32,488 results on '"COMPUTER network protocols"'
Search Results
302. Express Relay, a service offered by Pyth Network, aims to do away with MEV
- Subjects
Computer network protocols ,Protocol ,General interest ,News, opinion and commentary - Abstract
Pyth Network, a provider of real-time market data for onchain applications, has launched Express Relay, a decentralized solution to the problem of maximal extractable value (MEV). Express Relay connects DeFi [...]
- Published
- 2024
303. BlastRADIUS Vulnerability Threatens Corporate Networks and Cloud
- Subjects
Computer networks ,Internet service providers ,Cloud computing ,Information networks ,Computer network protocols ,Protocol ,Internet service provider ,General interest ,News, opinion and commentary - Abstract
OTTAWA: The BlastRADIUS vulnerability announced July 9 by cybersecurity researchers involves the RADIUS protocol which underlies most network connections worldwide. When the researchers discovered this critical vulnerability, their first call [...]
- Published
- 2024
304. OKX Wallet Now Integrated with Solayer
- Subjects
Computer network protocols ,Protocol ,Banking, finance and accounting industries ,Business - Abstract
SINGAPORE, July 06, 2024 (GLOBE NEWSWIRE) -- https://www.okx.com/?ACE514357, a leading Web3 technology company, has issued updates for July 7, 2024. OKX Wallet Now Integrated with Solayer https://www.okx.com/web3 is now integrated [...]
- Published
- 2024
305. Bitoro introduces Injective protocol eternal futures
- Subjects
Futures ,Computer network protocols ,Protocol ,General interest ,News, opinion and commentary - Abstract
Bitoro, a decentralized perpetual futures trading network, has launched its trading protocol on the Injective network, a decentralized blockchain focusing on Web3 financial solutions. The protocol is available on various [...]
- Published
- 2024
306. Stamus Networks Marks Decade of SELKS Open-Source Tool with New Edition
- Subjects
Computer network protocols ,Protocol ,Business ,News, opinion and commentary - Abstract
Free Suricata-based threat detection and hunting platform builds on open-source legacy with powerful new capabilities INDIANAPOLIS and PARIS, June 13, 2024 /PRNewswire/ -- https://c212.net/c/link/?t=0&l=en&o=4189746-1&h=1762649849&u=https%3A%2F%2Fwww.stamus-networks.com%2F%3Futm_source%3DPRNewswire%26utm_medium%3DPR%26utm_campaign%3DSELKS-10-Launch&a=Stamus+Networks, a global provider of high-performance network-based [...]
- Published
- 2024
307. Prime Protocol Integrates With Orderly Network to Launch Revolutionary Omnichain Perpetuals Trading
- Subjects
Computer network protocols ,Protocol ,General interest ,News, opinion and commentary - Abstract
NEW YORK: Orderly Network announces its partnership with Prime Protocol, the first natively cross-chain prime brokerage in Web3. Backed by the infrastructure of Orderly Network, Prime Protocol is set to [...]
- Published
- 2024
308. Prime Protocol Integrates with Orderly Network to Launch Revolutionary Omnichain Perpetuals Trading
- Subjects
Computer network protocols ,Protocol ,Banking, finance and accounting industries ,Business - Abstract
NEW YORK, June 06, 2024 (GLOBE NEWSWIRE) -- Orderly Network is thrilled to announce its partnership with https://www.globenewswire.com/Tracker?data=vAxlSwhfPAwH2A9kScG-g6W548tADTFUMjFOgbHZR37-vi0wqEZDt-PAQgIyF1_mmNGqJl-SUBBQDtezEdU0I2AfbjbrHPkAlIS9nZ0ZiTE=, the first natively cross-chain prime brokerage in Web3. Backed by the infrastructure [...]
- Published
- 2024
309. The team behind Bitcoin Layer 2 Ark protocol found a new company to compete with Lightning Network
- Subjects
Computer network protocols ,Protocol ,General interest ,News, opinion and commentary - Abstract
Bitcoin layer-2 protocol Ark has formed Ark Labs to develop a faster, cheaper payments system on the world's largest blockchain. The company aims to create a better venue than Lightning [...]
- Published
- 2024
310. Flash News: OKX to Support Mina Protocol's Upgrade
- Subjects
Computer network protocols ,Protocol ,Banking, finance and accounting industries ,Business - Abstract
NASSAU, the Bahamas, June 03, 2024 (GLOBE NEWSWIRE) -- https://www.globenewswire.com/Tracker?data=JUIuRO6e3H4gfCYnheSX_DlkYY4MPpA8toZUub8UsnUYHgyOCKEKdfhDxR3XELktMVLJ_eHDP9Hcn0xj6VOsnA==, a leading crypto exchange and Web3 technology company, has issued updates for June 3, 2024. OKX to Support Mina Protocol's [...]
- Published
- 2024
311. 179cw Session Initiation Protocol (sip)
- Subjects
Market surveys ,Computer network protocols ,Public contracts ,Marketing research ,Protocol ,Government contract ,Business, international - Abstract
Sources sought (original): 179cw session initiation protocol (sip) notice: sources sought Solicitation number: w50s8r24r5008 Response date: 13 may 2024 1:00 pm est Naics code: 517111 This announcement constitutes a sources [...]
- Published
- 2024
312. Flare Network to Take Part in Proof of Talk 2024 on June 10th in Paris
- Subjects
Computer network protocols ,Protocol ,General interest ,News, opinion and commentary - Abstract
Flare Network, a distributed protocol that uses the Ethereum Virtual Machine (EVM) to execute Turing-complete smart contracts, is set to participate in the Proof of Talk 2024 conference in Paris. [...]
- Published
- 2024
313. Bitrue Enhances User Experience with USDC & USDT Integration on NEAR Protocol Network
- Subjects
Crypto-currencies ,Computer network protocols ,Protocol ,General interest ,News, opinion and commentary - Abstract
VICTORIA, Seychelles: Bitrue has issued the following press release: Leading cryptocurrency exchange, Bitrue has today announced that it has completed the integration of USD Coin (USDC) and Tether (USDT) on [...]
