[go: up one dir, main page]

 
 
sensors-logo

Journal Browser

Journal Browser

Blockchain for IoT Security, Privacy and Intelligence

A special issue of Sensors (ISSN 1424-8220). This special issue belongs to the section "Internet of Things".

Deadline for manuscript submissions: closed (31 October 2023) | Viewed by 50821

Special Issue Editor


E-Mail Website
Guest Editor
Department of Electronic Engineering, Sogang University, Seoul 04107, Republic of Korea
Interests: blockchain; IoT; mobile networks; mobility; algorithms

Special Issue Information

Dear Colleagues,

The Internet of Things (IoT) is exploding in research and industry, with IoT technologies quickly maturing in smart homes, smart farms, smart factories and smart cities. Diverse IoT devices generate a huge volume of IoT data vulnerable to tampering, hacking and even denial of services. This vulnerability comes from heterogeneity in protocols and operating systems and slow adoption of global standards. However, most IoT devices are too constrained in terms of processing and communication ability to accommodate conventional security and privacy schemes.

The vast data generated from the huge number of interconnected IoT devices can be best analyzed with Artificial Intelligence (AI) for problem-solving or decision-making. In return, IoT provides ample data essential for AI such as machine learning. Thus, IoT and AI are inseparable.

Blockchain is a promising technology for providing security and privacy for constrained IoT devices. Unlike conventional security schemes, which focus on the path traversed by data, blockchain focuses on the protection of data themselves, providing immutability and authentication. This makes blockchain an outstanding candidate for IoT security and privacy, since most IoT data traverse diverse and vulnerable paths interconnecting distributed IoT devices.

This Special Issue addresses the innovative developments, technologies and challenges related to blockchain, security, privacy and intelligence for the IoT. The Special Issue is seeking the latest findings from research and ongoing projects. Additionally, review articles that provide readers with current research trends and solutions are also welcome. Potential topics include but are not limited to:

  • Blockchain-based security and privacy for IoT
  • Blockchain technology for IoT
  • Blockchain and AI for IoT
  • Mobile blockchain for IoT
  • Software platforms for security in IoT
  • Edge/fog computing for security and privacy in IoT
  • IoT applications based on blockchain technology
  • Evaluation and experimental analysis of blockchain IoT applications
  • Blockchain, security and privacy for the Internet of Vehicles
  • Blockchain, security, privacy and AI for IoT healthcare systems
  • AI-based technologies for security and privacy of future IoT
  • AI-based technologies for measurement and management of future IoT
  • Blockchain and AI for smart cities, smart homes, smart health and industrial IoT
  • AI for fraud detection and forensics in blockchain

Prof. Dr. Ju Wook Jang
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • blockchain
  • IoT
  • security
  • privacy
  • Artificial Intelligence

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (11 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Jump to: Review

19 pages, 444 KiB  
Article
Blockchain-Based Data Access Control and Key Agreement System in IoT Environment
by JoonYoung Lee, MyeongHyun Kim, KiSung Park, SungKee Noh, Abhishek Bisht, Ashok Kumar Das and Youngho Park
Sensors 2023, 23(11), 5173; https://doi.org/10.3390/s23115173 - 29 May 2023
Cited by 3 | Viewed by 2351
Abstract
Recently, with the increasing application of the Internet of Things (IoT), various IoT environments such as smart factories, smart homes, and smart grids are being generated. In the IoT environment, a lot of data are generated in real time, and the generated IoT [...] Read more.
Recently, with the increasing application of the Internet of Things (IoT), various IoT environments such as smart factories, smart homes, and smart grids are being generated. In the IoT environment, a lot of data are generated in real time, and the generated IoT data can be used as source data for various services such as artificial intelligence, remote medical care, and finance, and can also be used for purposes such as electricity bill generation. Therefore, data access control is required to grant access rights to various data users in the IoT environment who need such IoT data. In addition, IoT data contain sensitive information such as personal information, so privacy protection is also essential. Ciphertext-policy attribute-based encryption (CP-ABE) technology has been utilized to address these requirements. Furthermore, system structures applying blockchains with CP-ABE are being studied to prevent bottlenecks and single failures of cloud servers, as well as to support data auditing. However, these systems do not stipulate authentication and key agreement to ensure the security of the data transmission process and data outsourcing. Accordingly, we propose a data access control and key agreement scheme using CP-ABE to ensure data security in a blockchain-based system. In addition, we propose a system that can provide data nonrepudiation, data accountability, and data verification functions by utilizing blockchains. Both formal and informal security verifications are performed to demonstrate the security of the proposed system. We also compare the security, functional aspects, and computational and communication costs of previous systems. Furthermore, we perform cryptographic calculations to analyze the system in practical terms. As a result, our proposed protocol is safer against attacks such as guessing attacks and tracing attacks than other protocols, and can provide mutual authentication and key agreement functions. In addition, the proposed protocol is more efficient than other protocols, so it can be applied to practical IoT environments. Full article
(This article belongs to the Special Issue Blockchain for IoT Security, Privacy and Intelligence)
Show Figures

Figure 1

Figure 1
<p>Proposed system model (author’s own processing).</p>
Full article ">Figure 2
<p>Authentication and key agreement phase (author’s own processing).</p>
Full article ">Figure 3
<p>Formation of a block on the transactions by <span class="html-italic">CS</span> (author’s own processing).</p>
Full article ">Figure 4
<p>HLPSL specification for user (Author’s own processing).</p>
Full article ">Figure 5
<p>Simulation results on OFMC and CL-AtSe.</p>
Full article ">
33 pages, 1202 KiB  
Article
Toward Trusted IoT by General Proof-of-Work
by Chih-Wen Hsueh and Chi-Ting Chin
Sensors 2023, 23(1), 15; https://doi.org/10.3390/s23010015 - 20 Dec 2022
Cited by 1 | Viewed by 1798
Abstract
Internet of Things (IoT) is used to describe devices with sensors that connect and exchange data with other devices or systems on the Internet or other communication networks. Actually, the data not only represent the concrete things connected but also describe the abstract [...] Read more.
Internet of Things (IoT) is used to describe devices with sensors that connect and exchange data with other devices or systems on the Internet or other communication networks. Actually, the data not only represent the concrete things connected but also describe the abstract matters related. Therefore, it is expected to support trust on IoT since blockchain was invented so that trusted IoT could be possible or, recently, even metaverse could be imaginable. However, IoT systems are usually composed of a lot of device nodes with limited computing power. The built-in unsolved performance and energy-consumption problems in blockchain become more critical in IoT. The other problems such as finality, privacy, or scalability introduce even more complexity so that trusted IoT is still far from realization, let alone the metaverse. With general Proof of Work (GPoW), the energy consumption of Bitcoin can be reduced to less than 1 billionth and proof of PowerTimestamp (PoPT) can be constructed so that a global even ordering can be reached to conduct synchronization on distributed systems in real-time. Therefore, trusted IoT is possible. We reintroduce GPoW with more mathematic proofs so that PoPT can be optimal and describe how PoPT can be realized with simulation results, mining examples and synchronization scenario toward trusted IoT. Full article
(This article belongs to the Special Issue Blockchain for IoT Security, Privacy and Intelligence)
Show Figures

