SS-DID: A secure and scalable Web3 decentralized identity utilizing multi-layer sharding blockchain

Y Liu, B Zhao, Z Zhao, J Liu, X Lin… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
Web3 is a revolutionary Internet paradigm that focusing decentralization, user
empowerment, and intelligence. One of its key technologies is decentralized identity (DID) …

A Reputation-Enhanced Shard-Based Byzantine Fault-Tolerant Scheme for Secure Data Sharing in Zero Trust Human Digital Twin Systems

SD Okegbile, J Cai, J Chen, C Yi - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
Secure data sharing is imperative in human digital twin (HDT) systems due to the continuous
communication requirements among physical and virtual twins, making data security and …

[HTML][HTML] Dissecting zero trust: research landscape and its implementation in IoT

C Liu, R Tan, Y Wu, Y Feng, Z Jin, F Zhang, Y Liu, Q Liu - Cybersecurity, 2024 - Springer
As a progressive security strategy, the zero trust model has attracted notable attention and
importance within the realm of network security, especially in the context of the Internet of …

A Secure Interconnected Autonomous System Architecture for Multi-Domain IoT Ecosystems

R Xu, D Nagothu, Y Chen, A Aved… - IEEE …, 2024 - ieeexplore.ieee.org
The rapid merge of Artificial Intelligence (AI), Internet of Things (IoT), and Blockchain
technologies atop the fifth generation and beyond (B5G) communication networks is …

BAZAM: A Blockchain-Assisted Zero-Trust Authentication in Multi-UAV Wireless Networks

M Xie, Z Chang, O Alfarraj, K Yu, T Chen… - arXiv preprint arXiv …, 2024 - arxiv.org
Unmanned aerial vehicles (UAVs) are vulnerable to interception and attacks when operated
remotely without a unified and efficient identity authentication. Meanwhile, the openness of …

[PDF][PDF] Shard-based and Reputation-enhanced Byzantine Fault-tolerant Scheme for Secure Data Sharing in Latency-sensitive Computing Services

S Okegbile, J Cai, J Chen, C Yi - Authorea Preprints, 2023 - techrxiv.org
Shard-based and Reputation-enhanced Byzantine Fault-tolerant Scheme for Secure Data
Sharing in Latency-sensitive Computing Servi Page 1 P osted on 14 Jun 2020 — CC-BY …

Analysis of the Demodulation Performance of Space-Based ADS-B Signals

X Li, X Zhang, Y Tan - 2023 IEEE 8th International Conference …, 2023 - ieeexplore.ieee.org
Space-based Automatic Dependent Surveillance-Broadcast (ADS-B) technology has
become a new research hotspot in the field of aviation surveillance due to its global …

Surveillance Application Analysis of Beihang Aviation Satellite-1

Y Tan, X Zhang, X Li, Y Zheng - 2023 IEEE 8th International …, 2023 - ieeexplore.ieee.org
With the rapid development of air traffic control (ATC) globalization, the space-based ADS-B
system has attracted extensive research in the field of ATC because of its global coverage …

Cross-Domain Data Compliance Flow Mechanisms: A Robust Sidechain and Relay Chain Integration Approach in Blockchain

S Peng, Q Feng, D Sun, L Zhu, S Chen… - Proceedings of the 3rd …, 2024 - eudl.eu
In response to the challenges of cross-domain data compliance circulation across various
trust domains and ensuring the cross-domain exchange of private data, this study constructs …