Abstract:The Internet of Things (IoT) is getting important and interconnected technologies of the world, consisting of sensor devices. The internet is smoothly changing from an internet of people towards an Internet of Things, which permits various objects to connect to another wirelessly. The energy consumption of the IoT routing protocol can affect the network life span. In addition, the high volume of data produced by IoT will result in transmission collision, security issues, and energy dissipation due to increased… Show more
“…However, it is worth mentioning that the Poisson arrival and exponential service time have been adopted in the literature to get an appropriate approximation of real systems. As stated in [59], [60], [61], [63], [64], [65], [66], [67] considering blockchain IoT integration would result in latent responses and diminished throughput. It's also difficult to discover a viable method for delivering blockchain solutions in order to build a trustless society with minimal changes to the existing IoT ecosystem.…”
Recently researchers and companies have shown significant interest in merging blockchain and the Internet of Things (IoT) to create a safe, reliable, and resilient communication platform. However, determining the proper role of blockchain in existing IoT contexts with minimum implications is a challenge. This work suggests a message schedule for a blockchain-based architecture with two access-level setting filters for incoming messages: critical and non-critical. The proposed work of the researchers divides the fog layer into two parts: action clusters and blockchain fog clusters. Similar to the three-layered IoT architecture, the action cluster and the main cloud data center work together for critical message requests. The blockchain fog cluster is dedicated to only the blockchain application's requirements. In the fog layer, a fog broker is used to schedule critical and non-critical messages in the action and blockchain fog clusters, respectively. The proposed technique is compared to the existing Dual Fog-IoT architecture. The solution is also tested for fog and cloud computing resource utilization. The findings demonstrate that this architecture is feasible for varying percentages of receiving critical and non-critical messages. In addition to the inherent benefits of blockchain, the suggested paradigm reduces the system loss rate and offloads the cloud data center with minimal changes to the existing IoT ecosystem.INDEX TERMS Internet of Things (IoT), Message Scheduling, Wireless Sensor Networks, Fog Computing.
“…However, it is worth mentioning that the Poisson arrival and exponential service time have been adopted in the literature to get an appropriate approximation of real systems. As stated in [59], [60], [61], [63], [64], [65], [66], [67] considering blockchain IoT integration would result in latent responses and diminished throughput. It's also difficult to discover a viable method for delivering blockchain solutions in order to build a trustless society with minimal changes to the existing IoT ecosystem.…”
Recently researchers and companies have shown significant interest in merging blockchain and the Internet of Things (IoT) to create a safe, reliable, and resilient communication platform. However, determining the proper role of blockchain in existing IoT contexts with minimum implications is a challenge. This work suggests a message schedule for a blockchain-based architecture with two access-level setting filters for incoming messages: critical and non-critical. The proposed work of the researchers divides the fog layer into two parts: action clusters and blockchain fog clusters. Similar to the three-layered IoT architecture, the action cluster and the main cloud data center work together for critical message requests. The blockchain fog cluster is dedicated to only the blockchain application's requirements. In the fog layer, a fog broker is used to schedule critical and non-critical messages in the action and blockchain fog clusters, respectively. The proposed technique is compared to the existing Dual Fog-IoT architecture. The solution is also tested for fog and cloud computing resource utilization. The findings demonstrate that this architecture is feasible for varying percentages of receiving critical and non-critical messages. In addition to the inherent benefits of blockchain, the suggested paradigm reduces the system loss rate and offloads the cloud data center with minimal changes to the existing IoT ecosystem.INDEX TERMS Internet of Things (IoT), Message Scheduling, Wireless Sensor Networks, Fog Computing.
“…Only a tiny amount of study has developed a federated security model that integrates different international approaches [44]. Machine learning techniques identify resource allocation, security and privacy, communication cost, localization of malicious nodes, and enhancing network lifetime in IoT-based WSNs [45]. Some of the learning techniques utilized in this work include a support vector machine, XGBoost, random forest, and ensemble stacking to improve the performance and evaluate the effectiveness of the proposed system using various evaluation metrics.…”
Section: Sensor Nodesmentioning
confidence: 99%
“…Wireless Communications and Mobile Computing effective data aggregation using the trust values of the beacon nodes for improved network lifetime compared to Ahmed et al [45]. Mahmood and Jusas [65] proposed blockchain-enabled federated learning for data security and privacy in IoT-WSNs and decentralized nodes and sent global data sharing and achieved average detection accuracy of 95%.…”
Wireless sensor networks are the core of the Internet of Things and are used in healthcare, locations, the military, and security. Threats to the security of wireless sensor networks built on the Internet of Things (IoT-WSNs) can come from a variety of sources. This study proposes secure attack localization and detection in IoT-WSNs to improve security and service delivery. The technique used blockchain-based cascade encryption and trust evaluation in a hierarchical design to generate blockchain trust values before beacon nodes broadcast data to the base station. Simulation results reveal that cascading encryption and feature assessment measure the trust value of nodes by rewarding each other for service provisioning and trust by removing malicious nodes that reduce localization accuracy and quality of service in the network. Federated machine learning improves data security and transmission by merging raw device data and placing malicious threats in the blockchain. Malicious nodes are classified through federated learning. Federated learning combines hybrid random forest, gradient boost, ensemble learning,
K
-means clustering, and support vector machine approaches to classify harmful nodes via a feature assessment process. Comparing the proposed system to current ones shows an average detection and classification accuracy of 100% for binary and 99.95% for multiclass. This demonstrates that the suggested approach works well for large-scale IoT-WSNs, both in terms of performance and security, when utilizing heterogeneous wireless senor networks for the providing of secure services.
“…An energy-efficient data aggregation model [26] for IoT secured by Blockchain is proposed for the security of the IoT based devices and edge node is introduce to increase the response time. Much literature on the SWIPT system is implemented based on the time switching and power splitting algorithms.…”
A software-defined vehicular network is made up of an IoT (Internet of Things) based vehicular ad-hoc network and a software-defined network. For better communication in IoT based vehicle networks, researchers are now working on the VANET (Vehicular Ad-hoc Network) to increase the overall system performance. To maximize the VANET ad-hoc network's information application performance and reliability, edge computing has gained the attention of researchers. In current research, cloud computing is used for message related task execution, which increases the response time. We propose a Software-defined Fault Tolerance and QoS-Aware (Quality of Service) IoT-Based Vehicular Networks Using Edge Computing Secured by Blockchain to reduce overall communication delay, message failure fault tolerance, and secure service provisioning for VANET ad-hoc networks in this article. We proposed heuristic algorithms to solve the above mentioned problems of response delay, message failure, fault tolerance, and security provided by the Blockchain. The proposed model gets vehicle messages through SDN (Software defined network) nodes, which are placed on nearby edge servers, and the edge servers are validated by the blockchain to provide secure services to vehicles. The SDN controller, which exists on an edge server, which is placed on the road side to overcome communication delays, receives different messages from the vehicles and divides these messages in to two different categories. The message division is performed by the edge server by judging the time line, size, and emergency situation. SDN controller organized these messages and forwarded them to their destination. After the message is delivered to its destination, a fault tolerance mechanism checks their acknowledgements. If the message delivery fails, the fault tolerance algorithm will resend the failure message. The proposed model is implemented using a custom simulator and compared with the latest VANET based QoS and fault tolerance models. The result shows the performance of the proposed model, which decreased the overall message communication delay by 55% of the normal and emergency messages by using the edge server SDN controller. Furthermore, the proposed model reduces the execution time, security risk, and message failure ratio by using the edge server, cloud server and blockchain infrastructure.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.