Figure 1

Figure 1
<p>Network architecture for blockchain-based IoT.</p>
Full article ">Figure 2
<p>Mining by proof-of-work.</p>
Full article ">Figure 3
<p>Mining flow of conservative GPoW model.</p>
Full article ">Figure 4
<p>Mining flow of aggressive GPoW model.</p>
Full article ">Figure 5
<p>CDF is the CDF of conservative GPoW, <math display="inline"><semantics> <mrow> <msubsup> <mo>∑</mo> <mrow> <mi>i</mi> <mo>=</mo> <mi>m</mi> </mrow> <mi>n</mi> </msubsup> <mfenced separators="" open="(" close=")"> <mfrac linethickness="0pt"> <mrow> <mi>i</mi> <mo>−</mo> <mn>1</mn> </mrow> <mrow> <mi>m</mi> <mo>−</mo> <mn>1</mn> </mrow> </mfrac> </mfenced> <msup> <mi>u</mi> <mi>m</mi> </msup> <msup> <mrow> <mo>(</mo> <mn>1</mn> <mo>−</mo> <mi>u</mi> <mo stretchy="false">)</mo> </mrow> <mrow> <mi>i</mi> <mo>−</mo> <mi>m</mi> </mrow> </msup> </mrow> </semantics></math>, and aggressive GPoW, <math display="inline"><semantics> <mrow> <msubsup> <mo>∑</mo> <mrow> <mi>i</mi> <mo>=</mo> <mi>m</mi> </mrow> <mi>n</mi> </msubsup> <mfenced separators="" open="(" close=")"> <mfrac linethickness="0pt"> <mi>n</mi> <mi>i</mi> </mfrac> </mfenced> <msup> <mi>u</mi> <mi>i</mi> </msup> <msup> <mrow> <mo>(</mo> <mn>1</mn> <mo>−</mo> <mi>u</mi> <mo stretchy="false">)</mo> </mrow> <mrow> <mi>n</mi> <mo>−</mo> <mi>i</mi> </mrow> </msup> </mrow> </semantics></math>, overlapped, <span class="html-italic">n</span> = 50, <span class="html-italic">m</span> = 2. Conservative = <math display="inline"><semantics> <mrow> <msubsup> <mo>∑</mo> <mrow> <mi>i</mi> <mo>=</mo> <mi>m</mi> </mrow> <mrow> <mi>m</mi> <mo>+</mo> <mn>3</mn> </mrow> </msubsup> <mfenced separators="" open="(" close=")"> <mfrac linethickness="0pt"> <mrow> <mi>i</mi> <mo>−</mo> <mn>1</mn> </mrow> <mrow> <mi>m</mi> <mo>−</mo> <mn>1</mn> </mrow> </mfrac> </mfenced> <msup> <mi>u</mi> <mi>m</mi> </msup> <msup> <mrow> <mo>(</mo> <mn>1</mn> <mo>−</mo> <mi>u</mi> <mo stretchy="false">)</mo> </mrow> <mrow> <mi>i</mi> <mo>−</mo> <mi>m</mi> </mrow> </msup> </mrow> </semantics></math> and Aggressive = <math display="inline"><semantics> <mrow> <msubsup> <mo>∑</mo> <mrow> <mi>i</mi> <mo>=</mo> <mi>m</mi> </mrow> <mrow> <mi>m</mi> <mo>+</mo> <mn>3</mn> </mrow> </msubsup> <mfenced separators="" open="(" close=")"> <mfrac linethickness="0pt"> <mi>n</mi> <mi>i</mi> </mfrac> </mfenced> <msup> <mrow> <mo>(</mo> <mi>x</mi> <mo stretchy="false">)</mo> </mrow> <mi>i</mi> </msup> <msup> <mrow> <mo>(</mo> <mn>1</mn> <mo>−</mo> <mi>x</mi> <mo stretchy="false">)</mo> </mrow> <mrow> <mi>n</mi> <mo>−</mo> <mi>i</mi> </mrow> </msup> </mrow> </semantics></math>.</p>
Full article ">Figure 6
<p>Formula of trust.</p>
Full article ">Figure 7
<p>CDF is the CDF of conservative GPoW, <math display="inline"><semantics> <mrow> <msubsup> <mo>∑</mo> <mrow> <mi>i</mi> <mo>=</mo> <mi>m</mi> </mrow> <mi>n</mi> </msubsup> <mfenced separators="" open="(" close=")"> <mfrac linethickness="0pt"> <mrow> <mi>i</mi> <mo>−</mo> <mn>1</mn> </mrow> <mrow> <mi>m</mi> <mo>−</mo> <mn>1</mn> </mrow> </mfrac> </mfenced> <msup> <mi>u</mi> <mi>m</mi> </msup> <msup> <mrow> <mo>(</mo> <mn>1</mn> <mo>−</mo> <mi>u</mi> <mo stretchy="false">)</mo> </mrow> <mrow> <mi>i</mi> <mo>−</mo> <mi>m</mi> </mrow> </msup> </mrow> </semantics></math>, and aggressive GPoW, <math display="inline"><semantics> <mrow> <msubsup> <mo>∑</mo> <mrow> <mi>i</mi> <mo>=</mo> <mi>m</mi> </mrow> <mi>n</mi> </msubsup> <mfenced separators="" open="(" close=")"> <mfrac linethickness="0pt"> <mi>n</mi> <mi>i</mi> </mfrac> </mfenced> <msup> <mi>u</mi> <mi>i</mi> </msup> <msup> <mrow> <mo>(</mo> <mn>1</mn> <mo>−</mo> <mi>u</mi> <mo