Article
Computer Science, Information Systems
Bhabendu Kumar Mohanta, Debasish Jena, Somula Ramasubbareddy, Mahmoud Daneshmand, Amir H. Gandomi
Summary: The rapid growth of IoT technology presents security and privacy challenges, but blockchain technology offers some solutions. By integrating IoT and blockchain technologies, a more secure smart IoT system can be achieved.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Computer Science, Information Systems
Abdul Razzaq
Summary: Internet of Things (IoTs) is a network collection that integrates various objects to support pervasive computing. The Internet of Underwater Things (IoUTs) is a specific genre of IoTs that continuously senses data related to oceanic ecosystems. This research aims to secure IoUT data transmission and address system scalability and security challenges using blockchain technology and Interplanetary File System (IPFS) method.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS
(2022)
Article
Computer Science, Information Systems
Mohamed Ali Kandi, Djamel Eddine Kouicem, Messaoud Doudou, Hicham Lakhlef, Abdelmadjid Bouabdallah, Yacine Challal
Summary: This paper introduces a decentralized blockchain-based key management protocol to address the challenges of key management in the IoT. The protocol balances loads between nodes based on their capabilities and securely rekeys the network upon a change. By utilizing blockchain technology and smart contracts, the key management is decentralized, ensuring system operation even in the event of entity failure.
COMPUTER COMMUNICATIONS
(2022)
Review
Computer Science, Information Systems
Auqib Hamid Lone, Roohie Naaz
Summary: In the past decade, there has been a significant rise in the development and study of Blockchain Technology, primarily focused on cryptocurrencies initially, but expanding to other applications with the introduction of Ethereum and smart contracts.
COMPUTER SCIENCE REVIEW
(2021)
Article
Computer Science, Information Systems
Ibrahim Shawky Farahat, Waleed Aladrousy, Mohamed Elhoseny, Samir Elmougy, Ahmed Elsaid Tolba
Summary: This paper presents the use of blockchain technology to secure medical data and ensure privacy. By modifying SHA256 algorithm and incorporating smart contract, private patient records can be protected and financial transactions between doctors and patients can be facilitated. The paper also demonstrates the performance advantage of this security system.
Article
Chemistry, Analytical
Woei-Jiunn Tsaur, Jen-Chun Chang, Chin-Ling Chen
Summary: Internet of Things (IoT) device security is a crucial topic in information security. This research proposes a highly secure and efficient protection mechanism based on blockchain technology to improve traditional firmware update methods.
Article
Computer Science, Information Systems
Bela Shrimali, Hiren B. Patel
Summary: This article provides an introduction to Blockchain, including its definition, characteristics, and application domains, as well as the opportunities, benefits, and challenges of this technology. It also presents an extensive study on Blockchain, covering taxonomy, application/use-cases, consensus mechanisms, future directions, and related technologies.
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES
(2022)
Review
Computer Science, Information Systems
Alfredo J. Perez, Sherali Zeadally
Summary: The development of Blockchain and smart contracts enables the automation of commerce in crowdsensing systems. However, security and privacy issues need to be addressed.
COMPUTER SCIENCE REVIEW
(2022)
Article
Computer Science, Information Systems
Kai Peng, Meijun Li, Haojun Huang, Chen Wang, Shaohua Wan, Kim-Kwang Raymond Choo
Summary: This article provides a comprehensive review of the security challenges and research opportunities associated with deploying smart contracts in an IoT setting, serving as a starting point for readers interested in exploring the potential applications of smart contracts.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Computer Science, Information Systems
Soumyashree S. Panda, Debasish Jena, Bhabendu Kumar Mohanta, Somula Ramasubbareddy, Mahmoud Daneshmand, Amir H. Gandomi
Summary: This article proposes a Blockchain-based distributed IoT architecture using hash chains for secure key management to ensure data privacy and provide a secure communication environment. It also introduces a secure and efficient key generation and management scheme for mutual authentication between communication entities, utilizing a one-way hash chain technique to provide a set of public and private key pairs to IoT devices. The experimental analysis confirms the superior performance of the proposed scheme compared to conventional mechanisms.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Chemistry, Analytical
Ruipeng Zhang, Chen Xu, Mengjun Xie
Summary: The research proposes an innovative IoT service platform powered by consortium blockchain technology, abstracting M2M and H2M communications into services provided by IoT devices and realizing data exchange through smart contracts and blockchain transactions. Experimental results demonstrate high performance under light to moderate workloads and provide valuable insights into the optimization of blockchain configuration.
