Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (258)

Search Parameters:
Keywords = hyperledger

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
22 pages, 658 KiB  
Article
An SSI-Based Solution to Support Lawful Interception
by Francesco Buccafurri, Aurelio Loris Canino, Vincenzo De Angelis, Annunziata Laurenda and Gianluca Lax
Appl. Sci. 2025, 15(4), 2206; https://doi.org/10.3390/app15042206 - 19 Feb 2025
Abstract
Lawful Interception refers to the acquisition of the contents of communications between private individuals or organizations by subjects authorized by law. It involves three actors: the network operator (NO), the Law Enforcement Agency (LEA), and the Law Enforcement Monitoring Facility (LEMF). In the [...] Read more.
Lawful Interception refers to the acquisition of the contents of communications between private individuals or organizations by subjects authorized by law. It involves three actors: the network operator (NO), the Law Enforcement Agency (LEA), and the Law Enforcement Monitoring Facility (LEMF). In the literature, standards and scientific solutions are proposed for the interception procedure and the interaction between the NO and the LEMF. However, no standard has been proposed for the interaction between the LEMF and the LEA. The absence of standards for controlling LEA (or a delegated agency) access to intercepted contents stored by the LEMF is a significant gap that should be overcome. This prevents the implementation of secure, interoperable, and automated procedures, leading to inefficiencies and security risks. In this paper, we propose to cover the above gap by adopting the Self-Sovereign Identity (SSI) paradigm. The adopted research methodology follows a multi-phase approach that includes studying existing solutions, system design, and technical feasibility testing. The study first examines existing standards and identity management frameworks and their limitations. Next, an SSI-based architecture is proposed to manage the interactions between LEA (or a delegated agency) and LEMF. Finally, a proof of concept of the proposed solution written in Python and using the Hyperledger Indy blockchain has been implemented to assess whether our proposal is technically feasible. The proposed solution enhances automation, security, and interoperability in lawful interception. Indeed, it enables machine-readable authorizations, reducing errors and improving efficiency by eliminating manual operations. Additionally, verifiable credentials and decentralized identifiers strengthen security and standardize interactions across jurisdictions, ensuring privacy-preserving identity management. By standardizing interactions between LEA and LEMF, this research contributes to a more secure, privacy-preserving, and legally compliant lawful interception process. Full article
Show Figures

Figure 1

33 pages, 866 KiB  
Article
Secure Electric Vehicle Charging Infrastructure in Smart Cities: A Blockchain-Based Smart Contract Approach
by Abdullahi Chowdhury, Sakib Shahriar Shafin, Saleh Masum, Joarder Kamruzzaman and Shi Dong
Smart Cities 2025, 8(1), 33; https://doi.org/10.3390/smartcities8010033 - 15 Feb 2025
Abstract
Increasing adoption of electric vehicles (EVs) and the expansion of EV charging infrastructure present opportunities for enhancing sustainable transportation within smart cities. However, the interconnected nature of EV charging stations (EVCSs) exposes this infrastructure to various cyber threats, including false data injection, man-in-the-middle [...] Read more.
Increasing adoption of electric vehicles (EVs) and the expansion of EV charging infrastructure present opportunities for enhancing sustainable transportation within smart cities. However, the interconnected nature of EV charging stations (EVCSs) exposes this infrastructure to various cyber threats, including false data injection, man-in-the-middle attacks, malware intrusions, and denial of service attacks. Financial attacks, such as false billing and theft of credit card information, also pose significant risks to EV users. In this work, we propose a Hyperledger Fabric-based blockchain network for EVCSs to mitigate these risks. The proposed blockchain network utilizes smart contracts to manage key processes such as authentication, charging session management, and payment verification in a secure and decentralized manner. By detecting and mitigating malicious data tampering or unauthorized access, the blockchain system enhances the resilience of EVCS networks. A comparative analysis of pre- and post-implementation of the proposed blockchain network demonstrates how it thwarts current cyberattacks in the EVCS infrastructure. Our analyses include performance metrics using the benchmark Hyperledger Caliper test, which shows the proposed solution’s low latency for real-time operations and scalability to accommodate the growth of EV infrastructure. Deployment of this blockchain-enhanced security mechanism will increase user trust and reliability in EVCS systems. Full article
Show Figures

