Exploring the Next Frontier in Wireless Communication: 5G and Beyond for Enhanced Reliability and Low Latency in IoT and Autonomous Technologies DOI Open Access
Deepak Kumar Sharma, K. Lakshmi Narayana,

P Shyamala

et al.

Nanotechnology Perceptions, Journal Year: 2024, Volume and Issue: unknown, P. 676 - 689

Published: Dec. 1, 2024

This research focuses on how 5G and beyond technologies might be the game changers in reliability, low latency, efficiency, improvement of IoT autonomous systems, such as electric vehicles. It addresses advancements 6G-based communication networks integrated with machine learning edge computing to enhance vehicle performance, energy management, vehicle-to-infrastructure (V2I) communication. Extensive experimentation conducted greatly led discovery important improvements response time. Latency was reduced by much 45 per cent when compared 4G networks, this meant that 6G enabled potential increases up 60 over data throughput reliability high-density environments. In addition that, AI application towards predictive maintenance battery optimization an increase 30 for applications intelligence a more sustainable EV system. The results further reveal promise AI-based security ML-based 25% reduction network vulnerabilities traditional protocols. inform transformative capability next generations fulfil their scope remodelling future vehicles systems. Future will focus overcoming present infrastructure deficiencies improving algorithms behind real-time decision-making processes support scalable, energy-efficient, secure ecosystems.

Language: Английский

The Role of Blockchain and AI in Fortifying Cybersecurity for Healthcare Systems DOI Open Access

M. Husain Bathushaw,

S. Nagasundaram

International Journal of Computational and Experimental Science and Engineering, Journal Year: 2024, Volume and Issue: 10(4)

Published: Nov. 24, 2024

In a simulated healthcare setting, the algorithms were assessed based on organized threat insight data, inconsistency location executed with blockchain-enhanced access control, and machine learning-driven interruption detection. The test results depiction showed that all calculations feasible, an accuracy range of 0.88-0.94 lift defined between 0.75 1; knowledge values ranging from.86 to.92, F1 scores above.90 are displayed as follows: Above all, TIAA excelled in risk insights management; ADA exceeded expectations detecting inconsistencies; BACA used blockchain to fortify control; ML-IDS produced remarkable intrusion importance these addressing particular cybersecurity concerns industry is highlighted through comparative comparison similar studies. suggested relevant growing conversation about because they offer comprehensive strategy protect private health guarantee reliability assessment models, organizations against variety evolving cyberthreats.

Language: Английский

Citations

6

Unlocking a Promising Future: Integrating Blockchain Technology and FL-IoT in the Journey to 6G DOI Creative Commons
Fatemah Alghamedy, Nahla El-Haggar, Albandari Alsumayt

et al.

IEEE Access, Journal Year: 2024, Volume and Issue: 12, P. 115411 - 115447

Published: Jan. 1, 2024

The rapid advancement of technology has set higher standards for the next generation wireless communication networks, known as 6G. These networks go beyond simple task connecting devices and aim to establish a self-sustaining system within society. One key factors in achieving this goal is integration AI services apps through Internet Things (IoT), which will be made possible with support 6G technology. artificial intelligence (AI) play crucial role enhancing protocols, architectures, operations networks. To achieve collaborative IoT applications, Federated Learning (FL) emerged popular method. FL enables training without need data sharing, ensuring privacy security. However, also faces challenges, such presence malicious risk single-point failure. address these concerns, blockchain (BCT) offers secure efficient solution. By leveraging blockchain, issues can effectively tackled, providing reliable framework implementing FL-IoT applications.

Language: Английский

Citations

6

Securing IoT Sensors Using Sharding-Based Blockchain Network Technology Integration: A Systematic Review DOI Creative Commons
A.Mohamed Aslam, Octavian Postolache, Sancho Oliveira

et al.

Sensors, Journal Year: 2025, Volume and Issue: 25(3), P. 807 - 807

Published: Jan. 29, 2025

Sharding is an emerging blockchain technology that used extensively in several fields such as finance, reputation systems, the IoT, and others because of its ability to secure increase number transactions every second. In sharding-based technology, divided into sub-chains, also known shards, enhance network throughput. This paper aims examine impact integrating securing IoT sensors, which further for environmental monitoring. this paper, idea proposed, along with advantages disadvantages, by conducting a systematic literature review studies based on recent years. Based research findings, beneficial systems improving security, access, transaction rates. The findings suggest issues, cross-shard transactions, synchronization concentration stakes. With increased focus showcasing important trade-offs, offers recommendations implementation sensors applications environment These valuable insights are effective facilitating informed decisions while developing more efficient decentralized networks internet data centers (IDCs), monitoring picking out key points data.

