This document discusses using blockchain technology to secure data management for supply chain management applications that utilize Internet of Things (IoT). It first provides background on IoT and blockchain individually, explaining how IoT connects devices to share data but also raises security and privacy issues, while blockchain provides a distributed ledger to securely record transactions without a central authority. The document then reviews related work applying blockchain to areas like crowdsensing and supply chains. It proposes that blockchain could help address some security issues in IoT by providing secure identity management, product traceability, automated smart contracts, and time-stamped records for supply chain applications. However, challenges remain to implement these solutions in practice.
In this seminar you will listen to in depth explanation of the hottest technologies in 2019 and beyond. Prof. Banafa will discuss each technology its applications and challenges with real life cases. The interaction among all the four technology will be explored with focus on future trends in each of technology. As all technologies can be summarized in one word IBAC (IoT, Blockchain, AI, Cybersecurity) they can be explained with the following words: IoT: senses, Blockchain: remembers, AI: thinks, and Cybersecurity: protects.
IRJET- An Approach to Authenticating Devise in IoT using BlockchainIRJET Journal
The document proposes using blockchain technology to authenticate devices in the Internet of Things (IoT) and address major security issues. It describes how IoT currently lacks adequate authentication of entities and integrity of exchanged information due to its decentralized nature. The approach suggests an initial decentralized system using blockchain's security elements to guarantee solid device identification and authentication while preserving integrity and accessibility of information. This would help generate secure virtual environments where devices can identify and trust each other. The document provides background on IoT security issues, blockchain technology, and smart contracts before reviewing related literature on authentication in IoT.
Secure and Smart IoT using Blockchain and AIAhmed Banafa
This document discusses securing and enabling smart capabilities for Internet of Things (IoT) devices using blockchain and artificial intelligence. It covers challenges facing IoT implementation including lack of standardization, security and privacy issues, and integrating diverse data formats from different sensors and devices. The document proposes that combining blockchain and AI can help address these challenges by decentralizing IoT networks, adding an extra layer of security to device authentication and data transmission, and powering smart analytics on the large volumes of data generated by IoT. Overall, the document argues that blockchain and AI will be important technologies to realize the full potential of a secure, smart IoT.
Seminar of the Web Security and Privacy course of the Master Degree in Engineering in Computer Science (Cyber Security) of the University of Rome "La Sapienza".
The presentation is about a research project called "Smart Home" in which the Block Chain method is applied in a Smart Home environment to assure Privacy and Security in an IoT context.
The following list of predictions (Figure 1) explores the state of IoT in 2019 and covering IoT impact on many aspects business and technology including Digital Transformation, Blockchain, AI, and 5G.
Coalition of IoT and Blockchain: Rewards and Challengesanupriti
IoT and Blockchain are two evolving technologies which are gradually realizing immense potential to be a decisive part of future of mankind ecosystem. Blockchain and IoT, both are envisaged to bring in a plethora of advantages including better control, communication, transparency and more significantly realizing digital trust without any third party intervention. Both of these technologieshave immense potential for exploitation in a smart nation concept. The advantages being realized are potent enough for definite implementation ahead but they come with an austere package of security concerns which if not taken care at the design stage can lead to pandemonium beyond control because of the billion plus connected things. Even atdesign stage, one can appreciate that it will be envisaging beyond control to close all security vulnerabilities and zero day’s exploits of future. But then Blockchain is an inexpugnable solution to shut all these securities imperils. This paper builds upon the advantages of the union of these two evolving technology behemoths, their union and solutions vide Blockchain to the challenges in the way ahead
The Blockchain Wave in 2019 and BeyondAhmed Banafa
We’re still in the early days of Blockchain as a technology, and so we’re yet to see the full impact that it will have on the world that we live in. Still, it’s already showing potential across a range of industries and started to enter the public consciousness, so the real question is what will happen when Blockchain technology starts to mature.
In this seminar you will listen to in depth explanation of the hottest technologies in 2019 and beyond. Prof. Banafa will discuss each technology its applications and challenges with real life cases. The interaction among all the four technology will be explored with focus on future trends in each of technology. As all technologies can be summarized in one word IBAC (IoT, Blockchain, AI, Cybersecurity) they can be explained with the following words: IoT: senses, Blockchain: remembers, AI: thinks, and Cybersecurity: protects.
IRJET- An Approach to Authenticating Devise in IoT using BlockchainIRJET Journal
The document proposes using blockchain technology to authenticate devices in the Internet of Things (IoT) and address major security issues. It describes how IoT currently lacks adequate authentication of entities and integrity of exchanged information due to its decentralized nature. The approach suggests an initial decentralized system using blockchain's security elements to guarantee solid device identification and authentication while preserving integrity and accessibility of information. This would help generate secure virtual environments where devices can identify and trust each other. The document provides background on IoT security issues, blockchain technology, and smart contracts before reviewing related literature on authentication in IoT.
Secure and Smart IoT using Blockchain and AIAhmed Banafa
This document discusses securing and enabling smart capabilities for Internet of Things (IoT) devices using blockchain and artificial intelligence. It covers challenges facing IoT implementation including lack of standardization, security and privacy issues, and integrating diverse data formats from different sensors and devices. The document proposes that combining blockchain and AI can help address these challenges by decentralizing IoT networks, adding an extra layer of security to device authentication and data transmission, and powering smart analytics on the large volumes of data generated by IoT. Overall, the document argues that blockchain and AI will be important technologies to realize the full potential of a secure, smart IoT.
Seminar of the Web Security and Privacy course of the Master Degree in Engineering in Computer Science (Cyber Security) of the University of Rome "La Sapienza".
The presentation is about a research project called "Smart Home" in which the Block Chain method is applied in a Smart Home environment to assure Privacy and Security in an IoT context.
The following list of predictions (Figure 1) explores the state of IoT in 2019 and covering IoT impact on many aspects business and technology including Digital Transformation, Blockchain, AI, and 5G.
Coalition of IoT and Blockchain: Rewards and Challengesanupriti
IoT and Blockchain are two evolving technologies which are gradually realizing immense potential to be a decisive part of future of mankind ecosystem. Blockchain and IoT, both are envisaged to bring in a plethora of advantages including better control, communication, transparency and more significantly realizing digital trust without any third party intervention. Both of these technologieshave immense potential for exploitation in a smart nation concept. The advantages being realized are potent enough for definite implementation ahead but they come with an austere package of security concerns which if not taken care at the design stage can lead to pandemonium beyond control because of the billion plus connected things. Even atdesign stage, one can appreciate that it will be envisaging beyond control to close all security vulnerabilities and zero day’s exploits of future. But then Blockchain is an inexpugnable solution to shut all these securities imperils. This paper builds upon the advantages of the union of these two evolving technology behemoths, their union and solutions vide Blockchain to the challenges in the way ahead
The Blockchain Wave in 2019 and BeyondAhmed Banafa
We’re still in the early days of Blockchain as a technology, and so we’re yet to see the full impact that it will have on the world that we live in. Still, it’s already showing potential across a range of industries and started to enter the public consciousness, so the real question is what will happen when Blockchain technology starts to mature.
IRJET- Consensus Mechanism on Secure Challenges in Blockchain NetworksIRJET Journal
This document discusses consensus mechanisms for blockchain networks and the security challenges they present. It begins with an introduction to blockchain technology and its applications like Bitcoin and Ethereum. The properties of blockchain like decentralization and tamper-proof records are described. The document then examines the consensus algorithm used to validate transactions and adds new blocks. It evaluates the performance of different consensus mechanisms and discusses issues like scalability, costs, and attacks. The conclusion is that consensus algorithms need to be tailored to specific blockchain applications and further work is still needed to solve challenges of reliability, throughput, and delays simultaneously.
