Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 20 de 1.478
Filtrar
Más filtros

Tipo del documento
Intervalo de año de publicación
1.
Cell ; 185(15): 2626-2631, 2022 07 21.
Artículo en Inglés | MEDLINE | ID: mdl-35868267

RESUMEN

Technological advances have enabled the rapid generation of health and genomic data, though rarely do these technologies account for the values and priorities of marginalized communities. In this commentary, we conceptualize a blockchain genomics data framework built out of the concept of Indigenous Data Sovereignty.


Asunto(s)
Cadena de Bloques , Seguridad Computacional , Genómica , Tecnología
2.
Proc Natl Acad Sci U S A ; 121(14): e2313911121, 2024 Apr 02.
Artículo en Inglés | MEDLINE | ID: mdl-38527203

RESUMEN

Climate change persists as a pressing global issue due to high greenhouse gas emissions from fossil fuel-based energy sources. A transition to a greener energy matrix combined with carbon offsetting is imperative to mitigate the rate at which global temperature ascends. While countries have deployed faith in green hydrogen to accelerate worldwide decarbonization efforts, the concurrent rise of blockchain-operated crypto-applications, such as bitcoin, has exacerbated climate change concerns. In this study, we propose technological solutions that combine the green hydrogen infrastructure with bitcoin mining operations to catalyze environmental and socioeconomic sustainability in climate change mitigation strategies. Since the present state of crypto-operations undeniably contributes to worldwide carbon emissions, it becomes vital to explore opportunities for harnessing the widespread enthusiasm for bitcoin as an aid toward a sustainable and climate-friendly future. Our findings reveal that green hydrogen production, paired with crypto-operations, can accelerate the deployment of solar and wind power capacities to boost conventional mitigation frameworks. Specifically, leveraging the economic potential derived from green hydrogen and bitcoin for incremental investment in renewable energy penetration, this dynamic duo can enable capacity expansions of up to 25.5% and 73.2% for solar and wind power installations. Therefore, the proposed technological solutions that leverage green hydrogen and bitcoin mining, bolstered with appropriate policy interventions, can not only strengthen renewable power generation and carbon offsetting capacities but also contribute significantly to achieving climate sustainability.

3.
Proc Natl Acad Sci U S A ; 120(29): e2303109120, 2023 Jul 18.
Artículo en Inglés | MEDLINE | ID: mdl-37428917

RESUMEN

The world is facing a formidable climate predicament due to elevated greenhouse gas (GHG) emissions from fossil fuels. The preceding decade has also witnessed a dramatic surge in blockchain-based applications, constituting yet another substantial energy consumer. Nonfungible tokens (NFTs) are one such application traded on Ethereum (ETH) marketplaces that have raised concerns about their climate impacts. The transition of ETH from proof of work (PoW) to proof of stake (PoS) is a step toward reducing the carbon footprint of the NFT sector. However, this alone will not address the climate impacts of the growing blockchain industry. Our analysis indicates that NFTs can cause yearly GHG emissions of up to 18% of the peak under the energy-intensive PoW algorithm. This results in a significant carbon debt of 4.56 Mt CO2-eq by the end of this decade, equivalent to CO2 emissions from a 600-MW coal-fired power plant in 1 y which would meet residential power demand in North Dakota. To mitigate the climate impact, we propose technological solutions to sustainably power the NFT sector using unutilized renewable energy sources in the United States. We find that 15% utilization of curtailed solar and wind power in Texas or 50 MW of potential hydropower from existing nonpowered dams can support the exponential growth of NFT transactions. In summary, the NFT sector has the potential to generate significant GHG emissions, and measures are necessary to mitigate its climate impact. The proposed technological solutions and policy support can help promote climate-friendly development in the blockchain industry.

