scispace - formally typeset
Search or ask a question
Author

Nisha Malik

Bio: Nisha Malik is an academic researcher from University of Technology, Sydney. The author has contributed to research in topics: Vehicular ad hoc network & Blockchain. The author has an hindex of 4, co-authored 6 publications receiving 401 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: The blockchain is a public ledger that works like a log by keeping a record of all transactions in chronological order, secured by an appropriate consensus mechanism and providing an immutable record.
Abstract: In 2008, the emergence of the blockchain as the foundation of the first-ever decentralized cryptocurrency not only revolutionized the financial industry but proved a boon for peer-to-peer (P2P) information exchange in the most secure, efficient, and transparent manner. The blockchain is a public ledger that works like a log by keeping a record of all transactions in chronological order, secured by an appropriate consensus mechanism and providing an immutable record. Its exceptional characteristics include immutability, irreversibility, decentralization, persistence, and anonymity.

270 citations

Journal ArticleDOI
TL;DR: An overview of this technology for the realization of security across distributed parties in an impregnable and transparent way is presented.
Abstract: The blockchain is emerging as one of the most propitious and ingenious technologies of cybersecurity In its germinal state, the technology has successfully replaced economic transaction systems in various organizations and has the potential to revamp heterogeneous business models in different industries Although it promises a secure distributed framework to facilitate sharing, exchanging, and the integration of information across all users and third parties, it is important for the planners and decision makers to analyze it in depth for its suitability in their industry and business applications The blockchain should be deployed only if it is applicable and provides security with better opportunities for obtaining increased revenue and reductions in cost This article presents an overview of this technology for the realization of security across distributed parties in an impregnable and transparent way

257 citations

Proceedings ArticleDOI
05 Sep 2018
TL;DR: A blockchain based authentication and revocation framework for vehicular networks, which not only reduces the computation and communication overhead by mitigating dependency on a trusted authority for identity verification, but also speedily updates the status of revocated vehicles in the shared blockchain ledger.
Abstract: Authentication and revocation of users in Vehicular Adhoc Networks (VANETS) are two vital security aspects It is extremely important to perform these actions promptly and efficiently The past works addressing these issues lack in mitigating the reliance on the centralized trusted authority and therefore do not provide distributed and decentralized security This paper proposes a blockchain based authentication and revocation framework for vehicular networks, which not only reduces the computation and communication overhead by mitigating dependency on a trusted authority for identity verification, but also speedily updates the status of revocated vehicles in the shared blockchain ledger In the proposed framework, vehicles obtain their Pseudo IDs from the Certificate Authority (CA), which are stored along with their certificate in the immutable authentication blockchain and the pointer corresponding to the entry in blockchain, enables the Road Side Units (RSUs) to verify the identity of a vehicle on road The efficiency and performance of the framework has been validated using the Omnet++ simulation environment

115 citations

Journal ArticleDOI
TL;DR: This research work intends to introduce a new trust management system in VANET with two major phases: secured message transmission and node trustability prediction and the performance of the proposed model is verified and proved over other conventional methods for certain measures.
Abstract: In vehicular ad hoc networks (VANET), effective trust establishment with authentication is an important requirement. Trust management among communicating vehicles is significant for secure message transmission; however, very less contributions have been made towards evaluating the trustworthiness of the node. This research work intends to introduce a new trust management system in VANET with two major phases: secured message transmission and node trustability prediction. The security assured message passing is carried out by incorporating the privacy preservation model under the data sanitization process. The key used for the sanitization process is optimally tuned by a new hybrid algorithm termed Sea Lion Explored-Whale Optimization Algorithm, which is the combination of Whale Optimization Algorithm and Sea Lion Optimization Algorithm, respectively. The blockchain technology is assisted to handle the key generated by the nodes. Subsequently, the trustability of the node is evaluated under novel specifics “two-level evaluation process” with a rule-based and machine learning-based evaluation process. Finally, the performance of the proposed model is verified and proved over other conventional methods for certain measures.

21 citations

Proceedings ArticleDOI
01 Aug 2019
TL;DR: A smart contract-based approach to update and query the reputation of nodes, stored and maintained by IPFS distributed storage, deals with an emergency scenario, dealing against colluding attacks and the results show how smart contracts are capable of accurately identifying trustworthy nodes and record the reputationof a node transparently and immutably.
Abstract: Appending digital signatures and certificates to messages guarantee data integrity and ensure non-repudiation, but do not identify greedy authenticated nodes. Trust evolves if some reputable and trusted node verifies the node, data and evaluates the trustworthiness of the node using an accurate metric. But, even if the verifying party is a trusted centralized party, there is opacity and obscurity in computed reputation rating. The trusted party maps it with the node's identity, but how is it evaluated and what inputs derive the reputation rating remains hidden, thus concealment of transparency leads to privacy. Besides, the malevolent nodes might collude together for defamatory actions against reliable nodes, and eventually bad mouth these nodes or praise malicious nodes collaboratively. Thus, we cannot always assume the fairness of the nodes as the rating they give to any node might not be a fair one. In this paper, we propose a smart contract-based approach to update and query the reputation of nodes, stored and maintained by IPFS distributed storage. The use case particularly deals with an emergency scenario, dealing against colluding attacks. Our scheme is implemented using MATLAB simulation. The results show how smart contracts are capable of accurately identifying trustworthy nodes and record the reputation of a node transparently and immutably.

8 citations


Cited by
More filters
Journal ArticleDOI

[...]

08 Dec 2001-BMJ
TL;DR: There is, I think, something ethereal about i —the square root of minus one, which seems an odd beast at that time—an intruder hovering on the edge of reality.
Abstract: There is, I think, something ethereal about i —the square root of minus one. I remember first hearing about it at school. It seemed an odd beast at that time—an intruder hovering on the edge of reality. Usually familiarity dulls this sense of the bizarre, but in the case of i it was the reverse: over the years the sense of its surreal nature intensified. It seemed that it was impossible to write mathematics that described the real world in …

33,785 citations

Journal ArticleDOI
TL;DR: A comprehensive classification of blockchain-enabled applications across diverse sectors such as supply chain, business, healthcare, IoT, privacy, and data management is presented, and key themes, trends and emerging areas for research are established.

1,310 citations

Journal ArticleDOI
TL;DR: The privacy issues caused due to integration of blockchain in IoT applications by focusing over the applications of the authors' daily use are discussed, and implementation of five privacy preservation strategies in blockchain-based IoT systems named as anonymization, encryption, private contract, mixing, and differential privacy are discussed.

359 citations

Journal ArticleDOI
TL;DR: The main aim of this paper is to identify blockchain- based solutions for addressing food traceability concerns, highlight the benefits and challenges of blockchain-based traceability systems implementation, and help researchers and practitioners to apply blockchain technology based food Traceability systems by proposing an architecture design framework and suitability application analysis flowchart.

334 citations