Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Blockchain

Discipline
Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 196

Full-Text Articles in Physical Sciences and Mathematics

Monero: Powering Anonymous Digital Currency Transactions, Jake Braddy May 2024

Monero: Powering Anonymous Digital Currency Transactions, Jake Braddy

Theses/Capstones/Creative Projects

Cryptocurrencies rely on a distributed public ledger (record of transactions) in order to perform their intended functions. However, the public’s ability to audit the network is both its greatest strength and greatest weakness: Anyone can see what address sent currency, and to whom the currency was sent. If cryptocurrency is ever going to take some of the responsibility of fiat currency, then there needs to be a certain level of confidentiality. Thus far, Monero has come out on top as the preferred currency for embodying the ideas of privacy and confidentiality. Through numerous cryptographic procedures, Monero is able to obfuscate …


A Reputation System For Provably-Robust Decision Making In Iot Blockchain Networks, Charles C. Rawlins, Sarangapani Jagannathan, Venkata Sriram Siddhardh Nadendla Apr 2024

A Reputation System For Provably-Robust Decision Making In Iot Blockchain Networks, Charles C. Rawlins, Sarangapani Jagannathan, Venkata Sriram Siddhardh Nadendla

Electrical and Computer Engineering Faculty Research & Creative Works

Blockchain systems have been successful in discerning truthful information from interagent interaction amidst possible attackers or conflicts, which is crucial for the completion of nontrivial tasks in distributed networking. However, the state-of-the-art blockchain protocols are limited to resource-rich applications where reliably connected nodes within the network are equipped with significant computing power to run lottery-based proof-of-work (pow) consensus. The purpose of this work is to address these challenges for implementation in a severely resource-constrained distributed network with internet of things (iot) devices. The contribution of this work is a novel lightweight alternative, called weight-based reputation (wbr) scheme, to classify new …


Blockchain Applications In Higher Education Based On The Nist Cybersecurity Framework, Brady Lund Ph.D. Feb 2024

Blockchain Applications In Higher Education Based On The Nist Cybersecurity Framework, Brady Lund Ph.D.

Journal of Cybersecurity Education, Research and Practice

This paper investigates the integration of blockchain technology into core systems within institutions of higher education, utilizing the National Institute of Standards and Technology’s (NIST) Cybersecurity Framework as a guiding framework. It supplies definitions of key terminology including blockchain, consensus mechanisms, decentralized identity, and smart contracts, and examines the application of secure blockchain across various educational functions such as enrollment management, degree auditing, and award processing. Each facet of the NIST Framework is utilized to explore the integration of blockchain technology and address persistent security concerns. The paper contributes to the literature by defining blockchain technology applications and opportunities within …


The Microverse: A Task-Oriented Edge-Scale Metaverse, Qian Qu, Mohsen Hatami, Ronghua Xu, Deeraj Nagothu, Yu Chen, Xiaohua Li, Erik Blasch, Erika Ardiles-Cruz, Genshe Chen Feb 2024

The Microverse: A Task-Oriented Edge-Scale Metaverse, Qian Qu, Mohsen Hatami, Ronghua Xu, Deeraj Nagothu, Yu Chen, Xiaohua Li, Erik Blasch, Erika Ardiles-Cruz, Genshe Chen

Michigan Tech Publications, Part 2

Over the past decade, there has been a remarkable acceleration in the evolution of smart cities and intelligent spaces, driven by breakthroughs in technologies such as the Internet of Things (IoT), edge–fog–cloud computing, and machine learning (ML)/artificial intelligence (AI). As society begins to harness the full potential of these smart environments, the horizon brightens with the promise of an immersive, interconnected 3D world. The forthcoming paradigm shift in how we live, work, and interact owes much to groundbreaking innovations in augmented reality (AR), virtual reality (VR), extended reality (XR), blockchain, and digital twins (DTs). However, realizing the expansive digital vista …


