Article
Computer Science, Information Systems
Ma Zhaofeng, Meng Jialin, Wang Jihui, Shan Zhiguang
Summary: The paper proposes a blockchain-based decentralized authentication modeling scheme, named BlockAuth, to provide a more secure and reliable authentication solution in the edge and IoT environment. By treating edge devices as nodes in a blockchain network and designing secure registration and authentication strategies as well as decentralized authentication protocols, a complete blockchain-based authentication platform has been implemented, suitable for various authentication methods.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Computer Science, Information Systems
Abbas Yazdinejad, Reza M. Parizi, Ali Dehghantanha, Hadis Karimipour, Gautam Srivastava, Mohammed Aledhari
Summary: This article introduces a secure authentication model utilizing blockchain technology to address security and latency issues in drone authentication in smart cities. The proposed architecture aims for positive impacts on the Internet of Drones (IoD) by reducing network latency and enhancing security.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Computer Science, Information Systems
Mustafa Kara, Hisham R. J. Merzeh, Muhammed Ali Aydin, Hasan Huseyin Balik
Summary: Confidentiality, availability, integrity, authentication, and non-repudiation are the top priorities for secure communication. Traditional authentication mechanisms have vulnerabilities that lead to insecure communication. This paper proposes a decentralized blockchain-based identity authentication mechanism, VoIPChain, to provide secure and private communication in VoIP networks.
COMPUTER COMMUNICATIONS
(2023)
Article
Computer Science, Information Systems
Prakash Tekchandani, Indranil Pradhan, Ashok Kumar Das, Neeraj Kumar, Youngho Park
Summary: Smart devices in IoT generate big data through sensors, which is used for intelligent applications through machine learning. This requires data collection from devices to central servers for model training, but privacy and bandwidth limitations hinder the efficiency of centralized training. To address this, we propose a hybrid secure federated learning approach with blockchain for local device training and blockchain storage for traceability and immutability. A detailed analysis shows the approach's effectiveness in terms of security, resilience against attacks, and cost efficiency.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Computer Science, Information Systems
Osama A. Khashan, Sultan Alamri, Waleed Alomoush, Mutasem K. Alsmadi, Samer Atawneh, Usama Mir
Summary: Recently, technology has made significant advancements and is now being integrated into educational settings to enhance distance learning and promote interaction between learners. The integration of the Internet of Things (IoT) into education can improve the teaching and learning process and broaden the learning context for students. However, it is crucial to protect sensitive learning data during transmission and storage.
CMC-COMPUTERS MATERIALS & CONTINUA
(2023)
Article
Computer Science, Hardware & Architecture
Hind Idrissi, Paolo Palmieri
Summary: This paper presents a new scheme for authentication and authorization in IoT-based healthcare systems, addressing scalability and interoperability concerns. The scheme combines mobile agents and blockchain technologies to achieve mutual and anonymous authentication and dynamic and decentralized attribute-based access control (ABAC). Formal and informal security analyses demonstrate the robustness and resilience of the proposed scheme against various attacks. Performance evaluation shows that the scheme is scalable, outperforming existing schemes in terms of communication cost, computational cost, storage capacity, throughput, and latency.
JOURNAL OF SUPERCOMPUTING
(2023)
Article
Engineering, Electrical & Electronic
Mochan Fan, Zhipeng Zhang, Zonghang Li, Gang Sun, Hongfang Yu, Mohsen Guizani
Summary: This paper proposes a decentralized and lightweight anonymous FL identity authentication scheme, DAFL, which combines the directed acyclic graph (DAG) blockchain and accumulator to design a decentralized and simplified storage FL authentication framework. A lightweight digital signature algorithm that supports batch verification is proposed for authentication. Nodes interact through pseudonyms, and the trusted authority can track and recover the real identities of nodes. Theoretical security of the proposed DAFL is proven, and extensive experiments show that DAFL has lower authentication overhead and better convergence performance compared to existing schemes.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
(2023)
Article
Computer Science, Information Systems
Myeonghyun Kim, Joonyoung Lee, Kisung Park, Yohan Park, Kil Houm Park, Youngho Park
Summary: Car-sharing systems can solve urban problems by providing shared vehicles and reducing personal vehicle usage. However, security concerns exist due to information being transmitted through a public channel. Designing a secure authentication protocol and a decentralized scheme using blockchain technology is essential for addressing these issues.
