Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (2)

Search Parameters:
Keywords = trusted time server (TTS)

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
21 pages, 1109 KiB  
Article
Trusted Traceability Service: A Novel Approach to Securing Supply Chains
by A S M Touhidul Hasan, Rakib Ul Haque, Larry Wigger and Anthony Vatterott
Electronics 2025, 14(10), 1985; https://doi.org/10.3390/electronics14101985 - 13 May 2025
Cited by 1 | Viewed by 980
Abstract
Counterfeit products cause financial losses for both the manufacturer and the enduser; e.g., fake foods and medicines pose significant risks to the public’s health. Moreover, it is challenging to ensure trust in a product’s supply chain, preventing counterfeit goods from being distributed throughout [...] Read more.
Counterfeit products cause financial losses for both the manufacturer and the enduser; e.g., fake foods and medicines pose significant risks to the public’s health. Moreover, it is challenging to ensure trust in a product’s supply chain, preventing counterfeit goods from being distributed throughout the network. However, fake product detection methods are expensive and need to be more scalable, whereas a unified traceability system for packaged products is not available. Therefore, this research proposes a product traceability system, named Trusted Traceability Service (TTS), using Blockchain and Self-Sovereign Identity (SSI). The TTS can be incorporated across diverse industries because of its generic and manageable four-layer product packaging strategy. Blockchain-enabled SSI empowers distributed nodes, to verify them without a centralized client–server authorization architecture. Moreover, due to its distributed nature, the proposed TTS framework is scalable and robust, with the use of web3.0 distributed application development. The adoption of Fantom, a public blockchain infrastructure, allows the proposed system to handle thousands of successful transactions more cost-effectively than the Ethereum network. The deployment of the proposed framework in both public and private blockchain networks demonstrated its superiority in execution time and number of successful transactions. Full article
Show Figures

Figure 1

20 pages, 2924 KiB  
Article
Trusted Time-Based Verification Model for Automatic Man-in-the-Middle Attack Detection in Cybersecurity
by James Jin Kang, Kiran Fahd and Sitalakshmi Venkatraman
Cryptography 2018, 2(4), 38; https://doi.org/10.3390/cryptography2040038 - 5 Dec 2018
Cited by 14 | Viewed by 9028
Abstract
Due to the prevalence and constantly increasing risk of cyber-attacks, new and evolving security mechanisms are required to protect information and networks and ensure the basic security principles of confidentiality, integrity, and availability—referred to as the CIA triad. While confidentiality and integrity can [...] Read more.
Due to the prevalence and constantly increasing risk of cyber-attacks, new and evolving security mechanisms are required to protect information and networks and ensure the basic security principles of confidentiality, integrity, and availability—referred to as the CIA triad. While confidentiality and integrity can be achieved using Secure Sockets Layer (SSL)/Transport Layer Security (TLS) certificates, these depend on the correct authentication of servers, which could be compromised due to man-in-the-middle (MITM) attacks. Many existing solutions have practical limitations due to their operational complexity, deployment costs, as well as adversaries. We propose a novel scheme to detect MITM attacks with minimal intervention and workload to the network and systems. Our proposed model applies a novel inferencing scheme for detecting true anomalies in transmission time at a trusted time server (TTS) using time-based verification of sent and received messages. The key contribution of this paper is the ability to automatically detect MITM attacks with trusted verification of the transmission time using a learning-based inferencing algorithm. When used in conjunction with existing systems, such as intrusion detection systems (IDS), which require comprehensive configuration and network resource costs, it can provide a robust solution that addresses these practical limitations while saving costs by providing assurance. Full article
Show Figures

Figure 1

Back to TopTop