Article
Energy & Fuels
Arun Sekar Rajasekaran, Azees Maria, Fadi Al-Turjman, Chadi Altrjman, Leonardo Mostarda
Summary: Vehicle to grid network (V2G) enables energy flow and information exchange between battery powered Electric Vehicle (EV) and grid. This research proposes the use of blockchain technology for authentication and a revoking mechanism to enhance security and anonymity. Simulation on CYGWIN platform validates the effectiveness of the proposed approach.
Article
Computer Science, Information Systems
Saurabh Rana, Dheerendra Mishra, Sourav Mukhopadhyay
Summary: The advancement in Internet technology has led to exponential growth in the multimedia industry, but it also brings challenges such as copyright infringement, security, and privacy concerns. A blockchain-based content distribution framework is proposed to address these issues and ensure efficient and authenticated access.
MULTIMEDIA TOOLS AND APPLICATIONS
(2021)
Article
Computer Science, Information Systems
Yves Christian Elloh Adja, Badis Hammi, Ahmed Serhrouchni, Sherali Zeadally
Summary: In this study, a decentralized certificate revocation management system utilizing blockchain technology was proposed to address the single point of failure issue in current revocation mechanisms. By introducing a new field in certificate structure and storing revocation information in a public blockchain, the system demonstrates high efficiency in execution time and data consumption compared to existing revocation techniques. The research also outperforms Online Certificate Status Protocol (OCSP) and Certificate Revocation List (CRL) in terms of performance metrics.
COMPUTERS & SECURITY
(2021)
Article
Mathematics
Jan Lansky, Amir Masoud Rahmani, Saqib Ali, Nasour Bagheri, Masoumeh Safkhani, Omed Hassan Ahmed, Mehdi Hosseinzadeh
Summary: The paper introduces a lightweight authentication protocol BCmECC based on Elliptic Curve Cryptography, which relies on a public blockchain to validate users' public keys for security. The protocol is evaluated heuristically and formally, demonstrating a high level of security and comparing favorably with other blockchain-based authentication protocols in terms of security.
Article
Computer Science, Information Systems
Mustafa Kara, Hisham R. J. Merzeh, Muhammed Ali Aydin, Hasan Huseyin Balik
Summary: Confidentiality, availability, integrity, authentication, and non-repudiation are the top priorities for secure communication. Traditional authentication mechanisms have vulnerabilities that lead to insecure communication. This paper proposes a decentralized blockchain-based identity authentication mechanism, VoIPChain, to provide secure and private communication in VoIP networks.
COMPUTER COMMUNICATIONS
(2023)
Article
Chemistry, Analytical
Qianqian Xing, Xiaofeng Wang, Xinyue Xu, Jiaqi Lin, Fei Wang, Cui Li, Baosheng Wang
Summary: Log-based PKIs enhance transparency and accountability through publicly verifiable logs, but are vulnerable to split-world attacks and lack incentives. Blockchain-based PKIs enable decentralized log audits through financial incentives, but struggle with developing a scalable revocation mechanism for lightweight clients.
Article
Computer Science, Information Systems
Senshan Pan, Yunxiang Zhang, Saifei Wang
Summary: This article introduces a certificateless signature scheme based on elliptic curves, which improves the efficiency and security of healthcare through secure aggregation techniques and efficient revocation tools.
IEEE SYSTEMS JOURNAL
(2023)
Article
Computer Science, Information Systems
Abir El Azzaoui, Min Yeong Choi, Chang Hoon Lee, Jong Hyuk Park
Summary: During the global pandemic, cloud videoconferencing applications have emerged as a solution for millions of schools, companies, governments, and individuals by replacing face-to-face meetings with virtual meetings. However, security and privacy concerns arise, which can be addressed by a decentralized blockchain-based authentication mechanism proposed in this paper.
HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES
(2022)
Article
Computer Science, Artificial Intelligence
Righa Tandon, Ajay Verma, P. K. Gupta
Summary: This paper proposes a dual blockchain-based decentralized architecture for vehicle authentication and secure communication within the network, which improves network efficiency, security, and transmission speed.
