4.7 Article

A smart privacy preserving framework for industrial IoT using hybrid meta-heuristic algorithm

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

AI-enabled privacy-preservation phrase with multi-keyword ranked searching for sustainable edge-cloud networks in the era of industrial IoT

B. D. Deebak et al.

Summary: The integration of sensing technologies and cloud computing in electronic healthcare systems and the demands of the Industrial Internet of Things were discussed. A new secure multi-keyword ranked searching scheme (PPP-MKRS) was proposed for encrypted cloud data search, showing advantages in efficiency through experimental analysis.

AD HOC NETWORKS (2022)

Article Computer Science, Artificial Intelligence

Privacy preservation of cloud data in business application enabled by multi-objective red deer-bird swarm algorithm

B. Balashunmugaraja et al.

Summary: Decision-making plays a crucial role in knowledge transfer, but existing schemes often lack privacy-preserving techniques, which can cause legal and financial implications, especially in critical domains like finance. Cloud computing provides uninterrupted and cost-efficient services, but privacy protection for millions of users accessing cloud services remains a challenge. Privacy-preserving data mining algorithms have been developed to secure data privacy in the cloud. This paper proposes a new hybrid meta-heuristic algorithm for privacy preservation in the cloud sector, and evaluates its performance against existing schemes using statistical and attack analyses. The comparative analysis demonstrates the effectiveness of the proposed model.

KNOWLEDGE-BASED SYSTEMS (2022)

Article Computer Science, Artificial Intelligence

Mitigation of black hole attacks using firefly and artificial neural network

Pooja Rani et al.

Summary: This paper investigates the issue of secure routing in mobile ad hoc networks, with a focus on black hole attacks. By combining the firefly algorithm and artificial neural network, the proposed approach enhances the ad hoc on-demand distance vector routing protocol to combat black hole attacks. Numerical results show that this method outperforms traditional approaches.

NEURAL COMPUTING & APPLICATIONS (2022)

Article Computer Science, Information Systems

Artificial intelligence-aided privacy preserving trustworthy computation and communication in 5G-based IoT networks

Tan Le et al.

Summary: 5G offers unprecedented bandwidth and low latency, making it ideal for IoT applications. However, cyber-attacks pose risks to communication and computation in 5G networks, requiring mechanisms to enhance trust and privacy capabilities. This paper presents recent trust management and privacy preservation mechanisms, and proposes an AI-aided framework for privacy-preserving trustworthy communication and computation in 5G-enabled IoT networks.

AD HOC NETWORKS (2022)

Article Automation & Control Systems

ANAF-IoMT: A Novel Architectural Framework for IoMT-Enabled Smart Healthcare System by Enhancing Security Based on RECC-VC

Mohit Kumar et al.

Summary: This article investigates how to enhance the security of the Internet of Medical Things using elliptic curve cryptography and Vigenere cipher, improving data security and privacy through algorithms for privacy preservation, neural networks, optimization methods, and blockchain technology.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2022)

Article Engineering, Multidisciplinary

Improved Deep Convolutional Neural Network Based Malicious Node Detection and Energy-Efficient Data Transmission in Wireless Sensor Networks

Mohit Kumar et al.

Summary: This paper presents a solution for detecting malicious nodes and achieving energy-efficient data transmission in wireless sensor networks. The improved deep convolutional neural network is used for detection, while the selection of cluster heads centered on the sensor's residual energy enables efficient data transmission.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2022)

Article Computer Science, Information Systems

An efficient framework using visual recognition for IoT based smart city surveillance

Manish Kumar et al.

Summary: The proposed technique effectively reduces redundant features and is suitable for various visual recognition applications in IoT surveillance devices, with higher dimension reduction efficiency.

MULTIMEDIA TOOLS AND APPLICATIONS (2021)

Article Automation & Control Systems

Toward Secure Data Fusion in Industrial IoT Using Transfer Learning

Hui Lin et al.

