Blockchain-based intelligent tracing of food grain crops from production to delivery DOI
Udit Agarwal, Vinay Rishiwal,

Mohd. Shiblee

et al.

Peer-to-Peer Networking and Applications, Journal Year: 2024, Volume and Issue: unknown

Published: Sept. 2, 2024

Language: Английский

Leveraging Blockchain Technology for Ensuring Security and Privacy Aspects in Internet of Things: A Systematic Literature Review DOI Creative Commons
Haider Dhia Zubaydi, Pál Varga, Sándor Molnár

et al.

Sensors, Journal Year: 2023, Volume and Issue: 23(2), P. 788 - 788

Published: Jan. 10, 2023

As the Internet of Things (IoT) concept materialized worldwide in complex ecosystems, related data security and privacy issues became apparent. While system elements their communication paths could be protected individually, generic, ecosystem-wide approaches were sought after as well. On a parallel timeline to IoT, distributed ledgers blockchains came into technological limelight. Blockchains offer many advantageous features relation enhanced security, anonymity, increased capacity, peer-to-peer capabilities. Although blockchain technology can provide IoT with effective efficient solutions, there are challenges various aspects integrating these technologies. anonymity/data privacy, smart contract-related apparently for technologies (BCT), storage capacity/scalability, resource utilization, transaction rate scalability, predictability, legal issues. This paper provides systematic review on state-of-the-art BCT integration, specifically order solve certain security- privacy-related The first brief overview IoT's basic principles, including architecture, protocols consensus algorithms, characteristics, them. Afterwards, it describes survey methodology, search strategy, eligibility criteria, selection results, characteristics included articles. Later, we highlight findings this study which illustrates different works that addressed integration tackle followed by categorization applications have been investigated such primary information, objective, development level, target application, type platform, algorithm, evaluation environment metrics, future or open (if any), further notes consideration. Furthermore, detailed discussion all articles is from an architectural operational perspective. Finally, cover major gaps considerations taken account when IoT.

Language: Английский

Citations

109

Blockchain Application in Healthcare Systems: A Review DOI Creative Commons

Pranto Kumar Ghosh,

Arindom Chakraborty, Mehedi Hasan

et al.

Systems, Journal Year: 2023, Volume and Issue: 11(1), P. 38 - 38

Published: Jan. 8, 2023

In the recent years, blockchain technology has gained significant attention in healthcare sector. It potential to alleviate a wide variety of major difficulties electronic health record systems. This study presents an elaborate overview existing research works on applications industry. paper evaluates 144 articles that discuss importance and limits using technologies improve operations. The objective is demonstrate technology’s uses highlight possible sectors for future domain. starts with extensive background its features. Then, focuses providing literature review selected current themes blockchain-based After that, application areas along solutions provided by systems are pointed out. Finally, discussion section provides insight into limitations, challenges directions.

Language: Английский

Citations

96

Artificial intelligence and blockchain technology for secure smart grid and power distribution Automation: A State-of-the-Art Review DOI
Abdullah Ayub Khan, Asif Ali Laghari, Mamoon Rashid

et al.

Sustainable Energy Technologies and Assessments, Journal Year: 2023, Volume and Issue: 57, P. 103282 - 103282

Published: May 12, 2023

Language: Английский

Citations

92

Lightweight-BIoV: Blockchain Distributed Ledger Technology (BDLT) for Internet of Vehicles (IoVs) DOI Open Access
Asif Ali Laghari, Abdullah Ayub Khan, Reem Alkanhel

et al.

