Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

Blockchain

Discipline
Institution
Publication Year
Publication
File Type

Articles 1 - 30 of 120

Full-Text Articles in Physical Sciences and Mathematics

Quantinar: A Blockchain Peer-To-Peer Ecosystem For Modern Data Analytics, Raul Bag, Bruno Spilak, Julian Winkel, Wolfgang Karl Hardle Aug 2024

Quantinar: A Blockchain Peer-To-Peer Ecosystem For Modern Data Analytics, Raul Bag, Bruno Spilak, Julian Winkel, Wolfgang Karl Hardle

Sim Kee Boon Institute for Financial Economics

The power of data and correct statistical analysis has never been more prevalent. Academics and practitioners require nowadays an accurate application of quantitative methods. Yet many branches are subject to a crisis of integrity, which is shown in an improper use of statistical models, p-hacking, HARKing, or failure to replicate results. We propose the use of a Peer-to-Peer (P2P) ecosystem based on a blockchain network, Quantinar, to support quantitative analytics knowledge paired with code in the form of Quantlets or software snippets. The integration of blockchain technology allows Quantinar to ensure fully transparent and reproducible scientific research.


Unveiling The Dynamics Of Ai Applications: A Review Of Reviews Using Scientometrics And Bertopic Modeling, Raghu Raman, Debidutta Pattnaik, Laurie Hughes, Prema Nedungadi Jul 2024

Unveiling The Dynamics Of Ai Applications: A Review Of Reviews Using Scientometrics And Bertopic Modeling, Raghu Raman, Debidutta Pattnaik, Laurie Hughes, Prema Nedungadi

Research outputs 2022 to 2026

In a world that has rapidly transformed through the advent of artificial intelligence (AI), our systematic review, guided by the PRISMA protocol, investigates a decade of AI research, revealing insights into its evolution and impact. Our study, examining 3,767 articles, has drawn considerable attention, as evidenced by an impressive 63,577 citations, underscoring the scholarly community's profound engagement. Our study reveals a collaborative landscape with 18,189 contributing authors, reflecting a robust network of researchers advancing AI and machine learning applications. Review categories focus on systematic reviews and bibliometric analyses, indicating an increasing emphasis on comprehensive literature synthesis and quantitative analysis. The …


Predicting Iot Distributed Ledger Fraud Transactions With A Lightweight Gan Network, Charles Rawlins, Jagannathan Sarangapani Jul 2024

Predicting Iot Distributed Ledger Fraud Transactions With A Lightweight Gan Network, Charles Rawlins, Jagannathan Sarangapani

Electrical and Computer Engineering Faculty Research & Creative Works

Decision-making and consensus in traditional blockchain protocols is formulated as a repeated Bernoulli trial that solves a computationally intense lottery puzzle, called Proof-of-Work (PoW) in Bitcoin. This approach has shown robustness through practice but does not scale with increasing network size and generation of new transactions. Resource constrained Internet of Things (IoT) networks are incompatible with full computation of schemes like Bitcoin's PoW. Our effort proposes a first step towards an alternative consensus using machine learning-based decision-making with prediction of fraud transactions to alleviate need for intense computation. To improve base approval probabilities for fraud detection in an ideal security …


Fully Automated Selfish Mining Analysis In Efficient Proof Systems Blockchains, Krishnendu Chatterjee, Amirali Ebrahimzadeh, Mehrdad Karrabi, Krzysztof Pietrzak, Michelle Yeo, Dorde Zikelic Jun 2024

Fully Automated Selfish Mining Analysis In Efficient Proof Systems Blockchains, Krishnendu Chatterjee, Amirali Ebrahimzadeh, Mehrdad Karrabi, Krzysztof Pietrzak, Michelle Yeo, Dorde Zikelic

Research Collection School Of Computing and Information Systems

We study selfish mining attacks in longest-chain blockchains like Bitcoin, but where the proof of work is replaced with efficient proof systems - like proofs of stake or proofs of space - and consider the problem of computing an optimal selfish mining attack which maximizes expected relative revenue of the adversary, thus minimizing the chain quality. To this end, we propose a novel selfish mining attack that aims to maximize this objective and formally model the attack as a Markov decision process (MDP). We then present a formal analysis procedure which computes an ϵ-tight lower bound on the optimal expected …


