1,255 research outputs found
HOW BLOCKCHAIN FACILITATES SMART CITY APPLICATIONS– DEVELOPMENT OF A MULTI-LAYER TAXONOMY
A decade after Sathosi Nakamoto published his famous whitepaper, blockchain technology (BT) has started to become widely recognized and used beyond the cryptocurrency Bitcoin. While the financial sector is the most prominent adopter of the technology, numerous other fields of application for the ground-breaking innovation are discussed by researchers and practitioners alike. One key area in which blockchain-based applications are expected to drive radical and disruptive innovation is smart cities. BT provides unique benefits which smart cities can leverage to improve quality of life, adminis-trative processes, and environmental sustainability. However, due to the entrepreneurial dynamics and abundant fields of application for BT in smart cities, an integrated and boundary-spanning analysis is lacking. Thus, our paper aims at analysing how BT is used in different smart city business models to present a multi-layer taxonomy. For this purpose, we identified a global sample of 80 startups which offer products or services for smart cities and examined their business models. The paper explores economic and technological characteristics of blockchain based smart city applications. These unique insights will be useful for researchers, practitioners, and regulators
Factors driving enterprise adoption of blockchain technology
Amidst the rapidly evolving advancement of blockchain technology (BT), enterprises face notable challenges in leveraging its transformative potential, starting with a need to understand the technology and how it can be used for particular applications. Two challenges are that many BT trials have not been successful and large-scale implementations that have led to continued use are scarce. This research provides a comprehensive examination of factors that drive the successful adoption of BT for enterprise use cases. A dual-phased approach was employed. First, I introduce a taxonomy matrix correlating BT design characteristics with use case characteristics, offering a framework for BT design and benefits across different enterprise contexts. Second, I conducted case studies of five successful BT cases in large enterprises that led to the adoption in terms of continued use and contrasted them with one failure case. The data collection and analysis of the case studies encompassed technological, organizational, environmental, and inter-organizational variables that led to BT\u27s continued use. The cross-case analysis revealed that compatibility, relative advantage, and observability are primary technological factors contributing to continued use. Within the organizational dimension, organizational knowledge and internal characteristics emerged as crucial elements, while regulatory compliance came out to be a significant factor. Based on the cross-case analysis, I develop theoretical propositions about the factors that lead to the continued use of BT, which can be further validated and tested in future research
Orchestration in the Cloud-to-Things Compute Continuum: Taxonomy, Survey and Future Directions
IoT systems are becoming an essential part of our environment. Smart cities,
smart manufacturing, augmented reality, and self-driving cars are just some
examples of the wide range of domains, where the applicability of such systems
has been increasing rapidly. These IoT use cases often require simultaneous
access to geographically distributed arrays of sensors, and heterogeneous
remote, local as well as multi-cloud computational resources. This gives birth
to the extended Cloud-to-Things computing paradigm. The emergence of this new
paradigm raised the quintessential need to extend the orchestration
requirements i.e., the automated deployment and run-time management) of
applications from the centralised cloud-only environment to the entire spectrum
of resources in the Cloud-to-Things continuum. In order to cope with this
requirement, in the last few years, there has been a lot of attention to the
development of orchestration systems in both industry and academic
environments. This paper is an attempt to gather the research conducted in the
orchestration for the Cloud-to-Things continuum landscape and to propose a
detailed taxonomy, which is then used to critically review the landscape of
existing research work. We finally discuss the key challenges that require
further attention and also present a conceptual framework based on the
conducted analysis.Comment: Journal of Cloud Computing Pages: 2
IoMT Malware Detection Approaches: Analysis and Research Challenges
The advancement in Information and Communications Technology (ICT) has changed the entire paradigm of computing. Because of such advancement, we have new types of computing and communication environments, for example, Internet of Things (IoT) that is a collection of smart IoT devices. The Internet of Medical Things (IoMT) is a specific type of IoT communication environment which deals with communication through the smart healthcare (medical) devices. Though IoT communication environment facilitates and supports our day-to-day activities, but at the same time it has also certain drawbacks as it suffers from several security and privacy issues, such as replay, man-in-the-middle, impersonation, privileged-insider, remote hijacking, password guessing and denial of service (DoS) attacks, and malware attacks. Among these attacks, the attacks which are performed through the malware botnet (i.e., Mirai) are the malignant attacks. The existence of malware botnets leads to attacks on confidentiality, integrity, authenticity and availability of the data and other resources of the system. In presence of such attacks, the sensitive data of IoT communication may be disclosed, altered or even may not be available to the authorized users. Therefore, it becomes essential to protect the IoT/IoMT environment from malware attacks. In this review paper, we first perform the study of various types of malware attacks, and their symptoms. We also discuss some architectures of IoT environment along with their applications. Next, a taxonomy of security protocols in IoT environment is provided. Moreover, we conduct a comparative study on various existing schemes for malware detection and prevention in IoT environment. Finally, some future research challenges and directions of malware detection in IoT/IoMT environment are highlighted
Enabling technologies for urban smart mobility: Recent trends, opportunities and challenges
