scispace - formally typeset
Search or ask a question

Showing papers in "IEEE Consumer Electronics Magazine in 2021"


Journal ArticleDOI
TL;DR: This work proposes a blockchain-based medical research support platform, which can provide efficient and privacy-preserving data sharing against COVID-19 and shows that the read and write performance and security performance on the alliance chain meet the requirements.
Abstract: COVID-19 is a major global public health challenge and difficult to control in a short time completely. To prevent the COVID-19 epidemic from continuing to worsen, global scientific research institutions have actively carried out studies on COVID-19, thereby effectively improving the prevention, monitoring, tracking, control, and treatment of the epidemic. However, the COVID-19 electronic medical records (CEMRs) among hospitals worldwide are managed independently. With privacy consideration, CEMRs cannot be made public or shared, which is not conducive to in-depth and extensive research on COVID-19 by medical research institutions. In addition, even if new research results are developed, the disclosure and sharing process is slow. To address this issue, we propose a blockchain-based medical research support platform, which can provide efficient and privacy-preserving data sharing against COVID-19. First, hospitals and medical research institutions are treated as nodes on the alliance chain, so consensus and data sharing among the nodes is achieved. Then, COVID-19 patients, doctors, and researchers need to be authenticated in various institutes. Moreover, doctors and researchers need to be registered with the Fabric certificate authority. The CEMRs for COVID-19 patients uses the blockchain's pseudonym mechanism to protect privacy. After that, doctors upload CEMRs on the alliance chain, and researchers can obtain CEMRs from the alliance chain for research. Finally, the research results will be published on the blockchain for doctors to use. The experimental results show that the read and write performance and security performance on the alliance chain meet the requirements, which can promote the wide application of scientific research results against COVID-19.

102 citations


Journal ArticleDOI
TL;DR: A HoneyNet approach that includes both threat detection and situational awareness to enhance the security and resilience of AIoT is proposed and the feasibility and effectiveness are demonstrated.
Abstract: Artificial Intelligence of Things (AIoT) is emerging as the future of Industry 4.0 and will be widely applied in consumer, commercial, and industrial fields. In AIoT, intelligent objects (smart devices), smart gateways, and edge/cloud nodes are subject to a large number of security threats and attacks. However, the traditional network security approaches are not fully suitable for AIoT. To address this issue, this paper proposes a HoneyNet approach that includes both threat detection and situational awareness to enhance the security and resilience of AIoT. We first design a HoneyNet based on Docker technology that collects data to detect adversaries and monitor their attack behaviors. The collected data are then converted into images and used as samples to train a deep learning model. Finally, the trained model is deployed in AIoT to perform threat detection and provide situational awareness. To validate our scheme, we conduct HoneyNet deployment and model training on the SiteWhere AIoT platform and construct a simulation environment on this platform for threat detection and situational awareness. The experimental results demonstrate the feasibility and effectiveness of our solution.

65 citations



Journal ArticleDOI
TL;DR: A lightweight authentication protocol for IoT devices named Light-Edge is introduced using a three-layer scheme, including IoT device layer, trust center at the edge layer, and cloud service providers, which shows the superiority of the proposed protocol against other approaches in terms of attack resistance, communication cost, and time cost.
Abstract: Due to the ever-growing use of active Internet devices, the Internet has achieved good popularity at present. The smart devices could connect to the Internet and communicate together that shape the Internet of Things (IoT). Such smart devices are generating data and are connecting to each other through edge-cloud infrastructure. Authentication of the IoT devices plays a critical role in the success of the integration of IoT, edge, and cloud computing technologies. The complexity and attack resistance of the authentication protocols are still the main challenges. Motivated by this, this paper introduces a lightweight authentication protocol for IoT devices named Light-Edge using a three-layer scheme, including IoT device layer, trust center at the edge layer, and cloud service providers. The results show the superiority of the proposed protocol against other approaches in terms of attack resistance, communication cost, and time cost.

