Transactions on Emerging Telecommunications Technologies最新文献

筛选
英文 中文
Blockchain Assisted Secure Authentication Protocol for Aerial Surveillance in IoT-Based Smart Agriculture 基于物联网的智能农业中空中监控的区块链辅助安全认证协议
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2025-04-13 DOI: 10.1002/ett.70118
G. S. Tamizh Arasi, P. Rubini, K. C. Sriharipriya, Achyut Shankar, Bharat Bhushan, Abhay Bansal
{"title":"Blockchain Assisted Secure Authentication Protocol for Aerial Surveillance in IoT-Based Smart Agriculture","authors":"G. S. Tamizh Arasi,&nbsp;P. Rubini,&nbsp;K. C. Sriharipriya,&nbsp;Achyut Shankar,&nbsp;Bharat Bhushan,&nbsp;Abhay Bansal","doi":"10.1002/ett.70118","DOIUrl":"https://doi.org/10.1002/ett.70118","url":null,"abstract":"<div>\u0000 \u0000 <p>In modern smart agriculture, unmanned aerial vehicles (UAVs) play a crucial role in data acquisition, crop monitoring, and precision farming using high-resolution cameras and advanced sensors. However, the extensive use of IoT devices and aerial surveillance systems introduces significant security challenges, making drone-captured data vulnerable to unauthorized access, cyberattacks, and data tampering. As multiple entities collaborate in smart agriculture, the need for a secure and efficient authentication mechanism becomes critical. To address these concerns, this paper presents a blockchain-assisted secure two-factor mutual authentication scheme for aerial surveillance security in IoT-enabled smart agriculture. The key contributions are twofold: (1) A blockchain-based authentication framework that ensures decentralized, tamper-proof security, and (2) an efficient and lightweight authentication mechanism using physically unclonable functions (PUF) to enhance device authentication and mitigate impersonation threats. The proposed protocol is formally verified using automated validation of internet security protocols and applications (AVISPA) to assess its security robustness. The results demonstrate that the protocol effectively defends against major security threats while maintaining low computational complexity (1.11 ms). Comparative analysis indicates that the proposed approach outperforms conventional authentication schemes, offering enhanced security, scalability, and efficiency in IoT-based aerial surveillance security for smart agriculture.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 4","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143826773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid Fire Hawk With Successive Convex Approximation for Sum Rate Maximization Problem in Double IRS-Assisted Multi-User MIMO mmWave Systems 基于连续凸逼近的混合火鹰法求解双irs辅助多用户MIMO毫米波系统和速率最大化问题
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2025-04-13 DOI: 10.1002/ett.70125
Ragodaya Deepthi Kadiyala, Anjaneyulu Lokam, Chayan Bhar
{"title":"Hybrid Fire Hawk With Successive Convex Approximation for Sum Rate Maximization Problem in Double IRS-Assisted Multi-User MIMO mmWave Systems","authors":"Ragodaya Deepthi Kadiyala,&nbsp;Anjaneyulu Lokam,&nbsp;Chayan Bhar","doi":"10.1002/ett.70125","DOIUrl":"https://doi.org/10.1002/ett.70125","url":null,"abstract":"<div>\u0000 <p>A promising technique for improving spectral efficiency in wireless communication is Intelligent Reflecting Surfaces (IRS). However, because of significant path loss and obstructions, a single IRS is not enough to provide adequate coverage and beamforming gain in millimeter-wave (mmWave) networks. To overcome these limitations, this paper investigates the impact of a dual-IRS-assisted multi-user MIMO mmWave system, which enables cooperative passive beamforming to enhance the effective channel gain and extend coverage in non-line-of-sight (NLoS) environments. The proposed approach optimizes phase shift design at the IRSs and digital precoding at the transmitter by formulating a weighted sum rate maximization issue. To effectively solve the precoding and phase shift design problem, a hybrid metaheuristic optimization framework that combines Bernstein-Levy Search Differential Evolution (BL-SDE), Hybrid Aquila with Fire Hawk (HAOFH) optimization, and Double Stochastic Successive Convex Approximation (DSSCA) is generated. The hybrid Aquila optimizer specifically solves the digital