The increasing population across the globe makes it essential to link smart and sustainable city planning with the logistics of transporting people and goods, which will significantly contribute to how societies will face mobility in the coming years. The concept of smart mobility emerged with the popularity of smart cities and is aligned with the sustainable development goals defined by the United Nations. A reduction in traffic congestion and new route optimizations with reduced ecological footprint are some of the essential factors of smart mobility; however, other aspects must also be taken into account, such as the promotion of active mobility and inclusive mobility, encour-aging the use of other types of environmentally friendly fuels and engagement with citizens. The Internet of Things (IoT), Artificial Intelligence (AI), Blockchain and Big Data technology will serve as the main entry points and fundamental pillars to promote the rise of new innovative solutions that will change the current paradigm for cities and their citizens. Mobility‐as‐a‐service, traffic flow optimization, the optimization of logistics and autonomous vehicles are some of the services and applications that will encompass several changes in the coming years with the transition of existing cities into smart cities. This paper provides an extensive review of the current trends and solutions presented in the scope of smart mobility and enabling technologies that support it. An overview of how smart mobility fits into smart cities is provided by characterizing its main attributes and the key benefits of using smart mobility in a smart city ecosystem. Further, this paper highlights other various opportunities and challenges related to smart mobility. Lastly, the major services and applications that are expected to arise in the coming years within smart mobility are explored with the prospective future trends and scope
Navigating the IoT landscape: Unraveling forensics, security issues, applications, research challenges, and future
Given the exponential expansion of the internet, the possibilities of
security attacks and cybercrimes have increased accordingly. However, poorly
implemented security mechanisms in the Internet of Things (IoT) devices make
them susceptible to cyberattacks, which can directly affect users. IoT
forensics is thus needed for investigating and mitigating such attacks. While
many works have examined IoT applications and challenges, only a few have
focused on both the forensic and security issues in IoT. Therefore, this paper
reviews forensic and security issues associated with IoT in different fields.
Future prospects and challenges in IoT research and development are also
highlighted. As demonstrated in the literature, most IoT devices are vulnerable
to attacks due to a lack of standardized security measures. Unauthorized users
could get access, compromise data, and even benefit from control of critical
infrastructure. To fulfil the security-conscious needs of consumers, IoT can be
used to develop a smart home system by designing a FLIP-based system that is
highly scalable and adaptable. Utilizing a blockchain-based authentication
mechanism with a multi-chain structure can provide additional security
protection between different trust domains. Deep learning can be utilized to
develop a network forensics framework with a high-performing system for
detecting and tracking cyberattack incidents. Moreover, researchers should
consider limiting the amount of data created and delivered when using big data
to develop IoT-based smart systems. The findings of this review will stimulate
academics to seek potential solutions for the identified issues, thereby
advancing the IoT field.Comment: 77 pages, 5 figures, 5 table
Security Threats Classification in Blockchains
Blockchain, the foundation of Bitcoin, has become one of the most popular technologies to create and manage digital transactions recently. It serves as an immutable ledger which allows transactions take place in a decentralized manner. This expeditiously evolving technology has the potential to lead to a shift in thinking about digital transactions in multiple sectors including, Internet of Things, healthcare, energy, supply chain, manufacturing, cybersecurity and principally financial services. However, this emerging technology is still in its infancy. Despite the huge opportunities blockchain offers, it suffers from challenges and limitation such as scalability, security, and privacy, compliance, and governance issues that have not yet been thoroughly explored and addressed. Although there are some studies on the security and privacy issues of the blockchain, they lack a systematic examination of the security of blockchain systems. This research conducted a systematic survey of the security threats to the blockchain systems and reviewed the existing vulnerabilities in the Blockchain. These vulnerabilities lead to the execution of the various security threats to the normal functionality of the Blockchain platforms. Moreover, the study provides a case-study for each attack by examining the popular blockchain systems and also reviews possible countermeasures which could be used in the development of various blockchain systems. Furthermore, this study developed taxonomies that classified the security threats and attacks based on the blockchain abstract layers, blockchain primary processes and primary business users. This would assist the developers and businesses to be attentive to the existing threats in different areas of the blockchain-based platforms and plan accordingly to mitigate risk. Finally, summarized the critical open challenges, and suggest future research directions
Location proof systems for smart internet of things:Requirements, taxonomy, and comparative analysis
Recommended from our members
Blockchain Technology and its Applications Across Multiple Domains: A Survey
Blockchain technology has become an active area of research and a technological option for many businesses and industrial communities. With its distributed, decentralized, and trustless nature, blockchain can provide businesses with new opportunities and benefits through increased efficiency, reduced costs, enhanced integrity and transparency, better security, and improved traceability. Although blockchain’s largest applications have been in the finance and banking sector, we now see experiments and proposed applications in different fields. This paper provides an overview of blockchain technology; it brings together all the key design features, characteristics, and benefits of blockchain that make it a superior and unique technology, and it presents the popular consensus protocols and taxonomy of blockchain systems. Additionally, the paper surveys blockchain-based applications across multiple domains such as in finance, insurance, supply chain management, energy, advertising and media, real estate and healthcare. It aims at examining the industries’ key issues, blockchain solutions and use cases. The paper highlights three broad limitations that blockchain technology presents: scalability, security, and regulation, and shows how these challenges could impact blockchain application and adoption
- …