An artificial intelligence lightweight blockchain security model for security and privacy in IIoT systems

The Industrial Internet of Things (IIoT) promises to deliver innovative business models across multiple domains by providing ubiquitous connectivity, intelligent data, predictive analytics, and decision-making systems for improved market performance. However, traditional IIoT architectures are highl...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:Journal of cloud computing : advances, systems and applications Ročník 12; číslo 1; s. 38 - 17
Hlavní autoři: Selvarajan, Shitharth, Srivastava, Gautam, Khadidos, Alaa O., Khadidos, Adil O., Baza, Mohamed, Alshehri, Ali, Lin, Jerry Chun-Wei
Médium: Journal Article
Jazyk:angličtina
Vydáno: Berlin/Heidelberg Springer Berlin Heidelberg 01.12.2023
Springer Nature B.V
SpringerOpen
Témata:
ISSN:2192-113X, 2192-113X
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract The Industrial Internet of Things (IIoT) promises to deliver innovative business models across multiple domains by providing ubiquitous connectivity, intelligent data, predictive analytics, and decision-making systems for improved market performance. However, traditional IIoT architectures are highly susceptible to many security vulnerabilities and network intrusions, which bring challenges such as lack of privacy, integrity, trust, and centralization. This research aims to implement an Artificial Intelligence-based Lightweight Blockchain Security Model (AILBSM) to ensure privacy and security of IIoT systems. This novel model is meant to address issues that can occur with security and privacy when dealing with Cloud-based IIoT systems that handle data in the Cloud or on the Edge of Networks (on-device). The novel contribution of this paper is that it combines the advantages of both lightweight blockchain and Convivial Optimized Sprinter Neural Network (COSNN) based AI mechanisms with simplified and improved security operations. Here, the significant impact of attacks is reduced by transforming features into encoded data using an Authentic Intrinsic Analysis (AIA) model. Extensive experiments are conducted to validate this system using various attack datasets. In addition, the results of privacy protection and AI mechanisms are evaluated separately and compared using various indicators. By using the proposed AILBSM framework, the execution time is minimized to 0.6 seconds, the overall classification accuracy is improved to 99.8%, and detection performance is increased to 99.7%. Due to the inclusion of auto-encoder based transformation and blockchain authentication, the anomaly detection performance of the proposed model is highly improved, when compared to other techniques.
AbstractList The Industrial Internet of Things (IIoT) promises to deliver innovative business models across multiple domains by providing ubiquitous connectivity, intelligent data, predictive analytics, and decision-making systems for improved market performance. However, traditional IIoT architectures are highly susceptible to many security vulnerabilities and network intrusions, which bring challenges such as lack of privacy, integrity, trust, and centralization. This research aims to implement an Artificial Intelligence-based Lightweight Blockchain Security Model (AILBSM) to ensure privacy and security of IIoT systems. This novel model is meant to address issues that can occur with security and privacy when dealing with Cloud-based IIoT systems that handle data in the Cloud or on the Edge of Networks (on-device). The novel contribution of this paper is that it combines the advantages of both lightweight blockchain and Convivial Optimized Sprinter Neural Network (COSNN) based AI mechanisms with simplified and improved security operations. Here, the significant impact of attacks is reduced by transforming features into encoded data using an Authentic Intrinsic Analysis (AIA) model. Extensive experiments are conducted to validate this system using various attack datasets. In addition, the results of privacy protection and AI mechanisms are evaluated separately and compared using various indicators. By using the proposed AILBSM framework, the execution time is minimized to 0.6 seconds, the overall classification accuracy is improved to 99.8%, and detection performance is increased to 99.7%. Due to the inclusion of auto-encoder based transformation and blockchain authentication, the anomaly detection performance of the proposed model is highly improved, when compared to other techniques.
Abstract The Industrial Internet of Things (IIoT) promises to deliver innovative business models across multiple domains by providing ubiquitous connectivity, intelligent data, predictive analytics, and decision-making systems for improved market performance. However, traditional IIoT architectures are highly susceptible to many security vulnerabilities and network intrusions, which bring challenges such as lack of privacy, integrity, trust, and centralization. This research aims to implement an Artificial Intelligence-based Lightweight Blockchain Security Model (AILBSM) to ensure privacy and security of IIoT systems. This novel model is meant to address issues that can occur with security and privacy when dealing with Cloud-based IIoT systems that handle data in the Cloud or on the Edge of Networks (on-device). The novel contribution of this paper is that it combines the advantages of both lightweight blockchain and Convivial Optimized Sprinter Neural Network (COSNN) based AI mechanisms with simplified and improved security operations. Here, the significant impact of attacks is reduced by transforming features into encoded data using an Authentic Intrinsic Analysis (AIA) model. Extensive experiments are conducted to validate this system using various attack datasets. In addition, the results of privacy protection and AI mechanisms are evaluated separately and compared using various indicators. By using the proposed AILBSM framework, the execution time is minimized to 0.6 seconds, the overall classification accuracy is improved to 99.8%, and detection performance is increased to 99.7%. Due to the inclusion of auto-encoder based transformation and blockchain authentication, the anomaly detection performance of the proposed model is highly improved, when compared to other techniques.
The Industrial Internet of Things (IIoT) promises to deliver innovative business models across multiple domains by providing ubiquitous connectivity, intelligent data, predictive analytics, and decision-making systems for improved market performance. However, traditional IIoT architectures are highly susceptible to many security vulnerabilities and network intrusions, which bring challenges such as lack of privacy, integrity, trust, and centralization. This research aims to implement an Artificial Intelligence-based Lightweight Blockchain Security Model (AILBSM) to ensure privacy and security of IIoT systems. This novel model is meant to address issues that can occur with security and privacy when dealing with Cloud-based IIoT systems that handle data in the Cloud or on the Edge of Networks (on-device). The novel contribution of this paper is that it combines the advantages of both lightweight blockchain and Convivial Optimized Sprinter Neural Network (COSNN) based AI mechanisms with simplified and improved security operations. Here, the significant impact of attacks is reduced by transforming features into encoded data using an Authentic Intrinsic Analysis (AIA) model. Extensive experiments are conducted to validate this system using various attack datasets. In addition, the results of privacy protection and AI mechanisms are evaluated separately and compared using various indicators. By using the proposed AILBSM framework, the execution time is minimized to 0.6 seconds, the overall classification accuracy is improved to 99.8%, and detection performance is increased to 99.7%. Due to the inclusion of auto-encoder based transformation and blockchain authentication, the anomaly detection performance of the proposed model is highly improved, when compared to other techniques.The Industrial Internet of Things (IIoT) promises to deliver innovative business models across multiple domains by providing ubiquitous connectivity, intelligent data, predictive analytics, and decision-making systems for improved market performance. However, traditional IIoT architectures are highly susceptible to many security vulnerabilities and network intrusions, which bring challenges such as lack of privacy, integrity, trust, and centralization. This research aims to implement an Artificial Intelligence-based Lightweight Blockchain Security Model (AILBSM) to ensure privacy and security of IIoT systems. This novel model is meant to address issues that can occur with security and privacy when dealing with Cloud-based IIoT systems that handle data in the Cloud or on the Edge of Networks (on-device). The novel contribution of this paper is that it combines the advantages of both lightweight blockchain and Convivial Optimized Sprinter Neural Network (COSNN) based AI mechanisms with simplified and improved security operations. Here, the significant impact of attacks is reduced by transforming features into encoded data using an Authentic Intrinsic Analysis (AIA) model. Extensive experiments are conducted to validate this system using various attack datasets. In addition, the results of privacy protection and AI mechanisms are evaluated separately and compared using various indicators. By using the proposed AILBSM framework, the execution time is minimized to 0.6 seconds, the overall classification accuracy is improved to 99.8%, and detection performance is increased to 99.7%. Due to the inclusion of auto-encoder based transformation and blockchain authentication, the anomaly detection performance of the proposed model is highly improved, when compared to other techniques.
