首页 > 最新文献

Peer-To-Peer Networking and Applications最新文献

英文 中文
Securing IoT data: Fog computing, blockchain, and tailored privacy-enhancing technologies in action 确保物联网数据安全:雾计算、区块链和量身定制的隐私增强技术在行动
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-07 DOI: 10.1007/s12083-024-01801-z
Iraq Ahmad Reshi, Sahil Sholla

The inherent challenges associated with the Internet of Things (IoT), such as vulnerability to cyber threats and privacy issues, need the development of novel solutions to ensure secure and efficient handling of data. Fog computing resolves these concerns by facilitating data processing in proximity to edge devices, minimising latency, and improving real-time decision-making. Blockchain boosts security in fog-based systems by providing a tamper-proof and transparent ledger. However, exclusively prioritising privacy in fog-based blockchains may impede the practical execution. This article presents the FogBlock Connect paradigm, which combines Fog computing and Blockchain through the implementation of a tailored Proxy Re-encryption (PRE) algorithm inspired by BBS98. This strategy guarantees enhanced data confidentiality while simultaneously upholding operational effectiveness in fog-based blockchains for Internet of Things applications. The efficiency and effectiveness of the suggested PRE algorithm over typical encryption methods are confirmed by comprehensive simulations utilising the Fobsim simulator. The FogBlock Connect paradigm entails the transmission of updates from nearby IoT devices to Fog servers for the purpose of creating and securely storing global updates, hence improving efficiency and performance. The paradigm ensures robust privacy measures, mitigates risks of single-point failures, and facilitates precise access control, establishing a basis for secure and resilient IoT applications. The CCA resistant formal security proof provides further validation for the strength and effectiveness of the suggested approach.

与物联网(IoT)相关的固有挑战,如易受网络威胁和隐私问题,需要开发新的解决方案,以确保安全高效地处理数据。雾计算通过促进边缘设备附近的数据处理、最大限度地减少延迟和改进实时决策,解决了这些问题。区块链通过提供防篡改和透明的分类账,提高了基于雾的系统的安全性。然而,在基于雾的区块链中仅优先考虑隐私可能会阻碍实际执行。本文介绍了 FogBlock Connect 范式,该范式通过实施受 BBS98 启发而定制的代理重加密(PRE)算法,将雾计算与区块链结合起来。该策略可确保增强数据保密性,同时维护基于雾的区块链在物联网应用中的运行效率。利用 Fobsim 仿真器进行的综合仿真证实了所建议的 PRE 算法相对于典型加密方法的效率和有效性。FogBlock Connect 范式需要将附近物联网设备的更新传输到 Fog 服务器,以创建和安全存储全局更新,从而提高效率和性能。该范例确保了稳健的隐私措施,降低了单点故障风险,促进了精确的访问控制,为安全、弹性的物联网应用奠定了基础。抗CCA的正式安全证明进一步验证了所建议方法的强度和有效性。
{"title":"Securing IoT data: Fog computing, blockchain, and tailored privacy-enhancing technologies in action","authors":"Iraq Ahmad Reshi, Sahil Sholla","doi":"10.1007/s12083-024-01801-z","DOIUrl":"https://doi.org/10.1007/s12083-024-01801-z","url":null,"abstract":"<p>The inherent challenges associated with the Internet of Things (IoT), such as vulnerability to cyber threats and privacy issues, need the development of novel solutions to ensure secure and efficient handling of data. Fog computing resolves these concerns by facilitating data processing in proximity to edge devices, minimising latency, and improving real-time decision-making. Blockchain boosts security in fog-based systems by providing a tamper-proof and transparent ledger. However, exclusively prioritising privacy in fog-based blockchains may impede the practical execution. This article presents the FogBlock Connect paradigm, which combines Fog computing and Blockchain through the implementation of a tailored Proxy Re-encryption (PRE) algorithm inspired by BBS98. This strategy guarantees enhanced data confidentiality while simultaneously upholding operational effectiveness in fog-based blockchains for Internet of Things applications. The efficiency and effectiveness of the suggested PRE algorithm over typical encryption methods are confirmed by comprehensive simulations utilising the Fobsim simulator. The FogBlock Connect paradigm entails the transmission of updates from nearby IoT devices to Fog servers for the purpose of creating and securely storing global updates, hence improving efficiency and performance. The paradigm ensures robust privacy measures, mitigates risks of single-point failures, and facilitates precise access control, establishing a basis for secure and resilient IoT applications. The CCA resistant formal security proof provides further validation for the strength and effectiveness of the suggested approach.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"63 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142205036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integrating deep learning and metaheuristics algorithms for blockchain-based reassurance data management in the detection of malicious IoT nodes 整合深度学习和元搜索算法,在检测恶意物联网节点中实现基于区块链的放心数据管理
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-05 DOI: 10.1007/s12083-024-01786-9
Faeiz M. Alserhani

