10,693 research outputs found

    Study of NFT-secured Blockchain Technologies for High Security Metaverse Communication

    Get PDF
    After Covid-19, Metaverse grew in popularity as it encourages remote unique experiences and provides solutions for various businesses such as manufacturing, education, and social media. The Metaverse is a 3D augmented reality world, it is a hybrid of today\u27s social media expanded into three dimensions. Metaverse is a mix of several advanced technologies including Artificial Intelligence, Augmented Reality, Blockchain, Cryptocurrencies, NFTs (Non-Fungible Token) and Internet of Things (IoT) all based on a cloud infrastructure. However, Metaverse have various security challenges due to the multi-layer nature of it, such as identity verification, secure transactions, and privacy. We have analyzed the Metaverse architecture with layers and security solutions for each layer. The common architecture of Metaverse provides specific secure blockchain protocols, such that the blockchain transactions are monitored and kept in the blockchain for extra security. Therefore, the goals of this research are to (1) break down the architecture of Metaverse and provide security technologies for each layer, (2) to suggest blockchain based security solutions to solve issues related to identity verification, and (3) develop an identification solution using NFTs based on the blockchain protocol which gives each user a unique NFT as form of ID, backed up by smart contracts and Ethereum’s blockchain. In this research we aspire to make the Metaverse applications more accessible by enhancing the security features and making it a safe place for people to interact without the fear of cybercriminals

    Internet of things security: A top-down survey

    Get PDF
    International audienceInternet of Things (IoT) is one of the promising technologies that has attracted a lot of attention in both industrial and academic fields these years. It aims to integrate seamlessly both physical and digital worlds in one single ecosystem that makes up a new intelligent era of Internet. This technology offers a huge business value for organizations and provides opportunities for many existing applications such as energy, healthcare and other sectors. However, as new emergent technology, IoT suffers from several security issues which are most challenging than those from other fields regarding its complex environment and resources-constrained IoT devices. A lot of researches have been initiated in order to provide efficient security solutions in IoT, particularly to address resources constraints and scalability issues. Furthermore, some technologies related to networking and cryptocurrency fields such as Software Defined Networking (SDN) and Blockchain are revolutionizing the world of the Internet of Things thanks to their efficiency and scalability. In this paper, we provide a comprehensive top down survey of the most recent proposed security and privacy solutions in IoT. We discuss particularly the benefits that new approaches such as blockchain and Software Defined Networking can bring to the security and the privacy in IoT in terms of flexibility and scalability. Finally, we give a general classification of existing solutions and comparison based on important parameters

    Blockchain Technologies in Healthcare System for Real Time Applications Using IoT and Deep Learning Techniques

    Get PDF
    Data transparency, flexible access, immutability, privacy, audit, traceability, data provenance, trust, and security are fundamental issues for modern healthcare data management systems. As a promising new technology, blockchain has the potential to enhance healthcare data management functions by boosting data efficiency and guaranteeing trust. The present research looked into the benefits of blockchain technology in healthcare and the challenges that have prevented its widespread implementation so far. Healthcare organisations around the world are using a variety of methods to modernise into more effective, coordinated and user-cantered structures. There is an increase in both human effort and security risks when dealing with massive amounts of data, such as reports and images for each individual. Internet of Things (IoT) solutions in healthcare aim to address these problems by enhancing patient care while reducing costs through more effective use of healthcare resources. However, many different types of intrusion can pose serious risks to IoT devices. In some cases, doctors will insist that their patients use only certain labs or pharmacies, regardless of the quality of the services they provide, simply to increase the doctor's bottom line. Because of this, protecting data is essential when discussing the Internet of Things. To solve these problems, Blockchain technology has emerged as the most reliable method for protecting the privacy of control systems in real time. In this paper, we will introduce a CNN-based healthcare data security framework using the blockchain technique by generating the hash of each data point, which will alert all users of the blockchain network to any unauthorised changes to data or breaches in the supply of medicines

    Security and Privacy for Green IoT-based Agriculture: Review, Blockchain solutions, and Challenges

    Get PDF
    open access articleThis paper presents research challenges on security and privacy issues in the field of green IoT-based agriculture. We start by describing a four-tier green IoT-based agriculture architecture and summarizing the existing surveys that deal with smart agriculture. Then, we provide a classification of threat models against green IoT-based agriculture into five categories, including, attacks against privacy, authentication, confidentiality, availability, and integrity properties. Moreover, we provide a taxonomy and a side-by-side comparison of the state-of-the-art methods toward secure and privacy-preserving technologies for IoT applications and how they will be adapted for green IoT-based agriculture. In addition, we analyze the privacy-oriented blockchain-based solutions as well as consensus algorithms for IoT applications and how they will be adapted for green IoT-based agriculture. Based on the current survey, we highlight open research challenges and discuss possible future research directions in the security and privacy of green IoT-based agriculture

    A critical literature review of security and privacy in smart home healthcare schemes adopting IoT & blockchain: problems, challenges and solutions

    Get PDF
    Protecting private data in smart homes, a popular Internet-of-Things (IoT) application, remains a significant data security and privacy challenge due to the large-scale development and distributed nature of IoT networks. Recently, smart healthcare has leveraged smart home systems, thereby compounding security concerns in terms of the confidentiality of sensitive and private data and by extension the privacy of the data owner. However, PoA-based Blockchain DLT has emerged as a promising solution for protecting private data from indiscriminate use and thereby preserving the privacy of individuals residing in IoT-enabled smart homes. This review elicits some concerns, issues, and problems that have hindered the adoption of blockchain and IoT (BCoT) in some domains and suggests requisite solutions using the aging-in-place scenario. Implementation issues with BCoT were examined as well as the combined challenges BCoT can pose when utilised for security gains. The study discusses recent findings, opportunities, and barriers, and provide recommendations that could facilitate the continuous growth of blockchain application in healthcare. Lastly, the study then explored the potential of using a PoA-based permission blockchain with an applicable consent-based privacy model for decision-making in the information disclosure process, including the use of publisher-subscriber contracts for fine-grained access control to ensure secure data processing and sharing, as well as ethical trust in personal information disclosure, as a solution direction. The proposed authorisation framework could guarantee data ownership, conditional access management, scalable and tamper-proof data storage, and a more resilient system against threat models such as interception and insider attacks

    Comprehensive analysis of security issues in cloud-based Internet of Things: A survey

    Get PDF
    The Internet of Things (IoT )has emerged as the largest computing platform, enabling IoT devices to sense real-world conditions such as temperature, humidity, pressure, and cloud prediction. However, the security of IoT systems is crucial due to their direct impact on human life. With the expansion of processing and communication capabilities to numerous devices, IoT has become a vast network where connectivity is ubiquitous. This paper focuses on the security issues of cloud-based IoT, specifically access control, network security, data security, and privacy, which are the four main components of cloud-based IoT. By analyzing and comparing existing research papers on security in cloud IoT and IoT in general, we identify proposed solutions. Most researchers have concentrated on a single component, while only a few have addressed two components. Consequently, our research aims to bridge the gap in Cloud IoT security by focusing on more than two components. We propose the utilization of methods such as Machine Learning and blockchain to enhance security, drawing on the strengths highlighted in previous works. Our future focus will involve exploring potential attacks in cloud IoT and developing a comprehensive method that encompasses atleast three security components of cloud IoT security
    • …
    corecore