Exploring the Synergy of Fog Computing, Blockchain, and Federated Learning for IoT Applications: A Systematic Literature Review
The proliferation of Internet of Things (IoT) applications poses formidable challenges in
managing data processing, privacy, and security. In response, technologies such as Fog …
managing data processing, privacy, and security. In response, technologies such as Fog …
Secure Reviewing & Data Sharing in Scientific Collaboration: Leveraging Blockchain and Zero Trust Architecture
S Pooja, CB Chandrakala - IEEE Access, 2024 - ieeexplore.ieee.org
The current publishing landscape grapples with opacity in the review process. In response,
a proposal for a blockchain-driven system is put forth to establish transparent and audit-able …
a proposal for a blockchain-driven system is put forth to establish transparent and audit-able …
GLSBIoT: GWO-based enhancement for lightweight scalable blockchain for IoT with trust based consensus
Blockchain technology, which has gained much attention from researchers, faces
challenges when applied to resource-constrained devices in the Internet of Things (IoT) …
challenges when applied to resource-constrained devices in the Internet of Things (IoT) …
A Zero Trust-based framework employed by Blockchain Technology and Ring Oscillator Physical Unclonable Functions for security of Field Programmable Gate Array …
A Kulkarni, NA Hazari, M Niamat - IEEE Access, 2024 - ieeexplore.ieee.org
The field programmable gate array (FPGA) supply chain is vulnerable to security issues from
untrusted participants involved, resulting in the significant research being conducted in this …
untrusted participants involved, resulting in the significant research being conducted in this …
Deep Trust: A Novel Framework for Dynamic Trust and Reputation Management in the Internet of Things (IoT) Based Networks
The proliferation of the Internet of Things (IoT) has brought unprecedented connectivity,
introducing complex trust and reputation management challenges across vast …
introducing complex trust and reputation management challenges across vast …
Design of An Anomaly Detection Framework For Delay & Privacy-Aware Blockchain-Based Cloud Deployments
AV Nagarjun, S Rajkumar - IEEE Access, 2024 - ieeexplore.ieee.org
Cloud-based deployments face increasing threats from various types of attacks,
necessitating robust anomaly detection frameworks to safeguard against potential security …
necessitating robust anomaly detection frameworks to safeguard against potential security …
Designing efficient patient‐centric smart contracts for healthcare ecosystems with access control capabilities
Electronic medical records are a patient's digital asset that enhances the information
available to doctors for tracking their patients' health. When this information is stored in a …
available to doctors for tracking their patients' health. When this information is stored in a …
A hybrid wrapper technique enabled Network Intrusion Detection System for Software defined networking based IoT networks
In the age of smart era, usage of IoT devices is inevitable. As the number of IoT devices
increases, the amount of data they generate also increases, which in turn leads to security …
increases, the amount of data they generate also increases, which in turn leads to security …