Article
Computer Science, Information Systems
Ahmad K. Al Hwaitat, Mohammed Amin Almaiah, Aitizaz Ali, Shaha Al-Otaibi, Rima Shishakly, Abdalwali Lutfi, Mahmaod Alrawad, Sushanta Tripathy
Summary: Most current research on decentralized IoT applications focuses on a specific vulnerability, but only a limited number of techniques are dedicated to handling privacy and trust concerns. To address this, blockchain-based solutions are increasingly used to improve the quality of IoT networks. A proposed unique approach for a massive IoT system based on a permissions-based blockchain can solve the complexity and storage overhead issues, providing optimized storage and scalability for applications relying on blockchain technology. Integration of homomorphic encryption in encrypting IoT data at the user's end and extensive simulation results comparison with benchmark frameworks contribute to a novel IoT approach that increases security, privacy, and connects outstanding IoT services.
Review
Computer Science, Information Systems
Alfredo J. Perez, Sherali Zeadally
Summary: The development of Blockchain and smart contracts enables the automation of commerce in crowdsensing systems. However, security and privacy issues need to be addressed.
COMPUTER SCIENCE REVIEW
(2022)
Article
Computer Science, Information Systems
Vikram Puri, Ishaani Priyadarshini, Raghvendra Kumar, Chung Van Le
Summary: The Internet of Things (IoT) is a powerful platform that includes devices, communications, protocols, analytics, cloud, and automation. Despite its many advantages, privacy and security issues are prevalent in the IoT network. To address these issues, the authors propose a blockchain-based solution and design three different security policies. Blockchain technology can ensure the security and privacy of the IoT network.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS
(2021)
Article
Computer Science, Theory & Methods
Nikolay Ivanov, Chenning Li, Qiben Yan, Zhiyuan Sun, Zhichao Cao, Xiapu Luo
Summary: This survey develops a comprehensive taxonomy of smart contract threat mitigation solutions and classifies 133 existing solutions using this taxonomy. The study also shows how these solutions work, creates a coverage map of known smart contract vulnerabilities, and performs an evidence-based evolutionary analysis to identify trends, future perspectives, and major weaknesses of existing methodologies in threat mitigation.
ACM COMPUTING SURVEYS
(2023)
Article
Computer Science, Hardware & Architecture
M. Indushree, Manish Raj
Summary: The application of blockchain technology in the healthcare industry can address the issue of data interoperability by achieving data confidentiality, data integrity, user anonymity, drug traceability, and data misuse prevention. Blockchain allows patients to have more control over their medical information, while healthcare providers can access patient records from other institutions. A secure and efficient decentralized authentication framework, using smart contracts on the blockchain, has been developed and its performance has been rigorously evaluated.
JOURNAL OF SUPERCOMPUTING
(2023)
Article
Computer Science, Information Systems
Tharaka Mawanane Hewa, Yining Hu, Madhusanka Liyanage, Salil S. Kanhare, Mika Ylianttila
Summary: Blockchain-based smart contracts have become a significant research interest with revolutionary potential in transforming various industries towards elevated service standards. As blockchain technology advances, the opportunities for smart contracts to be applied across different sectors continue to expand, offering promising prospects for future development and exploration.
Article
Computer Science, Information Systems
Omar Alfandi, Salam Khanji, Liza Ahmad, Asad Khattak
Summary: The paper comprehensively reviews recent security and privacy challenges related to IoT, categorizing them according to the IoT layered architecture: perception, network, and application layer. The study investigates blockchain technology as a key pillar to overcome many of the IoT security and privacy problems, while also exploring the added value of combining blockchain with other new technologies such as machine learning, especially in intrusion detection systems. Additionally, challenges and privacy issues resulting from the integration of blockchain in IoT applications are highlighted, and a framework of IoT security and privacy requirements via blockchain technology is proposed.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS
(2021)
Article
Computer Science, Information Systems
B. D. Deebak, Fida Hussain Memon, Sunder Ali Khowaja, Kapal Dev, Weizheng Wang, Nawab Muhammad Faseeh Qureshi, Chunhua Su
Summary: The Internet of Things (IoT) has made significant advancements in sustainable information systems, particularly in terms of security. This article proposes a blockchain-based remote mutual authentication method that combines AI and blockchain technologies to enhance security and privacy.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Computer Science, Information Systems
Raaj Anand Mishra, Anshuman Kalla, An Braeken, Madhusanka Liyanage
Summary: Sharing students' credentials is a complex and insecure process, but this research aims to address these issues by leveraging blockchain technology. By proposing a blockchain-based architecture, the security of sharing students' credentials is ensured, with scalability improved through the use of off-chain storage mechanisms.
