Novel Lightweight Encryption Scheme Based on Transformation Matrix and ChaCha20 Algorithm for Secure Snap Transmission DOI

V. Sellam,

Ranjith Kumar Manoharan,

Virendra Kumar

et al.

Published: Oct. 25, 2024

Language: Английский

Blockchain-Enabled Secure Data Aggregation Routing (BSDAR) Protocol for IoT-Integrated Next-Generation Sensor Networks for Enhanced Security DOI Open Access

N Vidhya,

Ch Meenakshi

International Journal of Computational and Experimental Science and Engineering, Journal Year: 2025, Volume and Issue: 11(1)

Published: Jan. 5, 2025

WSNs, due to their special characteristics as compared conventional networks, have become the focus of extensive research. A large-scale IoT forms backbone billions resource-constrained next-generation sensors interconnected with each other. Their deployments remain one most serious challenges existing security mechanisms dynamic devices, which could not provide efficient protection against malicious adversaries. Besides, routing protocols are vulnerable various threats from unreliability and open-access nature internet. This research article presents a novel blockchain-enabled secure data aggregation model protocol for in IoT-integrated networks using sensor nodes. The BSDAR is capable improving energy performance while ensuring strong node-level shield attacks. It first organizes networking nodal points into autonomous clusters different radii effectively avoid holes around BS. Then, uses A-star based heuristics strategy construct well-organized non-looping paths. has integrated blockchain technology goal communication process. In that, end-to-end preserved by decentralized tamper-proof approach simulation results prove that significantly outperforms solutions consumption, throughput, network lifetime time complexity, thus presenting promising solution scalable deployments.

Language: Английский

Citations

7

Machine Learning for Blockchain and IoT Systems in Smart Cities: A Survey DOI Creative Commons
Ηλίας Δρίτσας, Μαρία Τρίγκα

Future Internet, Journal Year: 2024, Volume and Issue: 16(9), P. 324 - 324

Published: Sept. 6, 2024

The integration of machine learning (ML), blockchain, and the Internet Things (IoT) in smart cities represents a pivotal advancement urban innovation. This convergence addresses complexities modern environments by leveraging ML’s data analytics predictive capabilities to enhance intelligence IoT systems, while blockchain provides secure, decentralized framework that ensures integrity trust. synergy these technologies not only optimizes management but also fortifies security privacy increasingly connected cities. survey explores transformative potential ML-driven blockchain-IoT ecosystems enabling autonomous, resilient, sustainable city infrastructure. It discusses challenges such as scalability, privacy, ethical considerations, outlines possible applications future research directions are critical for advancing initiatives. Understanding dynamics is essential realizing full cities, where technology enhances efficiency sustainability resilience.

Language: Английский

Citations

7

BFLIDS: Blockchain-Driven Federated Learning for Intrusion Detection in IoMT Networks DOI Creative Commons
Khadija Begum, Md Ariful Islam Mozumder,

Moon-Il Joo

et al.

Sensors, Journal Year: 2024, Volume and Issue: 24(14), P. 4591 - 4591

Published: July 15, 2024

The Internet of Medical Things (IoMT) has significantly advanced healthcare, but it also brought about critical security challenges. Traditional solutions struggle to keep pace with the dynamic and interconnected nature IoMT systems. Machine learning (ML)-based Intrusion Detection Systems (IDS) have been increasingly adopted counter cyberattacks, centralized ML approaches pose privacy risks due single points failure (SPoFs). Federated Learning (FL) emerges as a promising solution, enabling model updates directly on end devices without sharing private data central server. This study introduces BFLIDS, Blockchain-empowered Learning-based IDS designed enhance intrusion detection in networks. Our approach leverages blockchain secure transaction records, FL maintain by training models locally, IPFS for decentralized storage, MongoDB efficient management. Ethereum smart contracts (SCs) oversee all interactions transactions within system. We modified FedAvg algorithm Kullback-Leibler divergence estimation adaptive weight calculation boost accuracy robustness against adversarial attacks. For classification, we implemented an Adaptive Max Pooling-based Convolutional Neural Network (CNN) Bidirectional Long Short-Term Memory (BiLSTM) attention residual connections Edge-IIoTSet TON-IoT datasets. achieved accuracies 97.43% (for CNNs Edge-IIoTSet), 96.02% BiLSTM 98.21% TON-IoT), 97.42% TON-IoT) scenarios, which are competitive methods. proposed BFLIDS effectively detects intrusions, enhancing

