Special Issues
Table of Content

Distributed Computing with Applications to IoT and BlockChain

Submission Deadline: 08 March 2025 View: 865 Submit to Special Issue

Guest Editors

Prof. Chunjiong Zhang, Ajou University, South Korea
Prof. Tao Xie, Southwest University, China
Prof. Jehad Ali, Ajou University, South Korea

Summary

The increased interest in privacy-driven distributed computations has necessitated greater scrutiny of the security and optimality of these distributions. The Internet of Things (IoT) is a network of heterogeneous digital devices embedded with sensors and software for various automation and monitoring purposes. The power of a blockchain network is that (ideally) every node maintains its own copy of the ledger and takes part in validating the transactions. Integrating IoT and blockchains brings promising applications in many areas, including education, health, finance, agriculture, industry, and the environment. However, the complex, dynamic and heterogeneous computing and communication needs of IoT technologies, optionally integrated by blockchain technologies (if mandated), draw several challenges on scaling, interoperability, and security goals. In recent years, numerous models integrating IoT with blockchain have been proposed, tested, and deployed for businesses. Furthermore, the increased presence of portable smart devices, coupled with the explosive growth in computing power, offers an untapped resource for these computations. Importantly, blockchain technology is an elegant example of distributed computation which decentralizes information. There is no doubt that the implications of blockchain for distributed systems are of profound influence.

 

 

This Special Issue aims to benefit the research community with a collection of articles emphasizing the challenges and solutions to distributed secure computing for models integrating IoT with blockchain. This Special Issue will also focus on state-of-the-art fast and efficient privacy-enhancing techniques for achieving secure distributed computations in IoT and blockchain networks. We welcome both original research articles as well as review articles discussing the current state of the art.

 

In this Special Issue, original research articles and reviews are welcome. Research areas may include (but not limited to) the following:

 

Verifiable computation in outsourced environments in IoT

User authentication and authorization for IoT devices

Secure behaviour modelling of IoT devices

Privacy-enhancing technologies for distributed environments

Privacy-preserving machine learning in smart mobile IoT networks

Integrate blockchain technology with an existing IoT

Distributed key generation with smart contracts

Privacy-preserving smart contracts

Secure storing of secret keys for blockchain wallet

Secure authentication for blockchain wallet

Threshold-optimal signatures and applications to blockchain wallet

Various applications atop blockchain, such as e-voting and e-action


Keywords

Distributed Computing, IoT, Blockchain, Privacy-enhancing Techniques, Verifiable Computation, Smart Contracts, Secure Storage

Published Papers


  • Open Access

    ARTICLE

    An Improved Practical Byzantine Fault-Tolerant Algorithm Based on XGBoost Grouping for Consortium Chains

    Xiaowei Wang, Haiyang Zhang, Jiasheng Zhang, Yingkai Ge, Kexin Cui, Zifu Peng, Zhengyi Li, Lihua Wang
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.058559
    (This article belongs to the Special Issue: Distributed Computing with Applications to IoT and BlockChain)
    Abstract In response to the challenges presented by the unreliable identity of the master node, high communication overhead, and limited network support size within the Practical Byzantine Fault-Tolerant (PBFT) algorithm for consortium chains, we propose an improved PBFT algorithm based on XGBoost grouping called XG-PBFT in this paper. XG-PBFT constructs a dataset by training important parameters that affect node performance, which are used as classification indexes for nodes. The XGBoost algorithm then is employed to train the dataset, and nodes joining the system will be grouped according to the trained grouping model. Among them, the nodes… More >

  • Open Access

    ARTICLE

    IoT-CDS: Internet of Things Cyberattack Detecting System Based on Deep Learning Models

    Monir Abdullah
    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 4265-4283, 2024, DOI:10.32604/cmc.2024.059271
    (This article belongs to the Special Issue: Distributed Computing with Applications to IoT and BlockChain)
    Abstract The rapid growth and pervasive presence of the Internet of Things (IoT) have led to an unparalleled increase in IoT devices, thereby intensifying worries over IoT security. Deep learning (DL)-based intrusion detection (ID) has emerged as a vital method for protecting IoT environments. To rectify the deficiencies of current detection methodologies, we proposed and developed an IoT cyberattacks detection system (IoT-CDS) based on DL models for detecting bot attacks in IoT networks. The DL models—long short-term memory (LSTM), gated recurrent units (GRUs), and convolutional neural network-LSTM (CNN-LSTM) were suggested to detect and classify IoT attacks.… More >

  • Open Access

    ARTICLE

    Research on IPFS Image Copyright Protection Method Based on Blockchain

    Xin Cong, Lanjin Feng, Lingling Zi
    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 663-684, 2024, DOI:10.32604/cmc.2024.054372
    (This article belongs to the Special Issue: Distributed Computing with Applications to IoT and BlockChain)
    Abstract In the digital information age, distributed file storage technologies like the InterPlanetary File System (IPFS) have gained considerable traction as a means of storing and disseminating media content. Despite the advantages of decentralized storage, the proliferation of decentralized technologies has highlighted the need to address the issue of file ownership. The aim of this paper is to address the critical issues of source verification and digital copyright protection for IPFS image files. To this end, an innovative approach is proposed that integrates blockchain, digital signature, and blind watermarking. Blockchain technology functions as a decentralized and… More >

  • Open Access

    ARTICLE

    A Traffic-Aware and Cluster-Based Energy Efficient Routing Protocol for IoT-Assisted WSNs

    Hina Gul, Sana Ullah, Ki-Il Kim, Farman Ali
    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 1831-1850, 2024, DOI:10.32604/cmc.2024.052841
    (This article belongs to the Special Issue: Distributed Computing with Applications to IoT and BlockChain)
    Abstract The seamless integration of intelligent Internet of Things devices with conventional wireless sensor networks has revolutionized data communication for different applications, such as remote health monitoring, industrial monitoring, transportation, and smart agriculture. Efficient and reliable data routing is one of the major challenges in the Internet of Things network due to the heterogeneity of nodes. This paper presents a traffic-aware, cluster-based, and energy-efficient routing protocol that employs traffic-aware and cluster-based techniques to improve the data delivery in such networks. The proposed protocol divides the network into clusters where optimal cluster heads are selected among super… More >

Share Link