2017 3rd International Conference on Advances in Computing,Communication &Amp; Automation (ICACCA) (Fall) 2017
DOI: 10.1109/icaccaf.2017.8344726
|View full text |Cite
|
Sign up to set email alerts
|

Fog-based enhanced safety management system for miners

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
4
3

Relationship

3
4

Authors

Journals

citations
Cited by 15 publications
(3 citation statements)
references
References 2 publications
0
3
0
Order By: Relevance
“…This approach uses a blockchain-based architecture to give a demand response solution. This solution included Fog-Enabled Intelligent Devices (FEID) [36] at the user side (act as a blockchain node) and managed smart contracts with the energy producer [36] in cloud computing platform [37], [38]. Then, a group of energy users combined into a centralized Virtual Node.…”
Section: Responsementioning
confidence: 99%
“…This approach uses a blockchain-based architecture to give a demand response solution. This solution included Fog-Enabled Intelligent Devices (FEID) [36] at the user side (act as a blockchain node) and managed smart contracts with the energy producer [36] in cloud computing platform [37], [38]. Then, a group of energy users combined into a centralized Virtual Node.…”
Section: Responsementioning
confidence: 99%
“…48 As third-party administrators operate the cloud service, they are the chances of data manipulation and data misuse and it generates a problem of security and privacy in the IoT. 49 For overcoming the difficulties that exist in the IoT, this triggers for blockchain integration with IoT. Blockchain can authenticate the devices, improve storage capability of IoT, reduce the data manipulation, and provide the security to the cloud server.…”
Section: Internet Of Thingsmentioning
confidence: 99%
“…The inherent limitations of centralization through third-party service providers form a closed system as users cannot interact with the external environment, thereby reducing the versatility of modern CPS applications. However, with the rise in edge/fog computing, users can store, retrieve, and access their data securely over mobile devices through wireless communication infrastructures [8]. Decentralized applications also mitigate the requirement of third-party service providers and edge/fog computing reduces the overall latency in communications [9].…”
Section: Introductionmentioning
confidence: 99%