A Lightweight Security with Key Distribution Method in Mobile Ad-hoc Networks DOI

Ashish Kumar Soni,

Rajendra Gupta, Ankur Khare

et al.

Published: Nov. 23, 2023

A Mobile Ad-hoc Network (MANET) is the best network system in wireless communication because it has properties to connect devices without need for extra infrastructure and dynamic access. MANET used too much by devices, laptops, pc, any other gadgets but an insecure network. better security strategy can give protection fast speed giving time attackers MANET. In this paper, Lightweight Security with Key Distribution Method (LS-KMM) method combined Diffie-Hellman discrete distribution method. The authorized access concerned key exchange of manage right exchanging secure keys between users a strong scheme achieved at lightweight stopping attacks experimental test result presents that LS-KMM than existing methods, DES, 3DES, conventional AES, modified RC4, Blow-fish, RSA conditions encryption process time, running avalanche effect.

Language: Английский

Secured Network Architectures Based on Blockchain Technologies: A Systematic Review DOI Open Access

Song-Kyoo Kim,

Hou Cheng Vong

ACM Computing Surveys, Journal Year: 2025, Volume and Issue: unknown

Published: Jan. 25, 2025

Blockchain applications have emerged in recent decades, among which blockchain secured-networks serve as a prevalent application. This paper provides the potential of networks secured by technology to enhance various domains and structured view current landscape applications, capturing practical technology. Followed background overview, survey analysis latest advancements blockchain-secured is presented, categorized six application fields: Vehicular Ad-Hoc, Health Care, Smart Home, Unmanned Aerial Vehicle (UAV), Internet Things (IoT), Industrial IoT Networks. An in-depth discussion on these key research topics within provided, enhancing understanding their influence across multiple disciplines. The study overall conveys versatility networks, highlighting immense for fields. A comprehensive conducted, By providing trends application, this enables readers navigate information effectively identify areas interest, facilitating further exploration opportunities field

Language: Английский

Citations

1

PrivShieldROS: An Extended Robot Operating System Integrating Ethereum and Interplanetary File System for Enhanced Sensor Data Privacy DOI Creative Commons
Tianhao Wang, Ke Chen, Zhaohua Zheng

et al.

Sensors, Journal Year: 2024, Volume and Issue: 24(10), P. 3241 - 3241

Published: May 20, 2024

With the application of robotics in security monitoring, medical care, image analysis, and other high-privacy fields, vision sensor data robotic operating systems (ROS) faces challenge enhancing secure storage transmission. Recently, it has been proposed that distributed advantages blockchain be taken advantage to improve ROS. Still, limitations such as high latency large resource consumption. To address these issues, this paper introduces PrivShieldROS, an extended system developed by InterPlanetary File System (IPFS), blockchain, HybridABEnc enhance confidentiality The takes decentralized nature IPFS availability robustness while combining for fine-grained access control. In addition, ensures distribution mechanism using technology store content identifiers (CID) persistently. Finally, effectiveness is verified three experiments. Compared with state-of-the-art blockchain-extended ROS, PrivShieldROS shows improvements key metrics. This partly submitted IROS 2024.

Language: Английский

Citations

6

The Design of Security Algorithm RPBB-24-2 in Circuitous Route Across the Distributed Ledger DOI

S. Rajaprakash,

C. Bagath Basha,

Karthik Karthik

et al.

