Data sharing and privacy for patient IoT devices using blockchain

G Srivastava, RM Parizi, A Dehghantanha… - … Conference on Smart …, 2019 - Springer
Once a fitness fad, wearable and other related Internet of Things (IoT) devices are fast
becoming common place in many different smart city applications such as healthcare …

Distributed ledger technologies for authentication and access control in networking applications: A comprehensive survey

F Ghaffari, E Bertin, N Crespi, J Hatin - Computer Science Review, 2023 - Elsevier
The accelerated growth of networking technologies highlights the importance of
Authentication and Access Control (AAC) as protection against associated attacks …

Impact of temporary fork on the evolution of mining pools in blockchain networks: An evolutionary game analysis

C Chen, X Chen, J Yu, W Wu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Temporary fork is a fundamental phenomenon in many blockchains with proof of work, and
the analysis of temporary fork has recently drawn great attention. Different from existing …

A novel authentication scheme supporting multiple user access for 5G and beyond

C Lai, Y Ma, R Lu, Y Zhang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The deployment of ultra-dense networks in the fifth-generation (5 G) network architecture
can significantly improve the quality of wireless links, but this will cause frequent handovers …

Security considerations for virtual reality systems

K Viswanathan, A Yazdinejad - arXiv preprint arXiv:2201.02563, 2022 - arxiv.org
There is a growing need for authentication methodology in virtual reality applications.
Current systems assume that the immersive experience technology is a collection of …

Securing SDN-controlled IoT networks through edge blockchain

J Hu, M Reed, N Thomos… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) connected by software-defined networking (SDN) promises to
bring great benefits to cyber-physical systems. However, the increased attack surface …

A machine learning-based sdn controller framework for drone management

A Yazdinejad, E Rabieinejad… - 2021 IEEE …, 2021 - ieeexplore.ieee.org
With the advancement of information and communication technology, Unmanned Aerial
Vehicles (UAV), popularly known as drones, have also increased. The drones have been …

Neuro-fuzzy based handover authentication protocol for ultra dense 5G networks

VO Nyangaresi, AJ Rodrigues… - 2020 2nd Global Power …, 2020 - ieeexplore.ieee.org
Smart grids improve the management of various power network components as well as the
monitoring of power flows. Their deployments require very fast communication channels …

Blockchain Based 5g Heterogeneous Networks Using Privacy Federated Learning with Internet of Things

N Yathiraju - Research Journal of Computer Systems and …, 2022 - technicaljournals.org
Federated learning, which is a distributed machine learning approach for preserving privacy
and is thus widely used in numerous privacy issue applications, is involved in the area …

Evolving requirements and application of SDN and IoT in the context of industry 4.0, blockchain and artificial intelligence

SK Singh, SK Sharma, D Singla… - Software Defined …, 2022 - Wiley Online Library
Today, the world is seeing the fourth industrial revolution. Today, the globe is seeing the
fourth commercial revolution. Internet of Things (IoT) and software‐defined network (SON) …