Nowadays, nobody neglects the fact that #autonomous_vehicles are the future. Nevertheless, many problems stem from letting machines take control of the streets without embedding a sophisticated decision-making process within. This column spotlights the importance of #security in the smart #Internet_of_Vehicles paradigm, and the integration of #Blockchain and #Artificial_Intelligence for acquiring safety on the road by investigating in an #Edge-based architecture that benefits from the decentralized authority and network topology of a hybrid Blockchain in order to leverage highly accurate decision models. Challenges and future directions of such a combination are listed and discussed in the following article.
The full paper is available from:
https://www.researchgate.net/publication/340999407_AI_Blockchain_and_Vehicular_Edge_Computing_for_Smart_and_Secure_IoV_Challenges_and_Directions
Internet of Things, cognitive systems, and blockchain technology are three fields which have created numerous revolutions in software development. It seems that a combination among these fields may results in emerging a high potential and interesting field. Therefore, in this paper, we propose a framework for Internet of Things based on cognitive systems and blockchain technology. To the best of our knowledge, there is no framework for Internet of Things based on cognitive systems and blockchain. In order to study the applicability of the proposed framework, a recommender system based on the proposed framework is suggested. Since the proposed framework is novel, the suggested recommender system is novel. The suggested recommender system is compared with the existing recommender systems. The results show that the suggested recommender system has several benefits which are not available in the existing recommender systems.
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...IJERD Editor
The development of cloud computing and mobility,mobile cloud computing has emerged and
become a focus of research. By the means of on-demand self-service and extendibility, it can offer the
infrastructure, platform, and software services in a cloud to mobile users through the mobile network. Security
and privacy are the key issues for mobile cloud computing applications, and still face some enormous
challenges. In order to facilitate this emerging domain, we firstly in brief review the advantages and system
model of mobile cloud computing, and then pay attention to the security and privacy in the mobile cloud
computing. MCC provides a platform where mobile users make use of cloud services on mobile devices. The
use of MCC minimizes the performance, compatibility, and lack of resources issues in mobile computing
environment. By deeply analyzing the security and privacy issues from three aspects: mobile terminal, mobile
network and cloud, we give the current security and privacy approaches. The users of MCC are still below
expectations because of the associated risks in terms of security and privacy. These risks are playing important
role by preventing the organizations to adopt MCC environment. Significant amount of research is in progress in
order to reduce the security concerns but still a lot work has to be done to produce a security prone MCC
environment. This paper presents a comprehensive literature review of MCC and its security issues,challenges
and possible solutions for the security issues.
A fully automated, self-driving car can perceive its environment, determine the optimal route, and drive
unaided by human intervention for the entire journey. Connected autonomous vehicles (CAVs) have the
potential to drastically reduce accidents, travel time, and the environmental impact of road travel. Such
technology includes the use of several sensors, various algorithms, interconnected network connections,
and multiple auxiliary systems. CAVs have been subjected to attacks by malicious users to gain/deny
control of one or more of its various systems. Data security and data privacy is one such area of CAVs that
has been targeted via different types of attacks. The scope of this study is to present a good background
knowledge of issues pertaining to different attacks in the context of data security and privacy, as well
present a detailed review and analysis of eight very recent studies on the broad topic of security and
privacy related attacks. Methodologies including Blockchain, Named Data Networking, Intrusion
Detection System, Cognitive Engine, Adversarial Objects, and others have been investigated in the
literature and problem- and context-specific models have been proposed by their respective authors.
Insight into IoT Applications and Common Practice Challengesijtsrd
IoT caused a revolution in the technological world. Not only is the IoT related to computers, people or cell phones but also to various sensors, actuators, vehicles, and other modern appliances. There are around 14 billion interconnected digital devices across the globe i.e. almost 2 devices per human being on earth. The IoT serves as a medium to connect non living things to the internet to transfer information from one point to another in their community network which automates processes and ultimately makes the life of human beings convenient. The subsequent result of amalgamating internet connectivity with powerful data analysis is a complete change in the way we humans work and live. The most vital characteristics of IoT include connectivity, active engagement, sensors, artificial intelligence, and small device use. All of this creates many challenges that need to be solved to keep this technology to continue expanding. In this paper, we have identified various applications of IoT based on recent technological and business trends and highlighted the existing challenges faced by IoT which need to be addressed considering the exponential acceptance of the concept globally and the way those challenges had been addressed in the past. We have also made a few comments on the way such challenges are being attempted to be resolved now. This paper presents the current status Internet of Things IoT in terms of technical details, and applications. Also, this paper opens a window for future work on the historical approach to study and address IoT challenges. Lubna Alazzawi | Jamal Alotaibi "Insight into IoT Applications and Common Practice Challenges" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30286.pdf Paper Url :https://www.ijtsrd.com/engineering/computer-engineering/30286/insight-into-iot-applications-and-common-practice-challenges/lubna-alazzawi
Discovering and Understanding The Security Issues In IoT CloudCSCJournals
The rapid growth and adoption of IoT technologies in sectors of life are challenged by the resources constrained IoT devices. However, the growth of IoT technologies can be enhanced by integrating them with cloud computing. Hence, a new area of computing called IoT Cloud or CloudIoT has emerged. That is, the data collected from the IoT technologies are stored and processed in the cloud infrastructure so that IoT technologies are relived from resources constrained issue. As a result, some new classes of security and privacy issues are introduced. This paper presents security issues pertaining to IoT cloud.
Internet of Things, cognitive systems, and blockchain technology are three fields which have created numerous revolutions in software development. It seems that a combination among these fields may results in emerging a high potential and interesting field. Therefore, in this paper, we propose a framework for Internet of Things based on cognitive systems and blockchain technology. To the best of our knowledge, there is no framework for Internet of Things based on cognitive systems and blockchain. In order to study the applicability of the proposed framework, a recommender system based on the proposed framework is suggested. Since the proposed framework is novel, the suggested recommender system is novel. The suggested recommender system is compared with the existing recommender systems. The results show that the suggested recommender system has several benefits which are not available in the existing recommender systems.
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...IJERD Editor
The development of cloud computing and mobility,mobile cloud computing has emerged and
become a focus of research. By the means of on-demand self-service and extendibility, it can offer the
infrastructure, platform, and software services in a cloud to mobile users through the mobile network. Security
and privacy are the key issues for mobile cloud computing applications, and still face some enormous
challenges. In order to facilitate this emerging domain, we firstly in brief review the advantages and system
model of mobile cloud computing, and then pay attention to the security and privacy in the mobile cloud
computing. MCC provides a platform where mobile users make use of cloud services on mobile devices. The
use of MCC minimizes the performance, compatibility, and lack of resources issues in mobile computing
environment. By deeply analyzing the security and privacy issues from three aspects: mobile terminal, mobile
network and cloud, we give the current security and privacy approaches. The users of MCC are still below
expectations because of the associated risks in terms of security and privacy. These risks are playing important
role by preventing the organizations to adopt MCC environment. Significant amount of research is in progress in
order to reduce the security concerns but still a lot work has to be done to produce a security prone MCC
environment. This paper presents a comprehensive literature review of MCC and its security issues,challenges
and possible solutions for the security issues.
A fully automated, self-driving car can perceive its environment, determine the optimal route, and drive
unaided by human intervention for the entire journey. Connected autonomous vehicles (CAVs) have the
potential to drastically reduce accidents, travel time, and the environmental impact of road travel. Such
technology includes the use of several sensors, various algorithms, interconnected network connections,
and multiple auxiliary systems. CAVs have been subjected to attacks by malicious users to gain/deny
control of one or more of its various systems. Data security and data privacy is one such area of CAVs that
has been targeted via different types of attacks. The scope of this study is to present a good background
knowledge of issues pertaining to different attacks in the context of data security and privacy, as well
present a detailed review and analysis of eight very recent studies on the broad topic of security and
privacy related attacks. Methodologies including Blockchain, Named Data Networking, Intrusion
Detection System, Cognitive Engine, Adversarial Objects, and others have been investigated in the
literature and problem- and context-specific models have been proposed by their respective authors.
Insight into IoT Applications and Common Practice Challengesijtsrd
IoT caused a revolution in the technological world. Not only is the IoT related to computers, people or cell phones but also to various sensors, actuators, vehicles, and other modern appliances. There are around 14 billion interconnected digital devices across the globe i.e. almost 2 devices per human being on earth. The IoT serves as a medium to connect non living things to the internet to transfer information from one point to another in their community network which automates processes and ultimately makes the life of human beings convenient. The subsequent result of amalgamating internet connectivity with powerful data analysis is a complete change in the way we humans work and live. The most vital characteristics of IoT include connectivity, active engagement, sensors, artificial intelligence, and small device use. All of this creates many challenges that need to be solved to keep this technology to continue expanding. In this paper, we have identified various applications of IoT based on recent technological and business trends and highlighted the existing challenges faced by IoT which need to be addressed considering the exponential acceptance of the concept globally and the way those challenges had been addressed in the past. We have also made a few comments on the way such challenges are being attempted to be resolved now. This paper presents the current status Internet of Things IoT in terms of technical details, and applications. Also, this paper opens a window for future work on the historical approach to study and address IoT challenges. Lubna Alazzawi | Jamal Alotaibi "Insight into IoT Applications and Common Practice Challenges" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30286.pdf Paper Url :https://www.ijtsrd.com/engineering/computer-engineering/30286/insight-into-iot-applications-and-common-practice-challenges/lubna-alazzawi
Discovering and Understanding The Security Issues In IoT CloudCSCJournals
The rapid growth and adoption of IoT technologies in sectors of life are challenged by the resources constrained IoT devices. However, the growth of IoT technologies can be enhanced by integrating them with cloud computing. Hence, a new area of computing called IoT Cloud or CloudIoT has emerged. That is, the data collected from the IoT technologies are stored and processed in the cloud infrastructure so that IoT technologies are relived from resources constrained issue. As a result, some new classes of security and privacy issues are introduced. This paper presents security issues pertaining to IoT cloud.
