Change search
Link to record
Permanent link

Direct link
Publications (10 of 43) Show all publications
Ilie, D., Grahn, H., Lundberg, L., Westerhagen, A., Granbom, B. & Höök, A. (2023). Avoiding Detection by Hostile Nodes in Airborne Tactical Networks. Future Internet, 15(6), Article ID 204.
Open this publication in new window or tab >>Avoiding Detection by Hostile Nodes in Airborne Tactical Networks
Show others...
2023 (English)In: Future Internet, E-ISSN 1999-5903, Vol. 15, no 6, article id 204Article in journal (Refereed) Published
Abstract [en]

Contemporary airborne radio networks are usually implemented using omnidirectional antennas. Unfortunately, such networks suffer from disadvantages such as easy detection by hostile aircraft and potential information leakage. In this paper, we present a novel mobile ad hoc network (MANET) routing protocol based on directional antennas and situation awareness data that utilizes adaptive multihop routing to avoid sending information in directions where hostile nodes are present. Our protocol is implemented in the OMNEST simulator and evaluated using two realistic flight scenarios involving 8 and 24 aircraft, respectively. The results show that our protocol has significantly fewer leaked packets than comparative protocols, but at a slightly higher cost in terms of longer packet lifetime.

Place, publisher, year, edition, pages
MDPI, 2023
Keywords
mobile ad hoc networks, routing, protocol
National Category
Computer Sciences
Identifiers
urn:nbn:se:bth-25214 (URN)10.3390/fi15060204 (DOI)001017172700001 ()2-s2.0-85163779771 (Scopus ID)
Projects
NFFP7 (Call 2)-Riktad luftdatalänk
Funder
Vinnova
Available from: 2023-08-07 Created: 2023-08-07 Last updated: 2023-08-07Bibliographically approved
Tkachuk, R.-V., Ilie, D., Robert, R., Kebande, V. R. & Tutschku, K. (2023). On the Performance and Scalability of Consensus Mechanisms in Privacy-Enabled Decentralized Renewable Energy Marketplace. Annales des télécommunications
Open this publication in new window or tab >>On the Performance and Scalability of Consensus Mechanisms in Privacy-Enabled Decentralized Renewable Energy Marketplace
Show others...
2023 (English)In: Annales des télécommunications, ISSN 0003-4347, E-ISSN 1958-9395Article in journal (Refereed) Epub ahead of print
Abstract [en]

Renewable energy sources were introduced as an alternative to fossil fuel sources to make electricity generation cleaner. However, today's renewable energy markets face a number of limitations, such as inflexible pricing models and inaccurate consumption information. These limitations can be addressed with a decentralized marketplace architecture. Such architecture requires a mechanism to guarantee that all marketplace operations are executed according to predefined rules and regulations. One of the ways to establish such a mechanism is blockchain technology. This work defines a decentralized blockchain-based peer-to-peer (P2P) energy marketplace which addresses actors' privacy and the performance of consensus mechanisms. The defined marketplace utilizes private permissioned Ethereum-based blockchain client Hyperledger Besu (HB) and its smart contracts to automate the P2P trade settlement process. Also, to make the marketplace compliant with energy trade regulations, it includes the regulator actor, which manages the issue and consumption of guarantees of origin and certifies the renewable energy sources used to generate traded electricity. Finally, the proposed marketplace incorporates privacy-preserving features, allowing it to generate private transactions and store them within a designated group of actors. Performance evaluation results of HB-based marketplace with three main consensus mechanisms for private networks, i.e., Clique, IBFT 2.0, and QBFT, demonstrate a lower throughput than another popular private permissioned blockchain platform Hyperledger Fabric (HF). However, the lower throughput is a side effect of the Byzantine Fault Tolerant characteristics of HB's consensus mechanisms, i.e., IBFT 2.0 and QBFT, which provide increased security compared to HF's Crash Fault Tolerant consensus RAFT.

