Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (744)

Search Parameters:
Keywords = Blockchain scalability

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
19 pages, 1269 KB  
Article
A Conceptual Framework for AI- and Blockchain-Enabled Research Project Evaluation Systems
by Saule Amanzholova, Galimkair Mutanov, Olga Ussatova, Laura Aldasheva, Akzhibek Amirova and Vitaliy Naumenko
Information 2026, 17(2), 151; https://doi.org/10.3390/info17020151 - 3 Feb 2026
Abstract
The evaluation of research and development (R&D) project proposals plays a critical role in shaping national scientific and technological priorities. However, existing expert review systems are often characterized by fragmented digital workflows, limited traceability of decisions, and a strong reliance on manual coordination, [...] Read more.
The evaluation of research and development (R&D) project proposals plays a critical role in shaping national scientific and technological priorities. However, existing expert review systems are often characterized by fragmented digital workflows, limited traceability of decisions, and a strong reliance on manual coordination, which reduces transparency and auditability. This paper proposes a conceptual and methodological framework for a national research project evaluation system that integrates artificial intelligence and blockchain technologies as complementary decision-support and data integrity mechanisms. The framework formalizes the complete evaluation lifecycle, including applicant authorization, formal compliance verification, originality and plagiarism analysis, expert selection and assessment, analytical consolidation of reviews, and fixation of final decisions. Artificial intelligence modules are introduced to support thematic classification, compliance checking, expert matching, and analytical processing of expert evaluations, while blockchain technology is incorporated as an immutable integrity layer for recording critical evaluation events and ensuring data provenance. The proposed approach focuses on architectural design, governance principles, and process modeling rather than system implementation or empirical validation. The framework is intended to serve as a reference model for the design and future development of transparent, accountable, and scalable research project evaluation platforms at national and institutional levels. Full article
(This article belongs to the Section Information Systems)
Show Figures

Figure 1

28 pages, 5401 KB  
Article
A Novel Dual-Layer Quantum-Resilient Encryption Strategy for UAV–Cloud Communication Using Adaptive Lightweight Ciphers and Hybrid ECC–PQC
by Mahmoud Aljamal, Bashar S. Khassawneh, Ayoub Alsarhan, Saif Okour, Latifa Abdullah Almusfar, Bashair Faisal AlThani and Waad Aldossary
Computers 2026, 15(2), 101; https://doi.org/10.3390/computers15020101 - 2 Feb 2026
Abstract
Unmanned Aerial Vehicles (UAVs) are increasingly integrated into Internet of Things (IoT) ecosystems for applications such as surveillance, disaster response, environmental monitoring, and logistics. These missions demand reliable and secure communication between UAVs and cloud platforms for command, control, and data storage. However, [...] Read more.
Unmanned Aerial Vehicles (UAVs) are increasingly integrated into Internet of Things (IoT) ecosystems for applications such as surveillance, disaster response, environmental monitoring, and logistics. These missions demand reliable and secure communication between UAVs and cloud platforms for command, control, and data storage. However, UAV communication channels are highly vulnerable to eavesdropping, spoofing, and man-in-the-middle attacks due to their wireless and often long-range nature. Traditional cryptographic schemes either impose excessive computational overhead on resource-constrained UAVs or lack sufficient robustness for cloud-level security. To address this challenge, we propose a dual-layer encryption architecture that balances lightweight efficiency with strong cryptographic guarantees. Unlike prior dual-layer approaches, the proposed framework introduces a context-aware adaptive lightweight layer for UAV-to-gateway communication and a hybrid post-quantum layer for gateway-to-cloud security, enabling dynamic cipher selection, energy-aware key scheduling, and quantum-resilient key establishment. In the first layer, UAV-to-gateway communication employs a lightweight symmetric encryption scheme optimized for low latency and minimal energy consumption. In the second layer, gateway-to-cloud communication uses post-quantum asymmetric encryption to ensure resilience against emerging quantum threats. The architecture is further reinforced with optional multi-path hardening and blockchain-assisted key lifecycle management to enhance scalability and tamper-proof auditability. Experimental evaluation using a UAV testbed and cloud integration shows that the proposed framework achieves 99.85% confidentiality preservation, reduces computational overhead on UAVs by 42%, and improves end-to-end latency by 35% compared to conventional single-layer encryption schemes. These results confirm that the proposed adaptive and hybridized dual-layer design provides a scalable, secure, and resource-aware solution for UAV-to-cloud communication, offering both present-day practicality and future-proof cryptographic resilience. Full article
(This article belongs to the Special Issue Emerging Trends in Network Security and Applied Cryptography)
Show Figures