52 citations


Journal ArticleDOI
TL;DR: The model presented in this work is well adapted to the changing environment, thereby redefining the terms of sustainability and highlighting a new IoT-based solution, which is smart and sustainable.
Abstract: This article presents the potential of Internet-of-Things (IoT) in the area of greenhouse farming and leading to the smart agriculture. The different parameters, such as humidity, water nutrients solution level, pH and electrical conductivity (EC) value, temperature, UV light intensity, CO2 level, mist, and amount of insecticides or pesticides, are monitored through various sensors so that significant knowledge can be captured and early fault detection and diagnosis can be done. A decision support system (DSS) acts as the central operating system that governs and coordinates all the activities. Furthermore, this work also accounts for the different challenges of greenhouse rose farming and highlights a new IoT-based solution, which is smart and sustainable. The model presented in this work is well adapted to the changing environment, thereby redefining the terms of sustainability.

42 citations


Journal ArticleDOI
TL;DR: In this article, the role of free space optics (FSO) in the creation of next-generation satellite networks is analyzed, and a comparison of FSO and radio frequency (RF) technologies for intersatellite links (ISLs) is provided, including a comparison between FSO and RF links when employed between low Earth orbit satellites.
Abstract: Free space optics (FSO) refers to optical wireless communications in outdoor environments. The aim of this article is to analyze the role that FSO is envisaged to play in the creation of next-generation satellite networks. To begin with, the reader is introduced to the types of FSO links and functionalities of a basic FSO system. Next, a comparison of FSO and radio frequency (RF) technologies for intersatellite links (ISLs) is provided, including a comparison between FSO and RF links when employed between low Earth orbit satellites. After that, the types of FSO or laser ISLs are considered, and the challenges in establishing laser ISLs, the properties of laser ISLs, and the capabilities of terminals for laser ISLs are discussed. Then, the parameters of a satellite constellation are highlighted, and different aspects of SpaceX's upcoming megaconstellation Starlink are explored. In addition, the optical wireless satellite network that is created by utilizing laser ISLs is examined. Finally, a use case is investigated for next-generation optical wireless satellite networks that are envisioned by the mid to late 2020s.

37 citations


Journal ArticleDOI
TL;DR: This article is considering multi-access edge computing (MEC) flavor of the edge paradigms for realizing the contact-less approaches that assist the mediation of COVID-19 and the future of healthcare.
Abstract: COVID-19 or coronavirus has thrilled the entire world population with uncertainty over their survival and well-being. The impact this pathogen has caused over the globe has been profound due to its unique transmission features; that urges for contact-less strategies to interact and treat the infected. The impending 5G mobile technology is immersing the applications that enable the provisioning of medical and healthcare services in a contact-less manner. The edge computing paradigms offer a decentralized and versatile networking infrastructure capable of adhering to the novel demands of 5G. In this article, we are considering multi-access edge computing (MEC) flavor of the edge paradigms for realizing the contact-less approaches that assist the mediation of COVID-19 and the future of healthcare. In order to formulate this ideology, we propose three use cases and discuss their implementation in the MEC context. Furthermore, the requirements for launching these services are provided. Additionally, we validate our proposed approaches through simulations.

32 citations


Journal ArticleDOI
TL;DR: The article discusses security-by-design (SbD) concepts in the energy harvester technologies for sustainable and secured IoT with uninterrupted energy resource smart villages and smart cities.
Abstract: The Internet-of-Things (IoT) consists of a large number of different and heterogeneous devices under one umbrella. Building a typical architecture for the devices used in IoT is a challenge due to the involvement of a vast number of devices, layers, protocols, middleware, and software. The sensors in IoT have to monitor the activities regularly, making the end node devices energy hungry. Traditional fixed batteries get drained out in limited time, requiring continuous replacement, thereby increasing the budget. This article focuses on consumer technologies in the perspective of IoT computing targeted for smart villages and smart cities. The article discusses security-by-design (SbD) concepts in the energy harvester technologies for sustainable and secured IoT with uninterrupted energy resource smart villages and smart cities.