Electronics, Journal Year: 2023, Volume and Issue: 12(3), P. 677 - 677

Published: Jan. 29, 2023

The vast enhancement in the development of Internet Vehicles (IoV) is due to impact distributed emerging technology and topology industrial IoV. It has created a new paradigm, such as security-related resource constraints Industry 5.0. A revolution dimension IoV popup raise various critical challenges existing information preservation, especially node transactions communication, transmission, trust privacy, security-protection-related problems, which have been analyzed. These aspects pose serious problems for industry provide vehicular-related data integrity, availability, exchange reliability, provenance, trustworthiness overall activities service delivery prospects against increasing number multiple transactions. In addition, there lot research interest that intersects with blockchain association. this regard, inadequate performance connected nodes high requirements consortium ledger not yet tackled complete solution. introduction NuCypher Re-encryption infrastructure, hashing tree allocation, proof-of-work require more computational power well. This paper contributes two different folds. First, it proposes sawtooth-enabled modular architecture protected, secure, trusted execution, delivery, acknowledgment immutable storage security peer-to-peer (P2P) network on-chain off-chain inter-communication vehicular activities. Secondly, we design create smart contract-enabled structure order smooth streamlined broadcast content. Substantially, develop deploy hyperledger sawtooth-aware customized consensus investigations. For validation purposes, simulate related details between devices on simulation results show proposed BIoV reduces cost down 37.21% robust generation up 56.33%. Therefore, only 41.93% 47.31% Vehicles-related resources are kept used, respectively.

Language: Английский

Citations

68

Data Security in Healthcare Industrial Internet of Things With Blockchain DOI
Abdullah Ayub Khan, Sami Bourouis, M. M. Kamruzzaman

et al.

IEEE Sensors Journal, Journal Year: 2023, Volume and Issue: 23(20), P. 25144 - 25151

Published: May 11, 2023

The industrial Internet of Things (IIoT) has gained more attention because the self-governing nature system configuration with interoperable application connectivity. In E-healthcare environment, it cooperates medical sensors to capture, examine, analyze, preserve, and document day-to-day transactions patients in real-time. integration IIoT provides an analytical platform handle a large amount data low cost cloud-enabling scalable storage. Throughout transformation, patients' personal information is at risk while exchanging records over centralized server-based systems. Thus, rate node connectivity, failure parallel sharing, deliverance-related issues increase. this article, we present solutions three folds. First, article proposes novel secure architecture for security using blockchain-distributed ledger technology named BHIIoT. Second, transformation lifecycle wireless sensor networks (WSNs) management optimization distributed layered hierarchy developed, which enhances network resources increases trust blockchain-enabled peer-to-peer (P2P) environment. Third, proposed BHIIoT uses NuCypher threshold re-encryption mechanism encryption protects shared form blocks preserved blockchain immutable For instance, chain codes are deployed automate authentication, logging, index deliverance, trace resist illegal activities application. customized lightweight multi-proof-of-work (PoW) multi-proof-of-stake (PoS) designed digital signature improving consumption reducing load storage transaction process scheduled.

Language: Английский

Citations

64

Detection of Real-Time Malicious Intrusions and Attacks in IoT Empowered Cybersecurity Infrastructures DOI Creative Commons
Irfan Ali Kandhro, Sultan M. Alanazi, Fayyaz Ali

et al.

IEEE Access, Journal Year: 2023, Volume and Issue: 11, P. 9136 - 9148

Published: Jan. 1, 2023

Computer viruses, malicious, and other hostile attacks can affect a computer network. Intrusion detection is key component of network security as an active defence technology. Traditional intrusion systems struggle with issues like poor accuracy, ineffective detection, high percentage false positives, inability to handle new types intrusions. To address these issues, we propose deep learning-based novel method detect cybersecurity vulnerabilities breaches in cyber-physical systems. The proposed framework contrasts the unsupervised discriminative approaches. This paper presents generative adversarial cyber threats IoT-driven IICs networks. results demonstrate performance increase approximately 95% 97% terms reliability, efficiency detecting all dropout value 0.2 epoch 25. output well-known state-of-the-art DL classifiers achieved highest true rate (TNR) (HDR) when following attacks: (BruteForceXXS, BruteForceWEB, DoS_Hulk_Attack, DOS_LOIC_HTTP_Attack) on NSL-KDD, KDDCup99, UNSW-NB15 datasets. It also maintained confidentiality integrity users' systems' sensitive information during training testing phases.

Language: Английский

Citations

58

Security and Privacy of Technologies in Health Information Systems: A Systematic Literature Review DOI Creative Commons

Parisasadat Shojaei,

Elena Vlahu‐Gjorgievska, Yang-Wai Chow

et al.

