Figure - available from: Sensors
This content is subject to copyright.
Source publication
With the growing availability and prevalence of internet-capable devices, the complexity of networks and associated connection management increases. Depending on the use case, different approaches in handling connectivity have emerged over the years, tackling diverse challenges in each distinct area. Exposing centralized web-services facilitates re...
Citations
... In practice, a diverse collection of libraries with different approaches is present. For instance, well-known Peer-to-Peer (P2P) applications share and expose their underlying networking techniques in order to be reused by other applications [5]. In contrast to this, new technologies such as the QUIC protocol tend to be implemented multiple times until one implementation proves itself in practice [6]. ...
More than once, computer history has shown that critical software vulnerabilities can have a large and media-effective impact on affected components. In the Free and open-source software (FOSS) ecosystem, most software is distributed via package repositories. Nowadays, keeping track of critical dependencies in a software system becomes crucial for maintaining good security practices. Especially due to new legal requirements such as the European Cyber Resilience Act, there is the need that software projects keep a transparent track record with Software Bill of Materials (SBOM) and maintain a good health state. This study summarizes the current state of available FOSS package repositories and addresses the challenge of finding problematic spots in a software ecosystem. These parts are analyzed in more detail, quantifying the health state of the FOSS ecosystem. The results show that there are well maintained projects in the FOSS ecosystem but there are also projects with a high impact that are vulnerable to supply chain attacks. This study proposes a method for a heath state analysis and shows missing elements, e.g. interfaces, for future research.
... In practice, there exists a diverse collection of libraries with different approaches. For example, well-known Peer-to-Peer (P2P) applications share and expose their underlying networking techniques to be reused by other applications [5]. In contrast, new technologies such as the QUIC protocol often undergo multiple implementations until one proves itself effective in practice [6]. ...
Throughout computer history, it has been repeatedly demonstrated that critical software vulnerabilities can significantly affect the components involved. In the Free/Libre and Open Source Software (FLOSS) ecosystem, most software is distributed through package repositories. Nowadays, monitoring critical dependencies in a software system is essential for maintaining robust security practices. This is particularly important due to new legal requirements, such as the European Cyber Resilience Act, which necessitate that software projects maintain a transparent track record with Software Bill of Materials (SBOM) and ensure a good overall state. This study provides a summary of the current state of available FLOSS package repositories and addresses the challenge of identifying problematic areas within a software ecosystem. These areas are analyzed in detail, quantifying the current state of the FLOSS ecosystem. The results indicate that while there are well-maintained projects within the FLOSS ecosystem, there are also high-impact projects that are susceptible to supply chain attacks. This study proposes a method for analyzing the current state and identifies missing elements, such as interfaces, for future research.
... Each block in the chain is connected to the previous block with a hash code, and each block contains timestamp, nonce, and transaction history. The central concept is decentralization [109][110][111][112] and security in BC, where each node is a device that stores data securely. The BC system ensures security for each transaction made. ...
With the growth of computing and communication technologies, the information processing paradigm of the healthcare environment is evolving. The patient information is stored electronically, making it convenient to store and retrieve patient information remotely when needed. However, evolving the healthcare systems into smart healthcare environments comes with challenges and additional pressures. Internet of Things (IoT) connects things, such as computing devices, through wired or wireless mediums to form a network. There are numerous security vulnerabilities and risks in the existing IoT-based systems due to the lack of intrinsic security technologies. For example, patient medical data, data privacy, data sharing, and convenience are considered imperative for collecting and storing electronic health records (EHR). However, the traditional IoT-based EHR systems cannot deal with these paradigms because of inconsistent security policies and data access structures. Blockchain (BC) technology is a decentralized and distributed ledger that comes in handy in storing patient data and encountering data integrity and confidentiality challenges. Therefore, it is a viable solution for addressing existing IoT data security and privacy challenges. BC paves a tremendous path to revolutionize traditional IoT systems by enhancing data security, privacy, and transparency. The scientific community has shown a variety of healthcare applications based on artificial intelligence (AI) that improve health diagnosis and monitoring practices. Moreover, technology companies and startups are revolutionizing healthcare with AI and related technologies. This study illustrates the implication of integrated technologies based on BC, IoT, and AI to meet growing healthcare challenges. This research study examines the integration of BC technology with IoT and analyzes the advancements of these innovative paradigms in the healthcare sector. In addition, our research study presents a detailed survey on enabling technologies for the futuristic, intelligent, and secure internet of health things (IoHT). Furthermore, this study comprehensively studies the peculiarities of the IoHT environment and the security, performance, and progression of the enabling technologies. First, the research gaps are identified by mapping security and performance benefits inferred by the BC technologies. Secondly, practical issues related to the integration process of BC and IoT devices are discussed. Third, the healthcare applications integrating IoT, BC, and ML in healthcare environments are discussed. Finally, the research gaps, future directions, and limitations of the enabling technologies are discussed.