scholarly journals A Novel Framework of an IOT-Blockchain-Based Intelligent System

2022 ◽  
Vol 2022 ◽  
pp. 1-13
Author(s):  
Aliaa M. Alabdali

With the growing need of technology into varied fields, dependency is getting directly proportional to ease of user-friendly smart systems. The advent of artificial intelligence in these smart systems has made our lives easier. Several Internet of Things- (IoT-) based smart refrigerator systems are emerging which support self-monitoring of contents, but the systems lack to achieve the optimized run time and data security. Therefore, in this research, a novel design is implemented with the hardware level of integration of equipment with a more sophisticated software design. It was attempted to design a new smart refrigerator system, which has the capability of automatic self-checking and self-purchasing, by integrating smart mobile device applications and IoT technology with minimal human intervention carried through Blynk application on a mobile phone. The proposed system automatically makes periodic checks and then waits for the owner’s decision to either allow the system to repurchase these products via Ethernet or reject the purchase option. The paper also discussed the machine level integration with artificial intelligence by considering several features and implemented state-of-the-art machine learning classifiers to give automatic decisions. The blockchain technology is cohesively combined to store and propagate data for the sake of data security and privacy concerns. In combination with IoT devices, machine learning, and blockchain technology, the proposed model of the paper can provide a more comprehensive and valuable feedback-driven system. The experiments have been performed and evaluated using several information retrieval metrics using visualization tools. Therefore, our proposed intelligent system will save effort, time, and money which helps us to have an easier, faster, and healthier lifestyle.

Author(s):  
Vijaya Ravindra Wankhade

Abstract: In recent years, the emergence of blockchain technology (BT) has become a novel, most disruptive, and trending technology. The redistributed database in BT emphasizes data security and privacy. Also, the consensus mechanism makes positive that data is secured and bonafide. Still, it raises new security issues like majority attacks and double-spending. To handle the said problems, data analytics is required on blockchain-based secure knowledge. Analytics on these data raises the importance of arising technology Machine Learning (ML). ml involves the rational quantity of data to create precise selections. data reliability and its sharing are terribly crucial in ml to enhance the accuracy of results. the combination of those two technologies (ML and BT) provide give highly precise results. in this paper, present gift a detailed study on ml adoption we BTbased present applications additional resilient against attacks. There area unit varied ancient ML techniques, for example, Support Vector Machines (SVM), clustering, bagging, and Deep Learning (DL) algorithms like Convolutional Neural Network (CNN) and Long STM (LSTM) are often used to analyze the attacks on a blockchain-based network. Further, we tend to embody however each the technologies are often applied in many sensible applications like unmanned Aerial Vehicle (UAV), sensible Grid (SG), healthcare, and sensible cities. Then, future analysis problems and challenges are explored. At last, a case study is presented with a conclusion. Keywords: Blockchain, machine learning, smart grid, data security and privacy, data analytics, smart applications.


Proceedings ◽  
2021 ◽  
Vol 74 (1) ◽  
pp. 24
Author(s):  
Eduard Alexandru Stoica ◽  
Daria Maria Sitea

Nowadays society is profoundly changed by technology, velocity and productivity. While individuals are not yet prepared for holographic connection with banks or financial institutions, other innovative technologies have been adopted. Lately, a new world has been launched, personalized and adapted to reality. It has emerged and started to govern almost all daily activities due to the five key elements that are foundations of the technology: machine to machine (M2M), internet of things (IoT), big data, machine learning and artificial intelligence (AI). Competitive innovations are now on the market, helping with the connection between investors and borrowers—notably crowdfunding and peer-to-peer lending. Blockchain technology is now enjoying great popularity. Thus, a great part of the focus of this research paper is on Elrond. The outcomes highlight the relevance of technology in digital finance.