Article
Computer Science, Information Systems
Anand Muni Mishra, Yogesh Ramdas Shahare, Piyush Kumar Shukla, Akhtar Husain, Santar Pal Singh, Sultan Alyami, Abdullah Alghamdi, Tariq Ahamed Ahanger
Summary: Blockchain technology provides a solution to interoperability issues in health information systems, ensuring safe exchange of medical data. This study proposes a Driving Training Based Optimization (DTBO) key generation method for secure authentication and data sharing in IoT healthcare.
COMPUTER COMMUNICATIONS
(2023)
Article
Chemistry, Analytical
Mohammed Amin Almaiah, Fahima Hajjej, Aitizaz Ali, Muhammad Fermi Pasha, Omar Almomani
Summary: Digital healthcare is a composite infrastructure that includes IoT-based CPS, base stations, and service providers. The demand for this technology has been increasing in recent years, but it also poses security risks. This paper proposes a lightweight authentication and data preservation scheme utilizing deep learning to achieve decentralized authentication, reducing validation latency and improving communication statistics.
Article
Computer Science, Information Systems
Myeonghyun Kim, Jihyeon Oh, Seunghwan Son, Yohan Park, Jungjoon Kim, Youngho Park
Summary: As the metaverse becomes more popular, security and privacy preservation are becoming increasingly important. In this paper, we propose an authentication scheme that uses blockchain technology to ensure secure identity verification and authentication in the metaverse without compromising sensitive information. The proposed scheme also addresses privacy concerns associated with personal information management.
Article
Computer Science, Artificial Intelligence
Righa Tandon, Ajay Verma, P. K. Gupta
Summary: This paper proposes a dual blockchain-based decentralized architecture for vehicle authentication and secure communication within the network, which improves network efficiency, security, and transmission speed.
EXPERT SYSTEMS WITH APPLICATIONS
(2024)
Article
Computer Science, Information Systems
Chanchal Maurya, Vijay Kumar Chaurasiya
Summary: The e-healthcare system utilizes IoT sensors for real-time patient health monitoring and efficient sharing of patient data. However, due to resource constraints, patients need to outsource their health data to the cloud. Accessing data from a trusted cloud or distributed users can lead to data leakage and manipulation. This paper proposes an efficient and collusion-resistant re-encryption scheme (CRRE) with mutual authentication to address these security concerns and provide privacy-preserving secure data sharing with fine-grained access control. Integrating the CRRE scheme with blockchain enhances data integrity, verifiability, accountability, and interoperability in the e-healthcare system. Formal and informal security of the CRRE scheme are validated using the random oracle model and AVISPA tool. The results show that the proposed CRRE scheme is more efficient and suitable for resource-constrained devices in the e-healthcare system.
MULTIMEDIA TOOLS AND APPLICATIONS
(2023)
Article
Computer Science, Information Systems
Mahmoud Chaira, Sofiane Aouag, Hadda Cherroun, Bouziane Brik, Abdelmounaam Rezgui
Summary: The Internet of Things (IoT) is transforming everyday life by connecting a large number of smart objects across various fields. However, the increasing prevalence of IoT brings security risks, particularly in device authentication and handling confidential data. To address these challenges, a novel decentralized scheme leveraging a hybridization of local and public blockchains is proposed. This scheme eliminates network isolation, reduces the number of messages required for device association, and solves the time delay problem caused by the PoW consensus mechanism. The proposal utilizes Ethereum blockchain in both local and public versions and demonstrates effectiveness in terms of execution time and energy consumption.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS
(2023)
Article
Computer Science, Information Systems
Osama A. Khashan, Nour M. Khafajah
Summary: With the rapid increase in the number of IoT devices, the need for secure authentication mechanisms that are resource-efficient and scalable has become crucial. Conventional authentication approaches are not suitable for IoT devices due to their expensive cryptographic primitives and lack of scalability. Blockchain technology has been proposed as a solution, but existing blockchain-based authentication methods suffer from high overhead and authentication time delays. This study presents a hybrid centralized and blockchain-based authentication architecture for IoT systems, combining the efficiency of edge servers with the decentralized trust of blockchains. Lightweight cryptographic methods are implemented to achieve efficient authentication while limiting resource consumption. The proposed architecture demonstrates significant improvements in computation cost, execution time, and power consumption compared to traditional authentication schemes.