Figure 1

29 pages, 1417 KB  
Systematic Review
Democratic Innovation: Systematic Evaluation of Blockchain-Based Electronic Voting (2022–2025)
by Oscar Revelo Sánchez, Alexander Barón Salazar and Manuel Bolaños González
Technologies 2026, 14(2), 95; https://doi.org/10.3390/technologies14020095 - 2 Feb 2026
Abstract
This systematic review examines recent advances in blockchain-based electronic voting systems, motivated by the need for more transparent, secure, and verifiable electoral processes. The rapid growth of research between 2022 and 2025 highlights blockchain as a promising foundation for addressing long-standing challenges of [...] Read more.
This systematic review examines recent advances in blockchain-based electronic voting systems, motivated by the need for more transparent, secure, and verifiable electoral processes. The rapid growth of research between 2022 and 2025 highlights blockchain as a promising foundation for addressing long-standing challenges of integrity, anonymity, and trust in digital elections, particularly in academic contexts where pilot deployments are more feasible. The review followed PRISMA 2020 guidelines and applied the evidence-based methodology proposed by Kitchenham & Charters. Searches were conducted in six major databases, yielding 861 records; after removing duplicates and applying eligibility criteria, 338 studies were retained. Data were extracted using a structured template and synthesised qualitatively due to the conceptual and methodological heterogeneity of the evidence. The included studies reveal significant progress in blockchain architectures, smart contracts, and advanced cryptographic mechanisms—such as blind signatures, zero-knowledge proofs, and homomorphic encryption. Multiple authentication and verification strategies were identified; however, real-world validations remain limited and largely confined to small-scale academic pilots. Overall, blockchain-based voting systems demonstrate conceptual advantages over traditional and conventional electronic models, especially regarding transparency and auditability. Nevertheless, the field requires stronger empirical evaluation, greater scalability, and clearer regulatory alignment to support broader institutional adoption. Full article
(This article belongs to the Special Issue Application and Management of Blockchain Technologies)
Show Figures

Graphical abstract

29 pages, 2816 KB  
Article
Library Systems and Digital-Rights Management: Towards a Blockchain-Based Solution for Enhanced Privacy and Security
by Patrick Laboso, Martin Aruldoss, P. Thiyagarajan, T. Miranda Lakshmi and Martin Wynn
Information 2026, 17(2), 137; https://doi.org/10.3390/info17020137 - 1 Feb 2026
Viewed by 145
Abstract
The rapid digitization of library resources has intensified the need for robust digital-rights management (DRM) mechanisms to safeguard copyright, control access, and preserve user privacy. Conventional DRM approaches are often centralized, prone to single-point-of-failure, and are limited in transparency and interoperability. To address [...] Read more.
The rapid digitization of library resources has intensified the need for robust digital-rights management (DRM) mechanisms to safeguard copyright, control access, and preserve user privacy. Conventional DRM approaches are often centralized, prone to single-point-of-failure, and are limited in transparency and interoperability. To address these challenges, this article puts forward a decentralized DRM framework for library systems by leveraging blockchain technology and decentralized DRM-key mechanisms. An integrative review of the available research literature provides an analysis of current blockchain-based DRM library systems, their limitations, and associated challenges. To address these issues, a controlled experiment is set up to implement and evaluate a possible solution. In the proposed model, digital content is encrypted and stored in the Inter-Planetary File System (IPFS), while blockchain smart contracts manage the generation, distribution, and validation of DRM-keys that regulate user-access rights. This approach ensures immutability, transparency, and fine-grained access control without reliance on centralized authorities. Security is enhanced through cryptographic techniques for authentication. The model not only mitigates issues of piracy, unauthorized redistribution, and vendor lock-in, but also provides a scalable and interoperable solution for modern digital libraries. The findings demonstrate how blockchain-enabled DRM-keys can enhance trust, accountability, and efficiency through the development of secure, decentralized, and user-centric digital library systems, which will be of interest to practitioners charged with library IT technology management and to researchers in the wider field of blockchain applications in organizations. Full article
Show Figures

