You are currently on the new version of our website. Access the old version .

232 Results Found

  • Article
  • Open Access
22 Citations
5,161 Views
25 Pages

26 December 2022

We propose a decentralized medical trust management system using blockchain-based federated learning for large-scale Internet of Things (IoT) systems. The proposed system enables health institutions to share data without revealing the privacy of data...

  • Article
  • Open Access
15 Citations
8,298 Views
20 Pages

The widespread computer network has been changing drastically and substantially since blockchain and IoT entered the stage. Blockchain is good at protecting data transactions between logical nodes with a desirable guaranty. Internet of Things (IoT),...

  • Article
  • Open Access
6 Citations
4,069 Views
24 Pages

8 February 2024

The intersection of cybersecurity and opportunistic networks has ushered in a new era of innovation in the realm of wireless communications. In an increasingly interconnected world, where seamless data exchange is pivotal for both individual users an...

  • Proceeding Paper
  • Open Access
12 Citations
2,274 Views
6 Pages

Trust Management Technique Using Blockchain in Smart Building

  • Muhammad Saeed,
  • Rashid Amin,
  • Muhammad Aftab and
  • Naeem Ahmed

Security is a big challenge for developing and implementing IoT in smart building situations. In this context, our goal is to create a secure blockchain-based trust management system. To do so we take advantage of the security features that blockchai...

  • Article
  • Open Access
971 Views
23 Pages

23 November 2025

The integrity of digital identity is foundational to a sustainable digital society yet is increasingly challenged by sophisticated AI-enabled risks such as deepfakes and synthetic identities. This is a conceptual paper that develops an AI-integrated,...

  • Article
  • Open Access
4 Citations
4,954 Views
28 Pages

QuietPlace: An Ultrasound-Based Proof of Location Protocol with Strong Identities

  • Dimitrios Kounas,
  • Orfefs Voutyras,
  • Georgios Palaiokrassas,
  • Antonios Litke and
  • Theodora Varvarigou

Location-based services are becoming extremely popular due to the widespread use of smartphones and other mobile and portable devices. These services mainly rely on the sincerity of users, who can spoof the location they report to them. For applicati...

  • Article
  • Open Access
3 Citations
1,412 Views
24 Pages

3 July 2025

Traditional systems in real life lack transparency and ease of use due to their reliance on centralization and large infrastructure. Furthermore, many sectors that rely on information technology face major challenges related to data integrity, trust,...

  • Article
  • Open Access
12 Views
42 Pages

This paper proposes a process-aware, tag-based digital identity framework that enhances interoperability while enabling identity unlinkability and selective disclosure across multi-party workflows involving sensitive data. We realize this framework w...

  • Article
  • Open Access
4 Citations
3,358 Views
17 Pages

A Novel Method of Secured Data Distribution Using Sharding Zkp and Zero Trust Architecture in Blockchain Multi Cloud Environment

  • Komala Rangappa,
  • Arun Kumar Banavara Ramaswamy,
  • Mahadeshwara Prasad and
  • Shreyas Arun Kumar

In the era of cloud computing, guaranteeing the safety and effectiveness of data management is of utmost importance. This investigation presents a novel approach that amalgamates the sharding concept, encryption, zero-knowledge proofs (zkp), and bloc...

  • Article
  • Open Access
4 Citations
3,118 Views
33 Pages

Toward Trusted IoT by General Proof-of-Work

  • Chih-Wen Hsueh and
  • Chi-Ting Chin

20 December 2022

Internet of Things (IoT) is used to describe devices with sensors that connect and exchange data with other devices or systems on the Internet or other communication networks. Actually, the data not only represent the concrete things connected but al...

  • Article
  • Open Access
1 Citations
1,232 Views
24 Pages

30 July 2025

Trust evaluation has become a major challenge in the quickly developing Internet of Things (IoT) environment because of the vulnerabilities and security hazards associated with networked devices. To overcome these obstacles, this study offers a novel...

  • Article
  • Open Access
15 Citations
2,910 Views
20 Pages

In the rapidly evolving landscape of distributed systems, security stands as a significant challenge, especially in the face of network node attacks. Such threats introduce profound complexities into the dynamics of security protocols, trust manageme...

