Region proposal network based on context information feature fusion for vehicle detection DOI Creative Commons

Zengyong Xu

ICST Transactions on Scalable Information Systems, Journal Year: 2018, Volume and Issue: unknown, P. 173161 - 173161

Published: July 13, 2018

By using the traditional methods, feature information extracted from vehicle target detection is insufficient, which leads to low accuracy in identifying small vehicles or blocked targets. Therefore, we propose a region proposal network (RPN) based on context fus

Language: Английский

Internet of Things (IoT) Security With Blockchain Technology: A State-of-the-Art Review DOI Creative Commons
Abdullah Ayub Khan, Asif Ali Laghari, Zaffar Ahmed Shaikh

et al.

IEEE Access, Journal Year: 2022, Volume and Issue: 10, P. 122679 - 122695

Published: Jan. 1, 2022

With the rapid enhancement in design and development of Internet Things creates a new research interest adaptation industrial domains. It is due to impact distributed emerging technology topology security-related resource constraints 5.0. This conducts paradigm along with critical challenges existing information preservation, node transactions communication, transmission, trust privacy, security protection related problems. These aspects pose serious limitations issues for industry provide data integrity, exchange reliability, provenance, trustworthiness overall activities service delivery prospects. In addition, intersection blockchain IoT has gained more consideration interest. However, there an limitation between inadequate performance connected nodes, high requirement permissioned private ledger not yet been tackled complete solution. Due introductions NuCypher Re-Encryption infrastructure, hashing tree allocation, deployment proof-of-work required computational power as well. paper divided into three different folds; first, we studied various literature blockchain-enabling its implementation challenging Secondly, proposed hyperledger sawtooth-enabled framework. framework provides secure trusted execution environment, which mechanisms protocols are designed acknowledgment, including immutable storage security, peer-to-peer network on-chain off-chain communication activities. Thirdly, pseudo-chain codes consensus smooth streamline broadcast content. The multiple investigated simulated using Hyperledger Sawtooth-enabled docker testing devices within limited usage constraints.

Language: Английский

Citations

137

A drone-based data management and optimization using metaheuristic algorithms and blockchain smart contracts in a secure fog environment DOI
Abdullah Ayub Khan, Asif Ali Laghari,

Thippa Reddy Gadekallu

et al.

Computers & Electrical Engineering, Journal Year: 2022, Volume and Issue: 102, P. 108234 - 108234

Published: July 25, 2022

Language: Английский

Citations

110

BIoMT: A State-of-the-Art Consortium Serverless Network Architecture for Healthcare System Using Blockchain Smart Contracts DOI Creative Commons
Abdullah Ayub Khan, Asif Ali Wagan, Asif Ali Laghari

et al.

IEEE Access, Journal Year: 2022, Volume and Issue: 10, P. 78887 - 78898

Published: Jan. 1, 2022

Owing to the sensitive nature of healthcare data, aforementioned approach transferring patient data central servers creates serious security and privacy issues. In addition, blockchain distributed ledger technology has introduced immutable storage decentralized management capability, which handles a large number nodes E-Healthcare transactions via serverless network, but in limited manner because blockchain-enabled resources. this scenario, medical industries are concerned about constituting an innovation health information preservation exchanging service delivery protocols without connectivity untrusted third-party infrastructure. study, we proposed hyperledger fabric-enabled consortium architecture called BIoMT, provides security, integrity, transparency, provenance health-related exchanges clinical peer-to-peer (P2P) secure network environment. A consensus is designed created reduce rate resource constraints on Internet Medical Things (IoMT). The individual before sharing protected using NuCypher Re-Encryption mechanism, increases integrity transparency. Smart contracts deployed automate device registration, exchange transactions, (filecoin) after cross verification validation. experimental results show that BIoMT reduces computational cost by 26.13%, robust node generation 60.37%. Thus, only 31.79% 74.21% IoMT-related P2P usage maintained saved, respectively.

Language: Английский

Citations

84

Data Security in Healthcare Industrial Internet of Things With Blockchain DOI
Abdullah Ayub Khan, Sami Bourouis, M. M. Kamruzzaman

et al.