Sustainable Accounting: The Benefits And Challenges Of Its Implementation, Collin Eckstein May 2024

Sustainable Accounting: The Benefits And Challenges Of Its Implementation, Collin Eckstein

University Honors College

This thesis is centered around the idea that sustainability is a necessary component within the world. Environmental, social, and governance (ESG) factors are key components of analyzing sustainable practices. Although accountants have historically focused on financial reporting, they now have the added function of sustainable accounting as environmental implications are an area of concern for companies. A substantial component of this thesis centers around analyzing how ESG factors contribute to an organization’s financial performance. It also observes how comprehensive sustainability reports impact investor decisions and examines the challenges that auditors face when providing assurance for sustainability initiatives. Furthermore, it examines …


A Reputation System For Provably-Robust Decision Making In Iot Blockchain Networks, Charles C. Rawlins, Sarangapani Jagannathan, Venkata Sriram Siddhardh Nadendla Apr 2024

A Reputation System For Provably-Robust Decision Making In Iot Blockchain Networks, Charles C. Rawlins, Sarangapani Jagannathan, Venkata Sriram Siddhardh Nadendla

Electrical and Computer Engineering Faculty Research & Creative Works

Blockchain systems have been successful in discerning truthful information from interagent interaction amidst possible attackers or conflicts, which is crucial for the completion of nontrivial tasks in distributed networking. However, the state-of-the-art blockchain protocols are limited to resource-rich applications where reliably connected nodes within the network are equipped with significant computing power to run lottery-based proof-of-work (pow) consensus. The purpose of this work is to address these challenges for implementation in a severely resource-constrained distributed network with internet of things (iot) devices. The contribution of this work is a novel lightweight alternative, called weight-based reputation (wbr) scheme, to classify new …


The Microverse: A Task-Oriented Edge-Scale Metaverse, Qian Qu, Mohsen Hatami, Ronghua Xu, Deeraj Nagothu, Yu Chen, Xiaohua Li, Erik Blasch, Erika Ardiles-Cruz, Genshe Chen Feb 2024

The Microverse: A Task-Oriented Edge-Scale Metaverse, Qian Qu, Mohsen Hatami, Ronghua Xu, Deeraj Nagothu, Yu Chen, Xiaohua Li, Erik Blasch, Erika Ardiles-Cruz, Genshe Chen

Michigan Tech Publications, Part 2

Over the past decade, there has been a remarkable acceleration in the evolution of smart cities and intelligent spaces, driven by breakthroughs in technologies such as the Internet of Things (IoT), edge–fog–cloud computing, and machine learning (ML)/artificial intelligence (AI). As society begins to harness the full potential of these smart environments, the horizon brightens with the promise of an immersive, interconnected 3D world. The forthcoming paradigm shift in how we live, work, and interact owes much to groundbreaking innovations in augmented reality (AR), virtual reality (VR), extended reality (XR), blockchain, and digital twins (DTs). However, realizing the expansive digital vista …


Pias: Privacy-Preserving Incentive Announcement System Based On Blockchain For Internet Of Vehicles, Yonghua Zhan, Yang Yang, Hongju Cheng, Xiangyang Luo, Zhuangshuang Guan, Robert H. Deng Jan 2024

Pias: Privacy-Preserving Incentive Announcement System Based On Blockchain For Internet Of Vehicles, Yonghua Zhan, Yang Yang, Hongju Cheng, Xiangyang Luo, Zhuangshuang Guan, Robert H. Deng

Research Collection School Of Computing and Information Systems

More vehicles are connecting to the Internet of Things (IoT), transforming Vehicle Ad hoc Networks (VANETs) into the Internet of Vehicles (IoV), providing a more environmentally friendly and safer driving experience. Vehicular announcement networks show promise in vehicular communication applications. However, two major issues arise when establishing such a system. Firstly, user privacy cannot be guaranteed when messages are forwarded anonymously, thus the reliability of these messages is in question. Secondly, users often lack interest in responding to announcements. To address these problems, we introduce a Blockchain-based incentive announcement system called PIAS. This system enables anonymous message commitment in a …


Towards Blockchain-Based Secure Bgp Routing, Challenges And Future Research Directions, Qiong Yang, Li Ma, Shanshan Tu, Sami Ullah, Muhammad Waqas, Hisham Alasmary Jan 2024