31 citations


Journal ArticleDOI
TL;DR: Based on the qualitative and quantitative experimental analysis, it can be concluded that the P-MEC model stands firm compared with the state-of-the-art models and has strong robustness against statistical attack, vulnerability attack, and other comprehensive attacks.
Abstract: In this multimedia era, the security of multimedia content over the Cloud becomes a crucial research area There are several modes of communication available for transmitting the information over the Cloud from one place to another place around the globe Such communication networks are open to all where anyone can access the data very easily Therefore, the security of multimedia data over the Cloud becomes a major challenge This study highlights better protection of multimedia content over Cloud in comparison to the existing approaches, where the information cannot be unwrapped in a reasonable time The Strength of RSA, ElGamal, Diffie Hellman, and many more Cryptographic algorithms depend on the concept of congruence As of now, the solution for linear and quadratic congruence had made its use limited, but this study had changed it by introducing the solution for Cubic and Polynomial congruence The polynomial congruence concept has been used to encrypt the multimedia content Based on the qualitative and quantitative experimental analysis, it can be concluded that the P-MEC model stands firm compared with the state-of-the-art models The security analysis and experimental results display that the proposed scheme has strong robustness against statistical attack, vulnerability attack, and other comprehensive attacks

28 citations


Journal ArticleDOI
TL;DR: State-of-the-art communication technologies and consumer electronics aspect for implementing the IoUT network are provided and various research requirements and challenges concerning the efficient design and proper implementation of IoUT networks are classified.
Abstract: This article introduces the latest advancements in the field of Internet of Underwater Things (IoUT) with importance toward the technological aspects for communication and location awareness. The IoUT is composed of underwater devices such as sensor nodes with defined communication and networking protocols. The IoUT framework integrates various marine communication technologies based on acoustic waves, radio waves, optical waves, and magnetic induction. This new framework enables multiple applications, including ocean exploration, assisted navigation, location awareness, and environmental pollution control. Hence, this article provides state-of-the-art communication technologies and consumer electronics aspect for implementing the IoUT network. Furthermore, this article also states the recent advancements in IoUT and its useful applications in the underwater environment. Moreover, we also classify various research requirements and challenges concerning the efficient design and proper implementation of IoUT networks.

28 citations


Journal ArticleDOI
TL;DR: How the future electric energy system with 100% electricity supply from renewable energy sources requires the “birth of security and resiliency” incorporated with its ecosystem is described.
Abstract: The concept of smart cities is driven by the need to enhance citizens' quality of life. It is estimated that 70% of the world population will live in urban areas by 2050. The electric grid is the energy backbone of smart city deployments. An electric energy system immune to adverse events, both cyber and physical risks, and able to support the integration of renewable sources will drive a transformational development approach for future smart cities. This article describes how the future electric energy system with 100% electricity supply from renewable energy sources requires the “birth of security and resiliency” incorporated with its ecosystem.

Journal ArticleDOI
TL;DR: A Blockchain-based medical data-sharing framework (called GlobeChain) is introduced to overcome the technical challenges to handle the outbreak records and the challenges that might arise due to the proposed Blockchain- based framework are presented.
Abstract: Contagious diseases are prevalent even in the current era of advanced technology. A uniformed initiative is required to build a reliable interactive information exchange service targeting vaccination data management and other medical services. The conventional data exchange mechanism is centralized, creating many vulnerable issues such as a single point failure, data leakage, access control, etc. This article introduces a Blockchain-based medical data-sharing framework (called GlobeChain) to overcome the technical challenges to handle the outbreak records. The challenges that might arise due to the proposed Blockchain-based framework are also presented as a future direction that grabs the proposal's effectiveness.

