data, as off-chain system blockchain, only address (IPFS hash) returned by IPFS, thus reducing space overhead ensuring security. Further, we adopt framework platform embed PBFT into ensure reliability nodes in Fabric, improving availability blockchain. addition, use AES RSA security transmission. Through experimental testing, proposed meets need secure traceability data. Compared using combined technology has advantages occupation, significantly improved throughput, lower latency overhead. Meanwhile, compared official supports fault tolerance better

Language: Английский

Citations

15