4.7 Article

PPSF: A Privacy-Preserving and Secure Framework Using Blockchain-Based Machine-Learning for IoT-Driven Smart Cities

Journal

Publisher

IEEE COMPUTER SOC
DOI: 10.1109/TNSE.2021.3089435

Keywords

Blockchain; Smart cities; Peer-to-peer computing; Security; Intrusion detection; Internet of Things; Intelligent sensors; Fog-Cloud architecture; Intelligent Blockchain; Internet of Things; Intrusion Detection System; Machine Learning; Privacy-Preservation

Ask authors/readers for more resources

With the advancement of IoT, smart cities have become the mainstream trend in urban development. However, challenges such as centralization, security, and privacy issues are still faced by smart cities. Therefore, a Privacy-Preserving and Secure Framework (PPSF) is proposed to address these challenges.
With the evolution of the Internet of Things (IoT), smart cities have become the mainstream of urbanization. IoT networks allow distributed smart devices to collect and process data within smart city infrastructure using an open channel, the Internet. Thus, challenges such as centralization, security, privacy (e.g., performing data poisoning and inference attacks), transparency, scalability, and verifiability limits faster adaptations of smart cities. Motivated by the aforementioned discussions, we present a Privacy-Preserving and Secure Framework (PPSF) for IoT-driven smart cities. The proposed PPSF is based on two key mechanisms: a two-level privacy scheme and an intrusion detection scheme. First, in a two-level privacy scheme, a blockchain module is designed to securely transmit the IoT data and Principal Component Analysis (PCA) technique is applied to transform raw IoT information into a new shape. In the intrusion detection scheme, a Gradient Boosting Anomaly Detector (GBAD) is applied for training and evaluating the proposed two-level privacy scheme based on two IoT network datasets, namely ToN-IoT and BoT-IoT. We also suggest a blockchain-InterPlanetary File System (IPFS) integrated Fog-Cloud architecture to deploy the proposed PPSF framework. Experimental results demonstrate the superiority of the PPSF framework over some recent approaches in blockchain and non-blockchain systems.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Chemistry, Analytical

TAKEN: A Traffic Knowledge-Based Navigation System for Connected and Autonomous Vehicles

Nikhil Kamath, Roshan Fernandes, Anisha P. Rodrigues, Mufti Mahmud, P. Vijaya, Thippa Reddy Gadekallu, M. Shamim Kaiser

Summary: This paper proposes a navigation method based on traffic knowledge to enable precise navigation of connected and autonomous vehicles (CAVs) in urban traffic environments. By analyzing sensor-oriented traffic data, a precise navigation path is generated, and traffic knowledge is shared with other vehicles to enable CAVs navigation. Experimental results confirm the benefits of this method in accurately navigating CAVs in urban traffic environments.

SENSORS (2023)

Article Telecommunications

A provably secure key transfer protocol for the fog-enabled Social Internet of Vehicles based on a confidential computing environment

Chien -Ming Chen, Zhen Li, Saru Kumari, Gautam Srivastava, Kuruva Lakshmanna, Thippa Reddy Gadekallu

Summary: In recent years, the Social Internet of Vehicles (SIoV) has significantly improved people's lifestyles in transportation by collecting and processing real-time traffic information, alleviating congestion, and enabling smart transportation in smart cities. However, the data transmitted on public channels by vehicles moving with servers is susceptible to interception and tampering by attackers, posing a security risk to driver's sensitive information. Additionally, the massive amount of real-time data generated by vehicles, devices, drivers, passengers, and social relationships creates a heavy load on servers. This paper proposes a secure authentication protocol using confidential computing environments and introduces an improved key transfer phase to reduce computation pressure on cloud servers. The protocol is analyzed using the Real-Oracle Random model, demonstrating its provable security. Experimental evaluation shows excellent computational and communication performance of the proposed protocol.

