Enhancing Data Center Efficiency with Docker & Kubernetes: Industry 4.0 Container-as-a-Service (CAAS) for IoE Cloud Technology DOI

Ratnesh Kumar,

Jaspreet Singh,

K. Martin Sagayam

и другие.

Опубликована: Ноя. 13, 2024

Язык: Английский

Enhancing Electronic Agriculture Data Security with a Blockchain-Based Search Method and E-Signatures DOI

Duaa Hammoud Tahayur,

Mishall Al-Zubaidie

Deleted Journal, Год журнала: 2024, Номер 4(3), С. 129 - 149

Опубликована: Сен. 9, 2024

The production of digital signatures with blockchain constitutes a prerequisite for the security electronic agriculture applications (EAA), such as Internet Things (IoT). To prevent irresponsibility within blockchain, attackers regularly attempt to manipulate or intercept data stored sent via EAA-IoT. Additionally, cybersecurity has not received much attention recently because IoT are still relatively new. As result, protection EAAs against threats remains insufficient. Moreover, protocols used in contemporary research insufficient thwart wide range threats. For these issues, first, this study proposes system combine consortium blocks Edwards25519 (Ed25519) stop block tampering IoT. Second, proposed leverages an artificial bee colonizer (ABC) approach preserve unpredictable nature Ed25519 while identifying optimal solution and optimizing various complex challenges. Advanced deep learning (ADL) technology is model track evaluate objects optimizer system. We tested our terms measures performance overhead. Tests conducted on have shown that it can most destructive applications, obfuscation, selfish mining, blocking, ignoring, blind heuristic attacks, fends off attacks through use test Scyther tool. parameters, including scalability 99.56%, entropy 60.99 Mbps, network throughput rate 200,000.0 m/s, which reflects acceptability over existing systems.

Язык: Английский

Процитировано

1

PoAh 2.0: AI-empowered dynamic authentication based adaptive blockchain consensus for IoMT-edge workflow DOI Creative Commons
Joy Dutta, Deepak Puthal

Future Generation Computer Systems, Год журнала: 2024, Номер 161, С. 655 - 672

Опубликована: Июль 31, 2024

This paper introduces a significant advancement in the Proof of Authentication (PoAh) consensus algorithm, designed specifically for resource-constrained Internet Things (IoT) devices. Building upon foundations PoAh consensus, this enhanced iteration, known as 2.0, integrates Artificial Intelligence (AI) at block creator node level. novel approach allows generation transactions embedded with AI-determined sensitivity and other applicable transaction-related metadata, pioneering concept domain. The verifier node, trusted entity, is tasked verifying incoming blocks, utilizing header its metadata information to determine authenticity while preserving privacy content block's data. A core innovation 2.0 dynamic authentication mechanism, which adapts level data within each block, behaving an adaptive way based on situation. AI plays crucial role process, ensuring integrity security are maintained. To demonstrate efficacy advanced AI-enabled we conducted case study Medical (IoMT)-based eHealth scenario. results from reveal that our developed technique not only significantly enhances original version but also establishes new benchmark validation applications. integration improved authentication, calibrated needs marks stride blockchain research. development enriches current understanding applications IoT, sets direction future research secure efficient implementations IoMT-Edge centric landscape.

Язык: Английский

Процитировано

0

Optimal Transportation System Based on Adaptive Federated Learning Techniques for Healthcare IoV (HIoV) DOI

Pallati Narsimhulu,

Rashmi Sahay, Premkumar Chithaluru

и другие.

Опубликована: Дек. 13, 2024

The advent of the Healthcare Internet Vehicles (HIoV) has revolutionized transportation systems, ushering in a new era smart mobility. However, to fully harness potential HIoV, efficient and adaptive control techniques are imperative. This book chapter delves into optimization systems through integration Adaptive Federated Learning (FL) techniques. primary challenge addressed is need for real-time, mechanisms HIoV environments. aims explore develop an innovative approach optimize systems. By employing FL techniques, objective create adaptable intelligent HIoVs. What sets this apart its pioneering use methods novelty lies development adaptable, that enhance safety, efficiency, user experience. provides insights It offers analysis impact on system adaptability, real-time decision-making, overall efficiency HIoVs dynamic

Язык: Английский

Процитировано

0

The Role of Blockchain, IoT and AR in Future Healthcare: A Review DOI Creative Commons

Richard Aggrey -,

Emmanuel Adjirachor -,

Bismark Adjei

и другие.

International Journal For Multidisciplinary Research, Год журнала: 2024, Номер 6(6)

Опубликована: Дек. 20, 2024

The healthcare industry is on the border of technological revolution that unites tech, Internet Things (IoT), Augmented Reality (AR), and Blockchain. Blockchain provides a transparent method for storing exchanging records, which boosts data integrity compatibility among systems. At same time, IoT gadgets allow real-time tracking patient health indicators, aiding in prompt intervention tailored treatment plans. Meanwhile, AR can elevate medical training sessions surgical processes involvement. Providers streamline cut expenses by blending these advancements incorporating them into operations. most exciting aspect potential to significantly enhance outcomes. Nevertheless, there are obstacles overcome, like safeguarding privacy, maintaining cybersecurity navigating through requirements before fully be harnessed their maximum potential.

Язык: Английский

Процитировано

0

Hybrid key management WSN protocol to enhance network performance using ML Techniques for IoT application in cloud Environment DOI Creative Commons

M. Raghini,

Selvam Durairaj,

S. Sasikala

и другие.

Research Square (Research Square), Год журнала: 2024, Номер unknown

Опубликована: Май 15, 2024

Abstract As the Internet of Things (IoT) develops, Wireless Sensor Networks (WSNs) must be used to collect and transmit critical data. Ensuring security efficiency these networks is paramount, given sheer volume sensitivity data they handle. This paper introduces a novel hybrid key management protocol for WSNs in IoT applications, integrating cloud services harnessing Machine Learning (ML) techniques enhance network performance security. The proposed leverages strengths symmetric asymmetric essential methods, providing robust foundation securing communication within WSN. It also capitalizes on cloud-based services’ scalability centralized capabilities streamline distribution facilitate network-wide updates. are seamlessly integrated into protocol, enabling predictive distribution, anomaly detection, dynamic management, intelligent load balancing. By analyzing historical patterns, ML algorithms predict optimal times locations updates, reducing overhead enhancing Additionally, ML-based detection empowers identify respond irregularities potential breaches. framework combines integration, intelligence Learning, resulting highly adaptable efficient IoT-enabled WSNs. enhanced by using exiting algorithms.

Язык: Английский

Процитировано

0

Enhancing Data Center Efficiency with Docker & Kubernetes: Industry 4.0 Container-as-a-Service (CAAS) for IoE Cloud Technology DOI

Ratnesh Kumar,

Jaspreet Singh,

K. Martin Sagayam

и другие.

Опубликована: Ноя. 13, 2024

Язык: Английский

Процитировано

0