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMijwmn
In 2020 more than50 billions devices will be connected over the Internet. Every device will be connected to
anything, anyone, anytime and anywhere in the world of Internet of Thing or IoT. This network will
generate tremendous unstructured or semi structured data that should be shared between different
devices/machines for advanced and automated service delivery in the benefits of the user’s daily life. Thus,
mechanisms for data interoperability and automatic service discovery and delivery should be offered.
Although many approaches have been suggested in the state of art, none of these researches provide a fully
interoperable, light, flexible and modular Sensing/Actuating as service architecture. Therefore, this paper
introduces a new Semantic Multi Agent architecture named OntoSmart for IoT data and service
management through service oriented paradigm. It proposes sensors/actuators and scenarios independent
flexible context aware and distributed architecture for IoT systems, in particular smart home systems.
Study and analysis of mobility, security, and caching issues in CCN IJECEIAES
Existing architecture of Internet is IP-centric, having capability to cope with the needs of the Internet users. Due to the recent advancements and emerging technologies, a need to have ubiquitous connectivity has become the primary focus. Increasing demands for location-independent content raised the requirement of a new architecture and hence it became a research challenge. Content Centric Networking (CCN) paradigm emerges as an alternative to IP-centric model and is based on name-based forwarding and in-network data caching. It is likely to address certain challenges that have not been solved by IP-based protocols in wireless networks. Three important factors that require significant research related to CCN are mobility, security, and caching. While a number of studies have been conducted on CCN and its proposed technologies, none of the studies target all three significant research directions in a single article, to the best of our knowledge. This paper is an attempt to discuss the three factors together within context of each other. In this paper, we discuss and analyze basics of CCN principles with distributed properties of caching, mobility, and secure access control. Different comparisons are made to examine the strengths and weaknesses of each aforementioned aspect in detail. The final discussion aims to identify the open research challenges and some future trends for CCN deployment on a large scale.
In this video from the Global Tech Jam 2018, Jerry Power from the USC Marshall School of Business presents: Global Tech Jam: I3 Intelligent IoT Integrator.
Watch the video: http://insidesmartcities.com/global-tech-jam-video-i3-intelligent-iot-integrator/
Learn more: https://globaltechjam.com/2018-global-tech-jam-presentations/
and
http://insideSmartCities.com
In this video from the Global Tech Jam 2018, Jerry Power from the USC Marshall School of Business presents: Global Tech Jam: I3 Intelligent IoT Integrator.
Watch the video: http://insidesmartcities.com/global-tech-jam-video-i3-intelligent-iot-integrator/
Learn more: http://i3.usc.edu
https://globaltechjam.com/2018-global-tech-jam-presentations/
and
http://insideSmartCities.com
A Survey on the applications of IoT: an investigation into existing environme...TELKOMNIKA JOURNAL
In today’s digital environment, devices are able to interconnect and react to contextual data more than ever before: artificial intelligence is beginning to coordinate how data collected from sensors and de-vices within the network is analysed, and device ecosystems are replacing standalone devices to deliver solutions to the user. In this paper, the researcher explores current implementations of IoT that have led to positive outcomes for the user; but also, the challenges that remain in today’s applications. Moreover, ex-ploring these current barriers may be able to infer future applications capable of being deployed on a global scale
Injecting (Micro)Intelligence in the IoT: Logic-based Approaches for (M)MASAndrea Omicini
Pervasiveness of ICT resources along with the promise of ubiquitous intelligence is pushing hard both our demand and our fears of AI: demand mandates for the ability to inject (micro) intelligence ubiquitously, fears compel the behaviour of intelligent systems to be observable, explainable, and accountable.
Whereas the first wave of the new "AI Era" was mostly heralded by non-symbolic approaches, features like explainability are better provided by symbolic techniques.
In this talk we focus on logic-based approaches, and discuss their potential in pervasive scenarios like the IoT and open (M)MAS along with our latest results in the field.
Andrea Omicini, Roberta Calegari
Invited Talk
MMAS 2018, Stockholm, Sweden, 14 July 2018
The Internet of Things (IoT): An OverviewIJERA Editor
Information and Communications Technology (ICT) controls our daily behaviors. It becomes a main part of our
life critical infrastructure bringing interconnection of heterogeneous devices in different aspects. Personal
computing, sensing, surveillance, smart homes, entertainment, transportation and video streaming are examples,
to name a few. As a critical living entity, Internet is contentiously changing and evolving leading to emerging
new technologies, applications, protocols and algorithms. Acceleration of wireless communication trends brings
an ever growing innovation in Internet connectivity and mobile broadband. Infrastructureless communication
devices become ubiquitous, smart, powerful, connectible, smaller, cheaper, and easier to deploy and install. This
opens a new future direction in the society of ICT: the Internet of Things (IoT). Nowadays, the IoT, early
defined as Machine-to-Machine (M2M) communications, becomes a key concern of ICT world and research
communities. In this paper, we provide an overview study of the IoT paradigm, its concepts, principles and
potential benefits. Specifically, we focus on the IoT major technologies, emerging protocols, and widespread
applications. This overview can help those who start approaching the IoT world aiming to understand and
participate to its development.
Towards Internet of Things: Survey and Future VisionCSCJournals
Internet of things is a promising research due to its importance in many commerce, industry, and education applications. Recently, new applications and research challenges in numerous areas of Internet of things are fired. In this paper, we discuss the history of Internet of things, different proposed architectures of Internet of things, research challenges and open problems related to the Internet of things. We also introduce the concept of Internet of things database and discuss about the future vision of Internet of things. These are the manuscript preparation guidelines used as a standard template for all journal submissions. Author must follow these instructions while preparing/modifying these guidelines.
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...Rida Qayyum
With the explosive growth of mobile applications and extensive praxis of cloud computing, mobile cloud computing has been introduced to be a potential technology for mobile services. But privacy is the main concern for a mobile user in the modern era. In the current study, we address the privacy challenges faced by mobile users while outsourcing their data to the service provider for storage and processing. However, a secure mobile user is required to protect these fundamental privacy factors such as their personal data, real identity, current location and the actual query sent to the cloud vendor server while availing different cloud services. Under these privacy metrics, we evaluated the existing approaches that are counting privacy challenge in mobile cloud computing. The primary focus of this study is to presents a critical survey of recent privacy protection techniques. Leading to objective, the current study conduct a comparative analysis of these state of the art methods with their strong points, privacy level and scalability. After analysis, this paper suggests the pseudo-random permutation method could be a promising solution that can be taken into consideration for preserving user personal information and data query privacy in MCC more efficiently. Primarily, the purpose of the survey was to focus on further advancements of the suggested method. Furthermore, we present the future research directions in the mobile cloud computing paradigms.
FAST PACKETS DELIVERY TECHNIQUES FOR URGENT PACKETS IN EMERGENCY APPLICATIONS...IJCNCJournal
Internet of Things (IoT) has been receiving a lot of interest around the world in academia, industry and telecommunication organizations. In IoT, many constrained devices can communicate with each other which generate a huge number of transferred packets. These packets have different priorities based on the applications which are supported by IoT technology. Emergency applications such as calling an ambulance in a car accident scenario need fast and reliable packets delivery in order to receive an immediate response from a service provider. When a client sends his request with specific requirements, fast and reliable return contents (packets) should be fulfilled, otherwise, the network resources may be wasted and undesirable circumstances may be counted. Content-Centric Networking (CCN) has become a promising network paradigm that satisfies the requirements of fast packets delivery for emergency applications of IoT. In this paper, we propose fast packets delivery techniques based on CCN for IoT environment, these techniques are suitable for urgent packets in emergency applications that need fast delivery. The simulation results show how the proposed techniques can achieve high throughput, a large number of request messages, fast response time and a low number of lost packets in comparison with the normal CCN.
The Internet of things IoT is a relatively new concept. It presents numerous benefits to consumers and proves a financial boon for businesses. Pervasive introduction of sensors and devices into currently intimate spaces, such as homes, cars, and wearables, poses some challenges. There are also challenges in deploying IoT by government agencies and private industries. This paper attempts to address these challenges and offers solutions. Matthew N. O. Sadiku | Adedamola Omotoso | Shuza Binzaid | Sarhan M. Musa "Internet of Things: Challenges and Solutions" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-6 , October 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29302.pdf Paper URL: https://www.ijtsrd.com/engineering/electrical-engineering/29302/internet-of-things-challenges-and-solutions/matthew-n-o-sadiku
Hardware/Software Interoperability and Single Point Vulnerability Problems of...BRNSS Publication Hub
As reiterated by many authors, internet of things (IoT) is the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data, creating opportunities for more direct integration of the physical world into computer-based systems, resulting in efficiency improvements, economic benefits, and reduced human exertions. This is made possible by the communications models with the enabling technologies which make communications possible among IoT connected devices, although, with drawbacks. These drawbacks are the major reasons for adoption problems of IoT services by the society. This paper carried out an investigative study on previous works on the societal applications and adoption problems of IoT, IoT communications models, and pros and cons of IoT. Through the study, it was revealed that for IoT devices and services to be widely adopted with no or minimal problems, future IoT technology will not only address the known drawbacks but also will require hardware and software components that are highly interoperable, dependable, reconfigurable, and, in many applications, certifiable.
