Vijay Karnatak, Amit Kumar Mishra, Neha Tripathi, Mohammad Wazid, Jaskaran Singh, Ashok Kumar Das
Fog computing is a distributed computing architecture, as opposed to depending entirely on centralized cloud servers, which brings the processing of data, functionality of an application, and its storage closer to the network's edge, where it can be closer to the data source or an end‐user device. Some of the potential applications of the fog computing‐based Internet of Things (IoT)‐enabled system are smart healthcare, smart agriculture, smart manufacturing, intelligent transportation system, and smart cities (i.e., in parking management, lighting control, traffic control, and security of civilians). The fog computing‐based IoT‐enabled system is vulnerable to various attacks. Therefore, one needs to deploy security mechanisms, like authentication, access control, key management, and malware detection, in order to secure its communication. In this article, we design a signature‐based access control and key management scheme for fog computing‐based IoT‐enabled big data applications (in short, SBAC‐FC). A detailed security analysis and performance comparison of the SBAC‐FC with other similar existing schemes reveal that the SBAC‐FC surpasses the existing schemes in terms of security and functionality characteristics, as well as complexity overheads.
{"title":"A secure signature‐based access control and key management scheme for fog computing‐based IoT‐enabled big data applications","authors":"Vijay Karnatak, Amit Kumar Mishra, Neha Tripathi, Mohammad Wazid, Jaskaran Singh, Ashok Kumar Das","doi":"10.1002/spy2.353","DOIUrl":"https://doi.org/10.1002/spy2.353","url":null,"abstract":"Fog computing is a distributed computing architecture, as opposed to depending entirely on centralized cloud servers, which brings the processing of data, functionality of an application, and its storage closer to the network's edge, where it can be closer to the data source or an end‐user device. Some of the potential applications of the fog computing‐based Internet of Things (IoT)‐enabled system are smart healthcare, smart agriculture, smart manufacturing, intelligent transportation system, and smart cities (i.e., in parking management, lighting control, traffic control, and security of civilians). The fog computing‐based IoT‐enabled system is vulnerable to various attacks. Therefore, one needs to deploy security mechanisms, like authentication, access control, key management, and malware detection, in order to secure its communication. In this article, we design a signature‐based access control and key management scheme for fog computing‐based IoT‐enabled big data applications (in short, SBAC‐FC). A detailed security analysis and performance comparison of the SBAC‐FC with other similar existing schemes reveal that the SBAC‐FC surpasses the existing schemes in terms of security and functionality characteristics, as well as complexity overheads.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135271757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract Personal Health Records (PHRs) allow patients to have full control over their health data. However, storage and sharing of PHRs still remains a difficult but necessary task, especially when health data is one of the major targets of cyber attacks worldwide. Searchable Encryption (SE) is a feasible solution for this problem and can be augmented by Blockchain to address some of its issues, such as verifiability. Therefore, SE using blockchain is a promising technologies to tackle the challenge of PHR storage and sharing. In this survey, we have explored the research works that use SE and blockchain technology for the same. The work starts with an introduction of cloud, searchable encryption and blockchain. Subsequently, we present a literature survey of the corresponding technologies. We then describe SE in detail and how it fits with blockchain. This is followed by description of noteworthy existing solutions for secure storage and sharing of PHRs. Even though there have been a number of surveys related to SE, none of them have surveyed the use of blockchain with SE or use of SE and blockchain in PHR sharing. The work concludes with a comparative study of these existing solutions and future scope in this direction.
