TP2SF: A Trustworthy Privacy-Preserving Secured Framework for sustainable smart cities by leveraging blockchain and machine learning

With the advancement in sensor technology and the proliferation of low-cost electronic circuits, Internet of Things (IoT) is emerging as a promising technology for realization of smart cities. However, challenges such as security, privacy, trust, scalability, verifiability, and centralization preven...

Full description

Saved in:
Bibliographic Details
Published inJournal of systems architecture Vol. 115; p. 101954
Main Authors Kumar, Prabhat, Gupta, Govind P., Tripathi, Rakesh
Format Journal Article
LanguageEnglish
Published Elsevier B.V 01.05.2021
Subjects
Online AccessGet full text

Cover

Loading…
Abstract With the advancement in sensor technology and the proliferation of low-cost electronic circuits, Internet of Things (IoT) is emerging as a promising technology for realization of smart cities. However, challenges such as security, privacy, trust, scalability, verifiability, and centralization prevent faster adaptations of IoT-driven smart cities. Thus, in this paper, a Trustworthy Privacy-Preserving Secured Framework (TP2SF) for smart cities is presented. This framework includes three modules namely: a trustworthiness module, a two-level privacy module, and an intrusion detection module. In trustworthiness module, address-based blockchain reputation system is designed. In the two-level privacy module, a blockchain based enhanced Proof of Work (ePoW) technique is simultaneously applied with Principal Component analysis (PCA) to transform data into a new reduced shape for preventing inference and poisoning attacks. In the intrusion detection module, an optimized gradient tree boosting system (XGBoost) is deployed. Finally, due to inherited strengths and weaknesses of Fog–Cloud architecture, we present a blockchain-IPFS integrated Fog–Cloud infrastructure namely, CloudBlock and FogBlock to deploy proposed TP2SF framework in smart city. The TP2SF framework is evaluated using two realistic IoT-based datasets, namely ToN-IoT and BoT-IoT. The findings indicate the superiority of TP2SF framework over other state-of-the-art techniques in both nonblockchain and blockchain systems.
AbstractList With the advancement in sensor technology and the proliferation of low-cost electronic circuits, Internet of Things (IoT) is emerging as a promising technology for realization of smart cities. However, challenges such as security, privacy, trust, scalability, verifiability, and centralization prevent faster adaptations of IoT-driven smart cities. Thus, in this paper, a Trustworthy Privacy-Preserving Secured Framework (TP2SF) for smart cities is presented. This framework includes three modules namely: a trustworthiness module, a two-level privacy module, and an intrusion detection module. In trustworthiness module, address-based blockchain reputation system is designed. In the two-level privacy module, a blockchain based enhanced Proof of Work (ePoW) technique is simultaneously applied with Principal Component analysis (PCA) to transform data into a new reduced shape for preventing inference and poisoning attacks. In the intrusion detection module, an optimized gradient tree boosting system (XGBoost) is deployed. Finally, due to inherited strengths and weaknesses of Fog–Cloud architecture, we present a blockchain-IPFS integrated Fog–Cloud infrastructure namely, CloudBlock and FogBlock to deploy proposed TP2SF framework in smart city. The TP2SF framework is evaluated using two realistic IoT-based datasets, namely ToN-IoT and BoT-IoT. The findings indicate the superiority of TP2SF framework over other state-of-the-art techniques in both nonblockchain and blockchain systems.
ArticleNumber 101954
Author Kumar, Prabhat
Tripathi, Rakesh
Gupta, Govind P.
Author_xml – sequence: 1
  givenname: Prabhat
  orcidid: 0000-0002-0723-0752
  surname: Kumar
  fullname: Kumar, Prabhat
  email: pkumar.phd2019.it@nitrr.ac.in
– sequence: 2
  givenname: Govind P.
  surname: Gupta
  fullname: Gupta, Govind P.
  email: gpgupta.it@nitrr.ac.in
– sequence: 3
  givenname: Rakesh
  surname: Tripathi
  fullname: Tripathi, Rakesh
  email: rtripathi.it@nitrr.ac.in
BookMark eNqFkMtOAzEMRSMEEs8_YJEfmJLHvGCBhBAFJCQqUdaRk_HQlGkGOUPR7PlwUsqKBax8Zd9j2feQ7YY-IGOnUkykkOXZchLHCOQmSqjv1nmR77ADWVc6K2VZ7Cata51VpZL77DDGpRCiKKQ6YJ_zmXqaXvArPqf3OHz0NCxGPiO_BjdmM8KItPbhhT-heyds-JRghcn2ytueeEwM-AC2Qx5XQAN3fvAYuR15h2skeNnAtuvdq1skJ4fQ8BW4hQ-YHEAhzY_ZXgtdxJOfesSepzfz67vs4fH2_vrqIXO6UkMGsrJ5U1fWFU3eWtfkthKqhkbnVqKtaptrLCulC7RaJynaonS6BStqJUDoI5Zv9zrqYyRszRv5dPVopDCbJM3SbJM0myTNNsmEXfzC0pMw-D4MBL77D77cwpgeW3skE53H4LDxhG4wTe__XvAFBy2XKA
CitedBy_id crossref_primary_10_3390_electronics10111257
crossref_primary_10_1016_j_eswa_2024_123853
crossref_primary_10_1049_blc2_12025
crossref_primary_10_3390_s23198153
crossref_primary_10_3390_fi16090324
crossref_primary_10_3390_s22176436
crossref_primary_10_3390_sym14112304
crossref_primary_10_1007_s00354_023_00210_9
crossref_primary_10_1038_s41598_023_42257_0
crossref_primary_10_1007_s11135_021_01251_2
crossref_primary_10_1109_JIOT_2021_3122021
crossref_primary_10_3390_app12125893
crossref_primary_10_1002_int_22946
crossref_primary_10_1002_ett_4578
crossref_primary_10_1007_s10586_024_04424_4
crossref_primary_10_1155_2023_6048087
crossref_primary_10_1007_s11042_024_19150_7
crossref_primary_10_3390_info14050295
crossref_primary_10_1109_ACCESS_2024_3408868
crossref_primary_10_3390_electronics13061053
crossref_primary_10_1109_ACCESS_2022_3216850
crossref_primary_10_1109_ACCESS_2024_3409273
crossref_primary_10_3390_info15010065
crossref_primary_10_1109_ACCESS_2023_3236983