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...IRJET Journal
This document proposes enhancing security for IoT devices connected to cloud services through identity and access management (IAM). It discusses challenges in defining identity for IoT objects due to limitations in authentication factors. The document recommends using a risk-based multi-factor authentication approach leveraging inheritance, association, knowledge, and context information. It also notes complications from dynamic ownership and naming schemes. The proposed solution authenticates devices using OAuth 2.0 client credentials with a client ID, client secret, X509 certificates, and JSON web tokens. Access would further be authorized based on defined permissions and policies in a simple IAM implementation.
A Novel Security Approach for Communication using IOTIJEACS
The Internet of Things (IOT) is the arrangement of physical articles or "things" introduced with equipment, programming, sensors, and framework accessibility, which enables these things to accumulate and exchange data. Here outlining security convention for the Internet of Things, and execution of this relating security convention on the inserted gadgets. This convention will cover the honesty of messages and verification of every customer by giving a productive confirmation component. By this venture the protected correspondence is executed on implanted gadgets.
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Eswar Publications
This document proposes an Internet of Things (IoT)-based system for healthcare and an authentication scheme to secure it. It first reviews existing literature on IoT and healthcare systems. It then presents the architecture of the proposed system, which has perception, network and application layers. Devices in the perception layer would collect health data from patients. The network layer would communicate this data to cloud servers via gateways. The application layer would manage devices, analyze data and share it with applications. The document proposes authenticating healthcare devices during access of patient data. It aims to enhance security in IoT-based healthcare through device authentication.
IoT, AI and Blockchain: Catalysts for Digital TransformationAhmed Banafa
The digital revolution has brought with it a new way of thinking about manufacturing and operations. Emerging challenges associated with logistics and energy costs are influencing global production and associated distribution decisions. Significant advances in technology, including big data and analytics, AI, Internet of Things, robotics and additive manufacturing, are shifting the capabilities and value proposition of global manufacturing. In response, manufacturing and operations require a digital renovation: the value chain must be redesigned and retooled and the workforce retrained. Total delivered cost must be analyzed to determine the best places to locate sources of supply, manufacturing and assembly operations around the world. In other words we need a digital transformation.
Does the Convergence of the Blockchain, the Internet of Things and Artificial...eraser Juan José Calderón
Does the Convergence of the Blockchain, the
Internet of Things and Artificial Intelligence Changing
Our Lives, Education and the Known World of the
Internet?! Some Changes and Perspectives for the
International Economy. Elena GURGU
, Maria ANDRONIE
, Mihai ANDRONIE
, Irina DIJMARESCU
1, 2, 3Spiru Haret University, 13 Ion Ghica, Bucharest, 030045, Romania,
IRJET- Secured Real Estate Transactions using Blockchain TechnologyIRJET Journal
This document discusses using blockchain technology to improve security and transparency in real estate transactions. It begins with an introduction to blockchain and its key characteristics of decentralization, immutability, and auditability. These traits could help reduce costs and improve efficiency in the real estate industry by establishing a secure and permanent record of transactions. The document then reviews related work applying blockchain to real estate and discusses how a blockchain-based system could structure real estate transactions with improved traceability and data integrity. Challenges of early adoption are also noted.
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...Ahmed Banafa
The document discusses 8 trends predicted for IoT in 2018 and beyond: 1) Lack of standardization will continue due to the lack of unified standards, 2) More connectivity and more devices as the number of IoT devices doubles by 2021, 3) Blockchain is seen as providing "new hope" for IoT security, 4) Continued investments in IoT hardware, software, and services, 5) Increased use of fog computing to minimize latency and bandwidth, 6) Closer work between AI and IoT across many applications, 7) Emergence of new IoT-as-a-Service business models, and 8) Increased need for skills in big data analytics and AI.
New trends of IoT in 2018 and beyond (SJSU Conference ) Ahmed Banafa
The Internet of things (IoT) is growing rapidly and 2018 will be a fascinating year for the IoT industry. IoT technology continues to evolve at an incredibly rapid pace. Consumers and businesses alike are anticipating the next big innovation. They are all set to embrace the ground-breaking impact of the Internet of Things on our lives like ATMs that report crimes around them, forks that tell you if you are eating fast, or IP address for each organ of your body for doctors to connect and check
Io t security_review_blockchain_solutionsShyam Goyal
This document reviews security issues related to the Internet of Things (IoT) and potential blockchain solutions. It presents a survey of emerging topics in IoT security and blockchain technology. The document maps major IoT security issues to possible solutions and reviews how blockchain could help address challenging security problems in IoT. It also identifies open challenges for IoT security.
Understanding the different building blocks of IoT, identifying the areas of vulnerability in each block and exploring technologies needed to counter each of the weaknesses are essential in dealing with the security issue of IoT.
Blockchain, the "distributed ledger" technology, has emerged as an object of intense interest in the tech industry and beyond.
Blockchain technology offers a way of recording transactions or any digital interaction in a way that is designed to be secure, transparent, highly resistant to outages, auditable, and efficient; as such, it carries the possibility of disrupting industries and enabling new business models.
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...IJECEIAES
‘Internet of Things (IoT)’emerged as an intelligent collaborative computation and communication between a set of objects capable of providing on-demand services to other objects anytime anywhere. A large-scale deployment of data-driven cloud applications as well as automated physical things such as embed electronics, software, sensors and network connectivity enables a joint ubiquitous and pervasive internet-based computing systems well capable of interacting with each other in an IoT. IoT, a well-known term and a growing trend in IT arena certainly bring a highly connected global network structure providing a lot of beneficial aspects to a user regarding business productivity, lifestyle improvement, government efficiency, etc. It also generates enormous heterogeneous and homogeneous data needed to be analyzed properly to get insight into valuable information. However, adoption of this new reality (i.e., IoT) by integrating it with the internet invites a certain challenges from security and privacy perspective. At present, a much effort has been put towards strengthening the security system in IoT still not yet found optimal solutions towards current security flaws. Therefore, the prime aim of this study is to investigate the qualitative aspects of the conventional security solution approaches in IoT. It also extracts some open research problems that could affect the future research track of IoT arena.
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUESIJNSA Journal
The Internet of Things (IoT) is a growing trend in technology that interconnects millions of physical devices from any location anytime. Currently, IoT devices have become an integral part of human lives, as such organizations are deeply concerned with its security and technical issues. Blockchain system comprises a distributed digital ledger which is shared among community of users on the Internet; validated and recorded transactions in the ledger which cannot be altered or removed. We presented the challenges of IoT devices and how blockchain can be used to alleviate these problems. An outline of how to integrate blockchain with IoT was tackled, highlighting the challenges of IoT and how blockchain can remedy the issues. It was concluded that blockchain has the capability to curb the challenges posed by IoT devices.
This document provides a literature review of blockchain-based solutions for issues in the Internet of Things (IoT). It first discusses features of IoT and issues it faces related to security, privacy, and centralized control. Blockchain is proposed as a technology that can address these issues due to its decentralized, immutable, and traceable nature. The review then outlines features of blockchain like decentralization, immutability, and traceability that make it suitable for addressing IoT issues. Specific issues in IoT that could benefit from blockchain solutions are also discussed. Finally, potential issues with implementing blockchain in IoT are acknowledged.
