A
Mobile
Ad-hoc
Network
(MANET)
is
the
best
network
system
in
wireless
communication
because
it
has
properties
to
connect
devices
without
need
for
extra
infrastructure
and
dynamic
access.
MANET
used
too
much
by
devices,
laptops,
pc,
any
other
gadgets
but
an
insecure
network.
better
security
strategy
can
give
protection
fast
speed
giving
time
attackers
MANET.
In
this
paper,
Lightweight
Security
with
Key
Distribution
Method
(LS-KMM)
method
combined
Diffie-Hellman
discrete
distribution
method.
The
authorized
access
concerned
key
exchange
of
manage
right
exchanging
secure
keys
between
users
a
strong
scheme
achieved
at
lightweight
stopping
attacks
experimental
test
result
presents
that
LS-KMM
than
existing
methods,
DES,
3DES,
conventional
AES,
modified
RC4,
Blow-fish,
RSA
conditions
encryption
process
time,
running
avalanche
effect.
ACM Computing Surveys,
Journal Year:
2025,
Volume and Issue:
unknown
Published: Jan. 25, 2025
Blockchain
applications
have
emerged
in
recent
decades,
among
which
blockchain
secured-networks
serve
as
a
prevalent
application.
This
paper
provides
the
potential
of
networks
secured
by
technology
to
enhance
various
domains
and
structured
view
current
landscape
applications,
capturing
practical
technology.
Followed
background
overview,
survey
analysis
latest
advancements
blockchain-secured
is
presented,
categorized
six
application
fields:
Vehicular
Ad-Hoc,
Health
Care,
Smart
Home,
Unmanned
Aerial
Vehicle
(UAV),
Internet
Things
(IoT),
Industrial
IoT
Networks.
An
in-depth
discussion
on
these
key
research
topics
within
provided,
enhancing
understanding
their
influence
across
multiple
disciplines.
The
study
overall
conveys
versatility
networks,
highlighting
immense
for
fields.
A
comprehensive
conducted,
By
providing
trends
application,
this
enables
readers
navigate
information
effectively
identify
areas
interest,
facilitating
further
exploration
opportunities
field
Sensors,
Journal Year:
2024,
Volume and Issue:
24(10), P. 3241 - 3241
Published: May 20, 2024
With
the
application
of
robotics
in
security
monitoring,
medical
care,
image
analysis,
and
other
high-privacy
fields,
vision
sensor
data
robotic
operating
systems
(ROS)
faces
challenge
enhancing
secure
storage
transmission.
Recently,
it
has
been
proposed
that
distributed
advantages
blockchain
be
taken
advantage
to
improve
ROS.
Still,
limitations
such
as
high
latency
large
resource
consumption.
To
address
these
issues,
this
paper
introduces
PrivShieldROS,
an
extended
system
developed
by
InterPlanetary
File
System
(IPFS),
blockchain,
HybridABEnc
enhance
confidentiality
The
takes
decentralized
nature
IPFS
availability
robustness
while
combining
for
fine-grained
access
control.
In
addition,
ensures
distribution
mechanism
using
technology
store
content
identifiers
(CID)
persistently.
Finally,
effectiveness
is
verified
three
experiments.
Compared
with
state-of-the-art
blockchain-extended
ROS,
PrivShieldROS
shows
improvements
key
metrics.
This
partly
submitted
IROS
2024.
Transactions on Emerging Telecommunications Technologies,
Journal Year:
2025,
Volume and Issue:
36(5)
Published: May 1, 2025
ABSTRACT
Healthcare
systems
generate
vast
amounts
of
sensitive
data,
and
ensuring
its
security
privacy
remains
a
significant
challenge.
Various
traditional
solutions,
including
encryption
techniques,
access
control
mechanisms,
centralized
cloud‐based
systems,
have
been
developed
to
address
these
issues.
However,
approaches
often
face
challenges
such
as
single
points
failure,
limited
scalability,
lack
decentralized
trust
management.
Encryption
schemes
AES
RSA
are
computationally
expensive
do
not
inherently
issues
data
integrity
or
transparency.