Language: Английский

Citations

6

The Role of Blockchain and AI in Fortifying Cybersecurity for Healthcare Systems DOI Open Access

M. Husain Bathushaw,

S. Nagasundaram

International Journal of Computational and Experimental Science and Engineering, Journal Year: 2024, Volume and Issue: 10(4)

Published: Nov. 24, 2024

In a simulated healthcare setting, the algorithms were assessed based on organized threat insight data, inconsistency location executed with blockchain-enhanced access control, and machine learning-driven interruption detection. The test results depiction showed that all calculations feasible, an accuracy range of 0.88-0.94 lift defined between 0.75 1; knowledge values ranging from.86 to.92, F1 scores above.90 are displayed as follows: Above all, TIAA excelled in risk insights management; ADA exceeded expectations detecting inconsistencies; BACA used blockchain to fortify control; ML-IDS produced remarkable intrusion importance these addressing particular cybersecurity concerns industry is highlighted through comparative comparison similar studies. suggested relevant growing conversation about because they offer comprehensive strategy protect private health guarantee reliability assessment models, organizations against variety evolving cyberthreats.

Language: Английский

Citations

6

Smart Contracts Management: The Interplay of Data Privacy and Blockchain for Secure and Efficient Real Estate Transactions DOI Open Access

Olumide Samuel Ogungbemi

Journal of Engineering Research and Reports, Journal Year: 2024, Volume and Issue: 26(8), P. 278 - 300

Published: Aug. 7, 2024

The digital transformation of the real estate industry is being significantly influenced by blockchain technology and smart contracts, which promise enhanced efficiency, transparency, security in transactions. This study aims to develop a secure efficient contract management protocol that balances benefits with robust data privacy practices. methodology involves descriptive analytics transaction from Ethereum blockchain, feasibility studies using synthetic data, regulatory compliance analysis map impact different regions' regulations on adoption estate. findings reveal while contracts can automate various processes reduce reliance intermediaries, challenges related persist. Higher features are associated increased execution costs, indicating trade-off between cost efficiency. Smart level 3 had an 0.025 ETH, compared those 1 at 0.02 ETH. Integrating permissioned blockchains zero-knowledge proofs offers promising solution, though their complexity limits broader adoption. Zero-knowledge maintained high (achieving levels up 0.76) reasonable computational (proof generation time 1.9 seconds). Thus, integration pathway address these challenges. However, techniques requires specialized knowledge, limiting concludes recommendations training programs, collaborate frameworks, invest advanced cryptographic research, implement targeted strategies overcome barriers. These efforts will contribute asset management, fostering innovation enhancing overall efficiency

Language: Английский

Citations

4

Integrating IoT and Blockchain for Secure Computer Network DOI

Rachappa Jopate,

Divyajyothi M. G,

P. Devika

et al.

SSRN Electronic Journal, Journal Year: 2025, Volume and Issue: unknown

Published: Jan. 1, 2025

The fast-growing Internet of Things (IoT) has boom up industries by announcing a complete interconnection between the real-time, which leads to data exchange and connectivity. In presence so many devices that are interconnected with IoT, issue their insecurity manifests itself absolutely any such network its CONNEСTION will turn out be subject cyberattacks unauthorized access stored data. But blockchain offers way forward in decentralized, un-editable, traceable system record. this paper, proposed methodology focuses bring IoT & Blockchain technologies together organize secured computer networks. With mind, purpose paper is provide an overview how cryptographic principles can applied for securing communications protect against tampering supporting as well decentralized trust mechanisms. Furthermore, explores limitations on deployment settings related dimensions scalability, latency resource constraints some means aforementioned challenges may assuaged. This would allow networks become more secure, integrity improved interactions less should make entire vulnerable StegLoaded. investigation state-of-the-art, use-cases used integration secure

Language: Английский

Citations

0

Securing IoT Sensors Using Sharding-Based Blockchain Network Technology Integration: A Systematic Review DOI Creative Commons
A.Mohamed Aslam, Octavian Postolache, Sancho Oliveira

et al.

