The?convergence of the Internet, sensor networks, and Radio Frequency Identification (RFID) systems has ushered to the concept of Internet of Things (IoT) which is capable of connecting daily things, making them smart...The?convergence of the Internet, sensor networks, and Radio Frequency Identification (RFID) systems has ushered to the concept of Internet of Things (IoT) which is capable of connecting daily things, making them smart through sensing, reasoning, and cooperating with other things. Further, RFID technology enables tracking of an object and assigning it a unique ID. IoT has the potential for a wide range of applications relating to healthcare, environment, transportation, cities… Moreover, the middleware is a basic component in the IoT architecture. It handles heterogeneity issues among IoT devices and provides a common framework for communication. More recently, the interest has focusing on developing publish/subscribe middleware systems for the IoT to allow asynchronous communication between the IoT devices. The scope of our paper is to study routing protocols for publish/subscribe schemes that include content and context-based routing. We propose an Energy-Efficient Content-Based Routing (EECBR) protocol for the IoT that minimizes the energy consumption. The proposed algorithm makes use of a virtual topology that is constructed in a centralized manner and then routes the events from the publishers to the intended interested subscribers in a distributed manner. EECBR has been simulated using Omnet++. The simulation results show that EECBR has a significant performance in term of the energy variance compared to the other schemes.展开更多
Internet of Things technology is a new type of network technology emerging in the new economic era. It has played a good role in various industries and provided new opportunities for the reform and optimization of the...Internet of Things technology is a new type of network technology emerging in the new economic era. It has played a good role in various industries and provided new opportunities for the reform and optimization of the education industry. This paper takes the intelligent teaching base on the basis of Internet of Things technology as the research object, introduces the connotation of the wisdom teaching base with reference to relevant literature materials, analyzes the research background of the wisdom teaching base on the basis of the Internet of Things technology, expounds the design method of smart teaching base on the basis of Internet of Things technology, and analyzes the function realization and application of intelligent teaching base on the basis of Internet of Things technology.展开更多
The term Internet of Things (IoT) emerged in the early 2000s but actually gained momentum only in the past few years, however we still do not get to see them in our daily life. It has generally been avoided by the mai...The term Internet of Things (IoT) emerged in the early 2000s but actually gained momentum only in the past few years, however we still do not get to see them in our daily life. It has generally been avoided by the mainstream market due to its “cryptic” nature which requires technical knowledge prior to its use. Lack of strong business model (by companies) and inability to adapt to new rapid changes (by consumers) are the two primary factors contributing to the fact that IoT is well ahead of its times but it need no longer be. In this paper, I’ve created a setup for smart home that allows the users to control their electrical appliances from internet and even makes the appliances smart enough to react to the environmental conditions on their own. Using this setup, I observed the pattern in which electricity consumption and carbon footprints reduced as compared to the conventional setup i.e. without IoT. Analyzing this data provided me a solid proof that IoT definitely helps us to save electricity and environment. Since IoT is beneficial for all, I, then focused on the challenges that are hampering the penetration of IoT into the daily lives of consumers and how the consumer is overlooking the benefits that it has to offer, which even includes a primary concern for many, i.e. saving money. This paper is overall aimed to change the way a consumer thinks about IoT and to provide a solid ground to how it is beneficial.展开更多
A systematic perspective on agricultural supply chain finance can offer fresh insights into its development.The high-quality development of the agricultural supply chain finance ecosystem is crucial for the comprehens...A systematic perspective on agricultural supply chain finance can offer fresh insights into its development.The high-quality development of the agricultural supply chain finance ecosystem is crucial for the comprehensive revitalization of rural areas and the realization of agricultural power.Based on the current state of development of this ecosystem,this paper identifies several bottlenecks,such as insufficient policy and technical support in the macro-environment system,weak incentives for independent circulation within the industrial environment system,and inadequate motivation for stakeholders to participate in the micro-environment system.To address these issues,this paper proposes that the visualization,digitalization,and authenticity characteristics of the“blockchain+Internet of Things”technology architecture can effectively resolve these bottlenecks.Additionally,targeted strategies are suggested to promote the high-quality development of the agricultural supply chain finance ecosystem.展开更多