stretchy="false">)</mo> </mrow> <mrow> <mi>n</mi> <mo>−</mo> <mi>i</mi> </mrow> </msup> </mrow> </semantics></math>, overlapped, <span class="html-italic">n</span> = 50. Conservative = <math display="inline"><semantics> <mrow> <mfenced separators="" open="(" close=")"> <mfrac linethickness="0pt"> <mrow> <mi>i</mi> <mo>−</mo> <mn>1</mn> </mrow> <mrow> <mi>m</mi> <mo>−</mo> <mn>1</mn> </mrow> </mfrac> </mfenced> <msup> <mi>u</mi> <mi>m</mi> </msup> <msup> <mrow> <mo>(</mo> <mn>1</mn> <mo>−</mo> <mi>u</mi> <mo stretchy="false">)</mo> </mrow> <mrow> <mi>i</mi> <mo>−</mo> <mi>m</mi> </mrow> </msup> </mrow> </semantics></math> and Aggressive = <math display="inline"><semantics> <mrow> <mfenced separators="" open="(" close=")"> <mfrac linethickness="0pt"> <mi>n</mi> <mi>i</mi> </mfrac> </mfenced> <msup> <mrow> <mo>(</mo> <mi>x</mi> <mo stretchy="false">)</mo> </mrow> <mi>i</mi> </msup> <msup> <mrow> <mo>(</mo> <mn>1</mn> <mo>−</mo> <mi>x</mi> <mo stretchy="false">)</mo> </mrow> <mrow> <mi>n</mi> <mo>−</mo> <mi>i</mi> </mrow> </msup> </mrow> </semantics></math> are the components of CDF, respectively. X axis is target. Y axis is CDF.</p>
Full article ">Figure 8
<p>GPoW mining with partitions of the same parent.</p>
Full article ">Figure 9
<p>GPoW mining with all in one partition.</p>
Full article ">Figure 10
<p>GPoW mining with 2-block epoch.</p>
Full article ">Figure 11
<p>Liquidity saving transactions in blockchain.</p>
Full article ">
31 pages, 941 KiB  
Article
Secure Decentralized IoT Service Platform Using Consortium Blockchain
by Ruipeng Zhang, Chen Xu and Mengjun Xie
Sensors 2022, 22(21), 8186; https://doi.org/10.3390/s22218186 - 26 Oct 2022
Cited by 3 | Viewed by 3357
Abstract
Although many studies have been devoted to integrating blockchain into IoT device management, access control, data integrity, security, and privacy, blockchain-facilitated IoT communication is still much less studied. Blockchain has great potential in decentralizing and securing IoT communications. In this paper, we propose [...] Read more.
Although many studies have been devoted to integrating blockchain into IoT device management, access control, data integrity, security, and privacy, blockchain-facilitated IoT communication is still much less studied. Blockchain has great potential in decentralizing and securing IoT communications. In this paper, we propose an innovative IoT service platform powered by the consortium blockchain technology. The proposed platform abstracts machine-to-machine (M2M) and human-to-machine (H2M) communications into services provided by IoT devices. Then, it materializes the data exchange of the IoT network through smart contracts and blockchain transactions. Additionally, we introduce the auxiliary storage layer to the proposed platform to address various off-chain data storage needs. Our proof-of-concept implementation was tested against various workloads and connection sizes under different block configurations to evaluate the platform’s transaction throughput, latency, and hardware utilization. The experimental results demonstrate that our solution can maintain high performance with a throughput of approximately 800 reads per second (RPS), 50–80 transactions per second (TPS), and a latency of 50 ms–2 s under light to moderate workloads. Our extensive evaluation of the performance impact of batch size, batch timeout, and connection size also provides valuable insights into the optimization of blockchain configuration for achieving high performance. Full article
(This article belongs to the Special Issue Blockchain for IoT Security, Privacy and Intelligence)
Show Figures

