Filters








123 Hits in 9.5 sec

Toward a Sustainable Cybersecurity Ecosystem

Shahrin Sadik, Mohiuddin Ahmed, Leslie F. Sikos, A. K. M. Najmul Islam
2020 Computers  
This paper focuses on the cybersecurity of smart grids and the emerging trends such as using blockchain in the Internet of Things (IoT).  ...  Considering the rapid increase of technological implementations, it has turned into a global necessity in the attempt to adapt security countermeasures, whether direct or indirect, and prevent systems  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/computers9030074 doaj:3e2e5a6ff03d45719675ef789f1e0982 fatcat:i2aqvqwp5zcohkbx3vkz4iibcy

Blockchain-based Platform for Secure Sharing and Validation of Vaccination Certificates [article]

Mwrwan Abubakar, Pádraig McCarron, Zakwan Jaroucheh, Ahmed Al-Dubai, William J Buchanan
2021 arXiv   pre-print
To resolve significant privacy concerns and remove the need for relying on third parties to maintain trust and control the user's data, in this paper, we leverage blockchain technologies in developing  ...  The usability of this approach was further analysed, particularly concerning performance and security. Our analysis proved that our approach satisfies vaccination certificate security requirements.  ...  The VC location in the IPFS will be sent to the smart contract and smart contracts will be used in our system to help to store an mapped to the user public address.  ... 
arXiv:2112.10124v2 fatcat:juli7lp7mbh3xlzitgpq7jg22u

Disruptive Technologies for Environment and Health Research: An Overview of Artificial Intelligence, Blockchain, and Internet of Things

Frederico M. Bublitz, Arlene Oetomo, Kirti S. Sahu, Amethyst Kuang, Laura X. Fadrique, Pedro E. Velmovitsky, Raphael M. Nobrega, Plinio P. Morita
2019 International Journal of Environmental Research and Public Health  
This paper first outlines the current use of technologies at the intersection of public health and the environment, in particular, Artificial Intelligence (AI), Blockchain, and the Internet of Things (  ...  Its primary aim is to provide a review of disruptive technologies and their current uses in the environment and in healthcare.  ...  These are just some of the proposed applications of Blockchain within the environmental sector.  ... 
doi:10.3390/ijerph16203847 pmid:31614632 pmcid:PMC6843531 fatcat:2u24e2x5lzgnlfc2ta7lvr5ena

Blockchain and Building Information Management (BIM) for Sustainable Building Development within the Context of Smart Cities

Zhen Liu, Ziyuan Chi, Mohamed Osmani, Peter Demian
2021 Sustainability  
This paper queries the Web of Science (WoS) database with keywords to obtain relevant publication, and then uses the VOSviewer to visually analyze the relationships between blockchain, BIM, and sustainable  ...  Therefore, the aim of this paper is to explore the potential impact of the integration of blockchain and BIM in a smart city environment on making buildings more sustainable within the context of CIM/Smart  ...  The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, or in the decision to publish the results.  ... 
doi:10.3390/su13042090 fatcat:x7ubsib3rbeq7ijnnyjlvcg46m

Cybersecurity Management for (Industrial) Internet of Things: Challenges and Opportunities

Maximilian L, Markl E, Mohamed A
2018 Journal of Information Technology & Software Engineering  
Cybersecurity management has to increase awareness, competence levels and assess novel technologies such as blockchain and SDN (Software Defined Networking).  ...  However, there are 3 main challenges for solving security issues in IoT and IIoT settings: Applications operate in highly distributed environments, heterogeneous smart objects are used, and sensors and  ...  to your home network. • Consider whether you'll be using the public or private cloud. • To prevent attacks that penetrate your network, use a virtual private network (VPN).  ... 
doi:10.4172/2165-7866.1000250 fatcat:qzdsbz3pbfh4vpccwzoan5rfve

A Review of Intrusion Detection and Blockchain Applications in the Cloud: Approaches, Challenges and Solutions

Osama Alkadi, Nour Moustafa, Benjamin Turnbull
2020 IEEE Access  
Blockchain technology has numerous applications across different domains that go beyond The associate editor coordinating the review of this manuscript and approving it for publication was Haider Abbas  ...  Blockchain-based applications have emerged in multiple domains to offer trust and data privacy services.  ...  The blockchain technology is utilised as a public, distributed ledger of transaction rows, that could be used to secure data transactions of cloud systems.  ... 
doi:10.1109/access.2020.2999715 fatcat:qz677wrupvcblbvcrm74owmjyu

Disruptive Technologies and Sustainable Supply Chain Management: A Review and Cross-Case Analysis

Khadija Ajmal, Nallan C. Suresh, Charles X. Wang
2021 Journal of Management and Sustainability  
Based on a comprehensive literature review on both theoretical and practical roles of these disruptive technologies in SSCM, we conduct a cross-case study to analyze the impacts of disruptive technologies  ...  We also utilize the cases to illustrate how disruptive technologies are applied to key areas of SSCM and identify opportunities for future research.  ...  Another study by Badiezadeh et al. (2018) uses the BDA approach to assess supply chain systems via sustainability scores.  ... 
doi:10.5539/jms.v11n2p77 fatcat:dd7mobzh3jbnblad4k6gcjtvbm

Full Text PDF of The JBBA, Volume 2 Issue 2, October 2019

Naseem Naqvi
2019 The Journal of British Blockchain Association  
This phenomenon in Japan could be attributed to the stronger public sentiment on the use of bitcoin for official payment than the application of the underlying blockchain technology.  ...  As an outcome of the survey, METI published the first version of evaluation templates to assess blockchain applications and completed the first evaluation for blockchain applications in healthcare, supply  ...  While in practice, tools like the Metamask Chrome extension or the Brave browser make it easy to use Ethereum, audiences that are less familiar with technology might find this challenging.  ... 
doi:10.31585/jbba-2-2-(full)2019 fatcat:lsnv4wnuhvhpne33puatdc4p4e

