2022
DOI: 10.1109/jiot.2022.3162499
|View full text |Cite
|
Sign up to set email alerts
|

A Redactable Blockchain Framework for Secure Federated Learning in Industrial Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
15
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
10

Relationship

0
10

Authors

Journals

citations
Cited by 41 publications
(20 citation statements)
references
References 33 publications
0
15
0
Order By: Relevance
“…Since the 1980s, the impact of biotechnology and information technology has increased the complexity of technology, made R&D more difficult, increased the complexity and risk of innovation, and shortened the iteration cycle of technology and market. As a result, enterprises need more resources to support their innovation and a stronger ability to take risks and uncertainties at a later stage, and they are gradually moving from fighting alone to joining with other enterprises to form a group [13]. The phenomenon of information silos in the supply chain has increased the backlog of inventory and the difficulty of supply chain system management.…”
Section: Related Workmentioning
confidence: 99%
“…Since the 1980s, the impact of biotechnology and information technology has increased the complexity of technology, made R&D more difficult, increased the complexity and risk of innovation, and shortened the iteration cycle of technology and market. As a result, enterprises need more resources to support their innovation and a stronger ability to take risks and uncertainties at a later stage, and they are gradually moving from fighting alone to joining with other enterprises to form a group [13]. The phenomenon of information silos in the supply chain has increased the backlog of inventory and the difficulty of supply chain system management.…”
Section: Related Workmentioning
confidence: 99%
“…On the basis of analyzing the key information of each link of the rice supply chain, Wang et al [ 36 ] constructed a blockchain-based rice supply chain information supervision model and adopted a hierarchical data encryption storage model to ensure the security and privacy of data in the process of circulation and storage. Aiming to solve the problem that model updates in FL are easily tampered by malicious agents, Wei et al [ 37 ] proposed an efficient chameleon hash scheme for secure federation learning in Industrial Internet of Things. To address the security of the key used for encryption and decryption of industrial IoT data, Yu et al [ 38 ] proposed a blockchain-based threshold encryption protection scheme for IIOT data, which uses the private key of the edge gateway to protect the symmetric key.…”
Section: Related Workmentioning
confidence: 99%
“…Then, slicing software is utilized to slice the 3D models according to the parameters of the parts. On this basis, the computer algorithms are used to precisely connect each layer FIGURE 1: A typical example that illustrates scenarios of robust visual SLAM for additive manufacturing to form a layer stack to quickly realize the additive manufacturing of parts [16], [17]. Contemporarily, the application of additive manufacturing technology has bee more and more general in the automotive industry [18], [19],liu2022human.…”
Section: Introductionmentioning
confidence: 99%