Blockchain For Computational Integrity And Privacy, Rahul Raj Jan 2024

Blockchain For Computational Integrity And Privacy, Rahul Raj

Theses and Dissertations

This study proposes a blockchain based system that utilizes fully homomorphic encryption to provide security of data in use as well as computational integrity. This is achieved by leveraging the attributes of blockchain which provides availability and data integrity combined with homomorphic encryption that provides confidentiality. The proposed system is designed to perform statistical operations, including mean, median and variance, on encrypted data, thus providing confidentiality of data while in use. The computations are performed on the smart contract, residing on the blockchain which provides computational integrity. The results indicate that it is possible to perform fully homomorphic computations on …


Reliable Emergency Rescue Model Of Uavs Based On Blockchain, Mengyao Du, Kai Xu, Miao Zhang, Xiang Fu, Quanjun Yin Dec 2023

Reliable Emergency Rescue Model Of Uavs Based On Blockchain, Mengyao Du, Kai Xu, Miao Zhang, Xiang Fu, Quanjun Yin

Journal of System Simulation

Abstract: Natural disasters may unpredictably disrupt ground communication infrastructure and transportation systems, and UAVs emergency response can deal with such uncertainties and highly dynamic scenarios. Aiming at the robustness requirements of decentralized rescue systems. UAV emergency rescue chain (UERChain) based on blockchain technology is proposed. By deploying UAV backbone nodes within a layered local network, the smart contracts for managing reputation considering UAV social relationships are designed. The blockchain is employed as a trust mechanism to realize the trustworthy interactions among distributed UAVs. Experimental results show that, UERChain has higher robustness, and within controllable resource constraints, the reputation management and …


Janus: Toward Preventing Counterfeits In Supply Chains Utilizing A Multi-Quorum Blockchain, Vika Crossland, Connor Dellwo, Golam Bashar, Gaby G. Dagher Dec 2023

Janus: Toward Preventing Counterfeits In Supply Chains Utilizing A Multi-Quorum Blockchain, Vika Crossland, Connor Dellwo, Golam Bashar, Gaby G. Dagher

Computer Science Faculty Publications and Presentations

The modern pharmaceutical supply chain lacks transparency and traceability, resulting in alarming rates of counterfeit products entering the market. These illegitimate products cause harm to end users and wreak havoc on the supply chain itself, costing billions of dollars in profit loss. In this paper, in response to the Drug Supply Chain Security Act (DSCSA), we introduce Janus, a novel pharmaceutical track-and-trace system that utilizes blockchain and cloning-resistant hologram tags to prevent counterfeits from entering the pharmaceutical supply chain. We design a multi-quorum consensus protocol that achieves load balancing across the network. We perform a security analysis to show robustness …


Bitcoin's Technical Foundation And Its Potential For A Decentralized And Environmentally Friendly Future, Iqtiar Md Siddique Dec 2023

Bitcoin's Technical Foundation And Its Potential For A Decentralized And Environmentally Friendly Future, Iqtiar Md Siddique

Open Access Theses & Dissertations

This research examines a systematic analysis of Bitcoin, employing a Coefficient of Variation (CV) approach to gauge its degree of decentralization. Bitcoin, an innovative decentralized digital currency, has received much attention for its potential to revolutionize traditional financial systems. This study employs the Coefficient of Variation (CV) to acquire insights into the wealth distribution and concentration among Bitcoin users. This research demonstrates how decentralized the network of Bitcoin is. The methodology uses real data on Bitcoin addresses and their holdings to compute the Coefficient of Variation (CV). This approach provides valuable insights into the ongoing discourse surrounding Bitcoin's decentralization, offering …


Healthaichain: Improving Security And Safety Using Blockchain Technology Applications In Ai-Based Healthcare Systems, Naresh Kshetri, James Hutson, Revathy G Nov 2023

Healthaichain: Improving Security And Safety Using Blockchain Technology Applications In Ai-Based Healthcare Systems, Naresh Kshetri, James Hutson, Revathy G