crossref_primary_10_1002_cpe_7738
crossref_primary_10_1142_S0219265923500081
crossref_primary_10_1049_ise2_12091
crossref_primary_10_1007_s12083_024_01776_x
crossref_primary_10_1007_s12083_022_01430_4
crossref_primary_10_1016_j_asej_2023_102211
crossref_primary_10_1016_j_imavis_2022_104573
crossref_primary_10_1016_j_procs_2023_01_014
crossref_primary_10_1109_JIOT_2022_3217087
crossref_primary_10_3390_electronics11152314
crossref_primary_10_1016_j_icte_2024_02_008
crossref_primary_10_1007_s10586_022_03776_z
crossref_primary_10_1186_s13677_022_00305_6
crossref_primary_10_1002_cpe_7529
crossref_primary_10_1142_S0218539323410036
crossref_primary_10_4018_IJCAC_297106
crossref_primary_10_1109_ACCESS_2024_3396461
crossref_primary_10_1007_s10115_024_02273_6
crossref_primary_10_1007_s42979_024_03152_1
crossref_primary_10_3233_JIFS_221873
crossref_primary_10_1109_TITS_2021_3122368
crossref_primary_10_3390_app12041863
crossref_primary_10_3390_s22197162
crossref_primary_10_1007_s42979_024_03383_2
crossref_primary_10_3390_app12199572
crossref_primary_10_3390_s24124022
crossref_primary_10_1080_09540091_2022_2149698
crossref_primary_10_1007_s13369_024_08882_1
crossref_primary_10_1186_s40537_024_00912_x
crossref_primary_10_1002_nem_2295
crossref_primary_10_1007_s42979_023_02075_7
crossref_primary_10_1007_s11042_022_13915_8
crossref_primary_10_3390_s22010241
crossref_primary_10_1007_s00500_024_10322_z
crossref_primary_10_1016_j_scs_2024_105438
crossref_primary_10_1109_ACCESS_2022_3203568
crossref_primary_10_1109_ACCESS_2024_3454211
crossref_primary_10_1109_MGRS_2023_3272825
crossref_primary_10_1109_TAI_2022_3213531
crossref_primary_10_1007_s13369_021_06028_1
crossref_primary_10_1587_transcom_2022EBP3169
crossref_primary_10_3390_app14167034
crossref_primary_10_1109_JIOT_2023_3237893
crossref_primary_10_32604_cmc_2022_030825
crossref_primary_10_1007_s13369_023_07900_y
crossref_primary_10_1016_j_comnet_2023_109726
crossref_primary_10_1016_j_rineng_2024_103882
crossref_primary_10_1145_3539608
crossref_primary_10_1016_j_matpr_2021_10_472
crossref_primary_10_1145_3614424
crossref_primary_10_3390_su14148707
crossref_primary_10_1016_j_jpdc_2022_12_009
crossref_primary_10_3390_electronics13061012
crossref_primary_10_3390_electronics13245060
crossref_primary_10_1007_s10723_023_09680_z
crossref_primary_10_1016_j_scs_2022_104089
crossref_primary_10_1111_exsy_12934
crossref_primary_10_1038_s41598_024_74822_6
crossref_primary_10_3390_su15086902
crossref_primary_10_1007_s11042_023_16406_6
crossref_primary_10_1109_OJCOMS_2024_3438264
crossref_primary_10_1016_j_jnca_2024_103858
crossref_primary_10_1016_j_iot_2022_100584
crossref_primary_10_3390_s23031252
crossref_primary_10_1016_j_jpdc_2022_01_030
crossref_primary_10_1038_s41598_024_81147_x
crossref_primary_10_1007_s12083_021_01263_7
crossref_primary_10_1109_ACCESS_2023_3264598
crossref_primary_10_1109_ACCESS_2023_3245524
crossref_primary_10_1109_JIOT_2022_3201772
crossref_primary_10_1109_ACCESS_2025_3538331
crossref_primary_10_1109_MM_2021_3112476
crossref_primary_10_1142_S0218126623300015
crossref_primary_10_1109_ACCESS_2023_3293529
crossref_primary_10_1155_2022_6468870
crossref_primary_10_1109_IOTM_002_2200195
crossref_primary_10_1016_j_seta_2023_103114
crossref_primary_10_1007_s12083_023_01592_9
crossref_primary_10_3390_app11157013
crossref_primary_10_3390_electronics10091104
crossref_primary_10_1016_j_future_2023_08_010
crossref_primary_10_1142_S0219622023500530
crossref_primary_10_32604_cmes_2023_026691
crossref_primary_10_1155_2022_7281872
crossref_primary_10_1007_s10586_024_04387_6
crossref_primary_10_1109_JSEN_2025_3526807
crossref_primary_10_1109_TNSE_2022_3191601
crossref_primary_10_1016_j_cities_2024_105198
crossref_primary_10_1109_TKDE_2024_3382726
crossref_primary_10_1155_2023_7107663
crossref_primary_10_2139_ssrn_5077757
crossref_primary_10_1007_s10586_024_04780_1
crossref_primary_10_3390_electronics12102180
crossref_primary_10_1007_s13369_024_08835_8
crossref_primary_10_1007_s00607_024_01390_y
Cites_doi 10.1016/j.jnca.2019.06.018
10.1016/j.jnca.2019.02.024
10.1016/j.future.2019.07.030
10.1016/j.future.2020.02.017
10.1177/1550147719844159
10.1007/s12652-018-0887-z
10.1016/j.future.2018.05.046
10.1016/j.future.2018.02.039
10.1109/ACCESS.2020.2982318
10.1016/j.comnet.2019.01.023
10.1007/s11432-019-9893-2
10.1016/j.asoc.2019.105995
10.1145/3337064
10.1145/2818184
10.1109/ACCESS.2020.2988579
10.1016/j.cose.2019.101653
10.1016/j.comcom.2019.10.034
10.1016/j.cose.2020.101906
10.1016/j.comcom.2020.02.008
10.1177/1550147719825820
10.1016/j.iot.2020.100177
10.1145/3343147.3343169
10.1016/j.scs.2018.02.039
10.1109/JIOT.2017.2720635
10.1016/j.ins.2019.10.019
10.1109/MNET.001.1900151
10.1007/s11227-016-1850-4
10.1016/j.future.2019.05.041
10.1016/j.comcom.2020.06.030
10.1016/j.future.2017.06.031
10.1007/s11227-018-2701-2
10.3390/electronics9020219
10.3390/su10051388
10.1016/j.scs.2020.102364
10.1109/ACCESS.2019.2956955
10.1016/j.sysarc.2019.01.005
10.1016/j.comnet.2018.11.010
10.1109/ACCESS.2020.2969820
10.1016/j.comcom.2020.05.048
10.1016/j.cose.2020.101863
10.3390/fi12040061
10.1186/s13677-018-0123-6
10.1016/j.sysarc.2019.101701
10.3390/electronics9010144
10.1016/j.future.2019.02.060
10.1016/j.jnca.2019.102481
10.1016/j.jnca.2014.01.014
10.1109/COMST.2019.2896380
ContentType Journal Article
Copyright 2020 Elsevier B.V.
Copyright_xml – notice: 2020 Elsevier B.V.
DBID AAYXX
CITATION
DOI 10.1016/j.sysarc.2020.101954
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1873-6165
ExternalDocumentID 10_1016_j_sysarc_2020_101954
S1383762120302071
GroupedDBID --K
--M
-~X
.DC
.~1
0R~
1B1
1~.
1~5
29L
4.4
457
4G.
