Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Physical Sciences and Mathematics

Blockchain And Federated Learning-Based Security Solutions For Telesurgery System: A Comprehensive Review, Sachi Chaudjary, Riya Kakkar, Rajesh Gupta, Sudeep Tanwar, Smita Agrawal, Ravi Sharma Nov 2022

Blockchain And Federated Learning-Based Security Solutions For Telesurgery System: A Comprehensive Review, Sachi Chaudjary, Riya Kakkar, Rajesh Gupta, Sudeep Tanwar, Smita Agrawal, Ravi Sharma

Turkish Journal of Electrical Engineering and Computer Sciences

The advent of telemedicine with its remote surgical procedures has effectively transformed the working of healthcare professionals. The evolution of telemedicine facilitates the remote monitoring of patients that lead to the advent of telesurgery systems, i.e. one of the most critical applications in telemedicine systems. Apart from gaining popularity, the telesurgery system may encounter security and trust issues of patients? data while communicating with the surgeon for their remote treatment. Motivated by this, we have presented a comprehensive survey on secure telesurgery systems comprising healthcare, surgical robots, traditional telesurgery systems, and the role of artificial intelligence to deal with the …


Presenting A Method To Detect Intrusion In Iot Through Private Blockchain, Rezvan Mahmoudie, Saeed Parsa, Amir Masoud Rahmani Sep 2022

Presenting A Method To Detect Intrusion In Iot Through Private Blockchain, Rezvan Mahmoudie, Saeed Parsa, Amir Masoud Rahmani

Turkish Journal of Electrical Engineering and Computer Sciences

Blockchain (BC) has been used as a new solution to overcome security and privacy challenges in the Internet of Things (IoT). However, recent studies have indicated that the BC has a limited scalability and is computationally costly. Also, it has significant overhead and delay in the network, which is not suitable to the nature of IoT. This article aims at implementing BC in the IoT context for smart home management, as the integration of these two technologies ensures the IoT's security and privacy. Therefore, we proposed an overlay network in private BC to optimize its compatibility with IoT by increasing …


Two-Layered Blockchain-Based Admission Control For Secure Uav Networks, Müge Özçevi̇k Sep 2022

Two-Layered Blockchain-Based Admission Control For Secure Uav Networks, Müge Özçevi̇k

Turkish Journal of Electrical Engineering and Computer Sciences

The frequent replacement requirement of UAVs for recharging outputs an extreme number of messaging for admission control of end-users. There are many studies that try to optimize the network capacity in an energy-efficient manner. However, they do not consider the security of data and control channels, which is the urgent requirement of 5G. Blockchain handles secure systems. However, the high numbered transactions in blockchain may cause bottlenecks while considering computational delay and throughput of end-user. In UAVs, a high percentage of battery is consumed for computational tasks instead of communication tasks. Therefore, to handle security by considering the computational needs, …


Verification Of Transaction Ordering Dependence Vulnerability Of Smart Contract Based On Cpn, Hong Zheng, Zerun Liu, Jianhua Huang, Shihui Qian Jul 2022

Verification Of Transaction Ordering Dependence Vulnerability Of Smart Contract Based On Cpn, Hong Zheng, Zerun Liu, Jianhua Huang, Shihui Qian

Journal of System Simulation

Abstract: The formal verification of smart contracts researches mainly focus on programming language-level vulnerabilities, and the transaction ordering dependence is more difficult to be detected as a blockchain-level vulnerability.The latent transaction ordering dependence vulnerability in smart contracts is formally verified based on colored Petri nets.The latent vulnerability in the Decode reward contractis analyzed, anda colored Petri net model of the contract itself and its execution environment is established from top to bottom.The attacker model is introduced to consider the situation that the contract is attacked. By running the model to verify the existence of transaction ordering dependence vulnerability in …


Using Blockchain To Improve Security Of The Internet Of Things, Joshua W. Quist Jul 2022

Using Blockchain To Improve Security Of The Internet Of Things, Joshua W. Quist

Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal

The Internet of Things has increased in popularity in recent years, with daily life now being surrounded by “smart devices.” This network of smart devices, such as thermostats, refrigerators, and even stationary bikes affords us convenience, but at a cost. Security measures are typically inferior on these devices; considering that they collect our data around the clock, this is a big reason for concern. Recent research shows that blockchain technology may be one way to address these security concerns. This paper discusses the Internet of Things and the current issues with how security is handled, discusses how blockchain can shore …


Bcse: Blockchain-Based Trusted Service Evaluation Model Over Big Data, Fengyin Li, Xinying Yu, Rui Ge, Yanli Wang, Yang Cui, Huiyu Zhou Mar 2022

Bcse: Blockchain-Based Trusted Service Evaluation Model Over Big Data, Fengyin Li, Xinying Yu, Rui Ge, Yanli Wang, Yang Cui, Huiyu Zhou

Big Data Mining and Analytics

The blockchain, with its key characteristics of decentralization, persistence, anonymity, and auditability, has become a solution to overcome the overdependence and lack of trust for a traditional public key infrastructure on third-party institutions. Because of these characteristics, the blockchain is suitable for solving certain open problems in the service-oriented social network, where the unreliability of submitted reviews of service vendors can cause serious security problems. To solve the unreliability problems of submitted reviews, this paper first proposes a blockchain-based identity authentication scheme and a new trusted service evaluation model by introducing the scheme into a service evaluation model. The new …