At
the
same
time,
prone
breaches
third‐party
vulnerabilities.
This
paper
proposes
blockchain‐based
solution
with
trust‐weighted
proof
authority
(PoA)
consensus
mechanism
overcome
limitations
ensure
secure
transmission
in
Internet
Things
(IoT)‐enabled
healthcare
systems.
The
Density‐based
Spatial
Clustering
Applications
Noise
(DBSCAN)
algorithm
is
employed
for
classification,
followed
by
Huffman
encoding
compression.
Data
encrypted
using
combination
Substitution‐Caesar
cipher
Updated
Elliptical
Curve
Cryptography
(UECC).
A
novel
PoA
then
used
block
validation,
enhancing
transmission.
proposed
achieves
an
accuracy
99.38%,
F1
score
98.2%,
precision
98.5%,
recall
98%,
throughput
65
Mbps,
latency
0.23
s,
processing
time
17
s.
results
demonstrate
that
effectively
addresses
shortcomings
methods,
higher
security,
Applied Artificial Intelligence,
Journal Year:
2024,
Volume and Issue:
38(1)
Published: April 11, 2024
With
the
development
of
advertising
technology,
especially
emergence
generative
artificial
intelligence,
generation
and
editing
content
has
become
more
convenient
efficient.
However,
this
also
brings
new
security
risks
to
digital
advertising.
For
example,
in
order
generate
personalized
content,
AI
can
collect
user
behavior
data
without
user's
knowledge
automatically
ads
that
are
beneficial
advertisers.
In
addition,
main
issue
regarding
outdoor
is
whether
platform
deliver
required
by
advertiser
at
designated
place
time
according
actual
requirements
customer.
Combining
blockchain
edge
computing
paper
builds
a
security-enhanced
platform.
The
decentralized,
non-tamperable
traceable
features
technology
provide
with
credibility
between
users
advertisers,
as
well
advertisers
At
same
time,
terminal
controller
processing
capabilities
improves
efficiency
enhances
task
balance
server
playback
side.
Experimental
results
show
effectively
manage
identities
maintain
plans.
It
not
only
credibility,
but
good
performance.
Electronics,
Journal Year:
2024,
Volume and Issue:
13(3), P. 560 - 560
Published: Jan. 30, 2024
Blockchain
stands
out
in
addressing
the
data
security
requirements
of
Internet
Vehicles.
However,
blockchain
has
storage
pressure
that
cannot
be
met
by
most
existing
nodes.
The
emergence
Mobile
Edge
Computing
allows
nodes
closer
to
users
undertake
caching
and
computation
process.
Although
sharding
can
alleviate
on
nodes,
frequent
cross-shard
communication
affect
overall
performance
blockchain.
In
this
paper,
combining
features
traffic
flow
with
strong
regional
similarity
as
well
inter-node
correlation,
we
propose
two
methods
based
current
Vehicle–Infrastructure–Clouds
three-tier
service
model.
proposed
Content
Sharding
method
optimize
node
improve
cache-hitting
ratio.
effectively
reduce
system
delay
assisting
cache
whole
together
across
network.
International Journal of Electrical and Electronics Engineering,
Journal Year:
2024,
Volume and Issue:
11(4), P. 36 - 44
Published: April 30, 2024
Block
Chain
is
one
of
the
technologies
that
gaining
popularity
in
modern
world.
The
technology
question
offers
an
exceptionally
robust
level
protection.
Users
do
not
have
a
lot
information
about
Chain,
but
its
security
used
to
safeguard
data
sent
several
directions.
This
user
continued
utilize
"ChaCha"
and
RBJ25
algorithms,
which
are
considered
be
compact
secure
varieties.
In
this
article,
we
present
new
mechanism
decided
call
RPBB24-1.
Two
components
make
up
RPBB-24-1
approach,
encryption
decryption.
Five
stages
involved
procedure.
Assignment
"Latin
Alphabet
cod"
PT
first
step
Multiplying
number
by
itself
four
times
using
Equation
(1)
second
step.