The Internet of Things (IoT) refers to a network where different smart devices are interconnected through the Internet. This network enables these devices to communicate, share data, and exert control over the surrounding physical environment to work as a data-driven mobile computing system. Nevertheless, due to wireless networks' openness, connectivity, resource constraints, and smart devices' resource limitations, the IoT is vulnerable to several different routing attacks. Addressing these security concerns becomes crucial if data exchanged over IoT networks is to remain precise and trustworthy. This study presents a trust management evaluation for IoT devices with routing using the cryptographic algorithms Rivest, Shamir, Adleman (RSA), Self-Adaptive Tasmanian Devil Optimization (SA_TDO) for optimal key generation, and Secure Hash Algorithm 3-512 (SHA3-512), as well as an Intrusion Detection System (IDS) for spotting threats in IoT routing. By verifying the validity and integrity of the data exchanged between nodes and identifying and thwarting network threats, the proposed approach seeks to enhance IoT network security. The stored data is encrypted using the RSA technique, keys are optimally generated using the Tasmanian Devil Optimization (TDO) process, and data integrity is guaranteed using the SHA3-512 algorithm. Deep Learning Intrusion detection is achieved with Convolutional Spiking neural network-optimized deep neural network. The Deep Neural Network (DNN) is optimized with the Archimedes Optimization Algorithm (AOA). The developed model is simulated in Python, and the results obtained are evaluated and compared with other existing models. The findings indicate that the design is efficient in providing secure and reliable routing in IoT-enabled, futuristic, smart vertical networks while identifying and blocking threats. The proposed technique also showcases shorter response times (209.397 s at 70% learn rate, 223.103 s at 80% learn rate) and shorter sharing record times (13.0873 s at 70% learn rate, 13.9439 s at 80% learn rate), which underlines its strength. The performance metrics for the proposed AOA-ODNN model were evaluated at learning rates of 70% and 80%. The highest metrics were achieved at an 80% learning rate, with an accuracy of 0.989434, precision of 0.988886, sensitivity of 0.988886, specificity of 0.998616, F-measure of 0.988886, Matthews Correlation Coefficient (MCC) of 0.895521, Negative predictive value (NPV) of 0.998616, False Positive Rate (FPR) of 0.034365, and False Negative Rate (FNR) of 0.103095.

物联网(IoT)是指不同智能设备通过互联网相互连接的网络。该网络使这些设备能够通信、共享数据并控制周围的物理环境,从而成为一个数据驱动的移动计算系统。然而,由于无线网络的开放性、连通性、资源限制以及智能设备的资源局限性,物联网很容易受到几种不同的路由攻击。如果要保持物联网网络交换数据的精确性和可信性,解决这些安全问题就变得至关重要。本研究利用加密算法 Rivest、Shamir、Adleman(RSA)、用于优化密钥生成的自适应塔斯马尼亚魔鬼优化算法(SA_TDO)和安全散列算法 3-512 (SHA3-512),以及用于发现物联网路由威胁的入侵检测系统(IDS),对具有路由功能的物联网设备进行了信任管理评估。通过验证节点间数据交换的有效性和完整性以及识别和挫败网络威胁,所提出的方法旨在增强物联网网络的安全性。存储的数据使用 RSA 技术加密,密钥使用塔斯马尼亚魔鬼优化(TDO)流程优化生成,数据完整性使用 SHA3-512 算法保证。深度学习入侵检测是通过卷积尖峰神经网络优化的深度神经网络实现的。深度神经网络(DNN)采用阿基米德优化算法(AOA)进行优化。用 Python 对所开发的模型进行了仿真,并对所获得的结果进行了评估,并与其他现有模型进行了比较。研究结果表明,该设计能有效地在物联网、未来智能垂直网络中提供安全可靠的路由选择,同时还能识别和阻止威胁。所提出的技术还缩短了响应时间(70% 学习率时为 209.397 秒,80% 学习率时为 223.103 秒),缩短了共享记录时间(70% 学习率时为 13.0873 秒,80% 学习率时为 13.9439 秒),这凸显了它的优势。在学习率为 70% 和 80% 时,对所提出的 AOA-ODNN 模型的性能指标进行了评估。学习率为 80% 时的指标最高,准确度为 0.989434,精确度为 0.988886,灵敏度为 0.988886,特异度为 0.998616,F-measure 为 0.988886,马修斯相关系数 (Matthews Correlation Coefficient, MCC) 为 0.895521,负预测值 (Negative predictive value, NPV) 为 0.998616,假阳性率 (False Positive Rate, FPR) 为 0.034365,假阴性率 (False Negative Rate, FNR) 为 0.103095。
{"title":"Integrating deep learning and metaheuristics algorithms for blockchain-based reassurance data management in the detection of malicious IoT nodes","authors":"Faeiz M. Alserhani","doi":"10.1007/s12083-024-01786-9","DOIUrl":"https://doi.org/10.1007/s12083-024-01786-9","url":null,"abstract":"<p>The Internet of Things (IoT) refers to a network where different smart devices are interconnected through the Internet. This network enables these devices to communicate, share data, and exert control over the surrounding physical environment to work as a data-driven mobile computing system. Nevertheless, due to wireless networks' openness, connectivity, resource constraints, and smart devices' resource limitations, the IoT is vulnerable to several different routing attacks. Addressing these security concerns becomes crucial if data exchanged over IoT networks is to remain precise and trustworthy. This study presents a trust management evaluation for IoT devices with routing using the cryptographic algorithms Rivest, Shamir, Adleman (RSA), Self-Adaptive Tasmanian Devil Optimization (SA_TDO) for optimal key generation, and Secure Hash Algorithm 3-512 (SHA3-512), as well as an Intrusion Detection System (IDS) for spotting threats in IoT routing. By verifying the validity and integrity of the data exchanged between nodes and identifying and thwarting network threats, the proposed approach seeks to enhance IoT network security. The stored data is encrypted using the RSA technique, keys are optimally generated using the Tasmanian Devil Optimization (TDO) process, and data integrity is guaranteed using the SHA3-512 algorithm. Deep Learning Intrusion detection is achieved with Convolutional Spiking neural network-optimized deep neural network. The Deep Neural Network (DNN) is optimized with the Archimedes Optimization Algorithm (AOA). The developed model is simulated in Python, and the results obtained are evaluated and compared with other existing models. The findings indicate that the design is efficient in providing secure and reliable routing in IoT-enabled, futuristic, smart vertical networks while identifying and blocking threats. The proposed technique also showcases shorter response times (209.397 s at 70% learn rate, 223.103 s at 80% learn rate) and shorter sharing record times (13.0873 s at 70% learn rate, 13.9439 s at 80% learn rate), which underlines its strength. The performance metrics for the proposed AOA-ODNN model were evaluated at learning rates of 70% and 80%. The highest metrics were achieved at an 80% learning rate, with an accuracy of 0.989434, precision of 0.988886, sensitivity of 0.988886, specificity of 0.998616, F-measure of 0.988886, Matthews Correlation Coefficient (MCC) of 0.895521, Negative predictive value (NPV) of 0.998616, False Positive Rate (FPR) of 0.034365, and False Negative Rate (FNR) of 0.103095.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"13 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142204982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
End to end delay aware service function chain scheduling in network function virtualization enabled networks 启用网络功能虚拟化的网络中端到端延迟感知服务功能链调度
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-05 DOI: 10.1007/s12083-024-01800-0
Sudha Dubba, Balaprakasa Rao Killi

