4.7 Article

An enhanced consortium blockchain diversity mining technique for IoT metadata aggregation

Related references

Note: Only part of the references are listed.
Article Mathematics, Applied

Adaptation of kernel functions-based approach with Atangana-Baleanu-Caputo distributed order derivative for solutions of fuzzy fractional Volterra and Fredholm integrodifferential equations

Omar Abu Arqub et al.

Summary: This study presents a mathematical modeling approach for uncertain fractional integrodifferentials (FIDEs) in electric circuits, signal processing, electromagnetics, and anomalous diffusion systems. A numerical method based on the reproducing kernel algorithm (RKA) is used to solve groups of fuzzy fractional integrodifferentials (FFIDEs) with Atangana-Baleanu-Caputo (ABC) fractional distributed order derivatives. Experimental results demonstrate the feasibility and accuracy of the proposed approach, indicating its potential for treating various models with fractional ABC distributed order.

MATHEMATICAL METHODS IN THE APPLIED SCIENCES (2023)

Article Mathematics, Applied

Reproducing kernel approach for numerical solutions of fuzzy fractional initial value problems under the Mittag-Leffler kernel differential operator

Omar Abu Arqub et al.

Summary: In this research study, fuzzy fractional differential equations in presence of the Atangana-Baleanu-Caputo differential operators are analyzed and solved using extended reproducing kernel Hilbert space technique. A new fuzzy characterization theorem and two fuzzy fractional solutions are constructed and computed. The convergence analysis and error behavior beyond the reproducing kernel theory are explored and discussed. Three computational algorithms and modern trends in terms of analytic and numerical solutions are demonstrated. The dynamical characteristics and mechanical features of these fuzzy fractional solutions are illustrated and studied. Highlights and future suggested research work are provided.

MATHEMATICAL METHODS IN THE APPLIED SCIENCES (2023)

Article Computer Science, Interdisciplinary Applications

A blockchain-enabled IoT auditing management system complying with ISO/IEC 15408-2

Shi-Cho Cha et al.

Summary: Blockchain is being recognized as a trusted and decentralized architecture that can enhance IoT security and auditing management. This study presents a blockchain-enabled IoT auditing management system that complies with ISO/IEC 15408-2 requirements. The system demonstrates stable data retrieval and compressing/uploading times, and fulfills critical auditing requirements while leveraging the advantages of blockchain technology.

COMPUTERS & INDUSTRIAL ENGINEERING (2023)

Review Computer Science, Theory & Methods

Fusion of blockchain and IoT in scientific publishing: Taxonomy, tools, and future directions

Sudeep Tanwar et al.

Summary: Scientific publishing systems (SPS) provide a platform for authors, reviewers, and editors to share their research, leading to the advancement of the academic community. However, traditional SPS face challenges in managing large databases, complex queries and retrievals, lengthy publishing processes, and lack of rewarding methods for peer review and storage of unsuccessful articles. In this paper, a fusion of blockchain and IoT technologies is proposed to address these limitations and provide a secure, transparent, and efficient publishing platform.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2023)

Article Computer Science, Information Systems

EHDHE: Enhancing security of healthcare documents in IoT-enabled digital healthcare ecosystems using blockchain

Pratima Sharma et al.

Summary: Blockchain technology is essential for ensuring data security in various fields such as artificial intelligence, supply chain, cloud computing, and healthcare. The blockchain-based IoT systems have significantly enhanced security, privacy, transparency, and efficiency in the healthcare sector, offering better business opportunities.

INFORMATION SCIENCES (2023)

Article Green & Sustainable Science & Technology

Enablers to achieve zero hunger through IoT and blockchain technology and transform the green food supply chain systems

Mukesh Kumar et al.

Summary: Food security requires a multifaceted strategy, including social protection and providing healthy food. Digital transformation and the application of IoT and blockchain can improve food security, safety, and quality. This study identifies the key factors in the green food supply chain management that can reduce hunger through IoT and blockchain technologies.

