An artificial intelligence lightweight blockchain security model for security and privacy in IIoT systems
The Industrial Internet of Things (IIoT) promises to deliver innovative business models across multiple domains by providing ubiquitous connectivity, intelligent data, predictive analytics, and decision-making systems for improved market performance. However, traditional IIoT architectures are highl...
Saved in:
| Published in: | Journal of cloud computing : advances, systems and applications Vol. 12; no. 1; pp. 38 - 17 |
|---|---|
| Main Authors: | , , , , , , |
| Format: | Journal Article |
| Language: | English |
| Published: |
Berlin/Heidelberg
Springer Berlin Heidelberg
01.12.2023
Springer Nature B.V SpringerOpen |
| Subjects: | |
| ISSN: | 2192-113X, 2192-113X |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | The Industrial Internet of Things (IIoT) promises to deliver innovative business models across multiple domains by providing ubiquitous connectivity, intelligent data, predictive analytics, and decision-making systems for improved market performance. However, traditional IIoT architectures are highly susceptible to many security vulnerabilities and network intrusions, which bring challenges such as lack of privacy, integrity, trust, and centralization. This research aims to implement an Artificial Intelligence-based Lightweight Blockchain Security Model (AILBSM) to ensure privacy and security of IIoT systems. This novel model is meant to address issues that can occur with security and privacy when dealing with Cloud-based IIoT systems that handle data in the Cloud or on the Edge of Networks (on-device). The novel contribution of this paper is that it combines the advantages of both lightweight blockchain and Convivial Optimized Sprinter Neural Network (COSNN) based AI mechanisms with simplified and improved security operations. Here, the significant impact of attacks is reduced by transforming features into encoded data using an Authentic Intrinsic Analysis (AIA) model. Extensive experiments are conducted to validate this system using various attack datasets. In addition, the results of privacy protection and AI mechanisms are evaluated separately and compared using various indicators. By using the proposed AILBSM framework, the execution time is minimized to 0.6 seconds, the overall classification accuracy is improved to 99.8%, and detection performance is increased to 99.7%. Due to the inclusion of auto-encoder based transformation and blockchain authentication, the anomaly detection performance of the proposed model is highly improved, when compared to other techniques. |
|---|---|
| AbstractList | The Industrial Internet of Things (IIoT) promises to deliver innovative business models across multiple domains by providing ubiquitous connectivity, intelligent data, predictive analytics, and decision-making systems for improved market performance. However, traditional IIoT architectures are highly susceptible to many security vulnerabilities and network intrusions, which bring challenges such as lack of privacy, integrity, trust, and centralization. This research aims to implement an Artificial Intelligence-based Lightweight Blockchain Security Model (AILBSM) to ensure privacy and security of IIoT systems. This novel model is meant to address issues that can occur with security and privacy when dealing with Cloud-based IIoT systems that handle data in the Cloud or on the Edge of Networks (on-device). The novel contribution of this paper is that it combines the advantages of both lightweight blockchain and Convivial Optimized Sprinter Neural Network (COSNN) based AI mechanisms with simplified and improved security operations. Here, the significant impact of attacks is reduced by transforming features into encoded data using an Authentic Intrinsic Analysis (AIA) model. Extensive experiments are conducted to validate this system using various attack datasets. In addition, the results of privacy protection and AI mechanisms are evaluated separately and compared using various indicators. By using the proposed AILBSM framework, the execution time is minimized to 0.6 seconds, the overall classification accuracy is improved to 99.8%, and detection performance is increased to 99.7%. Due to the inclusion of auto-encoder based transformation and blockchain authentication, the anomaly detection performance of the proposed model is highly improved, when compared to other techniques. Abstract The Industrial Internet of Things (IIoT) promises to deliver innovative business models across multiple domains by providing ubiquitous connectivity, intelligent data, predictive analytics, and decision-making systems for improved market performance. However, traditional IIoT architectures are highly susceptible to many security vulnerabilities and network intrusions, which bring challenges such as lack of privacy, integrity, trust, and centralization. This research aims to implement an Artificial Intelligence-based Lightweight Blockchain Security Model (AILBSM) to ensure privacy and security of IIoT systems. This novel model is meant to address issues that can occur with security and privacy when dealing with Cloud-based IIoT systems that handle data in the Cloud or on the Edge of Networks (on-device). The novel contribution of this paper is that it combines the advantages of both lightweight blockchain and Convivial Optimized Sprinter Neural Network (COSNN) based AI mechanisms with simplified and improved security operations. Here, the significant impact of attacks is reduced by transforming features into encoded data using an Authentic Intrinsic Analysis (AIA) model. Extensive experiments are conducted to validate this system using various attack datasets. In addition, the results of privacy protection and AI mechanisms are evaluated separately and compared using various indicators. By using the proposed AILBSM framework, the execution time is minimized to 0.6 seconds, the overall classification accuracy is improved to 99.8%, and detection performance is increased to 99.7%. Due to