The Industrial Internet of Things (IIoT) promises to deliver innovative business models across multiple domains by providing ubiquitous connectivity, intelligent data, predictive analytics, and decision-making systems for improved market performance. However, traditional IIoT architectures are highly susceptible to many security vulnerabilities and network intrusions, which bring challenges such as lack of privacy, integrity, trust, and centralization. This research aims to implement an Artificial Intelligence-based Lightweight Blockchain Security Model (AILBSM) to ensure privacy and security of IIoT systems. This novel model is meant to address issues that can occur with security and privacy when dealing with Cloud-based IIoT systems that handle data in the Cloud or on the Edge of Networks (on-device). The novel contribution of this paper is that it combines the advantages of both lightweight blockchain and Convivial Optimized Sprinter Neural Network (COSNN) based AI mechanisms with simplified and improved security operations. Here, the significant impact of attacks is reduced by transforming features into encoded data using an Authentic Intrinsic Analysis (AIA) model. Extensive experiments are conducted to validate this system using various attack datasets. In addition, the results of privacy protection and AI mechanisms are evaluated separately and compared using various indicators. By using the proposed AILBSM framework, the execution time is minimized to 0.6 seconds, the overall classification accuracy is improved to 99.8%, and detection performance is increased to 99.7%. Due to the inclusion of auto-encoder based transformation and blockchain authentication, the anomaly detection performance of the proposed model is highly improved, when compared to other techniques.
ArticleNumber 38
Author Alshehri, Ali
Selvarajan, Shitharth
Srivastava, Gautam
Khadidos, Alaa O.
Baza, Mohamed
Khadidos, Adil O.
Lin, Jerry Chun-Wei
Author_xml – sequence: 1
  givenname: Shitharth
  surname: Selvarajan
  fullname: Selvarajan, Shitharth
  organization: Department of Computer Science, Kebri Dehar University
– sequence: 2
  givenname: Gautam
  surname: Srivastava
  fullname: Srivastava, Gautam
  email: srivastavag@brandonu.ca
  organization: Department of Math and Computer Science, Brandon University, Research Centre for Interneural Computing, China Medical University, Dept. of Computer Science and Math, Lebanese American University
– sequence: 3
  givenname: Alaa O.
  surname: Khadidos
  fullname: Khadidos, Alaa O.
  organization: Department of Information Systems, Faculty of Computing and Information Technology, King Abdulaziz University
– sequence: 4
  givenname: Adil O.
  surname: Khadidos
  fullname: Khadidos, Adil O.
  organization: Department of Information Technology, Faculty of Computing and Information Technology, King Abdulaziz University
– sequence: 5
  givenname: Mohamed
  surname: Baza
  fullname: Baza, Mohamed
  organization: Department of Computer Science, College of Charleston
– sequence: 6
  givenname: Ali
  surname: Alshehri
  fullname: Alshehri, Ali
  organization: Department of Computer Science, University of Tabuk
– sequence: 7
  givenname: Jerry Chun-Wei
  surname: Lin
  fullname: Lin, Jerry Chun-Wei
  organization: Department of Computer Science, Electrical Engineering and Mathematical Sciences, Western Norway University of Applied Sciences
BackLink https://www.ncbi.nlm.nih.gov/pubmed/36937654$$D View this record in MEDLINE/PubMed
BookMark eNp9Ustu3SAUtKpUTZrmB7qoLHXTjVteBryqoqiPK0Xq5i66Qxgf7uXWhhTsRP774jhpHotsOOgwMwzDeVsc-eChKN5j9Bljyb8kTLkQFSK0QohhUs2vihOCG1JhTH8fPdofF2cpHRBCGGFCpXhTHFPeUMFrdlK4c1_qODrrjNN96fwIfe924A2Uue7HG1jWsu2D-WP22vkygZmiG-dyCB30pQ3xoaV9V15Fd63NnLXKzSZsyzSnEYb0rnhtdZ_g7K6eFtvv37YXP6vLXz82F-eXleGYjZW0LWtEQ4zEhlloBVjUQQuYUswE0rQWlBnMuGjqtuYIJG9p21hLsK1xTU-LzSrbBX1Q2cug46yCduq2EeJOLe81PShbd5o2tUE5KkYZkojqVkreEMaQAZu1vq5aV1M7QGfAj1H3T0Sfnni3V7twrXAOW3C-uPl0pxDD3wnSqAaXTI5YewhTUkRIKVG-rsnQj8-ghzBFn6NaUAI1jFCRUR8eW_rv5f5HM0CuABNDShGsMm7UowuLQ9dna2qZH7XOj8rzo27nR82ZSp5R79VfJNGVlDLY7yA-2H6B9Q-dZtjm
CitedBy_id crossref_primary_10_1371_journal_pone_0291596
crossref_primary_10_1007_s11063_025_11772_8
crossref_primary_10_1016_j_heliyon_2023_e21887
crossref_primary_10_36660_abchf_20230031
crossref_primary_10_1038_s41598_025_05257_w
crossref_primary_10_3390_s25010213
crossref_primary_10_1016_j_future_2024_01_001
crossref_primary_10_1016_j_heliyon_2024_e41617
crossref_primary_10_1002_cpe_8231
crossref_primary_10_1007_s10115_025_02513_3
crossref_primary_10_3390_electronics12183800
crossref_primary_10_3389_fnut_2025_1636980
crossref_primary_10_1007_s13198_025_02794_5
crossref_primary_10_3390_s24103111
crossref_primary_10_1038_s41598_025_01290_x
crossref_primary_10_1038_s41598_023_42257_0
crossref_primary_10_1080_19393555_2025_2510975
crossref_primary_10_3390_s25165181
crossref_primary_10_1108_JHTI_04_2024_0316
crossref_primary_10_1109_JIOT_2024_3448212
crossref_primary_10_1109_ACCESS_2024_3454812
crossref_primary_10_1142_S2010324724400149
crossref_primary_10_1007_s11277_023_10731_7
crossref_primary_10_1016_j_iot_2023_100851
crossref_primary_10_1007_s10586_024_04481_9
crossref_primary_10_1109_TCE_2025_3571956
crossref_primary_10_1007_s10586_024_04422_6
crossref_primary_10_1007_s12083_025_02024_6
crossref_primary_10_1016_j_comnet_2023_109837
crossref_primary_10_1007_s11042_024_19150_7
crossref_primary_10_1007_s10586_024_04449_9
crossref_primary_10_1002_ett_70243
crossref_primary_10_1007_s40860_025_00254_2
crossref_primary_10_1007_s10586_024_04429_z
crossref_primary_10_1109_ACCESS_2023_3298024
crossref_primary_10_1038_s41598_025_12027_1
crossref_primary_10_3390_s24031035
crossref_primary_10_1016_j_sysarc_2025_103329
crossref_primary_10_1016_j_suscom_2025_101127
crossref_primary_10_1109_ACCESS_2023_3318755
crossref_primary_10_3390_app15126835
crossref_primary_10_1002_ima_22925
crossref_primary_10_1109_JIOT_2024_3507746
crossref_primary_10_3390_su151612193
crossref_primary_10_3390_a18050263
