Predictive Maintenance for IoT-Enabled Smart Cities using Recurrent Neural Networks DOI Open Access

A. Kingsly Jabakumar,

Anishkumar Dhablia

Deleted Journal, Journal Year: 2022, Volume and Issue: 3(2), P. 01 - 07

Published: Dec. 31, 2022

This work delves into the pressing need for more efficient Predictive Maintenance solutions in context of IoT-enabled Smart Cities. Existing methodologies often fall short, lacking precision and accuracy required to keep these rapidly evolving urban environments running smoothly different use cases. The limitations current approaches become apparent when considering their inability cope with intricacies IoT data. They struggle harness wealth information generated by countless interconnected devices systems, resulting suboptimal performance. issue is further compounded relatively sluggish response times, hindering timely detection critical maintenance needs. In challenges, this paper presents an innovative approach that leverages fusion Bidirectional Long Short-Term Memory (BiLSTM) Autoencoders conjunction Recurrent Neural Networks (RNNs). combination advanced techniques brings forth a powerful predictive model process. utilization BiLSTM adds layer sophistication, allowing deeper understanding underlying data patterns. BiLSTM's ability capture contextual from both past future points enriches model's capabilities. inclusion aids feature extraction reconstruction, enhancing discern relevant sets. advantages proposed are profound. It exhibits 4.9% higher precision, ensuring actions precisely targeted, thus reducing unnecessary interventions. Moreover, achieves remarkable 5.5% increase accuracy, guaranteeing reliable predictions. Its 4.5% boost recall ensures potential issues identified promptly. 3.9% speed means responses faster effective, minimizing downtemporal instance Lastly, 8.5% improvement Area Under Curve (AUC) underscores its superior performance compared existing methodologies. impacts extend far beyond realm levels. contributes significantly realization truly smart cities, where resources optimized, disruptions minimized, quality life citizens enhanced research marks pivotal step towards seamless integration technologies environments, revolutionize way we manage maintain our cities scenarios.

Language: Английский

Artificial Intelligence in Smart Cities—Applications, Barriers, and Future Directions: A Review DOI Creative Commons
Radosław Wolniak, Kinga Stecuła

Smart Cities, Journal Year: 2024, Volume and Issue: 7(3), P. 1346 - 1389

Published: June 10, 2024

As urbanization continues to pose new challenges for cities around the world, concept of smart is a promising solution, with artificial intelligence (AI) playing central role in this transformation. This paper presents literature review AI solutions applied cities, focusing on its six main areas: mobility, environment, governance, living, economy, and people. The analysis covers publications from 2021 2024 available Scopus. examines application each area identifies barriers, advances, future directions. authors set following goals analysis: (1) identify applications using cities; (2) barriers implementation (3) explore directions usage cities.

Language: Английский

Citations

53

The Cybersecurity Applied by Online Travel Agencies and Hotels to Protect Users’ Private Data in Smart Cities DOI Creative Commons
Lázaro Florido-Benítez

Smart Cities, Journal Year: 2024, Volume and Issue: 7(1), P. 475 - 495

Published: Feb. 4, 2024

The purpose of this paper is to analyse the cybersecurity in online travel agencies (OTAs) and hotel sectors protect users’ private data smart cities. Methodologically, research uses a sample information about cyberattacks that occurred during period 2000–2023 companies operating as OTAs travel, tourism, food sectors, which was obtained from articles. Then, we had expand include updated digital newspapers, regulatory sources, state breach notification sites like CSIS, KonBriefing, EUROCONTROL, GlobalData. findings current prove hotels were constantly exposed analysed, especially by breaches malware attacks; fact, main novelty research. In addition, these incidents severe for both guests tourism because their vulnerabilities consequences affect reputation cities where firms operate, well consumer confidence. results also showed most examined manuscript aimed at stealing companies’ such email addresses; credit card numbers, security codes, expiration dates; encoded magstripe data; among many other types data. Cyberattacks cyberthreats never disappear completely illegal activities are closely related hacker’s thirst power, fame, wealth.

Language: Английский

Citations

21

The Role of 6G Technologies in Advancing Smart City Applications: Opportunities and Challenges DOI Open Access
Sanjeev Kumar Sharma,

Renu Popli,

Sajjan Singh

et al.

Sustainability, Journal Year: 2024, Volume and Issue: 16(16), P. 7039 - 7039

Published: Aug. 16, 2024

The deployment of fifth-generation (5G) wireless networks has already laid the ground-work for futuristic smart cities but along with this, it also triggered rapid growth a wide range applications, example, Internet Everything (IoE), online gaming, extended/virtual reality (XR/VR), telemedicine, cloud computing, and others, which require ultra-low latency, ubiquitous coverage, higher data rates, extreme device density, ultra-high capacity, energy efficiency, better reliability. Moreover, predicted explosive surge in mobile traffic until 2030 envisioned potential use-cases/scenarios city context will far exceed capabilities 5G was designed. Therefore, there is need to harness 6th Generation (6G) capabilities, not only meet stringent requirements megacities can open up new applications. Other crucial concerns that be addressed are related network security, privacy, interoperability, digital divide, other integration issues. In this article, we examine current emerging trends implementation 6G arena. Firstly, give an inclusive comprehensive review communication technologies find use cities. discussion each technology covers its benefits, challenges future research direction. Secondly, explore promising applications these technologies, such as, grids, healthcare, waste management, etc. conclusion part, have highlighted suggestions possible directions. So, single paper, attempted provide wider perspective on 6G-enabled by including both their This paper help readers gain holistic view ascertain opportunities bring diverse, massive

Language: Английский

Citations

15

Benefit and limitation of using blockchain in smart cities to improve citizen services DOI

Davoud Bahrepour,

Raheleh Maleki

GeoJournal, Journal Year: 2024, Volume and Issue: 89(2)

Published: Feb. 26, 2024

Language: Английский

Citations

10

Enabling Technologies for Next-Generation Smart Cities: A Comprehensive Review and Research Directions DOI Creative Commons

Shrouk A. Ali,

Shaimaa Ahmed Elsaid,

Abdelhamied A. Ateya

et al.