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES
(2023)
Article
Computer Science, Artificial Intelligence
Qiuyun Tong, Yinbin Miao, Jian Weng, Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. H. Deng
Summary: In this paper, a Verifiable Fuzzy multi-keyword Search scheme with Adaptive security (VFSA) is proposed to address the challenges of achieving result verification and adaptive security in privacy-preserving fuzzy multi-keyword search. VFSA utilizes locality sensitive hashing, twin Bloom filters, and a graph-based keyword partition algorithm to achieve adaptive sublinear retrieval. The Merkle hash tree structure and adapted multiset accumulator are used to check the correctness and completeness of search results.
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
(2023)
Article
Computer Science, Artificial Intelligence
Laraib Javed, Adeel Anjum, Bello Musa Yakubu, Majid Iqbal, Syed Atif Moqurrab, Gautam Srivastava
Summary: In our technologically advanced world, data security is crucial for every individual, especially in the exchange of medical information. Existing techniques for preserving data security have limitations, but this work proposes a secure architecture and semantic approach based on blockchain, local differential privacy, and federated learning. The proposed framework addresses the vulnerabilities of current solutions and provides a trustless environment for data sharing.
Article
Computer Science, Information Systems
P. Keerthi Chandrika, M. S. Mekala, Gautam Srivastava
Summary: This article discusses the importance of edge service computing and analyzes the impact of reinforcement learning-based edge resource consolidation models on corresponding orchestrations. The article also highlights the unresolved challenges for further research on MEC orchestration.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS
(2023)
Article
Computer Science, Interdisciplinary Applications
Abbas Yazdinejad, Ali Dehghantanha, Reza M. Parizi, Gautam Srivastava, Hadis Karimipour
Summary: Integrating blockchain into the Internet of Things (IoT) for security is a new development, but it also brings more vulnerabilities and security threats. Although blockchain has potential security benefits, new cyberattacks have emerged that make it insufficient to deal with threats and attacks in IoT networks. Therefore, better security approaches are needed, such as efficient threat detection against network attacks in blockchain-based IoT environments.
COMPUTERS IN INDUSTRY
(2023)
Article
Computer Science, Theory & Methods
Jiayan Shen, Peng Zeng, Kim-Kwang Raymond Choo, Chengju Li
Summary: Electronic health records (EHRs) are stored, shared, and analyzed on cloud servers. A certificateless provable data possession (PDP) scheme is proposed for cloud-based EHRs, distributing multiple copies across different servers to ensure recoverability and resist copy-summation attack. EHRs are stored in ciphertext form to ensure authorized access, and a new data structure called map version marker table (MVMT) is designed for dynamic operations and traceability. Security and performance analyses confirm the practicality and security of the proposed scheme, assuming the intractability of the computational Diffie-Hellman problem.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
(2023)
Article
Green & Sustainable Science & Technology
Sharnil Pandya, Gautam Srivastava, Rutvij Jhaveri, M. Rajasekhara Babu, Sweta Bhattacharya, Praveen Kumar Reddy Maddikunta, Spyridon Mastorakis, Md. Jalil Piran, Thippa Reddy Gadekallu
Summary: With the emergence of new technologies such as AIoT, big data, fog computing, and edge computing, smart city applications face challenges related to the leakage of confidential and sensitive information. To address this, integrating federated learning (FL) with smart city applications can ensure privacy preservation and sensitive information protection. This paper provides an overview of current and future developments of FL for smart cities, highlighting the societal, industrial, and technological trends driving its implementation. It discusses the concept of FL for smart cities and explores various FL integrated smart city applications, including transportation, healthcare, governance, disaster management, industries, and UAV monitoring. The paper also outlines research challenges and prospects for FL's development in smart cities.
SUSTAINABLE ENERGY TECHNOLOGIES AND ASSESSMENTS
(2023)
Article
Computer Science, Cybernetics
Taushif Anwar, V Uma, Gautam Srivastava
Summary: This article addresses two research topics in recommender systems (RSs), namely cross-domain RSs (CDRSs) and context-aware RSs (CARSs). CDRSs aim to improve recommendation quality in a target domain by utilizing source domain information, while also combating the spread of fake information. CARSs utilize contextual information to recommend items that align with user interests as they change with context.