Network function virtualization is a key enabling technology for the customization of network services in next-generation networks to support diverse applications. Most enterprise and network services contain specific network functions that are stitched together in a predefined sequence to form a service function chain. The deployment and scheduling of a service function chain onto the substrate network play a vital role in deciding the efficiency of resource utilization and the performance of network management. For a delay-sensitive network service request traversing a service function chain, the end-to-end packet delay is a crucial parameter that indicates the deployment performance. Transmission, propagation, processing, edge queueing, and virtualization delays all impact the order in which virtual network functions execute. Service level agreement violations and incorrect schedules are produced when the controller does not take edge queueing and virtualization delays into account. In this work, we propose a service function chain scheduling problem for the optimization of the end-to-end delay while considering transmission, propagation, queueing, virtualization, and processing delays. Then, we propose a scheduling approach based on the earliest finish times of the physical machines to minimize the end-to-end delay of the service function chain. The performance of the proposed service function chain scheduling approach using the earliest finish time is evaluated in terms of end-to-end delay, service level agreement violation ratio, resource utilization, and acceptance ratio. We compare our proposed algorithm with four existing approaches from the literature. Simulation results show that our proposed approach outperforms existing approaches in terms of end-to-end delay, service level agreement violation ratio, resource utilization, and acceptance ratio.

网络功能虚拟化是在下一代网络中定制网络服务以支持各种应用的关键使能技术。大多数企业和网络服务都包含特定的网络功能,这些功能按预定顺序拼接在一起,形成服务功能链。服务功能链在基底网络上的部署和调度对资源利用效率和网络管理性能起着至关重要的作用。对于穿越服务功能链的延迟敏感型网络服务请求而言,端到端数据包延迟是显示部署性能的关键参数。传输、传播、处理、边缘排队和虚拟化延迟都会影响虚拟网络功能的执行顺序。如果控制器不考虑边缘队列和虚拟化延迟,就会产生违反服务水平协议和计划不正确的情况。在这项工作中,我们提出了一个服务功能链调度问题,以优化端到端延迟,同时考虑传输、传播、排队、虚拟化和处理延迟。然后,我们提出了一种基于物理机最早完成时间的调度方法,以最小化服务功能链的端到端延迟。我们从端到端延迟、服务级别协议违反率、资源利用率和接受率等方面评估了所提出的使用最早完成时间的服务功能链调度方法的性能。我们将提出的算法与文献中现有的四种方法进行了比较。仿真结果表明,我们提出的方法在端到端延迟、服务水平协议违反率、资源利用率和接受率方面都优于现有方法。
{"title":"End to end delay aware service function chain scheduling in network function virtualization enabled networks","authors":"Sudha Dubba, Balaprakasa Rao Killi","doi":"10.1007/s12083-024-01800-0","DOIUrl":"https://doi.org/10.1007/s12083-024-01800-0","url":null,"abstract":"<p>Network function virtualization is a key enabling technology for the customization of network services in next-generation networks to support diverse applications. Most enterprise and network services contain specific network functions that are stitched together in a predefined sequence to form a service function chain. The deployment and scheduling of a service function chain onto the substrate network play a vital role in deciding the efficiency of resource utilization and the performance of network management. For a delay-sensitive network service request traversing a service function chain, the end-to-end packet delay is a crucial parameter that indicates the deployment performance. Transmission, propagation, processing, edge queueing, and virtualization delays all impact the order in which virtual network functions execute. Service level agreement violations and incorrect schedules are produced when the controller does not take edge queueing and virtualization delays into account. In this work, we propose a service function chain scheduling problem for the optimization of the end-to-end delay while considering transmission, propagation, queueing, virtualization, and processing delays. Then, we propose a scheduling approach based on the earliest finish times of the physical machines to minimize the end-to-end delay of the service function chain. The performance of the proposed service function chain scheduling approach using the earliest finish time is evaluated in terms of end-to-end delay, service level agreement violation ratio, resource utilization, and acceptance ratio. We compare our proposed algorithm with four existing approaches from the literature. Simulation results show that our proposed approach outperforms existing approaches in terms of end-to-end delay, service level agreement violation ratio, resource utilization, and acceptance ratio.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"48 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142204983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Transaction graph based key node identification for blockchain regulation 基于交易图的区块链监管关键节点识别
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-04 DOI: 10.1007/s12083-024-01783-y
Yiren Hu, Xiaozhen Lu, Wei Wang, Ping Cao

The inherent distributed and anonymity features of the blockchain system may cause illegal activities like improper content dissemination, illegal transactions, money laundering, etc., posing a severe threat to the blockchain. Due to the ultra-large scale of the public chain system, identifying key nodes in the transaction network is usually cost-intensive and time-consuming. In this paper, we propose a transaction graph-based scheme to identify key nodes in the public blockchain, where a multi-stage key node detection algorithm is proposed. Real Ethereum transaction data validates the performance of the proposed scheme. It is shown that with a data volume of millions of items, our multi-stage approach can effectively eliminate low-value information from the data and realize high-efficiency key node detection, with similar performance compared to traditional algorithms without filtering, and an extremely large improvement in algorithm execution time.