4.
Environ Res ; 252(Pt 1): 118798, 2024 Jul 01.
Artículo en Inglés | MEDLINE | ID: mdl-38555086

RESUMEN

Blockchain technology, the backbone of cryptocurrency, is under scrutiny due to the environmental and health hazards linked to its energy-consuming Proof-of-Work (PoW) mining process. This review study provides a comprehensive analysis of the global health implications of PoW mining and cryptocurrency, with a focus on environmental sustainability and human health. The research utilized both traditional databases (PubMed and Web of Science) and additional primary sources. The study underscores the high energy consumption and carbon emissions of Bitcoin mining, despite ongoing debates comparing cryptocurrency to conventional finance. The review calls for immediate interventions, including the exploration of renewable energy sources and a transition from PoW to more sustainable consensus mechanisms. A case study on China's carbon policies highlights the necessity for effective regulatory measures. The findings reiterate the environmental and health risks associated with PoW cryptocurrency mining, including its resource-intensive procedures, reliance on non-renewable energy, and emission of air pollutants. The review emphasizes the urgent need for global regulation and a transition to more sustainable consensus mechanisms, such as Proof-of-Stake (PoS), to reduce the industry's impact on climate and human health.


Asunto(s)
Minería , Humanos , Ambiente
5.
BMC Health Serv Res ; 24(1): 1292, 2024 Oct 28.
Artículo en Inglés | MEDLINE | ID: mdl-39468706

RESUMEN

BACKGROUND: Digitalization in long-term care (LTC) is being discussed as a means of easing pressures on care service delivery, optimizing care coordination and planning processes, and improving service quality. With its advanced data protection and process automation features, blockchain technology could help solve data security and privacy issues, especially for the implementation of assistive technologies. Blockchain (BC) is thus a new technology being tapped in LTC. However, little is known about the fields, scope, and experiences of BC applications in this sector. OBJECTIVE: This systematic review aims to provide an extensive overview of current discussions of BC technology in LTC settings. Particular attention was given to the use cases, the objectives behind applying the new technology, and barriers as well as facilitating factors for the implementation. METHOD: According to the PRISMA methodology, we conducted a systematic literature review of academic articles and conference papers published between 2016 and 2023. The search through the Scopus database yielded 194 results, 29 of which were selected according to our inclusion and exclusion criteria. RESULTS: Research on BC technologies has taken off in LTC since 2016. Scientific interest centers around use cases for Ambient Assisted Living (AAL), care service management, and the improved integration of care ecosystems. However, most of the selected studies discuss prototypes that have neither yet been extensively evaluated nor been implemented and tested in real-world scenarios. Among the implementation barriers, technical immaturity, stakeholder cooperation, organizational change management, access to adequate IT infrastructure and end-user acceptance issues were most evident. CONCLUSION: Future research is needed to gain insights into context-specific implementation efforts, user experiences, benefits, and pitfalls of using BC technologies in LTC settings. While many expectations are tied to BC applications, potential negative effects have received little attention in the literature. Whether BC technology can serve as a mitigator between privacy and security preservation and improved information sharing in LTC settings is an important topic for further research.


Asunto(s)
Cadena de Bloques , Cuidados a Largo Plazo , Humanos , Cuidados a Largo Plazo/organización & administración , Seguridad Computacional
6.
J Med Internet Res ; 26: e46556, 2024 Sep 25.
Artículo en Inglés | MEDLINE | ID: mdl-39320943