Figure 1

30 pages, 9373 KiB  
Article
Dependency Reduction Techniques for Performance Improvement of Hyperledger Fabric Blockchain
by Ju-Won Kim, Jae-Geun Song, In-Hwan Park, Dong-Hwan Jo, Yong-Jin Kim and Ju-Wook Jang
Big Data Cogn. Comput. 2025, 9(2), 32; https://doi.org/10.3390/bdcc9020032 - 7 Feb 2025
Abstract
We propose dependency reduction techniques for the performance enhancement of the Hyperledger Fabric blockchain. A dependency hazard may result from the parallelism in Hyperledger Fabric, which executes multiple transactions simultaneously in a single block. Since multiple transactions in a block are executed in [...] Read more.
We propose dependency reduction techniques for the performance enhancement of the Hyperledger Fabric blockchain. A dependency hazard may result from the parallelism in Hyperledger Fabric, which executes multiple transactions simultaneously in a single block. Since multiple transactions in a block are executed in parallel for throughput enhancement, dependency problems may arise among transactions involving the same key (If Z = A + D is executed in parallel with A = B + C, a read-after-write hazard for A will occur). To address these issues, our scheme proposes a transaction dependency checking system that integrates a dependency-tree-based management approach to dynamically prioritize transactions based on factors such as the tree level, arrival time, and starvation possibility. Our scheme constructs a dependency tree for transactions in a block to be executed in parallel over multiple execution units. We rearrange the transactions into blocks in such a way that the dependency among the transactions are removed as far as possible. This allows parallel execution of transactions to be performed without collision, enhancing the throughput against the conventional implementation of Hyperledger Fabric. Our illustrative implementation of the proposed scheme in a testbed for trading renewable energy shows a performance improvement as big as 27%, depending on the input mixture of transactions. A key innovation is the introduction of the Starve-Avoid method, which mitigates data starvation by dynamically adjusting the transaction priorities to balance throughput and fairness, ensuring that no transaction experiences indefinite delays. Unlike existing approaches that require structural modifications to the conventional Hyperledger Fabric, the proposed scheme optimizes the performance as an independent module, maintaining compatibility with the conventional Hyperledger Fabric architecture. Full article
Show Figures

Figure 1

23 pages, 621 KiB  
Article
A Dynamic Trading Approach Based on Walrasian Equilibrium in a Blockchain-Based NFT Framework for Sustainable Waste Management
by Ch Sree Kumar, Aayushman Bhaba Padhy, Akhilendra Pratap Singh and K. Hemant Kumar Reddy
Mathematics 2025, 13(3), 521; https://doi.org/10.3390/math13030521 - 5 Feb 2025
Abstract
It is becoming harder to manage the growing amounts of waste generated daily at an increasing rate. These problems require an efficient solution that guarantees effectiveness and transparency and maintains trust within the community. To improve the process of traditional waste management, we [...] Read more.
It is becoming harder to manage the growing amounts of waste generated daily at an increasing rate. These problems require an efficient solution that guarantees effectiveness and transparency and maintains trust within the community. To improve the process of traditional waste management, we proposed a unique solution, “GREENLINK”, which uses a combination of blockchain technology with the concept of zero-knowledge proofs (ZKPs), non-fungible tokens (NFTs), and Walrasian equilibrium. Zero-knowledge proofs (cryptographic protocols) are used to verify organizations and prove compliance (e.g., certification, recycling capacity) without disclosing sensitive information. Through an iterative bidding process, the proposed framework employs Walrasian equilibrium, a technique to balance supply and demand, guaranteeing equitable pricing and effective resource distribution among participants. The transactions and waste management activities are securely recorded on an immutable ledger, ensuring accountability, traceability, and transparency. The performance of the proposed model is evaluated. Parameters like average latency, TPS, and memory consumption are calculated using Hyperledger Caliper (a blockchain performance benchmark framework). Full article
Show Figures

