Skip to Content

343 Results Found

  • Article
  • Open Access
44 Citations
3,199 Views
14 Pages

An Enhanced Multi-Layer Blockchain Security Model for Improved Latency and Scalability

  • Basem Mohamed Elomda,
  • Taher Abouzaid Abdelaty Abdelbary,
  • Hesham Ahmed Hassan,
  • Kamal S. Hamza and
  • Qasem Kharma

18 March 2025

The Multi-Layer Blockchain Security Model (MLBSM) proposed in 2024 was designed to safeguard Internet of Things (IoT) networks, as well as similar network architectures, against transaction privacy leakage in public blockchain systems. MLBSM also add...

  • Review
  • Open Access
3,533 Views
37 Pages

29 August 2025

Blockchain technologies, despite their profound transformative potential across multiple industries, continue to face significant scalability challenges. These limitations are primarily observed in restricted transaction throughput and elevated laten...

  • Review
  • Open Access
19 Citations
9,088 Views
16 Pages

29 August 2024

Layer 2 solutions have emerged in recent years as a valuable alternative to increase the throughput and scalability of blockchain-based architectures. The three primary types of Layer 2 solutions are state channels, sidechains, and rollups. The rollu...

  • Review
  • Open Access
472 Views
31 Pages

The integration of Software-Defined Networking (SDN), blockchain (BC), and machine learning (ML) has emerged as a promising approach to securing Internet of Things (IoT) and Industrial IoT (IIoT) networks. This paper conducted a comprehensive review...

  • Article
  • Open Access
6 Citations
2,738 Views
22 Pages

In today’s digital age, ensuring the secure transmission of confidential data through various means of communication is crucial. Protecting the data from malicious attacks during transmission poses a significant challenge. To achieve this, reve...

  • Article
  • Open Access
231 Views
20 Pages

3 February 2026

The COVID-19 outbreak significantly impacted global health, resulting in widespread infections and fatalities. In response, the World Health Organization (WHO) launched the Preparedness and Resilience for Emerging Threats (PRET) program, focusing on...

  • Article
  • Open Access
116 Citations
16,927 Views
26 Pages

Multi-Layer Blockchain-Based Security Architecture for Internet of Things

  • Houshyar Honar Pajooh,
  • Mohammad Rashid,
  • Fakhrul Alam and
  • Serge Demidenko

24 January 2021

The proliferation of smart devices in the Internet of Things (IoT) networks creates significant security challenges for the communications between such devices. Blockchain is a decentralized and distributed technology that can potentially tackle the...

  • Article
  • Open Access
34 Citations
13,875 Views
24 Pages

7 September 2023

Blockchain technology can be a useful tool to address issues related to sustainability. From its initial foundation based on cryptocurrency to the development of smart contracts, blockchain technology promises significant business benefits for variou...

  • Article
  • Open Access
17 Citations
3,143 Views
27 Pages

5 June 2023

Blockchain techniques have been introduced to achieve decentralized and transparent traceability systems, which are critical components of food supply chains. Academia and industry have tried to enhance the efficiency of blockchain-based food supply...

  • Review
  • Open Access
3 Citations
6,826 Views
36 Pages

Securing Blockchain Systems: A Layer-Oriented Survey of Threats, Vulnerability Taxonomy, and Detection Methods

  • Mohammad Jaminur Islam,
  • Saminur Islam,
  • Mahmud Hossain,
  • Shahid Noor and
  • S. M. Riazul Islam

Blockchain technology is emerging as a pivotal framework to enhance the security of internet-based systems, especially as advancements in machine learning (ML), artificial intelligence (AI), and cyber–physical systems such as smart grids and Io...