5GY
5VS
7-5
71M
8P~
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AAXUO
AAYFN
ABBOA
ABFNM
ABFRF
ABJNI
ABMAC
ABXDB
ABYKQ
ACDAQ
ACGFO
ACGFS
ACNNM
ACRLP
ACZNC
ADBBV
ADEZE
ADJOM
ADMUD
ADTZH
AEBSH
AECPX
AEFWE
AEKER
AENEX
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHJVU
AHZHX
AIALX
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
ASPBG
AVWKF
AXJTR
AZFZN
BJAXD
BKOJK
BKOMP
BLXMC
CS3
DU5
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-Q
GBLVA
GBOLZ
HVGLF
HZ~
IHE
J1W
JJJVA
KOM
M41
MO0
MS~
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
PQQKQ
Q38
R2-
RIG
ROL
RPZ
RXW
SBC
SDF
SDG
SDP
SES
SEW
SPC
SPCBC
SST
SSV
SSZ
T5K
TAE
TN5
U5U
UHS
~G-
AATTM
AAXKI
AAYWO
AAYXX
ABWVN
ACRPL
ACVFH
ADCNI
ADNMO
AEIPS
AEUPX
AFJKZ
AFPUW
AFXIZ
AGCQF
AGQPQ
AGRNS
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
BNPGV
CITATION
SSH
ID FETCH-LOGICAL-c372t-a17b4d87bc5d4fbcd4b7028ad34b1eb78b43e67235eb333e60f56c3fab0820a03
IEDL.DBID .~1
ISSN 1383-7621
IngestDate Thu Apr 24 23:06:54 EDT 2025
Tue Jul 01 00:29:17 EDT 2025
Fri Feb 23 02:43:34 EST 2024
IsPeerReviewed true
IsScholarly true
Keywords Machine learning
Blockchain
Privacy-preservation
Internet of Things
Smart city
Trust management
Anomaly detection
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c372t-a17b4d87bc5d4fbcd4b7028ad34b1eb78b43e67235eb333e60f56c3fab0820a03
ORCID 0000-0002-0723-0752
ParticipantIDs crossref_primary_10_1016_j_sysarc_2020_101954
crossref_citationtrail_10_1016_j_sysarc_2020_101954
elsevier_sciencedirect_doi_10_1016_j_sysarc_2020_101954
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate May 2021
2021-05-00
PublicationDateYYYYMMDD 2021-05-01
PublicationDate_xml – month: 05
  year: 2021
  text: May 2021
PublicationDecade 2020
PublicationTitle Journal of systems architecture
PublicationYear 2021
Publisher Elsevier B.V
Publisher_xml – name: Elsevier B.V
References Fletcher, Islam (b43) 2019; 52
Soe, Feng, Santosa, Hartanto, Sakurai (b61) 2020; 9
(b66) 2020; 160
Shafiq, Tian, Bashir, Du, Guizani (b58) 2020
Lin, He, Zeadally, Kumar, Choo (b72) 2020; 63
Ferreira, Antunes, Zhygulskyy, Frazão (b63) 2019
Singh, Ra, Meng, Kaur, Cho (b44) 2019; 15
Haider, Moustafa, Keshk, Fernandez, Choo, Wahab (b30) 2020
Bellini, Iraqi, Damiani (b34) 2020; 8
Alguliyev, Aliguliyev, Abdullayeva (b55) 2019; 15
Gupta, Tanwar, Tyagi, Kumar (b46) 2020; 153
Calvaresi, Mattioli, Dubovitskaya, Dragoni, Schumacher (b54) 2018
Chahal, Kumar, Batra (b27) 2020; 150
Shen, Bai, Hu, Wang (b38) 2019; 97
Illiano, Lupu (b15) 2015; 48
Gai, Wang, Deng, Peng (b53) 2018
Makkar, Garg, Kumar, Hossain, Ghoneim, Alrashoud (b48) 2020
Khan, Mehmood, Khan, Khan, Iqbal, Mashwani (b7) 2020; 105
Kaur, Nayyar, Singh (b64) 2020
Kumar, Makkar (b47) 2020
Singh, Sharma, Yoon, Shojafar, Cho, Ra (b2) 2020; 63
Shafiq, Tian, Bashir, Du, Guizani (b59) 2020
Kumar, Tripathi (b62) 2020
da Costa, Papa, Lisboa, Munoz, de Albuquerque (b9) 2019; 151
Koroniotis, Moustafa, Sitnikova, Turnbull (b28) 2019; 100
Singh, Nayyar, Kaur, Ghosh (b19) 2020; 12
Aujla, Singh, Bose, Kumar, Han, Buyya (b37) 2020; 34
Alkadi, Moustafa, Turnbull, Choo (b39) 2020
Jindal, Kumar, Singh (b4) 2020; 108
Keshk, Moustafa, Sitnikova, Turnbull (b40) 2018
Bouachir, Aloqaily, Tseng, Boukerche (b23) 2020
Nayyar, Rameshwar, Solanki (b5) 2020
Gai, Guo, Zhu, Yu (b22) 2020
Malik, Dedeoglu, Kanhere, Jurdak (b50) 2019
Iqbal, Butt, Afzaal, Salah (b26) 2019; 15
Salo, Nassif, Essex (b67) 2019; 148
Zhao, Tarus, Yang, Sun, Ge, Wang (b41) 2020; 515
Moustafa (b31) 2019
Koroniotis, Moustafa, Sitnikova, Turnbull (b29) 2018
Elrawy, Awad, Hamed (b10) 2018; 7
Makhdoom, Zhou, Abolhasan, Lipman, Ni (b56) 2020; 88
Venkatesh, Anuradha (b65) 2019; 19
Chai, Leng, Zhang, Mao (b51) 2019; 7
Lin (b57) 2020; 87
Devan, Khare (b69) 2020
Bostami, Ahmed, Choudhury (b14) 2019
Park, Del Pobil, Kwon (b1) 2018; 10
Shafiq, Tian, Sun, Du, Guizani (b60) 2020; 107
Sengupta, Ruj, Bit (b3) 2020; 149
Fortino, Fotia, Messina, Rosaci, Sarné (b35) 2020; 8
Raj, Sahoo, Pradhan (b42) 2020
Sharma, Pilli, Mazumdar, Gera (b32) 2020; 160
Braun, Fung, Iqbal, Shah (b13) 2018; 39
Alli, Alam (b18) 2020; 9
Reyna, Martín, Chen, Soler, Díaz (b20) 2018; 88
Bhattacharya, Kaluri, Singh, Alazab, Tariq (b68) 2020; 9
Singh, Sharma, Moon, Moon, Park (b11) 2019; 75
Li, Song, Zeng (b17) 2017; 5
Singh, Nayyar, Kumar, Sharma (b21) 2019; 75
Khan, Pervez, Abbasi (b8) 2017; 77
Yan, Zhang, Vasilakos (b33) 2014; 42
Keshk, Sitnikova, Moustafa, Hu, Khalil (b12) 2019
Kochovski, Gec, Stankovski, Bajec, Drobintsev (b36) 2019; 101
Aggarwal, Chaudhary, Aujla, Kumar, Choo, Zomaya (b24) 2019; 144
Chen, Tian, Cui, Yin, Wang (b49) 2019; 10
Q. Zhuang, Y. Liu, L. Chen, Z. Ai, Proof of reputation: A reputation-based consensus protocol for blockchain based systems, in: Proceedings of the 2019 International Electronics Communication Conference, 2019, pp. 131–138.
Hassan, Rehmani, Chen (b25) 2019; 97
Singh, Singh (b70) 2020
Altaf, Abbas, Iqbal, Derhab (b16) 2019; 137
Pedregosa, Varoquaux, Gramfort, Michel, Thirion, Grisel, Blondel, Prettenhofer, Weiss, Dubourg, Vanderplas, Passos, Cournapeau, Brucher, Perrot, Duchesnay (b71) 2011; 12
Bodkhe, Tanwar, Parekh, Khanpara, Tyagi, Kumar, Alazab (b45) 2020; 8
Chaabouni, Mosbah, Zemmari, Sauvignac, Faruki (b6) 2019; 21
Singh (10.1016/j.sysarc.2020.101954_b19) 2020; 12
Jindal (10.1016/j.sysarc.2020.101954_b4) 2020; 108
Keshk (10.1016/j.sysarc.2020.101954_b40) 2018
Aujla (10.1016/j.sysarc.2020.101954_b37) 2020; 34
Iqbal (10.1016/j.sysarc.2020.101954_b26) 2019; 15
Altaf (10.1016/j.sysarc.2020.101954_b16) 2019; 137
Koroniotis (10.1016/j.sysarc.2020.101954_b28) 2019; 100
Lin (10.1016/j.sysarc.2020.101954_b57) 2020; 87
Gai (10.1016/j.sysarc.2020.101954_b22) 2020
Aggarwal (10.1016/j.sysarc.2020.101954_b24) 2019; 144
Raj (10.1016/j.sysarc.2020.101954_b42) 2020
Salo (10.1016/j.sysarc.2020.101954_b67) 2019; 148
Alguliyev (10.1016/j.sysarc.2020.101954_b55) 2019; 15
Nayyar (10.1016/j.sysarc.2020.101954_b5) 2020
Chen (10.1016/j.sysarc.2020.101954_b49) 2019; 10
Bellini (10.1016/j.sysarc.2020.101954_b34) 2020; 8
Fletcher (10.1016/j.sysarc.2020.101954_b43) 2019; 52
Singh (10.1016/j.sysarc.2020.101954_b2) 2020; 63
Chai (10.1016/j.sysarc.2020.101954_b51) 2019; 7
Singh (10.1016/j.sysarc.2020.101954_b70) 2020
Lin (10.1016/j.sysarc.2020.101954_b72) 2020; 63
Kaur (10.1016/j.sysarc.2020.101954_b64) 2020
Chaabouni (10.1016/j.sysarc.2020.101954_b6) 2019; 21