Summary: The industrial Internet of Things (IIoT) can enhance industrial intelligence by data fusion, yet existing methods are inadequate for real-time requirements and lack defense against internal attacks while balancing system performance and privacy protection.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)

Article Automation & Control Systems

Enabling Secure Authentication in Industrial IoT With Transfer Learning Empowered Blockchain

Xiaoding Wang et al.

Summary: The article proposes a novel authentication mechanism ATLB based on transfer learning and blockchain, which trains user authentication models in specific regions and transfers them for quick authentication in other areas to address data security and privacy challenges in Industrial Internet of Things.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)

Article Computer Science, Information Systems

Privacy preserving using multi-hop dynamic clustering routing protocol and elliptic curve cryptosystem for WSN in IoT environment

Irin G. Loretta et al.

Summary: Wireless Sensor Networks (WSN) are deployed in various applications connected to Internet of Things (IoT). In this paper, a cryptographic based clustering structure called OP-MDCRP is proposed for improving data privacy and energy efficient routing. Experimental comparison shows that OP-MDCRP approach provides more data security than existing methods.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2021)

Article Computer Science, Hardware & Architecture

Deep learning for privacy preservation in autonomous moving platforms enhanced 5G heterogeneous networks

Yulei Wu et al.

Summary: 5G heterogeneous networks have become a promising platform to connect a growing number of Internet-of-Things devices and accommodate various vertical services. Deep learning is widely used to enhance network quality-of-service and user quality-of-experience, while addressing privacy preservation issues in this environment.

COMPUTER NETWORKS (2021)

Article Computer Science, Information Systems

Privacy-Preserving Flexible Access Control for Encrypted Data in Internet of Things

Leyou Zhang et al.

Summary: The Internet of Things (IoT) has a significant impact on people's lives, but the leakage of private user information through data sharing poses new security threats. This article proposes a flexible fine-grained access control for shared data to eliminate vulnerabilities, and presents a framework based on attribute-based encryption to address privacy preservation in IoT. By embedding attribute names in the access policy and storing attribute values in a bloom filter, the proposed scheme achieves efficient security protection against attacks.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Automation & Control Systems

A Secure Fog-Based Architecture for Industrial Internet of Things and Industry 4.0

Jayasree Sengupta et al.

Summary: This article proposes a secure fog-based IIoT architecture by introducing security features and offloading tasks to fog nodes to reduce the trust and burden on cloud computing and resource-constrained devices. The architecture is validated through theoretical overhead analysis and practical experimentation, including simulation study and testbed implementation.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)

Article Automation & Control Systems

Challenges and Opportunities in Securing the Industrial Internet of Things

Martin Serror et al.

Summary: The Industrial Internet of Things, also known as Industry 4.0, is a natural trend towards interconnecting devices in industrial settings, similar to the success seen in consumer IoT. Although it brings many benefits, it also introduces serious security challenges. Unlike consumer IoT, securing the Industrial IoT focuses more on safety and productivity requirements.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)

Review Chemistry, Analytical

Internet of Things for System Integrity: A Comprehensive Survey on Security, Attacks and Countermeasures for Industrial Applications

Nasr Abosata et al.

Summary: The growth of IoT offers numerous opportunities for industrial applications, but also poses security risks. Various techniques are required to prevent hacks and ensure the security level needed. Wider implementation of IIoT may cause greater security risks than benefits.

SENSORS (2021)

Article Engineering, Multidisciplinary

PPSF: A Privacy-Preserving and Secure Framework Using Blockchain-Based Machine-Learning for IoT-Driven Smart Cities

Prabhat Kumar et al.