Figure 1

25 pages, 16510 KiB  
Article
Hyperledger Fabric-Based Multi-Channel Structure for Data Exchange in Internet of Vehicles
by Yiluo Liu, Yaokai Feng and Kouichi Sakurai
Electronics 2025, 14(3), 572; https://doi.org/10.3390/electronics14030572 - 31 Jan 2025
Abstract
The rapid growth of the Internet of Vehicles (IoV) requires secure, efficient, and reliable data exchanges among multiple stakeholders. Traditional centralized database systems can hardly address the challenges associated with data privacy, integrity, and scalability in this decentralized ecosystem. In this paper, we [...] Read more.
The rapid growth of the Internet of Vehicles (IoV) requires secure, efficient, and reliable data exchanges among multiple stakeholders. Traditional centralized database systems can hardly address the challenges associated with data privacy, integrity, and scalability in this decentralized ecosystem. In this paper, we propose a Hyperledger Fabric-Based Multi-Channel Structure to overcome these limitations. By leveraging the blockchain architecture, the system ensures data confidentiality and integrity by segregating data into exclusive channels and enabling different organizations to collaborate. Cross-channel communication ensures security when data are interacted with. Chaincodes automate transactions and enhance trust between participants. Our functional tests and performance tests by using Hyperledger Caliper verified the effectiveness of the system in real-world scenarios, highlighting its advantages over traditional systems in terms of decentralization, transparency, and security. Future work will focus on enhancing the user experience and integrating the system with edge computing. Eventually, attempts will be made to operationalize it in real-world environments. Full article
(This article belongs to the Special Issue Future Technologies for Data Management, Processing and Application)
Show Figures

Figure 1

25 pages, 699 KiB  
Review
Blockchain-Facilitated Cybersecurity for Ubiquitous Internet of Things with Space–Air–Ground Integrated Networks: A Survey
by Wenbing Zhao, Shunkun Yang and Xiong Luo
Sensors 2025, 25(2), 383; https://doi.org/10.3390/s25020383 - 10 Jan 2025
Viewed by 554
Abstract
This article presents a systematic review on blockchain-facilitated cybersecurity solutions for Internet of Things (IoT) devices in space–air–ground integrated networks (SAGIN). First, we identify the objectives and the context of the blockchain-based solutions for SAGIN. Although, typically, the blockchain is primarily used to [...] Read more.
This article presents a systematic review on blockchain-facilitated cybersecurity solutions for Internet of Things (IoT) devices in space–air–ground integrated networks (SAGIN). First, we identify the objectives and the context of the blockchain-based solutions for SAGIN. Although, typically, the blockchain is primarily used to enhance the trustworthiness of some systems or operations, it is necessary to document exactly in what context the blockchain is used that is specific to the IoT and SAGIN. Second, we investigate how blockchain technology is used to achieve the objectives. Again, we want to report the technical details on how blockchain is used in this specific field instead of general discussion. Third, we provide a critique on the technical correctness of the blockchain-based solutions. As we elaborate in this article, there are serious technical issues in the proposed solutions. The most pervasive assumption made in many blockchain-based solutions is that higher-level trustworthiness can be achieved by using any form of blockchain. Fourth, we provide a guideline on when blockchain technology could be useful for IoT and SAGIN and what types of blockchain could be useful to enhance the security of ubiquitous IoT in SAGIN. Full article
(This article belongs to the Special Issue AI-Driven Cybersecurity in IoT-Based Systems)
Show Figures

