
The COVID-19 pandemic caused by highly-infectious virus namely severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) has resulted in infection of millions of individuals and deaths across the world. The need of an hour is to find the innovative solution for diagnosis, prevention, and cure of the COVID-19 disease. Nanotechnology is emerging as one of the important tool for the same. In the present review we discuss the applications of nanotechnology-based approaches that are being implemented to speed up the development of diagnostic kits for SARS-CoV-2, development of personal protective equipments, and development of therapeutics of COVID-19 especially the vaccine development.
Citation: Alrayan Abass Albaz, Misbahuddin M Rafeeq, Ziaullah M Sain, Wael Abdullah Almutairi, Ali Saeed Alamri, Ahmed Hamdan Aloufi, Waleed Hassan Almalki, Mohammed Tarique. Nanotechnology-based approaches in the fight against SARS-CoV-2[J]. AIMS Microbiology, 2021, 7(4): 368-398. doi: 10.3934/microbiol.2021023
[1] | Austin Bushur, Kevin Ward, Tommy Flahaven, Tom Kelly, Jin H. Jo, Matt Aldeman . Techno-economic evaluation of installing EV and PV combined infrastructure on Academic Institution’s Parking Garages in Illinois, USA. AIMS Energy, 2019, 7(1): 31-45. doi: 10.3934/energy.2019.1.31 |
[2] | Badr Ouhammou, Fatima Zohra Gargab, Samir El idrissi kaitouni, Slimane Smouh, Rachid El mrabet, Mohammed Aggour, Abdelmajid Jamil, Tarik Kousksou . Energy saving potential diagnosis for Moroccan university campuses. AIMS Energy, 2023, 11(3): 576-611. doi: 10.3934/energy.2023030 |
[3] | Ashebir Dingeto Hailu, Desta Kalbessa Kumsa . Ethiopia renewable energy potentials and current state. AIMS Energy, 2021, 9(1): 1-14. doi: 10.3934/energy.2021001 |
[4] | Arben Gjukaj, Rexhep Shaqiri, Qamil Kabashi, Vezir Rexhepi . Renewable energy integration and distributed generation in Kosovo: Challenges and solutions for enhanced energy quality. AIMS Energy, 2024, 12(3): 686-705. doi: 10.3934/energy.2024032 |
[5] | Chukwuebuka Okafor, Christian Madu, Charles Ajaero, Juliet Ibekwe, Happy Bebenimibo, Chinelo Nzekwe . Moving beyond fossil fuel in an oil-exporting and emerging economy: Paradigm shift. AIMS Energy, 2021, 9(2): 379-413. doi: 10.3934/energy.2021020 |
[6] | Emmanuel Arthur . Energy development: A global perspective and advances in Ghana. AIMS Energy, 2022, 10(2): 306-339. doi: 10.3934/energy.2022017 |
[7] | María P. Pablo-Romero, Antonio Sánchez-Braza, Manuel González-Pablo Romero . Renewable energy in Latin America. AIMS Energy, 2022, 10(4): 695-717. doi: 10.3934/energy.2022033 |
[8] | Patrick Moriarty, Damon Honnery . The limits of renewable energy. AIMS Energy, 2021, 9(4): 812-829. doi: 10.3934/energy.2021037 |
[9] | Ladislas Mutunda Kangaji, Atanda Raji, Efe Orumwense . Cutting-edge progress in offshore wind and tidal stream power technology—State-of-the-Art. AIMS Energy, 2025, 13(1): 188-230. doi: 10.3934/energy.2025007 |
[10] | Aparajita Banerjee, Emily Prehoda, Roman Sidortsov, Chelsea Schelly . Renewable, ethical? Assessing the energy justice potential of renewable electricity. AIMS Energy, 2017, 5(5): 768-797. doi: 10.3934/energy.2017.5.768 |
The COVID-19 pandemic caused by highly-infectious virus namely severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) has resulted in infection of millions of individuals and deaths across the world. The need of an hour is to find the innovative solution for diagnosis, prevention, and cure of the COVID-19 disease. Nanotechnology is emerging as one of the important tool for the same. In the present review we discuss the applications of nanotechnology-based approaches that are being implemented to speed up the development of diagnostic kits for SARS-CoV-2, development of personal protective equipments, and development of therapeutics of COVID-19 especially the vaccine development.
IoT devices are an essential part of intelligent applications, such as the Healthcare system that plays an indispensable role between the user and the application providing assistance and personalized services [1,2,3]. Devices send real-time health data to cloud systems for analysis and update healthcare staff to revise or maintain patient care [4,5,6,7]. Modern 5G cellular networks support high data rates for portable devices such as smartphones and IoT machines for real-time communication [8]. A wireless communication environment supported by applications contains various cluster-based areas of operations [9]. The machines connect and authenticate with local base stations spread throughout a space [10]. Base stations regularly broadcast network information as messages to nearby devices searching for an access point, providing the strongest signal strength. A handover process occurs when a device moves between different base stations and connects with others to maintain good signal strength [11,12,13].
An attacker sets up a rogue base station or an access point to behave as a legitimate base station [14]. An SSID generated by the network administrator for uniquely identifying each access point is used by rogue nodes to disguise themselves as valid network members. The rogue base station attacks are easily performed using laptops, smartphones, and specialized software [15]. A broadcast message sent by a base station provides information about the network's signal strength data, which lacks security and data confidentiality. A rogue access point broadcasts a similar message during handover requests and attempts to collect private user data. A device analyzes multiple broadcasts from several base stations during the cell selection phase to select the one with the strongest signal strength. A device then establishes a connection and connects with a rogue base station [16]. An attacker steals confidential user data such as financial records, hospital patient data, and personal records to sell them to third-party entities, thus affecting user privacy. Additionally, data intercepted using man-in-the-middle attack results in a high probability of sensitive user data being tampered affecting data integrity.
A critical vulnerability and problem identified in telecommunication networks between a base station and device authentication are when malicious nodes behave as valid access nodes to steal user data [17,18]. A device focuses on connecting to new access points that provide superior signal strength, thus ensuring stable data rate flow. Users are unaware whether the access node is a legitimate part of the network or an attacker with a laptop/smartphone spoofing as an access node to steal and manipulate user data. A device connecting with a rogue base station is sent attack messages directly, bypassing security measures provided by the network. Various fake messages spoofing as official bank messages result in victims sharing confidential user data such as bank passwords and ATM pins. Devices are further vulnerable to Denial of Service-based attacks, resulting in them being unable to connect with existing networks and being forced to communicate with less secure 2G/3G systems. Attackers launch eavesdropping attacks to listen to user calls exploiting weak ciphers on devices connected on 2G networks [19,20]. Vulnerabilities caused by rogue base stations are a security issue in 2G and 3G networks. Public key encryption of the Subscriber Permanent Identifier (SUPI) in 5G networks prevents an attacker from obtaining the SUPI key, ensuring network-side security. However, the encryption of SUPI does not prevent rogue base station attacks on devices due to the lack of protection from broadcast messages received from unauthorized base stations.
The motivation for conducting this research is to address the vulnerability of unsecured broadcast messages of base stations used by attackers to spoof users into joining unauthorized nodes and compromise user data and user privacy. Base station IDs are unprotected and exposed, allowing attackers to disguise them as any access point in the network. A device on the network is unaware of a previously identified rogue node is now spoofing as a different access point. A handover process in an environment such as a hospital requires quick and seamless authentication between devices and base stations. Both base stations and devices should be aware of existing registered entities for immediate authentication. Maintenance of authorized and valid base stations and device profiles results in high data storage. Limited memories in IoT devices prevent them from maintaining an extensive database of all official base stations. A lightweight profile is necessary for both device and base stations to diminish data storage concerns and reduce data communication overhead during the authentication process.
In this paper, the proposed scheme presents a decentralized network for securing base station data from external data. The main contributions of this research include,
1) Base station IDs are generated using mined data and hashed using SHA256 to prevent an attacker from observing and learning the ID generation process. An authentication certificate is issued that lists IDs of all authorized base stations for future handover processes.
2) Each device joining the network for the first time is assigned a unique ID that is hashed using SHA256 and stored in the network database. A certificate of all devices is stored in the base station.
3) Each hashed device and Base station ID undergo a modulo operation that reduces the size of the certificate stored in devices where memory is limited. The reduced authentication certificate size reduces the overall storage overhead and communication overhead, enabling a quick and seamless handover authentication.
4) The proposed scheme is compared with existing studies based on Computation overhead and Storage overhead.
This paper is organized as follows: Section 2 discusses related work discussing recent research to secure devices from Rogue Base Stations (RBS) and includes the key considerations for securing devices against rogue base station attacks. In Section 3, we propose an overview of the proposed scheme and the detailed workflow of the proposed scheme. Section 4 analyzes the proposed scheme compared to existing studies and includes a comparative analysis of the proposed scheme with existing research based on identified key considerations. Finally, Section 5 concludes this paper.
Existing studies address the identification of rogue base stations using three methods, location-based approach, captured signal strength, and key-based agreement methods. This section discusses related works and highlights their remaining open challenges. To mitigate these challenges, key considerations are highlighted that are required for a secure and robust lightweight authentication scheme for identifying rogue base stations.
A location-based approach-based study presented in [21] proposed two location-based awareness-based fake base station resistance schemes to combat spoofing attacks where signal strength is monitored based on the location of the device. The scheme relies on the authorized base stations and devices' location information, the path loss, shadowing effect, and small-scale fading, which confirm the Average Received Signal Strength synchronization (ARSSS) of the authorized base station is within an adequate range.
The following two studies approached the detection of RBS using the captured signal strength of base stations and compared it with the honest base station. The first study discussed in [22] presented a Density-based spatial clustering of applications with noise (DBSCAN) method to defend smart meters from cyberattacks connected in houses. The meters are installed as part of the Advanced Metering Infrastructure (AMI), which uses General Packet Radio Service (GPRS) to communicate with local base stations, resulting in devices vulnerable to rogue base stations' attacks. The DBSCAN method separates false base stations from authorized base stations based on observable variations in signal strengths. The profile benefits from both meters and base stations' stationary existence and requires less computational resources on meters to distinguish between an attacker and a rogue base station. The second study in [23] proposed an approach to safeguard IoT open meters systems such as power, water, and meter collectors in Open Metering Systems (OMS) from malicious cyberattacks by rogue femtocells. Fake femtocells are identified by observing the variations of the signal strength. The distance between the meter and the base station is measured using the Euclidean distance, and a 24-hour time window is used to identify a rogue femtocell. Analysis of the proposed approach shows a rogue base station connecting at 11:15 pm has the maximum signal strength by 01:00 am, but its signal begins to fade over time. The authors identify a limitation in the proposed approach where an attacker may remain consistently connected and static for over 24 hours rendering the solution infeasible.
The next three studies detect RBS using a handover authentication scheme based on key agreement schemes. The first study in[24] presented a secure handover authentication scheme non-reliant on certificates for the LTE network environment. The scheme is based on a key agreement method that consists of two phases, the initial authentication phase and the handover phase. First, devices generate a partial key and acquire another from the Home Subscriber Server. Secondly, during a handover scenario, the device proceeds with a key agreement method, and a shared session key are generated. Thus, three handshakes are required for the proposed mutual key agreement method to succeed. The second study in [25] based on key agreement proposed an Elliptic Curve Cryptography-based Proxy signature for the handover authentication scheme that includes both Edge-node base stations and Home edge-node base stations. The scheme is based on two phases, attach phase and the handover phase. The first phase is responsible for the authentication when a device registers with the network for the first time. The second phase manages the authentication of devices when they perform the handover process between different base stations. The scheme focuses on reducing the computational cost compared to other methods. The third study in [26] based on handover authentication relies on a proxy signature for secure authentication. The scheme focuses on handover validation between different home-edge node base stations and edge node base stations. An initial attach phase in the scheme requires every new UE joining the network to register and authenticate with the Home Subscriber Server and the MME. Mutual authentication between a device is required when it moves in proximity to the new base station, and a new session key is generated. The proxy signature algorithm generates new long-term secret keys during the handover authentication.