RESUMEN

BACKGROUND: Telehealth played a critical role during the COVID-19 pandemic and continues to function as an essential component of health care. Existing platforms cannot ensure privacy and prevent cyberattacks. OBJECTIVE: The main objectives of this study are to understand existing cybersecurity issues in identity management and trustworthy communication processes in telehealth platforms and to design a software architecture integrated with blockchain to improve security and trustworthiness with acceptable performance. METHODS: We improved personal information security in existing telehealth platforms by adopting an innovative interdisciplinary approach combining design science, social science, and computer science in the health care domain, with prototype implementation. We used the design science research methodology to implement our overall design. We innovated over existing telehealth platforms with blockchain integration that improves health care delivery services in terms of security, privacy, and efficiency. We adopted a user-centric design approach and started with user requirement collection, followed by system functionality development. Overall system implementation facilitates user requirements, thus promoting user behavior for the adoption of the telehealth platform with decentralized identity management and an access control mechanism. RESULTS: Our investigation identified key challenges to identity management and trustworthy communication processes in telehealth platforms used in the current health care domain. By adopting distributed ledger technology, we proposed a decentralized telehealth platform to support identity management and a trustworthy communication process. Our design and prototype implementation using a smart contract-driven telehealth platform to provide decentralized identity management and trustworthy communication with token-based access control addressed several security challenges. This was substantiated by testing with 10,000 simulated transactions across 5 peers in the Rahasak blockchain network. The proposed design provides resistance to common attacks while maintaining a linear time overhead, demonstrating improved security and efficiency in telehealth services. We evaluated the performance in terms of transaction throughput, smart contract execution time, and block generation time. To create a block with 10,000 transactions, it takes 8 seconds on average, which is an acceptable overhead for blockchain-based applications. CONCLUSIONS: We identified technical limitations in current telehealth platforms. We presented several design innovations using blockchain to prototype a system. We also presented the implementation details of a unique distributed architecture for a trustworthy communication system. We illustrated how this design can overcome privacy, security, and scalability limitations. Moreover, we illustrated how improving these factors sets the stage for improving and standardizing the application and for the wide adoption of blockchain-enabled telehealth platforms.


Asunto(s)
Cadena de Bloques , COVID-19 , Seguridad Computacional , Pandemias , SARS-CoV-2 , Telemedicina , Humanos , Confianza , Confidencialidad , Comunicación Interdisciplinaria
7.
J Med Internet Res ; 26: e50730, 2024 Oct 18.
Artículo en Inglés | MEDLINE | ID: mdl-39423005

RESUMEN

BACKGROUND: Health care insurance fraud is on the rise in many ways, such as falsifying information and hiding third-party liability. This can result in significant losses for the medical health insurance industry. Consequently, fraud detection is crucial. Currently, companies employ auditors who manually evaluate records and pinpoint fraud. However, an automated and effective method is needed to detect fraud with the continually increasing number of patients seeking health insurance. Blockchain is an emerging technology and is constantly evolving to meet business needs. With its characteristics of immutability, transparency, traceability, and smart contracts, it demonstrates its potential in the health care domain. In particular, self-executable smart contracts are essential to reduce the costs associated with traditional paradigms, which are mostly manual, while preserving privacy and building trust among health care stakeholders, including the patient and the health insurance networks. However, with the proliferation of blockchain development platform options, selecting the right one for health care insurance can be difficult. This study addressed this void and developed an automated decision map recommender system to select the most effective blockchain platform for insurance fraud detection. OBJECTIVE: This study aims to develop smart contracts for detecting health care insurance fraud efficiently. Therefore, we provided a taxonomy of fraud scenarios and implemented their detection using a blockchain platform that was suitable for health care insurance fraud detection. To automatically and efficiently select the best platform, we proposed and implemented a decision map-based recommender system. For developing the decision-map, we proposed a taxonomy of 102 blockchain platforms. METHODS: We developed smart contracts for 12 fraud scenarios that we identified in the literature. We used the top 2 blockchain platforms selected by our proposed decision-making map-based recommender system, which is tailored for health care insurance fraud. The map used our taxonomy of 102 blockchain platforms classified according to their application domains. RESULTS: The recommender system demonstrated that Hyperledger Fabric was the best blockchain platform for identifying health care insurance fraud. We validated our recommender system by comparing the performance of the top 2 platforms selected by our system. The blockchain platform taxonomy that we created revealed that 59 blockchain platforms are suitable for all application domains, 25 are suitable for financial services, and 18 are suitable for various application domains. We implemented fraud detection based on smart contracts. CONCLUSIONS: Our decision map recommender system, which was based on our proposed taxonomy of 102 platforms, automatically selected the top 2 platforms, which were Hyperledger Fabric and Neo, for the implementation of health care insurance fraud detection. Our performance evaluation of the 2 platforms indicated that Fabric surpassed Neo in all performance metrics, as depicted by our recommender system. We provided an implementation of fraud detection based on smart contracts.