crossref_primary_10_3390_electronics12173618
crossref_primary_10_1007_s10207_023_00748_1
crossref_primary_10_1109_ACCESS_2024_3471688
crossref_primary_10_1016_j_phycom_2024_102340
crossref_primary_10_1109_ACCESS_2025_3561677
crossref_primary_10_1109_ACCESS_2023_3349019
crossref_primary_10_1038_s41598_023_46746_0
crossref_primary_10_1007_s11760_024_03125_0
crossref_primary_10_1109_ACCESS_2024_3366492
crossref_primary_10_3390_s24237440
crossref_primary_10_1016_j_vehcom_2024_100864
crossref_primary_10_1038_s41598_024_51154_z
crossref_primary_10_1109_ACCESS_2024_3363469
crossref_primary_10_1038_s41598_025_06807_y
crossref_primary_10_1108_IDD_11_2024_0185
crossref_primary_10_1007_s10462_024_10908_x
crossref_primary_10_1007_s12083_025_01953_6
crossref_primary_10_1109_JSEN_2023_3305716
crossref_primary_10_1038_s41598_024_75994_x
crossref_primary_10_1371_journal_pone_0290694
crossref_primary_10_3390_pr13072237
crossref_primary_10_3390_fi16080273
crossref_primary_10_1016_j_eswa_2024_124479
crossref_primary_10_1038_s41598_023_34354_x
crossref_primary_10_1371_journal_pone_0298534
crossref_primary_10_3389_fcomp_2024_1477501
crossref_primary_10_1007_s00607_023_01236_z
crossref_primary_10_1007_s11277_024_11694_z
crossref_primary_10_1016_j_comnet_2025_111484
crossref_primary_10_7717_peerj_cs_2211
crossref_primary_10_1007_s43926_025_00129_1
crossref_primary_10_1145_3769090
Cites_doi 10.1016/j.adhoc.2021.102526
10.3390/en15103624
10.1016/j.ipm.2022.103155
10.1109/ACCESS.2022.3171660
10.34028/iajit/19/5/14
10.3390/machines10100858
10.24846/v30i2y202111
10.3390/s21041467
10.1109/TII.2021.3095466
10.1109/ACCESS.2022.3165809
10.1016/j.jisa.2022.103404
10.1109/JIOT.2021.3125190
10.3390/app11209393
10.3390/s21155122
10.3390/jsan11040071
10.1049/iet-ifs.2019.0011
10.1109/MITP.2020.3031358
10.1109/ACCESS.2021.3063671
10.1016/j.iot.2021.100365
10.1109/TII.2021.3097131
10.1109/TII.2022.3140792
10.3390/s21196647
10.1016/j.procs.2021.04.014
10.1109/TII.2021.3084753
10.1016/j.jpdc.2022.01.015
10.4018/978-1-6684-7132-6.ch016
10.1109/IWCMC55113.2022.9824557
10.1002/ett.4137
10.1002/ett.4337
10.1007/978-981-19-6290-5_3
10.12691/jcsa-9-1-2
10.1007/s10586-022-03645-9
ContentType Journal Article
Copyright The Author(s) 2023
The Author(s) 2023.
The Author(s) 2023. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: The Author(s) 2023
– notice: The Author(s) 2023.
– notice: The Author(s) 2023. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID C6C
AAYXX
CITATION
NPM
3V.
7RQ
7SC
7X5
7XB
8AL
8FD
8FE
8FG
8FK
8G5
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BEZIV
BGLVJ
CCPQU
DWQXO
GNUQQ
GUQSH
HCIFZ
JQ2
K6~
K7-
L7M
L~C
L~D
M0N
M2O
MBDVC
P62
PADUT
PHGZM
PHGZT
PIMPY
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
Q9U
U9A
7X8
5PM
DOA
DOI 10.1186/s13677-023-00412-y
DatabaseName Springer Nature OA Free Journals
CrossRef
PubMed
ProQuest Central (Corporate)
Career & Technical Education Database
Computer and Information Systems Abstracts
Entrepreneurship Database
ProQuest Central (purchase pre-March 2016)
Computing Database (Alumni Edition)
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni) (purchase pre-March 2016)
Research Library (Alumni Edition)
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
Advanced Technologies & Computer Science Collection
ProQuest Central Essentials
ProQuest Central
Business Premium Collection
Technology collection
ProQuest One Community College
ProQuest Central
ProQuest Central Student
Research Library Prep
SciTech Premium Collection
ProQuest Computer Science Collection
ProQuest Business Collection
Computer Science Database
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
Computing Database
Research Library
Research Library (Corporate)
ProQuest Advanced Technologies & Aerospace Collection
Research Library China
ProQuest Central Premium
ProQuest One Academic
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic (retired)
ProQuest One Academic UKI Edition
ProQuest Central Basic
MEDLINE - Academic
PubMed Central (Full Participant titles)
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
PubMed
Publicly Available Content Database
Research Library Prep
Computer Science Database
ProQuest Central Student
Technology Collection
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
Research Library (Alumni Edition)
ProQuest Central
ProQuest One Applied & Life Sciences
ProQuest Central Korea
ProQuest Research Library
ProQuest Central (New)
Research Library China
Advanced Technologies Database with Aerospace
Career and Technical Education (Alumni Edition)
ProQuest Entrepreneurship
Advanced Technologies & Aerospace Collection
Business Premium Collection
ProQuest Computing
ProQuest Central Basic
ProQuest Computing (Alumni Edition)
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest SciTech Collection
ProQuest Business Collection
Computer and Information Systems Abstracts Professional
ProQuest Career and Technical Education
ProQuest One Academic UKI Edition
ProQuest One Academic
ProQuest One Academic (New)
ProQuest Central (Alumni)
MEDLINE - Academic
DatabaseTitleList
CrossRef
PubMed

MEDLINE - Academic
Publicly Available Content Database

Database_xml – sequence: 1
  dbid: DOA
  name: Directory of Open Access Journals (DOAJ)
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: NPM
  name: PubMed
  url: http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed
  sourceTypes: Index Database
– sequence: 3
  dbid: 7RQ
  name: Career & Technical Education Database
  url: https://search.proquest.com/career
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 2192-113X
EndPage 17
ExternalDocumentID oai_doaj_org_article_f5da395c02194340803ab88692440cef
PMC10017665
36937654
10_1186_s13677_023_00412_y
Genre Journal Article
GrantInformation_xml – fundername: Natural Sciences and Engineering Research Council of Canada
  grantid: RGPIN-2020-05363
  funderid: http://dx.doi.org/10.13039/501100000038
– fundername: ;
  grantid: RGPIN-2020-05363
GroupedDBID -A0
0R~
3V.