Towards Blockchain-Based Secure Bgp Routing, Challenges And Future Research Directions, Qiong Yang, Li Ma, Shanshan Tu, Sami Ullah, Muhammad Waqas, Hisham Alasmary

Research outputs 2022 to 2026

Border Gateway Protocol (BGP) is a standard inter-domain routing protocol for the Internet that conveys network layer reachability information and establishes routes to different destinations. The BGP protocol exhibits security design defects, such as an unconditional trust mechanism and the default acceptance of BGP route announcements from peers by BGP neighboring nodes, easily triggering prefix hijacking, path forgery, route leakage, and other BGP security threats. Meanwhile, the traditional BGP security mechanism, relying on a public key infrastructure, faces issues like a single point of failure and a single point of trust. The decentralization, anti-tampering, and traceability advantages of blockchain offer …


Autonomous Strike Uavs In Support Of Homeland Security Missions: Challenges And Preliminary Solutions, Meshari Aljohani, Ravi Mukkamala, Stephan Olariu Jan 2024

Autonomous Strike Uavs In Support Of Homeland Security Missions: Challenges And Preliminary Solutions, Meshari Aljohani, Ravi Mukkamala, Stephan Olariu

Computer Science Faculty Publications

Unmanned Aerial Vehicles (UAVs) are becoming crucial tools in modern homeland security applications, primarily because of their cost-effectiveness, risk reduction, and ability to perform a wider range of activities. This study focuses on the use of autonomous UAVs to conduct, as part of homeland security applications, strike missions against high-value terrorist targets. Owing to developments in ledger technology, smart contracts, and machine learning, activities formerly carried out by professionals or remotely flown UAVs are now feasible. Our study provides the first in-depth analysis of the challenges and preliminary solutions for the successful implementation of an autonomous UAV mission. Specifically, we …


Janus: Toward Preventing Counterfeits In Supply Chains Utilizing A Multi-Quorum Blockchain, Vika Crossland, Connor Dellwo, Golam Bashar, Gaby G. Dagher Dec 2023

Janus: Toward Preventing Counterfeits In Supply Chains Utilizing A Multi-Quorum Blockchain, Vika Crossland, Connor Dellwo, Golam Bashar, Gaby G. Dagher

Computer Science Faculty Publications and Presentations

The modern pharmaceutical supply chain lacks transparency and traceability, resulting in alarming rates of counterfeit products entering the market. These illegitimate products cause harm to end users and wreak havoc on the supply chain itself, costing billions of dollars in profit loss. In this paper, in response to the Drug Supply Chain Security Act (DSCSA), we introduce Janus, a novel pharmaceutical track-and-trace system that utilizes blockchain and cloning-resistant hologram tags to prevent counterfeits from entering the pharmaceutical supply chain. We design a multi-quorum consensus protocol that achieves load balancing across the network. We perform a security analysis to show robustness …


Healthaichain: Improving Security And Safety Using Blockchain Technology Applications In Ai-Based Healthcare Systems, Naresh Kshetri, James Hutson, Revathy G Nov 2023

Healthaichain: Improving Security And Safety Using Blockchain Technology Applications In Ai-Based Healthcare Systems, Naresh Kshetri, James Hutson, Revathy G

Faculty Scholarship

Blockchain as a digital ledger for keeping records of digital transactions and other information, it is secure and decentralized technology. The globally growing number of digital population every day possesses a significant threat to online data including the medical and patients’ data. After bitcoin, blockchain technology has emerged into a general-purpose technology with applications in medical industries and healthcare. Blockchain can promote highly configurable openness while retaining the highest security standards for critical data of medical patients. Referred to as distributed record keeping for healthcare systems which makes digital assets unalterable and transparent via a cryptographic hash and decentralized network. …


Metaverse Key Requirements And Platforms Survey, Akbobek Abilkaiyrkyzy, Ahmed Elhagry, Fedwa Laamarti, Abdulmotaleb El Saddik Oct 2023

Metaverse Key Requirements And Platforms Survey, Akbobek Abilkaiyrkyzy, Ahmed Elhagry, Fedwa Laamarti, Abdulmotaleb El Saddik

