Article
Engineering, Electrical & Electronic
Rahul Saha, Gulshan Kumar, G. Geetha, Tai-Hoon-Kim, Mamoun Alazab, Reji Thomas, Mritunjay Kumar Rai, Joel J. P. C. Rodrigues
Summary: This study presents a blockchain-based Internet of Energy (IoE) solution for optimal charging and resource control in the era of electric vehicles, incorporating energy trading and security aspects. Hierarchical key generation, lattice-based cryptographic keys, and PBFT-based consensus are utilized to address security challenges faced by IoE. The addition of smart contracts for energy transfer utilization enhances transparency, reliability, and failure recovery, demonstrating superiority over existing approaches through experimental results, comparative analysis, and security validation.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
(2021)
Article
Computer Science, Theory & Methods
Jinglin Zou, Debiao He, Sherali Zeadally, Neeraj Kumar, Huaqun Wang, Kkwang Raymond Choo
Summary: Cloud computing is a network model of on-demand access, while blockchain can be applied to provide security services in the cloud computing model, addressing security challenges. Research also indicates that cloud computing can provide performance improvements for blockchain.
ACM COMPUTING SURVEYS
(2021)
Review
Chemistry, Analytical
Selvakumar Guruswamy, Milica Pojic, Jayashree Subramanian, Jasna Mastilovic, Sohail Sarang, Arumugam Subbanagounder, Goran Stojanovic, Varun Jeoti
Summary: The rapid growth of world population has increased the demand for food and the need for food security and sustainability. This review summarizes the available evidence for various information and communication technologies (ICTs) that can support collaborative actions, prevent fraud, and enable real-time monitoring in the food system, especially during the COVID-19 pandemic. Technologies such as the Internet of Everything, 6G, blockchain, artificial intelligence, and digital twin are gaining attention for their potential to enhance the food supply chain. The paper emphasizes the importance of utilizing ICTs to mitigate the vulnerability of the food system.
Article
Computer Science, Information Systems
Raja Wasim Ahmad, Khaled Salah, Raja Jayaraman, Ibrar Yaqoob, Samer Ellahham, Mohammed Omar
Summary: The emergence of COVID-19 in 2020 has had a global impact on the economy, health, and human lives. Existing healthcare systems have shown limitations in handling public health emergencies efficiently. Blockchain technology can assist in combating the pandemic by ensuring safe medical supplies, accurate identification of virus hotspots, and establishing data provenance for verifying the authenticity of personal protective equipment.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS
(2023)
Article
Computer Science, Hardware & Architecture
Mian Ahmad Jan, Jinjin Cai, Xiang-Chuan Gao, Fazlullah Khan, Spyridon Mastorakis, Muhammad Usman, Mamoun Alazab, Paul Watters
Summary: This paper reviews the security aspects and blockchain technology in the Internet of Multimedia Things (IoMT), discussing the challenges in data security. It explores the integration of blockchain with IoMT and commercial projects in multimedia applications, presenting future development directions.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2021)
Review
Computer Science, Information Systems
Zhang Wenhua, Faizan Qamar, Taj-Aldeen Naser Abdali, Rosilah Hassan, Syed Talib Abbas Jafri, Quang Ngoc Nguyen
Summary: Blockchain technology provides inherent security properties through cryptography, decentralization, and consensus, ensuring trust in transactions. It has wide-ranging applications, particularly in medical health data security and privacy protection. However, security issues are becoming increasingly apparent with the development of this technology.
Article
Social Issues
Raja Wasim Ahmad, Khaled Salah, Raja Jayaraman, Ibrar Yaqoob, Mohammed Omar
Summary: This article explores the potential opportunities and applications of blockchain technology in the oil and gas industry, specifically in supply chain and logistics operations. The study finds that blockchain can provide traceability, transparency, and security features to address issues in the current systems. Additionally, the article presents various systems and case studies that utilize blockchain technology, demonstrating its practicality.
TECHNOLOGY IN SOCIETY
(2022)
Article
Computer Science, Information Systems
Dinh C. Nguyen, Ming Ding, Quoc-Viet Pham, Pubudu N. Pathirana, Long Bao Le, Aruna Seneviratne, Jun Li, Dusit Niyato, H. Vincent Poor
Summary: The article discusses the concept of FLchain in MEC networks, focusing on privacy protection, security, cross-device collaboration, and resource allocation. FLchain integrates FL and blockchain technology, presenting a promising paradigm for intelligent MEC networks.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Chemistry, Multidisciplinary
Sana Al-Farsi, Muhammad Mazhar Rathore, Spiros Bakiras
Summary: This study aims to investigate practical threats and vulnerabilities in the design of blockchain-based supply chain management systems, with a focus on ensuring system reliability and security, including transparency, privacy, and traceability.