Internet of Things(IoT)network used for industrial management is vulnerable to different security threats due to its unstructured deployment,and dynamic communication behavior.In literature various mechanisms addresse...Internet of Things(IoT)network used for industrial management is vulnerable to different security threats due to its unstructured deployment,and dynamic communication behavior.In literature various mechanisms addressed the security issue of Industrial IoT networks,but proper maintenance of the performance reliability is among the common challenges.In this paper,we proposed an intelligent mutual authentication scheme leveraging authentication aware node(AAN)and base station(BS)to identify routing attacks in Industrial IoT networks.The AAN and BS uses the communication parameter such as a route request(RREQ),node-ID,received signal strength(RSS),and round-trip time(RTT)information to identify malicious devices and routes in the deployed network.The feasibility of the proposed model is validated in the simulation environment,where OMNeT++was used as a simulation tool.We compare the results of the proposed model with existing field-proven schemes in terms of routing attacks detection,communication cost,latency,computational cost,and throughput.The results show that our proposed scheme surpasses the previous schemes regarding these performance parameters with the attack detection rate of 97.7%.展开更多
Inventory pledge financing not only solves the financing difficulties of small and medium-sized enterprises,but also opens up business channels for banks.Under the random market demand,this article studies the pledge ...Inventory pledge financing not only solves the financing difficulties of small and medium-sized enterprises,but also opens up business channels for banks.Under the random market demand,this article studies the pledge decision-making of perishable pledges in the inventory pledge business,On the basis of considering the supervision of the Internet of Things technology to reduce the loss rate of quality goods,a decision model of the pledge rate of the bank is constructed in the case of not adopting the Internet of things technology and adopting the Internet of things technology.The pledge rate decision-making model in the two technical situations aims at maximizing the profit at the end of the pledge period.The factors in the model such as the pledge rate,end-of-period income,and IoT technology coverage rate are analyzed respectively,and finally the decision-making process is verified through calculation examples.Studies have shown that,when Internet of Things technology is not adopted,the income of bank pledge business first increases and then decreases with the growth of pledge rate.After the adoption of Internet of Things technology,the income of Banks is inversely proportional to the coverage rate of Internet of Things technology.However,within a certain coverage range,Banks can obtain greater income by using Internet of Things technology to supervise pledges.展开更多
Supply Chain Finance(SCF)refers to the financial service in which banks rely on core enterprises to manage the capital flow and logistics of upstream and downstream enterprises.SCF adopts a self-testing and closed-loo...Supply Chain Finance(SCF)refers to the financial service in which banks rely on core enterprises to manage the capital flow and logistics of upstream and downstream enterprises.SCF adopts a self-testing and closed-loop credit model to control funds and risks.The key factor in a successful SCF service is the deployment of SCF businessoriented information systems that allow businesses to form partnerships efficiently and expedite cash flows throughout the supply chain.Blockchain Technology(BCT),featuring decentralization,tamper-proofing,traceability,which is usually paired with the Internet of Things(IoT)in real-world contexts,has been widely adopted in the field of finance and is perfectly positioned to facilitate innovative collaborations among participants in supply chain networks.In this paper,we propose a BCT and IoT-based information management framework(named BC4Regu),which works as the regulatory to improve the information transparency in the business process of SCF.With BC4Regu,the operation cost of the whole supply chain can be significantly reduced through the coordination and integration of capital flow,information flow,logistics and trade flow in the supply chain.The contributions in this paper include:(1)proposing a novel information management framework which leverages Blockchain and IoT to solve the problem of information asymmetry in the trade of SCF;(2)proposing the technical design of BC4Regu,including the Blockchain infrastructure,distributed ledger-based integrated data flow service,and reshaped SCF process;and(3)applying BC4Regu to a group of scenarios and conducting theoretical analysis by introducing the principal-agent model to validate the BC4Regu.展开更多
Over the last few years, the Internet of Things (IoT) has become an omnipresent term. The IoT expands the existing common concepts, anytime and anyplace to the connectivity for anything. The proliferation in IoT offer...Over the last few years, the Internet of Things (IoT) has become an omnipresent term. The IoT expands the existing common concepts, anytime and anyplace to the connectivity for anything. The proliferation in IoT offers opportunities but may also bear risks. A hitherto neglected aspect is the possible increase in power consumption as smart devices in IoT applications are expected to be reachable by other devices at all times. This implies that the device is consuming electrical energy even when it is not in use for its primary function. Many researchers’ communities have started addressing storage ability like cache memory of smart devices using the concept called—Named Data Networking (NDN) to achieve better energy efficient communication model. In NDN, memory or buffer overflow is the common challenge especially when internal memory of node exceeds its limit and data with highest degree of freshness may not be accommodated and entire scenarios behaves like a traditional network. In such case, Data Caching is not performed by intermediate nodes to guarantee highest degree of freshness. On the periodical updates sent from data producers, it is exceedingly demanded that data consumers must get up to date information at cost of lease energy. Consequently, there is challenge in maintaining tradeoff between freshness energy consumption during Publisher-Subscriber interaction. In our work, we proposed the architecture to overcome cache strategy issue by Smart Caching Algorithm for improvement in memory management and data freshness. The smart caching strategy updates the data at precise interval by keeping garbage data into consideration. It is also observed from experiment that data redundancy can be easily obtained by ignoring/dropping data packets for the information which is not of interest by other participating nodes in network, ultimately leading to optimizing tradeoff between freshness and energy required.展开更多