Place, publisher, year, edition, pages
Springer Science+Business Media B.V., 2023
Keywords
Renewable Energy Marketplace, Blockchain Technology, Peer-To-Peer Energy Trading, Hyperledger Besu, Data Privacy
National Category
Computer Sciences Energy Systems
Research subject
Computer Science
Identifiers
urn:nbn:se:bth-24767 (URN)10.1007/s12243-023-00973-8 (DOI)001057000900001 ()2-s2.0-85169302173 (Scopus ID)
Available from: 2023-06-08 Created: 2023-06-08 Last updated: 2023-09-15Bibliographically approved
Tkachuk, R.-V., Ilie, D., Robert, R., Kebande, V. R. & Tutschku, K. (2023). On the Performance of Consensus Mechanisms in Privacy-Enabled Decentralized Peer-to-Peer Renewable Energy Marketplace. In: Lopez D., Montpetit M.-J., Cerroni W., Di Mauro M., Borylo P. (Ed.), Proceedings of the 26th Conference on Innovation in Clouds, Internet and Networks, ICIN 2023: . Paper presented at 26th Conference on Innovation in Clouds, Internet and Networks, ICIN 2023, Paris, 6 March through 9 March 2023 (pp. 179-186). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>On the Performance of Consensus Mechanisms in Privacy-Enabled Decentralized Peer-to-Peer Renewable Energy Marketplace
Show others...
2023 (English)In: Proceedings of the 26th Conference on Innovation in Clouds, Internet and Networks, ICIN 2023 / [ed] Lopez D., Montpetit M.-J., Cerroni W., Di Mauro M., Borylo P., Institute of Electrical and Electronics Engineers (IEEE), 2023, p. 179-186Conference paper, Published paper (Refereed)
Abstract [en]

This work defines a decentralized blockchain-based peer-to-peer (P2P) energy marketplace which addresses actors' privacy and the performance of consensus mechanisms. The defined marketplace utilizes private permissioned Ethereum-based blockchain client Hyperledger Besu (HB) and its smart contracts to automate the P2P trade settlement process. Also, to make the marketplace compliant with energy trade regulations, it includes the regulator actor, which manages the issue and generation of guarantees of origin and certifies the renewable energy sources used to generate traded electricity. Finally, the proposed marketplace incorporates privacy-preserving features, allowing it to generate private transactions and store them within a designated group of actors. Performance evaluation results of HB-based marketplace with three main consensus mechanisms for private networks, i. e., Clique, IBFT 2.0, and QBFT, demonstrate a lower throughput than another popular private permissioned blockchain platform Hyperledger Fabric (HF). However, the lower throughput is a side effect of the Byzantine Fault Tolerant characteristics of HB's consensus mechanisms, i. e., IBFT 2.0 and QBFT, which provide increased security compared to HF's Crash Fault Tolerant consensus RAFT. © 2023 IEEE.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2023
Keywords
Blockchain Technology, Data Privacy, Hyperledger Besu, Peer-To-Peer Energy Trading, Renewable Energy Marketplace, Distributed ledger, Energy policy, Fault tolerance, Power markets, Privacy-preserving techniques, Renewable energy resources, Block-chain, Decentralised, Energy trading, Hyperledg besu, Peer to peer, Performance, Renewable energies, Blockchain
National Category
Computer Sciences
Identifiers
urn:nbn:se:bth-24459 (URN)10.1109/ICIN56760.2023.10073510 (DOI)001006975300031 ()2-s2.0-85151998681 (Scopus ID)9798350398045 (ISBN)
Conference
26th Conference on Innovation in Clouds, Internet and Networks, ICIN 2023, Paris, 6 March through 9 March 2023
Funder
Knowledge Foundation, 20190111
Available from: 2023-04-21 Created: 2023-04-21 Last updated: 2023-08-11Bibliographically approved
Ilie, D., Grahn, H., Lundberg, L. & Westerhagen, A. (2023). Topology Control for Directed DataLinks between Airborne Platforms: Directed Air Data Link: WP3 report. Karlskrona: Blekinge Tekniska Högskola
Open this publication in new window or tab >>Topology Control for Directed DataLinks between Airborne Platforms: Directed Air Data Link: WP3 report
2023 (English)Report (Other academic)
Abstract [en]

Contemporary airborne radio networks are usually implemented using omnidirectional antennas. Unfortunately, such networks suffer from disadvantages such as easy detection by hostile aircraft and potential information leakage. In addition, tactical links used for military communication rely on NATO-specific standards such as Link 16, which are becoming outdated. 