{"title":"Personal health record storage and sharing using searchable encryption and blockchain: A comprehensive survey","authors":"Abhishek Bisht, Ashok Kumar Das, Debasis Giri","doi":"10.1002/spy2.351","DOIUrl":"https://doi.org/10.1002/spy2.351","url":null,"abstract":"Abstract Personal Health Records (PHRs) allow patients to have full control over their health data. However, storage and sharing of PHRs still remains a difficult but necessary task, especially when health data is one of the major targets of cyber attacks worldwide. Searchable Encryption (SE) is a feasible solution for this problem and can be augmented by Blockchain to address some of its issues, such as verifiability. Therefore, SE using blockchain is a promising technologies to tackle the challenge of PHR storage and sharing. In this survey, we have explored the research works that use SE and blockchain technology for the same. The work starts with an introduction of cloud, searchable encryption and blockchain. Subsequently, we present a literature survey of the corresponding technologies. We then describe SE in detail and how it fits with blockchain. This is followed by description of noteworthy existing solutions for secure storage and sharing of PHRs. Even though there have been a number of surveys related to SE, none of them have surveyed the use of blockchain with SE or use of SE and blockchain in PHR sharing. The work concludes with a comparative study of these existing solutions and future scope in this direction.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135413459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract Vehicular ad‐hoc networks (VANETs) are mobile networks intended to connect vehicles and provide secure communication. In this direction, many researchers worked on establishing secure communication in VANETs. However, VANETs still face potential security and privacy issues due to network openness. In this paper, we proposed a secure communication system for VANETs with privacy, consisting of an Enhanced privacy‐preserving mutual authentication procedure for safe communication in V2V and deriving a session key using vehicle identities and time stamps the secret values (nonce) shared during the session. Further, we compared the proposed technique with existing techniques, and satisfactory results were obtained in favor of the proposed less computation. Finally, a formal security model is established to secure against unknown key share attacks, replay attacks, and key‐compromised impersonation attacks.
{"title":"An identity‐based secure <scp>VANET</scp> communication system","authors":"Vankamamidi S. Naresh, Sivaranjani Reddi","doi":"10.1002/spy2.349","DOIUrl":"https://doi.org/10.1002/spy2.349","url":null,"abstract":"Abstract Vehicular ad‐hoc networks (VANETs) are mobile networks intended to connect vehicles and provide secure communication. In this direction, many researchers worked on establishing secure communication in VANETs. However, VANETs still face potential security and privacy issues due to network openness. In this paper, we proposed a secure communication system for VANETs with privacy, consisting of an Enhanced privacy‐preserving mutual authentication procedure for safe communication in V2V and deriving a session key using vehicle identities and time stamps the secret values (nonce) shared during the session. Further, we compared the proposed technique with existing techniques, and satisfactory results were obtained in favor of the proposed less computation. Finally, a formal security model is established to secure against unknown key share attacks, replay attacks, and key‐compromised impersonation attacks.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135511976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract Smart healthcare, also known as IoT (Internet of Things) based healthcare, utilizes IoT technology to enhance the healthcare industry. The use of IoT‐enabled medical equipment enables remote monitoring of patients, allowing for in‐home care and alerting healthcare providers of any changes. This can lead to improved patient outcomes and better disease management. However, it is important to implement robust security measures to protect patient data when using IoT in healthcare. One potential solution is to use blockchain technology to secure data storage and sharing with medical providers. Blockchain's decentralized structure and cryptographic techniques make it difficult for hackers to access or tamper with patient information. Additionally, IPFS (InterPlanetary file system) can be used for efficient data storage and sharing with authorized medical professionals, while smart contract functionality can automate the process of granting and revoking access to patient data. This article proposes a blockchain‐based secure remote patient monitoring system, specifically for chronic disease patients. The system utilizes distributed blockchain for data security, IPFS for data storage and sharing, and DApp for data collection and connection to the blockchain, along with encryption for added security. The proposed approach is compared to existing solutions and found to be a superior option for IoT‐based healthcare.