Internet of Things (IoT) are being adopted for industrial and manufacturing applications such as manufacturing automation, remote machine diagnostics, prognostic health management of industrial machines and supply cha...Internet of Things (IoT) are being adopted for industrial and manufacturing applications such as manufacturing automation, remote machine diagnostics, prognostic health management of industrial machines and supply chain management. Cloud-Based Manufacturing is a recent on-demand model of manufacturing that is leveraging IoT technologies. While Cloud-Based Manufacturing enables on-demand access to manufacturing resources, a trusted intermediary is required for transactions between the users who wish to avail manufacturing services. We present a decentralized, peer-to-peer platform called BPIIoT for Industrial Internet of Things based on the Block chain technology. With the use of Blockchain technology, the BPIIoT platform enables peers in a decentralized, trustless, peer-to-peer network to interact with each other without the need for a trusted intermediary.展开更多
Cloud storage is widely used by large companies to store vast amounts of data and files,offering flexibility,financial savings,and security.However,information shoplifting poses significant threats,potentially leading...Cloud storage is widely used by large companies to store vast amounts of data and files,offering flexibility,financial savings,and security.However,information shoplifting poses significant threats,potentially leading to poor performance and privacy breaches.Blockchain-based cognitive computing can help protect and maintain information security and privacy in cloud platforms,ensuring businesses can focus on business development.To ensure data security in cloud platforms,this research proposed a blockchain-based Hybridized Data Driven Cognitive Computing(HD2C)model.However,the proposed HD2C framework addresses breaches of the privacy information of mixed participants of the Internet of Things(IoT)in the cloud.HD2C is developed by combining Federated Learning(FL)with a Blockchain consensus algorithm to connect smart contracts with Proof of Authority.The“Data Island”problem can be solved by FL’s emphasis on privacy and lightning-fast processing,while Blockchain provides a decentralized incentive structure that is impervious to poisoning.FL with Blockchain allows quick consensus through smart member selection and verification.The HD2C paradigm significantly improves the computational processing efficiency of intelligent manufacturing.Extensive analysis results derived from IIoT datasets confirm HD2C superiority.When compared to other consensus algorithms,the Blockchain PoA’s foundational cost is significant.The accuracy and memory utilization evaluation results predict the total benefits of the system.In comparison to the values 0.004 and 0.04,the value of 0.4 achieves good accuracy.According to the experiment results,the number of transactions per second has minimal impact on memory requirements.The findings of this study resulted in the development of a brand-new IIoT framework based on blockchain technology.展开更多
Internet of things(IoT)field has emerged due to the rapid growth of artificial intelligence and communication technologies.The use of IoT technology in modern healthcare environments is convenient for doctors and pati...Internet of things(IoT)field has emerged due to the rapid growth of artificial intelligence and communication technologies.The use of IoT technology in modern healthcare environments is convenient for doctors and patients as it can be used in real-time monitoring of patients,proper administration of patient information,and healthcare management.However,the usage of IoT in the healthcare domain will become a nightmare if patient information is not securely maintainedwhile transferring over an insecure network or storing at the administrator end.In this manuscript,the authors have developed a secure IoT healthcare monitoring system using the Blockchainbased XOR Elliptic Curve Cryptography(BC-XORECC)technique to avoid various vulnerable attacks.Initially,thework has established an authentication process for patient details by generating tokens,keys,and tags using Length Ceaser Cipher-based PearsonHashingAlgorithm(LCC-PHA),EllipticCurve Cryptography(ECC),and Fishers Yates Shuffled Based Adelson-Velskii and Landis(FYS-AVL)tree.The authentications prevent unauthorized users from accessing or misuse the data.After that,a secure data transfer is performed using BC-XORECC,which acts faster by maintaining high data privacy and blocking the path for the attackers.Finally,the Linear Spline Kernel-Based Recurrent Neural Network(LSK-RNN)classification monitors the patient’s health status.The whole developed framework brings out a secure data transfer without data loss or data breaches and remains efficient for health care monitoring via IoT.Experimental analysis shows that the proposed framework achieves a faster encryption and decryption time,classifies the patient’s health status with an accuracy of 89%,and remains robust comparedwith the existing state-of-the-art method.展开更多