precoding matrix design challenge, while the Fire Hawk optimizer solves the analog phase shift problem. Throughput maximization is a critical indicator for assessing IRS-assisted mmWave MIMO systems, and its direct impact on network efficiency and user experience is the driving force for its adoption as the performance metric. According to simulation results, the suggested dual-IRS system outperforms traditional single-IRS and non-IRS-assisted schemes in terms of spectral efficiency, sum rate, bit error rate, and mean square error. These findings support the efficiency of the dual-IRS framework in addressing mmWave channel defects and promoting next-generation wireless communication.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 4","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143826840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Analysis of Ethereum Blockchain Enabled IoT Based Model for Secure Data Transmission 基于以太坊区块链的物联网安全数据传输模型设计与分析
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2025-04-10 DOI: 10.1002/ett.70126
Sapna S. Khapre, Santosh Kumar Sahoo
{"title":"Design and Analysis of Ethereum Blockchain Enabled IoT Based Model for Secure Data Transmission","authors":"Sapna S. Khapre,&nbsp;Santosh Kumar Sahoo","doi":"10.1002/ett.70126","DOIUrl":"https://doi.org/10.1002/ett.70126","url":null,"abstract":"<div>\u0000 \u0000 <p>Ensuring the security and privacy of sensitive health data in Internet of Things (IoT)-based healthcare systems (HCS) is a critical challenge. This paper proposes a robust security framework by integrating blockchain mechanisms and deep learning (DL) approaches to enhance security and data privacy. The proposed framework leverages the Ethereum blockchain with zero knowledge proof (ZKP) to ensure data integrity and confidentiality, while the interplanetary file system (IPFS) provides secure and efficient data storage. Additionally, a novel At-GAN-BiLSTM model is introduced for intrusion detection by combining the attention mechanism, generative adversarial networks (GAN) and bidirectional long short-term memory (Bi-LSTM) to improve detection accuracy and also help to enhance model robustness. The proposed model is evaluated by two different benchmark datasets, namely CICIDS-2018 (D1) and ToN-IoT (D2), achieving accuracies of 99.9% and 99.1%, respectively. Comparative investigation shows that the proposed approach reduces false alarm rates (FAR) and performs better than current models in identifying impersonation, insider, and man-in-the-middle (MITM) attacks. By integrating blockchain and DL, the proposed framework significantly enhances intrusion detection, data security, and overall system resilience, addressing key vulnerabilities in IoT-based healthcare security.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 4","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143818466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Correction to “Lattice Homomorphic Assisted Privacy Preserving Electronic Health Records Data Transmission in Internet of Medical Things Using Blockchain” 对“基于b区块链的医疗物联网中格同态辅助隐私保护电子病历数据传输”的修正
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2025-04-07 DOI: 10.1002/ett.70124
{"title":"Correction to “Lattice Homomorphic Assisted Privacy Preserving Electronic Health Records Data Transmission in Internet of Medical Things Using Blockchain”","authors":"","doi":"10.1002/ett.70124","DOIUrl":"https://doi.org/10.1002/ett.70124","url":null,"abstract":"<p>R. Vijay Anand, I. Alagiri, P. Jayalakshmi, M. G. Brahmam, and A. B. Abdullah, “Lattice Homomorphic Assisted Privacy Preserving Electronic Health Records Data Transmission in Internet of Medical Things Using Blockchain,” <i>Transactions on Emerging Telecommunications Technologies</i> 36 (2025): e70070, https://doi.org/10.1002/ett.70070</p><p>The city name in Affiliation 1 was inadvertently changed by the author. The correct affiliation for authors R. Vijay Anand, I. Alagiri, P. Jayalakshmi, and Madala Guru Brahmam is provided below:</p><p><sup>1</sup>School of Computer Science Engineering and Information Systems, Vellore Institute of Technology, Vellore, India</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 4","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/ett.70124","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143793293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Transactions in IoT Network Using PINN-Based Intrusion Detection System and HDPoA Blockchain Protocol 基于pup入侵检测系统和HDPoA区块链协议的物联网安全交易