Authors: Arshdeep Bahga, Vijay Madisetti
Paperback: 446 pages
Publisher: VPT; 1 edition (August 9, 2014)
Language: English
ISBN-10: 0996025510
ISBN-13: 978-0996025515
Product Dimensions: 10 x 7 x 1 inches
Book Website: www.internet-of-things-book.com
Availabile on: www.amazon.com/dp/0996025510
Internet of Things (IoT) refers to physical and virtual objects that have unique identities and are connected to the internet to facilitate intelligent applications that make energy, logistics, industrial control, retail, agriculture and many other domains "smarter". Internet of Things is a new revolution of the Internet that is rapidly gathering momentum driven by the advancements in sensor networks, mobile devices, wireless communications, networking and cloud technologies. Experts forecast that by the year 2020 there will be a total of 50 billion devices/things connected to the internet.
This book is written as a textbook on Internet of Things for educational programs at colleges and universities, and also for IoT vendors and service providers who may be interested in offering a broader perspective of Internet of Things to accompany their own customer and developer training programs. The typical reader is expected to have completed a couple of courses in programming using traditional high-level languages at the college-level, and is either a senior or a beginning graduate student in one of the science, technology, engineering or mathematics (STEM) fields. Like our companion book on Cloud Computing, we have tried to write a comprehensive book that transfers knowledge through an immersive "hands on" approach, where the reader is provided the necessary guidance and knowledge to develop working code for real-world IoT applications.
The internet of things, or IoT, is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMijwmn
In 2020 more than50 billions devices will be connected over the Internet. Every device will be connected to
anything, anyone, anytime and anywhere in the world of Internet of Thing or IoT. This network will
generate tremendous unstructured or semi structured data that should be shared between different
devices/machines for advanced and automated service delivery in the benefits of the user’s daily life. Thus,
mechanisms for data interoperability and automatic service discovery and delivery should be offered.
Although many approaches have been suggested in the state of art, none of these researches provide a fully
interoperable, light, flexible and modular Sensing/Actuating as service architecture. Therefore, this paper
introduces a new Semantic Multi Agent architecture named OntoSmart for IoT data and service
management through service oriented paradigm. It proposes sensors/actuators and scenarios independent
flexible context aware and distributed architecture for IoT systems, in particular smart home systems.
Study and analysis of mobility, security, and caching issues in CCN IJECEIAES
Existing architecture of Internet is IP-centric, having capability to cope with the needs of the Internet users. Due to the recent advancements and emerging technologies, a need to have ubiquitous connectivity has become the primary focus. Increasing demands for location-independent content raised the requirement of a new architecture and hence it became a research challenge. Content Centric Networking (CCN) paradigm emerges as an alternative to IP-centric model and is based on name-based forwarding and in-network data caching. It is likely to address certain challenges that have not been solved by IP-based protocols in wireless networks. Three important factors that require significant research related to CCN are mobility, security, and caching. While a number of studies have been conducted on CCN and its proposed technologies, none of the studies target all three significant research directions in a single article, to the best of our knowledge. This paper is an attempt to discuss the three factors together within context of each other. In this paper, we discuss and analyze basics of CCN principles with distributed properties of caching, mobility, and secure access control. Different comparisons are made to examine the strengths and weaknesses of each aforementioned aspect in detail. The final discussion aims to identify the open research challenges and some future trends for CCN deployment on a large scale.
In this video from the Global Tech Jam 2018, Jerry Power from the USC Marshall School of Business presents: Global Tech Jam: I3 Intelligent IoT Integrator.
Watch the video: http://insidesmartcities.com/global-tech-jam-video-i3-intelligent-iot-integrator/
Learn more: https://globaltechjam.com/2018-global-tech-jam-presentations/
and
http://insideSmartCities.com
In this video from the Global Tech Jam 2018, Jerry Power from the USC Marshall School of Business presents: Global Tech Jam: I3 Intelligent IoT Integrator.
Watch the video: http://insidesmartcities.com/global-tech-jam-video-i3-intelligent-iot-integrator/
Learn more: http://i3.usc.edu
https://globaltechjam.com/2018-global-tech-jam-presentations/
and
http://insideSmartCities.com
A Survey on the applications of IoT: an investigation into existing environme...TELKOMNIKA JOURNAL
In today’s digital environment, devices are able to interconnect and react to contextual data more than ever before: artificial intelligence is beginning to coordinate how data collected from sensors and de-vices within the network is analysed, and device ecosystems are replacing standalone devices to deliver solutions to the user. In this paper, the researcher explores current implementations of IoT that have led to positive outcomes for the user; but also, the challenges that remain in today’s applications. Moreover, ex-ploring these current barriers may be able to infer future applications capable of being deployed on a global scale
Injecting (Micro)Intelligence in the IoT: Logic-based Approaches for (M)MASAndrea Omicini
Pervasiveness of ICT resources along with the promise of ubiquitous intelligence is pushing hard both our demand and our fears of AI: demand mandates for the ability to inject (micro) intelligence ubiquitously, fears compel the behaviour of intelligent systems to be observable, explainable, and accountable.
Whereas the first wave of the new "AI Era" was mostly heralded by non-symbolic approaches, features like explainability are better provided by symbolic techniques.
In this talk we focus on logic-based approaches, and discuss their potential in pervasive scenarios like the IoT and open (M)MAS along with our latest results in the field.
Andrea Omicini, Roberta Calegari
Invited Talk
MMAS 2018, Stockholm, Sweden, 14 July 2018
The Internet of Things (IoT): An OverviewIJERA Editor
Information and Communications Technology (ICT) controls our daily behaviors. It becomes a main part of our
life critical infrastructure bringing interconnection of heterogeneous devices in different aspects. Personal
computing, sensing, surveillance, smart homes, entertainment, transportation and video streaming are examples,
to name a few. As a critical living entity, Internet is contentiously changing and evolving leading to emerging
new technologies, applications, protocols and algorithms. Acceleration of wireless communication trends brings
an ever growing innovation in Internet connectivity and mobile broadband. Infrastructureless communication
devices become ubiquitous, smart, powerful, connectible, smaller, cheaper, and easier to deploy and install. This
opens a new future direction in the society of ICT: the Internet of Things (IoT). Nowadays, the IoT, early
defined as Machine-to-Machine (M2M) communications, becomes a key concern of ICT world and research
communities. In this paper, we provide an overview study of the IoT paradigm, its concepts, principles and
potential benefits. Specifically, we focus on the IoT major technologies, emerging protocols, and widespread
applications. This overview can help those who start approaching the IoT world aiming to understand and
participate to its development.
Towards Internet of Things: Survey and Future VisionCSCJournals
Internet of things is a promising research due to its importance in many commerce, industry, and education applications. Recently, new applications and research challenges in numerous areas of Internet of things are fired. In this paper, we discuss the history of Internet of things, different proposed architectures of Internet of things, research challenges and open problems related to the Internet of things. We also introduce the concept of Internet of things database and discuss about the future vision of Internet of things. These are the manuscript preparation guidelines used as a standard template for all journal submissions. Author must follow these instructions while preparing/modifying these guidelines.
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...Rida Qayyum
With the explosive growth of mobile applications and extensive praxis of cloud computing, mobile cloud computing has been introduced to be a potential technology for mobile services. But privacy is the main concern for a mobile user in the modern era. In the current study, we address the privacy challenges faced by mobile users while outsourcing their data to the service provider for storage and processing. However, a secure mobile user is required to protect these fundamental privacy factors such as their personal data, real identity, current location and the actual query sent to the cloud vendor server while availing different cloud services. Under these privacy metrics, we evaluated the existing approaches that are counting privacy challenge in mobile cloud computing. The primary focus of this study is to presents a critical survey of recent privacy protection techniques. Leading to objective, the current study conduct a comparative analysis of these state of the art methods with their strong points, privacy level and scalability. After analysis, this paper suggests the pseudo-random permutation method could be a promising solution that can be taken into consideration for preserving user personal information and data query privacy in MCC more efficiently. Primarily, the purpose of the survey was to focus on further advancements of the suggested method. Furthermore, we present the future research directions in the mobile cloud computing paradigms.
FAST PACKETS DELIVERY TECHNIQUES FOR URGENT PACKETS IN EMERGENCY APPLICATIONS...IJCNCJournal
Internet of Things (IoT) has been receiving a lot of interest around the world in academia, industry and telecommunication organizations. In IoT, many constrained devices can communicate with each other which generate a huge number of transferred packets. These packets have different priorities based on the applications which are supported by IoT technology. Emergency applications such as calling an ambulance in a car accident scenario need fast and reliable packets delivery in order to receive an immediate response from a service provider. When a client sends his request with specific requirements, fast and reliable return contents (packets) should be fulfilled, otherwise, the network resources may be wasted and undesirable circumstances may be counted. Content-Centric Networking (CCN) has become a promising network paradigm that satisfies the requirements of fast packets delivery for emergency applications of IoT. In this paper, we propose fast packets delivery techniques based on CCN for IoT environment, these techniques are suitable for urgent packets in emergency applications that need fast delivery. The simulation results show how the proposed techniques can achieve high throughput, a large number of request messages, fast response time and a low number of lost packets in comparison with the normal CCN.
