2022
DOI: 10.3390/en15218304
|View full text |Cite
|
Sign up to set email alerts
|

Energy-Aware UAV Based on Blockchain Model Using IoE Application in 6G Network-Driven Cybertwin

Abstract: Several advanced features exist in fifth-generation (5G) correspondence than in fourth-generation (4G) correspondence. Centric cloud-computing architecture achieves resource sharing and effectively handles big data explosion. For data security problems, researchers had developed many methods to protect data against cyber-attacks. Only a few solutions are based on blockchain (BC), but are affected by expensive storage costs, network latency, confidence, and capacity. Things are represented in digital form in th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 32 publications
0
7
0
Order By: Relevance
“…• If required, establish communication between Arduino Uno and a centralized system (e.g., cloud platform) using communication modules (e.g., Wi-Fi, Ethernet, GSM) [20]. • Transmit relevant data or threat information to the central system for further analysis [3]. o Data Logging:…”
Section: Results Analysis Using Arduino Unomentioning
confidence: 99%
See 2 more Smart Citations
“…• If required, establish communication between Arduino Uno and a centralized system (e.g., cloud platform) using communication modules (e.g., Wi-Fi, Ethernet, GSM) [20]. • Transmit relevant data or threat information to the central system for further analysis [3]. o Data Logging:…”
Section: Results Analysis Using Arduino Unomentioning
confidence: 99%
“…• Implement data logging on Arduino Uno to record historical sensor readings and detected safety events [21]. • Facilitate later analysis or auditing of safety incidents [3]. Depending on the required degree of autonomy, processing needs, and specific safety standards, the degree of result analysis on Arduino Uno can vary [4].…”
Section: Results Analysis Using Arduino Unomentioning
confidence: 99%
See 1 more Smart Citation
“…As such, RL for WSNs is concerned with a wide range of issues, including clustering protocols, medium-access protocols, and routing protocols; additionally, hyper-parameter optimization is addressed within the context of RL, with applications including architectural network design and application-level collaboration between nodes. To improve the effectiveness of standard learning algorithms for WSN routing issues, the Q-learning [40] approach is useful [41].…”
Section: Reinforcement Learningmentioning
confidence: 99%
“…Blockchain technology could naturally be used to secure data exchange, via cryptographical transfers, for all users without even a trusted person through the features of decentralization, transparency, and data consistency [ 26 ]. It remains a major challenge to adapt blockchain methods for the variety of data handled by the UAV networks in terms of security and latency constraints [ 27 , 28 ]. In the proposed method, we differentiate data generated by the network nodes in terms of their urgency and security requirements.…”
Section: Introductionmentioning
confidence: 99%