Figure 1

Figure 1
<p>Consortium blockchain-based IoT service platform architecture.</p>
Full article ">Figure 2
<p>The life cycle of an IoT device and its service.</p>
Full article ">Figure 3
<p>The proposed multi-layered access control model.</p>
Full article ">Figure 4
<p>Process of communication between an IoT device and application.</p>
Full article ">Figure 5
<p>Auxiliary storage types and applications.</p>
Full article ">Figure 6
<p>The architecture and data flow of Parrot.</p>
Full article ">Figure 7
<p>The architecture and data flow of Crystal Ball.</p>
Full article ">Figure 8
<p>IoT service platform testbed architecture.</p>
Full article ">Figure 9
<p>Throughput and latency of read operations with varying batch sizes.</p>
Full article ">Figure 10
<p>Throughput and latency of transaction operations with varying batch sizes.</p>
Full article ">Figure 11
<p>The average CPU usage (<b>a</b>), average memory usage (<b>b</b>), total data received from the network (<b>c</b>) and sent to the network (<b>d</b>), total data written to disk (<b>e</b>) and read from disk (<b>f</b>) of orderer1 (<span class="html-italic">O</span><sub>1</sub>), orderer2 (<span class="html-italic">O</span><sub>2</sub>), oderer3 (<span class="html-italic">O</span><sub>3</sub>), org1 peer1 (<span class="html-italic">P</span><sub>11</sub>), org1 peer2 (<span class="html-italic">P</span><sub>12</sub>), org2 peer1 (<span class="html-italic">P</span><sub>21</sub>), and org2 peer2 (<span class="html-italic">P</span><sub>22</sub>) during read operations when <math display="inline"><semantics> <msub> <mi>S</mi> <mrow> <mi>s</mi> <mi>o</mi> <mi>f</mi> <mi>t</mi> </mrow> </msub> </semantics></math> = 2 MB.</p>
Full article ">Figure 12
<p>The average CPU usage (<b>a</b>), average memory usage (<b>b</b>), total data received from the network (<b>c</b>) and sent to the network (<b>d</b>), total data written to disk (<b>e</b>) and read from disk (<b>f</b>) of orderer1 (<span class="html-italic">O</span><sub>1</sub>), orderer2 (<span class="html-italic">O</span><sub>2</sub>), oderer3 (<span class="html-italic">O</span><sub>3</sub>), org1 peer1 (<span class="html-italic">P</span><sub>11</sub>), org1 peer2 (<span class="html-italic">P</span><sub>12</sub>), org2 peer1 (<span class="html-italic">P</span><sub>21</sub>), and org2 peer2 (<span class="html-italic">P</span><sub>22</sub>) during read operations when <math display="inline"><semantics> <msub> <mi>S</mi> <mrow> <mi>s</mi> <mi>o</mi> <mi>f</mi> <mi>t</mi> </mrow> </msub> </semantics></math> = 2 MB.</p>
Full article ">Figure 13
<p>The average CPU and memory usage (<b>a</b>), total data received from and sent to the network (<b>b</b>), total data written to and read from disk (<b>c</b>) of orderer and peer nodes for handling “querying a service request“ operations with varying batch sizes.</p>
Full article ">Figure 14
<p>The average CPU and memory usage (<b>a</b>), total data received from and sent to the network (<b>b</b>), total data written to and read from disk (<b>c</b>) of orderer and peer nodes for handling “requesting for service“ operations with varying batch sizes.</p>
Full article ">Figure 15
<p>Throughput and latency of read operations for varying batch timeouts.</p>
Full article ">Figure 16
<p>Throughput and latency of transaction operations for varying batch timeouts.</p>
Full article ">Figure 17
<p>The average CPU and memory usage (<b>a</b>), total data received from and sent to the network (<b>b</b>), total data written to and read from disk (<b>c</b>) of orderer and peer nodes for handling “querying a service request” operations with varying batch timeouts.</p>
Full article ">Figure 18
<p>The average CPU and memory usage (<b>a</b>), total data received from and sent to the network (<b>b</b>), total data written to and read from disk (<b>c</b>) of orderer and peer nodes for handling “requesting for service” operations with varying batch timeouts.</p>
Full article ">Figure 19
<p>Throughput and latency of read and transaction operations for 10 client connections (10×) and 2000 client connections (2000×).</p>
Full article ">Figure 20
<p>Average system resource utilization of orderer and peer nodes for 10 client connections (10×) and 2000 client connections (2000×).</p>
Full article ">
20 pages, 7752 KiB  
Article
LBSS: A Lightweight Blockchain-Based Security Scheme for IoT-Enabled Healthcare Environment
by Omar Said
Sensors 2022, 22(20), 7948; https://doi.org/10.3390/s22207948 - 18 Oct 2022
Cited by 13 | Viewed by 2063
Abstract
Recently, global healthcare has made great progress with the use of Internet of Things technology. However, for there to be excellent patient care, there must be a high degree of safety for the IoT health system. There has been a massive increase in [...] Read more.
Recently, global healthcare has made great progress with the use of Internet of Things technology. However, for there to be excellent patient care, there must be a high degree of safety for the IoT health system. There has been a massive increase in hacking systems and the theft of sensitive and highly confidential information from large health centers and hospitals. That is why establishing a highly secure and reliable healthcare system has become a top priority. In this paper, a security scheme for the IoT-enabled healthcare environment, LBSS, is proposed. This security scheme comprises three security mechanisms. The first mechanism is based on the blockchain technology and is used for transaction integrity. The second mechanism is used to store the healthcare system data in a secure manner through the distribution of its data records among multiple servers. The third mechanism is used to access the healthcare data after applying a proposed authorization test. To minimize the security overhead, the healthcare data is prioritized in regard to its importance. Therefore, each security mechanism has specific steps for each level of data importance. Finally, the NS3 package is used to construct a simulation environment for IoT-enabled healthcare systems to measure the proposed security scheme performance. The simulation results proved that the proposed healthcare security scheme outperformed the traditional models in regard to the performance metrics. Full article
(This article belongs to the Special Issue Blockchain for IoT Security, Privacy and Intelligence)
Show Figures

Figure 1

Figure 1
<p>The three mechanisms of the proposed security scheme.</p>
Full article ">Figure 2
<p>The levels of data importance for data combined with things.</p>
Full article ">Figure 3
<p>Data priority center, data blocks, and miners’ relationship.</p>
Full article ">Figure 4
<p>Using simple and complex hash functions.</p>
Full article ">Figure 5
<p>The general view of data distribution over servers.</p>
Full article ">Figure 6
<p>Prioritizer and slicer relationship.</p>
Full article ">Figure 7
<p>Healthcare data access mechanism.</p>
Full article ">Figure 8
<p>Simulation scenario with networks and coverage tools parameters.</p>
Full article ">Figure 9
<p>Processing time for transaction integrity.</p>
Full article ">Figure 10
<p>Changing the number of miners over a time.</p>
Full article ">Figure 11
<p>Energy consumption average.</p>
Full article ">Figure 12
<p>Throughput average.</p>
Full article ">Figure 13
<p>End-to-end delay average.</p>
Full article ">Figure 14
<p>Packet loss ratio.</p>
Full article ">Figure 15
<p>Average consumption time that is required to access healthcare data.</p>
Full article ">Figure 16
<p>Number of transactions with different levels of importance.</p>
Full article ">
20 pages, 584 KiB  
Article
Improving Ponzi Scheme Contract Detection Using Multi-Channel TextCNN and Transformer
by Yizhou Chen, Heng Dai, Xiao Yu, Wenhua Hu, Zhiwen Xie and Cheng Tan
Sensors 2021, 21(19), 6417; https://doi.org/10.3390/s21196417 - 26 Sep 2021
Cited by 34 | Viewed by 4151
Abstract
With the development of blockchain technologies, many Ponzi schemes disguise themselves under the veil of smart contracts. The Ponzi scheme contracts cause serious financial losses, which has a bad effect on the blockchain. Existing Ponzi scheme contract detection studies have mainly focused on [...] Read more.
With the development of blockchain technologies, many Ponzi schemes disguise themselves under the veil of smart contracts. The Ponzi scheme contracts cause serious financial losses, which has a bad effect on the blockchain. Existing Ponzi scheme contract detection studies have mainly focused on extracting hand-crafted features and training a machine learning classifier to detect Ponzi scheme contracts. However, the hand-crafted features cannot capture the structural and semantic feature of the source code. Therefore, in this study, we propose a Ponzi scheme contract detection method called MTCformer (Multi-channel Text Convolutional Neural Networks and Transofrmer). In order to reserve the structural information of the source code, the MTCformer first converts the Abstract Syntax Tree (AST) of the smart contract code to the specially formatted code token sequence via the Structure-Based Traversal (SBT) method. Then, the MTCformer uses multi-channel TextCNN (Text Convolutional Neural Networks) to learn local structural and semantic features from the code token sequence. Next, the MTCformer employs the Transformer to capture the long-range dependencies of code tokens. Finally, a fully connected neural network with a cost-sensitive loss function in the MTCformer is used for classification. The experimental results show that the MTCformer is superior to the state-of-the-art methods and its variants in Ponzi scheme contract detection. Full article
(This article belongs to the Special Issue Blockchain for IoT Security, Privacy and Intelligence)
Show Figures

