Article
Computer Science, Information Systems
Jiahui Chen, Hang Xiao, Yushan Zheng, Mohammad Mehedi Hassan, Michele Ianni, Antonella Guzzo, Giancarlo Fortino
Summary: In this paper, a Decentralized Kerberos Secure Service-Management Protocol (DKSM) based on blockchain technology and Ciphertext-policy Attribute-based Encryption (CP-ABE) schema is proposed. Compared with existing protocols, DKSM fulfills decentralization, fine-grained access control with effective cost, and scalability simultaneously. The security of DKSM is also discussed and the protocol's efficiency and cost-effectiveness are demonstrated through tests on the Ethereum testnet and FISCO consortium platform.
INTERNET OF THINGS
(2023)
Article
Automation & Control Systems
Rahul Saha, Gulshan Kumar, Mauro Conti, Tannishtha Devgun, Tai-hoon Kim, Mamoun Alazab, Reji Thomas
Summary: The article introduces a decentralized hybrid access control framework called DHACS for IIoTs, which aims to provide transparency, reliability, and robustness. DHACS uses role-based, rule-based, and organization-based access control strategies and outperforms existing approaches in terms of access control management efficiency.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2022)
Review
Computer Science, Information Systems
Vinay Gugueoth, Sunitha Safavat, Sachin Shetty, Danda Rawat
Summary: This paper thoroughly investigates the security threats and issues in IoT, as well as potential solutions through the implementation of Blockchain. It provides a detailed description of the security threats, Blockchain-based solutions, and challenges introduced during the integration process. The paper also analyzes existing techniques and evaluation parameters.
COMPUTER SCIENCE REVIEW
(2023)
Article
Computer Science, Information Systems
Mohamed Ali Kandi, Djamel Eddine Kouicem, Messaoud Doudou, Hicham Lakhlef, Abdelmadjid Bouabdallah, Yacine Challal
Summary: This paper introduces a decentralized blockchain-based key management protocol to address the challenges of key management in the IoT. The protocol balances loads between nodes based on their capabilities and securely rekeys the network upon a change. By utilizing blockchain technology and smart contracts, the key management is decentralized, ensuring system operation even in the event of entity failure.
COMPUTER COMMUNICATIONS
(2022)
Article
Computer Science, Information Systems
Ma Zhaofeng, Meng Jialin, Wang Jihui, Shan Zhiguang
Summary: The paper proposes a blockchain-based decentralized authentication modeling scheme, named BlockAuth, to provide a more secure and reliable authentication solution in the edge and IoT environment. By treating edge devices as nodes in a blockchain network and designing secure registration and authentication strategies as well as decentralized authentication protocols, a complete blockchain-based authentication platform has been implemented, suitable for various authentication methods.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Computer Science, Information Systems
Shihong Zou, Jinwen Xi, Guoai Xu, Miao Zhang, Yueming Lu
Summary: This article proposes a new decentralized crowdsensing system called CrowdHB, which utilizes a hybrid blockchain architecture and smart contracts to ensure location privacy preservation and data quality while improving system performance. The proposed system also includes a location privacy-preserving optimization mechanism and an approach of consistency optimization to achieve a tradeoff between user privacy and system performance.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Information Systems
Ibrahim Shawky Farahat, Waleed Aladrousy, Mohamed Elhoseny, Samir Elmougy, Ahmed Elsaid Tolba
Summary: This paper presents the use of blockchain technology to secure medical data and ensure privacy. By modifying SHA256 algorithm and incorporating smart contract, private patient records can be protected and financial transactions between doctors and patients can be facilitated. The paper also demonstrates the performance advantage of this security system.
Article
Computer Science, Hardware & Architecture
Yulei Wu, Zehua Wang, Yuxiang Ma, Victor C. M. Leung
Summary: With the ambitious plans of renewal and expansion of industrialization in many countries, the efficiency, agility, and cost savings potentially resulting from the application of Industrial Internet of Things (IIoT) are drawing attentions. Blockchain and machine learning technologies may provide the next promising use case for IIoT but they are working in an adversarial way to some extent, with a focus on data privacy and security risks.
Article
Computer Science, Information Systems
Abbas Yazdinejad, Reza M. Parizi, Ali Dehghantanha, Hadis Karimipour, Gautam Srivastava, Mohammed Aledhari
Summary: This article introduces a secure authentication model utilizing blockchain technology to address security and latency issues in drone authentication in smart cities. The proposed architecture aims for positive impacts on the Internet of Drones (IoD) by reducing network latency and enhancing security.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Automation & Control Systems
B. D. Deebak, Fida Hussain Memon, Kapal Dev, Sunder Ali Khowaja, Weizheng Wang, Nawab Muhammad Faseeh Qureshi
Summary: This article proposes a trust-aware blockchain-based seamless authentication with privacy-preserving (TAB-SAPP) method to address the issues of privacy, security, and packet delivery in IoT applications. By utilizing identity management and a novel data traffic pattern, this method can expand user connectivity and improve communication metrics.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2023)
Article
Computer Science, Information Systems
Krishna Prasad Satamraju, B. Malarkodi
Summary: This study proposes a decentralized and scalable framework for device authentication and data security in IoT networks based on blockchain and Physical Unclonable Functions (PUFs). An authentication protocol using PUF-based cryptographic primitives is developed, data privacy is preserved by storing sensitive data off-chain, and lightweight smart contracts are used to facilitate role-based access control.
