In the second decade of the 21st century, blockchain definitely became one of the most trending computational technologies. This research aims to question the feasibility and suitability of using blockchain technology within e-voting systems, regarding both technical and non-technical aspects. In today's world, although the course of this spreading is considerably slow, several countries already use means of e-voting due to many social and economic reasons, which we further investigated. Nevertheless, the number of countries offering various e-government solutions, apart from e-voting, is significantly high. E-voting systems, naturally, require much more attention and assurance regarding potential security and anonymity issues, since voting is one of the few extremely critical governmental processes. Nevertheless, e-voting is not purely a governmental service, but many companies and nonprofit organizations would benefit the cost-efficiency, scalability, remote accessibility, and ease of use that it provides. Blockchain technology is claimed to be able to address some, obviously not all, important security concerns, including anonymity, confidentiality, integrity, and non-repudiation. The analysis results presented in this article mostly confirm these claims. and valid changes) could be provided during the election time. This should be implemented with a supporting consensus protocol. Security is further discussed in the following parts. B. Social AspectsApplications involving e-voting and the Blockchain technology have big social impacts, too. These impacts can further be listed as the value obtained from the provided ease of use and the people's perception of trust to these so-called "hitech" systems. Generally, the e-Government services enabled wider, easier, and faster access to the government services for the people, including the ones living in remote settlements and the ones who are very busy and/or mobile. So that it can be seen as a powerful tool that reinforces the government-citizen relationships [21]. While the e-Government itself is not directly related to the democracy, the concept of e-voting extends the e-Government to provide means of democracy, called e-Democracy. 132 applications. While this mechanism ensures the integrity and authentication of the user/voter accounts, authenticating the users themselves remains as an open problem. E. Comparison with AlternativesWhile there are hundreds of different e-Government applications and services, throughout the world, we cannot claim the same for e-voting systems, there aren't many to compare. Even so, we compared the distributed model of the blockchain scheme with centralized solutions, mostly referring to the Estonia model, which is one of the few successful applications so far.Since the application in Estonia is a full off-the-shelf solution, a blockchain based variation shall not totally replace all the methods used in parts of that system. For example, a blockchain based solution itself would not provide a brandnew personal ID authentication mechan...
Drone technology is developing very rapidly. Flying devices accomplishing various applications are becoming an integral part of our daily life undoubtedly. Drones are characterized by extreme mobility, decent computing power, scalability, and a very short lifetime due to energy constraints. The rise of drones inevitably enabled swarms and drone networking applications. Drone networks is a pathbreaking subclass of flying ad-hoc networks with unique capabilities and specific requirements. One very important challenge with swarms is the device authentication problem, in other words, proving the identity of a single or a group of drones that request to join the swarm. In this paper, we tackle this emerging problem and propose a novel context-aware mutual authentication protocol. The proposed protocol provides authentication for groups of drones and supports recovering a swarm in case of network separation. Likewise, the protocol can handle drone joins and leaves. Moreover, the protocol is not dependent on network infrastructure, secure storage, and secure channels. We tested the protocol using an automated formal security protocol verification tool, called Scyther. The tests resulted in the complete verification of the authentication and secrecy claims for arbitrary network instances and all defined use-cases. The protocol is also shown to have proven performance advantages over the existing schemes.INDEX TERMS Authentication, drone networks, security, swarms, wireless ad-hoc networks.
This paper presents the results of research that aims to find a suitable, reliable, and lightweight pseudorandom number generator for constrained devices used in the Internet of things. Within the study, three reduced versions of the xorshift+ generator are built. They are tested using the TestU01 suite as well as the NIST suite to measure their ability to produce randomness and performance values along with some other existing generators. The best of our reduced variations according to our tests, called the xorshiftR+, demonstrated great suitability for lightweight devices considering its randomness, performance, and resource usage.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.