{"title":"Smart Contract as a Service: A Paradigm of Reusing Smart Contract in Web3 Ecosystem","authors":"Jinghan Sun, Abdulmotaleb El Saddik, Wei Cai","doi":"10.1109/mce.2024.3353178","DOIUrl":"https://doi.org/10.1109/mce.2024.3353178","url":null,"abstract":"","PeriodicalId":54330,"journal":{"name":"IEEE Consumer Electronics Magazine","volume":"44 1","pages":""},"PeriodicalIF":4.5,"publicationDate":"2024-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139953200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploring Avatar Experiences in Social VR: A Comprehensive Analysis of User Reviews","authors":"Jiong Dong, Mianxiong Dong, Kaoru Ota","doi":"10.1109/mce.2024.3350875","DOIUrl":"https://doi.org/10.1109/mce.2024.3350875","url":null,"abstract":"","PeriodicalId":54330,"journal":{"name":"IEEE Consumer Electronics Magazine","volume":"142 1","pages":""},"PeriodicalIF":4.5,"publicationDate":"2024-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139953204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Branislav M. Todorović, Nenad M. Stojanović, Gordana S. Velikić
{"title":"Is Direct Sequence Spread Spectrum Modulation Promising for AI-Based Design of 6G Networks?","authors":"Branislav M. Todorović, Nenad M. Stojanović, Gordana S. Velikić","doi":"10.1109/mce.2024.3349458","DOIUrl":"https://doi.org/10.1109/mce.2024.3349458","url":null,"abstract":"","PeriodicalId":54330,"journal":{"name":"IEEE Consumer Electronics Magazine","volume":"22 1","pages":""},"PeriodicalIF":4.5,"publicationDate":"2024-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139953211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dyadic-XV: A Taxonomy of Digital Beings","authors":"Curtis L. Gittens","doi":"10.1109/mce.2024.3349461","DOIUrl":"https://doi.org/10.1109/mce.2024.3349461","url":null,"abstract":"","PeriodicalId":54330,"journal":{"name":"IEEE Consumer Electronics Magazine","volume":"8 1","pages":""},"PeriodicalIF":4.5,"publicationDate":"2024-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139953074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Macedo, Flávia Coimbra Delicato, L. Moraes, G. Fortino
{"title":"Assigning Trust to Devices in the Context of Consumer IoT Applications","authors":"E. Macedo, Flávia Coimbra Delicato, L. Moraes, G. Fortino","doi":"10.1109/mce.2022.3154357","DOIUrl":"https://doi.org/10.1109/mce.2022.3154357","url":null,"abstract":"With the outstanding growth in the number of consumer Internet of Things (IoT) connected devices, especially boosted by smart home applications and wearables, there is a need to provide such devices with security. If any device in such consumer IoT systems gets compromised, a data leak may cause serious threats to privacy, material losses, and even put people's lives at risk. Therefore, in this article, we focus on challenges associated with the trust involving communication between IoT devices, which is a key security-related characteristic in consumer IoT applications. A mathematical trust metric, based on a two-level approach, is used to illustrate how the presented proposal can be useful in the objective assessment of confidence and, consequently, provide better security among IoT devices.","PeriodicalId":54330,"journal":{"name":"IEEE Consumer Electronics Magazine","volume":"1 1","pages":"12-21"},"PeriodicalIF":4.5,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"62339596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Dehury, S. Srirama, Praveen Kumar Donta, S. Dustdar
{"title":"Securing clustered edge intelligence with blockchain","authors":"C. Dehury, S. Srirama, Praveen Kumar Donta, S. Dustdar","doi":"10.1109/mce.2022.3164529","DOIUrl":"https://doi.org/10.1109/mce.2022.3164529","url":null,"abstract":"The devices at the edge of a network are not only responsible for sensing the surrounding environment but are also made intelligent enough to learn and react to the environment. Clustered Edge Intelligence (CEI) emphasizes intelligence-centric clustering instead of device-centric clustering. It allows the devices to share their knowledge and events with other devices and the remote fog or cloud servers. However, recent advancements facilitate the traceability of the events’ history by analyzing edge devices’ event logs, which are compute intensive and easy to alter. This article focuses on a blockchain-based solution for CEI that makes the edge devices’ events history immutable and easily traceable. This article further explains how the edge devices’ activities and the environmental data can be secured from the source device to the cloud servers. Such a secured CEI mechanism can be applied in establishing a transparent and efficient smart city, supply chain, logistics, and transportation systems.","PeriodicalId":54330,"journal":{"name":"IEEE Consumer Electronics Magazine","volume":"1 1","pages":"22-29"},"PeriodicalIF":4.5,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"62339720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}