49 Hits in 5.8 sec

Edge Computing and Its Convergence with Blockchain in 5G and Beyond: Security, Challenges, and Opportunities

Showkat Ahmad Bhat, Ishfaq Bashir Sofi, Chong-Yung Chi
2020 IEEE Access  
At times it is exceptionally puzzling to ascertain the cause for a service breakdown precisely in the network.  ...  (QoS), routing area code (RAC) information, and location awareness [72] , [73] .  ... 
doi:10.1109/access.2020.3037108 fatcat:iksoyfx7nbhfrefnzgf6uxuw4q

Blockchain for Vehicular Internet of Things: Recent Advances and Open Issues

Chunrong Peng, Celimuge Wu, Liming Gao, Jiefang Zhang, Kok-Lim Alvin Alvin Yau, Yusheng Ji
2020 Sensors  
There are many studies focusing on the use of blockchain in managing data and transactions in vehicular environments.  ...  However, the application of blockchain in vehicular environments also faces some technical challenges. In this paper, we first explain the fundamentals of blockchain and vehicular IoT.  ...  In a traditional blockchain like Bitcoin, blocks are generated by the miners that have solved a complex cryptographic puzzle.  ... 
doi:10.3390/s20185079 pmid:32906707 pmcid:PMC7571114 fatcat:ukisc67roneg7kcqugsiblh6ca

AACT: Anonymous and Accountable communication topology for Wireless Mesh Networks

M.Narasimha Rao
2012 IOSR Journal of Computer Engineering  
Recently, multihop wireless mesh networks (WMNs) have involved increasing attention and deployment as a low-cost move toward to give broadband Internet access at an urban scale.  ...  On the other hand, AACT offers complicated user privacy protection beside both adversaries and a range of other network entities.  ...  In this paper we have kept in mind the limitations of the distributed systems which may under perform during high network traffic so we used the group-oriented protocol for rekeying.  ... 
doi:10.9790/0661-0520112 fatcat:wxrb53grjzdjrmbikh65wzm5iy

Security Considerations for Internet of Things: A Survey

Anca Jurcut, Tiberiu Niculcea, Pasika Ranaweera, Nhien-An Le-Khac
2020 SN Computer Science  
This paper is focusing on a survey on IoT security and aims to highlight the most significant problems related to safety and security in the IoT ecosystems.  ...  After a review of the relevant, online literature on the topic and after looking at the market trends and developments, one can notice that there are still concerns with regard to security in IoT products  ...  Symphony Link, offered by Link Labs, is a wireless solution for enterprise and industrial which connects IoT devices to the cloud securely [97] .  ... 
doi:10.1007/s42979-020-00201-3 fatcat:4gkafccu7vgq7olrqdxdpgm2eu

Blockchain and IoT Convergence—A Systematic Survey on Technologies, Protocols and Security

Alessandra Pieroni, Noemi Scarpato, Lorenzo Felli
2020 Applied Sciences  
blocks of IoT architecture and solve the scalability problem as the number of devices increases.  ...  The IoT global market is expected to grow from 170 billion USD in 2017 to 560 billion USD by 2022.  ...  It is nothing but collection of sensors, actuators which forms Wireless Sensor Network (WSN).  ... 
doi:10.3390/app10196749 fatcat:wq2gbxxxunb2hdruyoa6di7mri

Delegated Proof of Secret Sharing: A Privacy-Preserving Consensus Protocol Based on Secure Multiparty Computation for IoT Environment

Tieming Geng, Laurent Njilla, Chin-Tser Huang
2022 Network  
A key aspect of privacy in the blockchain is the sensitive content of transactions in the permissionless blockchain.  ...  Specifically, DPoSS first uses polynomial interpolation to select a dealer group from many nodes to maintain the consensus of the blockchain system, in which the dealers in the dealer group take turns  ...  During the election, each participant will run a cryptographic puzzle for a fixed time, and the result of the puzzle will be broadcast to the network for comparison.  ... 
doi:10.3390/network2010005 fatcat:x7v6sncmzrfmle7foomxmzqeq4

Blockchain's adoption in IoT: The challenges, and a way forward

Imran Makhdoom, Mehran Abolhasan, Haider Abbas, Wei Ni
2019 Journal of Network and Computer Applications  
It can also perform other functions such as cloud computing and handling of data management processes [16] .  ...  A data management system for decentralized networks has been proposed in [151] . It protects against issues related to data transparency and auditability, data ownership and access control.  ...  Hence, in a network with four replicas, a single request requires 32 messages between client and replicas, i.e., 4 in stage-1, 3 in stage-2, 9 in stage-3, 12 in stage-4 and 4 in stage-5 respectively.  ... 
doi:10.1016/j.jnca.2018.10.019 fatcat:g6ya7prv6bdzbagaqcai2b4boa

A Survey of IoT and Blockchain Integration: Security Perspective

Elham A. Shammar, Ammar T. Zahary, Asma A. Al-Shargabi
2021 IEEE Access  
The use of blockchain in IoT applications is still in its early stages, particularly at the low end of the computing spectrum.  ...  In the Internet of Things (IoT), blockchain can be used to create a decentralized, reliable, and secure environment.  ...  Tree-chain incorporates a consensus algorithm that does not require validators to solve any puzzles or provide proof of x before storing a new block.  ... 
doi:10.1109/access.2021.3129697 fatcat:l3tj4zelejbobouc2ouw3j3pcy

WiFi Dependent Consensus Mechanism For Constrained Devices Using Blockchain Technology