Journal ArticleDOI
TL;DR: A blockchain-enabled vehicular crowdsensing system to protect user privacy and data safety in 5G Internet of Vehicles (IoV), with a deep reinforcement learning (DRL)-enabled algorithm proposed to select proper active miners and transactions to maximize the security and minimize the latency of blockchain.
Abstract: Vehicular crowdsensing has been widely leveraged in the intelligent transportation systems to collect real-time traffic data. However, the data security and privacy preservation issues have not been well investigated for vehicular crowdsensing. This article proposes a blockchain-enabled vehicular crowdsensing system to protect user privacy and data safety in 5G Internet of Vehicles (IoV). In order to maximize the security and minimize the latency of blockchain, a deep reinforcement learning (DRL)-enabled algorithm is proposed to select proper active miners and transactions. Then, a two-sided matching-based algorithm is put forwarded to allocate the nonorthogonal multiple access subchannels to minimize the maximum uploading delay of all users to guarantee the freshness of messages. Extensive experimental results demonstrate the effectiveness of our system. Finally, system analysis demonstrates that our system can protect user privacy, guarantee data security as well as integrity, and defend against common attacks. With the development of information communication techniques, vehicular crowdsensing is widely leveraged in the Intelligent Transportation Systems (ITSs) to collect real-time traffic information (e.g., traffic accidents and jams). Recently, vehicles have begun to be regarded as the consumer electronics product, due to the advancements in the development of autonomous vehicles, and users in vehicular crowdsensing focus more and more on their privacy protection and data security. In order to guarantee the connectivity and communication of users participating in the vehicular crowdsensing, intelligent management of network traffic and offering services to vehicles has become a vital need, especially for the highly dynamic topology and untrusty communication environment in 5G Internet of Vehicles (IoV).1 However, the vehicular crowdsensing-based data collection and transmission in 5G IoVs face the following major challenges:

Journal ArticleDOI
TL;DR: An introduction to UAV systems' architecture, classification, and applications is served to help researchers and practitioners starting in this field get adequate information to understand the current state of UAV technologies.
Abstract: Unmanned aerial vehicles (UAV) have been gaining significant attention in recent times as they are becoming increasingly accessible and easier to use. This article serves as an introduction to UAV systems’ architecture, classification, and applications to help researchers and practitioners starting in this field get adequate information to understand the current state of UAV technologies. The article starts by inspecting the UAVs’ body configuration styles and explains the physical components and sensors that are necessary to operate and fly a UAV system. The article also provides a comparison of several components for state-of-the-art UAVs. The article further discusses different propulsion methods and various payloads that could be mounted on the UAV. The article then explores the classification of UAVs followed by the application of UAVs in different domains, such as recreational, commercial, and military. Finally, the article provides a discussion of futuristic technologies and applications of UAVs along with their associated challenges.

Journal ArticleDOI
TL;DR: A new “active mask” paradigm is presented, in which the wearable device is equipped with smart sensors and actuators to both detect the presence of airborne pathogens in real time and take appropriate action to mitigate the threat.
Abstract: Face masks provide effective, easy-to-use, and low-cost protection against airborne pathogens or infectious agents, including SARS-CoV-2. Existing masks are all passive in nature, i.e., simply act as air filters for the nasal passage and/or mouth. This article presents a new “active mask” paradigm, in which the wearable device is equipped with smart sensors and actuators to both detect the presence of airborne pathogens in real time and take appropriate action to mitigate the threat. The proposed approach is based on a closed-loop control system that senses airborne particles of different sizes near the mask and then makes intelligent decisions to reduce their concentrations. In the current implementation, an on-board controller determines ambient air quality via a commercial particulate matter sensor, and if necessary activates a piezoelectric actuator that generates a mist spray to load these particles, thus causing them to fall to the ground. The system communicates with the user via a smart phone application that provides various alerts, including the need to recharge and/or decontaminate the mask prior to reuse. The application also enables a user to override the on-board control system and manually control the mist generator if necessary. Experimental results from a functional prototype demonstrate significant reduction in airborne PM counts near the mask when the active protection system is enabled.