To this end we are investigating the feasibility of replacing omnidirectional communication with directed communication, which will address the disadvantages mentioned above. In addition, we definine a communication architecture based on the conventional Ethernet and TCP/IP protocol stack, which will ease management and interoperability with existing Internet-based system 

In this report, we briefly review the TCP/IP stack and the services offerd at each layer of the stack. Furthermore, we review existing litterature involving mobile ad hoc network (MANET) protocols used for airborne networks along with various performance studies in the same area. Finally, we propose a novel MANET routing protocol based on directional antennas and situation awareness data that utilizes adaptive multihop routing to avoid sending information in directions where hostile nodes are present. 

Our protocol is implemented in the OMNEST simulator and evaluated using two realistic flight scenarios involving 8 and 24 aircraft, respectively. The results show that our protocol has significantly fewer leaked packets than comparative protocols, but at a slightly higher cost in terms of longer packet lifetime. 

Place, publisher, year, edition, pages
Karlskrona: Blekinge Tekniska Högskola, 2023
Keywords
routing, MANET, directed communication, FANET
National Category
Communication Systems
Research subject
Computer Science; Telecommunication Systems
Identifiers
urn:nbn:se:bth-25288 (URN)
Projects
Directed Air Data Link (Vinnova)
Available from: 2023-08-17 Created: 2023-08-17 Last updated: 2023-08-22Bibliographically approved
Tkachuk, R.-V., Ilie, D., Robert, R., Kebande, V. R. & Tutschku, K. (2023). Towards Efficient Privacy and Trust in Decentralized Blockchain-Based Peer-to-Peer Renewable Energy Marketplace. Sustainable Energy, Grids and Networks, 35, Article ID 101146.
Open this publication in new window or tab >>Towards Efficient Privacy and Trust in Decentralized Blockchain-Based Peer-to-Peer Renewable Energy Marketplace
Show others...
2023 (English)In: Sustainable Energy, Grids and Networks, E-ISSN 2352-4677, Vol. 35, article id 101146Article in journal (Refereed) Published
Abstract [en]

Renewable energy sources are becoming increasingly important as a substitute for fossil energy production. However, distributed renewable energy production faces several challenges regarding trading and management, such as inflexible pricing models and inaccurate green consumption information. A decentralized peer-to-peer (P2P) electricity marketplace may address these challenges. It enables prosumers to market their self-produced electricity. However, such a marketplace needs to guarantee that the transactions follow market rules and government regulations, cannot be manipulated, and are consistent with the generated electricity. One of the ways to provide these guarantees is to leverage blockchain technology.

This work describes a decentralized blockchain-based P2P energy marketplace addressing privacy, trust, and governance issues. It uses a private permissioned blockchain Hyperledger Fabric (HF) and its smart contracts to perform energy trading settlements. The suggested P2P marketplace includes a particular regulator actor acting as a governmental representative overseeing marketplace operations. In this way, the suggested P2P marketplace can address the governance issues needed in electricity marketplaces. Further, the proposed marketplace ensures actors’ data privacy by employing HF’s private data collections while preserving the integrity and auditability of all operations. We present an in-depth performance evaluation and provide insights into the security and privacy challenges emerging from such a marketplace. The results demonstrate that partial centralization by the applied regulator does not limit the P2P energy trade settlement execution. Blockchain technology allows for automated marketplace operations enabling better incentives for prosumer electricity production. Finally, the suggested marketplace preserves the user’s privacy when P2P energy trade settlements are conducted.