Article
Computer Science, Information Systems
Sushil Kumar Singh, Abir E. L. Azzaoui, Kim-Kwang Raymond Choo, Laurence T. Yang, Jong Hyuk Park
Summary: Established and emerging technologies such as 5G, IoT, and blockchain are crucial in smart city applications. This article comprehensively surveys articles on blockchain for a secure IoT-enabled smart city based on 5G and beyond, published between 2016 and 2023. It provides an overview of smart city contributions and background knowledge, outlines the blockchain research framework in smart city, discusses the use of blockchain and beyond 5G in smart city applications, and identifies limitations and potential extensions for future blockchain-based solutions in smart cities.
HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES
(2023)
Article
Chemistry, Analytical
Fariza Sabrina, Julian Jang-Jaccard
Summary: Smart cities utilize IoT devices to collect and analyze data for infrastructure improvement, but security concerns remain. This study introduces a blockchain-based entitlement-based access control architecture for secure data sharing in IoT environments.
Article
Agriculture, Multidisciplinary
Faisal Jamil, Muhammad Ibrahim, Israr Ullah, Suyeon Kim, Hyun Kook Kahng, Do-Hyeun Kim
Summary: The Internet of Things (IoT) has been widely adopted in various smart applications. Lately, the greenhouse industry has gained attention for its ability to produce fresh agricultural products. However, labor and energy costs increase production costs. Additionally, ensuring the security and authenticity of agricultural data is a challenging problem. In this study, a blockchain-enabled optimization approach for greenhouse systems is proposed, which improves energy consumption and optimizes the greenhouse environment through prediction, optimization, and control. Experimental results show the effectiveness of the proposed system.
COMPUTERS AND ELECTRONICS IN AGRICULTURE
(2022)
Article
Computer Science, Information Systems
Xu Yang, Xuechao Yang, Xun Yi, Ibrahim Khalil, Xiaotong Zhou, Debiao He, Xinyi Huang, Surya Nepal
Summary: This article discusses the challenges of ensuring device authenticity and security in IoT systems, and proposes a blockchain-based authentication scheme that combines blockchain technology with the modular square root algorithm to achieve effective authentication.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Hardware & Architecture
Zihang Zhen, Xiaoding Wang, Hui Lin, Sahil Garg, Prabhat Kumar, M. Shamim Hossain
Summary: In this paper, a blockchain architecture based on dynamic state sharding (DSSBD) is proposed to solve the problems caused by cross-shard transactions and reconfiguration. By utilizing deep reinforcement learning, the number of shards, block spacing, and block size can be dynamically adjusted to improve the performance of the blockchain. The experimental results show that the crowdsourcing system with DSSBD has better performance in terms of throughput, latency, balancing, cross-shard transaction proportion, and node reconfiguration proportion, while ensuring security.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2024)
Article
Computer Science, Hardware & Architecture
Gabriel F. C. de Queiroz, Jose F. de Rezende, Valmir C. Barbosa
Summary: Multi-access Edge Computing (MEC) is a technology that enables faster task processing at the network edge by deploying servers closer to end users. This paper proposes the FlexDO algorithm to solve the DAG application partitioning and offloading problem, and compares it with other solutions to demonstrate its superior performance in various test scenarios.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2024)
Article
Computer Science, Hardware & Architecture
Shahid Latif, Wadii Boulila, Anis Koubaa, Zhuo Zou, Jawad Ahmad
Summary: In the field of Industrial Internet of Things (IIoT), networks are increasingly vulnerable to cyberattacks. This research introduces an optimized Intrusion Detection System based on Deep Transfer Learning (DTL) for heterogeneous IIoT networks, combining Convolutional Neural Networks (CNNs), Genetic Algorithms (GA), and ensemble techniques. Through rigorous evaluation, the framework achieves exceptional performance and accurate detection of various cyberattacks.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2024)
Article
Computer Science, Hardware & Architecture
Rongji Liao, Yuan Zhang, Jinyao Yan, Yang Cai, Narisu Tao
Summary: This paper proposes a joint control approach called STOP to guarantee user-perceived deadline using curriculum-guided deep reinforcement learning. Experimental results show that the STOP scheme achieves a significantly higher average arrival ratio in NS-3.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2024)
Article
Computer Science, Hardware & Architecture
Miguel Rodriguez-Perez, Sergio Herreria-Alonso, J. Carlos Lopez-Ardao, Raul F. Rodriguez-Rubio
Summary: This paper presents an implementation of an active queue management (AQM) algorithm for the Named-Data Networking (NDN) architecture and its application in congestion control protocols. By utilizing the congestion mark field in NDN packets, information about each transmission queue is encoded to achieve a scalable AQM solution.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2024)
Article
Computer Science, Hardware & Architecture
Angel Canete, Mercedes Amor, Lidia Fuentes
Summary: This paper proposes an energy-aware placement of service function chains of Virtual Network Functions (VNFs) and a resource-allocation solution for heterogeneous edge infrastructures. The solution has been integrated with an open source management and orchestration project and has been successfully applied to augmented reality services, achieving significant reduction in power consumption and ensuring quality of service compliance.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2024)