Performance Analysis Of Lightweight Internet Of Things Devices On Blockchainnetworks, Cem Kösemen, Gökhan Dalkiliç, Şafak Öksüzer Feb 2022

Performance Analysis Of Lightweight Internet Of Things Devices On Blockchainnetworks, Cem Kösemen, Gökhan Dalkiliç, Şafak Öksüzer

Turkish Journal of Electrical Engineering and Computer Sciences

Potential integration or cooperation of the Internet of things (IoT) systems and the blockchain technology is nowadays attracting remarkable interest from the researchers. These inter-operating systems often have to rely on lowcost, low-power, and robust IoT devices that can communicate with the blockchain network through smart contracts. In this work, we designed and ran a benchmark study for ESP32-based lightweight IoT devices interacting within the Quorum blockchain. A software library was built for ESP32 devices to enable elliptic-curve digital signing, Keccak-256 hashing, decoding, encoding, and secure private key generation capabilities, which all are the basic functional requirements for running a …


Privacy In Blockchain Systems, Murat Osmanoğlu, Ali̇ Aydin Selçuk Feb 2022

Privacy In Blockchain Systems, Murat Osmanoğlu, Ali̇ Aydin Selçuk

Turkish Journal of Electrical Engineering and Computer Sciences

Privacy of blockchains has been a matter of discussion since the inception of Bitcoin. Various techniques with a varying degree of privacy protection and complexity have been proposed over the past decade. In this survey, we present a systematic analysis of these proposals in four categories: (i) identity, (ii) transaction, (iii) consensus, and (iv) smart contract privacy. Each of these categories have privacy requirements of its own, and various solutions have been proposed to meet these requirements. Almost every technique in the literature of privacy enhancing technologies have been applied to blockchains: mix networks, zero-knowledge proofs, blind signatures, ring signatures, …


Forming A Decentralized Research Network: Ds4h, Eni̇s Karaarslan, Meli̇h Bi̇ri̇m, Hüseyi̇n Emre Ari Feb 2022

Forming A Decentralized Research Network: Ds4h, Eni̇s Karaarslan, Meli̇h Bi̇ri̇m, Hüseyi̇n Emre Ari

Turkish Journal of Electrical Engineering and Computer Sciences

There is a trend toward decentralized systems, but these systems are developed without conducting enough software tests. Also, the performance, scalability, and sustainability of the decentralized systems are not taken into account. One of the reasons is the time-consuming testing process. The other is the hardware requirements and the complexity of the software installations of the testing environment. Developer communities need stable and secure research networks to test and develop prototypes before releasing the working versions. Cloud-based blockchain test networks are available, but it allows using a specific framework. Also, users are required to learn how to use each framework. …


Data Immutability And Event Management Via Blockchain In The Internet Of Things, Hakan Altaş, Gökhan Dalkiliç, Umut Can Çabuk Feb 2022

Data Immutability And Event Management Via Blockchain In The Internet Of Things, Hakan Altaş, Gökhan Dalkiliç, Umut Can Çabuk

Turkish Journal of Electrical Engineering and Computer Sciences

The Internet of things (IoT) is the key enabler of the smart systems used in many areas, from agriculture to aviation, industrial automation to autonomous vehicles. Most IoT deployments employ cost-efficient lightweight devices with limited resources (e.g., bandwidth, energy, storage). Although an IoT network must be built in its simplest form, engineers include more sophisticated devices like gateways and servers to provide web-based services and benefit from cloud systems. So, although the nodes can be widely distributed geographically or topologically, the system becomes centralized, which causes bottlenecks and single-points-of-failure. Furthermore, providing data integrity, nonrepudiation, and event management becomes tricky. In …


Tri-Op Redactable Blockchains With Block Modification, Removal, And Insertion, Mohammad Sadeq Dousti, Alpteki̇n Küpçü Feb 2022

Tri-Op Redactable Blockchains With Block Modification, Removal, And Insertion, Mohammad Sadeq Dousti, Alpteki̇n Küpçü

Turkish Journal of Electrical Engineering and Computer Sciences

In distributed computations and cryptography, it is desirable to record events on a public ledger, such that later alterations are computationally infeasible. An implementation of this idea is called blockchain, which is a distributed protocol that allows the creation of an immutable ledger. While such an idea is very appealing, the ledger may be contaminated with incorrect, illegal, or even dangerous data, and everyone running the blockchain protocol has no option but to store and propagate the unwanted data. The ledger is bloated over time, and it is not possible to remove redundant information. Finally, missing data cannot be inserted …


Block Size Optimization For Pow Consensus Algorithm Based Blockchainapplications By Using Whale Optimization Algorithm, Betül Aygün, Hi̇lal Arslan Feb 2022

Block Size Optimization For Pow Consensus Algorithm Based Blockchainapplications By Using Whale Optimization Algorithm, Betül Aygün, Hi̇lal Arslan

Turkish Journal of Electrical Engineering and Computer Sciences

Blockchain-based applications come up with cryptocurrencies, especially Bitcoin, introducing a distributed ledger technologies for peer-to-peer networks and essentially records the transactions in blocks containing hash value of the previous blocks. Block generation constitutes the basis of this technology, and the optimization of such systems is among the most crucial concerns. Determining either the block size or the number of transactions in the block brings out a remarkable problem that has been solved by the miners in recent years. First, higher block size results in higher transaction time, on the other hand, smaller block size has many disadvantages such as security, …