The final two studies implement Blockchain technology for authenticating IoT devices joining the network. The first study in [27] presents a Blockchain based Authentication and Key Agreement for 5G networks against Rogue Base Station attacks. A one-time hashing function designs the device's secret key preventing attackers from learning key data to impersonate as authorized devices. Keys are stored in a decentralized storage which are Denial of Service resilient, preventing attackers from obtaining authentication data. The second study in [28] proposes a lightweight authentication scheme for the IoT devices connecting with a decentralized network. The study focuses on maintaining the privacy of connected users and the security of their data using a modular square root technique. Smart Contracts register devices on the network to prevent malicious devices form transmitting data to the network. There are open research challenges in the above existing studies. The dependence on signal strength reception by [20,21] requires a device to record the base station's signal strength accurately. Environmental factors such as thick walls, physical obstructions, and other wireless devices in proximity prevent accurate reception of signal strength. The research conducted in [23] is dependent on static IoT meter devices and thus is unsuitable for portable IoT devices. Key-based authentication schemes in [24,25,26]—incur high computation and storage overheads during their evaluation. A lightweight scheme is required that is not dependent on an inaccurate recording of signal strength and is suitable for devices and base stations to authenticate mutually. Blockchain based authentication research presented in [27,28] do not focus on reducing the size of encryption keys resulting in high storage overheads and communication costs. Thus, they are not suitable for real-time operations in time critical environments such as Smart Healthcare and the Internet of Vehicles.
In order to maintain a secure and lightweight handover operation between IoT devices and base stations, the following key considerations are essential to the proposed scheme,
1) Access control – Base stations serve as access points for IoT devices to connect with the network and provide real-time services to users and other entities part of the intelligent cloud operations. Therefore, ownership of access control by network owners such as telecommunication organizations is essential to ensure that only it has the sole authority to assign base stations in the network. As a result, malicious entities are prevented from disguising themselves as a valid part of the network.
2) Data integrity – Information collected and transmitted from IoT devices for sensitive applications such as Smart Healthcare requires an analysis based on accurate data for precise diagnosis for patients. Man-in-the-middle attacks threaten the quality of data provided by devices by manipulation resulting in the reliability of the computation results.
3) Data Privacy – A significant challenge when transmitting data over untrusted access points and base stations is user identification and data confidentiality violation. Malicious users intercept data between the network and the device and collect and store data to sell it for economically profitable benefits. In addition, marketing organizations and fraudulent individuals promote promotional offers using data that users did not consent to release in the public domain.
4) Communication overhead – Handover authentication between devices and base stations relies on the presented access point to prove that it is a valid part of the network. Therefore, the exchange of IDs results in high communication overhead. Minimizing network costs enables a seamless handover operation and improves overall network performance.
5) Storage overhead – IoT devices are subject to low memory and computation capabilities, resulting in them unable to store large amounts of base station identification data for secure handover authentication. Devices are subject to rely on the truthfulness of access points that they are a valid part of the network. A low storage cost certificate that stores IDs of all nearby base stations must secure device data transmission and reduce the memory footprint on devices.
The novelty of the proposed scheme is based on the design of a lightweight Blockchain based secure mutual authentication system. Proof of Authority ensures only a single validator is responsible for mining blocks, thus removing the need for a solving cryptographic puzzle. Furthermore, authentication keys are designed to reduce the communication and storage overhead in both memory resource strained IoT devices and Blockchain networks with small block sizes. The authentication scheme depends on requiring both the destination Base Station and the device to prove their authenticity mutually. The handover destination base station must prove it is part of the Private Blockchain network by transmitting its ID to the original base station which is only possible if they both belong to the same Blockchain network. Only Blockchain members are aware of each other IDs which are not shared or communicated with any other entity. The device stores only its own ID and in the event, it is stolen or taken control by a botnet attack, the attacker cannot learn the Base Station ID to launch RBS attacks. The storage of Base Station and Device ID in a hashed form reduces the storage and communication costs in the network, essential for healthcare-based environments where latency is a major cause of concern in network performance.
We consider a healthcare environment consisting of a multi-departmental hospital and focus on the mutual authentication between the base station nodes and devices to prevent sensors from connecting with rogue base stations. The environment consists of several clusters of base stations connected using the Blockchain network. Each cluster consists of several medical devices that are free to move around within the boundaries of the hospital and connect with other base stations due to increased signal strength provided by the nearest base station. Devices assume that each base station is not malicious and is a pre-validated access point belonging to the telecommunication network. Each device regularly receives network information along with signal strength shared by various base stations in plaintext. Exposure of sensitive network information during a broadcast by the base station presents a challenge for network security leaving sensitive base station identity information exposed to attackers. Base stations attract devices based on their superior signal strength to ensure Quality of Service, essential for low delay-tolerant medical devices.
A critical vulnerability in the handover process is identified when an IoT device, referred to as User Equipment (UE), moves within a hospital cluster, such as from the general ward to the surgery center, and requires connecting to a different BS. The increasing distance from BS1 and the fading signal strength requires UE to connect to a closer base station. UE monitors all base stations in proximity and sends a connection request to the router with the strongest and reliable signal strength. BS2 requests the UE to send an ID, the UE responds by sending its International Mobile Subscriber Identity in plain text to the BS2, and a connection is established. It serves as a 64-bit unique identifier number of each user connected with the network. Base Stations collect information of all connected users, that include International Mobile Subscriber Identity numbers to distinguish between home base users of the telecommunication network and non-local users that are roaming and are part of an external region. In an attack scenario, UE shares its International Mobile Subscriber Identity (IMSI) in plaintext to the base station that exposes all data exchanged on the network to an attacker under the control of a rogue base station. UE is unaware of the base station it is connected to transmit an invalid BS identity code giving the impression it is an authorized network entity. Private medical data is accessible to an attacker affecting data privacy and integrity.
In this sub-section, the overview of the proposed scheme describes the environment and the components used to authenticate both base stations and IoT devices. The environment consists of a hospital with multiple clusters, with each containing a group of base stations. Several IoT devices connect with local base stations and perform handover operations when moving further from their original base station. An authentication certificate issued by base stations contains unique IDs of both devices and all base stations in the local cluster. Devices and new base stations exchange certificates to enable a seamless and secure authentication with a low communication overhead.
As shown in Figure 1, the network environment is based on blockchain-based nodes where each block represents a base station (BS) node. In this paper, we take the scenario of a hospital with several departments. Each section within the hospital consists of several wireless routers that are identified as BS. Several BS comprise a group cluster responsible for connecting and performing handover operations for all IoT devices in a specific geographical area. Different departments within the hospital, such as the emergency response unit, surgery, and general wards, comprise a separate cluster. Pediatrics, Birthing center, and its respective intensive care unit constitute a second cluster example. Each group consists of several IoT devices such as pacemakers, glucose monitors, heart-rate monitors, and drug effectiveness monitors for individual patients. Patients move between different departments based on their medical requirements and require a quick and seamless handover process to monitor patient health continuously.
The proposed scheme implements a blockchain network to secure UEs from rogue base stations. A private blockchain provides the cellular network the privileged access to add blocks to the network system and speeds up handover requests. In this paper, we assume that blocks are pre-mined by the network where each Block is pre-mined by the network using proof-of-work for block mining. The Blockchain-based Base Station network ensures the security of data stored in immutable ledgers, prevents single point of failure vulnerabilities, and prevents unauthorized entities from accessing or modifying stored data in blocks. Each newly mined block by the network is connected with the previous block using a hash value making it impossible to modify or tamper with data. Transactions are validated using the Proof of Authority consensus ensuring the validity of the data stored. New blocks are added when new Base Stations join the network by the cellular network. Proof of Authority enables the network to behave as the validator and is resistant to 51% attacks and Denial of Service attacks. A successful attack is challenging as it requires the network system itself to be first compromised. Furthermore, the computationally and energy consuming task of solving cryptographic puzzles are removed by selecting the network as the sole authority to approve new blocks mined for adding new base stations. The reduced number of validators increases the transaction finality in the network, thus increasing the efficiency of the Private Blockchain. The consensus algorithm is suitable for Private Blockchain enables privacy of data storage and ensuring data ownership is retained by the network.
Blocks added to the network represent BSs authorized by the core network and establish a blockchain neighborhood to ensure all BSs are valid nodes and UEs are connected securely. The secure authentication process of the proposed scheme as shown in Figure 2 is as follows,
Step 1: BS are pre-mined nodes by the network. The telecommunication network does not require solving a complex cryptographic puzzle in a private blockchain as it is the only authorized entity to mine a block.
Step 2: A unique BS identity (ID) is generated that relies on the timestamp of the block creation, the nonce value to mine the block, and the hash of the previous block. The network owns the genesis block.
Step 3: The BSID is hashed using SHA-256 to prevent an attacker from learning the ID and pretend to be a valid node belonging to the network.
Step 4: BSID of all BS belonging to various clusters are generated using SHA-256. The BSID is required to be shared with the UEs; however, due to low available memory, UE cannot store multiple authentication certificates belonging to various clusters existing in a hospital.
Step 5: BSID hash is converted into a decimal number, and a modulo operation is performed to reduce the ID size. The modulo result is included as an identifier of each BS in the certificate and shared with other BSs in the cluster.
Step 6: Each UE registers with the network to support a seamless handover scenario. Each BS is aware of the UE's existence and its history with the network during a handover process. Therefore, a profile for each device is saved across all BSs in the cluster.
Step 7: UE registration initiates with collecting the signal strength profile, which is unique to each device, a timestamp, and a random number. The timestamp and the random number are not reliant on a specific order and are included to increase the randomness of the UEID generation.
Step 8: A similar BSID generation process follows for UEID, where an SHA-256 hash process hides the UEID generated. The hash is converted into a decimal number, and the modulo operation resultant is included in the UE profile that is safely stored in the network. A copy of the individual UE profile is shared with each BS in the existing cluster where it is registered.
Step 9: The authentication process during a handover scenario requires only the UE to share its UEID and initiate the authentication process. Preventing the base station from sharing its ID protects the network from a malicious device from learning the BSID.
Step 10: BS2 checks the validity of the UEID ensuring it is a valid part of the network. In the event, the UEID is invalid or blacklisted by the network due to the device being stolen, the authentication process fails. If the device is a valid part of the network, the next authentication step proceeds.
Step 11: The Private Blockchain network requires only pre-mined base station nodes to connect and communicate amongst each other. Therefore, BS2 sends its BS2ID to BS1. BS1 is the base station node with which the UE is currently connected. BS1 checks the validity of BS2ID from the list of stored valid base stations.
Step 12: If BS2 is a valid part of the network and not an RBS, then BS1 transmits a valid message directly to the UE attempting handover.
Step 13: Successful authentication between the BS2 and UE results in a successful handover operation.
The proposed scheme is dependent on pre-selected IoT devices that exist within the hospital environment to monitor patients. The BSID is a unique fingerprint for each authorized BS in the network and is issued only by the network system. The registered BSID is announced by each BS to other BSs within the cluster. The network maintains global knowledge of each BS in cluster and a new BS added is shared across all clusters in the hospital. The UEID, issued by the BS, is randomized using a timestamp and a random number and hashed using the SHA256, preventing an attacker from learning the ID. Usage of weak number generators or vulnerable software allows repeated nonce value usage to sign various keys [29]. Thus, each UE has a uniquely different ID based on changing signal strength, random number, and timestamp. A UEID generated is shared among all BS in a cluster. The network maintains the profile of all UEs added and shares it across all other BSs in different cluster.
The proposed scheme operates in three phases, as shown in Figure 2, Phase 1, Base station registration, and Phase 2, UE registration, which occur before the handover scenario. Phase 3, Authentication, represents the handover scenario where UE requests the BS to authenticate itself before establishing data communication among them. We assume two honest BSs, identified as BS1 and BS2 one UE, and one RBS. Phases 1 and 2 describe the key generation process, and Phase 3 represents the handover process.