  • Article
  • Open Access
9 Citations
3,196 Views
20 Pages

A Double-Layer Blockchain Based Trust Management Model for Secure Internet of Vehicles

  • Wenbo Ruan,
  • Jia Liu,
  • Yuanfang Chen,
  • Sardar M. N. Islam and
  • Muhammad Alam

12 May 2023

The Internet of Vehicles (IoV) enables vehicles to share data that help vehicles perceive the surrounding environment. However, vehicles can spread false information to other IoV nodes; this incorrect information misleads vehicles and causes confusio...

  • Article
  • Open Access
15 Citations
5,190 Views
18 Pages

A Practical Byzantine Fault Tolerance (PBFT) is a consensus algorithm deployed in a consortium blockchain that connects a group of related participants. This type of blockchain suits the implementation of the Building Information Modeling (BIM) infor...

  • Article
  • Open Access
1 Citations
4,178 Views
21 Pages

The landscape of ICOs and its underlying Blockchain technology needs more clarity, given that several overlapping and opposing views exist from governmental institutions, institutional investors, economists, and academia. Those positions stem from co...

  • Article
  • Open Access
16 Citations
3,803 Views
25 Pages

Credible Peer-to-Peer Trading with Double-Layer Energy Blockchain Network in Distributed Electricity Markets

  • Longze Wang,
  • Yu Xie,
  • Delong Zhang,
  • Jinxin Liu,
  • Siyu Jiang,
  • Yan Zhang and
  • Meicheng Li

Blockchain-based peer-to-peer (P2P) energy trading is one of the most viable solutions to incentivize prosumers in distributed electricity markets. However, P2P energy trading through an open-end blockchain network is not conducive to mutual credit a...

  • Article
  • Open Access
18 Citations
4,182 Views
24 Pages

VANET Secure Reputation Evaluation & Management Model Based on Double Layer Blockchain

  • Bochuan Hou,
  • Yang Xin,
  • Hongliang Zhu,
  • Yixian Yang and
  • Jianhua Yang

6 May 2023

Vehicle ad-hoc network (VANET) is interconnected through message forwarding and exchanging among vehicle nodes. Due to its highly dynamic topology and its wireless and heterogeneous communication mode, VANET is more vulnerable to security threats fro...

  • Article
  • Open Access
3 Citations
7,654 Views
27 Pages

Blockchainsand smart contracts are pivotal in transforming interactions between systems and individuals, offering secure, immutable, and transparent trust-building mechanisms without central oversight. However, Smart Contracts face limitations due to...

  • Article
  • Open Access
964 Views
17 Pages

As a new generation of mobile communication networks, 6G security faces many new security challenges. Vehicle to Everything (V2X) will be an important part of 6G. In V2X, connected and automated vehicles (CAVs) need to frequently share data with othe...

  • Article
  • Open Access
13 Citations
2,712 Views
20 Pages

15 September 2023

The decentralization and anonymity of blockchain have attracted significant attention. However, in recent years, there has been a rise in blockchain money laundering incidents, and anti-money laundering efforts have become crucial within the blockcha...

  • Article
  • Open Access
9 Citations
3,090 Views
14 Pages

VaNetChain: A Framework for Trustworthy Exchanges of Information in VANETs Based on Blockchain and a Virtualization Layer

  • Paúl Vintimilla-Tapia,
  • Jack Bravo-Torres,
  • Martín López-Nores,
  • Pablo Gallegos-Segovia,
  • Esteban Ordóñez-Morales and
  • Manuel Ramos-Cabrer

9 November 2020

Vehicular ad hoc networks (VANETs) face challenges related to the reliability of the data exchanged and the unstability of the communication links. These shortcomings have hampered the development of the long-awaited applications that would turn road...

  • Article
  • Open Access
4 Citations
2,717 Views
21 Pages

Blockchain technology has impacted various sectors and is transforming them through its decentralized, immutable, transparent, smart contracts (automatically executing digital agreements) and traceable attributes. Due to the adoption of blockchain te...