Faculty Scholarship

Blockchain as a digital ledger for keeping records of digital transactions and other information, it is secure and decentralized technology. The globally growing number of digital population every day possesses a significant threat to online data including the medical and patients’ data. After bitcoin, blockchain technology has emerged into a general-purpose technology with applications in medical industries and healthcare. Blockchain can promote highly configurable openness while retaining the highest security standards for critical data of medical patients. Referred to as distributed record keeping for healthcare systems which makes digital assets unalterable and transparent via a cryptographic hash and decentralized network. …


Metaverse Key Requirements And Platforms Survey, Akbobek Abilkaiyrkyzy, Ahmed Elhagry, Fedwa Laamarti, Abdulmotaleb El Saddik Oct 2023

Metaverse Key Requirements And Platforms Survey, Akbobek Abilkaiyrkyzy, Ahmed Elhagry, Fedwa Laamarti, Abdulmotaleb El Saddik

Computer Vision Faculty Publications

The growing interest in the metaverse has led to an abundance of platforms, each with its own unique features and limitations. This paper's objective is two-fold. First, we aim at providing an objective analysis of requirements that need to be fulfilled by metaverse platforms. We survey a broad set of criteria including interoperability, immersiveness, persistence, multimodal and social interaction, scalability, level of openness, configurability, market access, security, and blockchain integration, among others. Second, we review a wide range of existing metaverse platforms, and we critically evaluate their ability to meet the requirements listed. We identify their limitations, which must be …


Application Of Blockchain Technology In Aquaculture Management, Yu-Jen Pan, Hsin-Pei Shieh Oct 2023

Application Of Blockchain Technology In Aquaculture Management, Yu-Jen Pan, Hsin-Pei Shieh

Journal of Marine Science and Technology

In recent years, food safety has become a growing concern in Taiwanese society. To ensure efficient management of the supply chain within the L Aquatic Products company, it is imperative to employ reliable technical support in establishing an effective traceability management system. The traceability of products can provide managers with valuable insight into the intricacies of the supply chain. By establishing a dependable food traceability system, brand trust can be strengthened, and consumers can inquire about the movement of aquatic products within the supply chain. Blockchain technology offers features such as traceability, accountability, transparency, reliability, trust, privacy, and security, making …


Identity Management Pki System Using Blockchain, Mohamed Abdel Fattah Abdel Baki Awad Sep 2023

Identity Management Pki System Using Blockchain, Mohamed Abdel Fattah Abdel Baki Awad

Theses and Dissertations

Identity management is one of the most important topics in the security field. Public Key Infrastructure (PKI) is the most commonly used approach in legally identity management systems. PKI systems have many centralized services that might affect the availability and trustworthiness of the system. Issues related to certificate verification methods such as Certificate Revocation List (CRL) and Online Certificate Status Protocol (OCSP) can be avoided if blockchain is used. Blockchain is a decentralized trusted system where data can only be appended to a public ledger. Edits are not allowed in blockchain. Blockchain consists of several nodes all of them have …


Threshold Attribute-Based Credentials With Redactable Signature, Rui Shi, Huamin Feng, Yang Yang, Feng Yuan, Yingjiu Li, Hwee Hwa Pang, Robert H. Deng Sep 2023

Threshold Attribute-Based Credentials With Redactable Signature, Rui Shi, Huamin Feng, Yang Yang, Feng Yuan, Yingjiu Li, Hwee Hwa Pang, Robert H. Deng

Research Collection School Of Computing and Information Systems

Threshold attribute-based credentials are suitable for decentralized systems such as blockchains as such systems generally assume that authenticity, confidentiality, and availability can still be guaranteed in the presence of a threshold number of dishonest or faulty nodes. Coconut (NDSS'19) was the first selective disclosure attribute-based credentials scheme supporting threshold issuance. However, it does not support threshold tracing of user identities and threshold revocation of user credentials, which is desired for internal governance such as identity management, data auditing, and accountability. The communication and computation complexities of Coconut for verifying credentials are linear in the number of each user's attributes and …