In phase 1, Base station registration, requires the initial set of information to identify each BS and prevent an RBS from behaving as authorized by the network. Initially, we begin with BS1registration. A block is mined by the network for each BS and block parameters such as nonce ID (nonid), previous block hash (prevhash), and the block creation timestamp (tstamp) are recorded. These parameters are hashed using the SHA2 hashing function f(h) with a output of 256 bits. The hash serves as a secure key. The key generation and storage process is as follows,
Step 1: Each BS is assigned a pre-mined node in the Blockchain network and registered in the private Blockchain network using a BSID. The unique ID refers to its own BS and is inaccessible to entities external to the Blockchain.
Step 2: The BSID includes three parameters available after the block is mined, nonid, prevhash, and tstamp. The BSID is represented as follows,
BSID=[nonid,prevhash,tstamp] | (1) |
Step 3: Using the SHA2 function, a 256-bit hash is generated to secure the BSID. The key is now represented as,
f(h)[nonid,prevhash,tstamp] | (2) |
Step 4: The resulting hash in hexadecimal format serves as input when it is converted into a decimal number (dbs) using the function,
dbs=ni∗16k+ni+1∗16k−1+ni+2∗16k−2+…ni+j∗16k−j | (3) |
Step 5: A modulo (mod) operation is performed to reduce the size of the resultant decimal number.
mbs=dbs%ubs | (4) |
Here mod is represented by (mbs). A unique and random number (ubs) is selected between 0 to 256 to perform the mod operation and prevent an attacker from learning the BSID. The limitation on the random number selection is to control the size of the resultant mbs and therefore reduce the storage overhead on resource constrained IoT devices. The final mod is included in the Cluster Certificate (Ccert) and is part of a single BS that is included in a certificate. Further BSs registered by the network are included in the Ccert as Ccert=(BS1(mbs),BS2(mbs),……BSn(mbs)). The network stores the certificate for quick validation of all included Cluster BS's.
In the second phase, UE registration, a unique identity for each connecting device is generated. The UE joining the first local BS is registered as the source BS in the blockchain network. The registration process is as follows,
Step 1: We assume BS1 as the first source BS that collects details from the UE that includes a set of SS collected. A random nonce number (UEn) and timestamp (UEitstamp) are included in the device registration to increase randomness in the final UEID generation. These values form a unique UEID that ensures that the device is registered with the network and helps in future authentication with other BSs.
Step 2: A new UEID is generated serving as a fingerprint for the device. Three parameters are used, ss1,ss2,ss3……ssn, UEitstamp, and UEn.
(UEID)=[(ss1,ss2,ss3……ssn),UEitstamp,UEn] | (5) |
Here, (ss1,ss2,ss3……ssn) represents a set of SS collected from the device when it registered with BS1 to form a unique profile based on user movement. Environmental factors impacting real SS are not considered as the primary goal. SS is not used to establish a unique device fingerprint but to collect the UE's movement pattern that is difficult for an attacker to imitate and determine. A timestamp (UEitstamp) is generated which is random and not dependent upon the device being registered. A secondary random number (UEn) is used to increase the randomness of the UE fingerprint.
Step 3: Storing the UEID on the UE risks exposure to being exposed to attackers. A cyberattack on an IoT device such as botnet reveals the UE and so the ID is hashed using SHA2 function (h).
(UEID)=f(h)[(ss1,ss2,ss3……ssn),UEitstamp,UEn] | (6) |
Step 4: Similar to equation (3), the hexadecimal output of the hash is transformed into a decimal number (due) for further modulo operation. The objective is to reduce the size of the key for less communication overhead during final authentication process.
due=ni∗16k+ni+1∗16k−1+ni+2∗16k−2+…ni+j∗16k−j | (7) |
Step 5: A mod function operation (m) similar to equation (4) is as follows,
mue=due%uue | (8) |
Here mue is the result of the mod operation and is stored in the UE to be used during the final authentication process.
Note: Equation (8) and its parameters due and uue and the UEID hash are stored as a list L=(UE1(mue),UE2(mue),……,UEn(mue)) in BS1 and shared with all other BSs (BS2,BS3,……,BSn) in the cluster.
Here mue is the result of the mod operation and is stored in the UE to be used during the final authentication process. Equation (8) and its parameters due and uue and the UEID hash are stored as a list L=(UE1(mue),UE2(mue),……,UEn(mue)) in BS1 and shared with all other BSs (BS2,BS3,……,BSn) in the cluster.
In this third phase, the UE moves from source BS1 to the destination BS2 for handover because of its stronger signal strength compared with other BS in the cluster BS1,BS3,BS4….BSn. The final phase mutually authenticates UE and BS2 to prevent an RBS from validating itself as part of the network and a malicious device from connecting with the network. The authentication process as shown in Figure 3 is as follows,
Step 1: UE sends a request to BS2 to initiate the handover process by sharing its 𝑈𝐸 (mue) and current BS(BS1) name with BS2 and waits for a response.
Step 2: BS2 verifies the identity of UE to ensure it is not a malicious device by searching UEID(mue)∈ L where L=(UE1(mue),UE2(mue),……,UEn(mue)).
Step 3: Upon successful device authentication, BS2 forwards its mod to BS1 for verification. Only members of the network service provider's private Blockchain network are allowed to communicate with other base stations.
Step 4: Each base station has access to the Ccert generated during the Phase 1: Base Station generation. BS1 checks if BS2(mbs) ∈ Ccert where Ccert=(BS1(mbs),BS2(mbs),……BSn(mbs)).
Step 5: BS1 verifies the identity of BS2 and that it is not malicious. BS1 then forwards authentication verification message directly to the UE.
An attack scenario in the authentication scheme is possible under two scenarios, the attacker steals the device or listens as an eavesdropper during the device and Base Station authentication communication. In the first scenario, if the device is stolen and leaves its cluster, the device is deregistered from the network and listed in a blacklist. The device remains blacklisted till it is recovered and re-registered with the network. The system administrator is additionally required to enable the registration and ensure the device is now controlled and managed by the healthcare facility.
In the second attack scenario, the attacker eavesdrops the authentication between the device and the Base Station. The data exchanged between the device and the Base Station includes only the 𝑈𝐸 (mue) and does not reveal any details of the BSID. An attacker is unaware of the BSID and therefore cannot perform the RBS attack. In the event, the attacker learns the BSID, the authentication process requires the RBS to be part of the Private Blockchain network and authenticate the RBS with another valid Base Station to enable devices to share their private data. The RBS being external to the Private Blockchain network results in an authentication failure as other Blockchain nodes return authentication failure message to the device.
The analysis of the proposed scheme's performance is based on communication overhead and storage overhead. A scheme protecting UEs from RBS attacks is required to satisfy the following requirements and present a secure and reliable scheme for base station and UE security. We observe the proposed scheme requires fewer bytes during communication between the UE and BS2 resulting in reduced communication overhead compared with existing studies. The storage overhead incurred by the storing of Ccert and the L by the base station is less due to the modulo operation requiring a smaller amount of data storage in bytes.
The performance evaluation of the Lightweight IoT Authentication scheme is evaluated using a desktop running Intel i7 based CPU with 16 GB RAM running Ubuntu 18.0.04 and Python 3.6. Key generation and authentication are determined using a custom python script, and Open SSL secures inter-node communication. Nodes are designed using Network Simulator 2. SHA256 computation is achieved using Crypto.js library. We examine the operation time of the scheme as shown in Table 1 by analyzing the SHA256 hashing operation f(h)[nonid,prevhash,tstamp], and the modulo operation to generate the modulo key using mbs=dbs%ubs. Next, the computation of the (UEID)=[(ss1,ss2,ss3……ssn),UEitstamp,UEn, the hashing process using SHA2, (UEID)=f(h)[(ss1,ss2,ss3……ssn),UEitstamp,UEn and the modulo operation, mue=due%uueare analyzed. Finally, the handover authentication process between BS2 and the UE are analyzed.
Phase | Stage | Time taken (ms) | Communication overhead (bytes) | Total Computation Overhead (ms) |
Base station Key generation | Compute f(h) Compute dbs Compute mbs mbs→UEn |
1.51 1.23 0.83 1.8 |
31.87 bytes - 1 byte 6 bytes |
4.14 |
UE key generation | Compute f(h) Compute due Compute mue mbs→BS1…BS2…BSn |
1.54 1.22 0.9 4.2 |
31.87 - 1 10 |
6.64 |
Authentication process | UE→BS2 Verify UE(mue) BS2→BS1 Verify BS2(mbs) BS1→UE |
1.9 0.38 1.76 0.84 1.8 |
1 1 |
6.68 |
As presented in Table 1, the total computation overhead measures the time taken by the proposed method to complete the operation to calculate the BSID, UEID, and the final authentication BS1 validates if BS2(mbs)∈Ccert and BS2 completes verifying if UEID(mue)∈L.
In the proposed scheme, a total of 3 messages are shared between BS2 and the UE. The first message is a request from the UE to BS2 for its mbs to verify if it is part of the valid network and is included in the Ccert. In our evaluation of the communication overhead, packets shared on the network in bytes for the authentication process are measured and compared with the works by Chow et al. [27], Yang et al. [28], Ma et al. [24], Qiu et al. [25], andCao et al. [26]. Three messages are required to complete the authentication process in the proposed scheme and the related research. Message 1 (M1), Message 2 (M2), Message 3 (M3) are the three messages exchanged. M1 represents the handover request for UE ̶˃BS2 and includes mue. M2 represents the reply from BS2 to BS1 with mbs. M3 is the final communication with BS1 transmitting establishing the final connection as authorized with UE. All M1, M2, and M3 are measured considering IP header, TCP header, source MAC, and destination MAC when measuring the packet size.
The proposed scheme compared with existing methods, as shown in Figure 4 and Table 2, requires fewer bytes of data transferred for the authentication process to succeed. The inclusion of the hashing process in the proposed scheme increases the individual UE and BSID size to nearly 32 bytes each. However, the modulo operation reduces the size of the authentication certificate mue=due%uue ensures that overall communication overhead compared to existing studies is at the minimum. Table 2 presents the communication overhead incurred by the proposed scheme without the default packet overhead incurred during communication between the BS2 and UE.
![]() |
M1 | M2 | M3 | Total Overhead | |
Proposed scheme | 1 | 1 | 1 | 3 | |
Chow et al. [27] 2022 Yang et al. [28] 2022 Ma et al. [24] 2019 |
32 216 264 |
- 20 136 |
- - 32 |
32 236 432 |
|
Qiu et al. [25] 2017 | 304 | 304 | 16 | 624 | |
Cao et al. [26] 2012 | 856 | 872 | 16 | 1744 |
Storage overhead in the proposed scheme is measured by considering a minimum of 10 UEID stored in one base station as part of one Ccert. As there are multiple access points set up nearby across departments in a hospital and devices with patients and the healthcare staff frequently request handover requests. Therefore, a minimum of 3 Ccert for 3 base stations each are considered allowing a single BS to seamlessly authenticate with a minimum of 10 devices in the hospital. The total storage overhead resulted in 30 bytes. Ma et al. [24] scheme performed the best among other existing studies with 288 bytes of device storage overhead. The scheme stores a partial public key, the private key, and the public parameters in the UE. In Qiu et al. [25] scheme, the UE stores public parameters and the proxy signature information and results in 296 byes of storage overhead. The UE stores long-term secret keys and public parameters in Cao et al. [26] scheme requiring 1616 bytes and thus results in the highest storage overhead. Chow et al. [27] highlights their proposal incurs higher energy costs during half open connections during DDoS attacks. The scheme proposed by Yang et al. [28] incurs a high storage overhead of 92 bytes, which includes storing the device identity, timestamp, random number, and a hash function. Figure 5 illustrates the comparison of incurred storage costs in a device with existing research. We observe the proposed scheme, compared to other existing techniques, is especially suitable for storing BSID on IoT devices that have low memory. The proposed study implements Proof of Authority consensus model preventing external entities from block data modification as there is only a single validator, the cellular network.