Elrawy (10.1016/j.sysarc.2020.101954_b10) 2018; 7
Koroniotis (10.1016/j.sysarc.2020.101954_b29) 2018
Moustafa (10.1016/j.sysarc.2020.101954_b31) 2019
10.1016/j.sysarc.2020.101954_b52
Keshk (10.1016/j.sysarc.2020.101954_b12) 2019
Chahal (10.1016/j.sysarc.2020.101954_b27) 2020; 150
Bhattacharya (10.1016/j.sysarc.2020.101954_b68) 2020; 9
Fortino (10.1016/j.sysarc.2020.101954_b35) 2020; 8
Alkadi (10.1016/j.sysarc.2020.101954_b39) 2020
Sharma (10.1016/j.sysarc.2020.101954_b32) 2020; 160
Park (10.1016/j.sysarc.2020.101954_b1) 2018; 10
Kumar (10.1016/j.sysarc.2020.101954_b47) 2020
Bodkhe (10.1016/j.sysarc.2020.101954_b45) 2020; 8
Makkar (10.1016/j.sysarc.2020.101954_b48) 2020
Calvaresi (10.1016/j.sysarc.2020.101954_b54) 2018
Ferreira (10.1016/j.sysarc.2020.101954_b63) 2019
Khan (10.1016/j.sysarc.2020.101954_b8) 2017; 77
Alli (10.1016/j.sysarc.2020.101954_b18) 2020; 9
Pedregosa (10.1016/j.sysarc.2020.101954_b71) 2011; 12
Haider (10.1016/j.sysarc.2020.101954_b30) 2020
Yan (10.1016/j.sysarc.2020.101954_b33) 2014; 42
Kochovski (10.1016/j.sysarc.2020.101954_b36) 2019; 101
(10.1016/j.sysarc.2020.101954_b66) 2020; 160
Sengupta (10.1016/j.sysarc.2020.101954_b3) 2020; 149
Singh (10.1016/j.sysarc.2020.101954_b44) 2019; 15
Shafiq (10.1016/j.sysarc.2020.101954_b58) 2020
Illiano (10.1016/j.sysarc.2020.101954_b15) 2015; 48
Zhao (10.1016/j.sysarc.2020.101954_b41) 2020; 515
Shafiq (10.1016/j.sysarc.2020.101954_b59) 2020
Makhdoom (10.1016/j.sysarc.2020.101954_b56) 2020; 88
Bouachir (10.1016/j.sysarc.2020.101954_b23) 2020
Singh (10.1016/j.sysarc.2020.101954_b21) 2019; 75
Shen (10.1016/j.sysarc.2020.101954_b38) 2019; 97
Malik (10.1016/j.sysarc.2020.101954_b50) 2019
Devan (10.1016/j.sysarc.2020.101954_b69) 2020
Bostami (10.1016/j.sysarc.2020.101954_b14) 2019
Hassan (10.1016/j.sysarc.2020.101954_b25) 2019; 97
Venkatesh (10.1016/j.sysarc.2020.101954_b65) 2019; 19
Khan (10.1016/j.sysarc.2020.101954_b7) 2020; 105
da Costa (10.1016/j.sysarc.2020.101954_b9) 2019; 151
Li (10.1016/j.sysarc.2020.101954_b17) 2017; 5
Gai (10.1016/j.sysarc.2020.101954_b53) 2018
Kumar (10.1016/j.sysarc.2020.101954_b62) 2020
Singh (10.1016/j.sysarc.2020.101954_b11) 2019; 75
Braun (10.1016/j.sysarc.2020.101954_b13) 2018; 39
Reyna (10.1016/j.sysarc.2020.101954_b20) 2018; 88
Shafiq (10.1016/j.sysarc.2020.101954_b60) 2020; 107
Soe (10.1016/j.sysarc.2020.101954_b61) 2020; 9
Gupta (10.1016/j.sysarc.2020.101954_b46) 2020; 153
References_xml – volume: 7
  start-page: 21
  year: 2018
  ident: b10
  article-title: Intrusion detection systems for IoT-based smart environments: a survey
  publication-title: J. Cloud Comput.
– volume: 160
  start-page: 475
  year: 2020
  end-page: 493
  ident: b32
  article-title: Towards trustworthy Internet of Things: A survey on trust management applications and schemes
  publication-title: Comput. Commun.
– start-page: 1
  year: 2020
  ident: b39
  article-title: A deep blockchain framework-enabled collaborative intrusion detection for protecting IoT and cloud networks
  publication-title: IEEE Internet Things J.
– volume: 5
  start-page: 716
  year: 2017
  end-page: 723
  ident: b17
  article-title: Policy-based secure and trustworthy sensing for internet of things in smart cities
  publication-title: IEEE Internet Things J.
– volume: 9
  year: 2020
  ident: b18
  article-title: The fog cloud of things: A survey on concepts, architecture, standards, tools, and applications
  publication-title: Internet Things
– start-page: 184
  year: 2019
  end-page: 193
  ident: b50
  article-title: Trustchain: Trust management in blockchain and IoT supported supply chains
  publication-title: 2019 IEEE International Conference on Blockchain (Blockchain)
– volume: 8
  start-page: 79764
  year: 2020
  end-page: 79800
  ident: b45
  article-title: Blockchain for industry 4.0: A comprehensive review
  publication-title: IEEE Access
– volume: 515
  start-page: 132
  year: 2020
  end-page: 155
  ident: b41
  article-title: Privacy-preserving clustering for big data in cyber-physical-social systems: Survey and perspectives
  publication-title: Inform. Sci.
– volume: 63
  start-page: 1
  year: 2020
  end-page: 14
  ident: b72
  article-title: SecBCS: a secure and privacy-preserving blockchain-based crowdsourcing system
  publication-title: Sci. China Inf. Sci.
– volume: 75
  start-page: 2070
  year: 2019
  end-page: 2105
  ident: b21
  article-title: Fog computing: from architecture to edge computing and big data processing
  publication-title: J. Supercomput.
– volume: 87
  year: 2020
  ident: b57
  article-title: A reversible privacy-preserving clustering technique based on k-means algorithm
  publication-title: Appl. Soft Comput.
– volume: 108
  start-page: 921
  year: 2020
  end-page: 934
  ident: b4
  article-title: A unified framework for big data acquisition, storage, and analytics for demand response management in smart cities
  publication-title: Future Gener. Comput. Syst.
– volume: 52
  start-page: 1
  year: 2019
  end-page: 33
  ident: b43
  article-title: Decision tree classification with differential privacy: A survey
  publication-title: ACM Comput. Surv.
– volume: 148
  start-page: 164
  year: 2019
  end-page: 175
  ident: b67
  article-title: Dimensionality reduction with IG-PCA and ensemble classifier for network intrusion detection
  publication-title: Comput. Netw.
– year: 2019
  ident: b31
  article-title: ToN_IoT Datasets
– volume: 63
  year: 2020
  ident: b2
  article-title: Convergence of blockchain and artificial intelligence in IoT network for the sustainable smart city
  publication-title: Sustainable Cities Soc.
– year: 2020
  ident: b58
  article-title: IoT malicious traffic identification using wrapper-based feature selection mechanisms
  publication-title: Comput. Secur.
– start-page: 35
  year: 2020
  end-page: 59
  ident: b62
  article-title: Blockchain-based framework for data storage in peer-to-peer scheme using interplanetary file system
  publication-title: Handbook of Research on Blockchain Technology
– volume: 137
  start-page: 93
  year: 2019
  end-page: 111
  ident: b16
  article-title: Trust models of internet of smart things: A survey, open issues, and future directions
  publication-title: J. Netw. Comput. Appl.
– start-page: 1
  year: 2018
  end-page: 9
  ident: b40
  article-title: Privacy-preserving big data analytics for cyber-physical systems
  publication-title: Wirel. Netw.
