Blockchain and Machine Learning for IoT: Security and Privacy Challenges

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Networks".

Deadline for manuscript submissions: closed (28 February 2022) | Viewed by 7023

Special Issue Editors


E-Mail Website
Guest Editor
Department of Computer Science, University of Salerno, 84084 Fisciano, Italy
Interests: security and privacy; computer modeling and simulation; information systems; computer networks
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor

Special Issue Information

Dear Colleagues,

The pervasiveness of IoT technologies in a variety of fields is changing our lives. Industry, agriculture, health, and even personal life are experiencing a revolution in the way data are collected, communicated, processed, and stored. In recent years, two other technologies have begun to be used in synergy with IoT: Blockchain, which has changed the way data are stored, and machine learning, which has changed the way data are processed. With these premises in mind, it is desirable for researchers to focus their attention not just on the performance and features of the new systems but also on the new security and privacy issues related to this revolution. 

This Special Issue invites researchers to contribute with original contributions, case studies, and reviews that address all new challenges due to the use of IoT in synergy with blockchain systems and/or machine learning techniques.

The topics relevant for this Special Issue include (but are not limited to):

  • Security and privacy in blockchain technology for IoT;
  • Intelligent systems for fraud detection and forensics in blockchain environments;
  • Innovative architectures and protocols for safe blockchain application in IoT;
  • Blockchain and trust management;
  • Blockchain-based solutions for IoT security;
  • Novel machine learning and data science methods for IoT security;
  • Generative adversarial networks (GAN) in IoT security;
  • Architectures and protocols for scalable, secure, robust, and privacy enhancing IoT;
  • Privacy preservation in IoT;
  • Vulnerability analysis, threat modeling, and risk assessment in IoT;
  • Intrusion detection for IoT;
  • Novel security architectures, protocols, or applications for IoT.

This is a joint special issue with Network.

Dr. Michele Mastroianni
Prof. Dr. Francesco Palmieri
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Blockchain
  • Machine Learning
  • IoT
  • Security
  • Privacy
  • Risk Analysis

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

29 pages, 5124 KiB  
Article
BlockchainBot: A Novel Botnet Infrastructure Enhanced by Blockchain Technology and IoT
by Haoyu Gao, Leixiao Li, Xiangyang Chang, Jianxiong Wan, Jie Li, Jinze Du and Xiaoxu Zhang
Electronics 2022, 11(7), 1065; https://doi.org/10.3390/electronics11071065 - 28 Mar 2022
Cited by 4 | Viewed by 2427
Abstract
Although the traditional P2P botnet has significant resilience against termination, its dependence on neighbor lists (NL) has left it vulnerable to infiltration and destruction. In addition, it is not sufficient in protecting the botmaster’s identity. To overcome these weaknesses, we proposed BlockchainBot, a [...] Read more.
Although the traditional P2P botnet has significant resilience against termination, its dependence on neighbor lists (NL) has left it vulnerable to infiltration and destruction. In addition, it is not sufficient in protecting the botmaster’s identity. To overcome these weaknesses, we proposed BlockchainBot, a botnet model that leveraged IoT devices as maintainers, and integrated blockchain, also known as distributed ledger technology (DLT). The BlockchainBot was able to fully deploy bots on public blockchains. It was versatile for multiple botnet applications and eliminated the dependence on NL. In addition, we further introduced a novel method, the forking of a channel, to kick out spy nodes that infiltrate a botnet. To further enforce the resistance against a single point of failure (SPoF), we introduced bot-cluster dispersing to prevent clustering around full nodes and more evenly scatter bots to prevent hostile takeovers. The analysis of the security of BlockchainBot indicated that it had strong resilience against DDoS attacks, Sybil attacks, and forensic investigations. Furthermore, the security of the forking of the channel and bot-cluster dispersing were also shown to be effective. The robustness of the BlockchainBot against the Sybil attack was also briefly discussed. Experimental results authenticated the effectiveness and performance of the BlockchainBot, as compared to previous models. Full article
Show Figures

Figure 1

19 pages, 377 KiB  
Article
Anonymous Sealed-Bid Auction on Ethereum
by Gaurav Sharma, Denis Verstraeten, Vishal Saraswat, Jean-Michel Dricot and Olivier Markowitch
Electronics 2021, 10(19), 2340; https://doi.org/10.3390/electronics10192340 - 24 Sep 2021
Cited by 8 | Viewed by 3313
Abstract
In a competitive market, online auction systems enable optimal trading of digital products and services. Bidders can participate in existing blockchain-based auctions while protecting the confidentiality of their bids in a decentralized, transparent, secure, and auditable manner. However, in a competitive market, parties [...] Read more.
In a competitive market, online auction systems enable optimal trading of digital products and services. Bidders can participate in existing blockchain-based auctions while protecting the confidentiality of their bids in a decentralized, transparent, secure, and auditable manner. However, in a competitive market, parties would prefer not to disclose their interests to competitors, and to remain anonymous during auctions. In this paper, we firstly analyze the specific requirements for blockchain-based anonymous fair auctions. We present a formal model tailored to study auction systems that facilitate anonymity, as well as a generic protocol for achieving bid confidentiality and bidder anonymity using existing cryptographic primitives such as designated verifier ring signature. We demonstrate that it is secure using the security model we presented. Towards the end, we demonstrate through extensive simulation results on Ethereum blockchain that the proposed protocol is practical and has minimal associated overhead. Furthermore, we discuss the complexity and vulnerabilities that a blockchain environment might introduce during implementation. Full article
Show Figures

Figure 1

Back to TopTop