INFORMATION PROCESSING & MANAGEMENT
(2021)
Review
Computer Science, Information Systems
N'guessan Yves-Roland Douha, Monowar Bhuyan, Shigeru Kashihara, Doudou Fall, Yuzo Taenaka, Youki Kadobayashi
Summary: Smart-home security has attracted the attention of industry professionals, attackers, and academic researchers. Recent studies have focused on the role of blockchain, SDN, and NFV in addressing security challenges, proposing new architectures. SDN and NFV enhance home network management and access control, while blockchain strengthens IoT data security and privacy.
INTERNET OF THINGS
(2022)
Article
Computer Science, Information Systems
M. Indushree, Manish Raj, Vipul Kumar Mishra, R. Shashidhara, Ashok Kumar Das, K. Vivekananda Bhat
Summary: Designing a secure and efficient authentication protocol for mobility network is crucial and challenging due to network attacks in seamless roaming of mobile users and broadcast nature of communication. The proposed Mobile-Chain is a secure blockchain-based authentication system that protects user privacy and provides provable security. Its implementation on the ethereum blockchain platform using smart contracts shows robustness against security threats in mobility networks.
COMPUTER COMMUNICATIONS
(2023)
Article
Computer Science, Hardware & Architecture
Mohammad Amiri-Zarandi, Rozita A. Dara, Evan Fraser
Summary: Researchers proposed a lightweight blockchain-based trust management system for Social IoT, leveraging social information and demonstrating high performance in detecting untrustable nodes and rating accuracy in experiments.
JOURNAL OF SUPERCOMPUTING
(2022)
Article
Computer Science, Hardware & Architecture
Liuling Qi, Junfeng Tian, Mengjia Chai, Hongyun Cai
Summary: Blockchain has been widely adopted in IoT to tackle security issues like DDoS and Sybil. However, designing a lightweight Proof-of-Work (PoW) for IoT while maintaining security remains a challenge. To address this, we propose a lightweight PoW for blockchain in IoT. We introduce Heterogeneity Considered Trust Mechanism (HCTM) for IoT nodes to evaluate trust value based on capacity and quality, making trust evaluation more reasonable. Additionally, we present Trust based Time-Constrained PoW (TBTC-PoW), which assigns time windows to consensus nodes according to computing resources, trust values, and mining difficulty, thereby reducing energy consumption and enhancing PoW security. Theoretical analysis and experimental results demonstrate lower energy consumption and higher security with our approach.
Review
Computer Science, Information Systems
Zainab Iftikhar, Yasir Javed, Syed Yawar Abbas Zaidi, Munam Ali Shah, Zafar Iqbal Khan, Shafaq Mussadiq, Kamran Abbasi
Summary: This paper discusses the benefits and privacy issues of implementing blockchain in IoT, as well as related research. Blockchain can improve the efficiency of IoT and maintain trust, addressing privacy limitations. Research finds that blockchain is the optimal way to prevent identity disclosure, monitoring, and provide tracking in IoT.
Article
Computer Science, Information Systems
Khulud Salem Alshudukhi, Maher Ali Khemakhem, Fathy Elbouraey Eassa, Kamal Mansur Jambi
Summary: In this research, we propose a blockchain security manager based on microservice technology for federated cloud systems in an IoT environment. This security manager enables transaction exchange between different cloud providers and ensures security and access control protection. Interoperability is achieved through smart contracts.
Article
Chemistry, Analytical
Aitizaz Ali, Mohammed Amin Almaiah, Fahima Hajjej, Muhammad Fermi Pasha, Ong Huey Fang, Rahim Khan, Jason Teo, Muhammad Zakarya
Summary: This paper proposes a novel algorithm based on group theory and deep neural networks to address security issues in the IoT. By utilizing blockchain and homomorphic encryption techniques, a secure patient healthcare data access scheme is devised, providing better efficiency and security in current schemes for sharing digital healthcare data.