The Internet of things IoT is a relatively new concept. It presents numerous benefits to consumers and proves a financial boon for businesses. Pervasive introduction of sensors and devices into currently intimate spaces, such as homes, cars, and wearables, poses some challenges. There are also challenges in deploying IoT by government agencies and private industries. This paper attempts to address these challenges and offers solutions. Matthew N. O. Sadiku | Adedamola Omotoso | Shuza Binzaid | Sarhan M. Musa "Internet of Things: Challenges and Solutions" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-6 , October 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29302.pdf Paper URL: https://www.ijtsrd.com/engineering/electrical-engineering/29302/internet-of-things-challenges-and-solutions/matthew-n-o-sadiku
Hardware/Software Interoperability and Single Point Vulnerability Problems of...BRNSS Publication Hub
As reiterated by many authors, internet of things (IoT) is the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data, creating opportunities for more direct integration of the physical world into computer-based systems, resulting in efficiency improvements, economic benefits, and reduced human exertions. This is made possible by the communications models with the enabling technologies which make communications possible among IoT connected devices, although, with drawbacks. These drawbacks are the major reasons for adoption problems of IoT services by the society. This paper carried out an investigative study on previous works on the societal applications and adoption problems of IoT, IoT communications models, and pros and cons of IoT. Through the study, it was revealed that for IoT devices and services to be widely adopted with no or minimal problems, future IoT technology will not only address the known drawbacks but also will require hardware and software components that are highly interoperable, dependable, reconfigurable, and, in many applications, certifiable.
Authors: Arshdeep Bahga, Vijay Madisetti
Paperback: 446 pages
Publisher: VPT; 1 edition (August 9, 2014)
Language: English
ISBN-10: 0996025510
ISBN-13: 978-0996025515
Product Dimensions: 10 x 7 x 1 inches
Book Website: www.internet-of-things-book.com
Availabile on: www.amazon.com/dp/0996025510
Internet of Things (IoT) refers to physical and virtual objects that have unique identities and are connected to the internet to facilitate intelligent applications that make energy, logistics, industrial control, retail, agriculture and many other domains "smarter". Internet of Things is a new revolution of the Internet that is rapidly gathering momentum driven by the advancements in sensor networks, mobile devices, wireless communications, networking and cloud technologies. Experts forecast that by the year 2020 there will be a total of 50 billion devices/things connected to the internet.
This book is written as a textbook on Internet of Things for educational programs at colleges and universities, and also for IoT vendors and service providers who may be interested in offering a broader perspective of Internet of Things to accompany their own customer and developer training programs. The typical reader is expected to have completed a couple of courses in programming using traditional high-level languages at the college-level, and is either a senior or a beginning graduate student in one of the science, technology, engineering or mathematics (STEM) fields. Like our companion book on Cloud Computing, we have tried to write a comprehensive book that transfers knowledge through an immersive "hands on" approach, where the reader is provided the necessary guidance and knowledge to develop working code for real-world IoT applications.
The internet of things, or IoT, is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.
Insights of 6G and artificial intelligence-based internet-of-vehicle towards ...IAESIJAI
The significance of internet-of-vehicle (IoV) is spontaneously increasing with exponentially rising demands towards transportation system and road safety. At present, there are various number of scientific approaches which is meant for leveraging the communication performance in IoV, but yet the problem still exists over multiple attributes e.g. resource management, privacy, security, and service offloading. Such problems are anticipated to be solved by 6G services that offers better communication capabilities compared to its prior version of 5G. At the same time, the quality of communication system can be enhanced by artificial intelligence (AI), which is capable of solving complex real-world problems. Therefore, this manuscript offers an insight towards strength and weakness of existing 6G based study model as well as AI-based solution in order to contribute towards highlighting an essential research gap that could directly offer better insight towards future planning towards improving communication in IoV.
Cloud-Based IoT Applications and Their Roles in Smart CitiesAlAtfat
A smart city is an urbanization region that collects data using several digital and physical devices. The information collected from such devices is used efficiently to manage revenues, resources, and assets, etc., while the information obtained from such devices is utilized to boost performance throughout the city. Cloud-based Internet of Things (IoT) applications could help smart cities that contain information gathered from citizens, devices, homes, and other things. This information is processed and analyzed to monitor and manage transportation networks, electric utilities, resources management, water supply systems, waste management, crime detection, security mechanisms, proficiency, digital library, healthcare facilities, and other opportunities. A cloud service provider offers public cloud services that can update the IoT environment, enabling third-party activities to embed IoT data within electronic devices executing on the IoT. In this paper, the author explored cloud-based IoT applications and their roles in smart cities.
Constellation’s technology will enable the advancement of the digital revolution by creating an ecosystem facilitating decentralized applications throughout a scalable distributed network. Constellation acts as a centerpiece framework that other applications can integrate with, without giving away data security and application dependency. Furthermore, our goal is to leverage existing technologies in distributed computing, big data and machine learning that are widely used among developer communities, and apply them to a decentralized distributed network.
https://runfrictionless.com/b2b-white-paper-service/
Towards design strong emergency and COVID-19 authentication scheme in VANETnooriasukmaningtyas
The wide use of vehicular ad hoc networks (VANETs) in the last decade has led many researchers to find efficient and reliable methods to obtain the desired benefits and offer services, such as healthcare and traffic management. However, VANETs suffer from security issues represented by authentication and data integrity. In this paper, we propose a robust mutual authentication scheme based on elliptic curve cryptography (ECC), cryptography Hash Function, and a pseudonym. The proposed work was twofold in focus: first, on healthcare in emergency cars which use VANETs, and second, on overcoming security issues, such as resisting familiar attacks (e.g. insider attacks and reply attacks). Because of the serious situation generated by the worldwide outbreak of the Covid-19 epidemic, we also found this research valuable in supporting global efforts to combat the rapid spread of this virus, by finding the safest and fastest routes to epidemic treatment centres for medical staff, assistance teams in medical operations, fumigation control, and all work teams associated with disease control. This research attempts to contribute by proposing a special signal used to define epidemic teams. The best route, fast route can be chosen by using VANETs infrastructure. This scheme also deals with metric security features, such as key management, data integrity, and data privacy. In the communication and computation cost, we noticed that our proposed scheme achieved good results compared with the related works
A survey on security and privacy issues in IoV IJECEIAES
As an up-and-coming branch of the Internet of things, internet of vehicles (IoV) is imagined to fill in as a fundamental information detecting and processing platform for astute transportation frameworks. Today, vehicles are progressively being associated with the Internet of Things which empower them to give pervasive access to data to drivers and travelers while moving. Be that as it may, as the quantity of associated vehicles continues expanding, new prerequisites, (for example, consistent, secure, vigorous, versatile data trade among vehicles, people, and side of the road frameworks) of vehicular systems are developing. Right now, the unique idea of vehicular specially appointed systems is being changed into another idea called the internet of vehicles (IoV). We talk about the issues faced in implementing a secure IoV architecture. We examine the various challenges in implementing security and privacy in IoV by reviewing past papers along with pointing out research gaps and possible future work and putting forth our on inferences relating to each paper.
Vehicular conveyed processing (VCC) is made from different circled vehicular fogs (VCs), which are outlined on-the-fly by intensely consolidating underutilized vehicular resources including figuring force, accumulating, and so forth. Existing recommendation for lifestyle as-a-organization (IDaaS) are not suitable for use in that frame of mind of confined handling resources and limit cutoff of introduced vehicle devices. we at first propose an improved ciphertext-methodology trademark based encryption (CPABE) plot.
TOWARD A GENERIC VEHICULAR CLOUD NETWORK ARCHITECTURE: A CASE OF VIRTUAL VEHI...ijwmn
In recent years, cloud computing has gained more and more popularity. The motivation towards
implementing cloud computing in vehicular networks is due to the availability of communication, storage,
and computing resources represented by communication, vehicles, roadside units (RSUs), and central
servers. These resources can be utilized and provided to vehicles, drivers on the road, travellers, and
customers on the internet. Intelligent Transportation System (ITS) applications can utilize vehicular
cloud computing to provide efficient real-time services, as well as to improve transportation safety,
mobility, and comfort levels for drivers. In this paper, all possible vehicular cloud models are presented.
Each vehicular cloud model offers different services. Integrating all vehicular cloud models into
one integrated system will provide all services and serve internet users, passengers, and vehicles.
Therefore, a generic vehicular cloud model is proposed. After that, a new service called Virtual Vehicle is
proposed in vehicular cloud computing. The virtual vehicle is a virtual machine that migrates from one
physical vehicle to another. It provides the same services as the physical vehicle according to the
consumer's requirements.
'' Internet of Vehicles (IoV) ,,
IoV is basically INTERNET of VEHICLES, a strong network between vehicles and living.
IoT is a proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.
The new era of the Internet of Things is driving the evolution of conventional Vehicle Ad-hoc Networks into the Internet of Vehicles (IoV).
Being in generation of Internet connectivity, there is a need to stay in safe and hassle free environment.
According to recent predictions, 25 billion “things” will be connected to the Internet by 2020, of which vehicles will constitute a significant portion.
Objectives
IoV – distributed transport fabric capable of making its own decisions about driving customers to their destinations
IoV should have communications, processing, storage, intelligence, learning and strong security capabilities .
To be integrated in IoT framework and smart cities technologies.
Extended business models and the range of applications ( including mediaoriented) current vehicular networks.
Types Of Communication IoV
The IoV includes mainly five types of vehicular communications
1.Vehicle-to-Vehicle (V2V).
2.Vehicle to-Roadside Unit (V2R).
3.Vehicle-to-Infrastructure of cellular networks (V2I) .
4.Vehicle-to-Personal devices (V2P)
5.Vehicle-to-Sensors (V2S).
Network elements of IoV
A network model of IoV is proposed based on the three network elements, including cloud, connection, and client. The benefits of the design and development of IoV are highlighted by performing a qualitative comparison between IoV and VANETs
Fog computing scheduling algorithm for smart city IJECEIAES
With the advent of the number of smart devices across the globe, increasing the number of users using the Internet. The main aim of the fog computing (FC) paradigm is to connect huge number of smart objects (billions of objects) that can make a bright future for smart cities. Due to the large deployments of smart devices, devices are expected to generate huge amounts of data and forward the data through the Internet. FC also refers to an edge computing framework that mitigates the issue by applying the process of knowledge discovery using a data analysis approach to the edges. Thus, the FC approaches can work together with the internet of things (IoT) world, which can build a sustainable infrastructure for smart cities. In this paper, we propose a scheduling algorithm namely the weighted round-robin (WRR) scheduling algorithm to execute the task from one fog node (FN) to another fog node to the cloud. Firstly, a fog simulator is used with the emergent concept of FC to design IoT infrastructure for smart cities. Then, spanning-tree routing (STP) protocol is used for data collection and routing. Further, 5G networks are proposed to establish fast transmission and communication between users. Finally, the performance of our proposed system is evaluated in terms of response time, latency, and amount of data used.