Figure 1

18 pages, 1697 KiB  
Article
Reputation-Based Leader Selection Consensus Algorithm with Rewards for Blockchain Technology
by Munir Hussain, Amjad Mehmood, Muhammad Altaf Khan, Rabia Khan and Jaime Lloret
Computers 2025, 14(1), 20; https://doi.org/10.3390/computers14010020 - 8 Jan 2025
Viewed by 629
Abstract
Blockchain technology is an emerging decentralized and distributed technology that can maintain data security. It has the potential to transform many sectors completely. The core component of blockchain networks is the consensus algorithm because its efficiency, security, and scalability depend on it. A [...] Read more.
Blockchain technology is an emerging decentralized and distributed technology that can maintain data security. It has the potential to transform many sectors completely. The core component of blockchain networks is the consensus algorithm because its efficiency, security, and scalability depend on it. A consensus problem is a difficult and significant task that must be considered carefully in a blockchain network. It has several practical applications such as distributed computing, load balancing, and blockchain transaction validation. Even though a lot of consensus algorithms have been proposed, the majority of them require many computational and communication resources. Similarly, they also suffer from high latency and low throughput. In this work, we proposed a new consensus algorithm for consortium blockchain for a leader selection using the reputation value of nodes and the voting process to ensure high performance. A security analysis is conducted to demonstrate the security of the proposed algorithm. The outcomes show that the proposed algorithm provides a strong defense against the network nodes’ abnormal behavior. The performance analysis is performed by using Hyperledger Fabric v2.1 and the results show that it performs better in terms of throughput, latency, CPU utilization, and communications costs than its rivals Trust-Varying Algo, FP-BFT, and Scalable and Trust-based algorithms. Full article
Show Figures

Figure 1

25 pages, 4451 KiB  
Article
Integrating Blockchain Technology into Mobility-as-a-Service Platforms for Smart Cities
by Radu Miron, Mihai Hulea, Vlad Muresan, Iulia Clitan and Andrei Rusu
Smart Cities 2025, 8(1), 9; https://doi.org/10.3390/smartcities8010009 - 7 Jan 2025
Viewed by 755
Abstract
As cities evolve into smarter and more connected environments, there is a growing need for innovative solutions to improve urban mobility. This study examines the potential of integrating blockchain technology into passenger transportation systems within smart cities, with a particular emphasis on a [...] Read more.
As cities evolve into smarter and more connected environments, there is a growing need for innovative solutions to improve urban mobility. This study examines the potential of integrating blockchain technology into passenger transportation systems within smart cities, with a particular emphasis on a blockchain-enabled Mobility-as-a-Service (MaaS) solution. In contrast to traditional technologies, blockchain’s decentralized structure improves data security and guarantees transaction transparency, thus reducing the risk of fraud and errors. The proposed MaaS framework enables seamless collaboration between key transportation stakeholders, promoting more efficient utilization of services like buses, trains, bike-sharing, and ride-hailing. By improving integrated payment and ticketing systems, the solution aims to create a smoother user experience while advancing the urban goals of efficiency, environmental sustainability, and secure data handling. This research evaluates the feasibility of a Hyperledger Fabric-based solution, demonstrating its performance under various load conditions and proposing scalability adjustments based on pilot results. The conclusions indicate that blockchain-enabled MaaS systems have the potential to transform urban mobility. Further exploration into pilot projects and the expansion to freight transportation are needed for an integrated approach to city-wide transport solutions. Full article
Show Figures

