Special Issues
Table of Content

Security, Privacy and Trust Management for IoT-based Blockchain

Submission Deadline: 31 August 2022 (closed) View: 171

Guest Editors

Dr. Farhan Ullah, Northwestern Polytechnical University, China.
Dr. Sohail Jabbar, The University of Faisalabad, Pakistan.
Dr. Xiaochun Cheng, Middlesex University, UK.
Dr. Leonardo Mostarda, Camerino University, Italy.

Summary

The Internet of Things (IoT) is a network of physical objects (devices, vehicles, buildings, and other items) that are equipped with electronics, software, sensors, and network connectivity to process and analyze data. Massive overhead costs, concerns about centralized data control, and single points of failure are significantly reduced by moving IoT from a centralized data server architecture to a trustless, distributed peer-to-peer network. Currently, Blockchain is one of the most promising and effective technologies for enabling a trusted, secure, and distributed IoT ecosystem. Blockchain-based systems combine cryptography, public key infrastructure, and economic modeling to obtain distributed database synchronization through peer-to-peer networking and decentralized consensus. Security and privacy, as well as maintenance costs and support for time-critical IoT applications, are all factors to consider. The widespread acceptance of Blockchain for a trusted and secure environment highlights the concept that IoT requires Blockchain and vice versa. In addition, blockchain provides solutions to IoT impediments such as resilience, adaptability, trust, security, and privacy, as well as lower maintenance costs and less support for time-critical IoT applications. The more the digital twin emerges, the greater the risk and challenges in terms of the trust, security, and privacy. IoT, machine learning, artificial intelligence, and software analytics are, without a doubt, critical components of this technological transformation. This technical integration also poses a range of obstacles.

The key components of a trusted environment are immutability, transparency, fault tolerance, and security is not to be overlooked. Access control, availability and confidentiality, lightweight security and privacy, forensic, data integrity, management and storage, and performance and scalability analysis are among the most highlighted challenges from the trust, security, and privacy perspectives. Cyber attacks, ransomware, data breaches, and financial information breaches are the most common types of breaches. It must do so to build a long-term, trust-based data economy. A new data regulation following the General Data Protection Regulation (GDPR) is now in effect, requiring any organization handling personal data of EU citizens, regardless of location, to comply.

This Special Issue invites theoretical and applied cutting-edge research on standards, frameworks, models, and approaches for security, privacy, and trust management in the diverse and long list of Internet of Things applications. Being an active agent in the current technological revolution, the role of Blockchain from this solutions paradigm can't be separated. The research work should also address the solutions considering the synergistic mating environment of IoT and Blockchain. Articles covering innovations in tools and techniques for a secured decentralized paradigm of IoT, especially using Blockchain and its emergence in the fabrics of life, are also welcome. Topics of Interest include but not limited to are:

 

• Use cases, threat models, protocols, and assisting technologies of IoT and Blockchain Access control, authentication, firewalls, and intrusion detection for networks of smart objects

• Secure collective decision-making and adaptation

• Interface development and Lightweight data structure

• Secure software architectures and middleware in an integrated environment of IoT and Blockchain

• Privacy and anonymity in the IoT through Blockchain and other solutions: threats, mechanisms, guarantees, and policing

• Security, privacy, and trust management in an integrated environment of a digital twin for social networking, energy, smart grid, logistics and supply chain, monetization and e-business, notarization and e-government, healthcare, commerce, insurance, finance and banking, education, learning, crowdsourcing and crowdsensing, and other applications

• Trust, security, and privacy by design and its preserving

• Trust models for the IoT: policy specification, maintenance, and dynamics

• Legal, social and ethical issues in the IoT – in both developed and developing countries

• Forensic analysis of IoT crime scenes

• IoT Cybercrime and digital investigation

• Smart algorithms extending machine learning, artificial intelligence, and deep learning for a trusted environment of digital Twin

Tools, techniques, and algorithms for software analytics in digital twin applications


Keywords

Privacy, Security, IoT, Blockchain, Cyber Intelligence

Published Papers


  • Open Access

    ARTICLE

    Smart Shoes Safety System for the Blind People Based on (IoT) Technology

    Ammar Almomani, Mohammad Alauthman, Amal Malkawi, Hadeel Shwaihet, Batool Aldigide, Donia Aldabeek, Karmen Abu Hamoodeh
    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 415-436, 2023, DOI:10.32604/cmc.2023.036266
    (This article belongs to the Special Issue: Security, Privacy and Trust Management for IoT-based Blockchain)
    Abstract People’s lives have become easier and simpler as technology has proliferated. This is especially true with the Internet of Things (IoT). The biggest problem for blind people is figuring out how to get where they want to go. People with good eyesight need to help these people. Smart shoes are a technique that helps blind people find their way when they walk. So, a special shoe has been made to help blind people walk safely without worrying about running into other people or solid objects. In this research, we are making a new safety system… More >

  • Open Access

    ARTICLE

    A New Multi Chaos-Based Compression Sensing Image Encryption

    Fadia Ali Khan, Jameel Ahmed, Suliman A. Alsuhibany
    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 437-453, 2023, DOI:10.32604/cmc.2023.032236
    (This article belongs to the Special Issue: Security, Privacy and Trust Management for IoT-based Blockchain)
    Abstract The advancements in technology have substantially grown the size of image data. Traditional image encryption algorithms have limited capabilities to deal with the emerging challenges in big data, including compression and noise toleration. An image encryption method that is based on chaotic maps and orthogonal matrix is proposed in this study. The proposed scheme is built on the intriguing characteristics of an orthogonal matrix. Gram Schmidt disperses the values of pixels in a plaintext image by generating a random orthogonal matrix using logistic chaotic map. Following the diffusion process, a block-wise random permutation of the More >

Share Link