AI-Powered Secure Decentralized Energy Transactions in Smart Grids: Enhancing Security and Efficiency DOI
Yousef Methkal Abd Algani,

Vuda Sreenivasa Rao,

R. Saravanakumar

et al.

Published: June 21, 2024

Language: Английский

A Decentralized Approach to Smart Home Security: Blockchain With Red-Tailed Hawk-Enabled Deep Learning DOI Creative Commons
Fahad F. Alruwaili, Manal Abdullah Alohali, Nouf Aljaffan

et al.

IEEE Access, Journal Year: 2024, Volume and Issue: 12, P. 14146 - 14156

Published: Jan. 1, 2024

The fast development of smart home devices and the Internet Things (IoTs) presents unprecedented accessibility into our day-to-day lives; however, it has also increased major problems regarding security privacy. A network is a vital element modern automation systems, enabling interconnectivity control different devices. These networks allow homeowners to remotely lighting, security, temperature, entertainment systems via voice commands or smartphones. offer energy efficiency, convenience, improved by permitting residents monitor modify their living surroundings. Safeguarding flexibility against cyberattacks unauthorized access important comprehending maximum ability while retaining data integrity privacy connected This research develops Blockchain with Red-Tailed Hawk Algorithm-Enabled Deep Learning (BC-RTHADL) model, aimed strengthen safety systems. BC-RTHADL integrates features blockchain strong malicious action recognition procedure. module certifies immutability, transparency, decentralization, donating safe atmosphere. detection influences Algorithm for feature selection an ensemble Extreme Machine (ELM), Gated Recurrent Unit (GRU), Long Short-Term Memory (LSTM) techniques precise recognition. Equilibrium Optimizer algorithm enhances parameters effectiveness. Complete tests show greater performance across numerous metrics, reaffirming its promising potential in safeguarding networks.

Language: Английский

Citations

6

Artifical Intelligence-Based Smart Security System Using Internet of Things for Smart Home Applications DOI Open Access
Hakilo Sabit

Electronics, Journal Year: 2025, Volume and Issue: 14(3), P. 608 - 608

Published: Feb. 4, 2025

This study presents the design and development of an AI-based Smart Security System leveraging IoT technology for smart home applications. research focuses on exploring evaluating various artificial intelligence (AI) Internet Things (IoT) options, particularly in video processing security. The system is structured around key components: elements, software management interactions, AI-driven processing, user information delivery methods. Each component’s selection based a comparative analysis alternative approaches, emphasizing advantages chosen solutions. provides in-depth discussion theoretical framework implementation strategies used to integrate these technologies into security system. Results from system’s deployment testing are analyzed, highlighting performance challenges faced during integration. also addresses how were mitigated through specific adaptations. Finally, potential future enhancements suggested further improve system, including recommendations upgrades could advance functionality effectiveness Systems

Language: Английский

Citations

0

Building the Smart City of Tomorrow: A Bibliometric Analysis of Artificial Intelligence in Urbanization DOI Creative Commons
Erik Karger,

Aristide Rothweiler,

Tim Brée

et al.

Urban Science, Journal Year: 2025, Volume and Issue: 9(4), P. 132 - 132

Published: April 17, 2025

Urbanization is a global trend that continues to grow, leading an increasing number of people live in cities. This rapid expansion creates challenges such as traffic congestion, environmental pollution, and the need ensure high living standards for all residents. To address these challenges, many cities adopt digital technologies become smarter, more efficient, sustainable. Among technologies, artificial intelligence (AI) has gained significant attention recent years due its transformative potential. In context smart cities, AI offers innovative solutions across various domains, including mobility, waste management, energy optimization. Due multidisciplinary nature advancements, research on grown significantly. A comprehensive approach needed understand role urban transformation identify key gaps. paper aims synthesize existing knowledge providing valuable insights both researchers practitioners. We define scope AI-related by analyzing scientific literature offer three main contributions. First, we provide holistic overview field conducting bibliometric analysis map status structure knowledge. Second, major themes through co-citation clustering. Third, outline future agenda most influential journal articles. Our findings have theoretical practical implications wide range disciplines, computer science, energy, transportation, security. Furthermore, our results can facilitate collaboration identifying institutions, highlight critical gaps, foster discussions benefits AI-driven city solutions.

