2023
DOI: 10.3390/math11092073
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing Data Security in IoT Networks with Blockchain-Based Management and Adaptive Clustering Techniques

Abstract: The rapid proliferation of smart devices in Internet of Things (IoT) networks has amplified the security challenges associated with device communications. To address these challenges in 5G-enabled IoT networks, this paper proposes a multi-level blockchain security architecture that simplifies implementation while bolstering network security. The architecture leverages an adaptive clustering approach based on Evolutionary Adaptive Swarm Intelligent Sparrow Search (EASISS) for efficient organization of heterogen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(4 citation statements)
references
References 29 publications
0
4
0
Order By: Relevance
“…The tests conducted in this investigation illustrate the adequacy of the proposed security and vitality effectiveness improvement procedures in moving forward with the execution of WSNs for IoT applications. The accomplished advancements emphasize the centrality of tending to security and vitality productivity challenges to empower the solid and economical operation of WSNs in different IoT scenarios [29]. The exploratory comes about to illustrate a noteworthy change in security vigour with the sending of the proposed lightweight cryptographic calculations, interruption location framework (IDS), and secure steering conventions.…”
Section: A Security Robustnessmentioning
confidence: 99%
“…The tests conducted in this investigation illustrate the adequacy of the proposed security and vitality effectiveness improvement procedures in moving forward with the execution of WSNs for IoT applications. The accomplished advancements emphasize the centrality of tending to security and vitality productivity challenges to empower the solid and economical operation of WSNs in different IoT scenarios [29]. The exploratory comes about to illustrate a noteworthy change in security vigour with the sending of the proposed lightweight cryptographic calculations, interruption location framework (IDS), and secure steering conventions.…”
Section: A Security Robustnessmentioning
confidence: 99%
“…Authors in [31] presented IoT engineering applications in the humanitarian context, entailing disaster management, healthcare monitoring, environmental monitoring, and infrastructure development. Multi-level blockchain security architectures were proposed in [32,33] to simplify implementation while bolstering network security. A more recent study [34], examined the challenges and strategies related to cloud computing and IoT security.…”
Section: Inclusionmentioning
confidence: 99%
“…[31] Managing access control in IoT environments in a decentralized, fine-grained, and dynamic way to help distributed systems reach consensus faster. [32] A multi-level blockchain security architecture to simplify the implementation while strengthening network security is deployed. [34] Major difficulties with cloud computing, IoT, and Cloud-IoT security and strategies are discussed.…”
Section: Inclusionmentioning
confidence: 99%
“…In today's digital era, due to the fast growth and broad adoption of IoT technology [1][2][3], IoT devices have penetrated into various industries and fields such as cyberphysical systems [4], urban intelligence [5], and industrial IoT [6], bringing great convenience and opportunities for human beings, but also bringing unprecedented challenges to IoT network security issues [7]. IoT devices and sensors are often connected in a distributed manner and exchange and communicate data via the Internet, forming a large and complex network.…”
Section: Introductionmentioning
confidence: 99%