The Role of Blockchain and AI in Fortifying Cybersecurity for Healthcare Systems
M. Husain Bathushaw,
No information about this author
S. Nagasundaram
No information about this author
International Journal of Computational and Experimental Science and Engineering,
Journal Year:
2024,
Volume and Issue:
10(4)
Published: Nov. 24, 2024
In
a
simulated
healthcare
setting,
the
algorithms
were
assessed
based
on
organized
threat
insight
data,
inconsistency
location
executed
with
blockchain-enhanced
access
control,
and
machine
learning-driven
interruption
detection.
The
test
results
depiction
showed
that
all
calculations
feasible,
an
accuracy
range
of
0.88-0.94
lift
defined
between
0.75
1;
knowledge
values
ranging
from.86
to.92,
F1
scores
above.90
are
displayed
as
follows:
Above
all,
TIAA
excelled
in
risk
insights
management;
ADA
exceeded
expectations
detecting
inconsistencies;
BACA
used
blockchain
to
fortify
control;
ML-IDS
produced
remarkable
intrusion
importance
these
addressing
particular
cybersecurity
concerns
industry
is
highlighted
through
comparative
comparison
similar
studies.
suggested
relevant
growing
conversation
about
because
they
offer
comprehensive
strategy
protect
private
health
guarantee
reliability
assessment
models,
organizations
against
variety
evolving
cyberthreats.
Language: Английский
Unlocking a Promising Future: Integrating Blockchain Technology and FL-IoT in the Journey to 6G
IEEE Access,
Journal Year:
2024,
Volume and Issue:
12, P. 115411 - 115447
Published: Jan. 1, 2024
The
rapid
advancement
of
technology
has
set
higher
standards
for
the
next
generation
wireless
communication
networks,
known
as
6G.
These
networks
go
beyond
simple
task
connecting
devices
and
aim
to
establish
a
self-sustaining
system
within
society.
One
key
factors
in
achieving
this
goal
is
integration
AI
services
apps
through
Internet
Things
(IoT),
which
will
be
made
possible
with
support
6G
technology.
artificial
intelligence
(AI)
play
crucial
role
enhancing
protocols,
architectures,
operations
networks.
To
achieve
collaborative
IoT
applications,
Federated
Learning
(FL)
emerged
popular
method.
FL
enables
training
without
need
data
sharing,
ensuring
privacy
security.
However,
also
faces
challenges,
such
presence
malicious
risk
single-point
failure.
address
these
concerns,
blockchain
(BCT)
offers
secure
efficient
solution.
By
leveraging
blockchain,
issues
can
effectively
tackled,
providing
reliable
framework
implementing
FL-IoT
applications.
Language: Английский
Securing IoT Sensors Using Sharding-Based Blockchain Network Technology Integration: A Systematic Review
Sensors,
Journal Year:
2025,
Volume and Issue:
25(3), P. 807 - 807
Published: Jan. 29, 2025
Sharding
is
an
emerging
blockchain
technology
that
used
extensively
in
several
fields
such
as
finance,
reputation
systems,
the
IoT,
and
others
because
of
its
ability
to
secure
increase
number
transactions
every
second.
In
sharding-based
technology,
divided
into
sub-chains,
also
known
shards,
enhance
network
throughput.
This
paper
aims
examine
impact
integrating
securing
IoT
sensors,
which
further
for
environmental
monitoring.
this
paper,
idea
proposed,
along
with
advantages
disadvantages,
by
conducting
a
systematic
literature
review
studies
based
on
recent
years.
Based
research
findings,
beneficial
systems
improving
security,
access,
transaction
rates.
The
findings
suggest
issues,
cross-shard
transactions,
synchronization
concentration
stakes.
With
increased
focus
showcasing
important
trade-offs,
offers
recommendations
implementation
sensors
applications
environment
These
valuable
insights
are
effective
facilitating
informed
decisions
while
developing
more
efficient
decentralized
networks
internet
data
centers
(IDCs),
monitoring
picking
out
key
points
data.
Language: Английский
A Physical-Layer Security Cooperative Framework for Mitigating Interference and Eavesdropping Attacks in Internet of Things Environments
Sensors,
Journal Year:
2024,
Volume and Issue:
24(16), P. 5171 - 5171
Published: Aug. 10, 2024
Intentional
electromagnetic
interference
attacks
(e.g.,
jamming)
against
wireless
connected
devices
such
as
the
Internet
of
Things
(IoT)
remain
a
serious
challenge,
especially
evolve
in
complexity.
Similarly,
eavesdropping
on
communication
channels
persists
an
inherent
vulnerability
that
is
often
exploited
by
adversaries.
This
article
investigates
novel
approach
to
enhancing
information
security
for
IoT
systems
via
collaborative
strategies
can
effectively
mitigate
targeting
availability
and
confidentiality
eavesdropping.
We
examine
proposed
two
use
cases.
First,
we
consider
device
experiences
attack,
causing
channel
outages
hindering
access
transmitted
data.
A
physical-layer-based
(PLS)
transmission
strategy
this
maintain
target
levels
targeted
adversarial
interference.
In
strategy,
select
leverage
cooperative
signal
under
active
attacks.
Second,
case
they
communicate
over
with
possible
eavesdroppers.
case,
propose
where
create
outage
eavesdropper,
preventing
it
from
decoding
devices.
