Developing Secure and Scalable Consensus Algorithms
Consensus algorithms are at the core of blockchain technology, ensuring the integrity and agreement of data among distributed nodes. To enhance their efficiency and security, our research explores transitioning from traditional Proof-of-Work (PoW) to more sophisticated mechanisms like Proof-of-Stake (PoS) and Practical Byzantine Fault Tolerance (PBFT). By integrating Multi-Agent Reinforcement Learning (MRL), we enable dynamic adaptation to user behavior, penalize malicious nodes, and reward honest participants. These advancements not only optimize transaction efficiency but also fortify blockchain networks against evolving threats, laying a robust foundation for scalable and secure decentralized systems.IEEE GLOBECOM 2024 | IEEE CCWC 2024
Addressing Performance and Security Challenges in Conflicting Transactions
Blockchain performance often suffers due to contention arising from conflicting transactions. To address this, we introduced ConChain, a framework leveraging transaction parallelism and intelligent dependency management. This approach significantly reduces network latency, boosts throughput, and enhances attack resilience. By mitigating threats like double spending and DDoS attacks, ConChain exemplifies how innovative frameworks can overcome inherent limitations in blockchain technology, promoting wider adoption and reliability in decentralized applications.IEEE GLOBECOM 2024 | IEEE BLOCKCHAIN 2024 | IEEE CCNC 2024
Designing Secure and Automated Upgradable Smart Contracts
Smart contracts revolutionize trust and efficiency in blockchain systems but face challenges in adaptability and upgradability. Our solutions, FlexiContracts and SEAM, offer secure, automated in-place upgrades without compromising data integrity. By incorporating decentralized governance, cross-chain interoperability, and anomaly detection, these frameworks simplify the development and evolution of smart contracts. This research paves the way for more robust and adaptable blockchain ecosystems, accommodating the ever-changing demands of decentralized applications.Enhancing Cloud Security, Fault Tolerance, and Efficiency
The reliance on cloud storage necessitates robust mechanisms to ensure data security, integrity, and fault tolerance. Our research addresses these challenges by developing distributed systems integrating advanced cryptographic techniques, fine-grained access control, and predictive fault management. The Entangled Merkle Forest framework, for instance, optimizes centralized auditing, ensuring scalable and efficient data verification. These innovations contribute to more reliable cloud infrastructures, fostering trust and efficiency in data storage solutions.IEEE ICC 2024 | IEEE GLOBECOM 2023
Securing Cyber-Physical Systems Against Advanced Persistent Threats
Advanced Persistent Threats (APTs) pose significant risks to Cyber-Physical Systems (CPS) due to their stealth and persistence. By employing stochastic evolutionary game models, we simulate adversarial dynamics and optimize defense strategies to balance cost and benefit. Our case studies on Energy Delivery Systems highlight the efficacy of these models, showcasing how rational decision-making can thwart sophisticated attacks. This research underscores the importance of adaptive and proactive defense mechanisms in safeguarding critical infrastructures.Applied Sciences 2023 | IEEE ICCCN 2022
Enhancing Security and Privacy in Vehicular Ad-Hoc Networks
Vehicular Ad-Hoc Networks (VANETs) demand robust security and privacy measures to prevent malicious tampering with traffic data. Our research proposes a secure vehicular cloud architecture leveraging Advanced Driving Assistance System (ADAS) sensors for Sybil attack detection. This innovative approach eliminates the need for centralized authorities, enhancing message authenticity and integrity. By integrating deep learning-based object detection, we advance the detection capabilities across diverse scenarios, ensuring safer and more reliable vehicular communications.Copyright © 2024
Last updated on December 6, 2024
Last updated on December 6, 2024