JOURNAL OF CLEANER PRODUCTION (2023)

Article Energy & Fuels

Blockchain plus IoT sensor network to measure, evaluate and incentivize personal environmental accounting and efficient energy use in indoor spaces

Nan Ma et al.

Summary: Electric demand flexibility in buildings is heavily influenced by occupant behavior. This study presents a novel infrastructure that connects IoT sensors to a blockchain network for long-term monitoring of energy and environmental performance. The system provides real-time data on indoor environmental quality, energy usage, and carbon intensity, and uses smart contracts to incentivize energy conservation and carbon reduction.

APPLIED ENERGY (2023)

Article Computer Science, Interdisciplinary Applications

Secure Intelligent Fuzzy Blockchain Framework: Effective Threat Detection in IoT Networks

Abbas Yazdinejad et al.

Summary: Integrating blockchain into the Internet of Things (IoT) for security is a new development, but it also brings more vulnerabilities and security threats. Although blockchain has potential security benefits, new cyberattacks have emerged that make it insufficient to deal with threats and attacks in IoT networks. Therefore, better security approaches are needed, such as efficient threat detection against network attacks in blockchain-based IoT environments.

COMPUTERS IN INDUSTRY (2023)

Article Computer Science, Hardware & Architecture

BLAST-IoT: BLockchain Assisted Scalable Trust in Internet of Things

Avani Sharma et al.

Summary: The Internet of Things enables connectivity between different physical devices, requiring a secure and reliable network system for data interchange and information flow. A trust management system can be embedded to compute and maintain trust values, which are exchanged between devices to assess reputation and facilitate decision-making. This paper presents a blockchain-assisted scalable trust model for secure dissemination and storage of trust information in heterogeneous IoT systems.

COMPUTERS & ELECTRICAL ENGINEERING (2023)

Article Computer Science, Hardware & Architecture

Enhance the trust between IoT devices, mobile apps, and the cloud based on blockchain

Juan Wang et al.

Summary: The current IoT platform is vulnerable to remote device hijacking and substitution attacks due to weak authentication and authorization mechanisms. These attacks can lead to privacy breaches and pose a threat to users' lives and properties. This paper proposes a blockchain-based trust management approach to enhance trust between IoT devices, mobile apps, and the cloud. The evaluation results demonstrate the effectiveness of the approach in detecting attacks, with acceptable performance.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2023)

Article Computer Science, Hardware & Architecture

The convergence of blockchain, IoT and 6G: Potential, opportunities, challenges and research roadmap

Abu Jahid et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2023)

Article Computer Science, Information Systems

Blockchain-assisted computation offloading collaboration: A hierarchical game to fortify IoT security and resilience

Zitao Zhou et al.

Summary: This paper proposes a blockchain-assisted computation offloading collaboration scheme to enhance security and resilience in computation offloading. A hierarchical game model and contract theory are employed to determine optimal incentive strategies and address security and privacy issues. Experimental and simulation results confirm the effectiveness and feasibility of the BACOC scheme.

INTERNET OF THINGS (2023)

Article Computer Science, Information Systems

Two level blockchain-based privacy preservation framework in IoT with heuristic fusion mechanism-aided deep learning architecture

Danish Ahamad et al.

Summary: Blockchain technology provides a viable solution for IoT, addressing authentication, maintenance, and security issues. This research proposes a blockchain-based privacy preservation approach for IoT, which achieves two levels of data privacy using deep learning techniques, data encoding with an autoencoder, and data encryption with elliptic curve cryptography.

INTERNET OF THINGS (2023)

Review Computer Science, Information Systems

Blockchain technology as a Fog computing security and privacy solution: An overview

Yehia Ibrahim Alzoubi et al.

Summary: Fog computing is an extension of Cloud computing that aims to enhance the processing power of IoT devices and provide additional services. However, it faces significant security and privacy challenges. Blockchain has the potential to address these challenges and enable distributed and trusted identity management, secure data, reputation, and payment systems in Fog computing.

COMPUTER COMMUNICATIONS (2022)

Article Automation & Control Systems

Fog Computing and Blockchain-Based Security Service Architecture for 5G Industrial IoT-Enabled Cloud Manufacturing

Tharaka Hewa et al.