区块链系统与生俱来的分布式和匿名性特点,可能会导致不当内容传播、非法交易、洗钱等非法活动,对区块链构成严重威胁。由于公有链系统的超大规模,识别交易网络中的关键节点通常需要耗费大量的成本和时间。本文提出了一种基于交易图的公有区块链关键节点识别方案,其中提出了一种多阶段关键节点检测算法。真实的以太坊交易数据验证了所提方案的性能。结果表明,在数据量达数百万条的情况下,我们的多阶段方法可以有效剔除数据中的低价值信息,实现高效率的关键节点检测,其性能与不带过滤功能的传统算法相近,并且算法执行时间有了极大的改善。
{"title":"Transaction graph based key node identification for blockchain regulation","authors":"Yiren Hu, Xiaozhen Lu, Wei Wang, Ping Cao","doi":"10.1007/s12083-024-01783-y","DOIUrl":"https://doi.org/10.1007/s12083-024-01783-y","url":null,"abstract":"<p>The inherent distributed and anonymity features of the blockchain system may cause illegal activities like improper content dissemination, illegal transactions, money laundering, etc., posing a severe threat to the blockchain. Due to the ultra-large scale of the public chain system, identifying key nodes in the transaction network is usually cost-intensive and time-consuming. In this paper, we propose a transaction graph-based scheme to identify key nodes in the public blockchain, where a multi-stage key node detection algorithm is proposed. Real Ethereum transaction data validates the performance of the proposed scheme. It is shown that with a data volume of millions of items, our multi-stage approach can effectively eliminate low-value information from the data and realize high-efficiency key node detection, with similar performance compared to traditional algorithms without filtering, and an extremely large improvement in algorithm execution time.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"316 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142226104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A secure and trusted consensus protocol for blockchain-enabled supply chain management system 区块链供应链管理系统的安全可信共识协议
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-04 DOI: 10.1007/s12083-024-01782-z
Rangu Manjula, Naveen Chauhan

It is encouraging to see blockchain technology take off as a practical means of improving supply chain management. Blockchain can help to lower fraud, boost efficiency, and improve the trust of those involved in the supply chain by offering a secure, decentralized, and transparent platform for tracking and verifying transactions. Additionally, blockchain can help with the creation of smart contracts, which can automate the completion of some transactions and improve the supply chain’s overall efficiency. Despite ongoing challenges like scalability and interoperability, blockchain technology has the potential to transform supply chain management and build a more robust, sustainable, and reliable global economy. To increase transparency, accountability, and trust in the supply chain, this article suggests using a Proof of Reputation (PoR) consensus protocol in a blockchain-based supply chain management system. The protocol gives each participant a reputation score based on their previous actions and behavior, and uses this score to securely and decentralized validate transactions and add new blocks to the blockchain. The article offers a collection of Fair-Exchange Assessment Metrics for assessing node reputation as well as an assessment model for choosing the best consensus protocol based on particular needs and objectives. The proposed model, BCSC, outperforms the current model, BRBC, in terms of interference ratio, fair data exchange ratio, and process overhead, according to experimental results. The suggested method has the potential to boost the security, scalability, and effectiveness of supply chain blockchain systems.

区块链技术作为改善供应链管理的一种实用手段,令人鼓舞。区块链提供了一个安全、去中心化和透明的平台来跟踪和验证交易,有助于减少欺诈、提高效率,并增强供应链参与者的信任。此外,区块链还有助于创建智能合约,从而自动完成某些交易,提高供应链的整体效率。尽管目前还存在可扩展性和互操作性等挑战,但区块链技术有可能改变供应链管理,建立一个更加稳健、可持续和可靠的全球经济。为了提高供应链的透明度、问责制和信任度,本文建议在基于区块链的供应链管理系统中使用信誉证明(PoR)共识协议。该协议根据每个参与者以前的行动和行为给他们打分,并利用这个分数来安全、分散地验证交易和向区块链添加新区块。文章提供了一系列用于评估节点声誉的公平交换评估指标,以及根据特定需求和目标选择最佳共识协议的评估模型。根据实验结果,所提出的 BCSC 模型在干扰比、公平数据交换比和进程开销方面优于当前的 BRBC 模型。建议的方法有望提高供应链区块链系统的安全性、可扩展性和有效性。
{"title":"A secure and trusted consensus protocol for blockchain-enabled supply chain management system","authors":"Rangu Manjula, Naveen Chauhan","doi":"10.1007/s12083-024-01782-z","DOIUrl":"https://doi.org/10.1007/s12083-024-01782-z","url":null,"abstract":"<p>It is encouraging to see blockchain technology take off as a practical means of improving supply chain management. Blockchain can help to lower fraud, boost efficiency, and improve the trust of those involved in the supply chain by offering a secure, decentralized, and transparent platform for tracking and verifying transactions. Additionally, blockchain can help with the creation of smart contracts, which can automate the completion of some transactions and improve the supply chain’s overall efficiency. Despite ongoing challenges like scalability and interoperability, blockchain technology has the potential to transform supply chain management and build a more robust, sustainable, and reliable global economy. To increase transparency, accountability, and trust in the supply chain, this article suggests using a Proof of Reputation (PoR) consensus protocol in a blockchain-based supply chain management system. The protocol gives each participant a reputation score based on their previous actions and behavior, and uses this score to securely and decentralized validate transactions and add new blocks to the blockchain. The article offers a collection of Fair-Exchange Assessment Metrics for assessing node reputation as well as an assessment model for choosing the best consensus protocol based on particular needs and objectives. The proposed model, BCSC, outperforms the current model, BRBC, in terms of interference ratio, fair data exchange ratio, and process overhead, according to experimental results. The suggested method has the potential to boost the security, scalability, and effectiveness of supply chain blockchain systems.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"48 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142204985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security analysis and trends in signcryption for WBAN: A research study WBAN 信号加密的安全分析和趋势:一项研究
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-03 DOI: 10.1007/s12083-024-01745-4
Divya Keerthana K, Sree Nidhi S, Aarthi A, Sridharan D