Future Internet, Journal Year: 2023, Volume and Issue: 15(12), P. 398 - 398

Published: Dec. 9, 2023

The concept of smart cities, which aim to enhance the quality urban life through innovative technologies and policies, has gained significant momentum in recent years. As we approach era next-generation it becomes crucial explore key enabling that will shape their development. This work reviews leading driving future cities. begins by introducing main requirements different city applications; then, are presented. highlights transformative potential Internet things (IoT) facilitate data collection analysis improve infrastructure services. a complementary technology, distributed edge computing brings computational power closer devices, reducing reliance on centralized centers. Another technology is virtualization, optimizes resource utilization, multiple virtual environments run efficiently shared hardware. Software-defined networking (SDN) emerges as pivotal flexibility scalability networks, allowing for dynamic network management allocation. Artificial intelligence (AI) another managing cities predictive analytics, automation, decision making based vast amounts data. Lastly, blockchain introduced promising achieve required security. review concludes identifying research directions address challenges complexities brought about integrating these technologies.

Language: Английский

Citations

16

AI-based model for Prediction of Power consumption in smart grid-smart way towards smart city using blockchain technology DOI Creative Commons
Emran Aljarrah

Intelligent Systems with Applications, Journal Year: 2024, Volume and Issue: unknown, P. 200440 - 200440

Published: Sept. 1, 2024

Language: Английский

Citations

4

Anonymous Authentication Scheme Based on Physically Unclonable Function and Biometrics for Smart Cities DOI Creative Commons
Vincent Omollo Nyangaresi,

Ahmad Abdul Qadir AlRababah,

Ganesh Yenurkar

et al.

Engineering Reports, Journal Year: 2024, Volume and Issue: unknown

Published: Dec. 20, 2024

ABSTRACT Smart cities amalgamate technologies such as Internet of Things, big data analytics, and cloud computing to collect analyze large volumes from varied sources which facilitate intelligent surveillance, enhanced energy management systems, environmental monitoring. The ultimate goal these smart is offer city residents with better services, opportunities, quality life. However, the vulnerabilities in underlying technologies, interconnection heterogeneous devices, transfer over open public channels expose networks a myriad security privacy threats. Therefore, many solutions have been presented literature. majority techniques still numerous performance, privacy, challenges that need be addressed. To this end, we present an anonymous authentication scheme for based on physically unclonable function user biometrics. Its formal analysis using Real‐Or‐Random (ROR) model demonstrates robustness negotiated session key against active passive attacks. In addition, informal shows it supports salient functional features mutual authentication, agreement, perfect secrecy, anonymity, untraceability. It also shown withstand typical threats side‐channeling, offline guessing, disclosure, eavesdropping, hijacking, privileged insider, impersonation Moreover, comparative performance incurs lowest computation costs at relatively low communication overheads.

Language: Английский

Citations

4

Enhancing Smart Transportation System: Blockchain Based Integrating Cloud Database Management System DOI

Pankaj Pali,

Divya Pandey,

M Nanda Krishna Yadav

et al.

Lecture notes in intelligent transportation and infrastructure, Journal Year: 2025, Volume and Issue: unknown, P. 603 - 617

Published: Jan. 1, 2025

Language: Английский

Citations

0

Cybersecurity Challenges in Smart Grid IoT DOI
Zain Buksh, Neeraj Anand Sharma, Rishal Ravikesh Chand

et al.

Published: Jan. 29, 2025

Language: Английский

Citations

0

Pribadi: A decentralized privacy-preserving authentication in wireless multimedia sensor networks for smart cities DOI Creative Commons

Rekha Goyat,

Gulshan Kumar, Rahul Saha

et al.

Cluster Computing, Journal Year: 2023, Volume and Issue: 27(4), P. 4823 - 4839

Published: Dec. 27, 2023

Abstract Wireless Multimedia Sensor Network (WMSN) is a network of interconnected sensor nodes equipped with multimedia devices capable to retrieve as well scalar data in smart city scenarios. With the progress development, WMSNs are becoming points interest. The existing research works on security show some significant centralized solutions; they prone denial service attacks, central failure, and privacy breaches. Also, these solution having limitations because their nature.Therefore, proposed scheme adopted concept decentralization achieve more effective ubiquitous results. As per our best knowledge, we introduce first decentralized privacy-preserving authentication framework for address energy storage challenges. We call PRIvacy-preserving Blockchain-based Authentication multimeDIa networks (PRIBADI). PRIBADI uses blockchain authenticated communication between base stations (as trusted authority) by using certification access schemes. elect trustworthy cluster heads based weight metrics forward information Trusted Authority (TA). Subsequently, TA large cloud storage, relevant certificates hashes recorded distributed blockchain. Moreover, revokes malicious eliminates them from run set experiments compare results state-of-the-art models. use evaluation criteria detection accuracy, operation, consumption. find that 31.7% better than

Language: Английский

Citations

6