Journal of Network and Computer Applications最新文献

筛选
英文 中文
Energy and density-based stable election routing protocol for wireless IoT network 基于能量和密度的无线物联网稳定选举路由协议
IF 8.7 2区 计算机科学
Journal of Network and Computer Applications Pub Date : 2025-06-22 DOI: 10.1016/j.jnca.2025.104237
Donghyun Lee, Yongin Jeon, Yunseong Lee, Nhu-Ngoc Dao, Woongsoo Na, Sungrae Cho
{"title":"Energy and density-based stable election routing protocol for wireless IoT network","authors":"Donghyun Lee, Yongin Jeon, Yunseong Lee, Nhu-Ngoc Dao, Woongsoo Na, Sungrae Cho","doi":"10.1016/j.jnca.2025.104237","DOIUrl":"https://doi.org/10.1016/j.jnca.2025.104237","url":null,"abstract":"In battery-based wireless sensor networks (WSN), routing protocols are crucial for enhancing energy efficiency and prolonging network lifetime. These protocols should maximize the discharge times of cluster heads (CH) and sensors for data collection. To maximize the WSN lifetime, the number of clusters, the distance between the base station and the CH, and the remaining battery of sensors should be carefully considered. This study proposes energy and density-based stable election protocol (SEP) for cooperative communication in WSNs to address these challenges. The key contributions of this work are threefold: (1) a novel CH election technique that incorporates both the remaining battery capacity of each sensor and network density; (2) a dynamic mechanism to determining the maximum number of clusters to prevent excessive cluster creation; and (3) an optimized routing approach that enhances energy efficiency. Simulation results conclusively demonstrate that the proposed protocol significantly improves network performance, achieving substantial reductions in total energy consumption and a considerable extension of network lifetime compared to existing protocols. This research advances the state-of-the-art in WSN routing by providing a density-aware and energy-efficient solution that holds significant potential for prolonging the operational lifespan and enhancing the reliability of WSN-based IoT deployments in diverse and challenging environments.","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"245 1","pages":""},"PeriodicalIF":8.7,"publicationDate":"2025-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144341201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LightCGS-Net: A novel lightweight road extraction method for remote sensing images combining global semantics and spatial details LightCGS-Net:一种结合全局语义和空间细节的轻型遥感影像道路提取方法
IF 7.7 2区 计算机科学
Journal of Network and Computer Applications Pub Date : 2025-06-21 DOI: 10.1016/j.jnca.2025.104247
Yifei Duan , Dan Yang , Xiaochen Qu , Le Zhang , Junsuo Qu , Lu Chao , Peilu Gan
{"title":"LightCGS-Net: A novel lightweight road extraction method for remote sensing images combining global semantics and spatial details","authors":"Yifei Duan ,&nbsp;Dan Yang ,&nbsp;Xiaochen Qu ,&nbsp;Le Zhang ,&nbsp;Junsuo Qu ,&nbsp;Lu Chao ,&nbsp;Peilu Gan","doi":"10.1016/j.jnca.2025.104247","DOIUrl":"10.1016/j.jnca.2025.104247","url":null,"abstract":"<div><div>Road extraction remains a critical area of study within the realm of remote sensing image. The simultaneous extraction of accurate global semantic and spatial detail features from such images poses a significant challenge in contemporary research. This paper introduced a novel road extraction methodology, termed LightCGS-Net, which integrated a spatial detail branch derived from a lightweight CNN and a global semantic branch based on an enhanced Swin Transformer within the encoder. The spatial detail branch enhances the accuracy of tiny road extractions, while the global semantic branch preserves comprehensive contextual information. To address the noise interference caused by the extensive redundant data produced by the dual-branch fusion, Gaussian filtering was employed. The Lightweight Parallel Channel and Space Attention Mechanism (PCSAM) in the skip connection addresses road discontinuities caused by tree and building obstructions. The Feature Fusion Mechanism (FFM) module, using dilated convolution, captures edge features and provides precise structural road information, with distinct loss functions for primary and edge roads. Testing on the DeepGlobe, Massachusetts, and SpaceNet 03-05 datasets showed that our network performed well compared to traditional road extraction networks, surpassing them in evaluation scores and segmentation effectiveness, despite having more parameters and computational time. LightCGS-Net stands out in road networks using Transformer technology due to its lower parameter (43.78M) and flops (196.09G). It performs well in IoU metrics and maintains competitiveness in Recall, F1-score, and Accuracy. It shows superior generalization and exceeds traditional semantic segmentation methods in overall effectiveness.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"242 ","pages":"Article 104247"},"PeriodicalIF":7.7,"publicationDate":"2025-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144341204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A secure and quality of service-aware solution for the end-to-end protection of IoT applications 为物联网应用的端到端保护提供安全、优质的服务感知解决方案