Figure 1

Figure 1
<p>The overall workflow of our proposed MTCformer.</p>
Full article ">Figure 2
<p>The feature learning process of the MTCformer.</p>
Full article ">Figure 3
<p>The SBT process.</p>
Full article ">
22 pages, 757 KiB  
Article
Security and Privacy for Mobile IoT Applications Using Blockchain
by Kevin Carvalho and Jorge Granjal
Sensors 2021, 21(17), 5931; https://doi.org/10.3390/s21175931 - 3 Sep 2021
Cited by 9 | Viewed by 3651
Abstract
Internet of Things (IoT) applications are becoming more integrated into our society and daily lives, although many of them can expose the user to threats against their privacy. Therefore, we find that it is crucial to address the privacy requirements of most of [...] Read more.
Internet of Things (IoT) applications are becoming more integrated into our society and daily lives, although many of them can expose the user to threats against their privacy. Therefore, we find that it is crucial to address the privacy requirements of most of such applications and develop solutions that implement, as far as possible, privacy by design in order to mitigate relevant threats. While in the literature we may find innovative proposals to enhance the privacy of IoT applications, many of those only focus on the edge layer. On the other hand, privacy by design approaches are required throughout the whole system (e.g., at the cloud layer), in order to guarantee robust solutions to privacy in IoT. With this in mind, we propose an architecture that leverages the properties of blockchain, integrated with other technologies, to address security and privacy in the context of IoT applications. The main focus of our proposal is to enhance the privacy of the users and their data, using the anonymisation properties of blockchain to implement user-controlled privacy. We consider an IoT application with mobility for smart vehicles as our usage case, which allows us to implement and experimentally evaluate the proposed architecture and mechanisms as a proof of concept. In this application, data related to the user’s identity and location needs to be shared with security and privacy. Our proposal was implemented and experimentally validated in light of fundamental privacy and security requirements, as well as its performance. We found it to be a viable approach to security and privacy in IoT environments. Full article
(This article belongs to the Special Issue Blockchain for IoT Security, Privacy and Intelligence)
Show Figures

Figure 1

Figure 1
<p>An architecture for security and privacy in mobile IoT applications.</p>
Full article ">Figure 2
<p>Overview of the system’s processes.</p>
Full article ">Figure 3
<p>Vehicle user’s ACL definition.</p>
Full article ">Figure 4
<p>Exchange of the symmetric key with authorised users.</p>
Full article ">Figure 5
<p>Data published by a sensor controller to be stored in Storj and in the blockchain.</p>
Full article ">Figure 6
<p>Data access request by an authorised node of the public blockchain.</p>
Full article ">Figure 7
<p>Data erasure request.</p>
Full article ">Figure 8
<p>System architecture of the experimental evaluation scenario.</p>
Full article ">Figure 9
<p>Time overhead measured in the sensor controller with mean values.</p>
Full article ">Figure 10
<p>Resource consumption measured in the smart contract proxy with mean values.</p>
Full article ">Figure 11
<p>Time overhead measured in the agent with mean values.</p>
Full article ">Figure 12
<p>Resource consumption measured in the MQTT broker with mean values.</p>
Full article ">
29 pages, 1293 KiB  
Article
A Scheduling Mechanism Based on Optimization Using IoT-Tasks Orchestration for Efficient Patient Health Monitoring
by Naeem Iqbal, Imran, Shabir Ahmad, Rashid Ahmad and Do-Hyeun Kim
Sensors 2021, 21(16), 5430; https://doi.org/10.3390/s21165430 - 11 Aug 2021
Cited by 28 | Viewed by 4313
Abstract
Over the past years, numerous Internet of Things (IoT)-based healthcare systems have been developed to monitor patient health conditions, but these traditional systems do not adapt to constraints imposed by revolutionized IoT technology. IoT-based healthcare systems are considered mission-critical applications whose missing deadlines [...] Read more.
Over the past years, numerous Internet of Things (IoT)-based healthcare systems have been developed to monitor patient health conditions, but these traditional systems do not adapt to constraints imposed by revolutionized IoT technology. IoT-based healthcare systems are considered mission-critical applications whose missing deadlines cause critical situations. For example, in patients with chronic diseases or other fatal diseases, a missed task could lead to fatalities. This study presents a smart patient health monitoring system (PHMS) based on an optimized scheduling mechanism using IoT-tasks orchestration architecture to monitor vital signs data of remote patients. The proposed smart PHMS consists of two core modules: a healthcare task scheduling based on optimization and optimization of healthcare services using a real-time IoT-based task orchestration architecture. First, an optimized time-constraint-aware scheduling mechanism using a real-time IoT-based task orchestration architecture is developed to generate autonomous healthcare tasks and effectively handle the deployment of emergent healthcare tasks. Second, an optimization module is developed to optimize the services of the e-Health industry based on objective functions. Furthermore, our study uses Libelium e-Health toolkit to monitors the physiological data of remote patients continuously. The experimental results reveal that an optimized scheduling mechanism reduces the tasks starvation by 14% and tasks failure by 17% compared to a conventional fair emergency first (FEF) scheduling mechanism. The performance analysis results demonstrate the effectiveness of the proposed system, and it suggests that the proposed solution can be an effective and sustainable solution towards monitoring patient’s vital signs data in the IoT-based e-Health domain. Full article
(This article belongs to the Special Issue Blockchain for IoT Security, Privacy and Intelligence)
Show Figures

