Enhancing Data Center Efficiency with Docker & Kubernetes: Industry 4.0 Container-as-a-Service (CAAS) for IoE Cloud Technology DOI

Ratnesh Kumar,

Jaspreet Singh,

K. Martin Sagayam

et al.

Published: Nov. 13, 2024

Language: Английский

Enhancing Electronic Agriculture Data Security with a Blockchain-Based Search Method and E-Signatures DOI

Duaa Hammoud Tahayur,

Mishall Al-Zubaidie

Deleted Journal, Journal Year: 2024, Volume and Issue: 4(3), P. 129 - 149

Published: Sept. 9, 2024

The production of digital signatures with blockchain constitutes a prerequisite for the security electronic agriculture applications (EAA), such as Internet Things (IoT). To prevent irresponsibility within blockchain, attackers regularly attempt to manipulate or intercept data stored sent via EAA-IoT. Additionally, cybersecurity has not received much attention recently because IoT are still relatively new. As result, protection EAAs against threats remains insufficient. Moreover, protocols used in contemporary research insufficient thwart wide range threats. For these issues, first, this study proposes system combine consortium blocks Edwards25519 (Ed25519) stop block tampering IoT. Second, proposed leverages an artificial bee colonizer (ABC) approach preserve unpredictable nature Ed25519 while identifying optimal solution and optimizing various complex challenges. Advanced deep learning (ADL) technology is model track evaluate objects optimizer system. We tested our terms measures performance overhead. Tests conducted on have shown that it can most destructive applications, obfuscation, selfish mining, blocking, ignoring, blind heuristic attacks, fends off attacks through use test Scyther tool. parameters, including scalability 99.56%, entropy 60.99 Mbps, network throughput rate 200,000.0 m/s, which reflects acceptability over existing systems.

Language: Английский

Citations

1

PoAh 2.0: AI-empowered dynamic authentication based adaptive blockchain consensus for IoMT-edge workflow DOI Creative Commons
Joy Dutta, Deepak Puthal

Future Generation Computer Systems, Journal Year: 2024, Volume and Issue: 161, P. 655 - 672

Published: July 31, 2024

This paper introduces a significant advancement in the Proof of Authentication (PoAh) consensus algorithm, designed specifically for resource-constrained Internet Things (IoT) devices. Building upon foundations PoAh consensus, this enhanced iteration, known as 2.0, integrates Artificial Intelligence (AI) at block creator node level. novel approach allows generation transactions embedded with AI-determined sensitivity and other applicable transaction-related metadata, pioneering concept domain. The verifier node, trusted entity, is tasked verifying incoming blocks, utilizing header its metadata information to determine authenticity while preserving privacy content block's data. A core innovation 2.0 dynamic authentication mechanism, which adapts level data within each block, behaving an adaptive way based on situation. AI plays crucial role process, ensuring integrity security are maintained. To demonstrate efficacy advanced AI-enabled we conducted case study Medical (IoMT)-based eHealth scenario. results from reveal that our developed technique not only significantly enhances original version but also establishes new benchmark validation applications. integration improved authentication, calibrated needs marks stride blockchain research. development enriches current understanding applications IoT, sets direction future research secure efficient implementations IoMT-Edge centric landscape.

Language: Английский

Citations

0

Optimal Transportation System Based on Adaptive Federated Learning Techniques for Healthcare IoV (HIoV) DOI

Pallati Narsimhulu,

Rashmi Sahay, Premkumar Chithaluru

et al.

Published: Dec. 13, 2024

The advent of the Healthcare Internet Vehicles (HIoV) has revolutionized transportation systems, ushering in a new era smart mobility. However, to fully harness potential HIoV, efficient and adaptive control techniques are imperative. This book chapter delves into optimization systems through integration Adaptive Federated Learning (FL) techniques. primary challenge addressed is need for real-time, mechanisms HIoV environments. aims explore develop an innovative approach optimize systems. By employing FL techniques, objective create adaptable intelligent HIoVs. What sets this apart its pioneering use methods novelty lies development adaptable, that enhance safety, efficiency, user experience. provides insights It offers analysis impact on system adaptability, real-time decision-making, overall efficiency HIoVs dynamic

Language: Английский

Citations

0

The Role of Blockchain, IoT and AR in Future Healthcare: A Review DOI Creative Commons

Richard Aggrey -,

Emmanuel Adjirachor -,

Bismark Adjei

et al.

International Journal For Multidisciplinary Research, Journal Year: 2024, Volume and Issue: 6(6)

Published: Dec. 20, 2024

The healthcare industry is on the border of technological revolution that unites tech, Internet Things (IoT), Augmented Reality (AR), and Blockchain. Blockchain provides a transparent method for storing exchanging records, which boosts data integrity compatibility among systems. At same time, IoT gadgets allow real-time tracking patient health indicators, aiding in prompt intervention tailored treatment plans. Meanwhile, AR can elevate medical training sessions surgical processes involvement. Providers streamline cut expenses by blending these advancements incorporating them into operations. most exciting aspect potential to significantly enhance outcomes. Nevertheless, there are obstacles overcome, like safeguarding privacy, maintaining cybersecurity navigating through requirements before fully be harnessed their maximum potential.

Language: Английский

Citations

0

Hybrid key management WSN protocol to enhance network performance using ML Techniques for IoT application in cloud Environment DOI Creative Commons

M. Raghini,

Selvam Durairaj,

S. Sasikala

et al.

Research Square (Research Square), Journal Year: 2024, Volume and Issue: unknown

Published: May 15, 2024

Abstract As the Internet of Things (IoT) develops, Wireless Sensor Networks (WSNs) must be used to collect and transmit critical data. Ensuring security efficiency these networks is paramount, given sheer volume sensitivity data they handle. This paper introduces a novel hybrid key management protocol for WSNs in IoT applications, integrating cloud services harnessing Machine Learning (ML) techniques enhance network performance security. The proposed leverages strengths symmetric asymmetric essential methods, providing robust foundation securing communication within WSN. It also capitalizes on cloud-based services’ scalability centralized capabilities streamline distribution facilitate network-wide updates. are seamlessly integrated into protocol, enabling predictive distribution, anomaly detection, dynamic management, intelligent load balancing. By analyzing historical patterns, ML algorithms predict optimal times locations updates, reducing overhead enhancing Additionally, ML-based detection empowers identify respond irregularities potential breaches. framework combines integration, intelligence Learning, resulting highly adaptable efficient IoT-enabled WSNs. enhanced by using exiting algorithms.

Language: Английский

Citations

0

Enhancing Data Center Efficiency with Docker & Kubernetes: Industry 4.0 Container-as-a-Service (CAAS) for IoE Cloud Technology DOI

Ratnesh Kumar,

Jaspreet Singh,

K. Martin Sagayam

et al.

Published: Nov. 13, 2024

Language: Английский

Citations

0