applsci-logo

Journal Browser

Journal Browser

Blockchain Internet of Things (BIoT): Security, Applications, and Challenges

A special issue of Applied Sciences (ISSN 2076-3417). This special issue belongs to the section "Computing and Artificial Intelligence".

Deadline for manuscript submissions: closed (31 March 2023) | Viewed by 16199

Special Issue Editor


E-Mail Website
Guest Editor
Artificial Intelligence Engineering Department, Research Center for AI and IoT, AI & Robotics Institute, Near East University, North Cyprus via Mersin 10, Nicosia 99138, Turkey
Interests: IoT; AI; cloud computing; blockchain; AIoT
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

In today’s professional world, blockchain technology plays a vital role in creative development. Blockchain technology brings persistent revolution and changes while moving towards newer technology. It works as a chain of blocks that manages trust between two parties and covers all information no matter how distant.

In the last couple of years, expansion in blockchain has obliged researchers and scientists to analyze new strategies for finding solutions in the healthcare domain. Sustainable computing meets the growing demand for Internet-based applications such as healthcare, health education, health sciences, etc. Blockchain has the greatest impact on the healthcare domain with the improvement of clinical trials, electronic healthcare records, etc. The dramatic increase in blockchain technology has provided new application opportunities in healthcare. Handling huge amounts of data is an important research issue. The existing technology is centralized, and a central authority has complete control over information flow. However, blockchain can work on peer-to-peer networks, with a consensus protocol for storing massive numbers of patient electronic records. This encourages the application of blockchain in healthcare to support the IoT framework as a transparent mechanism between patients and hospitals. To move the existing centralized systems towards de-centralized systems to provide security, integrity, and data privacy, blockchain technology needs to interact with an IoT system.

While blockchain technology has a wide variety of applications, it brings many challenges for the research community. This Special Issue aims to bring together the latest advances and developments related to the role of blockchain in healthcare with smart systems, building an era of blockchain and Internet of Things convergence. Researchers and scholars from both industry and academia are encouraged to present their research findings and achievements in this domain. Relevant topics of interest include (but are not limited to):

  • Use of sensors for environmental monitoring as a healthcare challenge with blockchain.
  • Implications for disease in healthcare related to the use of mobile computing with IoT-blockchain.
  • Sustainability-centered data sensing and processing for managing healthcare data with blockchain.
  • Futuristic technology for sustainable computing as applied in smart healthcare.
  • Potential of blockchain in healthcare.
  • Application of blockchain technology in medicine.
  • Blockchain and smart healthcare security for IoT deployment.
  • Blockchain-based security frameworks for IoT.
  • ‘Fit-for-purpose’ challenges and opportunities for applications of blockchain technology in the future of healthcare.
  • M-Health communication frameworks using blockchain and IoT technologies.
  • Role of IoT and blockchain in health sciences and health education.
  • Trust management in IoT-enabled healthcare with blockchain.
  • Blockchain with IoT in healthcare: benefits, challenges, and applications.
  • EcoStructure for Healthcare IoT and digital solutions.
  • Privacy and security issues in IoT healthcare applications for disabled users.
  • IoT-based systems integrated with blockchain to manage patient data in the healthcare sector.
  • Blockchain in 5G/6G for IoT in healthcare.
  • Internet of Medical Things for managing computing resources in healthcare.
  • Blockchain and E-Health management for sustainable computing.
  • Applications of blockchain and smart contracts in electronic health records.

Prof. Dr. Fadi Al-Turjman
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Applied Sciences is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • blockchain
  • Internet of Medical Things
  • IoT

Published Papers (5 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Jump to: Review