In this section, we analyze the security of the proposed scheme and discuss comparison results with other existing studies. The four key areas of consideration, Access control, Data integrity, Data Privacy, Communication overhead, and Storage overhead, with current research are compared to determine a secure and lightweight authentication handover scheme against RBS attacks.
We observe from the Comparative Analysis given in Table 3 that existing researches do not fully satisfy all key areas of consideration. None of the current studies propose means to prevent an attacker from obfuscating as part of the network. Valid base stations are vulnerable to sharing private network data with the attacker. The network environments do not prevent an attacker from manipulating data by sending false information to other base stations. The proposed scheme adopts a cluster system where base stations are grouped belonging to a geographical area. The cluster is responsible for serving devices that include in the same area boundary. Each base station is aware of the other's existence due to the network assigning an ID and shares it with other BSs within the cluster. The ID serves as a unique fingerprint and prevents a rogue base station from replicating it. Only the network managing the private Blockchain generates the nonid,prevhash,tstamp. A rogue node unable to replicate a valid Base station ID is rejected by other nodes in the Blockchain and the network.
References | Access Control | Data Integrity | Data Privacy | Communication Overhead | Storage Overhead | |
Ma et al. [24] 2019 | The scheme does not prevent an attacker from setting up an RBS. | Signcryption method verifies sender's signature key. | Verified sender's signature ensures only the target can read the data shared. | Requires a total of 432 bytes of information for the scheme to authenticate the base station and the device. | Keys stored in UE increase storage overhead to 288 bytes | |
Qiu et al. [25] 2017 | The scheme does not prevent an attacker from setting up an RBS. | Random numbers used to generate keys prevent attackers from deciphering the ciphertext. | User privacy concerns are not addressed as a UE must first send its IMSI to the MME. | 624 bytes of communication overhead are required for the authentication process to complete. | UE stores 296 bytes of data. | |
Cao et al. [26] 2012 | The scheme does not prevent an attacker from setting up an RBS. | The handover process requires mutual authentication before sharing data. | The m_ue generated consists of user identifying IMSI information. | 1744 bytes of data are transmitted. | The UE stores 1616 bytes of data that includes long-term secret keys | |
Chow et al. [27] 2022 | Higher computational delays increase latency in the authentication process. | Data stored in Blockchain prevents data manipulation. | A successful DDoS attack exposes the authentication protocol. | 256 bytes of communication overhead occurs using SHA based hashing. | High storage overhead of 32 bytes | |
Yang et al. [28] 2022 | Devices are registered in the Blockchain. | Data stored in Blockchain ensures Data security. | Public and Private key are exposed to attackers. | 236 bytes of communication overhead at the server. | High storage overhead of 92 bytes. | |
Proposed Scheme | Private blockchain mines nodes and assign new base stations. | Blockchain-based base stations prevent data exploitation. | Hashed User IDs prevent identifying the data owner. | m_bs and m_ue are of a total of 3 bytes. | Low storage overhead of 30 bytes using C_cert |
We observe from the Comparative Analysis given in Table 3 that existing researches do not fully satisfy all key areas of consideration. None of the current studies propose means to prevent an attacker from obfuscating as part of the network. Valid base stations are vulnerable to sharing private network data with the attacker. The network environments do not prevent an attacker from manipulating data by sending false information to other base stations. The proposed scheme adopts a cluster system where base stations are grouped belonging to a geographical area. The cluster is responsible for serving devices that include in the same area boundary. Each base station is aware of the other's existence due to the network assigning an ID and shares it with other BSs within the cluster. The ID serves as a unique fingerprint and prevents a rogue base station from replicating it. Only the network managing the private Blockchain generates the nonid,prevhash,tstamp. A rogue node unable to replicate a valid Base station ID is rejected by other nodes in the Blockchain and the network.
Data integrity concerns are addressed by existing research. However, user data privacy is an open vulnerability in Qiu et al. [25] and Cao et al. [26] proposed schemes where IMSI information is shared as part of the initial authentication process. As a result, user location privacy and data transmitted, such as calls and messages, are exposed to the attackers with the knowledge of the UE's IMSI. Recent studies by Chow et al. [27] and Yang et al. [28] do not provide privacy to secure the authentication protocols allowing attackers to learn user and device identity. The proposed scheme, UE's connecting the first time with the BS register with the local cluster BS and a unique UEID where (UEID)=[(ss1,ss2,ss3……ssn),UEitstamp,UEn] is generated. The ID uses the device's signal strength information which does not directly correlate to the device's identity. Furthermore, a timestamp and a random number are included to increase the randomness of the data gathered for ID generation. Finally, SHA256 produces a hash with a non-reversible property preventing an attacker from learning the user's identity.
Communication overhead and Storage overhead are vital components of the final analysis with existing studies. A large number of devices require mutual authentication and the handover process to be seamless with reduced latency. Significant bytes of data shared during the final authentication increase the communication overhead, resulting in slower authentication and inferior quality of service, especially in sensitive environments such as healthcare institutions. Large storage overheads are not feasible for IoT devices with low memory storage availability, thus affecting their overall operational capacity. All existing researches incur higher communication and storage overhead than the proposed scheme, which implements the modulo operation to decrease the size of the mbs stored in the Ccert. IoT devices are required to store fewer data in bytes for storing BS identifying data resulting in less storage overhead. Similarly, mue data stored in L reduces the data size stored in base stations. Communication overhead is decreased directly due to the reduced sizes of both mbs and mue.
In comparison with existing studies, the proposed framework outperforms them on Communication and Storage overhead and provides complete data integrity and privacy along with network access controls. The proposed scheme is suitable for handover authentication in hospitals with a pre-approved IoT device and a private blockchain network with mined nodes representing base stations.
This paper presented a scheme to protect the cellular network and its connected devices from Rogue Base Stations. Private blockchain-based network with Proof of Authority consensus algorithm ensures all base stations are network approved, and each possesses a unique, encrypted ID. In addition, devices registered with the network have a unique ID designed based on captured signal strength data. Both IDs for base stations and devices are hashed using SHA256, and a modulo operation is performed to reduce the storage overhead of both IDs. The proposed scheme is evaluated and compared with existing research based on two parameters, communication overhead, and storage overhead. The proposed scheme, requires fewer bytes of data transmitted during final authentication. Additionally, the storage overhead for IoT devices with low memory is less in our scheme.
Lack of measures of physical device security for pre-registered IoT devices presents a vulnerability where an attacker joins the network as an authorized user and transmit malicious scripts to base stations. This limitation comprises the network security and enables an attacker to disrupt telecommunication services. In our future research, we aim to present a novel method for the physical security of devices to prevent attackers from accessing confidential data stored in IoT devices. The research will include intrusion detection systems along with access control measures to prevent unauthorized access of data.
This study was supported by the Research Program funded by the SeoulTech (Seoul National University of Science and Technology).
The authors declare there is no conflict of interest.
[1] |
Yang P, Wang X (2020) COVID-19: a new challenge for human beings. Cell Mol Immunol 17: 555-557. doi: 10.1038/s41423-020-0407-x
![]() |
[2] |
Finkel Y, Mizrahi O, Nachshon A, et al. (2020) The coding capacity of SARS-CoV-2. Nature 589: 125-130. doi: 10.1038/s41586-020-2739-1
![]() |
[3] | World Health Organization Numbers at a glance Retrieved July 26, 2021. Available from: https://www.who.int/emergencies/diseases/novel-coronavirus-2019. |
[4] | Hussain A, Kaler J, Tabrez E, et al. (2020) Novel COVID-19: A comprehensive review of transmission, manifestation, and pathogenesis. Cureus 12: e8184. |
[5] |
Sultan A, Ali R, Sultan T, et al. (2021) Circadian clock modulating small molecules repurposing as inhibitors of SARS-CoV-2 Mpro for pharmacological interventions in COVID-19 pandemic. Chronobiol Int 38: 971-985. doi: 10.1080/07420528.2021.1903027
![]() |
[6] |
Zhang Y, Geng X, Tan Y, et al. (2020) New understanding of the damage of SARS-CoV-2 infection outside the respiratory system. Biomed Pharmacother 127: 110195. doi: 10.1016/j.biopha.2020.110195
![]() |
[7] |
Abdool Karim SS, Oliveira T (2021) New SARS-CoV-2 variants—clinical public health, and vaccine implications. N Engl J Med 384: 1866-1868. doi: 10.1056/NEJMc2100362
![]() |
[8] |
Flaxman S, Mishra S, Gandy A, et al. (2020) Estimating the effects of non-pharmaceutical interventions on COVID-19 in Europe. Nature 584: 257-261. doi: 10.1038/s41586-020-2405-7