Language: Английский

Citations

0

A Physical-Layer Security Cooperative Framework for Mitigating Interference and Eavesdropping Attacks in Internet of Things Environments DOI Creative Commons
Abdallah Farraj, Eman Hammad

Sensors, Journal Year: 2024, Volume and Issue: 24(16), P. 5171 - 5171

Published: Aug. 10, 2024

Intentional electromagnetic interference attacks (e.g., jamming) against wireless connected devices such as the Internet of Things (IoT) remain a serious challenge, especially evolve in complexity. Similarly, eavesdropping on communication channels persists an inherent vulnerability that is often exploited by adversaries. This article investigates novel approach to enhancing information security for IoT systems via collaborative strategies can effectively mitigate targeting availability and confidentiality eavesdropping. We examine proposed two use cases. First, we consider device experiences attack, causing channel outages hindering access transmitted data. A physical-layer-based (PLS) transmission strategy this maintain target levels targeted adversarial interference. In strategy, select leverage cooperative signal under active attacks. Second, case they communicate over with possible eavesdroppers. case, propose where create outage eavesdropper, preventing it from decoding devices. The analytical numerical results illustrate effectiveness achieving desired respect both

Language: Английский

Citations

3

Analysis and Quantification of Different Security Issues in Deploying AI and Blockchain DOI
Snehasis Dey

Advances in information security, privacy, and ethics book series, Journal Year: 2025, Volume and Issue: unknown, P. 119 - 130

Published: Feb. 7, 2025

Artificial intelligence and Blockchain have taken full control over today's human activities. More reliance on these technologies time again given homogenous challenges for researchers academician to find the way safety, security privacy control.AI integration in cybersecurity really prioritized every research today adequate balance technology usages. Potential usage effective result are still a concern AI industry line of control. Global digitization heavy dependency emerged as big trustworthy secured networking. This chapter caters analysis proper identification different technologies. The prolific must be realistic perspective it is very important domain globalization like healthcare, agriculture business industry. draws definite shape boundary integrating growing industries.

Language: Английский

Citations

0

IOTASDN: IOTA 2.0 Smart Contracts for Securing Software-Defined Networking Ecosystem DOI Creative Commons
Mohamed Fartitchou, Ismail Lamaakal, Yassine Maleh

et al.

Sensors, Journal Year: 2024, Volume and Issue: 24(17), P. 5716 - 5716

Published: Sept. 2, 2024

Software-Defined Networking (SDN) has revolutionized network management by providing unprecedented flexibility, control, and efficiency. However, its centralized architecture introduces critical security vulnerabilities. This paper a novel approach to securing SDN environments using IOTA 2.0 smart contracts. The proposed system utilizes the Tangle, directed acyclic graph (DAG) structure, improve scalability efficiency while eliminating transaction fees reducing energy consumption. We introduce three contracts: Authority, Access Control, DoS Detector, ensure trusted secure operations, prevent unauthorized access, maintain integrity of control data, mitigate denial-of-service attacks. Through comprehensive simulations Mininet ShimmerEVM Test Network, we demonstrate efficacy our in enhancing security. Our findings highlight potential contracts provide robust, decentralized solution for environments, paving way further integration blockchain technologies management.

Language: Английский

Citations

1

IOTASDN: IOTA 2.0 Smart Contracts for Securing SDN Ecosystem DOI Open Access
Mohamed Fartitchou, Ismail Lamaakal, Yassine Maleh

et al.

Published: July 15, 2024

Software-Defined Networking (SDN) has revolutionized network management by providing unprecedented flexibility, control, and efficiency. However, its centralized architecture introduces critical security vulnerabilities. This paper presents an innovative approach to securing SDN environments using IOTA 2.0 smart contracts. The proposed system leverages the Tangle, a directed acyclic graph (DAG) structure, enhance scalability efficiency while eliminating transaction fees reducing energy consumption. We introduce three contracts—Authority, Access Control, DoS Detector—to ensure secure operations, prevent unauthorized access, mitigate denial-of-service attacks. Through comprehensive simulations Mininet ShimmerEVM Test Network, we demonstrate efficacy of our in enhancing security. Our findings highlight potential contracts provide robust, decentralized solution for environments, paving way further integration blockchain technologies management.

Language: Английский

Citations

0

Exploring the Next Frontier in Wireless Communication: 5G and Beyond for Enhanced Reliability and Low Latency in IoT and Autonomous Technologies DOI Open Access
Deepak Kumar Sharma, K. Lakshmi Narayana,

P Shyamala

et al.

Nanotechnology Perceptions, Journal Year: 2024, Volume and Issue: unknown, P. 676 - 689

Published: Dec. 1, 2024

This research focuses on how 5G and beyond technologies might be the game changers in reliability, low latency, efficiency, improvement of IoT autonomous systems, such as electric vehicles. It addresses advancements 6G-based communication networks integrated with machine learning edge computing to enhance vehicle performance, energy management, vehicle-to-infrastructure (V2I) communication. Extensive experimentation conducted greatly led discovery important improvements response time. Latency was reduced by much 45 per cent when compared 4G networks, this meant that 6G enabled potential increases up 60 over data throughput reliability high-density environments. In addition that, AI application towards predictive maintenance battery optimization an increase 30 for applications intelligence a more sustainable EV system. The results further reveal promise AI-based security ML-based 25% reduction network vulnerabilities traditional protocols. inform transformative capability next generations fulfil their scope remodelling future vehicles systems. Future will focus overcoming present infrastructure deficiencies improving algorithms behind real-time decision-making processes support scalable, energy-efficient, secure ecosystems.

Language: Английский

Citations

0