4.7 Article

Orchestrating product provenance story: When IOTA ecosystem meets electronics supply chain space

Journal

COMPUTERS IN INDUSTRY
Volume 123, Issue -, Pages -

Publisher

ELSEVIER
DOI: 10.1016/j.compind.2020.103334

Keywords

Blockchain; Distributed Ledger Technology; Internet of Things; Industrial Internet of Things; Industry 4; 0; IOTA; Masked Authenticated Messaging; Provenance; Supply chain; Trustworthy data

Ask authors/readers for more resources

Trustworthy data is the fuel for ensuring transparent traceability, precise decision-making, and cogent coordination in the Supply Chain (SC) space. However, the disparate data silos act as a trade barrier in orchestrating the provenance of the product lifecycle; starting from the raw materials to end products available for customers. Besides product traceability, the legacy SCs face several other problems including data validation, data accessibility, security, and privacy issues. In this regard, Blockchain-an advanced Distributed Ledger Technology (DLT) works well to address these challenges by linking fragmented and siloed SC events in an immutable audit trail. However, the underlying challenges with blockchain such as scalability, inability to access off-line data, vulnerability to quantum attacks, and high transaction fees necessitate a new solution to overcome the inefficiencies of the current blockchain design. In this regard, IOTA (the third generation of DLT) leverages a Directed Acyclic Graph (DAG)-based data structure in contrast to linear data structure of blockchain to address such challenges and facilitate a scalable, quantum-resistant, and miner-free solution for the Internet of Things (IoT). After realizing the crucial requirement of traceability and considering the limitations of blockchain in SC, in this work, we propose a provenance-enabled framework for the Electronics Supply Chain (ESC) through a permissioned IOTA ledger. To that end, we construct a transparent product ledger based on trade event details along with time-stamped SC processes to identify operational disruptions or counterfeiting issues. We further exploit the Masked Authenticated Messaging (MAM) protocol provided by IOTA that allows the SC players to procure distributed information while keeping confidential trade flows, ensuring restrictions on data retrieval, and facilitating the integration of fine-grained or coarse-grained data accessibility. Our experimental results show that the time required to construct secure provenance data aggregated from multiple SC entities takes 3 s (on average) for a local node and 4 s for a remote node, which is justifiable. Furthermore, we perform experiments on Raspberry Pi 3B to verify that the estimated energy consumption at resource-constrained devices is tolerable while implementing the proposed scheme. (c) 2020 Elsevier B.V. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Information Systems

Toward Multiple Federated Learning Services Resource Sharing in Mobile Edge Networks

Minh N. H. Nguyen, Nguyen H. Tran, Yan Kyaw Tun, Zhu Han, Choong Seon Hong

Summary: This paper investigates multiple federated learning service models on edge computing servers, involving resource allocation and hyper-learning rate control for local training and learning information exchange. Centralized and decentralized algorithms are proposed to solve this problem, and simulation results show the superior performance of the algorithms.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2023)

Article Computer Science, Information Systems

A Digital Processing in Memory Architecture Using TCAM for Rapid Learning and Inference Based on a Spike Location Dependent Plasticity

Seong Min Kim, Kyeong Min Kim, Ji Hoon Choi, Seung Man Kang, Min Kyung Bang, So Hee Park, Eon Gyeong Lee, Seong Bae Park, Choong Seon Hong, Sang Hoon Hong

Summary: In this paper, a digital processing in memory (DPIM) is presented, configured as a stride edge-detection search frequency neural network (SE-SFNN) trained through spike location dependent plasticity (SLDP). By employing a ternary data scheme and a two-layer format of ternary content addressable memory (TCAM), the computation time is significantly reduced. Additionally, a method to decrease the TCAM memory size is proposed, achieving a reduction of 84.4% in required memory size while maintaining an accuracy decrease of only 1.12%.

IEEE ACCESS (2023)

Article Computer Science, Information Systems

FL-Incentivizer: FL-NFT and FL-Tokens for Federated Learning Model Trading and Training

Umer Majeed, Latif U. Khan, Sheikh Salman Hassan, Zhu Han, Choong Seon Hong

Summary: This paper proposes a smart contract-based framework called FL-Incentivizer, which addresses the issues of flow governance and incentivization in distributed learning. The framework commercializes and tokenizes the global model using FL-NFT and FL-Token based on the ERC-721 and ERC-20 standards, respectively. The implementation includes showcasing the trading of FL-NFT on OpenSea and the transfer of FL-Tokens through MetaMask.