Computer Vision Faculty Publications

The growing interest in the metaverse has led to an abundance of platforms, each with its own unique features and limitations. This paper's objective is two-fold. First, we aim at providing an objective analysis of requirements that need to be fulfilled by metaverse platforms. We survey a broad set of criteria including interoperability, immersiveness, persistence, multimodal and social interaction, scalability, level of openness, configurability, market access, security, and blockchain integration, among others. Second, we review a wide range of existing metaverse platforms, and we critically evaluate their ability to meet the requirements listed. We identify their limitations, which must be …


Threshold Attribute-Based Credentials With Redactable Signature, Rui Shi, Huamin Feng, Yang Yang, Feng Yuan, Yingjiu Li, Hwee Hwa Pang, Robert H. Deng Sep 2023

Threshold Attribute-Based Credentials With Redactable Signature, Rui Shi, Huamin Feng, Yang Yang, Feng Yuan, Yingjiu Li, Hwee Hwa Pang, Robert H. Deng

Research Collection School Of Computing and Information Systems

Threshold attribute-based credentials are suitable for decentralized systems such as blockchains as such systems generally assume that authenticity, confidentiality, and availability can still be guaranteed in the presence of a threshold number of dishonest or faulty nodes. Coconut (NDSS'19) was the first selective disclosure attribute-based credentials scheme supporting threshold issuance. However, it does not support threshold tracing of user identities and threshold revocation of user credentials, which is desired for internal governance such as identity management, data auditing, and accountability. The communication and computation complexities of Coconut for verifying credentials are linear in the number of each user's attributes and …


The Future Of Cryptocurrency And Blockchain Technology In Finance, Wanyi Wong, Alan @ Ali Madjelisi Megargel Aug 2023

The Future Of Cryptocurrency And Blockchain Technology In Finance, Wanyi Wong, Alan @ Ali Madjelisi Megargel

Research Collection School Of Computing and Information Systems

Cryptocurrencies have been all the rage in recent years, with many being drawn to their appeal as speculative investment assets. Its proponents also champion the secure and decentralised nature of the technology it is based on, called the blockchain. Given the secure nature of blockchain technology, the idea of adopting cryptocurrencies as legal tender currency has also been mooted and experimented with – with the most famous example being the Central American nation of El Salvador’s bold move to adopting the cryptocurrency Bitcoin as legal tender in September 2021. In theory, this would provide a solution to the high transaction …


Towards Crisp‐Bc: 3tic Specification Framework For Blockchain Use‐Cases, Pouyan Jahanbin, Ravi S. Sharma, Stephen T. Wingreen, Nir Kshetri, Kim‐Kwang Raymond Choo Jul 2023

Towards Crisp‐Bc: 3tic Specification Framework For Blockchain Use‐Cases, Pouyan Jahanbin, Ravi S. Sharma, Stephen T. Wingreen, Nir Kshetri, Kim‐Kwang Raymond Choo

All Works

The application of Blockchain and augmented technologies such as IoT, AI, and Big Data platforms present a feasible approach for resolving the implementation challenges of trusted, decentralized platforms. This article proposes a DevOps framework for the specification of Blockchain use‐cases that enables evaluation, replication, and benchmarking. Specifically, it could be applied to specify the requirements and design characteristics of Blockchain applications in terms of key attributes such as: (i) transparency; (ii) traceability; (iii) tamper‐resistance; (iv) immutability; and (v) compliance. The article first introduces the design characteristics of Blockchain as a Platform and then examines successful use‐cases for its implementation using …


The Internet Of Things (Iot) In Healthcare: Taking Stock And Moving Forward, Abderahman Rejeb, Karim Rejeb, Horst Treiblmaier, Andrea Appolloni, Salem Alghamdi, Yaser Alhasawi, Mohammad Iranmanesh Jul 2023

The Internet Of Things (Iot) In Healthcare: Taking Stock And Moving Forward, Abderahman Rejeb, Karim Rejeb, Horst Treiblmaier, Andrea Appolloni, Salem Alghamdi, Yaser Alhasawi, Mohammad Iranmanesh

Research outputs 2022 to 2026

Recent improvements in the Internet of Things (IoT) have allowed healthcare to evolve rapidly. This article summarizes previous studies on IoT applications in healthcare. A comprehensive review and a bibliometric analysis were performed to objectively summarize the growth of IoT research in healthcare. To begin, 2,990 journal articles were carefully selected for further investigation. These publications were analyzed based on various bibliometric metrics, including publication year, journals, authors, institutions, and countries. Keyword co-occurrence and co-citation networks were generated to unravel significant research hotspots. The findings show that IoT research has received considerable interest from the healthcare community. Based on the …