Graphical abstract

28 pages, 3862 KB  
Review
A Review of Wireless Charging Solutions for FANETs in IoT-Enabled Smart Environments
by Nelofar Aslam, Hongyu Wang, Hamada Esmaiel, Naveed Ur Rehman Junejo and Adel Agamy
Sensors 2026, 26(3), 912; https://doi.org/10.3390/s26030912 - 30 Jan 2026
Viewed by 158
Abstract
Unmanned Aerial Vehicles (UAVs) are emerging as a fundamental part of Flying Ad Hoc Networks (FANETs). However, owing to the limited energy capacity of UAV batteries, wireless power transfer (WPT) technologies have recently gained interest from researchers, offering recharging possibilities for FANETs. Based [...] Read more.
Unmanned Aerial Vehicles (UAVs) are emerging as a fundamental part of Flying Ad Hoc Networks (FANETs). However, owing to the limited energy capacity of UAV batteries, wireless power transfer (WPT) technologies have recently gained interest from researchers, offering recharging possibilities for FANETs. Based on this background, this study highlights the need for wireless charging to enhance the operational endurance of FANETs in Internet-of-Things (IoT) environments. This review investigates WPT power replenishment to explore the dynamic usage of UAVs in two ways. The former is for using a UAV as a mobile charger to recharge the ground nodes, whereas the latter is for WPT applications in in-flight (UAV-to-UAV) charging. For the two research domains, we describe the different methods of WPT and its latest advancements through the academic and industrial research literature. We categorized the results based on the power transfer range, efficiency, wireless charger topology (ground or in-flight), coordination among multiple UAVs, and trajectory optimization formulation. A crucial finding is that in-flight UAV charging can extend the endurance by three times compared to using standalone batteries. Furthermore, the integration of IoT for the deployment of a clan of UAVs as a FANET is rigorously emphasized. Our data findings also indicate the present and future forecasting graphs of UAVs and IoT-integrating UAVs in the global market. Existing systems have scalability issues beyond 20 UAVs; therefore, future research requires edge computing for WPT scheduling and blockchains for energy trading. Full article
(This article belongs to the Special Issue Security and Privacy Challenges in IoT-Driven Smart Environments)
Show Figures

Figure 1

24 pages, 2311 KB  
Article
Performance Evaluation of Cross-Chain Systems Based on Notary Mechanism
by Xingshuo Song, Peng Chen and Chengguo E
Sustainability 2026, 18(3), 1389; https://doi.org/10.3390/su18031389 - 30 Jan 2026
Viewed by 78
Abstract
The application of blockchain technology in large-scale sustainable scenarios requires advancement. Therefore, high-performance cross-chain infrastructure is essential for domains like green supply chain management and peer-to-peer renewable energy trading. This study proposes an integrated modeling framework, whose core innovation is the combination of [...] Read more.
The application of blockchain technology in large-scale sustainable scenarios requires advancement. Therefore, high-performance cross-chain infrastructure is essential for domains like green supply chain management and peer-to-peer renewable energy trading. This study proposes an integrated modeling framework, whose core innovation is the combination of Phase-Type (PH) distribution, the GI/PH/1 queuing model, and quasi-birth-and-death (QBD) process theory to systematically describe the multi-stage service and dynamic interactions in a notary-based cross-chain system. This framework overcomes the limitations of traditional models that rely on oversimplified service assumptions. By utilizing matrix-analytic methods, it enables the precise quantification of key performance metrics, such as system throughput, response time, and rejection rate. This research provides a unified, scalable theoretical tool for cross-chain performance evaluation and establishes a methodological foundation for optimizing system resource allocation and sustainable infrastructure design. Full article
Show Figures