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2025-04-07 DOI: 10.1002/ett.70116
Sourav Mishra, Vijay Kumar Chaurasiya
{"title":"Secure Transactions in IoT Network Using PINN-Based Intrusion Detection System and HDPoA Blockchain Protocol","authors":"Sourav Mishra,&nbsp;Vijay Kumar Chaurasiya","doi":"10.1002/ett.70116","DOIUrl":"https://doi.org/10.1002/ett.70116","url":null,"abstract":"<div>\u0000 \u0000 <p>IoT is a rapidly developing technology with a wealth of creative application possibilities. However, IoT wireless sensor networks are vulnerable to Denial of Service (DoS) attacks due to their insecure nature. Although network integrity and security have been ensured through the use of distributed ledger and blockchain technologies, privacy preservation concerns frequently arise with traditional approaches. So, deep learning-based Physics-informed neural networks (PINN) and Honesty-based Distributed Proof-of-Authority (HDPoA) are developed to enhance transaction security and detect intrusions. Initially, the mobile nodes were deployed in different regions to gather transactions and an intrusion detection system to analyze attacks. First, the Intrusion Detection System (IDS) uses a deep learning approach for detecting the intrusion in the network. For that, the collected data from the deployed nodes are pre-processed using Variational auto-encoder and min-max normalization to standardize input dataset values. Then the features are selected using wild horse optimization and classified using PINN to predict data attack or non-attack. After that, Homomorphic variable tag generation is used for normal transactions with multiple copies in the same document, which are then converted into hash values using the Keccak hashing function. The miner validates transactions based on rank-based priority. Honesty-based Distributed Proof-of-Authority (HDPoA) was used for network security, making it suitable for deployment in blockchain-based IoT applications. The proposed deep learning-based PINN classifier reached 97.2% accuracy and 96.52% specificity. Homomorphic variable (HV) tag generation takes 0.4 s, while the Keccak algorithm takes 0.3 s for hash generation, and the HDPoA protocol has 420 s for block generation time.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 4","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143793292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Insider Attack Monitoring and Secured Data Transfer Using KPCC and BiO-ELSTM in Cloud Computing 云计算中使用KPCC和BiO-ELSTM的内部攻击监控和安全数据传输
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2025-04-07 DOI: 10.1002/ett.70095
Rama Krishna Mani Kanta Yalla, Vijaykumar Mamidala, Akhil Raj Gaius Yallamelli, Mohanarangan Veerappermal Devarajan, Thirusubramanian Ganesan, Aceng Sambas
{"title":"Insider Attack Monitoring and Secured Data Transfer Using KPCC and BiO-ELSTM in Cloud Computing","authors":"Rama Krishna Mani Kanta Yalla,&nbsp;Vijaykumar Mamidala,&nbsp;Akhil Raj Gaius Yallamelli,&nbsp;Mohanarangan Veerappermal Devarajan,&nbsp;Thirusubramanian Ganesan,&nbsp;Aceng Sambas","doi":"10.1002/ett.70095","DOIUrl":"https://doi.org/10.1002/ett.70095","url":null,"abstract":"<div>\u0000 \u0000 <p>Handling of User's data effectively in the cloud has become a crucial task. Monitoring insider attacks in the cloud and securely transferring cookie files have not been concentrated in the existing works. Insider threats pose significant risks to data security in cloud environments, particularly during data transfers between public and private/hybrid clouds. Existing methodologies often fail to adequately monitor these threats and secure data, leading to vulnerabilities such as cookie attacks and data integrity issues. This paper proposes a novel framework that integrates the Cyclic permutation-based Hirose-Streebog (CH-Streebog) algorithm for secure logins and hashcode verification, alongside the KPCC method for securing cookie files. Additionally, the WS-Fuzzy method is employed for optimal virtual machine selection, and the BiO-ELSTM classifier is utilized for effective insider threat monitoring, aiming to reduce false alarm rates. The proposed framework demonstrates impressive performance metrics, achieving a precision of 98.95%, recall of 98.02%, f-measure of 98.48%, accuracy of 98.26%, and specificity of 98.78%. These results indicate a significant improvement in insider threat detection and secure data handling in cloud environments compared to existing methods.