Place, publisher, year, edition, pages
Elsevier, 2023
Keywords
Renewable Energy Marketplace, Blockchain Technology, Peer-To-Peer Energy Trading, Hyperledger Fabric, Data Privacy
National Category
Computer Sciences Energy Systems
Research subject
Computer Science
Identifiers
urn:nbn:se:bth-24766 (URN)10.1016/j.segan.2023.101146 (DOI)001068745600001 ()
Available from: 2023-06-08 Created: 2023-06-08 Last updated: 2023-10-18Bibliographically approved
Tkachuk, R.-V., Ilie, D., Tutschku, K. & Robert, R. (2022). A Survey on Blockchain-based Telecommunication Services Marketplaces. IEEE Transactions on Network and Service Management, 19(1), 228-255
Open this publication in new window or tab >>A Survey on Blockchain-based Telecommunication Services Marketplaces
2022 (English)In: IEEE Transactions on Network and Service Management, ISSN 1932-4537, E-ISSN 1932-4537, Vol. 19, no 1, p. 228-255Article in journal (Refereed) Published
Abstract [en]

Digital marketplaces were created recently to accelerate the delivery of applications and services to customers. Their appealing feature is to activate and dynamize the demand, supply, and development of digital goods, applications, or services. By being an intermediary between producer and consumer, the primary business model for a marketplace is to charge the producer with a commission on the amount paid by the consumer. However, most of the time, the commission is dictated by the marketplace facilitator itself and creates an imbalance in value distribution, where producer and consumer sides suffer monetarily. In order to eliminate the need for a centralized entity between the producer and consumer, a blockchain-based decentralized digital marketplace concept was introduced. It provides marketplace actors with the tools to perform business transactions in a trusted manner and without the need for an intermediary. In this work, we provide a survey on Telecommunication Services Marketplaces (TSMs) which employ blockchain technology as the main trust enabling entity in order to avoid any intermediaries. We provide an overview of scientific and industrial proposals on the blockchain-based online digital marketplaces at large, and TSMs in particular. We consider in this study the notion of telecommunication services as any service enabling the capability for information transfer and, increasingly, information processing provided to a group of users by a telecommunications system. We discuss the main standardization activities around the concepts of TSMs and provide particular use-cases for the TSM business transactions such as SLA settlement. Also, we provide insights into the main foundational services provided by the TSM, as well as a survey of the scientific and industrial proposals for such services. Finally, a prospect for future developments is given. Author

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers Inc., 2022
Keywords
Blockchain Technology, Blockchains, Business, Communication Service Provider, Communications technology, Digital Marketplace, Distributed ledger, Distributed Ledger Technology., Internet of Things, Proposals, Telecommunication services, Telecommunication Services Marketplace, Blockchain, Surveys, Block-chain, Communication service, Communicationtechnology, Distributed ledg technology., Proposal, Service provider, Telecommunication service marketplace, Telecommunications services
National Category
Business Administration Computer Sciences
Identifiers
urn:nbn:se:bth-22381 (URN)10.1109/TNSM.2021.3123680 (DOI)000767855700018 ()2-s2.0-85118595494 (Scopus ID)
Funder
Knowledge Foundation, 20190111
Note