Speech to first year graduate students at Babson College on the attitudinal shifts that will allow the IoT to transform business away from hierarchy to innovative circular organizations
Blockchain and IoT convergence has potential benefits across many industries. IBM is working on extending private blockchains to cognitive IoT solutions. Blockchain can improve IoT features and cost efficiency through smart contracts that automatically execute transactions. However, challenges remain regarding technology, business models, legal issues, and developing agreements between many ecosystem actors. Future applications may involve peer-to-peer IoT device interactions using blockchain for security and transactions without centralized authorities.
Fog computing security and privacy issues, open challenges, and blockchain so...IJECEIAES
Due to the expansion growth of the IoT devices, Fog computing was proposed to enhance the low latency IoT applications and meet the distribution nature of these devices. However, Fog computing was criticized for several privacy and security vulnerabilities. This paper aims to identify and discuss the security challenges for Fog computing. It also discusses blockchain technology as a complementary mechanism associated with Fog computing to mitigate the impact of these issues. The findings of this paper reveal that blockchain can meet the privacy and security requirements of fog computing; however, there are several limitations of blockchain that should be further investigated in the context of Fog computing.
State regulation of the IoT in the Russian Federation: Fundamentals and chall...IJECEIAES
The purpose of this section is to study the problems with implementing technical and legal regulations for the development of public administration functions in the Russian Federation when using the internet of things (IoT). The introduction is based on an analysis of regulatory legal acts and presents the main strategic directions for the development of public administration functions in the Russian federation when using IoT. State reports, scientific literature, a system of technical and legal regulation are analyzed, and the main problems of implementing the IoT that impede the achievement of effective public administration are studied. The Russian practice of using IoT in various economic areas is investigated. Based on an analysis of the mechanisms for ensuring data safety of information technology users in the Russian federation, problems were investigated, such as the collecting data through IoT, including publicly available personal data in order to profile human activities, and creating of a digital twin of a person. The social constraints for introducing distributed registry technologies are users' distrust in the field of data privacy protection and mathematical algorithms that are used to establish trust in a digital environment instead of trusted centralized intermediaries; these problems were also analyzed. The Russian approach was analyzed in comparison to European experience in this field. To ensure information security and the possibility of its distribution, the IoT is revealed.
Design of a Hybrid Authentication Technique for User and Device Authenticatio...IRJET Journal
The document proposes a hybrid authentication technique using blockchain authentication and artificial intelligence for user and device authentication in an integrated Internet of Things (IoT) environment. It discusses challenges with IoT security and reviews existing literature on blockchain and AI approaches for IoT authentication. The proposed technique aims to create a decentralized authentication system using a blockchain to store authentication records that are then used to train a neural network model. This trained model can authenticate new users and devices in the IoT network. The document outlines the objectives, methodology, and potential benefits of the proposed hybrid authentication approach for improving IoT security.
[A REVIEW ON ENACTMENT OF BLOCKCHAIN IN IOT]IRJET Journal
This document provides an overview of how blockchain technology can be used to enhance security and privacy in IoT networks. It discusses some of the key challenges with centralized IoT systems, such as lack of user control over data and single points of failure. Blockchain offers a decentralized alternative that allows for immutable and traceable records, authentication without single authorities, and more scalable networks. The document reviews benefits of blockchain for IoT like increased trust, transparency and security. It also provides illustrations of blockchain structure and how blocks are interconnected in a blockchain.
IRJET- Consensus Mechanism on Secure Challenges in Blockchain NetworksIRJET Journal
This document discusses consensus mechanisms for blockchain networks and the security challenges they present. It begins with an introduction to blockchain technology and its applications like Bitcoin and Ethereum. The properties of blockchain like decentralization and tamper-proof records are described. The document then examines the consensus algorithm used to validate transactions and adds new blocks. It evaluates the performance of different consensus mechanisms and discusses issues like scalability, costs, and attacks. The conclusion is that consensus algorithms need to be tailored to specific blockchain applications and further work is still needed to solve challenges of reliability, throughput, and delays simultaneously.
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...IRJET Journal
This document proposes enhancing security for IoT devices connected to cloud services through identity and access management (IAM). It discusses challenges in defining identity for IoT objects due to limitations in authentication factors. The document recommends using a risk-based multi-factor authentication approach leveraging inheritance, association, knowledge, and context information. It also notes complications from dynamic ownership and naming schemes. The proposed solution authenticates devices using OAuth 2.0 client credentials with a client ID, client secret, X509 certificates, and JSON web tokens. Access would further be authorized based on defined permissions and policies in a simple IAM implementation.
A Novel Security Approach for Communication using IOTIJEACS
The Internet of Things (IOT) is the arrangement of physical articles or "things" introduced with equipment, programming, sensors, and framework accessibility, which enables these things to accumulate and exchange data. Here outlining security convention for the Internet of Things, and execution of this relating security convention on the inserted gadgets. This convention will cover the honesty of messages and verification of every customer by giving a productive confirmation component. By this venture the protected correspondence is executed on implanted gadgets.
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Eswar Publications
This document proposes an Internet of Things (IoT)-based system for healthcare and an authentication scheme to secure it. It first reviews existing literature on IoT and healthcare systems. It then presents the architecture of the proposed system, which has perception, network and application layers. Devices in the perception layer would collect health data from patients. The network layer would communicate this data to cloud servers via gateways. The application layer would manage devices, analyze data and share it with applications. The document proposes authenticating healthcare devices during access of patient data. It aims to enhance security in IoT-based healthcare through device authentication.
IoT, AI and Blockchain: Catalysts for Digital TransformationAhmed Banafa
The digital revolution has brought with it a new way of thinking about manufacturing and operations. Emerging challenges associated with logistics and energy costs are influencing global production and associated distribution decisions. Significant advances in technology, including big data and analytics, AI, Internet of Things, robotics and additive manufacturing, are shifting the capabilities and value proposition of global manufacturing. In response, manufacturing and operations require a digital renovation: the value chain must be redesigned and retooled and the workforce retrained. Total delivered cost must be analyzed to determine the best places to locate sources of supply, manufacturing and assembly operations around the world. In other words we need a digital transformation.
Does the Convergence of the Blockchain, the Internet of Things and Artificial...eraser Juan José Calderón
Does the Convergence of the Blockchain, the
Internet of Things and Artificial Intelligence Changing
Our Lives, Education and the Known World of the
Internet?! Some Changes and Perspectives for the
International Economy. Elena GURGU
, Maria ANDRONIE
, Mihai ANDRONIE
, Irina DIJMARESCU
1, 2, 3Spiru Haret University, 13 Ion Ghica, Bucharest, 030045, Romania,
IRJET- Secured Real Estate Transactions using Blockchain TechnologyIRJET Journal
This document discusses using blockchain technology to improve security and transparency in real estate transactions. It begins with an introduction to blockchain and its key characteristics of decentralization, immutability, and auditability. These traits could help reduce costs and improve efficiency in the real estate industry by establishing a secure and permanent record of transactions. The document then reviews related work applying blockchain to real estate and discusses how a blockchain-based system could structure real estate transactions with improved traceability and data integrity. Challenges of early adoption are also noted.
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...Ahmed Banafa
The document discusses 8 trends predicted for IoT in 2018 and beyond: 1) Lack of standardization will continue due to the lack of unified standards, 2) More connectivity and more devices as the number of IoT devices doubles by 2021, 3) Blockchain is seen as providing "new hope" for IoT security, 4) Continued investments in IoT hardware, software, and services, 5) Increased use of fog computing to minimize latency and bandwidth, 6) Closer work between AI and IoT across many applications, 7) Emergence of new IoT-as-a-Service business models, and 8) Increased need for skills in big data analytics and AI.
