Enhancing Data Center Efficiency with Docker & Kubernetes: Industry 4.0 Container-as-a-Service (CAAS) for IoE Cloud Technology DOI

Ratnesh Kumar,

Jaspreet Singh,

K. Martin Sagayam

et al.

Published: Nov. 13, 2024

Language: Английский

Blockchain-Enabled Secure Data Aggregation Routing (BSDAR) Protocol for IoT-Integrated Next-Generation Sensor Networks for Enhanced Security DOI Open Access

N Vidhya,

Ch Meenakshi

International Journal of Computational and Experimental Science and Engineering, Journal Year: 2025, Volume and Issue: 11(1)

Published: Jan. 5, 2025

WSNs, due to their special characteristics as compared conventional networks, have become the focus of extensive research. A large-scale IoT forms backbone billions resource-constrained next-generation sensors interconnected with each other. Their deployments remain one most serious challenges existing security mechanisms dynamic devices, which could not provide efficient protection against malicious adversaries. Besides, routing protocols are vulnerable various threats from unreliability and open-access nature internet. This research article presents a novel blockchain-enabled secure data aggregation model protocol for in IoT-integrated networks using sensor nodes. The BSDAR is capable improving energy performance while ensuring strong node-level shield attacks. It first organizes networking nodal points into autonomous clusters different radii effectively avoid holes around BS. Then, uses A-star based heuristics strategy construct well-organized non-looping paths. has integrated blockchain technology goal communication process. In that, end-to-end preserved by decentralized tamper-proof approach simulation results prove that significantly outperforms solutions consumption, throughput, network lifetime time complexity, thus presenting promising solution scalable deployments.

Language: Английский

Citations

7

An optimized meta‐heuristic clustering‐based routing scheme for secured wireless sensor networks DOI

G. Kiran Kumar,

S. K. Prashanth,

E. Padmalatha

et al.

International Journal of Communication Systems, Journal Year: 2024, Volume and Issue: 37(11)

Published: April 15, 2024

Summary Privacy and security present significant challenges in wireless sensor networks (WSNs). In order to enhance security, the network is equipped with high throughput. While importance of both source node (SN) base station (BS) location privacy acknowledged, recent research has predominantly focused on privacy. Addressing this gap, geometric zigzag bidirectional tree effectively tackles threats at SN BS locations. Future iterations WSN are anticipated integrate additional functionalities meet diverse requirements real‐world applications. The absence robust constraints leads an unpredictable setup. This article aims reduce energy consumption (EC) while simultaneously enhancing connectivity. To address WSN, we propose optimized meta‐heuristic clustering‐based key‐agreement routing technique. suggested system, a gateway‐based constructed devise key arrangement protocol that promotes during communication. proposed strategy involves forming clusters nodes ( ), facilitating efficient selection cluster heads (CHs) prioritize least modification. addresses EC problem. A comprehensive performance evaluation conducted, considering improvements efficiency, packet delivery ratio (PDR), throughput, end‐to‐end delay delay), EC.

Language: Английский

Citations

4

Tech Business Analytics in Quaternary Industry Sector DOI Open Access
Sachin Kumar,

Krishna Prasad K,

P. S. Aithal

et al.

International Journal of Case Studies in Business IT and Education, Journal Year: 2024, Volume and Issue: unknown, P. 69 - 159

Published: April 19, 2024

Purpose: The knowledge-based segment of the economy is referred to as "quaternary sector," which comprises businesses like information technology, telecommunications, research and development, other professional services. Businesses in this industry may find that technology-driven business analytics greatly aids helping them make data-driven decisions, optimize workflows, enhance overall performance. Utilizing technology analyse can significantly improve market trends, consumer behaviour, an organization's operational Through analysis data, companies more informed decisions support expansion competitiveness. Analytics tools assist identifying inefficiencies their processes operations so they changes reduce expenses, boost output, ultimately revenue. Customer loyalty satisfaction rise a result this. Information regarding emerging technologies integration with data science prediction trends could present chances for growth innovation. Methodology: There are particular potential challenges Quaternary sector because its emphasis on activities, innovation, cutting-edge technology. Here, we methodical strategy using industry, allowing obtain useful long-term planning calculations. This approach gives framework utilizing analytics. helps competitive advantages increasingly environment by access important insights spur Findings/Result: study looks at how digital have been used control from birth present. Originality/Value: An explanation tech differs traditional within industry. It also includes general design be technical purposes, it examines thirty recently submitted recommendations related Tech Business industries. Paper Type: Exploratory research.

Language: Английский

Citations

4

Enhancing IoT Ecosystems through Effective Master Data Management DOI
Ronak Ravjibhai Pansara,

Balaram Yadav Kasula,

Piyush Gupta

et al.

