Lecture notes in electrical engineering, Год журнала: 2024, Номер unknown, С. 323 - 328
Опубликована: Окт. 19, 2024
Язык: Английский
Lecture notes in electrical engineering, Год журнала: 2024, Номер unknown, С. 323 - 328
Опубликована: Окт. 19, 2024
Язык: Английский
IEEE Access, Год журнала: 2022, Номер 10, С. 122679 - 122695
Опубликована: Янв. 1, 2022
With the rapid enhancement in design and development of Internet Things creates a new research interest adaptation industrial domains. It is due to impact distributed emerging technology topology security-related resource constraints 5.0. This conducts paradigm along with critical challenges existing information preservation, node transactions communication, transmission, trust privacy, security protection related problems. These aspects pose serious limitations issues for industry provide data integrity, exchange reliability, provenance, trustworthiness overall activities service delivery prospects. In addition, intersection blockchain IoT has gained more consideration interest. However, there an limitation between inadequate performance connected nodes, high requirement permissioned private ledger not yet been tackled complete solution. Due introductions NuCypher Re-Encryption infrastructure, hashing tree allocation, deployment proof-of-work required computational power as well. paper divided into three different folds; first, we studied various literature blockchain-enabling its implementation challenging Secondly, proposed hyperledger sawtooth-enabled framework. framework provides secure trusted execution environment, which mechanisms protocols are designed acknowledgment, including immutable storage security, peer-to-peer network on-chain off-chain communication activities. Thirdly, pseudo-chain codes consensus smooth streamline broadcast content. The multiple investigated simulated using Hyperledger Sawtooth-enabled docker testing devices within limited usage constraints.
Язык: Английский
Процитировано
137Computers & Electrical Engineering, Год журнала: 2022, Номер 102, С. 108234 - 108234
Опубликована: Июль 25, 2022
Язык: Английский
Процитировано
110Sustainable Energy Technologies and Assessments, Год журнала: 2023, Номер 57, С. 103282 - 103282
Опубликована: Май 12, 2023
Язык: Английский
Процитировано
92IEEE Access, Год журнала: 2022, Номер 10, С. 78887 - 78898
Опубликована: Янв. 1, 2022
Owing to the sensitive nature of healthcare data, aforementioned approach transferring patient data central servers creates serious security and privacy issues. In addition, blockchain distributed ledger technology has introduced immutable storage decentralized management capability, which handles a large number nodes E-Healthcare transactions via serverless network, but in limited manner because blockchain-enabled resources. this scenario, medical industries are concerned about constituting an innovation health information preservation exchanging service delivery protocols without connectivity untrusted third-party infrastructure. study, we proposed hyperledger fabric-enabled consortium architecture called BIoMT, provides security, integrity, transparency, provenance health-related exchanges clinical peer-to-peer (P2P) secure network environment. A consensus is designed created reduce rate resource constraints on Internet Medical Things (IoMT). The individual before sharing protected using NuCypher Re-Encryption mechanism, increases integrity transparency. Smart contracts deployed automate device registration, exchange transactions, (filecoin) after cross verification validation. experimental results show that BIoMT reduces computational cost by 26.13%, robust node generation 60.37%. Thus, only 31.79% 74.21% IoMT-related P2P usage maintained saved, respectively.
Язык: Английский
Процитировано
84Electronics, Год журнала: 2023, Номер 12(3), С. 677 - 677
Опубликована: Янв. 29, 2023
The vast enhancement in the development of Internet Vehicles (IoV) is due to impact distributed emerging technology and topology industrial IoV. It has created a new paradigm, such as security-related resource constraints Industry 5.0. A revolution dimension IoV popup raise various critical challenges existing information preservation, especially node transactions communication, transmission, trust privacy, security-protection-related problems, which have been analyzed. These aspects pose serious problems for industry provide vehicular-related data integrity, availability, exchange reliability, provenance, trustworthiness overall activities service delivery prospects against increasing number multiple transactions. In addition, there lot research interest that intersects with blockchain association. this regard, inadequate performance connected nodes high requirements consortium ledger not yet tackled complete solution. introduction NuCypher Re-encryption infrastructure, hashing tree allocation, proof-of-work require more computational power well. This paper contributes two different folds. First, it proposes sawtooth-enabled modular architecture protected, secure, trusted execution, delivery, acknowledgment immutable storage security peer-to-peer (P2P) network on-chain off-chain inter-communication vehicular activities. Secondly, we design create smart contract-enabled structure order smooth streamlined broadcast content. Substantially, develop deploy hyperledger sawtooth-aware customized consensus investigations. For validation purposes, simulate related details between devices on simulation results show proposed BIoV reduces cost down 37.21% robust generation up 56.33%. Therefore, only 41.93% 47.31% Vehicles-related resources are kept used, respectively.