17 pages, 4026 KiB  
Article
An Opcode-Based Vulnerability Detection of Smart Contracts
by Jia Sui, Lili Chu and Han Bao
Appl. Sci. 2023, 13(13), 7721; https://doi.org/10.3390/app13137721 - 29 Jun 2023
Cited by 1 | Viewed by 2088
Abstract
Aiming at the problem of insufficient technology for detecting smart contract vulnerabilities and the lack of improvement of certain detection tools, a method for the expansion and improvement of the internal module of the Mythril method is proposed. Since the technology of detecting [...] Read more.
Aiming at the problem of insufficient technology for detecting smart contract vulnerabilities and the lack of improvement of certain detection tools, a method for the expansion and improvement of the internal module of the Mythril method is proposed. Since the technology of detecting vulnerabilities is not yet mature and there are vulnerabilities in smart contracts, vulnerability detection is particularly important. Since the Mythril tool covers the most types of vulnerabilities, its accuracy rate is also the highest. In order to ensure the effect of smart contract vulnerability detection, this paper proposes the expansion and improvement of the internal module of Mythril, which realizes the operation of automatic vulnerability analysis when performing vulnerability detection by improving the operation efficiency and simplifying the operation of smart contract opcodes while analyzing them. The comparison of experimental results shows that the proposed method is more suitable for smart contract vulnerability detection, and the detection accuracy and efficiency are improved, with an average accuracy rate of 94.07%. It performs better in vulnerability detection and provides an effective guarantee for the security and reliability of smart contracts, which has important application value and research significance. Full article
Show Figures

Figure 1

15 pages, 1544 KiB  
Article
Interactive Design and Implementation of a Digital Museum under the Background of AR and Blockchain Technology
by Wangming Hu, Hyunsuk Han, Gulong Wang, Tao Peng and Zhiqiang Yang
Appl. Sci. 2023, 13(8), 4714; https://doi.org/10.3390/app13084714 - 8 Apr 2023
Cited by 1 | Viewed by 3013
Abstract
A museum is the destination of the crystallization of history and culture, and a museum is the center for the development of heritage culture. The display and exhibition of historical relics can promote the harmonious development of society. However, there are many defects [...] Read more.
A museum is the destination of the crystallization of history and culture, and a museum is the center for the development of heritage culture. The display and exhibition of historical relics can promote the harmonious development of society. However, there are many defects in traditional museums. The collection in the museum is scattered. The exhibition needs a specific time and place to open, and the exhibition mode is boring and lacks entertainment, which seriously limits the museum’s dissemination of history and culture. In order to improve the public’s number of visits, museums need to keep pace with the times. Using augmented reality technology can digitize the information in the museum and integrate it with the user’s real environment, which solves the limitation of time and space for most users to visit the museum, and greatly increases the entertainment of users to visit the museum. In addition, the application of blockchain technology in digital museums can effectively ensure the security of museum cultural relics data and quickly restore the lost cultural relics information. The digital museum can help tourists realize cross-region viewing. Through multimedia software and hardware, it can greatly stimulate tourists’ interest and attract tourists of different ages to visit. This article uses digital technology to present physical museums in a digital form on the network, but it is difficult for digital museums to conduct targeted analysis on tourists of different ages. This article will analyze the attraction ability of digital museums to tourists of different ages, thereby attracting tourists of different ages to visit. This paper compared traditional museums with digital museums based on augmented reality technology and blockchain technology. The experimental results showed that from the perspective of young people, the average interactivity of traditional museums and digital museums was 47.20% and 78.20%, respectively; from the perspective of the elderly, the average interactivity of traditional museums and digital museums was 59.04% and 70.36%, respectively. Therefore, the digital museum built by using augmented reality technology and blockchain technology can effectively improve the interaction with users. The digital museum can improve the interaction with tourists of different ages, attract a large number of tourists for virtual visits, and improve the cultural transmission and economic development of the digital museum. Full article
Show Figures

Figure 1

14 pages, 1265 KiB  
Article
Towards a Provably Secure Authentication Protocol for Fog-Driven IoT-Based Systems
by Minahil Rana, Khalid Mahmood, Muhammad Asad Saleem, Fadi Al-Turjman, Manjur Sayyadbadasha Kolhar and Chadi Altrjman
Appl. Sci. 2023, 13(3), 1424; https://doi.org/10.3390/app13031424 - 20 Jan 2023
Cited by 3 | Viewed by 1845
Abstract
The emergence of fog-based Internet of Things (IoT) systems have played a significant role in enhancing the applicability of the IoT paradigm. In such systems, fog-nodes are proficient enough to retain, process and transmit the data coming from IoT devices. Nevertheless, as an [...] Read more.
The emergence of fog-based Internet of Things (IoT) systems have played a significant role in enhancing the applicability of the IoT paradigm. In such systems, fog-nodes are proficient enough to retain, process and transmit the data coming from IoT devices. Nevertheless, as an extension of cloud computing, inheriting the security and privacy concerns of cloud computing is also inevitable in fog-based IoT systems. To deal with such challenges, a diverse range of security solutions are reported in the literature. However, most of them have several limitations (i.e., vulnerability to known security attacks and high computation overhead) that curtail their practical implementation applicability. Keeping these limitations in mind, this paper propose a privacy-preserving hash-based authenticated key agreement protocol using XOR and concatenation operations for fog-driven IoT systems. Using healthcare as a case study, the security of the novel protocol is evaluated by using informal and formal security analysis. In order to obtain the experimental results, the key cryptographic operations used at the user, fog node and cloud server-side are implemented on a mobile device, Arduino and cloud server, respectively. Findings from the performance evaluation results show that the proposed protocol has the least computation cost compared to several related competing protocols. Full article
Show Figures