Computers, Journal Year: 2024, Volume and Issue: 13(2), P. 41 - 41

Published: Jan. 31, 2024

Health information systems (HISs) have immense value for healthcare institutions, as they provide secure storage, efficient retrieval, insightful analysis, seamless exchange, and collaborative sharing of patient health information. HISs are implemented to meet needs, well ensure the security privacy medical data, including confidentiality, integrity, availability, which necessary achieve high-quality services. This systematic literature review identifies various technologies methods currently employed enhance data within HISs. Various been utilized information, such IoT, blockchain, mobile applications, cloud computing, combined technologies. study also three key aspects, namely, access control, sharing, discusses challenges faced in each aspect that must be enhanced

Language: Английский

Citations

35

Secure Remote Sensing Data With Blockchain Distributed Ledger Technology: A Solution for Smart Cities DOI Creative Commons
Abdullah Ayub Khan, Asif Ali Laghari, Roobaea Alroobaea

et al.

IEEE Access, Journal Year: 2024, Volume and Issue: 12, P. 69383 - 69396

Published: Jan. 1, 2024

Particularly in the context of smart cities, remote sensing data (RSD) has emerged as one hottest study topics information and communication technology (ICT) today. The development machine learning (ML) artificial intelligence (AI) made it possible to solve a number issues, including automation, control access, optimization, monitoring, management. Simultaneously, there are significant issues with design process hierarchy, inadequate training records, centralized architecture, privacy protection, overall resource consumption restrictions. Distributed Ledger Technology (DLT), on other hand, provides decentralized infrastructure that allows systems eliminate data-sharing procedures cities while transferring from network node node, third-party access solves issues. To an ideal delivery mechanism for analytical model, paper employs Partial Swam Optimization (POS) conjunction secure blockchain distributed consortium network. This work makes three contributions. Firstly, offers safe transmission method combines optimize path reliable across channels. Second, neighborhood encryption sequences carried out using NuCypher proxy re-encryption-enabled value encryption, public key cryptographic approach avoids cypher conversion. Third, Artificial Neural Networks (ANNs) can deliverance classification problem by optimizing record management preservation.

Language: Английский

Citations

26

Security of Smart Grid: Cybersecurity Issues, Potential Cyberattacks, Major Incidents, and Future Directions DOI Creative Commons
Mohammad Ahmed Alomari, Mohammed Nasser Al-Andoli, Mukhtar Ghaleb

et al.

Energies, Journal Year: 2025, Volume and Issue: 18(1), P. 141 - 141

Published: Jan. 1, 2025

Despite the fact that countless IoT applications are arising frequently in various fields, such as green cities, net-zero decarbonization, healthcare systems, and smart vehicles, grid is considered most critical cyber–physical application. With emerging technologies supporting much-anticipated energy particularly grid, these systems will continue to profoundly transform our way of life environment. Energy have improved over past ten years terms intelligence, efficiency, decentralization, ICT usage. On other hand, cyber threats attacks against greatly expanded a result enormous spread sensors devices inside sector well traditional power grids. In order detect mitigate vulnerabilities while increasing security grids, thorough investigation in-depth research highly required. This study offers comprehensive overview state-of-the-art cybersecurity research. this work, we primarily concentrate on examining numerous cyberattacks recently invaded developing general grids particular. begins by introducing architecture, it key components, its issues. Then, present spectrum highlighting significant studies been documented literature. The categorization cyberattacks, taking into account information characteristics, can help make possible provide organized effective solutions for potential applications. cyberattack classification covered thoroughly paper. also discusses historical incidents which depicts how harsh disastrous go if not detected mitigated. Finally, summary latest future trend open

Language: Английский

Citations

3

IoT with Multimedia Investigation: A Secure Process of Digital Forensics Chain-of-Custody using Blockchain Hyperledger Sawtooth DOI
Abdullah Ayub Khan, Aftab Ahmed Shaikh, Asif Ali Laghari

et al.

Arabian Journal for Science and Engineering, Journal Year: 2022, Volume and Issue: 48(8), P. 10173 - 10188

Published: Dec. 24, 2022

Language: Английский

Citations

43