the inclusion of auto-encoder based transformation and blockchain authentication, the anomaly detection performance of the proposed model is highly improved, when compared to other techniques. The Industrial Internet of Things (IIoT) promises to deliver innovative business models across multiple domains by providing ubiquitous connectivity, intelligent data, predictive analytics, and decision-making systems for improved market performance. However, traditional IIoT architectures are highly susceptible to many security vulnerabilities and network intrusions, which bring challenges such as lack of privacy, integrity, trust, and centralization. This research aims to implement an Artificial Intelligence-based Lightweight Blockchain Security Model (AILBSM) to ensure privacy and security of IIoT systems. This novel model is meant to address issues that can occur with security and privacy when dealing with Cloud-based IIoT systems that handle data in the Cloud or on the Edge of Networks (on-device). The novel contribution of this paper is that it combines the advantages of both lightweight blockchain and Convivial Optimized Sprinter Neural Network (COSNN) based AI mechanisms with simplified and improved security operations. Here, the significant impact of attacks is reduced by transforming features into encoded data using an Authentic Intrinsic Analysis (AIA) model. Extensive experiments are conducted to validate this system using various attack datasets. In addition, the results of privacy protection and AI mechanisms are evaluated separately and compared using various indicators. By using the proposed AILBSM framework, the execution time is minimized to 0.6 seconds, the overall classification accuracy is improved to 99.8%, and detection performance is increased to 99.7%. Due to the inclusion of auto-encoder based transformation and blockchain authentication, the anomaly detection performance of the proposed model is highly improved, when compared to other techniques.The Industrial Internet of Things (IIoT) promises to deliver innovative business models across multiple domains by providing ubiquitous connectivity, intelligent data, predictive analytics, and decision-making systems for improved market performance. However, traditional IIoT architectures are highly susceptible to many security vulnerabilities and network intrusions, which bring challenges such as lack of privacy, integrity, trust, and centralization. This research aims to implement an Artificial Intelligence-based Lightweight Blockchain Security Model (AILBSM) to ensure privacy and security of IIoT systems. This novel model is meant to address issues that can occur with security and privacy when dealing with Cloud-based IIoT systems that handle data in the Cloud or on the Edge of Networks (on-device). The novel contribution of this paper is that it combines the advantages of both lightweight blockchain and Convivial Optimized Sprinter Neural Network (COSNN) based AI mechanisms with simplified and improved security operations. Here, the significant impact of attacks is reduced by transforming features into encoded data using an Authentic Intrinsic Analysis (AIA) model. Extensive experiments are conducted to validate this system using various attack datasets. In addition, the results of privacy protection and AI mechanisms are evaluated separately and compared using various indicators. By using the proposed AILBSM framework, the execution time is minimized to 0.6 seconds, the overall classification accuracy is improved to 99.8%, and detection performance is increased to 99.7%. Due to the inclusion of auto-encoder based transformation and blockchain authentication, the anomaly detection performance of the proposed model is highly improved, when compared to other techniques. The Industrial Internet of Things (IIoT) promises to deliver innovative business models across multiple domains by providing ubiquitous connectivity, intelligent data, predictive analytics, and decision-making systems for improved market performance. However, traditional IIoT architectures are highly susceptible to many security vulnerabilities and network intrusions, which bring challenges such as lack of privacy, integrity, trust, and centralization. This research aims to implement an Artificial Intelligence-based Lightweight Blockchain Security Model (AILBSM) to ensure privacy and security of IIoT systems. This novel model is meant to address issues that can occur with security and privacy when dealing with Cloud-based IIoT systems that handle data in the Cloud or on the Edge of Networks (on-device). The novel contribution of this paper is that it combines the advantages of both lightweight blockchain and Convivial Optimized Sprinter Neural Network (COSNN) based AI mechanisms with simplified and improved security operations. Here, the significant impact of attacks is reduced by transforming features into encoded data using an Authentic Intrinsic Analysis (AIA) model. Extensive experiments are conducted to validate this system using various attack datasets. In addition, the results of privacy protection and AI mechanisms are evaluated separately and compared using various indicators. By using the proposed AILBSM framework, the execution time is minimized to 0.6 seconds, the overall classification accuracy is improved to 99.8%, and detection performance is increased to 99.7%. Due to the inclusion of auto-encoder based transformation and blockchain authentication, the anomaly detection performance of the proposed model is highly improved, when compared to other techniques. |
| ArticleNumber | 38 |
| Author | Alshehri, Ali Selvarajan, Shitharth Srivastava, Gautam Khadidos, Alaa O. Baza, Mohamed Khadidos, Adil O. Lin, Jerry Chun-Wei |
