-
181
Blockchain Approach for Healthcare Using Fog Topology and Lightweight Consensus
Published 2025-01-01“…The architecture and algorithms for signature generation, encryption, emergency state actions and consensus are developed and evaluated through extensive simulations using the NS3 toolkit.Results: The simulation results validate the effectiveness of the proposed approach in improving healthcare IoT systems. …”
Get full text
Article -
182
BS-SCRM: a novel approach to secure wireless sensor networks via blockchain and swarm intelligence techniques
Published 2024-04-01“…The proposed BS-SCRM method is structured in two phases: (1) an enhanced cluster head (CH) election utilizing an elite strategy-enhanced Whale Optimization Algorithm (WOA) that considers node energy and proximity to the base station, and (2) a secure data on-chain phase where blockchain comes into play, encrypting and validating cluster data to safeguard integrity and prevent tampering. …”
Get full text
Article -
183
A systematic review of data privacy in Mobility as a Service (MaaS)
Published 2025-05-01“…Using the PRISMA framework, a comprehensive literature search across Web of Science, Elsevier, and IEEE Xplore databases resulted in the selection of 32 studies for detailed analysis.The review is structured around three main themes: (1) Privacy-Preserving Techniques, including anonymization strategies (k-anonymity, differential privacy, obfuscation), encryption methods (blockchain, cryptographic protocols), federated learning for decentralized data processing, and advanced algorithms for optimizing privacy budgets and balancing utility-privacy trade-offs; (2) User Trust and Privacy Perceptions, highlighting that trust in service providers is essential for MaaS adoption, privacy concerns may impact adoption but do not necessarily prevent it (the “privacy paradox”), and awareness of data misuse affects user trust and willingness to adopt MaaS; and (3) Regulatory Frameworks, focusing on the importance of GDPR compliance to ensure strict data protection through consent and transparency, and embedding privacy-by-design principles within MaaS architectures to safeguard user data from the outset.This review emphasizes the need for a holistic approach, integrating technological innovation, user-centered design, and strong regulatory oversight to effectively address privacy challenges in MaaS. …”
Get full text
Article -
184
A lightweight lattice-based group signcryption authentication scheme for Internet of things
Published 2024-04-01“…In the key generation stage, the improved trapdoor diagonal matrix was designed to optimize the original image sampling algorithm required for key generation and reduce the overall time required for generating a large number of keys. …”
Get full text
Article -
185
A lightweight lattice-based group signcryption authentication scheme for Internet of things
Published 2024-04-01“…In the key generation stage, the improved trapdoor diagonal matrix was designed to optimize the original image sampling algorithm required for key generation and reduce the overall time required for generating a large number of keys. …”
Get full text
Article -
186
Blockchain-enabled verification of medical records using soul-bound tokens and cloud computing
Published 2024-10-01“…Blockchain systems can lower platform costs and determine the optimal allocation of resources across a dispersed network by utilizing deep learning algorithms. …”
Get full text
Article -
187
The application of blockchain with a comparative approach and its impact on risk, flexibility and internal control evaluation
Published 2024-09-01“…In general, the use of blockchain can affect the following: Risk: Blockchain minimizes the possibility of changing and falsifying information by using strong encryption and security algorithms. Also, by using distributed technology, the reliability of data access and visibility increases. …”
Get full text
Article