Article
Computer Science, Information Systems
Bhabendu Kumar Mohanta, Debasish Jena, Somula Ramasubbareddy, Mahmoud Daneshmand, Amir H. Gandomi
Summary: The rapid growth of IoT technology presents security and privacy challenges, but blockchain technology offers some solutions. By integrating IoT and blockchain technologies, a more secure smart IoT system can be achieved.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Computer Science, Information Systems
Mohamed Amine Ferrag, Lei Shu
Summary: This article presents research challenges and a tutorial on the performance evaluation of blockchain-based security and privacy systems for IoT. The article reviews existing surveys, blockchain applications in IoT, consensus algorithms, security analysis techniques, performance metrics, and open challenges. The study provides insights into building and evaluating blockchain-based security and privacy systems and highlights future research opportunities.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Computer Science, Information Systems
Ali Dorri, Clemence Roulin, Shantanu Pal, Sarah Baalbaki, Raja Jurdak, Salil S. Kanhere
Summary: This article explores the impact of user deanonymization on IoT-based blockchain and demonstrates that machine learning algorithms can successfully classify transactions. To enhance user anonymity, the article proposes multiple obfuscation methods.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Review
Computer Science, Information Systems
Vinay Gugueoth, Sunitha Safavat, Sachin Shetty, Danda Rawat
Summary: This paper thoroughly investigates the security threats and issues in IoT, as well as potential solutions through the implementation of Blockchain. It provides a detailed description of the security threats, Blockchain-based solutions, and challenges introduced during the integration process. The paper also analyzes existing techniques and evaluation parameters.
COMPUTER SCIENCE REVIEW
(2023)
Article
Computer Science, Hardware & Architecture
Ahmed Lekssays, Luca Landa, Barbara Carminati, Elena Ferrari
Summary: Botnets are a major threat in the IoT landscape, designed in a distributed manner with a P2P structure. Community behavior analysis solutions show promise for detection, but need to run in a dynamic distributed environment, raising trust issues among participants.
Article
Computer Science, Hardware & Architecture
Shivam Saxena, Bharat Bhushan, Mohd Abdul Ahad
Summary: This paper investigates the integration of blockchain technology with IoT systems for security improvements and discusses the challenges that arise during this integration. It also highlights the relevant blockchain-based IoT applications and outlines future research directions.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2021)
Article
Computer Science, Information Systems
Rishav Singh, Tanveer Ahmed, Amit Kumar Singh, Prasenjit Chanak, Sanjay Kumar Singh
Summary: This article explores the classification of brain signals using smart IoT sensors in healthcare and presents a secure privacy-preserving technique for this purpose. By transforming brain signals into images, applying transfer learning, and utilizing blockchain for image storage, the proposed technique addresses the challenges in classifying brain signals effectively.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Review
Green & Sustainable Science & Technology
Ritika Raj Krishna, Aanchal Priyadarshini, Amitkumar V. Jha, Bhargav Appasani, Avireni Srinivasulu, Nicu Bizon
Summary: The Internet of Things (IoT) serves as a blessing to mankind, connecting physical and virtual objects worldwide, but it also poses potential risks due to lack of security measures. Enhancing security, protecting privacy, implementing authentication, and recovery measures are essential for the future implementation of this technology. Proposed solutions based on Blockchain (BC), Fog Computing (FC), Edge Computing (EC), and Machine Learning (ML) aim to strengthen security features in IoT devices.
Article
Computer Science, Information Systems
Yijia Liu, Jie Wang, Zheng Yan, Zhiguo Wan, Riku Jantti
Summary: The Internet of Things (IoT) aims to create a vast network of interconnected objects that can exchange data and interact intelligently with people. However, the openness, heterogeneity, and dynamicity of IoT introduce security, privacy, and trust issues. Traditional trust management systems (TMSs) are not sufficient, and thus blockchain-based trust management (BC-TM) has been extensively studied to achieve decentralized trust management in IoT. This article provides a comprehensive survey on BC-TM in IoT, proposing evaluation criteria, taxonomy of TMSs, and a review on BC-TM. It also identifies open issues and suggests future research directions.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Computer Science, Information Systems
Soumyashree S. Panda, Debasish Jena, Bhabendu Kumar Mohanta, Somula Ramasubbareddy, Mahmoud Daneshmand, Amir H. Gandomi
Summary: This article proposes a Blockchain-based distributed IoT architecture using hash chains for secure key management to ensure data privacy and provide a secure communication environment. It also introduces a secure and efficient key generation and management scheme for mutual authentication between communication entities, utilizing a one-way hash chain technique to provide a set of public and private key pairs to IoT devices. The experimental analysis confirms the superior performance of the proposed scheme compared to conventional mechanisms.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Computer Science, Hardware & Architecture
Simge Demir, Sevval Simsek, Sinem Gur, Albert Levi
Summary: Internet of Things (IoT) applications, particularly Home Automation Systems, have gained popularity in recent years. However, concerns regarding security and privacy have risen due to the connectivity to the internet and simplicity of these devices. This paper proposes a privacy preserving and secure identification and authentication model for Home Automation Systems, which includes a trusted middleware-layer and a zero knowledge mutual verification and authentication protocol, along with the implementation of fake proofs for privacy preservation.