Article
Green & Sustainable Science & Technology
Muhammad Saidu Aliero, Muhammad Asif, Imran Ghani, Muhammad Fermi Pasha, Seung Ryul Jeong
Summary: Smart building technology uses smart energy products, networked sensors, and data analytics software to monitor environmental data and occupants' energy consumption habits, improving building operation and energy performance. The application of smart technologies and controls in research, industrial, and commercial domains is growing steadily, especially in the field of smart building energy management systems (SBEMS). Future research focuses on improving privacy and security, as well as enhancing interoperability.
Article
Environmental Sciences
Adi Alsyouf, Abdalwali Lutfi, Mohammad Al-Bsheish, Mu'taman Jarrar, Khalid Al-Mugheed, Mohammed Amin Almaiah, Fahad Nasser Alhazmi, Ra'ed Masa'deh, Rami J. Anshasi, Abdallah Ashour
Summary: This study investigates the acceptance of exposure detection apps in the context of COVID-19 from the perspective of the technology acceptance model. The findings support the overall model hypotheses, except for the link between social media awareness and intention to use exposure detection apps. The study also confirms the mediating effects of COVID-19 anxiety and influence. It contributes to the field of technology acceptance by developing a context-driven model that takes into account the major characteristics of the pandemic. The results have important implications for government agencies, health policymakers, and health organizations in combating the spread of COVID-19.
INTERNATIONAL JOURNAL OF ENVIRONMENTAL RESEARCH AND PUBLIC HEALTH
(2022)
Article
Green & Sustainable Science & Technology
Abdalwali Lutfi, Mohamed Saad, Mohammed Amin Almaiah, Abdallah Alsaad, Ahmad Al-Khasawneh, Mahmaod Alrawad, Adi Alsyouf, Akif Lutfi Al-Khasawneh
Summary: This study investigates the influence of quality features, including performance expectancy, effort expectancy, facilitating conditions, and social influence, on the intentions and satisfaction of users toward mobile learning in Saudi learning institutions. The results show that social influence does not have a significant influence on intention to use m-learning, while performance expectancy, effort expectancy, and facilitating conditions do. Additionally, system, intention, and user satisfaction are found to positively and significantly influence m-learning-system usage.
Article
Business
Abdalwali Lutfi, Mahmaod Alrawad, Adi Alsyouf, Mohammed Amin Almaiah, Ahmad Al-Khasawneh, Akif Lutfi Al-Khasawneh, Ahmad Farhan Alshira'h, Malek Hamed Alshirah, Mohamed Saad, Nahla Ibrahim
Summary: This study proposes an integrated model to examine the drivers and impact of big data analytics (BDA) adoption in the retail industry in Jordan. Through an online questionnaire survey, the research model is validated and the findings show that factors like relative advantage, organizational readiness, top management support, government support, data variety, and data velocity have a significant influence on BDA adoption. Additionally, there is a significant association between BDA adoption and firm performance.
JOURNAL OF RETAILING AND CONSUMER SERVICES
(2023)
Article
Green & Sustainable Science & Technology
Elham Alzain, Shaha Al-Otaibi, Theyazn H. H. Aldhyani, Ali Saleh Alshebami, Mohammed Amin Almaiah, Mukti E. Jadhav
Summary: In this study, multilayer perceptron and adaptive network-based fuzzy inference system models were used for PV power production forecasting. The suggested method provided better results compared to the latest models, and future PV power generation values were also predicted. The ultimate goal is to achieve a balance between the supply and demand of energy through model predictive control technique.
Article
Computer Science, Information Systems
Orieb Abualghanam, Hadeel Alazzam, Basima Elshqeirat, Mohammad Qatawneh, Mohammed Amin Almaiah
Summary: This study proposes a hybrid DNS tunneling detection system based on packet length and selected features. Experimental results show that the proposed system achieved 98.3% accuracy and a 97.6% F-score in DNS tunneling datasets, outperforming other related techniques. Moreover, including packet length in the hybrid approach improves runtime performance compared to using Tabu-PIO.