The
analytical
numerical
results
illustrate
effectiveness
achieving
desired
respect
both
Language: Английский
Analysis and Quantification of Different Security Issues in Deploying AI and Blockchain
Advances in information security, privacy, and ethics book series,
Journal Year:
2025,
Volume and Issue:
unknown, P. 119 - 130
Published: Feb. 7, 2025
Artificial
intelligence
and
Blockchain
have
taken
full
control
over
today's
human
activities.
More
reliance
on
these
technologies
time
again
given
homogenous
challenges
for
researchers
academician
to
find
the
way
safety,
security
privacy
control.AI
integration
in
cybersecurity
really
prioritized
every
research
today
adequate
balance
technology
usages.
Potential
usage
effective
result
are
still
a
concern
AI
industry
line
of
control.
Global
digitization
heavy
dependency
emerged
as
big
trustworthy
secured
networking.
This
chapter
caters
analysis
proper
identification
different
technologies.
The
prolific
must
be
realistic
perspective
it
is
very
important
domain
globalization
like
healthcare,
agriculture
business
industry.
draws
definite
shape
boundary
integrating
growing
industries.
Language: Английский
IOTASDN: IOTA 2.0 Smart Contracts for Securing Software-Defined Networking Ecosystem
Sensors,
Journal Year:
2024,
Volume and Issue:
24(17), P. 5716 - 5716
Published: Sept. 2, 2024
Software-Defined
Networking
(SDN)
has
revolutionized
network
management
by
providing
unprecedented
flexibility,
control,
and
efficiency.
However,
its
centralized
architecture
introduces
critical
security
vulnerabilities.
This
paper
a
novel
approach
to
securing
SDN
environments
using
IOTA
2.0
smart
contracts.
The
proposed
system
utilizes
the
Tangle,
directed
acyclic
graph
(DAG)
structure,
improve
scalability
efficiency
while
eliminating
transaction
fees
reducing
energy
consumption.
We
introduce
three
contracts:
Authority,
Access
Control,
DoS
Detector,
ensure
trusted
secure
operations,
prevent
unauthorized
access,
maintain
integrity
of
control
data,
mitigate
denial-of-service
attacks.
Through
comprehensive
simulations
Mininet
ShimmerEVM
Test
Network,
we
demonstrate
efficacy
our
in
enhancing
security.
Our
findings
highlight
potential
contracts
provide
robust,
decentralized
solution
for
environments,
paving
way
further
integration
blockchain
technologies
management.
Language: Английский
IOTASDN: IOTA 2.0 Smart Contracts for Securing SDN Ecosystem
Published: July 15, 2024
Software-Defined
Networking
(SDN)
has
revolutionized
network
management
by
providing
unprecedented
flexibility,
control,
and
efficiency.
However,
its
centralized
architecture
introduces
critical
security
vulnerabilities.
This
paper
presents
an
innovative
approach
to
securing
SDN
environments
using
IOTA
2.0
smart
contracts.
The
proposed
system
leverages
the
Tangle,
a
directed
acyclic
graph
(DAG)
structure,
enhance
scalability
efficiency
while
eliminating
transaction
fees
reducing
energy
consumption.
We
introduce
three
contracts—Authority,
Access
Control,
DoS
Detector—to
ensure
secure
operations,
prevent
unauthorized
access,
mitigate
denial-of-service
attacks.
Through
comprehensive
simulations
Mininet
ShimmerEVM
Test
Network,
we
demonstrate
efficacy
of
our
in
enhancing
security.
Our
findings
highlight
potential
contracts
provide
robust,
decentralized
solution
for
environments,
paving
way
further
integration
blockchain
technologies
management.
Language: Английский
Exploring the Next Frontier in Wireless Communication: 5G and Beyond for Enhanced Reliability and Low Latency in IoT and Autonomous Technologies
Nanotechnology Perceptions,
Journal Year:
2024,
Volume and Issue:
unknown, P. 676 - 689
Published: Dec. 1, 2024
This
research
focuses
on
how
5G
and
beyond
technologies
might
be
the
game
changers
in
reliability,
low
latency,
efficiency,
improvement
of
IoT
autonomous
systems,
such
as
electric
vehicles.
It
addresses
advancements
6G-based
communication
networks
integrated
with
machine
learning
edge
computing
to
enhance
vehicle
performance,
energy
management,
vehicle-to-infrastructure
(V2I)
communication.
Extensive
experimentation
conducted
greatly
led
discovery
important
improvements
response
time.
Latency
was
reduced
by
much
45
per
cent
when
compared
4G
networks,
this
meant
that
6G
enabled
potential
increases
up
60
over
data
throughput
reliability
high-density
environments.
In
addition
that,
AI
application
towards
predictive
maintenance
battery
optimization
an
increase
30
for
applications
intelligence
a
more
sustainable
EV
system.
The
results
further
reveal
promise
AI-based
security
ML-based
25%
reduction
network
vulnerabilities
traditional
protocols.
inform
transformative
capability
next
generations
fulfil
their
scope
remodelling
future
vehicles
systems.
Future
will
focus
overcoming
present
infrastructure
deficiencies
improving
algorithms
behind
real-time
decision-making
processes
support
scalable,
energy-efficient,
secure
ecosystems.
Language: Английский