40G
5VS
7RQ
8FE
8FG
8G5
AAFWJ
AAJSJ
AAKKN
ABEEZ
ABFTD
ABUWG
ACACY
ACGFS
ACULB
ADBBV
ADINQ
AFGXO
AFKRA
AFPKN
AHBYD
AHYZX
ALMA_UNASSIGNED_HOLDINGS
AMKLP
ARAPS
AZQEC
BCNDV
BENPR
BGLVJ
BPHCQ
C24
C6C
CCPQU
DWQXO
EBLON
EBS
GNUQQ
GROUPED_DOAJ
GUQSH
HCIFZ
HZ~
IAO
ISR
ITC
K6V
K7-
KQ8
M0N
M2O
M~E
O9-
OK1
PADUT
PIMPY
PQQKQ
PROAC
RNS
RSV
SCO
SOJ
AASML
AAYXX
CITATION
ICD
IVC
2VQ
AHSBF
EJD
NPM
PHGZM
PHGZT
PQGLB
7SC
7X5
7XB
8AL
8FD
8FK
BEZIV
JQ2
K6~
L7M
L~C
L~D
MBDVC
P62
PKEHL
PQEST
PQUKI
Q9U
U9A
7X8
5PM
ID FETCH-LOGICAL-c614t-8fb49792c81c4feb7ef0debe1331470a35734c146795b560e86b3b9ff21f5153
IEDL.DBID 7RQ
ISICitedReferencesCount 91
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000949343900001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 2192-113X
IngestDate Tue Oct 14 14:59:51 EDT 2025
Tue Nov 04 02:07:06 EST 2025
Sun Nov 09 12:58:32 EST 2025
Wed Oct 15 14:30:51 EDT 2025
Mon Jul 21 05:32:59 EDT 2025
Sat Nov 29 01:40:29 EST 2025
Tue Nov 18 22:18:40 EST 2025
Fri Feb 21 02:45:02 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 1
Keywords Fog computing
Cloud computing
Security
Convivial Optimized Sprinter Neural Network
Artificial intelligence
Blockchain
Language English
License The Author(s) 2023.
Open AccessThis article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c614t-8fb49792c81c4feb7ef0debe1331470a35734c146795b560e86b3b9ff21f5153
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
content type line 23
OpenAccessLink https://www.proquest.com/docview/2787094237?pq-origsite=%requestingapplication%
PMID 36937654
PQID 2787094237
PQPubID 2034894
PageCount 17
ParticipantIDs doaj_primary_oai_doaj_org_article_f5da395c02194340803ab88692440cef
pubmedcentral_primary_oai_pubmedcentral_nih_gov_10017665
proquest_miscellaneous_2788804409
proquest_journals_2787094237
pubmed_primary_36937654
crossref_citationtrail_10_1186_s13677_023_00412_y
crossref_primary_10_1186_s13677_023_00412_y
springer_journals_10_1186_s13677_023_00412_y
PublicationCentury 2000
PublicationDate 2023-12-01
PublicationDateYYYYMMDD 2023-12-01
PublicationDate_xml – month: 12
  year: 2023
  text: 2023-12-01
  day: 01
PublicationDecade 2020
PublicationPlace Berlin/Heidelberg
PublicationPlace_xml – name: Berlin/Heidelberg
– name: Germany
– name: Heidelberg
PublicationSubtitle Advances, Systems and Applications
PublicationTitle Journal of cloud computing : advances, systems and applications
PublicationTitleAbbrev J Cloud Comp
PublicationTitleAlternate J Cloud Comput (Heidelb)
PublicationYear 2023
Publisher Springer Berlin Heidelberg
Springer Nature B.V
SpringerOpen
Publisher_xml – name: Springer Berlin Heidelberg
– name: Springer Nature B.V
– name: SpringerOpen
References Bangui, Buhnova (CR26) 2021; 184
Leng, Chen, Huang, Zhu, Su, Lin, Zhang (CR12) 2022; 10
Ferrag, Friha, Hamouda, Maglaras, Janicke (CR5) 2022; 10
Farooq, Tariq, Asim, Baker, Al-Shamma’a (CR21) 2022; 162
Golec, Ozturac, Pooranian, Gill, Buyya (CR16) 2021; 18
Khadidos, Manoharan, Selvarajan, Khadidos, Alyoubi, Yafoz (CR11) 2022; 15
Latif, Idrees, e Huma, Ahmad (CR13) 2021; 32
Wang, Wei, Zhang, Yu, Sharma (CR9) 2021; 119
Yu, Tan, Yang, Choo, Bashir, Rodrigues, Sato (CR8) 2021; 9
CR17
Qamar, Zardari (CR35) 2023; 4
CR38
Pal, Jadidi (CR4) 2021; 11
CR37
Selvarajan, Shaik, Ameerjohn, Kannan (CR40) 2020; 14
CR33
Shahbazi, Byun (CR23) 2021; 21
CR31
Banerjee, Roy, Odelu, Das, Chattopadhyay, Rodrigues, Park (CR18) 2020; 53
Saba, Haseeb, Shah, Rehman, Tariq, Mehmood (CR20) 2021; 23
Sharma, Pant, Kumar Sharma, Datta Gupta, Vashishth, Chhabra (CR10) 2021; 32
Hewa, Braeken, Liyanage, Ylianttila (CR30) 2022; 18
Martinez-Rendon, González-Compeán, Sánchez-Gallegos, Carretero (CR34) 2023; 60
Javanmardi, Shojafar, Mohammadi, Persico, Pescapè (CR32) 2023; 72
Ali, Wang, Riaz, Rafique (CR1) 2022; 12
Maseleno, Abdullah, Satria, Souisa, Rahim (CR27) 2021
Istiaque Ahmed, Tahir, Hadi Habaebi, Lun Lau, Ahad (CR22) 2021; 21
Alsarhan, Alauthman, Alshdaifat, Al-Ghuwairi, Al-Dubai (CR25) 2021; 24
Rathee, Kerrache, Ferrag (CR29) 2022; 11
Shin, Yu, Bae, Chang (CR6) 2022; 12
Tian, Li, Xiong, Bhuiyan, Ma, Peng (CR15) 2021; 18
Guezzaz, Benkirane, Mohyeddine, Attou, Douiba (CR7) 2022; 19
Wang, Xu, Alazab, Gadekallu, Han, Su (CR14) 2021; 18
Tan, Samsudin (CR3) 2021; 21
Jia, Jia, Kong, Lin, Qi (CR2) 2022; 12
Ahmad, Alsmadi (CR19) 2021; 14
Shitharth, Kshirsagar, Balachandran, Alyoubi, Khadidos (CR39) 2022; 10
Duraisamy, Subramaniam, Robin (CR24) 2021; 30
Liu, Yang, Lian, Li (CR28) 2021; 9
Mittal, Tripathi, Pandey, Venu, Menon, Pal (CR36) 2022; 18
U Farooq (412_CR21) 2022; 162
S Ali (412_CR1) 2022; 12
AO Khadidos (412_CR11) 2022; 15
J Leng (412_CR12) 2022; 10
K Istiaque Ahmed (412_CR22) 2021; 21
M Golec (412_CR16) 2021; 18
412_CR33
412_CR17
412_CR38
412_CR37
C Jia (412_CR2) 2022; 12
412_CR31
S Banerjee (412_CR18) 2020; 53
C Martinez-Rendon (412_CR34) 2023; 60
T Saba (412_CR20) 2021; 23
S Selvarajan (412_CR40) 2020; 14
J Wang (412_CR9) 2021; 119
G Rathee (412_CR29) 2022; 11
Y Tian (412_CR15) 2021; 18
E Shin (412_CR6) 2022; 12
S Javanmardi (412_CR32) 2023; 72
S Pal (412_CR4) 2021; 11
W Wang (412_CR14) 2021; 18
R Ahmad (412_CR19) 2021; 14
A Maseleno (412_CR27) 2021
T Hewa (412_CR30) 2022; 18
A Guezzaz (412_CR7) 2022; 19
S Shitharth (412_CR39) 2022; 10
A Duraisamy (412_CR24) 2021; 30
H Bangui (412_CR26) 2021; 184
M Sharma (412_CR10) 2021; 32
R Qamar (412_CR35) 2023; 4
H Mittal (412_CR36) 2022; 18
J Liu (412_CR28) 2021; 9
A Alsarhan (412_CR25) 2021; 24
K Yu (412_CR8) 2021; 9