open access

Available from: 2021-11-19 Created: 2021-11-19 Last updated: 2023-06-08Bibliographically approved
Tkachuk, R.-V., Ilie, D. & Tutschku, K. (2021). Decentralized Blockchain-based Telecommunication Services Marketplaces: Tutorial presentation. In: IEEE International Conference on Network Softwarization (IEEE NetSoft 2021): . Paper presented at The 7th IEEE International Conference on Network Softwarization, Tokyo, June 28 to July 2, 2021.
Open this publication in new window or tab >>Decentralized Blockchain-based Telecommunication Services Marketplaces: Tutorial presentation
2021 (English)In: IEEE International Conference on Network Softwarization (IEEE NetSoft 2021), 2021Conference paper, Oral presentation only (Other academic)
National Category
Telecommunications
Research subject
Computer Science
Identifiers
urn:nbn:se:bth-24521 (URN)
Conference
The 7th IEEE International Conference on Network Softwarization, Tokyo, June 28 to July 2, 2021
Available from: 2023-05-10 Created: 2023-05-10 Last updated: 2023-05-11Bibliographically approved
Tkachuk, R.-V., Ilie, D. & Tutschku, K. (2020). Building a Framework for Automated Security Testbeds in Cloud Infrastructures. In: Proceedings of SNCNW 2020: 16th Swedish National Computer Networking Workshop, SNCNW, Kristianstad. Paper presented at 16th Swedish National Computer Networking Workshop, SNCNW, Kristianstad.
Open this publication in new window or tab >>Building a Framework for Automated Security Testbeds in Cloud Infrastructures
2020 (English)In: Proceedings of SNCNW 2020: 16th Swedish National Computer Networking Workshop, SNCNW, Kristianstad, 2020Conference paper, Published paper (Refereed)
Abstract [en]

When exposed to the network, applications and devices are exposed to constant security risks. This puts pressure on hardware and software vendors to test even more than before how secure applications and devices are before being released to customers.

We have worked towards defining and developing a frame- work for automated security testbeds. Testbeds comprise both the ability to build on-demand virtual isolated networks that emulate corporate networks, as well as the ability to automate security breach scenarios, which accelerates the testing process. In order to accomplish both features of the testbed, we have based the framework on well-established cloud and orchestration technologies e. g. , OpenStack and Ansible. Although many of these technologies are powerful, they are also complex, leading to a steep learning curve for new users. Thus, one of the main goals of the developed framework is to hide the underlying complexities through a template approach and a simplified user interface that shortens the initial training time.

In this paper, we present the full stack of technologies that were used for constructing the testbed framework. The framework allows us to create entire virtual networks and to manipulate network devices started in it, via comprehensive yet simple interfaces. Also, we describe a specific testbed solution, developed as a part of the Test Arena Blekinge project.

Keywords
Security Testbed, Cloud Infrastructures, Infrastructure as a Service, Infrastructure as Code
National Category
Computer Systems
Identifiers
urn:nbn:se:bth-19621 (URN)
Conference
16th Swedish National Computer Networking Workshop, SNCNW, Kristianstad
Note

open access

Available from: 2020-06-09 Created: 2020-06-09 Last updated: 2021-10-06Bibliographically approved
Bergenholtz, E., Casalicchio, E., Ilie, D. & Moss, A. (2020). Detection of Metamorphic Malware Packers Using Multilayered LSTM Networks. In: Weizhi Meng, Dieter Gollmann, Christian D. Jensen, and Jianying Zhou (Ed.), Lecture Notes in Computer Science: . Paper presented at 22nd International Conference on Information and Communications Security, ICICS 2020; Online, Copenhagen; Denmark; 24 August 2020 through 26 August 2020 (pp. 36-53). Springer Science and Business Media Deutschland GmbH, 12282
Open this publication in new window or tab >>Detection of Metamorphic Malware Packers Using Multilayered LSTM Networks
2020 (English)In: Lecture Notes in Computer Science / [ed] Weizhi Meng, Dieter Gollmann, Christian D. Jensen, and Jianying Zhou, Springer Science and Business Media Deutschland GmbH , 2020, Vol. 12282, p. 36-53Conference paper, Published paper (Refereed)
Abstract [en]

Malware authors do their best to conceal their malicious software to increase its probability of spreading and to slow down analysis. One method used to conceal malware is packing, in which the original malware is completely hidden through compression or encryption, only to be reconstructed at run-time. In addition, packers can be metamorphic, meaning that the output of the packer will never be exactly the same, even if the same file is packed again. As the use of known off-the-shelf malware packers is declining, it is becoming increasingly more important to implement methods of detecting packed executables without having any known samples of a given packer. In this study, we evaluate the use of recurrent neural networks as a means to classify whether or not a file is packed by a metamorphic packer. We show that even with quite simple networks, it is possible to correctly distinguish packed executables from non-packed executables with an accuracy of up to 89.36% when trained on a single packer, even for samples packed by previously unseen packers. Training the network on more packer raises this number to up to 99.69%.