| Author_xml | – sequence: 1 givenname: Shitharth surname: Selvarajan fullname: Selvarajan, Shitharth organization: Department of Computer Science, Kebri Dehar University – sequence: 2 givenname: Gautam surname: Srivastava fullname: Srivastava, Gautam email: srivastavag@brandonu.ca organization: Department of Math and Computer Science, Brandon University, Research Centre for Interneural Computing, China Medical University, Dept. of Computer Science and Math, Lebanese American University – sequence: 3 givenname: Alaa O. surname: Khadidos fullname: Khadidos, Alaa O. organization: Department of Information Systems, Faculty of Computing and Information Technology, King Abdulaziz University – sequence: 4 givenname: Adil O. surname: Khadidos fullname: Khadidos, Adil O. organization: Department of Information Technology, Faculty of Computing and Information Technology, King Abdulaziz University – sequence: 5 givenname: Mohamed surname: Baza fullname: Baza, Mohamed organization: Department of Computer Science, College of Charleston – sequence: 6 givenname: Ali surname: Alshehri fullname: Alshehri, Ali organization: Department of Computer Science, University of Tabuk – sequence: 7 givenname: Jerry Chun-Wei surname: Lin fullname: Lin, Jerry Chun-Wei organization: Department of Computer Science, Electrical Engineering and Mathematical Sciences, Western Norway University of Applied Sciences |
| BackLink | https://www.ncbi.nlm.nih.gov/pubmed/36937654$$D View this record in MEDLINE/PubMed |
| BookMark | eNp9Ustu3SAUtKpUTZrmB7qoLHXTjVteBryqoqiPK0Xq5i66Qxgf7uXWhhTsRP774jhpHotsOOgwMwzDeVsc-eChKN5j9Bljyb8kTLkQFSK0QohhUs2vihOCG1JhTH8fPdofF2cpHRBCGGFCpXhTHFPeUMFrdlK4c1_qODrrjNN96fwIfe924A2Uue7HG1jWsu2D-WP22vkygZmiG-dyCB30pQ3xoaV9V15Fd63NnLXKzSZsyzSnEYb0rnhtdZ_g7K6eFtvv37YXP6vLXz82F-eXleGYjZW0LWtEQ4zEhlloBVjUQQuYUswE0rQWlBnMuGjqtuYIJG9p21hLsK1xTU-LzSrbBX1Q2cug46yCduq2EeJOLe81PShbd5o2tUE5KkYZkojqVkreEMaQAZu1vq5aV1M7QGfAj1H3T0Sfnni3V7twrXAOW3C-uPl0pxDD3wnSqAaXTI5YewhTUkRIKVG-rsnQj8-ghzBFn6NaUAI1jFCRUR8eW_rv5f5HM0CuABNDShGsMm7UowuLQ9dna2qZH7XOj8rzo27nR82ZSp5R79VfJNGVlDLY7yA-2H6B9Q-dZtjm |
| CitedBy_id | crossref_primary_10_1371_journal_pone_0291596 crossref_primary_10_1007_s11063_025_11772_8 crossref_primary_10_1016_j_heliyon_2023_e21887 crossref_primary_10_36660_abchf_20230031 crossref_primary_10_1038_s41598_025_05257_w crossref_primary_10_3390_s25010213 crossref_primary_10_1016_j_future_2024_01_001 crossref_primary_10_1016_j_heliyon_2024_e41617 crossref_primary_10_1002_cpe_8231 crossref_primary_10_1007_s10115_025_02513_3 crossref_primary_10_3390_electronics12183800 crossref_primary_10_3389_fnut_2025_1636980 crossref_primary_10_1007_s13198_025_02794_5 crossref_primary_10_3390_s24103111 crossref_primary_10_1038_s41598_025_01290_x crossref_primary_10_1038_s41598_023_42257_0 crossref_primary_10_1080_19393555_2025_2510975 crossref_primary_10_3390_s25165181 crossref_primary_10_1108_JHTI_04_2024_0316 crossref_primary_10_1109_JIOT_2024_3448212 crossref_primary_10_1109_ACCESS_2024_3454812 crossref_primary_10_1142_S2010324724400149 crossref_primary_10_1007_s11277_023_10731_7 crossref_primary_10_1016_j_iot_2023_100851 crossref_primary_10_1007_s10586_024_04481_9 crossref_primary_10_1109_TCE_2025_3571956 crossref_primary_10_1007_s10586_024_04422_6 crossref_primary_10_1007_s12083_025_02024_6 crossref_primary_10_1016_j_comnet_2023_109837 crossref_primary_10_1007_s11042_024_19150_7 crossref_primary_10_1007_s10586_024_04449_9 crossref_primary_10_1002_ett_70243 crossref_primary_10_1007_s40860_025_00254_2 crossref_primary_10_1007_s10586_024_04429_z crossref_primary_10_1109_ACCESS_2023_3298024 crossref_primary_10_1038_s41598_025_12027_1 crossref_primary_10_3390_s24031035 crossref_primary_10_1016_j_sysarc_2025_103329 crossref_primary_10_1016_j_suscom_2025_101127 crossref_primary_10_1109_ACCESS_2023_3318755 crossref_primary_10_3390_app15126835 crossref_primary_10_1002_ima_22925 crossref_primary_10_1109_JIOT_2024_3507746 crossref_primary_10_3390_su151612193 crossref_primary_10_3390_a18050263 crossref_primary_10_3390_electronics12173618 crossref_primary_10_1007_s10207_023_00748_1 crossref_primary_10_1109_ACCESS_2024_3471688 crossref_primary_10_1016_j_phycom_2024_102340 crossref_primary_10_1109_ACCESS_2025_3561677 crossref_primary_10_1109_ACCESS_2023_3349019 crossref_primary_10_1038_s41598_023_46746_0 crossref_primary_10_1007_s11760_024_03125_0 crossref_primary_10_1109_ACCESS_2024_3366492 crossref_primary_10_3390_s24237440 crossref_primary_10_1016_j_vehcom_2024_100864 crossref_primary_10_1038_s41598_024_51154_z crossref_primary_10_1109_ACCESS_2024_3363469 crossref_primary_10_1038_s41598_025_06807_y crossref_primary_10_1108_IDD_11_2024_0185 crossref_primary_10_1007_s10462_024_10908_x crossref_primary_10_1007_s12083_025_01953_6 crossref_primary_10_1109_JSEN_2023_3305716 crossref_primary_10_1038_s41598_024_75994_x crossref_primary_10_1371_journal_pone_0290694 crossref_primary_10_3390_pr13072237 crossref_primary_10_3390_fi16080273 crossref_primary_10_1016_j_eswa_2024_124479 crossref_primary_10_1038_s41598_023_34354_x crossref_primary_10_1371_journal_pone_0298534 crossref_primary_10_3389_fcomp_2024_1477501 crossref_primary_10_1007_s00607_023_01236_z crossref_primary_10_1007_s11277_024_11694_z crossref_primary_10_1016_j_comnet_2025_111484 crossref_primary_10_7717_peerj_cs_2211 crossref_primary_10_1007_s43926_025_00129_1 crossref_primary_10_1145_3769090 |
| Cites_doi | 10.1016/j.adhoc.2021.102526 10.3390/en15103624 10.1016/j.ipm.2022.103155 10.1109/ACCESS.2022.3171660 10.34028/iajit/19/5/14 10.3390/machines10100858 10.24846/v30i2y202111 10.3390/s21041467 10.1109/TII.2021.3095466 10.1109/ACCESS.2022.3165809 10.1016/j.jisa.2022.103404 10.1109/JIOT.2021.3125190 10.3390/app11209393 10.3390/s21155122 10.3390/jsan11040071 10.1049/iet-ifs.2019.0011 10.1109/MITP.2020.3031358 10.1109/ACCESS.2021.3063671 10.1016/j.iot.2021.100365 10.1109/TII.2021.3097131 10.1109/TII.2022.3140792 10.3390/s21196647 10.1016/j.procs.2021.04.014 10.1109/TII.2021.3084753 10.1016/j.jpdc.2022.01.015 10.4018/978-1-6684-7132-6.ch016 10.1109/IWCMC55113.2022.9824557 10.1002/ett.4137 10.1002/ett.4337 10.1007/978-981-19-6290-5_3 10.12691/jcsa-9-1-2 10.1007/s10586-022-03645-9 |
| ContentType | Journal Article |