The Future Of Cryptocurrency And Blockchain Technology In Finance, Wanyi Wong, Alan @ Ali Madjelisi Megargel Aug 2023

The Future Of Cryptocurrency And Blockchain Technology In Finance, Wanyi Wong, Alan @ Ali Madjelisi Megargel

Research Collection School Of Computing and Information Systems

Cryptocurrencies have been all the rage in recent years, with many being drawn to their appeal as speculative investment assets. Its proponents also champion the secure and decentralised nature of the technology it is based on, called the blockchain. Given the secure nature of blockchain technology, the idea of adopting cryptocurrencies as legal tender currency has also been mooted and experimented with – with the most famous example being the Central American nation of El Salvador’s bold move to adopting the cryptocurrency Bitcoin as legal tender in September 2021. In theory, this would provide a solution to the high transaction …


Reinforcing Digital Trust For Cloud Manufacturing Through Data Provenance Using Ethereum Smart Contracts, Trupti Narayan Rane Aug 2023

Reinforcing Digital Trust For Cloud Manufacturing Through Data Provenance Using Ethereum Smart Contracts, Trupti Narayan Rane

Engineering Management & Systems Engineering Theses & Dissertations

Cloud Manufacturing(CMfg) is an advanced manufacturing model that caters to fast-paced agile requirements (Putnik, 2012). For manufacturing complex products that require extensive resources, manufacturers explore advanced manufacturing techniques like CMfg as it becomes infeasible to achieve high standards through complete ownership of manufacturing artifacts (Kuan et al., 2011). CMfg, with other names such as Manufacturing as a Service (MaaS) and Cyber Manufacturing (NSF, 2020), addresses the shortcoming of traditional manufacturing by building a virtual cyber enterprise of geographically distributed entities that manufacture custom products through collaboration.

With manufacturing venturing into cyberspace, Digital Trust issues concerning product quality, data, and intellectual …


Towards Crisp‐Bc: 3tic Specification Framework For Blockchain Use‐Cases, Pouyan Jahanbin, Ravi S. Sharma, Stephen T. Wingreen, Nir Kshetri, Kim‐Kwang Raymond Choo Jul 2023

Towards Crisp‐Bc: 3tic Specification Framework For Blockchain Use‐Cases, Pouyan Jahanbin, Ravi S. Sharma, Stephen T. Wingreen, Nir Kshetri, Kim‐Kwang Raymond Choo

All Works

The application of Blockchain and augmented technologies such as IoT, AI, and Big Data platforms present a feasible approach for resolving the implementation challenges of trusted, decentralized platforms. This article proposes a DevOps framework for the specification of Blockchain use‐cases that enables evaluation, replication, and benchmarking. Specifically, it could be applied to specify the requirements and design characteristics of Blockchain applications in terms of key attributes such as: (i) transparency; (ii) traceability; (iii) tamper‐resistance; (iv) immutability; and (v) compliance. The article first introduces the design characteristics of Blockchain as a Platform and then examines successful use‐cases for its implementation using …


The Internet Of Things (Iot) In Healthcare: Taking Stock And Moving Forward, Abderahman Rejeb, Karim Rejeb, Horst Treiblmaier, Andrea Appolloni, Salem Alghamdi, Yaser Alhasawi, Mohammad Iranmanesh Jul 2023

The Internet Of Things (Iot) In Healthcare: Taking Stock And Moving Forward, Abderahman Rejeb, Karim Rejeb, Horst Treiblmaier, Andrea Appolloni, Salem Alghamdi, Yaser Alhasawi, Mohammad Iranmanesh