Summary: The recent evolution of the industrial Internet of Things has enabled the integration of cloud computing with the classical manufacturing model, resulting in the concept of cloud manufacturing for Industry 4.0. However, cloud integration also introduces security risks and increased latency. To address these challenges, we propose a security service architecture based on blockchain and fog computing.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2022)

Article Computer Science, Information Systems

Ebola Optimization Search Algorithm: A New Nature-Inspired Metaheuristic Optimization Algorithm

Olaide Nathaniel Oyelade et al.

Summary: This study proposes a novel bio-inspired and population-based optimization algorithm named Ebola Optimization Search Algorithm (EOSA) based on the propagation mechanism of the Ebola virus disease. The algorithm outperforms popular metaheuristic algorithms such as Particle Swarm Optimization Algorithm (PSO), Genetic Algorithm (GA), and Artificial Bee Colony Algorithm (ABC) in terms of scalability, convergence, and sensitivity analyses. The algorithm is also successfully applied to the problem of selecting the best combination of convolutional neural network (CNN) hyperparameters in the image classification of digital mammography.

IEEE ACCESS (2022)

Article Computer Science, Information Systems

Stochastic Analysis of Double Blockchain Architecture in IoT Communication Networks

Xin Hao et al.

Summary: This article presents practical stochastic modeling and detailed performance analysis of a double blockchain (DBC) for secure information and reputation data management in large-scale wireless Internet of Things (IoT) networks. The DBC consists of an information blockchain (IBC) in the cloud layer and a reputation blockchain (RBC) in the near-terminal fog layer, providing high storage scalability, low latency, and superior security. Numerical simulations demonstrate the performance gains of the DBC design for different fog node and IoT device densities.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Engineering, Multidisciplinary

Dwarf Mongoose Optimization Algorithm

Jeffrey O. Agushaka et al.

Summary: This paper proposes a new metaheuristic algorithm, dwarf mongoose optimization algorithm (DMO), which mimics the foraging behavior of dwarf mongooses. The algorithm is tested on various benchmark functions and optimization problems, and compared with other algorithms. The results show that DMO performs better in most cases and achieves near-optimal solutions. Matlab codes of DMO are also provided.

COMPUTER METHODS IN APPLIED MECHANICS AND ENGINEERING (2022)

Review Computer Science, Hardware & Architecture

Swarm Intelligence inspired Intrusion Detection Systems - A systematic literature review

Muhammad Hassan Nasir et al.

Summary: This paper presents a systematic review of swarm intelligence approaches deployed in intrusion detection in various attack surfaces and domains between 2010 and 2020. It categorizes the SI approaches according to their applicability in improving different aspects of intrusion detection and discusses the features of datasets used in experimentation. The study aims to help researchers assess the capabilities and limitations of SI algorithms in identifying security threats and challenges, as well as differentiating SI-based IDS from traditional ones.

COMPUTER NETWORKS (2022)

Article Computer Science, Artificial Intelligence

Reptile Search Algorithm (RSA): A nature-inspired meta-heuristic optimizer

Laith Abualigah et al.

Summary: The paper introduces a novel nature-inspired meta-heuristic optimizer, RSA, based on the hunting behavior of crocodiles. Through implementing two main steps of crocodile behavior, RSA shows unique search methods compared to existing algorithms, and achieves better results in various test functions and engineering problems.

EXPERT SYSTEMS WITH APPLICATIONS (2022)

Article Computer Science, Information Systems

Data anonymization evaluation for big data and IoT environment

Chunchun Ni et al.

Summary: The growth of big data can increase risks of re-identification in complex IoT environment. This work proposes a data anonymisation evaluation framework that can evaluate commonly used data anonymization algorithms in terms of privacy preserving level, data utility, and performance. Experiment results demonstrate that the proposed solution can effectively evaluate the performance and de-identification features that can help to prevent inappropriate usage of anonymized data.

INFORMATION SCIENCES (2022)

Article Environmental Sciences

An Enhanced Feed-Forward Back Propagation Levenberg-Marquardt Algorithm for Suspended Sediment Yield Modeling

Arvind Yadav et al.