- Published
- 2024
314. Bitrue Enhances User Experience with USDC & USDT Integration on NEAR Protocol Network
- Subjects
Crypto-currencies ,Computer network protocols ,Protocol ,Business ,News, opinion and commentary - Abstract
VICTORIA, Seychelles, May 9, 2024 /PRNewswire/ -- Leading cryptocurrency exchange, Bitrue has today https://support.bitrue.com/hc/en-001/articles/32231432528793-Exciting-News-Bitrue-Supports-the-USDT-USDC-On-the-NEAR-Protocol-Network that it has completed the integration of USD Coin (USDC) and Tether (USDT) on the NEAR [...]
- Published
- 2024
315. Keep folders in sync with Syncthing.
- Author
-
PEERS, NICK
- Subjects
SECURE Sockets Layer (Computer network protocol) ,INTERNET protocol address ,CLOUD storage ,COMPUTER network protocols - Published
- 2023
316. BLUETOOTH THE TOOTH SHALL SET YOU FREE.
- Author
-
Graham-Smith, Darien
- Subjects
INTERNET protocol version 6 ,BLUETOOTH technology ,COMPUTER network protocols ,TEETH ,COMPUTER peripherals ,AUDIO codec ,KEYBOARDS (Electronics) ,NEAR field communication - Abstract
Bluetooth 1.1 followed shortly afterwards, containing mostly bug fixes; in 2003, Bluetooth 1.2 added the adaptive frequency-hopping technology that helps Bluetooth avoid the worst effects of interference. 2010 BLUETOOTH 4 The fourth-generation Bluetooth standard brought the biggest update the technology has seen: a new "low-energy" mode known as Bluetooth LE, or just BLE. Bluetooth 4.2 made it possible to use Bluetooth over IPv6, rather than relying on native radio hardware, the intention being to allow IoT devices to use Bluetooth technologies over an internet or LAN connection. BUILD A GAMING POWERHOUSE BLUETOOTH has become so commonplace that you probably used it today without even thinking, but it's a technology that is worthy of deeper consideration. [Extracted from the article]
- Published
- 2023
317. Editorial: Long-range dependent processes: theory and applications, volume II.
- Author
-
Li, Ming, Duan, Jun-Sheng, Heydari, Mohammad Hossein, and Chen, YangQuan
- Subjects
COMPUTER network protocols ,PROBABILITY density function ,PINK noise ,RANDOM noise theory ,COMPUTER network traffic - Abstract
This document is an editorial published in the journal Frontiers in Physics. It discusses the theory and applications of long-range dependent (LRD) processes, which are of interest to researchers in various fields, including physics and computer science. LRD processes differ from conventional random processes in terms of their autocorrelation function, power spectrum density, and probability density function. The editorial highlights two models of LRD processes: fractional Gaussian noise (fGn) and the generalized Cauchy process. It also mentions several papers included in the research topic, which explore the use of LRD processes in precision time protocol, dynamic routing algorithms, identification of cryptomining behavior, and modeling global sea surface chlorophyll concentration. [Extracted from the article]
- Published
- 2024
- Full Text
- View/download PDF
318. The Future of Blockchain Consensus.
- Author
-
GRAMOLI, VINCENT and QIANG TANG
- Subjects
- *
BLOCKCHAINS , *COMPUTER network protocols , *ASYNCHRONOUS transfer mode - Abstract
The article offers information on the Redbelly Blockchain. Blockchain consensus, performance, and protocols are discussed. According to the article, the Redbelly Blockchain was added to the Australian National Blockchain Roadmap. The Dumbo path, the asynchronous consensus, and the Bolt-Dumbo-Transformer are also mentioned.
- Published
- 2023
- Full Text
- View/download PDF
319. Ethical Hacking and Network Analysis with Wireshark
- Author
-
Manish Sharma and Manish Sharma
- Subjects
- Computer network protocols, Computer networks--Security measures, Computer security, Hacking
- Published
- 2024
320. NATIONAL AERONAUTICS AND SPACE ADMINISTRATION invites tenders for Technology Transfer Opportunity: a Fault-Tolerant Synchronization Protocol for Wireless Networks (Lar-Tops-291)
- Subjects
United States. National Aeronautics and Space Administration ,Telecommunication systems ,Aeronautics ,Computer network protocols ,Protocol ,News, opinion and commentary - Abstract
NATIONAL AERONAUTICS AND SPACE ADMINISTRATION, United States has invited tenders for Technology Transfer Opportunity: a Fault-Tolerant Synchronization Protocol for Wireless Networks (Lar-Tops-291). Tender Notice No: T2P-LaRC-00083 Deadline: April 24, 2025 [...]
- Published
- 2024
321. INE rejects protocol to prevent bot campaigns on social networks
- Published
- 2024
322. KOREA INSTITUTE OF SCIENCE AND TECHNOLOGY INFORMATION invites tenders for Quantum Network Information Transmission Protocol Trend Analysis and Design Consulting
- Subjects
Computer network protocols ,Protocol ,News, opinion and commentary - Abstract
KOREA INSTITUTE OF SCIENCE AND TECHNOLOGY INFORMATION, South Korea has invited tenders for Quantum Network Information Transmission Protocol Trend Analysis and Design Consulting. Tender Notice No: B2024-000112-00 Deadline: March 26, [...]
- Published
- 2024
323. This is Morena's plan to avoid 'dirty war in networks'
- Published
- 2024
324. KOREA INDUSTRIAL TECHNOLOGY TESTING INSTITUTE invites tenders for [announcement 2024-1-0055] Wireless Communication Protocol Analysis Device
- Subjects
Technical institutes ,Computer network protocols ,Protocol ,News, opinion and commentary - Abstract
KOREA INDUSTRIAL TECHNOLOGY TESTING INSTITUTE, South Korea has invited tenders for [announcement 2024-1-0055] Wireless Communication Protocol Analysis Device. Tender Notice No: 20240312066-00 Deadline: March 20, 2024 Copyright © 2011-2022 pivotalsources.com. [...]
- Published
- 2024
325. MINISTRY OF TAXES AND DUTIES OF THE REPUBLIC OF BELARUS invites tenders for Service Interconnection of Corporate Networks Via Ip Protocol (Vpn)
- Subjects
Taxation ,Computer network protocols ,Protocol ,News, opinion and commentary - Abstract
MINISTRY OF TAXES AND DUTIES OF THE REPUBLIC OF BELARUS, Belarus has invited tenders for Service Interconnection of Corporate Networks Via Ip Protocol (Vpn). Tender Notice No: auc0001670839 Deadline: February [...]