Webology ◽  
2021 ◽  
Vol 18 (Special Issue 04) ◽  
pp. 453-465
Author(s):  
Nguyen Dinh Trung ◽  
Dinh Tran Ngoc Huy ◽  
Le Thi Thanh Huong ◽  
Ta Van Thanh ◽  
Nguyen Thi Phuong Thanh ◽  
...  

Once again in this study, we emphasizes strongly on applications of mathematical solutions for industrial uses. By using qualitative analysis, synthesis and inductive methods, together with statistic data, our paper target is to analyze aspects of SWOT analysis on blockchain technology and its opportunities for various industries and sectors in emerging markets such as Vietnam. This is based on the original foundation theory indicating that blockchain tech functioned as a mathematical solutions that can be applied for solving commerce secrets, with high data security and can be used for intellectual property. Among our research results is findings on the connection between IoTs - Internet of Things and blockchain tech, as well as relationship between AI - Artificial intelligence and blockchain tech. Last but not least authors propose cybersecurity risk solutions and there are policies implications attached.


2018 ◽  
Vol 7 (2.7) ◽  
pp. 797
Author(s):  
Ravinder Korani ◽  
Dr P. Chandra Sekhar Reddy

Conventional intrusion detection mechanisms face serious limitations in identifying heterogeneous and distributed type of intrusions over the IoT environment. This is due to inadequate resources and open deployment environment of IoT. Accordingly, ensuring data security and privacy are tough challenges in the practical context. This manuscript discusses various aspects of networking security and related challenges along with the concepts of system architecture. Further, endeavored to define a machine learning model that outlines two heuristics called Intrusion Scope Heuristic ( ), and benign scope heuristic ( ), which further uses in predictive analysis to identify the IOT network transaction is prone to intrusion or benign. The experimental study revealed the significance of the proposal with maximal detection accuracy, and minimal miss rate. 


2020 ◽  
Vol 2020 ◽  
pp. 1-10
Author(s):  
Zhiyan Xu ◽  
Min Luo ◽  
Neeraj Kumar ◽  
Pandi Vijayakumar ◽  
Li Li

With the popularization of wireless communication and smart devices in the medical field, mobile medicine has attracted more and more attention because it can break through the limitations of time, space, and objects and provide more efficient and quality medical services. However, the characteristics of a mobile smart medical network make it more susceptible to security threats such as data integrity damage and privacy leakage than those of traditional wired networks. In recent years, many digital signature schemes have been proposed to alleviate some of these challenges. Unfortunately, traditional digital signatures cannot meet the diversity and privacy requirements of medical data applications. In response to this problem, this paper uses the unique security attributes of sanitizable signatures to carry out research on the security and privacy protection of medical data and proposes a data security and privacy protection scheme suitable for smart mobile medical scenarios. Security analysis and performance evaluation show that our new scheme effectively guarantees data security and user privacy while greatly reducing computation and communication costs, making it especially suitable for mobile smart medical application scenarios.


2021 ◽  
Vol 8 ◽  
Author(s):  
Yujie Song ◽  
Laurène Bernard ◽  
Christian Jorgensen ◽  
Gilles Dusfour ◽  
Yves-Marie Pers

During the past 20 years, the development of telemedicine has accelerated due to the rapid advancement and implementation of more sophisticated connected technologies. In rheumatology, e-health interventions in the diagnosis, monitoring and mentoring of rheumatic diseases are applied in different forms: teleconsultation and telecommunications, mobile applications, mobile devices, digital therapy, and artificial intelligence or machine learning. Telemedicine offers several advantages, in particular by facilitating access to healthcare and providing personalized and continuous patient monitoring. However, some limitations remain to be solved, such as data security, legal problems, reimbursement method, accessibility, as well as the application of recommendations in the development of the tools.


