IEEE Access,
Год журнала:
2023,
Номер
11, С. 120680 - 120693
Опубликована: Янв. 1, 2023
In
a
rapidly
evolving
metaverse,
where
the
physical
and
virtual
realms
naturally
merge,
users
are
actively
participating
in
interactive
experiences,
content
creation,
trading,
transcending
spatial
temporal
constraints.
However,
with
spread
of
security
concerns
have
been
raised
about
privacy
integrity
digital
transactions.
Several
studies
thus
focused
on
enhancing
metaverse.
there
is
still
lack
research
trading
between
metaverse
platforms.
Therefore,
this
paper
proposes
secure
system
for
cross-platform
interactions
within
Leveraging
blockchain
technology,
proposed
delivers
an
ecosystem
that
ensures
management,
data
integrity,
verifiable
We
use
smart
contracts
enable
reliable
automated
purchase
methods,
empowering
building
their
trust.
addition,
we
incorporate
searchable
encryption
to
further
enhance
user
experience
by
allowing
avatars
seamlessly
search
obtain
desired
across
different
The
scheme
comprehensively
assessed
via
vulnerability
analyses,
including
BAN
logic
Scyther,
identify
potential
threats
vulnerabilities
various
scenarios.
performance
compared
those
related
schemes.
Result
reveals
robust
can
be
applied
systems
dynamic
ever-expanding
environments.
Sensors,
Год журнала:
2023,
Номер
23(16), С. 7128 - 7128
Опубликована: Авг. 11, 2023
Digital
Twins
serve
as
virtual
counterparts,
replicating
the
characteristics
and
functionalities
of
tangible
objects,
processes,
or
systems
within
digital
space,
leveraging
their
capability
to
simulate
forecast
real-world
behavior.
They
have
found
valuable
applications
in
smart
farming,
facilitating
a
comprehensive
replica
farm
that
encompasses
vital
aspects
such
crop
cultivation,
soil
composition,
prevailing
weather
conditions.
By
amalgamating
data
from
diverse
sources,
including
soil,
plants
condition,
environmental
sensor
networks,
meteorological
predictions,
high-resolution
UAV
Satellite
imagery,
farmers
gain
access
dynamic
up-to-date
visualization
agricultural
domains
empowering
them
make
well-informed
timely
choices
concerning
critical
like
efficient
irrigation
plans,
optimal
fertilization
methods,
effective
pest
management
strategies,
enhancing
overall
productivity
sustainability.
This
research
paper
aims
present
overview
contemporary
state
on
twins
modelling,
precision
agriculture,
associated
technologies,
while
exploring
potential
impact
practices,
addressing
challenges
limitations
privacy
concerns,
need
for
high-quality
accurate
simulations
complexity
integrating
multiple
sources.
Lastly,
explores
prospects
highlighting
avenues
future
advancement
this
domain.
Artificial Intelligence Review,
Год журнала:
2024,
Номер
57(8)
Опубликована: Июль 10, 2024
Abstract
The
potential
of
digital
twin
technology
is
yet
to
be
fully
realised
due
its
diversity
and
untapped
potential.
Digital
twins
enable
systems’
analysis,
design,
optimisation,
evolution
performed
digitally
or
in
conjunction
with
a
cyber-physical
approach
improve
speed,
accuracy,
efficiency
over
traditional
engineering
methods.
Industry
4.0,
factories
the
future,
continue
benefit
from
provide
enhanced
within
existing
systems.
Due
lack
information
security
standards
associated
transition
cyber
digitisation,
cybercriminals
have
been
able
take
advantage
situation.
Access
product
service
equivalent
threatening
entire
collection.
There
robust
interaction
between
artificial
intelligence
tools,
which
leads
strong
these
technologies,
so
it
can
used
cybersecurity
platforms
based
on
their
integration
technologies.
This
study
aims
investigate
role
providing
for
versions
various
industries,
as
well
risks
versions.
In
addition,
this
research
serves
road
map
researchers
others
interested
security.
Future Internet,
Год журнала:
2025,
Номер
17(1), С. 31 - 31
Опубликована: Янв. 13, 2025
Blockchain
technology
has
been
applied
in
a
wide
range
of
domains
and
seen
major
developments
the
last
years,
notably
when
integrated
with
other
emerging
technologies.
In
this
paper,
we
focus
on
integration
blockchain
digital
twins
aim
enhancing
capabilities
both
particular,
demonstrate
how
can
improve
critical
aspects
security
transparency
by
analyzing
real-world
scenario
evaluating
produced
experimental
data.