Figure 1

31 pages, 1140 KB  
Review
A Survey of Multi-Layer IoT Security Using SDN, Blockchain, and Machine Learning
by Reorapetse Molose and Bassey Isong
Electronics 2026, 15(3), 494; https://doi.org/10.3390/electronics15030494 - 23 Jan 2026
Viewed by 278
Abstract
The integration of Software-Defined Networking (SDN), blockchain (BC), and machine learning (ML) has emerged as a promising approach to securing Internet of Things (IoT) and Industrial IoT (IIoT) networks. This paper conducted a comprehensive review of recent studies focusing on multi-layered security across [...] Read more.
The integration of Software-Defined Networking (SDN), blockchain (BC), and machine learning (ML) has emerged as a promising approach to securing Internet of Things (IoT) and Industrial IoT (IIoT) networks. This paper conducted a comprehensive review of recent studies focusing on multi-layered security across device, control, network, and application layers. The analysis reveals that BC technology ensures decentralised trust, immutability, and secure access validation, while SDN enables programmability, load balancing, and real-time monitoring. In addition, ML/deep learning (DL) techniques, including federated and hybrid learning, strengthen anomaly detection, predictive security, and adaptive mitigation. Reported evaluations show similar gains in detection accuracy, latency, throughput, and energy efficiency, with effective defence against threats, though differing experimental contexts limit direct comparison. It also shows that the solutions’ effectiveness depends on ecosystem factors such as SDN controllers, BC platforms, cryptographic protocols, and ML frameworks. However, most studies rely on simulations or small-scale testbeds, leaving large-scale and heterogeneous deployments unverified. Significant challenges include scalability, computational and energy overhead, dataset dependency, limited adversarial resilience, and the explainability of ML-driven decisions. Based on the findings, future research should focus on lightweight consensus mechanisms for constrained devices, privacy-preserving ML/DL, and cross-layer adversarial-resilient frameworks. Advancing these directions will be important in achieving scalable, interoperable, and trustworthy SDN-IoT/IIoT security solutions. Full article
(This article belongs to the Section Artificial Intelligence)
Show Figures

Figure 1

42 pages, 6277 KB  
Article
Process-Aware Selective Disclosure and Identity Unlinkability: A Tag-Based Interoperability-Enhancing Digital Identity Framework and Its Application to Logistics Transportation Workflows
by Junliang Liu, Zhiyao Liang and Qiuyun Lyu
Electronics 2026, 15(2), 473; https://doi.org/10.3390/electronics15020473 - 22 Jan 2026
Viewed by 97
Abstract
This paper proposes a process-aware, tag-based digital identity framework that enhances interoperability while enabling identity unlinkability and selective disclosure across multi-party workflows involving sensitive data. We realize this framework within the self-sovereign identity (SSI) paradigm, employing zk-SNARK–based zero-knowledge proofs to enable verifiable identity [...] Read more.
This paper proposes a process-aware, tag-based digital identity framework that enhances interoperability while enabling identity unlinkability and selective disclosure across multi-party workflows involving sensitive data. We realize this framework within the self-sovereign identity (SSI) paradigm, employing zk-SNARK–based zero-knowledge proofs to enable verifiable identity authentication without plaintext disclosure. The framework introduces a protocol-tagging mechanism to support multiple proof systems within a unified architecture, thereby enhancing SSI scalability and interoperability. Its core innovation lies in combining identity unlinkability and process-driven data disclosure: derived sub-identities mitigate identity-linkage attacks, while layered encryption enables selective, stepwise decryption of sensitive information (e.g., delivery addresses), ensuring participants access only the minimal information necessary for their tasks. In addition, zero-knowledge proof-based verification guarantees that the validation of derived sub-identities can be performed without sharing any plaintext attributes or identifying factors. We applied the framework to logistics, where sub-identities anonymize participants and layered encryption allows for delivery addresses to be decrypted progressively along the logistics chain, with only the final courier authorized to access complete information. During the parcel receipt process, users can complete verification using derived sub-identities and zero-knowledge proofs alone, without disclosing any real personal information or attributes that could be linked back to their identity. Trusted Execution Environments (TEEs) ensure the authenticity of decryption requests, while blockchain provides immutable audit trails. A demonstration system was implemented, formally verified using Scyther, and performance-tested across multiple platforms, including resource-constrained environments, showing high efficiency and strong practical potential. The core paradigms of identity unlinkability and process-driven data disclosure are generalizable and applicable to multi-party scenarios involving sensitive data flows. Full article
Show Figures