New trends of IoT in 2018 and beyond (SJSU Conference ) Ahmed Banafa
The Internet of things (IoT) is growing rapidly and 2018 will be a fascinating year for the IoT industry. IoT technology continues to evolve at an incredibly rapid pace. Consumers and businesses alike are anticipating the next big innovation. They are all set to embrace the ground-breaking impact of the Internet of Things on our lives like ATMs that report crimes around them, forks that tell you if you are eating fast, or IP address for each organ of your body for doctors to connect and check
Io t security_review_blockchain_solutionsShyam Goyal
This document reviews security issues related to the Internet of Things (IoT) and potential blockchain solutions. It presents a survey of emerging topics in IoT security and blockchain technology. The document maps major IoT security issues to possible solutions and reviews how blockchain could help address challenging security problems in IoT. It also identifies open challenges for IoT security.
Understanding the different building blocks of IoT, identifying the areas of vulnerability in each block and exploring technologies needed to counter each of the weaknesses are essential in dealing with the security issue of IoT.
Blockchain, the "distributed ledger" technology, has emerged as an object of intense interest in the tech industry and beyond.
Blockchain technology offers a way of recording transactions or any digital interaction in a way that is designed to be secure, transparent, highly resistant to outages, auditable, and efficient; as such, it carries the possibility of disrupting industries and enabling new business models.
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...IJECEIAES
‘Internet of Things (IoT)’emerged as an intelligent collaborative computation and communication between a set of objects capable of providing on-demand services to other objects anytime anywhere. A large-scale deployment of data-driven cloud applications as well as automated physical things such as embed electronics, software, sensors and network connectivity enables a joint ubiquitous and pervasive internet-based computing systems well capable of interacting with each other in an IoT. IoT, a well-known term and a growing trend in IT arena certainly bring a highly connected global network structure providing a lot of beneficial aspects to a user regarding business productivity, lifestyle improvement, government efficiency, etc. It also generates enormous heterogeneous and homogeneous data needed to be analyzed properly to get insight into valuable information. However, adoption of this new reality (i.e., IoT) by integrating it with the internet invites a certain challenges from security and privacy perspective. At present, a much effort has been put towards strengthening the security system in IoT still not yet found optimal solutions towards current security flaws. Therefore, the prime aim of this study is to investigate the qualitative aspects of the conventional security solution approaches in IoT. It also extracts some open research problems that could affect the future research track of IoT arena.
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUESIJNSA Journal
The Internet of Things (IoT) is a growing trend in technology that interconnects millions of physical devices from any location anytime. Currently, IoT devices have become an integral part of human lives, as such organizations are deeply concerned with its security and technical issues. Blockchain system comprises a distributed digital ledger which is shared among community of users on the Internet; validated and recorded transactions in the ledger which cannot be altered or removed. We presented the challenges of IoT devices and how blockchain can be used to alleviate these problems. An outline of how to integrate blockchain with IoT was tackled, highlighting the challenges of IoT and how blockchain can remedy the issues. It was concluded that blockchain has the capability to curb the challenges posed by IoT devices.
This document provides a literature review of blockchain-based solutions for issues in the Internet of Things (IoT). It first discusses features of IoT and issues it faces related to security, privacy, and centralized control. Blockchain is proposed as a technology that can address these issues due to its decentralized, immutable, and traceable nature. The review then outlines features of blockchain like decentralization, immutability, and traceability that make it suitable for addressing IoT issues. Specific issues in IoT that could benefit from blockchain solutions are also discussed. Finally, potential issues with implementing blockchain in IoT are acknowledged.
Speech to first year graduate students at Babson College on the attitudinal shifts that will allow the IoT to transform business away from hierarchy to innovative circular organizations
Blockchain and IoT convergence has potential benefits across many industries. IBM is working on extending private blockchains to cognitive IoT solutions. Blockchain can improve IoT features and cost efficiency through smart contracts that automatically execute transactions. However, challenges remain regarding technology, business models, legal issues, and developing agreements between many ecosystem actors. Future applications may involve peer-to-peer IoT device interactions using blockchain for security and transactions without centralized authorities.
Fog computing security and privacy issues, open challenges, and blockchain so...IJECEIAES
Due to the expansion growth of the IoT devices, Fog computing was proposed to enhance the low latency IoT applications and meet the distribution nature of these devices. However, Fog computing was criticized for several privacy and security vulnerabilities. This paper aims to identify and discuss the security challenges for Fog computing. It also discusses blockchain technology as a complementary mechanism associated with Fog computing to mitigate the impact of these issues. The findings of this paper reveal that blockchain can meet the privacy and security requirements of fog computing; however, there are several limitations of blockchain that should be further investigated in the context of Fog computing.
State regulation of the IoT in the Russian Federation: Fundamentals and chall...IJECEIAES
The purpose of this section is to study the problems with implementing technical and legal regulations for the development of public administration functions in the Russian Federation when using the internet of things (IoT). The introduction is based on an analysis of regulatory legal acts and presents the main strategic directions for the development of public administration functions in the Russian federation when using IoT. State reports, scientific literature, a system of technical and legal regulation are analyzed, and the main problems of implementing the IoT that impede the achievement of effective public administration are studied. The Russian practice of using IoT in various economic areas is investigated. Based on an analysis of the mechanisms for ensuring data safety of information technology users in the Russian federation, problems were investigated, such as the collecting data through IoT, including publicly available personal data in order to profile human activities, and creating of a digital twin of a person. The social constraints for introducing distributed registry technologies are users' distrust in the field of data privacy protection and mathematical algorithms that are used to establish trust in a digital environment instead of trusted centralized intermediaries; these problems were also analyzed. The Russian approach was analyzed in comparison to European experience in this field. To ensure information security and the possibility of its distribution, the IoT is revealed.
Design of a Hybrid Authentication Technique for User and Device Authenticatio...IRJET Journal
The document proposes a hybrid authentication technique using blockchain authentication and artificial intelligence for user and device authentication in an integrated Internet of Things (IoT) environment. It discusses challenges with IoT security and reviews existing literature on blockchain and AI approaches for IoT authentication. The proposed technique aims to create a decentralized authentication system using a blockchain to store authentication records that are then used to train a neural network model. This trained model can authenticate new users and devices in the IoT network. The document outlines the objectives, methodology, and potential benefits of the proposed hybrid authentication approach for improving IoT security.
[A REVIEW ON ENACTMENT OF BLOCKCHAIN IN IOT]IRJET Journal
This document provides an overview of how blockchain technology can be used to enhance security and privacy in IoT networks. It discusses some of the key challenges with centralized IoT systems, such as lack of user control over data and single points of failure. Blockchain offers a decentralized alternative that allows for immutable and traceable records, authentication without single authorities, and more scalable networks. The document reviews benefits of blockchain for IoT like increased trust, transparency and security. It also provides illustrations of blockchain structure and how blocks are interconnected in a blockchain.
IRJET - Development of Cloud System for IoT ApplicationsIRJET Journal
This document discusses the development of cloud systems for IoT applications. It begins with an introduction stating that one major problem IoT faces is storing and managing vast amounts of data generated. It then reviews 6 papers related to IoT cloud platforms, cloud storage systems, developments in cloud and IoT, exploring IoT platform development, minimizing energy consumption and SLA violations in cloud data centers, and IoT data classification. The document concludes that a detailed review of 6 IoT platform development approaches was presented and a framework was proposed to help select approaches based on requirements.