| Copyright | The Author(s) 2023 The Author(s) 2023. The Author(s) 2023. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| Copyright_xml | – notice: The Author(s) 2023 – notice: The Author(s) 2023. – notice: The Author(s) 2023. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| DBID | C6C AAYXX CITATION NPM 3V. 7RQ 7SC 7X5 7XB 8AL 8FD 8FE 8FG 8FK 8G5 ABUWG AFKRA ARAPS AZQEC BENPR BEZIV BGLVJ CCPQU DWQXO GNUQQ GUQSH HCIFZ JQ2 K6~ K7- L7M L~C L~D M0N M2O MBDVC P62 PADUT PHGZM PHGZT PIMPY PKEHL PQEST PQGLB PQQKQ PQUKI Q9U U9A 7X8 5PM DOA |
| DOI | 10.1186/s13677-023-00412-y |
| DatabaseName | Springer Nature OA Free Journals CrossRef PubMed ProQuest Central (Corporate) Career & Technical Education Database Computer and Information Systems Abstracts Proquest Entrepreneurship ProQuest Central (purchase pre-March 2016) Computing Database (Alumni Edition) Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) (purchase pre-March 2016) Research Library (Alumni Edition) ProQuest Central (Alumni) ProQuest Central UK/Ireland Health Research Premium Collection ProQuest Central Essentials Local Electronic Collection Information ProQuest Central Business Premium Collection Technology collection ProQuest One Community College ProQuest Central ProQuest Central Student Research Library Prep SciTech Premium Collection ProQuest Computer Science Collection ProQuest Business Collection Computer Science Database Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional Computing Database Research Library Research Library (Corporate) ProQuest Advanced Technologies & Aerospace Collection Research Library China ProQuest Central Premium ProQuest One Academic Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) One Applied & Life Sciences ProQuest One Academic (retired) ProQuest One Academic UKI Edition ProQuest Central Basic MEDLINE - Academic PubMed Central (Full Participant titles) DOAJ Directory of Open Access Journals |
| DatabaseTitle | CrossRef PubMed Publicly Available Content Database Research Library Prep Computer Science Database ProQuest Central Student Technology Collection Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection Computer and Information Systems Abstracts ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College Research Library (Alumni Edition) ProQuest Central ProQuest One Applied & Life Sciences ProQuest Central Korea ProQuest Research Library ProQuest Central (New) Research Library China Advanced Technologies Database with Aerospace Career and Technical Education (Alumni Edition) ProQuest Entrepreneurship Advanced Technologies & Aerospace Collection Business Premium Collection ProQuest Computing ProQuest Central Basic ProQuest Computing (Alumni Edition) ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection ProQuest Business Collection Computer and Information Systems Abstracts Professional ProQuest Career and Technical Education ProQuest One Academic UKI Edition ProQuest One Academic ProQuest One Academic (New) ProQuest Central (Alumni) MEDLINE - Academic |
| DatabaseTitleList | CrossRef PubMed MEDLINE - Academic Publicly Available Content Database |
| Database_xml | – sequence: 1 dbid: DOA name: Directory of Open Access Journals (DOAJ) url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: NPM name: PubMed url: http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed sourceTypes: Index Database – sequence: 3 dbid: 7RQ name: Career & Technical Education Database url: https://search.proquest.com/career sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 2192-113X |
| EndPage | 17 |
| ExternalDocumentID | oai_doaj_org_article_f5da395c02194340803ab88692440cef PMC10017665 36937654 10_1186_s13677_023_00412_y |
| Genre | Journal Article |
| GrantInformation_xml | – fundername: Natural Sciences and Engineering Research Council of Canada grantid: RGPIN-2020-05363 funderid: http://dx.doi.org/10.13039/501100000038 – fundername: ; grantid: RGPIN-2020-05363 |
| GroupedDBID | -A0 0R~ 3V. 40G 5VS 7RQ 8FE 8FG 8G5 AAFWJ AAJSJ AAKKN ABEEZ ABFTD ABUWG ACACY ACGFS ACULB ADBBV ADINQ AFGXO AFKRA AFPKN AHBYD AHYZX ALMA_UNASSIGNED_HOLDINGS AMKLP ARAPS AZQEC BCNDV BENPR BGLVJ BPHCQ C24 C6C CCPQU DWQXO EBLON EBS GNUQQ GROUPED_DOAJ GUQSH HCIFZ HZ~ IAO ISR ITC K6V K7- KQ8 M0N M2O M~E O9- OK1 PADUT PIMPY PQQKQ PROAC RNS RSV SCO SOJ AASML AAYXX CITATION ICD IVC 2VQ AHSBF EJD NPM PHGZM PHGZT PQGLB 7SC 7X5 7XB 8AL 8FD 8FK BEZIV JQ2 K6~ L7M L~C L~D MBDVC P62 PKEHL PQEST PQUKI Q9U U9A 7X8 5PM |
| ID | FETCH-LOGICAL-c614t-8fb49792c81c4feb7ef0debe1331470a35734c146795b560e86b3b9ff21f5153 |
| IEDL.DBID | DOA |
| ISICitedReferencesCount | 91 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000949343900001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 2192-113X |
| IngestDate | Tue Oct 14 14:59:51 EDT 2025 Tue Nov 04 02:07:06 EST 2025 Sun Nov 09 12:58:32 EST 2025 Wed Oct 15 14:30:51 EDT 2025 Mon Jul 21 05:32:59 EDT 2025 Sat Nov 29 01:40:29 EST 2025 Tue Nov 18 22:18:40 EST 2025 Fri Feb 21 02:45:02 EST 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 1 |
| Keywords | Fog computing Cloud computing Security Convivial Optimized Sprinter Neural Network Artificial intelligence Blockchain |
| Language | English |
| License | The Author(s) 2023. Open AccessThis article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/. |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c614t-8fb49792c81c4feb7ef0debe1331470a35734c146795b560e86b3b9ff21f5153 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 content type line 23 |
| OpenAccessLink | https://doaj.org/article/f5da395c02194340803ab88692440cef |
| PMID | 36937654 |
| PQID | 2787094237 |
| PQPubID | 2034894 |
| PageCount | 17 |
| ParticipantIDs | doaj_primary_oai_doaj_org_article_f5da395c02194340803ab88692440cef pubmedcentral_primary_oai_pubmedcentral_nih_gov_10017665 proquest_miscellaneous_2788804409 proquest_journals_2787094237 pubmed_primary_36937654 crossref_citationtrail_10_1186_s13677_023_00412_y crossref_primary_10_1186_s13677_023_00412_y springer_journals_10_1186_s13677_023_00412_y |
| PublicationCentury | 2000 |
| PublicationDate | 2023-12-01 |
| PublicationDateYYYYMMDD | 2023-12-01 |
| PublicationDate_xml | – month: 12 year: 2023 text: 2023-12-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationPlace | Berlin/Heidelberg |
