179 research outputs found

    Trust Management and Bad Data Reduction in Internet of Vehicles Using Blockchain and AI

    Get PDF
    Blockchain offers cryptographically secure storage for recording transactions. However, one issue with blockchains is the problem of bad data and data reliability, where bad data refers to inaccurate, incomplete, or irrelevant data. This paper investigates how machine learning (ML) can be used to identify inaccurate sensor data added to a blockchain in Internet of Vehicles (IoV) applications. A solution for reducing the inclusion of incorrect data using a reputation-based method is proposed. We suggest that if an accurate ML model can be built for a task that can be completed using the input sensor data, it is possible to use the same model to assess the accuracy of new input data samples for which the actual task outcome is known. A road surface-type classification task is performed using Convolutional Neural Network models on the Passive Vehicular Sensors Datasets, and a pre-trained model is used in a novel solution approach involving edge servers and validators on a blockchain network. Our research shows that ML can be used to identify bad data on the blockchain and to reduce the addition of unreliable data to the blockchain in an IoV context. The proposed solution is generalizable and can be applied to any scenario where an accurate ML model can be devised for a task that can be accomplished using some blockchain input data

    A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions

    Get PDF
    Security has become the primary concern in many telecommunications industries today as risks can have high consequences. Especially, as the core and enable technologies will be associated with 5G network, the confidential information will move at all layers in future wireless systems. Several incidents revealed that the hazard encountered by an infected wireless network, not only affects the security and privacy concerns, but also impedes the complex dynamics of the communications ecosystem. Consequently, the complexity and strength of security attacks have increased in the recent past making the detection or prevention of sabotage a global challenge. From the security and privacy perspectives, this paper presents a comprehensive detail on the core and enabling technologies, which are used to build the 5G security model; network softwarization security, PHY (Physical) layer security and 5G privacy concerns, among others. Additionally, the paper includes discussion on security monitoring and management of 5G networks. This paper also evaluates the related security measures and standards of core 5G technologies by resorting to different standardization bodies and provide a brief overview of 5G standardization security forces. Furthermore, the key projects of international significance, in line with the security concerns of 5G and beyond are also presented. Finally, a future directions and open challenges section has included to encourage future research.European CommissionNational Research Tomsk Polytechnic UniversityUpdate citation details during checkdate report - A

    Can Blockchain Strengthen the Energy Internet?

    Get PDF
    Emergence of the Energy Internet (EI) demands restructuring of traditional electricity grids to integrate heterogeneous energy sources, distribution network management with grid intelligence and big data management. This paradigm shift is considered to be a breakthrough in the energy industry towards facilitating autonomous and decentralized grid operations while maximizing the utilization of Distributed Generation (DG). Blockchain has been identified as a disruptive technology enabler for the realization of EI to facilitate reliable, self-operated energy delivery. In this paper, we highlight six key directions towards utilizing blockchain capabilities to realize the envisaged EI. We elaborate the challenges in each direction and highlight the role of blockchain in addressing them. Furthermore, we summarize the future research directive in achieving fully autonomous and decentralized electricity distribution networks, which will be known as Energy InternetUniversity College DublinUniversity Grants Commission, Sri Lank

    Survey on 6G Frontiers: Trends, Applications, Requirements, Technologies and Future Research

    Get PDF
    Emerging applications such as Internet of Everything, Holographic Telepresence, collaborative robots, and space and deep-sea tourism are already highlighting the limitations of existing fifth-generation (5G) mobile networks. These limitations are in terms of data-rate, latency, reliability, availability, processing, connection density and global coverage, spanning over ground, underwater and space. The sixth-generation (6G) of mobile networks are expected to burgeon in the coming decade to address these limitations. The development of 6G vision, applications, technologies and standards has already become a popular research theme in academia and the industry. In this paper, we provide a comprehensive survey of the current developments towards 6G. We highlight the societal and technological trends that initiate the drive towards 6G. Emerging applications to realize the demands raised by 6G driving trends are discussed subsequently. We also elaborate the requirements that are necessary to realize the 6G applications. Then we present the key enabling technologies in detail. We also outline current research projects and activities including standardization efforts towards the development of 6G. Finally, we summarize lessons learned from state-of-the-art research and discuss technical challenges that would shed a new light on future research directions towards 6G

    Distributed-Proof-of-Sense: Blockchain Consensus Mechanisms for Detecting Spectrum Access Violations of the Radio Spectrum

    Get PDF
    The exponential growth in connected devices with Internet-of-Things (IoT) and next-generation wireless networks requires more advanced and dynamic spectrum access mechanisms. Blockchain-based approaches to Dynamic Spectrum Access (DSA) seem efficient and robust due to their inherited characteristics such as decentralization, immutability and transparency. However, conventional consensus mechanisms used in blockchain networks are expensive to be used due to the cost, processing and energy constraints. Moreover, addressing spectrum violations (i.e., unauthorized access to the spectrum) is not well-discussed in most blockchain-based DSA systems in the literature. In this work, we propose a newly tailored energyefficient consensus mechanism called “Distributed-Proof-of-Sense (DPoS)” that is specially designed to enable DSA and detect spectrum violations. The proposed consensus algorithm motivates blockchain miners to perform spectrum sensing, which leads to the collection of a full spectrum of sensing data. An elliptic curve cryptography-based zero-knowledge proof is used as the core of the proposed mechanism. We use MATLAB simulations to analyze the performance of the consensus mechanism and implement several consensus algorithms in a microprocessor to highlight the benefits of adopting the proposed system

    A survey of Virtual Private LAN Services (VPLS): Past, present and future

    Get PDF
    Virtual Private LAN services (VPLS) is a Layer 2 Virtual Private Network (L2VPN) service that has gained immense popularity due to a number of its features, such as protocol independence, multipoint-to-multipoint mesh connectivity, robust security, low operational cost (in terms of optimal resource utilization), and high scalability. In addition to the traditional VPLS architectures, novel VPLS solutions have been designed leveraging new emerging paradigms, such as Software Defined Networking (SDN) and Network Function Virtualization (NFV), to keep up with the increasing demand. These emerging solutions help in enhancing scalability, strengthening security, and optimizing resource utilization. This paper aims to conduct an in-depth survey of various VPLS architectures and highlight different characteristics through insightful comparisons. Moreover, the article discusses numerous technical aspects such as security, scalability, compatibility, tunnel management, operational issues, and complexity, along with the lessons learned. Finally, the paper outlines future research directions related to VPLS. To the best of our knowledge, this paper is the first to furnish a detailed survey of VPLS.University College DublinAcademy of Finlan
    corecore