Sensors, Journal Year: 2025, Volume and Issue: 25(3), P. 807 - 807

Published: Jan. 29, 2025

Sharding is an emerging blockchain technology that used extensively in several fields such as finance, reputation systems, the IoT, and others because of its ability to secure increase number transactions every second. In sharding-based technology, divided into sub-chains, also known shards, enhance network throughput. This paper aims examine impact integrating securing IoT sensors, which further for environmental monitoring. this paper, idea proposed, along with advantages disadvantages, by conducting a systematic literature review studies based on recent years. Based research findings, beneficial systems improving security, access, transaction rates. The findings suggest issues, cross-shard transactions, synchronization concentration stakes. With increased focus showcasing important trade-offs, offers recommendations implementation sensors applications environment These valuable insights are effective facilitating informed decisions while developing more efficient decentralized networks internet data centers (IDCs), monitoring picking out key points data.

Language: Английский

Citations

0

Balancing data privacy and sharing in IIoT: Introducing the GFL-LFF aggregation algorithm DOI

R. Regan,

R. Josphineleela,

Mohammad Khamruddin

et al.

Computer Networks, Journal Year: 2024, Volume and Issue: 247, P. 110401 - 110401

Published: May 2, 2024

Language: Английский

Citations

2

Enhancing Security and Energy Efficiency in Wireless Sensor Networks for IoT Applications DOI Creative Commons
Ibrahim Aqeel

Deleted Journal, Journal Year: 2024, Volume and Issue: 20(3s), P. 807 - 816

Published: April 4, 2024

Wireless Sensor Networks (WSNs) are fundamental components within the Internet of Things (IoT) scene, empowering information collection and transmission in different applications. This research papers on upgrading security vitality effectiveness WSNs for ideal IoT usefulness. Novel strategies were created assessed to address these vital perspectives. Security improvements included usage lightweight cryptographic calculations, intrusion detection systems (IDS), secure directing conventions. These measures essentially reinforced organized strength against cyber dangers, with interruption discovery rates surpassing 95% steering conventions accomplishing a score over 97%. Vitality productivity optimizations enveloped communication convention improvements, accumulation strategies, energetic control administration methodologies. procedures come about outstanding decreases utilization, optimized diminishing utilization by up 30% conglomeration techniques yielding reserve funds 50%. Test assessments conducted utilizing both simulation-based approaches real-world organizations. Recreation comes about, obtained NS-3, showcasing viability proposed network topologies, activity designs, attack scenarios. Real-world experimentation employing WSN testbed approved viable achievability techniques. Comparative investigations existing writing highlighted oddity importance commitments, checking considerable progressions proficiency.

Language: Английский

Citations

1

DCGFuzz: An Embedded Firmware Security Analysis Method with Dynamically Co-Directional Guidance Fuzzing DOI Open Access
Yunzhi Wang, Yufeng Li

Electronics, Journal Year: 2024, Volume and Issue: 13(8), P. 1433 - 1433

Published: April 10, 2024

Microcontroller Units (MCUs) play a vital role in embedded devices due to their energy efficiency and scalability. The firmware MCUs contains vulnerabilities that can lead digital physical harm. However, testing MCU faces challenges various tool limitations unavailable details. To address this problem, research is turning fuzzing rehosting. Due the inherent imbalance computational resources of algorithm lack consideration for resource requirements rehosting methods, some hardware behavior-related paths are difficult discover. In work, we propose novel Dynamically Co-directional Guidance Fuzzing (DCGFuzz) method improve security analysis efficiency. Our dynamically correlates allocation both rehosting, computing unified power schedule score. Using score, adjust test frequencies paths, boosting aiding detection hardware-related paths. We evaluated our approach on nine real-world pieces firmware. Compared previous approach, achieved maximum increase 47.9% path coverage an enhancement 27.6% effective model during process within 24 h.

Language: Английский

Citations

0