Summary: Estimation of suspended sediment yield (SSY) is essential for river basin management, and a developed artificial neural network (ANN) model showed superior accuracy and generalizability for SSY prediction in the Mahanadi River basin.

WATER (2022)

Article Mathematics

Suspended Sediment Yield Forecasting with Single and Multi-Objective Optimization Using Hybrid Artificial Intelligence Models

Arvind Yadav et al.

Summary: Rivers are important for ecosystems and society, and the forecasting of suspended sediment yield (SSY) is crucial for river basin systems. Traditional methods struggle with the complexity of SSY, but artificial intelligence techniques offer a promising solution. This study developed a hybrid intelligent model combining artificial neural networks (ANN) and genetic algorithms (GA) to forecast SSY in the Mahanadi River. The GA optimized the ANN parameters, and the model outperformed other models in terms of accuracy and simplicity.

MATHEMATICS (2022)

Article Mathematics

An Optimized Open Pit Mine Application for Limestone Quarry Production Scheduling to Maximize Net Present Value

Devendra Joshi et al.

Summary: This study aims to determine the duration of providing necessary materials to a cement plant from a limestone mine, and explore the feasibility of combining limestone from a nearby mine with the study mine limestone. By calculating the maximum net profit and production sequencing, the issues were resolved. The findings show that the study mine can exclusively serve the cement plant for 15 years, but the addition of limestone from the neighboring mine significantly increases the mine's lifespan, and the proposed method generates higher profits compared to the current production planning formulation.

MATHEMATICS (2022)

Article Computer Science, Information Systems

Task offloading strategy with emergency handling and blockchain security in SDN-empowered and fog-assisted healthcare IoT

Junyu Ren et al.

Summary: This article introduces a smart healthcare application based on wireless body area networks using fog computing, software-defined networking, and blockchain. It includes strategies for task offloading, security, and blockchain sharding. Extensive simulation experiments have been conducted to validate the superior performance of the proposed methods.

TSINGHUA SCIENCE AND TECHNOLOGY (2022)

Article Computer Science, Hardware & Architecture

A deep density based and self-determining clustering approach to label unknown traffic

Mehrnoosh Monshizadeh et al.

Summary: This paper presents an architecture based on associated density clustering for analyzing non-labeled data in intrusion detection. The proposed architecture applies clustering techniques to categorize unknown traffic and only analyzes one packet from each cluster to generalize the result to all packets within the cluster. The architecture uses multiple unsupervised algorithms and a co-association matrix to detect attack clusters of any shape and automatically determines the best number of clusters.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2022)

Article Mathematics

Improved Recurrent Neural Network Schema for Validating Digital Signatures in VANET

Arpit Jain et al.

Summary: Vehicular ad hoc networks (VANETs) enable communication between vehicles using wireless technology. This paper proposes an efficient technique for digital signature verification based on an artificial neural network, aiming to enhance secure communication among vehicles.

MATHEMATICS (2022)

Article Social Sciences, Interdisciplinary

A Novel Large-Scale Stochastic Pushback Design Merged with a Minimum Cut Algorithm for Open Pit Mine Production Scheduling

Devendra Joshi et al.

Summary: Traditional optimization of open pit mine design is essential in the mining industry, with geological uncertainty being the key factor. This study proposes a minimum cut algorithm to generate optimal pit limits and pushback designs, and applies Gaussian simulation-based smoothing spline technique to analyze an iron ore mining project in India, demonstrating higher metal production and net present value when uncertainty is considered.

SYSTEMS (2022)

Article Computer Science, Information Systems

Towards Blockchain-Based Secure Storage and Trusted Data Sharing Scheme for IoT Environment

Zia Ullah et al.

Summary: The paper introduces a blockchain-based decentralized distributed storage and sharing scheme that offers end-to-end encryption and fine-grained access control. The proposed IoTChain model uses attribute-based access control (A-BAC) policy, Ethereum blockchain, and IPFS, with advanced encryption standards and key exchange protocols. The system uses proof-of-authority (PoA) consensus to reduce transaction costs and boost throughput.