  • Article
  • Open Access
1,510 Views
14 Pages

Anonymous Access System with Limited Number of Uses in a Trustless Environment

  • Francesc Garcia-Grau,
  • Jordi Herrera-Joancomartí and
  • Aleix Dorca Josa

24 September 2024

This article proposes a novel method for managing usage counters within an anonymous credential system, addressing the limitation of traditional anonymous credentials in tracking repeated use. The method takes advantage of blockchain technology throu...

  • Article
  • Open Access
23 Citations
6,321 Views
23 Pages

Blockchain-Based Trusted Property Transactions in the Built Environment: Development of an Incubation-Ready Prototype

  • Srinath Perera,
  • Amer A. Hijazi,
  • Geeganage Thilini Weerasuriya,
  • Samudaya Nanayakkara and
  • Muhandiramge Nimashi Navodana Rodrigo

20 November 2021

Blockchain can be introduced to use cases in the built environment where reliability of transaction records is paramount. Blockchain facilitates decentralised, cryptographically secure, trustworthy, and immutable recordkeeping of transactions. Howeve...

  • Article
  • Open Access
10 Citations
5,944 Views
27 Pages

Security Architecture and Protocol for Trust Verifications Regarding the Integrity of Files Stored in Cloud Services

  • Alexandre Pinheiro,
  • Edna Dias Canedo,
  • Rafael Timoteo De Sousa Junior,
  • Robson De Oliveira Albuquerque,
  • Luis Javier García Villalba and
  • Tai-Hoon Kim

2 March 2018

Cloud computing is considered an interesting paradigm due to its scalability, availability and virtually unlimited storage capacity. However, it is challenging to organize a cloud storage service (CSS) that is safe from the client point-of-view and t...

  • Review
  • Open Access
4 Citations
3,763 Views
31 Pages

13 May 2025

Ensuring the safe, reliable, and energy-efficient provision of electricity is a complex task for smart grid (SG) management applications. Internet of Things (IoT) and edge computing-based SG applications have been proposed for time-responsive monitor...

  • Article
  • Open Access
571 Views
22 Pages

11 November 2025

Real-time monitoring of atmospheric emissions is critical for ensuring transparency, compliance, and rapid response to environmental risks. However, traditional systems often suffer from latency and a lack of verifiable data integrity. This paper pre...

  • Article
  • Open Access
5 Citations
4,550 Views
21 Pages

Federated learning is a privacy-preserving machine learning framework where multiple data owners collaborate to train a global model under the orchestra of a central server. The local training results from trainers should be submitted to the central...

  • Article
  • Open Access
16 Citations
3,471 Views
24 Pages

24 September 2021

The rapid advancement in artificial intelligence (AI) and wide deployment of Internet of Video Things (IoVT) enable situation awareness (SAW). The robustness and security of IoVT systems are essential for a sustainable urban environment. While blockc...

  • Article
  • Open Access
15 Citations
3,410 Views
18 Pages

Schloss: Blockchain-Based System Architecture for Secure Industrial IoT

  • Fatemeh Ghovanlooy Ghajar,
  • Axel Sikora and
  • Dominik Welte

Industrial companies can use blockchain to assist them in resolving their trust and security issues. In this research, we provide a fully distributed blockchain-based architecture for industrial IoT, relying on trust management and reputation to enha...

  • Article
  • Open Access
1 Citations
3,024 Views
14 Pages

Rentable CDN Using Blockchain and Proof of Provenance

  • Suah Kim,
  • Vasily Sachnev and
  • Hyoung Joong Kim

20 September 2020

Building a rentable content delivery network (CDN), a p2p based CDN that supports content control and is composed of hardware rented from consumers, requires significant trust between the renters and consumers. The proposed method solves this using a...

  • Article
  • Open Access
35 Citations
5,675 Views
17 Pages

15 March 2023

Recent advancement in IoT technology has boosted the healthcare domain with enormous usage of IoT devices to provide elevated services to patients with chronic disorders on a real-time basis by the incorporation of IoT sensors on patients’ bodi...

  • Article
  • Open Access
3 Citations
5,371 Views
18 Pages

The rapid development of blockchain has significantly promoted research on zero-knowledge proofs (ZKPs), especially zero-knowledge succinct noninteractive arguments of knowledge (zk-SNARK). As is well known, protocol proof and verification time, as w...

  • Article
  • Open Access
3 Citations
3,328 Views
17 Pages

Authentication is a crucial security service on the Internet. In real-world applications, multiple independent trust domains often exist, with each recognizing only certain identities within their own systems. During cross-domain access, users cannot...