Figure 1

22 pages, 2450 KiB  
Article
Building a Sustainable Digital Infrastructure for Higher Education: A Blockchain-Based Solution for Cross-Institutional Enrollment
by Ali Saleh Alammary
Sustainability 2025, 17(1), 194; https://doi.org/10.3390/su17010194 - 30 Dec 2024
Viewed by 717
Abstract
Educational cooperation in higher education offers valuable opportunities for students and institutions alike. However, it also introduces significant challenges, particularly regarding student enrollment processes. Traditional centralized systems for managing this task can pose issues around authority, transparency, accountability, security, and cost, often hindering [...] Read more.
Educational cooperation in higher education offers valuable opportunities for students and institutions alike. However, it also introduces significant challenges, particularly regarding student enrollment processes. Traditional centralized systems for managing this task can pose issues around authority, transparency, accountability, security, and cost, often hindering scalability and sustainable growth. This paper introduces the Cross-Institutional Blockchain Enrollment System (BCHEEN), a novel decentralized platform designed to streamline and enhance cross-institutional enrollment processes. Un-like existing solutions, BCHEEN employs a unique hybrid architecture that leverages blockchain technology to ensure transparency and security while maintaining scalability through innovative off-chain data management using the “replicate when used” approach. The platform was prototyped as a permissioned blockchain platform using the Hyperledger Composer framework and evaluated through functional, performance, and security analyses using tools such as Cucumber and Hyperledger Caliper. Evaluation results show that BCHEEN achieved a peak throughput of 18 tps at a send rate of 47 tps, with an average latency of 4.32 s under the same conditions, demonstrating its scalability and reliability. Furthermore, a computational cost analysis highlights the efficiency of the “replicate when used” approach in reducing storage overhead while preserving data integrity. BCHEEN’s practical impact includes streamlining enrollment processes, reducing administrative costs, and fostering secure, scalable, and transparent inter-institutional collaboration. These contributions position BCHEEN as a transformative tool for higher education, supporting policy advancements and promoting resilience and sustainability in educational practices. Full article
(This article belongs to the Special Issue Sustainable Education and Technology Development)
Show Figures

Figure 1

29 pages, 1635 KiB  
Review
A Comparative Survey of Centralised and Decentralised Identity Management Systems: Analysing Scalability, Security, and Feasibility
by Aviral Goel and Yogachandran Rahulamathavan
Future Internet 2025, 17(1), 1; https://doi.org/10.3390/fi17010001 - 24 Dec 2024
Viewed by 970
Abstract
Traditional identity management (IdM) solutions based on centralised protocols, such as Lightweight Directory Access Protocol (LDAP) and Security Assertion Markup Language (SAML), are where a central authority manages all the processes. This risks a single point of failure and other vulnerabilities. In response, [...] Read more.
Traditional identity management (IdM) solutions based on centralised protocols, such as Lightweight Directory Access Protocol (LDAP) and Security Assertion Markup Language (SAML), are where a central authority manages all the processes. This risks a single point of failure and other vulnerabilities. In response, decentralised techniques like blockchain and decentralised identities (DIDs) are being explored. This review paper performs a comparison of popular decentralised identity management (DIM) protocols, such as self-sovereign identity (SSI), against traditional centralised approaches such as LDAP and SAML. These decentralised identity management systems are being developed, keeping users’ identity data as its highest priority. Additionally, this method eliminates the need for a central authority to manage and secure the system. To further explore the potential of decentralised identity management, this study delves into popular blockchain-based decentralised identity management systems such as uPort, Sovrin, EverID, Blockstack, ShoCard, and Hyperledger Indy. We analyse their underlying principles and compare them with the well-established centralised identity management solutions, focusing on key aspects such as scalability, security, and feasibility. However, despite their benefits and several worthy developments in this field, decentralised approaches are still not widely used. Through this study, we investigate both centralised and decentralised methods and review their strengths and weaknesses. By reviewing multiple research papers, this survey aims to provide an understanding and aid in selecting the most suitable identity management system for different use cases. Full article
Show Figures