COMPUTERS & ELECTRICAL ENGINEERING
(2022)
Article
Computer Science, Information Systems
Shihong Zou, Jinwen Xi, Guoai Xu, Miao Zhang, Yueming Lu
Summary: This article proposes a new decentralized crowdsensing system called CrowdHB, which utilizes a hybrid blockchain architecture and smart contracts to ensure location privacy preservation and data quality while improving system performance. The proposed system also includes a location privacy-preserving optimization mechanism and an approach of consistency optimization to achieve a tradeoff between user privacy and system performance.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Information Systems
Ashish Tomar, Niraj Gupta, Divya Rani, Sachin Tripathi
Summary: IoT devices in healthcare generate diverse data, which can be monitored in real-time by healthcare professionals through medical sensors and transmitted to cloud servers for analysis. However, the wireless communication channels of these devices are vulnerable to security threats. To address these concerns, a blockchain-based protocol called BIoMTAKE is proposed to establish a distributed and secure environment without relying on a single trusted authority. The protocol ensures authenticated access to IoMT data and has been rigorously analyzed for security and efficiency.
INTERNET OF THINGS
(2023)
Article
Computer Science, Information Systems
Dong Li, Zai Luo, Bo Cao
Summary: Blockchain technology is an indisputable ledger technology storing transactions securely in chains of blocks; Federated learning is a new paradigm to enhance accuracy in data mining while ensuring privacy and security; Utilizing blockchain technology in intelligent learning can significantly impact information security and privacy, leading to advancements in data science and AI.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS
(2022)
Article
Computer Science, Information Systems
Mochan Fan, Kailai Ji, Zhaofeng Zhang, Hongfang Yu, Gang Sun
Summary: This article proposes a new decentralized, secure and verifiable consortium BFL privacy protection scheme, named LPBFL, which ensures the privacy of the local model and data set while achieving lightweight computing. It adopts Paillier encryption and a newly designed lightweight digital signature and batch verification algorithm. A device reputation selection mechanism is also designed to improve efficiency.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Computer Science, Artificial Intelligence
B. D. Deebak, Fadi Al-Turjman
Summary: This paper introduces the application of S-USI in cloud-based healthcare systems and proposes a robust secure-based S-USI mechanism and a coexistence protocol proof for pervasive services in the cloud.
COMPLEX & INTELLIGENT SYSTEMS
(2023)
Article
Computer Science, Artificial Intelligence
Fahim Ullah, Fadi Al-Turjman
Summary: Blockchain-based smart contracts are transforming the smart real estate sector in smart cities. This study explores the literature on blockchain smart contracts in smart real estate and proposes a conceptual framework for their adoption in smart cities. Through a systematic review of literature published between 2000 and 2020, ten key aspects of blockchain smart contracts are identified and organized into six layers. The study presents a decentralized application and its interactions with Ethereum Virtual Machine (EVM), along with a detailed design and interaction mechanism for real estate owners and users as parties to a smart contract. It also provides a stepwise procedure for establishing and terminating smart contracts, along with a list of functions for initiating, creating, modifying, or terminating a smart contract. The study has the potential to enhance the contracting process for users and create new business opportunities for real estate owners, property technologies companies, and real estate agents.
NEURAL COMPUTING & APPLICATIONS
(2023)
Article
Computer Science, Software Engineering
Deebak Bakkiam Deebak, Fadi AL-Turjman
Summary: Proper real-time data processing and analysis are essential for Internet of Things (IoT) and cyber-physical systems, with the evolution of mobile edge computing addressing security and privacy issues. The integration of computing methods and communication technologies in healthcare systems improves medical services. A lightweight privacy-aware secure authentication (LPASA) scheme is proposed to protect vulnerable medical data, achieving better quality of services in resource-constrained environments.