S Latif (412_CR13) 2021; 32
Z Shahbazi (412_CR23) 2021; 21
SF Tan (412_CR3) 2021; 21
MA Ferrag (412_CR5) 2022; 10
References_xml – volume: 119
  start-page: 102526
  year: 2021
  ident: CR9
  article-title: An optimized transaction verification method for trustworthy blockchain-enabled iiot
  publication-title: Ad Hoc Netw
  doi: 10.1016/j.adhoc.2021.102526
– volume: 15
  start-page: 3624
  issue: 10
  year: 2022
  ident: CR11
  article-title: A classy multifacet clustering and fused optimization based classification methodologies for scada security
  publication-title: Energies
  doi: 10.3390/en15103624
– volume: 60
  start-page: 103155
  issue: 1
  year: 2023
  ident: CR34
  article-title: Cd/cv: Blockchain-based schemes for continuous verifiability and traceability of iot data for edge-fog-cloud
  publication-title: Inf Process Manag
  doi: 10.1016/j.ipm.2022.103155
– volume: 10
  start-page: 46424
  year: 2022
  end-page: 46441
  ident: CR39
  article-title: An innovative perceptual pigeon galvanized optimization (ppgo) based likelihood naïve bayes (lnb) classification approach for network intrusion detection system
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2022.3171660
– volume: 12
  start-page: 1
  year: 2022
  end-page: 15
  ident: CR2
  article-title: Privacy-aware retrieval of electronic medical records by fuzzy keyword search
  publication-title: Hum Centric Comput Inf Sci
– volume: 12
  start-page: 1
  year: 2022
  end-page: 3
  ident: CR6
  article-title: The Impact of Enterprise Security Performance on Business Performance in Industrial Convergence Environment
  publication-title: Human-centric Computing and Information Sciences
– volume: 19
  start-page: 1
  issue: 5
  year: 2022
  end-page: 9
  ident: CR7
  article-title: A lightweight hybrid intrusion detection framework using machine learning for edge-based iiot security
  publication-title: Int Arab J Inform Technol
  doi: 10.34028/iajit/19/5/14
– volume: 10
  start-page: 858
  year: 2022
  ident: CR12
  article-title: Secure blockchain middleware for decentralized iiot towards industry 5.0: A review of architecture, enablers, challenges, and directions
  publication-title: Machines
  doi: 10.3390/machines10100858
– volume: 30
  start-page: 121
  issue: 2
  year: 2021
  end-page: 131
  ident: CR24
  article-title: An optimized deep learning based security enhancement and attack detection on iot using ids and kh-aes for smart cities
  publication-title: Stud Inf Control
  doi: 10.24846/v30i2y202111
– volume: 21
  start-page: 1467
  issue: 4
  year: 2021
  ident: CR23
  article-title: Integration of blockchain, iot and machine learning for multistage quality control and enhancing security in smart manufacturing
  publication-title: Sensors
  doi: 10.3390/s21041467
– ident: CR37
– volume: 18
  start-page: 3522
  issue: 5
  year: 2021
  end-page: 3529
  ident: CR16
  article-title: ifaasbus: A security-and privacy-based lightweight framework for serverless computing using iot and machine learning
  publication-title: IEEE Trans Ind Inf
  doi: 10.1109/TII.2021.3095466
– ident: CR33
– volume: 10
  start-page: 40281
  year: 2022
  end-page: 40306
  ident: CR5
  article-title: Edge-iiotset: A new comprehensive realistic cyber security dataset of iot and iiot applications for centralized and federated learning
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2022.3165809
– volume: 72
  start-page: 103404
  year: 2023
  ident: CR32
  article-title: S-fos: A secure workflow scheduling approach for performance optimization in sdn-based iot-fog networks
  publication-title: Journal of Information Security and Applications
  doi: 10.1016/j.jisa.2022.103404
– volume: 9
  start-page: 8154
  issue: 11
  year: 2021
  end-page: 67
  ident: CR8
  article-title: A blockchain-based shamir’s threshold cryptography scheme for data protection in industrial internet of things settings
  publication-title: IEEE Internet of Things Journal
  doi: 10.1109/JIOT.2021.3125190
– volume: 11
  start-page: 9393
  issue: 20
  year: 2021
  ident: CR4
  article-title: Analysis of security issues and countermeasures for the industrial internet of things
  publication-title: Appl Sci
  doi: 10.3390/app11209393
– volume: 21
  start-page: 5122
  issue: 15
  year: 2021
  ident: CR22
  article-title: Machine learning for authentication and authorization in iot: Taxonomy, challenges and future research direction
  publication-title: Sensors
  doi: 10.3390/s21155122
– volume: 11
  start-page: 71
  issue: 4
  year: 2022
  ident: CR29
  article-title: A blockchain-based intrusion detection system using viterbi algorithm and indirect trust for iiot systems
  publication-title: J Sens Actuator Netw
  doi: 10.3390/jsan11040071
– volume: 14
  start-page: 1
  issue: 1
  year: 2020
  end-page: 11
  ident: CR40
  article-title: Mining of intrusion attack in scada network using clustering and genetically seeded flora-based optimal classification algorithm
  publication-title: IET Inf Secur
  doi: 10.1049/iet-ifs.2019.0011
– volume: 53
  start-page: 102503
  year: 2020
  ident: CR18
  article-title: Multi-authority cp-abe-based user access control scheme with constant-size key and ciphertext for iot deployment
  publication-title: J Inf Secur Appl
– volume: 23
  start-page: 69
  issue: 3
  year: 2021
  end-page: 75
  ident: CR20
  article-title: A machine-learning-based approach for autonomous iot security
  publication-title: IT Prof