VEHICULAR COMMUNICATIONS (2023)

Article Computer Science, Information Systems

A Survey on Soft Computing Techniques for Federated Learning- Applications, Challenges and Future Directions

Y. Supriya, Thippa Reddy Gadekallu

Summary: Federated Learning is a distributed, privacy-preserving machine learning model that is gaining attention. It has broad applications in various fields, but faces challenges such as communication costs, privacy concerns, and data management. The survey provides a definition and analysis of federated learning systems, offering insights for future research. The review explores the aggregation of federated learning systems with soft computing techniques, as well as the integration of nature-inspired techniques to mitigate its flaws. The paper also discusses potential future developments of combining federated learning and soft computing techniques.

ACM JOURNAL OF DATA AND INFORMATION QUALITY (2023)

Article Computer Science, Information Systems

An evolutionary-based approach for optimising diverse group stock portfolio with active and inactive stocks

Chun-Hao Chen, Cheng-Yu Lu, Rui-Dong Chiang, Gautam Srivastava, Jerry Chun-Wei Lin

Summary: This paper proposes an intelligent optimization algorithm to obtain a more profitable diverse group stock portfolio with active and inactive stocks. The coding scheme considers not only grouping, stocks, and weighting, but also active stock parts. Two evaluation functions are developed based on factors such as group balance, modified portfolio satisfaction, price balance, unit balance, and extended diversity factor. Empirical studies on two financial datasets are conducted to demonstrate the merits of the proposed algorithm.

ENTERPRISE INFORMATION SYSTEMS (2023)

Article Computer Science, Hardware & Architecture

Advancing Security in the Industrial Internet of Things Using Deep Progressive Neural Networks

Mehul Sharma, Shrid Pant, Priety Yadav, Deepak Kumar Sharma, Nitin Gupta, Gautam Srivastava

Summary: This paper proposes a novel deep progressive algorithm that utilizes progressive learning and deep neural networks to address the security threats faced by IIoT devices. The proposed Deep Progressive Neural Network (DPNN) accurately classifies numerous attacks and efficiently adds new classes to the previously trained network. Experimental results demonstrate that the DPNN model outperforms the contemporary KNN model in terms of attack classification accuracy.

MOBILE NETWORKS & APPLICATIONS (2023)

Article Chemistry, Analytical

Hybrid Recommendation Network Model with a Synthesis of Social Matrix Factorization and Link Probability Functions

Balraj Kumar, Neeraj Sharma, Bhisham Sharma, Norbert Herencsar, Gautam Srivastava

Summary: Recommender systems are important but face challenges in producing quality recommendations due to sparsity issues. This study introduces a hierarchical Bayesian hybrid recommendation model, RCTR-SMF, for recommending music artists to users. The model integrates social matrix factorization and link probability functions into collaborative topic regression-based recommender systems, utilizing auxiliary domain knowledge for better prediction accuracy. The model addresses sparsity and cold-start problems, and shows superior performance compared to other state-of-the-art algorithms, as demonstrated on a large social media dataset.

SENSORS (2023)

Article Ecology

Mathematical approach of fiber optics for renewable energy sources using general adversarial networks

Tawfiq Hasanin, Hariprasath Manoharan, Hassan A. Alterazi, Gautam Srivastava, Shitharth Selvarajan, Jerry Chun-Wei Lin

Summary: Extending the visibility factor to a higher depth in the development phase of a subterranean communication system is challenging. The proposed method integrates a fiber optic communication system with a specific energy source and external panels to optimize the visibility parameter. By minimizing the reflection index and using generative adversarial network (GAN), the method enhances the effectiveness of the system in all subsurface areas.

FRONTIERS IN ECOLOGY AND EVOLUTION (2023)

Editorial Material Computer Science, Information Systems

Editorial for the Special Issue on Quality Assessment of Data Security

Gautam Srivastava, Jerry Chun-Wei Lin, Zhihan Lv

ACM JOURNAL OF DATA AND INFORMATION QUALITY (2023)

Article Computer Science, Hardware & Architecture

Multi-dimensional Data Optimal Classification Algorithm for Quality Evaluation of Distance Teaching in Universities

Feng Chen, Thippa Reddy Gadekallu

Summary: To effectively extract multidimensional data and accurately evaluate the quality of network distance teaching in universities, an optimal classification algorithm is proposed. The algorithm utilizes various perspectives and evaluation indices to classify the data and improve the accuracy of the evaluation. Experimental results demonstrate high classification accuracy and evaluation precision, indicating the effectiveness of the algorithm in extracting multidimensional teaching quality evaluation from the distance teaching data and improving the accuracy of network distance teaching quality evaluation.