The necessity for an advanced health monitoring system within healthcare systems has instigated the evolution of Wireless Body Area Networks (WBANs). It serves as a tool predominantly employed in diagnosing and addressing patient's health concerns through treatments. Securing highly confidential and sensitive patient data collected through sensors within WBANs is crucial, necessitating robust measures to prevent various forms of adversarial attacks and unauthorized access, mainly due to its critical role in healthcare applications. Hence, signcryption security is essential for ensuring the protection of medical information within WBANs. This research presents a novel perspective apart from existing investigations on signcryption, addressing a gap in the literature. The study thoroughly analyzes signcryption-based WBAN protocols to contribute valuable insights to the field. Recent signcryption literature has been assessedorganization, equipped with the master key to analyze WBAN architecture, security requirements, and critical challenges within WBANs to fulfill the outlined objectives. This review aims to perform a comparative analysis of existing signcryption security solutions and analyze the existing proposed security solutions for WBANs. The techniques were compared with the existing signcryption methods, aiming to comprehend the security issues and their underlying motives. Furthermore, it highlights the research challenges encountered in the security dimensions of signcryption in WBAN, establishing the foundation for future avenues of investigation in this rapidly developing sector of health monitoring technology. The survey aims to serve as a benchmark for researchers and application developers, offering reference points for further exploration in the field.

医疗保健系统对先进健康监测系统的需求推动了无线体域网(WBAN)的发展。它是一种主要用于诊断和通过治疗解决病人健康问题的工具。由于 WBAN 在医疗保健应用中的关键作用,确保通过 WBAN 内的传感器收集的高度机密和敏感的病人数据的安全至关重要,需要采取强有力的措施来防止各种形式的恶意攻击和未经授权的访问。因此,签名加密安全对于确保保护无线局域网内的医疗信息至关重要。除了现有的标识加密研究外,本研究提出了一个新的视角,填补了文献空白。研究深入分析了基于签名加密的无线局域网协议,为该领域贡献了宝贵的见解。最近的签名加密文献已经过组织评估,配备了分析 WBAN 架构、安全要求和 WBAN 内关键挑战的万能钥匙,以实现概述的目标。本综述旨在对现有的签名加密安全解决方案进行比较分析,并分析现有的 WBAN 安全解决方案建议。这些技术与现有的签名加密方法进行了比较,旨在了解安全问题及其根本原因。此外,它还强调了在 WBAN 信号加密安全方面遇到的研究挑战,为今后在这一快速发展的健康监测技术领域开展研究奠定了基础。调查旨在为研究人员和应用开发人员提供一个基准,为该领域的进一步探索提供参考点。
{"title":"Security analysis and trends in signcryption for WBAN: A research study","authors":"Divya Keerthana K, Sree Nidhi S, Aarthi A, Sridharan D","doi":"10.1007/s12083-024-01745-4","DOIUrl":"https://doi.org/10.1007/s12083-024-01745-4","url":null,"abstract":"<p>The necessity for an advanced health monitoring system within healthcare systems has instigated the evolution of Wireless Body Area Networks (WBANs). It serves as a tool predominantly employed in diagnosing and addressing patient's health concerns through treatments. Securing highly confidential and sensitive patient data collected through sensors within WBANs is crucial, necessitating robust measures to prevent various forms of adversarial attacks and unauthorized access, mainly due to its critical role in healthcare applications. Hence, signcryption security is essential for ensuring the protection of medical information within WBANs. This research presents a novel perspective apart from existing investigations on signcryption, addressing a gap in the literature. The study thoroughly analyzes signcryption-based WBAN protocols to contribute valuable insights to the field. Recent signcryption literature has been assessedorganization, equipped with the master key to analyze WBAN architecture, security requirements, and critical challenges within WBANs to fulfill the outlined objectives. This review aims to perform a comparative analysis of existing signcryption security solutions and analyze the existing proposed security solutions for WBANs. The techniques were compared with the existing signcryption methods, aiming to comprehend the security issues and their underlying motives. Furthermore, it highlights the research challenges encountered in the security dimensions of signcryption in WBAN, establishing the foundation for future avenues of investigation in this rapidly developing sector of health monitoring technology. The survey aims to serve as a benchmark for researchers and application developers, offering reference points for further exploration in the field.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"81 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142204989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DWAMA: Dynamic weight-adjusted mahalanobis defense algorithm for mitigating poisoning attacks in federated learning DWAMA:用于减轻联合学习中中毒攻击的动态权重调整马哈拉诺比斯防御算法
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-02 DOI: 10.1007/s12083-024-01794-9
Guozhi Zhang, Hongsen Liu, Bin Yang, Shuyan Feng