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 4","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143793291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Resource Allocation in Digital Twin-Assisted Mobile Edge Computing Network 数字双机辅助移动边缘计算网络中的高效资源分配
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2025-04-02 DOI: 10.1002/ett.70108
Ilsa Rameen, Mudassar Ali, Muhammad Imran, Muhammad Naeem
{"title":"Efficient Resource Allocation in Digital Twin-Assisted Mobile Edge Computing Network","authors":"Ilsa Rameen,&nbsp;Mudassar Ali,&nbsp;Muhammad Imran,&nbsp;Muhammad Naeem","doi":"10.1002/ett.70108","DOIUrl":"https://doi.org/10.1002/ett.70108","url":null,"abstract":"<div>\u0000 \u0000 <p>Considering the rapid growth in user count and increasing demand for higher data rates, we need to optimize network strategies to accommodate more users and increase the network throughput. Therefore, this work aims to accommodate maximum IoT nodes and increase the network's throughput simultaneously by optimizing the IoT node association and power allocation in the digital twin (DT)-assisted mobile edge computing (MEC) network. The DT of each cloudlet is considered here which helps to optimize the power allocation and IoT node association. The DT technology helps make more accurate and optimized decisions in the MEC network by creating real-time digital representations of physical objects. This work formulates the optimization problem as a mixed integer nonlinear programming problem. To solve the proposed problem, the outer approximation algorithm is used due to its lesser complexity. The proposed algorithm's convergence, effectiveness, and lesser complexity leads to <span></span><math></math>-optimal solution = <span></span><math></math>, achieved using standard problem solvers. The simulation results in terms of associated IoT nodes and the network's throughput demonstrate the effectiveness of the proposed approach.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 4","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143749636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy Efficient Dual Index Multicarrier M-Ary Cyclic Shifted Chaotic Vector Shift Keying System 高能效双指标多载波M-Ary循环移位混沌矢量移位键控系统
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2025-04-01 DOI: 10.1002/ett.70123
G. Bavatharani, T. Laxmikandan, T. Manimekalai
{"title":"Energy Efficient Dual Index Multicarrier M-Ary Cyclic Shifted Chaotic Vector Shift Keying System","authors":"G. Bavatharani,&nbsp;T. Laxmikandan,&nbsp;T. Manimekalai","doi":"10.1002/ett.70123","DOIUrl":"https://doi.org/10.1002/ett.70123","url":null,"abstract":"<div>\u0000 \u0000 <p>Chaotic signals are highly suitable for spread spectrum communication due to their inherent anti-jamming and anti-interference properties. Chaos-based multicarrier systems meet the increasing demands for high spectral efficiency, energy efficiency, secure, and reliable communication. However, the transmission of reference signals in these systems negatively impacts both spectral and energy efficiency. In this work, we enhance the energy efficiency of chaos-based multicarrier systems by employing index modulation with dual indexing on carriers, combined with cyclic-shifted chaotic signals. This approach not only improves energy efficiency but also reduces hardware complexity by utilizing a subset of subcarriers. Semi-analytical expressions for bit error rate (BER) over AWGN (additive white Gaussian noise) and multipath fading channels have been derived and validated through simulations. Comparative analysis reveals that the proposed system achieves significant improvement in BER performance and offers gain in energy efficiency up to a 2.5 dB over existing chaotic multicarrier systems and reduced hardware complexity in addition.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 4","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143741401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Secure Multi-Model Biometrics Using Deep Learning Model Based-Optimal Hybrid Pattern by the Heuristic Approach 基于启发式方法的基于深度学习模型的最优混合模式安全多模型生物识别