– start-page: 1
  year: 2020
  end-page: 16
  ident: b69
  article-title: An efficient XGBoost–DNN-based classification model for network intrusion detection system
  publication-title: Neural Comput. Appl.
– volume: 105
  year: 2020
  ident: b7
  article-title: A survey on intrusion detection and prevention in wireless ad-hoc networks
  publication-title: J. Syst. Archit.
– volume: 150
  start-page: 13
  year: 2020
  end-page: 46
  ident: b27
  article-title: Trust management in social Internet of Things: A taxonomy, open issues, and challenges
  publication-title: Comput. Commun.
– volume: 144
  start-page: 13
  year: 2019
  end-page: 48
  ident: b24
  article-title: Blockchain for smart communities: Applications, challenges and opportunities
  publication-title: J. Netw. Comput. Appl.
– volume: 101
  start-page: 747
  year: 2019
  end-page: 759
  ident: b36
  article-title: Trust management in a blockchain based fog computing platform with trustless smart oracles
  publication-title: Future Gener. Comput. Syst.
– volume: 48
  start-page: 1
  year: 2015
  end-page: 33
  ident: b15
  article-title: Detecting malicious data injections in wireless sensor networks: A survey
  publication-title: ACM Comput. Surv.
– volume: 12
  start-page: 2825
  year: 2011
  end-page: 2830
  ident: b71
  article-title: Scikit-learn: Machine learning in python
  publication-title: J. Mach. Learn. Res.
– volume: 15
  year: 2019
  ident: b26
  article-title: Trust management in social internet of vehicles: Factors, challenges, blockchain, and fog solutions
  publication-title: Int. J. Distrib. Sens. Netw.
– start-page: 1
  year: 2020
  ident: b22
  article-title: Blockchain meets cloud computing: A survey
  publication-title: IEEE Commun. Surv. Tutor.
– year: 2020
  ident: b30
  article-title: FGMC-HADS: Fuzzy Gaussian mixture-based correntropy models for detecting zero-day attacks from linux systems
  publication-title: Comput. Secur.
– volume: 7
  start-page: 175744
  year: 2019
  end-page: 175757
  ident: b51
  article-title: Proof-of-reputation based-consortium blockchain for trust resource sharing in internet of vehicles
  publication-title: IEEE Access
– year: 2020
  ident: b47
  article-title: Machine Learning in Cognitive IoT
– volume: 8
  start-page: 21127
  year: 2020
  end-page: 21151
  ident: b34
  article-title: Blockchain-based distributed trust and reputation management systems: a survey
  publication-title: IEEE Access
– volume: 153
  start-page: 406
  year: 2020
  end-page: 440
  ident: b46
  article-title: Machine learning models for secure data analytics: A taxonomy and threat model
  publication-title: Comput. Commun.
– volume: 19
  start-page: 3
  year: 2019
  end-page: 26
  ident: b65
  article-title: A review of feature selection and its methods
  publication-title: Cybern. Inf. Technol.
– volume: 15
  start-page: 1
  year: 2019
  end-page: 14
  ident: b55
  article-title: Privacy-preserving deep learning algorithm for big personal data analysis
  publication-title: J. Ind. Inf. Integr.
– volume: 88
  start-page: 173
  year: 2018
  end-page: 190
  ident: b20
  article-title: On blockchain and its integration with IoT. Challenges and opportunities
  publication-title: Future Gener. Comput. Syst.
– start-page: 25
  year: 2020
  end-page: 42
  ident: b64
  article-title: Blockchain: A path to the future
  publication-title: Cryptocurrencies and Blockchain Technology Applications
– volume: 97
  start-page: 130
  year: 2019
  end-page: 141
  ident: b38
  article-title: P2TA: Privacy-preserving task allocation for edge computing enhanced mobile crowdsensing
  publication-title: J. Syst. Archit.
– volume: 21
  start-page: 2671
  year: 2019
  end-page: 2701
  ident: b6
  article-title: Network intrusion detection for IoT security based on learning techniques
  publication-title: IEEE Commun. Surv. Tutor.
– year: 2018
  ident: b29
  article-title: BoT_IoT Datasets
– volume: 10
  start-page: 1388
  year: 2018
  ident: b1
  article-title: The role of Internet of Things (IoT) in smart cities: Technology roadmap-oriented approaches
  publication-title: Sustainability
– start-page: 1
  year: 2019
  ident: b12
  article-title: An integrated framework for privacy-preserving based anomaly detection for cyber-physical systems
  publication-title: IEEE Trans. Sustain. Comput.
– start-page: 1
  year: 2020
  ident: b48
  article-title: An efficient spam detection technique for IoT devices using machine learning
  publication-title: IEEE Trans. Ind. Inf.
– volume: 9
  start-page: 219
  year: 2020
  ident: b68
  article-title: A novel PCA-firefly based xgboost classification model for intrusion detection in networks using GPU
  publication-title: Electronics
– volume: 34
  start-page: 83
  year: 2020
  end-page: 91
  ident: b37
  article-title: BlockSDN: Blockchain-as-a-service for software defined networking in smart city applications
  publication-title: IEEE Netw.
– volume: 15
  year: 2019
  ident: b44
  article-title: SH-BlockCC: A secure and efficient Internet of things smart home architecture based on cloud computing and blockchain technology
  publication-title: Int. J. Distrib. Sens. Netw.
– volume: 88
  year: 2020
  ident: b56
  article-title: PrivySharing: A blockchain-based framework for privacy-preserving and secure data sharing in smart cities
  publication-title: Comput. Secur.
– volume: 12
  start-page: 61
  year: 2020
  ident: b19
  article-title: Blockchain and fog based architecture for internet of everything in smart cities
  publication-title: Future Internet
– volume: 10
  start-page: 3099
  year: 2019
  end-page: 3107
  ident: b49
  article-title: Trust architecture and reputation evaluation for internet of things
  publication-title: J. Ambient Intell. Humaniz. Comput.
– volume: 9
  start-page: 144
  year: 2020
  ident: b61
  article-title: Towards a lightweight detection system for cyber attacks in the IoT environment using corresponding features
  publication-title: Electronics
– volume: 8
  start-page: 60117
  year: 2020
  end-page: 60125
  ident: b35
  article-title: Trust and reputation in the internet of things: State-of-the-art and research challenges
  publication-title: IEEE Access
– volume: 160
  start-page: 139
  year: 2020
  end-page: 149
  ident: b66
  article-title: An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture
  publication-title: Comput. Commun.
– volume: 39
  start-page: 499
  year: 2018
  end-page: 507
  ident: b13
  article-title: Security and privacy challenges in smart cities
  publication-title: Sustain. Cities Soc.
– volume: 77
  start-page: 112
  year: 2017
  end-page: 135
  ident: b8
  article-title: Towards a secure service provisioning framework in a smart city environment
  publication-title: Future Gener. Comput. Syst.
– volume: 75
  start-page: 4543
  year: 2019
  end-page: 4574
  ident: b11
  article-title: A comprehensive study on APT attacks and countermeasures for future networks and communications: challenges and solutions
  publication-title: J. Supercomput.
– reference: Q. Zhuang, Y. Liu, L. Chen, Z. Ai, Proof of reputation: A reputation-based consensus protocol for blockchain based systems, in: Proceedings of the 2019 International Electronics Communication Conference, 2019, pp. 131–138.
– volume: 149
  year: 2020
  ident: b3
  article-title: A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT
  publication-title: J. Netw. Comput. Appl.
– year: 2020
  ident: b5
  article-title: Internet of Things (IoT) and the Digital Business Environment: A Standpoint Inclusive Cyber Space, Cyber Crimes, and Cybersecurity
– start-page: 666
  year: 2018
  end-page: 681
  ident: b53
  article-title: Proof of reputation: a reputation-based consensus protocol for peer-to-peer network
  publication-title: International Conference on Database Systems for Advanced Applications
– start-page: 1
  year: 2019
  end-page: 7
  ident: b63
  article-title: Performance of hash functions in blockchain applied to IoT devices
  publication-title: 2019 14th Iberian Conference on Information Systems and Technologies (CISTI)
– year: 2020
  ident: b70
  article-title: A survey on machine learning-based malware detection in executable files
  publication-title: J. Syst. Archit.
