ARTICLE | doi:10.20944/preprints202205.0220.v1
Subject: Mathematics & Computer Science, Information Technology & Data Management Keywords: security; privacy; blockchain; smartcontracts; IoT; encryption; transaction
Online: 18 May 2022 (02:43:20 CEST)
When we talk about the Internet of Things, we are referring to the connecting of things to a1 physical network that is embedded with software, sensors, and other devices that allow information2 to be exchanged between devices. It is possible that the interconnection of devices will present3 issues in terms of security, trustworthiness, reliability, and confidentiality, among other things.4 The proposed approach is effective at detecting intrusions into the Internet of Things network.5 Initially, the privacy-preserving technology was deployed utilising a Blockchain-based methodology6 to ensure that personal information was protected. Patients’ health records (PHR) security is the7 most crucial component of encryption over the Internet because of the value and importance of these8 records, particularly in the context of the Internet of Medical Things (IoMT). The search terms access9 mechanism is one of the most common approaches used to access personal health records from a10 database, but it is vulnerable to a number of security flaws. However, while blockchain-enabled11 healthcare systems provide increased security, they may also introduce weaknesses into the current12 state of the art. Blockchain-enabled frameworks have been proposed in the literature as a means13 of resolving those challenges. These solutions, on the other hand, are primarily concerned with14 data storage, with Blockchain serving as a database. To enable secure search and keyword-based15 access to a distributed database, this study proposes the use of blockchain technology as a distributed16 database, together with a homomorphic encryption mechanism. Aside from that, the suggested17 system includes a secure key revocation mechanism that can be used to automatically update various18 policies.As a result, our proposed approach provides greater security, efficiency, and transparency19 while also being more cost-effective. We have compared the findings of our proposed models with20 those of the benchmark models, if appropriate. Our comparison research demonstrates that our21 suggested framework provides a more secure and searchable mechanism for the healthcare system22 than the current state of the art.
ARTICLE | doi:10.20944/preprints201908.0243.v1
Subject: Mathematics & Computer Science, General & Theoretical Computer Science Keywords: Internet of Things; Security; Sybil attack; Quality of Service; multi-hop flows; ad hoc networks
Online: 23 August 2019 (09:56:55 CEST)
The Internet of Things (IoT) is an emerging technology that aims to enable the interconnection of a large number of smart devices and heterogeneous networks. Ad hoc networks play an important role in the designing of IoT-enabled platforms due to their efficient, flexible, low-cost, and dynamic infrastructures. These networks utilize the available resources efficiently to maintain the Quality of Service (QoS) in a multi-hop communication. However, in a multi-hop communication, the relay nodes can be malicious, thus requiring a secured and reliable data transmission. In this paper, we propose a QoS-aware secured communication scheme for IoT-based networks (QoS-IoT). In QoS-IoT, a Sybil attack detection mechanism is used for the identification of Sybil nodes and their forged identities in multi-hop communication. %by high-power and mobile nodes. After Sybil nodes detection, an optimal contention window (CW) is selected for QoS provisioning, i.e., to achieve per-flow fairness and efficient utilization of the available bandwidth. In a multi-hop communication, the MAC layer protocols do not perform well in terms of fairness and throughput, especially when the nodes generate a large amount of data. It is because the MAC layer has no capability of providing QoS to prioritized or forwarding flows. We evaluate the performance of QoS-IoT in terms of Sybil attack detection, fairness, throughput, and buffer utilization. The simulation results show that the proposed scheme outperforms the existing schemes and significantly enhances the performance of the network with a large volume of data. Moreover, the proposed scheme is resilient against Sybil attack.
ARTICLE | doi:10.20944/preprints201910.0014.v1
Subject: Biology, Plant Sciences Keywords: Piriformospora indica; Trichoderma viride; final disease severity; grain yield and tolerance
Online: 2 October 2019 (05:13:13 CEST)
In this study, we evaluated the potential of fungal endophytes to control yellow rust in wheat (Triticum aestivum L.) as endophytes are beneficial microbes and alternate to pesticides for confronting pathogens. The in-vitro efficacy of the fungal endophytes isolated from different desert plants was evaluated and the best four namely Colletotrichum lindemuthianum, Piriformospora indica, Acremonium lolii and Trichoderma viride were selected. Seeds of two susceptible wheat genotypes namely Fareed-06 and Shafaq-06 obtained from screening experiment were inoculated by dipping in four endophytic spore suspensions and were sown using randomized complete block design under factorial arrangement. Data concerning about area under disease progress curve, final disease severity percentage, coefficient of infection,1000- grains weight and grain yield were recorded. Results showed that endophyte P. indica showed significant decrease in final disease severity (FDS) and area under disease progress curve (AUDPC), resultantly 12.2% grain yield gain in rust susceptible wheat genotypes of Fareed-06 and Shafaq-06 followed by the endophytes T. viride, C. lindemuthianum and A. lolii with the grain yield gain of 10.6%, 06.2% and 04.2% respectively. In crux, fungal endophytes are valuable microbes which can be employed to induce tolerance against P. striiformis in yellow rust vulnerable areas for better and sustainable wheat production.