  • Article
  • Open Access
2 Citations
2,170 Views
27 Pages

Proof-of-Friendship Consensus Mechanism for Resilient Blockchain Technology

  • Jims Marchang,
  • Rengaprasad Srikanth,
  • Solan Keishing and
  • Indranee Kashyap

Traditional blockchain consensus mechanisms, such as Proof of Work (PoW) and Proof of Stake (PoS), face significant challenges related to the centralisation of validators and miners, environmental impact, and trustworthiness. While PoW is highly secu...

  • Article
  • Open Access
12 Citations
5,153 Views
24 Pages

30 August 2023

The trustworthiness of a system is not just about proving the identity or integrity of the hardware but also extends to the data, control, and management planes of communication between devices and the software they are running. This trust in data an...

  • Article
  • Open Access
2 Citations
3,191 Views
23 Pages

A high level of data integrity is a strong requirement in systems where the life of people depends on accurate and timely responses. In healthcare emergency response systems, a centralized authority that handles data related to occurring events is pr...

  • Article
  • Open Access
1,035 Views
19 Pages

26 June 2025

As a core enabler of the emerging low-altitude economy, UAV networks face significant security risks during operation, including malicious node infiltration and data tampering. Existing trust management schemes suffer from deficiencies such as strong...

  • Article
  • Open Access
30 Citations
7,421 Views
26 Pages

A Consortium Blockchain-Based Secure and Trusted Electronic Portfolio Management Scheme

  • Mpyana Mwamba Merlec,
  • Md. Mainul Islam,
  • Youn Kyu Lee and
  • Hoh Peter In

8 February 2022

In recent times, electronic portfolios (e-portfolios) are being increasingly used by students and lifelong learners as digital online multimedia résumés that showcase their skill sets and achievements. E-portfolios require secure, relia...

  • Article
  • Open Access
1 Citations
1,560 Views
20 Pages

Distributed and Lightweight Software Assurance in Cellular Broadcasting Handshake and Connection Establishment

  • Sourav Purification,
  • Jinoh Kim,
  • Jonghyun Kim,
  • Ikkyun Kim and
  • Sang-Yoon Chang

7 September 2023

With developments in OpenRAN and software-defined radio (SDR), the mobile networking implementations for radio and security control are becoming increasingly software-based. We design and build a lightweight and distributed software assurance scheme,...

  • Article
  • Open Access
682 Views
20 Pages

29 June 2025

As the Internet of Things (IoT) continues to evolve, the demand for cross-domain collaboration between devices and data sharing has grown significantly. Operations confined to a single trust domain can no longer satisfy this requirement, so cross-dom...

  • Article
  • Open Access
45 Citations
18,937 Views
49 Pages

23 February 2024

As financial institutions navigate an increasingly complex cyber threat landscape and regulatory ecosystem, there is a pressing need for a robust and adaptive security architecture. This paper introduces a comprehensive, Zero Trust model-based framew...

  • Review
  • Open Access
84 Citations
25,572 Views
21 Pages

Security of Zero Trust Networks in Cloud Computing: A Comparative Review

  • Sirshak Sarkar,
  • Gaurav Choudhary,
  • Shishir Kumar Shandilya,
  • Azath Hussain and
  • Hwankuk Kim

7 September 2022

Recently, networks have shifted from traditional in-house servers to third-party-managed cloud platforms due to its cost-effectiveness and increased accessibility toward its management. However, the network remains reactive, with less accountability...

  • Article
  • Open Access
4 Citations
2,455 Views
15 Pages

NetDAO: Toward Trustful and Secure IoT Networks without Central Gateways

  • Gang Liu,
  • Chi-Yuan Chen,
  • Jing-Yuan Han,
  • Yi Zhou and
  • Guo-Biao He

30 August 2022

The Internet of Things (IoT) suffers from a profound lack of trust between central gateways and sensors, e.g., gateways suspect sensors of flooding malicious packets, and vice versa, sensors suspect gateways of manipulating traffic data. One importan...

  • Article
  • Open Access
35 Citations
7,761 Views
20 Pages

2 March 2022

Smallholder farmers produce over 70% of the world’s food needs. Yet, the socioeconomic conditions of the smallholder farmers are substandard. One of the primary reasons for this unpropitious situation is that they generate modest income by sell...