– start-page: 1
  year: 2020
  ident: b59
  article-title: Corrauc: a malicious Bot-IoT traffic detection method in IoT network using machine learning techniques
  publication-title: IEEE Internet Things J.
– volume: 107
  start-page: 433
  year: 2020
  end-page: 442
  ident: b60
  article-title: Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city
  publication-title: Future Gener. Comput. Syst.
– volume: 100
  start-page: 779
  year: 2019
  end-page: 796
  ident: b28
  article-title: Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-iot dataset
  publication-title: Future Gener. Comput. Syst.
– start-page: 47
  year: 2019
  end-page: 58
  ident: b14
  article-title: False data injection attacks in internet of things
  publication-title: Performability in Internet of Things
– start-page: 719
  year: 2018
  end-page: 725
  ident: b54
  article-title: Reputation management in multi-agent systems using permissioned blockchain technology
  publication-title: 2018 IEEE/WIC/ACM International Conference on Web Intelligence (WI)
– volume: 42
  start-page: 120
  year: 2014
  end-page: 134
  ident: b33
  article-title: A survey on trust management for internet of things
  publication-title: J. Netw. Comput. Appl.
– volume: 97
  start-page: 512
  year: 2019
  end-page: 529
  ident: b25
  article-title: Privacy preservation in blockchain based IoT systems: Integration issues, prospects, challenges, and future research directions
  publication-title: Future Gener. Comput. Syst.
– year: 2020
  ident: b23
  article-title: Blockchain and fog computing for cyber-physical systems: Case of smart industry
– start-page: 513
  year: 2020
  end-page: 522
  ident: b42
  article-title: Privacy preserving in collaborative filtering based recommender system: A systematic literature review
  publication-title: Progress in Computing, Analytics and Networking
– volume: 151
  start-page: 147
  year: 2019
  end-page: 157
  ident: b9
  article-title: Internet of Things: A survey on machine learning-based intrusion detection approaches
  publication-title: Comput. Netw.
– volume: 144
  start-page: 13
  year: 2019
  ident: 10.1016/j.sysarc.2020.101954_b24
  article-title: Blockchain for smart communities: Applications, challenges and opportunities
  publication-title: J. Netw. Comput. Appl.
  doi: 10.1016/j.jnca.2019.06.018
– volume: 19
  start-page: 3
  issue: 1
  year: 2019
  ident: 10.1016/j.sysarc.2020.101954_b65
  article-title: A review of feature selection and its methods
  publication-title: Cybern. Inf. Technol.
– volume: 137
  start-page: 93
  year: 2019
  ident: 10.1016/j.sysarc.2020.101954_b16
  article-title: Trust models of internet of smart things: A survey, open issues, and future directions
  publication-title: J. Netw. Comput. Appl.
  doi: 10.1016/j.jnca.2019.02.024
– start-page: 1
  year: 2019
  ident: 10.1016/j.sysarc.2020.101954_b63
  article-title: Performance of hash functions in blockchain applied to IoT devices
– start-page: 184
  year: 2019
  ident: 10.1016/j.sysarc.2020.101954_b50
  article-title: Trustchain: Trust management in blockchain and IoT supported supply chains
– year: 2020
  ident: 10.1016/j.sysarc.2020.101954_b5
– volume: 101
  start-page: 747
  year: 2019
  ident: 10.1016/j.sysarc.2020.101954_b36
  article-title: Trust management in a blockchain based fog computing platform with trustless smart oracles
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2019.07.030
– volume: 107
  start-page: 433
  year: 2020
  ident: 10.1016/j.sysarc.2020.101954_b60
  article-title: Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2020.02.017
– volume: 15
  issue: 4
  year: 2019
  ident: 10.1016/j.sysarc.2020.101954_b44
  article-title: SH-BlockCC: A secure and efficient Internet of things smart home architecture based on cloud computing and blockchain technology
  publication-title: Int. J. Distrib. Sens. Netw.
  doi: 10.1177/1550147719844159
– volume: 10
  start-page: 3099
  issue: 8
  year: 2019
  ident: 10.1016/j.sysarc.2020.101954_b49
  article-title: Trust architecture and reputation evaluation for internet of things
  publication-title: J. Ambient Intell. Humaniz. Comput.
  doi: 10.1007/s12652-018-0887-z
– volume: 88
  start-page: 173
  year: 2018
  ident: 10.1016/j.sysarc.2020.101954_b20
  article-title: On blockchain and its integration with IoT. Challenges and opportunities
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2018.05.046
– volume: 108
  start-page: 921
  year: 2020
  ident: 10.1016/j.sysarc.2020.101954_b4
  article-title: A unified framework for big data acquisition, storage, and analytics for demand response management in smart cities
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2018.02.039
– volume: 8
  start-page: 60117
  year: 2020
  ident: 10.1016/j.sysarc.2020.101954_b35
  article-title: Trust and reputation in the internet of things: State-of-the-art and research challenges
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.2982318
– start-page: 1
  year: 2020
  ident: 10.1016/j.sysarc.2020.101954_b22
  article-title: Blockchain meets cloud computing: A survey
  publication-title: IEEE Commun. Surv. Tutor.
– volume: 151
  start-page: 147
  year: 2019
  ident: 10.1016/j.sysarc.2020.101954_b9
  article-title: Internet of Things: A survey on machine learning-based intrusion detection approaches
  publication-title: Comput. Netw.
  doi: 10.1016/j.comnet.2019.01.023
– volume: 63
  start-page: 1
  issue: 3
  year: 2020
  ident: 10.1016/j.sysarc.2020.101954_b72
  article-title: SecBCS: a secure and privacy-preserving blockchain-based crowdsourcing system
  publication-title: Sci. China Inf. Sci.
  doi: 10.1007/s11432-019-9893-2
– volume: 87
  year: 2020
  ident: 10.1016/j.sysarc.2020.101954_b57
  article-title: A reversible privacy-preserving clustering technique based on k-means algorithm
  publication-title: Appl. Soft Comput.
  doi: 10.1016/j.asoc.2019.105995
– volume: 52
  start-page: 1
  issue: 4
  year: 2019
  ident: 10.1016/j.sysarc.2020.101954_b43
  article-title: Decision tree classification with differential privacy: A survey
  publication-title: ACM Comput. Surv.
  doi: 10.1145/3337064
– volume: 48
  start-page: 1
  issue: 2
  year: 2015
  ident: 10.1016/j.sysarc.2020.101954_b15
  article-title: Detecting malicious data injections in wireless sensor networks: A survey
  publication-title: ACM Comput. Surv.
  doi: 10.1145/2818184
– volume: 8
  start-page: 79764
  year: 2020
  ident: 10.1016/j.sysarc.2020.101954_b45
  article-title: Blockchain for industry 4.0: A comprehensive review
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.2988579
– volume: 88
  year: 2020
  ident: 10.1016/j.sysarc.2020.101954_b56
  article-title: PrivySharing: A blockchain-based framework for privacy-preserving and secure data sharing in smart cities
  publication-title: Comput. Secur.
  doi: 10.1016/j.cose.2019.101653
– year: 2020
  ident: 10.1016/j.sysarc.2020.101954_b23
– start-page: 719
  year: 2018
  ident: 10.1016/j.sysarc.2020.101954_b54
  article-title: Reputation management in multi-agent systems using permissioned blockchain technology
– volume: 150
  start-page: 13
  year: 2020
  ident: 10.1016/j.sysarc.2020.101954_b27
  article-title: Trust management in social Internet of Things: A taxonomy, open issues, and challenges
  publication-title: Comput. Commun.