IEEE Sensors Journal, Journal Year: 2023, Volume and Issue: 23(20), P. 25144 - 25151

Published: May 11, 2023

The industrial Internet of Things (IIoT) has gained more attention because the self-governing nature system configuration with interoperable application connectivity. In E-healthcare environment, it cooperates medical sensors to capture, examine, analyze, preserve, and document day-to-day transactions patients in real-time. integration IIoT provides an analytical platform handle a large amount data low cost cloud-enabling scalable storage. Throughout transformation, patients' personal information is at risk while exchanging records over centralized server-based systems. Thus, rate node connectivity, failure parallel sharing, deliverance-related issues increase. this article, we present solutions three folds. First, article proposes novel secure architecture for security using blockchain-distributed ledger technology named BHIIoT. Second, transformation lifecycle wireless sensor networks (WSNs) management optimization distributed layered hierarchy developed, which enhances network resources increases trust blockchain-enabled peer-to-peer (P2P) environment. Third, proposed BHIIoT uses NuCypher threshold re-encryption mechanism encryption protects shared form blocks preserved blockchain immutable For instance, chain codes are deployed automate authentication, logging, index deliverance, trace resist illegal activities application. customized lightweight multi-proof-of-work (PoW) multi-proof-of-stake (PoS) designed digital signature improving consumption reducing load storage transaction process scheduled.

Language: Английский

Citations

64

QoS-Ledger: Smart Contracts and Metaheuristic for Secure Quality-of-Service and Cost-Efficient Scheduling of Medical-Data Processing DOI Open Access
Abdullah Ayub Khan, Zaffar Ahmed Shaikh, Лаура Байтенова

et al.

Electronics, Journal Year: 2021, Volume and Issue: 10(24), P. 3083 - 3083

Published: Dec. 10, 2021

Quality-of-service (QoS) is the term used to evaluate overall performance of a service. In healthcare applications, efficient computation QoS one mandatory requirements during processing medical records through smart measurement methods. Medical services often involve transmission demanding information. Thus, there are stringent for secure, intelligent, public-network quality-of-service. This paper contributes three different aspects. First, we propose novel metaheuristic approach cost-efficient task schedules, where an intelligent scheduler manages tasks, such as rate service schedule, and lists items utilized by users data fog node. Second, efficient-computation algorithm, which effectively monitors according indicator (parameter) with analysis mechanism quality-of-experience (QoE), has been developed. Third, framework blockchain-distributed technology-enabled (QoS-ledger) in applications proposed permissionless public peer-to-peer (P2P) network, stores processed information distributed ledger. We have designed deployed contracts secure medical-data serverless peering networks handled node-protected interactions preserved logs blockchain The simulation result shows that computed on network power = average −10 −17 dBm, jitter 34 ms, delay 87 95 throughput 185 bytes, duty cycle 8%, route delivery response back variable. QoS-ledger potential candidate quality-of-service not limited e-healthcare applications.

Language: Английский

Citations

77

A Confidentiality-based data Classification-as-a-Service (C2aaS) for cloud security DOI Creative Commons
Munwar Ali, Low Tang Jung, Ali Hassan Sodhro

et al.

Alexandria Engineering Journal, Journal Year: 2022, Volume and Issue: 64, P. 749 - 760

Published: Nov. 2, 2022

Rapid development and massive use of Information Technology (IT) have since produced a amount electronic data. In tandem, the demand for data outsourcing associated security is increasing exponentially. Small organizations are often finding it expensive to save process their huge data, keep secure from unauthorized access. Cloud computing suitable affordable platform provide services on user demand. The cloud preferable used by individuals, Small, Medium Enterprises (SMEs) that cannot afford large-scale hardware, software, maintenance cost. Storage processing big in becoming key appealing features SMEs individuals. However, facing two issues such as stored system overload due volume These storage methods plain text encrypted storage. Both strengths limitations. fundamental issue high risk breaches; whereas, storage, encryption complete file may cause overload. This paper propose feasible solution address these with new service model called Confidentiality-based Classification-as-a-Service (C2aaS) performs treating dynamically according level preparation storing cloud. comparison conventional methods, our proposed strongly showing good confidential proficient reducing overloading.

Language: Английский

Citations

45

A Blockchain and Metaheuristic-Enabled Distributed Architecture for Smart Agricultural Analysis and Ledger Preservation Solution: A Collaborative Approach DOI Creative Commons
Abdullah Ayub Khan, Zaffar Ahmed Shaikh, Larisa Belinskaja

et al.

