Article
Computer Science, Information Systems
Peng Wang, Ning Xu, Haibin Zhang, Wen Sun, Abderrahim Benslimane
Summary: This article proposes a dynamic and lightweight attribute-based access control framework for blockchain-empowered IoT, which achieves secure and fine-grained authorization. The access policy is executed through smart contract in blockchain, and a decentralized application-based framework is designed to adapt to delay-intolerant applications.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Hardware & Architecture
Mohammad Amiri-Zarandi, Rozita A. Dara, Evan Fraser
Summary: Researchers proposed a lightweight blockchain-based trust management system for Social IoT, leveraging social information and demonstrating high performance in detecting untrustable nodes and rating accuracy in experiments.
JOURNAL OF SUPERCOMPUTING
(2022)
Article
Computer Science, Hardware & Architecture
M. Indushree, Manish Raj
Summary: The application of blockchain technology in the healthcare industry can address the issue of data interoperability by achieving data confidentiality, data integrity, user anonymity, drug traceability, and data misuse prevention. Blockchain allows patients to have more control over their medical information, while healthcare providers can access patient records from other institutions. A secure and efficient decentralized authentication framework, using smart contracts on the blockchain, has been developed and its performance has been rigorously evaluated.
JOURNAL OF SUPERCOMPUTING
(2023)
Article
Computer Science, Information Systems
Ahmad K. Al Hwaitat, Mohammed Amin Almaiah, Aitizaz Ali, Shaha Al-Otaibi, Rima Shishakly, Abdalwali Lutfi, Mahmaod Alrawad, Sushanta Tripathy
Summary: Most current research on decentralized IoT applications focuses on a specific vulnerability, but only a limited number of techniques are dedicated to handling privacy and trust concerns. To address this, blockchain-based solutions are increasingly used to improve the quality of IoT networks. A proposed unique approach for a massive IoT system based on a permissions-based blockchain can solve the complexity and storage overhead issues, providing optimized storage and scalability for applications relying on blockchain technology. Integration of homomorphic encryption in encrypting IoT data at the user's end and extensive simulation results comparison with benchmark frameworks contribute to a novel IoT approach that increases security, privacy, and connects outstanding IoT services.
Review
Computer Science, Information Systems
N'guessan Yves-Roland Douha, Monowar Bhuyan, Shigeru Kashihara, Doudou Fall, Yuzo Taenaka, Youki Kadobayashi
Summary: Smart-home security has attracted the attention of industry professionals, attackers, and academic researchers. Recent studies have focused on the role of blockchain, SDN, and NFV in addressing security challenges, proposing new architectures. SDN and NFV enhance home network management and access control, while blockchain strengthens IoT data security and privacy.
INTERNET OF THINGS
(2022)
Article
Chemistry, Analytical
Mohammed Amin Almaiah, Aitizaz Ali, Fahima Hajjej, Muhammad Fermi Pasha, Manal Abdullah Alohali
Summary: The Industrial Internet of Things is becoming increasingly important as it integrates various technologies and applications. To address the security and privacy issues in IIoT networks, a blockchain-based deep-learning framework is proposed, which provides two levels of security and privacy protection.
Review
Computer Science, Information Systems
Alfredo J. Perez, Sherali Zeadally
Summary: The development of Blockchain and smart contracts enables the automation of commerce in crowdsensing systems. However, security and privacy issues need to be addressed.
COMPUTER SCIENCE REVIEW
(2022)
Article
Computer Science, Hardware & Architecture
Zhe Tu, Huachun Zhou, Kun Li, Haoxiang Song, Yuzheng Yang
Summary: This paper introduces a Blockchain-based Trust and Reputation Model (BTRM) that evaluates user reputation from multiple aspects and can resist multiple malicious attacks in a distributed network. A novel Dynamic Evaluation Mechanism (DEM) is proposed to reduce the number of reputation evaluations and build trust between long-term inactive users and the network.
Article
Computer Science, Information Systems
Vikram Puri, Ishaani Priyadarshini, Raghvendra Kumar, Chung Van Le
Summary: The Internet of Things (IoT) is a powerful platform that includes devices, communications, protocols, analytics, cloud, and automation. Despite its many advantages, privacy and security issues are prevalent in the IoT network. To address these issues, the authors propose a blockchain-based solution and design three different security policies. Blockchain technology can ensure the security and privacy of the IoT network.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS
(2021)
Article
Computer Science, Interdisciplinary Applications
Salam Abdallah, Nishara Nizamuddin
Summary: In this paper, a blockchain-based framework for the online sale of pharmaceutical products is proposed. It eliminates intermediaries such as hospitals or pharmacies and utilizes Ethereum smart contracts to monitor interactions, track transactions, and ensure secure payment dispersal. The smart contracts also regulate the interaction between sellers and consumers, monitor IoT container status, and provide full notification to consumers. Special cases such as consumer refunds are handled to ensure the safe delivery of medicines.