Figure 1

30 pages, 6341 KB  
Article
MCS-VD: Alliance Chain-Driven Multi-Cloud Storage and Verifiable Deletion Scheme for Smart Grid Data
by Lihua Zhang, Jiali Luo, Yi Yang and Wenbiao Wang
Future Internet 2026, 18(1), 56; https://doi.org/10.3390/fi18010056 - 20 Jan 2026
Viewed by 123
Abstract
The entire system collapses due to the issues of inadequate centralized storage capacity, poor scalability, low storage efficiency, and susceptibility to single point of failure brought on by huge power consumption data in the smart grid; thus, an alliance chain-driven multi-cloud storage and [...] Read more.
The entire system collapses due to the issues of inadequate centralized storage capacity, poor scalability, low storage efficiency, and susceptibility to single point of failure brought on by huge power consumption data in the smart grid; thus, an alliance chain-driven multi-cloud storage and verifiable deletion method for smart grid data is proposed. By leveraging the synergy between alliance blockchain and multi-cloud architecture, the encrypted power data originating from edge nodes is dispersed across a decentralized multi-cloud infrastructure, which effectively mitigates the danger of data loss resulting from single-point failures or malicious intrusions. The removal of expired and user-defined data is guaranteed through a transaction deletion algorithm integrated into the indexed storage deletion chain and strengthens the flexibility and security of the storage architecture. Based on the Practical Byzantine Fault-Tolerant Consensus Protocol with Ultra-Low Storage Overhead (ULS-PBFT), by the hierarchical grouping of nodes, the system communication overhead and storage overhead are reduced. Security analysis proves that the scheme can resist tampering attacks, impersonation attacks, collusion attacks, double spend attacks, and replay attacks. Performance evaluation shows that the scheme improves compared to similar methods. Full article
(This article belongs to the Special Issue Security and Privacy in Blockchains and the IoT—3rd Edition)
Show Figures

Figure 1

21 pages, 321 KB  
Review
Privacy-Preserving Protocols in Smart Cities and Industrial IoT: Challenges, Trends, and Future Directions
by Manuel José Cabral dos Santos Reis
Electronics 2026, 15(2), 399; https://doi.org/10.3390/electronics15020399 - 16 Jan 2026
Viewed by 346
Abstract
The increasing deployment of interconnected devices in Smart Cities and Industrial Internet of Things (IIoT) environments has significantly enhanced operational efficiency, automation, and real-time data analytics. However, this rapid digitization also introduces complex security and privacy challenges, particularly in the handling of sensitive [...] Read more.
The increasing deployment of interconnected devices in Smart Cities and Industrial Internet of Things (IIoT) environments has significantly enhanced operational efficiency, automation, and real-time data analytics. However, this rapid digitization also introduces complex security and privacy challenges, particularly in the handling of sensitive data across heterogeneous and resource-constrained networks. This review explores the current landscape of privacy-preserving protocols designed for Smart City and IIoT infrastructures. We examine state-of-the-art approaches including lightweight cryptographic schemes, secure data aggregation, anonymous communication protocols, and blockchain-based frameworks. The paper also analyzes practical trade-offs between security, latency, and computational overhead in real-world deployments. Open research challenges such as secure interoperability, privacy in federated learning, and resilience against AI-driven cyberattacks are discussed. Finally, the paper outlines promising research directions and technologies that can enable scalable, secure, and privacy-aware network infrastructures for future urban and industrial ecosystems. Full article
(This article belongs to the Special Issue Computer Networking Security and Privacy)
Show Figures

