TP2SF: A Trustworthy Privacy-Preserving Secured Framework for sustainable smart cities by leveraging blockchain and machine learning
With the advancement in sensor technology and the proliferation of low-cost electronic circuits, Internet of Things (IoT) is emerging as a promising technology for realization of smart cities. However, challenges such as security, privacy, trust, scalability, verifiability, and centralization preven...
Saved in:
Published in | Journal of systems architecture Vol. 115; p. 101954 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
Elsevier B.V
01.05.2021
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | With the advancement in sensor technology and the proliferation of low-cost electronic circuits, Internet of Things (IoT) is emerging as a promising technology for realization of smart cities. However, challenges such as security, privacy, trust, scalability, verifiability, and centralization prevent faster adaptations of IoT-driven smart cities. Thus, in this paper, a Trustworthy Privacy-Preserving Secured Framework (TP2SF) for smart cities is presented. This framework includes three modules namely: a trustworthiness module, a two-level privacy module, and an intrusion detection module. In trustworthiness module, address-based blockchain reputation system is designed. In the two-level privacy module, a blockchain based enhanced Proof of Work (ePoW) technique is simultaneously applied with Principal Component analysis (PCA) to transform data into a new reduced shape for preventing inference and poisoning attacks. In the intrusion detection module, an optimized gradient tree boosting system (XGBoost) is deployed. Finally, due to inherited strengths and weaknesses of Fog–Cloud architecture, we present a blockchain-IPFS integrated Fog–Cloud infrastructure namely, CloudBlock and FogBlock to deploy proposed TP2SF framework in smart city. The TP2SF framework is evaluated using two realistic IoT-based datasets, namely ToN-IoT and BoT-IoT. The findings indicate the superiority of TP2SF framework over other state-of-the-art techniques in both nonblockchain and blockchain systems. |
---|---|
AbstractList | With the advancement in sensor technology and the proliferation of low-cost electronic circuits, Internet of Things (IoT) is emerging as a promising technology for realization of smart cities. However, challenges such as security, privacy, trust, scalability, verifiability, and centralization prevent faster adaptations of IoT-driven smart cities. Thus, in this paper, a Trustworthy Privacy-Preserving Secured Framework (TP2SF) for smart cities is presented. This framework includes three modules namely: a trustworthiness module, a two-level privacy module, and an intrusion detection module. In trustworthiness module, address-based blockchain reputation system is designed. In the two-level privacy module, a blockchain based enhanced Proof of Work (ePoW) technique is simultaneously applied with Principal Component analysis (PCA) to transform data into a new reduced shape for preventing inference and poisoning attacks. In the intrusion detection module, an optimized gradient tree boosting system (XGBoost) is deployed. Finally, due to inherited strengths and weaknesses of Fog–Cloud architecture, we present a blockchain-IPFS integrated Fog–Cloud infrastructure namely, CloudBlock and FogBlock to deploy proposed TP2SF framework in smart city. The TP2SF framework is evaluated using two realistic IoT-based datasets, namely ToN-IoT and BoT-IoT. The findings indicate the superiority of TP2SF framework over other state-of-the-art techniques in both nonblockchain and blockchain systems. |
ArticleNumber | 101954 |
Author | Kumar, Prabhat Tripathi, Rakesh Gupta, Govind P. |
Author_xml | – sequence: 1 givenname: Prabhat orcidid: 0000-0002-0723-0752 surname: Kumar fullname: Kumar, Prabhat email: pkumar.phd2019.it@nitrr.ac.in – sequence: 2 givenname: Govind P. surname: Gupta fullname: Gupta, Govind P. email: gpgupta.it@nitrr.ac.in – sequence: 3 givenname: Rakesh surname: Tripathi fullname: Tripathi, Rakesh email: rtripathi.it@nitrr.ac.in |
BookMark | eNqFkMtOAzEMRSMEEs8_YJEfmJLHvGCBhBAFJCQqUdaRk_HQlGkGOUPR7PlwUsqKBax8Zd9j2feQ7YY-IGOnUkykkOXZchLHCOQmSqjv1nmR77ADWVc6K2VZ7Cata51VpZL77DDGpRCiKKQ6YJ_zmXqaXvArPqf3OHz0NCxGPiO_BjdmM8KItPbhhT-heyds-JRghcn2ytueeEwM-AC2Qx5XQAN3fvAYuR15h2skeNnAtuvdq1skJ4fQ8BW4hQ-YHEAhzY_ZXgtdxJOfesSepzfz67vs4fH2_vrqIXO6UkMGsrJ5U1fWFU3eWtfkthKqhkbnVqKtaptrLCulC7RaJynaonS6BStqJUDoI5Zv9zrqYyRszRv5dPVopDCbJM3SbJM0myTNNsmEXfzC0pMw-D4MBL77D77cwpgeW3skE53H4LDxhG4wTe__XvAFBy2XKA |
CitedBy_id | crossref_primary_10_3390_electronics10111257 crossref_primary_10_1016_j_eswa_2024_123853 crossref_primary_10_1049_blc2_12025 crossref_primary_10_3390_s23198153 crossref_primary_10_3390_fi16090324 crossref_primary_10_3390_s22176436 crossref_primary_10_3390_sym14112304 crossref_primary_10_1007_s00354_023_00210_9 crossref_primary_10_1038_s41598_023_42257_0 crossref_primary_10_1007_s11135_021_01251_2 crossref_primary_10_1109_JIOT_2021_3122021 crossref_primary_10_3390_app12125893 crossref_primary_10_1002_int_22946 crossref_primary_10_1002_ett_4578 crossref_primary_10_1007_s10586_024_04424_4 crossref_primary_10_1155_2023_6048087 crossref_primary_10_1007_s11042_024_19150_7 crossref_primary_10_3390_info14050295 crossref_primary_10_1109_ACCESS_2024_3408868 crossref_primary_10_3390_electronics13061053 crossref_primary_10_1109_ACCESS_2022_3216850 crossref_primary_10_1109_ACCESS_2024_3409273 crossref_primary_10_3390_info15010065 crossref_primary_10_1109_ACCESS_2023_3236983 crossref_primary_10_1002_cpe_7738 crossref_primary_10_1142_S0219265923500081 crossref_primary_10_1049_ise2_12091 crossref_primary_10_1007_s12083_024_01776_x crossref_primary_10_1007_s12083_022_01430_4 crossref_primary_10_1016_j_asej_2023_102211 crossref_primary_10_1016_j_imavis_2022_104573 crossref_primary_10_1016_j_procs_2023_01_014 crossref_primary_10_1109_JIOT_2022_3217087 crossref_primary_10_3390_electronics11152314 crossref_primary_10_1016_j_icte_2024_02_008 crossref_primary_10_1007_s10586_022_03776_z crossref_primary_10_1186_s13677_022_00305_6 crossref_primary_10_1002_cpe_7529 crossref_primary_10_1142_S0218539323410036 crossref_primary_10_4018_IJCAC_297106 crossref_primary_10_1109_ACCESS_2024_3396461 crossref_primary_10_1007_s10115_024_02273_6 crossref_primary_10_1007_s42979_024_03152_1 crossref_primary_10_3233_JIFS_221873 crossref_primary_10_1109_TITS_2021_3122368 