applsci-logo

Journal Browser

Journal Browser

Complex IoT Applications and Blockchain

A special issue of Applied Sciences (ISSN 2076-3417). This special issue belongs to the section "Electrical, Electronics and Communications Engineering".

Deadline for manuscript submissions: closed (31 May 2023) | Viewed by 8505

Special Issue Editors


E-Mail Website
Guest Editor
Department of Computer Science and Engineering, Sogang University, Seoul 04107, Korea
Interests: blockchain application; requirement engineering; adaptive software; process tailoring; dynamic product line

E-Mail Website
Guest Editor
Department of Software Engineering, Jeonbuk National University, Jeonju 54896, Korea
Interests: smart contract; blockchain platform and application architecture; mining software repository; software architecture; source code comprehension; design patterns

Special Issue Information

Dear Colleagues,

We are inviting submissions to the Special Issue on complex IoT applications and blockchain.

The blockchain, a distributed ledger whose information is protected by a consensus algorithm, enables the creation of complex networks of heterogeneous smart sensors and devices. Even though various blockchain platforms have been introduced to show the applications of more responsive and secure IoT environments, the industry still needs better blockchain technologies to enhance the applications of the IoT with blockchain. 

The aim of this Special Issue is to provide a reference on the state of the art and the opportunities and issues related to the development of blockchain technologies for complex IoT environments such as smart cities, factory automation, and supply chains of the future.

In addition to this, we invite submissions exploring cutting-edge research and recent advances in the field of IoT applications supported by blockchain technology. Both theoretical and experimental studies are welcome, as well as comprehensive review and survey papers.

Prof. Dr. Sooyong Park
Prof. Dr. Suntae Kim
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Applied Sciences is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  •  complex IoT applications supported by blockchain
  •  smart cities and blockchain
  •  factory automation and blockchain
  •  supply chains and blockchain
  •  smart home and blockchain
  •  connected healthcare and blockchain
  •  smart farming and blockchain
  •  connected cars and blockchain
  •  smart grid and blockchain

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue policies can be found here.

Published Papers (3 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

19 pages, 5659 KiB  
Article
Secure Access Control Realization Based on Self-Sovereign Identity for Cloud CDM
by Yunhee Kang and Young B. Park
Appl. Sci. 2022, 12(19), 9833; https://doi.org/10.3390/app12199833 - 29 Sep 2022
Cited by 2 | Viewed by 2023
Abstract
Public healthcare has transformed from treatment to preventive care and disease management. The Common Data Model (CDM) provides a standard data structure defined to utilize hospitals’ data. Digital identity takes a significant role as the body of information about an individual used by [...] Read more.
Public healthcare has transformed from treatment to preventive care and disease management. The Common Data Model (CDM) provides a standard data structure defined to utilize hospitals’ data. Digital identity takes a significant role as the body of information about an individual used by computer systems to identify and establish trust among organizations. The CDM research network, composed of users handling medical information, has several digital identities associated with their activity. A high central authority cost can be reduced by Distributed Ledger Technology (DLT). It enables users to control their identities independently of a third party. To preserve the privacy of researchers in clinical studies, secure identification is the main concern of identifying the researcher and its agents. To do so, they should pose a legally verifiable credential in the cloud CDM. By presenting the proof represented by the capability that the user has, each identity has access control that is linked to an authentication credential that the cloud CDM can verify. Assurance in one’s identity is confirmed by asserting claims with the identity and its capability, providing its verifiable credential to the authentication entity in the cloud CDM. This paper describes the user-centric claim-based identity operation model based on use cases to handle researcher identity in the cloud CDM. In this model, credentials are designed as a capability and presented to them to access SPs in the cloud CDM. To provide well-controlled access control in the cloud CDM, we build and prototype a capability based CDM management system. Full article
(This article belongs to the Special Issue Complex IoT Applications and Blockchain)
Show Figures