Federated learning is a distributed machine learning approach that enables participants to train models without sharing raw data, thereby protecting data privacy and facilitating collective information extraction. However, the risk of malicious attacks during client communication in federated learning remains a concern. Model poisoning attacks, where attackers hijack and modify uploaded models, can severely degrade the accuracy of the global model. To address this issue, we propose DWAMA, a federated learning-based method that incorporates outlier detection and a robust aggregation strategy. We use the robust Mahalanobis distance as a metric to measure abnormality, capturing complex correlations between data features. We also dynamically adjust the aggregation weights of malicious clients to ensure a more stable model updating process. Moreover, we adaptively adjust the malicious detection threshold to adapt to the Non-IID scenarios. Through a series of experiments and comparisons, we verify our method’s effectiveness and performance advantages, offering a more robust defense against model poisoning attacks in federated learning scenarios.

联合学习是一种分布式机器学习方法,它能让参与者在不共享原始数据的情况下训练模型,从而保护数据隐私并促进集体信息提取。然而,联合学习中客户端通信期间的恶意攻击风险仍然令人担忧。模型中毒攻击,即攻击者劫持并修改上传的模型,会严重降低全局模型的准确性。为了解决这个问题,我们提出了 DWAMA,一种基于联合学习的方法,其中包含离群点检测和稳健的聚合策略。我们使用稳健的 Mahalanobis 距离作为衡量异常的指标,捕捉数据特征之间复杂的相关性。我们还动态调整恶意客户端的聚合权重,确保模型更新过程更加稳定。此外,我们还自适应地调整恶意检测阈值,以适应非 IID 场景。通过一系列实验和比较,我们验证了我们的方法的有效性和性能优势,为联合学习场景中的模型中毒攻击提供了更稳健的防御。
{"title":"DWAMA: Dynamic weight-adjusted mahalanobis defense algorithm for mitigating poisoning attacks in federated learning","authors":"Guozhi Zhang, Hongsen Liu, Bin Yang, Shuyan Feng","doi":"10.1007/s12083-024-01794-9","DOIUrl":"https://doi.org/10.1007/s12083-024-01794-9","url":null,"abstract":"<p>Federated learning is a distributed machine learning approach that enables participants to train models without sharing raw data, thereby protecting data privacy and facilitating collective information extraction. However, the risk of malicious attacks during client communication in federated learning remains a concern. Model poisoning attacks, where attackers hijack and modify uploaded models, can severely degrade the accuracy of the global model. To address this issue, we propose DWAMA, a federated learning-based method that incorporates outlier detection and a robust aggregation strategy. We use the robust Mahalanobis distance as a metric to measure abnormality, capturing complex correlations between data features. We also dynamically adjust the aggregation weights of malicious clients to ensure a more stable model updating process. Moreover, we adaptively adjust the malicious detection threshold to adapt to the Non-IID scenarios. Through a series of experiments and comparisons, we verify our method’s effectiveness and performance advantages, offering a more robust defense against model poisoning attacks in federated learning scenarios.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"21 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142204986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-based intelligent tracing of food grain crops from production to delivery 基于区块链的粮食作物从生产到交付的智能追踪系统
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-02 DOI: 10.1007/s12083-024-01780-1
Udit Agarwal, Vinay Rishiwal, Mohd. Shiblee, Mano Yadav, Sudeep Tanwar

Traceability in the food industry has become essential to ensuring safety, quality, and regulatory compliance. Traditional traceability methods often lack transparency, efficiency, and security, leading to challenges in verifying product quality and adherence to health regulations. This paper addresses these challenges by presenting a unique blockchain-based framework/system to enhance the traceability of the food grain. Integrating sensors, Raspberry Pi units, IPFS, and Ethereum Blockchain creates a transparent and auditable supply chain, empowering every participant within the supply chain to verify quality and adherence to healthful regulations. The suggested framework combines machine learning (ML) with blockchain technology. ML is responsible for distinguishing between valid and invalid data within the agri-food supply chain in this setup. At the same time, blockchain ensures that only valid data is stored, maintaining its security and privacy. This is crucial for consumer trust and enabling regulatory bodies to conduct efficient online inspections and ensure adherence to best practices. Finally, the proposed system is evaluated using various performance metrics. In terms of scalability, as the volume of data transactions increases, the system’s scalability improves. The framework shows faster transaction commitments, reduced propagation delays, higher throughput, and lower latency with higher transaction volumes. Additionally, the security analysis confirms that the proposed system effectively addresses critical security and privacy concerns, including confidentiality, data integrity, availability, non-repudiation, and protection against cyber-attacks. The proposed blockchain-based traceability framework for food grains has shown substantial possibility in reducing fraud and improving transparency and consumer trust.