Figure 1

21 pages, 617 KiB  
Article
Unleashing the Potential of Permissioned Blockchain: Addressing Privacy, Security, and Interoperability Concerns in Healthcare Data Management
by Delowar Hossain, Quazi Mamun and Rafiqul Islam
Electronics 2024, 13(24), 5050; https://doi.org/10.3390/electronics13245050 - 23 Dec 2024
Viewed by 737
Abstract
Blockchain technology leverages a cryptographic system to provide secure and immutable storage of transaction histories within a decentralised framework. While various industries have demonstrated interest in integrating blockchain into their IT systems, concerns regarding accessibility, privacy, performance, and scalability persist. Permissioned blockchain frameworks [...] Read more.
Blockchain technology leverages a cryptographic system to provide secure and immutable storage of transaction histories within a decentralised framework. While various industries have demonstrated interest in integrating blockchain into their IT systems, concerns regarding accessibility, privacy, performance, and scalability persist. Permissioned blockchain frameworks offer a viable solution for securing confidential records. Extensive research has been conducted to explore the opportunities, challenges, application areas, and performance evaluations of different public and permissioned blockchain platforms. Given the sensitive nature of medical information, healthcare organisations must adhere to various legal obligations, including HIPAA regulations, to protect these data. Although navigating these requirements can be challenging, it is crucial for safeguarding the reputation of healthcare providers, maintaining patient trust, and avoiding legal repercussions. Permissioned blockchains represent decentralised digital ledgers tailored to collaborate among businesses and organisations. Their popularity has increased significantly in recent years, resulting in the availability of several leading options, such as Hyperledger Fabric, Corda, Quorum, and MultiChain. Each of these platforms presents its own set of advantages and disadvantages. Although blockchain technology remains relatively nascent in the permissioned realm, several factors warrant consideration when comparing these platforms. This study will review the existing landscape of blockchain technologies in healthcare applications and identify the research scopes. This research aims to determine how permissioned blockchain technology can effectively fulfil the requirements for managing healthcare data. Full article
(This article belongs to the Special Issue AI in Blockchain Assisted Cyber-Physical Systems)
Show Figures

Figure 1

17 pages, 902 KiB  
Article
Context-Aware Electronic Health Record—Internet of Things and Blockchain Approach
by Tiago Guimarães, Ricardo Duarte, Francini Hak and Manuel Santos
Informatics 2024, 11(4), 98; https://doi.org/10.3390/informatics11040098 - 18 Dec 2024
Viewed by 621
Abstract
Hospital inpatient care relies on constant monitoring and reliable real-time data. Continuous improvement, adaptability, and state-of-the-art technologies are critical for ongoing efficiency, productivity, and readiness growth. When appropriately used, technologies, such as blockchain and IoT-enabled devices, can change the practice of medicine and [...] Read more.
Hospital inpatient care relies on constant monitoring and reliable real-time data. Continuous improvement, adaptability, and state-of-the-art technologies are critical for ongoing efficiency, productivity, and readiness growth. When appropriately used, technologies, such as blockchain and IoT-enabled devices, can change the practice of medicine and ensure that it is performed based on correct assumptions and reliable data. The proposed electronic health record (EHR) can obtain context information from beacons, change the user interface of medical devices according to their location, and provide a more user-friendly interface for medical devices. The data generated, which are associated with the location of the beacons and devices, were stored in Hyperledger Fabric, a permissioned distributed ledger technology. Overall, by prompting and adjusting the user interface to context- and location-specific information while ensuring the immutability and value of the data, this solution targets a decrease in medical errors and an increase in the efficiency in healthcare inpatient care by improving user experience and ease of access to data for health professionals. Moreover, given auditing, accountability, and governance needs, it must ensure when, if, and by whom the data are accessed. Full article
(This article belongs to the Section Medical and Clinical Informatics)
Show Figures

Figure 1

25 pages, 2934 KiB  
Article
IoT Forensics-Based on the Integration of a Permissioned Blockchain Network
by Butrus Mbimbi, David Murray and Michael Wilson
Blockchains 2024, 2(4), 482-506; https://doi.org/10.3390/blockchains2040021 - 18 Dec 2024
Viewed by 601
Abstract
The proliferation of Internet of Things (IoT) devices has facilitated the exchange of information among individuals and devices. This development has introduced several challenges, including increased vulnerability to potential cyberattacks and digital forensics. IoT forensic investigations need to be managed in a forensically [...] Read more.
The proliferation of Internet of Things (IoT) devices has facilitated the exchange of information among individuals and devices. This development has introduced several challenges, including increased vulnerability to potential cyberattacks and digital forensics. IoT forensic investigations need to be managed in a forensically sound manner using a standard framework. However, adopting traditional digital forensics tools introduces various challenges, such as identifying all IoT devices and users at the crime scene. Therefore, collecting evidence from these devices is a major problem. This paper proposes a permissioned blockchain integration solution for IoT forensics (PBCIS-IoTF) that aims to observe data transactions within the blockchain. The PBCIS-IoTF framework designs and tests Hyperledger blockchains simulated with a Raspberry Pi device and chaincode to address the challenges of IoT forensics. This blockchain is deployed using multiple nodes within the network to avoid a single point of failure. The authenticity and integrity of the acquired evidence are analysed by comparing the SHA-256 hash metadata in the blockchain of all peers within the network. We further integrate webpage access with the blockchain to capture the forensics data from the user’s IoT devices. This allows law enforcement and a court of law to access forensic evidence directly and ensures its authenticity and integrity. PBCIS-IoTF shows high authenticity and integrity across all peers within the network. Full article
Show Figures