{"title":"A secure framework for <scp>IoT</scp>‐based healthcare using blockchain and <scp>IPFS</scp>","authors":"Deepa Rani, Rajeev Kumar, Naveen Chauhan","doi":"10.1002/spy2.348","DOIUrl":"https://doi.org/10.1002/spy2.348","url":null,"abstract":"Abstract Smart healthcare, also known as IoT (Internet of Things) based healthcare, utilizes IoT technology to enhance the healthcare industry. The use of IoT‐enabled medical equipment enables remote monitoring of patients, allowing for in‐home care and alerting healthcare providers of any changes. This can lead to improved patient outcomes and better disease management. However, it is important to implement robust security measures to protect patient data when using IoT in healthcare. One potential solution is to use blockchain technology to secure data storage and sharing with medical providers. Blockchain's decentralized structure and cryptographic techniques make it difficult for hackers to access or tamper with patient information. Additionally, IPFS (InterPlanetary file system) can be used for efficient data storage and sharing with authorized medical professionals, while smart contract functionality can automate the process of granting and revoking access to patient data. This article proposes a blockchain‐based secure remote patient monitoring system, specifically for chronic disease patients. The system utilizes distributed blockchain for data security, IPFS for data storage and sharing, and DApp for data collection and connection to the blockchain, along with encryption for added security. The proposed approach is compared to existing solutions and found to be a superior option for IoT‐based healthcare.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136142511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract Unprecedented growth and prevalent adoption of the Android Operating System (OS) have triggered a substantial transformation, not only within the smartphone industry but across various categories of intelligent devices. These intelligent devices store a wealth of sensitive data, making them enticing targets for malicious individuals who create harmful Android applications to steal this data for malicious purposes. While numerous Android malware detection methods have been proposed, the exponential growth in sophisticated and malicious Android apps presents an unprecedented challenge to existing detection techniques. Some of the researchers have attempted to classify malicious Android applications into families through static analysis of applications but most of them are evaluated on applications of previous API levels. This paper introduces a novel dataset compromising of 2019 to 2021 applications and proposes a Deep Learning based Malware Detection and Family Classification method (DeepMDFC) to detect and classify emerging malicious Android applications through static analysis and deep Artificial Neural Networks. Experimental findings indicate that DeepMDFC surpasses standard machine learning algorithms, achieving accuracy rates of 99.3% and 96.7% for Android malware detection and classification, respectively, with a limited size feature set. The performance of DeepMDFC is also assessed using the benchmark dataset (DREBIN) and results showed that DeepMDFC surpasses these methods in terms of performance. Furthermore, it leverages the proposed dataset to construct a prediction model that adeptly identifies malicious Android applications from both the years 2022 and 2023. This process the potency and resilience of DeepMDFC against emerging Android applications.
{"title":"<scp>DeepMDFC</scp>: A deep learning based android malware detection and family classification method","authors":"Sandeep Sharma, Prachi Ahlawat, Kavita Khanna","doi":"10.1002/spy2.347","DOIUrl":"https://doi.org/10.1002/spy2.347","url":null,"abstract":"Abstract Unprecedented growth and prevalent adoption of the Android Operating System (OS) have triggered a substantial transformation, not only within the smartphone industry but across various categories of intelligent devices. These intelligent devices store a wealth of sensitive data, making them enticing targets for malicious individuals who create harmful Android applications to steal this data for malicious purposes. While numerous Android malware detection methods have been proposed, the exponential growth in sophisticated and malicious Android apps presents an unprecedented challenge to existing detection techniques. Some of the researchers have attempted to classify malicious Android applications into families through static analysis of applications but most of them are evaluated on applications of previous API levels. This paper introduces a novel dataset compromising of 2019 to 2021 applications and proposes a Deep Learning based Malware Detection and Family Classification method (DeepMDFC) to detect and classify emerging malicious Android applications through static analysis and deep Artificial Neural Networks. Experimental findings indicate that DeepMDFC surpasses standard machine learning algorithms, achieving accuracy rates of 99.3% and 96.7% for Android malware detection and classification, respectively, with a limited size feature set. The performance of DeepMDFC is also assessed using the benchmark dataset (DREBIN) and results showed that DeepMDFC surpasses these methods in terms of performance. Furthermore, it leverages the proposed dataset to construct a prediction model that adeptly identifies malicious Android applications from both the years 2022 and 2023. This process the potency and resilience of DeepMDFC against emerging Android applications.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136142107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Himanshu Vadher, Pal Patel, Anuja Nair, Tarjni Vyas, Shivani Desai, Lata Gohil, Sudeep Tanwar, Deepak Garg, Anupam Singh