IEEE ACCESS (2022)

Article Computer Science, Information Systems

Cloud Computing Assisted Blockchain-Enabled Internet of Things

Chao Qiu et al.

Summary: This paper proposes agent mining and cloud mining approaches to address the resource limitation issue in the integration of blockchain and IoT, and applies a dueling deep reinforcement learning approach to optimize performance.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2022)

Article Computer Science, Artificial Intelligence

Unraveling the capabilities that enable digital transformation: A data-driven methodology and the case of artificial intelligence

Mengjia Wu et al.

Summary: This paper introduces a novel bibliometric framework to quantitatively identify the evolutionary patterns and hierarchies of digital transformation (DT) research, providing a comprehensive definition of DT and a systematic categorization of the capabilities required for DT. Through a case study and an AI capabilities model, practical insights are offered for managers to understand the process-based DT journey and necessary capabilities.

ADVANCED ENGINEERING INFORMATICS (2021)

Article Computer Science, Hardware & Architecture

Optimal deep learning approaches and healthcare big data analytics for mobile networks toward 5G

Denis A. Pustokhin et al.

Summary: Recent advancements in wireless networking, big data technologies, healthcare analytics, IoT, wearables and AI have led to the development of intelligent disease diagnosis models. A new model combining big data analytics and DBN for disease diagnosis has been proposed, with feature selection using Link-based Quasi Oppositional Binary Particle Swarm Optimization Algorithm to improve performance. Experimental results showed that the proposed model outperformed in various aspects.

COMPUTERS & ELECTRICAL ENGINEERING (2021)

Review Engineering, Electrical & Electronic

Applications, Deployments, and Integration of Internet of Drones (IoD): A Review

Laith Abualigah et al.

Summary: The Internet of Drones (IoD) has gained significant attention in recent years for its wide potential applications. This paper provides a comprehensive survey of IoD and its applications, deployments, and integration, focusing on smart cities surveillance, cloud and fog frameworks, unmanned aerial vehicles, wireless sensor networks, networks, mobile computing, and business paradigms. Discussions highlight hot research topics and problems to guide future research in this area.

IEEE SENSORS JOURNAL (2021)

Article Computer Science, Hardware & Architecture

Deep learning for privacy preservation in autonomous moving platforms enhanced 5G heterogeneous networks

Yulei Wu et al.

Summary: 5G heterogeneous networks have become a promising platform to connect a growing number of Internet-of-Things devices and accommodate various vertical services. Deep learning is widely used to enhance network quality-of-service and user quality-of-experience, while addressing privacy preservation issues in this environment.

COMPUTER NETWORKS (2021)

Article Biology

Precision health data: Requirements, challenges and existing techniques for data security and privacy

Chandra Thapa et al.

Summary: Precision health utilizes various information sources to enable personalized care and disease prevention, but requires strict protection of privacy and security to establish public trust and participation in health data.

COMPUTERS IN BIOLOGY AND MEDICINE (2021)

Article Computer Science, Information Systems

EEDTO: An Energy-Efficient Dynamic Task Offloading Algorithm for Blockchain-Enabled IoT-Edge-Cloud Orchestrated Computing

Huaming Wu et al.

Summary: This article explores how to achieve secure task offloading collaboration between edge computing and cloud computing using blockchain. By combining MEC and MCC, a blockchain-enabled IoT-Edge-Cloud computing architecture is proposed, providing faster computing services and stronger computational power while minimizing energy consumption and task response time.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Interdisciplinary Applications

Aquila Optimizer: A novel meta-heuristic optimization algorithm

Laith Abualigah et al.

Summary: This paper introduces a novel population-based optimization method, AO, inspired by the behaviors of eagles during hunting. Through a series of experiments, the superior performance of AO in finding optimal solutions for various problems is demonstrated and compared with other meta-heuristic methods.