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGSsuthi
Edge computing refers to the enabling technologies allowing computation to be performed at the edge of the network, on downstream data on behalf of cloud services and upstream data on behalf of IoT services. Here we define “edge” as any computing and network resources along the path between data sources and cloud data centers. For example, a smart phone is the edge between body things and cloud, a gateway in a smart home is the edge between home things and cloud, a micro data center and a cloudlet is the edge between a mobile device and cloud. The rationale of edge computing is that computing should happen at the proximity of data sources. From our point of view, edge computing is interchangeable with fog computing, but edge computing focus more toward the things side, while fog computing focus more on the infrastructure side. Edge computing could have as big an impact on our society as has the cloud computing.
CICS: Cloud–Internet Communication Security Framework for the Internet of Sma...AlAtfat
— The internet of smart devices is a network of intelligent gadgets
with sensors, programs, Wi-Fi and communication network connections. These
devices store the data in cloud and process data outside the device using the
proposed Cloud-Internet communication framework. These devices can
communicate with other devices using the proposed framework. However, there
are many challenges for communication security among the internet of smart
devices. The Cloud can store the device data with security, reliability, privacy
and service availability. The communication Security has been raised as one of
the most critical issues of cloud computing where resolving such an issue would
result in a constant growth in the use and popularity of cloud computing. Our
purpose of this study is to create a framework for providing the communication
security among smart devices network for the internet of things using cloud
computing. Our main contribution links a new study for providing
communication security for the internet of smart devices using the cloud-Internet
framework. This study can be helpful for communication security problem in the
framework of the Internet of Things. The proposed study generates a new
framework for solving the issue of communication security among internet of
smart devices.
Similar to Blockchain and ai__architectures__challenges_and_future_directions_for_enabling_io_v (9) (20)
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Enhancing Performance with Globus and the Science DMZGlobus
ESnet has led the way in helping national facilities—and many other institutions in the research community—configure Science DMZs and troubleshoot network issues to maximize data transfer performance. In this talk we will present a summary of approaches and tips for getting the most out of your network infrastructure using Globus Connect Server.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
The Art of the Pitch: WordPress Relationships and Sales
Blockchain and ai__architectures__challenges_and_future_directions_for_enabling_io_v (9)
1. See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/340999407
AI, Blockchain and Vehicular Edge Computing for Smart and Secure IoV:
Challenges and Directions
Preprint · April 2020
CITATIONS
0
READS
292
6 authors, including:
Some of the authors of this publication are also working on these related projects:
Cloud and Fog Federations Using Game Theoretical Models View project
Privacy Aware Data Collection and Analysis in CPS View project
Ahmad Hammoud
Lebanese American University
3 PUBLICATIONS 7 CITATIONS
SEE PROFILE
Hani Sami
Concordia University Montreal
7 PUBLICATIONS 10 CITATIONS
SEE PROFILE
Azzam Mourad
Lebanese American University
101 PUBLICATIONS 852 CITATIONS
SEE PROFILE
Hadi Otrok
Khalifa University
137 PUBLICATIONS 1,452 CITATIONS
SEE PROFILE
All content following this page was uploaded by Hani Sami on 29 April 2020.
The user has requested enhancement of the downloaded file.
2. This paper has been accepted for publication in a future issue of the IEEE Internet of Things Magazine
AI, Blockchain and Vehicular Edge Computing for
Smart and Secure IoV: Challenges and Directions
Ahmad Hammoud∗, Hani Sami∗, Azzam Mourad∗, Hadi Otrok†, Rabeb Mizouni†, Jamal Bentahar‡
∗Department of Computer science and Mathematics, Lebanese American University, Beirut, Lebanon
†Center of Cyber-Physical Systems (C2PS), Department of EECS, Khalifa University, Abu Dhabi, UAE
‡Concordia Institute for Information Systems Engineering, Concordia University, Montreal, Canada
Abstract—Internet of Things (IoT) is turning into an un-
deniably developing point of discussion in both research and
industrial fields. A key part that is witnessing a quick de-
velopment in the utilization of IoT devices is the Internet of
Vehicles (IoV), which allows information exchange among vehi-
cles and infrastructures. Notably, Artificial Intelligence (AI) has
been widely adopted for solving challenging vehicular problems
and managing the IoV infrastructure. Despite the advantages
AI carries for IoV, its deployment can be negatively affected
by lacking computation resources and processing unreliable
data. On the other hand, Blockchain is a decentralized and
distributed peer-to-peer network architecture that can be em-
ployed to empower security and resists against undesirable data
modification. However, integrating both technologies (i.e., AI
and Blockchain) exhausts, even more, the IoV infrastructure.
Thereupon, we present in this paper an overview discussing the
AI and Blockchain approaches and models for IoV and propose
a new Vehicular Edge Computing based architecture embedding
both technologies and overcoming the aforementioned limitations.
We then discuss the main challenges and give notice to the
concerned parties and stakeholders about promising directions
that arise from enabling the three technologies for providing
smart, secure, and efficient IoV.
Index Terms—Internet of Things, Internet of Vehicles, Au-
tonomous Vehicles, Blockchain, Artificial Intelligence, Vehicular
Edge Computing, Resource Management, IoV Applications.
I. INTRODUCTION
With the increasing need for generating data and computa-
tional tasks on vehicles and the rapid development of Inter-
net and communication technologies, the Internet-of-Vehicles
(IoV) concept arose to be one of the hottest topics nowadays.
IoV is a distributed network that utilizes the data generated
by vehicles to improve safety on the road for smart cities. It
enables a smart Vehicle-to-Everything (V2X) communication
allowing the interaction of vehicles with other heterogeneous
networks [1].
New generation of vehicles embeds complex applications
that require intelligent decision making. Hence, the advance-
ment of Artificial Intelligence (AI) derived its path into IoV,
yielding the innovation of smart vehicles. This emergence
attracted many industries to invest in AI for IoV applications
such as real-time navigation systems, autonomous driving,
street surveillance, and other safety-related systems. For in-
stance, Google has launched its project for the self-driving ve-
hicles using AI, where they used images, beams of radar, lidar,
ultrasound, GPS navigation, and central computing to identify
objects and predict behaviors accurately [2]. Consequently, the
number of smart vehicles in IoV is going to increase in the
upcoming years drastically. Therefore, careful consideration
must be taken in order to manage the IoV infrastructure
efficiently. In addition, after the emergence of modern appli-
cations in smart vehicles, Vehicular Edge Computing (VEC)
came to meet the vehicles’ demands for computation. VEC is
composed of computation devices residing on roadsides or in
proximity to the vehicles. Such architecture facilitates commu-
nication, computation, and data sharing among vehicles. This
results in avoiding the delays in communicating with the cloud,
which is more convenient for dynamic environments such as
IoV. Hence, meeting the large computation demands can be
done using AI to optimally decide and schedule tasks that
need to be offloaded to the VEC infrastructure and properly
manage the network usage.
Additionally, with the increasing number of automated
vehicles, the burden of security, privacy, and trust fears has
spread, affecting the industry finance and customer trust [3].
In parallel, Blockchain is a decentralized ledger that entails a
high level of trustworthiness and availability. Correspondingly,
the integration of Blockchain within the IoV started to gain
attention lately. It was essentially integrated by scholars to
maintain high data credibility among vehicles, enabling traffic
safety and efficiency. Many manufacturers are considering this
framework to improve the driving experience [4].
Further, the expected large number of smart vehicles em-
bedding several AI models obligates the need for a rich source
of computation power. Simultaneously, employing Blockchain
in such an environment raises many questions regarding its
feasibility due to its high demand for resources. To the best
of our knowledge, no research efforts have addressed the
aforementioned limitations combined. Thereupon, a need for
integrating AI’s learning process with a scalable Blockchain
implementation within the same architecture arises for en-
abling smart, secure, and efficient IoV. In this regard, we
propose a new VEC-based architecture embedding both AI
and hybrid Blockchain models for (1) increasing the accuracy
of IoV intelligent applications affected by lacking computation
resources and processing unreliable falsified data and (2) effi-
ciently managing the IoV infrastructure resources to enable the
successful deployment of both technologies. Regardless, this
synergy arises many limitations that need to be addressed for
realizing the proposed architecture. Accordingly, we elaborate
on a thorough list of challenges and research directions.
This paper is organized as follows: In Section II, we present
3. This paper has been accepted for publication in a future issue of the IEEE Internet of Things Magazine
the typical IoV architecture and emphasize on the AI role
within. In section III, we give an overview of Blockchain
and its advantages in IoV, supported by some research work.
Section IV proposes a VEC-based architecture integrating
AI and Blockchain on different layers within IoV. Then, we
open the doors for challenges caused by this combination and
propose future research directions in Section V. Finally, we
conclude the paper in Section VI.
II. EMERGENCE OF AI WITHIN IOV
In this section, we present the typical IoV architecture
and its components, followed by an overview of the current
industrial and research directions utilizing AI for achieving
intelligence in IoV applications and efficiency in managing
IoV resources.
A. IoV Architecture
Ultimately, IoV is the consolidation of the internet and
IoT along with the vehicles, enabling a smart communication
between vehicles and other heterogeneous networks to provide
the drivers and the passengers with a variety of services
[5]. Fig. 1 summarizes the components and their interactions.
