Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
                                            Some full text articles may not yet be available without a charge during the embargo (administrative interval).
                                        
                                        
                                        
                                            
                                                
                                             What is a DOI Number?
                                        
                                    
                                
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
- 
            Deep neural networks (DNNs) are influencing a wide range of applications from safety-critical to security-sensitive use cases. In many such use cases, the DNN inference process relies on distributed systems involving IoT devices and edge/cloud severs as participants where a pre-trained DNN model is partitioned/split onto multiple parts and the participants collaboratively execute them. However, often such collaboration requires dynamic DNN partitioning information to be exchanged among the participants over unsecured network or via relays/hops which can lead to novel privacy vulnerabilities. In this paper, we propose a DNN model extraction attack that exploits such vulnerabilities to not only extract the original input data, but also reconstruct the entire victim DNN model. Specifically, the proposed attack model utilizes extracted/leaked data and adversarial autoencoders to generate and train a shadow model that closely mimics the behavior of the original victim model. The proposed attack is query-free and does not require the attacker to have any prior information about the victim model and input data. Using an IoT- edge hardware testbed running collaborative DNN inference, we demonstrate the effectiveness of the proposed attack model in extracting the victim model with high levels of certainty across many realistic scenarios.more » « lessFree, publicly-accessible full text available May 12, 2026
- 
            The management of radioactive sources is a criti- cal process that ensures the safe and responsible handling of radioactive materials throughout their lifecycle. These sources require careful management from production to disposal, such as real-time tracking and radiation monitoring to follow everyone’s safety rules and protect people and the environment. However, these sources present significant global challenges, especially regarding safety, security, and transparency. Current systems face limitations such as fragmented oversight, lack of accountability, and risks of unauthorized access. To address these limitations, this paper proposes a blockchain-based radioactive source lifecycle management system to manage the lifecycle of radioactive sources. Blockchain’s decentralized and tamper-proof ledger secures data throughout the entire lifecycle of radioactive materials. By using smart contracts and access controls, the system ensures that only authorized parties can monitor and verify transactions in real- time, which reduces human error and prevents unauthorized changes to the data. Users can perform key operations such as retrieving source details, transferring ownership, updating source locations, and adding observers to our proposed system. Our experiment in designing and testing a blockchain application has proven the potential for a secure and transparent system that enhances global cooperation in managing radioactive sources. Overall, the proposed system not only addresses current challenges in radioactive source management but also enhances the tracking and monitoring of radioactive materials.more » « lessFree, publicly-accessible full text available March 22, 2026
- 
            The need for secure and efficient communication between connected devices continues to grow in healthcare systems within smart cities. Secure communication of healthcare data in Internet of Things (IoT) systems is critical to ensure patient privacy and data integrity. Problems with healthcare communication, like data breaches, integrity issues, scalability issues, and cyber threats, make it harder for people to trust doctors, cause costs to rise, stop people from using new technology, and put private data at risk. So, this paper presents a blockchain-based hybrid method for sending secure healthcare data that combines IoT systems with blockchain technology and high-tech encryption techniques like elliptic curve cryptography (ECC). The proposed method uses the public key of a smart contract to encrypt private data to protect its privacy. It also uses cryptographic hashing and digital signatures to make sure that the data is correct and real. The framework stores metadata (e.g., hashes and signatures) on-chain, and large data uses off-chain storage like IPFS to reduce costs and improve scalability. It also incorporates a mechanism to authenticate IoT devices and enable secure communication across heterogeneous networks. Moreover, this work bridges gaps in existing solutions by providing an end-to-end secure communication system for healthcare applications. It provides strong data security and efficient storage for a reliable and scalable way to handle healthcare data safely in IoT ecosystems.more » « lessFree, publicly-accessible full text available March 22, 2026
- 
            Free, publicly-accessible full text available January 1, 2026
- 
            The emerging field of smart healthcare has identified emotion detection as a key component in improving patient care, diagnostics, and therapeutic interventions. This paper introduces an innovative approach to emotion detection within the healthcare domain by integrating a Convolutional Neural Network (CNN) with a Maximum A Posterior (MAP) estimator prepared for Magnitude-Squared Spectrum (MSS) analysis. The effectiveness of CNN’s advanced feature extraction capabilities with the statistical strength of MAP estimation offers a promising avenue for interpreting complex physiological signals. The proposed methodology aims to accurately discern and quantify emotional states, thus contributing to the personalization and effectiveness of healthcare services. To validate the efficacy of this approach, the work conducted extensive experiments on a diverse data set composed of physiological signals, demonstrating that the proposed model outperforms existing limitations in emotion recognition tasks. The integration of MSS into CNN frameworks, added with MAP estimation, provides a significant improvement in the detection and analysis of emotions, resulting in more responsive and intelligent healthcare systems. This proposed paper not only presents a novel methodological contribution, but also demonstrates the groundwork for future research toward the intersection of emotional intelligence and healthcare technology.more » « lessFree, publicly-accessible full text available December 8, 2025
- 
            The rapid evolution of Software-Defined Networking (SDN) has transformed network management by decoupling the control and data planes. It provides centralized control, enhanced flexibility, and programmability of network management services. However, this centralized control introduces security vulnerabilities and challenges related to data integrity, unauthorized access, and resource management. In addition, it brings forth significant challenges in secure and scalable data storage and computational resource management. These challenges are further increased by the need for real-time processing and the ever-increasing volume of data. To address these challenges, this paper presents a scalable blockchain-based framework for security and computational resource management in SDN architectures. The proposed framework ensures decentralized and tamper-resistant data handling and utilizes smart contracts for automated resource allocation. Due to the need for advanced security and scalability in SDN networks, this work incorporates sharding to improve parallel processing capabilities. The performance of sharded versus non-sharded blockchain systems under various network conditions is evaluated. Our findings demonstrate that the sharded blockchain model enhances scalability and throughput with robust security and fault tolerance. The framework is also assessed for its performance, scalability, and security to enhance SDN resilience against data breaches, malicious activities, and inefficient resource distribution.more » « lessFree, publicly-accessible full text available December 8, 2025
- 
            In the rapidly growing consumer electronics industry, continuous innovation drives increasing demand for smart devices and advanced gadgets. However, this sector faces changing demands and complex supply chains due to the management of rapid technological advancements and consumer expectations. Seamless communication between suppliers and consumers is essential to optimize production processes, minimize waste, and enhance overall customer satisfaction. In response to these demands, this paper presents a solution that combines Digital Twins (DT) and blockchain to improve security and efficiency in metaverse-inspired consumer-oriented supply chains. Herein, DT is used to represent products in virtual spaces and blockchain secures sensitive information using encryption and access controls. Our objective is to create a transparent, secure, and user-friendly system where consumers and suppliers can interact in real-time to verify product details and access important information of featured tasks like warranties and payment settlement. Smart contracts automates these tasks to make processes faster and more reliable. Through experiments, we tested how well the system maintains product integrity, authenticates transactions, and supports consumer-oriented supply chain (CSC) operations. Comparative analysis shows that our approach improves security, performance, and scalability over existing methods. Furthermore, the proposed system not only enhances security, trust, and transparency in CSC but also sets a higher standard for consumer demands and satisfaction. The findings point to the potential solution for future innovations in metaverse-driven CSC management systems.more » « less
 An official website of the United States government
An official website of the United States government 
				
			 
					 
					