  • Review
  • Open Access
3,855 Views
46 Pages

A Review on Blockchain Sharding for Improving Scalability

  • Mahran Morsidi,
  • Sharul Tajuddin,
  • S. H. Shah Newaz,
  • Ravi Kumar Patchmuthu and
  • Gyu Myoung Lee

21 October 2025

Blockchain technology, originally designed as a secure and immutable ledger, has expanded its applications across various domains. However, its scalability remains a fundamental bottleneck, limiting throughput, specifically Transactions Per Second (T...

  • Article
  • Open Access
3 Citations
1,835 Views
18 Pages

11 October 2023

Ship collision avoidance (CA) is the most fundamental and essential issue of maritime safety, regardless of whether the ship is a conventional ship or a future maritime autonomous surface ship (MASS). However, effective ship-to-ship communication has...

  • Article
  • Open Access
39 Citations
4,181 Views
17 Pages

Resilient Security Framework Using TNN and Blockchain for IoMT

  • Rayan A. Alsemmeari,
  • Mohamed Yehia Dahab,
  • Abdulaziz A. Alsulami,
  • Badraddin Alturki and
  • Sultan Algarni

The growth of the Internet of Things (IoT) devices in the healthcare sector enables the new era of the Internet of Medical Things (IoMT). However, IoT devices are susceptible to various cybersecurity attacks and threats, which lead to negative conseq...

  • Article
  • Open Access
5 Citations
2,903 Views
23 Pages

20 January 2025

Efficient cattle healthcare management is vital for ensuring productivity and welfare in dairy production, yet traditional record-keeping methods often lack transparency, security, and efficiency, leading to challenges in livestock product quality an...

  • Article
  • Open Access
2,063 Views
18 Pages

A Two-Layer Transaction Network-Based Method for Virtual Currency Address Identity Recognition

  • Lingling Xia,
  • Tao Zhu,
  • Zhengjun Jing,
  • Qun Wang,
  • Zhuo Ma,
  • Zimo Huang and
  • Ziyu Yin

Digital currencies, led by Bitcoin and USDT, are characterized by decentralization and anonymity, which obscure the identities of traders and create a conducive environment for illicit activities such as drug trafficking, money laundering, cyber frau...

  • Feature Paper
  • Review
  • Open Access
253 Citations
26,383 Views
28 Pages

Blockchain Technology: Security Issues, Healthcare Applications, Challenges and Future Trends

  • Zhang Wenhua,
  • Faizan Qamar,
  • Taj-Aldeen Naser Abdali,
  • Rosilah Hassan,
  • Syed Talib Abbas Jafri and
  • Quang Ngoc Nguyen

Blockchain technology provides a data structure with inherent security properties that include cryptography, decentralization, and consensus, which ensure trust in transactions. It covers widely applicable usages, such as in intelligent manufacturing...

  • Article
  • Open Access
90 Citations
6,733 Views
17 Pages

Blockchain-Based Security Mechanism for the Medical Data at Fog Computing Architecture of Internet of Things

  • Desire Ngabo,
  • Dong Wang,
  • Celestine Iwendi,
  • Joseph Henry Anajemba,
  • Lukman Adewale Ajao and
  • Cresantus Biamba

30 August 2021

The recent developments in fog computing architecture and cloud of things (CoT) technology includes data mining management and artificial intelligence operations. However, one of the major challenges of this model is vulnerability to security threats...

  • Article
  • Open Access
20 Citations
18,596 Views
34 Pages

Blockchain technology promises transformative potential across diverse sectors, facilitating innovations in areas ranging from finance to healthcare. Despite its many promising applications, several barriers—including scalability challenges, re...

  • Article
  • Open Access
46 Citations
5,133 Views
22 Pages

Artificial Intelligence-Enabled DDoS Detection for Blockchain-Based Smart Transport Systems

  • Tong Liu,
  • Fariza Sabrina,
  • Julian Jang-Jaccard,
  • Wen Xu and
  • Yuanyuan Wei

22 December 2021

A smart public transport system is expected to be an integral part of our human lives to improve our mobility and reduce the effect of our carbon footprint. The safety and ongoing maintenance of the smart public transport system from cyberattacks are...