Article
Computer Science, Information Systems
Theyazn H. H. Aldhyani, Mohammad Ayoub Khan, Mohammed Amin Almaiah, Noha Alnazzawi, Ahmad K. Al Hwaitat, Ahmed Elhag, Rami Taha Shehab, Ali Saleh Alshebami
Summary: Computational intelligence (CI) and artificial intelligence (AI) play important roles in the development of smart and sustainable healthcare systems. However, the widespread use of smart devices for IoT applications generates massive amounts of data and raises concerns about confidentiality. This research aims to prove the efficacy of a secure Internet of Medical Things (IoMT) model in detecting and managing breast cancer using gated recurrent units (GRUs).
Article
Business
Mahmaod Alrawad, Abdalwali Lutfi, Sundus Alyatama, Adel Al Khattab, Sliman S. Alsoboa, Mohammed Amin Almaiah, Mujtaba Hashim Ramadan, Hussin Mostafa Arafa, Nazar Ali Ahmed, Adi Alsyouf, Akif Lutfi Al-Khasawneh
Summary: This study empirically identifies the most relevant sources of risks associated with online shopping services and investigates the influence of sociodemographic characteristics on perceived risk levels. The analysis shows that financial risk, information risk, and privacy risk significantly influence customers' purchase decisions.
JOURNAL OF RETAILING AND CONSUMER SERVICES
(2023)
Article
Chemistry, Analytical
Aitizaz Ali, Bander Ali Saleh Al-rimy, Abdulwahab Ali Almazroi, Faisal S. Alsubaei, Abdulaleem Ali Almazroi, Faisal Saeed
Summary: This paper presents an innovative approach using consortium blockchain technology to address privacy challenges in cyber-physical systems (CPSs). The proposed design establishes a decentralized and tamper-resistant framework for privacy preservation, ensuring the security and integrity of sensitive information. By leveraging consortium blockchain, secrets in CPSs can be securely stored, shared, and accessed only by authorized entities, mitigating unauthorized access and data breaches.
Article
Chemistry, Analytical
Aitizaz Ali, Bander Ali Saleh Al-rimy, Ting Tin Tin, Saad Nasser Altamimi, Sultan Noman Qasem, Faisal Saeed
Summary: Precision medicine relies on comprehensive and diverse medical data, and blockchain-enabled federated learning coupled with electronic medical records (EMRs) offers a groundbreaking solution to enable secure and decentralized data sharing and analysis. By leveraging blockchain's immutability and transparency, federated learning can be conducted on distributed EMR datasets without compromising patient privacy. This approach unlocks revolutionary insights, improves diagnosis accuracy, and expedites the development of novel therapies in precision medicine.
Article
Engineering, Multidisciplinary
Aitizaz Ali, Muhammad Fermi Pasha, Antonio Guerrieri, Antonella Guzzo, Xiaobing Sun, Aamir Saeed, Amir Hussain, Giancarlo Fortino
Summary: This paper proposes a hybrid deep learning model for Industrial Internet of Medical Things (IIoMT) that addresses security challenges using homomorphic encryption (HE) and blockchain technology, providing higher privacy and security. By deploying a pre-trained model on edge devices and utilizing a consortium blockchain for data sharing and updating, the model can effectively classify and train local models while delivering higher efficiency and low latency.
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING
(2023)
Article
Health Care Sciences & Services
Muhammad Ayaz, Muhammad Fermi Pasha, Tham Yu Le, Tahani Jaser Alahmadi, Nik Nailah Binti Abdullah, Zaid Ali Alhababi
Summary: Despite the adoption of HL7 message standards, there are still issues with semantic interoperability and support for smart devices. The FHIR standard, based on modern web technologies, could overcome these shortcomings and improve data interoperability in the healthcare industry.
Article
Computer Science, Information Systems
Muhammad Hasnain, Imran Ghani, Seung Ryul Jeong, Muhammad Fermi Pasha, Sardar Usman, Anjum Abbas
Summary: Forecasting the success or failure of software is crucial in the software development industry. This study examined the impact of human factors, misinterpretation of requirements, and miscommunication on software success prediction. The results highlight the importance of avoiding cognitive bias and improving communication to ensure software success.
CMC-COMPUTERS MATERIALS & CONTINUA
(2023)