  doi: 10.1109/MITP.2020.3031358
– volume: 9
  start-page: 38254
  year: 2021
  end-page: 38268
  ident: CR28
  article-title: Research on intrusion detection based on particle swarm optimization in iot
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2021.3063671
– ident: CR38
– volume: 14
  start-page: 100365
  year: 2021
  ident: CR19
  article-title: Machine learning approaches to iot security: A systematic literature review
  publication-title: Internet of Things
  doi: 10.1016/j.iot.2021.100365
– ident: CR17
– ident: CR31
– volume: 18
  start-page: 1918
  issue: 3
  year: 2021
  end-page: 1929
  ident: CR15
  article-title: A blockchain-based machine learning framework for edge services in iiot
  publication-title: IEEE Trans Ind Inf
  doi: 10.1109/TII.2021.3097131
– volume: 18
  start-page: 7174
  issue: 10
  year: 2022
  end-page: 7185
  ident: CR30
  article-title: Fog computing and blockchain-based security service architecture for 5g industrial iot-enabled cloud manufacturing
  publication-title: IEEE Trans Ind Inf
  doi: 10.1109/TII.2022.3140792
– volume: 18
  start-page: 1
  year: 2022
  end-page: 3
  ident: CR36
  article-title: A novel fuzzy clustering-based method for human activity recognition in cloud-based industrial IoT environment
  publication-title: Wireless Networks
– volume: 32
  start-page: e4137
  issue: 7
  year: 2021
  ident: CR10
  article-title: Enabling security for the industrial internet of things using deep learning, blockchain, and coalitions
  publication-title: Trans Emerg Telecommun Technol
– volume: 24
  start-page: 1
  year: 2021
  end-page: 0
  ident: CR25
  article-title: Machine Learning-driven optimization for SVM-based intrusion detection system in vehicular ad hoc networks
  publication-title: Journal of Ambient Intelligence and Humanized Computing
– volume: 12
  start-page: 1
  year: 2022
  end-page: 5
  ident: CR1
  article-title: Preserving the Privacy of Dependent Tuples Using Enhanced Differential Privacy
  publication-title: Human-centric Comput Informat Sci
– volume: 21
  start-page: 6647
  issue: 19
  year: 2021
  ident: CR3
  article-title: Recent technologies, security countermeasure and ongoing challenges of industrial internet of things (iiot): A survey
  publication-title: Sensors
  doi: 10.3390/s21196647
– volume: 184
  start-page: 877
  year: 2021
  end-page: 886
  ident: CR26
  article-title: Recent advances in machine-learning driven intrusion detection in transportation: survey
  publication-title: Procedia Comput Sci
  doi: 10.1016/j.procs.2021.04.014
– volume: 32
  start-page: e4337
  issue: 11
  year: 2021
  ident: CR13
  article-title: Blockchain technology for the industrial internet of things: A comprehensive survey on security challenges, architectures, applications, and future research directions
  publication-title: Trans Emerg Telecommun Technol
– start-page: 119
  year: 2021
  end-page: 133
  ident: CR27
  publication-title: An Intelligent Intrusion Detection for Smart Cities Application Based on Random Optimization with Recurrent Network
– volume: 18
  start-page: 7059
  issue: 10
  year: 2021
  end-page: 67
  ident: CR14
  article-title: Blockchain-based reliable and efficient certificateless signature for IIoT devices
  publication-title: IEEE transactions on industrial informatics
  doi: 10.1109/TII.2021.3084753
– volume: 4
  start-page: 15
  issue: 1
  year: 2023
  end-page: 23
  ident: CR35
  article-title: A study of blockchain-based internet of things
  publication-title: Iraqi J Comput Sci Math
– volume: 162
  start-page: 89
  year: 2022
  end-page: 104
  ident: CR21
  article-title: Machine learning and the internet of things security: Solutions and open challenges
  publication-title: J Parallel Distrib Comput
  doi: 10.1016/j.jpdc.2022.01.015
– volume: 18
  start-page: 7174
  issue: 10
  year: 2022
  ident: 412_CR30
  publication-title: IEEE Trans Ind Inf
  doi: 10.1109/TII.2022.3140792
– ident: 412_CR31
  doi: 10.4018/978-1-6684-7132-6.ch016
– volume: 60
  start-page: 103155
  issue: 1
  year: 2023
  ident: 412_CR34
  publication-title: Inf Process Manag
  doi: 10.1016/j.ipm.2022.103155
– volume: 53
  start-page: 102503
  year: 2020
  ident: 412_CR18
  publication-title: J Inf Secur Appl
– volume: 10
  start-page: 46424
  year: 2022
  ident: 412_CR39
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2022.3171660
– volume: 14
  start-page: 100365
  year: 2021
  ident: 412_CR19
  publication-title: Internet of Things
  doi: 10.1016/j.iot.2021.100365
– volume: 4
  start-page: 15
  issue: 1
  year: 2023
  ident: 412_CR35
  publication-title: Iraqi J Comput Sci Math
– volume: 11
  start-page: 9393
  issue: 20
  year: 2021
  ident: 412_CR4
  publication-title: Appl Sci
  doi: 10.3390/app11209393
– volume: 30
  start-page: 121
  issue: 2
  year: 2021
  ident: 412_CR24
  publication-title: Stud Inf Control
  doi: 10.24846/v30i2y202111
– ident: 412_CR37
  doi: 10.1109/IWCMC55113.2022.9824557
– volume: 23
  start-page: 69
  issue: 3
  year: 2021
  ident: 412_CR20
  publication-title: IT Prof
  doi: 10.1109/MITP.2020.3031358
– volume: 32
  start-page: e4137
  issue: 7
  year: 2021
  ident: 412_CR10
  publication-title: Trans Emerg Telecommun Technol
  doi: 10.1002/ett.4137
– volume: 184
  start-page: 877
  year: 2021
  ident: 412_CR26
  publication-title: Procedia Comput Sci
  doi: 10.1016/j.procs.2021.04.014
– volume: 9
  start-page: 8154
  issue: 11
  year: 2021