IF 7.7 2区 计算机科学
Journal of Network and Computer Applications Pub Date : 2025-06-20 DOI: 10.1016/j.jnca.2025.104246
Stefano Berlato , Umberto Morelli , Roberto Carbone , Silvio Ranise
{"title":"A secure and quality of service-aware solution for the end-to-end protection of IoT applications","authors":"Stefano Berlato ,&nbsp;Umberto Morelli ,&nbsp;Roberto Carbone ,&nbsp;Silvio Ranise","doi":"10.1016/j.jnca.2025.104246","DOIUrl":"10.1016/j.jnca.2025.104246","url":null,"abstract":"<div><div>Internet of Things (IoT) applications increasingly rely on lightweight publish–subscribe protocols (e.g., MQTT) to exchange a considerable amount of sensitive data. However, such data are often threatened by external attackers, malicious insiders, and <em>honest but curious</em> Edge and Cloud providers. Typical security mechanisms — such as Transport Layer Security (TLS) or centralized data authorization management — may expose messages to intermediate nodes and fail to enforce Access Control (AC) policies without relying on (sometimes missing) fully trusted agents. Furthermore, when security mechanisms are in place, they should consider the trust assumptions (e.g., on the presence of certain attackers) and meet the performance goals (e.g., low latency, high scalability) relevant to the underlying scenario. In this paper, we propose a security mechanism based Cryptographic Access Control (CAC) that integrates decentralized AC enforcement with end-to-end protection (in terms of data confidentiality and integrity) for IoT applications employing publish–subscribe protocols. By building on previous work, we also formalize an optimization problem to strike the best possible balance between security and quality of service by fine-tuning the deployment of our security mechanism accordingly. We showcase the benefits of the optimization problem in three different scenarios for IoT applications: Remote Patient Monitoring, Cooperative Maneuvering, and Smart Lock. Finally, our open-source proof-of-concept named CryptoAC demonstrates the feasibility of our security mechanism: a thorough performance evaluation reveals that CryptoAC achieves higher scalability than TLS under multi-publisher workloads and a practical level of overhead for key management and policy updates.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"242 ","pages":"Article 104246"},"PeriodicalIF":7.7,"publicationDate":"2025-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144335611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SwiftShard: Efficient account allocation in blockchain sharding system SwiftShard:区块链分片系统中高效的账号分配
IF 8.7 2区 计算机科学
Journal of Network and Computer Applications Pub Date : 2025-06-19 DOI: 10.1016/j.jnca.2025.104248
Cheng Qu, Shuo Wang, Haowen Zhang, YuanYi Ma, Hang Xiong, Jing Li
{"title":"SwiftShard: Efficient account allocation in blockchain sharding system","authors":"Cheng Qu, Shuo Wang, Haowen Zhang, YuanYi Ma, Hang Xiong, Jing Li","doi":"10.1016/j.jnca.2025.104248","DOIUrl":"https://doi.org/10.1016/j.jnca.2025.104248","url":null,"abstract":"Sharding technology emerges as a scalable solution for expanding blockchain systems, preserving decentralization and security. Despite its promise, challenges such as costly cross-shard transactions and uneven shard load distribution persist. Prior research aiming to mitigate these issues with dynamic transaction allocation has seen limited success due to substantial overhead and dilution of decentralization and security. Our proposed strategy seeks to diminish cross-shard transactions and balance loads effectively at a lower cost, without sacrificing security or decentralization principles. Utilizing an efficient account allocation algorithm and a dual address mechanism for account management, our findings demonstrate that our framework reduces overhead with competitive performance compared to existing methods.","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"147 1","pages":""},"PeriodicalIF":8.7,"publicationDate":"2025-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144335613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent routing optimization for SDN based on PPO and GNN 基于PPO和GNN的SDN智能路由优化