Place, publisher, year, edition, pages
Springer Science and Business Media Deutschland GmbH, 2020
Series
Lecture Notes in Computer Science, ISSN 0302-9743
Keywords
packing, packer detection, security, static analysis, machine learning, deep learning
National Category
Computer Sciences
Identifiers
urn:nbn:se:bth-20107 (URN)10.1007/978-3-030-61078-4_3 (DOI)2-s2.0-85097650138 (Scopus ID)9783030610777 (ISBN)
Conference
22nd International Conference on Information and Communications Security, ICICS 2020; Online, Copenhagen; Denmark; 24 August 2020 through 26 August 2020
Note

open access 

Available from: 2020-11-29 Created: 2020-11-29 Last updated: 2021-01-04Bibliographically approved
Martinkauppi, L. B., He, Q. & Ilie, D. (2020). On the Design and Performance of Chinese OSCCA-approved Cryptographic Algorithms. In: 2020 13th International Conference on Communications, COMM 2020 - Proceedings: . Paper presented at 13th International Conference on Communications, COMM 2020, Bucharest, Romania, 18 June 2020 through 20 June 2020 (pp. 119-124). Institute of Electrical and Electronics Engineers (IEEE), Article ID 9142035.
Open this publication in new window or tab >>On the Design and Performance of Chinese OSCCA-approved Cryptographic Algorithms
2020 (English)In: 2020 13th International Conference on Communications, COMM 2020 - Proceedings, Institute of Electrical and Electronics Engineers (IEEE), 2020, p. 119-124, article id 9142035Conference paper, Published paper (Refereed)
Abstract [en]

SM2, SM3, and SM4 are cryptographic standards authorized to be used in China. To comply with Chinese cryptography laws, standard cryptographic algorithms in products targeting the Chinese market may need to be replaced with the algorithms mentioned above. It is important to know beforehand if the replaced algorithms impact performance. Bad performance may degrade user experience and increase future system costs.

We present a performance study of the standard cryptographic algorithms (RSA, ECDSA, SHA-256, and AES-128) and corresponding Chinese cryptographic algorithms.

Our results indicate that the digital signature algorithms SM2 and ECDSA have similar design and also similar performance. SM2 and RSA have fundamentally different designs. SM2 performs better than RSA when generating keys and signatures. Hash algorithms SM3 and SHA-256 have many design similarities, but SHA-256 performs slightly better than SM3. AES-128 and SM4 share some similarities in the design. In the controlled experiment, AES-128 outperforms SM4 with a significant margin.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2020
National Category
Communication Systems
Identifiers
urn:nbn:se:bth-19835 (URN)10.1109/COMM48946.2020.9142035 (DOI)000612723900021 ()9781728156118 (ISBN)
Conference
13th International Conference on Communications, COMM 2020, Bucharest, Romania, 18 June 2020 through 20 June 2020
Note