Enabling Third Layer Bitcoin Applications Using Lightning Network, Ahmet Kurt Jun 2023

Enabling Third Layer Bitcoin Applications Using Lightning Network, Ahmet Kurt

FIU Electronic Theses and Dissertations

When Bitcoin was introduced in 2009, it created a big sensation in the world as it was first of its kind. Since then, a lot of different cryptocurrencies were proposed. Today, cryptocurrencies can be used to pay for goods and services similar to using cash or credit cards. However, none of them could replace or supersede Bitcoin in usage or market capitalization. Current market conditions still imply that it will stay the same way. However, Bitcoin suffers from very low transaction per second (TPS) which limits its usability on large scale. There have been numerous proposals to increase its scalability …


Code Will Tell: Visual Identification Of Ponzi Schemes On Ethereum, Xiaolin Wen, Kim Siang Yeo, Yong Wang, Ling Cheng, Feida Zhu, Min Zhu Apr 2023

Code Will Tell: Visual Identification Of Ponzi Schemes On Ethereum, Xiaolin Wen, Kim Siang Yeo, Yong Wang, Ling Cheng, Feida Zhu, Min Zhu

Research Collection School Of Computing and Information Systems

Ethereum has become a popular blockchain with smart contracts for investors nowadays. Due to the decentralization and anonymity of Ethereum, Ponzi schemes have been easily deployed and caused significant losses to investors. However, there are still no explainable and effective methods to help investors easily identify Ponzi schemes and validate whether a smart contract is actually a Ponzi scheme. To fill the research gap, we propose PonziLens, a novel visualization approach to help investors achieve early identification of Ponzi schemes by investigating the operation codes of smart contracts. Specifically, we conduct symbolic execution of opcode and extract the control flow …


Design Of Robust Blockchain-Envisioned Authenticated Key Management Mechanism For Smart Healthcare Applications, Siddhant Thapiyal, Mohammad Wazid, Devesh Pratap Singh, Ashok Kumar Das, Sachin Shetty Jan 2023

Design Of Robust Blockchain-Envisioned Authenticated Key Management Mechanism For Smart Healthcare Applications, Siddhant Thapiyal, Mohammad Wazid, Devesh Pratap Singh, Ashok Kumar Das, Sachin Shetty

VMASC Publications

The healthcare sector is a very crucial and important sector of any society, and with the evolution of the various deployed technologies, like the Internet of Things (IoT), machine learning and blockchain it has numerous advantages. However, in this section, the data is much more vulnerable than others, because the data is strictly private and confidential, and it requires a highly secured framework for the transmission of data between entities. In this article, we aim to design a blockchain-envisioned authentication and key management mechanism for the IoMT-based smart healthcare applications (in short, we call it SBAKM-HS). We compare the various …


Towards The Development Of A Blockchain System For Philippine Government Processes For Enhanced Transparency And Verifiability, Karlo Angelo F. Cabugwang, Raphael Christen K. Enriquez, Bienvenido E. Villabroza, Christian E. Pulmano Jan 2023

Towards The Development Of A Blockchain System For Philippine Government Processes For Enhanced Transparency And Verifiability, Karlo Angelo F. Cabugwang, Raphael Christen K. Enriquez, Bienvenido E. Villabroza, Christian E. Pulmano

Department of Information Systems & Computer Science Faculty Publications

There are cases of corruption and fraud within the Philippine government that have gone under the radar, often due to a lack of transparency and verifiability. The objective of this study is to prototype a blockchain network that can run a government process as a decentralized application such that it can enhance transparency and verifiability in the public sector. This can be accomplished by identifying a government process that would be converted into a decentralized application. One of these processes would be converted into a decentralized application. Afterwards, a blockchain framework should be identified one which can create a public …


Machine-Learning-Based Vulnerability Detection And Classification In Internet Of Things Device Security, Sarah Bin Hulayyil, Shancang Li, Li Da Xu Jan 2023

Machine-Learning-Based Vulnerability Detection And Classification In Internet Of Things Device Security, Sarah Bin Hulayyil, Shancang Li, Li Da Xu