Abstract In this technological era, as the need for security arises, the use of biometrics is increasing in authentication systems as a secure and convenient method of human identification and verification. Electroencephalogram (EEG) signals have gained significant attention among the various biometric modalities available because of their unique and unforgeable characteristics. In this study, we have proposed an EEG‐based multi‐subject and multi‐task biometric authentication system for the military applications that address the challenges associated with multi‐task variation in EEG signals. The proposed work considers the use of respective EEG signals for the access of artillery, entrance to highly confidential places for the military and so forth by authenticated personnel only. We have used a multi‐subject, multi‐session, and multi‐task () dataset. The dataset was partially preprocessed with basic signal processing techniques such as bad channel repairing, independent component analysis for artifact removal, downsampling to 250 Hz, and an audio filter of 0.01–200 Hz for signal improvisation. This partially preprocessed dataset was further processed and was used in our deep learning model (DL) architectures. For EEG‐based biometric authentication, convolutional neural network (CNN) outperforms many of the state‐of‐the‐art DL architectures with a validation accuracy of approximately 99.86%, training accuracy of 98.49% and precision, recall and F1‐score with values of 99.91% that makes this EEG‐based approach for authentication more reliable. The DL models were also compared based on training and inference time, where CNN used the most training time but took the least time to predict the output. We compared the performance of the CNN model for three preprocessing techniques by feeding mel spectrograms, chromagrams and mel frequency cepstral coefficients, out of which mel spectrograms provided better results. This proposed architecture proves to be robust and efficient for military applications.
{"title":"EEG‐based biometric authentication system using convolutional neural network for military applications","authors":"Himanshu Vadher, Pal Patel, Anuja Nair, Tarjni Vyas, Shivani Desai, Lata Gohil, Sudeep Tanwar, Deepak Garg, Anupam Singh","doi":"10.1002/spy2.345","DOIUrl":"https://doi.org/10.1002/spy2.345","url":null,"abstract":"Abstract In this technological era, as the need for security arises, the use of biometrics is increasing in authentication systems as a secure and convenient method of human identification and verification. Electroencephalogram (EEG) signals have gained significant attention among the various biometric modalities available because of their unique and unforgeable characteristics. In this study, we have proposed an EEG‐based multi‐subject and multi‐task biometric authentication system for the military applications that address the challenges associated with multi‐task variation in EEG signals. The proposed work considers the use of respective EEG signals for the access of artillery, entrance to highly confidential places for the military and so forth by authenticated personnel only. We have used a multi‐subject, multi‐session, and multi‐task () dataset. The dataset was partially preprocessed with basic signal processing techniques such as bad channel repairing, independent component analysis for artifact removal, downsampling to 250 Hz, and an audio filter of 0.01–200 Hz for signal improvisation. This partially preprocessed dataset was further processed and was used in our deep learning model (DL) architectures. For EEG‐based biometric authentication, convolutional neural network (CNN) outperforms many of the state‐of‐the‐art DL architectures with a validation accuracy of approximately 99.86%, training accuracy of 98.49% and precision, recall and F1‐score with values of 99.91% that makes this EEG‐based approach for authentication more reliable. The DL models were also compared based on training and inference time, where CNN used the most training time but took the least time to predict the output. We compared the performance of the CNN model for three preprocessing techniques by feeding mel spectrograms, chromagrams and mel frequency cepstral coefficients, out of which mel spectrograms provided better results. This proposed architecture proves to be robust and efficient for military applications.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134944485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract The integration of Internet of Things (IoT) technology into electronic health (eHealth) applications has revolutionized the healthcare landscape, enabling real‐time patient monitoring, personalized care, and improved patient outcomes. However, this convergence of IoT and healthcare also introduces critical security and privacy challenges, needing careful consideration. This survey comprehensively explores the multifaceted realm of security and privacy issues in IoT‐based eHealth applications. First, we taxonomize the diverse security threats that arise due to the interconnected nature of IoT medical devices. Additionally, we highlight privacy concerns stemming from the collection and sharing of personal health information, while reconciling them with the need for accessible and collaborative healthcare ecosystems. Second, we synthesize functional, ethical, and regulatory perspectives to pick up the major requirements needed in the context of eHealth data during their whole lifecycle, from creation to destruction. Third, we identify emerging research strategies employed to address security and privacy concerns, such as cloud‐based solutions, decentralized technologies such as blockchain technology and InterPlanetary File System (IPFS), cryptographic approaches, fine‐grained access control strategies, and so forth. Additionally, we examine the impact of these approaches on computational efficiency, latency, and energy consumption, critically evaluating their suitability in the healthcare context. Building upon this comprehensive assessment, we outline potential future research directions aimed at advancing security and privacy measures in IoT‐based eHealth applications.
