33 research outputs found

    Joint Transaction Transmission and Channel Selection in Cognitive Radio Based Blockchain Networks: A Deep Reinforcement Learning Approach

    Full text link
    To ensure that the data aggregation, data storage, and data processing are all performed in a decentralized but trusted manner, we propose to use the blockchain with the mining pool to support IoT services based on cognitive radio networks. As such, the secondary user can send its sensing data, i.e., transactions, to the mining pools. After being verified by miners, the transactions are added to the blocks. However, under the dynamics of the primary channel and the uncertainty of the mempool state of the mining pool, it is challenging for the secondary user to determine an optimal transaction transmission policy. In this paper, we propose to use the deep reinforcement learning algorithm to derive an optimal transaction transmission policy for the secondary user. Specifically, we adopt a Double Deep-Q Network (DDQN) that allows the secondary user to learn the optimal policy. The simulation results clearly show that the proposed deep reinforcement learning algorithm outperforms the conventional Q-learning scheme in terms of reward and learning speed

    On the Convergence of Blockchain and Internet of Things (IoT) Technologies

    Full text link
    The Internet of Things (IoT) technology will soon become an integral part of our daily lives to facilitate the control and monitoring of processes and objects and revolutionize the ways that human interacts with the physical world. For all features of IoT to become fully functional in practice, there are several obstacles on the way to be surmounted and critical challenges to be addressed. These include, but are not limited to cybersecurity, data privacy, energy consumption, and scalability. The Blockchain decentralized nature and its multi-faceted procedures offer a useful mechanism to tackle several of these IoT challenges. However, applying the Blockchain protocols to IoT without considering their tremendous computational loads, delays, and bandwidth overhead can let to a new set of problems. This review evaluates some of the main challenges we face in the integration of Blockchain and IoT technologies and provides insights and high-level solutions that can potentially handle the shortcomings and constraints of both IoT and Blockchain technologies.Comment: Includes 11 Pages, 3 Figures, To publish in Journal of Strategic Innovation and Sustainability for issue JSIS 14(1

    IoT Applications, Platforms, Systems, And Framework based on Blockchain

    Get PDF
    The Internet of Things (IoT) has lately evolved as a new technology capable of providing real-time and cutting-edge sensing capabilities to numerous industries such as healthcare, agriculture, smart cities, smart homes, and supply chain. Because of this technology's inherent promise, it has already seen exponential growth in a wide range of use-cases across numerous application domains. As academics around the world continue to examine its capabilities, there is widespread consensus that in order to get the most out of this technology and fully realise its potential, IoT must be built on a flexible network architecture with strong support for security, privacy, and trust. Blockchain (BC) technology, on the other hand, has lately emerged as a breakthrough technology with the promise to give several beneficial qualities such as robustness, support for integrity, anonymity, decentralisation, and autonomous control. Several BC systems are offered, which may be appropriate for various use-cases, including IoT applications. As a result, the integration of IoT with BC technology is seen as a potential solution to some critical concerns. To do this, a good grasp of the requirements of various IoT applications and the viability of a BC platform for a specific application satisfying its underlying requirements is required. This project explains many ways such as the gateway process and sensor device. By addressing the present blockchain concerns, IoT may enable a variety of security services, all of which are described in detail. Various authors present some common facts on the use of blockchain in IoT, which aids in a thorough understanding of the concept. Blockchain improves security and privacy in IoT platforms. In this project, an extra immutable ledger is created using all of the resources and information mentioned in the existing procedure. [1]

    Process business modeling of emerging security threats with BPMN extension

    Get PDF
    Effective and rational management of a company cannot take place without the use of information technologies. Additionally, according to specific security requirements to protect the IT system against different threats, the development of a security system is significant for the companies and their clients and satisfactory common cooperation. The BPMN (Business Process Model and Notation) can be used for this purpose; however, the basic version of BPMN and its current extensions do not support the service of security threats. For this reason, we propose to extend the BPMN to be possible to model the chosen security issues coming from company business processes. The paper deals with the selected aspects of security requirements modeling in terms of emerging threats on the example of existing extensions of business process modeling language and the proposition of BPMN extension for chosen security issues together with the definition of information security policy

    Developing a Trustworthy Cloud Service Framework for Cloud Computing Security

    Get PDF
    Cloud computing is quickly becoming an essential platform for sharing infrastructure, software, apps, and corporate resources. Cloud computing has many advantages, but users still have a lot of questions about the dependability and safety of cloud services. Concerns about the hazards associated with the possible exploitation of this technology to undertake criminal operations might threaten the undeniable success of cloud computing. To ensure happy customers, the cloud model must prioritize safety, openness, and dependability.Its main purpose is data security, which concerns everyone contemplating cloud services. A cloud-based assault protection system will safeguard data, communications, and information.According to studies, the recommended technique is successful, however updating tags and blocks when data is amended requires computation and communication expenses. Scalability, data secrecy, and decentralized double encryption improve security.The proposed method employs cloud servers for computation-intensive tasks and protects data content by depriving data owners and users of privilege information. Also ensures responsibility. Sharing health data on the cloud is feasible, cost-effective, efficient, adaptive, and better for individuals. This"Advanced Encryption Standard with Lightweight Cipher-text-Identity and Attribute-based Encryption" (AES-lightweight CP-ABE) aims to protect sensitive data

    DIoTA: Decentralized Ledger based Framework for Data Authenticity Protection in IoT Systems

    Get PDF
    It is predicted that more than 20 billion IoT devices will be deployed worldwide by 2020. These devices form the critical infrastructure to support a variety of important applications such as smart city, smart grid, and industrial internet. To guarantee that these applications work properly, it is imperative to authenticate these devices and data generated from them. Although digital signatures can be applied for these purposes, the scale of the overall system and the limited computation capability of IoT devices pose two big challenges. In order to overcome these obstacles, we propose DIoTA, a novel decentralized ledger-based authentication framework for IoT devices. DIoTA uses a two-layer decentralized ledger architecture together with a lightweight data authentication mechanism to facilitate IoT devices and data management. We also analyze the performance and security of DIoTA, and explicitly give the major parameters an administrator can choose to achieve a desirable balance between different metrics
    corecore