食品行业的可追溯性对于确保安全、质量和符合法规要求至关重要。传统的追溯方法往往缺乏透明度、效率和安全性,导致在验证产品质量和遵守卫生法规方面面临挑战。本文提出了一种独特的基于区块链的框架/系统,以提高粮食的可追溯性,从而应对这些挑战。该系统集成了传感器、树莓派(Raspberry Pi)装置、IPFS 和以太坊区块链,创建了一个透明、可审计的供应链,使供应链中的每个参与者都有能力验证产品质量和是否符合卫生法规。建议的框架将机器学习(ML)与区块链技术相结合。在这种设置中,机器学习负责区分农业食品供应链中的有效数据和无效数据。同时,区块链可确保只存储有效数据,维护数据的安全性和隐私性。这对消费者的信任至关重要,并使监管机构能够进行高效的在线检查,确保遵守最佳做法。最后,使用各种性能指标对拟议系统进行了评估。在可扩展性方面,随着数据交易量的增加,系统的可扩展性也在提高。随着交易量的增加,该框架显示出更快的交易承诺、更少的传播延迟、更高的吞吐量和更低的延迟。此外,安全分析证实,拟议的系统能有效解决关键的安全和隐私问题,包括保密性、数据完整性、可用性、不可抵赖性和防范网络攻击。拟议的基于区块链的粮食谷物溯源框架在减少欺诈、提高透明度和消费者信任度方面显示出巨大的可能性。
{"title":"Blockchain-based intelligent tracing of food grain crops from production to delivery","authors":"Udit Agarwal, Vinay Rishiwal, Mohd. Shiblee, Mano Yadav, Sudeep Tanwar","doi":"10.1007/s12083-024-01780-1","DOIUrl":"https://doi.org/10.1007/s12083-024-01780-1","url":null,"abstract":"<p>Traceability in the food industry has become essential to ensuring safety, quality, and regulatory compliance. Traditional traceability methods often lack transparency, efficiency, and security, leading to challenges in verifying product quality and adherence to health regulations. This paper addresses these challenges by presenting a unique blockchain-based framework/system to enhance the traceability of the food grain. Integrating sensors, Raspberry Pi units, IPFS, and Ethereum Blockchain creates a transparent and auditable supply chain, empowering every participant within the supply chain to verify quality and adherence to healthful regulations. The suggested framework combines machine learning (ML) with blockchain technology. ML is responsible for distinguishing between valid and invalid data within the agri-food supply chain in this setup. At the same time, blockchain ensures that only valid data is stored, maintaining its security and privacy. This is crucial for consumer trust and enabling regulatory bodies to conduct efficient online inspections and ensure adherence to best practices. Finally, the proposed system is evaluated using various performance metrics. In terms of scalability, as the volume of data transactions increases, the system’s scalability improves. The framework shows faster transaction commitments, reduced propagation delays, higher throughput, and lower latency with higher transaction volumes. Additionally, the security analysis confirms that the proposed system effectively addresses critical security and privacy concerns, including confidentiality, data integrity, availability, non-repudiation, and protection against cyber-attacks. The proposed blockchain-based traceability framework for food grains has shown substantial possibility in reducing fraud and improving transparency and consumer trust.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"16 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142204987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
D2D-assisted cooperative computation offloading and resource allocation in wireless-powered mobile edge computing networks 无线供电移动边缘计算网络中的 D2D 辅助协同计算卸载和资源分配
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-02 DOI: 10.1007/s12083-024-01774-z
Xianzhong Tian, Yuheng Shao, Yujia Zou, Junxian Zhang

With the increasing popularity of the internet of things (IoT) and 5th generation mobile communication technology (5G), mobile edge computing (MEC) has emerged as an innovative approach to support smart devices (SDs) in performing computational tasks. Nevertheless, the process of offloading can be energy-intensive. Traditional battery-powered SDs often encounter the challenge of battery depletion when offloading tasks. However, with the advancements in wireless power transfer technology, SDs can now achieve a sustainable power supply by harvesting ambient radio frequency energy. This paper studies the computation offloading in wireless-powered MEC networks with device-to-device (D2D) assistance. The SDs are categorized into near and far SDs based on their proximity to the MEC server. With the support of near SDs, far SDs can reduce transmission energy consumption and overall latency. In this paper, we comprehensively consider the allocation of energy harvesting time, transmission power, computation resources, and offloading decisions for SDs, establishing a mathematical model aimed at minimizing long-term average delay under energy constraints. To address the time-varying stochastic nature resulting from dynamic task arrivals and varying battery levels, we transform the long-term problem into a deterministic one for each time slot by introducing a queue and leveraging Lyapunov optimization theory. We then solve the transformed problem using deep reinforcement learning. Simulation results demonstrate that the proposed algorithm performs effectively in reducing delay and enhancing task completion rates.

