Accurate Image Registration Using Evolutionary Algorithms DOI

N Gobi,

Ritesh Kumar, Deepak Kumar

et al.

Lecture notes in electrical engineering, Journal Year: 2024, Volume and Issue: unknown, P. 323 - 328

Published: Oct. 19, 2024

Language: Английский

Internet of Things (IoT) Security With Blockchain Technology: A State-of-the-Art Review DOI Creative Commons
Abdullah Ayub Khan, Asif Ali Laghari, Zaffar Ahmed Shaikh

et al.

IEEE Access, Journal Year: 2022, Volume and Issue: 10, P. 122679 - 122695

Published: Jan. 1, 2022

With the rapid enhancement in design and development of Internet Things creates a new research interest adaptation industrial domains. It is due to impact distributed emerging technology topology security-related resource constraints 5.0. This conducts paradigm along with critical challenges existing information preservation, node transactions communication, transmission, trust privacy, security protection related problems. These aspects pose serious limitations issues for industry provide data integrity, exchange reliability, provenance, trustworthiness overall activities service delivery prospects. In addition, intersection blockchain IoT has gained more consideration interest. However, there an limitation between inadequate performance connected nodes, high requirement permissioned private ledger not yet been tackled complete solution. Due introductions NuCypher Re-Encryption infrastructure, hashing tree allocation, deployment proof-of-work required computational power as well. paper divided into three different folds; first, we studied various literature blockchain-enabling its implementation challenging Secondly, proposed hyperledger sawtooth-enabled framework. framework provides secure trusted execution environment, which mechanisms protocols are designed acknowledgment, including immutable storage security, peer-to-peer network on-chain off-chain communication activities. Thirdly, pseudo-chain codes consensus smooth streamline broadcast content. The multiple investigated simulated using Hyperledger Sawtooth-enabled docker testing devices within limited usage constraints.

Language: Английский

Citations

137

A drone-based data management and optimization using metaheuristic algorithms and blockchain smart contracts in a secure fog environment DOI
Abdullah Ayub Khan, Asif Ali Laghari,

Thippa Reddy Gadekallu

et al.

Computers & Electrical Engineering, Journal Year: 2022, Volume and Issue: 102, P. 108234 - 108234

Published: July 25, 2022

Language: Английский

Citations

110

Artificial intelligence and blockchain technology for secure smart grid and power distribution Automation: A State-of-the-Art Review DOI
Abdullah Ayub Khan, Asif Ali Laghari, Mamoon Rashid

et al.

Sustainable Energy Technologies and Assessments, Journal Year: 2023, Volume and Issue: 57, P. 103282 - 103282

Published: May 12, 2023

Language: Английский

Citations

92

BIoMT: A State-of-the-Art Consortium Serverless Network Architecture for Healthcare System Using Blockchain Smart Contracts DOI Creative Commons
Abdullah Ayub Khan, Asif Ali Wagan, Asif Ali Laghari

et al.

IEEE Access, Journal Year: 2022, Volume and Issue: 10, P. 78887 - 78898

Published: Jan. 1, 2022

Owing to the sensitive nature of healthcare data, aforementioned approach transferring patient data central servers creates serious security and privacy issues. In addition, blockchain distributed ledger technology has introduced immutable storage decentralized management capability, which handles a large number nodes E-Healthcare transactions via serverless network, but in limited manner because blockchain-enabled resources. this scenario, medical industries are concerned about constituting an innovation health information preservation exchanging service delivery protocols without connectivity untrusted third-party infrastructure. study, we proposed hyperledger fabric-enabled consortium architecture called BIoMT, provides security, integrity, transparency, provenance health-related exchanges clinical peer-to-peer (P2P) secure network environment. A consensus is designed created reduce rate resource constraints on Internet Medical Things (IoMT). The individual before sharing protected using NuCypher Re-Encryption mechanism, increases integrity transparency. Smart contracts deployed automate device registration, exchange transactions, (filecoin) after cross verification validation. experimental results show that BIoMT reduces computational cost by 26.13%, robust node generation 60.37%. Thus, only 31.79% 74.21% IoMT-related P2P usage maintained saved, respectively.