![]() |
[9] |
Hsiang S, Allen D, Annan-Phan S, et al. (2020) The effect of large-scale anti-contagion policies on the COVID-19 pandemic. Nature 584: 262-267. doi: 10.1038/s41586-020-2404-8
![]() |
[10] |
Horton R (2020) Offline: the second wave. Lancet 395: 1960. doi: 10.1016/S0140-6736(20)31451-3
![]() |
[11] |
Flühmann B, Ntai I, Borchard G, et al. (2019) Nanomedicines: The magic bullets reaching their target? Eur J Pharm Sci 128: 73-80. doi: 10.1016/j.ejps.2018.11.019
![]() |
[12] |
Hawthorne GH, Bernuci MP, Bortolanza M, et al. (2017) Clinical developments in antimicrobial nanomedicine: toward novel solutions. Nanostructures for antimicrobial therapy Elsevier, 653-668. doi: 10.1016/B978-0-323-46152-8.00029-9
![]() |
[13] | Szunerits S, Barras A, Khanal M, et al. (2015) Nanostructures for the inhibition of viral infections. Mol Basel Switz 20: 14051-14081. |
[14] |
Sathish Sundar D, Gover Antoniraj M, Senthil Kumar C, et al. (2016) Recent trends of biocompatible and biodegradable nanoparticles in drug delivery: A review. Curr Med Chem 23: 3730-3751. doi: 10.2174/0929867323666160607103854
![]() |
[15] |
Guntur SR, Kumar NS, Hegde MM, et al. (2018) In vitro studies of the antimicrobial and free-radical scavenging potentials of silver nanoparticles biosynthesized from the extract of Desmostachya bipinnata. Anal Chem Insights 13: 1177390118782877. doi: 10.1177/1177390118782877
![]() |
[16] |
Nasrollahzadeh M, Sajjadi M, Soufi GJ, et al. (2020) Nanomaterials and nanotechnology-associated innovations against viral infections with a focus on coronaviruses. Nanomater Basel Switz 10: 1072. doi: 10.3390/nano10061072
![]() |
[17] | Singh L, Kruger HG, Maguire GEM, et al. (2017) The role of nanotechnology in the treatment of viral infections. Ther Adv Infect Dis 4: 105-131. |
[18] |
Yang D (2021) Application of nanotechnology in the COVID-19 pandemic. Int J Nanomedicine 16: 623-649. doi: 10.2147/IJN.S296383
![]() |
[19] | Singh L, Kruger HG, Maguire GE, et al. (2017) The role of nanotechnology in the treatment of viral infections. Ther Adv Infect Dis 4: 105-131. |
[20] |
Bonam SR, Kotla NG, Bohara RA, et al. (2021) Potential immuno-nanomedicine strategies to fight COVID-19 like pulmonary infections. Nano Today 36: 101051. doi: 10.1016/j.nantod.2020.101051
![]() |
[21] |
Barar J (2020) COVID-19 clinical implications: the significance of nanomedicine. Bioimpacts 10: 137-138. doi: 10.34172/bi.2020.16
![]() |
[22] |
Sivaraman D, Pradeep PS, Manoharan SS, et al. (2020) Current Strategies and Approaches in Combating SARS-CoV-2 Virus that Causes COVID-19. Lett Drug Des Discov 17: 672-674. doi: 10.2174/157018081705200403092546
![]() |
[23] |
Sportelli MC, Izzi M, Kukushkina EA, et al. (2020) Can Nanotechnology and Materials Science Help the Fight against SARS-CoV-2? Nanomaterials 10: 802. doi: 10.3390/nano10040802
![]() |
[24] |
Huang L, Rong Y, Pan Q, et al. (2021) SARS-CoV-2 vaccine research and development: Conventional vaccines and biomimetic nanotechnology strategies. Asian J Pharm Sci 16: 136-146. doi: 10.1016/j.ajps.2020.08.001
![]() |
[25] |
Yang D (2021) Application of Nanotechnology in the COVID-19 Pandemic. Int J Nanomedicine 16: 623-649. doi: 10.2147/IJN.S296383
![]() |
[26] |
Cheema R, Blumberg DA (2021) Understanding laboratory testing for SARS-CoV-2. Children 8: 355. doi: 10.3390/children8050355
![]() |
[27] | World Health Organization COVID-19 target product profiles for priority diagnostics to support response to the COVID-19 pandemic v.0.1 (2020) .Retrieved July 31, 2020, Available from: https://www.who.int/docs/default-source/blue-print/rd-blueprint-diagnostics-tpp-final-v31july2020.pdf?sfvrsn=2db5b31b_1&download=true. |
[28] |
Adhikari S, Adhikari U, Mishra A, et al. (2020) Nanomaterials for diagnostic, treatment and prevention of COVID-19. Appl Sci Technol Ann 1: 155-164. doi: 10.3126/asta.v1i1.30295
![]() |
[29] |
Balkourani G, Brouzgou A, Archonti M, et al. (2021) Emerging materials for the electrochemical detection of COVID-19. J Electroanal Chem 893: 115289. doi: 10.1016/j.jelechem.2021.115289
![]() |
[30] | Misra R, Acharya S, Sushmitha N (2021) Nanobiosensor-based diagnostic tools in viral infections: Special emphasis on Covid-19. Rev Med Virol e2267. |
[31] |
Shetti NP, Mishra A, Bukkitgar SD, et al. (2021) Conventional and nanotechnology-based sensing methods for SARS coronavirus (2019-nCoV). ACS Appl Bio Mater 4: 1178-1190. doi: 10.1021/acsabm.0c01545
![]() |
[32] |
Suleman S, Shukla SK, Malhotra N, et al. (2021) Point of care detection of COVID-19: Advancement in biosensing and diagnostic methods. Chem Eng J 414: 128759. doi: 10.1016/j.cej.2021.128759
![]() |
[33] |
Choi Y, Hwang JH, Lee SY (2018) Recent trends in nanomaterials-based colorimetric detection of pathogenic bacteria and viruses. Small Methods 2: 1700351. doi: 10.1002/smtd.201700351
![]() |
[34] |
Chen J, Andler SM, Goddard JM, et al. (2017) Integrating recognition elements with nanomaterials for bacteria sensing. Chem Soc Rev 46: 1272-1283. doi: 10.1039/C6CS00313C
![]() |
[35] |
Saha K, Agasti SS, Kim C, et al. (2012) Gold nanoparticles in chemical and biological sensing. Chem Rev 112: 2739-2779. doi: 10.1021/cr2001178
![]() |
[36] |
Karami A, Hasani M, Azizi Jalilian F, et al. (2021) Hairpin-spherical nucleic acids for diagnosing COVID-19: A simple method to generalize the conventional PCR for molecular assays. Anal Chem 93: 9250-9257. doi: 10.1021/acs.analchem.1c01515
![]() |
[37] |
Sil BK, Jamiruddin MR, Haq MA, et al. (2021) AuNP coupled rapid flow-through dot-blot immuno-assay for enhanced detection of SARS-CoV-2 specific nucleocapsid and receptor binding domain IgG. Int J Nanomedicine 16: 4739-4753. doi: 10.2147/IJN.S313140
![]() |
[38] |
Ventura BD, Cennamo M, Minopoli A, et al. (2020) Colorimetric test for fast detection of SARS-CoV-2 in nasal and throat swabs. ACS Sens 5: 3043-3048. doi: 10.1021/acssensors.0c01742
![]() |
[39] |
Moitra P, Alafeef M, Dighe K, et al. (2020) Selective naked-eye detection of SARS-CoV-2 mediated by N gene targeted antisense oligonucleotide capped plasmonic nanoparticles. ACS Nano 14: 7617-7627. doi: 10.1021/acsnano.0c03822
![]() |
[40] |
Mejía-Salazar JR, Oliveira ON (2018) Plasmonic biosensing: Focus review. Chem Rev 118: 10617-10625. doi: 10.1021/acs.chemrev.8b00359
![]() |
[41] |
Jadhav SA, Biji P, Panthalingal MK, et al. (2021) Development of integrated microfluidic platform coupled with Surface-enhanced Raman Spectroscopy for diagnosis of COVID-19. Med Hypotheses 146: 110356. doi: 10.1016/j.mehy.2020.110356
![]() |
[42] |
Shrivastav AM, Cvelbar U, Abdulhalim I (2021) A comprehensive review on plasmonic-based biosensors used in viral diagnostics. Commun Biol 4: 70. doi: 10.1038/s42003-020-01615-8
![]() |
[43] |
Liu H, Dai E, Xiao R, et al. (2021) Development of a SERS-based lateral flow immunoassay for rapid and ultra-sensitive detection of anti-SARS-CoV-2 IgM/IgG in clinical samples. Sens Actuators B Chem 329: 129196. doi: 10.1016/j.snb.2020.129196
![]() |
[44] |
Qiu G, Gai Z, Tao Y, et al. (2020) Dual-functional plasmonic photothermal biosensors for highly accurate severe acute respiratory syndrome coronavirus 2 detection. ACS Nano 14: 5268-5277. doi: 10.1021/acsnano.0c02439
![]() |
[45] |
Zhu X, Wang X, Han L, et al. (2020) Multiplex reverse transcription loop-mediated isothermal amplification combined with nanoparticles-based lateral flow biosensor for the diagnosis of COVID-19. Biosens Bioelectron 166: 112437. doi: 10.1016/j.bios.2020.112437
![]() |
[46] |
Wang Z, Zheng Z, Hu H, et al. (2020) A point-of-care selenium nanoparticles-based test for the combined detection of anti-SARS-CoV-2 IgM and IgG in human serum and blood. Lab Chip 20: 4255-4261. doi: 10.1039/D0LC00828A
![]() |
[47] |
Vadlamani BS, Uppal T, Verma SC, et al. (2020) Functionalized TiO2 nanotube-based electrochemical biosensor for rapid detection of SARS-CoV-2. Sensors 20: 5871. doi: 10.3390/s20205871
![]() |
[48] |
Jeong S, González-Grandío E, Navarro N, et al. (2021) Extraction of viral nucleic acids with carbon nanotubes increases SARS-CoV-2 quantitative reverse transcription polymerase chain reaction detection sensitivity. ACS Nano 15: 10309-10317. doi: 10.1021/acsnano.1c02494
![]() |
[49] |
Seo G, Lee G, Kim MJ, et al. (2020) Rapid detection of COVID-19 causative virus (SARS-CoV-2) in human nasopharyngeal swab specimens using field-effect transistor-based biosensor. ACS Nano 14: 5135-5142. doi: 10.1021/acsnano.0c02823
![]() |
[50] |
Li J, Wu D, Yu Y, et al. (2021) Rapid and unamplified identification of COVID-19 with morpholino-modified graphene field-effect transistor nanosensor. Biosens Bioelectron 183: 113206. doi: 10.1016/j.bios.2021.113206
![]() |
[51] |
Ali MA, Hu C, Jahan S, et al. (2021) Sensing of COVID-19 antibodies in seconds via aerosol jet nanoprinted reduced-graphene-oxide-coated 3D electrodes. Adv Mater Deerfield Beach Fla 33: 2006647. doi: 10.1002/adma.202006647
![]() |
[52] |
Zhu Z (2017) An overview of carbon nanotubes and graphene for biosensing applications. Nano-Micro Lett 9: 1-24. doi: 10.1007/s40820-016-0103-7
![]() |
[53] |
Vermisoglou E, Panáček D, Jayaramulu K, et al. (2020) Human virus detection with graphene-based materials. Biosens Bioelectron 166: 112436. doi: 10.1016/j.bios.2020.112436
![]() |
[54] |
Yang L, Xie X, Cai L, et al. (2016) p-sulfonated calix [8] arene functionalized graphene as a “turn on” fluorescent sensing platform for aconitine determination. Biosens Bioelectron 82: 146-154. doi: 10.1016/j.bios.2016.04.005
![]() |
[55] |
Huang C, Wen T, Shi FJ, et al. (2020) Rapid detection of IgM antibodies against the SARS-CoV-2 virus via colloidal gold nanoparticle-based lateral-flow assay. ACS Omega 5: 12550-12556. doi: 10.1021/acsomega.0c01554
![]() |
[56] |
Mertens P, De Vos N, Martiny D, et al. (2020) Development and potential usefulness of the COVID-19 Ag Respi-Strip diagnostic assay in a pandemic context. Front Med 7: 225. doi: 10.3389/fmed.2020.00225
![]() |
[57] |
Wen T, Huang C, Shi FJ, et al. (2020) Development of a lateral flow immunoassay strip for rapid detection of IgG antibody against SARS-CoV-2 virus. Analyst 145: 5345-5352. doi: 10.1039/D0AN00629G
![]() |
[58] |
Shan B, Broza YY, Li W, et al. (2020) Multiplexed nanomaterial-based sensor array for detection of COVID-19 in exhaled breath. ACS Nano 14: 12125-12132. doi: 10.1021/acsnano.0c05657