crossref_primary_10_3390_app12041863 crossref_primary_10_3390_s22197162 crossref_primary_10_1007_s42979_024_03383_2 crossref_primary_10_3390_app12199572 crossref_primary_10_3390_s24124022 crossref_primary_10_1080_09540091_2022_2149698 crossref_primary_10_1007_s13369_024_08882_1 crossref_primary_10_1186_s40537_024_00912_x crossref_primary_10_1002_nem_2295 crossref_primary_10_1007_s42979_023_02075_7 crossref_primary_10_1007_s11042_022_13915_8 crossref_primary_10_3390_s22010241 crossref_primary_10_1007_s00500_024_10322_z crossref_primary_10_1016_j_scs_2024_105438 crossref_primary_10_1109_ACCESS_2022_3203568 crossref_primary_10_1109_ACCESS_2024_3454211 crossref_primary_10_1109_MGRS_2023_3272825 crossref_primary_10_1109_TAI_2022_3213531 crossref_primary_10_1007_s13369_021_06028_1 crossref_primary_10_1587_transcom_2022EBP3169 crossref_primary_10_3390_app14167034 crossref_primary_10_1109_JIOT_2023_3237893 crossref_primary_10_32604_cmc_2022_030825 crossref_primary_10_1007_s13369_023_07900_y crossref_primary_10_1016_j_comnet_2023_109726 crossref_primary_10_1016_j_rineng_2024_103882 crossref_primary_10_1145_3539608 crossref_primary_10_1016_j_matpr_2021_10_472 crossref_primary_10_1145_3614424 crossref_primary_10_3390_su14148707 crossref_primary_10_1016_j_jpdc_2022_12_009 crossref_primary_10_3390_electronics13061012 crossref_primary_10_3390_electronics13245060 crossref_primary_10_1007_s10723_023_09680_z crossref_primary_10_1016_j_scs_2022_104089 crossref_primary_10_1111_exsy_12934 crossref_primary_10_1038_s41598_024_74822_6 crossref_primary_10_3390_su15086902 crossref_primary_10_1007_s11042_023_16406_6 crossref_primary_10_1109_OJCOMS_2024_3438264 crossref_primary_10_1016_j_jnca_2024_103858 crossref_primary_10_1016_j_iot_2022_100584 crossref_primary_10_3390_s23031252 crossref_primary_10_1016_j_jpdc_2022_01_030 crossref_primary_10_1038_s41598_024_81147_x crossref_primary_10_1007_s12083_021_01263_7 crossref_primary_10_1109_ACCESS_2023_3264598 crossref_primary_10_1109_ACCESS_2023_3245524 crossref_primary_10_1109_JIOT_2022_3201772 crossref_primary_10_1109_ACCESS_2025_3538331 crossref_primary_10_1109_MM_2021_3112476 crossref_primary_10_1142_S0218126623300015 crossref_primary_10_1109_ACCESS_2023_3293529 crossref_primary_10_1155_2022_6468870 crossref_primary_10_1109_IOTM_002_2200195 crossref_primary_10_1016_j_seta_2023_103114 crossref_primary_10_1007_s12083_023_01592_9 crossref_primary_10_3390_app11157013 crossref_primary_10_3390_electronics10091104 crossref_primary_10_1016_j_future_2023_08_010 crossref_primary_10_1142_S0219622023500530 crossref_primary_10_32604_cmes_2023_026691 crossref_primary_10_1155_2022_7281872 crossref_primary_10_1007_s10586_024_04387_6 crossref_primary_10_1109_JSEN_2025_3526807 crossref_primary_10_1109_TNSE_2022_3191601 crossref_primary_10_1016_j_cities_2024_105198 crossref_primary_10_1109_TKDE_2024_3382726 crossref_primary_10_1155_2023_7107663 crossref_primary_10_2139_ssrn_5077757 crossref_primary_10_1007_s10586_024_04780_1 crossref_primary_10_3390_electronics12102180 crossref_primary_10_1007_s13369_024_08835_8 crossref_primary_10_1007_s00607_024_01390_y |
Cites_doi | 10.1016/j.jnca.2019.06.018 10.1016/j.jnca.2019.02.024 10.1016/j.future.2019.07.030 10.1016/j.future.2020.02.017 10.1177/1550147719844159 10.1007/s12652-018-0887-z 10.1016/j.future.2018.05.046 10.1016/j.future.2018.02.039 10.1109/ACCESS.2020.2982318 10.1016/j.comnet.2019.01.023 10.1007/s11432-019-9893-2 10.1016/j.asoc.2019.105995 10.1145/3337064 10.1145/2818184 10.1109/ACCESS.2020.2988579 10.1016/j.cose.2019.101653 10.1016/j.comcom.2019.10.034 10.1016/j.cose.2020.101906 10.1016/j.comcom.2020.02.008 10.1177/1550147719825820 10.1016/j.iot.2020.100177 10.1145/3343147.3343169 10.1016/j.scs.2018.02.039 10.1109/JIOT.2017.2720635 10.1016/j.ins.2019.10.019 10.1109/MNET.001.1900151 10.1007/s11227-016-1850-4 10.1016/j.future.2019.05.041 10.1016/j.comcom.2020.06.030 10.1016/j.future.2017.06.031 10.1007/s11227-018-2701-2 10.3390/electronics9020219 10.3390/su10051388 10.1016/j.scs.2020.102364 10.1109/ACCESS.2019.2956955 10.1016/j.sysarc.2019.01.005 10.1016/j.comnet.2018.11.010 10.1109/ACCESS.2020.2969820 10.1016/j.comcom.2020.05.048 10.1016/j.cose.2020.101863 10.3390/fi12040061 10.1186/s13677-018-0123-6 10.1016/j.sysarc.2019.101701 10.3390/electronics9010144 10.1016/j.future.2019.02.060 10.1016/j.jnca.2019.102481 10.1016/j.jnca.2014.01.014 10.1109/COMST.2019.2896380 |
ContentType | Journal Article |
Copyright | 2020 Elsevier B.V. |
Copyright_xml | – notice: 2020 Elsevier B.V. |
DBID | AAYXX CITATION |
DOI | 10.1016/j.sysarc.2020.101954 |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 1873-6165 |
ExternalDocumentID | 10_1016_j_sysarc_2020_101954 S1383762120302071 |
GroupedDBID | --K --M -~X .DC .~1 0R~ 1B1 1~. 1~5 29L 4.4 457 4G. 5GY 5VS 7-5 71M 8P~ AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AAXUO AAYFN ABBOA ABFNM ABFRF ABJNI ABMAC ABXDB ABYKQ ACDAQ ACGFO ACGFS ACNNM ACRLP ACZNC ADBBV ADEZE ADJOM ADMUD ADTZH AEBSH AECPX AEFWE AEKER AENEX AFKWA AFTJW AGHFR AGUBO AGYEJ AHJVU AHZHX AIALX AIEXJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD ASPBG AVWKF AXJTR AZFZN BJAXD BKOJK BKOMP BLXMC CS3 DU5 EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 FDB FEDTE FGOYB FIRID FNPLU FYGXN G-Q GBLVA GBOLZ HVGLF HZ~ IHE J1W JJJVA KOM M41 MO0 MS~ N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. PQQKQ Q38 R2- RIG ROL RPZ RXW SBC SDF SDG SDP SES SEW SPC SPCBC SST SSV SSZ T5K TAE TN5 U5U UHS ~G- AATTM AAXKI AAYWO AAYXX ABWVN ACRPL ACVFH ADCNI ADNMO AEIPS AEUPX AFJKZ AFPUW AFXIZ AGCQF AGQPQ AGRNS AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP BNPGV CITATION SSH |
ID | FETCH-LOGICAL-c372t-a17b4d87bc5d4fbcd4b7028ad34b1eb78b43e67235eb333e60f56c3fab0820a03 |
IEDL.DBID | .~1 |
ISSN | 1383-7621 |
IngestDate | Thu Apr 24 23:06:54 EDT 2025 Tue Jul 01 00:29:17 EDT 2025 Fri Feb 23 02:43:34 EST 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Keywords | Machine learning Blockchain Privacy-preservation Internet of Things Smart city Trust management Anomaly detection |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c372t-a17b4d87bc5d4fbcd4b7028ad34b1eb78b43e67235eb333e60f56c3fab0820a03 |
ORCID | 0000-0002-0723-0752 |
ParticipantIDs | crossref_primary_10_1016_j_sysarc_2020_101954 crossref_citationtrail_10_1016_j_sysarc_2020_101954 elsevier_sciencedirect_doi_10_1016_j_sysarc_2020_101954 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | May 2021 2021-05-00 |
PublicationDateYYYYMMDD | 2021-05-01 |