COMPUTERS & INDUSTRIAL ENGINEERING (2021)

Article Computer Science, Information Systems

A Privacy-Aware PUFs-Based Multiserver Authentication Protocol in Cloud-Edge IoT Systems Using Blockchain

Yan Zhang et al.

Summary: The paper proposes a privacy-aware authentication protocol for multiserver CE-IoT systems by combining PUFs and the blockchain technique, which addresses privacy leakage, reduced reliability, and CRP synchronization issues. The security of the protocol is formally proved using a random oracle model, and security features are discussed to demonstrate resistance to various attacks. A prototype implementation confirms the protocol's efficiency, and comparison results show its compatibility with CE-IoT systems. Additionally, a simulation of the smart contract evaluates the scalability of the protocol.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Information Systems

Networking Integrated Cloud-Edge-End in IoT: A Blockchain-Assisted Collective Q-Learning Approach

Chao Qiu et al.

Summary: The paper introduces a blockchain-based collective Q-learning approach to tackle challenges in machine learning and computing in the Internet of Things. It proposes a new PoL consensus protocol as an alternative to the traditional PoW mechanism. Experimental results on network integrated cloud-edge-end resource allocation demonstrate the superior performance of the proposed scheme.

IEEE INTERNET OF THINGS JOURNAL (2021)

Review Multidisciplinary Sciences

Combating emerging financial risks in the big data era: A perspective review

Xueqi Cheng et al.

Summary: Big data technology has had a significant impact on new business and financial services, increasing connectivity but also bringing challenges of financial risks. Breaking the borders of traditional data, algorithms, and systems is crucial, along with proposing new methods for risk detection, assessment, and forecasting.

FUNDAMENTAL RESEARCH (2021)

Article Computer Science, Information Systems

BFIM: Performance Measurement of a Blockchain Based Hierarchical Tree Layered Fog-IoT Microservice Architecture

Md Whaiduzzaman et al.

Summary: Fog computing emerged to support Internet of Things applications by removing limitations of cloud computing, such as delays and network bandwidth. Data security is a crucial concern in IoT, fog, and cloud network ecosystems, addressed by deploying a microservice-based blockchain mechanism. A comprehensive performance evaluation shows that the Blockchain-based Fog IoT Microservice architecture provides higher task and service delivery efficiency compared to traditional algorithms such as AES, DES, and RSA.

IEEE ACCESS (2021)

Review Computer Science, Hardware & Architecture

A Comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for IoT and IIoT

Jayasree Sengupta et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2020)

Article Computer Science, Information Systems

Groupchain: Towards a Scalable Public Blockchain in Fog Computing of IoT Services Computing

Kai Lei et al.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2020)

Article Engineering, Industrial

Big data analytics for smart factories of the future

Robert X. Gao et al.

CIRP ANNALS-MANUFACTURING TECHNOLOGY (2020)

Article Computer Science, Hardware & Architecture

A-Z survey of Internet of Things: Architectures, protocols, applications, recent advances, future directions and recommendations

Wafa'a Kassab et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2020)

Review Computer Science, Hardware & Architecture

Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey

Nesrine Kaaniche et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2020)

Review Computer Science, Information Systems

A survey of privacy enhancing technologies for smart cities

James Curzon et al.

PERVASIVE AND MOBILE COMPUTING (2019)

Review Computer Science, Hardware & Architecture

A walkthrough of the emerging IoT paradigm: Visualizing inside functionalities, key features, and open issues

Abhishek Singh et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2019)

Article Computer Science, Information Systems

DualFog-IoT: Additional Fog Layer for Solving Blockchain Integration Problem in Internet of Things

Raheel Ahmed Memon et al.

IEEE ACCESS (2019)

Article Mathematics, Interdisciplinary Applications

Optimization Solution of Troesch's and Bratu's Problems of Ordinary Type Using Novel Continuous Genetic Algorithm

Zaer Abo-Hammour et al.

DISCRETE DYNAMICS IN NATURE AND SOCIETY (2014)

Article Computer Science, Information Systems

Numerical solution of systems of second-order boundary value problems using continuous genetic algorithm

Omar Abu Arqub et al.

INFORMATION SCIENCES (2014)