Journal ArticleDOI
TL;DR: SSA finds several applications and provides a futuristic perspective for developing efficient and economical CE devices that can automate multiple processes, monitor the soil health, growth of the crops, animal husbandry, detect anomalies in crop growth or livestock health, and enhance agriculture product quality and volumes.
Abstract: Smart sensing for agriculture (SSA) is an emerging paradigm to facilitate quantitative and qualitative improvement in the productions. It incorporates a large number of low cost and low energy consuming sensors for inducing automation and reducing human efforts. SSA not only increases the monetary benefits of farmers but also ensures the delivery of fresh products. SSA uses a variety of consumer electronics (CE) devices that can automate multiple processes, monitor the soil health, growth of the crops, animal husbandry, detect anomalies in crop growth or livestock health, and enhance agriculture product quality and volumes. These devices incorporate various short-range and long-range communication protocols for relaying the sensory data. SSA finds several applications and provides a futuristic perspective for developing efficient and economical CE devices. This encourages us to present a taxonomy of different applications and advancements in agriculture through smart sensing. We also discuss different challenges that we incur while developing CE devices for smart agriculture.

Journal ArticleDOI
TL;DR: BIIoVT: Blockchain-based Secure Storage Architecture for Intelligent Internet of Vehicular Things (IIVoT) to mitigate the above-mention issues and show an outstanding balance of secure storage and efficiency for the IoVT compared to existing methods.
Abstract: Today, the rapid growth of vehicles connected to the Internet enables provides various services to consumers, including traffic management, traffic safety, and entertainment. Vehicular Ad-Hoc Network (VANET) is one of the most prominent and emerging technologies on the Internet of Vehicular Things (IoVT). This technology offers to fulfill requirements such as robust information exchange, and infotainment among vehicles for the smart city environment. Still, it has some challenges such as centralization, storage, security, and privacy because all city vehicular networks send vehicles and road-related information data directly to the cloud. This article proposes BIIoVT: Blockchain-based Secure Storage Architecture for Intelligent Internet of Vehicular Things (IIVoT) to mitigate the above-mention issues. Blockchain provides security and privacy at each city's vehicular networks and decentralized storage at the cloud layer with a Distributed Hash Table (DHT). It also examines how the vehicular network offers a secure platform. The validation results of the proposed architecture show an outstanding balance of secure storage and efficiency for the IoVT compared to existing methods.

Journal ArticleDOI
TL;DR: Key smart agricultural technologies discussed include data-driven honey yield prediction and verification, a smart distribution system built on blockchain technology, pollen signature verification with machine learning algorithms, and a final customer information portal that has the potential to further several of the United Nations’ Sustainable Development Goals.
Abstract: Smart agricultural systems can ensure food security at the source, combat counterfeits and mislabeled goods, garner and preserve trust, and reduce the price of product differentiation. In the honey sector, a smart supply chain could help lift beekeepers out of poverty by generating better market opportunities and value for their honey and strengthening apiculture's position as a vital component of sustainable agriculture. In doing so, the proposed system improves food security and food safety, and reduces honey fraud while strengthening greater biodiversity. This article shows how an open, image-based traceability system designed for sustainable development can be built and used around the world. Key smart agricultural technologies discussed include data-driven honey yield prediction and verification, a smart distribution system built on blockchain technology, pollen signature verification with machine learning algorithms, and a final customer information portal. Taken together, this smart agricultural system has the potential to further several of the United Nations’ Sustainable Development Goals.

Journal ArticleDOI
TL;DR: This work presents a unique concept that integrates blockchain with lightweight cryptographic solutions targeting resource-constrained IoT sensor nodes, and proof-of-authentication utilizing a lightweight authenticated encryption (AE) scheme to achieve consensus.
Abstract: IoT nodes comprise of sensors and resource-constrained embedded systems. On the other hand, blockchain is regarded as computationally expensive due to the consensus algorithm (e.g. Proof of Work) and hash computation (i.e. Merkle tree). Therefore, it is challenging to apply blockchain to an IoT system. This work presents a unique concept that integrates blockchain with lightweight cryptographic solutions targeting resource-constrained IoT sensor nodes. In particular, proof of authentication utilizing a lightweight authenticated encryption (AE) scheme to achieve consensus is proposed. Each IoT sensor node generates its own distinctive tag based on the input sensor data, and broadcasts it to the blockchain network. The trusted nodes (e.g. a gateway) in the network authenticate sensor nodes using the lightweight AE scheme. The authenticated block is then hashed by a lightweight hash function and added to the blockchain. The proposed proof of authentication scheme can be implemented in software (e.g. microcontroller) or hardware platform (e.g. FPGA, ASIC). Experimental results show that lightweight authentication can perform 1.34M authentications-per-second with only 6.55k look-up tables (LUTs) on the Spartan- 6 FPGA platform. This high-throughput authentication can speed up the consensus in blockchain, utilizing few resources and making it very suitable for applications in IoT sensor nodes

