Article
Computer Science, Interdisciplinary Applications
Shahid Latif, Zeba Idrees, Jawad Ahmad, Lirong Zheng, Zhuo Zou
Summary: This paper presents a blockchain-based secure and trustworthy architecture for industrial IoT, utilizing lightweight private blockchain, real-time cryptographic algorithms, and highly scalable consensus mechanism.
JOURNAL OF INDUSTRIAL INFORMATION INTEGRATION
(2021)
Article
Computer Science, Information Systems
Ashish Tomar, Niraj Gupta, Divya Rani, Sachin Tripathi
Summary: IoT devices in healthcare generate diverse data, which can be monitored in real-time by healthcare professionals through medical sensors and transmitted to cloud servers for analysis. However, the wireless communication channels of these devices are vulnerable to security threats. To address these concerns, a blockchain-based protocol called BIoMTAKE is proposed to establish a distributed and secure environment without relying on a single trusted authority. The protocol ensures authenticated access to IoMT data and has been rigorously analyzed for security and efficiency.
INTERNET OF THINGS
(2023)
Article
Computer Science, Information Systems
Mays Alshaikhli, Tarek Elfouly, Omar Elharrouss, Amr Mohamed, Najmath Ottakath
Summary: Internet of Things (IoT) has become a new paradigm with interconnected devices in various applications. The use of traditional security mechanisms is not sufficient to address the security risks associated with IoT, thus Distributed Ledger Technology (DLT) emerges as a potential solution to mitigate these risks.
Article
Automation & Control Systems
Muhammad Habib ur Rehman, Ahmed Mukhtar Dirir, Khaled Salah, Ernesto Damiani, Davor Svetinovic
Summary: Cross-device federated learning systems use the blockchain-based framework TrustFed to detect model poisoning attacks, enable fair training settings, and maintain device reputation, resulting in better outcomes compared to conventional approaches.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2021)
Article
Computer Science, Information Systems
Jing Huey Khor, Michail Sidorov, Peh Yee Woon
Summary: This study delves into the challenges faced by existing public blockchains with IoT device integration, including resource-constrained IoT device classification, wireless communication protocols, and challenges for successful integration. Solutions are proposed and possible security attacks on the blockchain network are thoroughly reviewed. A list of important characteristics required for integrating public blockchains with resource-constrained IoT networks and specific requirements for IoT end nodes is provided.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Computer Science, Information Systems
Jin Wang, Boyang Wei, Jingyu Zhang, Xiaofeng Yu, Pradip Kumar Sharma
Summary: Blockchain technology can provide a new security solution for the Industrial Internet of Things (IIoT), but the current Merkle tree storage structure is not efficient for transactions requiring frequent verification in IIoT systems.
Article
Computer Science, Information Systems
Haoyu Gao, Leixiao Li, Xiangyang Chang, Jianxiong Wan, Jie Li, Jinze Du, Xiaoxu Zhang
Summary: This article introduces a new type of botnet called BlockchainBot, which leverages IoT devices as maintainers and integrates blockchain technology. It overcomes the weaknesses of traditional P2P botnets and has strong security and performance.
Review
Health Care Sciences & Services
Hanaa Fatoum, Sam Hanna, John D. Halamka, Douglas C. Sicker, Peter Spangenberg, Shahrukh K. Hashmi
Summary: This article explores the importance and role of blockchain technology in healthcare. Blockchain can address key issues in healthcare data management, such as privacy and security, and has promising applications in areas like clinical trial management and electronic health records. It has the potential to be a key catalyst for healthcare innovations.