  doi: 10.1016/j.comcom.2019.10.034
– year: 2020
  ident: 10.1016/j.sysarc.2020.101954_b30
  article-title: FGMC-HADS: Fuzzy Gaussian mixture-based correntropy models for detecting zero-day attacks from linux systems
  publication-title: Comput. Secur.
  doi: 10.1016/j.cose.2020.101906
– volume: 153
  start-page: 406
  year: 2020
  ident: 10.1016/j.sysarc.2020.101954_b46
  article-title: Machine learning models for secure data analytics: A taxonomy and threat model
  publication-title: Comput. Commun.
  doi: 10.1016/j.comcom.2020.02.008
– start-page: 25
  year: 2020
  ident: 10.1016/j.sysarc.2020.101954_b64
  article-title: Blockchain: A path to the future
– start-page: 35
  year: 2020
  ident: 10.1016/j.sysarc.2020.101954_b62
  article-title: Blockchain-based framework for data storage in peer-to-peer scheme using interplanetary file system
– start-page: 1
  year: 2019
  ident: 10.1016/j.sysarc.2020.101954_b12
  article-title: An integrated framework for privacy-preserving based anomaly detection for cyber-physical systems
  publication-title: IEEE Trans. Sustain. Comput.
– year: 2020
  ident: 10.1016/j.sysarc.2020.101954_b47
– volume: 15
  issue: 1
  year: 2019
  ident: 10.1016/j.sysarc.2020.101954_b26
  article-title: Trust management in social internet of vehicles: Factors, challenges, blockchain, and fog solutions
  publication-title: Int. J. Distrib. Sens. Netw.
  doi: 10.1177/1550147719825820
– start-page: 1
  year: 2020
  ident: 10.1016/j.sysarc.2020.101954_b48
  article-title: An efficient spam detection technique for IoT devices using machine learning
  publication-title: IEEE Trans. Ind. Inf.
– volume: 9
  year: 2020
  ident: 10.1016/j.sysarc.2020.101954_b18
  article-title: The fog cloud of things: A survey on concepts, architecture, standards, tools, and applications
  publication-title: Internet Things
  doi: 10.1016/j.iot.2020.100177
– ident: 10.1016/j.sysarc.2020.101954_b52
  doi: 10.1145/3343147.3343169
– volume: 39
  start-page: 499
  year: 2018
  ident: 10.1016/j.sysarc.2020.101954_b13
  article-title: Security and privacy challenges in smart cities
  publication-title: Sustain. Cities Soc.
  doi: 10.1016/j.scs.2018.02.039
– volume: 5
  start-page: 716
  issue: 2
  year: 2017
  ident: 10.1016/j.sysarc.2020.101954_b17
  article-title: Policy-based secure and trustworthy sensing for internet of things in smart cities
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2017.2720635
– volume: 515
  start-page: 132
  year: 2020
  ident: 10.1016/j.sysarc.2020.101954_b41
  article-title: Privacy-preserving clustering for big data in cyber-physical-social systems: Survey and perspectives
  publication-title: Inform. Sci.
  doi: 10.1016/j.ins.2019.10.019
– start-page: 513
  year: 2020
  ident: 10.1016/j.sysarc.2020.101954_b42
  article-title: Privacy preserving in collaborative filtering based recommender system: A systematic literature review
– year: 2019
  ident: 10.1016/j.sysarc.2020.101954_b31
– volume: 34
  start-page: 83
  issue: 2
  year: 2020
  ident: 10.1016/j.sysarc.2020.101954_b37
  article-title: BlockSDN: Blockchain-as-a-service for software defined networking in smart city applications
  publication-title: IEEE Netw.
  doi: 10.1109/MNET.001.1900151
– start-page: 1
  year: 2018
  ident: 10.1016/j.sysarc.2020.101954_b40
  article-title: Privacy-preserving big data analytics for cyber-physical systems
  publication-title: Wirel. Netw.
– volume: 75
  start-page: 4543
  issue: 8
  year: 2019
  ident: 10.1016/j.sysarc.2020.101954_b11
  article-title: A comprehensive study on APT attacks and countermeasures for future networks and communications: challenges and solutions
  publication-title: J. Supercomput.
  doi: 10.1007/s11227-016-1850-4
– start-page: 1
  year: 2020
  ident: 10.1016/j.sysarc.2020.101954_b59
  article-title: Corrauc: a malicious Bot-IoT traffic detection method in IoT network using machine learning techniques
  publication-title: IEEE Internet Things J.
– volume: 100
  start-page: 779
  year: 2019
  ident: 10.1016/j.sysarc.2020.101954_b28
  article-title: Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-iot dataset
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2019.05.041
– volume: 160
  start-page: 475
  year: 2020
  ident: 10.1016/j.sysarc.2020.101954_b32
  article-title: Towards trustworthy Internet of Things: A survey on trust management applications and schemes
  publication-title: Comput. Commun.
  doi: 10.1016/j.comcom.2020.06.030
– start-page: 47
  year: 2019
  ident: 10.1016/j.sysarc.2020.101954_b14
  article-title: False data injection attacks in internet of things
– volume: 12
  start-page: 2825
  year: 2011
  ident: 10.1016/j.sysarc.2020.101954_b71
  article-title: Scikit-learn: Machine learning in python
  publication-title: J. Mach. Learn. Res.
– volume: 77
  start-page: 112
  year: 2017
  ident: 10.1016/j.sysarc.2020.101954_b8
  article-title: Towards a secure service provisioning framework in a smart city environment
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2017.06.031
– start-page: 1
  year: 2020
  ident: 10.1016/j.sysarc.2020.101954_b39
  article-title: A deep blockchain framework-enabled collaborative intrusion detection for protecting IoT and cloud networks
  publication-title: IEEE Internet Things J.
– volume: 75
  start-page: 2070
  issue: 4
  year: 2019
  ident: 10.1016/j.sysarc.2020.101954_b21
  article-title: Fog computing: from architecture to edge computing and big data processing
  publication-title: J. Supercomput.
  doi: 10.1007/s11227-018-2701-2
– volume: 9
  start-page: 219
  issue: 2
  year: 2020
  ident: 10.1016/j.sysarc.2020.101954_b68
  article-title: A novel PCA-firefly based xgboost classification model for intrusion detection in networks using GPU
  publication-title: Electronics
  doi: 10.3390/electronics9020219
– volume: 10
  start-page: 1388
  issue: 5
  year: 2018
  ident: 10.1016/j.sysarc.2020.101954_b1
  article-title: The role of Internet of Things (IoT) in smart cities: Technology roadmap-oriented approaches
  publication-title: Sustainability
  doi: 10.3390/su10051388
– volume: 63
  year: 2020
  ident: 10.1016/j.sysarc.2020.101954_b2
  article-title: Convergence of blockchain and artificial intelligence in IoT network for the sustainable smart city
  publication-title: Sustainable Cities Soc.
  doi: 10.1016/j.scs.2020.102364
– volume: 7
  start-page: 175744
  year: 2019
  ident: 10.1016/j.sysarc.2020.101954_b51
  article-title: Proof-of-reputation based-consortium blockchain for trust resource sharing in internet of vehicles
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2956955
– volume: 97
  start-page: 130
  year: 2019
  ident: 10.1016/j.sysarc.2020.101954_b38
  article-title: P2TA: Privacy-preserving task allocation for edge computing enhanced mobile crowdsensing
  publication-title: J. Syst. Archit.
  doi: 10.1016/j.sysarc.2019.01.005
– volume: 148
  start-page: 164
  year: 2019
  ident: 10.1016/j.sysarc.2020.101954_b67
  article-title: Dimensionality reduction with IG-PCA and ensemble classifier for network intrusion detection
  publication-title: Comput. Netw.
  doi: 10.1016/j.comnet.2018.11.010
– volume: 8
  start-page: 21127
  year: 2020
  ident: 10.1016/j.sysarc.2020.101954_b34
  article-title: Blockchain-based distributed trust and reputation management systems: a survey
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.2969820
– volume: 15
  start-page: 1
  year: 2019
  ident: 10.1016/j.sysarc.2020.101954_b55
  article-title: Privacy-preserving deep learning algorithm for big personal data analysis
  publication-title: J. Ind. Inf. Integr.