| PublicationPlace_xml | – name: Berlin/Heidelberg – name: Germany – name: Heidelberg |
| PublicationSubtitle | Advances, Systems and Applications |
| PublicationTitle | Journal of cloud computing : advances, systems and applications |
| PublicationTitleAbbrev | J Cloud Comp |
| PublicationTitleAlternate | J Cloud Comput (Heidelb) |
| PublicationYear | 2023 |
| Publisher | Springer Berlin Heidelberg Springer Nature B.V SpringerOpen |
| Publisher_xml | – name: Springer Berlin Heidelberg – name: Springer Nature B.V – name: SpringerOpen |
| References | Bangui, Buhnova (CR26) 2021; 184 Leng, Chen, Huang, Zhu, Su, Lin, Zhang (CR12) 2022; 10 Ferrag, Friha, Hamouda, Maglaras, Janicke (CR5) 2022; 10 Farooq, Tariq, Asim, Baker, Al-Shamma’a (CR21) 2022; 162 Golec, Ozturac, Pooranian, Gill, Buyya (CR16) 2021; 18 Khadidos, Manoharan, Selvarajan, Khadidos, Alyoubi, Yafoz (CR11) 2022; 15 Latif, Idrees, e Huma, Ahmad (CR13) 2021; 32 Wang, Wei, Zhang, Yu, Sharma (CR9) 2021; 119 Yu, Tan, Yang, Choo, Bashir, Rodrigues, Sato (CR8) 2021; 9 CR17 Qamar, Zardari (CR35) 2023; 4 CR38 Pal, Jadidi (CR4) 2021; 11 CR37 Selvarajan, Shaik, Ameerjohn, Kannan (CR40) 2020; 14 CR33 Shahbazi, Byun (CR23) 2021; 21 CR31 Banerjee, Roy, Odelu, Das, Chattopadhyay, Rodrigues, Park (CR18) 2020; 53 Saba, Haseeb, Shah, Rehman, Tariq, Mehmood (CR20) 2021; 23 Sharma, Pant, Kumar Sharma, Datta Gupta, Vashishth, Chhabra (CR10) 2021; 32 Hewa, Braeken, Liyanage, Ylianttila (CR30) 2022; 18 Martinez-Rendon, González-Compeán, Sánchez-Gallegos, Carretero (CR34) 2023; 60 Javanmardi, Shojafar, Mohammadi, Persico, Pescapè (CR32) 2023; 72 Ali, Wang, Riaz, Rafique (CR1) 2022; 12 Maseleno, Abdullah, Satria, Souisa, Rahim (CR27) 2021 Istiaque Ahmed, Tahir, Hadi Habaebi, Lun Lau, Ahad (CR22) 2021; 21 Alsarhan, Alauthman, Alshdaifat, Al-Ghuwairi, Al-Dubai (CR25) 2021; 24 Rathee, Kerrache, Ferrag (CR29) 2022; 11 Shin, Yu, Bae, Chang (CR6) 2022; 12 Tian, Li, Xiong, Bhuiyan, Ma, Peng (CR15) 2021; 18 Guezzaz, Benkirane, Mohyeddine, Attou, Douiba (CR7) 2022; 19 Wang, Xu, Alazab, Gadekallu, Han, Su (CR14) 2021; 18 Tan, Samsudin (CR3) 2021; 21 Jia, Jia, Kong, Lin, Qi (CR2) 2022; 12 Ahmad, Alsmadi (CR19) 2021; 14 Shitharth, Kshirsagar, Balachandran, Alyoubi, Khadidos (CR39) 2022; 10 Duraisamy, Subramaniam, Robin (CR24) 2021; 30 Liu, Yang, Lian, Li (CR28) 2021; 9 Mittal, Tripathi, Pandey, Venu, Menon, Pal (CR36) 2022; 18 U Farooq (412_CR21) 2022; 162 S Ali (412_CR1) 2022; 12 AO Khadidos (412_CR11) 2022; 15 J Leng (412_CR12) 2022; 10 K Istiaque Ahmed (412_CR22) 2021; 21 M Golec (412_CR16) 2021; 18 412_CR33 412_CR17 412_CR38 412_CR37 C Jia (412_CR2) 2022; 12 412_CR31 S Banerjee (412_CR18) 2020; 53 C Martinez-Rendon (412_CR34) 2023; 60 T Saba (412_CR20) 2021; 23 S Selvarajan (412_CR40) 2020; 14 J Wang (412_CR9) 2021; 119 G Rathee (412_CR29) 2022; 11 Y Tian (412_CR15) 2021; 18 E Shin (412_CR6) 2022; 12 S Javanmardi (412_CR32) 2023; 72 S Pal (412_CR4) 2021; 11 W Wang (412_CR14) 2021; 18 R Ahmad (412_CR19) 2021; 14 A Maseleno (412_CR27) 2021 T Hewa (412_CR30) 2022; 18 A Guezzaz (412_CR7) 2022; 19 S Shitharth (412_CR39) 2022; 10 A Duraisamy (412_CR24) 2021; 30 H Bangui (412_CR26) 2021; 184 M Sharma (412_CR10) 2021; 32 R Qamar (412_CR35) 2023; 4 H Mittal (412_CR36) 2022; 18 J Liu (412_CR28) 2021; 9 A Alsarhan (412_CR25) 2021; 24 K Yu (412_CR8) 2021; 9 S Latif (412_CR13) 2021; 32 Z Shahbazi (412_CR23) 2021; 21 SF Tan (412_CR3) 2021; 21 MA Ferrag (412_CR5) 2022; 10 |
| References_xml | – volume: 119 start-page: 102526 year: 2021 ident: CR9 article-title: An optimized transaction verification method for trustworthy blockchain-enabled iiot publication-title: Ad Hoc Netw doi: 10.1016/j.adhoc.2021.102526 – volume: 15 start-page: 3624 issue: 10 year: 2022 ident: CR11 article-title: A classy multifacet clustering and fused optimization based classification methodologies for scada security publication-title: Energies doi: 10.3390/en15103624 – volume: 60 start-page: 103155 issue: 1 year: 2023 ident: CR34 article-title: Cd/cv: Blockchain-based schemes for continuous verifiability and traceability of iot data for edge-fog-cloud publication-title: Inf Process Manag doi: 10.1016/j.ipm.2022.103155 – volume: 10 start-page: 46424 year: 2022 end-page: 46441 ident: CR39 article-title: An innovative perceptual pigeon galvanized optimization (ppgo) based likelihood naïve bayes (lnb) classification approach for network intrusion detection system publication-title: IEEE Access doi: 10.1109/ACCESS.2022.3171660 – volume: 12 start-page: 1 year: 2022 end-page: 15 ident: CR2 article-title: Privacy-aware retrieval of electronic medical records by fuzzy keyword search publication-title: Hum Centric Comput Inf Sci – volume: 12 start-page: 1 year: 2022 end-page: 3 ident: CR6 article-title: The Impact of Enterprise Security Performance on Business Performance in Industrial Convergence Environment publication-title: Human-centric Computing and Information Sciences – volume: 19 start-page: 1 issue: 5 year: 2022 end-page: 9 ident: CR7 article-title: A lightweight hybrid intrusion detection framework using machine learning for edge-based iiot security publication-title: Int Arab J Inform Technol doi: 10.34028/iajit/19/5/14 – volume: 10 start-page: 858 year: 2022 ident: CR12 article-title: Secure blockchain middleware for decentralized iiot towards industry 5.0: A review of architecture, enablers, challenges, and directions publication-title: Machines doi: 10.3390/machines10100858 – volume: 30 start-page: 121 issue: 2 year: 2021 end-page: 131 ident: CR24 article-title: An optimized deep learning based security enhancement and attack detection on iot using ids and kh-aes for smart cities publication-title: Stud Inf Control doi: 10.24846/v30i2y202111 – volume: 21 start-page: 1467 issue: 4 year: 2021 ident: CR23 article-title: Integration of blockchain, iot and machine learning for multistage quality control and enhancing security in smart manufacturing publication-title: Sensors doi: 10.3390/s21041467 – ident: CR37 – volume: 18 start-page: 3522 issue: 5 year: 