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE
(2023)
Article
Computer Science, Artificial Intelligence
Aditya Khamparia, Babita Pandey, Fadi Al-Turjman, Prajoy Podder
Summary: This article presents a computer aided detection system for early knee osteoarthritis and rheumatoid detection using X-ray images and machine learning classifiers. The CAD system can be used remotely to assist medical practitioners in treatments of knee arthritis. The presented results show commendable improvement over different existing feature extractors in combination with different classifiers.
Review
Computer Science, Artificial Intelligence
Chnoor M. Rahman, Tarik A. Rashid, Abeer Alsadoon, Nebojsa Bacanin, Polla Fattah, Seyedali Mirjalili
Summary: This paper provides a comprehensive investigation of the dragonfly algorithm in the engineering field. It discusses the overview and modifications of the algorithm, surveys its applications in engineering, and compares its performance with other algorithms. The results show that the dragonfly algorithm performs excellently in small to intermediate applications. The purpose of this research is to assist other researchers in studying and utilizing the algorithm to optimize engineering problems.
EVOLUTIONARY INTELLIGENCE
(2023)
Article
Computer Science, Information Systems
Nebojsa Bacanin, Milos Antonijevic, Timea Bezdan, Miodrag Zivkovic, K. Venkatachalam, Sharaf Malebary
Summary: This article introduces the dependency on wireless devices in today's world and the use of mobile edge computing technology to overcome limitations on computing capacity. It also proposes a data offloading method based on 5G networks to improve energy efficiency. By using the PSO algorithm to select edge nodes, the data processing in 5G networks is further optimized, and it is demonstrated that mobile edge computing consumes less energy.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS
(2023)
Article
Computer Science, Artificial Intelligence
Nebojsa Bacanin
Summary: This research proposes an optimal operating methodology for microgrids using a combined model that incorporates game theory. By employing a hybrid method operation and using game theory, the cost of the microgrid process and the optimal BESS capacity can be lowered. The proposed method outperforms in terms of cost-effectiveness and operational cost compared to traditional methods.
Article
Computer Science, Hardware & Architecture
Nebojsa Bacanin, K. Venkatachalam, Timea Bezdan, Miodrag Zivkovic, Mohamed Abouhawwash
Summary: Feature selection is a critical step in machine learning and data science, aiming to identify relevant information from high-dimensional datasets. This manuscript proposes an enhanced version of the firefly algorithm for feature selection, demonstrating its robustness and efficiency through practical simulations.
MICROPROCESSORS AND MICROSYSTEMS
(2023)
Article
Multidisciplinary Sciences
K. M. Baalamurugan, P. Prabu, Nebojsa Bacanin, K. Venkatachalam, S. S. Askar, Mohamed Abouhawwash
Summary: IIoT-based systems are becoming increasingly important in industry consortium systems due to their rapid growth and wide-ranging application. These systems involve interconnected physical objects that communicate with each other and simplify decision-making by observing and analyzing the environment. However, traditional security frameworks face shortcomings as IIoT networks grow and methods of connection diversify. Blockchain technology has the potential to address these issues and enable safe data distribution in the IIoT.
SCIENTIFIC REPORTS
(2023)
Article
Environmental Sciences
Gordana Jovanovic, Mirjana Perisic, Nebojsa Bacanin, Miodrag Zivkovic, Svetlana Stanisic, Ivana Strumberger, Filip Alimpic, Andreja Stojic
Summary: This study focuses on benzo(a)pyrene as an indicator of exposure to a PAH carcinogenic mixture. The XGBoost model is applied to analyze a two-year database of pollutant concentrations and meteorological parameters to identify the factors associated with benzo(a)pyrene concentrations and explain the interactions between benzo(a)pyrene and other pollutants. The results suggest that surface temperature, arsenic, PM10, and NOx concentrations are major factors affecting benzo(a)pyrene concentrations and its environmental fate.
Article
Mathematics, Applied
Catalin Stoean, Miodrag Zivkovic, Aleksandra Bozovic, Nebojsa Bacanin, Roma Strulak-Wojcikiewicz, Milos Antonijevic, Ruxandra Stoean
Summary: As solar energy generation becomes increasingly important, accurate models for forecasting green energy production are crucial. This study proposes using LSTM and BiLSTM models to predict solar energy generation, incorporating weather data. The models are optimized using an enhanced version of the RSA algorithm. Compared to other state-of-the-art optimization approaches, the proposed method outperforms in terms of performance.
Review
Telecommunications
Robertas Damasevicius, Nebojsa Bacanin, Sanjay Misra
Summary: The advancement in technology has led to the integration of internet-connected devices and systems into emergency management and response, known as the Internet of Emergency Services (IoES). This integration can revolutionize emergency services through real-time data collection and analysis, improving coordination among agencies. This paper explores the use of IoES in emergency response, emphasizing the role of sensors and IoT devices in providing real-time information to responders, while also addressing challenges and potential impact on public safety and crisis management.