Язык: Английский
Процитировано
68IEEE Sensors Journal, Год журнала: 2023, Номер 23(20), С. 25144 - 25151
Опубликована: Май 11, 2023
The industrial Internet of Things (IIoT) has gained more attention because the self-governing nature system configuration with interoperable application connectivity. In E-healthcare environment, it cooperates medical sensors to capture, examine, analyze, preserve, and document day-to-day transactions patients in real-time. integration IIoT provides an analytical platform handle a large amount data low cost cloud-enabling scalable storage. Throughout transformation, patients' personal information is at risk while exchanging records over centralized server-based systems. Thus, rate node connectivity, failure parallel sharing, deliverance-related issues increase. this article, we present solutions three folds. First, article proposes novel secure architecture for security using blockchain-distributed ledger technology named BHIIoT. Second, transformation lifecycle wireless sensor networks (WSNs) management optimization distributed layered hierarchy developed, which enhances network resources increases trust blockchain-enabled peer-to-peer (P2P) environment. Third, proposed BHIIoT uses NuCypher threshold re-encryption mechanism encryption protects shared form blocks preserved blockchain immutable For instance, chain codes are deployed automate authentication, logging, index deliverance, trace resist illegal activities application. customized lightweight multi-proof-of-work (PoW) multi-proof-of-stake (PoS) designed digital signature improving consumption reducing load storage transaction process scheduled.
Язык: Английский
Процитировано
64IEEE Access, Год журнала: 2024, Номер 12, С. 69383 - 69396
Опубликована: Янв. 1, 2024
Particularly in the context of smart cities, remote sensing data (RSD) has emerged as one hottest study topics information and communication technology (ICT) today. The development machine learning (ML) artificial intelligence (AI) made it possible to solve a number issues, including automation, control access, optimization, monitoring, management. Simultaneously, there are significant issues with design process hierarchy, inadequate training records, centralized architecture, privacy protection, overall resource consumption restrictions. Distributed Ledger Technology (DLT), on other hand, provides decentralized infrastructure that allows systems eliminate data-sharing procedures cities while transferring from network node node, third-party access solves issues. To an ideal delivery mechanism for analytical model, paper employs Partial Swam Optimization (POS) conjunction secure blockchain distributed consortium network. This work makes three contributions. Firstly, offers safe transmission method combines optimize path reliable across channels. Second, neighborhood encryption sequences carried out using NuCypher proxy re-encryption-enabled value encryption, public key cryptographic approach avoids cypher conversion. Third, Artificial Neural Networks (ANNs) can deliverance classification problem by optimizing record management preservation.
Язык: Английский
Процитировано
26Engineering Applications of Artificial Intelligence, Год журнала: 2024, Номер 141, С. 109838 - 109838
Опубликована: Дек. 13, 2024
Язык: Английский
Процитировано
15Drones, Год журнала: 2022, Номер 6(12), С. 377 - 377
Опубликована: Ноя. 25, 2022
Due to globalization and advances in network technology, the Internet of Vehicles (IoV) with edge computing has gained increasingly more attention over last few years. The technology provides a new paradigm design interconnected distributed nodes Unmanned Aerial Vehicle (UAV)-assisted vehicle networks for communications between vehicles smart cities. process hierarchy current UAV-assisted is also becoming multifaceted as are connected, requiring accessing exchanging information, performing tasks, updating information securely. This poses serious issues limitations centralized networks, directly affecting computing-intensive tasks data offloading. paper bridges these gaps by providing novel, transparent, secure lifecycle communication using blockchain hyperledger technology. A modular infrastructure Vehicle-to-Everything (V2X) designed ‘B-UV2X’, fabric-enabled permissioned network-based consortium structure, proposed. participating others chain cities exchange different such movement, etc., preserving operational logs on blockchain-enabled immutable ledger. automates IoV transactions proposed vehicle-enabled doppler spread. Thus, this purpose, there four codes that deployed registration, adding transactions, ledger, monitoring resource management, customized multi-consensus proof-of-work. For lightweight authentication, B-UV2X uses two-way verification method defined fabric consensus mechanism. Transaction protection from acquisition deliverance storage NuCypher threshold proxy re-encryption Simulation results show reduction consumption 12.17% compared system, an increase security features up 9.76%, 7.93% computational load computed log storage.
Язык: Английский
Процитировано
32IEEE Access, Год журнала: 2024, Номер 12, С. 7156 - 7169
Опубликована: Янв. 1, 2024
Malicious assaults and information leakage have grown in importance practically every area of communication technology (ICT) recent years. Enterprise ledger organization, preservation, security, protection are all greatly aided by security (IS). To maintain their positions the market, industries must safeguard data other vital assets. The main goals this paper's systematic review, which covers entire process privacy to introduce cryptographic IS for Industry 5.0 (the Fifth Industrial Revolution) as a comprehensive solution that provides regulatory compliance policies addition industrial goals. review four areas: (i) recognizing need frameworks be developed secure lifecycle; (ii) emphasizing guidelines, procedures, countermeasures 5.0; (iii) applying control, access, availability real-time; (iv) proposing futuristic architecture security. Furthermore, analysis previously published state-of-the-art techniques is presented paper. These survive with various limitations challenges, including intercommunication exchange, fine-grained control interconnectivity-related issues, affect adoption an programmes. At end we investigated few open research problems mentioned those involved design re-encryption-enabled future developments.
Язык: Английский
Процитировано
9