![]() |
[59] |
Lamote K, Janssens E, Schillebeeckx E, et al. (2020) The scent of COVID-19: viral (semi-)volatiles as fast diagnostic biomarkers? J Breath Res 14: 042001. doi: 10.1088/1752-7163/aba105
![]() |
[60] |
Fabiani L, Saroglia M, Galatà G, et al. (2020) Magnetic beads combined with carbon black-based screen-printed electrodes for COVID-19: A reliable and miniaturized electrochemical immunosensor for SARS-CoV-2 detection in saliva. Biosens Bioelectron 171: 112686. doi: 10.1016/j.bios.2020.112686
![]() |
[61] |
Arduini F, Cinti S, Mazzaracchio V, et al. (2020) Carbon black as an outstanding and affordable nanomaterial for electrochemical (bio)sensor design. Biosens Bioelectron 156: 112033. doi: 10.1016/j.bios.2020.112033
![]() |
[62] |
Vaquer A, Alba-Patiño A, Adrover-Jaume C, et al. (2021) Nanoparticle transfer biosensors for the non-invasive detection of SARS-CoV-2 antigens trapped in surgical face masks. Sens Actuators B Chem 345: 130347. doi: 10.1016/j.snb.2021.130347
![]() |
[63] |
Baker AN, Richards SJ, Guy CS, et al. (2020) The SARS-CoV-2 spike protein binds sialic acids and enables rapid detection in a lateral flow point of care diagnostic device. ACS Cent Sci 6: 2046-2052. doi: 10.1021/acscentsci.0c00855
![]() |
[64] |
Yang Y, Peng Y, Lin C, et al. (2021) Human ACE2-functionalized gold ‘virus-trap’ nanostructures for accurate capture of SARS-CoV-2 and single-virus SERS detection. Nano-Micro Lett 13: 109. doi: 10.1007/s40820-021-00620-8
![]() |
[65] |
Zhang Y, Chen M, Liu C, et al. (2021) Sensitive and rapid on-site detection of SARS-CoV-2 using a gold nanoparticle-based high-throughput platform coupled with CRISPR/Cas12-assisted RT-LAMP. Sens Actuators B Chem 345: 130411. doi: 10.1016/j.snb.2021.130411
![]() |
[66] |
Cao Y, Wu J, Pang B, et al. (2021) CRISPR/Cas12a-mediated gold nanoparticle aggregation for colorimetric detection of SARS-CoV-2. Chem Commun Camb Engl 57: 6871-6874. doi: 10.1039/D1CC02546E
![]() |
[67] |
Jiang Y, Hu M, Liu AA, et al. (2021) Detection of SARS-CoV-2 by CRISPR/Cas12a-enhanced colorimetry. ACS Sens 6: 1086-1093. doi: 10.1021/acssensors.0c02365
![]() |
[68] |
Song F, Shen Y, Wei Y, et al. (2021) Botulinum toxin as an ultrasensitive reporter for bacterial and SARS-CoV-2 nucleic acid diagnostics. Biosens Bioelectron 176: 112953. doi: 10.1016/j.bios.2020.112953
![]() |
[69] | Lew T, Aung K, Ow SY, et al. (2021) Epitope-functionalized gold nanoparticles for rapid and selective detection of SARS-CoV-2 IgG antibodies. ACS Nano Online ahead of print. |
[70] |
Alafeef M, Moitra P, Dighe K, et al. (2021) RNA-extraction-free nano-amplified colorimetric test for point-of-care clinical diagnosis of COVID-19. Nat Protoc 16: 3141-3162. doi: 10.1038/s41596-021-00546-w
![]() |
[71] |
Pramanik A, Gao Y, Patibandla S, et al. (2021) Aptamer conjugated gold nanostar-based distance-dependent nanoparticle surface energy transfer spectroscopy for ultrasensitive detection and inactivation of corona virus. J Phys Chem Lett 12: 2166-2171. doi: 10.1021/acs.jpclett.0c03570
![]() |
[72] |
Yao Z, Zhang Q, Zhu W, et al. (2021) Rapid detection of SARS-CoV-2 viral nucleic acids based on surface enhanced infrared absorption spectroscopy. Nanoscale 13: 10133-10142. doi: 10.1039/D1NR01652K
![]() |
[73] |
Karami A, Hasani M, Azizi Jalilian F, et al. (2021) Conventional PCR assisted single-component assembly of spherical nucleic acids for simple colorimetric detection of SARS-CoV-2. Sens Actuators B Chem 328: 128971. doi: 10.1016/j.snb.2020.128971
![]() |
[74] |
de Lima LF, Ferreira AL, Torres MD, et al. (2021) Minute-scale detection of SARS-CoV-2 using a low-cost biosensor composed of pencil graphite electrodes. Proc Natl Acad Sci 118: e2106724118. doi: 10.1073/pnas.2106724118
![]() |
[75] |
Zhang M, Li X, Pan J, et al. (2021) Ultrasensitive detection of SARS-CoV-2 spike protein in untreated saliva using SERS-based biosensor. Biosens Bioelectron 190: 113421. doi: 10.1016/j.bios.2021.113421
![]() |
[76] |
Sibai M, Solis D, Röltgen K, et al. (2021) Evaluation of SARS-CoV-2 total antibody detection via a lateral flow nanoparticles fluorescence immunoassay. J Clin Virol Off Publ Pan Am Soc Clin Virol 139: 104818. doi: 10.1016/j.jcv.2021.104818
![]() |
[77] |
Fu Z, Zeng W, Cai S, et al. (2021) Porous Au@Pt nanoparticles with superior peroxidase-like activity for colorimetric detection of spike protein of SARS-CoV-2. J Colloid Interface Sci 604: 113-121. doi: 10.1016/j.jcis.2021.06.170
![]() |
[78] |
Bayin Q, Huang L, Ren C, et al. (2021) Anti-SARS-CoV-2 IgG and IgM detection with a GMR based LFIA system. Talanta 227: 122207. doi: 10.1016/j.talanta.2021.122207
![]() |
[79] |
Chen Z, Zhang Z, Zhai X, et al. (2020) Rapid and sensitive detection of anti-SARS-CoV-2 IgG, using lanthanide-doped nanoparticles-based lateral flow immunoassay. Anal Chem 92: 7226-7231. doi: 10.1021/acs.analchem.0c00784
![]() |
[80] |
Wang D, He S, Wang X, et al. (2020) Rapid lateral flow immunoassay for the fluorescence detection of SARS-CoV-2 RNA. Nat Biomed Eng 4: 1150-1158. doi: 10.1038/s41551-020-00655-z
![]() |
[81] |
Stieber F, Howard J, Rao SN, et al. (2020) First performance report of QIAreach™ Anti-SARS-CoV-2 Total Test, an innovative nanoparticle fluorescence digital detection platform. J Clin Virol 133: 104681. doi: 10.1016/j.jcv.2020.104681
![]() |
[82] |
Nguyen N, Kim S, Lindemann G, et al. (2021) COVID-19 spike protein induced phononic modification in antibody-coupled graphene for viral detection application. ACS Nano 15: 11743-11752. doi: 10.1021/acsnano.1c02549
![]() |
[83] |
Zhang Y, Malekjahani A, Udugama BN, et al. (2021) Surveilling and tracking COVID-19 patients using a portable quantum dot smartphone device. Nano Lett 21: 5209-5216. doi: 10.1021/acs.nanolett.1c01280
![]() |
[84] |
Zhou Y, Chen Y, Liu W, et al. (2021) Development of a rapid and sensitive quantum dot nanobead-based double-antigen sandwich lateral flow immunoassay and its clinical performance for the detection of SARS-CoV-2 total antibodies. Sens Actuators B Chem 343: 130139. doi: 10.1016/j.snb.2021.130139
![]() |
[85] |
Sundah NR, Natalia A, Liu Y, et al. (2021) Catalytic amplification by transition-state molecular switches for direct and sensitive detection of SARS-CoV-2. Sci Adv 7: 5940. doi: 10.1126/sciadv.abe5940
![]() |
[86] |
Chen R, Ren C, Liu M, et al. (2021) Early Detection of SARS-CoV-2 seroconversion in humans with aggregation-induced near-infrared emission nanoparticle-labeled lateral flow immunoassay. ACS Nano 15: 8996-9004. doi: 10.1021/acsnano.1c01932
![]() |
[87] | Bałazy A, Toivola M, Reponen T, et al. (2006) Manikin-based performance evaluation of N95 filtering-facepiece respirators challenged with nanoparticles. Ann Occup Hyg 50: 259-269. |
[88] |
Chen L, Liang J (2020) An overview of functional nanoparticles as novel emerging antiviral therapeutic agents. Mater Sci Eng C Mater Biol Appl 112: 110924. doi: 10.1016/j.msec.2020.110924
![]() |
[89] |
Militky J, Novak O, Kremenakova D, et al. (2021) A review of impact of textile research on protective face masks. Material (Basel) 14: 1937. doi: 10.3390/ma14081937
![]() |
[90] |
Palmieri V, De Maio F, De Spirito M, et al. (2021) Face masks and nanotechnology: Keep the blue side up. Nano Today 37: 101077. doi: 10.1016/j.nantod.2021.101077
![]() |
[91] |
Talebian S, Wallace GG, Schroeder A, et al. (2020) Nanotechnology-based disinfectants and sensors for SARS-CoV-2. Nat Nanotechnol 15: 618-621. doi: 10.1038/s41565-020-0751-0
![]() |
[92] |
Kumar S, Karmacharya M, Joshi SR, et al. (2021) Photoactive Antiviral Face Mask with Self-Sterilization and Reusability. Nano Lett 21: 337-343. doi: 10.1021/acs.nanolett.0c03725
![]() |
[93] | Nanotechnology Products Database (2021) .Available from: https://product.statnano.com/search?keyword=COVID-19. |
[94] | Nanotechnology in Battle Against Coronavirus Retrieved July 31, 2021, Available from: https://statnano.com/nanotechnology-in-battle-against-coronavirus. |
[95] |
Borkow G, Zhou SS, Page T, et al. (2010) A novel anti-influenza copper oxide containing respiratory face mask. PloS One 5: e11295. doi: 10.1371/journal.pone.0011295
![]() |
[96] | Korea Advanced Institute of Science and Technology, Recyclable nano-fiber filtered face masks a boon for supply fiasco, 2020 Available from: https://news.kaist.ac.kr/newsen/html/news/?mode=V&mng_no=6530. |
[97] | Queensland University of Technology, New mask material can remove virus-size nanoparticles, 2020 Available from: https://www.qut.edu.au/news?id=161468. |
[98] | The world's first anti-coronavirus surgical mask by Wakamono, 2020 Available from: https://wakamonobio.com/the-wakamono-mask-the-worlds-first-anti-coronavirus-surgical-mask-2/. |
[99] | Tremiliosi GC, Simoes LGP, Minozzi DT, et al. (2020) Ag nanoparticles-based antimicrobial polycotton fabrics to prevent the transmission and spread of SARS-CoV-2 Preprint. |
[100] |
Jeremiah SS, Miyakawa K, Morita T, et al. (2020) Potent antiviral effect of silver nanoparticles on SARS-CoV-2. Biochem Biophys Res Commun 533: 195-200. doi: 10.1016/j.bbrc.2020.09.018
![]() |
[101] |
Gheblawi M, Wang K, Viveiros A, et al. (2020) Angiotensin-converting enzyme 2: SARS-CoV-2 receptor and regulator of the renin-angiotensin system: celebrating the 20th anniversary of the discovery of ACE2. Circ Res 126: 1456-1474. doi: 10.1161/CIRCRESAHA.120.317015
![]() |
[102] |
Ni W, Yang X, Yang D, et al. (2020) Role of angiotensin-converting enzyme 2 (ACE2) in COVID-19. Crit Care 24: 422. doi: 10.1186/s13054-020-03120-0
![]() |
[103] |
Imai Y, Kuba K, Rao S, et al. (2005) Angiotensin-converting enzyme 2 protects from severe acute lung failure. Nature 436: 112-116. doi: 10.1038/nature03712
![]() |
[104] |
Aydemir D, Ulusu NN (2020) Correspondence: Angiotensin-converting enzyme 2 coated nanoparticles containing respiratory masks, chewing gums and nasal filters may be used for protection against COVID-19 infection. Travel Med Infect Dis 37: 101697. doi: 10.1016/j.tmaid.2020.101697
![]() |
[105] |
Raghav PK, Mohanty S (2020) Are graphene and graphene-derived products capable of preventing COVID-19 infection? Med Hypotheses 144: 110031. doi: 10.1016/j.mehy.2020.110031
![]() |
[106] |