Journal ArticleDOI
TL;DR: An overview of opportunities investigated by current solutions combining VR, AR, and Blockchain will be discussed, showing how they allowed both companies and academic researchers cope with issues affecting traditional services and products in a rather heterogenous set of application domains.
Abstract: Nowadays, breakthrough technologies, such as virtual reality (VR), augmented reality (AR), and Blockchain, have definitively attracted the attention of a huge number of investors worldwide. Although, at first glance, Blockchain (traditionally used for financial services) seems to have little to none to share with VR and AR (originally adopted for entertainment), in the last few years several use cases started to appear showing effective ways to integrate these technologies. In this article, an overview of opportunities investigated by current solutions combining VR, AR, and Blockchain will be discussed, showing how they allowed both companies and academic researchers cope with issues affecting traditional services and products in a rather heterogenous set of application domains. Opportunities that could foster the convergence of these technologies and boost them further are also discussed.

Journal ArticleDOI
TL;DR: Several artificial intelligence (AI) approaches for improving performance and privacy within a previously proposed e-Cash scheme called PUF-Cash are investigated, which utilizes physical unclonable functions for authentication and encryption operations between Alice, the Bank, and multiple trusted third parties.
Abstract: Electronic money or e-Cash is becoming increasingly popular as the preferred strategy for making purchases, both on and offline. Several unique attributes of e-Cash are appealing to customers, including the convenience of always having “cash-on-hand” without the need to periodically visit the ATM, the ability to perform peer-to-peer transactions without an intermediary, and the peace of mind associated in conducting those transactions privately. Equally important is that paper money provides customers with an anonymous method of payment, which is highly valued by many individuals. Although anonymity is implicit with fiat money, it is a difficult property to preserve within e-Cash schemes. In this article, we investigate several artificial intelligence (AI) approaches for improving performance and privacy within a previously proposed e-Cash scheme called PUF-Cash.PUF-Cash utilizes physical unclonable functions for authentication and encryption operations between Alice, the Bank, and multiple trusted third parties. The AI methods select a subset of the TTPs and distribute withdrawal amounts to maximize the performance and privacy associated with Alice's e-Cash tokens. Simulation results show the effectiveness of the various AI approaches using a large test-bed architecture.

Journal ArticleDOI
TL;DR: Recommendations and associated risks for diabetic patients to balance glycemic profiles during the CO VID-19 outbreak are discussed and emerging smart healthcare that can potentially safeguard against COVID-19 are presented.
Abstract: Diabetic patients are at higher risk from novel coronavirus disease 2019 (COVID-19) that spreads through Severe Acute Respiratory Syndrome Coronavirus 2 (SARS-CoV-2). There are around 20% to 50% of COVID-19 cases who had diabetes across the different regions of the world. This article discusses recommendations and associated risks for diabetic patients to balance glycemic profiles during the COVID-19 outbreak. It also discusses the case study of various countries with impact of COVID-19 for diabetic patients. It presents emerging smart healthcare that can potentially safeguard against COVID-19.