- Published
- 2024
326. MUNICIPALITY OF PAGBILAO, QUEZON invites tenders for Supply and Delivery of Meals and Snacks (Training on Radio Communication Protocol)
- Subjects
Snack foods ,Computer network protocols ,Protocol ,News, opinion and commentary - Abstract
MUNICIPALITY OF PAGBILAO, QUEZON, Philippines has invited tenders for Supply and Delivery of Meals and Snacks (Training on Radio Communication Protocol). Tender Notice No: 2024 B02.098 Deadline: February 22, 2024 [...]
- Published
- 2024
327. MUNICIPALITY OF PAGBILAO, QUEZON invites tenders for Supply and Delivery of Supplies and Materials (Training on Radio Communication Protocol)
- Subjects
Computer network protocols ,Protocol ,News, opinion and commentary - Abstract
MUNICIPALITY OF PAGBILAO, QUEZON, Philippines has invited tenders for Supply and Delivery of Supplies and Materials (Training on Radio Communication Protocol). Tender Notice No: 2024 B02.099 Deadline: February 22, 2024 [...]
- Published
- 2024
328. EMS: Efficient Monitoring System to Detect Non-Cooperative Nodes in IoT-Based Vehicular Delay Tolerant Networks (VDTNs).
- Author
-
Rehman, Ghani Ur, Zubair, Muhammad, Qasim, Iqbal, Badshah, Afzal, Mahmood, Zafar, Aslam, Muhammad, and Jilani, Syeda Fizah
- Subjects
- *
DELAY-tolerant networks , *COMPUTER network protocols , *DATA transmission systems , *INTERNET of things , *NETWORK performance - Abstract
Since several Internet of Things (IoT) applications have been widely deployed on unstable wireless networks, such as the Delay Tolerant Network (DTN), data communication efficiency in DTN remains a challenge for IoT applications. Vehicular Delay Tolerant Network (VDTN) has become one of DTN's potential applications, in which the network experiences connectivity interruption due to the lack of an end-to-end relay route. VDTNs focus on node cooperation to achieve this goal. As a result, it is essential to ensure that almost all network nodes adopt the protocol to preserve network performance. This is a challenging task since nodes may diverge from the basic protocol to optimize their effectiveness. This article presents an Efficient Monitoring System (EMS) to detect and respond to just selfish nodes to minimize their entire network and data communication efficacy. The scheme is based on a network-wide cooperative sharing of node reputation. It is also necessary to increase overall network efficiency by tracking selfish nodes. The NS-2 simulator is used to run this experimental setup. Simulation results indicate that the proposed scheme performs better in terms of probability of package delivery, package delivery delay, energy consumption, and amount of packet drops. For 80% selfish nodes in the network, the packet delivery of EMS is 37% and 31% better than SOS and IPS. Similarly, the average delivery delay of EMS is 22% and 18% lower than SOS and IPS when 80% selfish nodes are incorporated in the network. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
329. Synchronizing network systems in the presence of limited resources via edge snapping.
- Author
-
Corso, Alessandra, Gambuzza, Lucia Valentina, De Lellis, Pietro, and Frasca, Mattia
- Subjects
- *
ELECTRIC power distribution grids , *DYNAMICAL systems , *COMPUTER network protocols - Abstract
In this work, we propose a multilayer control protocol for the synchronization of network dynamical systems under limited resources. In addition to the layer where the interactions of the system take place, i.e., the backbone network, we propose a second, adaptive layer, where the edges are added or removed according to the edge snapping mechanism. Different from classic edge snapping, the inputs to the edge dynamics are modified to cap the number of edges that can be activated. After studying the local stability of the overall network dynamics, we illustrate the effectiveness of the approach on a network of Rössler oscillators and then show its robustness in a more general setting, exemplified with a model of the Italian high-voltage power grid. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
330. Para a crise do jornalismo, "jornalismo de soluções"? Apontamentos a partir da experiência do Grupo RBS.
- Author
-
Moura de Oliveira, Felipe, Lins Pastl, Carolina Monego, and Smaniotto Garcia, Isadora
- Subjects
- *
SPORTS journalism , *COMPUTER network protocols , *MARKETING , *JOURNALISM , *POSTURE , *SUSPICION , *MEDIATION , *INFERENCE (Logic) - Abstract
The article reflects on the journalism crisis, marked by the loss of credibility, from what is called solutions journalism. It evokes two procedures: an interview with Marta Gleich, executive director of Journalism and Sport at Grupo RBS (Brazil, RS); and analysis, based on the Solutions Journalism Network protocol, of two articles published on the GZH website. It is an attempt to assess the relevance of these initiatives as concrete manifestations of the concept of qualified mediation. The suspicion is that, as a posture towards the representation of events, journalism of solutions can be constituted as an alternative to face the crisis -- although they are still incipient initiatives, which leads to the need to advance from the conceptual level or marketing (in the relationship with its audiences) to journalistic practices. Finally, it is necessary to emphasize the essayistic nature of the article, which makes its inferences still insufficient for a more definitive conclusion. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
331. Analysis and Design of Adaptive Cruise Control for Smart Electric Vehicle With Domain-Based Poly-Service Loop Delay.
- Author
-
Cao, Wanke, Liu, Shao, Li, Jianwei, Zhang, Zhaolong, and He, Hongwen
- Subjects
- *
CRUISE control , *ADAPTIVE control systems , *ELECTRIC vehicles , *COMPUTER network protocols , *SOFTWARE upgrades - Abstract
Domain-based electronic and electrical (E/E) architectures have been regarded as a possible upgrade to distributed E/E architectures currently used in electric vehicles. In a distributed E/E design, E/E components are directly connected to the automobile bus. Domain-based architectures split E/E components into distinct domains depending on their functions, which clearly benefits software upgrading and wire harness reduction. However, due to its heterogeneous topology with multiple network protocols, domain-based E/E architecture introduces complicated multilink and multinode delays into the control loop. The delays may degrade and even deteriorate the stability of adaptive cruise control (ACC) employing domain-based E/E architecture. To this end, this article proposes a heterogeneous-topology loop delay analysis by introducing a notion of poly-service loop delay. With a graphical pattern, the analytical process is presented in depth. The worst-case loop delay is calculated using an upper-boundary mathematic equation. Then, a hierarchical cyber-physical control method for ACC is designed. The upper level is intended to achieve desired acceleration based on vehicle and intervehicle motion states. And the lower level is intended to mitigate the negative impact of loop delays and provide reliable acceleration tracking. The results of cosimulation and hardware-in-loop experiment verify effectiveness of proposed approaches. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
332. On the variable structure control approach with sliding modes to robust finite-time consensus problems: A methodological overview based on nonsmooth analysis.