EXPERT SYSTEMS WITH APPLICATIONS
(2024)
Article
Computer Science, Information Systems
Myeonghyun Kim, Joonyoung Lee, Kisung Park, Yohan Park, Kil Houm Park, Youngho Park
Summary: Car-sharing systems can solve urban problems by providing shared vehicles and reducing personal vehicle usage. However, security concerns exist due to information being transmitted through a public channel. Designing a secure authentication protocol and a decentralized scheme using blockchain technology is essential for addressing these issues.
Article
Computer Science, Information Systems
Anju Devi, Amit Kumar, Geetanjali Rathee, Hemraj Saini
Summary: The Industrial IoT is driving advancements in the industrial era, but data security and privacy pose challenges in IIoT applications. This paper proposes a new hybrid authentication approach using PKI and ECC algorithms, implemented on the Ethereum blockchain and IPFS cloud server. The approach provides privacy, high authentication accuracy, throughput, and reduced latency compared to existing methods.
MULTIMEDIA TOOLS AND APPLICATIONS
(2023)
Article
Chemistry, Analytical
Meirylene Avelino, Antonio A. de A. Rocha
Summary: This research presents a Blockchain-based solution called BlockProof framework to tackle the issue of fake news in digital crime. It verifies the authenticity and integrity of web content and records the history of updates, providing evidence for content providers to combat fake news.
Article
Computer Science, Artificial Intelligence
Xudong Li, Lingbo Wei, Lidong Wang, Ying Ma, Chi Zhang, Muhammad Sohail
Summary: With the integration of blockchain and trusted hardware, this study successfully achieves private tracking and authentication of multimedia data. The system addresses the storage capability issue of blockchain by adopting a hybrid storage pattern, and ensures data integrity and provenance through data traceability. Experimental results confirm the efficiency and reliability of the system.
INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS
(2022)
Article
Engineering, Electrical & Electronic
Durbadal Chattaraj, Basudeb Bera, Ashok Kumar Das, Sourav Saha, Pascal Lorenz, YoungHo Park
Summary: In the Internet of Vehicles (IoV), the blockchain-assisted certificateless key agreement protocol Block-CLAP provides superior security and lower communication and computational overheads compared to existing competing authentication schemes.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
(2021)
Article
Computer Science, Information Systems
Osama A. Khashan, Nour M. Khafajah
Summary: With the rapid increase in the number of IoT devices, the need for secure authentication mechanisms that are resource-efficient and scalable has become crucial. Conventional authentication approaches are not suitable for IoT devices due to their expensive cryptographic primitives and lack of scalability. Blockchain technology has been proposed as a solution, but existing blockchain-based authentication methods suffer from high overhead and authentication time delays. This study presents a hybrid centralized and blockchain-based authentication architecture for IoT systems, combining the efficiency of edge servers with the decentralized trust of blockchains. Lightweight cryptographic methods are implemented to achieve efficient authentication while limiting resource consumption. The proposed architecture demonstrates significant improvements in computation cost, execution time, and power consumption compared to traditional authentication schemes.
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES
(2023)
Article
Computer Science, Artificial Intelligence
B. D. Deebak, Fadi Al-Turjman
Summary: This paper introduces the application of S-USI in cloud-based healthcare systems and proposes a robust secure-based S-USI mechanism and a coexistence protocol proof for pervasive services in the cloud.
COMPLEX & INTELLIGENT SYSTEMS
(2023)
Article
Computer Science, Artificial Intelligence
Fahim Ullah, Fadi Al-Turjman
Summary: Blockchain-based smart contracts are transforming the smart real estate sector in smart cities. This study explores the literature on blockchain smart contracts in smart real estate and proposes a conceptual framework for their adoption in smart cities. Through a systematic review of literature published between 2000 and 2020, ten key aspects of blockchain smart contracts are identified and organized into six layers. The study presents a decentralized application and its interactions with Ethereum Virtual Machine (EVM), along with a detailed design and interaction mechanism for real estate owners and users as parties to a smart contract. It also provides a stepwise procedure for establishing and terminating smart contracts, along with a list of functions for initiating, creating, modifying, or terminating a smart contract. The study has the potential to enhance the contracting process for users and create new business opportunities for real estate owners, property technologies companies, and real estate agents.