IEEE ACCESS (2023)

Article Computer Science, Information Systems

Dependency Tasks Offloading and Communication Resource Allocation in Collaborative UAV Networks: A Metaheuristic Approach

Loc X. Nguyen, Yan Kyaw Tun, Tri Nguyen Dang, Yu Min Park, Zhu Han, Choong Seon Hong

Summary: Nowadays, UAVs-assisted MEC systems are being used to provide computation services to mobile users outside terrestrial networks. Limited capacity and battery life of standalone UAVs make it challenging to meet the computation requirement of numerous users. To address this, a collaborative scheme among UAVs is proposed to share workload and optimize latency and transmission rates for dependency tasks.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Computer Science, Information Systems

Privacy preservation in the internet of vehicles using local differential privacy and IOTA ledger

Zainab Iftikhar, Adeel Anjum, Abid Khan, Munam Ali Shah, Gwanggil Joen

Summary: With the growth of VANET technology, data generated by communication among vehicular devices and edge nodes becomes massive. Privacy preservation is a major challenge due to the personal and sensitive information contained in the data. Most existing distributed privacy preserving solutions rely on third-party anonymization, but Local Differential Privacy (LDP) allows for local and individual data anonymization without a third party. In this work, a privacy preservation solution using LDP is proposed to address security and privacy threats. Additionally, a model incorporating IOTA ledger further enhances privacy and security in a complex and distributed network of vehicles.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2023)

Article Computer Science, Information Systems

Radio and Computing Resource Allocation in Co-Located Edge Computing: A Generalized Nash Equilibrium Model

Chit Wutyee Zaw, Nguyen H. Tran, Zhu Han, Choong Seon Hong

Summary: Mobile Network Operators (MNO) can reduce their CAPEX and OPEX by utilizing tower sharing and partnering with Computing Resource Providers (CRP) to expand their network coverage and provide Multi-access Edge Computing services. This paper formulates a resource allocation problem to minimize OPEX for both MNOs and CRP in the task offloading scenario, and proposes decentralized algorithms to solve it efficiently.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2023)

Article Computer Science, Hardware & Architecture

Runtime Testability on Autonomous System

Lok-Won Kim, Quang Hieu Vo, Choong Seon Hong

Summary: This article proposes a hardware architecture that extends the pre-deployment verification to the lifetime of the hardware systems, ensuring integrity and reliability. It also explains how to recover hardware functionalities compromised by runtime defects.

IEEE TRANSACTIONS ON RELIABILITY (2023)

Article Chemistry, Multidisciplinary

A Privacy-Enabled, Blockchain-Based Smart Marketplace

Bello Musa Yakubu, Majid Iqbal Khan, Abid Khan, Adeel Anjum, Madiha Haider Syed, Semeen Rehman

Summary: Advancements in sensor-enabled devices led to the emergence of resource trading models for smart communities, such as the smart marketplace (SMP). Most of the proposed SMP architectures are based on blockchain technology, which has a public ledger to achieve transparency. However, safeguarding the participant's anonymity, untraceability, and transactional data privacy during trading becomes a challenging task.

APPLIED SCIENCES-BASEL (2023)

Article Computer Science, Information Systems

Seamless and Energy-Efficient Maritime Coverage in Coordinated 6G Space-Air-Sea Non-Terrestrial Networks

Sheikh Salman Hassan, Do Hyeon Kim, Yan Kyaw Tun, Nguyen H. H. Tran, Walid Saad, Choong Seon Hong

Summary: This study investigates the design of an energy-efficient resource allocation system for non-terrestrial networks (NTNs) that integrates space and aerial networks with terrestrial systems. The goal is to maximize system energy efficiency by optimizing user equipment association, power control, and unmanned aerial vehicle deployment. The study proposes a mixed-integer nonlinear programming problem and develops an algorithm to decompose and solve each problem distributedly. Simulation results demonstrate that the algorithm achieves better energy efficiency and spectral efficiency than baselines.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Computer Science, Hardware & Architecture