COMPUTERS & INDUSTRIAL ENGINEERING
(2023)
Article
Computer Science, Theory & Methods
Omar Hasan, Lionel Brunie, Elisa Bertino
Summary: The purpose of a reputation system is to hold users accountable for their behavior in a distributed application. Users' reputation is computed based on the feedback provided by fellow users. Privacy-preserving reputation systems allow users to provide feedback privately. This survey proposes analysis frameworks for privacy-preserving reputation systems, focusing on blockchain-based systems and their unique properties. The analysis provides insights and directions for further research, including leveraging blockchain for truly trustless systems and addressing common attacks.
ACM COMPUTING SURVEYS
(2023)
Review
Computer Science, Information Systems
Wattana Viriyasitavat, Li Da Xu, Dusit Niyato, Zhuming Bi, Danupol Hoonsopon
Summary: Blockchain technology is revolutionizing Business Process Management by providing trust and enforcing obligations through smart contracts. This paper explores the applications of blockchain in BPM, identifies the relationship between BPM and blockchain, discusses the current progress in the field, and highlights the challenges and research directions for future advancements. The study finds that adopting blockchain in BPM has attracted significant attention and holds promise for assuring trust in decentralized BPM. Efforts are needed to address technical challenges and improve interoperability, trust entity determination, time-sensitive execution confirmation, and support for irreversibility.
Article
Engineering, Multidisciplinary
Mohamed Baza, Noureddine Lasla, Mohamed M. E. A. Mahmoud, Gautam Srivastava, Mohamed Abdallah
Summary: Ride-sharing services are vulnerable to centralized service failures, privacy breaches, and malicious attacks. B-Ride, a decentralized ride-sharing service based on public Blockchain, addresses issues of fraudulent activities by introducing a time-locked deposit protocol and zero-knowledge set membership proof.
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING
(2021)
Review
Computer Science, Information Systems
Zainab Iftikhar, Yasir Javed, Syed Yawar Abbas Zaidi, Munam Ali Shah, Zafar Iqbal Khan, Shafaq Mussadiq, Kamran Abbasi
Summary: This paper discusses the benefits and privacy issues of implementing blockchain in IoT, as well as related research. Blockchain can improve the efficiency of IoT and maintain trust, addressing privacy limitations. Research finds that blockchain is the optimal way to prevent identity disclosure, monitoring, and provide tracking in IoT.
Review
Computer Science, Theory & Methods
Thien Huynh-The, Thippa Reddy Gadekallu, Weizheng Wang, Gokul Yenduri, Pasika Ranaweera, Quoc-Viet Pham, Daniel Benevides da Costa, Madhusanka Liyanage
Summary: Since Facebook officially changed its name to Meta in Oct. 2021, the metaverse has become a new norm of social networks and 3D virtual worlds. Blockchain is a promising solution for securing users' digital content and data in the metaverse due to its distinct features of decentralization, immutability, and transparency.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2023)
Article
Computer Science, Information Systems
Michael Sober, Giulia Scaffino, Stefan Schulte, Salil S. Kanhere
Summary: With the steady growth of the Internet of Things (IoT), the amount of generated data has also increased. To address the challenges of finding and using relevant data, a data marketplace implemented with blockchain technology is proposed. Smart contracts are used to enable various functionalities and enforce data exchange rules, while a proxy, broker, and GUIs facilitate data trading.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS
(2023)
Article
Computer Science, Hardware & Architecture
Mohammad Reza Nosouhi, Shui Yu, Keshav Sood, Marthie Grobler, Raja Jurdak, Ali Dorri, Shigen Shen
Summary: In this article, a secure mix-based approach called UCoin is proposed to address the issues in preserving privacy of users in cryptocurrencies. It breaks the link between input and output addresses in transactions, utilizes a secure shuffling protocol, and achieves higher performance and compatibility with the existing cryptocurrency architecture.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
(2023)
Article
Computer Science, Information Systems
Rahul Mishra, Dharavath Ramesh, Salil S. Kanhere, Damodar Reddy Edla
Summary: This paper introduces a blockchain-based secure decentralized public auditing model and an efficient deduplication scheme. By using blockchain instead of a centralized third-party auditor, it reduces the waste of computational and storage resources. By employing redactability to address security issues and efficient deduplication scheme, it achieves storage savings and data protection.