JOURNAL OF MEDICAL INTERNET RESEARCH
(2021)
Article
Computer Science, Information Systems
Soumyashree S. Panda, Debasish Jena, Bhabendu Kumar Mohanta, Somula Ramasubbareddy, Mahmoud Daneshmand, Amir H. Gandomi
Summary: This article proposes a Blockchain-based distributed IoT architecture using hash chains for secure key management to ensure data privacy and provide a secure communication environment. It also introduces a secure and efficient key generation and management scheme for mutual authentication between communication entities, utilizing a one-way hash chain technique to provide a set of public and private key pairs to IoT devices. The experimental analysis confirms the superior performance of the proposed scheme compared to conventional mechanisms.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Chemistry, Multidisciplinary
Chin-Ling Chen, Zi-Yi Lim, Hsien-Chou Liao, Yong-Yuan Deng
Summary: The proposed private security service scheme incorporates blockchain technology and smart contracts to ensure real-time monitoring and response to security events. It guarantees the authenticity, traceability, and integrity of security event records, with security analysis and encryption mechanisms in place to fend off known attacks. Additionally, an arbitration mechanism is provided to address potential disputes between private security companies and clients.
APPLIED SCIENCES-BASEL
(2021)
Article
Computer Science, Information Systems
Pranav Gangwani, Alexander Perez-Pons, Tushar Bhardwaj, Himanshu Upadhyay, Santosh Joshi, Leonel Lagos
Summary: This paper proposes advancing electronic environmental monitoring using blockchain technology. By utilizing the new distributed ledger technology IOTA for IoT, privacy and security issues can be addressed and secure data sharing can be provided. The use of the data communication protocol MAM can support the secure transmission, storage, and retrieval of environmental sensor data.
Article
Chemistry, Analytical
Amir Al Sadi, Carlo Mazzocca, Andrea Melis, Rebecca Montanari, Marco Prandini, Nicolo Romandini
Summary: The recent adoption of novel network technologies has significantly improved the customization of data packet processing. Among these technologies, the Programming Protocol-independent Packet Processors (P4) has emerged as a disruptive technology that enables highly customizable configuration of network devices. Blockchain-based distributed ledger technologies (DLTs), such as IOTA, can provide secure reporting alerts on malicious activities, but face scalability concerns. To overcome this, the article proposes an architecture that integrates a P4-based software-defined network (SDN) with an IOTA layer to detect and notify about network threats.
Article
Agriculture, Multidisciplinary
Miguel Pincheira, Massimo Vecchio, Raffaele Giaffreda, Salil S. Kanhere
Summary: This study explores incentivizing virtuous behaviors in agricultural practices through energy-efficient integration of IoT-based sensing and blockchains, using constrained sensing devices as trustworthy data sources. The research advances the State-of-the-Art in IoT and blockchain interactions, and demonstrates how the proposed architecture can be implemented with minimal additional energy budget, making it suitable for automated and incentive-based irrigation water management systems to increase sustainability in the agricultural sector.
COMPUTERS AND ELECTRONICS IN AGRICULTURE
(2021)
Article
Business
Scott Thiebes, Sebastian Lins, Ali Sunyaev
Summary: Artificial intelligence presents both opportunities and challenges, with Trustworthy AI emphasizing the importance of trust in its development and deployment. Its five foundational principles include beneficence, non-maleficence, autonomy, justice, and explicability. A data-driven research framework can help delineate fruitful avenues for future research in the realization of Trustworthy AI.
ELECTRONIC MARKETS
(2021)
Review
Computer Science, Information Systems
Denis Stefanescu, Leticia Montalvillo, Patxi Galan-Garcia, Juanjo Unzilla, Aitor Urbieta
Summary: The IoT has become crucial in society, but there are concerns about security, privacy and performance. Blockchain adoption in IoT is gaining interest, but limitations in power, storage and computation call for lightweight blockchain solutions. This research focuses on understanding technical aspects of blockchain for IoT to address security and performance issues.
Article
Computer Science, Information Systems
Minh N. H. Nguyen, Nguyen H. Tran, Yan Kyaw Tun, Zhu Han, Choong Seon Hong
Summary: This paper investigates multiple federated learning service models on edge computing servers, involving resource allocation and hyper-learning rate control for local training and learning information exchange. Centralized and decentralized algorithms are proposed to solve this problem, and simulation results show the superior performance of the algorithms.