IF 8.7 2区 计算机科学
Journal of Network and Computer Applications Pub Date : 2025-06-19 DOI: 10.1016/j.jnca.2025.104249
Jiawei Wu, ZeLin Zhu
{"title":"Intelligent routing optimization for SDN based on PPO and GNN","authors":"Jiawei Wu, ZeLin Zhu","doi":"10.1016/j.jnca.2025.104249","DOIUrl":"https://doi.org/10.1016/j.jnca.2025.104249","url":null,"abstract":"With the continuous increase of network scale, a variety of emerging applications (e.g., video streaming) continue to emerge, which puts forward differentiated requirements for quality of service (QoS), such as extremely low latency, high bandwidth, low packet loss rate, etc. To this effect, an intelligent routing method is needed to meet various traffic QoS requirements. However, existing routing optimization QoS schemes either lack guaranteed QoS performance or cannot generalize to invisible network topologies. To address the problem, this article innovatively proposes the QoS intelligent routing method PPO-R, which combines PPO and GNN-based routing optimization for SDN. The algorithm generates multiple disjoint candidate paths by designing a redundant tree algorithm, infers the near optimal traffic splitting ratios on the pre-selected path, and reasonably allocates traffic to different paths based on the obtained traffic splitting ratios. Compared to the baseline scheme DQS, in the medium network topology Germany-50, the QoS performance of PPO-R is about 10.6% higher than that of DQS. The experimental results show that the PPO-R algorithm can achieve better QoS routing optimization results, consume less computing resources, and significantly improve the robustness and generalization of QoS routing.","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"65 1","pages":""},"PeriodicalIF":8.7,"publicationDate":"2025-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144335612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ReinFog: A Deep Reinforcement Learning empowered framework for resource management in edge and cloud computing environments ReinFog:用于边缘和云计算环境中资源管理的深度强化学习授权框架
IF 7.7 2区 计算机科学
Journal of Network and Computer Applications Pub Date : 2025-06-19 DOI: 10.1016/j.jnca.2025.104250
Zhiyu Wang , Mohammad Goudarzi , Rajkumar Buyya
{"title":"ReinFog: A Deep Reinforcement Learning empowered framework for resource management in edge and cloud computing environments","authors":"Zhiyu Wang ,&nbsp;Mohammad Goudarzi ,&nbsp;Rajkumar Buyya","doi":"10.1016/j.jnca.2025.104250","DOIUrl":"10.1016/j.jnca.2025.104250","url":null,"abstract":"<div><div>The growing IoT landscape requires effective server deployment strategies to meet demands including real-time processing and energy efficiency. This is complicated by heterogeneous, dynamic applications and servers. To address these challenges, we propose ReinFog, a modular distributed software empowered with Deep Reinforcement Learning (DRL) for adaptive resource management across edge/fog and cloud environments. ReinFog enables the practical development/deployment of various centralized and distributed DRL techniques for resource management in edge/fog and cloud computing environments. It also supports integrating native and library-based DRL techniques for diverse IoT application scheduling objectives. Additionally, ReinFog allows for customizing deployment configurations for different DRL techniques, including the number and placement of DRL Learners and DRL Workers in large-scale distributed systems. Besides, we propose a novel Memetic Algorithm for DRL Component (e.g., DRL Learners and DRL Workers) Placement in ReinFog named MADCP, which combines the strengths of Genetic Algorithm, Firefly Algorithm, and Particle Swarm Optimization. Experiments reveal that the DRL mechanisms developed within ReinFog have significantly enhanced both centralized and distributed DRL techniques implementation. These advancements have resulted in notable improvements in IoT application performance, reducing response time by 45%, energy consumption by 39%, and weighted cost by 37%, while maintaining minimal scheduling overhead. Additionally, ReinFog exhibits remarkable scalability, with a rise in DRL Workers from 1 to 30 causing only a 0.3-second increase in startup time and around 2 MB more RAM per Worker. The proposed MADCP for DRL component placement further accelerates the convergence rate of DRL techniques by up to 38%.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"242 ","pages":"Article 104250"},"PeriodicalIF":7.7,"publicationDate":"2025-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144321860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predictive modeling of RRC inactive transitions and latency impacts for energy optimization in live NR SA networks 实时NR SA网络能量优化的RRC非活动转换和延迟影响预测建模