Initially, vehicles offer computational capabilities within their
On-Board Units (OBUs). In particular, the OBU can benefit
from data generated by the integrated sensors (e.g. Camera,
GPS, Radar) to assist the driver in making a certain decision.
For instance, sensors can detect a possible collision with an
object (e.g. pedestrian or bicycle). A warning can be sent to the
driver accordingly to advocate on being cautious to unwanted
interference.
As observed in Fig. 1, there exist several types of communi-
cation networks in this topology:
• Vehicle-to-Vehicle (V2V): In V2V, vehicles are con-
nected wirelessly to share information and create a 360-
degrees awareness of other vehicles in proximity. With
such connectivity and cooperation, the number of crashes
will be reduced, as the self-driving vehicle (or the driver)
will be alerted to take actions.
• Vehicle-to-Infrastructure (V2I): The V2I is considered
to be a two-faced communication network. The infras-
tructure serves the car in bi-directional communication.
In Intelligent Transportation System (ITS), travelers are
linked to the available nearby VEC infrastructure, e.g.
Road-Side Unit (RSU) and Base Station (BS), feeding it
with road-data according to their destination to enhance
their driving experience. From the other side, the VEC in-
frastructure plays a secondary role in assisting the OBUs
in computational processing. The offloading technique is
used to transfer tasks from vehicles to infrastructure due
to resource-shortage a vehicle may suffer from. Once the
task is processed, the infrastructure returns the execution
result to the vehicle.
• Infrastructure-to-Infrastructure (I2I): The I2I is de-
picted by having infrastructures connected together in or-
der to facilitate computation and network load-balancing
and share information. Mainly, the components in such a
communication network consist of a set of BSs, RSUs,
Fog servers, and Cloud servers.
B. Intelligent IoV Applications
AI is being applied in a wide spectrum of areas and
applications trying to solve complex and challenging tasks that
usually require human intervention. Therefore, AI contributed
in solving challenging vehicular tasks, which resulted in
advancing the vehicular industry and its economy. Self-driving
excels because of revolutionary advancements of AI in these
IoV applications, including speed changing, objects detection,
building trajectory, lane changing, real-time navigation, traffic
lights control, and video surveillance [6]. On the industrial
level, Argo AI, Cruise, Waymo, and Aurora are examples of
leading companies in developing autonomous-driving vehicu-
lar systems coping with the fast-growing self-driving research
field. These companies were able to bring theory into reality
by counting on sensed data and radars to identify objects,
predict others’ actions, and build future trajectories up to
three football fields distance. After the unprecedented success
in self-driving technology, some influential players in the
vehicular industry such as Hyundai, Audi, Mercedes, and
BMW started integrating auto-piloting features into their new
models at high prices after gaining customer’s trust through
several successful prototypes [7].
In order to contextualize the importance AI is bringing
to the field, we consider some scenarios elucidating on its
main strength in solving IoV challenges. Considering a car
in auto-piloting mode, the car collects the needed data before
it starts moving on the road. In the simplest way, this can
be done by continuously sending 360 beams of radar to
predict, identify, and make decisions. Feeding these data to
an AI model, which can be a combination of multi-agent
Reinforcement Learning (RL), game-theoretical decisions, or
logical reasoning, the vehicle can identify its current position
on the road and is capable of understanding its surroundings.
This is made through AI by identifying different types of
objects, such as the traffic light color, moving pedestrians,
objects crossing the road, and static objects. Furthermore, AI is
used to plan or take instant actions. Examples of decisions can
be turning left or right, speeding up or down, changing lanes,
deciding on a break level when needed, or an immediate stop
to avoid accidents. Additionally, predicting the behavior of
neighboring drivers and objects is a crucial model supporting
self-driving. In summary, AI is serving the IoV by deciding
on a trajectory to follow through object detection, decision
making, and behavior analysis. To academically study how AI
is attractive within IoV, we show the number of publications
by exploring the search results of Google Scholar 1
for the
keywords ‘internet-of-vehicles’ or ‘self-driving’ with the term
‘AI’. As noticed in Fig. 2, the number of publications is huge
and increasing every year.
C. IoV Infrastructure Management
Vehicles are becoming smarter; however, such intelligence
come at the cost of requiring complex computation that
significantly utilizes the IoV resources. Even-though smart
vehicles nowadays are embedded with computation resources
1https://scholar.google.com/
4. This paper has been accepted for publication in a future issue of the IEEE Internet of Things Magazine
Fig. 1. IoV Architecture
Fig. 2. AI Usage in IoV in Terms of Publications
or OBUs; these resources might not be enough to meet all
the complex applications that are becoming more demanding.
To overcome such limitations, recent works are proposing
to offload vehicular tasks to VEC, which is a challenging
decision to make under different constraints and mobility
conditions [8]. A computation offloading problem on the
Edge consists of a set of tasks, each having services and
inputs that are sent to available connecting Edge. A basic
Edge serving the IoV is formed of BSs, RSUs, and computing
servers, while some other works use vehicles as part of it
[9]. At one point, the Edge infrastructure might receive
multiple offloading tasks at the same time. Having limited
available resources, the authors used AI, i.e. RL model
named Deep Q-Learning, to distribute the tasks among edge
resources in the order of importance [8]. The importance of
tasks distribution is defined by a cost factor which changes
depending on the perspective of the AI offloading solution.
Consequently, the number of tasks to be offloaded from the
same location and time can be large. Thus, managing network
resources and scheduling its traffic is another challenge to be
dealt with. To complicate things, the dynamics of vehicular
networks, heterogeneous network available resources, and dif-
ferent Quality-of-Service (QoS) requirements for every vehicle
make the vehicular network management problem non-trivial
to solve. Learning vehicular mobility, such as traffic flows,
trajectory prediction, and wireless channel estimation leads
to refine efficient network resource management models that
meet the different vehicular links requirements. Authors in
[10] presents an overview of the literature that uses machine
learning to solve difficult vehicular network problems, where
learned dynamics helps in building efficient scheduling and
routing network protocol for better management of V2X con-
nections. Network congestion control is another challenging
task in dense intersections or in a traffic jam. With the
increasing number of vehicular nodes connected to the VEC,
congestion parameters change depending on vehicles demands
to avoid data collisions. The dynamics learned also help
in managing the network resources or traffic transmission
scheduling in vehicular networks. For instance, the problems
can be formulated as Markov Decision Processes (MDP) and
solved using RL to maximize reward values and meet the
requirements of the dynamic links of the global network [10].
III. BLOCKCHAIN FOR SECURING IOV
In parallel, Blockchain is a decentralized and distributed
digital ledger that was developed as an underlying network
structure for the well-known secure crypto-currency system
“Bitcoin” [11]. Recently, it has been adopted by a diverse
5. This paper has been accepted for publication in a future issue of the IEEE Internet of Things Magazine
set of applications, including financial services, IoT, vot-
ing systems, and healthcare [12]. Blockchain uses a fully
distributed peer-to-peer architecture without relying on any
centralized authority to operate. Consequently, applications
and architectures that rely on Blockchain for managing their
network infrastructure obtain a high level of data availability,
security, privacy, and trust. For instance, Blockchain grants
transparency by having all participating nodes owning a full
copy of the database. Furthermore, the nodes must agree on
the new transactions before updating their databases to reach
consensus. Due to its massive success, Blockchain 2.0 got
released, introducing many features, including the foundation
of smart contracts. A smart contract is a self-executing piece of
code that gets triggered once its predefined conditions are met,
without relying on any trusted authority. There exist several
types of derived Blockchain, each of which serves a different
purpose as follows:
• Public Blockchain: is a fully distributed ledger that relies
on no central authority to manage. Anyone can become a
member in this type of Blockchain. For instance, Bitcoin
and Ethereum are public Blockchains for anonymous
participation to empower their decentralization.
• Private Blockchain: is a permission-based Blockchain
that is mostly adopted by private organizations. It relies
on a central authority to manage who can participate in
this network, and restrict some participants from reading
and writing inside of it.
• Consortium Blockchain: is a hybrid type of Blockchain.
It relies on a group of approved entities for its manage-
ment. Such a type may adopt a hybrid access method,
allowing the outside world to interact with it in an
authorized manner. Corda and Quorum are examples of
consortium Blockchain.
On the industry level, many leading automakers started
considering Blockchain to ameliorate the driving experience
by securely exchanging data in V2X [4]. For instance, GM and
BMW2
are considering deploying a Blockchain-based solution
for sharing self-driving car data among themselves, which will
fasten the existence of autonomous vehicles. Volkswagen3
,
on the other hand, is building a tracking system based on
Blockchain to prevent the manipulation of the odometer done
by the sellers to raise the prices of their cars.
Lately, researchers have focused on integrating Blockchain
within IoV for granting the latter the security and privacy
it needs to function. We used Google Scholar4
to observe
the number of publications addressing the integration of
Blockchain within IoV in the past few years, by exploring
results containing the words ‘IoV’ and ‘Blockchain’ within
the title or abstract. As observed in Fig. 3, the very first
research efforts came into light in mid-2017. The number
kept on increasing throughout the years as Blockchain proved
its efficiency for supporting IoV. In particular, some works
2https://www.coindesk.com/gm-bmw-back-blockchain-data-sharing-for-
self-driving-cars
3https://businessblockchainhq.com/business-blockchain-news/volkswagen-
blockchain-efforts-to-prevent-odometer-fraud/
4https://scholar.google.com/
Fig. 3. Blockchain Usage in IoV in Terms of Publications
adopted Blockchain to provide data trustworthiness and cred-
ibility for enabling road-safety and efficiency. Others focused
on preserving privacy for protecting drivers from any data
leakage or Cyberbullying. In the following, we discuss some
of these approaches:
• Empowering Security: The credibility of the broadcast
messages among vehicles has attracted many research
scholars lately. Some of these researchers employed the
Blockchain technique to reinforce the security of the IoV
paradigm by evaluating the credibility of the broadcast
messages [12]. Others proposed authentication mecha-
nisms to resist malicious attacks against IoV, enabling
a safe and secure environment [5].