Research outputs 2022 to 2026

Recent improvements in the Internet of Things (IoT) have allowed healthcare to evolve rapidly. This article summarizes previous studies on IoT applications in healthcare. A comprehensive review and a bibliometric analysis were performed to objectively summarize the growth of IoT research in healthcare. To begin, 2,990 journal articles were carefully selected for further investigation. These publications were analyzed based on various bibliometric metrics, including publication year, journals, authors, institutions, and countries. Keyword co-occurrence and co-citation networks were generated to unravel significant research hotspots. The findings show that IoT research has received considerable interest from the healthcare community. Based on the …


Optimal Ordering To Maximize Mev Arbitrage, Granton Michael White Jun 2023

Optimal Ordering To Maximize Mev Arbitrage, Granton Michael White

Theses and Dissertations

The rise of cryptocurrencies has brought with it new math problems with new sets of constraints. The MEV problem entails solving for the ordering of pending trades that maximizes a block creator's profit. In decentralized finance, time is a big constraint, so an exhaustive search of all possible orderings is impossible. I propose a solution to the MEV problem that gives a near optimal result that can be solved in a reasonable amount of time. I layout the method and the formulas required for my solution. Additionally, I test my solution on synthesized data to show that it works as …


Research On Collaborative Task Allocation Method Of Multiple Uavs Based On Blockchain, Shuangcheng Niu, Yuqiang Jin, Kunhu Kou May 2023

Research On Collaborative Task Allocation Method Of Multiple Uavs Based On Blockchain, Shuangcheng Niu, Yuqiang Jin, Kunhu Kou

Journal of System Simulation

Abstract: The autonomous collaborative control of a multi-unmanned aerial vehicle (UAV) system lacks a unified underlying technology platform and faces single point failure and information security threats. In order to solve these problems, an idea to build collaborative task planning platforms based on blockchain technology is proposed. With thecollaborative task allocation of multiple UAVs as research objects, an online, safe, high-efficiency, and real-time task allocation method is designed. The contract network task allocation algorithm is described as a smart contract, and system consensus is reached based on the blockchain consensus algorithm. In addition, …


An Analysis And Examination Of Consensus Attacks In Blockchain Networks, Thomas R. Clark May 2023

An Analysis And Examination Of Consensus Attacks In Blockchain Networks, Thomas R. Clark

Senior Honors Projects, 2020-current

This paper examines consensus attacks as they relate to blockchain networks. Consensus attacks are a significant threat to the security and integrity of blockchain networks, and understanding these attacks is crucial for developers and stakeholders. The primary contribution of the paper is to present blockchain and consensus attacks in a clear and accessible manner, with the aim of making these complex concepts easily understandable for a general audience. Using literature review, the paper identifies various methods to prevent consensus attacks, including multi-chain networks, proof-of-work consensus algorithms, and network auditing and monitoring. An analysis revealed that these methods for preventing consensus …


Blockchain Security: Double-Spending Attack And Prevention, William Henry Scott Iii May 2023

Blockchain Security: Double-Spending Attack And Prevention, William Henry Scott Iii

Electronic Theses and Dissertations

This thesis shows that distributed consensus systems based on proof of work are vulnerable to hashrate-based double-spending attacks due to abuse of majority rule. Through building a private fork of Litecoin and executing a double-spending attack this thesis examines the mechanics and principles behind the attack. This thesis also conducts a survey of preventative measures used to deter double-spending attacks, concluding that a decentralized peer-to-peer network using proof of work is best protected by the addition of an observer system whether internal or external.


Dea2uth: A Decentralized Authentication And Authorization Scheme For Secure Private Data Transfer, Phillipe Austria May 2023

Dea2uth: A Decentralized Authentication And Authorization Scheme For Secure Private Data Transfer, Phillipe Austria

UNLV Theses, Dissertations, Professional Papers, and Capstones

The sharing of private information is a daunting, multifaceted, and expensive undertaking. Furthermore, identity management is an additional challenge that poses significant technological, operational, and legal obstacles. Present solutions and their accompanying infrastructures rely on centralized models that are susceptible to hacking and can hinder data control by the rightful owner. Consequently, blockchain technology has generated interest in the fields of identity and access control. This technology is viewed as a potential solution due to its ability to offer decentralization, transparency, provenance, security, and privacy benefits. Nevertheless, a completely decentralized and private solution that enables data owners to control their …