2021 end-page: 3529 ident: CR16 article-title: ifaasbus: A security-and privacy-based lightweight framework for serverless computing using iot and machine learning publication-title: IEEE Trans Ind Inf doi: 10.1109/TII.2021.3095466 – ident: CR33 – volume: 10 start-page: 40281 year: 2022 end-page: 40306 ident: CR5 article-title: Edge-iiotset: A new comprehensive realistic cyber security dataset of iot and iiot applications for centralized and federated learning publication-title: IEEE Access doi: 10.1109/ACCESS.2022.3165809 – volume: 72 start-page: 103404 year: 2023 ident: CR32 article-title: S-fos: A secure workflow scheduling approach for performance optimization in sdn-based iot-fog networks publication-title: Journal of Information Security and Applications doi: 10.1016/j.jisa.2022.103404 – volume: 9 start-page: 8154 issue: 11 year: 2021 end-page: 67 ident: CR8 article-title: A blockchain-based shamir’s threshold cryptography scheme for data protection in industrial internet of things settings publication-title: IEEE Internet of Things Journal doi: 10.1109/JIOT.2021.3125190 – volume: 11 start-page: 9393 issue: 20 year: 2021 ident: CR4 article-title: Analysis of security issues and countermeasures for the industrial internet of things publication-title: Appl Sci doi: 10.3390/app11209393 – volume: 21 start-page: 5122 issue: 15 year: 2021 ident: CR22 article-title: Machine learning for authentication and authorization in iot: Taxonomy, challenges and future research direction publication-title: Sensors doi: 10.3390/s21155122 – volume: 11 start-page: 71 issue: 4 year: 2022 ident: CR29 article-title: A blockchain-based intrusion detection system using viterbi algorithm and indirect trust for iiot systems publication-title: J Sens Actuator Netw doi: 10.3390/jsan11040071 – volume: 14 start-page: 1 issue: 1 year: 2020 end-page: 11 ident: CR40 article-title: Mining of intrusion attack in scada network using clustering and genetically seeded flora-based optimal classification algorithm publication-title: IET Inf Secur doi: 10.1049/iet-ifs.2019.0011 – volume: 53 start-page: 102503 year: 2020 ident: CR18 article-title: Multi-authority cp-abe-based user access control scheme with constant-size key and ciphertext for iot deployment publication-title: J Inf Secur Appl – volume: 23 start-page: 69 issue: 3 year: 2021 end-page: 75 ident: CR20 article-title: A machine-learning-based approach for autonomous iot security publication-title: IT Prof doi: 10.1109/MITP.2020.3031358 – volume: 9 start-page: 38254 year: 2021 end-page: 38268 ident: CR28 article-title: Research on intrusion detection based on particle swarm optimization in iot publication-title: IEEE Access doi: 10.1109/ACCESS.2021.3063671 – ident: CR38 – volume: 14 start-page: 100365 year: 2021 ident: CR19 article-title: Machine learning approaches to iot security: A systematic literature review publication-title: Internet of Things doi: 10.1016/j.iot.2021.100365 – ident: CR17 – ident: CR31 – volume: 18 start-page: 1918 issue: 3 year: 2021 end-page: 1929 ident: CR15 article-title: A blockchain-based machine learning framework for edge services in iiot publication-title: IEEE Trans Ind Inf doi: 10.1109/TII.2021.3097131 – volume: 18 start-page: 7174 issue: 10 year: 2022 end-page: 7185 ident: CR30 article-title: Fog computing and blockchain-based security service architecture for 5g industrial iot-enabled cloud manufacturing publication-title: IEEE Trans Ind Inf doi: 10.1109/TII.2022.3140792 – volume: 18 start-page: 1 year: 2022 end-page: 3 ident: CR36 article-title: A novel fuzzy clustering-based method for human activity recognition in cloud-based industrial IoT environment publication-title: Wireless Networks – volume: 32 start-page: e4137 issue: 7 year: 2021 ident: CR10 article-title: Enabling security for the industrial internet of things using deep learning, blockchain, and coalitions publication-title: Trans Emerg Telecommun Technol – volume: 24 start-page: 1 year: 2021 end-page: 0 ident: CR25 article-title: Machine Learning-driven optimization for SVM-based intrusion detection system in vehicular ad hoc networks publication-title: Journal of Ambient Intelligence and Humanized Computing – volume: 12 start-page: 1 year: 2022 end-page: 5 ident: CR1 article-title: Preserving the Privacy of Dependent Tuples Using Enhanced Differential Privacy publication-title: Human-centric Comput Informat Sci – volume: 21 start-page: 6647 issue: 19 year: 2021 ident: CR3 article-title: Recent technologies, security countermeasure and ongoing challenges of industrial internet of things (iiot): A survey publication-title: Sensors doi: 10.3390/s21196647 – volume: 184 start-page: 877 year: 2021 end-page: 886 ident: CR26 article-title: Recent advances in machine-learning driven intrusion detection in transportation: survey publication-title: Procedia Comput Sci doi: 10.1016/j.procs.2021.04.014 – volume: 32 start-page: e4337 issue: 11 year: 2021 ident: CR13 article-title: Blockchain technology for the industrial internet of things: A comprehensive survey on security challenges, architectures, applications, and future research directions publication-title: Trans Emerg Telecommun Technol – start-page: 119 year: 2021 end-page: 133 ident: CR27 publication-title: An Intelligent Intrusion Detection for Smart Cities Application Based on Random Optimization with Recurrent Network – volume: 18 start-page: 7059 issue: 10 year: 2021 end-page: 67 ident: CR14 article-title: Blockchain-based reliable and efficient certificateless signature for IIoT devices publication-title: IEEE transactions on industrial informatics doi: 10.1109/TII.2021.3084753 – volume: 4 start-page: 15 issue: 1 year: 2023 end-page: 23 ident: CR35 article-title: A study of blockchain-based internet of things publication-title: Iraqi J Comput Sci Math – volume: 162 start-page: 89 year: 2022 end-page: 104 ident: CR21 article-title: Machine learning and the internet of things security: Solutions and open challenges publication-title: J Parallel Distrib Comput doi: 10.1016/j.jpdc.2022.01.015 – volume: 18 