  ident: 412_CR8
  publication-title: IEEE Internet of Things Journal
  doi: 10.1109/JIOT.2021.3125190
– volume: 32
  start-page: e4337
  issue: 11
  year: 2021
  ident: 412_CR13
  publication-title: Trans Emerg Telecommun Technol
  doi: 10.1002/ett.4337
– start-page: 119
  volume-title: An Intelligent Intrusion Detection for Smart Cities Application Based on Random Optimization with Recurrent Network
  year: 2021
  ident: 412_CR27
– volume: 72
  start-page: 103404
  year: 2023
  ident: 412_CR32
  publication-title: Journal of Information Security and Applications
  doi: 10.1016/j.jisa.2022.103404
– volume: 21
  start-page: 6647
  issue: 19
  year: 2021
  ident: 412_CR3
  publication-title: Sensors
  doi: 10.3390/s21196647
– ident: 412_CR33
  doi: 10.1007/978-981-19-6290-5_3
– volume: 19
  start-page: 1
  issue: 5
  year: 2022
  ident: 412_CR7
  publication-title: Int Arab J Inform Technol
  doi: 10.34028/iajit/19/5/14
– volume: 15
  start-page: 3624
  issue: 10
  year: 2022
  ident: 412_CR11
  publication-title: Energies
  doi: 10.3390/en15103624
– volume: 18
  start-page: 7059
  issue: 10
  year: 2021
  ident: 412_CR14
  publication-title: IEEE transactions on industrial informatics
  doi: 10.1109/TII.2021.3084753
– volume: 9
  start-page: 38254
  year: 2021
  ident: 412_CR28
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2021.3063671
– volume: 10
  start-page: 40281
  year: 2022
  ident: 412_CR5
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2022.3165809
– volume: 21
  start-page: 1467
  issue: 4
  year: 2021
  ident: 412_CR23
  publication-title: Sensors
  doi: 10.3390/s21041467
– volume: 162
  start-page: 89
  year: 2022
  ident: 412_CR21
  publication-title: J Parallel Distrib Comput
  doi: 10.1016/j.jpdc.2022.01.015
– volume: 24
  start-page: 1
  year: 2021
  ident: 412_CR25
  publication-title: Journal of Ambient Intelligence and Humanized Computing
– ident: 412_CR17
  doi: 10.12691/jcsa-9-1-2
– volume: 21
  start-page: 5122
  issue: 15
  year: 2021
  ident: 412_CR22
  publication-title: Sensors
  doi: 10.3390/s21155122
– volume: 12
  start-page: 1
  year: 2022
  ident: 412_CR2
  publication-title: Hum Centric Comput Inf Sci
– ident: 412_CR38
  doi: 10.1007/s10586-022-03645-9
– volume: 14
  start-page: 1
  issue: 1
  year: 2020
  ident: 412_CR40
  publication-title: IET Inf Secur
  doi: 10.1049/iet-ifs.2019.0011
– volume: 18
  start-page: 1
  year: 2022
  ident: 412_CR36
  publication-title: Wireless Networks
– volume: 11
  start-page: 71
  issue: 4
  year: 2022
  ident: 412_CR29
  publication-title: J Sens Actuator Netw
  doi: 10.3390/jsan11040071
– volume: 12
  start-page: 1
  year: 2022
  ident: 412_CR6
  publication-title: Human-centric Computing and Information Sciences
– volume: 12
  start-page: 1
  year: 2022
  ident: 412_CR1
  publication-title: Human-centric Comput Informat Sci
– volume: 18
  start-page: 1918
  issue: 3
  year: 2021
  ident: 412_CR15
  publication-title: IEEE Trans Ind Inf
  doi: 10.1109/TII.2021.3097131
– volume: 18
  start-page: 3522
  issue: 5
  year: 2021
  ident: 412_CR16
  publication-title: IEEE Trans Ind Inf
  doi: 10.1109/TII.2021.3095466
– volume: 119
  start-page: 102526
  year: 2021
  ident: 412_CR9
  publication-title: Ad Hoc Netw
  doi: 10.1016/j.adhoc.2021.102526
– volume: 10
  start-page: 858
  year: 2022
  ident: 412_CR12
  publication-title: Machines
  doi: 10.3390/machines10100858
SSID ssj0001012387
Score 2.6054175
Snippet The Industrial Internet of Things (IIoT) promises to deliver innovative business models across multiple domains by providing ubiquitous connectivity,...
Abstract The Industrial Internet of Things (IIoT) promises to deliver innovative business models across multiple domains by providing ubiquitous connectivity,...
SourceID doaj
pubmedcentral
proquest
pubmed
crossref
springer
SourceType Open Website
Open Access Repository
Aggregation Database
Index Database
Enrichment Source
Publisher
StartPage 38
SubjectTerms Algorithms for Secure Smart Services
Anomalies
Artificial intelligence
Blockchain
Cloud computing
Coders
Computer Communication Networks
Computer Science
Computer System Implementation
Computer Systems Organization and Communication Networks
Convivial Optimized Sprinter Neural Network
Cryptography
Cybersecurity
Decision analysis
Decision making
Fog computing
Industrial applications
Industrial Internet of Things
Information Systems Applications (incl.Internet)
Intelligence in the Edge-Cloud: Theories
Lightweight
Modelling
Neural networks
Privacy
Security
Software Engineering/Programming and Operating Systems
Special Purpose and Application-Based Systems
SummonAdditionalLinks – databaseName: DOAJ Directory of Open Access Journals
  dbid: DOA
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Jb9QwFH5CVQ9cgJYtUCojcQOrmSxejgVR0UvFYQ69WbZjqxFVBjXTVvPvec9JpjNsvfQaO86L3-7lewAfJN0NsKXgUXnNK-kLbhvX8OCUVbJBp1XZVGxCnp2p83P9faPUF50JG-CBh4k7inVjS1179EUEZYYBTmmdUgLzhir3IZL1zaXeSKbS6gqFCkpOt2SUOOoJm0xydFE8YUzx1ZYnSoD9f4sy_zws-duOaXJEJ8_gyRhBsuOB8j14FLp9eDpVZ2Cjsj6H9rhj9HsDRARrN7A32SWl5LdpVZQ5dGc__IVtO9aPxexYqo_DMJ69e2S7hiFFN9avcCx2erqYswEGun8B85Ov8y_f-FhYgXv0xkuuoqu01IVXM1_F4GSIeYPcxHx1VsnclrUsK082VNcOQ6KghCudjrGYRYx_ypew0y268BqY0A4tRKMrAobTIrhGCB2Ct_ghEXyewWyaY-NH0HGqfXFpUvKhhBn4YpAvJvHFrDL4uH7n5wC58d_en4l1654El50eoBCZUYjMfUKUwcHEeDPqcG8KsmWajg1l8H7djNpHWyq2C4vr1AcNIA6iM3g1yMmaklJg6CfqKgO1JUFbpG63dO1FQvgmYCwpRJ3Bp0nY7uj691y8eYi5eAuPC9KSdGTnAHaWV9fhHez6m2XbXx0mNfsFqBkqYg
  priority: 102
