AI-Enabled Threat Detection and Security Analysis for Industrial IoT 2021
DOI: 10.1007/978-3-030-76613-9_4
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain Applications in the Industrial Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
1
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 149 publications
0
1
0
Order By: Relevance
“…The works discussed in this review [17][18][19][20][21][22][23][24][25][26] present reductions in energy consumption in relation to reference works in the literature, according to Table 1. Since some nodes may be highly requested to transmit data or messages to mobile devices, their energy levels may be quickly depleted.…”
Section: Resultsmentioning
confidence: 97%
See 3 more Smart Citations
“…The works discussed in this review [17][18][19][20][21][22][23][24][25][26] present reductions in energy consumption in relation to reference works in the literature, according to Table 1. Since some nodes may be highly requested to transmit data or messages to mobile devices, their energy levels may be quickly depleted.…”
Section: Resultsmentioning
confidence: 97%
“…The HPDMS technique [24] employs two methods to balance collection delays and energy consumption. The first, KMACO-DH, uses k-medoids to organize the sensors into clusters and ant colony-based optimization (ACO) to calculate a route between CHs, to be traversed by the mobile sink.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…To protect communication channels while the data is exchanged, for example, production records, processing information, supply chain, and data sharing details, record management, organization, optimization, and computation; these issues consider one of the challenging aspects in the current IIoT. In this scenario, the individual information must check against and analyzed before being preserved in the distributed storage [96]. In addition, the most critical prospect is to structure preserved records in the blockchain network.…”
Section: Distributed Preservation and Privacy Issuesmentioning
confidence: 99%