- Author
-
Pilloni, A., Franceschelli, M., Pisano, A., and Usai, E.
- Subjects
- *
SLIDING mode control , *MULTIAGENT systems , *NONSMOOTH optimization , *DISTRIBUTED algorithms , *LARGE scale systems , *CYBER physical systems , *COMPUTER network protocols - Abstract
When controlling cyber–physical systems via consensus algorithms, the robustness issue is of paramount importance because of model mismatching and/or disturbances that generally modify the Laplacian flow dynamics associated to the overall network, compromising the possibility to achieve any expected, orchestrated emergent behavior. To face this issue, the Variable Structure Control (VSC) approach has recently been shown to be an effective tool in designing control protocols over networks, providing robustness and often yielding finite-time convergence. Moreover, VSC further enables the decoupling of simultaneous control objectives where reaching a consensus state is only part of a more complex task, for instance as it happens in distributed optimization. Thus motivated, this paper overviews, from a tutorial perspective, some selected recent advances in the application of VSC with Sliding Modes to design robust consensus controllers in both the leader-less and the leader-following settings. Efforts are also made to unify the notation and to discuss the theoretical foundations of the nonsmooth analysis tools at the basis of their design for a wide readership unfamiliar with these problems and formal tools. To this aim, examples supporting the treatment, and numerical simulations, are given and discussed in detail. Finally, hints for future investigations along with some current open problems are provided. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
333. An Analysis of Computational Resources of Event-Driven Streaming Data Flow for Internet of Things: A Case Study.
- Author
-
Tenorio-Trigoso, Alonso, Castillo-Cara, Manuel, Mondragón-Ruiz, Giovanny, Carrión, Carmen, and Caminero, Blanca
- Subjects
- *
INTERNET of things , *STREAMFLOW , *COMPUTER network protocols , *SMART cities , *QUALITY of service - Abstract
Information and communication technologies backbone of a smart city is an Internet of Things (IoT) application that combines technologies such as low power IoT networks, device management, analytics or event stream processing. Hence, designing an efficient IoT architecture for real-time IoT applications brings technical challenges that include the integration of application network protocols and data processing. In this context, the system scalability of two architectures has been analysed: the first architecture, named as POST architecture, integrates the hyper text transfer protocol with an Extract-Transform-Load technique, and is used as baseline; the second architecture, named as MQTT-CEP, is based on a publish-subscribe protocol, i.e. message queue telemetry transport, and a complex event processor engine. In this analysis, SAVIA, a smart city citizen security application, has been deployed following both architectural approaches. Results show that the design of the network protocol and the data analytic layer impacts highly in the Quality of Service experimented by the final IoT users. The experiments show that the integrated MQTT-CEP architecture scales properly, keeps energy consumption limited and thereby, promotes the development of a distributed IoT architecture based on constraint resources. The drawback is an increase in latency, mainly caused by the loosely coupled communication pattern of MQTT, but within reasonable levels which stabilize with increasing workloads. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
334. Effect of different specific warm-up protocols and time of day on optimum power performance in kickboxers.
- Author
-
Bayer, Ramazan, Nobari, Hadi, Eken, Özgür, Bayrakdaroğlu, Serdar, Koç, Hürmüz, Mainer-Pardos, Elena, and Yağın, Fatma Hilal
- Subjects
KICKBOXING ,SPORTS ,COMPUTER network protocols ,CONTROL groups ,EXPERIMENTAL design - Abstract
Numerous variables can affect performance before the competition. Nevertheless, it could be a subject of curiosity to find out whether a warm-up strategy has a more positive effect on the power performance of kickboxers. The purpose of this study is to evaluate the effect of different specific warm-up protocols and time of day on optimum power performance in kickboxers. Ten volunteer males performed three different warm-up routines in random order. The warm-up protocols consisted of only 20 min for each group. The groups with low-intensity aerobic running (NSWU) and specific warm-ups (SWU-20m) performed 20-min protocols. The other group followed 10 minutes of jogging and 10 minutes of specific warm-up (SWU-10m). All groups followed the warm-up randomly at two different periods of the day (i.e. morning: 09:00-10:00 and evening: 16:00-17:00) on non-consecutive days. A statistically significant difference was found between the groups in terms of Mean Propulsion (W) (F=3.518; p2=0.036). There was a statistically significant difference in Mean propulsive Power (W) between NSWU and SWU-10m (p3= 0.0007) in addition there was also a statistically significant difference in SWU-10m and SWU-20m (p3= 0.0106) and, NSWU and SWU-20m (p3= 0.415) protocols. In conclusion, mean propulsion (W) performance showed diurnal variation, and performances of the kickboxers' can be affected more positively in the evening hours, especially after SWU protocols. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
335. 一种基于开放网络的安全通信协议实现方法.