Figure 1

32 pages, 2775 KB  
Review
AIoT at the Frontline of Climate Change Management: Enabling Resilient, Adaptive, and Sustainable Smart Cities
by Claudia Banciu and Adrian Florea
Climate 2026, 14(1), 19; https://doi.org/10.3390/cli14010019 - 15 Jan 2026
Viewed by 234
Abstract
The convergence of Artificial Intelligence (AI) and the Internet of Things (IoT), known as Artificial Intelligence of Things (AIoT), has emerged as a transformative paradigm for enabling intelligent, data-driven, and context-aware decision-making in urban environments to reduce the carbon footprint of mobility and [...] Read more.
The convergence of Artificial Intelligence (AI) and the Internet of Things (IoT), known as Artificial Intelligence of Things (AIoT), has emerged as a transformative paradigm for enabling intelligent, data-driven, and context-aware decision-making in urban environments to reduce the carbon footprint of mobility and industry. This review examines the conceptual foundations, and state-of-the-art developments of AIoT, with a particular emphasis on its applications in smart cities and its relevance to climate change management. AIoT integrates sensing, connectivity, and intelligent analytics to provide optimized solutions in transportation systems, energy management, waste collection, and environmental monitoring, directly influencing urban sustainability. Beyond urban efficiency, AIoT can play a critical role in addressing the global challenges and management of climate change by (a) precise measurements and autonomously remote monitoring; (b) real-time optimization in renewable energy distribution; and (c) developing prediction models for early warning of climate disasters. This paper performs a literature review and bibliometric analysis to identify the current landscape of AIoT research in smart city contexts. Over 1885 articles from Web of Sciences and over 1854 from Scopus databases, published between 1993 and January 2026, were analyzed. The results reveal a strong and accelerating growth in research activity, with publication output doubling in the most recent two years compared to 2023. Waste management and air quality monitoring have emerged as leading application domains, where AIoT-based optimization and predictive models demonstrate measurable improvements in operational efficiency and environmental impact. Altogether, these support faster and more effective decisions for reducing greenhouse gas emissions and ensuring the sustainable use of resources. The reviewed studies reveal rapid advancements in edge intelligence, federated learning, and secure data sharing through the integration of AIoT with blockchain technologies. However, significant challenges remain regarding scalability, interoperability, privacy, ethical governance, and the effective translation of research outcomes into policy and citizen-oriented tools such as climate applications, insurance models, and disaster alert systems. By synthesizing current research trends, this article highlights the potential of AIoT to support sustainable, resilient, and citizen-centric smart city ecosystems while identifying both critical gaps and promising directions for future investigations. Full article
Show Figures

