Internet of Drones (IoD) plays a crucial role in the future Internet of Things due to its important features such as low cost, high flexibility, and mobility. The number of IoD applications is drastically increasing from military to civilian fields. Nevertheless, drones are resource-constrained and highly vulnerable to several security threats and attacks. The use of blockchain technology for securing IoD networks has gained growing attention. To this end, this paper presents a systematic literature review to analyze the current research area regarding the security of IoD environments using the emerging blockchain technology. Forty relevant studies were selected from 129 published articles to answer the identified research questions. The selected studies were classified into three main classes based on blockchain type. Furthermore, a comparison of the reviewed articles in terms of different factors is provided. The research findings show that the blockchain can guarantee fundamental security requirements such as authentication, privacy-preserving, confidentiality, integrity, and access control. Finally, open issues and challenges related to the combination of blockchain and IoD technologies are discussed.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC9628419 | PMC |
http://dx.doi.org/10.1007/s13369-022-07380-6 | DOI Listing |
Brain Inform
January 2025
Department of Computing, Glasgow Caledonian University, Glasgow, G4 0BA, Scotland.
A digital twin is a virtual model of a real-world system that updates in real-time. In healthcare, digital twins are gaining popularity for monitoring activities like diet, physical activity, and sleep. However, their application in predicting serious conditions such as heart attacks, brain strokes and cancers remains under investigation, with current research showing limited accuracy in such predictions.
View Article and Find Full Text PDFIEEE Trans Priv
November 2024
Management Science and Information Systems Department, Rutgers University, Newark, NJ 07102-3122 USA.
Interest in supporting Federated Learning (FL) using blockchains has grown significantly in recent years. However, restricting access to the trained models only to actively participating nodes remains a challenge even today. To address this concern, we propose a methodology that incentivizes model parameter sharing in an FL setup under Local Differential Privacy (LDP).
View Article and Find Full Text PDFSci Rep
January 2025
Torrens University Australia, Fortitude Valley, QLD 4006, Leaders Institute, 76 Park Road, Woolloongabba, QLD 4102, Brisbane, Queensland, Australia.
Sensors (Basel)
January 2025
Department of Computer Science and Engineering, Yanbu Industrial College, Royal Commission for Jubail and Yanbu, Yanbu Industrial City 41912, Saudi Arabia.
This paper provides the complete details of current challenges and solutions in the cybersecurity of cyber-physical systems (CPS) within the context of the IIoT and its integration with edge computing (IIoT-edge computing). We systematically collected and analyzed the relevant literature from the past five years, applying a rigorous methodology to identify key sources. Our study highlights the prevalent IIoT layer attacks, common intrusion methods, and critical threats facing IIoT-edge computing environments.
View Article and Find Full Text PDFSensors (Basel)
December 2024
College of Cryptography Engineering, Engineering University of PAP, Xi'an 710086, China.
With the rapid development of the Internet of Things (IoT), the scope of personal data sharing has significantly increased, enhancing convenience in daily life and optimizing resource management. However, this also poses challenges related to data privacy breaches and holdership threats. Typically, blockchain technology and cloud storage provide effective solutions.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!