Blockchain for edge of things: Applications, opportunities, and challenges

TR Gadekallu, QV Pham, DC Nguyen… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
In recent years, blockchain networks have attracted significant attention in many research
areas beyond cryptocurrency, one of them being the Edge of Things (EoT) that is enabled by …

Convolutional neural networks for 5G-enabled intelligent transportation system: A systematic review

D Sirohi, N Kumar, PS Rana - Computer Communications, 2020 - Elsevier
Abstract Modern 5G-enabled Intelligent Transportation System (ITS) provides comfort and
safety to the end users by using various models and techniques most of which are based on …

Blockchain-envisioned secure data delivery and collection scheme for 5g-based iot-enabled internet of drones environment

B Bera, S Saha, AK Das, N Kumar… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
The Internet of Drones (IoD) is widely used in a wide range of applications from military to
civilian applications from the past years. However, during communication either with the …

A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT

R Lu, K Heung, AH Lashkari, AA Ghorbani - IEEE access, 2017 - ieeexplore.ieee.org
Fog computing-enhanced Internet of Things (IoT) has recently received considerable
attention, as the fog devices deployed at the network edge can not only provide low latency …

Optimal 5G network slicing using machine learning and deep learning concepts

MH Abidi, H Alkhalefah, K Moiduddin, M Alazab… - Computer Standards & …, 2021 - Elsevier
Network slicing is predetermined to hold up the diversity of emerging applications with
enhanced performance and flexibility requirements in the way of splitting the physical …

Provably secure authenticated key agreement scheme for smart grid

V Odelu, AK Das, M Wazid… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Due to the rapid development of wireless communication systems, authentication becomes
a key security component in smart grid environments. Authentication then plays an important …

Analysis of security and energy efficiency for shortest route discovery in low‐energy adaptive clustering hierarchy protocol using Levenberg‐Marquardt neural network …

M Mittal, C Iwendi, S Khan… - Transactions on …, 2021 - Wiley Online Library
Wireless sensor network (WSN) is a collection of a huge number of autonomous sensor
nodes having capabilities such as sensing, processing, and manipulation. In any WSN …

A practical privacy-preserving data aggregation (3PDA) scheme for smart grid

Y Liu, W Guo, CI Fan, L Chang… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
The real-time electricity consumption data can be used in value-added service such as big
data analysis, meanwhile the single user's privacy needs to be protected. How to balance …

Blockchain-based royalty contract transactions scheme for Industry 4.0 supply-chain management

D Mehta, S Tanwar, U Bodkhe, A Shukla… - Information processing & …, 2021 - Elsevier
Abstract Industry 4.0-based oil and gas supply-chain (OaG-SC) industry automates and
efficiently executes most of the processes by using cloud computing (CC), artificial …

Efficient and privacy-preserving data aggregation scheme for smart grid against internal adversaries

D He, N Kumar, S Zeadally, A Vinel… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Privacy-preserving data aggregation (P2DA) is an important basic building block that can
protect consumer's privacy in the smart grid environment because it could be used to …