IEEE TRANSACTIONS ON MOBILE COMPUTING
(2023)
Article
Computer Science, Information Systems
Seong Min Kim, Kyeong Min Kim, Ji Hoon Choi, Seung Man Kang, Min Kyung Bang, So Hee Park, Eon Gyeong Lee, Seong Bae Park, Choong Seon Hong, Sang Hoon Hong
Summary: In this paper, a digital processing in memory (DPIM) is presented, configured as a stride edge-detection search frequency neural network (SE-SFNN) trained through spike location dependent plasticity (SLDP). By employing a ternary data scheme and a two-layer format of ternary content addressable memory (TCAM), the computation time is significantly reduced. Additionally, a method to decrease the TCAM memory size is proposed, achieving a reduction of 84.4% in required memory size while maintaining an accuracy decrease of only 1.12%.
Article
Computer Science, Information Systems
Umer Majeed, Latif U. Khan, Sheikh Salman Hassan, Zhu Han, Choong Seon Hong
Summary: This paper proposes a smart contract-based framework called FL-Incentivizer, which addresses the issues of flow governance and incentivization in distributed learning. The framework commercializes and tokenizes the global model using FL-NFT and FL-Token based on the ERC-721 and ERC-20 standards, respectively. The implementation includes showcasing the trading of FL-NFT on OpenSea and the transfer of FL-Tokens through MetaMask.
Article
Computer Science, Information Systems
Loc X. Nguyen, Yan Kyaw Tun, Tri Nguyen Dang, Yu Min Park, Zhu Han, Choong Seon Hong
Summary: Nowadays, UAVs-assisted MEC systems are being used to provide computation services to mobile users outside terrestrial networks. Limited capacity and battery life of standalone UAVs make it challenging to meet the computation requirement of numerous users. To address this, a collaborative scheme among UAVs is proposed to share workload and optimize latency and transmission rates for dependency tasks.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Computer Science, Information Systems
Zainab Iftikhar, Adeel Anjum, Abid Khan, Munam Ali Shah, Gwanggil Joen
Summary: With the growth of VANET technology, data generated by communication among vehicular devices and edge nodes becomes massive. Privacy preservation is a major challenge due to the personal and sensitive information contained in the data. Most existing distributed privacy preserving solutions rely on third-party anonymization, but Local Differential Privacy (LDP) allows for local and individual data anonymization without a third party. In this work, a privacy preservation solution using LDP is proposed to address security and privacy threats. Additionally, a model incorporating IOTA ledger further enhances privacy and security in a complex and distributed network of vehicles.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS
(2023)
Article
Computer Science, Information Systems
Chit Wutyee Zaw, Nguyen H. Tran, Zhu Han, Choong Seon Hong
Summary: Mobile Network Operators (MNO) can reduce their CAPEX and OPEX by utilizing tower sharing and partnering with Computing Resource Providers (CRP) to expand their network coverage and provide Multi-access Edge Computing services. This paper formulates a resource allocation problem to minimize OPEX for both MNOs and CRP in the task offloading scenario, and proposes decentralized algorithms to solve it efficiently.
IEEE TRANSACTIONS ON MOBILE COMPUTING
(2023)
Article
Computer Science, Hardware & Architecture
Lok-Won Kim, Quang Hieu Vo, Choong Seon Hong
Summary: This article proposes a hardware architecture that extends the pre-deployment verification to the lifetime of the hardware systems, ensuring integrity and reliability. It also explains how to recover hardware functionalities compromised by runtime defects.
IEEE TRANSACTIONS ON RELIABILITY
(2023)
Article
Chemistry, Multidisciplinary
Bello Musa Yakubu, Majid Iqbal Khan, Abid Khan, Adeel Anjum, Madiha Haider Syed, Semeen Rehman
Summary: Advancements in sensor-enabled devices led to the emergence of resource trading models for smart communities, such as the smart marketplace (SMP). Most of the proposed SMP architectures are based on blockchain technology, which has a public ledger to achieve transparency. However, safeguarding the participant's anonymity, untraceability, and transactional data privacy during trading becomes a challenging task.