Figure 1

Figure 1
<p>Proposed architecture of Smart patient health monitoring systems (PHMS).</p>
Full article ">Figure 2
<p>Task Orchestration Architecture for Efficient Tasks Allocation in Smart PHMS.</p>
Full article ">Figure 3
<p>Basic flow of automatic generation of health tasks.</p>
Full article ">Figure 4
<p>Flow of the proposed time-constraint aware scheduling mechanism.</p>
Full article ">Figure 5
<p>Experimental testbed of proposed smart PHMS.</p>
Full article ">Figure 6
<p>Visualization of healthcare tasks reading data using different sensors.</p>
Full article ">Figure 7
<p>Performance analysis of proposed architecture in terms of round trip time.</p>
Full article ">Figure 8
<p>Statistical analysis of healthcare executed tasks per second.</p>
Full article ">Figure 9
<p>Latency of healthcare tasks deployment.</p>
Full article ">Figure 10
<p>Performance analysis of event and periodic healthcare tasks in terms of Response Time.</p>
Full article ">Figure 11
<p>Performance analysis of event and periodic healthcare tasks in terms of Response Time.</p>
Full article ">Figure 12
<p>Comparative Analysis of Actual and Optimized Sensors Failure Recovery Time (m).</p>
Full article ">Figure 13
<p>Comparative Analysis of Actual and Optimized Sensors Failure Frequency (Annually).</p>
Full article ">
19 pages, 1994 KiB  
Article
A Scalable Implementation of Anonymous Voting over Ethereum Blockchain
by Jae-Geun Song, Sung-Jun Moon and Ju-Wook Jang
Sensors 2021, 21(12), 3958; https://doi.org/10.3390/s21123958 - 8 Jun 2021
Cited by 21 | Viewed by 3564
Abstract
We considered scalable anonymous voting on the Ethereum blockchain. We identified three major bottlenecks in implementation: (1) division overflow in encryption of voting values for anonymity; (2) large time complexity in tallying, which limited scalability in the number of candidates and voters; and [...] Read more.
We considered scalable anonymous voting on the Ethereum blockchain. We identified three major bottlenecks in implementation: (1) division overflow in encryption of voting values for anonymity; (2) large time complexity in tallying, which limited scalability in the number of candidates and voters; and (3) tallying failure due to “no votes” from registered voters. Previous schemes failed at tallying if one (or more) registered voters did not send encrypted voting values. Algorithmic solutions and implementation details are provided. An experiment using Truffle and Remix running on a desktop PC was performed for evaluation. Our scheme shows great reduction in gas, which measures the computational burden of smart contracts to be executed on Ethereum. For instance, our scheme consumed 1/53 of the gas compared to a state-of-the-art solution for 60 voters. Time complexity analysis shows that our scheme is asymptotically superior to known solutions. In addition, we propose a solution to the tallying failure due to the “no vote” from registered voters. Full article
(This article belongs to the Special Issue Blockchain for IoT Security, Privacy and Intelligence)
Show Figures

Figure 1

Figure 1
<p>Division error in computing <math display="inline"><semantics> <mrow> <mstyle displaystyle="true"> <mo>∏</mo> <mrow> <msup> <mi>g</mi> <mrow> <msub> <mi>x</mi> <mi>i</mi> </msub> <msub> <mi>y</mi> <mi>i</mi> </msub> </mrow> </msup> </mrow> </mstyle> <mi>mod</mi> <mi>p</mi> </mrow> </semantics></math>.</p>
Full article ">Figure 2
<p>Comparison: the number of allowed candidates for our scheme against previous schemes (number of voters <span class="html-italic">n</span> = 60).</p>
Full article ">Figure 3
<p>Comparison of the number of allowed voters when there are two candidates for our scheme against previous schemes (number of candidates <span class="html-italic">k</span> = 2).</p>
Full article ">Figure 4
<p>Comparison of the maximum number of allowed voters for our scheme against [<a href="#B6-sensors-21-03958" class="html-bibr">6</a>] (number of candidates <span class="html-italic">k</span> = 10).</p>
Full article ">Figure 5
<p>Comparison of the gas costs for a tallying transaction in our scheme against McCorry, Shahandahti, and Hao [<a href="#B1-sensors-21-03958" class="html-bibr">1</a>] and Hao, Ryan, and Zieliński [<a href="#B6-sensors-21-03958" class="html-bibr">6</a>].</p>
Full article ">Figure 6
<p>Gas cost for a tallying transaction in our scheme as the number of candidates (<span class="html-italic">k</span>) increases.</p>
Full article ">Figure 7
<p>Number of possible tally combinations increases for Hao, Ryan, and Zieliński [<a href="#B6-sensors-21-03958" class="html-bibr">6</a>], and Baudron et al. [<a href="#B7-sensors-21-03958" class="html-bibr">7</a>].</p>
Full article ">Figure 8
<p>Number of computations for tallying in our scheme as the number of candidates (<span class="html-italic">k</span>) grows.</p>
Full article ">Figure 9
<p>Comparison of the number of computations for our scheme against [<a href="#B6-sensors-21-03958" class="html-bibr">6</a>].</p>
Full article ">
27 pages, 15291 KiB  
Article
A Smart Contract-Based P2P Energy Trading System with Dynamic Pricing on Ethereum Blockchain
by Jae Geun Song, Eung seon Kang, Hyeon Woo Shin and Ju Wook Jang
Sensors 2021, 21(6), 1985; https://doi.org/10.3390/s21061985 - 11 Mar 2021
Cited by 34 | Viewed by 6680
Abstract
We implement a peer-to-peer (P2P) energy trading system between prosumers and consumers using a smart contract on Ethereum blockchain. The smart contract resides on a blockchain shared by participants and hence guarantees exact execution of trade and keeps immutable transaction records. It removes [...] Read more.
We implement a peer-to-peer (P2P) energy trading system between prosumers and consumers using a smart contract on Ethereum blockchain. The smart contract resides on a blockchain shared by participants and hence guarantees exact execution of trade and keeps immutable transaction records. It removes high cost and overheads needed against hacking or tampering in traditional server-based P2P energy trade systems. The salient features of our implementation include: 1. Dynamic pricing for automatic balancing of total supply and total demand within a microgrid, 2. prevention of double sale, 3. automatic and autonomous operation, 4. experiment on a testbed (Node.js and web3.js API to access Ethereum Virtual Machine on Raspberry Pis with MATLAB interface), and 5. simulation via personas (virtual consumers and prosumers generated from benchmark). Detailed description of our implementation is provided along with state diagrams and core procedures. Full article
(This article belongs to the Special Issue Blockchain for IoT Security, Privacy and Intelligence)
Show Figures

