Exploring the Synergy of Fog Computing, Blockchain, and Federated Learning for IoT Applications: A Systematic Literature Review

WV Solis, JM Parra-Ullauri, A Kertesz - IEEE Access, 2024 - ieeexplore.ieee.org
The proliferation of Internet of Things (IoT) applications poses formidable challenges in
managing data processing, privacy, and security. In response, technologies such as Fog …

Secure Reviewing & Data Sharing in Scientific Collaboration: Leveraging Blockchain and Zero Trust Architecture

S Pooja, CB Chandrakala - IEEE Access, 2024 - ieeexplore.ieee.org
The current publishing landscape grapples with opacity in the review process. In response,
a proposal for a blockchain-driven system is put forth to establish transparent and audit-able …

GLSBIoT: GWO-based enhancement for lightweight scalable blockchain for IoT with trust based consensus

A Padma, M Ramaiah - Future Generation Computer Systems, 2024 - Elsevier
Blockchain technology, which has gained much attention from researchers, faces
challenges when applied to resource-constrained devices in the Internet of Things (IoT) …

A Zero Trust-based framework employed by Blockchain Technology and Ring Oscillator Physical Unclonable Functions for security of Field Programmable Gate Array …

A Kulkarni, NA Hazari, M Niamat - IEEE Access, 2024 - ieeexplore.ieee.org
The field programmable gate array (FPGA) supply chain is vulnerable to security issues from
untrusted participants involved, resulting in the significant research being conducted in this …

Deep Trust: A Novel Framework for Dynamic Trust and Reputation Management in the Internet of Things (IoT) Based Networks

F Ullah, A Salam, F Amin, IA Khan, J Ahmed… - IEEE …, 2024 - ieeexplore.ieee.org
The proliferation of the Internet of Things (IoT) has brought unprecedented connectivity,
introducing complex trust and reputation management challenges across vast …

Design of An Anomaly Detection Framework For Delay & Privacy-Aware Blockchain-Based Cloud Deployments

AV Nagarjun, S Rajkumar - IEEE Access, 2024 - ieeexplore.ieee.org
Cloud-based deployments face increasing threats from various types of attacks,
necessitating robust anomaly detection frameworks to safeguard against potential security …

Designing efficient patient‐centric smart contracts for healthcare ecosystems with access control capabilities

KP Kalita, D Boro, D Kumar Bhattacharyya - Security and Privacy - Wiley Online Library
Electronic medical records are a patient's digital asset that enhances the information
available to doctors for tracking their patients' health. When this information is stored in a …

A hybrid wrapper technique enabled Network Intrusion Detection System for Software defined networking based IoT networks

M Ramaiah, A Padma, R Vishnukumar… - … For Internet of …, 2024 - ieeexplore.ieee.org
In the age of smart era, usage of IoT devices is inevitable. As the number of IoT devices
increases, the amount of data they generate also increases, which in turn leads to security …