2023
DOI: 10.20944/preprints202306.1159.v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Blockchain Protocols & Edge Computing Targeting Industry 5.0 Needs

Abstract: "Industry 5.0” is the latest industrial revolution. A variety of cutting-edge technologies, including artificial intelligence, the Internet of Things (IoT), and others, come together to form it. This new era will bring about significant changes in the way businesses operate, allowing them to become more cost-effective, more efficient, and produce higher-quality goods and services. Because sen-sors are getting better, 5G networks are being put in place, and more industrial equipment and machinery are b… Show more

Help me understand this report
View published versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 10 publications
(12 reference statements)
0
0
0
Order By: Relevance
“…In centralization, a platform is totally based on vulnerability due to client-server architecture that causes the system to attack by means the malicious actor can exploit. It is worth noting that the need for a trusted hierarchy is mandatory that is yet to be involved in this infrastructure [96], [97]. The absence of a trusted environment in a trustless platform can make the ecosystem more challenging in terms of identifying and analyzing privacy-related breaches.…”
Section: A Intrusion Trustworthiness and Modernizationmentioning
confidence: 99%
See 1 more Smart Citation
“…In centralization, a platform is totally based on vulnerability due to client-server architecture that causes the system to attack by means the malicious actor can exploit. It is worth noting that the need for a trusted hierarchy is mandatory that is yet to be involved in this infrastructure [96], [97]. The absence of a trusted environment in a trustless platform can make the ecosystem more challenging in terms of identifying and analyzing privacy-related breaches.…”
Section: A Intrusion Trustworthiness and Modernizationmentioning
confidence: 99%
“…In recent times, Industrial IoT devices have generally been considered secure and protected, but it is worth noting that they are not as secure as the blockchain infrastructure [97], [98]. It is due to the weak interconnectivity between node-tonode, which makes them vulnerable and raises security breaches.…”
Section: B Previously Published State-of-the-art Evaluation and Discu...mentioning
confidence: 99%