Lecture notes in networks and systems, Journal Year: 2025, Volume and Issue: unknown, P. 107 - 116

Published: Jan. 1, 2025

Language: Английский

Citations

0

IoT Data Transmission Security Using Blockchain With a Trust‐Weighted Proof of Authority Consensus Mechanism in Healthcare DOI
Shatakshi Kokate, Urmila Shrawankar

Transactions on Emerging Telecommunications Technologies, Journal Year: 2025, Volume and Issue: 36(5)

Published: May 1, 2025

ABSTRACT Healthcare systems generate vast amounts of sensitive data, and ensuring its security privacy remains a significant challenge. Various traditional solutions, including encryption techniques, access control mechanisms, centralized cloud‐based systems, have been developed to address these issues. However, approaches often face challenges such as single points failure, limited scalability, lack decentralized trust management. Encryption schemes AES RSA are computationally expensive do not inherently issues data integrity or transparency. At the same time, prone breaches third‐party vulnerabilities. This paper proposes blockchain‐based solution with trust‐weighted proof authority (PoA) consensus mechanism overcome limitations ensure secure transmission in Internet Things (IoT)‐enabled healthcare systems. The Density‐based Spatial Clustering Applications Noise (DBSCAN) algorithm is employed for classification, followed by Huffman encoding compression. Data encrypted using combination Substitution‐Caesar cipher Updated Elliptical Curve Cryptography (UECC). A novel PoA then used block validation, enhancing transmission. proposed achieves an accuracy 99.38%, F1 score 98.2%, precision 98.5%, recall 98%, throughput 65 Mbps, latency 0.23 s, processing time 17 s. results demonstrate that effectively addresses shortcomings methods, higher security,

Language: Английский

Citations

0

A Security-enhanced Advertising Platform based on Blockchain and Edge Computing in Generative AI DOI Creative Commons
Zhengjun Jing, Xiaolong Xu,

Chunseng Gu

et al.

Applied Artificial Intelligence, Journal Year: 2024, Volume and Issue: 38(1)

Published: April 11, 2024

With the development of advertising technology, especially emergence generative artificial intelligence, generation and editing content has become more convenient efficient. However, this also brings new security risks to digital advertising. For example, in order generate personalized content, AI can collect user behavior data without user's knowledge automatically ads that are beneficial advertisers. In addition, main issue regarding outdoor is whether platform deliver required by advertiser at designated place time according actual requirements customer. Combining blockchain edge computing paper builds a security-enhanced platform. The decentralized, non-tamperable traceable features technology provide with credibility between users advertisers, as well advertisers At same time, terminal controller processing capabilities improves efficiency enhances task balance server playback side. Experimental results show effectively manage identities maintain plans. It not only credibility, but good performance.

Language: Английский

Citations

3

Cache Optimization Methods Involving Node and Content Sharding of Blockchain in Internet of Vehicles DOI Creative Commons

Yawen Zhao,

Nan Ding

Electronics, Journal Year: 2024, Volume and Issue: 13(3), P. 560 - 560

Published: Jan. 30, 2024

Blockchain stands out in addressing the data security requirements of Internet Vehicles. However, blockchain has storage pressure that cannot be met by most existing nodes. The emergence Mobile Edge Computing allows nodes closer to users undertake caching and computation process. Although sharding can alleviate on nodes, frequent cross-shard communication affect overall performance blockchain. In this paper, combining features traffic flow with strong regional similarity as well inter-node correlation, we propose two methods based current Vehicle–Infrastructure–Clouds three-tier service model. proposed Content Sharding method optimize node improve cache-hitting ratio. effectively reduce system delay assisting cache whole together across network.

Language: Английский

Citations

1

The Design of Security Algorithm RPBB-24-1 in Multi-Way Path over the Distributed Ledger DOI Creative Commons

Bagath Basha C,

S. Rajaprakash,

Nitisha Aggarwal

et al.

International Journal of Electrical and Electronics Engineering, Journal Year: 2024, Volume and Issue: 11(4), P. 36 - 44

Published: April 30, 2024

Block Chain is one of the technologies that gaining popularity in modern world. The technology question offers an exceptionally robust level protection. Users do not have a lot information about Chain, but its security used to safeguard data sent several directions. This user continued utilize "ChaCha" and RBJ25 algorithms, which are considered be compact secure varieties. In this article, we present new mechanism decided call RPBB24-1. Two components make up RPBB-24-1 approach, encryption decryption. Five stages involved procedure. Assignment "Latin Alphabet cod" PT first step Multiplying number by itself four times using Equation (1) second step. Using encrypted data, third procedure involves swapping cell values, process begins with 0th value from most recent value. fourth dividing prime key into values matrix cells. Implementing algorithm fifth At long last, ordinary text transformed text. Unlike procedure, decryption approach works opposite direction. When compared currently use, suggested method higher security.