NEURAL COMPUTING & APPLICATIONS
(2023)
Article
Computer Science, Software Engineering
Deebak Bakkiam Deebak, Fadi AL-Turjman
Summary: Proper real-time data processing and analysis are essential for Internet of Things (IoT) and cyber-physical systems, with the evolution of mobile edge computing addressing security and privacy issues. The integration of computing methods and communication technologies in healthcare systems improves medical services. A lightweight privacy-aware secure authentication (LPASA) scheme is proposed to protect vulnerable medical data, achieving better quality of services in resource-constrained environments.
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE
(2023)
Article
Computer Science, Artificial Intelligence
Aditya Khamparia, Babita Pandey, Fadi Al-Turjman, Prajoy Podder
Summary: This article presents a computer aided detection system for early knee osteoarthritis and rheumatoid detection using X-ray images and machine learning classifiers. The CAD system can be used remotely to assist medical practitioners in treatments of knee arthritis. The presented results show commendable improvement over different existing feature extractors in combination with different classifiers.
Article
Computer Science, Artificial Intelligence
Abdullahi Umar Ibrahim, Pwadubashiyi Coston Pwavodi, Mehmet Ozsoz, Fadi Al-Turjman, Tirah Galaya, Joy Johnson Agbo
Summary: This article provides an overview of the characteristics, historical pandemics, and diagnostic methods of coronaviruses. It emphasizes the need for rapid, sensitive, simple, and affordable diagnostic tools for the virus, and introduces AI-driven and CRISPR-based approaches for diagnosis and treatment. The article also highlights limitations of laboratory techniques and open research issues in the field.
JOURNAL OF EXPERIMENTAL & THEORETICAL ARTIFICIAL INTELLIGENCE
(2023)
Article
Automation & Control Systems
Arun Sekar Rajasekaran, Maria Azees, Fadi Al-Turjman
Summary: This paper provides a summary of V2G network characteristics, significance, security services, and challenges. It also offers an overview of various security attacks and related countermeasures to make V2G communications more secure.
JOURNAL OF CONTROL AND DECISION
(2023)
Article
Computer Science, Information Systems
Arun Sekar Rajasekaran, M. Azees
Summary: In Healthcare 4.0, Wireless Body Area Networks (WBAN) play a crucial role in collecting real-time patient data. This study proposes a lightweight secure anonymous authentication scheme to protect the security of the data, and implements a WBAN system using a cadence tool. The methodology addresses key challenges such as integrity, privacy, security, and non-repudiation.
INTERNATIONAL JOURNAL OF INFORMATION SECURITY
(2023)
Article
Clinical Neurology
Ali Rajabian, Saman Vinke, Joseph Candelario-Mckeown, Catherine Milabo, Maricel Salazar, Abdul Karim Nizam, Nadia Salloum, Jonathan Hyam, Harith Akram, Eileen Joyce, Thomas Foltynie, Patricia Limousin, Marwan Hariz, Ludvic Zrinzo
Summary: A study examined the use of intraoperative MRI (iMRI) to guide and verify lead placement during deep brain stimulation (DBS) surgery. The results showed that iMRI offers a high level of accuracy and safety in confirming lead placement. This is the largest series reporting the use of iMRI in DBS surgery, demonstrating its precision and safety.
JOURNAL OF NEUROSURGERY
(2023)
Article
Computer Science, Information Systems
Jegadeesan Subramani, Azees Maria, Arun Sekar Rajasekaran, Fadi Al-Turjman, Mahesh Gopal
Summary: Vehicular Ad-hoc Networks (VANETs) have potential for improving traffic management and driver safety, but there are security and privacy concerns in vehicle communication. This study proposes a blockchain-based physically secure and privacy-aware anonymous authentication technique to address these issues.
Article
Engineering, Multidisciplinary
Adedoyin A. Hussain, Fadi Al-Turjman
Summary: The internet of medical things allows patients to access flexible and virtualized devices over the internet, but task scheduling is a fundamental issue. A hybrid genetic algorithm AI method is proposed to improve task scheduling efficiency and reduce cost and time. This research can enhance the operational efficiency of the internet of medical things.
CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES
(2023)
Article
Mathematical & Computational Biology
Auwalu Saleh Mubarak, Zubaida Said Ameen, Fadi Al-Turjman
Summary: This article discusses the importance of identifying potholes on vehicles and introduces the method of developing object detection models using deep learning and computer vision techniques. The research results show that the model trained on images filtered using Gaussian smoothing performs the best.
MATHEMATICAL BIOSCIENCES AND ENGINEERING
(2023)