PublicationDate_xml | – month: 05 year: 2021 text: May 2021 |
PublicationDecade | 2020 |
PublicationTitle | Journal of systems architecture |
PublicationYear | 2021 |
Publisher | Elsevier B.V |
Publisher_xml | – name: Elsevier B.V |
References | Fletcher, Islam (b43) 2019; 52 Soe, Feng, Santosa, Hartanto, Sakurai (b61) 2020; 9 (b66) 2020; 160 Shafiq, Tian, Bashir, Du, Guizani (b58) 2020 Lin, He, Zeadally, Kumar, Choo (b72) 2020; 63 Ferreira, Antunes, Zhygulskyy, Frazão (b63) 2019 Singh, Ra, Meng, Kaur, Cho (b44) 2019; 15 Haider, Moustafa, Keshk, Fernandez, Choo, Wahab (b30) 2020 Bellini, Iraqi, Damiani (b34) 2020; 8 Alguliyev, Aliguliyev, Abdullayeva (b55) 2019; 15 Gupta, Tanwar, Tyagi, Kumar (b46) 2020; 153 Calvaresi, Mattioli, Dubovitskaya, Dragoni, Schumacher (b54) 2018 Chahal, Kumar, Batra (b27) 2020; 150 Shen, Bai, Hu, Wang (b38) 2019; 97 Illiano, Lupu (b15) 2015; 48 Gai, Wang, Deng, Peng (b53) 2018 Makkar, Garg, Kumar, Hossain, Ghoneim, Alrashoud (b48) 2020 Khan, Mehmood, Khan, Khan, Iqbal, Mashwani (b7) 2020; 105 Kaur, Nayyar, Singh (b64) 2020 Kumar, Makkar (b47) 2020 Singh, Sharma, Yoon, Shojafar, Cho, Ra (b2) 2020; 63 Shafiq, Tian, Bashir, Du, Guizani (b59) 2020 Kumar, Tripathi (b62) 2020 da Costa, Papa, Lisboa, Munoz, de Albuquerque (b9) 2019; 151 Koroniotis, Moustafa, Sitnikova, Turnbull (b28) 2019; 100 Singh, Nayyar, Kaur, Ghosh (b19) 2020; 12 Aujla, Singh, Bose, Kumar, Han, Buyya (b37) 2020; 34 Alkadi, Moustafa, Turnbull, Choo (b39) 2020 Jindal, Kumar, Singh (b4) 2020; 108 Keshk, Moustafa, Sitnikova, Turnbull (b40) 2018 Bouachir, Aloqaily, Tseng, Boukerche (b23) 2020 Nayyar, Rameshwar, Solanki (b5) 2020 Gai, Guo, Zhu, Yu (b22) 2020 Malik, Dedeoglu, Kanhere, Jurdak (b50) 2019 Iqbal, Butt, Afzaal, Salah (b26) 2019; 15 Salo, Nassif, Essex (b67) 2019; 148 Zhao, Tarus, Yang, Sun, Ge, Wang (b41) 2020; 515 Moustafa (b31) 2019 Koroniotis, Moustafa, Sitnikova, Turnbull (b29) 2018 Elrawy, Awad, Hamed (b10) 2018; 7 Makhdoom, Zhou, Abolhasan, Lipman, Ni (b56) 2020; 88 Venkatesh, Anuradha (b65) 2019; 19 Chai, Leng, Zhang, Mao (b51) 2019; 7 Lin (b57) 2020; 87 Devan, Khare (b69) 2020 Bostami, Ahmed, Choudhury (b14) 2019 Park, Del Pobil, Kwon (b1) 2018; 10 Shafiq, Tian, Sun, Du, Guizani (b60) 2020; 107 Sengupta, Ruj, Bit (b3) 2020; 149 Fortino, Fotia, Messina, Rosaci, Sarné (b35) 2020; 8 Raj, Sahoo, Pradhan (b42) 2020 Sharma, Pilli, Mazumdar, Gera (b32) 2020; 160 Braun, Fung, Iqbal, Shah (b13) 2018; 39 Alli, Alam (b18) 2020; 9 Reyna, Martín, Chen, Soler, Díaz (b20) 2018; 88 Bhattacharya, Kaluri, Singh, Alazab, Tariq (b68) 2020; 9 Singh, Sharma, Moon, Moon, Park (b11) 2019; 75 Li, Song, Zeng (b17) 2017; 5 Singh, Nayyar, Kumar, Sharma (b21) 2019; 75 Khan, Pervez, Abbasi (b8) 2017; 77 Yan, Zhang, Vasilakos (b33) 2014; 42 Keshk, Sitnikova, Moustafa, Hu, Khalil (b12) 2019 Kochovski, Gec, Stankovski, Bajec, Drobintsev (b36) 2019; 101 Aggarwal, Chaudhary, Aujla, Kumar, Choo, Zomaya (b24) 2019; 144 Chen, Tian, Cui, Yin, Wang (b49) 2019; 10 Q. Zhuang, Y. Liu, L. Chen, Z. Ai, Proof of reputation: A reputation-based consensus protocol for blockchain based systems, in: Proceedings of the 2019 International Electronics Communication Conference, 2019, pp. 131–138. Hassan, Rehmani, Chen (b25) 2019; 97 Singh, Singh (b70) 2020 Altaf, Abbas, Iqbal, Derhab (b16) 2019; 137 Pedregosa, Varoquaux, Gramfort, Michel, Thirion, Grisel, Blondel, Prettenhofer, Weiss, Dubourg, Vanderplas, Passos, Cournapeau, Brucher, Perrot, Duchesnay (b71) 2011; 12 Bodkhe, Tanwar, Parekh, Khanpara, Tyagi, Kumar, Alazab (b45) 2020; 8 Chaabouni, Mosbah, Zemmari, Sauvignac, Faruki (b6) 2019; 21 Singh (10.1016/j.sysarc.2020.101954_b19) 2020; 12 Jindal (10.1016/j.sysarc.2020.101954_b4) 2020; 108 Keshk (10.1016/j.sysarc.2020.101954_b40) 2018 Aujla (10.1016/j.sysarc.2020.101954_b37) 2020; 34 Iqbal (10.1016/j.sysarc.2020.101954_b26) 2019; 15 Altaf (10.1016/j.sysarc.2020.101954_b16) 2019; 137 Koroniotis (10.1016/j.sysarc.2020.101954_b28) 2019; 100 Lin (10.1016/j.sysarc.2020.101954_b57) 2020; 87 Gai (10.1016/j.sysarc.2020.101954_b22) 2020 Aggarwal (10.1016/j.sysarc.2020.101954_b24) 2019; 144 Raj (10.1016/j.sysarc.2020.101954_b42) 2020 Salo (10.1016/j.sysarc.2020.101954_b67) 2019; 148 Alguliyev (10.1016/j.sysarc.2020.101954_b55) 2019; 15 Nayyar (10.1016/j.sysarc.2020.101954_b5) 2020 Chen (10.1016/j.sysarc.2020.101954_b49) 2019; 10 Bellini (10.1016/j.sysarc.2020.101954_b34) 2020; 8 Fletcher (10.1016/j.sysarc.2020.101954_b43) 2019; 52 Singh (10.1016/j.sysarc.2020.101954_b2) 2020; 63 Chai (10.1016/j.sysarc.2020.101954_b51) 2019; 7 Singh (10.1016/j.sysarc.2020.101954_b70) 2020 Lin (10.1016/j.sysarc.2020.101954_b72) 2020; 63 Kaur (10.1016/j.sysarc.2020.101954_b64) 2020 Chaabouni (10.1016/j.sysarc.2020.101954_b6) 2019; 21 Elrawy (10.1016/j.sysarc.2020.101954_b10) 2018; 7 Koroniotis (10.1016/j.sysarc.2020.101954_b29) 2018 Moustafa (10.1016/j.sysarc.2020.101954_b31) 2019 10.1016/j.sysarc.2020.101954_b52 Keshk (10.1016/j.sysarc.2020.101954_b12) 2019 Chahal (10.1016/j.sysarc.2020.101954_b27) 2020; 150 Bhattacharya (10.1016/j.sysarc.2020.101954_b68) 2020; 9 Fortino (10.1016/j.sysarc.2020.101954_b35) 2020; 8 Alkadi (10.1016/j.sysarc.2020.101954_b39) 2020 Sharma (10.1016/j.sysarc.2020.101954_b32) 2020; 160 Park (10.1016/j.sysarc.2020.101954_b1) 2018; 10 Kumar (10.1016/j.sysarc.2020.101954_b47) 2020 Bodkhe (10.1016/j.sysarc.2020.101954_b45) 2020; 8 Makkar (10.1016/j.sysarc.2020.101954_b48) 2020 Calvaresi (10.1016/j.sysarc.2020.101954_b54) 2018 Ferreira (10.1016/j.sysarc.2020.101954_b63) 2019 Khan (10.1016/j.sysarc.2020.101954_b8) 2017; 77 Alli (10.1016/j.sysarc.2020.101954_b18) 2020; 9 Pedregosa (10.1016/j.sysarc.2020.101954_b71) 2011; 12 Haider (10.1016/j.sysarc.2020.101954_b30) 2020 Yan (10.1016/j.sysarc.2020.101954_b33) 2014; 42 Kochovski (10.1016/j.sysarc.2020.101954_b36) 2019; 101 (10.1016/j.sysarc.2020.101954_b66) 2020; 160 Sengupta (10.1016/j.sysarc.2020.101954_b3) 2020; 149 Singh (10.1016/j.sysarc.2020.101954_b44) 2019; 15 Shafiq (10.1016/j.sysarc.2020.101954_b58) 2020 Illiano (10.1016/j.sysarc.2020.101954_b15) 2015; 48 Zhao (10.1016/j.sysarc.2020.101954_b41) 2020; 515 Shafiq (10.1016/j.sysarc.2020.101954_b59) 2020 Makhdoom (10.1016/j.sysarc.2020.101954_b56) 2020; 88 Bouachir (10.1016/j.sysarc.2020.101954_b23) 2020 Singh (10.1016/j.sysarc.2020.101954_b21) 2019; 75 Shen (10.1016/j.sysarc.2020.101954_b38) 2019; 97 Malik (10.1016/j.sysarc.2020.101954_b50) 2019 Devan (10.1016/j.sysarc.2020.101954_b69) 2020 Bostami (10.1016/j.sysarc.2020.101954_b14) 2019 Hassan (10.1016/j.sysarc.2020.101954_b25) 2019; 97 Venkatesh (10.1016/j.sysarc.2020.101954_b65) 2019; 19 Khan (10.1016/j.sysarc.2020.101954_b7) 2020; 105 da Costa (10.1016/j.sysarc.2020.101954_b9) 2019; 151 Li (10.1016/j.sysarc.2020.101954_b17) 2017; 5 Gai (10.1016/j.sysarc.2020.101954_b53) 2018 Kumar (10.1016/j.sysarc.2020.101954_b62) 2020 Singh (10.1016/j.sysarc.2020.101954_b11) 2019; 75 Braun (10.1016/j.sysarc.2020.101954_b13) 2018; 39 Reyna (10.1016/j.sysarc.2020.101954_b20) 2018; 88 Shafiq (10.1016/j.sysarc.2020.101954_b60) 2020; 107 Soe (10.1016/j.sysarc.2020.101954_b61) 2020; 9 Gupta (10.1016/j.sysarc.2020.101954_b46) 2020; 153 |
