Skip to main content

Showing 1–6 of 6 results for author: Commey, D

.
  1. arXiv:2505.02239  [pdf, ps, other

    cs.CR cs.PF

    Performance Analysis and Deployment Considerations of Post-Quantum Cryptography for Consumer Electronics

    Authors: Daniel Commey, Benjamin Appiah, Griffith S. Klogo, Winful Bagyl-Bac, James D. Gadze, Yousef Alsenani, Garth V. Crosby

    Abstract: Quantum computing threatens the security foundations of consumer electronics (CE). Preparing the diverse CE ecosystem, particularly resource-constrained devices, for the post-quantum era requires quantitative understanding of quantum-resistant cryptography (PQC) performance. This paper presents a comprehensive cross-platform performance analysis of leading PQC Key Encapsulation Mechanisms (KEMs) a… ▽ More

    Submitted 12 June, 2025; v1 submitted 4 May, 2025; originally announced May 2025.

  2. arXiv:2505.01866  [pdf, other

    cs.CR cs.LG

    PQS-BFL: A Post-Quantum Secure Blockchain-based Federated Learning Framework

    Authors: Daniel Commey, Garth V. Crosby

    Abstract: Federated Learning (FL) enables collaborative model training while preserving data privacy, but its classical cryptographic underpinnings are vulnerable to quantum attacks. This vulnerability is particularly critical in sensitive domains like healthcare. This paper introduces PQS-BFL (Post-Quantum Secure Blockchain-based Federated Learning), a framework integrating post-quantum cryptography (PQC)… ▽ More

    Submitted 3 May, 2025; originally announced May 2025.

  3. Strategic Deployment of Honeypots in Blockchain-based IoT Systems

    Authors: Daniel Commey, Sena Hounsinou, Garth V. Crosby

    Abstract: This paper addresses the challenge of enhancing cybersecurity in Blockchain-based Internet of Things (BIoTs) systems, which are increasingly vulnerable to sophisticated cyberattacks. It introduces an AI-powered system model for the dynamic deployment of honeypots, utilizing an Intrusion Detection System (IDS) integrated with smart contract functionalities on IoT nodes. This model enables the trans… ▽ More

    Submitted 21 May, 2024; originally announced May 2024.

  4. arXiv:2405.12322  [pdf, other

    cs.CR cs.DC cs.NI

    Securing Blockchain-based IoT Systems with Physical Unclonable Functions and Zero-Knowledge Proofs

    Authors: Daniel Commey, Sena Hounsinou, Garth V. Crosby

    Abstract: This paper presents a framework for securing blockchain-based IoT systems by integrating Physical Unclonable Functions (PUFs) and Zero-Knowledge Proofs (ZKPs) within a Hyperledger Fabric environment. The proposed framework leverages PUFs for unique device identification and ZKPs for privacy-preserving authentication and transaction processing. Experimental results demonstrate the framework's feasi… ▽ More

    Submitted 20 May, 2024; originally announced May 2024.

  5. EGAN: Evolutional GAN for Ransomware Evasion

    Authors: Daniel Commey, Benjamin Appiah, Bill K. Frimpong, Isaac Osei, Ebenezer N. A. Hammond, Garth V. Crosby

    Abstract: Adversarial Training is a proven defense strategy against adversarial malware. However, generating adversarial malware samples for this type of training presents a challenge because the resulting adversarial malware needs to remain evasive and functional. This work proposes an attack framework, EGAN, to address this limitation. EGAN leverages an Evolution Strategy and Generative Adversarial Networ… ▽ More

    Submitted 20 May, 2024; originally announced May 2024.

    Journal ref: 2023 IEEE 48th Conference on Local Computer Networks (LCN), Daytona Beach, FL, USA, 2023, pp. 1-9

  6. arXiv:2405.11580  [pdf, other

    cs.CR cs.CY cs.DC cs.LG

    Securing Health Data on the Blockchain: A Differential Privacy and Federated Learning Framework

    Authors: Daniel Commey, Sena Hounsinou, Garth V. Crosby

    Abstract: This study proposes a framework to enhance privacy in Blockchain-based Internet of Things (BIoT) systems used in the healthcare sector. The framework addresses the challenge of leveraging health data for analytics while protecting patient privacy. To achieve this, the study integrates Differential Privacy (DP) with Federated Learning (FL) to protect sensitive health data collected by IoT nodes. Th… ▽ More

    Submitted 19 May, 2024; originally announced May 2024.