COMPUTER COMMUNICATIONS
(2021)
Article
Automation & Control Systems
Abdalla Alameen
Summary: The article discusses the installation of billions of Internet of Things (IoT) and sensor devices worldwide by 2020. Among various applications, the hospital service system requires authenticating devices and recording medical data. To address challenges faced by digital signature systems, a ledger system for authenticating IoT medical devices was developed, using a centralized architecture for authentication purposes.
INTELLIGENT AUTOMATION AND SOFT COMPUTING
(2021)
Article
Automation & Control Systems
Geetanjali Rathee, Farhan Ahmad, Naveen Jaglan, Charalambos Konstantinou
Summary: The Industrial Internet-of-Things (IIoT) is a powerful application that revolutionizes the growth of industries by enabling transparent communication among various entities. Data science techniques are introduced to enhance the analysis of collected data in IIoT, addressing the limitations of current distributed architectures. The article tackles the security risks posed by network anomalies/attackers in IIoT through the election of a coordinator IoT device and the integration of a blockchain-based data model, thus increasing network security.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2023)
Article
Computer Science, Information Systems
Yifu Wu, Gihan J. Mendis, Jin Wei
Summary: This article introduces a decentralized deep learning paradigm (DDLPF) utilizing federated learning, metalearning, and blockchain techniques to address the challenges faced in IoT applications. Evaluation in simulation shows that DDLPF outperforms other existing techniques in various scenarios.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Computer Science, Information Systems
Mahmoud Chaira, Sofiane Aouag, Hadda Cherroun, Bouziane Brik, Abdelmounaam Rezgui
Summary: The Internet of Things (IoT) is transforming everyday life by connecting a large number of smart objects across various fields. However, the increasing prevalence of IoT brings security risks, particularly in device authentication and handling confidential data. To address these challenges, a novel decentralized scheme leveraging a hybridization of local and public blockchains is proposed. This scheme eliminates network isolation, reduces the number of messages required for device association, and solves the time delay problem caused by the PoW consensus mechanism. The proposal utilizes Ethereum blockchain in both local and public versions and demonstrates effectiveness in terms of execution time and energy consumption.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS
(2023)
Article
Telecommunications
Maryam Bashir, Jawad Ashraf, Asad Habib, Muhammad Muzammil
Summary: Urban road networks and vehicles generate a large amount of spatio-temporal big data, which requires optimized computing and compression techniques. Researchers proposed a compression technique based on intersections, using intelligent mining to compress the data, and the compression quality was evaluated through experimentation.
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES
(2022)
Article
Engineering, Civil
Ali Hassan Sodhro, Joel J. P. C. Rodrigues, Sandeep Pirbhulal, Noman Zahid, Antonio Roberto L. de Macedo, Victor Hugo C. de Albuquerque
Summary: The study proposes a novel reliable connectivity framework with the SSLO algorithm for optimization of vehicular networks, demonstrating high stability and reliability in different test scenarios. Experimental results on the software-defined Internet of Vehicle platform show the superior performance of the SSLO algorithm in vehicle-to-vehicle, vehicle-to-infrastructure, and vehicle-to-anything communications.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
(2021)
Article
Engineering, Civil
Ali Hassan Sodhro, Sandeep Pirbhulal, Gul Hassan Sodhro, Muhammad Muzammal, Luo Zongwei, Andrei Gurtov, Antonio Roberto L. de Macedo, Lei Wang, Nuno M. Garcia, Victor Hugo C. de Albuquerque
Summary: This research proposes 5G-based algorithms and frameworks for intelligent transportation systems, aiming to improve energy efficiency and reliability, and optimizing signal strength and packet loss ratio. Experimental results show significant progress in energy and reliability aspects.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
(2021)
Article
Chemistry, Analytical
Ali Hassan Sodhro, Charlotte Sennersten, Awais Ahmad
Summary: Secure and reliable sensing is crucial for cognitive tracking and authentication. This article highlights the importance of cognitive authentication and the use of electroencephalogram (EEG) as a unique performance indicator. The experimental setup and analysis show that the Random Forest (RF) classifier performs well in testing EEG data.
Article
Mathematical & Computational Biology
Muhammad Anas Baig, Danish Ali Sunny, Abdullah Alqahtani, Shtwai Alsubai, Adel Binbusayyis, Muhammad Muzammal
Summary: The integration of blockchain and IoT in decentralized environments offers promising solutions, but the computational requirements of consensus protocols limit their application in resource-constrained IoT devices. This study proposes an empirical approach for blockchain adoption in the supply chain and introduces a modified Raft consensus protocol for permissioned blockchain Hyperledger.
COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE
(2022)
Article
Chemistry, Multidisciplinary
Muhammad Waqar, Imran, Muhammad Atif Zaman, Muhammad Muzammal, Jungsuk Kim
Summary: Regression testing is important to ensure that modified software code does not have a negative impact on existing code. It involves executing a complete test suite after software updates. Test suite prioritization techniques based on reinforcement learning have been proposed to minimize the cost of regression testing and maximize fault detection using fewer test cases.
APPLIED SCIENCES-BASEL
(2022)
Review
Computer Science, Information Systems
Soomaiya Hamid, Narmeen Zakaria Bawany, Ali Hassan Sodhro, Abdullah Lakhan, Saleem Ahmed
Summary: The Internet of Medical Things (IoMT) has played a crucial role in the healthcare sector during the COVID-19 outbreak. IoMT systems have been implemented to support traditional healthcare systems in providing remote medical services. This research conducts a systematic literature review (SLR) on IoMT systems for COVID-19 and other medical applications, and proposes a framework called 'cov-AID' for remote disease monitoring and diagnosis.
Article
Chemistry, Analytical
Samuel Mcmurray, Ali Hassan Sodhro
Summary: Software Defect Prediction (SDP) is an integral aspect of the Software Development Life-Cycle (SDLC). This article investigates various Machine Learning (ML) techniques and their impact on SDP, including feature extraction and selection techniques, as well as different ML algorithms. The results show that certain techniques, such as Principal Component Analysis (PCA) and Partial Least Squares Regression (PLS), can provide significant improvements in predicting software defects.
Article
Chemistry, Analytical
Ahmad Raza, Mohsin Ali, Muhammad Khurram Ehsan, Ali Hassan Sodhro
Summary: This paper investigates the use of tree-based algorithms in machine learning to evaluate spectrum sensing in cognitive radio-based smart healthcare systems. The study creates data sets based on probability of detection and probability of false alarm, and trains and tests the system using different tree algorithms. The results show that the optimizable tree provides the best accuracy and minimum classification error for spectrum sensing.
Article
Mathematical & Computational Biology
Abdullah Lakhan, Mazhar Ali Dootio, Ali Hassan Sodhro, Sandeep Pirbhulal, Tor Morten Groenli, Muhammad Saddam Khokhar, Lei Wang
Summary: This paper aims to address the issues of data security and cost efficiency in the Internet of Medical Things (IoMT) system, by designing cost-efficient service selection and a blockchain-enabled serverless network. Simulation results show that the proposed scheme outperforms existing schemes in terms of data security and application execution cost.
MATHEMATICAL BIOSCIENCES AND ENGINEERING
(2021)
Proceedings Paper
Engineering, Electrical & Electronic
Noman Zahid, Ali Hassan Sodhro, Mabrook S. Al-Rakhami, Lei Wang, Abdul Gumaei, Sandeep Pirbhulal
Summary: This paper proposes an adaptive duty-cycle optimization algorithm and a joint Green and sustainable healthcare framework to enhance energy saving and reliability. Theoretical and experimental analysis shows that these methods can improve energy saving and reliability by 24.43% and 36.54% respectively. This suggests that the proposed algorithm has great potential for energy constrained sensor devices in smart and connected healthcare platform.
2021 IEEE 93RD VEHICULAR TECHNOLOGY CONFERENCE (VTC2021-SPRING)
(2021)
Proceedings Paper
Engineering, Electrical & Electronic
Ali Hassan Sodhro, Mabrook S. Al-Rakhami, Lei Wang, Hina Magsi, Noman Zahid, Sandeep Pirbhulal, Kashif Nisar, Awais Ahmad
Summary: This study focuses on the energy efficiency in the IoMT system, proposing the adaptive Energy efficient (EEA) algorithm to extend battery life by exploiting the recovery effect. Compared with the BRLE algorithm, the proposed algorithm shows better performance in terms of battery lifetime and energy consumption.
2021 IEEE 93RD VEHICULAR TECHNOLOGY CONFERENCE (VTC2021-SPRING)
(2021)
Proceedings Paper
Engineering, Electrical & Electronic
Suneel Kumar, Ali Nawaz Khan, Rizwan Rasheed, Shafaq Zia, Sandeep Pirbhulal
Summary: This paper explores the use of RF charging to improve network lifetime of sensor nodes, optimizing energy transmitting nodes placement and delaying charging intervals to increase network throughput and reduce charging time. The proposed framework increases network throughput by up to 50%, enhances channel utilization for data communication, and reduces average time required for charging sensor nodes by 50%.
2021 IEEE 93RD VEHICULAR TECHNOLOGY CONFERENCE (VTC2021-SPRING)
(2021)