Figure 1

Figure 1
<p>Comparison of our pricing model (solid red line) with (<span class="html-italic">k</span> = 3) against Chekired et al. [<a href="#B13-sensors-21-01985" class="html-bibr">13</a>] (dotted blue line), with <math display="inline"><semantics> <mrow> <msub> <mi>p</mi> <mrow> <mi>b</mi> <mi>a</mi> <mi>l</mi> <mi>a</mi> <mi>n</mi> <mi>c</mi> <mi>e</mi> </mrow> </msub> <mtext> </mtext> </mrow> </semantics></math>= 100, <math display="inline"><semantics> <mrow> <msub> <mi>p</mi> <mrow> <mi>c</mi> <mi>o</mi> <mi>n</mi> </mrow> </msub> </mrow> </semantics></math> = 30. (<b>a</b>) <math display="inline"><semantics> <mrow> <mi>R</mi> <mfenced> <mi>t</mi> </mfenced> <mo>=</mo> <mfenced> <mrow> <msup> <mrow> <mn>10</mn> </mrow> <mrow> <mo>−</mo> <mn>1</mn> </mrow> </msup> <mo>,</mo> <msup> <mrow> <mn>10</mn> </mrow> <mn>1</mn> </msup> </mrow> </mfenced> </mrow> </semantics></math> (<b>b</b>) <math display="inline"><semantics> <mrow> <mi>R</mi> <mfenced> <mi>t</mi> </mfenced> <mo>=</mo> <mfenced> <mrow> <mn>0.2</mn> <mo>×</mo> <msup> <mrow> <mn>10</mn> </mrow> <mrow> <mo>−</mo> <mn>2</mn> </mrow> </msup> <mo>,</mo> <mn>5</mn> <mo>×</mo> <msup> <mrow> <mn>10</mn> </mrow> <mn>2</mn> </msup> </mrow> </mfenced> </mrow> </semantics></math>.</p>
Full article ">Figure 2
<p>The proposed dynamic pricing with varying <span class="html-italic">k</span> (<math display="inline"><semantics> <mrow> <msub> <mi>p</mi> <mrow> <mi>b</mi> <mi>a</mi> <mi>l</mi> <mi>a</mi> <mi>n</mi> <mi>c</mi> <mi>e</mi> </mrow> </msub> <mo>=</mo> <mn>100</mn> <mo>,</mo> <mtext> </mtext> <msub> <mi>p</mi> <mrow> <mi>c</mi> <mi>o</mi> <mi>n</mi> </mrow> </msub> <mo>=</mo> <mn>30</mn> <mo stretchy="false">)</mo> </mrow> </semantics></math>.</p>
Full article ">Figure 3
<p>A state diagram for prosumer <span class="html-italic">i</span> in phase <span class="html-italic">t</span> = 0, 1, 2, 3 and 4 of energy trading.</p>
Full article ">Figure 4
<p>A state diagram for consumer <span class="html-italic">j</span> in phase <span class="html-italic">t</span> = 0, 1, 2, 3 and 4 of energy trading.</p>
Full article ">Figure 5
<p>The software architecture of proposed peer-to-peer (P2P) energy trading implementation on a private Ethereum blockchain.</p>
Full article ">Figure 6
<p>Illustration of change in the energy ownership in accordance with trading procedures.</p>
Full article ">Figure 6 Cont.
<p>Illustration of change in the energy ownership in accordance with trading procedures.</p>
Full article ">Figure 7
<p>Example of aggregation of multiple elements: (<b>a</b>) Before aggregation and (<b>b</b>) after aggregation.</p>
Full article ">Figure 8
<p>Prevent double sale by keeping the states of energy inside a smart contract.</p>
Full article ">Figure 9
<p>Appending an element to the energy ownership structure after energy injection.</p>
Full article ">Figure 10
<p>The process of payment between prosumers and consumers in the energy trading.</p>
Full article ">Figure 11
<p>An illustration of (<math display="inline"><semantics> <mrow> <mi>i</mi> <mo>.</mo> <mi>S</mi> <mi>u</mi> <mi>p</mi> <mi>p</mi> <mi>l</mi> <mi>y</mi> <mfenced> <mi>t</mi> </mfenced> </mrow> </semantics></math> or <math display="inline"><semantics> <mrow> <mi>j</mi> <mo>.</mo> <mi>D</mi> <mi>e</mi> <mi>m</mi> <mi>a</mi> <mi>n</mi> <mi>d</mi> <mfenced> <mi>t</mi> </mfenced> </mrow> </semantics></math>) vs. <math display="inline"><semantics> <mrow> <mi>p</mi> <mfenced> <mrow> <mi>t</mi> <mo>−</mo> <mn>1</mn> </mrow> </mfenced> </mrow> </semantics></math>.</p>
Full article ">Figure 12
<p><math display="inline"><semantics> <mrow> <mi>p</mi> <mfenced> <mi>t</mi> </mfenced> </mrow> </semantics></math> vs. <math display="inline"><semantics> <mrow> <mi>R</mi> <mfenced> <mi>t</mi> </mfenced> </mrow> </semantics></math> using Equation (6), <math display="inline"><semantics> <mrow> <msub> <mi>p</mi> <mrow> <mi>b</mi> <mi>a</mi> <mi>l</mi> <mi>a</mi> <mi>n</mi> <mi>c</mi> <mi>e</mi> </mrow> </msub> <mo> </mo> </mrow> </semantics></math>= 150 and <math display="inline"><semantics> <mrow> <msub> <mi>p</mi> <mrow> <mi>c</mi> <mi>o</mi> <mi>n</mi> </mrow> </msub> </mrow> </semantics></math> = 100, (<b>a</b>) <span class="html-italic">k</span> = 3, (<b>b</b>) <span class="html-italic">k</span> = 5 and (<b>c</b>) <span class="html-italic">k</span> = 7.</p>
Full article ">Figure 13
<p>Our testbed for experiment of our P2P energy trading on Ethereum blockchain.</p>
Full article ">Figure 14
<p>Testbed for experimentation.</p>
Full article ">Figure 15
<p>A GUI built with MATLAB for experimentation.</p>
Full article ">Figure 16
<p>Progressive gas consumption of our system compared against Galal and Youssef [<a href="#B29-sensors-21-01985" class="html-bibr">29</a>].</p>
Full article ">
32 pages, 6071 KiB  
Article
An Autonomous Log Storage Management Protocol with Blockchain Mechanism and Access Control for the Internet of Things
by Chien-Lung Hsu, Wei-Xin Chen and Tuan-Vinh Le
Sensors 2020, 20(22), 6471; https://doi.org/10.3390/s20226471 - 12 Nov 2020
Cited by 20 | Viewed by 4103
Abstract
As the Internet of Things (IoT) has become prevalent, a massive number of logs produced by IoT devices are transmitted and processed every day. The logs should contain important contents and private information. Moreover, these logs may be used as evidences for forensic [...] Read more.
As the Internet of Things (IoT) has become prevalent, a massive number of logs produced by IoT devices are transmitted and processed every day. The logs should contain important contents and private information. Moreover, these logs may be used as evidences for forensic investigations when cyber security incidents occur. However, evidence legality and internal security issues in existing works were not properly addressed. This paper proposes an autonomous log storage management protocol with blockchain mechanism and access control for the IoT. Autonomous model allows sensors to encrypt their logs before sending it to gateway and server, so that the logs are not revealed to the public during communication process. Along with blockchain, we introduce the concept “signature chain”. The integration of blockchain and signature chain provides efficient management functions with valuable security properties for the logs, including robust identity verification, data integrity, non-repudiation, data tamper resistance, and the legality. Our work also employs attribute-based encryption to achieve fine-grained access control and data confidentiality. The results of security analysis using AVSIPA toolset, GNY logic and semantic proof indicate that the proposed protocol meets various security requirements. Providing good performance with elliptic curve small key size, short BLS signature, efficient signcryption method, and single sign-on solution, our work is suitable for the IoT. Full article
(This article belongs to the Special Issue Blockchain for IoT Security, Privacy and Intelligence)
Show Figures