Published: March 21, 2024

This study explores the quantitative impact of Master Data Management (MDM) implementation on Internet Things (IoT) ecosystems. Employing a comparative analysis methodology, pre-and post-MDM integration metrics were assessed within IoT environment. Results showcased notable enhancement in data accuracy by 20%, attributed to minimized errors and improved consistency following MDM adoption. Operational efficiency exhibited significant 30% reduction time across diverse platforms, contributing streamlined processes. Financially, operational costs decreased 15%, primarily due reduced cleansing efforts implementation. Decision-making processes benefited from 25% faster response real-time analytics derived insights. Additionally, ecosystem's scalability increased 40%, indicating amplified adaptability accommodate higher volumes without compromising performance. These findings highlight substantial fortifying reliability, efficiency, ecosystems, providing empirical evidence for transformative potential optimizing applications.

Language: Английский

Citations

4

DBPBFT: A hierarchical PBFT consensus algorithm with dual blockchain for IoT DOI
Xiaohua Wu, Z. Y. Wang, Xiaoyu Li

et al.

Future Generation Computer Systems, Journal Year: 2024, Volume and Issue: 162, P. 107429 - 107429

Published: July 8, 2024

Language: Английский

Citations

4

FOG COMPUTING BASED ENERGY EFFICIENT AND SECURED IOT DATA SHARING USING SGSOA AND GMCC DOI
Shanthi Narla,

Sreekar Peddi,

Dharma Teja Valivarthi

et al.

Sustainable Computing Informatics and Systems, Journal Year: 2025, Volume and Issue: unknown, P. 101109 - 101109

Published: March 1, 2025

Language: Английский

Citations

0

The Use of Blockchain Technology and Artificial Intelligence in Cryptocurrency and Medical Technology DOI
Ranson Sifiso Gwala

Advances in computational intelligence and robotics book series, Journal Year: 2025, Volume and Issue: unknown, P. 147 - 184

Published: Feb. 21, 2025

The purpose of this research was to conduct a comprehensive review artificial intelligence and blockchain technology in advancing medical cryptocurrency. This study used desktop literature approach on the latest peer-reviewed journal articles technology. In order achieve this, can solve current AI problems offer different IoT nodes safe resource data sharing. Blockchain power marketplaces for components decentralised coordination platforms. As result, adoption reaches previously unheard-of level addresses safety concerns as well creating alternative economies currencies now known cryptocurrencies. has led growth intelligence, built capabilities address issues security, access, building new markets at an even faster scale than ever before.

Language: Английский

Citations

0

Hybrid key management WSN protocol to enhance network performance using ML techniques for IoT application in cloud environment DOI

M. Raghini,

Selvam Durairaj,

S. Sasikala

et al.

Peer-to-Peer Networking and Applications, Journal Year: 2025, Volume and Issue: 18(4)

Published: May 2, 2025

Language: Английский

Citations

0

Application of artificial intelligence in mobile networks: a survey DOI

Ikedichukwu Onyemaucheya Nwaneri,

Fadi Al-Turjman

Elsevier eBooks, Journal Year: 2025, Volume and Issue: unknown, P. 15 - 22

Published: Jan. 1, 2025

Language: Английский

Citations

0

Hybrid computing framework security in dynamic offloading for IoT-enabled smart home system DOI Creative Commons
Sheharyar Khan, Jiangbin Zheng, Farhan Ullah

et al.

PeerJ Computer Science, Journal Year: 2024, Volume and Issue: 10, P. e2211 - e2211

Published: Aug. 23, 2024

In the distributed computing era, cloud has completely changed organizational operations by facilitating simple access to resources. However, rapid development of IoT led collaborative computing, which raises scalability and security challenges. To fully realize potential Internet Things (IoT) in smart home technologies, there is still a need for strong data solutions, are essential dynamic offloading conjunction with edge, fog, computing. This research on challenges covers in-depth examinations security, privacy, processing speed, storage capacity restrictions, analytics inside networked devices. We introduce Trusted Big Data Analytics (TIBDA) framework as comprehensive solution reshape living. Our primary focus mitigating pervasive privacy issues. TIBDA incorporates robust trust mechanisms, prioritizing reliability secure user information confidentiality within environment. achieve this employing hybrid cryptosystem that combines Elliptic Curve Cryptography (ECC), Post Quantum (PQC), Blockchain technology (BCT) protect confidentiality. Additionally, we comprehensively compared four prominent Artificial Intelligence anomaly detection algorithms (Isolation Forest, Local Outlier Factor, One-Class SVM, Envelope). utilized machine learning classification (random forest, k-nearest neighbors, support vector machines, linear discriminant analysis, quadratic analysis) detecting malicious non-malicious activities systems. Furthermore, main part help an artificial neural network (ANN) algorithm; designs system integrates architecture efficiently supports numerous users while from devices real-time. The analysis shows outperforms these systems significantly across various metrics. terms response time, demonstrated reduction 10-20% other under varying loads, device counts, transaction volumes. Regarding TIBDA's AUC values were consistently higher 5-15%, indicating superior protection against threats. exhibited highest trustworthiness uptime percentage 10-12% greater than its competitors. Isolation Forest algorithm achieved accuracy 99.30%, random forest 94.70%, outperforming methods 8-11%. our ANN-based decision-making model validation 99% reduced loss 0.11, demonstrating significant improvements resource utilization performance.

Language: Английский

Citations

1