MOBILE NETWORKS & APPLICATIONS (2023)

Article Automation & Control Systems

GRTR: Gradient Rebalanced Traffic Sign Recognition for Autonomous Vehicles

Kehua Guo, Zheng Wu, Weizheng Wang, Sheng Ren, Xiaokang Zhou, Thippa Reddy Gadekallu, Entao Luo, Chao Liu

Summary: Traffic sign recognition is an important aspect of autonomous vehicle research, and deep learning techniques have contributed significantly to its progress. However, the distribution of traffic sign information in complex road conditions is long-tailed, posing a significant challenge for autonomous vehicle applications. This paper introduces the gradient rebalanced traffic sign recognition (GRTR) method, which evaluates the classifier's prediction and classification biases, and dynamically adjusts correction and compensation factors to prevent distribution imbalance and enhance the performance of the traffic sign classifier under difficult road conditions.

IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING (2023)

Article Computer Science, Information Systems

Supply Chain Management Using an Industrial Internet of Things Hyperledger Fabric Network

Muhammad Rehan, Abdul Rehman Javed, Natalia Kryvinska, Thippa Reddy Gadekallu, Gautam Srivastava, Zunera Jalil

Summary: Supply chain management (SCM) is pivotal in the industrial life cycle, with on-time delivery and transportation mode importance for safe and secure supply. The use of Industrial Internet of Things (IIoT) and blockchain platforms (like Ethereum) improves tracking, security, and transaction speed. This research proposes SCMIIOT, a novel approach that maintains traceability, data integrity, and achieves fast transaction through the use of sensor devices, 5G, and distributed database systems. Experimental results show the effectiveness of SCMIIOT, with fast file copying, block creation, and peer-to-peer connection times.

HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES (2023)

Article Computer Science, Information Systems

AQND: An asymmetric quorum-based neighbor discovery protocol for reducing delay in sensor based systems

Ziqing Xia, Zhangyang Gao, Anfeng Liu, Neal N. Xiong

Summary: In this paper, an asymmetric quorum-based neighbor discovery (AQND) protocol is proposed to reduce delay, improve energy utilization and lifetime, and outperform previous strategies in main performance indicators.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

DDSR: A delay differentiated services routing scheme to reduce deployment costs for the Internet of Things

Xiaohuan Liu, Anfeng Liu, Shaobo Zhang, Tian Wang, Neal N. Xiong

Summary: This paper proposes a delay differentiated services routing (DDSR) scheme to reduce the deployment costs for wireless sensor networks (WSNs) with wake-up radio (WuR) functionality, while meeting the delay requirement of forwarding urgent data and maintaining a long lifetime.

INFORMATION SCIENCES (2024)

Article Computer Science, Artificial Intelligence

An improved weighted ensemble clustering based on two-tier uncertainty measurement

Qinghua Gu, Yan Wang, Peipei Wang, Xuexian Li, Lu Chen, Neal N. Xiong, Di Liu

Summary: This paper proposes a new ensemble clustering method that combines the influence of cluster level and the base clustering level in a unified framework. The method inserts a global weighting strategy into a local ensemble cluster learning framework, improving the robustness and stability of clustering.

EXPERT SYSTEMS WITH APPLICATIONS (2024)

Article Computer Science, Artificial Intelligence

Finger pinching and imagination classification: A fusion of CNN architectures for IoMT-enabled BCI applications

Giuseppe Varone, Wadii Boulila, Maha Driss, Saru Kumari, Muhammad Khurram Khan, Thippa Reddy Gadekallu, Amir Hussain

Summary: This study introduces an unsupervised EEG preprocessing pipeline and fusion-based CNN method for distinguishing Motor Imagery (MI) from finger movements (Mex). The proposed approach achieves significant progress in distinguishing MI and Mex activities, demonstrating its potential to serve as a benchmark for future real-time BCI systems. This research contributes to the global interdisciplinary research community and enables the development of more effective and user-friendly BCI systems.

INFORMATION FUSION (2024)

No Data Available