open access

Available from: 2020-06-20 Created: 2020-06-20 Last updated: 2022-01-18Bibliographically approved
Projects
Bonseyes – Platform for Open Development of Systems of Artificial Intelligence; Publications
Tkachuk, R.-V. (2023). Efficient Design of Decentralized Privacy and Trust in Distributed Digital Marketplaces. (Doctoral dissertation). Karlskrona: Blekinge Tekniska HögskolaTkachuk, R.-V., Ilie, D. & Tutschku, K. (2020). Towards a Secure Proxy-based Architecture for Collaborative AI Engineering. In: CANDAR 2020: International Symposium on Computing and Networking: . Paper presented at th International Symposium on Computing and Networking Workshops, CANDARW 2020; Virtual, Naha, Japan, 24 November 2020 through 27 November 2020 (pp. 373-379). IEEE, Article ID 9355887. Tutschku, K., Horner, L., Granelli, F., Sekiya, Y., Tacca, M., Bhanare, D. & Helge, P. (Eds.). (2019). Proceedings of the 2019 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN2019). Paper presented at 2019 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), Dallas.. IEEE Communications Society
Symphony – Supply-and-Demand-based Service Exposure using Robust Distributed Concepts [20190111]; Blekinge Institute of Technology; Publications
Kebande, V. R. & Awad, A. I. (2024). Industrial Internet of Things Ecosystems Security and Digital Forensics: Achievements, Open Challenges, and Future Directions. ACM Computing Surveys, 56(5), Article ID 131. Kebande, V. R. & Ding, J. (2023). Blockchain-Enabled Renewable Energy Traceability with a Crypto-based Arbitrage Pricing Model. In: Quwaider M., Awaysheh F.M., Jararweh Y. (Ed.), 8th International Conference on Fog and Mobile Edge Computing, FMEC 2023: . Paper presented at 8th International Conference on Fog and Mobile Edge Computing, FMEC 2023, Tartu, 18/9- 20/9 2023 (pp. 34-41). Institute of Electrical and Electronics Engineers (IEEE)Tkachuk, R.-V. (2023). Efficient Design of Decentralized Privacy and Trust in Distributed Digital Marketplaces. (Doctoral dissertation). Karlskrona: Blekinge Tekniska HögskolaShamshad, H., Ullah, F., Ullah, A., Kebande, V. R., Ullah, S. & Al-Dhaqm, A. (2023). Forecasting and Trading of the Stable Cryptocurrencies With Machine Learning and Deep Learning Algorithms for Market Conditions. IEEE Access, 11, 122205-122220Tkachuk, R.-V., Ilie, D., Robert, R., Kebande, V. R. & Tutschku, K. (2023). On the Performance and Scalability of Consensus Mechanisms in Privacy-Enabled Decentralized Renewable Energy Marketplace. Annales des télécommunicationsTkachuk, R.-V., Ilie, D., Robert, R., Kebande, V. R. & Tutschku, K. (2023). On the Performance of Consensus Mechanisms in Privacy-Enabled Decentralized Peer-to-Peer Renewable Energy Marketplace. In: Lopez D., Montpetit M.-J., Cerroni W., Di Mauro M., Borylo P. (Ed.), Proceedings of the 26th Conference on Innovation in Clouds, Internet and Networks, ICIN 2023: . Paper presented at 26th Conference on Innovation in Clouds, Internet and Networks, ICIN 2023, Paris, 6 March through 9 March 2023 (pp. 179-186). Institute of Electrical and Electronics Engineers (IEEE)Tkachuk, R.-V., Ilie, D., Robert, R., Kebande, V. R. & Tutschku, K. (2023). Towards Efficient Privacy and Trust in Decentralized Blockchain-Based Peer-to-Peer Renewable Energy Marketplace. Sustainable Energy, Grids and Networks, 35, Article ID 101146. Tkachuk, R.-V., Ilie, D., Tutschku, K. & Robert, R. (2022). A Survey on Blockchain-based Telecommunication Services Marketplaces. IEEE Transactions on Network and Service Management, 19(1), 228-255Tkachuk, R.-V., Ilie, D. & Tutschku, K. (2021). Decentralized Blockchain-based Telecommunication Services Marketplaces: Tutorial presentation. In: IEEE International Conference on Network Softwarization (IEEE NetSoft 2021): . Paper presented at The 7th IEEE International Conference on Network Softwarization, Tokyo, June 28 to July 2, 2021. Tkachuk, R.-V., Ilie, D., Robert, R., Tutschku, K. & Kebande, V. R.On the Application of Enterprise Blockchains in Decentralized Renewable Energy Marketplaces.
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0001-8453-447x

Search in DiVA

Show all publications