Asunto(s)
Fraude , Seguro de Salud , Fraude/prevención & control , Seguro de Salud/clasificación , Humanos , Cadena de Bloques , Contratos
8.
J Med Internet Res ; 26: e46160, 2024 May 28.
Artículo en Inglés | MEDLINE | ID: mdl-38805706

RESUMEN

CryptoKitties, a trendy game on Ethereum that is an open-source public blockchain platform with a smart contract function, brought nonfungible tokens (NFTs) into the public eye in 2017. NFTs are popular because of their nonfungible properties and their unique and irreplaceable nature in the real world. The embryonic form of NFTs can be traced back to a P2P network protocol improved based on Bitcoin in 2012 that can realize decentralized digital asset transactions. NFTs have recently gained much attention and have shown an unprecedented explosive growth trend. Herein, the concept of digital asset NFTs is introduced into the medical and health field to conduct a subversive discussion on biobank operations. By converting biomedical data into NFTs, the collection and circulation of samples can be accelerated, and the transformation of resources can be promoted. In conclusion, the biobank can achieve sustainable development through "decentralization."


Asunto(s)
Internet , Humanos , Cadena de Bloques , Bancos de Muestras Biológicas
9.
J Med Internet Res ; 26: e54263, 2024 Jul 05.
Artículo en Inglés | MEDLINE | ID: mdl-38968598

RESUMEN

BACKGROUND: The medical knowledge graph provides explainable decision support, helping clinicians with prompt diagnosis and treatment suggestions. However, in real-world clinical practice, patients visit different hospitals seeking various medical services, resulting in fragmented patient data across hospitals. With data security issues, data fragmentation limits the application of knowledge graphs because single-hospital data cannot provide complete evidence for generating precise decision support and comprehensive explanations. It is important to study new methods for knowledge graph systems to integrate into multicenter, information-sensitive medical environments, using fragmented patient records for decision support while maintaining data privacy and security. OBJECTIVE: This study aims to propose an electronic health record (EHR)-oriented knowledge graph system for collaborative reasoning with multicenter fragmented patient medical data, all the while preserving data privacy. METHODS: The study introduced an EHR knowledge graph framework and a novel collaborative reasoning process for utilizing multicenter fragmented information. The system was deployed in each hospital and used a unified semantic structure and Observational Medical Outcomes Partnership (OMOP) vocabulary to standardize the local EHR data set. The system transforms local EHR data into semantic formats and performs semantic reasoning to generate intermediate reasoning findings. The generated intermediate findings used hypernym concepts to isolate original medical data. The intermediate findings and hash-encrypted patient identities were synchronized through a blockchain network. The multicenter intermediate findings were collaborated for final reasoning and clinical decision support without gathering original EHR data. RESULTS: The system underwent evaluation through an application study involving the utilization of multicenter fragmented EHR data to alert non-nephrology clinicians about overlooked patients with chronic kidney disease (CKD). The study covered 1185 patients in nonnephrology departments from 3 hospitals. The patients visited at least two of the hospitals. Of these, 124 patients were identified as meeting CKD diagnosis criteria through collaborative reasoning using multicenter EHR data, whereas the data from individual hospitals alone could not facilitate the identification of CKD in these patients. The assessment by clinicians indicated that 78/91 (86%) patients were CKD positive. CONCLUSIONS: The proposed system was able to effectively utilize multicenter fragmented EHR data for clinical application. The application study showed the clinical benefits of the system with prompt and comprehensive decision support.


Asunto(s)
Sistemas de Apoyo a Decisiones Clínicas , Registros Electrónicos de Salud , Humanos
10.
BMC Med Inform Decis Mak ; 24(1): 260, 2024 Sep 16.
Artículo en Inglés | MEDLINE | ID: mdl-39285411