{"title":"Survey on security and privacy in <scp>Internet of Things</scp>‐based <scp>eHealth</scp> applications: Challenges, architectures, and future directions","authors":"Hela Makina, Asma Ben Letaifa, Abderrezak Rachedi","doi":"10.1002/spy2.346","DOIUrl":"https://doi.org/10.1002/spy2.346","url":null,"abstract":"Abstract The integration of Internet of Things (IoT) technology into electronic health (eHealth) applications has revolutionized the healthcare landscape, enabling real‐time patient monitoring, personalized care, and improved patient outcomes. However, this convergence of IoT and healthcare also introduces critical security and privacy challenges, needing careful consideration. This survey comprehensively explores the multifaceted realm of security and privacy issues in IoT‐based eHealth applications. First, we taxonomize the diverse security threats that arise due to the interconnected nature of IoT medical devices. Additionally, we highlight privacy concerns stemming from the collection and sharing of personal health information, while reconciling them with the need for accessible and collaborative healthcare ecosystems. Second, we synthesize functional, ethical, and regulatory perspectives to pick up the major requirements needed in the context of eHealth data during their whole lifecycle, from creation to destruction. Third, we identify emerging research strategies employed to address security and privacy concerns, such as cloud‐based solutions, decentralized technologies such as blockchain technology and InterPlanetary File System (IPFS), cryptographic approaches, fine‐grained access control strategies, and so forth. Additionally, we examine the impact of these approaches on computational efficiency, latency, and energy consumption, critically evaluating their suitability in the healthcare context. Building upon this comprehensive assessment, we outline potential future research directions aimed at advancing security and privacy measures in IoT‐based eHealth applications.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135645602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohammed Riyadh Abdmeziem, Hiba Akli, Rima Zourane
Abstract Internet of Things (IoT) gained momentum these last few years pushed by the emergence of fast and reliable communication networks such as 5G and beyond. IoT depends on collecting information from the environment, leading to a significant increase in the amount of data generated that needs to be transmitted, saved, and analyzed. It is clear that classical deterministic approaches might not be suitable to this complex and fast evolving environment. Hence, machine learning techniques with their ability to handle such a dynamic context, are rising in popularity. In particular, Federated Learning architectures which are better suited to the distributed nature of IoT and its privacy concerns. Besides, to address security risks such as model poisoning, device compromise, and network interception, Blockchain (BC) is seen as the secure and distributed underlying communication infrastructure of choice. This integration of IoT, FL, and BC remains in its early stages and several challenges arise. Indeed, nodes selection to perform resource intensive and critical operations like model learning and transactions validation is a crucial issue considering the strong heterogeneity of the involved devices in terms of resources. In this paper, we propose an original literature review including a taxonomy, a thorough analysis, a comparison of the proposed approaches, along with some open research directions.