ACM TRANSACTIONS ON MANAGEMENT INFORMATION SYSTEMS
(2023)
Article
Computer Science, Artificial Intelligence
Siddique Latif, Rajib Rana, Sara Khalifa, Raja Jurdak, Junaid Qadir, Bjorn Schuller
Summary: Traditionally, speech emotion recognition (SER) relied on manual feature engineering, but this approach requires significant manual effort and impedes innovation. Representation learning techniques have been adopted to automatically learn intermediate representations without manual engineering, leading to improved SER performance and rapid innovation. Deep learning further enhances the effectiveness of representation learning by enabling the automatic learning of hierarchical representations. This article presents a comprehensive survey on deep representation learning for SER, highlighting techniques, challenges, and future research areas.
IEEE TRANSACTIONS ON AFFECTIVE COMPUTING
(2023)
Review
Energy & Fuels
Samuel Karumba, Subbu Sethuvenkatraman, Volkan Dedeoglu, Raja Jurdak, Salil S. Kanhere
Summary: The increasing adoption of clean energy technologies has led to the evolution of traditional electricity markets into Distributed Energy Trading (DET) systems. Blockchain technology has the potential to provide decentralised trust, immutability, security, and transparency in DET systems. However, the integration of blockchain in DET systems faces technical, administrative, standardisation, and economic barriers, which need to be addressed.
INTERNATIONAL JOURNAL OF SUSTAINABLE ENERGY
(2023)
Article
Computer Science, Theory & Methods
Seyedehfaezeh Hosseininoorbin, Siamak Layeghy, Mohanad Sarhan, Raja Jurdak, Marius Portmann
Summary: This paper explores the implementation of a practical network intrusion detection system (NIDS) at the edge of IoT using Google's Edge TPU and a deep learning approach. It focuses on the computational and energy efficiency of deep learning-based NIDS at the IoT edge. The study uses various scaled model sizes of deep neural network architectures and compares the performance of Edge TPU-based implementation with an energy-efficient embedded CPU.
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING
(2023)
Article
Computer Science, Artificial Intelligence
Siddique Latif, Rajib Rana, Sara Khalifa, Raja Jurdak, Bjorn Schuller
Summary: Despite recent advancements in speech emotion recognition (SER) within a single corpus, the performance of these systems degrades significantly for cross-corpus and cross-language scenarios. This is due to the lack of generalization in SER systems towards unseen conditions. Adversarial methods have been used to address this issue, but many only focus on cross-corpus SER and ignore the cross-language performance degradation. This study proposes an adversarial dual discriminator (ADDi) network and a self-supervised ADDi (sADDi) network to improve cross-corpus and cross-language SER without requiring target data labels. Experimental results demonstrate improved performance compared to state-of-the-art methods.
IEEE TRANSACTIONS ON AFFECTIVE COMPUTING
(2023)
Article
Computer Science, Information Systems
Seyedehfaezeh Hosseininoorbin, Siamak Layeghy, Brano Kusy, Raja Jurdak, Marius Portmann
Summary: This paper examines the performance of Google's Edge TPU on feed-forward neural networks. It considers the Edge TPU as a hardware platform and explores different architectures of deep neural network classifiers, which have traditionally been challenging to run on resource-constrained edge devices. By utilizing a spectrogram data representation, the study examines the trade-off between classification performance and energy consumption for inference. The energy efficiency of the Edge TPU is compared to that of the widely-used embedded CPU ARM Cortex-A53. The results provide insights into the impact of neural network architecture on the performance of the Edge TPU and offer guidance for selecting the optimal operating point based on classification accuracy and energy consumption. Additionally, the evaluations highlight the performance crossover between the Edge TPU and Cortex-A53, depending on the neural network specifications. The analysis also provides a decision chart to assist in platform selection based on model parameters and context.
INTERNET OF THINGS
(2023)
Proceedings Paper
Computer Science, Information Systems
Guntur Dharma Putra, Volkan Dedeoglu, Salil S. Kanhere, Raja Jurdak
Summary: 6G-enabled IoT networks require effective resource allocation for massive scale network capacity. While blockchain-based resource sharing schemes lack trust monitoring, Trust and Reputation Management (TRM) can address this. However, changeable keys in blockchains may hinder TRM's usability. This paper proposes a privacy-preserving TRM using interconnected public-private blockchains, allowing nodes to use changeable keys and ensuring minimal overheads.