Journal ArticleDOI
TL;DR: How the use of cutting edge technologies such as the Internet of Things (IoT), Big data, artificial intelligence (AI), unmanned aerial vehicles/drones, blockchain, robotics, autonomous ground vehicles, communication technologies in screening, testing, contact tracing, spread analysis, sanitization, and protocol enforcements can help prevent the COVID-19 spread is discussed.
Abstract: Without an effective vaccine, treatment, or therapy, the Coronavirus Disease 2019 (COVID-19) is spreading like fire and claiming lives. Countries began to adopt various strategies such as lockdown, mass testing, tracing, quarantine, sanitization, isolation, and treatment to contain COVID-19. However, it was soon realized that we need to take the help of powerful technologies to combat the spread of deadly COVID-19 until a vaccine or a drug is discovered. In this article, we discuss how the use of cutting edge technologies such as the Internet of Things (IoT), Big data, artificial intelligence (AI), unmanned aerial vehicles (UAVs)/drones, blockchain, robotics, autonomous ground vehicles, communication technologies in screening, testing, contact tracing, spread analysis, sanitization, and protocol enforcements can help prevent the COVID-19 spread.

Journal ArticleDOI
TL;DR: The design and development of an IoT-enhanced device—FarmFox, which can analyze the sensed information and transmitting it to the user via the internet, and the results confirm the success of soil health in terms of the four parameters.
Abstract: The amalgamation of traditional farming methodology with IoT can lead to sustainable agriculture. With this rationale, we have designed and developed an IoT-enhanced device—FarmFox, which can analyze the sensed information and transmitting it to the user via the internet. FarmFox thrives in real-time data collection, soil health monitoring via in-situ analysis, and controlling the whole architecture from a remote location. Compared to existing devices, FarmFox is an economic alternative as it utilizes Arduino-based hardware. Turbidity and pH, these two parameters are first incorpporated in FarmFox. The results confirm the success of soil health in terms of the four parameters. It is expected that the real-life implementation of FarmFox will lead toward a cost-effective smart solution for sustainable agriculture.

Journal ArticleDOI
TL;DR: This article critically review the existing integration approaches and cryptocurrency designs that strive to enable micropayments among consumer devices and identifies and discusses solutions under three main categories; direct integration, payment channel network, and new cryptocurrency design.
Abstract: Blockchain based cryptocurrencies have received great attention but long confirmation times of transactions hinder its adoption for micro-payments. Payment network is one of the solutions proposed to address the scalability issue. It transforms the problem into a routing problem by leveraging Hash Time Locked Contracts (HTLC). Payment networks possess unique characteristics to be considered when routing protocol is designed. Channels must stay balanced to have a sustainable network. In this paper, we present a payment network design that aims to keep the channels balanced by using a common weight policy across the network. We additionally utilize multi-point connection for unbalanced payment scenarios. The results show that we can keep the channels in the network more equally balanced compared to minimal fee approach and multiple connections from customers to stores increases the success ratio.

Journal ArticleDOI
TL;DR: An artificial intelligence based blockchain-envisioned access control framework for malicious attacks detection and mitigation has been suggested to secure the IoE environment and a blockchain-based implementation has been conducted on this framework.
Abstract: In Internet of Everything (IoE), malicious attacks detection and mitigation are important issues. These issues can be resolved through an access control framework where two entities first authenticate each other prior to establishing any secret key for their secure communication. The sensing data of various smart devices in an IoE environment are processed securely at the nearby fog servers and at the same time legitimate users can also access the real-time data directly from designated smart devices through access control mechanism. We first discuss various attack trends in an IoE environment. After that, we discuss evolution of the blockchain technology in the IoE. An artificial intelligence based blockchain-envisioned access control framework for malicious attacks detection and mitigation has been suggested to secure the IoE environment. Finally, a blockchain-based implementation has been conducted on the proposed blockchain-envisioned access control framework for measuring the computational time needed for varying number of blocks mined in the blockchain and also for varying number of transactions per block.

