Leveraging the usage of blockchain toward trust-dominated manufacturing systems

P Samaha, F El Kalach, R Harik - Journal of Manufacturing Systems, 2024 - Elsevier
Smart manufacturing has transformed the role of data in manufacturing, with a significant
focus on secure data infrastructure. As factories engage with external data sources …

Centrality-Based On-Path Caching Strategies in NDN-Based Internet of Things: A Survey

MA Naeem, IU Din, Y Meng, A Almogren… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
The substantial growth in data volume has led to considerable technological obstacles on
the Internet. In order to address the high volume of Internet traffic, the research community …

The Eternal Tussle: Exploring the Role of Centralization in {IPFS}

Y Wei, D Trautwein, Y Psaras, I Castro, W Scott… - … USENIX Symposium on …, 2024 - usenix.org
Web centralization and consolidation has created potential single points of failure, eg, in
areas such as content hosting, name resolution, and certification. The" Decentralized Web" …

[HTML][HTML] Blockchain-based model for incentivized cyber threat intelligence sharing

A Venčkauskas, V Jusas, D Barisas, B Misnevs - Applied Sciences, 2024 - mdpi.com
Sharing cyber threat intelligence (CTI) can significantly improve the security of information
technology (IT) in organizations. However, stakeholders and practitioners are not keen on …

Protecting the decentralized future: An exploration of common blockchain attacks and their countermeasures

B Saha, MM Hasan, N Anjum, S Tahora… - arxiv preprint arxiv …, 2023 - arxiv.org
Blockchain technology transformed the digital sphere by providing a transparent, secure,
and decentralized platform for data security across a range of industries, including …

Tit-for-Token: fair rewards for moving data in decentralized storage networks

VH Lakhani, L Jehl, G Ishmaev… - arxiv preprint arxiv …, 2023 - arxiv.org
Centralized data silos are not only becoming prohibitively expensive but also raise issues of
data ownership and data availability. These developments are affecting the industry …

A comprehensive survey on machine learning techniques in opportunistic networks: Advances, challenges and future directions

J Gandhi, Z Narmawala - Pervasive and Mobile Computing, 2024 - Elsevier
Abstract Machine Learning (ML) is growing in popularity and is applied in numerous fields to
solve complex problems. Opportunistic Networks are a type of Ad-hoc Network where a …

StealthPath: Privacy-preserving Path Validation in the Data Plane of Path-Aware Networks

J Li, Y Su, R Lu, Z Su, W Meng… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Network path validation aims to give more control over the forwarding path of data packets in
a path-aware network, which shields the network from security threats and allows end hosts …

Blockchain-enabled auction for cloud resource provisioning: a survey on trust and economy

R Singhal, V Sharma, I Singhal, V Bansal - International Journal of System …, 2024 - Springer
Blockchain has become a game-changing technology in the dynamic world of technological
breakthroughs, offering a variety of benefits to enterprises. The blockchain-enabled auction …

Incentive Mechanism for Resource Trading in Video Analytic Services Using Reinforcement Learning

N He, S Yang, F Li, L Zhu, L Sun… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Video analytics play a pivotal role in enhancing the safety of intelligent surveillance and
autonomous driving. However, the transmission of vast video data and the computational …