Journal of King Saud University - Computer and Information Sciences,
Год журнала:
2024,
Номер
36(5), С. 102044 - 102044
Опубликована: Май 4, 2024
The
rapid
growth
of
the
Internet
Things
(IoT)
has
led
to
an
increased
deployment
unmanned
aerial
vehicles
(UAVs)
across
various
sectors.
However,
efficiency
and
security
issues
are
persistently
among
primary
challenges
in
UAV
networks.
In
addition,
significant
communication
delays
can
occur
when
UAVs
perform
remote
tasks
far
from
a
command
center
(CC);
some
cases,
they
may
be
unable
communicate
with
CC.
To
address
these
challenges,
this
paper,
efficient
online/offline
heterogeneous
proxy
signcryption
scheme
for
secure
networks
(HOOPSC)
is
proposed.
This
enables
CC
certificateless
cryptosystem
(CLC)
environment
delegate
nearby
ground
control
station
(GCS)
act
as
agent,
directly
send
commands
within
identity-based
(IBC)
undertakes
then
decrypts
verifies
authenticity
confidentiality.
proposed
scheme,
process
split
into
offline
online
phases,
most
heavy
computations
conducted
without
availability
messages
during
phase.
Only
light
performed
phase
message
available.
Moreover,
formal
proof
given
random
oracle
model.
Finally,
performance
analysis
reveals
that
HOOPSC
outperforms
existing
relevant
schemes,
making
it
ideal
long-range
operations
IEEE Access,
Год журнала:
2022,
Номер
10, С. 122679 - 122695
Опубликована: Янв. 1, 2022
With
the
rapid
enhancement
in
design
and
development
of
Internet
Things
creates
a
new
research
interest
adaptation
industrial
domains.
It
is
due
to
impact
distributed
emerging
technology
topology
security-related
resource
constraints
5.0.
This
conducts
paradigm
along
with
critical
challenges
existing
information
preservation,
node
transactions
communication,
transmission,
trust
privacy,
security
protection
related
problems.
These
aspects
pose
serious
limitations
issues
for
industry
provide
data
integrity,
exchange
reliability,
provenance,
trustworthiness
overall
activities
service
delivery
prospects.
In
addition,
intersection
blockchain
IoT
has
gained
more
consideration
interest.
However,
there
an
limitation
between
inadequate
performance
connected
nodes,
high
requirement
permissioned
private
ledger
not
yet
been
tackled
complete
solution.
Due
introductions
NuCypher
Re-Encryption
infrastructure,
hashing
tree
allocation,
deployment
proof-of-work
required
computational
power
as
well.
paper
divided
into
three
different
folds;
first,
we
studied
various
literature
blockchain-enabling
its
implementation
challenging
Secondly,
proposed
hyperledger
sawtooth-enabled
framework.
framework
provides
secure
trusted
execution
environment,
which
mechanisms
protocols
are
designed
acknowledgment,
including
immutable
storage
security,
peer-to-peer
network
on-chain
off-chain
communication
activities.
Thirdly,
pseudo-chain
codes
consensus
smooth
streamline
broadcast
content.
The
multiple
investigated
simulated
using
Hyperledger
Sawtooth-enabled
docker
testing
devices
within
limited
usage
constraints.
IEEE Access,
Год журнала:
2022,
Номер
10, С. 78887 - 78898
Опубликована: Янв. 1, 2022
Owing
to
the
sensitive
nature
of
healthcare
data,
aforementioned
approach
transferring
patient
data
central
servers
creates
serious
security
and
privacy
issues.
In
addition,
blockchain
distributed
ledger
technology
has
introduced
immutable
storage
decentralized
management
capability,
which
handles
a
large
number
nodes
E-Healthcare
transactions
via
serverless
network,
but
in
limited
manner
because
blockchain-enabled
resources.
this
scenario,
medical
industries
are
concerned
about
constituting
an
innovation
health
information
preservation
exchanging
service
delivery
protocols
without
connectivity
untrusted
third-party
infrastructure.
study,
we
proposed
hyperledger
fabric-enabled
consortium
architecture
called
BIoMT,
provides
security,
integrity,
transparency,
provenance
health-related
exchanges
clinical
peer-to-peer
(P2P)
secure
network
environment.
A
consensus
is
designed
created
reduce
rate
resource
constraints
on
Internet
Medical
Things
(IoMT).
The
individual
before
sharing
protected
using
NuCypher
Re-Encryption
mechanism,
increases
integrity
transparency.