2023 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN AND CRYPTOCURRENCY, ICBC
(2023)
Proceedings Paper
Computer Science, Information Systems
Gowri Sankar Ramachandran, Thi Thuy Linh Tran, Raja Jurdak
Summary: Many real-world applications use web service frameworks to provide APIs to businesses and end-consumers. However, in applications like supply chain management, the organization running the web server may act dishonestly or the server may be compromised. To address this, we propose DeWS, a decentralized and Byzantine fault-tolerant web service framework that provides transparency and auditability through a blockchain ledger. Our proof-of-concept implementation shows that DeWS can tolerate Byzantine failures, although at the cost of high latency. This framework can support the shift towards more decentralized web services for safety-critical and mission-critical applications.
2023 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN AND CRYPTOCURRENCY, ICBC
(2023)
Proceedings Paper
Computer Science, Information Systems
Kealan Dunnett, Shantanu Pal, Zahra Jadidi, Raja Jurdak
Summary: This paper proposes a blockchain-based CTI sharing framework that utilizes trustless delegates for dynamic trust-based decision-making and decentralized trust evaluation. Unlike existing approaches, delegates within our framework facilitate direct sharing of CTI with consumers, enabling scalable CTI sharing.
2023 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN AND CRYPTOCURRENCY, ICBC
(2023)
Proceedings Paper
Computer Science, Information Systems
Jun Wook Heo, Gowri Ramachandran, Raja Jurdak
Summary: This paper proposes a decentralized Practical Proof of Storage (PPoS) solution for blockchain full nodes, which uses asymmetric latency for encryption and decryption, and introduces a chained architecture to detect attacks and reduce performance overhead. Experimental results demonstrate that this approach significantly reduces decryption time while maintaining a high degree of decentralization.
2023 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN AND CRYPTOCURRENCY, ICBC
(2023)
Proceedings Paper
Computer Science, Information Systems
Samuel Karumba, Raja Jurdak, Salil S. Kanhere, Subbu Sethuvenkatraman
Summary: Blockchain technology can revolutionize the energy sector by enabling peer-to-peer energy trading, demand-side flexibility trading, and renewable energy certificate trading, among other decentralised energy trading use cases. However, the lack of interoperability between blockchain networks and platforms is a significant challenge that leads to data and information silos. To address this challenge, a Blockchain Agnostic Interoperability Framework (BAILIF) is proposed, which provides a decentralized notary service and a cross-chain attestation and verification protocol. A proof of concept for a distributed energy trading application demonstrates the solution's feasibility, with BAILIF achieving a throughput of up to 666 transactions per second, indicating its potential to enable seamless data sharing across blockchain platforms and promote the adoption of renewable energy sources.
2023 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN AND CRYPTOCURRENCY, ICBC
(2023)
Article
Computer Science, Information Systems
Seyedehfaezeh Hosseininoorbin, Siamak Layeghy, Brano Kusy, Raja Jurdak, Marius Portmann
Summary: This study explores different joint time-frequency representations of sensor data and utilizes a Convolutional Neural Network (ConvNet) for activity classification based on wearable devices. The concurrent use of two different data representations in a cooperative bi-stream ConvNet configuration is also considered. The proposed method achieves high classification accuracy and F1 score on a real-world public HAR dataset, surpassing the state-of-the-art. Furthermore, the method is implemented on a resource-constrained edge device to evaluate the trade-off between energy consumption and classification performance in IoT applications.
INTERNET OF THINGS
(2023)
Proceedings Paper
Computer Science, Interdisciplinary Applications
Rahma Mukta, Rue C. Teh, Hye-young Paik, Qinghua Lu, Salil S. Kanhere
Summary: Self Sovereign Identity (SSI) is an emerging identity system that enables secure credential issuance and verification without relying on a centralized authority. However, current SSI platforms face trust issues as individual issuers lack sufficient trust support. This paper proposes a trust propagation protocol that uses blockchain to establish a trust propagation credential template, allowing individual users to be trusted verifiable issuers in the SSI platform.
2023 IEEE INTERNATIONAL CONFERENCE ON DECENTRALIZED APPLICATIONS AND INFRASTRUCTURES, DAPPS
(2023)