IF 7.7 2区 计算机科学
Journal of Network and Computer Applications Pub Date : 2025-06-18 DOI: 10.1016/j.jnca.2025.104260
Roopesh Kumar Polaganga , Qilian Liang
{"title":"Predictive modeling of RRC inactive transitions and latency impacts for energy optimization in live NR SA networks","authors":"Roopesh Kumar Polaganga ,&nbsp;Qilian Liang","doi":"10.1016/j.jnca.2025.104260","DOIUrl":"10.1016/j.jnca.2025.104260","url":null,"abstract":"<div><div>With the rapid evolution of 5G and the anticipated advancements in future 6G networks, machine learning is unlocking unprecedented opportunities for network optimization. Among the most significant advancements in 5G Standalone (SA) networks is the Radio Resource Control (RRC) Inactive state, a feature that is critical for achieving low-latency performance. Building on this foundation, our study is categorized into two key contributions. First, we present a novel application of ensemble machine learning to predict transitions from the RRC Inactive state, specifically distinguishing between RRC Resume and RRC Fallback requests. This predictive capability, developed using real-world New Radio (NR) SA network data, offers insights into previously unexplored transition behavior. Second, we demonstrate how this predictive capability can be applied to optimize gNodeB (gNB) operations, proactively managing User Equipment (UE) contexts to minimize unnecessary paging and processing overhead. Our findings show that the proposed framework achieves considerable energy savings while maintaining latency requirements critical to RRC Inactive mechanisms. These results underscore the practicality and scalability of machine learning-driven approaches to enhance network resource allocation and operational efficiency in 5G SA networks, providing a pathway to sustainable and high-performing next-generation networks.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"242 ","pages":"Article 104260"},"PeriodicalIF":7.7,"publicationDate":"2025-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144321861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Poisoning behavioral-based worker selection in mobile crowdsensing using generative adversarial networks 使用生成对抗网络的移动群体感知中基于中毒行为的工人选择
IF 7.7 2区 计算机科学
Journal of Network and Computer Applications Pub Date : 2025-06-11 DOI: 10.1016/j.jnca.2025.104236
Ruba Nasser , Ahmed Alagha , Shakti Singh , Rabeb Mizouni , Hadi Otrok , Jamal Bentahar
{"title":"Poisoning behavioral-based worker selection in mobile crowdsensing using generative adversarial networks","authors":"Ruba Nasser ,&nbsp;Ahmed Alagha ,&nbsp;Shakti Singh ,&nbsp;Rabeb Mizouni ,&nbsp;Hadi Otrok ,&nbsp;Jamal Bentahar","doi":"10.1016/j.jnca.2025.104236","DOIUrl":"10.1016/j.jnca.2025.104236","url":null,"abstract":"<div><div>With the widespread adoption of Artificial intelligence (AI), AI-based tools and components are becoming omnipresent in today’s solutions. However, these components and tools are posing a significant threat when it comes to adversarial attacks. Mobile Crowdsensing (MCS) is a sensing paradigm that leverages the collective participation of workers and their smart devices to collect data. One of the key challenges faced at the selection stage is ensuring task completion due to workers’ varying behavior. AI has been utilized to tackle this challenge by building unique models for each worker to predict their behavior. However, the integration of AI into the system introduces vulnerabilities that can be exploited by malicious insiders to reduce the revenue obtained by victim workers. This work proposes an adversarial attack targeting behavioral-based selection models in MCS. The proposed attack leverages Generative Adversarial Networks (GANs) to generate poisoning points that can mislead the models during the training stage without being detected. This way, the potential damage introduced by GANs on worker selection in MCS can be anticipated. Simulation results using a real-life dataset show the effectiveness of the proposed attack in compromising the victim workers’ model and evading detection by an outlier detector, compared to a benchmark. In addition, the impact of the attack on reducing the payment obtained by victim workers is evaluated.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"242 ","pages":"Article 104236"},"PeriodicalIF":7.7,"publicationDate":"2025-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144289942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Clear data, clear roads: Imputing missing data for enhanced intersection flow of connected autonomous vehicles 清晰的数据,清晰的道路:输入缺失的数据,以增强互联自动驾驶汽车的交叉路口流量