Figure 1

32 pages, 8110 KB  
Article
A Secure and Efficient Sharing Framework for Student Electronic Academic Records: Integrating Zero-Knowledge Proof and Proxy Re-Encryption
by Xin Li, Minsheng Tan and Wenlong Tian
Future Internet 2026, 18(1), 47; https://doi.org/10.3390/fi18010047 - 12 Jan 2026
Viewed by 194
Abstract
A sharing framework based on Zero-Knowledge Proof (ZKP) and Proxy Re-encryption (PRE) technologies offers a promising solution for sharing Student Electronic Academic Records (SEARs). As core credentials in the education sector, student records are characterized by strong identity binding, the need for long-term [...] Read more.
A sharing framework based on Zero-Knowledge Proof (ZKP) and Proxy Re-encryption (PRE) technologies offers a promising solution for sharing Student Electronic Academic Records (SEARs). As core credentials in the education sector, student records are characterized by strong identity binding, the need for long-term retention, frequent cross-institutional verification, and sensitive information. Compared with electronic health records and government archives, they face more complex security, privacy protection, and storage scalability challenges during sharing. These records not only contain sensitive data such as personal identity and academic performance but also serve as crucial evidence in key scenarios such as further education, employment, and professional title evaluation. Leakage or tampering could have irreversible impacts on a student’s career development. Furthermore, traditional blockchain technology faces storage capacity limitations when storing massive academic records, and existing general electronic record sharing solutions struggle to meet the high-frequency verification demands of educational authorities, universities, and employers for academic data. This study proposes a dedicated sharing framework for students’ electronic academic records, leveraging PRE technology and the distributed ledger characteristics of blockchain to ensure transparency and immutability during sharing. By integrating the InterPlanetary File System (IPFS) with Ethereum Smart Contract (SC), it addresses blockchain storage bottlenecks, enabling secure storage and efficient sharing of academic records. Relying on optimized ZKP technology, it supports verifying the authenticity and integrity of records without revealing sensitive content. Furthermore, the introduction of gate circuit merging, constant folding techniques, Field-Programmable Gate Array (FPGA) hardware acceleration, and the efficient Bulletproofs algorithm alleviates the high computational complexity of ZKP, significantly reducing proof generation time. The experimental results demonstrate that the framework, while ensuring strong privacy protection, can meet the cross-scenario sharing needs of student records and significantly improve sharing efficiency and security. Therefore, this method exhibits superior security and performance in privacy-preserving scenarios. This framework can be applied to scenarios such as cross-institutional academic certification, employer background checks, and long-term management of academic records by educational authorities, providing secure and efficient technical support for the sharing of electronic academic credentials in the digital education ecosystem. Full article
Show Figures

Graphical abstract

44 pages, 7079 KB  
Editorial
Mobile Network Softwarization: Technological Foundations and Impact on Improving Network Energy Efficiency
by Josip Lorincz, Amar Kukuruzović and Dinko Begušić
Sensors 2026, 26(2), 503; https://doi.org/10.3390/s26020503 - 12 Jan 2026
Viewed by 338
Abstract
This paper provides a comprehensive overview of mobile network softwarization, emphasizing the technological foundations and its transformative impact on the energy efficiency of modern and future mobile networks. In the paper, a detailed analysis of communication concepts known as software-defined networking (SDN) and [...] Read more.
This paper provides a comprehensive overview of mobile network softwarization, emphasizing the technological foundations and its transformative impact on the energy efficiency of modern and future mobile networks. In the paper, a detailed analysis of communication concepts known as software-defined networking (SDN) and network function virtualization (NFV) is presented, with a description of their architectural principles, operational mechanisms, and the associated interfaces and management frameworks that enable programmability, virtualization, and centralized control in modern mobile networks. The study further explores the role of cloud computing, virtualization platforms, distributed SDN controllers, and resource orchestration systems, outlining how they collectively support mobile network scalability, automation, and service agility. To assess the maturity and evolution of mobile network softwarization, the paper reviews contemporary research directions, including SDN security, machine-learning-assisted traffic management, dynamic service function chaining, virtual network function (VNF) placement and migration, blockchain-based trust mechanisms, and artificial intelligence (AI)-enabled self-optimization. The analysis also evaluates the relationship between mobile network softwarization and energy consumption, presenting the main SDN- and NFV-based techniques that contribute to reducing mobile network power usage, such as traffic-aware control, rule placement optimization, end-host-aware strategies, VNF consolidation, and dynamic resource scaling. Findings indicate that although fifth-generation (5G) mobile network standalone deployments capable of fully exploiting softwarization remain limited, softwarized SDN/NFV-based architectures provide measurable benefits in reducing network operational costs and improving energy efficiency, especially when combined with AI-driven automation. The paper concludes that mobile network softwarization represents an essential enabler for sustainable 5G and future beyond-5G systems, while highlighting the need for continued research into scalable automation, interoperable architectures, and energy-efficient softwarized network designs. Full article
(This article belongs to the Special Issue Energy-Efficient Communication Networks and Systems: 2nd Edition)
Show Figures