Applied Sciences, Journal Year: 2022, Volume and Issue: 12(3), P. 1487 - 1487

Published: Jan. 29, 2022

Distributed forecasting of agriculture commodity prices has an attractive research perspective that delivers active breakthrough analysis the rapid fluctuations in pricing forecasts for participating stakeholders without being manually dispatched lists. The increased use efficient mechanism information management generated records and processing creates emerging challenges limitations. These include new government mandates regulations, price land expansion, growing demand commodities, global financial market, food security, bio-based fuels. Building deploying distributed dynamic scheduling, management, monitoring systems agricultural activities supply chains require a significant secure approach. Thus, this paper discusses collaborative approach where two different folds are demonstrated to cover distinct aspects with objectives. A metaheuristic-enabled genetic algorithm is designed receive day-to-day production details process analyze forecast from by managing, them real-time. blockchain hyperledger sawtooth modular technology provides communication channel between stakeholders, private network, protects ledger, adds updates prices, preserves node transactions immutable ledger (IPFS). To accomplish this, we design, develop, deploy smart contracts register system’s actual allow addition exchanges. second contract distributes it while preserving detailed addresses storage. simulation results proposed deliver E-agriculture accuracy 95.3%. It also maintains transparency, integrity, provenance, availability, operational control access activities.

Language: Английский

Citations

38

Blockchain Hyperledger with Non-Linear Machine Learning: A Novel and Secure Educational Accreditation Registration and Distributed Ledger Preservation Architecture DOI Creative Commons
Zaffar Ahmed Shaikh, Abdullah Ayub Khan, Лаура Байтенова

et al.

Applied Sciences, Journal Year: 2022, Volume and Issue: 12(5), P. 2534 - 2534

Published: Feb. 28, 2022

This paper proposes a novel and secure blockchain hyperledger sawtooth-enabled consortium analytical model for smart educational accreditation credential evaluation. Indeed, candidate academic credentials are generated, verified, validated by the universities transmitted to Higher Education Department (HED). The objective is enable procedure of verification analyze tamper-proof forged records before validation. For this reason, we designed created an investigate individual collected from examine candidates’ credibility using machine learning techniques maintain all these aspects analysis addresses in distributed storage with hash-encryption (SHA-256) network, which runs on peer-to-peer (P2P) structure. In proposed model, deployed mechanism examiner analyst processes protection criteria, referred as chaincodes or contracts. These automate schedule, generation, verification, validation, monitoring overall nodes’ transactions. include registration associated university (candidateReg()), certificate-related update (CIssuanceTrans()), every node’s transactions preservation immutable (ULedgerAV()) further investigations. simulates benchmark dataset. result shows merit our model. Through extensive simulations, blockchain-enabled provides robust performance terms management problems.

Language: Английский

Citations

36

IPM-Model: AI and metaheuristic-enabled face recognition using image partial matching for multimedia forensics investigation with genetic algorithm DOI
Abdullah Ayub Khan, Aftab Ahmed Shaikh, Zaffar Ahmed Shaikh

et al.

Multimedia Tools and Applications, Journal Year: 2022, Volume and Issue: 81(17), P. 23533 - 23549

Published: March 18, 2022

Language: Английский

Citations

36

BIoMT Modular Infrastructure: The Recent Challenges, Issues, and Limitations in Blockchain Hyperledger-Enabled E-Healthcare Application DOI Creative Commons
Zaffar Ahmed Shaikh, Abdullah Ayub Khan, Lin Teng

et al.

Wireless Communications and Mobile Computing, Journal Year: 2022, Volume and Issue: 2022, P. 1 - 14

Published: Sept. 21, 2022

This paper presents a layered hierarchy that depicts the progressive relationship between data, information, knowledge, and wisdom. To begin with, data is gathered organized into information. Information gathered, filtered, refined, put through an investigation process to create knowledge. Wisdom attained after knowledge discovery of filtration aggregation experience. The in domain e-healthcare necessitates higher scheduling costs for collection, processing wisdom, management, which also insecure untrustworthy medical service. industry faces difficult problem providing collected integrity, information reliability, trustworthiness service relationships face increasing number day-to-day records. blockchain consortium hyperledger (fabric) has been used this act as bridge bridges gap electronic wisdom (DIKW) movement processes by enabling schedule management security transparency. For privacy, DIKW-ledger, such patients’ consultancy availing services, personal records, appointments, treatment details, other health-related transactions, fabric-enabled efficient architecture proposed. proposed creates two networks: public network stakeholders exchange agree on specific activities before being preserved distributed storage (read-only record registration) private complete DIKW management. We designed created smart contracts purpose, well use-case diagrams describe overall execution process. architectural solution provides more provenance, procedures immutably preserve ledger permissioned hash-encrypted structure.

Language: Английский

Citations

28