Using
encrypted
data,
third
procedure
involves
swapping
cell
values,
process
begins
with
0th
value
from
most
recent
value.
fourth
dividing
prime
key
into
values
matrix
cells.
Implementing
algorithm
fifth
At
long
last,
ordinary
text
transformed
text.
Unlike
procedure,
decryption
approach
works
opposite
direction.
When
compared
currently
use,
suggested
method
higher
security.
Applied Sciences,
Journal Year:
2024,
Volume and Issue:
14(13), P. 5907 - 5907
Published: July 5, 2024
The
Publisher-Subscriber
model
of
data
exchange
has
been
a
popular
method
for
many
Internet-based
applications,
including
the
Internet
Things
(IoT).
A
traditional
PS
system
consists
publishers,
subscribers,
and
broker.
publishers
create
new
registered
topic,
broker
relays
to
corresponding
subscribers.
This
paper
introduces
blockchain-based
smart
publisher-subscriber
(PS)
framework
IoT
network.
As
comes
from
devices
operating
in
various
environments,
it
may
suffer
multiple
challenges,
such
as
hardware
failures,
connectivity
issues,
external
vulnerabilities,
thereby
impacting
quality
terms
accuracy
timeliness.
It
is
important
monitor
this
inform
subscribers
about
its
quality.
proposed
composed
contracts
that
continuously
topic
by
assessing
relationship
with
other
related
topics
drift
or
delay
publishing
intervals.
assigns
reputation
score
each
computed
based
on
drifts,
passes
both
original
measure
subscriber.
Furthermore,
can
suggest
substitute
when
requested
are
unavailable
very
poor
evaluation
shows
efficiently
monitors
data,
efficiency
increases
notably
worse.
run
inside
blockchain,
automatically
inherits
advantages
scoring
indisputable
immutable
data.
Electronics,
Journal Year:
2024,
Volume and Issue:
13(23), P. 4812 - 4812
Published: Dec. 6, 2024
The
conventional
centralized
Industrial
Internet
of
Things
(IIoT)
framework
is
plagued
by
issues
like
subpar
security
performance
and
challenges
related
to
storage
expansion.
This
paper
proposes
a
two-tier
distributed
secure
based
on
blockchain
for
IIoT
data.
authors
first
introduce
the
two-layer
framework,
which
includes
edge
network
layer
layer.
nodes
in
are
classified
into
administrator
ordinary
nodes.
It
provides
lower
latency
environment
compared
cloud
computing
preprocess
raw
industrial
space
keep
data
traceable.
Secondly,
propose
differentiated
solution.
Based
timestamps
specific
media
access
control
(MAC)
address,
Universally
Unique
Identifier
(UUID)
generated
uploaded
storage.
Encrypt
corresponding
using
elliptic
curve
cryptography
algorithm,
then
upload
it
InterPlanetary
File
System
(IPFS)
expand
capacity
blockchain.
Deploy
smart
contract
compare
UUIDs
consistency
an
automated,
lightweight
method
determine
integrity.
Finally,
we
analyze
advantages
brought
integration
IIoT.
Additionally,
design
comparative
tests
different
methods.
results
prove
that
this
paper’s
scheme
improved,
extended.
Noteworthy
enhancements
include
heightened
throughput
minimized
delay
overhead.
InterConf,
Journal Year:
2024,
Volume and Issue:
41(185), P. 519 - 525
Published: Jan. 19, 2024
Ця
робота
досліджує
застосування
децентралізованих
VPN
(DVPN)
з
використанням
блокчейн-технології
для
підвищення
безпеки
мереж
Інтернету
речей
(ІоТ)
від
атак
типу
“людина
посередині”
(MitM).
Робота
розкриває
ключові
переваги
та
виклики
впровадження
технології
DVPN
у
мережі
ІоТ,
приділенням
основної
уваги
подоланню
високих
вимог
до
ресурсів
при
застосуванні
блокчейну.
З
метою
вирішення
проблематики
було
запропоновано
поєднати
міжпланетною
файловою
системою
(InterPlanetary
File
System,
IPFS),
що
дозволить
зменшити
навантаження
на
ресурси
ІоТ-пристроїв.