Code Will Tell: Visual Identification Of Ponzi Schemes On Ethereum, Xiaolin Wen, Kim Siang Yeo, Yong Wang, Ling Cheng, Feida Zhu, Min Zhu Apr 2023

Code Will Tell: Visual Identification Of Ponzi Schemes On Ethereum, Xiaolin Wen, Kim Siang Yeo, Yong Wang, Ling Cheng, Feida Zhu, Min Zhu

Research Collection School Of Computing and Information Systems

Ethereum has become a popular blockchain with smart contracts for investors nowadays. Due to the decentralization and anonymity of Ethereum, Ponzi schemes have been easily deployed and caused significant losses to investors. However, there are still no explainable and effective methods to help investors easily identify Ponzi schemes and validate whether a smart contract is actually a Ponzi scheme. To fill the research gap, we propose PonziLens, a novel visualization approach to help investors achieve early identification of Ponzi schemes by investigating the operation codes of smart contracts. Specifically, we conduct symbolic execution of opcode and extract the control flow …


Architectural Design Of A Blockchain-Enabled, Federated Learning Platform For Algorithmic Fairness In Predictive Health Care: Design Science Study, Xueping Liang, Juan Zhao, Yan Chen, Eranga Bandara, Sachin Shetty Jan 2023

Architectural Design Of A Blockchain-Enabled, Federated Learning Platform For Algorithmic Fairness In Predictive Health Care: Design Science Study, Xueping Liang, Juan Zhao, Yan Chen, Eranga Bandara, Sachin Shetty

VMASC Publications

Background: Developing effective and generalizable predictive models is critical for disease prediction and clinical decision-making, often requiring diverse samples to mitigate population bias and address algorithmic fairness. However, a major challenge is to retrieve learning models across multiple institutions without bringing in local biases and inequity, while preserving individual patients' privacy at each site.

Objective: This study aims to understand the issues of bias and fairness in the machine learning process used in the predictive health care domain. We proposed a software architecture that integrates federated learning and blockchain to improve fairness, while maintaining acceptable prediction accuracy and minimizing overhead …


Using Blockchain For Enabling Transparent, Traceable, And Trusted University Ranking Systems, Ammar Battah, Khaled Salah, Raja Jayaraman, Ibrar Yaqoob, Ashraf Khalil Jan 2023

Using Blockchain For Enabling Transparent, Traceable, And Trusted University Ranking Systems, Ammar Battah, Khaled Salah, Raja Jayaraman, Ibrar Yaqoob, Ashraf Khalil

All Works

Ranking systems have proven to improve the quality of education and help build the reputation of academic institutions. Each of the current academic ranking systems is based on different methodologies, criteria, and standards of measurement. Academic and employer reputations are subjective indicators of some rankings determined through surveying that is neither transparent nor traceable. The current academic ranking systems fall short of providing transparency and traceability features for both subjective and objective indicators that are used to calculate the ranking. Also, the ranking systems are managed and controlled in a centralized manner by specific entities. This raises concerns about fairness …


Towards The Development Of A Blockchain System For Philippine Government Processes For Enhanced Transparency And Verifiability, Karlo Angelo F. Cabugwang, Raphael Christen K. Enriquez, Bienvenido E. Villabroza, Christian E. Pulmano Jan 2023

Towards The Development Of A Blockchain System For Philippine Government Processes For Enhanced Transparency And Verifiability, Karlo Angelo F. Cabugwang, Raphael Christen K. Enriquez, Bienvenido E. Villabroza, Christian E. Pulmano