Language: Английский

Citations

0

Optimizing Smart Home Intrusion Detection with Harmony-Enhanced Extra Trees DOI
Akmalbek Abdusalomov, Dusmurod Kilichev, Rashid Nasimov

et al.

Published: Jan. 1, 2024

Download This Paper Open PDF in Browser Add to My Library Share: Permalink Using these links will ensure access this page indefinitely Copy URL DOI

Language: Английский

Citations

1

Hybrid computing framework security in dynamic offloading for IoT-enabled smart home system DOI Creative Commons
Sheharyar Khan, Jiangbin Zheng, Farhan Ullah

et al.

PeerJ Computer Science, Journal Year: 2024, Volume and Issue: 10, P. e2211 - e2211

Published: Aug. 23, 2024

In the distributed computing era, cloud has completely changed organizational operations by facilitating simple access to resources. However, rapid development of IoT led collaborative computing, which raises scalability and security challenges. To fully realize potential Internet Things (IoT) in smart home technologies, there is still a need for strong data solutions, are essential dynamic offloading conjunction with edge, fog, computing. This research on challenges covers in-depth examinations security, privacy, processing speed, storage capacity restrictions, analytics inside networked devices. We introduce Trusted Big Data Analytics (TIBDA) framework as comprehensive solution reshape living. Our primary focus mitigating pervasive privacy issues. TIBDA incorporates robust trust mechanisms, prioritizing reliability secure user information confidentiality within environment. achieve this employing hybrid cryptosystem that combines Elliptic Curve Cryptography (ECC), Post Quantum (PQC), Blockchain technology (BCT) protect confidentiality. Additionally, we comprehensively compared four prominent Artificial Intelligence anomaly detection algorithms (Isolation Forest, Local Outlier Factor, One-Class SVM, Envelope). utilized machine learning classification (random forest, k-nearest neighbors, support vector machines, linear discriminant analysis, quadratic analysis) detecting malicious non-malicious activities systems. Furthermore, main part help an artificial neural network (ANN) algorithm; designs system integrates architecture efficiently supports numerous users while from devices real-time. The analysis shows outperforms these systems significantly across various metrics. terms response time, demonstrated reduction 10-20% other under varying loads, device counts, transaction volumes. Regarding TIBDA's AUC values were consistently higher 5-15%, indicating superior protection against threats. exhibited highest trustworthiness uptime percentage 10-12% greater than its competitors. Isolation Forest algorithm achieved accuracy 99.30%, random forest 94.70%, outperforming methods 8-11%. our ANN-based decision-making model validation 99% reduced loss 0.11, demonstrating significant improvements resource utilization performance.

Language: Английский

Citations

1

Enhancing data security in cloud computing: a blockchain-based Feistel cipher encryption and multiclass vector side-channel attack detection approach DOI Open Access

Ramakrishna Subbareddy,

Tamil selvan

International Journal of Advanced Technology and Engineering Exploration, Journal Year: 2024, Volume and Issue: 11(112)

Published: March 31, 2024

Cloud computing (CC) permits more users for storing as well distributing their applications and data.CC continuously evolving technology that can improve agility, availability, collaboration, scalability of data.It offers on-demand solution different namely data storage, servers, databases, networking, software.One the most challenging issues in CC is detecting attacks.Parallel sponge-based authenticated encryptionwith sidechannel protection adversary-invisible nonces (PSASPIN) to sponge construction was designed [1].Moreover, leveled implementation has also utilized implementing key generation via pseudo random function (PRF).Next, preprocessing minimize code size.Finally, security proof ensured using game theory therefore processing shorter messages significantly.The encryption (AE) schemes such security, performance, efficiency are enhanced.

Language: Английский

Citations

0

Blockchain-Powered Deep Learning for Internet of Things With Cloud-Assisted Secure Smart Home Networks DOI Creative Commons
Fahad F. Alruwaili

IEEE Access, Journal Year: 2024, Volume and Issue: 12, P. 119927 - 119936

Published: Jan. 1, 2024

Language: Английский

Citations

0

AI-Powered Secure Decentralized Energy Transactions in Smart Grids: Enhancing Security and Efficiency DOI
Yousef Methkal Abd Algani,

Vuda Sreenivasa Rao,

R. Saravanakumar

et al.

Published: June 21, 2024

Language: Английский

Citations

0