RESUMEN

BACKGROUND: Graded diagnosis and treatment, referral, and expert consultations between medical institutions all require cross domain access to patient medical information to support doctors' treatment decisions, leading to an increase in cross domain access among various medical institutions within the medical consortium. However, patient medical information is sensitive and private, and it is essential to control doctors' cross domain access to reduce the risk of leakage. Access control is a continuous and long-term process, and it first requires verification of the legitimacy of user identities, while utilizing control policies for selection and management. After verifying user identity and access permissions, it is also necessary to monitor unauthorized operations. Therefore, the content of access control includes authentication, implementation of control policies, and security auditing. Unlike the existing focus on authentication and control strategy implementation in access control, this article focuses on the control based on access log security auditing for doctors who have obtained authorization to access medical resources. This paper designs a blockchain based doctor intelligent cross domain access log recording system, which is used to record, query and analyze the cross domain access behavior of doctors after authorization. Through DBSCAN clustering analysis of doctors' cross domain access logs, we find the abnormal phenomenon of cross domain access, and build a penalty function to dynamically control doctors' cross domain access process, so as to reduce the risk of Data breach. Finally, through comparative analysis and experiments, it is shown that the proposed cross domain access control model for medical consortia based on DBSCAN and penalty function has good control effect on the cross domain access behavior of doctors in various medical institutions of the medical consortia, and has certain feasibility for the cross domain access control of doctors.


Asunto(s)
Seguridad Computacional , Humanos , Seguridad Computacional/normas , Cadena de Bloques
11.
BMC Med Inform Decis Mak ; 24(1): 109, 2024 Apr 25.
Artículo en Inglés | MEDLINE | ID: mdl-38664792

RESUMEN

BACKGROUND: A blockchain can be described as a distributed ledger database where, under a consensus mechanism, data are permanently stored in records, called blocks, linked together with cryptography. Each block contains a cryptographic hash function of the previous block, a timestamp, and transaction data, which are permanently stored in thousands of nodes and never altered. This provides a potential real-world application for generating a permanent, decentralized record of scientific data, taking advantage of blockchain features such as timestamping and immutability. IMPLEMENTATION: Here, we propose INNBC DApp, a Web3 decentralized application providing a simple front-end user interface connected with a smart contract for recording scientific data on a modern, proof-of-stake (POS) blockchain such as BNB Smart Chain. Unlike previously proposed blockchain tools that only store a hash of the data on-chain, here the data are stored fully on-chain within the transaction itself as "transaction input data", with a true decentralized storage solution. In addition to plain text, the DApp can record various types of files, such as documents, images, audio, and video, by using Base64 encoding. In this study, we describe how to use the DApp and perform real-world transactions storing different kinds of data from previously published research articles, describing the advantages and limitations of using such a technology, analyzing the cost in terms of transaction fees, and discussing possible use cases. RESULTS: We have been able to store several different types of data on the BNB Smart Chain: raw text, documents, images, audio, and video. Notably, we stored several complete research articles at a reasonable cost. We found a limit of 95KB for each single file upload. Considering that Base64 encoding increases file size by approximately 33%, this provides us with a theoretical limit of 126KB. We successfully overcome this limitation by splitting larger files into smaller chunks and uploading them as multi-volume archives. Additionally, we propose AES encryption to protect sensitive data. Accordingly, we show that it is possible to include enough data to be useful for storing and sharing scientific documents and images on the blockchain at a reasonable cost for the users. CONCLUSION: INNBC DApp represents a real use case for blockchain technology in decentralizing biomedical data storage and sharing, providing us with features such as immutability, timestamp, and identity that can be used to ensure permanent availability of the data and to provide proof-of-existence as well as to protect authorship, a freely available decentralized science (DeSci) tool aiming to help bring mass adoption of blockchain technology among the scientific community.


Asunto(s)
Cadena de Bloques , Humanos , Almacenamiento y Recuperación de la Información/métodos , Seguridad Computacional/normas
12.
BMC Med Inform Decis Mak ; 24(1): 303, 2024 Oct 15.
Artículo en Inglés | MEDLINE | ID: mdl-39407229