  • Article
  • Open Access
43 Citations
5,111 Views
21 Pages

Privacy and data security have become the new hot topic for regulators in recent years. As a result, Federated Learning (FL) (also called collaborative learning) has emerged as a new training paradigm that allows multiple, geographically distributed...

  • Article
  • Open Access
3 Citations
2,886 Views
15 Pages

Abstracting Data in Distributed Ledger Systems for Higher Level Analytics and Visualizations

  • Leny Vinceslas,
  • Safak Dogan,
  • Srikumar Sundareshwar and
  • Ahmet M. Kondoz

11 January 2023

By design, distributed ledger technologies persist low-level data, which makes conducting complex business analysis of the recorded operations challenging. Existing blockchain visualization and analytics tools such as block explorers tend to rely on...

  • Article
  • Open Access
1 Citations
325 Views
30 Pages

Cross-Border Digital Identity System Based on Ethereum Layer 2 Architecture

  • Yu-Heng Hsieh,
  • Ching-Hsi Tseng,
  • Bang-Yi Luo and
  • Shyan-Ming Yuan

Modern passport systems face significant challenges in secure data sharing, real-time verification, and user-controlled authorization, particularly in cross-border scenarios. Existing digital passport solutions, often built on permissioned blockchain...

  • Article
  • Open Access
418 Views
28 Pages

A Novel Dual-Layer Quantum-Resilient Encryption Strategy for UAV–Cloud Communication Using Adaptive Lightweight Ciphers and Hybrid ECC–PQC

  • Mahmoud Aljamal,
  • Bashar S. Khassawneh,
  • Ayoub Alsarhan,
  • Saif Okour,
  • Latifa Abdullah Almusfar,
  • Bashair Faisal AlThani and
  • Waad Aldossary

2 February 2026

Unmanned Aerial Vehicles (UAVs) are increasingly integrated into Internet of Things (IoT) ecosystems for applications such as surveillance, disaster response, environmental monitoring, and logistics. These missions demand reliable and secure communic...

  • Article
  • Open Access
59 Citations
8,724 Views
29 Pages

A Lightweight Blockchain Based Framework for Underwater IoT

  • Md Ashraf Uddin,
  • Andrew Stranieri,
  • Iqbal Gondal and
  • Venki Balasurbramanian

16 December 2019

The Internet of Things (IoT) has facilitated services without human intervention for a wide range of applications, including underwater monitoring, where sensors are located at various depths, and data must be transmitted to surface base stations for...

  • Article
  • Open Access
1,415 Views
15 Pages

Hierarchical Security Authentication with Attention-Enhanced Convolutional Network for Internet of Things

  • Xiaoying Qiu,
  • Guangxu Zhao,
  • Jinwei Yu,
  • Wenbao Jiang,
  • Zhaozhong Guo and
  • Maozhi Xu

28 November 2024

As security authentication issues continue to arise in future wireless communication networks, researchers are working hard to further improve authentication techniques. Recently, physical layer authentication (PLA) has received widespread attention...

  • Feature Paper
  • Review
  • Open Access
9 Citations
9,099 Views
58 Pages

18 August 2025

Deployment of Unmanned Aerial Vehicles (UAVs) continues to expand rapidly across a wide range of applications, including environmental monitoring, precision agriculture, and disaster response. Despite their increasing ubiquity, UAVs remain inherently...

  • Article
  • Open Access
1 Citations
1,538 Views
30 Pages

8 August 2025

As a new type of production factor, data possesses multidimensional application value, and its pivotal role is becoming increasingly prominent in the aviation sector. Data sharing can significantly enhance the utilization efficiency of data resources...