IF 7.7 2区 计算机科学
Journal of Network and Computer Applications Pub Date : 2025-06-11 DOI: 10.1016/j.jnca.2025.104233
M. Freire , A. Maia , G. Figueiredo , C. Prazeres , W. Lobato , L. Villas , C. Sommer , M. Peixoto
{"title":"Clear data, clear roads: Imputing missing data for enhanced intersection flow of connected autonomous vehicles","authors":"M. Freire ,&nbsp;A. Maia ,&nbsp;G. Figueiredo ,&nbsp;C. Prazeres ,&nbsp;W. Lobato ,&nbsp;L. Villas ,&nbsp;C. Sommer ,&nbsp;M. Peixoto","doi":"10.1016/j.jnca.2025.104233","DOIUrl":"10.1016/j.jnca.2025.104233","url":null,"abstract":"<div><div>Urban intersection management affects traffic safety and flow. Particularly with the increasing presence of Connected Autonomous Vehicle (CAV), pedestrians, and cyclists, inefficient control can lead to congestion, delays, and an increased risk of accidents. Data communication failures due to physical obstacles, interference, network issues, or faulty sensors can create information gaps that negatively impact management solutions. We present an intersection management system for CAVs that relies on continuous data communication between vehicles and infrastructure. The system performs conflict analysis to identify potential collisions while dynamically adjusting vehicle speeds. To address missing information, we incorporate data imputation usingPiecewise Cubic Hermite Interpolating Polynomial (PCHIP), a method for smooth time series interpolation method. Simulation results demonstrate that Dynamic Adaptive Intersection Control System (DAICS) sustains high performance under data loss scenarios, reducing average travel time by 68.4% compared to the baseline algorithm, Intersection Management for Autonomous Vehicles (IMAV).</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"242 ","pages":"Article 104233"},"PeriodicalIF":7.7,"publicationDate":"2025-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144271431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decentralized certificate issuance and verification system using Ethereum blockchain technology 使用以太坊区块链技术的分散式证书颁发和验证系统
IF 7.7 2区 计算机科学
Journal of Network and Computer Applications Pub Date : 2025-06-10 DOI: 10.1016/j.jnca.2025.104190
Sam Prince Franklin S., Mary Shamala L., Thankaraja Raja Sree
{"title":"Decentralized certificate issuance and verification system using Ethereum blockchain technology","authors":"Sam Prince Franklin S.,&nbsp;Mary Shamala L.,&nbsp;Thankaraja Raja Sree","doi":"10.1016/j.jnca.2025.104190","DOIUrl":"10.1016/j.jnca.2025.104190","url":null,"abstract":"<div><div>The increasing prevalence of fraudulent and inefficient centralized certificate systems poses significant challenges across various sectors, undermining trust and hindering efficient verification processes. This paper aims to overcome these difficulties by offering a decentralized certificate issuance and verification system based on Ethereum blockchain technology and Goerli testnet. It is developed to provide a reliable and transparent way to create and validate credentials in various industries (for example, education—offering a transparent and non-tamper proof validation of academic credentials; healthcare—allowing for the secure validation of medical education; government—speeding up the validation of official documents). Our solution then uses the unique features of decentralized blockchain technology to remove the need for a central authority, closing off an entire attack vector of fraud and the misrepresentation of businesses, which opens the door to greater global trust and security when it comes to digital credentials. Certificate information is securely stored within smart contracts on the Ethereum blockchain, enabling automated verification processes for enhanced efficiency. Tested on the Goerli testnet and incorporating a user-friendly mobile application, our approach offers a robust and scalable solution for certificate management, promising to revolutionize credentialing processes across diverse applications and ensure enhanced security and trustworthiness for future digital ecosystems.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"242 ","pages":"Article 104190"},"PeriodicalIF":7.7,"publicationDate":"2025-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144263320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信