- Author
-
殷 琴 and 张立伟
- Subjects
DATA transmission systems ,DATA security ,COMPUTER network protocols ,ALGORITHMS ,IMAGE encryption ,EMAIL security ,MULTICASTING (Computer networks) - Abstract
Copyright of Railway Signalling & Communication Engineering is the property of Railway Signalling & Communication Engineering and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2023
- Full Text
- View/download PDF
336. A Flooding Mechanism of Stateless Anycast Routing in Mobile Wireless Ad Hoc Networks.
- Author
-
ÖZ, GÜRCÜ
- Subjects
AD hoc computer networks ,PETRI nets ,COMPUTER network protocols ,WIRELESS communications - Abstract
A detailed simulation study, together with real-world experiments, a stateless flooding mechanism for anycast routing in a mobile wireless ad hoc network is studied with a developed model. The model covers reliability aspects of wireless communication in such networks with a routing mechanism using a scheme of orientation-dependent inter-node communication links. Using the mechanism, the paper addresses another issue of locating the nearest server from a group of replicated servers in the network. A class of extended Petri nets is used in the development of the simulation model to explicitly represent parallelism of events and processes in the network. An application layer prototype system is implemented based on the proposed routing model without any changes at lower layers of the network protocol stack. In simulation and real-world experiments, the behavior of five fundamental performance metrics - response ratio, relative traffic, average response time, average number of hops, and duplicate ratio - were investigated by changing distance of transmission, motion pattern and combining with different model parameters. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
337. LabNet hardware control software for the Raspberry Pi.
- Author
-
Schatz, Alexej and Winter, York
- Subjects
- *
RASPBERRY Pi , *SINGLE-board computers , *COMPUTER network protocols , *PROGRAMMING languages , *COMPUTER software - Abstract
Single-board computers such as the Raspberry Pi make it easy to control hardware setups for laboratory experiments. GPIOs and expansion boards (HATs) give access to a whole range of sensor and control hardware. However, controlling such hardware can be challenging, when many experimental setups run in parallel and the time component is critical. LabNet is a C++ optimized control layer software to give access to the Raspberry Pi connected hardware over a simple network protocol. LabNet was developed to be suitable for time-critical operations, and to be simple to expand. It leverages the actor model to simplify multithreading programming and to increase modularity. The message protocol is implemented in Protobuf and offers performance, small message size, and supports a large number of programming languages on the client side. It shows good performance compared to locally executed tools like Bpod, pyControl, or Autopilot and reaches sub-millisecond range in network communication latencies. LabNet can monitor and react simultaneously to up to 14 pairs of digital inputs, without increasing latencies. LabNet itself does not provide support for the design of experimental tasks. This is left to the client. LabNet can be used for general automation in experimental laboratories with its control PC located at some distance. LabNet is open source and under continuing development. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
338. Performance Analysis of IEEE 802.15.4 Bootstrap Process.
- Author
-
Gallegos Ramonet, Alberto and Noguchi, Taku
- Subjects
COMPUTER network protocols ,WIRELESS sensor networks ,SOURCE code ,INTERNET of things ,SOCIAL networks - Abstract
The IEEE 802.15.4 is a popular standard used in wireless sensor networks (WSNs) and the Internet of Things (IoT) applications. In these networks, devices are organized into groups formally known as personal area networks (PAN) which require a bootstrap procedure to become operational. Bootstrap plays a key role in the initialization and maintenance of these networks. For this reason, this work presents our implementation and performance analysis for the ns-3 network simulator. Specifically, this bootstrap implementation includes the support of three types of scanning mechanisms (energy scan, passive scan, and active scan) and the complete classic association mechanism described by the standard. Both of these mechanisms can be used independently by higher layers protocols to support network initialization, network joining, and maintenance tasks. Performance evaluation is conducted in total network association time and packet overhead terms. Our source code is documented and publicly available in the latest ns-3 official release. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
339. EDSF: Efficient Distributed Scheduling Function for IETF 6TiSCH-based Industrial Wireless Networks.
- Author
-
Yang, Wei, Cao, Yuanlong, Wang, Hao, Zhang, Zhiming, and Wu, Celimuge
- Subjects
- *
COMPUTER network protocols , *SCHEDULING , *ACCESS control , *STATISTICS - Abstract
IETF 6TiSCH, which is composed of the IEEE802.15.4e and IPv6 RPL protocols, is a highly reliable and low-power industrial wireless network protocol stack. IEEE802.15.4e is the medium access control (MAC) layer protocol of the protocol stack—it defines a time-slotted channel hopping communication mode. IPv6 RPL is the network layer protocol of the protocol stack—it allows multiple nodes to form a multi-hop network. Scheduling is vital to the 6TiSCH protocol stack, as it defines the MAC layer cells to send/receive by the network packets. Herein, we propose an efficient distributed scheduling function (EDSF) for 6TiSCH wireless networks; it fully considers the use probability and distance of cells rather than random selection. Additionally, a schedule collision detection algorithm is proposed to detect two pairs of neighbor nodes that use the same cell. It fully utilizes the historical statistical data from the cell packet delivery ratio. Finally, we implement the EDSF scheme and verify its performance through experiments on a 6TiSCH simulator. The experimental results show that our proposed scheme can achieve a low end-to-end latency without additional costs. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
340. Energy-Efficient Network Protocols and Resilient Data Transmission Schemes for Wireless Sensor Networks—An Experimental Survey.
- Author
-
Dhabliya, Dharmesh, Soundararajan, Rajasoundaran, Selvarasu, Parthiban, Balasubramaniam, Maruthi Shankar, Rajawat, Anand Singh, Goyal, S. B., Raboaca, Maria Simona, Mihaltan, Traian Candin, Verma, Chaman, and Suciu, George
- Subjects
- *
WIRELESS sensor networks , *DATA transmission systems , *COMPUTER network protocols , *WIRELESS sensor nodes , *TIME division multiple access , *WIRELESS channels , *TELECOMMUNICATION systems , *NETWORK performance - Abstract
Wireless sensor networks (WSNs) are considerably used for various environmental sensing applications. The architecture and internal specifications of WSNs have been chosen based on the requirements of particular applications. On this basis, WSNs consist of resource (energy and memory)-limited wireless sensor nodes. WSNs initiate data communication from source to destination via physical layer management principles, channel slot scheduling principles (time division multiple access), wireless medium access control (WMAC) protocols, wireless routing protocols and application protocols. In this environment, the development of WMAC principles, routing protocols and channel allotment schemes play crucial roles in network communication phases. Consequently, these layering functions consume more energy at each sensor node, which leads to minimal network lifetime. Even though the channel management schemes, medium control protocols and routing protocols are functionally suitable, the excessive energy consumption affects the overall network performance. In this situation, energy optimization algorithms are advised to minimize the resource wastage of WSNs during regular operations (medium control and routing process). Many research works struggle to identify the optimal energy-efficient load balancing strategies to improve WSN functions. With this in mind, the proposed article has conducted a detailed literature review and notable experimental comparisons on energy-efficient MAC protocols, channel scheduling policies and energy-efficient routing protocols. To an extent, the detailed analysis over these wireless network operations helps to understand the benefits and limitations of recent research works. In the experimental section of this article, eight existing techniques are evaluated under energy optimization strategies (WMAC, channel allocation, sleep/wake protocols, integrated routing and WMAC policies, balanced routing and cooperative routing). The proposed review and the classified technical observations collected from notable recent works have been recognized as crucial contributions. The results infer the suggestions for feasible WSN communication strategies with optimal channel management policies and routing policies. Notably, the simulation results show that cross-layer or multi-layer energy optimization policies perform better than homogeneous energy optimization models. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
