Peer-to-Peer Networking and Applications, Journal Year: 2024, Volume and Issue: unknown
Published: Sept. 2, 2024
Language: Английский
Peer-to-Peer Networking and Applications, Journal Year: 2024, Volume and Issue: unknown
Published: Sept. 2, 2024
Language: Английский
Sensors, Journal Year: 2023, Volume and Issue: 23(2), P. 788 - 788
Published: Jan. 10, 2023
As the Internet of Things (IoT) concept materialized worldwide in complex ecosystems, related data security and privacy issues became apparent. While system elements their communication paths could be protected individually, generic, ecosystem-wide approaches were sought after as well. On a parallel timeline to IoT, distributed ledgers blockchains came into technological limelight. Blockchains offer many advantageous features relation enhanced security, anonymity, increased capacity, peer-to-peer capabilities. Although blockchain technology can provide IoT with effective efficient solutions, there are challenges various aspects integrating these technologies. anonymity/data privacy, smart contract-related apparently for technologies (BCT), storage capacity/scalability, resource utilization, transaction rate scalability, predictability, legal issues. This paper provides systematic review on state-of-the-art BCT integration, specifically order solve certain security- privacy-related The first brief overview IoT's basic principles, including architecture, protocols consensus algorithms, characteristics, them. Afterwards, it describes survey methodology, search strategy, eligibility criteria, selection results, characteristics included articles. Later, we highlight findings this study which illustrates different works that addressed integration tackle followed by categorization applications have been investigated such primary information, objective, development level, target application, type platform, algorithm, evaluation environment metrics, future or open (if any), further notes consideration. Furthermore, detailed discussion all articles is from an architectural operational perspective. Finally, cover major gaps considerations taken account when IoT.
Language: Английский
Citations
109Systems, Journal Year: 2023, Volume and Issue: 11(1), P. 38 - 38
Published: Jan. 8, 2023
In the recent years, blockchain technology has gained significant attention in healthcare sector. It potential to alleviate a wide variety of major difficulties electronic health record systems. This study presents an elaborate overview existing research works on applications industry. paper evaluates 144 articles that discuss importance and limits using technologies improve operations. The objective is demonstrate technology’s uses highlight possible sectors for future domain. starts with extensive background its features. Then, focuses providing literature review selected current themes blockchain-based After that, application areas along solutions provided by systems are pointed out. Finally, discussion section provides insight into limitations, challenges directions.
Language: Английский
Citations
96Sustainable Energy Technologies and Assessments, Journal Year: 2023, Volume and Issue: 57, P. 103282 - 103282
Published: May 12, 2023
Language: Английский
Citations
92Electronics, Journal Year: 2023, Volume and Issue: 12(3), P. 677 - 677
Published: Jan. 29, 2023
The vast enhancement in the development of Internet Vehicles (IoV) is due to impact distributed emerging technology and topology industrial IoV. It has created a new paradigm, such as security-related resource constraints Industry 5.0. A revolution dimension IoV popup raise various critical challenges existing information preservation, especially node transactions communication, transmission, trust privacy, security-protection-related problems, which have been analyzed. These aspects pose serious problems for industry provide vehicular-related data integrity, availability, exchange reliability, provenance, trustworthiness overall activities service delivery prospects against increasing number multiple transactions. In addition, there lot research interest that intersects with blockchain association. this regard, inadequate performance connected nodes high requirements consortium ledger not yet tackled complete solution. introduction NuCypher Re-encryption infrastructure, hashing tree allocation, proof-of-work require more computational power well. This paper contributes two different folds. First, it proposes sawtooth-enabled modular architecture protected, secure, trusted execution, delivery, acknowledgment immutable storage security peer-to-peer (P2P) network on-chain off-chain inter-communication vehicular activities. Secondly, we design create smart contract-enabled structure order smooth streamlined broadcast content. Substantially, develop deploy hyperledger sawtooth-aware customized consensus investigations. For validation purposes, simulate related details between devices on simulation results show proposed BIoV reduces cost down 37.21% robust generation up 56.33%. Therefore, only 41.93% 47.31% Vehicles-related resources are kept used, respectively.
Language: Английский
Citations
68IEEE Sensors Journal, Journal Year: 2023, Volume and Issue: 23(20), P. 25144 - 25151
Published: May 11, 2023
The industrial Internet of Things (IIoT) has gained more attention because the self-governing nature system configuration with interoperable application connectivity. In E-healthcare environment, it cooperates medical sensors to capture, examine, analyze, preserve, and document day-to-day transactions patients in real-time. integration IIoT provides an analytical platform handle a large amount data low cost cloud-enabling scalable storage. Throughout transformation, patients' personal information is at risk while exchanging records over centralized server-based systems. Thus, rate node connectivity, failure parallel sharing, deliverance-related issues increase. this article, we present solutions three folds. First, article proposes novel secure architecture for security using blockchain-distributed ledger technology named BHIIoT. Second, transformation lifecycle wireless sensor networks (WSNs) management optimization distributed layered hierarchy developed, which enhances network resources increases trust blockchain-enabled peer-to-peer (P2P) environment. Third, proposed BHIIoT uses NuCypher threshold re-encryption mechanism encryption protects shared form blocks preserved blockchain immutable For instance, chain codes are deployed automate authentication, logging, index deliverance, trace resist illegal activities application. customized lightweight multi-proof-of-work (PoW) multi-proof-of-stake (PoS) designed digital signature improving consumption reducing load storage transaction process scheduled.