Decentralized Receiver-based Link Stability-aware Forwarding Scheme for NDN-based VANETs

Waseeq Ul Islam Zafar, Muhammad Atif Ur Rehman, Farhana Jabeen, Rehmat Ullah, Ghulam Abbas, Abid Khan

Summary: This paper discusses the importance of inter-vehicle communication in VANETs and the use of NDN as the underlying protocol. It proposes a decentralized receiver-based link stability-aware forwarding (DRLSF) protocol to address the challenges faced. The DRLSF protocol is suitable for pull-based applications.

COMPUTER NETWORKS (2023)

Article Telecommunications

Deep Reinforcement Learning for Channel Estimation in RIS-Aided Wireless Networks

Kitae Kim, Yan Kyaw Tun, Md. Shirajum Munir, Walid Saad, Choong Seon Hong

Summary: Accurate channel estimation and allocation are crucial for delivering RIS-aided wireless network services. A new learning-based method is proposed for channel estimation in RIS systems, which uses a limited number of pilot signals trained in a masked autoencoder (MAE) to achieve high accuracy. Furthermore, a deep reinforcement learning (DRL) agent learns pilot allocation policies through MAE, resulting in higher channel estimation performance with fewer pilots than conventional methods.

IEEE COMMUNICATIONS LETTERS (2023)

Article Engineering, Electrical & Electronic

Ruin Theory for User Association and Energy Optimization in Multi-Access Edge Computing

Do Hyeon Kim, Aunas Manzoor, Madyan Alsenwi, Yan Kyaw Tun, Walid Saad, Choong Seon Hong

Summary: This paper proposes a novel framework for analyzing data offloading in a multi-access edge computing system, which includes an algorithm with two key phases. The first phase utilizes ruin theory to handle user association, taking into account their transmission reliability and resource utilization efficiency. The second phase employs an optimization-based algorithm to optimize the data offloading process and minimize users' energy consumption.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2023)

Review Chemistry, Analytical

Data Provenance in Healthcare: Approaches, Challenges, and Future Directions

Mansoor Ahmed, Amil Rohani Dar, Markus Helfert, Abid Khan, Jungsuk Kim

Summary: Data provenance is a method of recording data origins and the history of data generation and processing. In healthcare, it is important to implement data provenance to track the sources and reasons behind any issues with user data. This systematic review explores the impacts of data provenance in healthcare and GDPR-compliance-based data provenance, discussing the technologies and methodologies used to achieve it. The study identifies research gaps and suggests future directions.

SENSORS (2023)

Article Computer Science, Information Systems

A Contract-Theory-Based Incentive Mechanism for UAV-Enabled VR-Based Services in 5G and Beyond

Tri Nguyen Dang, Aunas Manzoor, Yan Kyaw Tun, S. M. Ahsan Kazmi, Zhu Han, Choong Seon Hong

Summary: The proliferation of novel infotainment services, such as virtual reality (VR)-based services, has led to a burden of data traffic in existing mobile networks. To overcome this, multiaccess edge computing (MEC) can be used to bring resources to the edge and unmanned aerial vehicles (UAVs) can be utilized as micro-base stations (UBSs) to expand service areas and improve spectrum efficiency. An incentive mechanism based on contract theory is proposed to encourage UAVs to participate in MEC services. Numerical findings show that this approach outperforms linear pricing (LP) techniques in terms of social welfare and fairness.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Computer Science, Artificial Intelligence

Self-Organizing Democratized Learning: Toward Large-Scale Distributed Learning Systems

Minh N. H. Nguyen, Shashi Raj Pandey, Tri Nguyen Dang, Eui-Nam Huh, Nguyen H. Tran, Walid Saad, Choong Seon Hong

Summary: This article introduces a distributed learning approach based on the philosophy of democratized learning (Dem-AI), which includes a self-organizing hierarchical structuring mechanism and solutions for hierarchical generalized learning problems. Experimental results show that the proposed algorithm outperforms conventional federated learning algorithms in the generalization performance of learning models in agents.

IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS (2023)

Article Computer Science, Interdisciplinary Applications

A human-centric system combining smartwatch and LiDAR data to assess the risk of musculoskeletal disorders and improve ergonomics of Industry 5.0 manufacturing workers

Francesco Pistolesi, Michele Baldassini, Beatrice Lazzerini

Summary: More than one in four workers worldwide suffer from back pain, resulting in the loss of 264 million work days annually. In the U.S., it costs $50 billion in healthcare expenses each year, rising up to $100 billion when accounting for decreased productivity and lost wages. The impending Industry 5.0 revolution emphasizes worker well-being and their rights, such as privacy, autonomy, and human dignity. This paper proposes a privacy-preserving artificial intelligence system that monitors the posture of assembly line workers. The system accurately assesses upper-body and lower-body postures while respecting privacy, enabling the detection of harmful posture habits and reducing the likelihood of musculoskeletal disorders.

COMPUTERS IN INDUSTRY (2024)

Article Computer Science, Interdisciplinary Applications

Smart PSS modelling language for value offer prototyping: A design case study in the field of heating appliance offers

Xavier Boucher, Camilo Murillo Coba, Damien Lamy

Summary: This paper explores the new business strategies of digital servitization and smart PSS delivery, and develops conceptual prototypes of smart PSS value offers for early stages of the design process. It presents the development and experimentation of a modelling language and toolkit, and applies it to the design of a smart PSS in the field of heating appliances.

COMPUTERS IN INDUSTRY (2024)

Article Computer Science, Interdisciplinary Applications

A methodological and theoretical framework for implementing explainable artificial intelligence (XAI) in business applications

Dieudonne Tchuente, Jerry Lonlac, Bernard Kamsu-Foguem

Summary: Artificial Intelligence (AI) is becoming increasingly important in various sectors of society. However, the black box nature of most AI techniques such as Machine Learning (ML) hinders their practical application. This has led to the emergence of Explainable artificial intelligence (XAI), which aims to provide AI-based decision-making processes and outcomes that are easily understood, interpreted, and justified by humans. While there has been a significant amount of research on XAI, there is currently a lack of studies on its practical applications. To address this research gap, this article proposes a comprehensive review of the business applications of XAI and a six-step framework to improve its implementation and adoption by practitioners.

COMPUTERS IN INDUSTRY (2024)

Article Computer Science, Interdisciplinary Applications

Deep reinforcement learning for continuous wood drying production line control

Francois-Alexandre Tremblay, Audrey Durand, Michael Morin, Philippe Marier, Jonathan Gaudreault

Summary: Continuous high-frequency wood drying, integrated with a traditional wood finishing line, improves the value of lumber by correcting moisture content piece by piece. Using reinforcement learning for continuous drying operation policies outperforms current industry methods and remains robust to sudden disturbances.

COMPUTERS IN INDUSTRY (2024)

Article Computer Science, Interdisciplinary Applications

Semantic knowledge-driven A-GASeq: A dynamic graph learning approach for assembly sequence optimization

Luyao Xia, Jianfeng Lu, Yuqian Lu, Wentao Gao, Yuhang Fan, Yuhao Xu, Hao Zhang

Summary: Efficient assembly sequence planning is crucial for enhancing production efficiency, ensuring product quality, and meeting market demands. This study proposes a dynamic graph learning algorithm called assembly-oriented graph attention sequence (A-GASeq), which optimizes the assembly graph structure to guide the search for optimal assembly sequences. The algorithm demonstrates superiority and broad utility in real-world scenarios.

COMPUTERS IN INDUSTRY (2024)

Article Computer Science, Interdisciplinary Applications

Fundamental requirements of a machine learning operations platform for industrial metal additive manufacturing

Mutahar Safdar, Padma Polash Paul, Guy Lamouche, Gentry Wood, Max Zimmermann, Florian Hannesen, Christophe Bescond, Priti Wanjara, Yaoyao Fiona Zhao

Summary: Metal-based additive manufacturing can achieve fully dense metallic components, and the application of machine learning in this field has been growing rapidly. However, there is a lack of framework to manage these machine learning models and guidance on the fundamental requirements for a cross-disciplinary platform to support process-based machine learning models in industrial metal AM.

COMPUTERS IN INDUSTRY (2024)