Embedded computing device implementation on the Internet of Things (IoT) requires careful assessment of their intrinsic resource limitations. These constraints are not limited to memory and processing capabilities but...Embedded computing device implementation on the Internet of Things (IoT) requires careful assessment of their intrinsic resource limitations. These constraints are not limited to memory and processing capabilities but extend to the network interfaces, particularly due to the low-power radio standards that these devices typically employ. The IPv6 protocol is shown to be a strong option for guaranteeing interoperability in the IoT, mostly because of its large address space, the range of current IP-based protocols, and its intrinsic versatility. Considering these benefits, we investigate if current IP-based network management protocols can be implemented on devices with limited resources. We investigate the resource needs in particular for implementing Network Configuration Protocol (NETCONF) and Simple Network Management Protocol (SNMP) on an 8-bit AVR-based device. Our investigation reveals the specific memory and processing demands of these protocols, providing valuable insights into their practicality and efficiency in constrained IoT environments. This study underscores the potential and challenges of leveraging IPv6-based network management protocols to enhance the functionality and interoperability of IoT devices while operating within stringent resource limitations.展开更多
The purpose of this research is to deal with effective block chain framework for secure transactions.The rate of effective data transactions and the interoperability of the ledger are the two major obstacles involved ...The purpose of this research is to deal with effective block chain framework for secure transactions.The rate of effective data transactions and the interoperability of the ledger are the two major obstacles involved in Blockchain and to tackle this issue,Cross-Chain based Transaction(CCT)is introduced.Traditional industries have been restructured by the introduction of Internet of Things(IoT)to become smart industries through the feature of data-driven decision-making.Still,there are a few limitations,like decentralization,security vulnerabilities,poor interoperability,as well as privacy concerns in IoTs.To overcome this limitation,Blockchain has been employed to assure a safer transaction process,especially in asset exchanges.In recent decades,scalable local ledgers implement Blockchains,simultaneously sustaining peer validations of transactions which can be at local or global levels.From the single Hyperledger-based blockchains system,the CCT takes the transaction amid various chains.In addition,the most significant factor for this registration processing strategy is the Signature to ensure security.The application of the Quantum cryptographic algorithm amplifies the proposed Hyperledger-based blockchains,to strengthen the safety of the process.The key has been determined by restricting the number of transactions that reach the global Blockchain using the quantum-based hash function and accomplished by scalable local ledgers,and peer validations of transactions at local and global levels without any issues.The rate of transaction processing for entire peers has enhanced with the ancillary aid of the proposed solution,as it includes the procedure of load distribution.Without any boosted enhancement,the recommended solution utilizes the current transaction strategy,and also,it’s aimed at scalability,resource conservation,and interoperability.The experimental results of the system have been evaluated using the metrics like block weight,ledger memory,the usage of the central processing unit,and the communication overhead.展开更多
The Internet of Things (IoT) and Cloud computing are gaining popularity due to their numerous advantages, including the efficient utilization of internetand computing resources. In recent years, many more IoT applicat...The Internet of Things (IoT) and Cloud computing are gaining popularity due to their numerous advantages, including the efficient utilization of internetand computing resources. In recent years, many more IoT applications have beenextensively used. For instance, Healthcare applications execute computations utilizing the user’s private data stored on cloud servers. However, the main obstaclesfaced by the extensive acceptance and usage of these emerging technologies aresecurity and privacy. Moreover, many healthcare data management system applications have emerged, offering solutions for distinct circumstances. But still, theexisting system has issues with specific security issues, privacy-preserving rate,information loss, etc. Hence, the overall system performance is reduced significantly. A unique blockchain-based technique is proposed to improve anonymityin terms of data access and data privacy to overcome the above-mentioned issues.Initially, the registration phase is done for the device and the user. After that, theGeo-Location and IP Address values collected during registration are convertedinto Hash values using Adler 32 hashing algorithm, and the private and publickeys are generated using the key generation centre. Then the authentication is performed through login. The user then submits a request to the blockchain server,which redirects the request to the associated IoT device in order to obtain thesensed IoT data. The detected data is anonymized in the device and stored inthe cloud server using the Linear Scaling based Rider Optimization algorithmwith integrated KL Anonymity (LSR-KLA) approach. After that, the Time-stamp-based Public and Private Key Schnorr Signature (TSPP-SS) mechanismis used to permit the authorized user to access the data, and the blockchain servertracks the entire transaction. The experimental findings showed that the proposedLSR-KLA and TSPP-SS technique provides better performance in terms of higherprivacy-preserving rate, lower information loss, execution time, and Central Processing Unit (CPU) usage than the existing techniques. Thus, the proposed method allows for better data privacy in the smart healthcare network.展开更多