Language: Английский
Citations
64IEEE Access, Journal Year: 2023, Volume and Issue: 11, P. 9136 - 9148
Published: Jan. 1, 2023
Computer viruses, malicious, and other hostile attacks can affect a computer network. Intrusion detection is key component of network security as an active defence technology. Traditional intrusion systems struggle with issues like poor accuracy, ineffective detection, high percentage false positives, inability to handle new types intrusions. To address these issues, we propose deep learning-based novel method detect cybersecurity vulnerabilities breaches in cyber-physical systems. The proposed framework contrasts the unsupervised discriminative approaches. This paper presents generative adversarial cyber threats IoT-driven IICs networks. results demonstrate performance increase approximately 95% 97% terms reliability, efficiency detecting all dropout value 0.2 epoch 25. output well-known state-of-the-art DL classifiers achieved highest true rate (TNR) (HDR) when following attacks: (BruteForceXXS, BruteForceWEB, DoS_Hulk_Attack, DOS_LOIC_HTTP_Attack) on NSL-KDD, KDDCup99, UNSW-NB15 datasets. It also maintained confidentiality integrity users' systems' sensitive information during training testing phases.
Language: Английский
Citations
58Computers, Journal Year: 2024, Volume and Issue: 13(2), P. 41 - 41
Published: Jan. 31, 2024
Health information systems (HISs) have immense value for healthcare institutions, as they provide secure storage, efficient retrieval, insightful analysis, seamless exchange, and collaborative sharing of patient health information. HISs are implemented to meet needs, well ensure the security privacy medical data, including confidentiality, integrity, availability, which necessary achieve high-quality services. This systematic literature review identifies various technologies methods currently employed enhance data within HISs. Various been utilized information, such IoT, blockchain, mobile applications, cloud computing, combined technologies. study also three key aspects, namely, access control, sharing, discusses challenges faced in each aspect that must be enhanced
Language: Английский
Citations
35IEEE Access, Journal Year: 2024, Volume and Issue: 12, P. 69383 - 69396
Published: Jan. 1, 2024
Particularly in the context of smart cities, remote sensing data (RSD) has emerged as one hottest study topics information and communication technology (ICT) today. The development machine learning (ML) artificial intelligence (AI) made it possible to solve a number issues, including automation, control access, optimization, monitoring, management. Simultaneously, there are significant issues with design process hierarchy, inadequate training records, centralized architecture, privacy protection, overall resource consumption restrictions. Distributed Ledger Technology (DLT), on other hand, provides decentralized infrastructure that allows systems eliminate data-sharing procedures cities while transferring from network node node, third-party access solves issues. To an ideal delivery mechanism for analytical model, paper employs Partial Swam Optimization (POS) conjunction secure blockchain distributed consortium network. This work makes three contributions. Firstly, offers safe transmission method combines optimize path reliable across channels. Second, neighborhood encryption sequences carried out using NuCypher proxy re-encryption-enabled value encryption, public key cryptographic approach avoids cypher conversion. Third, Artificial Neural Networks (ANNs) can deliverance classification problem by optimizing record management preservation.
Language: Английский
Citations
26Energies, Journal Year: 2025, Volume and Issue: 18(1), P. 141 - 141
Published: Jan. 1, 2025
Despite the fact that countless IoT applications are arising frequently in various fields, such as green cities, net-zero decarbonization, healthcare systems, and smart vehicles, grid is considered most critical cyber–physical application. With emerging technologies supporting much-anticipated energy particularly grid, these systems will continue to profoundly transform our way of life environment. Energy have improved over past ten years terms intelligence, efficiency, decentralization, ICT usage. On other hand, cyber threats attacks against greatly expanded a result enormous spread sensors devices inside sector well traditional power grids. In order detect mitigate vulnerabilities while increasing security grids, thorough investigation in-depth research highly required. This study offers comprehensive overview state-of-the-art cybersecurity research. this work, we primarily concentrate on examining numerous cyberattacks recently invaded developing general grids particular. begins by introducing architecture, it key components, its issues. Then, present spectrum highlighting significant studies been documented literature. The categorization cyberattacks, taking into account information characteristics, can help make possible provide organized effective solutions for potential applications. cyberattack classification covered thoroughly paper. also discusses historical incidents which depicts how harsh disastrous go if not detected mitigated. Finally, summary latest future trend open
Language: Английский
Citations
3Arabian Journal for Science and Engineering, Journal Year: 2022, Volume and Issue: 48(8), P. 10173 - 10188
Published: Dec. 24, 2022
Language: Английский
Citations
43