– volume: 160
  start-page: 139
  year: 2020
  ident: 10.1016/j.sysarc.2020.101954_b66
  article-title: An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture
  publication-title: Comput. Commun.
  doi: 10.1016/j.comcom.2020.05.048
– year: 2020
  ident: 10.1016/j.sysarc.2020.101954_b58
  article-title: IoT malicious traffic identification using wrapper-based feature selection mechanisms
  publication-title: Comput. Secur.
  doi: 10.1016/j.cose.2020.101863
– volume: 12
  start-page: 61
  issue: 4
  year: 2020
  ident: 10.1016/j.sysarc.2020.101954_b19
  article-title: Blockchain and fog based architecture for internet of everything in smart cities
  publication-title: Future Internet
  doi: 10.3390/fi12040061
– volume: 7
  start-page: 21
  issue: 1
  year: 2018
  ident: 10.1016/j.sysarc.2020.101954_b10
  article-title: Intrusion detection systems for IoT-based smart environments: a survey
  publication-title: J. Cloud Comput.
  doi: 10.1186/s13677-018-0123-6
– volume: 105
  year: 2020
  ident: 10.1016/j.sysarc.2020.101954_b7
  article-title: A survey on intrusion detection and prevention in wireless ad-hoc networks
  publication-title: J. Syst. Archit.
  doi: 10.1016/j.sysarc.2019.101701
– start-page: 666
  year: 2018
  ident: 10.1016/j.sysarc.2020.101954_b53
  article-title: Proof of reputation: a reputation-based consensus protocol for peer-to-peer network
– year: 2020
  ident: 10.1016/j.sysarc.2020.101954_b70
  article-title: A survey on machine learning-based malware detection in executable files
  publication-title: J. Syst. Archit.
– volume: 9
  start-page: 144
  issue: 1
  year: 2020
  ident: 10.1016/j.sysarc.2020.101954_b61
  article-title: Towards a lightweight detection system for cyber attacks in the IoT environment using corresponding features
  publication-title: Electronics
  doi: 10.3390/electronics9010144
– start-page: 1
  year: 2020
  ident: 10.1016/j.sysarc.2020.101954_b69
  article-title: An efficient XGBoost–DNN-based classification model for network intrusion detection system
  publication-title: Neural Comput. Appl.
– volume: 97
  start-page: 512
  year: 2019
  ident: 10.1016/j.sysarc.2020.101954_b25
  article-title: Privacy preservation in blockchain based IoT systems: Integration issues, prospects, challenges, and future research directions
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2019.02.060
– volume: 149
  year: 2020
  ident: 10.1016/j.sysarc.2020.101954_b3
  article-title: A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT
  publication-title: J. Netw. Comput. Appl.
  doi: 10.1016/j.jnca.2019.102481
– volume: 42
  start-page: 120
  year: 2014
  ident: 10.1016/j.sysarc.2020.101954_b33
  article-title: A survey on trust management for internet of things
  publication-title: J. Netw. Comput. Appl.
  doi: 10.1016/j.jnca.2014.01.014
– year: 2018
  ident: 10.1016/j.sysarc.2020.101954_b29
– volume: 21
  start-page: 2671
  issue: 3
  year: 2019
  ident: 10.1016/j.sysarc.2020.101954_b6
  article-title: Network intrusion detection for IoT security based on learning techniques
  publication-title: IEEE Commun. Surv. Tutor.
  doi: 10.1109/COMST.2019.2896380
SSID ssj0005512
Score 2.6057456
Snippet With the advancement in sensor technology and the proliferation of low-cost electronic circuits, Internet of Things (IoT) is emerging as a promising technology...
SourceID crossref
elsevier
SourceType Enrichment Source
Index Database
Publisher
StartPage 101954
SubjectTerms Anomaly detection
Blockchain
Internet of Things
Machine learning
Privacy-preservation
Smart city
Trust management
Title TP2SF: A Trustworthy Privacy-Preserving Secured Framework for sustainable smart cities by leveraging blockchain and machine learning
URI https://dx.doi.org/10.1016/j.sysarc.2020.101954
Volume 115
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8NAEF5EL158i2_m4HVts7vJNt5KsVRFEazgLewrWq1R2ir04skf7uwm8QGi4C0sM5DszM4j-80MIfsJV05aPEjSmpgKqwxNXSulSapljh4lkZEvFD47T3pX4uQ6vp4hnboWxsMqK9tf2vRgrauVRrWbjafBoHEZ-eQqQdOLesqaoY5cCOm1_OD1C8wjLm88kZh66rp8LmC8xtMxqhNmiSwspbH42T19cTndJbJQxYrQLl9nmcy4YoUs1nMYoDqWq-Stf8Euu4fQhr6voAiovylcjAYvykypB1l4g1DcQPi57ix0a0QWYMgK488aKhg_4MeDCW1WQU9h6FDVwyAj0Oj27s0tUoIqLDwEFKaDauzEzRq56h71Oz1aTVeghks2oSqSWtiW1Ca2ItfGCi0x2FCWCx05LVtacJdIxmPMtzk-NvM4MTxX2kcNqsnXyWzxWLgNAsxq3NmcGXSIglurhI1T7mRktE4TwzYJrzc1M1XrcT8BY5jVGLO7rBRF5kWRlaLYJPSD66lsvfEHvazllX1ToQy9w6-cW__m3CbzzINcAgJyh8xORs9uF6OUid4LarhH5trHp73zdxA46gk
linkProvider Elsevier
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT9tAEF6hcGgvBVqq8mrn0Osq8T68MbcIEYVXhESQuFn7Mg0Pg0hAyp0fzux6Da2EWqk3a7Uj2TOz8_B-M0PIz5xrrxweJOWspMJpSwvfL2heGFWhR8lVFgqFT8b56FwcXsiLJbLX1sIEWGWy_Y1Nj9Y6rXQTN7v302n3LAvJVY6mF_WU9UId-XLoTiU7ZHlwcDQavyE9ZHPpiftpIGgr6CLMa7aYoUZhosjiUiHF-x7qN68zXCWfUrgIg-aN1siSrz-TlXYUA6ST-YU8T07Z2XAXBjAJRRQR-LeA04fpk7YLGnAWwSbUlxD_r3sHwxaUBRi1wuytjApmt_j9YGOnVTALuPGo7XGWERj0fNf2F-4EXTu4jUBMD2nyxOU6OR_uT_ZGNA1YoJYrNqc6U0a4vjJWOlEZ64RRGG9ox4XJvFF9I7jPFeMSU26Oj71K5pZX2oTAQff4V9Kp72r_jQBzBjlbMYs-UXDntHCy4F5l1pgit2yD8JappU3dx8MQjJuyhZldlY0oyiCKshHFBqGvVPdN941_7FetvMo_tKhEB_FXys3_pvxBPowmJ8fl8cH4aIt8ZAHzEgGR26Qzf3j0Oxi0zM33pJQvEzzsug
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=TP2SF%3A+A+Trustworthy+Privacy-Preserving+Secured+Framework+for+sustainable+smart+cities+by+leveraging+blockchain+and+machine+learning&rft.jtitle=Journal+of+systems+architecture&rft.au=Kumar%2C+Prabhat&rft.au=Gupta%2C+Govind+P.&rft.au=Tripathi%2C+Rakesh&rft.date=2021-05-01&rft.issn=1383-7621&rft.volume=115&rft.spage=101954&rft_id=info:doi/10.1016%2Fj.sysarc.2020.101954&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_sysarc_2020_101954
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1383-7621&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1383-7621&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1383-7621&client=summon