Information Technology & Decision Sciences Faculty Publications

Detecting cyber security vulnerabilities in the Internet of Things (IoT) devices before they are exploited is increasingly challenging and is one of the key technologies to protect IoT devices from cyber attacks. This work conducts a comprehensive survey to investigate the methods and tools used in vulnerability detection in IoT environments utilizing machine learning techniques on various datasets, i.e., IoT23. During this study, the common potential vulnerabilities of IoT architectures are analyzed on each layer and the machine learning workflow is described for detecting IoT vulnerabilities. A vulnerability detection and mitigation framework was proposed for machine learning-based vulnerability detection in …


A Secure Emr Sharing System With Tamper Resistance And Expressive Access Control, Shengmin Xu, Jianting Ning, Yingjiu Li, Yinghui Zhang, Guowen Xu, Xinyi Huang, Robert H. Deng Jan 2023

A Secure Emr Sharing System With Tamper Resistance And Expressive Access Control, Shengmin Xu, Jianting Ning, Yingjiu Li, Yinghui Zhang, Guowen Xu, Xinyi Huang, Robert H. Deng

Research Collection School Of Computing and Information Systems

To reduce the cost of human and material resources and improve the collaborations among medical systems, research laboratories and insurance companies for healthcare researches and commercial activities, electronic medical records (EMRs) have been proposed to shift from paperwork to friendly shareable electronic records. To take advantage of EMRs efficiently and reduce the cost of local storage, EMRs are usually outsourced to the remote cloud for sharing medical data with authorized users. However, cloud service providers are untrustworthy. In this paper, we propose an efficient, secure, and flexible EMR sharing system by introducing a novel cryptosystem called dual-policy revocable attribute-based encryption …


Architectural Design Of A Blockchain-Enabled, Federated Learning Platform For Algorithmic Fairness In Predictive Health Care: Design Science Study, Xueping Liang, Juan Zhao, Yan Chen, Eranga Bandara, Sachin Shetty Jan 2023

Architectural Design Of A Blockchain-Enabled, Federated Learning Platform For Algorithmic Fairness In Predictive Health Care: Design Science Study, Xueping Liang, Juan Zhao, Yan Chen, Eranga Bandara, Sachin Shetty

VMASC Publications

Background: Developing effective and generalizable predictive models is critical for disease prediction and clinical decision-making, often requiring diverse samples to mitigate population bias and address algorithmic fairness. However, a major challenge is to retrieve learning models across multiple institutions without bringing in local biases and inequity, while preserving individual patients' privacy at each site.

Objective: This study aims to understand the issues of bias and fairness in the machine learning process used in the predictive health care domain. We proposed a software architecture that integrates federated learning and blockchain to improve fairness, while maintaining acceptable prediction accuracy and minimizing overhead …


An Optimized And Scalable Blockchain-Based Distributed Learning Platform For Consumer Iot, Zhaocheng Wang, Xueying Liu, Xinming Shao, Abdullah Alghamdi, Md. Shirajum Munir, Sujit Biswas Jan 2023

An Optimized And Scalable Blockchain-Based Distributed Learning Platform For Consumer Iot, Zhaocheng Wang, Xueying Liu, Xinming Shao, Abdullah Alghamdi, Md. Shirajum Munir, Sujit Biswas

School of Cybersecurity Faculty Publications

Consumer Internet of Things (CIoT) manufacturers seek customer feedback to enhance their products and services, creating a smart ecosystem, like a smart home. Due to security and privacy concerns, blockchain-based federated learning (BCFL) ecosystems can let CIoT manufacturers update their machine learning (ML) models using end-user data. Federated learning (FL) uses privacy-preserving ML techniques to forecast customers' needs and consumption habits, and blockchain replaces the centralized aggregator to safeguard the ecosystem. However, blockchain technology (BCT) struggles with scalability and quick ledger expansion. In BCFL, local model generation and secure aggregation are other issues. This research introduces a novel architecture, emphasizing …


A Review Of Iot Security And Privacy Using Decentralized Blockchain Techniques, Vinay Gugueoth, Sunitha Safavat, Sachin Shetty, Danda Rawat Jan 2023

A Review Of Iot Security And Privacy Using Decentralized Blockchain Techniques, Vinay Gugueoth, Sunitha Safavat, Sachin Shetty, Danda Rawat