Smart
contracts
deployed
automate
device
registration,
exchange
transactions,
(filecoin)
after
cross
verification
validation.
experimental
results
show
that
BIoMT
reduces
computational
cost
by
26.13%,
robust
node
generation
60.37%.
Thus,
only
31.79%
74.21%
IoMT-related
P2P
usage
maintained
saved,
respectively.
Electronics,
Год журнала:
2023,
Номер
12(3), С. 677 - 677
Опубликована: Янв. 29, 2023
The
vast
enhancement
in
the
development
of
Internet
Vehicles
(IoV)
is
due
to
impact
distributed
emerging
technology
and
topology
industrial
IoV.
It
has
created
a
new
paradigm,
such
as
security-related
resource
constraints
Industry
5.0.
A
revolution
dimension
IoV
popup
raise
various
critical
challenges
existing
information
preservation,
especially
node
transactions
communication,
transmission,
trust
privacy,
security-protection-related
problems,
which
have
been
analyzed.
These
aspects
pose
serious
problems
for
industry
provide
vehicular-related
data
integrity,
availability,
exchange
reliability,
provenance,
trustworthiness
overall
activities
service
delivery
prospects
against
increasing
number
multiple
transactions.
In
addition,
there
lot
research
interest
that
intersects
with
blockchain
association.
this
regard,
inadequate
performance
connected
nodes
high
requirements
consortium
ledger
not
yet
tackled
complete
solution.
introduction
NuCypher
Re-encryption
infrastructure,
hashing
tree
allocation,
proof-of-work
require
more
computational
power
well.
This
paper
contributes
two
different
folds.
First,
it
proposes
sawtooth-enabled
modular
architecture
protected,
secure,
trusted
execution,
delivery,
acknowledgment
immutable
storage
security
peer-to-peer
(P2P)
network
on-chain
off-chain
inter-communication
vehicular
activities.
Secondly,
we
design
create
smart
contract-enabled
structure
order
smooth
streamlined
broadcast
content.
Substantially,
develop
deploy
hyperledger
sawtooth-aware
customized
consensus
investigations.
For
validation
purposes,
simulate
related
details
between
devices
on
simulation
results
show
proposed
BIoV
reduces
cost
down
37.21%
robust
generation
up
56.33%.
Therefore,
only
41.93%
47.31%
Vehicles-related
resources
are
kept
used,
respectively.
IEEE Sensors Journal,
Год журнала:
2023,
Номер
23(20), С. 25144 - 25151
Опубликована: Май 11, 2023
The
industrial
Internet
of
Things
(IIoT)
has
gained
more
attention
because
the
self-governing
nature
system
configuration
with
interoperable
application
connectivity.
In
E-healthcare
environment,
it
cooperates
medical
sensors
to
capture,
examine,
analyze,
preserve,
and
document
day-to-day
transactions
patients
in
real-time.
integration
IIoT
provides
an
analytical
platform
handle
a
large
amount
data
low
cost
cloud-enabling
scalable
storage.
Throughout
transformation,
patients'
personal
information
is
at
risk
while
exchanging
records
over
centralized
server-based
systems.
Thus,
rate
node
connectivity,
failure
parallel
sharing,
deliverance-related
issues
increase.
this
article,
we
present
solutions
three
folds.
First,
article
proposes
novel
secure
architecture
for
security
using
blockchain-distributed
ledger
technology
named
BHIIoT.
Second,
transformation
lifecycle
wireless
sensor
networks
(WSNs)
management
optimization
distributed
layered
hierarchy
developed,
which
enhances
network
resources
increases
trust
blockchain-enabled
peer-to-peer
(P2P)
environment.
Third,
proposed
BHIIoT
uses
NuCypher
threshold
re-encryption
mechanism
encryption
protects
shared
form
blocks
preserved
blockchain
immutable
For
instance,
chain
codes
are
deployed
automate
authentication,
logging,
index
deliverance,
trace
resist
illegal
activities
application.
customized
lightweight
multi-proof-of-work
(PoW)
multi-proof-of-stake
(PoS)
designed
digital
signature
improving
consumption
reducing
load
storage
transaction
process
scheduled.
IEEE Access,
Год журнала:
2024,
Номер
12, С. 69383 - 69396
Опубликована: Янв. 1, 2024
Particularly
in
the
context
of
smart
cities,
remote
sensing
data
(RSD)
has
emerged
as
one
hottest
study
topics
information
and
communication
technology
(ICT)
today.
The
development
machine
learning
(ML)
artificial
intelligence
(AI)
made
it
possible
to
solve
a
number
issues,
including
automation,
control
access,
optimization,
monitoring,
management.