Language: Английский

Citations

84

Lightweight-BIoV: Blockchain Distributed Ledger Technology (BDLT) for Internet of Vehicles (IoVs) DOI Open Access
Asif Ali Laghari, Abdullah Ayub Khan, Reem Alkanhel

et al.

Electronics, Journal Year: 2023, Volume and Issue: 12(3), P. 677 - 677

Published: Jan. 29, 2023

The vast enhancement in the development of Internet Vehicles (IoV) is due to impact distributed emerging technology and topology industrial IoV. It has created a new paradigm, such as security-related resource constraints Industry 5.0. A revolution dimension IoV popup raise various critical challenges existing information preservation, especially node transactions communication, transmission, trust privacy, security-protection-related problems, which have been analyzed. These aspects pose serious problems for industry provide vehicular-related data integrity, availability, exchange reliability, provenance, trustworthiness overall activities service delivery prospects against increasing number multiple transactions. In addition, there lot research interest that intersects with blockchain association. this regard, inadequate performance connected nodes high requirements consortium ledger not yet tackled complete solution. introduction NuCypher Re-encryption infrastructure, hashing tree allocation, proof-of-work require more computational power well. This paper contributes two different folds. First, it proposes sawtooth-enabled modular architecture protected, secure, trusted execution, delivery, acknowledgment immutable storage security peer-to-peer (P2P) network on-chain off-chain inter-communication vehicular activities. Secondly, we design create smart contract-enabled structure order smooth streamlined broadcast content. Substantially, develop deploy hyperledger sawtooth-aware customized consensus investigations. For validation purposes, simulate related details between devices on simulation results show proposed BIoV reduces cost down 37.21% robust generation up 56.33%. Therefore, only 41.93% 47.31% Vehicles-related resources are kept used, respectively.

Language: Английский

Citations

68

Data Security in Healthcare Industrial Internet of Things With Blockchain DOI
Abdullah Ayub Khan, Sami Bourouis, M. M. Kamruzzaman

et al.

IEEE Sensors Journal, Journal Year: 2023, Volume and Issue: 23(20), P. 25144 - 25151

Published: May 11, 2023

The industrial Internet of Things (IIoT) has gained more attention because the self-governing nature system configuration with interoperable application connectivity. In E-healthcare environment, it cooperates medical sensors to capture, examine, analyze, preserve, and document day-to-day transactions patients in real-time. integration IIoT provides an analytical platform handle a large amount data low cost cloud-enabling scalable storage. Throughout transformation, patients' personal information is at risk while exchanging records over centralized server-based systems. Thus, rate node connectivity, failure parallel sharing, deliverance-related issues increase. this article, we present solutions three folds. First, article proposes novel secure architecture for security using blockchain-distributed ledger technology named BHIIoT. Second, transformation lifecycle wireless sensor networks (WSNs) management optimization distributed layered hierarchy developed, which enhances network resources increases trust blockchain-enabled peer-to-peer (P2P) environment. Third, proposed BHIIoT uses NuCypher threshold re-encryption mechanism encryption protects shared form blocks preserved blockchain immutable For instance, chain codes are deployed automate authentication, logging, index deliverance, trace resist illegal activities application. customized lightweight multi-proof-of-work (PoW) multi-proof-of-stake (PoS) designed digital signature improving consumption reducing load storage transaction process scheduled.

Language: Английский

Citations

64

Secure Remote Sensing Data With Blockchain Distributed Ledger Technology: A Solution for Smart Cities DOI Creative Commons
Abdullah Ayub Khan, Asif Ali Laghari, Roobaea Alroobaea

et al.