start-page: 7174 issue: 10 year: 2022 ident: 412_CR30 publication-title: IEEE Trans Ind Inf doi: 10.1109/TII.2022.3140792 – ident: 412_CR31 doi: 10.4018/978-1-6684-7132-6.ch016 – volume: 60 start-page: 103155 issue: 1 year: 2023 ident: 412_CR34 publication-title: Inf Process Manag doi: 10.1016/j.ipm.2022.103155 – volume: 53 start-page: 102503 year: 2020 ident: 412_CR18 publication-title: J Inf Secur Appl – volume: 10 start-page: 46424 year: 2022 ident: 412_CR39 publication-title: IEEE Access doi: 10.1109/ACCESS.2022.3171660 – volume: 14 start-page: 100365 year: 2021 ident: 412_CR19 publication-title: Internet of Things doi: 10.1016/j.iot.2021.100365 – volume: 4 start-page: 15 issue: 1 year: 2023 ident: 412_CR35 publication-title: Iraqi J Comput Sci Math – volume: 11 start-page: 9393 issue: 20 year: 2021 ident: 412_CR4 publication-title: Appl Sci doi: 10.3390/app11209393 – volume: 30 start-page: 121 issue: 2 year: 2021 ident: 412_CR24 publication-title: Stud Inf Control doi: 10.24846/v30i2y202111 – ident: 412_CR37 doi: 10.1109/IWCMC55113.2022.9824557 – volume: 23 start-page: 69 issue: 3 year: 2021 ident: 412_CR20 publication-title: IT Prof doi: 10.1109/MITP.2020.3031358 – volume: 32 start-page: e4137 issue: 7 year: 2021 ident: 412_CR10 publication-title: Trans Emerg Telecommun Technol doi: 10.1002/ett.4137 – volume: 184 start-page: 877 year: 2021 ident: 412_CR26 publication-title: Procedia Comput Sci doi: 10.1016/j.procs.2021.04.014 – volume: 9 start-page: 8154 issue: 11 year: 2021 ident: 412_CR8 publication-title: IEEE Internet of Things Journal doi: 10.1109/JIOT.2021.3125190 – volume: 32 start-page: e4337 issue: 11 year: 2021 ident: 412_CR13 publication-title: Trans Emerg Telecommun Technol doi: 10.1002/ett.4337 – start-page: 119 volume-title: An Intelligent Intrusion Detection for Smart Cities Application Based on Random Optimization with Recurrent Network year: 2021 ident: 412_CR27 – volume: 72 start-page: 103404 year: 2023 ident: 412_CR32 publication-title: Journal of Information Security and Applications doi: 10.1016/j.jisa.2022.103404 – volume: 21 start-page: 6647 issue: 19 year: 2021 ident: 412_CR3 publication-title: Sensors doi: 10.3390/s21196647 – ident: 412_CR33 doi: 10.1007/978-981-19-6290-5_3 – volume: 19 start-page: 1 issue: 5 year: 2022 ident: 412_CR7 publication-title: Int Arab J Inform Technol doi: 10.34028/iajit/19/5/14 – volume: 15 start-page: 3624 issue: 10 year: 2022 ident: 412_CR11 publication-title: Energies doi: 10.3390/en15103624 – volume: 18 start-page: 7059 issue: 10 year: 2021 ident: 412_CR14 publication-title: IEEE transactions on industrial informatics doi: 10.1109/TII.2021.3084753 – volume: 9 start-page: 38254 year: 2021 ident: 412_CR28 publication-title: IEEE Access doi: 10.1109/ACCESS.2021.3063671 – volume: 10 start-page: 40281 year: 2022 ident: 412_CR5 publication-title: IEEE Access doi: 10.1109/ACCESS.2022.3165809 – volume: 21 start-page: 1467 issue: 4 year: 2021 ident: 412_CR23 publication-title: Sensors doi: 10.3390/s21041467 – volume: 162 start-page: 89 year: 2022 ident: 412_CR21 publication-title: J Parallel Distrib Comput doi: 10.1016/j.jpdc.2022.01.015 – volume: 24 start-page: 1 year: 2021 ident: 412_CR25 publication-title: Journal of Ambient Intelligence and Humanized Computing – ident: 412_CR17 doi: 10.12691/jcsa-9-1-2 – volume: 21 start-page: 5122 issue: 15 year: 2021 ident: 412_CR22 publication-title: Sensors doi: 10.3390/s21155122 – volume: 12 start-page: 1 year: 2022 ident: 412_CR2 publication-title: Hum Centric Comput Inf Sci – ident: 412_CR38 doi: 10.1007/s10586-022-03645-9 – volume: 14 start-page: 1 issue: 1 year: 2020 ident: 412_CR40 publication-title: IET Inf Secur doi: 10.1049/iet-ifs.2019.0011 – volume: 18 start-page: 1 year: 2022 ident: 412_CR36 publication-title: Wireless Networks – volume: 11 start-page: 71 issue: 4 year: 2022 ident: 412_CR29 publication-title: J Sens Actuator Netw doi: 10.3390/jsan11040071 – volume: 12 start-page: 1 year: 2022 ident: 412_CR6 publication-title: Human-centric Computing and Information Sciences – volume: 12 start-page: 1 year: 2022 ident: 412_CR1 publication-title: Human-centric Comput Informat Sci – volume: 18 start-page: 1918 issue: 3 year: 2021 ident: 412_CR15 publication-title: IEEE Trans Ind Inf doi: 10.1109/TII.2021.3097131 – volume: 18 start-page: 3522 issue: 5 year: 2021 ident: 412_CR16 publication-title: IEEE Trans Ind Inf doi: 10.1109/TII.2021.3095466 – volume: 119 start-page: 102526 year: 2021 ident: 412_CR9 publication-title: Ad Hoc Netw doi: 10.1016/j.adhoc.2021.102526 – volume: 10 start-page: 858 year: 2022 ident: 412_CR12 publication-title: Machines doi: 10.3390/machines10100858 |
| SSID | ssj0001012387 |
| Score | 2.6054175 |
| Snippet | The Industrial Internet of Things (IIoT) promises to deliver innovative business models across multiple domains by providing ubiquitous connectivity,... Abstract The Industrial Internet of Things (IIoT) promises to deliver innovative business models across multiple domains by providing ubiquitous connectivity,... |
| SourceID | doaj pubmedcentral proquest pubmed crossref springer |
| SourceType | Open Website Open Access Repository Aggregation Database Index Database Enrichment Source Publisher |
| StartPage | 38 |
| SubjectTerms | Algorithms for Secure Smart Services Anomalies Artificial intelligence Blockchain Cloud computing Coders Computer Communication Networks Computer Science Computer System Implementation Computer Systems Organization and Communication Networks Convivial Optimized Sprinter Neural Network Cryptography Cybersecurity Decision analysis Decision making Fog computing Industrial applications Industrial Internet of Things Information Systems Applications (incl.Internet) Intelligence in the Edge-Cloud: Theories Lightweight Modelling Neural networks Privacy Security Software Engineering/Programming and Operating Systems Special Purpose and Application-Based Systems |