随着物联网(IoT)和第五代移动通信技术(5G)的日益普及,移动边缘计算(MEC)已成为支持智能设备(SD)执行计算任务的一种创新方法。然而,卸载过程可能会耗费大量能源。传统的电池供电 SD 在卸载任务时经常会遇到电池耗尽的难题。不过,随着无线电力传输技术的发展,SD 现在可以通过收集环境射频能量实现可持续供电。本文研究了具有设备对设备(D2D)辅助功能的无线供电 MEC 网络中的计算卸载。根据 SD 与 MEC 服务器的距离,将其分为近 SD 和远 SD。在近 SD 的支持下,远 SD 可以降低传输能耗和整体延迟。本文全面考虑了 SD 的能量采集时间分配、传输功率、计算资源和卸载决策,建立了一个数学模型,旨在使能量限制下的长期平均延迟最小化。为了解决动态任务到达和电池电量变化带来的时变随机性问题,我们通过引入队列和利用 Lyapunov 优化理论,将长期问题转化为每个时隙的确定性问题。然后,我们利用深度强化学习来解决转化后的问题。仿真结果表明,所提出的算法能有效减少延迟并提高任务完成率。
{"title":"D2D-assisted cooperative computation offloading and resource allocation in wireless-powered mobile edge computing networks","authors":"Xianzhong Tian, Yuheng Shao, Yujia Zou, Junxian Zhang","doi":"10.1007/s12083-024-01774-z","DOIUrl":"https://doi.org/10.1007/s12083-024-01774-z","url":null,"abstract":"<p>With the increasing popularity of the internet of things (IoT) and 5th generation mobile communication technology (5G), mobile edge computing (MEC) has emerged as an innovative approach to support smart devices (SDs) in performing computational tasks. Nevertheless, the process of offloading can be energy-intensive. Traditional battery-powered SDs often encounter the challenge of battery depletion when offloading tasks. However, with the advancements in wireless power transfer technology, SDs can now achieve a sustainable power supply by harvesting ambient radio frequency energy. This paper studies the computation offloading in wireless-powered MEC networks with device-to-device (D2D) assistance. The SDs are categorized into near and far SDs based on their proximity to the MEC server. With the support of near SDs, far SDs can reduce transmission energy consumption and overall latency. In this paper, we comprehensively consider the allocation of energy harvesting time, transmission power, computation resources, and offloading decisions for SDs, establishing a mathematical model aimed at minimizing long-term average delay under energy constraints. To address the time-varying stochastic nature resulting from dynamic task arrivals and varying battery levels, we transform the long-term problem into a deterministic one for each time slot by introducing a queue and leveraging Lyapunov optimization theory. We then solve the transformed problem using deep reinforcement learning. Simulation results demonstrate that the proposed algorithm performs effectively in reducing delay and enhancing task completion rates.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"59 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142204988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fog computing and blockchain technology based certificateless authentication scheme in 5G-assisted vehicular communication 5G 辅助车载通信中基于雾计算和区块链技术的无证书认证方案
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-31 DOI: 10.1007/s12083-024-01778-9
Zeyad Ghaleb Al-Mekhlafi, Hussam Dheaa Kamel Al-Janabi, Mahmood A. Al-Shareeda, Badiea Abdulkarem Mohammed, Jalawi Sulaiman Alshudukhi, Kawther A. Al-Dhlan

With the goal of enhancing traffic flow and decreasing road accidents, fifth-generation (5G)-assisted vehicular fog computing was developed through innovative studies in wireless network connection technologies. But, with such high speeds and open wireless networks built into the system, privacy and security are major issues. To ensure the safety of vehicular fog computing with 5G assistance, it is essential to verify vehicle-to-vehicle traffic communication. Numerous conditional privacy-preserving authentications (CPPA) solutions have been created to safeguard communications connected to traffic in systems. Nevertheless, utilising these CPPA approaches to validate signatures is computationally costly. Elliptic curve cryptography provides authentication and conditional privacy in this certificateless authentication method for 5G-assisted vehicular fog computing, which streamlines the process of verifying vehicle signatures. In contrast, the certificateless CPPA method rapidly authenticates a signature using blockchain technology, eliminating the need for any prior identification or validation of its legitimacy. According to our experiment carried out the AVISPA tool, there are no vulnerabilities in the system that could be exploited by a Doley-Yao threat. In comparison to older approaches, the proposed solution significantly reduces the computational, communication, and energy consumption expenses.

第五代(5G)辅助车载雾计算以提高交通流量和减少道路事故为目标,通过对无线网络连接技术的创新研究而发展起来。但是,由于系统具有如此高的速度和开放的无线网络,隐私和安全成为主要问题。为了确保 5G 辅助车载雾计算的安全性,必须验证车对车交通通信。为了保护与系统中的交通连接的通信,人们创造了许多有条件的隐私保护认证(CPPA)解决方案。然而,利用这些 CPPA 方法验证签名的计算成本很高。椭圆曲线加密技术为 5G 辅助车载雾计算的无证书认证方法提供了认证和条件隐私,简化了验证车辆签名的过程。相比之下,无证书 CPPA 方法利用区块链技术快速验证签名,无需事先对其合法性进行任何识别或验证。根据我们使用 AVISPA 工具进行的实验,系统中不存在可被 Doley-Yao 威胁利用的漏洞。与旧方法相比,所提出的解决方案大大减少了计算、通信和能源消耗。
{"title":"Fog computing and blockchain technology based certificateless authentication scheme in 5G-assisted vehicular communication","authors":"Zeyad Ghaleb Al-Mekhlafi, Hussam Dheaa Kamel Al-Janabi, Mahmood A. Al-Shareeda, Badiea Abdulkarem Mohammed, Jalawi Sulaiman Alshudukhi, Kawther A. Al-Dhlan","doi":"10.1007/s12083-024-01778-9","DOIUrl":"https://doi.org/10.1007/s12083-024-01778-9","url":null,"abstract":"<p>With the goal of enhancing traffic flow and decreasing road accidents, fifth-generation (5G)-assisted vehicular fog computing was developed through innovative studies in wireless network connection technologies. But, with such high speeds and open wireless networks built into the system, privacy and security are major issues. To ensure the safety of vehicular fog computing with 5G assistance, it is essential to verify vehicle-to-vehicle traffic communication. Numerous conditional privacy-preserving authentications (CPPA) solutions have been created to safeguard communications connected to traffic in systems. Nevertheless, utilising these CPPA approaches to validate signatures is computationally costly. Elliptic curve cryptography provides authentication and conditional privacy in this certificateless authentication method for 5G-assisted vehicular fog computing, which streamlines the process of verifying vehicle signatures. In contrast, the certificateless CPPA method rapidly authenticates a signature using blockchain technology, eliminating the need for any prior identification or validation of its legitimacy. According to our experiment carried out the AVISPA tool, there are no vulnerabilities in the system that could be exploited by a Doley-Yao threat. In comparison to older approaches, the proposed solution significantly reduces the computational, communication, and energy consumption expenses.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"19 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142205011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Peer-To-Peer Networking and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1