Journal ArticleDOI
TL;DR: This work is the first to investigate the applicability of Internet attack detection through federated machine learning through FML, to the best of the knowledge, and the evaluated results show that FML suits practical scenarios, where the variable image size may distract consumer from fetching relevant results.
Abstract: Enormous amount of information is processed at different web sites, on a number of different AI tools and in multiple data silos. Sharing data between various sources, this is a significant obstacle, due to administrative, organizational and security considerations. One possible solution is federated machine learning (FML), a system that simultaneously sends machine learning algorithms to all data sources, trains models at each source and aggregates the learned models. This technique ensures consumer influenced solution by processing the data locally. This work is the first to investigate the applicability of Internet attack detection through FML, to the best of our knowledge. Our primary contributions include the application of federated learning to satisfy customer search queries by detecting malicious spam images, which may lead these AI systems to retrieve irrelevant information. We assess and analyze the FML-entangled learning output comprehensively in different ways adjustments including balanced and imbalanced customer data distribution, scalability, and overhead communication. Our measuring results show that FML suits practical scenarios, where variable image size, including the animation ratio to legitimate samples of images present among the advertisements that may distract consumer from fetching relevant results. With the evaluated results, the state-of-the-art FedLearnSP proved significant image spam detection.

Journal ArticleDOI
TL;DR: This article gives a summary of the uses of the blockchain, while answering the above three important questions.
Abstract: The questions “When do we use the blockchain?” or “Where do we use the blockchain?” or “Why do we use the blockchain?” look simple, but these questions become complicated due to the increasing utilization of the blockchain. These days, it is being explored as a standard security solution. The blockchain has unique properties, and these are entirely different from other standard security or cryptography solutions. This article gives a summary of the uses of the blockchain, while answering the above three important questions.

Journal ArticleDOI
Shuo Gao1, Junliang Chen1, Yanning Dai1, Rui Wang1, Shuaibo Kang1, Lijun Xu1 
TL;DR: Smart integration of piezoelectric films with different polarization orientations and 32 electrodes is presented, for supporting both normal and shear stress detection with high three-dimensional resolution, and accurate and real-time gait monitoring for the majority parts of the plantar area is obtained.
Abstract: Insole gait analysis has become a research focus in recent years, owing to its potential in sports training improvement, and real-time and long-term health status monitoring. Among diverse insole gait analysis technologies, piezoelectric-based techniques receive growing attention, due to its nature in converting force to electric signals, potentially ensuring long-battery lifetime compared to its counterparts. However, current literature mainly reports on the detection of 6–8 main plantar positions for motion interpretation, lacking in providing enough information for illness diagnosis, e.g., hip disease. In this article, smart integration of piezoelectric films with different polarization orientations and 32 electrodes is presented, for supporting both normal and shear stress detection with high three-dimensional resolution. High sensitivities at 56 and 173 mN are demonstrated experimentally for normal and shear stress sensing. With our comprehensive algorithms, accurate and real-time gait monitoring for the majority parts of the plantar area is obtained. This paper can support diverse utilization purposes, advancing the area of insole gait analysis.

Journal ArticleDOI
TL;DR: A novel technique based on call data record analysis (CDRA) and contact tracing is proposed, which can effectively control the coronavirus outbreak and helps in isolating the patient in his/her house.
Abstract: Coronavirus or COVID-19, which has been declared pandemic by the World Health Organization, has incurred huge losses to the lives of people throughout the world. Although the scientists, researchers, and doctors are working round the clock to develop a vaccine for COVID-19, it may take a year or two to make a safe and effective vaccine available for the world. In current circumstances, a solution must be developed to control or stop the spread of the virus. For this purpose, a novel technique based on call data record analysis (CDRA) and contact tracing is proposed, which can effectively control the coronavirus outbreak. A positive coronavirus patient can be traced through CDRA and contact tracing. The technique can track the path traversed by the patient and collect the cell numbers of all those people who have met with the patient. Keeping intact the privacy of this group of people, when a test result of a person comes positive among the group, then he/she must be isolated and same CDRA and contact tracing procedures are adopted for that person. A COVID-19 patient is geotagged and alerts are sent if any violation of isolation is done by the patient. Moreover, the general public is informed in advance to avoid the path followed by the patients. This privacy-preserved and cost-effective mechanism is not only capable to control the coronavirus outbreak but also helps in isolating the patient in his/her house.