Internet of Things (IoT) is ubiquitous, including objects or devices communicating through heterogenous wireless networks. One of the major challenges in mobile IoT is an efficient vertical handover decision (VHD) tec...Internet of Things (IoT) is ubiquitous, including objects or devices communicating through heterogenous wireless networks. One of the major challenges in mobile IoT is an efficient vertical handover decision (VHD) technique between heterogenous networks for seamless connectivity with constrained resources. The conventional VHD approach is mainly based on received signal strength (RSS). The approach is inefficient for vertical handover, since it always selects the target network with the strongest signal without taking into consideration of factors such as quality of service (QoS), cost, delay, etc. In this paper, we present a hybrid approach by integrating the multi-cri- teria based VHD (MCVHD) technique and an algorithm based on fuzzy logic for efficient VHD among Wi-Fi, Radio and Satellite networks. The MCVHD provides a lightweight solution that aims to achieving seamless connectivity for mobile IoT Edge Gateway over a set of heterogeneous networks. The proposed solution is evaluated in real time using a testbed containing real IoT devices. Further, the testbed is integrated with lightweight and efficient software techniques, e.g., microservices, containers, broker, and Edge/Cloud techniques. The experimental results show that the proposed approach is suitable for an IoT environment and it outperforms the conventional RSS Quality based VHD by minimizing handover failures, unnecessary handovers, handover time and cost of service.展开更多
文摘The?convergence of the Internet, sensor networks, and Radio Frequency Identification (RFID) systems has ushered to the concept of Internet of Things (IoT) which is capable of connecting daily things, making them smart through sensing, reasoning, and cooperating with other things. Further, RFID technology enables tracking of an object and assigning it a unique ID. IoT has the potential for a wide range of applications relating to healthcare, environment, transportation, cities… Moreover, the middleware is a basic component in the IoT architecture. It handles heterogeneity issues among IoT devices and provides a common framework for communication. More recently, the interest has focusing on developing publish/subscribe middleware systems for the IoT to allow asynchronous communication between the IoT devices. The scope of our paper is to study routing protocols for publish/subscribe schemes that include content and context-based routing. We propose an Energy-Efficient Content-Based Routing (EECBR) protocol for the IoT that minimizes the energy consumption. The proposed algorithm makes use of a virtual topology that is constructed in a centralized manner and then routes the events from the publishers to the intended interested subscribers in a distributed manner. EECBR has been simulated using Omnet++. The simulation results show that EECBR has a significant performance in term of the energy variance compared to the other schemes.
文摘Internet of Things technology is a new type of network technology emerging in the new economic era. It has played a good role in various industries and provided new opportunities for the reform and optimization of the education industry. This paper takes the intelligent teaching base on the basis of Internet of Things technology as the research object, introduces the connotation of the wisdom teaching base with reference to relevant literature materials, analyzes the research background of the wisdom teaching base on the basis of the Internet of Things technology, expounds the design method of smart teaching base on the basis of Internet of Things technology, and analyzes the function realization and application of intelligent teaching base on the basis of Internet of Things technology.
文摘The term Internet of Things (IoT) emerged in the early 2000s but actually gained momentum only in the past few years, however we still do not get to see them in our daily life. It has generally been avoided by the mainstream market due to its “cryptic” nature which requires technical knowledge prior to its use. Lack of strong business model (by companies) and inability to adapt to new rapid changes (by consumers) are the two primary factors contributing to the fact that IoT is well ahead of its times but it need no longer be. In this paper, I’ve created a setup for smart home that allows the users to control their electrical appliances from internet and even makes the appliances smart enough to react to the environmental conditions on their own. Using this setup, I observed the pattern in which electricity consumption and carbon footprints reduced as compared to the conventional setup i.e. without IoT. Analyzing this data provided me a solid proof that IoT definitely helps us to save electricity and environment. Since IoT is beneficial for all, I, then focused on the challenges that are hampering the penetration of IoT into the daily lives of consumers and how the consumer is overlooking the benefits that it has to offer, which even includes a primary concern for many, i.e. saving money. This paper is overall aimed to change the way a consumer thinks about IoT and to provide a solid ground to how it is beneficial.
基金Phased Research Results of the Scientific Research Project of Jilin Provincial Department of Education 2024(Project No.JJKH20240264SK)。
文摘A systematic perspective on agricultural supply chain finance can offer fresh insights into its development.The high-quality development of the agricultural supply chain finance ecosystem is crucial for the comprehensive revitalization of rural areas and the realization of agricultural power.Based on the current state of development of this ecosystem,this paper identifies several bottlenecks,such as insufficient policy and technical support in the macro-environment system,weak incentives for independent circulation within the industrial environment system,and inadequate motivation for stakeholders to participate in the micro-environment system.To address these issues,this paper proposes that the visualization,digitalization,and authenticity characteristics of the“blockchain+Internet of Things”technology architecture can effectively resolve these bottlenecks.Additionally,targeted strategies are suggested to promote the high-quality development of the agricultural supply chain finance ecosystem.
基金supported by the MSIT(Ministry of Science and ICT),Korea under the ITRC(Information Technology Research Center)support program(IITP-2020-2018-0-01426)supervised by IITP(Institute for Information and Communication Technology Planning&Evaluation)+1 种基金in part by the National Research Foundation(NRF)funded by the Korea government(MSIT)(No.2019R1F1A1059125).