  providerName: Directory of Open Access Journals
– databaseName: SpringerLink Open Access Journals
  dbid: C24
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9QwEB5B4cCF8ialICNxA4tN4vhxLBUVvVQc9tCbZTs2jaiy1WZbtP--Y8fZslCQ4Bo7zsiZx2d7_A3AOxHvBpia0yCdoky4iprWttRbaaRoMWgxk4pNiJMTeXqqvuZLYcOU7T4dSSZPncxa8o9DJBcTFGMMTSRRdH0X7jWlVDGR7zDfcUg7KxEmSDHdkLn11a0olMj6b0OYvydK_nJamoLQ0e7_if8IHmbQSQ5GLXkMd3z_BHangg4k2_dT6A56ElVpZJUg3U90neQ8ruJ_pI1UYjECfndnpuvJkOvfkVRShyAEvnlk-pagkFfGrXEscny8mJOROXp4BvOjz_PDLzTXYqAOA_iKymCZEqpysnQseCt8mLWoALjELZmYmboRNXPR7arGIoryktvaqhCqMiBkqp_DTr_o_UsgXFl0Kq1ikUtOcW9bzpX3zuCHuHezAsrp12iXecpjuYxzndYrkutxKjVOpU5TqdcFvN-8czGydPy196f4xzc9I8N2erBYftPZYHVoWlOrxiEGihR6CKxrY6XkuF5lM-dDAfuTvuhs9oOuovtTMdOogLebZjTYeApjer-4TH3QZ-IgqoAXo3ptJKk5okXesALkluJtibrd0ndniRQ8cmkJzpsCPkz6dyPXn-di79-6v4IHVVThlM-zDzur5aV_Dffd1aoblm-SHV4DN_gvtg
  priority: 102
  providerName: Springer Nature
Title An artificial intelligence lightweight blockchain security model for security and privacy in IIoT systems
URI https://link.springer.com/article/10.1186/s13677-023-00412-y
https://www.ncbi.nlm.nih.gov/pubmed/36937654
https://www.proquest.com/docview/2787094237
https://www.proquest.com/docview/2788804409
https://pubmed.ncbi.nlm.nih.gov/PMC10017665
https://doaj.org/article/f5da395c02194340803ab88692440cef
Volume 12
WOSCitedRecordID wos000949343900001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAON
  databaseName: Directory of Open Access Journals (DOAJ)
  customDbUrl:
  eissn: 2192-113X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0001012387
  issn: 2192-113X
  databaseCode: DOA
  dateStart: 20120101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 2192-113X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0001012387
  issn: 2192-113X
  databaseCode: M~E
  dateStart: 20120101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
– providerCode: PRVAVX
  databaseName: SpringerLink Open Access Journals
  customDbUrl:
  eissn: 2192-113X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0001012387
  issn: 2192-113X
  databaseCode: C24
  dateStart: 20121201
  isFulltext: true
  titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22
  providerName: Springer Nature
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3Nb9MwFH-CjQMXxjeBURmJG1hr8-GPE9qmTVRopUw9jFNkO85WMaWj6Yb63_Oek7SUj124WErsJHbep5_t3wN4K-lsgEkEL5XTPJUu5qawBfdWGSULNFqpCckm5Gikzs70uA241e22yk4nBkVdzBzFyPdi4ixNmzg-XH3nlDWKVlfbFBp3YRsNtSA-l6df1jEWchiU7M7KKLFXE0KZ5GioeECa4ssNexRg-__ma_65ZfK3ddNgjo53_ncgD-FB64iy_YZzHsEdXz2GnS7JA2tl_glM9ytG7NUgTbDpLxCe7JJm9j9CcJVZtIrf3IWZVqxuc-KxkGaHoVu8vmWqguGQboxb4rvYcDibsAZNun4Kk-OjyeFH3uZn4A6N-oKr0qZa6tipgUtLb6Uv-wUyBU57B6nsmySTSepIFevMomfllbCJ1WUZD0p0o5JnsFXNKv8CmNAWFU2Bf4XQEoW3hRDae2fwQ8K7fgSDjki5a7HLKYXGZR7mMErkDWFzJGweCJsvI3i3euaqQe64tfUB0X7VklC3w43Z_DxvhTgvs8IkOnPoFxGsHjrbibFKCZzDpn3nywh2O5LnrSqo8zW9I3izqkYhppUZU_nZdWiDehRfoiN43jDaqieJQA9SZGkEaoMFN7q6WVNNLwJQOOFrSSGyCN533Lru17__xcvbh_EK7sckQGFPzy5sLebX_jXcczeLaT3vBQmk8kz1YPvgaDQ-xavDOO2FcAeWnyTH8iT-jPXj4cn4608XIUFX
linkProvider ProQuest
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Jb9QwFH4qBQkulK0QKGAkOIHVmSxeDgiVpepoyojDHHqzbMehEVVSJtNW86P4jzw7yQzD0lsPXGPHsZ3vbV6-B_CS-7sBOmG0EFbSlNuY6tzk1BmhBc_RaKU6JJvgk4k4OpJfNuBHfxfGH6vsdWJQ1Hlt_Rr5buyRJf0hjnen36nPGuV3V_sUGi0sxm5xgSFb83b0Ef_vqzje_zT9cEC7rALUoimaU1GYVHIZWzG0aeEMd8Ugx6FgsDZM-UAnGU9S6xWIzAz6A04wkxhZFPGwQOOfYLPX4HqaCO7FaszpaknH-yeC91dzBNttPCEap2gXaSC2oos18xeyBPzNtf3zhOZv27TB-u1v_Wfzdgdud2422Wvl4i5suOoebPUpLEin0e5DuVcRLzwtjwYpfyEoJSd-3eIiLB0Tgzb_mz3WZUWaLuMfCUmECDr9q0e6ygnO4Lm2C2yLjEb1lLRc2c0DmF7FeLdhs6or9wgIkwbVaI4_wXNBMmdyxqRzVuOHmLODCIY9JpTtmNl9gpATFSI0wVSLI4U4UgFHahHB6-U7py0vyaW133uoLWt6TvHwoJ59VZ2KUkWW60RmFr0-TxqIoUSijRAMI_R0YF0RwU6PMNUpukat4BXBi2Uxqii_76QrV5-FOmglsBEZwcMW18ueJAz9Y5alEYg1xK91db2kKo8DDbpnD-OMZRG86YVj1a9_z8Xjy4fxHG4eTD8fqsPRZPwEbsVedsPppR3YnM_O3FO4Yc_nZTN7FoSfgLpiofkJPlqUVQ
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1JbxMxFH4qKUJcKFthoICR4ARWklm8HBAqlIioEOWQQzlZtsdDI6pJyaSt8tP4dzx7ZhLC0lsPXGccx_Z8b7Ofvwfwgvu7ATphtBBW0pTbmOrc5NQZoQXP0WilOhSb4KORODqS4y340d6F8WmVrU4MijqfWb9H3o09sqRP4ugWTVrE-GDw9vQ79RWk_ElrW06jhsihW15g-Fa9GR7gt34Zx4MPk_cfaVNhgFo0SwsqCpNKLmMr-jYtnOGu6OU4LQzc-inv6STjSWq9MpGZQd_ACWYSI4si7hfoCCTY7TXYRo88jTuwPR5-Hn9Zb_B4b0Xw9qKOYN3K06NxilaSBporutwwhqFmwN8c3T_zNX87tA22cLDzH6_ibbjVOOBkv5aYO7Dlyruw0xa3II2uuwfT_ZJ4saoZNsj0F-pScuJ3NC7CpjIx6A18s8d6WpKqqQVIQnkhguHA-pEuc4Krea7tEvsiw-FsQmoW7eo-TK5ivrvQKWelewiESYMKNscP4lkimTM5Y9I5q_GPmLO9CPotPpRtONt96ZATFWI3wVSNKYWYUgFTahnBq9VvTmvGkktbv_OwW7X0bOPhwWz-VTXKSxVZrhOZWfQHPZ0gBhmJNkIwjN3TnnVFBHst2lSjAiu1hloEz1evUXn5EyldutlZaIP2AzuRETyoMb4aScLQc2ZZGoHYQP_GUDfflNPjQJDuecU4Y1kEr1tBWY_r32vx6PJpPIMbKCvq03B0-Bhuxl6MQ1rTHnQW8zP3BK7b88W0mj9tNAEBdcVS8xPoQ57W
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=An+artificial+intelligence+lightweight+blockchain+security+model+for+security+and+privacy+in+IIoT+systems&rft.jtitle=Journal+of+cloud+computing+%3A+advances%2C+systems+and+applications&rft.au=Selvarajan%2C+Shitharth&rft.au=Srivastava%2C+Gautam&rft.au=Khadidos%2C+Alaa+O&rft.au=Khadidos%2C+Adil+O&rft.date=2023-12-01&rft.eissn=2192-113X&rft.volume=12&rft.issue=1&rft.spage=38&rft_id=info:doi/10.1186%2Fs13677-023-00412-y&rft_id=info%3Apmid%2F36937654&rft.externalDocID=36937654
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2192-113X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2192-113X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2192-113X&client=summon