References_xml | – volume: 7 start-page: 21 year: 2018 ident: b10 article-title: Intrusion detection systems for IoT-based smart environments: a survey publication-title: J. Cloud Comput. – volume: 160 start-page: 475 year: 2020 end-page: 493 ident: b32 article-title: Towards trustworthy Internet of Things: A survey on trust management applications and schemes publication-title: Comput. Commun. – start-page: 1 year: 2020 ident: b39 article-title: A deep blockchain framework-enabled collaborative intrusion detection for protecting IoT and cloud networks publication-title: IEEE Internet Things J. – volume: 5 start-page: 716 year: 2017 end-page: 723 ident: b17 article-title: Policy-based secure and trustworthy sensing for internet of things in smart cities publication-title: IEEE Internet Things J. – volume: 9 year: 2020 ident: b18 article-title: The fog cloud of things: A survey on concepts, architecture, standards, tools, and applications publication-title: Internet Things – start-page: 184 year: 2019 end-page: 193 ident: b50 article-title: Trustchain: Trust management in blockchain and IoT supported supply chains publication-title: 2019 IEEE International Conference on Blockchain (Blockchain) – volume: 8 start-page: 79764 year: 2020 end-page: 79800 ident: b45 article-title: Blockchain for industry 4.0: A comprehensive review publication-title: IEEE Access – volume: 515 start-page: 132 year: 2020 end-page: 155 ident: b41 article-title: Privacy-preserving clustering for big data in cyber-physical-social systems: Survey and perspectives publication-title: Inform. Sci. – volume: 63 start-page: 1 year: 2020 end-page: 14 ident: b72 article-title: SecBCS: a secure and privacy-preserving blockchain-based crowdsourcing system publication-title: Sci. China Inf. Sci. – volume: 75 start-page: 2070 year: 2019 end-page: 2105 ident: b21 article-title: Fog computing: from architecture to edge computing and big data processing publication-title: J. Supercomput. – volume: 87 year: 2020 ident: b57 article-title: A reversible privacy-preserving clustering technique based on k-means algorithm publication-title: Appl. Soft Comput. – volume: 108 start-page: 921 year: 2020 end-page: 934 ident: b4 article-title: A unified framework for big data acquisition, storage, and analytics for demand response management in smart cities publication-title: Future Gener. Comput. Syst. – volume: 52 start-page: 1 year: 2019 end-page: 33 ident: b43 article-title: Decision tree classification with differential privacy: A survey publication-title: ACM Comput. Surv. – volume: 148 start-page: 164 year: 2019 end-page: 175 ident: b67 article-title: Dimensionality reduction with IG-PCA and ensemble classifier for network intrusion detection publication-title: Comput. Netw. – year: 2019 ident: b31 article-title: ToN_IoT Datasets – volume: 63 year: 2020 ident: b2 article-title: Convergence of blockchain and artificial intelligence in IoT network for the sustainable smart city publication-title: Sustainable Cities Soc. – year: 2020 ident: b58 article-title: IoT malicious traffic identification using wrapper-based feature selection mechanisms publication-title: Comput. Secur. – start-page: 35 year: 2020 end-page: 59 ident: b62 article-title: Blockchain-based framework for data storage in peer-to-peer scheme using interplanetary file system publication-title: Handbook of Research on Blockchain Technology – volume: 137 start-page: 93 year: 2019 end-page: 111 ident: b16 article-title: Trust models of internet of smart things: A survey, open issues, and future directions publication-title: J. Netw. Comput. Appl. – start-page: 1 year: 2018 end-page: 9 ident: b40 article-title: Privacy-preserving big data analytics for cyber-physical systems publication-title: Wirel. Netw. – start-page: 1 year: 2020 end-page: 16 ident: b69 article-title: An efficient XGBoost–DNN-based classification model for network intrusion detection system publication-title: Neural Comput. Appl. – volume: 105 year: 2020 ident: b7 article-title: A survey on intrusion detection and prevention in wireless ad-hoc networks publication-title: J. Syst. Archit. – volume: 150 start-page: 13 year: 2020 end-page: 46 ident: b27 article-title: Trust management in social Internet of Things: A taxonomy, open issues, and challenges publication-title: Comput. Commun. – volume: 144 start-page: 13 year: 2019 end-page: 48 ident: b24 article-title: Blockchain for smart communities: Applications, challenges and opportunities publication-title: J. Netw. Comput. Appl. – volume: 101 start-page: 747 year: 2019 end-page: 759 ident: b36 article-title: Trust management in a blockchain based fog computing platform with trustless smart oracles publication-title: Future Gener. Comput. Syst. – volume: 48 start-page: 1 year: 2015 end-page: 33 ident: b15 article-title: Detecting malicious data injections in wireless sensor networks: A survey publication-title: ACM Comput. Surv. – volume: 12 start-page: 2825 year: 2011 end-page: 2830 ident: b71 article-title: Scikit-learn: Machine learning in python publication-title: J. Mach. Learn. Res. – volume: 15 year: 2019 ident: b26 article-title: Trust management in social internet of vehicles: Factors, challenges, blockchain, and fog solutions publication-title: Int. J. Distrib. Sens. Netw. – start-page: 1 year: 2020 ident: b22 article-title: Blockchain meets cloud computing: A survey publication-title: IEEE Commun. Surv. Tutor. – year: 2020 ident: b30 article-title: FGMC-HADS: Fuzzy Gaussian mixture-based correntropy models for detecting zero-day attacks from linux systems publication-title: Comput. Secur. – volume: 7 start-page: 175744 year: 2019 end-page: 175757 ident: b51 article-title: Proof-of-reputation based-consortium blockchain for trust resource sharing in