Simultaneously,
there
are
significant
issues
with
design
process
hierarchy,
inadequate
training
records,
centralized
architecture,
privacy
protection,
overall
resource
consumption
restrictions.
Distributed
Ledger
Technology
(DLT),
on
other
hand,
provides
decentralized
infrastructure
that
allows
systems
eliminate
data-sharing
procedures
cities
while
transferring
from
network
node
node,
third-party
access
solves
issues.
To
an
ideal
delivery
mechanism
for
analytical
model,
paper
employs
Partial
Swam
Optimization
(POS)
conjunction
secure
blockchain
distributed
consortium
network.
This
work
makes
three
contributions.
Firstly,
offers
safe
transmission
method
combines
optimize
path
reliable
across
channels.
Second,
neighborhood
encryption
sequences
carried
out
using
NuCypher
proxy
re-encryption-enabled
value
encryption,
public
key
cryptographic
approach
avoids
cypher
conversion.
Third,
Artificial
Neural
Networks
(ANNs)
can
deliverance
classification
problem
by
optimizing
record
management
preservation.
Drones,
Год журнала:
2022,
Номер
6(12), С. 377 - 377
Опубликована: Ноя. 25, 2022
Due
to
globalization
and
advances
in
network
technology,
the
Internet
of
Vehicles
(IoV)
with
edge
computing
has
gained
increasingly
more
attention
over
last
few
years.
The
technology
provides
a
new
paradigm
design
interconnected
distributed
nodes
Unmanned
Aerial
Vehicle
(UAV)-assisted
vehicle
networks
for
communications
between
vehicles
smart
cities.
process
hierarchy
current
UAV-assisted
is
also
becoming
multifaceted
as
are
connected,
requiring
accessing
exchanging
information,
performing
tasks,
updating
information
securely.
This
poses
serious
issues
limitations
centralized
networks,
directly
affecting
computing-intensive
tasks
data
offloading.
paper
bridges
these
gaps
by
providing
novel,
transparent,
secure
lifecycle
communication
using
blockchain
hyperledger
technology.
A
modular
infrastructure
Vehicle-to-Everything
(V2X)
designed
‘B-UV2X’,
fabric-enabled
permissioned
network-based
consortium
structure,
proposed.
participating
others
chain
cities
exchange
different
such
movement,
etc.,
preserving
operational
logs
on
blockchain-enabled
immutable
ledger.
automates
IoV
transactions
proposed
vehicle-enabled
doppler
spread.
Thus,
this
purpose,
there
four
codes
that
deployed
registration,
adding
transactions,
ledger,
monitoring
resource
management,
customized
multi-consensus
proof-of-work.
For
lightweight
authentication,
B-UV2X
uses
two-way
verification
method
defined
fabric
consensus
mechanism.
Transaction
protection
from
acquisition
deliverance
storage
NuCypher
threshold
proxy
re-encryption
Simulation
results
show
reduction
consumption
12.17%
compared
system,
an
increase
security
features
up
9.76%,
7.93%
computational
load
computed
log
storage.
IEEE Access,
Год журнала:
2024,
Номер
12, С. 7156 - 7169
Опубликована: Янв. 1, 2024
Malicious
assaults
and
information
leakage
have
grown
in
importance
practically
every
area
of
communication
technology
(ICT)
recent
years.
Enterprise
ledger
organization,
preservation,
security,
protection
are
all
greatly
aided
by
security
(IS).
To
maintain
their
positions
the
market,
industries
must
safeguard
data
other
vital
assets.
The
main
goals
this
paper's
systematic
review,
which
covers
entire
process
privacy
to
introduce
cryptographic
IS
for
Industry
5.0
(the
Fifth
Industrial
Revolution)
as
a
comprehensive
solution
that
provides
regulatory
compliance
policies
addition
industrial
goals.
review
four
areas:
(i)
recognizing
need
frameworks
be
developed
secure
lifecycle;
(ii)
emphasizing
guidelines,
procedures,
countermeasures
5.0;
(iii)
applying
control,
access,
availability
real-time;
(iv)
proposing
futuristic
architecture
security.
Furthermore,
analysis
previously
published
state-of-the-art
techniques
is
presented
paper.
These
survive
with
various
limitations
challenges,
including
intercommunication
exchange,
fine-grained
control
interconnectivity-related
issues,
affect
adoption
an
programmes.
At
end
we
investigated
few
open
research
problems
mentioned
those
involved
design
re-encryption-enabled
future
developments.