Security and Privacy in Smart Farming: Challenges and Opportunities

Maanak Gupta, Mahmoud Abdelsalam, Sajad Khorsandroo, Sudip Mittal
2020 IEEE Access  
However, the use of IoT and smart communication technologies introduce a vast exposure to cybersecurity threats and vulnerabilities in smart farming environments.  ...  In particular, the Agriculture and Farming industries have also embraced this technological intervention. Smart devices are widely used by a range of people from farmers to entrepreneurs.  ...  Leckie, Associate Professor in the School of Agriculture at Tennessee Technological University, for his domain expertise, insightful comments, and suggestions, to make this manuscript more comprehensible  ... 
doi:10.1109/access.2020.2975142 fatcat:3s7cmur2jrghzh3yxdsmklbh7m

Ecosystem Platform for the Defence and Security Sector of Ukraine

Oleksandr Polischuk
2020 Information & Security An International Journal  
While success in current and future conflicts will increasingly be predicated by optimisation of high-tech solutions rather than military capabilities based on mass, the application of modern business  ...  This article presents detailed analysis of ways to adapt the security and defence sector of Ukraine to Euro-Atlantic standards, taking into account Ukraine's trajectory and growing interaction with the  ...  Ukraine also plans to introduce state data management through blockchain technology. 31 Effective security and defence sector management means the most rational use of available assets in order to react  ... 
doi:10.11610/isij.4501 fatcat:x64dqtarqzfvbcvtpeuqlk5gnm

A Comprehensive and Systematic Survey on the Internet of Things: Security and Privacy Challenges, Security Frameworks, Enabling Technologies, Threats, Vulnerabilities and Countermeasures

Muath A. Obaidat, Suhaib Obeidat, Jennifer Holst, Abdullah Al Hayajneh, Joseph Brown
2020 Computers  
The Internet of Things (IoT) has experienced constant growth in the number of devices deployed and the range of applications in which such devices are used.  ...  This survey provides a comprehensive overview of IoT in regard to areas of application, security architecture frameworks, recent security and privacy issues in IoT, as well as a review of recent similar  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/computers9020044 fatcat:v2iru7ncd5gppjd2qwse4v4axi

Privacy-Preserving Schemes for Safeguarding Heterogeneous Data Sources in Cyber-Physical Systems

Marwa Keshk, Benjamin Turnbull, Elena Sitnikova, Dinusha Vatsalan, Nour Moustafa
2021 IEEE Access  
In order to protect CPSs from prospect cyber-threats, it is essential to discover system components vulnerabilities to prohibit Advanced Persistent Threats (APTs) and keep their generated data secure using  ...  Then, classification of privacy preservation according to the way they would be protected, including perturbation, authentication, machine learning (ML), cryptography and blockchain, are explained to illustrate  ...  In [131] , the e-government system's privacy preservation is considered using a framework-based blockchain technology for gaining a high level of trust in public sectors.  ... 
doi:10.1109/access.2021.3069737 fatcat:zcgizjkslzbonejocasygt464u

CAVs Cybersecurity threats digest and analysis

S. Steinhorst, J. Lauinger, N.A. Nijdam, A. Collen, A. Zacharaki, M. Aslam
2019 Zenodo  
increasing connectivity in all kinds of vehicles will be considered in detail, so as to enable efficient and radical solution to the Cybersecurity on CH with the nIoVe toolkit.  ...  Within the first task a systematic analysis of the cybersecurity landscape will be performed with a focus on digital security of CAVs.  ...  Trust Management using Blockchain Blockchain is a new technology which has a variety of applications and potential for identification management in a trustworthy and privacy-preserving way. nIoVe will  ... 
doi:10.5281/zenodo.4728214 fatcat:fonojcfo6fdzbnc7oz6w66zoh4

IoT cyber risk: a holistic analysis of cyber risk assessment frameworks, risk vectors, and risk ranking process

Kamalanathan Kandasamy, Sethuraman Srinivas, Krishnashree Achuthan, Venkat P. Rangan
2020 EURASIP Journal on Information Security  
Security vulnerabilities of the modern Internet of Things (IoT) systems are unique, mainly due to the complexity and heterogeneity of the technology and data.  ...  Extending these existing frameworks to IoT systems alone will not address the new risks that have arisen in the IoT ecosystem.  ...  Acknowledgements The authors would like to express our immense gratitude to our beloved Chancellor Sri.  ... 
doi:10.1186/s13635-020-00111-0 fatcat:hy4xqbimbfbxlb5cnrasxdm5w4

Anatomy of Threats to The Internet of Things

Imran Makhdoom, Mehran Abolhasan, Justin Lipman, Ren Ping Liu, Wei Ni
2018 IEEE Communications Surveys and Tutorials  
Index Terms-Threats to the IoT, Internet of Things, malware attacks on the Internet of Things, attack methodology, security and privacy, IoT security framework, security guidelines.  ...  In the end, we propose a composite guideline for the development of an IoT security framework based on industry best practices and also highlight lessons learned, pitfalls and the open research challenges  ...  National Institute of Standards and Technology (NIST) have also issued a special publication 800-30 [151] as a guide to conduct a risk assessment for the security of information systems.  ... 
doi:10.1109/comst.2018.2874978 fatcat:5qkflaozurb4nctkfrwswnbce4
« Previous Showing results 1 — 15 out of 123 results