With the increased reliance of enterprises on cloud storage solutions for data management, maintaining safe and efficient storage while emphasizing privacy protection is crucial. With an emphasis on user privacy, this...
详细信息
The complexity of the entire process of supply chain management (SCM) is quite cumbersome and traditional way of handling it is devoid of proper authentication and security and very often suffers from human errors in ...
详细信息
The complexity of the entire process of supply chain management (SCM) is quite cumbersome and traditional way of handling it is devoid of proper authentication and security and very often suffers from human errors in dealing with flaws in quality control process of SCM. While it may have started with shipment tracking, the outcome of using IoT on supply chains has spread to every link in the chain. For instance, manufacturers are employing Internet-enabled sensors in production to find product faults, resulting in higher-quality production runs. Physical Unclonable Function (PUF) is a security mechanism that exploits the unique, unrepeatable physical characteristics of hardware components to generate distinct cryptographic keys or identifiers, typically for a semiconductor device like an Internet of Things (IoT) device. The unique identification of IoT devices along the supply chain is implemented by using PUFs as tamper-resistant IDs. Blockchain, the distributed, immutable ledger, on the other hand is the disruptive technology that provides higher security as compared to traditional centralized systems. The integration of PUF and blockchain proves to be quite interesting while handling the above issues of authentication. A smart contract on the blockchain is a software code that executes spontaneously as and when the conditions of the contract or agreement are satisfied. Hence after authentication process the results are fed to blockchain smart contract for the final validation. This paper presents a novel permissioned blockchain smart contract-based lightweight authentication scheme for SCM using PUF of IoT known as SPUFChain. Informal and formal security analysis (using AVISPA and BAN logic) of the proposed framework show its potential to combat several attack scenarios like man-in-the middle, non-repudiation, impersonation, replay attacks and many other security features as compared to other related schemes. The processing time (~13.8ms) is better than existing
Feature selection is a cornerstone in advancing the accuracy and efficiency of predictive models, particularly in nuanced domains like socio-economic analysis. This study explores nine distinct feature selection metho...
详细信息
In the cloud-assisted Industrial Internet of Things (IIoT), flexible and secure data sharing promotes industry processes optimization and new products-making. To enable selective data retrieval over categorized data c...
详细信息
The optimization of civil engineering structures is critical for enhancing structural performance and material efficiency in engineering *** optimization approaches seek to determine the optimal design,by considering ...
详细信息
The optimization of civil engineering structures is critical for enhancing structural performance and material efficiency in engineering *** optimization approaches seek to determine the optimal design,by considering material performance,cost,and structural *** design approaches aim to reduce the built environment’s energy use and carbon *** comprehensive review examines optimization techniques,including size,shape,topology,and multi-objective approaches,by integrating these *** trends and advancements that contribute to developing more efficient,cost-effective,and reliable structural designs were *** review also discusses emerging technologies,such as machine learning applications with different optimization *** of truss,frame,tensegrity,reinforced concrete,origami,pantographic,and adaptive structures are covered and *** techniques are explained,including metaheuristics,genetic algorithm,particle swarm,ant-colony,harmony search algorithm,and their applications with mentioned structure *** and non-linear structures,including geometric and material nonlinearity,are *** role of optimization in active structures,structural design,seismic design,form-finding,and structural control is taken into account,and the most recent techniques and advancements are mentioned.
Wireless Sensor Networks (WSNs) are vital for applications like environmental monitoring and smart cities, but effective node deployment remains challenging. Traditional methods often fail in dynamic scenarios. This p...
详细信息
This paper introduces an innovative approach utilizing a deep neural network (DNN) to optimize the modulation scheme for time-modulated antenna array to verify specific side lobe and maximum harmonics levels. The prop...
详细信息
This study investigates the utilization of the You Only Look Once (YOLOv8) deep learning framework for accurately identifying the location of brain tumors in medical imaging. We investigate the effects of model size a...
详细信息
In today’s globalized world, people from different parts of the world often communicate with each other for various reasons, such as business, travel, or personal interactions. However, language differences can creat...
详细信息
The given paper introduces a multi-staged AI-driven intrusion prevention system (IPS) that utilizes mathematical foundations like statistical analysis, probabilistic models, and optimization techniques to design strat...
详细信息
暂无评论