Department of Information Systems & Computer Science Faculty Publications

There are cases of corruption and fraud within the Philippine government that have gone under the radar, often due to a lack of transparency and verifiability. The objective of this study is to prototype a blockchain network that can run a government process as a decentralized application such that it can enhance transparency and verifiability in the public sector. This can be accomplished by identifying a government process that would be converted into a decentralized application. One of these processes would be converted into a decentralized application. Afterwards, a blockchain framework should be identified one which can create a public …


A Systematic Review Of Cryptocurrencies Use In Cybercrimes, Kieran B D Human Jan 2023

A Systematic Review Of Cryptocurrencies Use In Cybercrimes, Kieran B D Human

Graduate Thesis and Dissertation 2023-2024

Cryptocurrencies are one of the most prominent applications of blockchain systems. While cryptocurrencies promise many features and advantages, such as decentralization, anonymity, and ease of access, those very features can be abused. For instance, as documented in various recent works, cryptocurrencies have been frequently abused in many different forms of cybercrime. Despite the plethora of works on measuring and understanding the abuse of cryptocurrencies in the digital space, there has been no work on systemizing this knowledge by comprehensively understanding those contributions, contrasting them based on their merit, and understanding the gap in this research space.

This thesis initiates the …


Bimee: Blockchain Based Incentive Mechanism Considering Endowment Effect, Jayanth Madupalli Jan 2023

Bimee: Blockchain Based Incentive Mechanism Considering Endowment Effect, Jayanth Madupalli

MSU Graduate Theses

Crowdsensing, a paradigm in modern data collection, harnesses the collective power of mobile users equipped with sensory devices to contribute valuable data based on task-specific criteria. The efficacy of crowdsensing relies on sustained engagement from proficient users over extended periods. Incentivizing long-term participation is crucial, and blockchain technology emerges as a promising framework, providing a decentralized and immutable ledger. However, existing blockchain-based incentive mechanisms for crowdsensing encounter challenges. Firstly, they often overlook users' inherent bias towards loss aversion, a psychological phenomenon where individuals prioritize avoiding losses over acquiring equivalent rewards. Secondly, fairness issues arise, especially concerning newly participating users in …


Machine-Learning-Based Vulnerability Detection And Classification In Internet Of Things Device Security, Sarah Bin Hulayyil, Shancang Li, Li Da Xu Jan 2023

Machine-Learning-Based Vulnerability Detection And Classification In Internet Of Things Device Security, Sarah Bin Hulayyil, Shancang Li, Li Da Xu

Information Technology & Decision Sciences Faculty Publications

Detecting cyber security vulnerabilities in the Internet of Things (IoT) devices before they are exploited is increasingly challenging and is one of the key technologies to protect IoT devices from cyber attacks. This work conducts a comprehensive survey to investigate the methods and tools used in vulnerability detection in IoT environments utilizing machine learning techniques on various datasets, i.e., IoT23. During this study, the common potential vulnerabilities of IoT architectures are analyzed on each layer and the machine learning workflow is described for detecting IoT vulnerabilities. A vulnerability detection and mitigation framework was proposed for machine learning-based vulnerability detection in …


Design Of Robust Blockchain-Envisioned Authenticated Key Management Mechanism For Smart Healthcare Applications, Siddhant Thapiyal, Mohammad Wazid, Devesh Pratap Singh, Ashok Kumar Das, Sachin Shetty Jan 2023

Design Of Robust Blockchain-Envisioned Authenticated Key Management Mechanism For Smart Healthcare Applications, Siddhant Thapiyal, Mohammad Wazid, Devesh Pratap Singh, Ashok Kumar Das, Sachin Shetty

VMASC Publications

The healthcare sector is a very crucial and important sector of any society, and with the evolution of the various deployed technologies, like the Internet of Things (IoT), machine learning and blockchain it has numerous advantages. However, in this section, the data is much more vulnerable than others, because the data is strictly private and confidential, and it requires a highly secured framework for the transmission of data between entities. In this article, we aim to design a blockchain-envisioned authentication and key management mechanism for the IoMT-based smart healthcare applications (in short, we call it SBAKM-HS). We compare the various …