{"title":"Nodes selection review for federated learning in the blockchain‐based internet of things","authors":"Mohammed Riyadh Abdmeziem, Hiba Akli, Rima Zourane","doi":"10.1002/spy2.344","DOIUrl":"https://doi.org/10.1002/spy2.344","url":null,"abstract":"Abstract Internet of Things (IoT) gained momentum these last few years pushed by the emergence of fast and reliable communication networks such as 5G and beyond. IoT depends on collecting information from the environment, leading to a significant increase in the amount of data generated that needs to be transmitted, saved, and analyzed. It is clear that classical deterministic approaches might not be suitable to this complex and fast evolving environment. Hence, machine learning techniques with their ability to handle such a dynamic context, are rising in popularity. In particular, Federated Learning architectures which are better suited to the distributed nature of IoT and its privacy concerns. Besides, to address security risks such as model poisoning, device compromise, and network interception, Blockchain (BC) is seen as the secure and distributed underlying communication infrastructure of choice. This integration of IoT, FL, and BC remains in its early stages and several challenges arise. Indeed, nodes selection to perform resource intensive and critical operations like model learning and transactions validation is a crucial issue considering the strong heterogeneity of the involved devices in terms of resources. In this paper, we propose an original literature review including a taxonomy, a thorough analysis, a comparison of the proposed approaches, along with some open research directions.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135344276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiaole Su, Yuanchao Hu, Wei Liu, Zhipeng Jiang, Chan Qiu, Jie Xiong, Ju Sun
Abstract The extension of emerging renewable energy sources such as wind and water turbines, solar panels, and the increasing usage of electric vehicles requires the supply and distribution of energy in a small device on local scale and it has created new methods of supplying and selling electricity. Middle buyers and end users can obtain the local energy with the peer‐to‐peer trading method in this large and hierarchical market. This method enables market to manage and exchange the electricity between major suppliers and medium and local levels. Blockchain technology is developing in peer‐to‐peer exchange of electricity and acts as a reliable, efficient, and safe technology in the electricity trading market. In this method, while preserving the privacy of electricity users, by using smart contracts and by removing intermediaries in the energy supply and demand market, direct commercial interactions between energy suppliers and consumers are done. The blockchain technology, while creating trust between the parties in the energy market, reduces the cost of electricity trading and increases its scalability with using the intermediate energy aggregators. In this research, the blockchain‐based model, is presented for distribution and peer‐to‐peer transactions in the energy market. The suggested model provides the possibility of registration low‐cost instant transactions at the power grid in any specific period of time. The above method, unlike periodic payments, provides immediate access to bills and small payments. Since the transactions outside the blockchain chain are not recorded, this system guarantees its honest and independent operation without fraud and failure. The smart contract method based on blockchain, reduces the transaction fees and speeds up electricity trading. Also, the experimental investigation in 20 nodes shows the time required to determine the exchange contract in the blockchain method. The average is improved by 49.7% in this method. Also, the negotiation convergence time has become 47% faster.
{"title":"A blockchain‐based smart contract model for secured energy trading management in smart microgrids","authors":"Xiaole Su, Yuanchao Hu, Wei Liu, Zhipeng Jiang, Chan Qiu, Jie Xiong, Ju Sun","doi":"10.1002/spy2.341","DOIUrl":"https://doi.org/10.1002/spy2.341","url":null,"abstract":"Abstract The extension of emerging renewable energy sources such as wind and water turbines, solar panels, and the increasing usage of electric vehicles requires the supply and distribution of energy in a small device on local scale and it has created new methods of supplying and selling electricity. Middle buyers and end users can obtain the local energy with the peer‐to‐peer trading method in this large and hierarchical market. This method enables market to manage and exchange the electricity between major suppliers and medium and local levels. Blockchain technology is developing in peer‐to‐peer exchange of electricity and acts as a reliable, efficient, and safe technology in the electricity trading market. In this method, while preserving the privacy of electricity users, by using smart contracts and by removing intermediaries in the energy