Figure 1

12 pages, 1786 KiB  
Article
Optimal Design and Simulation for the Intelligent Control of Sewage Treatment Based on Multi-Objective Particle Swarm Optimization
by Baohua Shen, Daoguo Li, Feng Qian and Juan Jiang
Appl. Sci. 2023, 13(2), 735; https://doi.org/10.3390/app13020735 - 4 Jan 2023
Cited by 2 | Viewed by 2225
Abstract
With the continuous increase in emphasis on the environmental protection industry, sewage treatment plants have been built in many places, and these sewage treatment plants undoubtedly occupy an important position in protecting the local environment. The sewage treatment process is generally complicated and [...] Read more.
With the continuous increase in emphasis on the environmental protection industry, sewage treatment plants have been built in many places, and these sewage treatment plants undoubtedly occupy an important position in protecting the local environment. The sewage treatment process is generally complicated and the treatment environment is difficult, which means that the treatment plant must have an excellent control system. At this stage, the sewage treatment systems in many cities have the issue of possessing backward technology and huge costs, which hinder the development of urban sewage treatment. In this paper, a new intelligent control method for sewage treatment is proposed, combined with the multi-objective particle swarm optimization (MOPSO) algorithm. The MOPSO algorithm is used to optimize the parameters and control rules of the controller globally, thereby improving the performance and work efficiency of the controller. Practice has shown that the intelligent control system combined with the MOPSO algorithm can make chemical oxygen demand (COD) in the sewage treatment quickly meet the expected requirements, and the control accuracy is also very accurate, which greatly improves the sewage treatment performance. Through our calculations, the new method improved the sewage treatment efficiency by 7.15%. Full article
Show Figures

Figure 1

Review

Jump to: Research

21 pages, 640 KiB  
Review
A Survey on Consensus Protocols and Attacks on Blockchain Technology
by Abhishek Guru, Bhabendu Kumar Mohanta, Hitesh Mohapatra, Fadi Al-Turjman, Chadi Altrjman and Arvind Yadav
Appl. Sci. 2023, 13(4), 2604; https://doi.org/10.3390/app13042604 - 17 Feb 2023
Cited by 28 | Viewed by 6212
Abstract
In the current era, blockchain has approximately 30 consensus algorithms. This architecturally distributed database stores data in an encrypted form with multiple checks, including elliptical curve cryptography (ECC) and Merkle hash tree. Additionally, many researchers aim to implement a public key infrastructure (PKI) [...] Read more.
In the current era, blockchain has approximately 30 consensus algorithms. This architecturally distributed database stores data in an encrypted form with multiple checks, including elliptical curve cryptography (ECC) and Merkle hash tree. Additionally, many researchers aim to implement a public key infrastructure (PKI) cryptography mechanism to boost the security of blockchain-based data management. However, the issue is that many of these are required for advanced cryptographic protocols. For all consensus protocols, security features are required to be discussed because these consensus algorithms have recently been attacked by address resolution protocols (ARP), distributed denial of service attacks (DDoS), and sharding attacks in a permission-less blockchain. The existence of a byzantine adversary is perilous, and is involved in these ongoing attacks. Considering the above issues, we conducted an informative survey based on the consensus protocol attack on blockchain through the latest published article from IEEE, Springer, Elsevier, ACM, Willy, Hindawi, and other publishers. We incorporate various methods involved in blockchain. Our main intention is to gain clarity from earlier published articles to elaborate numerous key methods in terms of a survey article. Full article
Show Figures

Figure 1

Back to TopTop