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and ProtectionIRJET Journal
This document proposes using blockchain technology for large-scale Internet of Things (IoT) data storage and protection. It discusses issues with centralized cloud-based IoT structures, including high computation and storage demands on cloud servers and security/trust issues from dependencies on centralized servers. The proposed system uses a distributed data storage scheme employing blockchain to eliminate centralized servers. IoT device data would be stored in a distributed hash table (DHT) using the blockchain to manage storage addresses. Edge computing is also incorporated to enable real-time computations and communications from nearby edge servers, addressing limitations of IoT devices' low computational power. The goal is to achieve distributed data storage, protection, and complex computations through storing data in DHT using blockchain and
IBchain: Internet of Things and Blockchain Integration Approach for Secure Co...AlAtfat
Introducing IBchain, a new blockchain architecture with the Internet of Things (IoT), could be an
attractive framework regarding improvements in connectivity implementation through the smart cities.
Instead of meriting innovation and security, the IoT links people, sites, and products and provides
opportunities. Everything that transfers information to the IoT system is integrated by advanced
microchips, sensors, and actuators in actual things. The analytical ability of the IoT converts observations
into actions, impacting business advancements and significant ways of activity. IoT enables connected
objects to transmit information to personal blockchain systems to create tamper-resistant transaction
records. The information from sensors and microchips is progressing rapidly with blockchain ledgers,
making them more portable and relevant for immediate conversations. In IBchain methodology, the smart
objects are permissible to connect securely with other smart objects in diverse situations. IBchain creates
an innovative blockchain-based processing configuration through the IoT. The IBchain could analyze
blockchain to the main expertise or supports the IoT validation and trustworthiness. It reinforces
blockchain and cloud to build an empowering IoT ubiquitous situation for secure communication among
the smart devices.
IRJET- Probabilistic Stress Distribution in Thick Cylindrical Pipe using Fini...IRJET Journal
1) Blockchain is a distributed ledger technology that records transactions in a way that is secure, anonymous, and maintains data integrity without requiring a central authority.
2) While blockchain has potential applications beyond cryptocurrencies, it faces technical challenges including limited throughput, latency in transactions, scalability issues, and lack of skills that may limit widespread adoption.
3) The document discusses the background of blockchain and bitcoin, use cases for blockchain technology, and key challenges including throughput, latency, size and bandwidth limitations, security issues, wasted resources from mining, and lack of development skills.
This document proposes an e-toll payment system using Azure cloud that automates toll gate payments. The system uses RFID tags attached to vehicles with their registration number embedded. When a vehicle reaches the toll gate, the RFID reader obtains the registration number and sends it to the Azure cloud to check if payment was made using a mobile app. If payment was completed, the cloud responds to open the toll gate. This allows drivers to pay electronically without waiting in queues and avoids using cash. The system aims to reduce congestion and fuel consumption at toll plazas through automated payment verification and toll gate control.
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...IRJET Journal
This document proposes an e-toll payment system using Azure cloud that automates toll payments. A mobile app allows users to pay tolls digitally via wallet, credit/debit cards, or banking. Successful payments are recorded on Azure cloud along with the vehicle's RFID tag ID. At toll gates, RFID readers scan tags and check the cloud to see if payment was made. If so, the gate opens, streamlining the toll process and reducing congestion. The system aims to provide a more convenient cashless toll payment alternative compared to existing smart card or queue-based systems.
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITYIRJET Journal
This document discusses adopting blockchain technology in cybersecurity. It begins by introducing blockchain and its potential benefits for cybersecurity. These include decentralized data storage, improved availability against DDoS attacks, and enhanced security for IoT systems. The document then outlines the objectives of using blockchain to enhance cybersecurity by making systems more secure and tamper-proof. It presents the methodology and block diagram of how blockchain would work in a cybersecurity system. Several use cases are described, such as decentralized storage, availability, and IoT security. The document concludes by discussing common cybersecurity threats on blockchain networks and outlining the two-part workflow of an integrated blockchain-cybersecurity system.
This document reviews using blockchain technology for charities to increase transparency. It discusses how blockchain provides a decentralized and transparent record of transactions. This could help build trust between donors and charities by making the donation process and spending more visible. The document outlines several existing blockchain-based charity projects and discusses their approaches. It proposes a blockchain-based system using Ethereum that would track donations from donors to recipients in a verifiable way to increase accountability and transparency in charity transactions. In conclusion, the document argues this could help resolve trust issues that some charities currently face.
A survey on Internet of Things (IoT) security : Challenges and Current statusvivatechijri
When Internet of Things (IoT) applications become a part of people’s daily life, security issues in IoT have caught substantial attention in both academia and industry. Compared to traditional computing systems, IoT systems have more inherent vulnerabilities, and in the intervening time, could have higher security requirements. However, the current design of IoT does not successfully address the higher security requirements postured by those vulnerabilities. Many recent attacks on IoT systems have shown that novel security solutions are needed to defend this emerging system. This paper purposes to examine security challenges resulted from the special characteristics of the IoT systems and the new features of the IoT applications. This could help pave the road to better security solution design. Furthermore, three architectural security designs are suggested and analyzed. Examples of how to implement these designs are discussed. Finally, for each layer in IoT architecture, open issues are also identified.
IRJET - Blockchain Application Used in Enhance Technology from Cryptocurr...IRJET Journal
Blockchain technology has benefits such as decentralization, persistence, and auditability. Blockchain was first developed in 2009 with the creation of Bitcoin. This document discusses blockchain applications including cryptocurrency payment processing and supply chain monitoring. It also examines distributed ledger technology, which allows transactions to be recorded across multiple places simultaneously. Digitalization plays an important role by enabling authentication and ensuring data integrity. In conclusion, blockchain provides a trustless system for transactions without centralized authorities and has the potential to transform various industries.
111
Blockchain-Outside of
Currencies
Digital currencies were the first ever application of blockchain technology, arguably
without realizing its true potential. With the invention of bitcoin the concept of blockchain
was introduced for the very first time, but it wasn't until 2013, with the advent of Blockchain
2.0 that the real benefits of blockchain were realized with its possible application in many
different industries. Since then a number of use cases of blockchain technology in different
industries, have been proposed including but not limited to finance, the Internet of Things,
digital rights management, government, and law. In this chapter, four main industries
namely the Internet of Things (IoT), government, health, and finance, have been selected
for discussion. Readers will be introduced to all these fields and various related use cases
will be presented.
Internet of Things
The Internet of Things or IoT for short has recently gained much traction due to its potential
for transforming business applications and everyday life. IoT can be defined as a network of
computationally intelligent physical objects that are capable of connecting to the Internet,
sensing real-world events or environments, reacting to those events, collecting relevant
data, and communicating it over the Internet. This simple definition has huge implications
and has led to exciting concepts, such as wearable's, smart homes, smart grids, smart
connected cars, and smart cities, that are all based on this basic concept of an IoT device.
After dissecting the definition of IoT above, there are four functions that come to light as
being performed by an IoT device. These include sensing, reacting, collecting, and
communicating. All these functions are performed by using various components on the IoT
device.
C
o
p
y
r
i
g
h
t
2
0
1
7
.
P
a
c
k
t
P
u
b
l
i
s
h
i
n
g
.
A
l
l
r
i
g
h
t
s
r
e
s
e
r
v
e
d
.