Electrical & Computer Engineering Faculty Publications

IoT security is one of the prominent issues that has gained significant attention among the researchers in recent times. The recent advancements in IoT introduces various critical security issues and increases the risk of privacy leakage of IoT data. Implementation of Blockchain can be a potential solution for the security issues in IoT. This review deeply investigates the security threats and issues in IoT which deteriorates the effectiveness of IoT systems. This paper presents a perceptible description of the security threats, Blockchain based solutions, security characteristics and challenges introduced during the integration of Blockchain with IoT. An analysis of different …


Using Blockchain For Enabling Transparent, Traceable, And Trusted University Ranking Systems, Ammar Battah, Khaled Salah, Raja Jayaraman, Ibrar Yaqoob, Ashraf Khalil Jan 2023

Using Blockchain For Enabling Transparent, Traceable, And Trusted University Ranking Systems, Ammar Battah, Khaled Salah, Raja Jayaraman, Ibrar Yaqoob, Ashraf Khalil

All Works

Ranking systems have proven to improve the quality of education and help build the reputation of academic institutions. Each of the current academic ranking systems is based on different methodologies, criteria, and standards of measurement. Academic and employer reputations are subjective indicators of some rankings determined through surveying that is neither transparent nor traceable. The current academic ranking systems fall short of providing transparency and traceability features for both subjective and objective indicators that are used to calculate the ranking. Also, the ranking systems are managed and controlled in a centralized manner by specific entities. This raises concerns about fairness …


Differentiated Security Architecture For Secure And Efficient Infotainment Data Communication In Iov Networks, Jiani Fan, Lwin Khin Shar, Jiale Guo, Wenzhuo Yang, Dusit Niyato, Kwok-Yan Lam Dec 2022

Differentiated Security Architecture For Secure And Efficient Infotainment Data Communication In Iov Networks, Jiani Fan, Lwin Khin Shar, Jiale Guo, Wenzhuo Yang, Dusit Niyato, Kwok-Yan Lam

Research Collection School Of Computing and Information Systems

This paper aims to provide differentiated security protection for infotainment data commu- nication in Internet-of-Vehicle (IoV) networks. The IoV is a network of vehicles that uses various sensors, software, built-in hardware, and communication technologies to enable information exchange between pedestrians, cars, and urban infrastructure. Negligence on the security of infotainment data commu- nication in IoV networks can unintentionally open an easy access point for social engineering attacks. The attacker can spread false information about traffic conditions, mislead drivers in their directions, and interfere with traffic management. Such attacks can also cause distractions to the driver, which has a potential implication …


Applications Of Blockchain In Business Processes: A Comprehensive Review, Wattana Viriyasitavat, Li Xu, Dusit Niyato, Zhuming Bi, Danupol Hoonsopon Nov 2022

Applications Of Blockchain In Business Processes: A Comprehensive Review, Wattana Viriyasitavat, Li Xu, Dusit Niyato, Zhuming Bi, Danupol Hoonsopon

Information Technology & Decision Sciences Faculty Publications

Blockchain (BC), as an emerging technology, is revolutionizing Business Process Management (BPM) in multiple ways. The main adoption is to serve as a trusted infrastructure to guarantee the trust of collaborations among multiple partners in trustless environments. Especially, BC enables trust of information by using Distributed Ledger Technology (DLT). With the power of smart contracts, BC enforces the obligations of counterparties that transact in a business process (BP) by programming the contracts as transactions. This paper aims to study the state-of-the-art of BC technologies by (1) exploring its applications in BPM with the focus on how BC provides the trust …


Toward Intention Discovery For Early Malice Detection In Bitcoin, Ling Cheng, Feida Zhu, Yong Wang, Huiwen Liu Sep 2022

Toward Intention Discovery For Early Malice Detection In Bitcoin, Ling Cheng, Feida Zhu, Yong Wang, Huiwen Liu

Research Collection School Of Computing and Information Systems

Bitcoin has been subject to illicit activities more often than probably any other financial assets, due to the pseudo-anonymous nature of its transacting entities. An ideal detection model is expected to achieve all the three properties of (I) early detection, (II) good interpretability, and (III) versatility for various illicit activities. However, existing solutions cannot meet all these requirements, as most of them heavily rely on deep learning without satisfying interpretability and are only available for retrospective analysis of a specific illicit type.First, we present asset transfer paths, which aim to describe addresses' early characteristics. Next, with a decision tree based …