| SummonAdditionalLinks | – databaseName: Career & Technical Education Database dbid: 7RQ link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1Jb9QwFH6CwoELZSdQkJG4gdUsXk-oICoqoQrQHHqzYsemI6qkTKZF8-95dpIZhqUXrrYT2Xnb52fnewAvufKcFU2gMleWssByagvpKbeF8I3QvHGJMv-jPD5WJyf605hw68drlZNPTI666VzMke-XUbN0vMTx5vw7jVWj4unqWELjOtzAQC2inssvnzc5lggYlJz-lVFiv48MZZJioKKJaYqutuJRou3_G9b888rkb-emKRwd7v7vQu7A7RGIkoNBc-7CNd_eg92pyAMZbf4-zA9aEtVrYJog818oPMlZ3Nn_SMlVYjEqfnOn9bwl_VgTj6QyOwRh8aapbhuCS7qs3QrfRY6OuhkZ2KT7BzA7fD9794GO9Rmow6C-pCpYpqUunSocC95KH_IGlQK3vQWTeV1xWTEXXbHmFpGVV8JWVodQFgFhVPUQdtqu9Y-B5NxpwWoVGlEzxZtaYgixkVzQl3koRQbFJCTjRu7yWELjzKQ9jBJmEKxBwZokWLPK4NX6mfOBuePK0W-j7NcjI-t2augWX81oxCbgzCrNHeKiSKuHYLuqrVIC97Asdz5ksDeJ3IyuoDcbeWfwYt2NRhxPZurWdxdpDPpRfInO4NGgaOuZVAIRpOAsA7WlgltT3e5p56eJKDzya0kheAavJ23dzOvf3-LJ1ct4CrfKaEDpTs8e7CwXF_4Z3HSXy3m_eJ4s8CdJ5zly priority: 102 providerName: ProQuest – databaseName: SpringerOpen dbid: C24 link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9QwEB5B4cCFlnegRUbiBhZ5-HksFVUroYrDHnqzYsemEVUWbbat9t937CRblhYkuPqlkT3j-WyPvwF4z5XnrGgClbmylAWWU1tIT7kthG-E5o1LlPlf5cmJOj3V38ZPYf0U7T49SaadOpm1Ep_6SC4mKfoYmkii6Oo-POCF0jGQ72D845BuViJMUHL6IXNn1w0vlMj670KYtwMlf3stTU7ocPv_xN-BxyPoJPuDljyBe757CttTQgcy2vczaPc7ElVpYJUg7S90neQ8nuKv0kUqsegBf7izuu1IP-a_IymlDkEIfFNUdw1BIS9rt8KxyPHxfEYG5uj-OcwOv8wOjuiYi4E6dOBLqoJlWurSqcKx4K30IW9QAfCIWzCZ1xWXFXNx29XcIoryStjK6hDKIiBkql7AVjfv_CsgOXdasFqFRtRM8aaW6C5sJBL0ZR5KkUExLY1xI095TJdxbtJ5RQkzTKXBqTRpKs0qgw_rPj8Hlo6_tv4cV3zdMjJsp4L54rsZDdYElKzS3CEGihR6CKyr2iol8LzKcudDBruTvpjR7HtTxu1Px0ijDN6tq9Fg4ytM3fn5RWqDeyYOojN4OajXWpJKIFoUnGWgNhRvQ9TNmq49S6TgkUtLCsEz-Djp341cf56L1__W_A08KqMKp3ieXdhaLi78Hjx0l8u2X7xNdngNcJIvgw priority: 102 providerName: Springer Nature |
| Title | An artificial intelligence lightweight blockchain security model for security and privacy in IIoT systems |
| URI | https://link.springer.com/article/10.1186/s13677-023-00412-y https://www.ncbi.nlm.nih.gov/pubmed/36937654 https://www.proquest.com/docview/2787094237 https://www.proquest.com/docview/2788804409 https://pubmed.ncbi.nlm.nih.gov/PMC10017665 https://doaj.org/article/f5da395c02194340803ab88692440cef |
| Volume | 12 |
| WOSCitedRecordID | wos000949343900001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAON databaseName: Directory of Open Access Journals (DOAJ) customDbUrl: eissn: 2192-113X dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0001012387 issn: 2192-113X databaseCode: DOA dateStart: 20120101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 2192-113X dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0001012387 issn: 2192-113X databaseCode: M~E dateStart: 20120101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre – providerCode: PRVAVX databaseName: SpringerOpen customDbUrl: eissn: 2192-113X dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0001012387 issn: 2192-113X databaseCode: C24 dateStart: 20121201 isFulltext: true titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22 providerName: Springer Nature |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3Lb9MwGP8EgwMX3ozAqIzEDazl4edxmzZRwUqZeiinKHZsLWJK0doN9b_ns5N2Lc8LF0uxHeuLv3fi_D6AN1w5zrLaU5kqQ5lnKTWZdJSbTLhaaF7bCJn_UY5GajrV441SX-FMWAcP3G3cvud1VWhu0RcFKDMMcIrKKCUwb2CpdT5Y31TqjWQqvl0JoYKSq79klNifB2wySdFF0YgxRZdbnigC9v8uyvz1sORPX0yjIzp5CPf7CJIcdJQ_gluufQwPVtUZSK-sT6A5aEl4vA4igjQb2JvkIqTk3-NbUWLQnX2151XTknlfzI7E-jgE49mbrqqtCVJ0XdklrkWGw9mEdDDQ86cwOTmeHL2nfWEFatEbL6jyhmmpc6syy7wz0vm0Rm5ivpoxmVYFlwWzwYZqbjAkckqYwmjv88xj_FM8g5121rrnQFJutWCV8rWomEJWSbT9JqACujz1uUggW-1xaXvQ8VD74qKMyYcSZceXEvlSRr6UywTeru_51kFu_HX2YWDdemaAy44dKERlL0Tlv4Qogb0V48teh-dlHmyZDseGEni9HkbtC59UqtbNruIcNIC4iE5gt5OTNSWFwNBPcJaA2pKgLVK3R9rmPCJ8B2AsKQRP4N1K2G7o-vNevPgfe_ES7uVBS-KRnT3YWVxeuVdw114vmvnlAG7Ls8-hnaoB3Dk8Ho3P8OooZ4OogNh-kBTb0_wTjo-Hp-MvPwAlzjHn |
| linkProvider | Directory of Open Access Journals |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Jb9QwFH4qBQkulK0QKGAkOIHVLI7tHBAqS9XRDBWHOfRmxY5NR1SZMpm2mh_Ff-TZSWYYlt564Go7lu18b_PyPYCXubQ5SypHRSw1ZY7FVCfC0lwn3Fa8yCsTKPNH4vBQHh0VXzbgR_8Wxl-r7HViUNTV1Pg98t3UI6vwlzjenX6nPmuUP13tU2i0sBjaxQWGbM3bwUf8v6_SdP_T-MMB7bIKUIOmaE6l06wQRWpkYpizWlgXVzgVDNYSJuIyy0XGjFcgRa7RH7CS60wXzqWJQ-OfYbfX4DrLpPBiNRR0taXj_RMp-qc5ku82nhBNULSLNBBb0cWa-QtZAv7m2v55Q_O3Y9pg_fa3_rN1uwO3Ozeb7LVycRc2bH0PtvoUFqTTaPdhslcTLzwtjwaZ_EJQSk78vsVF2DomGm3-N3NcTmrSdBn_SEgiRNDpXxWVdUVwBc9Ls8C-yGAwHZOWK7t5AOOrmO82bNbT2j4CEuem4KyUruIlk3lVCjSQ2lMn2jR2KY8g6TGhTMfM7hOEnKgQoUmuWhwpxJEKOFKLCF4vvzlteUkubf3eQ23Z0nOKh4Lp7KvqVJRyOLKsyA16fZ40EEOJrNRScozQWWysi2CnR5jqFF2jVvCK4MWyGlWUP3cqazs9C23QSmAnRQQPW1wvR5Jx9I95ziKQa4hfG-p6TT05DjTonj1McJ5H8KYXjtW4_r0Wjy-fxnO4eTD-PFKjweHwCdxKveyG20s7sDmfndmncMOczyfN7FkQfgLqioXmJy9KlCI |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1bb9MwFD4aHUK8MO4EBhgJniBqLr7lAaHBqKg2qj70YTxZiWOziikdTbepP41_x7GTtJTL3vbAa-JYtvOdm338HYCXTBpG49KGIpJFSC2NwiIWJmRFzE3JM1ZqT5l_KEYjeXSUjbfgR3cXxqVVdjrRK-pypt0eeT9xyMpcEkfftmkR4_3Bu9Pvoasg5U5au3IaDUQOzPICw7f67XAf__WrJBl8nHz4FLYVBkKNZmkRSlvQTGSJlrGm1hTC2KjEaWHgFlMR5SkTKdVOmWSsQN_ASF6kRWZtElt0BFLs9hpso0dOkx5sj4efx1_WGzzOW5Giu6gjeb929GgiRCsZepqrcLlhDH3NgL85un_ma_52aOtt4WDnP17F23CrdcDJXiMxd2DLVHdhpytuQVpddw-mexVxYtUwbJDpL9Sl5MTtaFz4TWVSoDfwTR_n04rUbS1A4ssLEQwH1o_yqiS4mue5XmJfZDicTUjDol3fh8lVzPcB9KpZZR4BiZjOOM2lLXlOJStzgaazcKSKJolswgOIO3wo3XK2u9IhJ8rHbpKrBlMKMaU8ptQygNerb04bxpJLW793sFu1dGzj_sFs_lW1yktZHFmaMY3-oKMTxCAjzQspOcbuNNLGBrDboU21KrBWa6gF8GL1GpWXO5HKKzM7823QfmAnWQAPG4yvRpJy9Jw5owHIDfRvDHXzTTU99gTpjldMcM4CeNMJynpc_16Lx5dP4zncQFlRh8PRwRO4mTgx9mlNu9BbzM_MU7iuzxfTev6s1QQE1BVLzU_TUJ6j |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=An+artificial+intelligence+lightweight+blockchain+security+model+for+security+and+privacy+in+IIoT+systems&rft.jtitle=Journal+of+cloud+computing+%3A+advances%2C+systems+and+applications&rft.au=Selvarajan%2C+Shitharth&rft.au=Srivastava%2C+Gautam&rft.au=Khadidos%2C+Alaa+O&rft.au=Khadidos%2C+Adil+O&rft.date=2023-12-01&rft.issn=2192-113X&rft.eissn=2192-113X&rft.volume=12&rft.issue=1&rft.spage=38&rft_id=info:doi/10.1186%2Fs13677-023-00412-y&rft.externalDBID=NO_FULL_TEXT |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2192-113X&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2192-113X&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2192-113X&client=summon |