scholarly journals Supporting connectivity of VANET/MANET network nodes and elastic software-configurable security services using blockchain with floating genesis block

2018 ◽  
Vol 44 ◽  
pp. 00020 ◽  
Author(s):  
Alexey Busygin ◽  
Maxim Kalinin ◽  
Artem Konoplev

This paper considers the tasks of supporting the connectivity of nodes in communication networks of unmanned transport (VANET/MANET-networks). High dynamics, decentralization and absence of hierarchy in the networks of this type actualize the task of supporting the connectivity of nodes with software-configurable security services, providing the network protection. It is offered to use a Blockchain technology based system for VANET/MANET network topologyand authentication data distribution and storage. The issue of unlimited blockchain growth preventing this method from being implemented in VANET/MANET networks is considered. The existing solutions of this issueare analyzed and drawbacks are identified. A notion of blockchain with floating genesis block is introduced and its advantages over similar ideas are demonstrated thus allowing it to be used to resolve the issue of continuously growing blockchain within the systems with stalingtransactions as a whole and in VANET/MANET networks in particular.

2018 ◽  
Vol 2018 ◽  
pp. 1-10 ◽  
Author(s):  
Yongjun Ren ◽  
Yepeng Liu ◽  
Sai Ji ◽  
Arun Kumar Sangaiah ◽  
Jin Wang

In this paper, the blockchain technology is utilized to build the first incentive mechanism of nodes as per data storage for wireless sensor networks (WSNs). In our system, the nodes storing the data are rewarded with digital money. The more the data stored by the node, the more the reward it achieves. Moreover, two blockchains are constructed. One is utilized to store data of each node and another is to control the access of data. In addition, our proposal adopts the provable data possession to replace the proof of work (PoW) in original bitcoins to carry out the mining and storage of new data blocks, which greatly reduces the computing power comparing to the PoW mechanism. Furthermore, the preserving hash functions are used to compare the stored data and the new data block. The new data can be stored in the node which is closest to the existing data, and only the different subblocks are stored. Thus, it can greatly save the storage space of network nodes.


Logistics ◽  
2021 ◽  
Vol 5 (2) ◽  
pp. 37
Author(s):  
Serkan Alacam ◽  
Asli Sencer

In the global trucking industry, vertical collaboration between shippers and carriers is attained by intermediaries, called brokers. Brokers organize carriers for a shipper in accordance with its quality and price requirements, and support carriers to collaborate horizontally by sharing a large distribution order from a shipper. Brokers also act as trustees, preventing the passing of private information of any party to the others. Despite these benefits, intermediaries in the trucking industry are involved in several sustainability problems, including high costs, high levels of carbon emissions, high percentages of empty miles, low-capacity utilizations, and driver shortages. Several studies have acknowledged the importance of improving collaboration to address these problems. Obviously, the major concern of brokers is not collaboration, but rather to optimize their own gains. This paper investigates the potential of blockchain technology to improve collaboration in the trucking industry, by eliminating brokers while preserving their responsibilities as organizers and trustees. This paper extends the transportation control tower concept from the logistics literature, and presents a system architecture for its implementation through smart contracts on a blockchain network. In the proposed system, the scalability and privacy of trucking operations are ensured through integration with privacy-preserving off-chain computation and storage solutions (running outside of the blockchain). The potential of this design artifact for fostering collaboration in the trucking industry was evaluated by both blockchain technology experts and trucking industry professionals.


2018 ◽  
Author(s):  
Mian Zhang ◽  
Yuhong Ji

A problem facing healthcare record systems throughout the world is how to share the medical data with more stakeholders for various purposes without sacrificing data privacy and integrity. Blockchain, operating in a state of consensus, is the underpinning technology that maintains the Bitcoin transaction ledger. Blockchain as a promising technology to manage the transactions has been gaining popularity in the domain of healthcare. Blockchain technology has the potential of securely, privately, and comprehensively manage patient health records. In this work, we discuss the latest status of blockchain technology and how it could solve the current issues in healthcare systems. We evaluate the blockchain technology from the multiple perspectives around healthcare data, including privacy, security, control, and storage. We review the current projects and researches of blockchain in the domain of healthcare records and provide the insight into the design and construction of next generations of blockchain-based healthcare systems.


Author(s):  
Ting Wang ◽  
Liguo Yu ◽  
Yingmei Li

Blockchain is an information technology solution for distributed digital record. Its main properties are secure, traceable, and transparent. Blockchain was first proposed for bitcoin, a decentralized virtual digital currency. Recently, blockchain draws attentions of researchers, entrepreneurs, and investors, because people found that blockchain technology can revolutionize many business practices. This paper describes the fundamentals of blockchain technology, including data structure, data distribution, and transaction execution and validation. This paper also discusses the representative blockchain protocols and development platforms. In addition, this paper outlines the potential applications of blockchain technology and the broader impact it might bring to industry, business, and beyond.


Author(s):  
Isabel Borges

The combination of Software-Defined Networking (SDN) with Network Functions Virtualization (NFV) approaches is gaining momentum in the Industry as a new way of implementing, managing and controlling telecommunications networks. This chapter aims to go through SDN and lightly over NFV, presenting main characteristics and the standardization work on that technologies. SDN enables programming networks together with the ability to adapt to applications requirements and network dynamics. NFV aims at virtualizing network services by merging several network equipment types onto standard Information Technologies (IT) high volume virtualization technology (switches, servers and storage) located either in data centres, customer premises or network nodes. SDN and NFV interworking ambition is to bring on-demand resource provisioning, resource elasticity, among others with a centralized view of the overall network, able to automatically and dynamically honor service requirements.