Summary: With the advancement of IoT, smart cities have become the mainstream trend in urban development. However, challenges such as centralization, security, and privacy issues are still faced by smart cities. Therefore, a Privacy-Preserving and Secure Framework (PPSF) is proposed to address these challenges.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2021)

Article Automation & Control Systems

DeepPAR and DeepDPA: Privacy Preserving and Asynchronous Deep Learning for Industrial IoT

Xiaoyu Zhang et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Computer Science, Information Systems

Preserving Balance Between Privacy and Data Integrity in Edge-Assisted Internet of Things

Tian Wang et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Automation & Control Systems

A Trustworthy Privacy Preserving Framework for Machine Learning in Industrial IoT Systems

Pathum Chamikara Mahawaga Arachchige et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Automation & Control Systems

Privacy Preservation in Industrial IoT via Fast Adaptive Correlation Matrix Completion

Aris S. Lalos et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Computer Science, Information Systems

Matrix-Based Dynamic Authentication With Conditional Privacy-Preservation for Vehicular Network Security

Hayotjon Aliev et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Location Privacy Preservation Mechanism for Location-Based Service With Incomplete Location Data

Xudong Yang et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Privacy Protection and Energy Optimization for 5G-Aided Industrial Internet of Things

Mamoona Humayun et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

A Lightweight Authentication Mechanism for M2M Communications in Industrial IoT Environment

Alireza Esfahani et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Information Systems

Brain storm-based Whale Optimization Algorithm for privacy-protected data publishing in cloud computing

S. Thanga Revathi et al.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2019)

Article Computer Science, Hardware & Architecture

A privacy-preserving code-based authentication protocol for Internet of Things

Noureddine Chikouche et al.

JOURNAL OF SUPERCOMPUTING (2019)

Article Computer Science, Information Systems

Data Provenance for IoT With Light Weight Authentication and Privacy Preservation

Muhammad Naveed Aman et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Information Systems

A Provable Semi-Outsourcing Privacy Preserving Scheme for Data Transmission From IoT Devices

Xiaoshuai Zhang et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

An Authentic-Based Privacy Preservation Protocol for Smart e-Healthcare Systems in IoT

B. D. Deebak et al.

IEEE ACCESS (2019)

Article Computer Science, Interdisciplinary Applications

The industrial internet of things (IIoT): An analysis framework

Hugh Boyes et al.

COMPUTERS IN INDUSTRY (2018)

Article Automation & Control Systems

Deploying Fog Computing in Industrial Internet of Things and Industry 4.0

Mohammad Aazam et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)

Article Computer Science, Hardware & Architecture

An IoT-Oriented data placement method with privacy preservation in cloud environment

Xiaolong Xu et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)

Article Computer Science, Artificial Intelligence

Genetically modified glowworm swarm optimization based privacy preservation in cloud computing for healthcare sector

M. M. Annie Alphonsa et al.

EVOLUTIONARY INTELLIGENCE (2018)

Article Computer Science, Artificial Intelligence

A self-adaptive multi-population based Jaya algorithm for engineering optimization

R. Venkata Rao et al.

SWARM AND EVOLUTIONARY COMPUTATION (2017)

Article Computer Science, Information Systems

Security and Privacy Preservation Scheme of Face Identification and Resolution Framework Using Fog Computing in Internet of Things

Pengfei Hu et al.

IEEE INTERNET OF THINGS JOURNAL (2017)

Article Computer Science, Interdisciplinary Applications

Grasshopper Optimisation Algorithm: Theory and application

Shahrzad Saremi et al.

ADVANCES IN ENGINEERING SOFTWARE (2017)

Article Computer Science, Interdisciplinary Applications

Grey Wolf Optimizer

Seyedali Mirjalili et al.

ADVANCES IN ENGINEERING SOFTWARE (2014)

Article Automation & Control Systems

Internet of Things in Industries: A Survey

Li Da Xu et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2014)

Article Computer Science, Information Systems

CPAL: A Conditional Privacy-Preserving Authentication With Access Linkability for Roaming Service

Chengzhe Lai et al.

IEEE INTERNET OF THINGS JOURNAL (2014)

Article Computer Science, Information Systems

Black hole: A new heuristic optimization approach for data clustering

Abdolreza Hatamlou

INFORMATION SCIENCES (2013)