RESUMEN

BACKGROUND: As digital healthcare services handle increasingly more sensitive health data, robust access control methods are required. Especially in emergency conditions, where the patient's health situation is in peril, different healthcare providers associated with critical cases may need to be granted permission to acquire access to Electronic Health Records (EHRs) of patients. The research objective of this work is to develop a proactive access control method that can grant emergency clinicians access to sensitive health data, guaranteeing the integrity and security of the data, and generating trust without the need for a trusted third party. METHODS: A contextual and blockchain-based mechanism is proposed that allows access to sensitive EHRs by applying prognostic procedures where information based on context, is utilized to identify critical situations and grant access to medical data. Specifically, to enable proactivity, Long Short Term Memory (LSTM) Neural Networks (NNs) are applied that utilize patient's recent health history to prognose the next two-hour health metrics values. Fuzzy logic is used to evaluate the severity of the patient's health state. These techniques are incorporated in a private and permissioned Hyperledger-Fabric blockchain network, capable of securing patient's sensitive information in the blockchain network. RESULTS: The developed access control method provides secure access for emergency clinicians to sensitive information and simultaneously safeguards the patient's well-being. Integrating this predictive mechanism within the blockchain network proved to be a robust tool to enhance the performance of the access control mechanism. Furthermore, the blockchain network of this work can record the history of who and when had access to a specific patient's sensitive EHRs, guaranteeing the integrity and security of the data, as well as recording the latency of this mechanism, where three different access control cases are evaluated. This access control mechanism is to be enforced in a real-life scenario in hospitals. CONCLUSIONS: The proposed mechanism informs proactively the emergency team of professional clinicians about patients' critical situations by combining fuzzy and predictive machine learning techniques incorporated in the private and permissioned blockchain network, and it exploits the distributed data of the blockchain architecture, guaranteeing the integrity and security of the data, and thus, enhancing the users' trust to the access control mechanism.


Asunto(s)
Cadena de Bloques , Seguridad Computacional , Registros Electrónicos de Salud , Humanos , Seguridad Computacional/normas , Redes Neurales de la Computación , Confidencialidad/normas , Lógica Difusa
13.
Sensors (Basel) ; 24(4)2024 Feb 16.
Artículo en Inglés | MEDLINE | ID: mdl-38400422

RESUMEN

In an era dominated by rapid digitalization of sensed data, the secure exchange of sensitive information poses a critical challenge across various sectors. Established techniques, particularly in emerging technologies like the Internet of Things (IoT), grapple with inherent risks in ensuring data confidentiality, integrity, and vulnerabilities to evolving cyber threats. Blockchain technology, known for its decentralized and tamper-resistant characteristics, stands as a reliable solution for secure data exchange. However, the persistent challenge lies in protecting sensitive information amidst evolving digital landscapes. Among the burgeoning applications of blockchain technology, non-fungible tokens (NFTs) have emerged as digital certificates of ownership, securely recording various types of data on a distributed ledger. Unlike traditional data storage methods, NFTs offer several advantages for secure information exchange. Firstly, their tamperproof nature guarantees the authenticity and integrity of the data. Secondly, NFTs can hold both immutable and mutable data within the same token, simplifying management and access control. Moving beyond their conventional association with art and collectibles, this paper presents a novel approach that utilizes NFTs as dynamic carriers for sensitive information. Our solution leverages the immutable NFT data to serve as a secure data pointer, while the mutable NFT data holds sensitive information protected by steganography. Steganography embeds the data within the NFT, making them invisible to unauthorized eyes, while facilitating portability. This dual approach ensures both data integrity and authorized access, even in the face of evolving digital threats. A performance analysis confirms the approach's effectiveness, demonstrating its reliability, robustness, and resilience against attacks on hidden data. This paves the way for secure data transmission across diverse industries.