APPLIED SCIENCES-BASEL
(2023)
Article
Computer Science, Information Systems
Sheikh Salman Hassan, Do Hyeon Kim, Yan Kyaw Tun, Nguyen H. H. Tran, Walid Saad, Choong Seon Hong
Summary: This study investigates the design of an energy-efficient resource allocation system for non-terrestrial networks (NTNs) that integrates space and aerial networks with terrestrial systems. The goal is to maximize system energy efficiency by optimizing user equipment association, power control, and unmanned aerial vehicle deployment. The study proposes a mixed-integer nonlinear programming problem and develops an algorithm to decompose and solve each problem distributedly. Simulation results demonstrate that the algorithm achieves better energy efficiency and spectral efficiency than baselines.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Computer Science, Hardware & Architecture
Waseeq Ul Islam Zafar, Muhammad Atif Ur Rehman, Farhana Jabeen, Rehmat Ullah, Ghulam Abbas, Abid Khan
Summary: This paper discusses the importance of inter-vehicle communication in VANETs and the use of NDN as the underlying protocol. It proposes a decentralized receiver-based link stability-aware forwarding (DRLSF) protocol to address the challenges faced. The DRLSF protocol is suitable for pull-based applications.
Article
Telecommunications
Kitae Kim, Yan Kyaw Tun, Md. Shirajum Munir, Walid Saad, Choong Seon Hong
Summary: Accurate channel estimation and allocation are crucial for delivering RIS-aided wireless network services. A new learning-based method is proposed for channel estimation in RIS systems, which uses a limited number of pilot signals trained in a masked autoencoder (MAE) to achieve high accuracy. Furthermore, a deep reinforcement learning (DRL) agent learns pilot allocation policies through MAE, resulting in higher channel estimation performance with fewer pilots than conventional methods.
IEEE COMMUNICATIONS LETTERS
(2023)
Article
Engineering, Electrical & Electronic
Do Hyeon Kim, Aunas Manzoor, Madyan Alsenwi, Yan Kyaw Tun, Walid Saad, Choong Seon Hong
Summary: This paper proposes a novel framework for analyzing data offloading in a multi-access edge computing system, which includes an algorithm with two key phases. The first phase utilizes ruin theory to handle user association, taking into account their transmission reliability and resource utilization efficiency. The second phase employs an optimization-based algorithm to optimize the data offloading process and minimize users' energy consumption.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
(2023)
Review
Chemistry, Analytical
Mansoor Ahmed, Amil Rohani Dar, Markus Helfert, Abid Khan, Jungsuk Kim
Summary: Data provenance is a method of recording data origins and the history of data generation and processing. In healthcare, it is important to implement data provenance to track the sources and reasons behind any issues with user data. This systematic review explores the impacts of data provenance in healthcare and GDPR-compliance-based data provenance, discussing the technologies and methodologies used to achieve it. The study identifies research gaps and suggests future directions.
Article
Computer Science, Information Systems
Tri Nguyen Dang, Aunas Manzoor, Yan Kyaw Tun, S. M. Ahsan Kazmi, Zhu Han, Choong Seon Hong
Summary: The proliferation of novel infotainment services, such as virtual reality (VR)-based services, has led to a burden of data traffic in existing mobile networks. To overcome this, multiaccess edge computing (MEC) can be used to bring resources to the edge and unmanned aerial vehicles (UAVs) can be utilized as micro-base stations (UBSs) to expand service areas and improve spectrum efficiency. An incentive mechanism based on contract theory is proposed to encourage UAVs to participate in MEC services. Numerical findings show that this approach outperforms linear pricing (LP) techniques in terms of social welfare and fairness.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Computer Science, Artificial Intelligence
Minh N. H. Nguyen, Shashi Raj Pandey, Tri Nguyen Dang, Eui-Nam Huh, Nguyen H. Tran, Walid Saad, Choong Seon Hong
Summary: This article introduces a distributed learning approach based on the philosophy of democratized learning (Dem-AI), which includes a self-organizing hierarchical structuring mechanism and solutions for hierarchical generalized learning problems. Experimental results show that the proposed algorithm outperforms conventional federated learning algorithms in the generalization performance of learning models in agents.