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2025-04-01 DOI: 10.1002/ett.70106
Samatha J, Madhavi Gudavalli
{"title":"A Secure Multi-Model Biometrics Using Deep Learning Model Based-Optimal Hybrid Pattern by the Heuristic Approach","authors":"Samatha J,&nbsp;Madhavi Gudavalli","doi":"10.1002/ett.70106","DOIUrl":"https://doi.org/10.1002/ett.70106","url":null,"abstract":"<div>\u0000 \u0000 <p>A new Deep Learning (DL)-based privacy preservation method using multimodal biometrics is implemented in this work. Here, the fingerprint, iris, and face are aggregated in the initial phase and fed to the Optimal Hybrid Pattern, where the Local Gradient Pattern and Local Weber Pattern are used. Thus, two sets of patterns from two diverse techniques for fingerprint, face, and iris are attained. Here, the Fitness-aided Random Number in Cheetah Optimizer (FRNCO) is used for optimization and also used for selecting the optimal Pixels to attain the optimal pattern. Further, these three pattern images are used to attain the histogram-based features, where the same FRNCO model is used for optimization. It is then forwarded to the final Deep Bayesian Network (DBN) with a Gated Recurrent Unit (GRU) termed the DB-GRU approach for acquiring the classified outcomes. The designed model is assimilated to recognize the efficacy of the developed model.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 4","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143741402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Survey of Blockchain-Based Industrial Metaverse in SMMEs 基于区块链的中小企业工业元宇宙研究
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2025-04-01 DOI: 10.1002/ett.70109
Dianwei Wang, Junbiao Wang, Aijun Yan, Taotao Li, Yi Zhou, Qinqrui Tu, Jingfeng Zhu, Yejun Yang
{"title":"Survey of Blockchain-Based Industrial Metaverse in SMMEs","authors":"Dianwei Wang,&nbsp;Junbiao Wang,&nbsp;Aijun Yan,&nbsp;Taotao Li,&nbsp;Yi Zhou,&nbsp;Qinqrui Tu,&nbsp;Jingfeng Zhu,&nbsp;Yejun Yang","doi":"10.1002/ett.70109","DOIUrl":"https://doi.org/10.1002/ett.70109","url":null,"abstract":"<div>\u0000 \u0000 <p>The convergence of blockchain technology and the industrial metaverse is poised to revolutionize digital transformation in small- and medium-sized manufacturing enterprises (SMMEs), addressing their unique challenges and unlocking new opportunities for innovation and competitiveness. This survey explores the fundamental concepts, state-of-the-art advancements, and practical applications of blockchain and industrial metaverse technologies, focusing on their synergistic potential to reshape supply chain management, enhance production efficiency, and drive intelligent manufacturing. Key blockchain features such as decentralization, distributed ledgers, and smart contracts are analyzed alongside metaverse technologies like digital twins, virtual reality, and augmented reality, showcasing their transformative impact on data security, product traceability, and operational efficiency. Case studies and industry insights highlight the practical integration of these technologies in SMMEs, demonstrating their ability to overcome resource constraints and align with strategic goals. The survey also addresses the major challenges—technological, financial, and infrastructural—faced by SMMEs in digital transformation, providing actionable strategies and policy recommendations. By examining the interplay between blockchain and the industrial metaverse, this paper underscores the emerging trends and future trajectories of these technologies, offering a comprehensive roadmap for leveraging their potential to achieve sustainable growth and innovation in the manufacturing sector.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 4","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143749684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信