M
a
y
n
o
t
b
e
r
e
p
r
o
d
u
c
e
d
i
n
a
n
y
f
o
r
m
w
i
t
h
o
u
t
p
e
r
m
i
s
s
i
o
n
f
r
o
m
t
h
e
p
u
b
l
i
s
h
e
r
,
e
x
c
e
p
t
f
a
i
r
u
s
e
s
p
e
r
m
i
t
t
e
d
u
n
d
e
r
U
.
S
.
o
r
a
p
p
l
i
c
a
b
l
e
c
o
p
y
r
i
g
h
t
l
a
w
.
EBSCO Publishing : eBook Academic Collection (EBSCOhost) - printed on 1/26/2020 12:56 PM via UNIVERSITY OF THE CUMBERLANDS
AN: 1488410 ; Bashir, Imran.; Mastering Blockchain
Account: s8501869.main.eds_new
Blockchain-Outside of Currencies
[ 413 ]
Sensing is performed by sensors. Reacting or controlling is performed by actuators,
collection is a function of various sensors, and communication is performed by chips that
provide network connectivity. One thing to note is that all these components are accessible
and controllable via the Internet in the IoT. An IoT device on its own is perhaps useful to
some extent but if it is part of a larger IoT ecosystem it is more valuable.
A typical IoT can consist of many physical objects connecting with each other and to a
centralized cloud ser.
111
Blockchain-Outside of
Currencies
Digital currencies were the first ever application of blockchain technology, arguably
without realizing its true potential. With the invention of bitcoin the concept of blockchain
was introduced for the very first time, but it wasn't until 2013, with the advent of Blockchain
2.0 that the real benefits of blockchain were realized with its possible application in many
different industries. Since then a number of use cases of blockchain technology in different
industries, have been proposed including but not limited to finance, the Internet of Things,
digital rights management, government, and law. In this chapter, four main industries
namely the Internet of Things (IoT), government, health, and finance, have been selected
for discussion. Readers will be introduced to all these fields and various related use cases
will be presented.
Internet of Things
The Internet of Things or IoT for short has recently gained much traction due to its potential
for transforming business applications and everyday life. IoT can be defined as a network of
computationally intelligent physical objects that are capable of connecting to the Internet,
sensing real-world events or environments, reacting to those events, collecting relevant
data, and communicating it over the Internet. This simple definition has huge implications
and has led to exciting concepts, such as wearable's, smart homes, smart grids, smart
connected cars, and smart cities, that are all based on this basic concept of an IoT device.
After dissecting the definition of IoT above, there are four functions that come to light as
being performed by an IoT device. These include sensing, reacting, collecting, and
communicating. All these functions are performed by using various components on the IoT
device.
C
o
p
y
r
i
g
h
t
2
0
1
7
.
P
a
c
k
t
P
u
b
l
i
s
h
i
n
g
.
A
l
l
r
i
g
h
t
s
r
e
s
e
r
v
e
d
.
M
a
y
n
o
t
b
e
r
e
p
r
o
d
u
c
e
d
i
n
a
n
y
f
o
r
m
w
i
t
h
o
u
t
p
e
r
m
i
s
s
i
o
n
f
r
o
m
t
h
e
p
u
b
l
i
s
h
e
r
,
e
x
c
e
p
t
f
a
i
r
u
s
e
s
p
e
r
m
i
t
t
e
d
u
n
d
e
r
U
.
S
.
o
r
a
p
p
l
i
c
a
b
l
e
c
o
p
y
r
i
g
h
t
l
a
w
.
EBSCO Publishing : eBook Academic Collection (EBSCOhost) - printed on 1/26/2020 12:56 PM via UNIVERSITY OF THE CUMBERLANDS
AN: 1488410 ; Bashir, Imran.; Mastering Blockchain
Account: s8501869.main.eds_new
Blockchain-Outside of Currencies
[ 413 ]
Sensing is performed by sensors. Reacting or controlling is performed by actuators,
collection is a function of various sensors, and communication is performed by chips that
provide network connectivity. One thing to note is that all these components are accessible
and controllable via the Internet in the IoT. An IoT device on its own is perhaps useful to
some extent but if it is part of a larger IoT ecosystem it is more valuable.
A typical IoT can consist of many physical objects connecting with each other and to a
centralized cloud ser.
111
Blockchain-Outside of
Currencies
Digital currencies were the first ever application of blockchain technology, arguably
without realizing its true potential. With the invention of bitcoin the concept of blockchain
was introduced for the very first time, but it wasn't until 2013, with the advent of Blockchain
2.0 that the real benefits of blockchain were realized with its possible application in many
different industries. Since then a number of use cases of blockchain technology in different
industries, have been proposed including but not limited to finance, the Internet of Things,
digital rights management, government, and law. In this chapter, four main industries
namely the Internet of Things (IoT), government, health, and finance, have been selected
for discussion. Readers will be introduced to all these fields and various related use cases
will be presented.
Internet of Things
The Internet of Things or IoT for short has recently gained much traction due to its potential
for transforming business applications and everyday life. IoT can be defined as a network of
computationally intelligent physical objects that are capable of connecting to the Internet,
sensing real-world events or environments, reacting to those events, collecting relevant
data, and communicating it over the Internet. This simple definition has huge implications
and has led to exciting concepts, such as wearable's, smart homes, smart grids, smart
connected cars, and smart cities, that are all based on this basic concept of an IoT device.
After dissecting the definition of IoT above, there are four functions that come to light as
being performed by an IoT device. These include sensing, reacting, collecting, and
communicating. All these functions are performed by using various components on the IoT
device.
C
o
p
y
r
i
g
h
t
2
0
1
7
.
P
a
c
k
t
P
u
b
l
i
s
h
i
n
g
.
A
l
l
r
i
g
h
t
s
r
e
s
e
r
v
e
d
.
M
a
y
n
o
t
b
e
r
e
p
r
o
d
u
c
e
d
i
n
a
n
y
f
o
r
m
w
i
t
h
o
u
t
p
e
r
m
i
s
s
i
o
n
f
r
o
m
t
h
e
p
u
b
l
i
s
h
e
r
,
e
x
c
e
p
t
f
a
i
r
u
s
e
s
p
e
r
m
i
t
t
e
d
u
n
d
e
r
U
.
S
.
o
r
a
p
p
l
i
c
a
b
l
e
c
o
p
y
r
i
g
h
t
l
a
w
.
EBSCO Publishing : eBook Academic Collection (EBSCOhost) - printed on 1/26/2020 12:56 PM via UNIVERSITY OF THE CUMBERLANDS
AN: 1488410 ; Bashir, Imran.; Mastering Blockchain
Account: s8501869.main.eds_new
Blockchain-Outside of Currencies
[ 413 ]
Sensing is performed by sensors. Reacting or controlling is performed by actuators,
collection is a function of various sensors, and communication is performed by chips that
provide network connectivity. One thing to note is that all these components are accessible
and controllable via the Internet in the IoT. An IoT device on its own is perhaps useful to
some extent but if it is part of a larger IoT ecosystem it is more valuable.
A typical IoT can consist of many physical objects connecting with each other and to a
centralized cloud ser ...
111
Blockchain-Outside of
Currencies
Digital currencies were the first ever application of blockchain technology, arguably
without realizing its true potential. With the invention of bitcoin the concept of blockchain
was introduced for the very first time, but it wasn't until 2013, with the advent of Blockchain
2.0 that the real benefits of blockchain were realized with its possible application in many
different industries. Since then a number of use cases of blockchain technology in different
industries, have been proposed including but not limited to finance, the Internet of Things,
digital rights management, government, and law. In this chapter, four main industries
namely the Internet of Things (IoT), government, health, and finance, have been selected
for discussion. Readers will be introduced to all these fields and various related use cases
will be presented.