Chen YN, Hsueh YH, Hsieh CT, et al. (2016) Antiviral activity of graphene-silver nanocomposites against non-enveloped and enveloped viruses. Int J Environ Res Public Health 13: 430. doi: 10.3390/ijerph13040430
![]() |
[107] |
De Maio F, Palmieri V, Babini G, et al. (2021) Graphene nanoplatelet and graphene oxide functionalization of face mask materials inhibits infectivity of trapped SARS-CoV-2. iScience 24: 102788. doi: 10.1016/j.isci.2021.102788
![]() |
[108] |
Unal MA, Bayrakdar F, Nazir H, et al. (2021) Graphene oxide nanosheets interact and interfere with SARS-CoV-2 surface proteins and cell receptors to inhibit infectivity. Small 17: 2101483. doi: 10.1002/smll.202101483
![]() |
[109] | Guardian G-Volt masks would use graphene and electrical charge to repel viruses and bacteria (2020) .Available from: https://www.dezeen.com/2020/03/06/guardian-g-volt-face-mask-graphene-coronavirus-bacteria/. |
[110] | Balagna C, Perero S, Percivalle E, et al. (2020) Virucidal effect against coronavirus SARS-CoV-2 of a silver nanocluster/silica composite sputtered coating. Open Ceram 100006. |
[111] |
Pastorino B, Touret F, Gilles M, et al. (2020) Prolonged infectivity of SARS-CoV-2 in fomites. Emerg Infect Dis 26: 2256-2257. doi: 10.3201/eid2609.201788
![]() |
[112] | Blevens MS, Pastrana HF, Mazzotta HC, et al. (2021) Cloth Face Masks Containing Silver: Evaluating the Status. J Chem Health Saf 1c00005. |
[113] |
Chen X, Chen X, Liu Q, et al. (2021) Used disposable face masks are significant sources of microplastics to environment. Environ Pollut 285: 117485. doi: 10.1016/j.envpol.2021.117485
![]() |
[114] |
Sullivan GL, Delgado-Gallardo J, Watson TM, et al. (2021) An investigation into the leaching of micro and nano particles and chemical pollutants from disposable face masks-linked to the COVID-19 pandemic. Water Res 196: 117033. doi: 10.1016/j.watres.2021.117033
![]() |
[115] |
Kang J, Zhou L, Duan X, et al. (2019) Degradation of Cosmetic microplastics via functionalized carbon nanosprings. Matter 1: 745-758. doi: 10.1016/j.matt.2019.06.004
![]() |
[116] | World Health Organization COVID-19 vaccine tracker and landscape Retrieved on July 31, 2021. Available from: https://www.who.int/publications/m/item/draft-landscape-of-covid-19-candidate-vaccines. |
[117] | World Health Organization Status of COVID-19 Vaccines within WHO EUL/PQ evaluation process Retrieved on May 18, 2021. Available from: https://extranet.who.int/pqweb/sites/default/files/documents/Status_COVID_VAX_18May2021.pdf. |
[118] |
Sanders JM, Monogue ML, Jodlowski TZ, et al. (2020) Pharmacologic treatments for coronavirus disease 2019 (COVID-19): A review. JAMA 323: 1824-1836. doi: 10.1001/jama.2019.20153
![]() |
[119] | Pan H, Peto R, Abdool Karim Q, et al. (2020) Repurposed antiviral drugs for COVID-19 – interim WHO SOLIDARITY trial results. N Engl J Med 384: 497-511. |
[120] |
Tammam SN, Azzazy HM, Lamprecht A (2015) Biodegradable particulate carrier formulation and tuning for targeted drug delivery. J Biomed Nanotechnol 11: 555-577. doi: 10.1166/jbn.2015.2017
![]() |
[121] |
Patra JK, Das G, Fraceto LF, et al. (2018) Nano based drug delivery systems: recent developments and future prospects. J Nanobiotechnology 16: 71. doi: 10.1186/s12951-018-0392-8
![]() |
[122] |
Chakravarty M, Vora A (2020) Nanotechnology-based antiviral therapeutics. Drug Deliv Transl Res 11: 748-787. doi: 10.1007/s13346-020-00818-0
![]() |
[123] |
Teixeira MC, Carbone C, Souto EB (2017) Beyond liposomes: Recent advances on lipid based nanostructures for poorly soluble/poorly permeable drug delivery. Prog Lipid Res 68: 1-11. doi: 10.1016/j.plipres.2017.07.001
![]() |
[124] |
Roldão A, Mellado MC, Castilho LR, et al. (2010) Virus-like particles in vaccine development. Expert Rev Vaccines 9: 1149-1176. doi: 10.1586/erv.10.115
![]() |
[125] | Schwarz B, Uchida M, Douglas T (2017) Biomedical and catalytic opportunities of virus-like particles in nanotechnology. Adv Virus Res 60: 1-60. |
[126] |
Syomin BV, Ilyin YV (2019) Virus-like particles as an instrument of vaccine production. Mol Biol 53: 323-334. doi: 10.1134/S0026893319030154
![]() |
[127] |
Bachmann M, Rohrer U, Kundig T, et al. (1993) The influence of antigen organization on B cell responsiveness. Science 262: 1448-1451. doi: 10.1126/science.8248784
![]() |
[128] |
Zabel F, Kündig TM, Bachmann MF (2013) Virus-induced humoral immunity: on how B cell responses are initiated. Curr Opin Virol 3: 357-362. doi: 10.1016/j.coviro.2013.05.004
![]() |
[129] |
Bachmann MF, Jennings GT (2010) Vaccine delivery: a matter of size, geometry, kinetics and molecular patterns. Nat Rev Immunol 10: 787-796. doi: 10.1038/nri2868
![]() |
[130] |
Bachmann MF, Dyer MR (2004) Therapeutic vaccination for chronic diseases: a new class of drugs in sight. Nat Rev Drug Discov 3: 81-88. doi: 10.1038/nrd1284
![]() |
[131] |
Zepeda-Cervantes J, Ramírez-Jarquín JO, Vaca L (2020) Interaction between virus-like particles (VLPs) and pattern recognition receptors (PRRs) from dendritic cells (DCs): toward better engineering of VLPs. Front Immunol 11: 1100. doi: 10.3389/fimmu.2020.01100
![]() |
[132] |
Mohsen MO, Zha L, Cabral-Miranda G, et al. (2017) Major findings and recent advances in virus–like particle (VLP)-based vaccines. Semin Immunol 34: 123-132. doi: 10.1016/j.smim.2017.08.014
![]() |
[133] |
Ward BJ, Gobeil P, Séguin A, et al. (2021) Phase 1 randomized trial of a plant-derived virus-like particle vaccine for COVID-19. Nat Med 27: 1071-1078. doi: 10.1038/s41591-021-01370-1
![]() |
[134] | ARTES Biotechnology ARTES joins global combat against Corona, 2020 Available from: https://artes-biotechnology.biz/artes-joins-global-combat-against-corona/. |
[135] |
Fluckiger AC, Ontsouka B, Bozic J, et al. (2021) An enveloped virus-like particle vaccine expressing a stabilized prefusion form of the SARS-CoV-2 spike protein elicits highly potent immunity. Vaccine 39: 4988-5001. doi: 10.1016/j.vaccine.2021.07.034
![]() |
[136] | Milken Institute FasterCures COVID-19 treatments and vaccine tracker (2021) .Retrieved July 31, 2021. Available from: https://covid-19tracker.milkeninstitute.org/. |
[137] |
Reichmuth AM, Oberli MA, Jaklenec A, et al. (2016) mRNA vaccine delivery using lipid nanoparticles. Ther Deliv 7: 319-334. doi: 10.4155/tde-2016-0006
![]() |
[138] |
Jackson N, Kester KE, Casimiro D, et al. (2020) The promise of mRNA vaccines: a biotech and industrial perspective. NPJ Vaccines 5: 11. doi: 10.1038/s41541-020-0159-8
![]() |
[139] |
Buschmann MD, Carrasco MJ, Alishetty S, et al. (2021) Nanomaterial Delivery Systems for mRNA Vaccines. Vaccines 9: 65. doi: 10.3390/vaccines9010065
![]() |
[140] |
Khehra N, Padda I, Jaferi U, et al. (2021) Tozinameran (BNT162b2) vaccine: The journey from preclinical research to clinical trials and authorization. AAPS PharmSciTech 22: 172. doi: 10.1208/s12249-021-02058-y
![]() |
[141] | Francis AI, Ghany S, Gilkes T, et al. (2021) Review of COVID-19 vaccine subtypes, efficacy and geographical distributions. Postgrad Med J 0: 1-6. |
[142] |
Corbett KS, Edwards DK, Leist SR, et al. (2020) SARS-CoV-2 mRNA vaccine design enabled by prototype pathogen preparedness. Nature 586: 567-571. doi: 10.1038/s41586-020-2622-0
![]() |
[143] |
Corbett KS, Flynn B, Foulds KE, et al. (2020) Evaluation of the mRNA-1273 vaccine against SARS-CoV-2 in nonhuman primates. N Engl J Med 383: 1544-1555. doi: 10.1056/NEJMoa2024671
![]() |
[144] |
Baden LR, El Sahly HM, Essink B, et al. (2021) Efficacy and Safety of the mRNA-1273 SARS-CoV-2 Vaccine. N Engl J Med 384: 403-416. doi: 10.1056/NEJMoa2035389
![]() |
[145] |
Keech C, Albert G, Cho I, et al. (2020) Phase 1-2 trial of a SARS-CoV-2 recombinant spike protein nanoparticles vaccine. N Engl J Med 383: 2320-2332. doi: 10.1056/NEJMoa2026920
![]() |
[146] |
Heath PT, Galiza EP, Baxter DN, et al. (2021) Safety and efficacy of NVX-CoV2373 Covid-19 vaccine. N Engl J Med 385: 1172-1183. doi: 10.1056/NEJMoa2107659
![]() |
[147] | Massare MJ, Patel N, Zhou B, et al. (2021) Combination respiratory vaccine containing recombinant SARS-CoV-2 spike and quadrivalent seasonal influenza hemagglutinin nanoparticles with matrix-m adjuvant Preprint. |
[148] | He L, Lin X, Wang Y, et al. (2020) Self-assembling nanoparticles presenting receptor binding domain and stabilized spike as next-generation COVID-19 vaccines Preprint. |
[149] |
Zeng C, Hou X, Yan J, et al. (2020) Leveraging mRNA sequences and nanoparticles to deliver SARS-CoV-2 antigens in vivo. Adv Mater 32: 2004452. doi: 10.1002/adma.202004452
![]() |
[150] |
Rao L, Xia S, Xu W, et al. (2020) Decoy nanoparticles protect against COVID-19 by concurrently adsorbing viruses and inflammatory cytokines. Proc Natl Acad Sci 117: 27141-27147. doi: 10.1073/pnas.2014352117
![]() |
[151] |
Li Z, Wang Z, Dinh PUC, et al. (2021) Cell-mimicking nanodecoys neutralize SARS-CoV-2 and mitigate lung injury in a non-human primate model of COVID-19. Nat Nanotechnol 16: 942-951. doi: 10.1038/s41565-021-00923-2
![]() |
[152] |
Zhang Q, Honko A, Zhou J, et al. (2020) Cellular nanosponges inhibit SARS-CoV-2 infectivity. Nano Lett 20: 5570-5574. doi: 10.1021/acs.nanolett.0c02278
![]() |
[153] | Liu L, Liu Z, Chen H, et al. (2020) A translatable subunit nanovaccine for COVID-19 Preprint. |
[154] |
Padlan EA (1994) Anatomy of the antibody molecule. Mol Immunol 31: 169-217. doi: 10.1016/0161-5890(94)90001-9
![]() |
[155] |
Huang L, Muyldermans S, Saerens D (2010) Nanobodies®: proficient tools in diagnostics. Expert Rev Mol Diagn 10: 777-785. doi: 10.1586/erm.10.62
![]() |
[156] |
Van Audenhove I, Gettemans J (2016) Nanobodies as versatile tools to understand, diagnose, visualize and treat cancer. EBioMedicine 8: 40-48. doi: 10.1016/j.ebiom.2016.04.028
![]() |
[157] |
Bannas P, Hambach J, Koch-Nolte F (2017) Nanobodies and nanobody-based human heavy chain antibodies as antitumor therapeutics. Front Immunol 8: 1603. doi: 10.3389/fimmu.2017.01603
![]() |
[158] |
Pymm P, Adair A, Chan LJ, et al. (2021) Nanobody cocktails potently neutralize SARS-CoV-2 D614G N501Y variant and protect mice. Proc Natl Acad Sci 118: e2101918118. doi: 10.1073/pnas.2101918118
![]() |
[159] |
Wang Y, Fan Z, Shao L, et al. (2016) Nanobody-derived nanobiotechnology tool kits for diverse biomedical and biotechnology applications. Int J Nanomedicine 11: 3287-3303. doi: 10.2147/IJN.S107194
![]() |
[160] |