2020 ◽  
Vol 39 (4) ◽  
pp. 5027-5036
Author(s):  
You Lu ◽  
Qiming Fu ◽  
Xuefeng Xi ◽  
Zhenping Chen

Data outsourcing has gradually become a mainstream solution, but once data is outsourced, data owners will without the control of the data hardware, there is a possibility that the integrity of the data will be destroyed objectively. Many current studies have achieved low network overhead cloud data set verification by designing algorithmic structures (e.g., hashing, Merkel verification trees); however, cloud service providers may not recognize the incompleteness of cloud data to avoid liability or business factors fact. There is a need to build a secure, reliable, non-tamperable, and non-forgeable verification system for accountability. Blockchain is a chain-like data structure constructed by using data signatures, timestamps, hash functions, and proof-of-work mechanisms. Using blockchain technology to build an integrity verification system can achieve fault accountability. Blockchain is a chain-like data structure constructed by using data signatures, timestamps, hash functions, and proof-of-work mechanisms. Using blockchain technology to build an integrity verification system can achieve fault accountability. This paper uses the Hadoop framework to implement data collection and storage of the HBase system based on big data architecture. In summary, based on the research of blockchain cloud data collection and storage technology, based on the existing big data storage middleware, a large flow, high concurrency and high availability data collection and processing system has been realized.


Sensors ◽  
2019 ◽  
Vol 19 (22) ◽  
pp. 4895
Author(s):  
Maurício R. Silva ◽  
Elitelma S. Souza ◽  
Pablo J. Alsina ◽  
Deyvid L. Leite ◽  
Mateus R. Morais ◽  
...  

This paper presents a communication network for a squadron of unmanned aerial vehicles (UAVs) to be used in the scanning rocket impact area for Barreira do Inferno Launch Center—CLBI (Rio Grande do Norte, Brazil), aiming at detecting intruder boats. The main features of communication networks associated with multi-UAV systems are presented. This system sends information through Wireless Sensor Networks (WSN). After comparing and analyzing area scanning strategies, it presents the specification of a data communication network architecture for a squadron of UAVs within a sensor network using XBee Pro 900HP S3B modules. A brief description is made about the initial information from the construction of the system. The embedded hardware and the design procedure of a dedicated communication antenna to the XBee modules are presented. In order to evaluate the performance of the proposed architecture in terms of robustness and reliability, a set of experimental tests in different communication scenarios is carried out. Network management software is employed to measure the throughput, packet loss and other performance indicators in the communication links between the different network nodes. Experimental results allow verifying the quality and performance of the network nodes, as well as the reliability of the communication links, assessing signal received quality, range and latency.


Author(s):  
Hagen Echzell ◽  
Tobias Friedrich ◽  
Pascal Lenzner ◽  
Anna Melnichenko

Network Creation Games(NCGs) model the creation of decentralized communication networks like the Internet. In such games strategic agents corresponding to network nodes selfishly decide with whom to connect to optimize some objective function. Past research intensively analyzed models where the agents strive for a central position in the network. This models agents optimizing the network for low-latency applications like VoIP. However, with today's abundance of streaming services it is important to ensure that the created network can satisfy the increased bandwidth demand. To the best of our knowledge, this natural problem of the decentralized strategic creation of networks with sufficient bandwidth has not yet been studied. We introduce Flow-Based NCGs where the selfish agents focus on bandwidth instead of latency. In essence, budget-constrained agents create network links to maximize their minimum or average network flow value to all other network nodes. Equivalently, this can also be understood as agents who create links to increase their connectivity and thus also the robustness of the network. For this novel type of NCG we prove that pure Nash equilibria exist, we give a simple algorithm for computing optimal networks, we show that the Price of Stability is 1 and we prove an (almost) tight bound of 2 on the Price of Anarchy. Last but not least, we show that our models do not admit a potential function.


Electronics ◽  
2021 ◽  
Vol 10 (17) ◽  
pp. 2110
Author(s):  
Desire Ngabo ◽  
Dong Wang ◽  
Celestine Iwendi ◽  
Joseph Henry Anajemba ◽  
Lukman Adewale Ajao ◽  
...  

The recent developments in fog computing architecture and cloud of things (CoT) technology includes data mining management and artificial intelligence operations. However, one of the major challenges of this model is vulnerability to security threats and cyber-attacks against the fog computing layers. In such a scenario, each of the layers are susceptible to different intimidations, including the sensed data (edge layer), computing and processing of data (fog (layer), and storage and management for public users (cloud). The conventional data storage and security mechanisms that are currently in use appear to not be suitable for such a huge amount of generated data in the fog computing architecture. Thus, the major focus of this research is to provide security countermeasures against medical data mining threats, which are generated from the sensing layer (a human wearable device) and storage of data in the cloud database of internet of things (IoT). Therefore, we propose a public-permissioned blockchain security mechanism using elliptic curve crypto (ECC) digital signature that that supports a distributed ledger database (server) to provide an immutable security solution, transaction transparency and prevent the patient records tampering at the IoTs fog layer. The blockchain technology approach also helps to mitigate these issues of latency, centralization, and scalability in the fog model.


Sign in / Sign up

Export Citation Format

Share Document