14.
Sensors (Basel) ; 24(2)2024 Jan 15.
Artículo en Inglés | MEDLINE | ID: mdl-38257628

RESUMEN

Machine learning techniques have attracted considerable attention for wireless networks because of their impressive performance in complicated scenarios and usefulness in various applications. However, training with and sharing raw data obtained locally from each wireless node does not guarantee privacy and requires a large communication overhead. To mitigate such issues, federated learning (FL), in which sharing parameters for model updates are shared instead of raw data, has been developed. FL has also been studied using blockchain techniques to efficiently perform learning in distributed wireless systems without having to deploy a centralized server. Although blockchain-based decentralized federated learning (BDFL) is a promising technique for various wireless sensor networks, malicious attacks can still occur, which result in performance degradation or malfunction. In this study, we analyze the impact of a jamming threats from malicious miners to BDFL in wireless networks. In a wireless BDFL system, it is possible for malicious miners with jamming capability to interfere with the collection of model parameters by normal miners, thus preventing the victim miner from generating a global model. By disrupting normal miners participating in BDFL systems, malicious miners with jamming capability can more easily add malicious data to the mainstream. Through various simulations, we evaluated the success probability performance of malicious block insertion and the participation rate of normal miners in a wireless BDFL system.

15.
Sensors (Basel) ; 24(12)2024 Jun 17.
Artículo en Inglés | MEDLINE | ID: mdl-38931692

RESUMEN

This work proposes an implementation of the SHA-256, the most common blockchain hash algorithm, on a field-programmable gate array (FPGA) to improve processing capacity and power saving in Internet of Things (IoT) devices to solve security and privacy issues. This implementation presents a different approach than other papers in the literature, using clustered cores executing the SHA-256 algorithm in parallel. Details about the proposed architecture and an analysis of the resources used by the FPGA are presented. The implementation achieved a throughput of approximately 1.4 Gbps for 16 cores on a single FPGA. Furthermore, it saved dynamic power, using almost 1000 times less compared to previous works in the literature, making this proposal suitable for practical problems for IoT devices in blockchain environments. The target FPGA used was the Xilinx Virtex 6 xc6vlx240t-1ff1156.

16.
Sensors (Basel) ; 24(10)2024 May 14.
Artículo en Inglés | MEDLINE | ID: mdl-38793962

RESUMEN

This paper surveys the implementation of blockchain technology in cybersecurity in Internet of Things (IoT) networks, presenting a comprehensive framework that integrates blockchain technology with intrusion detection systems (IDS) to enhance IDS performance. This paper reviews articles from various domains, including AI, blockchain, IDS, IoT, and Industrial IoT (IIoT), to identify emerging trends and challenges in this field. An analysis of various approaches incorporating AI and blockchain demonstrates the potentiality of integrating AI and blockchain to transform IDS. This paper's structure establishes the foundation for further investigation and provides a blueprint for the development of IDS that is accessible, scalable, transparent, immutable, and decentralized. A demonstration from case studies integrating AI and blockchain shows the viability of combining the duo to enhance performance. Despite the challenges posed by resource constraints and privacy concerns, it is notable that blockchain is the key to securing IoT networks and that continued innovation in this area is necessary. Further research into lightweight cryptography, efficient consensus mechanisms, and privacy-preserving techniques is needed to realize all of the potential of blockchain-powered cybersecurity in IoT.

17.
Sensors (Basel) ; 24(2)2024 Jan 13.
Artículo en Inglés | MEDLINE | ID: mdl-38257589

RESUMEN

Electronic tickets (e-tickets) are gradually being adopted as a substitute for paper-based tickets to bring convenience to customers, corporations, and governments. However, their adoption faces a number of practical challenges, such as flexibility, privacy, secure storage, and inability to deploy on IoT devices such as smartphones. These concerns motivate the current research on e-ticket systems, which seeks to ensure the unforgeability and authenticity of e-tickets while simultaneously protecting user privacy. Many existing schemes cannot fully satisfy all these requirements. To improve on the current state-of-the-art solutions, this paper constructs a blockchain-enhanced privacy-preserving e-ticket system for IoT devices, dubbed PriTKT, which is based on blockchain, structure-preserving signatures (SPS), unlinkable redactable signatures (URS), and zero-knowledge proofs (ZKP). It supports flexible policy-based ticket purchasing and ensures user unlinkability. According to the data minimization and revealing principle of GDPR, PriTKT empowers users to selectively disclose subsets of (necessary) attributes to sellers as long as the disclosed attributes satisfy ticket purchasing policies. In addition, benefiting from the decentralization and immutability of blockchain, effective detection and efficient tracing of double spending of e-tickets are supported in PriTKT. Considering the impracticality of existing e-tickets schemes with burdensome ZKPs, we replace them with URS/SPS or efficient ZKP to significantly improve the efficiency of ticket issuing and make it suitable for use on smartphones.