341. Design and Analysis of Area and Energy Efficient Reconfigurable Cryptographic Accelerator for Securing IoT Devices.
- Author
-
Zhang, Xvpeng, Liu, Bingqiang, Zhao, Yaqi, Hu, Xiaoyu, Shen, Zixuan, Zheng, Zhaoxia, Liu, Zhenglin, Chong, Kwen-Siong, Yu, Guoyi, Wang, Chao, and Zou, Xuecheng
- Subjects
- *
BLOCK ciphers , *APPLICATION-specific integrated circuits , *COMPUTER network security , *FINITE fields , *DATA encryption , *COMPUTER network protocols - Abstract
Achieving low-cost and high-performance network security communication is necessary for Internet of Things (IoT) devices, including intelligent sensors and mobile robots. Designing hardware accelerators to accelerate multiple computationally intensive cryptographic primitives in various network security protocols is challenging. Different from existing unified reconfigurable cryptographic accelerators with relatively low efficiency and high latency, this paper presents design and analysis of a reconfigurable cryptographic accelerator consisting of a reconfigurable cipher unit and a reconfigurable hash unit to support widely used cryptographic algorithms for IoT Devices, which require block ciphers and hash functions simultaneously. Based on a detailed and comprehensive algorithmic analysis of both the block ciphers and hash functions in terms of basic algorithm structures and common cryptographic operators, the proposed reconfigurable cryptographic accelerator is designed by reusing key register files and operators to build unified data paths. Both the reconfigurable cipher unit and the reconfigurable hash unit contain a unified data path to implement Data Encryption Standard (DES)/Advanced Encryption Standard (AES)/ShangMi 4 (SM4) and Secure Hash Algorithm-1 (SHA-1)/SHA-256/SM3 algorithms, respectively. A reconfigurable S-Box for AES and SM4 is designed based on the composite field Galois field (GF) GF(((22)2)2), which significantly reduces hardware overhead and power consumption compared with the conventional implementation by look-up tables. The experimental results based on 65-nm application-specific integrated circuit (ASIC) implementation show that the achieved energy efficiency and area efficiency of the proposed design is 441 Gbps/W and 37.55 Gbps/mm2, respectively, which is suitable for IoT devices with limited battery and form factor. The result of delay analysis also shows that the number of delay cycles of our design can be reduced by 83% compared with the state-of-the-art design, which shows that the proposed design is more suitable for applications including 5G/Wi-Fi/ZigBee/Ethernet network standards to accelerate block ciphers and hash functions simultaneously. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
342. A decentralized honeypot for IoT Protocols based on Android devices.
- Author
-
Lygerou, Irini, Srinivasa, Shreyas, Vasilomanolakis, Emmanouil, Stergiopoulos, George, and Gritzalis, Dimitris
- Subjects
- *
INTERNET of things , *COMPUTER network protocols , *CYBER physical systems , *COMPUTER systems , *INTERNET protocols - Abstract
The exponential growth of internet connected devices in this past year has led to a significant increase in IoT targeted attacks. The lack of proper integration of security in IoT development life cycle along with a plethora of different protocols (e.g., Zigbee, LoRa, MQTT, etc.) have greatly impacted the resilience of such devices against cyber-attacks, a fact also exacerbated by the size and physical hardware structure of these devices. Thus, it is imperative to develop effective and efficient countermeasures that can also be applied post-production to help build resilience in modern IoT systems. Honeypots are prime example of this notion. Being designed to act as vulnerable computer components or systems, they provide useful intelligence regarding potential attackers. Nevertheless, honeypots have seen little use in protection IoT systems and their underlying protocols, especially in cases where honeypots can leverage the decentralized nature of IoT. In this research, we enhance the HosTaGe honeypot to build an IoT protocol honeypot that runs over mobile devices. The purpose of this paper is to introduce a honeypot specifically for IoT communication protocols over public networks that is easy-to-use and utilizes Android devices. The protocol honeypot utilizes the cellular network to establish decentralized, simulated infrastructures of IoT systems over different types of IoT network protocols. We test four IoT network implementations, one for each of the newly implemented MQTT, CoAP and AMQP protocols. Additionally, we upgrade existing Telnet and SSH protocols used in IoT systems to work over the simulated mobile honeypot. We use the virtualized honeypot networks to capture log, and analyze real-world public attacks on these protocols from the internet and provide an interface for interaction with the implemented honeypot. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
343. Special issue on 6G and satellite communications.
- Author
-
Kwon, Taesoo, Kim, Sooyoung, Lee, Kyunghan, and Chung, Jong‐Moon
- Subjects
MOBILE communication systems ,TELECOMMUNICATION satellites ,BANDWIDTH allocation ,WIRELESS channels ,ORTHOGONAL frequency division multiplexing ,INTELLIGENT networks ,COMPUTER network protocols - Abstract
The paper [[8]] "Dynamic Power and Bandwidth Allocation for DVB-based LEO Satellite Systems" proposes an efficient power and bandwidth allocation method employing two linear machine learning algorithms with inputs of channel conditions and TD. The fifth-generation (5G) technology has recently been consolidating its function as an infrastructure for new services, such as ultrareliable low-latency communications (URLLC) and massive machine-type communications, by further expanding the high-speed data service of the mobile communication system. In their paper titled [[1]] "Reliability-guaranteed Multi-path Allocation Algorithm in Mobile Network", Lee and Ko investigated the method of selecting higher reliable network paths for further enhancing URLLC services. [Extracted from the article]