Figure 1

15 pages, 4254 KiB  
Article
Trustworthy Transaction Spreading Using Node Reliability Estimation in IoT Blockchain Networks
by Juyeon Kim and Jae-Hoon Kim
Appl. Sci. 2022, 12(17), 8737; https://doi.org/10.3390/app12178737 - 31 Aug 2022
Cited by 3 | Viewed by 1700
Abstract
Blockchain network architecture is a promising technology for constructing highly secure Internet of Things (IoT) networks. IoT networks typically comprise various sensors and actuators. Blockchain network technology can be applied to secure control robots in smart factories or reliable drone deliveries in smart [...] Read more.
Blockchain network architecture is a promising technology for constructing highly secure Internet of Things (IoT) networks. IoT networks typically comprise various sensors and actuators. Blockchain network technology can be applied to secure control robots in smart factories or reliable drone deliveries in smart cities. The wide spread of transactions and shared smart contracts across blockchain networks guarantees ultimate network security. A typical wired blockchain network maintains sufficient redundancy within a stable configuration. However, IoT blockchain networks exhibit unavoidable instability. The dynamic configuration changes caused by flexible node membership make it impossible to achieve the same level of redundancy as a stable network. A trustworthy transaction spreading method provides practical transaction sharing for dynamic IoT networks. We propose a Q-learning framework and a graph convergence network (GCN) to search for the proper spreading path of each transaction. The proposed Q-learning framework determines the next spreading hop using node features. The GCN determines the reliable area based on the Q-learning results. The discovered reliable area guides the proper spreading path of transactions to the destination node. In addition, the proposed trustworthy transaction spreading was implemented over an InterPlanetary File system (IPFS). The IPFS-powered experiments confirmed the practicability of the proposed transaction spreading mechanism. Full article
(This article belongs to the Special Issue Complex IoT Applications and Blockchain)
Show Figures

Figure 1

17 pages, 2726 KiB  
Article
Development of an Electronic Smart Safe Box Using Private Blockchain Technology
by Basil Alothman, Chibli Joumaa, Abdulrahman Alotaibi, Bandar Alotaibi, Bashayer Almutairi, Asmaa Aldhafairi and Murad Khan
Appl. Sci. 2022, 12(13), 6445; https://doi.org/10.3390/app12136445 - 24 Jun 2022
Cited by 2 | Viewed by 4053
Abstract
Effective security has become a vital part of our daily routine, for example securing cash, jewelry, documents, and other valuables. One way is to protect these items by keeping them in a safe box. However, current safe boxes are vulnerable to a number [...] Read more.
Effective security has become a vital part of our daily routine, for example securing cash, jewelry, documents, and other valuables. One way is to protect these items by keeping them in a safe box. However, current safe boxes are vulnerable to a number of security attacks such as physical, repudiation, anonymously modifying, etc. In this regard, this paper presents a robust smart safe box using the blockchain solution to ensure each transaction and secure it from unauthorized access. Also, it traces back the local safe items by reading back to blockchain data transactions and protecting them from thieves by tracking the burglar with a real-time tracking location Global Positioning System (GPS) tracker and capturing a picture and video recording through the external camera. Similarly, with more security enhancement using the TensorFlow framework to analyze optical detection and identify things inside the box using an internal camera. At the same time, each transaction is stored by using Write Once and Read Many (WORM) patterns saved in local private blockchain data block logs. Finally, it uses three-way authentication mechanisms to unlock the safe box that authenticates the users, (1) face recognition, (2) fingerprint and (3) the keypad password. The performance of the proposed smart safe box is tested by a number of hardware and blockchain tests. The results reveal that the proposed smart safe box ensures safe and authenticated access to the box and records each transaction using blockchain technology. Further, the performance evaluation of the private blockchain significantly improved the integrity and safeness of the proposed smart safe box. Full article
(This article belongs to the Special Issue Complex IoT Applications and Blockchain)
Show Figures

Figure 1

Back to TopTop