Figure 1

19 pages, 1207 KB  
Article
An Auditable and Trusted Lottery System in the Cloud
by Gwan-Hwan Hwang, Tao-Ku Chang and Yi-Syuan Lu
Appl. Sci. 2026, 16(2), 741; https://doi.org/10.3390/app16020741 - 11 Jan 2026
Viewed by 339
Abstract
Public blockchains offer transparency and tamper resistance, but implementing national-scale lotteries directly on-chain is impractical because each bet would require a separate transaction, incurring substantial gas costs and facing throughput limitations. This paper presents an auditable lottery architecture designed to address these scalability [...] Read more.
Public blockchains offer transparency and tamper resistance, but implementing national-scale lotteries directly on-chain is impractical because each bet would require a separate transaction, incurring substantial gas costs and facing throughput limitations. This paper presents an auditable lottery architecture designed to address these scalability challenges and eliminate the reliance on trusted third parties. The proposed approach decouples high-volume bet recording from on-chain enforcement. Bets are recorded off-chain in a transaction-positioned Merkle tree (TP-Merkle tree), while the service provider commits only the per-round root hash and summary metadata to an Ethereum smart contract. Each player receives a signed receipt and a compact Merkle proof (Slice), enabling independent inclusion checks and third-party audits. A programmable appeal mechanism allows any participant to submit receipts and cryptographic evidence to the contract; if misbehavior is proven, compensation is executed automatically from a pre-deposited margin. A proof-of-concept implementation demonstrates the system’s feasibility, and extensive experiments evaluate collision behavior, storage overhead, proof size, and gas consumption, demonstrating that the proposed design can support national-scale betting volumes (tens of millions of bets per round) while occupying only a small fraction of on-chain resources. Full article
(This article belongs to the Special Issue Advanced Blockchain Technology and Its Applications)
Show Figures

Figure 1

25 pages, 2007 KB  
Article
Symmetric–Asymmetric Security Synergy: A Quantum-Resilient Hybrid Blockchain Framework for Incognito IoT Data Sharing
by Chimeremma Sandra Amadi, Simeon Okechukwu Ajakwe and Taesoo Jun
Symmetry 2026, 18(1), 142; https://doi.org/10.3390/sym18010142 - 10 Jan 2026
Viewed by 253
Abstract
Secure and auditable data sharing in large-scale Internet of Things (IoT) environments remains a significant challenge due to weak trust coordination, limited scalability, and susceptibility to emerging quantum attacks. This study introduces a hybrid blockchain-based framework that integrates post-quantum cryptography with intelligent anomaly [...] Read more.
Secure and auditable data sharing in large-scale Internet of Things (IoT) environments remains a significant challenge due to weak trust coordination, limited scalability, and susceptibility to emerging quantum attacks. This study introduces a hybrid blockchain-based framework that integrates post-quantum cryptography with intelligent anomaly detection to ensure end-to-end data integrity and resilience. The proposed system utilizes Hyperledger Fabric for permissioned device lifecycle management and Ethereum for public auditability of encrypted telemetry, thereby providing both private control and transparent verification. Device identities are established using quantum-entropy-seeded credentials and safeguarded with lattice-based encryption to withstand quantum adversaries. A convolutional long short-term memory (CNN–LSTM) model continuously monitors device behavior, facilitating real-time trust scoring and autonomous revocation via smart contract triggers. Experimental results demonstrate 97.4% anomaly detection accuracy and a 0.968 F1-score, supporting up to 1000 transactions per second with cross-chain latency below 6 s. These findings indicate that the proposed architecture delivers scalable, quantum-resilient, and computationally efficient data sharing suitable for mission-critical IoT deployments. Full article
(This article belongs to the Special Issue Applications Based on Symmetry in Quantum Computing)
Show Figures

Figure 1

Back to TopTop