18.
Sensors (Basel) ; 24(11)2024 Jun 01.
Artículo en Inglés | MEDLINE | ID: mdl-38894368

RESUMEN

Internet of Things (IoT) technology is evolving over the peak of smart infrastructure with the participation of IoT devices in a wide range of applications. Traditional IoT authentication methods are vulnerable to threats due to wireless data transmission. However, IoT devices are resource- and energy-constrained, so building lightweight security that provides stronger authentication is essential. This paper proposes a novel, two-layered multi-factor authentication (2L-MFA) framework using blockchain to enhance IoT devices and user security. The first level of authentication is for IoT devices, one that considers secret keys, geographical location, and physically unclonable function (PUF). Proof-of-authentication (PoAh) and elliptic curve Diffie-Hellman are followed for lightweight and low latency support. Second-level authentication for IoT users, which are sub-categorized into four levels, each defined by specific factors such as identity, password, and biometrics. The first level involves a matrix-based password; the second level utilizes the elliptic curve digital signature algorithm (ECDSA); and levels 3 and 4 are secured with iris and finger vein, providing comprehensive and robust authentication. We deployed fuzzy logic to validate the authentication and make the system more robust. The 2L-MFA model significantly improves performance, reducing registration, login, and authentication times by up to 25%, 50%, and 25%, respectively, facilitating quicker cloud access post-authentication and enhancing overall efficiency.

19.
Sensors (Basel) ; 24(13)2024 Jul 02.
Artículo en Inglés | MEDLINE | ID: mdl-39001087

RESUMEN

The growing importance of edge and fog computing in the modern IT infrastructure is driven by the rise of decentralized applications. However, resource allocation within these frameworks is challenging due to varying device capabilities and dynamic network conditions. Conventional approaches often result in poor resource use and slowed advancements. This study presents a novel strategy for enhancing resource allocation in edge and fog computing by integrating machine learning with the blockchain for reliable trust management. Our proposed framework, called CyberGuard, leverages the blockchain's inherent immutability and decentralization to establish a trustworthy and transparent network for monitoring and verifying edge and fog computing transactions. CyberGuard combines the Trust2Vec model with conventional machine-learning models like SVM, KNN, and random forests, creating a robust mechanism for assessing trust and security risks. Through detailed optimization and case studies, CyberGuard demonstrates significant improvements in resource allocation efficiency and overall system performance in real-world scenarios. Our results highlight CyberGuard's effectiveness, evidenced by a remarkable accuracy, precision, recall, and F1-score of 98.18%, showcasing the transformative potential of our comprehensive approach in edge and fog computing environments.

20.
Sensors (Basel) ; 24(15)2024 Jul 30.
Artículo en Inglés | MEDLINE | ID: mdl-39123985

RESUMEN

Existing attribute-based proxy re-encryption schemes suffer from issues like complex access policies, large ciphertext storage space consumption, and an excessive authority of the authorization center, leading to weak security and controllability of data sharing in cloud storage. This study proposes a Weighted Attribute Authority Multi-Authority Proxy Re-Encryption (WAMA-PRE) scheme that introduces attribute weights to elevate the expression of access policies from binary to multi-valued, simplifying policies and reducing ciphertext storage space. Simultaneously, the multiple attribute authorities and the authorization center construct a joint key, reducing reliance on a single authorization center. The proposed distributed attribute authority network enhances the anti-attack capability of cloud storage. Experimental results show that introducing attribute weights can reduce ciphertext storage space by 50%, proxy re-encryption saves 63% time compared to repeated encryption, and the joint key construction time is only 1% of the benchmark scheme. Security analysis proves that WAMA-PRE achieves CPA security under the decisional q-parallel BDHE assumption in the random oracle model. This study provides an effective solution for secure data sharing in cloud storage.

SELECCIÓN DE REFERENCIAS
DETALLE DE LA BÚSQUEDA