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS
(2023)
Article
Computer Science, Interdisciplinary Applications
Francesco Pistolesi, Michele Baldassini, Beatrice Lazzerini
Summary: More than one in four workers worldwide suffer from back pain, resulting in the loss of 264 million work days annually. In the U.S., it costs $50 billion in healthcare expenses each year, rising up to $100 billion when accounting for decreased productivity and lost wages. The impending Industry 5.0 revolution emphasizes worker well-being and their rights, such as privacy, autonomy, and human dignity. This paper proposes a privacy-preserving artificial intelligence system that monitors the posture of assembly line workers. The system accurately assesses upper-body and lower-body postures while respecting privacy, enabling the detection of harmful posture habits and reducing the likelihood of musculoskeletal disorders.
COMPUTERS IN INDUSTRY
(2024)
Article
Computer Science, Interdisciplinary Applications
Xavier Boucher, Camilo Murillo Coba, Damien Lamy
Summary: This paper explores the new business strategies of digital servitization and smart PSS delivery, and develops conceptual prototypes of smart PSS value offers for early stages of the design process. It presents the development and experimentation of a modelling language and toolkit, and applies it to the design of a smart PSS in the field of heating appliances.
COMPUTERS IN INDUSTRY
(2024)
Article
Computer Science, Interdisciplinary Applications
Dieudonne Tchuente, Jerry Lonlac, Bernard Kamsu-Foguem
Summary: Artificial Intelligence (AI) is becoming increasingly important in various sectors of society. However, the black box nature of most AI techniques such as Machine Learning (ML) hinders their practical application. This has led to the emergence of Explainable artificial intelligence (XAI), which aims to provide AI-based decision-making processes and outcomes that are easily understood, interpreted, and justified by humans. While there has been a significant amount of research on XAI, there is currently a lack of studies on its practical applications. To address this research gap, this article proposes a comprehensive review of the business applications of XAI and a six-step framework to improve its implementation and adoption by practitioners.
COMPUTERS IN INDUSTRY
(2024)
Article
Computer Science, Interdisciplinary Applications
Francois-Alexandre Tremblay, Audrey Durand, Michael Morin, Philippe Marier, Jonathan Gaudreault
Summary: Continuous high-frequency wood drying, integrated with a traditional wood finishing line, improves the value of lumber by correcting moisture content piece by piece. Using reinforcement learning for continuous drying operation policies outperforms current industry methods and remains robust to sudden disturbances.
COMPUTERS IN INDUSTRY
(2024)
Article
Computer Science, Interdisciplinary Applications
Luyao Xia, Jianfeng Lu, Yuqian Lu, Wentao Gao, Yuhang Fan, Yuhao Xu, Hao Zhang
Summary: Efficient assembly sequence planning is crucial for enhancing production efficiency, ensuring product quality, and meeting market demands. This study proposes a dynamic graph learning algorithm called assembly-oriented graph attention sequence (A-GASeq), which optimizes the assembly graph structure to guide the search for optimal assembly sequences. The algorithm demonstrates superiority and broad utility in real-world scenarios.
COMPUTERS IN INDUSTRY
(2024)
Article
Computer Science, Interdisciplinary Applications
Mutahar Safdar, Padma Polash Paul, Guy Lamouche, Gentry Wood, Max Zimmermann, Florian Hannesen, Christophe Bescond, Priti Wanjara, Yaoyao Fiona Zhao
Summary: Metal-based additive manufacturing can achieve fully dense metallic components, and the application of machine learning in this field has been growing rapidly. However, there is a lack of framework to manage these machine learning models and guidance on the fundamental requirements for a cross-disciplinary platform to support process-based machine learning models in industrial metal AM.
COMPUTERS IN INDUSTRY
(2024)