APPLIED SCIENCES-BASEL
(2021)
Article
Computer Science, Theory & Methods
Xiaoyun Li, Zibin Zheng, Hong-Ning Dai
Summary: Services computing offers a high-level abstraction to support diverse applications by encapsulating various computing infrastructures, but faces challenges such as privacy and security risks, information silos, and pricing mechanisms. The recent advances in blockchain provide opportunities to address these challenges with its built-in encryption and digital signature schemes, decentralization feature, and intrinsic incentive mechanisms. The integration of blockchain with services computing shows promise in addressing key challenges and promoting blockchain development.
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING
(2021)
Review
Green & Sustainable Science & Technology
Ritika Raj Krishna, Aanchal Priyadarshini, Amitkumar V. Jha, Bhargav Appasani, Avireni Srinivasulu, Nicu Bizon
Summary: The Internet of Things (IoT) serves as a blessing to mankind, connecting physical and virtual objects worldwide, but it also poses potential risks due to lack of security measures. Enhancing security, protecting privacy, implementing authentication, and recovery measures are essential for the future implementation of this technology. Proposed solutions based on Blockchain (BC), Fog Computing (FC), Edge Computing (EC), and Machine Learning (ML) aim to strengthen security features in IoT devices.
Review
Chemistry, Analytical
Uzma Jafar, Mohd Juzaiddin Ab Aziz, Zarina Shukur
Summary: Online voting is a growing trend in modern society with the potential to reduce costs and increase voter participation. However, caution is needed due to security threats, and blockchain technology may provide solutions to address privacy and transaction speed concerns in electronic voting systems.
Review
Computer Science, Information Systems
Urvish Thakker, Ruhi Patel, Sudeep Tanwar, Neeraj Kumar, Houbing Song
Summary: The integration of blockchain technology in the diamond industry provides new possibilities for addressing issues in the industry, while also bringing convenience and confidence to investors and consumers. By integrating blockchain technology, the diamond industry can improve security, transparency, and traceability.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Telecommunications
Yilei Wang, Zhaojie Wang, Guoyu Yang, Shan Ai, Xiaoyu Xiang, Chang Chen, Minghao Zhao
Summary: The blockchain provides a reliable and scalable method for enabling source-tracing functionality in large-scale IoT systems. To address the reliability issue of raw data collected from IoT devices, the Multi-dimensional Certificates of Origin (MCO) method is proposed to filter out potentially incredible data. The method includes Multi-dimensional Information Cross-Verification (MICV) and Multi-source Data Matching Calculation (MDMC) to verify and retain credible data.
DIGITAL COMMUNICATIONS AND NETWORKS
(2023)
Article
Computer Science, Information Systems
Saurabh Singh, A. S. M. Sanwar Hosen, Byungun Yoon
Summary: This paper discusses the application of blockchain technology in IoT systems, addressing relevant concepts and security attacks, and proposing solutions.
Article
Computer Science, Hardware & Architecture
Chia-Wei Chang, Yi-Bing Lin, Jyh-Cheng Chen
Summary: This paper explores the relationship between energy efficiency and data accuracy for IoT devices, using the example of PM2.5 application. Two reporting mechanisms, based on timer and threshold, were proposed and experimental results showed that the threshold-based reporting achieved over 37% more energy saving compared to the timer-based reporting when accuracies were the same.
MOBILE NETWORKS & APPLICATIONS
(2022)
Article
Automation & Control Systems
Jianbin Mu, Jing Wu, Ning Li, Xiaohu Zhang, Shaoyuan Li
Summary: This paper investigates the structural controllability of networked systems with high-order and heterogeneous dynamics, and provides a method to find necessary and/or sufficient conditions for structural controllability by simplifying subsystem dynamics. Designing network topology using these criteria can effectively reduce the number of subsystem interconnection links without concerning subsystem dynamics.