- Published
- 2022
- Full Text
- View/download PDF
344. Dynamic ID randomization for user privacy in mobile network.
- Author
-
Sarker, Arijet, Byun, SangHyun, Raavi, Manohar, Kim, Jinoh, Kim, Jonghyun, and Chang, Sang‐Yoon
- Subjects
TELECOMMUNICATION systems ,ENGINEERING standards ,PRIVACY ,COMPUTER network protocols ,MOBILE apps - Abstract
Mobile and telecommunication networking uses temporary and random identifiers (IDs) to protect user privacy. For greater intelligence and security o the communications between the core network and the mobile user, we design and build a dynamic randomization scheme for the temporary IDs for mobile networking, including 5G and 6G. Our work for ID randomization (ID‐RZ) advances the existing state‐of‐the‐art ID re‐allocation approach in 5G in the following ways. First, ID‐RZ for ID updates is based on computing, as opposed to incurring networking for the re‐allocation‐based updates, and is designed for lightweight and low‐latency mobile systems. Second, ID‐RZ changes IDs proactively (as opposed to updating based on explicit networking event triggers) and provides stronger security (by increasing the randomness and frequency of ID updates). We build on the standard cryptographic primitives for security (e.g., hash) and implement our dynamic randomization scheme in the 5G networking protocol to validate its design purposes, which include time efficiency (two to four orders of magnitude quicker than the re‐allocation approach) and appropriateness for mobile applications. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
345. WIRELESS SENSOR NETWORK FOR SITE SPECIFIC CROP MANAGEMENT FOR PRECISION AGRICULTURE.
- Author
-
Pawar, A. M., Ladgaonkar, B. P., and Patil, S. N.
- Subjects
WIRELESS sensor networks ,PRECISION farming ,CROP management ,GRAPHICAL user interfaces ,COMPUTER network protocols - Abstract
Recently, due to significant research and development efforts, an innovative field of Wireless Sensor Network (WSN) technologies is evolving as powerful platform for systematically distributed data accumulation and data management. Because of wide application potential WSN is becoming more and more ubiquitous. It ensures the deployment of the technologies such as an embedded technology, wireless communication technology and computer information management technology etc. Emphasizing the themes of Site Specific Crop Management (SSCM), the prime objective of Precision Agriculture, the Wireless Sensor Network is designed and implemented to monitor the environmental parameters of the high-tech polyhouse. The WSN is designed for monitoring of the relative humidity, temperature and intensity of light within the poly house, in the real units. The WSN under investigation comprises ten WSNodes, routed through star networking protocol. The WSNodes are the intelligent devices, wherein the embedded technology is realized. The Hardware is designed about AVR microcontroller, wherein the standards laid down by the IEEE 802.15.4 are emphasized. To ensure wireless networking, the Zigbee devices have been employed, which are configured by the methods suggested by the Digi Corporation. The Base Station, an inherent part the WSN, is also developed and made smarter by developing the Graphical Users Interface (GUI) is dedicatedly developed in the VB environment. Therefore, to realize the monitoring of the domain-wise data of spatio-temporal variance, the WSN is established in polyhouse of smart infrastructure. The results of implementation reveal the facets of Precision Agriculture. On comparison with the standard WSN from Hanback Electronics, it found that, the WSN under investigation exhibit good reliability and preciseness. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
346. Enhancing the Security of WPA2/PSK Authentication Protocol in Wi-Fi Networks.
- Author
-
Arikumar, K s, Deepak Kumar, A, Prathiba, Sahaya Beni, Tamilarasi, K, Moorthy, Rajalakshmi Shenbaga, and Mohamed Iqbal, M
- Subjects
COMPUTER network protocols ,DATA security ,INTERNATIONAL communication ,WIRELESS communications ,HANDSHAKING ,COMPUTER password security ,KEY agreement protocols (Computer network protocols) - Abstract
In today's world of wireless communication, the prime point of concentration lies on data security. This depends mainly on proper authentication of users who are intended to connect to the network. with modern day technology, the credentials (password), which the legitimate user send to the access points for his/her authorization, can be sniffed and used to enter the system, compromising the system security. WPA2/PSK (Wireless Protected Access/Pre-Shared Key) has a vulnerability which allows an attacker to perform Man-in-the-middle attack by capturing the handshake sent by the legitimate user for authentication. The captured handshake can be used to recover the password using dictionary attack or can be brute forced. To overcome the short comings of the current system, the proposed method uses Frequency Hopping Technique to secure the MIC(Message Integrity Code) before transmitting it. This method reduces the possibility of brute forcing the password, even if the handshake is captured. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
347. Active suspension control with consensus strategy for dynamic posture tracking of wheel-legged robotic systems on uneven surfaces.
- Author
-
Liu, Dongchen, Wang, Junzheng, Lei, Tao, and Wang, Shoukun
- Subjects
GLOBAL asymptotic stability ,POSTURE ,ROBOTICS ,COMPUTER network protocols ,HOPFIELD networks ,TELECOMMUNICATION systems - Abstract
This work presents a dynamic posture tracking control strategy for wheel-legged systems on uneven surfaces. Based on the kinematic model of a wheel-legged robotic system, the expected positions for the end-effectors of wheel-legs are calculated according to posture references and sensor feedback. The position control problem for a general wheel-leg is investigated for the active mechanism to imitate a passive suspension and respond to the external contact forces. The position tracking accuracy of the wheel-leg is sacrificed to enhance the compliance performance under rough terrain. Because of the unique contact state with the uneven ground for each wheel-leg, the position responses are different. As a result, the forces from the wheel-legs to the fuselage are inconsistent, which leads to the risk of posture oscillations. Equipping the wheel-legs with an undirected communication network, a consensus scheme for the robotic system is developed with proven global asymptotic stability to improve the posture tracking property. A novel robotic system is established with Stewart-structured wheel-legs, which are connected by a user datagram protocol network. Comparative experimental results are carried out on the physical prototype to validate the effectiveness of the proposed approach. • An improved kinematic model avoiding geomagnetism disturbances is established for general wheel-legged robotic systems. Considering the contact forces, an active suspension controller is proposed for the single wheel-leg to track the desired position with expected compliance behaviors. • Based on an undirected communication topology, a consensus strategy is carried out for multiple ASCs. The CASC fulfills the coordination requirements and active suspension response demands with proved convergency property. • The proposed posture control scheme is applied to a wheel-legged physical prototype. The comparative experimental results between the proposed CASC and our previous studies are presented, which highlights the CASC in posture tracking accuracy and wheel-leg coordination performances. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