Article
Computer Science, Hardware & Architecture
Sachin Kadam, Kaustubh S. Bhargao, Gaurav S. Kasbekar
Summary: This paper discusses the problem of estimating the node cardinality of each node type in a heterogeneous wireless network. Two schemes, HSRC-M1 and HSRC-M2, are proposed to rapidly estimate the number of nodes of each type. The accuracy and efficiency of these schemes are proven through mathematical analysis and simulation experiments.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2024)
Article
Computer Science, Hardware & Architecture
Jean Nestor M. Dahj, Kingsley A. Ogudo, Leandro Boonzaaier
Summary: The launch of commercial 5G networks has opened up opportunities for heavy data users and highspeed applications, but traditional monitoring and evaluation techniques have limitations in the 5G networks. This paper presents a cost-effective hybrid analytical approach for detecting and evaluating user experience in real-time 5G networks, using statistical methods to calculate the user quality index.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2024)
Article
Computer Science, Hardware & Architecture
Ali Nauman, Haya Mesfer Alshahrani, Nadhem Nemri, Kamal M. Othman, Nojood O. Aljehane, Mashael Maashi, Ashit Kumar Dutta, Mohammed Assiri, Wali Ullah Khan
Summary: The integration of terrestrial and satellite wireless communication networks offers a practical solution to enhance network coverage, connectivity, and cost-effectiveness. This study introduces a resource allocation framework that leverages local cache pool deployments and non-orthogonal multiple access (NOMA) to improve energy efficiency. Through the use of a multi-agent enabled deep deterministic policy gradient algorithm (MADDPG), the proposed approach optimizes user association, cache design, and transmission power control, resulting in enhanced energy efficiency and reduced time delays compared to existing methods.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2024)
Article
Computer Science, Hardware & Architecture
Wu Chen, Jiayi Zhu, Jiajia Liu, Hongzhi Guo
Summary: With advancements in technology, large-scale drone swarms will be widely used in commercial and military fields. Current application methods are mainly divided into autonomous methods and controlled methods. This paper proposes a new framework for global coordination through local interaction.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2024)
Article
Computer Science, Hardware & Architecture
Peiying Zhang, Zhihu Luo, Neeraj Kumar, Mohsen Guizani, Hongxia Zhang, Jian Wang
Summary: With the development of Industry 5.0, the demand for network access devices is increasing, especially in areas such as financial transactions, drone control, and telemedicine where low latency is crucial. However, traditional network architectures limit the construction of low-latency networks due to the tight coupling of control and data forwarding functions. To overcome this problem, researchers propose a constraint escalation virtual network embedding algorithm assisted by Graph Convolutional Networks (GCN), which automatically extracts network features and accelerates the learning process to improve network performance.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2024)
Review
Computer Science, Hardware & Architecture
P. Anitha, H. S. Vimala, J. Shreyas
Summary: Congestion control is crucial for maintaining network stability, reliability, and performance in IoT. It ensures that critical applications can operate seamlessly and that IoT devices can communicate efficiently without overwhelming the network. Congestion control algorithms ensure that the network operates within its capacity, preventing network overload and maintaining network performance.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2024)
Article
Computer Science, Hardware & Architecture
Shunmugapriya Ramanathan, Abhishek Bhattacharyya, Koteswararao Kondepu, Andrea Fumagalli
Summary: This article presents an experiment that achieves live migration of a containerized 5G Central Unit module using modified open-source migration software. By comparing different migration techniques, it is found that the hybrid migration technique can reduce end-user service recovery time by 36% compared to the traditional cold migration technique.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2024)
Article
Computer Science, Hardware & Architecture
Fatma Foad Ashrif, Elankovan A. Sundararajan, Rami Ahmad, Mohammad Kamrul Hasan, Elaheh Yadegaridehkordi
Summary: This article introduces the development and current status of authentication protocols in 6LoWPAN, and proposes an innovative perspective to fill the research gap. The article comprehensively surveys and evaluates AKA protocols, analyzing their suitability in wireless sensor networks and the Internet of Things, and proposes future research directions and issues.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2024)
Article
Computer Science, Hardware & Architecture
Pranjal Kumar Nandi, Md. Rejaul Islam Reaj, Sujan Sarker, Md. Abdur Razzaque, Md. Mamun-or-Rashid, Palash Roy
Summary: This paper proposes a task offloading policy for IoT devices to a mobile edge computing system, aiming to balance device utility and execution cost. A meta heuristic approach is developed to solve the offloading problem, and the results show its potential in terms of task execution latency, energy consumption, utility per unit cost, and task drop rate.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2024)