Internet of Things
The Internet of Things or IoT for short has recently gained much traction due to its potential
for transforming business applications and everyday life. IoT can be defined as a network of
computationally intelligent physical objects that are capable of connecting to the Internet,
sensing real-world events or environments, reacting to those events, collecting relevant
data, and communicating it over the Internet. This simple definition has huge implications
and has led to exciting concepts, such as wearable's, smart homes, smart grids, smart
connected cars, and smart cities, that are all based on this basic concept of an IoT device.
After dissecting the definition of IoT above, there are four functions that come to light as
being performed by an IoT device. These include sensing, reacting, collecting, and
communicating. All these functions are performed by using various components on the IoT
device.
C
o
p
y
r
i
g
h
t
2
0
1
7
.
P
a
c
k
t
P
u
b
l
i
s
h
i
n
g
.
A
l
l
r
i
g
h
t
s
r
e
s
e
r
v
e
d
.
M
a
y
n
o
t
b
e
r
e
p
r
o
d
u
c
e
d
i
n
a
n
y
f
o
r
m
w
i
t
h
o
u
t
p
e
r
m
i
s
s
i
o
n
f
r
o
m
t
h
e
p
u
b
l
i
s
h
e
r
,
e
x
c
e
p
t
f
a
i
r
u
s
e
s
p
e
r
m
i
t
t
e
d
u
n
d
e
r
U
.
S
.
o
r
a
p
p
l
i
c
a
b
l
e
c
o
p
y
r
i
g
h
t
l
a
w
.
EBSCO Publishing : eBook Academic Collection (EBSCOhost) - printed on 1/26/2020 12:56 PM via UNIVERSITY OF THE CUMBERLANDS
AN: 1488410 ; Bashir, Imran.; Mastering Blockchain
Account: s8501869.main.eds_new
Blockchain-Outside of Currencies
[ 413 ]
Sensing is performed by sensors. Reacting or controlling is performed by actuators,
collection is a function of various sensors, and communication is performed by chips that
provide network connectivity. One thing to note is that all these components are accessible
and controllable via the Internet in the IoT. An IoT device on its own is perhaps useful to
some extent but if it is part of a larger IoT ecosystem it is more valuable.
A typical IoT can consist of many physical objects connecting with each other and to a
centralized cloud ser.
When it comes to the Internet of Things, a blockchain can be provide a platform to handle device authentication process and thereby prevent a spoofing attack by malicious parties who may impersonate some other device to launch an attack to steal data or cause some other mayhem.Blockchain will allowdirect communication between two or more devices so that they are able to transact without going through a third-party intermediary, and in effect make spoofing more cost prohibitive. This White Paper explains how blockchain can improve the security of IOT devices.
IRJET - Securing Communication among IoT Devices using Blockchain ProxyIRJET Journal
This document proposes a blockchain proxy scheme to secure communication among IoT devices. The proxy requires a slim SDK on IoT devices to connect them to the blockchain while retaining full control over transactions. The proxy offloads communication tasks to save CPU and bandwidth for IoT devices. A preliminary implementation on Hyperledger Fabric shows potential savings. The proposed system uses a custom blockchain and smart contracts to analyze performance and security when IoT data is shared using this proxy scheme.
A blockchain is a decentralised database that is shared across computer network nodes. A blockchain acts as a database, storing information in a digital format. The study primarily aims to explore how in the future, block chain technology will alter several areas of the Indian economy. The current study aims to obtain a deeper understanding of blockchain technology's idea and implementation in India, as well as the technology's potential as a disruptive financial technological innovation.
Secondary sources such as reports, journals, papers, and websites were used to compile all the data. Current and relevant information were utilised to help understand the research goals. All the information is rationally organised to fulfil the objectives. The current research focuses on recommendations for enhancing India's Blockchain ecosystem so that it may become one of the best in the world at utilising this new technology.
Similar to IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic Supply Chain Management (20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
This study compares the use of Stark Steel and TMT Steel as reinforcement materials in a two-way reinforced concrete slab. Mechanical testing is conducted to determine the tensile strength, yield strength, and other properties of each material. A two-way slab design adhering to codes and standards is executed with both materials. The performance is analyzed in terms of deflection, stability under loads, and displacement. Cost analyses accounting for material, durability, maintenance, and life cycle costs are also conducted. The findings provide insights into the economic and structural implications of each material for reinforcement selection and recommendations on the most suitable material based on the analysis.
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
This document discusses a study analyzing the effect of camber, position of camber, and angle of attack on the aerodynamic characteristics of airfoils. Sixteen modified asymmetric NACA airfoils were analyzed using computational fluid dynamics (CFD) by varying the camber, camber position, and angle of attack. The results showed the relationship between these parameters and the lift coefficient, drag coefficient, and lift to drag ratio. This provides insight into how changes in airfoil geometry impact aerodynamic performance.
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
This document reviews the progress and challenges of aluminum-based metal matrix composites (MMCs), focusing on their fabrication processes and applications. It discusses how various aluminum MMCs have been developed using reinforcements like borides, carbides, oxides, and nitrides to improve mechanical and wear properties. These composites have gained prominence for their lightweight, high-strength and corrosion resistance properties. The document also examines recent advancements in fabrication techniques for aluminum MMCs and their growing applications in industries such as aerospace and automotive. However, it notes that challenges remain around issues like improper mixing of reinforcements and reducing reinforcement agglomeration.
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
This document discusses research on using graph neural networks (GNNs) for dynamic optimization of public transportation networks in real-time. GNNs represent transit networks as graphs with nodes as stops and edges as connections. The GNN model aims to optimize networks using real-time data on vehicle locations, arrival times, and passenger loads. This helps increase mobility, decrease traffic, and improve efficiency. The system continuously trains and infers to adapt to changing transit conditions, providing decision support tools. While research has focused on performance, more work is needed on security, socio-economic impacts, contextual generalization of models, continuous learning approaches, and effective real-time visualization.
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
This document summarizes a research project that aims to compare the structural performance of conventional slab and grid slab systems in multi-story buildings using ETABS software. The study will analyze both symmetric and asymmetric building models under various loading conditions. Parameters like deflections, moments, shears, and stresses will be examined to evaluate the structural effectiveness of each slab type. The results will provide insights into the comparative behavior of conventional and grid slabs to help engineers and architects select appropriate slab systems based on building layouts and design requirements.
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
This document summarizes and reviews a research paper on the seismic response of reinforced concrete (RC) structures with plan and vertical irregularities, with and without infill walls. It discusses how infill walls can improve or reduce the seismic performance of RC buildings, depending on factors like wall layout, height distribution, connection to the frame, and relative stiffness of walls and frames. The reviewed research paper analyzes the behavior of infill walls, effects of vertical irregularities, and seismic performance of high-rise structures under linear static and dynamic analysis. It studies response characteristics like story drift, deflection and shear. The document also provides literature on similar research investigating the effects of infill walls, soft stories, plan irregularities, and different
This document provides a review of machine learning techniques used in Advanced Driver Assistance Systems (ADAS). It begins with an abstract that summarizes key applications of machine learning in ADAS, including object detection, recognition, and decision-making. The introduction discusses the integration of machine learning in ADAS and how it is transforming vehicle safety. The literature review then examines several research papers on topics like lightweight deep learning models for object detection and lane detection models using image processing. It concludes by discussing challenges and opportunities in the field, such as improving algorithm robustness and adaptability.