  • Article
  • Open Access
8 Citations
4,582 Views
11 Pages

A New ECDLP-Based PoW Model

  • Alessio Meneghetti,
  • Massimiliano Sala and
  • Daniele Taufer

12 August 2020

Blockchain technology has attracted a lot of research interest in the last few years. Originally, their consensus algorithm was Hashcash, which is an instance of the so-called Proof-of-Work. Nowadays, there are several competing consensus algorithms,...

  • Article
  • Open Access
5 Citations
3,768 Views
21 Pages

15 April 2020

Resource constraints have prevented comprehensive cryptography and multifactor authentication in numerous Internet of Things (IoT) connectivity scenarios. Existing IoT systems generally adopt lightweight security protocols that lead to compromise and...

  • Article
  • Open Access
33 Citations
5,496 Views
17 Pages

This paper defines a new practical construction for a code-based signature scheme. We introduce a new protocol that is designed to follow the recent paradigm known as “Sigma protocol with helper”, and prove that the protocol’s secur...

  • Data Descriptor
  • Open Access
4 Citations
4,453 Views
15 Pages

Hardware Trojan Dataset of RISC-V and Web3 Generated with ChatGPT-4

  • Victor Takashi Hayashi and
  • Wilson Vicente Ruggiero

19 June 2024

Although hardware trojans impose a relevant threat to the hardware security of RISC-V and Web3 applications, existing datasets have a limited set of examples, as the most famous hardware trojan dataset TrustHub has 106 different trojans. RISC-V speci...

  • Article
  • Open Access
24 Citations
6,496 Views
23 Pages

2 June 2022

Due to its significant global impact, both domestic and international efforts are underway to cure the infection and stop the COVID-19 virus from spreading further. In resource-limited environments, overwhelmed healthcare institutions and surveillanc...

  • Article
  • Open Access
2 Citations
2,073 Views
18 Pages

As network technology advances, there is an increasing need for a trusted new-generation information management system. Blockchain technology provides a decentralized, transparent, and tamper-proof foundation. Meanwhile, data islands have become a si...

  • Article
  • Open Access
1 Citations
1,720 Views
23 Pages

14 November 2025

In this paper, we examine the relevant vulnerabilities and security controls for ensuring the security of applications built on microservice architectures. Zero Trust security principles are used to conceptualize and implement a secure ecosystem usin...

  • Article
  • Open Access
10 Citations
789 Views
12 Pages

The Next Generation Information Infrastructure for International Trade

  • Stefan Henningsson,
  • Uri Gal,
  • Niels Bjørn-Andersen and
  • Yao-Hua Tan

Regulators and actors in international trade are facing a difficult challenge of increasing control and security while at the same time lowering the administrative burden for traders. As a tentative response, the European Commission has introduced th...

  • Article
  • Open Access
1 Citations
1,082 Views
12 Pages

12 February 2025

Future generations of wireless networks at high-frequency spectrum suffer from limited coverage and Non-Line- of-Sight signal blockage, challenging emerging applications, such as smart industries and intelligent automation systems. Collaborative and...

  • Review
  • Open Access
1,349 Views
25 Pages

3 December 2025

With the accelerated development of the global digital economy, data spaces have become a crucial infrastructure for cross-domain data circulation and value creation. However, cross-organizational and cross-regional data sharing still faces several c...

  • Article
  • Open Access
3 Citations
4,353 Views
22 Pages

The evolution of smart contracts in recent years inspired a crucial question: do smart contract evaluation protocols provide the required level of privacy when executing contracts on the blockchain? The Hawk (IEEE S&P ’16) paper introduces...

  • Article
  • Open Access
43 Citations
10,559 Views
24 Pages

Privacy and Trust Redefined in Federated Machine Learning

  • Pavlos Papadopoulos,
  • Will Abramson,
  • Adam J. Hall,
  • Nikolaos Pitropakis and
  • William J. Buchanan

A common privacy issue in traditional machine learning is that data needs to be disclosed for the training procedures. In situations with highly sensitive data such as healthcare records, accessing this information is challenging and often prohibited...

  • Article
  • Open Access
657 Views
22 Pages

12 November 2025

The rapid expansion of satellite networks for advanced communication and space exploration has ensured that robust cybersecurity for inter-satellite links has become a critical challenge. Traditional security models rely on centralized trust authorit...

of 5