• Preserving Privacy: most Blockchain implementations
entail public-key encryption for privacy-preserving pur-
poses. Consequently, Blockchain was also employed in
IoV to reinforce the privacy of the drivers. Some scholars
were interested in targeting how to protect the vehicles
from any leakage of critically private information [13].
Certainly, by integrating the Blockchain, most communi-
cations will be encrypted, making it very hard for third
parties to decrypt and extract critical information.
IV. VEC-BASED ARCHITECTURE ENABLING AI AND
BLOCKCHAIN IN IOV
A. Problem Statement
Initially, IoV applications are complex in a sense they
require some advanced techniques to execute due to the
unpredicted and random behaviors of vehicles. Accordingly,
scholars have been adopting AI to assist in the overwhelming
decision-making process ever since (as discussed in Section
II). Despite these efforts and contributions, AI further increases
the computation load on the IoV infrastructure and needs
an incubating and malicious-free environment to perform as
expected. Otherwise, AI can lose its reliability and threaten
the road-safety, due to its vulnerability against cyber-attacks.
Such attacks can manipulate these algorithms and disrupt
their behaviors, with minimal changes, resulting in inaccurate
decisions that may endanger people’s lives. This is mainly
due to the lack of explainability of the decisions made by
these algorithms. In this context, the integration of AI along
with Blockchain entails advantages to the applications and
6. This paper has been accepted for publication in a future issue of the IEEE Internet of Things Magazine
Fig. 4. Blockchain-Based VEC Architecture Supporting AI in IoV
infrastructure management, enabling decentralized, smart, and
secure IoV. However, trying to overcome the above limitations
by integrating Blockchain results in a higher computation load
on the IoV infrastructure, which can harm its performance.
Thus, there is a need for an architecture that combines both
AI and Blockchain, and benefits from VEC to efficiently
utilize and support the IoV infrastructure in order to meet the
requirements of both technologies.
B. Proposed Architecture
In this section, we present a high-level view of our proposed
architecture that embeds AI models with a scalable Blockchain
network on a multi-layered VEC infrastructure. Fig. 4 depicts
how the three technologies can utilize the IoV components
in three hierarchical layers: IoV Data Generation, Vehicular
Edge, and Cloud/Fog. Presenting our architecture in a bottom-
up fashion, we start by the different IoV components that
generate vehicular data, run AI models, and execute a variety
of tasks. At the Edge layer, data reliability is ensured through
multiple hybrid Blockchains deployed on clusters of RSUs.
After Blockchain approval, Vehicular data are managed and
stored in data-centers. Moving forward, we utilize powerful
fog servers connected to these Blockchains, assisted by cloud
servers, to form a strong computation base to support IoV.
Cloud/Fog servers execute computation tasks that are offloaded
by vehicles. They are also responsible for updating vehicular
AI models through learning from the new data stored in the
data-centers. To elaborate further, we give below some details
about the essential functionalities of each layer.
• IoV Data Generation Layer: Initially, we suppose that
vehicles are always connected to the Vehicular Edge,
either directly or through a Master node. A vehicle (or
any other IoV device, e.g. road camera) generates road
data through the sensors it equips, and then sends them
to the nearest RSU. In addition, this layer generates com-
putation tasks to be offloaded to the VEC infrastructure.
• Vehicular Edge Layer: The generated data needs to
be stored, filtered, and then transferred securely, without
being tampered, to computationally-rich servers for pro-
cessing. Edge nodes, in our case RSUs, are responsible
for such tasks, in addition to avoiding network congestion
on higher layers due to the massive amount of data. As
shown in Fig. 4, neighboring RSUs form a cluster for
serving vehicles efficiently. Due to the RSU’s poor stor-
age capabilities, we assist the cluster by deploying a data-
center within its reach. New data received by the RSU
is forwarded to the data-center. The receiving RSU only
uses metadata that references the new data for process-
ing. To securely store data and maintain the anonymity
of vehicles generating them, we propose employing a
consortium Blockchain 2.0 architecture as the underlying
network for each cluster of RSUs. In such a Blockchain,
the used consensus method differs from the typical Proof-
of-Work (PoW) that drains a lot of energy and time.
Typically, it uses an efficient consensus algorithm, such
7. This paper has been accepted for publication in a future issue of the IEEE Internet of Things Magazine
as Istanbul Byzantine Fault Tolerance, Selective Endorse-
ment, and Raft-based Consensus mechanisms, which can
process a great number of transactions at higher speed
rates with less energy consumed. Moreover, it enables
hybrid access so that both internal and external entities
are granted full or limited access, depending on their
role, to manage the Blockchain and make inquiries. In
this context, the Edge is responsible for a certain set of
actions embedded in three distinguished smart contracts
as listed below.
– Participants Authentication: In order for a vehicle
to interact with the infrastructure, first, the authen-
tication contract acknowledges the connection with
this vehicle. After that, it creates a profile and stores
basic information about it that shall remain active
while staying under the same Edge cluster coverage.
– Data Storing: This contract can differentiate among
several types of sensed data. It embeds a mechanism
that categorizes and labels the data to be forwarded
to the data-center. Such a phase eases the process of
forwarding the data collected to the various types of
applications requesting it.
– Vehicular AI Models Management: Supposedly,
vehicles are in recurrent communication with the
Edge. Once the vehicle is authenticated, this con-
tract gets triggered frequently to handle updating the
IoV application models (such as the self-driving AI
model) embedded within the vehicles whenever a
new version is received from the Cloud/Fog layer.
The updated model gets transferred to vehicles run-
ning the related AI application.
It is important to mention that the Blockchain only stores
metadata of the data received from the vehicles, which
makes our proposal more scalable.
• Cloud/Fog Layer: As the challenges imply, there is a
need for a secure and computationally-rich environment
to do heavy processing. Typically, refining an up-to-date
AI model requires heavy processing, which can be offered
by the Fog servers provided by trustworthy providers. The
updated models rely on new road data retrieved from the
Vehicular Edge layer for updating them and increasing
their accuracy due to the dynamicity of IoV. In case the
fog servers are overloaded, they rely on offloading some
tasks to the Clouds. AI application models are forwarded
to the vehicle itself through the Edge for granting the
latter an ability for instant decision generation. The
resource management model can be deployed on the BSs
for optimally managing the Fog servers’ resources for
granting satisfying QoS.
V. CHALLENGES AND RESEARCH DIRECTIONS
Despite its advantages, the proposed architecture imposes
many challenges and opens several research directions related
to the three paradigms (i.e., AI, Blockchain, and VEC).
1) Draining IoV Infrastructure: Having traffic congestion
in some locations can lead to a high volume of data
being sent to the Edge. Likewise, the computation tasks
generated by vehicles for offloading will increase. This
causes drainage in computation, network, and storage
capacities of the infrastructure and affects its perfor-
mance [14]. Therefore, efficiently managing the IoV in-
frastructure and exploring new sources of computation is
vital. In the following, we list some promising research
directions:
• Elaborating intelligent model, e.g., RL used in [8],
for deciding where the computation should be of-
floaded and how the network can be managed to
enhance the efficiency of utilizing the IoV infras-
tructure. For instance, the computation can be sent
to the fog or cloud servers. Building such a model
and deciding on a reward function that takes into
consideration the current servers’ loads and vehicle
geographical locations is encouraging.
• Proposing on-demand formation of vehicular clus-
ters can be a solution for aiding the IoV infras-
tructure by providing more sources of computation
power. Further, deciding on how to form these on-
demand vehicular clusters, what type of tasks they
can run, and how these tasks are distributed should
be considered.
• Developing an intelligent network and storage re-
source management approach [10] for the Edge
clusters is another promising research direction.
This can be possible through studying the possibility
of offloading the data and tasks to other neighboring
clusters. This methodology ought to consider the
location of the model, the effect of data transmission
on the network, and the division of tasks among
several clusters after studying their capacities. In
this context, the use of containers instead of vir-
tual machines can ease the process of migration,
resource scaling, and maintenance of services.
• Collecting IoV data might still be costly due to
adopting a Blockchain solution. Hence, there is a
need for further optimizing the cost in terms of net-
work, storage, and computation resources in order
to attract stakeholders to invest in such technology.
2) Fog Federation for Load Balancing: Unbalanced traf-
fic congestion raises an important question towards the
vertical resource expansion in the computation layer.
Such complication results in an uneven data load sent to
different Fog servers. This opens the doors for further
exploring solutions through horizontal maturation. To
elaborate more, we advocate on studying the afore-
mentioned problem by proposing the concept of Fog
Federation as a solution to overcome the resource-
shortage caused by offloading big data to specific Fog
locations. Such types of federations can be achieved
through reaching a service-level agreement among Fog
Providers.
3) Inconsistency and Inefficiency of AI Models’ Up-
dates: Following our architecture, an AI model is
updated on fog servers, which receive data from the
connected Blockchains. Running AI updates indepen-
8. This paper has been accepted for publication in a future issue of the IEEE Internet of Things Magazine
dently on separate fog clusters result in inconsistencies
among AI models located in different locations and may
affect the performance of the applications. Therefore, an
aggregation mechanism to achieve model consistencies
for the same IoV application is crucial. In order to
overcome this issue, we suggest the development of a
Distributed Machine Learning model that can benefit
from the clustered and distributed nature of fog servers
in our architecture and is capable of updating the AI
models with large data received from different locations
in parallel. However, careful consideration should be
given on the design of the AI model used to qualify
for distributed computing.
