Deep Q-network-based heuristic intrusion detection against edge-based SIoT zero-day attacks

S Shen, C Cai, Z Li, Y Shen, G Wu, S Yu - Applied Soft Computing, 2024 - Elsevier
How to process and classify zero-day attacks due to their huge damage to social Internet of
Things (SIoT) systems has become a hot research issue. To solve this issue, we propose a …

Performance issues and research challenges in designing a secure IoT with blockchain

D Singh, RK Dwivedi - 2022 3rd International Conference on …, 2022 - ieeexplore.ieee.org
Now a day, Internet of Things (IoT) are being used in several areas such as vehicular
systems, smart city, healthcare, and supply chain management. Sensor data is stored in the …

Vulnerability analysis of smart contract for blockchain-based IoT applications: a machine learning approach

Q Zhou, K Zheng, K Zhang, L Hou… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
With the emergence of Blockchain-based Internet of Things (BIoT) applications, smart
contracts have become one of the most appealing aspects because they reduce the cost …

Federated hierarchical trust-based interaction scheme for cross-domain industrial IoT

C Li, H Yang, Z Sun, Q Yao, B Bao… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
The Industrial Internet of Things (IIoT) is considered to be one of the most promising
revolutionary technologies to increase productivity. With the refined development of …

A deep reinforcement learning method for economic power dispatch of microgrid in OPAL-RT environment

FJ Lin, CF Chang, YC Huang, TM Su - Technologies, 2023 - mdpi.com
This paper focuses on the economic power dispatch (EPD) operation of a microgrid in an
OPAL-RT environment. First, a long short-term memory (LSTM) network is proposed to …

RAFT consensus reliability in wireless networks: Probabilistic analysis

Y Li, Y Fan, L Zhang, J Crowcroft - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
The centralized system becomes less efficient, secure, and resilient as the network size and
heterogeneity increase due to its inherent single point of failure issues. Distributed …

Robust Permissioned Blockchain Consensus for Unstable Communication in FANET

Z Wang, H Wang, Z Li, X Li, Y Miao… - IEEE/ACM …, 2023 - ieeexplore.ieee.org
The utilization of blockchain technology as a distributed information sharing system has
gained widespread adoption across various domains. However, its application to Flying Ad …

A novel blockchain-assisted aggregation scheme for federated learning in IoT networks

Z Liu, K Zheng, L Hou, H Yang… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
With the wide range of Internet of Things (IoT) applications, federated learning (FL) is
commonly adopted to protect the privacy of IoT data. FL enables privacy-preserving model …

AI-Native Blockchain for Multi-Domain Resource Trading in 6G

G Sun, HN Abishu, YH Yacob, C Huan… - IEEE Communications …, 2024 - ieeexplore.ieee.org
Recently, resource trading has been regarded as a promising solution to deal with the
resource scarcity of Internet-of-Things devices (IoTDs) to meet the performance …

HL-DPoS: An enhanced anti-long-range attack DPoS algorithm

Y Li, C Xia, C Li, Y Zhao, C Chen, T Wang - Computer Networks, 2024 - Elsevier
The consensus algorithm is crucial in blockchain for ensuring the validity and security of
transactions across the decentralized network. However, achieving consensus among …