Chinazaekpere Ngubo, Mischa Dohler
2020 IEEE Access  
The nature of the problem is real-time i.e. miners become aware of the elements of the puzzle when the parts that make up the puzzle (the block contents) are revealed on the network.  ...  This single hop network does not introduce any additional delays as would be experienced in multi-hop networks.  ... 
doi:10.1109/access.2020.3014287 fatcat:lqiegl2tgvbmlhd3s47osdf7x4

A Comprehensive Review on Blockchains for Internet of Vehicles: Challenges and Directions [article]

Brian Hildebrand, Mohamed Baza, Tara Salman, Fathi Amsaad, Abdul Razaqu, Abdullah Alourani
2022 arXiv   pre-print
Lastly, a number of open issues and challenges as well as future opportunities in the area of AI-enabled BIoV, hardware-assisted security for BIoV and quantum computing attacks on BIoV.  ...  In this work, we present the state-of-the-art of Blockchain-enabled IoVs (BIoV) with a particular focus on their applications such as crowdsourcing-based applications, energy trading, traffic congestion  ...  The transaction lifecycle is depicted in Fig. 2 To add a block to Blockchain, a miner must successfully solve the computationally difficult puzzle of finding the right nonce for a block header.  ... 
arXiv:2203.10708v1 fatcat:sozptzz5l5a27oh5rukujcg32a

Applications of Blockchains in the Internet of Things: A Comprehensive Survey

Muhammad Salek Ali, Massimo Vecchio, Miguel Pincheira, Koustabh Dolui, Fabio Antonelli, Mubashir Husain Rehmani
2018 IEEE Communications Surveys and Tutorials  
From an abstract perspective, a blockchain is a distributed ledger capable of maintaining an immutable log of transactions happening in a network.  ...  In this context, the blockchain is seen as the missing link toward building a truly decentralized, trustless, and secure environment for the IoT and, in this survey, we aim to shape a coherent and comprehensive  ...  As an alternative to computationally expensive puzzle solving, proof of stake aims to stake peers' economic share in the network [50] .  ... 
doi:10.1109/comst.2018.2886932 fatcat:b6m4roave5c7tpdlzgguustf6e

Multi-grid cellular genetic algorithm for optimizing variable ordering of ROBDDs

Cristian Rotaru, Octav Brudaru
2012 2012 IEEE Congress on Evolutionary Computation  
The population evolves on a bidimensional grid and is implicitly organized in geographical clusters that present a form of structural similarity between individuals.  ...  This paper presents a cellular genetic algorithm for optimizing the variable order in Reduced Ordered Binary Decision Diagrams. The evolution process is inspired by a basic genetic algorithm.  ...  Dynamic Wireless Sensor Networks by Genetic Algorithm 522, Pei-Chuan Tsai, Chih-Ming Chen and Ying-ping Chen, Sparse Degrees Analysis for LT Codes Optimization 575, Lucas Benedicic, Mitja Stular and Peter  ... 
doi:10.1109/cec.2012.6256590 dblp:conf/cec/RotaruB12 fatcat:4ly3nrktw5habc6lf5err7d5py

D2.1 Vision, State of the Art and Requirements Analysis

Striccoli Domenico
2019 Zenodo  
A Privacy-Aware Authentication (PAA) scheme is presented in [106] to solve the identification problem in Mobile Cloud computing services.  ...  In [143] a multi-authority scheme is proposed, that can solve the trust issues, attribute revocation problem, and system failure.  ...  scalability, and localizability; • others (+), which mainly include: • Design: they specify or constraint architectural elements and their relationship; • Implementation: they specify or constraint the coding  ... 
doi:10.5281/zenodo.3564301 fatcat:lrb6r6zat5bk5oqwpwwlui3ztm

D2.1 Vision, State of the Art and Requirements Analysis

Striccoli Domenico
2019 Zenodo  
A Privacy-Aware Authentication (PAA) scheme is presented in [120] to solve the identification problem in Mobile Cloud computing services.  ...  In [157] a multi-authority scheme is proposed, that can solve the trust issues, attribute revocation problem, and system failure.  ...  This outcome is aligned with the scope of the GUARD project, which aims at unifying the user experience for prevention, detection, investigation and response actions, in a distributed environment across  ... 
doi:10.5281/zenodo.4268474 fatcat:vtvogbwapzdc7nn6vms2cvdjou

5GZORRO_D2.2: Design of the 5GZORRO Platform for Security & Trust

. Carrozzo, P.G. Giardina, J. Brenes, E. Bucchianeri, G. Landi, C. Herranz, A. Fernandez, M. S. Siddiqui, Javier Fernandez, K. Meth, K. Barabash, Diego R. López, P. Diogo, L. Conceicao, T. Subramanya, R. Behravesh, J.M. Jorquera Valero, P. M. Sánchez Sánchez, M. Gil Pérez, G. Martínez Pérez, J. Taylor, J. Bonnet, P. Chainho, M. Mertiri, T. Bozios, A. Lekidis, V. Theodorou, D. Laskaratos, F. Bravo Díaz, A. Ramos, J.M. Mifsud, A. Sciberreas
2021 Zenodo  
There are many consensus algorithms in use today, broadly being categorised into the following types: • Proof of Work (PoW) -an algorithm whereby 'miners' compete to solve a mathematical puzzle and generate  ...  In early stage (Incubation). 5GZORRO Focus In 5GZORRO scope, DIDs and VCs, together with DLTs, enable a multi-stakeholder decentralized identity management solution.  ... 
doi:10.5281/zenodo.5561042 fatcat:o5ecnvwvifhmveigarvfgih3l4
« Previous Showing results 1 — 15 out of 49 results