IEEE Access, Journal Year: 2024, Volume and Issue: 12, P. 69383 - 69396

Published: Jan. 1, 2024

Particularly in the context of smart cities, remote sensing data (RSD) has emerged as one hottest study topics information and communication technology (ICT) today. The development machine learning (ML) artificial intelligence (AI) made it possible to solve a number issues, including automation, control access, optimization, monitoring, management. Simultaneously, there are significant issues with design process hierarchy, inadequate training records, centralized architecture, privacy protection, overall resource consumption restrictions. Distributed Ledger Technology (DLT), on other hand, provides decentralized infrastructure that allows systems eliminate data-sharing procedures cities while transferring from network node node, third-party access solves issues. To an ideal delivery mechanism for analytical model, paper employs Partial Swam Optimization (POS) conjunction secure blockchain distributed consortium network. This work makes three contributions. Firstly, offers safe transmission method combines optimize path reliable across channels. Second, neighborhood encryption sequences carried out using NuCypher proxy re-encryption-enabled value encryption, public key cryptographic approach avoids cypher conversion. Third, Artificial Neural Networks (ANNs) can deliverance classification problem by optimizing record management preservation.

Language: Английский

Citations

26

BAIoT-EMS: Consortium network for small-medium enterprises management system with blockchain and augmented intelligence of things DOI
Abdullah Ayub Khan, Jing Yang, Asif Ali Laghari

et al.

Engineering Applications of Artificial Intelligence, Journal Year: 2024, Volume and Issue: 141, P. 109838 - 109838

Published: Dec. 13, 2024

Language: Английский

Citations

15

Vehicle to Everything (V2X) and Edge Computing: A Secure Lifecycle for UAV-Assisted Vehicle Network and Offloading with Blockchain DOI Creative Commons
Abdullah Ayub Khan, Asif Ali Laghari, Muhammad Shafiq

et al.

Drones, Journal Year: 2022, Volume and Issue: 6(12), P. 377 - 377

Published: Nov. 25, 2022

Due to globalization and advances in network technology, the Internet of Vehicles (IoV) with edge computing has gained increasingly more attention over last few years. The technology provides a new paradigm design interconnected distributed nodes Unmanned Aerial Vehicle (UAV)-assisted vehicle networks for communications between vehicles smart cities. process hierarchy current UAV-assisted is also becoming multifaceted as are connected, requiring accessing exchanging information, performing tasks, updating information securely. This poses serious issues limitations centralized networks, directly affecting computing-intensive tasks data offloading. paper bridges these gaps by providing novel, transparent, secure lifecycle communication using blockchain hyperledger technology. A modular infrastructure Vehicle-to-Everything (V2X) designed ‘B-UV2X’, fabric-enabled permissioned network-based consortium structure, proposed. participating others chain cities exchange different such movement, etc., preserving operational logs on blockchain-enabled immutable ledger. automates IoV transactions proposed vehicle-enabled doppler spread. Thus, this purpose, there four codes that deployed registration, adding transactions, ledger, monitoring resource management, customized multi-consensus proof-of-work. For lightweight authentication, B-UV2X uses two-way verification method defined fabric consensus mechanism. Transaction protection from acquisition deliverance storage NuCypher threshold proxy re-encryption Simulation results show reduction consumption 12.17% compared system, an increase security features up 9.76%, 7.93% computational load computed log storage.

Language: Английский

Citations

32

A New Trend in Cryptographic Information Security for Industry 5.0: A Systematic Review DOI Creative Commons
Zaffar Ahmed Shaikh, Fahima Hajjej,

Yeter Demir Uslu

et al.

IEEE Access, Journal Year: 2024, Volume and Issue: 12, P. 7156 - 7169

Published: Jan. 1, 2024

Malicious assaults and information leakage have grown in importance practically every area of communication technology (ICT) recent years. Enterprise ledger organization, preservation, security, protection are all greatly aided by security (IS). To maintain their positions the market, industries must safeguard data other vital assets. The main goals this paper's systematic review, which covers entire process privacy to introduce cryptographic IS for Industry 5.0 (the Fifth Industrial Revolution) as a comprehensive solution that provides regulatory compliance policies addition industrial goals. review four areas: (i) recognizing need frameworks be developed secure lifecycle; (ii) emphasizing guidelines, procedures, countermeasures 5.0; (iii) applying control, access, availability real-time; (iv) proposing futuristic architecture security. Furthermore, analysis previously published state-of-the-art techniques is presented paper. These survive with various limitations challenges, including intercommunication exchange, fine-grained control interconnectivity-related issues, affect adoption an programmes. At end we investigated few open research problems mentioned those involved design re-encryption-enabled future developments.

Language: Английский

Citations

9