Language: Английский

Citations

1

A Blockchain-Driven Smart Broker for Data Quality Assurance of the Tagged Periodic IoT Data in Publisher-Subscriber Model DOI Creative Commons
Rabbia Idrees, Ananda Maiti

Applied Sciences, Journal Year: 2024, Volume and Issue: 14(13), P. 5907 - 5907

Published: July 5, 2024

The Publisher-Subscriber model of data exchange has been a popular method for many Internet-based applications, including the Internet Things (IoT). A traditional PS system consists publishers, subscribers, and broker. publishers create new registered topic, broker relays to corresponding subscribers. This paper introduces blockchain-based smart publisher-subscriber (PS) framework IoT network. As comes from devices operating in various environments, it may suffer multiple challenges, such as hardware failures, connectivity issues, external vulnerabilities, thereby impacting quality terms accuracy timeliness. It is important monitor this inform subscribers about its quality. proposed composed contracts that continuously topic by assessing relationship with other related topics drift or delay publishing intervals. assigns reputation score each computed based on drifts, passes both original measure subscriber. Furthermore, can suggest substitute when requested are unavailable very poor evaluation shows efficiently monitors data, efficiency increases notably worse. run inside blockchain, automatically inherits advantages scoring indisputable immutable data.

Language: Английский

Citations

1

Research on Distributed Secure Storage Framework of Industrial Internet of Things Data Based on Blockchain DOI Open Access
Hongliang Tian,

Guangtao Huang

Electronics, Journal Year: 2024, Volume and Issue: 13(23), P. 4812 - 4812

Published: Dec. 6, 2024

The conventional centralized Industrial Internet of Things (IIoT) framework is plagued by issues like subpar security performance and challenges related to storage expansion. This paper proposes a two-tier distributed secure based on blockchain for IIoT data. authors first introduce the two-layer framework, which includes edge network layer layer. nodes in are classified into administrator ordinary nodes. It provides lower latency environment compared cloud computing preprocess raw industrial space keep data traceable. Secondly, propose differentiated solution. Based timestamps specific media access control (MAC) address, Universally Unique Identifier (UUID) generated uploaded storage. Encrypt corresponding using elliptic curve cryptography algorithm, then upload it InterPlanetary File System (IPFS) expand capacity blockchain. Deploy smart contract compare UUIDs consistency an automated, lightweight method determine integrity. Finally, we analyze advantages brought integration IIoT. Additionally, design comparative tests different methods. results prove that this paper’s scheme improved, extended. Noteworthy enhancements include heightened throughput minimized delay overhead.

Language: Английский

Citations

1

IPFS як засіб підвищення ефективності DVPN DOI Creative Commons

Марія Алієва

InterConf, Journal Year: 2024, Volume and Issue: 41(185), P. 519 - 525

Published: Jan. 19, 2024

Ця робота досліджує застосування децентралізованих VPN (DVPN) з використанням блокчейн-технології для підвищення безпеки мереж Інтернету речей (ІоТ) від атак типу “людина посередині” (MitM). Робота розкриває ключові переваги та виклики впровадження технології DVPN у мережі ІоТ, приділенням основної уваги подоланню високих вимог до ресурсів при застосуванні блокчейну. З метою вирішення проблематики було запропоновано поєднати міжпланетною файловою системою (InterPlanetary File System, IPFS), що дозволить зменшити навантаження на ресурси ІоТ-пристроїв.

Citations

0