internet of vehicles publication-title: IEEE Access – year: 2020 ident: b47 article-title: Machine Learning in Cognitive IoT – volume: 8 start-page: 21127 year: 2020 end-page: 21151 ident: b34 article-title: Blockchain-based distributed trust and reputation management systems: a survey publication-title: IEEE Access – volume: 153 start-page: 406 year: 2020 end-page: 440 ident: b46 article-title: Machine learning models for secure data analytics: A taxonomy and threat model publication-title: Comput. Commun. – volume: 19 start-page: 3 year: 2019 end-page: 26 ident: b65 article-title: A review of feature selection and its methods publication-title: Cybern. Inf. Technol. – volume: 15 start-page: 1 year: 2019 end-page: 14 ident: b55 article-title: Privacy-preserving deep learning algorithm for big personal data analysis publication-title: J. Ind. Inf. Integr. – volume: 88 start-page: 173 year: 2018 end-page: 190 ident: b20 article-title: On blockchain and its integration with IoT. Challenges and opportunities publication-title: Future Gener. Comput. Syst. – start-page: 25 year: 2020 end-page: 42 ident: b64 article-title: Blockchain: A path to the future publication-title: Cryptocurrencies and Blockchain Technology Applications – volume: 97 start-page: 130 year: 2019 end-page: 141 ident: b38 article-title: P2TA: Privacy-preserving task allocation for edge computing enhanced mobile crowdsensing publication-title: J. Syst. Archit. – volume: 21 start-page: 2671 year: 2019 end-page: 2701 ident: b6 article-title: Network intrusion detection for IoT security based on learning techniques publication-title: IEEE Commun. Surv. Tutor. – year: 2018 ident: b29 article-title: BoT_IoT Datasets – volume: 10 start-page: 1388 year: 2018 ident: b1 article-title: The role of Internet of Things (IoT) in smart cities: Technology roadmap-oriented approaches publication-title: Sustainability – start-page: 1 year: 2019 ident: b12 article-title: An integrated framework for privacy-preserving based anomaly detection for cyber-physical systems publication-title: IEEE Trans. Sustain. Comput. – start-page: 1 year: 2020 ident: b48 article-title: An efficient spam detection technique for IoT devices using machine learning publication-title: IEEE Trans. Ind. Inf. – volume: 9 start-page: 219 year: 2020 ident: b68 article-title: A novel PCA-firefly based xgboost classification model for intrusion detection in networks using GPU publication-title: Electronics – volume: 34 start-page: 83 year: 2020 end-page: 91 ident: b37 article-title: BlockSDN: Blockchain-as-a-service for software defined networking in smart city applications publication-title: IEEE Netw. – volume: 15 year: 2019 ident: b44 article-title: SH-BlockCC: A secure and efficient Internet of things smart home architecture based on cloud computing and blockchain technology publication-title: Int. J. Distrib. Sens. Netw. – volume: 88 year: 2020 ident: b56 article-title: PrivySharing: A blockchain-based framework for privacy-preserving and secure data sharing in smart cities publication-title: Comput. Secur. – volume: 12 start-page: 61 year: 2020 ident: b19 article-title: Blockchain and fog based architecture for internet of everything in smart cities publication-title: Future Internet – volume: 10 start-page: 3099 year: 2019 end-page: 3107 ident: b49 article-title: Trust architecture and reputation evaluation for internet of things publication-title: J. Ambient Intell. Humaniz. Comput. – volume: 9 start-page: 144 year: 2020 ident: b61 article-title: Towards a lightweight detection system for cyber attacks in the IoT environment using corresponding features publication-title: Electronics – volume: 8 start-page: 60117 year: 2020 end-page: 60125 ident: b35 article-title: Trust and reputation in the internet of things: State-of-the-art and research challenges publication-title: IEEE Access – volume: 160 start-page: 139 year: 2020 end-page: 149 ident: b66 article-title: An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture publication-title: Comput. Commun. – volume: 39 start-page: 499 year: 2018 end-page: 507 ident: b13 article-title: Security and privacy challenges in smart cities publication-title: Sustain. Cities Soc. – volume: 77 start-page: 112 year: 2017 end-page: 135 ident: b8 article-title: Towards a secure service provisioning framework in a smart city environment publication-title: Future Gener. Comput. Syst. – volume: 75 start-page: 4543 year: 2019 end-page: 4574 ident: b11 article-title: A comprehensive study on APT attacks and countermeasures for future networks and communications: challenges and solutions publication-title: J. Supercomput. – reference: Q. Zhuang, Y. Liu, L. Chen, Z. Ai, Proof of reputation: A reputation-based consensus protocol for blockchain based systems, in: Proceedings of the 2019 International Electronics Communication Conference, 2019, pp. 131–138. – volume: 149 year: 2020 ident: b3 article-title: A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT publication-title: J. Netw. Comput. Appl. – year: 2020 ident: b5 article-title: Internet of Things (IoT) and the Digital Business Environment: A Standpoint Inclusive Cyber Space, Cyber Crimes, and Cybersecurity – start-page: 666 year: 2018 end-page: 681 ident: b53 article-title: Proof of reputation: a reputation-based consensus protocol for peer-to-peer network publication-title: International Conference on Database Systems for Advanced Applications – start-page: 1 year: 2019 end-page: 7 ident: b63 article-title: Performance of hash functions in blockchain applied to IoT devices publication-title: 2019 14th Iberian Conference on Information Systems and Technologies (CISTI) – year: 2020 ident: b70 article-title: A survey on machine learning-based malware detection in executable files publication-title: J. Syst. Archit. – start-page: 1 year: 2020 ident: b59 article-title: Corrauc: a malicious Bot-IoT traffic detection method in IoT network using machine learning techniques publication-title: IEEE Internet Things J. – volume: 107 start-page: 433 year: 2020 end-page: 442 ident: b60 article-title: Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city publication-title: Future Gener. Comput. Syst. – volume: 100 start-page: 779 year: 2019 end-page: 796 ident: b28 article-title: Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-iot dataset publication-title: Future Gener. Comput. Syst. – start-page: 47 year: 2019 end-page: 58 ident: b14 article-title: False data injection attacks in internet of things publication-title: Performability in Internet of Things – start-page: 719 year: 2018 end-page: 725 ident: b54 article-title: Reputation management in multi-agent systems using permissioned blockchain technology publication-title: 2018 IEEE/WIC/ACM International Conference on Web Intelligence (WI) – volume: 42 start-page: 120 year: 2014 end-page: 134 ident: b33 article-title: A survey on trust management for internet of things publication-title: J. Netw. Comput. Appl. – volume: 97 start-page: 512 year: 2019 end-page: 529 ident: b25 article-title: Privacy preservation in blockchain based IoT systems: Integration issues, prospects, challenges, and future research directions publication-title: Future Gener. Comput. Syst. – year: 2020 ident: b23 article-title: Blockchain and fog computing for cyber-physical systems: Case of smart industry – start-page: 513 year: 2020 end-page: 522 ident: b42 article-title: Privacy preserving in collaborative filtering based recommender system: A systematic literature review publication-title: Progress in Computing, Analytics and Networking – volume: 151 start-page: 147 year: 2019 end-page: 157 ident: b9 article-title: Internet of Things: A survey on machine learning-based intrusion detection approaches publication-title: Comput. Netw. – volume: 144 start-page: 13 year: 2019 ident: 10.1016/j.sysarc.2020.101954_b24 article-title: Blockchain for smart communities: Applications, challenges and opportunities publication-title: J. Netw. Comput. Appl. doi: 10.1016/j.jnca.2019.06.018 – volume: 19 start-page: 3 issue: 1 year: 2019 ident: 10.1016/j.sysarc.2020.101954_b65 article-title: A review of feature selection and its methods publication-title: Cybern. Inf. Technol. – volume: 137 start-page: 93 year: 2019 ident: 10.1016/j.sysarc.2020.101954_b16 article-title: Trust models of internet of smart things: A survey, open issues, and future directions publication-title: J. Netw. Comput. Appl. doi: 10.1016/j.jnca.2019.02.024 – start-page: 1 year: 2019 ident: 10.1016/j.sysarc.2020.101954_b63 article-title: Performance of hash functions in blockchain applied to IoT devices – start-page: 184 year: 2019 ident: 10.1016/j.sysarc.2020.101954_b50 article-title: Trustchain: Trust management in blockchain and IoT supported supply chains – year: 2020 ident: 10.1016/j.sysarc.2020.101954_b5 – volume: 101 start-page: 747 year: 2019 ident: 10.1016/j.sysarc.2020.101954_b36 article-title: Trust management in a blockchain based fog computing platform with trustless smart oracles publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2019.07.030 – volume: 107 start-page: 433 year: 2020 ident: 10.1016/j.sysarc.2020.101954_b60 article-title: Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2020.02.017 – volume: 15 issue: 4 year: 2019 ident: 10.1016/j.sysarc.2020.101954_b44 article-title: SH-BlockCC: A secure and efficient Internet of things smart home architecture based on cloud computing and blockchain technology publication-title: Int. J. Distrib. Sens. Netw. doi: 10.1177/1550147719844159 – volume: 10 start-page: 3099 issue: 8 year: 2019 ident: 10.1016/j.sysarc.2020.101954_b49 article-title: Trust architecture and reputation evaluation for internet of things publication-title: J. Ambient Intell. Humaniz. Comput. doi: 10.1007/s12652-018-0887-z – volume: 88 start-page: 173 year: 2018 ident: 10.1016/j.sysarc.2020.101954_b20 article-title: On blockchain and its integration with IoT. Challenges and opportunities publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2018.05.046 – volume: 108 start-page: 921 year: 2020 ident: 10.1016/j.sysarc.2020.101954_b4 article-title: A unified framework for big data acquisition, storage, and analytics for demand response management in smart cities publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2018.02.039 – volume: 8 start-page: 60117 year: 2020 ident: 10.1016/j.sysarc.2020.101954_b35 article-title: Trust and reputation in the internet of things: State-of-the-art and research challenges publication-title: IEEE Access doi: 10.1109/ACCESS.2020.2982318 – start-page: 1 year: 2020 ident: 10.1016/j.sysarc.2020.101954_b22 article-title: Blockchain meets cloud computing: A survey publication-title: IEEE Commun. Surv. Tutor. – volume: 151 start-page: 147 year: 2019 ident: 10.1016/j.sysarc.2020.101954_b9 article-title: Internet of Things: A survey on machine learning-based intrusion detection approaches publication-title: Comput. Netw. doi: 10.1016/j.comnet.2019.01.023 – volume: 63 start-page: 1 issue: 3 year: 2020 ident: 10.1016/j.sysarc.2020.101954_b72 article-title: SecBCS: a secure and privacy-preserving blockchain-based crowdsourcing system publication-title: Sci. China Inf. Sci. doi: 10.1007/s11432-019-9893-2 – volume: 87 year: 2020 ident: 10.1016/j.sysarc.2020.101954_b57 article-title: A reversible privacy-preserving clustering technique based on k-means algorithm publication-title: Appl. Soft Comput. doi: 10.1016/j.asoc.2019.105995 – volume: 52 start-page: 1 issue: 4 year: 2019 ident: 10.1016/j.sysarc.2020.101954_b43 article-title: Decision tree classification with differential privacy: A survey publication-title: ACM Comput. Surv. doi: 10.1145/3337064 – volume: 48 start-page: 1 issue: 2 year: 2015 ident: 10.1016/j.sysarc.2020.101954_b15 article-title: Detecting malicious data injections in wireless sensor networks: A survey publication-title: ACM Comput. Surv. doi: 10.1145/2818184 – volume: 8 start-page: 79764 year: 2020 ident: 10.1016/j.sysarc.2020.101954_b45 article-title: Blockchain for industry 4.0: A comprehensive review publication-title: IEEE Access doi: 10.1109/ACCESS.2020.2988579 – volume: 88 year: 2020 ident: 10.1016/j.sysarc.2020.101954_b56 article-title: PrivySharing: A blockchain-based framework for privacy-preserving and secure data sharing in smart cities publication-title: Comput. Secur. doi: 10.1016/j.cose.2019.101653 – year: 2020 ident: 10.1016/j.sysarc.2020.101954_b23 – start-page: 719 year: 2018 ident: 10.1016/j.sysarc.2020.101954_b54 article-title: Reputation management in multi-agent systems using permissioned blockchain technology – volume: 150 start-page: 13 year: 2020 ident: 10.1016/j.sysarc.2020.101954_b27 article-title: Trust management in social Internet of Things: A taxonomy, open issues, and challenges publication-title: Comput. Commun. doi: 10.1016/j.comcom.2019.10.034 – year: 2020 ident: 10.1016/j.sysarc.2020.101954_b30 