348. HIRO-NET: Heterogeneous Intelligent Robotic Network for Internet Sharing in Disaster Scenarios.
- Author
-
Ferranti, Ludovico, DaOro, Salvatore, Bonati, Leonardo, Cuomo, Francesca, and Melodia, Tommaso
- Subjects
INTELLIGENT networks ,WIRELESS mesh networks ,WIDE area networks ,COMPUTER network protocols ,MESH networks ,INTERNET - Abstract
This article describes HIRO-NET, an Heterogeneous Intelligent Robotic Network. HIRO-NET is an emergency infrastructure-less network that aims to address the problem of providing connectivity in the immediate aftermath of a natural disaster, where no cellular or wide area network is operational and no Internet access is available. HIRO-NET establishes a two-tier wireless mesh network where the Lower Tier connects nearby survivors in a self-organized mesh via Bluetooth Low Energy (BLE) and the Upper Tier creates long-range VHF links between autonomous robots exploring the disaster-stricken area. HIRO-NET's main goal is to enable users in the disaster area to exchange text messages to share critical information and request help from first responders. The mesh network discovery problem is analyzed and a network protocol specifically designed to facilitate the exploration process is presented. We show how HIRO-NET robots successfully discover, bridge and interconnect local mesh networks. Results show that the Lower Tier always reaches network convergence and the Upper Tier can virtually extend HIRO-NET functionalities to the range of a small metropolitan area. In the event of an Internet connection still being available to some user, HIRO-NET is able to opportunistically share and provide access to low data-rate services (e.g., Twitter, Gmail) to the whole network. Results suggest that a temporary emergency network to cover a metropolitan area can be created in tens of minutes. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
349. Effectiveness and Safety of Acupuncture-Related Therapies for Chronic Musculoskeletal Pain: A Protocol for Systematic Review and Network Meta-Analysis.
- Author
-
Zhou, Zhuo, Xu, Guixing, Huang, Liuyang, Shu, Yunjie, Tian, Hao, Huang, Fengyuan, Liu, Yilin, Liang, Fanrong, and Sun, Mingsheng
- Subjects
MUSCULOSKELETAL pain ,CHRONIC pain ,LIFE change events ,RANDOMIZED controlled trials ,COMPUTER network protocols - Abstract
Introduction: Chronic pain is one of the major health problems worldwide in recent years, and acupuncture-related therapies have been reported to have definite analgesic effects. However, it is still unclear which treatment is the most effective. Our systematic review and network meta-analysis protocol aims to summarize the evidence and determine the most effective method to treat the chronic musculoskeletal pain. Methods and Analysis: Our literature search will be performed in five electronic databases—the Cochrane Library, EMBASE, and PubMed, AMED, CINAHL, until May 20, 2022. All randomized controlled trials of acupuncture-related therapies for chronic musculoskeletal pain will be included. The primary outcomes will be common pain-related scales, and the secondary outcomes will include quality of life and incidence of adverse events. Excel 2019 will be used for data extraction, RoB2 will be used for bias risk assessment. R 3.6.2 and WinBUGS V.1.4.3 software will be used for network data synthesis and to produce related plots. During the study, literature selection, data extraction, quality assessment and bias risk assessment will be independently completed by two reviewers, and differences will be judged by the third reviewer. Finally, the risk of bias and sources of heterogeneity in the study will be analyzed and explained in order to obtain reliable results. Results: Our study will evaluate the effectiveness and safety of acupuncture-related therapies for the treatment of chronic musculoskeletal pain, and we will rank all methods to recommend the best appropriate treatment option. Conclusion: This study will provide a good foundation for complementary and alternative medicine to treat chronic musculoskeletal pain. It will be also helpful to promote the clinical practice by providing evidence-based medical evidence. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
350. Blockchain in Healthcare: A Decentralized Platform for Digital Health Passport of COVID-19 Based on Vaccination and Immunity Certificates.
- Author
-
Razzaq, Abdul, Mohsan, Syed Agha Hassnain, Ghayyur, Shahbaz Ahmed Khan, Al-Kahtani, Nouf, Alkahtani, Hend Khalid, and Mostafa, Samih M.
- Subjects
PRIVACY ,COMPUTER software ,IMMUNIZATION ,BLOCKCHAINS ,COVID-19 ,HEALTH facilities ,HONESTY ,IMMUNE system ,DOCUMENTATION ,COMPUTER network protocols ,CONSCIENCE ,INFORMATION retrieval ,MEDICAL ethics ,COST analysis ,DATA encryption ,DECENTRALIZATION in management ,CERTIFICATION ,COVID-19 testing ,INFORMATION technology ,ALGORITHMS ,TRUST - Abstract
COVID-19 has become a very transmissible disease that has had a worldwide impact, resulting in a huge number of infections and fatalities. Testing is critical to the pandemic's successful response because it helps detect illnesses and so attenuate (isolate/cure) them and now vaccination is a life-safer innovation against the pandemic which helps to make the immunity system stronger and fight against this infection. Patient-sensitive information, on the other hand, is now held in a centralized or third-party storage paradigm, according to COVID-19. One of the most difficult aspects of using a centralized storage strategy is maintaining patient privacy and system transparency. The application of blockchain technology to support health initiatives that can minimize the spread of COVID-19 infections in the context of accessibility of the system and for verification of digital passports. Only by combining blockchain technology with advanced cryptographic algorithms can a secure and privacy-preserving solution to COVID-19 be provided. In this article, we investigate the issue and propose a blockchain-based solution incorporating conscience identity, encryption, and decentralized storage via interplanetary file systems (IPFS). For COVID-19 test takers and vaccination takers, our solution includes digital health passports (DHP) as a certification of test or vaccination. We explain smart contracts constructed and tested with Ethereum to preserve a DHP for test and vaccine takers, allowing for a prompt and trustworthy response from the necessary medical authorities. We use an immutable trustworthy blockchain to minimize medical facility response times, relieve the transmission of incorrect information, and stop the illness from spreading via DHP. We give a detailed explanation of the proposed solution's system model, development, and assessment in terms of cost and security. Finally, we put the suggested framework to the test by deploying a smart contract prototype on the Ethereum TESTNET network in a Windows environment. The study's findings revealed that the suggested method is effective and feasible. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.