ASIAN JOURNAL OF CONTROL
(2022)
Letter
Computer Science, Information Systems
Jianbin Mu, Shaoyuan Li, Jing Wu, Ning Li
SCIENCE CHINA-INFORMATION SCIENCES
(2022)
Article
Computer Science, Information Systems
Lijun Wei, Yuhan Yang, Jing Wu, Chengnian Long, Bo Li
Summary: The rapid development of IoT technology has brought about a growing focus on trust issues, which include not only security and efficiency, but also aspects such as reliability, attack resistance, fairness, flexibility, and incentive. Research in trust management has made significant progress from framework development to quantification methods.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Information Systems
Yinan Ma, Jing Wu, Chengnian Long, Yi-Bing Lin
Summary: This article introduces a privacy-aware architecture, MobiDIV, for secure driver identity verification. By processing sensitive data locally on the driver's smartphone, a efficient face feature extractor is proposed to achieve real-time and robust driver identification. Experimental results show that MobiDIV achieves similar verification accuracy with fewer parameters and floating-point calculations compared to other deep neural networks. On synthetic test data sets, MobiDIV even achieves a higher average verification accuracy. Integrating MobiDIV into the car-sharing platform ICICV-E100 demonstrates the feasibility of the system.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Information Systems
Yuhan Yang, Lijun Wei, Jing Wu, Chengnian Long, Bo Li
Summary: This article proposes a multi-domain vehicular authentication architecture by introducing blockchain technology to establish distributed trust and share cross-domain information among multiple administrative domains. To guarantee anonymity and traceability, a pseudonym-based privacy-preserving authentication method is proposed. The scheme designs a two-phase pseudonym distribution mechanism with the assistance of a roadside unit (RSU) proxy.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Review
Energy & Fuels
Arshad Nawaz, Min Zhou, Jing Wu, Chengnian Long
Summary: This paper provides a comprehensive review of the multi-microgrids concept and its features, analyzes the challenges to stable operation of power systems posed by various factors, discusses energy management and demand-side management techniques, highlights the importance of cybersecurity, and makes recommendations for future research.
Article
Computer Science, Information Systems
Min Zhou, Jing Wu, Chengnian Long, Chensheng Liu, Deepa Kundur
Summary: This article explores a cost-effective corrective dispatch scheme for load redistribution attacks, utilizing dynamic line rating technology to enhance power transfer capability and ensure system security and economic performance. A robust corrective dispatch model and column constraint generation algorithm are used to solve the problem, with case studies confirming its effectiveness.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Energy & Fuels
Arshad Nawaz, Jing Wu, Chengnian Long
Summary: This paper proposes a load characteristics-based multiple microgrids architecture and utilizes distributed model predictive control for its day-ahead scheduling in grid-connected mode. The architecture categorizes consumer's load into different groups according to their operational characteristics, improving power utilization economically and optimally. The incorporation of Demand Response Program and distributed network operator facilitates economic energy exchange and supply-demand balance. The results show that the proposed scheme effectively reduces system operation cost and achieves system-wide and local supply-demand balance more economically.
Article
Energy & Fuels
Arshad Nawaz, Jing Wu, Jun Ye, Yidi Dong, Chengnian Long
Summary: This paper presents a distributed model predictive control (MPC) based energy scheduling problem for islanded multi-microgrids. The objective is to achieve supply-demand balance and reduce battery degradation. A new slack variable and a distributed coordination strategy are introduced to optimize the battery state of charge. The system framework is modeled as a mixed-integer dynamic model and solved using a mixed-integer quadratic programming approach. Comparisons with existing models demonstrate the effectiveness of the proposed scheme, and convergence analysis and fast convergence performance are provided.
Article
Automation & Control Systems
Yuhan Yang, Jing Wu, Chengnian Long, Wei Liang, Yi-Bing Lin
Summary: This article proposes a privacy-preserving and publicly auditable multiparty computation scheme for industrial data sharing and computing. By separating the ownership, use, and verification of data, the contradiction between data sharing and privacy preservation is addressed. The use of blockchain technology provides a transparent management platform for identifying and tracing illegal data and computation behavior. Experimental results demonstrate the efficiency and feasibility of the scheme.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2022)
Article
Chemistry, Analytical
Yun-Wei Lin, Yi-Bing Lin, Ted C. -Y. Chang, Bo-Xun Lu
Summary: Smart agriculture utilizes IoT technologies and smart sensors to support farming intelligence. This study proposes SensorTalk3, a combination of machine learning models, to calibrate EC sensors at edge devices. It introduces a dual-sensor detection solution to determine when recalibration is needed.
Article
Computer Science, Artificial Intelligence
Yun-Wei Lin, Yuh-Hwan Liu, Yi-Bing Lin, Jian-Chang Hong
Summary: In order to improve accuracy in new fields, we propose FenceTalk, a moving object detection system that automatically selects suspicious images not successfully detected by Yolo model using SSIM measure, reducing labor cost for data selection. FenceTalk can effectively update background image, reducing misjudgment and selecting optimal threshold images, reaching over 99% recall when combined with Yolo and SSIM.
Article
Computer Science, Information Systems
Lijun Wei, Yuhan Yang, Jing Wu, Chengnian Long, Yi-Bing Lin
Summary: Social Internet of Things (SIoT), as an emerging paradigm, applies social networking aspects to IoT, allowing objects to establish social relationships without human intervention and enhance interaction efficiency. However, trust remains a crucial issue in SIoT development. Existing literature predominantly focuses on unidirectional solutions, evaluating the trust of service providers solely based on the needs of service requesters. This study proposes a bidirectional trust model and an explicit approach to address the service delegation issue, considering the context of SIoT services or tasks.