文摘Internet of Things(IoT)network used for industrial management is vulnerable to different security threats due to its unstructured deployment,and dynamic communication behavior.In literature various mechanisms addressed the security issue of Industrial IoT networks,but proper maintenance of the performance reliability is among the common challenges.In this paper,we proposed an intelligent mutual authentication scheme leveraging authentication aware node(AAN)and base station(BS)to identify routing attacks in Industrial IoT networks.The AAN and BS uses the communication parameter such as a route request(RREQ),node-ID,received signal strength(RSS),and round-trip time(RTT)information to identify malicious devices and routes in the deployed network.The feasibility of the proposed model is validated in the simulation environment,where OMNeT++was used as a simulation tool.We compare the results of the proposed model with existing field-proven schemes in terms of routing attacks detection,communication cost,latency,computational cost,and throughput.The results show that our proposed scheme surpasses the previous schemes regarding these performance parameters with the attack detection rate of 97.7%.
文摘Inventory pledge financing not only solves the financing difficulties of small and medium-sized enterprises,but also opens up business channels for banks.Under the random market demand,this article studies the pledge decision-making of perishable pledges in the inventory pledge business,On the basis of considering the supervision of the Internet of Things technology to reduce the loss rate of quality goods,a decision model of the pledge rate of the bank is constructed in the case of not adopting the Internet of things technology and adopting the Internet of things technology.The pledge rate decision-making model in the two technical situations aims at maximizing the profit at the end of the pledge period.The factors in the model such as the pledge rate,end-of-period income,and IoT technology coverage rate are analyzed respectively,and finally the decision-making process is verified through calculation examples.Studies have shown that,when Internet of Things technology is not adopted,the income of bank pledge business first increases and then decreases with the growth of pledge rate.After the adoption of Internet of Things technology,the income of Banks is inversely proportional to the coverage rate of Internet of Things technology.However,within a certain coverage range,Banks can obtain greater income by using Internet of Things technology to supervise pledges.
基金supported by the Educational Commission of Zhejiang Province of China under Grant No.Y202147553.
文摘Supply Chain Finance(SCF)refers to the financial service in which banks rely on core enterprises to manage the capital flow and logistics of upstream and downstream enterprises.SCF adopts a self-testing and closed-loop credit model to control funds and risks.The key factor in a successful SCF service is the deployment of SCF businessoriented information systems that allow businesses to form partnerships efficiently and expedite cash flows throughout the supply chain.Blockchain Technology(BCT),featuring decentralization,tamper-proofing,traceability,which is usually paired with the Internet of Things(IoT)in real-world contexts,has been widely adopted in the field of finance and is perfectly positioned to facilitate innovative collaborations among participants in supply chain networks.In this paper,we propose a BCT and IoT-based information management framework(named BC4Regu),which works as the regulatory to improve the information transparency in the business process of SCF.With BC4Regu,the operation cost of the whole supply chain can be significantly reduced through the coordination and integration of capital flow,information flow,logistics and trade flow in the supply chain.The contributions in this paper include:(1)proposing a novel information management framework which leverages Blockchain and IoT to solve the problem of information asymmetry in the trade of SCF;(2)proposing the technical design of BC4Regu,including the Blockchain infrastructure,distributed ledger-based integrated data flow service,and reshaped SCF process;and(3)applying BC4Regu to a group of scenarios and conducting theoretical analysis by introducing the principal-agent model to validate the BC4Regu.
文摘Over the last few years, the Internet of Things (IoT) has become an omnipresent term. The IoT expands the existing common concepts, anytime and anyplace to the connectivity for anything. The proliferation in IoT offers opportunities but may also bear risks. A hitherto neglected aspect is the possible increase in power consumption as smart devices in IoT applications are expected to be reachable by other devices at all times. This implies that the device is consuming electrical energy even when it is not in use for its primary function. Many researchers’ communities have started addressing storage ability like cache memory of smart devices using the concept called—Named Data Networking (NDN) to achieve better energy efficient communication model. In NDN, memory or buffer overflow is the common challenge especially when internal memory of node exceeds its limit and data with highest degree of freshness may not be accommodated and entire scenarios behaves like a traditional network. In such case, Data Caching is not performed by intermediate nodes to guarantee highest degree of freshness. On the periodical updates sent from data producers, it is exceedingly demanded that data consumers must get up to date information at cost of lease energy. Consequently, there is challenge in maintaining tradeoff between freshness energy consumption during Publisher-Subscriber interaction. In our work, we proposed the architecture to overcome cache strategy issue by Smart Caching Algorithm for improvement in memory management and data freshness. The smart caching strategy updates the data at precise interval by keeping garbage data into consideration. It is also observed from experiment that data redundancy can be easily obtained by ignoring/dropping data packets for the information which is not of interest by other participating nodes in network, ultimately leading to optimizing tradeoff between freshness and energy required.