2021 ◽  
Author(s):  
Priyanka Gupta ◽  
Lokesh Yadav ◽  
Deepak Singh Tomar

The Internet of Things (IoT) connects billions of interconnected devices that can exchange information with each other with minimal user intervention. The goal of IoT to become accessible to anyone, anytime, and anywhere. IoT has engaged in multiple fields, including education, healthcare, businesses, and smart home. Security and privacy issues have been significant obstacles to the widespread adoption of IoT. IoT devices cannot be entirely secure from threats; detecting attacks in real-time is essential for securing devices. In the real-time communication domain and especially in IoT, security and protection are the major issues. The resource-constrained nature of IoT devices makes traditional security techniques difficult. In this paper, the research work carried out in IoT Intrusion Detection System is presented. The Machine learning methods are explored to provide an effective security solution for IoT Intrusion Detection systems. Then discussed the advantages and disadvantages of the selected methodology. Further, the datasets used in IoT security are also discussed. Finally, the examination of the open issues and directions for future trends are also provided.


Author(s):  
P.Chinnasamy Et al.

The evolving agricultural technologies used mostly for remote access and modernization in farming connected via the Internet of Things (IoT) have been grown rapidly. However because of the wide size of all its broadcaster's propagandizing existence, it has some significant concerns with respect to security and privacy. We utilize blockchain to address such security breaches, allowing the development of a decentralized distributed blockchain system that's also exchanged between the IoT cluster heads. This article's major focus is provide smart greenhouse farmlands with a portable blockchain-based infrastructure which offers integrity and confidentiality. Where, green-house IoT sensor nodes are function as a blockchain centrally controlled to optimize the energy consumption by utilizing secure immutable ledgers. Furthermore, we present a significant solution that integrates blockchain technology via IoT devices to offer Smart Greenhouse cultivation with an enhanced secure communication.


2021 ◽  
Vol 12 (2) ◽  
pp. 136
Author(s):  
Arnan Dwika Diasmara ◽  
Aditya Wikan Mahastama ◽  
Antonius Rachmat Chrismanto

Abstract. Intelligent System of the Battle of Honor Board Game with Decision Making and Machine Learning. The Battle of Honor is a board game where 2 players face each other to bring down their opponent's flag. This game requires a third party to act as the referee because the players cannot see each other's pawns during the game. The solution to this is to implement Rule-Based Systems (RBS) on a system developed with Unity to support the referee's role in making decisions based on the rules of the game. Researchers also develop Artificial Intelligence (AI) as opposed to applying Case-Based reasoning (CBR). The application of CBR is supported by the nearest neighbor algorithm to find cases that have a high degree of similarity. In the basic test, the results of the CBR test were obtained with the highest formulated accuracy of the 3 examiners, namely 97.101%. In testing the AI scenario as a referee, it is analyzed through colliding pieces and gives the right decision in determining victoryKeywords: The Battle of Honor, CBR, RBS, unity, AIAbstrak. The Battle of Honor merupakan permainan papan dimana 2 pemain saling berhadapan untuk menjatuhkan bendera lawannya. Permainan ini membutuhkan pihak ketiga yang berperan sebagai wasit karena pemain yang saling berhadapan tidak dapat saling melihat bidak lawannya. Solusi dari hal tersebut yaitu mengimplementasikan Rule-Based Systems (RBS) pada sistem yang dikembangkan dengan Unity untuk mendukung peran wasit dalam memberikan keputusan berdasarkan aturan permainan. Peneliti juga mengembangkan Artificial Intelligence (AI) sebagai lawan dengan menerapkan Case-Based reasoning (CBR). Penerapan CBR didukung dengan algoritma nearest neighbour untuk mencari kasus yang memiliki tingkat kemiripan yang tinggi. Pada pengujian dasar didapatkan hasil uji CBR dengan accuracy yang dirumuskan tertinggi dari 3 penguji yaitu 97,101%. Pada pengujian skenario AI sebagai wasit dianalisis lewat bidak yang bertabrakan dan memberikan keputusan yang tepat dalam menentukan kemenangan.Kata Kunci: The Battle of Honor, CBR, RBS, unity, AI


Sign in / Sign up

Export Citation Format

Share Document