Figure 1

28 pages, 1185 KiB  
Review
Integrating Blockchains with the IoT: A Review of Architectures and Marine Use Cases
by Andreas Polyvios Delladetsimas, Stamatis Papangelou, Elias Iosif and George Giaglis
Computers 2024, 13(12), 329; https://doi.org/10.3390/computers13120329 - 6 Dec 2024
Viewed by 841
Abstract
This review examines the integration of blockchain technology with the IoT in the Marine Internet of Things (MIoT) and Internet of Underwater Things (IoUT), with applications in areas such as oceanographic monitoring and naval defense. These environments present distinct challenges, including a limited [...] Read more.
This review examines the integration of blockchain technology with the IoT in the Marine Internet of Things (MIoT) and Internet of Underwater Things (IoUT), with applications in areas such as oceanographic monitoring and naval defense. These environments present distinct challenges, including a limited communication bandwidth, energy constraints, and secure data handling needs. Enhancing BIoT systems requires a strategic selection of computing paradigms, such as edge and fog computing, and lightweight nodes to reduce latency and improve data processing in resource-limited settings. While a blockchain can improve data integrity and security, it can also introduce complexities, including interoperability issues, high energy consumption, standardization challenges, and costly transitions from legacy systems. The solutions reviewed here include lightweight consensus mechanisms to reduce computational demands. They also utilize established platforms, such as Ethereum and Hyperledger, or custom blockchains designed to meet marine-specific requirements. Additional approaches incorporate technologies such as fog and edge layers, software-defined networking (SDN), the InterPlanetary File System (IPFS) for decentralized storage, and AI-enhanced security measures, all adapted to each application’s needs. Future research will need to prioritize scalability, energy efficiency, and interoperability for effective BIoT deployment. Full article
(This article belongs to the Special Issue When Blockchain Meets IoT: Challenges and Potentials)
Show Figures

Figure 1

24 pages, 826 KiB  
Article
Policy-Based Smart Contracts Management for IoT Privacy Preservation
by Mohsen Rouached, Aymen Akremi, Mouna Macherki and Naoufel Kraiem
Future Internet 2024, 16(12), 452; https://doi.org/10.3390/fi16120452 - 3 Dec 2024
Viewed by 665
Abstract
This paper addresses the challenge of preserving user privacy within the Internet of Things (IoT) ecosystem using blockchain technology. Several approaches consider using blockchain and encryption to enhance the privacy of IoT applications and constrained IoT devices. However, existing blockchain platforms such as [...] Read more.
This paper addresses the challenge of preserving user privacy within the Internet of Things (IoT) ecosystem using blockchain technology. Several approaches consider using blockchain and encryption to enhance the privacy of IoT applications and constrained IoT devices. However, existing blockchain platforms such as Ethereum and Hyperledger Fabric already use encryption to store data blocks and secure communication. Therefore, introducing an additional cryptographic layer on top of these platforms could potentially increase processing overhead and reduce response time. In this work, we investigate the integration of IoT and blockchain for privacy preservation. More specifically, we propose a new model that leverages the properties of private blockchain and smart contracts to ensure user data privacy when shared with others. We define policy-based algorithms and notations to assist users in managing smart contracts responsible for registering and controlling their IoT devices. We also specify multiple smart contracts designed to enhance privacy by creating a private channel for communication between the user and the blockchain network. Full article
(This article belongs to the Section Cybersecurity)
Show Figures

Figure 1

Back to TopTop