文摘Internet of Things (IoT) are being adopted for industrial and manufacturing applications such as manufacturing automation, remote machine diagnostics, prognostic health management of industrial machines and supply chain management. Cloud-Based Manufacturing is a recent on-demand model of manufacturing that is leveraging IoT technologies. While Cloud-Based Manufacturing enables on-demand access to manufacturing resources, a trusted intermediary is required for transactions between the users who wish to avail manufacturing services. We present a decentralized, peer-to-peer platform called BPIIoT for Industrial Internet of Things based on the Block chain technology. With the use of Blockchain technology, the BPIIoT platform enables peers in a decentralized, trustless, peer-to-peer network to interact with each other without the need for a trusted intermediary.
文摘Cloud storage is widely used by large companies to store vast amounts of data and files,offering flexibility,financial savings,and security.However,information shoplifting poses significant threats,potentially leading to poor performance and privacy breaches.Blockchain-based cognitive computing can help protect and maintain information security and privacy in cloud platforms,ensuring businesses can focus on business development.To ensure data security in cloud platforms,this research proposed a blockchain-based Hybridized Data Driven Cognitive Computing(HD2C)model.However,the proposed HD2C framework addresses breaches of the privacy information of mixed participants of the Internet of Things(IoT)in the cloud.HD2C is developed by combining Federated Learning(FL)with a Blockchain consensus algorithm to connect smart contracts with Proof of Authority.The“Data Island”problem can be solved by FL’s emphasis on privacy and lightning-fast processing,while Blockchain provides a decentralized incentive structure that is impervious to poisoning.FL with Blockchain allows quick consensus through smart member selection and verification.The HD2C paradigm significantly improves the computational processing efficiency of intelligent manufacturing.Extensive analysis results derived from IIoT datasets confirm HD2C superiority.When compared to other consensus algorithms,the Blockchain PoA’s foundational cost is significant.The accuracy and memory utilization evaluation results predict the total benefits of the system.In comparison to the values 0.004 and 0.04,the value of 0.4 achieves good accuracy.According to the experiment results,the number of transactions per second has minimal impact on memory requirements.The findings of this study resulted in the development of a brand-new IIoT framework based on blockchain technology.
基金This project has been funded by the Scientific Research Deanship at the University of Ha’il-Saudi Arabia through project number BA-2105.
文摘Internet of things(IoT)field has emerged due to the rapid growth of artificial intelligence and communication technologies.The use of IoT technology in modern healthcare environments is convenient for doctors and patients as it can be used in real-time monitoring of patients,proper administration of patient information,and healthcare management.However,the usage of IoT in the healthcare domain will become a nightmare if patient information is not securely maintainedwhile transferring over an insecure network or storing at the administrator end.In this manuscript,the authors have developed a secure IoT healthcare monitoring system using the Blockchainbased XOR Elliptic Curve Cryptography(BC-XORECC)technique to avoid various vulnerable attacks.Initially,thework has established an authentication process for patient details by generating tokens,keys,and tags using Length Ceaser Cipher-based PearsonHashingAlgorithm(LCC-PHA),EllipticCurve Cryptography(ECC),and Fishers Yates Shuffled Based Adelson-Velskii and Landis(FYS-AVL)tree.The authentications prevent unauthorized users from accessing or misuse the data.After that,a secure data transfer is performed using BC-XORECC,which acts faster by maintaining high data privacy and blocking the path for the attackers.Finally,the Linear Spline Kernel-Based Recurrent Neural Network(LSK-RNN)classification monitors the patient’s health status.The whole developed framework brings out a secure data transfer without data loss or data breaches and remains efficient for health care monitoring via IoT.Experimental analysis shows that the proposed framework achieves a faster encryption and decryption time,classifies the patient’s health status with an accuracy of 89%,and remains robust comparedwith the existing state-of-the-art method.
文摘Embedded computing device implementation on the Internet of Things (IoT) requires careful assessment of their intrinsic resource limitations. These constraints are not limited to memory and processing capabilities but extend to the network interfaces, particularly due to the low-power radio standards that these devices typically employ. The IPv6 protocol is shown to be a strong option for guaranteeing interoperability in the IoT, mostly because of its large address space, the range of current IP-based protocols, and its intrinsic versatility. Considering these benefits, we investigate if current IP-based network management protocols can be implemented on devices with limited resources. We investigate the resource needs in particular for implementing Network Configuration Protocol (NETCONF) and Simple Network Management Protocol (SNMP) on an 8-bit AVR-based device. Our investigation reveals the specific memory and processing demands of these protocols, providing valuable insights into their practicality and efficiency in constrained IoT environments. This study underscores the potential and challenges of leveraging IPv6-based network management protocols to enhance the functionality and interoperability of IoT devices while operating within stringent resource limitations.