Figure 1

Figure 1
<p>System model of the proposed protocol.</p>
Full article ">Figure 2
<p>Private blockchain and signature chain in our system model.</p>
Full article ">Figure 3
<p>HLPLS specification of user role.</p>
Full article ">Figure 3 Cont.
<p>HLPLS specification of user role.</p>
Full article ">Figure 4
<p>HLPLS specification of attribute authority role.</p>
Full article ">Figure 5
<p>HLPLS specification of sensor role.</p>
Full article ">Figure 6
<p>HLPLS specification of session role.</p>
Full article ">Figure 7
<p>HLPLS specification of environment role.</p>
Full article ">Figure 8
<p>Verification results using OFMC and CL-AtSe backends.</p>
Full article ">Figure 9
<p>Total computation cost of the proposed protocol: (<b>a</b>) <math display="inline"><semantics> <mrow> <mi>n</mi> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>m</mi> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math>; (<b>b</b>) <math display="inline"><semantics> <mrow> <mi>n</mi> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>i</mi> <mo>=</mo> <mn>3</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 10
<p>Access policy <math display="inline"><semantics> <mrow> <mi>B</mi> <msub> <mi>F</mi> <mn>1</mn> </msub> </mrow> </semantics></math> of <math display="inline"><semantics> <mrow> <mi>S</mi> <mi>e</mi> <mi>n</mi> <mi>s</mi> <mi>o</mi> <msub> <mi>r</mi> <mn>1</mn> </msub> </mrow> </semantics></math>.</p>
Full article ">Figure 11
<p>Setting of our implementation.</p>
Full article ">Figure 12
<p>Device configuration.</p>
Full article ">Figure 13
<p>Account generated by SSO server.</p>
Full article ">Figure 14
<p>Blockchain server management interface.</p>
Full article ">Figure 15
<p>Table of registered devices.</p>
Full article ">Figure 16
<p>Private blocks within the chain.</p>
Full article ">Figure 17
<p>Data stored in a private block.</p>
Full article ">Figure 18
<p>Data stored in a public block.</p>
Full article ">

Review

Jump to: Research

19 pages, 1670 KiB  
Review
The Impact of Artificial Intelligence on Data System Security: A Literature Review
by Ricardo Raimundo and Albérico Rosário
Sensors 2021, 21(21), 7029; https://doi.org/10.3390/s21217029 - 23 Oct 2021
Cited by 24 | Viewed by 10438
Abstract
Diverse forms of artificial intelligence (AI) are at the forefront of triggering digital security innovations based on the threats that are arising in this post-COVID world. On the one hand, companies are experiencing difficulty in dealing with security challenges with regard to a [...] Read more.
Diverse forms of artificial intelligence (AI) are at the forefront of triggering digital security innovations based on the threats that are arising in this post-COVID world. On the one hand, companies are experiencing difficulty in dealing with security challenges with regard to a variety of issues ranging from system openness, decision making, quality control, and web domain, to mention a few. On the other hand, in the last decade, research has focused on security capabilities based on tools such as platform complacency, intelligent trees, modeling methods, and outage management systems in an effort to understand the interplay between AI and those issues. the dependence on the emergence of AI in running industries and shaping the education, transports, and health sectors is now well known in the literature. AI is increasingly employed in managing data security across economic sectors. Thus, a literature review of AI and system security within the current digital society is opportune. This paper aims at identifying research trends in the field through a systematic bibliometric literature review (LRSB) of research on AI and system security. the review entails 77 articles published in the Scopus® database, presenting up-to-date knowledge on the topic. the LRSB results were synthesized across current research subthemes. Findings are presented. the originality of the paper relies on its LRSB method, together with an extant review of articles that have not been categorized so far. Implications for future research are suggested. Full article
(This article belongs to the Special Issue Blockchain for IoT Security, Privacy and Intelligence)
Show Figures

Figure 1

Figure 1
<p>Subthemes/network of all keywords of AI—source: own elaboration.</p>
Full article ">Figure 2
<p>Number of documents by year. Source: own elaboration.</p>
Full article ">Figure 3
<p>Evolution and number of citations between 2010 and 2021. Source: own elaboration.</p>
Full article ">Figure 4
<p>Network of linked keywords. Source: own elaboration.</p>
Full article ">
Back to TopTop