This
research
identifies
addresses
vulnerabilities
twins,
particularly
data
integrity
transparency,
through
blockchain-based
validation
mechanisms
smart-contract
integration.
Various
blockchain-related
twin-related
technologies
are
employed
to
enable
repeatability
suggested
approach.
Additionally,
an
in-depth
analysis
such
is
provided
facilitate
symbiotic
relationship
between
these
addressing
key
challenges,
as
scalability,
interoperability,
performance,
along
viable
solutions
that
could
advance
their
co-evolution
academic
industrial
applications.
IEEE Access,
Год журнала:
2023,
Номер
11, С. 114662 - 114679
Опубликована: Янв. 1, 2023
The
refurbishing
of
conventional
medical
network
with
the
wireless
sensor
has
not
only
amplified
efficiency
but
concurrently
posed
different
security
threats.
Previously,
Servati
and
Safkhani
had
suggested
an
Internet
Things
(IoT)
based
authentication
scheme
for
healthcare
environment
promulgating
a
secure
protocol
in
resistance
to
several
attacks.
However,
analysis
demonstrates
that
could
withstand
user,
server,
gateway
node
impersonation
Further,
fails
resist
offline
password
guessing,
ephemeral
secret
leakage,
gateway-by-passing
To
address
weaknesses,
we
furnish
lightweight
three-factor
framework
employing
fuzzy
extractor
technique
safeguard
user's
biometric
information.
Burrows-Abadi-Needham
(BAN)
logic,
Real-or-Random
(ROR)
model,
Scyther
simulation
tool
have
been
imposed
as
formal
approaches
establishing
validity
proposed
work.
heuristic
stipulates
work
is
impenetrable
possible
threats
offers
peculiarities
like
forward
secrecy
security.
A
thorough
preexisting
works
ones
corroborates
intensified
reduced
computational,
communication,
overheads.
IEEE Access,
Год журнала:
2023,
Номер
11, С. 54476 - 54494
Опубликована: Янв. 1, 2023
In
V2X
(vehicle-to-everything)
communication,
there
is
a
two-way
communication
among
the
vehicle(s)
and
other
Internet
of
Things
(IoT)-enabled
smart
devices
around
it
that
may
change
how
we
need
to
drive.
Due
advancement
Information
Communications
Technology
(ICT)
rapid
development
IoT
in
transportation,
traditional
applications
are
converted
intelligent
applications.
communications,
collected
information
from
sources
passes
through
low-latency,
high-bandwidth,
high-reliability
links.
With
future
adoption
5th
generation
mobile
network
(5G)
beyond
networks,
continues
produce
huge
volume
data.
However,
collecting
storing
data
securely
blockchain-based
storage
extremely
needed
for
immutability
transparency.
this
survey
article,
convergence
IoT,
blockchain
technologies,
various
security
challenges
their
countermeasures
discussed.
Next,
discuss
respective
services.
Moreover,
IoT-V2X
architecture
its
enabling
technologies
discussed
article.
addition,
also
provide
comprehensive
analysis
mechanisms.
Finally,
some
important
issues
Blockchain
Intelligent
Transportation
System
(BITS).
IEEE Transactions on Intelligent Transportation Systems,
Год журнала:
2024,
Номер
25(10), С. 15002 - 15015
Опубликована: Май 7, 2024
The
potency
of
digital
twins
to
mitigate
the
shortcomings
traditional
mobility
systems,
such
as
Vehicular
Adhoc
Network
(VANET)
can
reconfigure
it
into
an
intelligent
transportation
domain
with
bolstered
processing,
storage
capabilities
and
decision-making
abilities.
vehicular
network
is
emerging
industrial
revolution,
where
each
real-mobile
entity
(i.e.,
vehicle)
connected
in
virtual
environment
through
their
replica,
known
a
twin.
real-time
data
synchronization
twin-centric
approach
achieved
via
open
communication
channel.
Unfortunately,
leveraging
virtual-reality
synthesized
security
perils
which
consequently
obligates
rigorous
privacy
countermeasures
authentication,
encryption
signature
techniques.
In
this
paper,
we
have
suggested
blockchain-based
authentication
framework
for
intra-twin
inter-twin
twin
networks,
integrated
blockchain
system
assures
compactness
verifiability.
protocol
investigated
under
real
or
random
oracle
model
(ROR)
confirmed
secure
non-mathematical
analysis.
Eventually,
operational
competences
functionality
features
are
inspected
relevant
state-of-the-arts.
findings
study
states
excel
computation
overhead
than
others
seemly
network.