  • Article
  • Open Access
73 Citations
11,397 Views
19 Pages

16 August 2021

Blockchain-based applications are gaining traction in various application fields, including supply chain management, health care, and finance. The Internet of Things (IoT) is a critical component of these applications since it allows for data collect...

  • Article
  • Open Access
14 Citations
3,555 Views
14 Pages

Resolving Security Issues in the IoT Using Blockchain

  • Hafiz Abid Mahmood Malik,
  • Asghar Ali Shah,
  • AbdulHafeez Muhammad,
  • Ahmad Kananah and
  • Ayesha Aslam

29 November 2022

The Internet of Things is a system of interconnected smart devices that can communicate with each other and with other devices over the Internet, with or without human-to-human or human-to-computer interaction. Although IoT devices, which have IPs, m...

  • Article
  • Open Access
1 Citations
2,278 Views
29 Pages

21 August 2025

The rapid development of the Internet of Things (IoT) has enabled the implementation of interconnected intelligent systems in extremely dynamic contexts with limited resources. However, traditional paradigms, such as those using ECC-based heuristics...

  • Article
  • Open Access
12 Citations
3,427 Views
15 Pages

The Industrial Internet of Things (IIoT) holds significant potential for improving efficiency, quality, and flexibility. In decentralized systems, there are no trust-based centralized authentication techniques, which are unsuitable for distributed ne...

  • Article
  • Open Access
13 Citations
3,947 Views
23 Pages

1 June 2024

Internet of Things (IoT) technology is evolving over the peak of smart infrastructure with the participation of IoT devices in a wide range of applications. Traditional IoT authentication methods are vulnerable to threats due to wireless data transmi...

  • Article
  • Open Access
8 Citations
3,757 Views
19 Pages

Security is a challenging issue for M2M/IoT applications due to the deployment, decentralization and heterogeneity of M2M and IoT devices. Typical security solutions may not be suitable for M2M/IoT systems regarding the difficulties encountered for t...

  • Article
  • Open Access
3 Citations
2,282 Views
27 Pages

Analyzing Miners’ Dynamic Equilibrium in Blockchain Networks under DDoS Attacks

  • Xiao Liu,
  • Zhao Huang,
  • Quan Wang,
  • Xiaohong Jiang,
  • Yin Chen and
  • Bo Wan

15 September 2023

Proof of work (PoW) is one of the most widely used consensus algorithms in blockchain networks. It mainly uses the competition between mining nodes to obtain block rewards. However, this competition for computational power will allow malicious nodes...

  • Article
  • Open Access
38 Citations
7,072 Views
25 Pages

A Survey of Consortium Blockchain and Its Applications

  • Xiaotong Chen,
  • Songlin He,
  • Linfu Sun,
  • Yangxin Zheng and
  • Chase Q. Wu

Blockchain is a revolutionary technology that has reshaped the trust model among mutually distrustful peers in a distributed network. While blockchain is well-known for its initial usage in a public manner, such as the cryptocurrency of Bitcoin, cons...

  • Article
  • Open Access
5 Citations
6,980 Views
23 Pages

Simulation Method for Blockchain Systems with a Public Chain

  • Yang Liu,
  • Yuxi Zhang,
  • Zhiyuan Lin,
  • Zhaoguo Wang and
  • Xuan Wang

12 December 2022

The potential security problems of blockchain technology are constantly restricting the development process of related industrial applications. The cost of deploying a blockchain system in a real environment to conduct research on security issues is...

  • Review
  • Open Access
39 Citations
10,535 Views
24 Pages

15 April 2022

The large-scale application of blockchain technology is an expected to be an inevitable trend. This study revolves around published papers and articles related to blockchain technology, relevance analysis and sorting through the retrieved documents w...

  • Article
  • Open Access
2 Citations
2,078 Views
20 Pages

6 December 2024

The conventional centralized Industrial Internet of Things (IIoT) framework is plagued by issues like subpar security performance and challenges related to storage expansion. This paper proposes a two-tier distributed secure storage framework based o...

of 7