[HTML][HTML] A survey on the adoption of blockchain in iot: Challenges and solutions

MA Uddin, A Stranieri, I Gondal… - Blockchain: Research …, 2021 - Elsevier
Abstract Conventional Internet of Things (IoT) ecosystems involve data streaming from
sensors, through Fog devices to a centralized Cloud server. Issues that arise include privacy …

A comprehensive taxonomy of schemes to detect and mitigate blackhole attack and its variants in MANETs

N Khanna, M Sachdeva - Computer Science Review, 2019 - Elsevier
Abstract Mobile Ad hoc Network due to its intrinsic properties of mobility, infrastructure-less
working and vulnerability of underlined standard routing protocols is exposed to various …

Secure and efficient data accessibility in blockchain based healthcare systems

V Ramani, T Kumar, A Bracken… - 2018 IEEE Global …, 2018 - ieeexplore.ieee.org
The healthcare industry is constantly reforming and adopting new shapes with respect to the
technological evolutions and transitions. One of the crucial requirements in the current smart …

An efficient privacy-preserving aggregation scheme for multidimensional data in IoT

C Peng, M Luo, H Wang, MK Khan… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) enables terminal devices connecting with the Internet and provides
various intelligent applications by analyzing devices data. As a typical IoT technique, edge …

A formal treatment of deterministic wallets

P Das, S Faust, J Loss - Proceedings of the 2019 ACM SIGSAC …, 2019 - dl.acm.org
In cryptocurrencies such as Bitcoin or Ethereum, users control funds via secret keys. To
transfer funds from one user to another, the owner of the money signs a new transaction that …

RKA security for identity-based signature scheme

J Chang, H Wang, F Wang, A Zhang, Y Ji - IEEE Access, 2020 - ieeexplore.ieee.org
Related-key attack (RKA) is a kind of side-channel attack considered for kinds of
cryptographic primitives, such as public key encryption, digital signature, pseudorandom …

Blockchain vulnerabilities in practice

N Amiet - Digital Threats: Research and Practice, 2021 - dl.acm.org
Blockchains are not invulnerable. There are known vulnerabilities in various blockchain
ecosystem components. This field note describes some vulnerabilities observed in smart …

CSP-E2: An abuse-free contract signing protocol with low-storage TTP for energy-efficient electronic transaction ecosystems

G Xu, Y Zhang, AK Sangaiah, X Li, A Castiglione… - Information …, 2019 - Elsevier
In an increasingly connected world, energy efficiency has become a significant problem.
Online electronic transactions are booming based on shopping convenience, fast payments …

Deterministic wallets in a quantum world

N Alkeilani Alkadri, P Das, A Erwig, S Faust… - Proceedings of the …, 2020 - dl.acm.org
Most blockchain solutions are susceptible to quantum attackers as they rely on cryptography
that is known to be insecure in the presence of quantum adversaries. In this work we …

Efficient certificateless online/offline signature scheme for wireless body area networks

C Peng, M Luo, L Li, KKR Choo… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Wireless body area networks (WBANs) have become more commonplace, including in
healthcare settings. For example, in a healthcare WBAN deployment, body sensor units …