文摘The purpose of this research is to deal with effective block chain framework for secure transactions.The rate of effective data transactions and the interoperability of the ledger are the two major obstacles involved in Blockchain and to tackle this issue,Cross-Chain based Transaction(CCT)is introduced.Traditional industries have been restructured by the introduction of Internet of Things(IoT)to become smart industries through the feature of data-driven decision-making.Still,there are a few limitations,like decentralization,security vulnerabilities,poor interoperability,as well as privacy concerns in IoTs.To overcome this limitation,Blockchain has been employed to assure a safer transaction process,especially in asset exchanges.In recent decades,scalable local ledgers implement Blockchains,simultaneously sustaining peer validations of transactions which can be at local or global levels.From the single Hyperledger-based blockchains system,the CCT takes the transaction amid various chains.In addition,the most significant factor for this registration processing strategy is the Signature to ensure security.The application of the Quantum cryptographic algorithm amplifies the proposed Hyperledger-based blockchains,to strengthen the safety of the process.The key has been determined by restricting the number of transactions that reach the global Blockchain using the quantum-based hash function and accomplished by scalable local ledgers,and peer validations of transactions at local and global levels without any issues.The rate of transaction processing for entire peers has enhanced with the ancillary aid of the proposed solution,as it includes the procedure of load distribution.Without any boosted enhancement,the recommended solution utilizes the current transaction strategy,and also,it’s aimed at scalability,resource conservation,and interoperability.The experimental results of the system have been evaluated using the metrics like block weight,ledger memory,the usage of the central processing unit,and the communication overhead.
文摘The Internet of Things (IoT) and Cloud computing are gaining popularity due to their numerous advantages, including the efficient utilization of internetand computing resources. In recent years, many more IoT applications have beenextensively used. For instance, Healthcare applications execute computations utilizing the user’s private data stored on cloud servers. However, the main obstaclesfaced by the extensive acceptance and usage of these emerging technologies aresecurity and privacy. Moreover, many healthcare data management system applications have emerged, offering solutions for distinct circumstances. But still, theexisting system has issues with specific security issues, privacy-preserving rate,information loss, etc. Hence, the overall system performance is reduced significantly. A unique blockchain-based technique is proposed to improve anonymityin terms of data access and data privacy to overcome the above-mentioned issues.Initially, the registration phase is done for the device and the user. After that, theGeo-Location and IP Address values collected during registration are convertedinto Hash values using Adler 32 hashing algorithm, and the private and publickeys are generated using the key generation centre. Then the authentication is performed through login. The user then submits a request to the blockchain server,which redirects the request to the associated IoT device in order to obtain thesensed IoT data. The detected data is anonymized in the device and stored inthe cloud server using the Linear Scaling based Rider Optimization algorithmwith integrated KL Anonymity (LSR-KLA) approach. After that, the Time-stamp-based Public and Private Key Schnorr Signature (TSPP-SS) mechanismis used to permit the authorized user to access the data, and the blockchain servertracks the entire transaction. The experimental findings showed that the proposedLSR-KLA and TSPP-SS technique provides better performance in terms of higherprivacy-preserving rate, lower information loss, execution time, and Central Processing Unit (CPU) usage than the existing techniques. Thus, the proposed method allows for better data privacy in the smart healthcare network.
文摘Internet of Things (IoT) is ubiquitous, including objects or devices communicating through heterogenous wireless networks. One of the major challenges in mobile IoT is an efficient vertical handover decision (VHD) technique between heterogenous networks for seamless connectivity with constrained resources. The conventional VHD approach is mainly based on received signal strength (RSS). The approach is inefficient for vertical handover, since it always selects the target network with the strongest signal without taking into consideration of factors such as quality of service (QoS), cost, delay, etc. In this paper, we present a hybrid approach by integrating the multi-cri- teria based VHD (MCVHD) technique and an algorithm based on fuzzy logic for efficient VHD among Wi-Fi, Radio and Satellite networks. The MCVHD provides a lightweight solution that aims to achieving seamless connectivity for mobile IoT Edge Gateway over a set of heterogeneous networks. The proposed solution is evaluated in real time using a testbed containing real IoT devices. Further, the testbed is integrated with lightweight and efficient software techniques, e.g., microservices, containers, broker, and Edge/Cloud techniques. The experimental results show that the proposed approach is suitable for an IoT environment and it outperforms the conventional RSS Quality based VHD by minimizing handover failures, unnecessary handovers, handover time and cost of service.