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS
(2023)
Article
Computer Science, Hardware & Architecture
Qi Feng, Debiao He, Min Luo, Xinyi Huang, Kim-Kwang Raymond Choo
Summary: In this paper, we propose an Efficient and Privacy-preserving Real-time Incentive system for CrowdsEnsing (EPRICE), designed to estimate the reliability of sensing data in a privacy-preserving setting. The theoretical analysis demonstrates that our proposed system achieves a high level of privacy-preserving for real-time reward distribution and supports practical privacy-preserving properties. The experimental findings show that our proposed EPRICE system significantly decreases the computation costs by three orders of magnitude compared with other competing schemes.
IEEE TRANSACTIONS ON COMPUTERS
(2023)
Article
Engineering, Civil
Weizheng Wang, Gautam Srivastava, Jerry Chun-Wei Lin, Yaoqi Yang, Mamoun Alazab, Thippa Reddy Gadekallu
Summary: This paper investigates the application of Unmanned Aerial Vehicles (UAV) in Mobile Edge Computing Networks (MECN) and considers security issues. By adopting a game theory viewpoint, two algorithms are proposed to optimize UAV's channel access strategies for minimizing the age of information.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
(2023)
Article
Engineering, Civil
Youcef Djenouri, Asma Belhadi, Djamel Djenouri, Gautam Srivastava, Jerry Chun-Wei Lin
Summary: In this paper, a new system called Secure and Intelligent System for the Internet of Vehicles (SISIV) is developed, which addresses the limitations of current IoV solutions by implementing a deep learning architecture based on graph convolutional networks and an attention mechanism, as well as using blockchain technology for secure data transmission. The hyperparameters of the deep learning model are intelligently selected using a branch-and-bound technique. Experimental results demonstrate the superiority of SISIV over baseline systems in terms of forecasting rate, F-measure, and attack detection, and its ability to efficiently and reliably predict traffic flow in an IoV context.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
(2023)
Article
Computer Science, Information Systems
Farhan Ullah, Shamsher Ullah, Gautam Srivastava, Jerry Chun-Wei Lin, Yue Zhao
Summary: Currently, there is a significant risk to Android applications from malware activities, which can result in the theft of important information and disruption to the economy, social structure, and financial sector. To address this, a network-based approach called NMal-Droid is developed, which includes a packet parser algorithm, a fine-tune embedding approach, Convolutional Neural Network (CNN), and Bi-directional Gated Recurrent Unit (Bi-GRU) neural network. The proposed approach is evaluated and outperforms state-of-the-art methods in terms of malware classification and detection.
Article
Engineering, Multidisciplinary
Yihong Yang, Xuan Yang, Mohsen Heidari, Mohammad Ayoub Khan, Gautam Srivastava, Mohammad R. Khosravi, Lianyong Qi
Summary: This study proposes a novel anomaly detection approach called ASTREAM, which is based on data streams. In contrast to current approaches, ASTREAM effectively addresses issues related to infiniteness, correlations, and data distribution change. It achieves accurate and efficient anomaly detection with better scalability, as demonstrated through comprehensive experiments on the KDDCUP99 dataset.
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING
(2023)
Article
Computer Science, Hardware & Architecture
Yi Chen, Zoran Salcic, Hongxia Wang, Kim-Kwang Raymond Choo, Xuyun Zhang
Summary: This article proposes a joint distortion-based non-additive cost assignment method to reduce distortion drift and improve security in video steganography. Extensive experiments show that the proposed method achieves enhanced security and visual stego video quality.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
(2023)
Article
Telecommunications
Abbas Yazdinejad, Behrouz Zolfaghari, Ali Dehghantanha, Hadis Karimipour, Gautam Srivastava, Reza M. Parizi
Summary: Threat hunting for anomalies in the behavior of edge devices is crucial in industrial IoT systems, as malicious functions from these devices can compromise the security of the entire system and potentially allow malicious software to penetrate the network.
DIGITAL COMMUNICATIONS AND NETWORKS
(2023)
Article
Computer Science, Hardware & Architecture
Jose Gomez, Elie F. Kfoury, Jorge Crichigno, Gautam Srivastava
Summary: Network operators and researchers need to evaluate and test new system deployments and research ideas, but they often face challenges in choosing the right platform to validate their performance advantages and limitations. Over the past decades, the networking community has developed platforms for testing new ideas and large-scale deployments, providing realism and scale for networking instruction. This article discusses the classification, challenges, and future directions of network experimentation platforms, aiming to assist experimenters and educators in selecting the most suitable platform for their needs.