Xu J, Xu K, Jung S, et al. (2021) Nanobodies from camelid mice and llamas neutralize SARS-CoV-2 variants. Nature 595: 278-282. doi: 10.1038/s41586-021-03676-z
![]() |
[161] |
Güttler T, Aksu M, Dickmanns A, et al. (2021) Neutralization of SARS-CoV-2 by highly potent, hyperthermostable, and mutation-tolerant nanobodies. EMBO J 40: e107985. doi: 10.15252/embj.2021107985
![]() |
[162] | Sziemel AM, Hwa SH, Sigal A, et al. (2021) Development of highly potent neutralising nanobodies against multiple SARS-CoV-2 variants including the variant of concern B.1.351 Preprint. |
[163] |
Custódio TF, Das H, Sheward DJ, et al. (2020) Selection, biophysical and structural analysis of synthetic nanobodies that effectively neutralize SARS-CoV-2. Nat Commun 11: 5588. doi: 10.1038/s41467-020-19204-y
![]() |
[164] | Ye G, Gallant JP, Massey C, et al. (2020) The development of a novel nanobody therapeutic for SARS-CoV-2 Preprint. |
[165] |
Hanke L, Vidakovics Perez L, Sheward DJ, et al. (2020) An alpaca nanobody neutralizes SARS-CoV-2 by blocking receptor interaction. Nat Commun 11: 4420. doi: 10.1038/s41467-020-18174-5
![]() |
[166] |
Nambulli S, Xiang Y, Tilston-Lunel NL, et al. (2021) Inhalable Nanobody (PiN-21) prevents and treats SARS-CoV-2 infections in Syrian hamsters at ultra-low doses. Sci Adv 7: 0319. doi: 10.1126/sciadv.abh0319
![]() |
[167] |
Esparza TJ, Martin NP, Anderson GP, et al. (2020) High affinity nanobodies block SARS-CoV-2 spike receptor binding domain interaction with human angiotensin converting enzyme. Sci Rep 10: 1-13. doi: 10.1038/s41598-020-79036-0
![]() |
[168] | Xiang Y, Nambulli S, Xiao Z, et al. (2020) Versatile and multivalent nanobodies efficiently neutralize SARS-CoV-2 370: 1479-1484. |
[169] | Koenig PA, Das H, Liu H, et al. (2021) Structure-guided multivalent nanobodies block SARS-CoV-2 infection and suppress mutational escape 371: 6230. |
[170] |
Lu Q, Zhang Z, Li H, et al. (2021) Development of multivalent nanobodies blocking SARS-CoV-2 infection by targeting RBD of spike protein. J Nanobiotechnology 19: 33. doi: 10.1186/s12951-021-00768-w
![]() |
1. | C. Mallikarjunaswamy, S. Pramila, G. Nagaraju, V. Lakshmi Ranganatha, Enhanced photocatalytic, electrochemical and antimicrobial activities of α-Mn2V2O7 nanopebbles, 2022, 33, 0957-4522, 617, 10.1007/s10854-021-07331-1 | |
2. | Xinyu Chen, Zhonghua Gou, Bridging the knowledge gap between energy-saving intentions and behaviours of young people in residential buildings, 2022, 57, 23527102, 104932, 10.1016/j.jobe.2022.104932 | |
3. | Zul Ilham, Indrani Subramaniam, Adi Ainurzaman Jamaludin, Wan Abd Al Qadr Imad Wan-Mohtar, Sarina Abdul Halim-Lim, Hideaki Ohgaki, Keiichi Ishihara, Mohd Radzi Abu Mansor, Analysing dimensions and indicators to design energy education framework in Malaysia using the analytic hierarchy process (AHP), 2022, 8, 23524847, 1013, 10.1016/j.egyr.2022.07.126 | |
4. | Adi Ainurzaman Jamaludin, Nurul Emy Idayu Zulkifli, Saherra Bharin, Rohana Jani, Mohd Istajib Mokhtar, Sarina Abdul Halim-Lim, Wan Abd Al Qadr Imad Wan-Mohtar, Zul Ilham, Awareness on energy conservation: a case study of first-year undergraduate students in Malaysia, 2023, 24, 1467-6370, 678, 10.1108/IJSHE-03-2022-0084 | |
5. | Zul Ilham, Nurul Emy Idayu Zulkifli, Nadia Farhana Ismail, Aida Suryana Danik, Sarina Abdul Halim-Lim, Wan Abd Al Qadr Imad Wan-Mohtar, Adi Ainurzaman Jamaludin, Energy conservation: awareness analysis among secondary school students, 2022, 28, 1350-4622, 925, 10.1080/13504622.2022.2031902 | |
6. | Ahmed K. Nassar, Identifying and Explaining Public Preferences for Renewable Energy Sources in Qatar, 2022, 14, 2071-1050, 13835, 10.3390/su142113835 | |
7. | Gharieb S. El-Sayyad, Dounia Elfadil, Mahmoud A. Mosleh, Yasmeen A. Hasanien, Abdo Mostafa, Rofaida S. Abdelkader, Neveen Refaey, Eman M. Elkafoury, Ghada Eshaq, Ehab A. Abdelrahman, Mohamed N. Malash, Samar H. Rizk, Mohamed Gobara, Hanady G. Nada, Amr H. Hashem, Mohamed S. Attia, Ayman M. Noreddin, M. I. A. Abdel Maksoud, Mohamed Mohamady Ghobashy, Dina E. Basher, Ragaa Magdy, Walid F. Elkhatib, Ahmed I. El-Batal, Eco-friendly Strategies for Biological Synthesis of Green Nanoparticles with Promising Applications, 2024, 14, 2191-1630, 3617, 10.1007/s12668-024-01494-x | |
8. | Grace Phang, Zul Ilham, Theory of planned behavior to understand pro-environmental behavior among Universiti Malaya students, 2023, 10, 2372-0352, 691, 10.3934/environsci.2023038 | |
9. | Sümeyra YILMAZ, Bülent AYDOĞDU, Fen Bilimleri Öğretmen Adaylarının Yenilenebilir Enerji Kaynaklarına Yönelik Tutumlarının Bazı Değişkenlere Göre İncelenmesi, 2020, 5, 2536-5258, 127, 10.48067/ijal.813577 | |
10. | Karina D. Véliz, Sergio Silva, Beatriz Hernández, Vision for a sustainable energy transition and decarbonization: A case study of students surveyed at a Chilean University, 2023, 9, 24058440, e21534, 10.1016/j.heliyon.2023.e21534 |
Phase | Stage | Time taken (ms) | Communication overhead (bytes) | Total Computation Overhead (ms) |
Base station Key generation | Compute f(h) Compute dbs Compute mbs mbs→UEn |
1.51 1.23 0.83 1.8 |
31.87 bytes - 1 byte 6 bytes |
4.14 |
UE key generation | Compute f(h) Compute due Compute mue mbs→BS1…BS2…BSn |
1.54 1.22 0.9 4.2 |
31.87 - 1 10 |
6.64 |
Authentication process | UE→BS2 Verify UE(mue) BS2→BS1 Verify BS2(mbs) BS1→UE |
1.9 0.38 1.76 0.84 1.8 |
1 1 |
6.68 |
References | Access Control | Data Integrity | Data Privacy | Communication Overhead | Storage Overhead | |
Ma et al. [24] 2019 | The scheme does not prevent an attacker from setting up an RBS. | Signcryption method verifies sender's signature key. | Verified sender's signature ensures only the target can read the data shared. | Requires a total of 432 bytes of information for the scheme to authenticate the base station and the device. | Keys stored in UE increase storage overhead to 288 bytes | |
Qiu et al. [25] 2017 | The scheme does not prevent an attacker from setting up an RBS. | Random numbers used to generate keys prevent attackers from deciphering the ciphertext. | User privacy concerns are not addressed as a UE must first send its IMSI to the MME. | 624 bytes of communication overhead are required for the authentication process to complete. | UE stores 296 bytes of data. | |
Cao et al. [26] 2012 | The scheme does not prevent an attacker from setting up an RBS. | The handover process requires mutual authentication before sharing data. | The m_ue generated consists of user identifying IMSI information. | 1744 bytes of data are transmitted. | The UE stores 1616 bytes of data that includes long-term secret keys | |
Chow et al. [27] 2022 | Higher computational delays increase latency in the authentication process. | Data stored in Blockchain prevents data manipulation. | A successful DDoS attack exposes the authentication protocol. | 256 bytes of communication overhead occurs using SHA based hashing. | High storage overhead of 32 bytes | |
Yang et al. [28] 2022 | Devices are registered in the Blockchain. | Data stored in Blockchain ensures Data security. | Public and Private key are exposed to attackers. | 236 bytes of communication overhead at the server. | High storage overhead of 92 bytes. | |
Proposed Scheme | Private blockchain mines nodes and assign new base stations. | Blockchain-based base stations prevent data exploitation. | Hashed User IDs prevent identifying the data owner. | m_bs and m_ue are of a total of 3 bytes. | Low storage overhead of 30 bytes using C_cert |
Phase | Stage | Time taken (ms) | Communication overhead (bytes) | Total Computation Overhead (ms) |
Base station Key generation | Compute f(h) Compute dbs Compute mbs mbs→UEn |
1.51 1.23 0.83 1.8 |
31.87 bytes - 1 byte 6 bytes |
4.14 |
UE key generation | Compute f(h) Compute due Compute mue mbs→BS1…BS2…BSn |
1.54 1.22 0.9 4.2 |
31.87 - 1 10 |
6.64 |
Authentication process | UE→BS2 Verify UE(mue) BS2→BS1 Verify BS2(mbs) BS1→UE |
1.9 0.38 1.76 0.84 1.8 |
1 1 |
6.68 |
![]() |
M1 | M2 | M3 | Total Overhead | |
Proposed scheme | 1 | 1 | 1 | 3 | |
Chow et al. [27] 2022 Yang et al. [28] 2022 Ma et al. [24] 2019 |
32 216 264 |
- 20 136 |
- - 32 |
32 236 432 |
|
Qiu et al. [25] 2017 | 304 | 304 | 16 | 624 | |
Cao et al. [26] 2012 | 856 | 872 | 16 | 1744 |
References | Access Control | Data Integrity | Data Privacy | Communication Overhead | Storage Overhead | |
Ma et al. [24] 2019 | The scheme does not prevent an attacker from setting up an RBS. | Signcryption method verifies sender's signature key. | Verified sender's signature ensures only the target can read the data shared. | Requires a total of 432 bytes of information for the scheme to authenticate the base station and the device. | Keys stored in UE increase storage overhead to 288 bytes | |
Qiu et al. [25] 2017 | The scheme does not prevent an attacker from setting up an RBS. | Random numbers used to generate keys prevent attackers from deciphering the ciphertext. | User privacy concerns are not addressed as a UE must first send its IMSI to the MME. | 624 bytes of communication overhead are required for the authentication process to complete. | UE stores 296 bytes of data. | |
Cao et al. [26] 2012 | The scheme does not prevent an attacker from setting up an RBS. | The handover process requires mutual authentication before sharing data. | The m_ue generated consists of user identifying IMSI information. | 1744 bytes of data are transmitted. | The UE stores 1616 bytes of data that includes long-term secret keys | |
Chow et al. [27] 2022 | Higher computational delays increase latency in the authentication process. | Data stored in Blockchain prevents data manipulation. | A successful DDoS attack exposes the authentication protocol. | 256 bytes of communication overhead occurs using SHA based hashing. | High storage overhead of 32 bytes | |
Yang et al. [28] 2022 | Devices are registered in the Blockchain. | Data stored in Blockchain ensures Data security. | Public and Private key are exposed to attackers. | 236 bytes of communication overhead at the server. | High storage overhead of 92 bytes. | |
Proposed Scheme | Private blockchain mines nodes and assign new base stations. | Blockchain-based base stations prevent data exploitation. | Hashed User IDs prevent identifying the data owner. | m_bs and m_ue are of a total of 3 bytes. | Low storage overhead of 30 bytes using C_cert |