4) Consortium Limitations: Consortium Blockchain
leverages significant advantages that may be enough
to suit our VEC architecture well. Nevertheless, it
entails some drawbacks due to its hybrid and semi-
decentralized mechanism. On the one hand, only a
certified group of members allows others to participate,
leading to a state of monopolism in some cases. On the
other hand, the resource-saving consensus algorithms
applied for this Blockchain could lead to committing
unwanted transactions to feed the AI learning process
with bogus data since the consensus participants are
pre-approved nodes on the network and can be subjected
to hijacking attacks. This opens the door for further
exploring the pros and cons of adopting a different type
of Blockchain and consensus methods for IoV as an
attempt to overcome these challenges.
5) Unreliable Vehicles: Vehicles may publicize fake data
intentionally or due to a broken sensor, and feed them
to the Edge [15]. The latter forwards them to the
Cloud/Fog servers for model learning regardless of how
trustworthy it is. In case of fake data, the model will be
inaccurate and exposed to making wrong decisions. Such
a challenge unravels many exciting research areas. In our
proposal, the advantage of having a three-layered archi-
tecture allows us to vertically and/or horizontally refine
an assessment model for the data to assist the evaluation
of its trustworthiness further. An attractive direction may
consist of combining a decentralized game-theoretical
model, in particular security games, along with a multi-
agent RL mechanism towards filtering falsified data from
malicious partners. The model should also deal with
conflicting data, for instance, data reporting conflicting
or inconsistent traffic situations.
6) AI-Enabled Smart Contract: Data is generated on the
user level, and gets forwarded to the Cloud/Fog for
analysis. Edge resembles as the man-in-the-middle for
such a process to help the Cloud/Fog preprocessing the
data according to the vehicle profile. However, a key
challenge is to recognize unfamiliar data patterns and
categorize them according to the various conditions.
Possibly, an RL model might be a promising solution
to overcome this problem. A feasibility study can be
addressed in the future to embed an intelligent model
within our Data Storing smart contract. The evolved
contract will intelligently recognize and categorize new
data patterns instead of having them statically defined.
VI. CONCLUSION
The usage of AI within IoV gained great attention lately in
the academic and industrial sectors. However, such integration
requires efficient resource management mechanisms due to
AI’s exhaustive learning process and entails secure approaches
for generating trustworthy data. In this context, Blockchain’s
decentralized and security-enhancing architecture offers the
aforementioned paradigm the trustworthiness it needs to func-
tion; nonetheless, it further exhausts the infrastructure. In this
regard, we first elaborated on the usage of AI for IoV applica-
tions and resource management, followed by the Blockchain
techniques addressing the security issues. We then proposed a
new multi-layered hybrid Blockchain-based VEC architecture
for supporting the AI integration within IoV to overcome the
aforementioned challenges. Finally, we offered a thorough list
of challenges and research directions that open the door for
further investigation.
REFERENCES
[1] O. Kaiwartya, A. H. Abdullah, Y. Cao, A. Altameem, M. Prasad, C.-T.
Lin, and X. Liu, “Internet of vehicles: Motivation, layered architecture,
network model, challenges, and future aspects,” IEEE Access, vol. 4,
pp. 5356–5373, 2016.
[2] J. Krafcik, “Say hello to waymo: What’s next for google’s self-driving
car project,” Medium. December, vol. 13, 2016.
[3] J. Cui, L. S. Liew, G. Sabaliauskaite, and F. Zhou, “A review on safety
failures, security attacks, and available countermeasures for autonomous
vehicles,” Ad Hoc Networks, vol. 90, p. 101823, 2019.
[4] E. Uhlemann, “Time for autonomous vehicles to connect [connected
vehicles],” IEEE vehicular technology magazine, vol. 13, no. 3, pp. 10–
13, 2018.
[5] A. Arora and S. K. Yadav, “Block chain based security mechanism for
internet of vehicles (iov),” in Proceedings of 3rd International Con-
ference on Internet of Things and Connected Technologies (ICIoTCT),
2018, pp. 26–27.
[6] B. Schoettle and M. Sivak, “A survey of public opinion about au-
tonomous and self-driving vehicles in the us, the uk, and australia,”
University of Michigan, Ann Arbor, Transportation Research Institute,
Tech. Rep., 2014.
[7] X. Krasniqi and E. Hajrizi, “Use of iot technology to drive the auto-
motive industry from connected to full autonomous vehicles,” IFAC-
PapersOnLine, vol. 49, no. 29, pp. 269–274, 2016.
[8] Z. Ning, P. Dong, X. Wang, J. J. Rodrigues, and F. Xia, “Deep reinforce-
ment learning for vehicular edge computing: An intelligent offloading
system,” ACM Transactions on Intelligent Systems and Technology
(TIST), vol. 10, no. 6, p. 60, 2019.
[9] Q. Qi, J. Wang, Z. Ma, H. Sun, Y. Cao, L. Zhang, and J. Liao,
“Knowledge-driven service offloading decision for vehicular edge com-
puting: A deep reinforcement learning approach,” IEEE Transactions on
Vehicular Technology, vol. 68, no. 5, pp. 4192–4203, 2019.
[10] L. Liang, H. Ye, and G. Y. Li, “Toward intelligent vehicular networks: A
machine learning framework,” IEEE Internet of Things Journal, vol. 6,
no. 1, pp. 124–135, 2018.
[11] S. Nakamoto et al., “Bitcoin: A peer-to-peer electronic cash system,”
2008.
[12] Z. Yang, K. Yang, L. Lei, K. Zheng, and V. C. Leung, “Blockchain-based
decentralized trust management in vehicular networks,” IEEE Internet
of Things Journal, vol. 6, no. 2, pp. 1495–1505, 2018.
[13] X. Wang, P. Zeng, N. Patterson, F. Jiang, and R. Doss, “An improved
authentication scheme for internet of vehicles based on blockchain
technology,” IEEE access, vol. 7, pp. 45 061–45 072, 2019.
[14] T. Dbouk, A. Mourad, H. Otrok, H. Tout, and C. Talhi, “A novel ad-
hoc mobile edge cloud offering security services through intelligent
resource-aware offloading,” IEEE Transactions on Network and Service
Management, 2019.
[15] O. A. Wahab, A. Mourad, H. Otrok, and J. Bentahar, “Ceap: Svm-based
intelligent detection model for clustered vehicular ad hoc networks,”
Expert Systems with Applications, vol. 50, pp. 40–54, 2016.
9. This paper has been accepted for publication in a future issue of the IEEE Internet of Things Magazine
Ahmad Hammoud received his BS in Business
Computing and MS in Computer Science from
the Lebanese University in 2016 and the Lebanese
American University in 2019 respectively. His cur-
rent research interests include cloud federation, fog
federation, game theory, Blockchain, Artificial Intel-
ligence, and security.
Hani Sami received his M.Sc. degree in Computer
Science from the American University of Beirut
and completed his B.S. and worked as Research
Assistant at the Lebanese American University. The
topics of his research are Fog Computing, Vehicular
Fog Computing, and Reinforcement Learning. He
is a reviewer of several prestigious conferences and
journals.
Azzam Mourad is currently an Associate Professor
of computer science with the Lebanese American
University and also an Affiliate Associate Professor
with the Software Engineering and IT Department,
Ecole de Technologie Superieure (ETS), Montreal.
He has served/serves as an Associate Editor for the
IEEE Transaction on Network and Service Manage-
ment, IEEE Network, IEEE Open Journal of the
Communications Society, the IET Quantum Com-
munication, and the IEEE Communications Letter,
the General Chair of IWCMC2020, the General Co-
Chair of WiMob2016, and the Track Chair, a TPC member, and a Reviewer
of several prestigious journals and conferences. He is an IEEE senior member.
Hadi Otrok holds an associate professor position
in the department of ECE at Khalifa University
of Science and Technology, an affiliate associate
professor in the Concordia Institute for Information
Systems Engineering at Concordia University, Mon-
treal, Canada, and an affiliate associate professor in
the electrical department at Ecole de Technologie
Superieure (ETS), Montreal, Canada. He received
his Ph.D. in ECE from Concordia University. He
is a senior member at IEEE, and associate editor at:
Ad-hoc networks (Elsevier) and IEEE Networks. He
served in the editorial board of IEEE communication letters. He co-chaired
several committees at various IEEE conferences. His research interests include
the domain of computer and network security, crowd sensing and sourcing,
ad hoc networks, and Blockchain.
Rabeb Mizouni is an associate professor in Electri-
cal and Computer Engineering at Khalifa University.
She got her PhD and her MSc in Electrical and
Computer Engineering from Concordia University,
Montreal, Canada in 2007 and 2002 respectively.
Currently, she is interested in edge computing, crowd
sensing, blockchain and cloud computing.
Jamal Bentahar received the bachelor’s degree in
Software Engineering from the National Institute
of Statistics and Applied Economics, Morocco, in
1998, the M.Sc. degree in the same discipline from
Mohamed V University, Morocco, in 2001, and the
Ph.D. degree in Computer Science and Software
Engineering from Laval University, Canada, in 2005.
He is a Professor with Concordia Institute for Infor-
mation Systems Engineering, Faculty of Engineer-
ing and Computer Science, Concordia University,
Canada. From 2005 to 2006, he was a Postdoctoral
Fellow with Laval University, and then NSERC Postdoctoral Fellow at Simon
Fraser University, Canada. He was an NSERC Co-Chair for Discovery Grant
for Computer Science (2016–2018). His research interests include cloud and
services computing, trust and reputation, game theory, computational logics,
model checking, multi-agent systems, and AI.
View publication statsView publication stats