article-title: FGMC-HADS: Fuzzy Gaussian mixture-based correntropy models for detecting zero-day attacks from linux systems publication-title: Comput. Secur. doi: 10.1016/j.cose.2020.101906 – volume: 153 start-page: 406 year: 2020 ident: 10.1016/j.sysarc.2020.101954_b46 article-title: Machine learning models for secure data analytics: A taxonomy and threat model publication-title: Comput. Commun. doi: 10.1016/j.comcom.2020.02.008 – start-page: 25 year: 2020 ident: 10.1016/j.sysarc.2020.101954_b64 article-title: Blockchain: A path to the future – start-page: 35 year: 2020 ident: 10.1016/j.sysarc.2020.101954_b62 article-title: Blockchain-based framework for data storage in peer-to-peer scheme using interplanetary file system – start-page: 1 year: 2019 ident: 10.1016/j.sysarc.2020.101954_b12 article-title: An integrated framework for privacy-preserving based anomaly detection for cyber-physical systems publication-title: IEEE Trans. Sustain. Comput. – year: 2020 ident: 10.1016/j.sysarc.2020.101954_b47 – volume: 15 issue: 1 year: 2019 ident: 10.1016/j.sysarc.2020.101954_b26 article-title: Trust management in social internet of vehicles: Factors, challenges, blockchain, and fog solutions publication-title: Int. J. Distrib. Sens. Netw. doi: 10.1177/1550147719825820 – start-page: 1 year: 2020 ident: 10.1016/j.sysarc.2020.101954_b48 article-title: An efficient spam detection technique for IoT devices using machine learning publication-title: IEEE Trans. Ind. Inf. – volume: 9 year: 2020 ident: 10.1016/j.sysarc.2020.101954_b18 article-title: The fog cloud of things: A survey on concepts, architecture, standards, tools, and applications publication-title: Internet Things doi: 10.1016/j.iot.2020.100177 – ident: 10.1016/j.sysarc.2020.101954_b52 doi: 10.1145/3343147.3343169 – volume: 39 start-page: 499 year: 2018 ident: 10.1016/j.sysarc.2020.101954_b13 article-title: Security and privacy challenges in smart cities publication-title: Sustain. Cities Soc. doi: 10.1016/j.scs.2018.02.039 – volume: 5 start-page: 716 issue: 2 year: 2017 ident: 10.1016/j.sysarc.2020.101954_b17 article-title: Policy-based secure and trustworthy sensing for internet of things in smart cities publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2017.2720635 – volume: 515 start-page: 132 year: 2020 ident: 10.1016/j.sysarc.2020.101954_b41 article-title: Privacy-preserving clustering for big data in cyber-physical-social systems: Survey and perspectives publication-title: Inform. Sci. doi: 10.1016/j.ins.2019.10.019 – start-page: 513 year: 2020 ident: 10.1016/j.sysarc.2020.101954_b42 article-title: Privacy preserving in collaborative filtering based recommender system: A systematic literature review – year: 2019 ident: 10.1016/j.sysarc.2020.101954_b31 – volume: 34 start-page: 83 issue: 2 year: 2020 ident: 10.1016/j.sysarc.2020.101954_b37 article-title: BlockSDN: Blockchain-as-a-service for software defined networking in smart city applications publication-title: IEEE Netw. doi: 10.1109/MNET.001.1900151 – start-page: 1 year: 2018 ident: 10.1016/j.sysarc.2020.101954_b40 article-title: Privacy-preserving big data analytics for cyber-physical systems publication-title: Wirel. Netw. – volume: 75 start-page: 4543 issue: 8 year: 2019 ident: 10.1016/j.sysarc.2020.101954_b11 article-title: A comprehensive study on APT attacks and countermeasures for future networks and communications: challenges and solutions publication-title: J. Supercomput. doi: 10.1007/s11227-016-1850-4 – start-page: 1 year: 2020 ident: 10.1016/j.sysarc.2020.101954_b59 article-title: Corrauc: a malicious Bot-IoT traffic detection method in IoT network using machine learning techniques publication-title: IEEE Internet Things J. – volume: 100 start-page: 779 year: 2019 ident: 10.1016/j.sysarc.2020.101954_b28 article-title: Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-iot dataset publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2019.05.041 – volume: 160 start-page: 475 year: 2020 ident: 10.1016/j.sysarc.2020.101954_b32 article-title: Towards trustworthy Internet of Things: A survey on trust management applications and schemes publication-title: Comput. Commun. doi: 10.1016/j.comcom.2020.06.030 – start-page: 47 year: 2019 ident: 10.1016/j.sysarc.2020.101954_b14 article-title: False data injection attacks in internet of things – volume: 12 start-page: 2825 year: 2011 ident: 10.1016/j.sysarc.2020.101954_b71 article-title: Scikit-learn: Machine learning in python publication-title: J. Mach. Learn. Res. – volume: 77 start-page: 112 year: 2017 ident: 10.1016/j.sysarc.2020.101954_b8 article-title: Towards a secure service provisioning framework in a smart city environment publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2017.06.031 – start-page: 1 year: 2020 ident: 10.1016/j.sysarc.2020.101954_b39 article-title: A deep blockchain framework-enabled collaborative intrusion detection for protecting IoT and cloud networks publication-title: IEEE Internet Things J. – volume: 75 start-page: 2070 issue: 4 year: 2019 ident: 10.1016/j.sysarc.2020.101954_b21 article-title: Fog computing: from architecture to edge computing and big data processing publication-title: J. Supercomput. doi: 10.1007/s11227-018-2701-2 – volume: 9 start-page: 219 issue: 2 year: 2020 ident: 10.1016/j.sysarc.2020.101954_b68 article-title: A novel PCA-firefly based xgboost classification model for intrusion detection in networks using GPU publication-title: Electronics doi: 10.3390/electronics9020219 – volume: 10 start-page: 1388 issue: 5 year: 2018 ident: 10.1016/j.sysarc.2020.101954_b1 article-title: The role of Internet of Things (IoT) in smart cities: Technology roadmap-oriented approaches publication-title: Sustainability doi: 10.3390/su10051388 – volume: 63 year: 2020 ident: 10.1016/j.sysarc.2020.101954_b2 article-title: Convergence of blockchain and artificial intelligence in IoT network for the sustainable smart city publication-title: Sustainable Cities Soc. doi: 10.1016/j.scs.2020.102364 – volume: 7 start-page: 175744 year: 2019 ident: 10.1016/j.sysarc.2020.101954_b51 article-title: Proof-of-reputation based-consortium blockchain for trust resource sharing in internet of vehicles publication-title: IEEE Access doi: 10.1109/ACCESS.2019.2956955 – volume: 97 start-page: 130 year: 2019 ident: 10.1016/j.sysarc.2020.101954_b38 article-title: P2TA: Privacy-preserving task allocation for edge computing enhanced mobile crowdsensing publication-title: J. Syst. Archit. doi: 10.1016/j.sysarc.2019.01.005 – volume: 148 start-page: 164 year: 2019 ident: 10.1016/j.sysarc.2020.101954_b67 article-title: Dimensionality reduction with IG-PCA and ensemble classifier for network intrusion detection publication-title: Comput. Netw. doi: 10.1016/j.comnet.2018.11.010 – volume: 8 start-page: 21127 year: 2020 ident: 10.1016/j.sysarc.2020.101954_b34 article-title: Blockchain-based distributed trust and reputation management systems: a survey publication-title: IEEE Access doi: 10.1109/ACCESS.2020.2969820 – volume: 15 start-page: 1 year: 2019 ident: 10.1016/j.sysarc.2020.101954_b55 article-title: Privacy-preserving deep learning algorithm for big personal data analysis publication-title: J. Ind. Inf. Integr. – volume: 160 start-page: 139 year: 2020 ident: 10.1016/j.sysarc.2020.101954_b66 article-title: An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture publication-title: Comput. Commun. doi: 10.1016/j.comcom.2020.05.048 – year: 2020 ident: 10.1016/j.sysarc.2020.101954_b58 article-title: IoT malicious traffic identification using wrapper-based feature selection mechanisms publication-title: Comput. Secur. doi: 10.1016/j.cose.2020.101863 – volume: 12 start-page: 61 issue: 4 year: 2020 ident: 10.1016/j.sysarc.2020.101954_b19 article-title: Blockchain and fog based architecture for internet of everything in smart cities publication-title: Future Internet doi: 10.3390/fi12040061 – volume: 7 start-page: 21 issue: 1 year: 2018 ident: 10.1016/j.sysarc.2020.101954_b10 article-title: Intrusion detection systems for IoT-based smart environments: a survey publication-title: J. Cloud Comput. doi: 10.1186/s13677-018-0123-6 – volume: 105 year: 2020 ident: 10.1016/j.sysarc.2020.101954_b7 article-title: A survey on intrusion detection and prevention in wireless ad-hoc networks publication-title: J. Syst. Archit. doi: 10.1016/j.sysarc.2019.101701 – start-page: 666 year: 2018 ident: 10.1016/j.sysarc.2020.101954_b53 article-title: Proof of reputation: a reputation-based consensus protocol for peer-to-peer network – year: 2020 ident: 10.1016/j.sysarc.2020.101954_b70 article-title: A survey on machine learning-based malware detection in executable files publication-title: J. Syst. Archit. – volume: 9 start-page: 144 issue: 1 year: 2020 ident: 10.1016/j.sysarc.2020.101954_b61 article-title: Towards a lightweight detection system for cyber attacks in the IoT environment using corresponding features publication-title: Electronics doi: 10.3390/electronics9010144 – start-page: 1 year: 2020 ident: 10.1016/j.sysarc.2020.101954_b69 article-title: An efficient XGBoost–DNN-based classification model for network intrusion detection system publication-title: Neural Comput. Appl. – volume: 97 start-page: 512 year: 2019 ident: 10.1016/j.sysarc.2020.101954_b25 article-title: Privacy preservation in blockchain based IoT systems: Integration issues, prospects, challenges, and future research directions publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2019.02.060 – volume: 149 year: 2020 ident: 10.1016/j.sysarc.2020.101954_b3 article-title: A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT publication-title: J. Netw. Comput. Appl. doi: 10.1016/j.jnca.2019.102481 – volume: 42 start-page: 120 year: 2014 ident: 10.1016/j.sysarc.2020.101954_b33 article-title: A survey on trust management for internet of things publication-title: J. Netw. Comput. Appl. doi: 10.1016/j.jnca.2014.01.014 – year: 2018 ident: 10.1016/j.sysarc.2020.101954_b29 – volume: 21 start-page: 2671 issue: 3 year: 2019 ident: 10.1016/j.sysarc.2020.101954_b6 article-title: Network intrusion detection for IoT security based on learning techniques publication-title: IEEE Commun. Surv. Tutor. doi: 10.1109/COMST.2019.2896380 |
SSID | ssj0005512 |
Score | 2.6057456 |
Snippet | With the advancement in sensor technology and the proliferation of low-cost electronic circuits, Internet of Things (IoT) is emerging as a promising technology... |
SourceID | crossref elsevier |
SourceType | Enrichment Source Index Database Publisher |
StartPage | 101954 |
SubjectTerms | Anomaly detection Blockchain Internet of Things Machine learning Privacy-preservation Smart city Trust management |
Title | TP2SF: A Trustworthy Privacy-Preserving Secured Framework for sustainable smart cities by leveraging blockchain and machine learning |
URI | https://dx.doi.org/10.1016/j.sysarc.2020.101954 |
Volume | 115 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8NAEF5EL158i2_m4HVts7vJNt5KsVRFEazgLewrWq1R2ir04skf7uwm8QGi4C0sM5DszM4j-80MIfsJV05aPEjSmpgKqwxNXSulSapljh4lkZEvFD47T3pX4uQ6vp4hnboWxsMqK9tf2vRgrauVRrWbjafBoHEZ-eQqQdOLesqaoY5cCOm1_OD1C8wjLm88kZh66rp8LmC8xtMxqhNmiSwspbH42T19cTndJbJQxYrQLl9nmcy4YoUs1nMYoDqWq-Stf8Euu4fQhr6voAiovylcjAYvykypB1l4g1DcQPi57ix0a0QWYMgK488aKhg_4MeDCW1WQU9h6FDVwyAj0Oj27s0tUoIqLDwEFKaDauzEzRq56h71Oz1aTVeghks2oSqSWtiW1Ca2ItfGCi0x2FCWCx05LVtacJdIxmPMtzk-NvM4MTxX2kcNqsnXyWzxWLgNAsxq3NmcGXSIglurhI1T7mRktE4TwzYJrzc1M1XrcT8BY5jVGLO7rBRF5kWRlaLYJPSD66lsvfEHvazllX1ToQy9w6-cW__m3CbzzINcAgJyh8xORs9uF6OUid4LarhH5trHp73zdxA46gk |
linkProvider | Elsevier |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT9tAEF6hcGgvBVqq8mrn0Osq8T68MbcIEYVXhESQuFn7Mg0Pg0hAyp0fzux6Da2EWqk3a7Uj2TOz8_B-M0PIz5xrrxweJOWspMJpSwvfL2heGFWhR8lVFgqFT8b56FwcXsiLJbLX1sIEWGWy_Y1Nj9Y6rXQTN7v302n3LAvJVY6mF_WU9UId-XLoTiU7ZHlwcDQavyE9ZHPpiftpIGgr6CLMa7aYoUZhosjiUiHF-x7qN68zXCWfUrgIg-aN1siSrz-TlXYUA6ST-YU8T07Z2XAXBjAJRRQR-LeA04fpk7YLGnAWwSbUlxD_r3sHwxaUBRi1wuytjApmt_j9YGOnVTALuPGo7XGWERj0fNf2F-4EXTu4jUBMD2nyxOU6OR_uT_ZGNA1YoJYrNqc6U0a4vjJWOlEZ64RRGG9ox4XJvFF9I7jPFeMSU26Oj71K5pZX2oTAQff4V9Kp72r_jQBzBjlbMYs-UXDntHCy4F5l1pgit2yD8JappU3dx8MQjJuyhZldlY0oyiCKshHFBqGvVPdN941_7FetvMo_tKhEB_FXys3_pvxBPowmJ8fl8cH4aIt8ZAHzEgGR26Qzf3j0Oxi0zM33pJQvEzzsug |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=TP2SF%3A+A+Trustworthy+Privacy-Preserving+Secured+Framework+for+sustainable+smart+cities+by+leveraging+blockchain+and+machine+learning&rft.jtitle=Journal+of+systems+architecture&rft.au=Kumar%2C+Prabhat&rft.au=Gupta%2C+Govind+P.&rft.au=Tripathi%2C+Rakesh&rft.date=2021-05-01&rft.issn=1383-7621&rft.volume=115&rft.spage=101954&rft_id=info:doi/10.1016%2Fj.sysarc.2020.101954&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_sysarc_2020_101954 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1383-7621&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1383-7621&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1383-7621&client=summon |