supply and demand market, direct commercial interactions between energy suppliers and consumers are done. The blockchain technology, while creating trust between the parties in the energy market, reduces the cost of electricity trading and increases its scalability with using the intermediate energy aggregators. In this research, the blockchain‐based model, is presented for distribution and peer‐to‐peer transactions in the energy market. The suggested model provides the possibility of registration low‐cost instant transactions at the power grid in any specific period of time. The above method, unlike periodic payments, provides immediate access to bills and small payments. Since the transactions outside the blockchain chain are not recorded, this system guarantees its honest and independent operation without fraud and failure. The smart contract method based on blockchain, reduces the transaction fees and speeds up electricity trading. Also, the experimental investigation in 20 nodes shows the time required to determine the exchange contract in the blockchain method. The average is improved by 49.7% in this method. Also, the negotiation convergence time has become 47% faster.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135734382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The emergence of Web 3.0, blockchain technology (BC), and artificial intelligence (AI) are transforming multiplayer online gaming in the metaverse. This development has its concerns about safety and inclusivity. Hate speech, in particular, poses a significant threat to the harmony of these online communities. Traditional moderation methods struggle to cope with the immense volume of user‐generated content, necessitating innovative solutions. This article proposes a novel framework, MetaHate, that employs AI and BC to detect and combat hate speech in online gaming environments within the metaverse. Various machine learning (ML) models are applied to analyze Hindi–English code mixed datasets, with gradient boosting proving the most effective, achieving 86.01% accuracy. AI algorithms are instrumental in identifying harmful language patterns, while BC technology ensures transparency and user accountability. Moreover, a BC‐based smart contract is proposed to support the moderation of hate speech in the game chat. Integrating AI and BC can significantly enhance the safety and inclusivity of the metaverse, underscoring the importance of these technologies in the ongoing battle against hate speech and in bolstering user engagement. This research emphasizes the potential of AI and BC synergy in creating a safer metaverse, highlighting the need for continuous refinement and deployment of these technologies.
Web 3.0、区块链技术(BC)和人工智能(AI)的出现正在改变虚拟世界中的多人在线游戏。这种发展有其对安全性和包容性的担忧。尤其是仇恨言论,对这些网络社区的和谐构成了重大威胁。传统的审核方法难以应对大量用户生成的内容,因此需要创新的解决方案。本文提出了一个新的框架,MetaHate,它使用AI和BC来检测和打击虚拟世界中在线游戏环境中的仇恨言论。应用各种机器学习(ML)模型分析印地语-英语代码混合数据集,其中梯度增强被证明是最有效的,达到86.01%的准确率。人工智能算法有助于识别有害的语言模式,而BC技术确保了透明度和用户问责制。此外,提出了一个基于BC的智能合约来支持游戏聊天中的仇恨言论的调节。整合人工智能和BC可以显着增强虚拟世界的安全性和包容性,强调这些技术在持续打击仇恨言论和增强用户参与度方面的重要性。这项研究强调了人工智能和BC协同创造更安全的元宇宙的潜力,强调了持续改进和部署这些技术的必要性。
{"title":"<i>MetaHate</i>: AI‐based hate speech detection for secured online gaming in metaverse using blockchain","authors":"Harshil Sanghvi, Rushir Bhavsar, Vini Hundlani, Lata Gohil, Tarjni Vyas, Anuja Nair, Shivani Desai, Nilesh Kumar Jadav, Sudeep Tanwar, Ravi Sharma, Nagendar Yamsani","doi":"10.1002/spy2.343","DOIUrl":"https://doi.org/10.1002/spy2.343","url":null,"abstract":"The emergence of Web 3.0, blockchain technology (BC), and artificial intelligence (AI) are transforming multiplayer online gaming in the metaverse. This development has its concerns about safety and inclusivity. Hate speech, in particular, poses a significant threat to the harmony of these online communities. Traditional moderation methods struggle to cope with the immense volume of user‐generated content, necessitating innovative solutions. This article proposes a novel framework, MetaHate, that employs AI and BC to detect and combat hate speech in online gaming environments within the metaverse. Various machine learning (ML) models are applied to analyze Hindi–English code mixed datasets, with gradient boosting proving the most effective, achieving 86.01% accuracy. AI algorithms are instrumental in identifying harmful language patterns, while BC technology ensures transparency and user accountability. Moreover, a BC‐based smart contract is proposed to support the moderation of hate speech in the game chat. Integrating AI and BC can significantly enhance the safety and inclusivity of the metaverse, underscoring the importance of these technologies in the ongoing battle against hate speech and in bolstering user engagement. This research emphasizes the potential of AI and BC synergy in creating a safer metaverse, highlighting the need for continuous refinement and deployment of these technologies.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135783995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}