JOURNAL OF SENSOR AND ACTUATOR NETWORKS
(2023)
Article
Green & Sustainable Science & Technology
Nikola Savanovic, Ana Toskovic, Aleksandar Petrovic, Miodrag Zivkovic, Robertas Damasevicius, Luka Jovanovic, Nebojsa Bacanin, Bosko Nikolic
Summary: Rapid developments in IoT have led to its integration into everyday life, especially in areas like healthcare where real-time monitoring is crucial. However, security remains a major challenge, and sustainable healthcare supported by IoT should not compromise the environment. This study addresses the security challenges by using machine learning algorithms optimized with a modified Firefly algorithm for detecting security issues in IoT devices used for Healthcare 4.0. Experiments and comparisons show significant improvements in solving the formulated problem.
Article
Chemistry, Multidisciplinary
Aleksandar Petrovic, Robertas Damasevicius, Luka Jovanovic, Ana Toskovic, Vladimir Simic, Nebojsa Bacanin, Miodrag Zivkovic, Petar Spalevic
Summary: This research explored the potential of using artificial intelligence techniques to classify maritime vessels and predict their trajectories based on data-driven approaches. A particle swarm optimization algorithm was introduced to optimize the hyperparameters of the models used in this study. The introduced Boosted PSO showed better performance compared to contemporary optimizers, with the XGBoost model achieving an overall accuracy of 99.72% for vessel classification and the LSTM model achieving a mean square error of 0.000098 for marine trajectory prediction. Statistical analysis and explainable AI principles were applied to validate outcomes and understand the impact of features on model decisions.
APPLIED SCIENCES-BASEL
(2023)
Article
Mathematical & Computational Biology
Auwalu Saleh Mubarak, Zubaida Said Ameen, Fadi Al-Turjman
Summary: This article discusses the importance of identifying potholes on vehicles and introduces the method of developing object detection models using deep learning and computer vision techniques. The research results show that the model trained on images filtered using Gaussian smoothing performs the best.
MATHEMATICAL BIOSCIENCES AND ENGINEERING
(2023)
Article
Energy & Fuels
Mokhtar Benasla, Imane Boukhatem, Tayeb Allaoui, Abderrahmane Berkani, Petr Korba, Felix Rafael Segundo Sevilla, Mohamed Belfedel
Summary: The idea of exporting dispatchable solar electricity from the North African region to Europe is still being discussed. This paper focuses on the potential of Algeria as a supplier and analyzes possible import corridors and barriers.
Article
Energy & Fuels
Hobyung Chae, Sangmu Bae, Jae-Weon Jeong, Yujin Nam
Summary: Thermoelectric generators (TEGs) utilize temperature differences to produce electricity and have potential for various industrial applications. This study introduces an advanced technique that utilizes temperature gradients in water pipes to increase power generation, with efficient modulation of output power through flow control. The feasibility evaluation in residential settings shows that TEGs can generate 10.95 kWh of electricity per unit, and to achieve zero-energy buildings, 64.5 m2 of TEG deployment is required per unit given a zT value of 1.
Review
Energy & Fuels
Lina Patricia Vega, Karen Tatiana Bautista, Heliana Campos, Sebastian Daza, Guillermo Vargas
Summary: This article focuses on the current situation of biofuel production and research development in Latin American countries such as Argentina, Brazil, Mexico, Chile, Costa Rica, and Colombia. Brazil stands out as a leader in the region, making significant advancements in clean energy production through biofuels policy implementation. The review highlights the challenges these countries face in utilizing their comparative advantages for biofuel production.
Article
Energy & Fuels
Iraj Faraji Davoudkhani, Mahmoud Rerza Shakarami, Almoataz Y. Abdelaziz, Adel El-Shahat
Summary: This paper presents an optimization-based method for designing a wide-area damping controller (WADC) based on remote signals to improve the damping of inter-area oscillations by considering the time delays. The grey wolf optimization (GWO) algorithm is utilized to solve the optimization problem, and simulations and statistical results demonstrate the superiority of the proposed method.
Article
Energy & Fuels
Majid Ahmed Mohammed, Bashar Mahmood Ali, Khalil Farhan Yassin, Obed Majeed Ali, Omar Rafae Alomar
Summary: This study compares the effects of different phase change materials on the performance of solar panels. The experiment shows that the use of beeswax can lower the temperature of the panel and increase the efficiency of the photovoltaic system.