33 research outputs found
Joint Transaction Transmission and Channel Selection in Cognitive Radio Based Blockchain Networks: A Deep Reinforcement Learning Approach
To ensure that the data aggregation, data storage, and data processing are
all performed in a decentralized but trusted manner, we propose to use the
blockchain with the mining pool to support IoT services based on cognitive
radio networks. As such, the secondary user can send its sensing data, i.e.,
transactions, to the mining pools. After being verified by miners, the
transactions are added to the blocks. However, under the dynamics of the
primary channel and the uncertainty of the mempool state of the mining pool, it
is challenging for the secondary user to determine an optimal transaction
transmission policy. In this paper, we propose to use the deep reinforcement
learning algorithm to derive an optimal transaction transmission policy for the
secondary user. Specifically, we adopt a Double Deep-Q Network (DDQN) that
allows the secondary user to learn the optimal policy. The simulation results
clearly show that the proposed deep reinforcement learning algorithm
outperforms the conventional Q-learning scheme in terms of reward and learning
speed
Recommended from our members
A Framework for Handling Internet of Things Data with Confidentiality and Blockchain Support
The Internet of Things (IoT) has emerged as a disruptive technology in recent time. Due to a sharp rise in the deployment of IoT devices across the globe, the total amount of generated data reaching record highs every day. There is no denying that IoT devices with the data that they produce enhancing our day to day lives by bringing in innovative solutions. However, there is a darker side of this technology as it enables device manufacturers and service providers to retain this data that they can later use for several purposes, including targeted marketing. Unfortunately, not many people are aware of this data misuse by service providers. To address this issue, we propose a framework for the confidential handling of IoT data with Blockchain-based verification. We used a combination of Solid and Blockchain to accomplish this goal. Our experimental results show that the proposed approach is promising and has the potential to bring a considerable change in the IoT industry
On the Convergence of Blockchain and Internet of Things (IoT) Technologies
The Internet of Things (IoT) technology will soon become an integral part of
our daily lives to facilitate the control and monitoring of processes and
objects and revolutionize the ways that human interacts with the physical
world. For all features of IoT to become fully functional in practice, there
are several obstacles on the way to be surmounted and critical challenges to be
addressed. These include, but are not limited to cybersecurity, data privacy,
energy consumption, and scalability. The Blockchain decentralized nature and
its multi-faceted procedures offer a useful mechanism to tackle several of
these IoT challenges. However, applying the Blockchain protocols to IoT without
considering their tremendous computational loads, delays, and bandwidth
overhead can let to a new set of problems. This review evaluates some of the
main challenges we face in the integration of Blockchain and IoT technologies
and provides insights and high-level solutions that can potentially handle the
shortcomings and constraints of both IoT and Blockchain technologies.Comment: Includes 11 Pages, 3 Figures, To publish in Journal of Strategic
Innovation and Sustainability for issue JSIS 14(1
IoT Applications, Platforms, Systems, And Framework based on Blockchain
The Internet of Things (IoT) has lately evolved as a new technology capable of providing real-time and cutting-edge sensing capabilities to numerous industries such as healthcare, agriculture, smart cities, smart homes, and supply chain. Because of this technology's inherent promise, it has already seen exponential growth in a wide range of use-cases across numerous application domains. As academics around the world continue to examine its capabilities, there is widespread consensus that in order to get the most out of this technology and fully realise its potential, IoT must be built on a flexible network architecture with strong support for security, privacy, and trust. Blockchain (BC) technology, on the other hand, has lately emerged as a breakthrough technology with the promise to give several beneficial qualities such as robustness, support for integrity, anonymity, decentralisation, and autonomous control. Several BC systems are offered, which may be appropriate for various use-cases, including IoT applications. As a result, the integration of IoT with BC technology is seen as a potential solution to some critical concerns. To do this, a good grasp of the requirements of various IoT applications and the viability of a BC platform for a specific application satisfying its underlying requirements is required. This project explains many ways such as the gateway process and sensor device. By addressing the present blockchain concerns, IoT may enable a variety of security services, all of which are described in detail. Various authors present some common facts on the use of blockchain in IoT, which aids in a thorough understanding of the concept. Blockchain improves security and privacy in IoT platforms. In this project, an extra immutable ledger is created using all of the resources and information mentioned in the existing procedure. [1]
Process business modeling of emerging security threats with BPMN extension
Effective and rational management of a company cannot take place without the use of information technologies. Additionally, according to specific security requirements to protect the IT system against different threats, the development of a security system is significant for the companies and their clients and satisfactory common cooperation. The BPMN (Business Process Model and Notation) can be used for this purpose; however, the basic version of BPMN and its current extensions do not support the service of security threats. For this reason, we propose to extend the BPMN to be possible to model the chosen security issues coming from company business processes. The paper deals with the selected aspects of security requirements modeling in terms of emerging threats on the example of existing extensions of business process modeling language and the proposition of BPMN extension for chosen security issues together with the definition of information security policy
Developing a Trustworthy Cloud Service Framework for Cloud Computing Security
Cloud computing is quickly becoming an essential platform for sharing infrastructure, software, apps, and corporate resources. Cloud computing has many advantages, but users still have a lot of questions about the dependability and safety of cloud services. Concerns about the hazards associated with the possible exploitation of this technology to undertake criminal operations might threaten the undeniable success of cloud computing. To ensure happy customers, the cloud model must prioritize safety, openness, and dependability.Its main purpose is data security, which concerns everyone contemplating cloud services. A cloud-based assault protection system will safeguard data, communications, and information.According to studies, the recommended technique is successful, however updating tags and blocks when data is amended requires computation and communication expenses. Scalability, data secrecy, and decentralized double encryption improve security.The proposed method employs cloud servers for computation-intensive tasks and protects data content by depriving data owners and users of privilege information. Also ensures responsibility. Sharing health data on the cloud is feasible, cost-effective, efficient, adaptive, and better for individuals. This"Advanced Encryption Standard with Lightweight Cipher-text-Identity and Attribute-based Encryption" (AES-lightweight CP-ABE) aims to protect sensitive data
DIoTA: Decentralized Ledger based Framework for Data Authenticity Protection in IoT Systems
It is predicted that more than 20 billion IoT devices will be deployed worldwide by 2020. These devices form the critical infrastructure to support a variety of important applications such as smart city, smart grid, and industrial internet. To guarantee that these applications work properly, it is imperative to authenticate these devices and data generated from them. Although digital signatures can be applied for these purposes, the scale of the overall system and the limited computation capability of IoT devices pose two big challenges. In order to overcome these obstacles, we propose DIoTA, a novel decentralized ledger-based authentication framework for IoT devices. DIoTA uses a two-layer decentralized ledger architecture together with a lightweight data authentication mechanism to facilitate IoT devices and data management. We also analyze the performance and security of DIoTA, and explicitly give the major parameters an administrator can choose to achieve a desirable balance between different metrics