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
The document analyzes temperature and precipitation trends in Asosa District, Benishangul Gumuz Region, Ethiopia from 1993 to 2022 based on data from the local meteorological station. The results show:
1) The average maximum and minimum annual temperatures have generally decreased over time, with maximum temperatures decreasing by a factor of -0.0341 and minimum by -0.0152.
2) Mann-Kendall tests found the decreasing temperature trends to be statistically significant for annual maximum temperatures but not for annual minimum temperatures.
3) Annual precipitation in Asosa District showed a statistically significant increasing trend.
The conclusions recommend development planners account for rising summer precipitation and declining temperatures in
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
This document discusses the design and analysis of pre-engineered building (PEB) framed structures using STAAD Pro software. It provides an overview of PEBs, including that they are designed off-site with building trusses and beams produced in a factory. STAAD Pro is identified as a key tool for modeling, analyzing, and designing PEBs to ensure their performance and safety under various load scenarios. The document outlines modeling structural parts in STAAD Pro, evaluating structural reactions, assigning loads, and following international design codes and standards. In summary, STAAD Pro is used to design and analyze PEB framed structures to ensure safety and code compliance.
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
This document provides a review of research on innovative fiber integration methods for reinforcing concrete structures. It discusses studies that have explored using carbon fiber reinforced polymer (CFRP) composites with recycled plastic aggregates to develop more sustainable strengthening techniques. It also examines using ultra-high performance fiber reinforced concrete to improve shear strength in beams. Additional topics covered include the dynamic responses of FRP-strengthened beams under static and impact loads, and the performance of preloaded CFRP-strengthened fiber reinforced concrete beams. The review highlights the potential of fiber composites to enable more sustainable and resilient construction practices.
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
This document summarizes a survey on securing patient healthcare data in cloud-based systems. It discusses using technologies like facial recognition, smart cards, and cloud computing combined with strong encryption to securely store patient data. The survey found that healthcare professionals believe digitizing patient records and storing them in a centralized cloud system would improve access during emergencies and enable more efficient care compared to paper-based systems. However, ensuring privacy and security of patient data is paramount as healthcare incorporates these digital technologies.
Review on studies and research on widening of existing concrete bridgesIRJET Journal
This document summarizes several studies that have been conducted on widening existing concrete bridges. It describes a study from China that examined load distribution factors for a bridge widened with composite steel-concrete girders. It also outlines challenges and solutions for widening a bridge in the UAE, including replacing bearings and stitching the new and existing structures. Additionally, it discusses two bridge widening projects in New Zealand that involved adding precast beams and stitching to connect structures. Finally, safety measures and challenges for strengthening a historic bridge in Switzerland under live traffic are presented.
React based fullstack edtech web applicationIRJET Journal
The document describes the architecture of an educational technology web application built using the MERN stack. It discusses the frontend developed with ReactJS, backend with NodeJS and ExpressJS, and MongoDB database. The frontend provides dynamic user interfaces, while the backend offers APIs for authentication, course management, and other functions. MongoDB enables flexible data storage. The architecture aims to provide a scalable, responsive platform for online learning.
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
This paper proposes integrating Internet of Things (IoT) and blockchain technologies to help implement objectives of India's National Education Policy (NEP) in the education sector. The paper discusses how blockchain could be used for secure student data management, credential verification, and decentralized learning platforms. IoT devices could create smart classrooms, automate attendance tracking, and enable real-time monitoring. Blockchain would ensure integrity of exam processes and resource allocation, while smart contracts automate agreements. The paper argues this integration has potential to revolutionize education by making it more secure, transparent and efficient, in alignment with NEP goals. However, challenges like infrastructure needs, data privacy, and collaborative efforts are also discussed.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
This document provides a review of research on the performance of coconut fibre reinforced concrete. It summarizes several studies that tested different volume fractions and lengths of coconut fibres in concrete mixtures with varying compressive strengths. The studies found that coconut fibre improved properties like tensile strength, toughness, crack resistance, and spalling resistance compared to plain concrete. Volume fractions of 2-5% and fibre lengths of 20-50mm produced the best results. The document concludes that using a 4-5% volume fraction of coconut fibres 30-40mm in length with M30-M60 grade concrete would provide benefits based on previous research.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
The document discusses optimizing business management processes through automation using Microsoft Power Automate and artificial intelligence. It provides an overview of Power Automate's key components and features for automating workflows across various apps and services. The document then presents several scenarios applying automation solutions to common business processes like data entry, monitoring, HR, finance, customer support, and more. It estimates the potential time and cost savings from implementing automation for each scenario. Finally, the conclusion emphasizes the transformative impact of AI and automation tools on business processes and the need for ongoing optimization.
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
The document describes the seismic design of a G+5 steel building frame located in Roorkee, India according to Indian codes IS 1893-2002 and IS 800. The frame was analyzed using the equivalent static load method and response spectrum method, and its response in terms of displacements and shear forces were compared. Based on the analysis, the frame was designed as a seismic-resistant steel structure according to IS 800:2007. The software STAAD Pro was used for the analysis and design.
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
This research paper explores using plastic waste as a sustainable and cost-effective construction material. The study focuses on manufacturing pavers and bricks using recycled plastic and partially replacing concrete with plastic alternatives. Initial results found that pavers and bricks made from recycled plastic demonstrate comparable strength and durability to traditional materials while providing environmental and cost benefits. Additionally, preliminary research indicates incorporating plastic waste as a partial concrete replacement significantly reduces construction costs without compromising structural integrity. The outcomes suggest adopting plastic waste in construction can address plastic pollution while optimizing costs, promoting more sustainable building practices.
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSIJNSA Journal
The smart irrigation system represents an innovative approach to optimize water usage in agricultural and landscaping practices. The integration of cutting-edge technologies, including sensors, actuators, and data analysis, empowers this system to provide accurate monitoring and control of irrigation processes by leveraging real-time environmental conditions. The main objective of a smart irrigation system is to optimize water efficiency, minimize expenses, and foster the adoption of sustainable water management methods. This paper conducts a systematic risk assessment by exploring the key components/assets and their functionalities in the smart irrigation system. The crucial role of sensors in gathering data on soil moisture, weather patterns, and plant well-being is emphasized in this system. These sensors enable intelligent decision-making in irrigation scheduling and water distribution, leading to enhanced water efficiency and sustainable water management practices. Actuators enable automated control of irrigation devices, ensuring precise and targeted water delivery to plants. Additionally, the paper addresses the potential threat and vulnerabilities associated with smart irrigation systems. It discusses limitations of the system, such as power constraints and computational capabilities, and calculates the potential security risks. The paper suggests possible risk treatment methods for effective secure system operation. In conclusion, the paper emphasizes the significant benefits of implementing smart irrigation systems, including improved water conservation, increased crop yield, and reduced environmental impact. Additionally, based on the security analysis conducted, the paper recommends the implementation of countermeasures and security approaches to address vulnerabilities and ensure the integrity and reliability of the system. By incorporating these measures, smart irrigation technology can revolutionize water management practices in agriculture, promoting sustainability, resource efficiency, and safeguarding against potential security threats.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...University of Maribor
Slides from talk presenting:
Aleš Zamuda: Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapter and Networking.
Presentation at IcETRAN 2024 session:
"Inter-Society Networking Panel GRSS/MTT-S/CIS
Panel Session: Promoting Connection and Cooperation"
IEEE Slovenia GRSS
IEEE Serbia and Montenegro MTT-S
IEEE Slovenia CIS
11TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTING ENGINEERING
3-6 June 2024, Niš, Serbia
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.