2021
DOI: 10.1109/access.2021.3077069
|View full text |Cite
|
Sign up to set email alerts
|

Deep Learning and Blockchain-Empowered Security Framework for Intelligent 5G-Enabled IoT

Abstract: Recently, many IoT applications, such as smart transportation, healthcare, and virtual and augmented reality experiences, have emerged with fifth-generation (5G) technology to enhance the Quality of Service (QoS) and user experience. The revolution of 5G-enabled IoT supports distinct attributes, including lower latency, higher system capacity, high data rate, and energy saving. However, such revolution also delivers considerable increment in data generation that further leads to a major requirement of intellig… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
36
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 74 publications
(37 citation statements)
references
References 22 publications
0
36
0
1
Order By: Relevance
“…These factors becoming the acceptance of IoT in the industrial domain, mainly leveraging the internet in manufacturing and production to enable reconfiguration of current processes and automate industrial executions, which is greatly evolved. The industrial IoT commits to bringing a large number of operations initiated, controlled and executed in an efficient manner along with improving productivity, and providing effective management of industrial things [82,83]. However, the existing architecture of IIoT is based on the client-serverenabled centralized network structure.…”
Section: Iiot With Blockchain and 5g Technologymentioning
confidence: 99%
“…These factors becoming the acceptance of IoT in the industrial domain, mainly leveraging the internet in manufacturing and production to enable reconfiguration of current processes and automate industrial executions, which is greatly evolved. The industrial IoT commits to bringing a large number of operations initiated, controlled and executed in an efficient manner along with improving productivity, and providing effective management of industrial things [82,83]. However, the existing architecture of IIoT is based on the client-serverenabled centralized network structure.…”
Section: Iiot With Blockchain and 5g Technologymentioning
confidence: 99%
“…Much work has already been done using blockchain to enhance security and privacy in the ML process. In [291], Rathore et al develop an ML and blockchain-driven security framework for 5G-enabled smart IoT to provide intelligent data and secure operations. Liu et al in [292] study a blockchain-enabled secure data sharing framework in MEC systems and propose an adaptive privacy protection mechanism based on this framework to protect the identity privacy of users in data sharing.…”
Section: G Security and Privacymentioning
confidence: 99%
“…Service management supports fog infrastructure and services based on dynamic and distributed policies. These solutions can also filter specific threat patterns to prevent a potential attack [10]. A fog-based security model can provide the encryption processes between layers (data, application) to ensure a high level of security for IoT data processed and stored in the cloud.…”
Section: • Intrusion Detection System;mentioning
confidence: 99%