2022
DOI: 10.1155/2022/9233267
|View full text |Cite
|
Sign up to set email alerts
|

Integration of Edge Computing and Blockchain for Provision of Data Fusion and Secure Big Data Analysis for Internet of Things

Abstract: Intelligent computing provides efficient, real-time, and secure data analysis services for the Internet of Things (IoT). As the number of IoT devices increases, IoT generates massive, diverse, and multisourcing datasets that can be used to improve IoT services further. Models trained by intelligent computing from a single system or sensor are often not global, and sending all data directly to the computing platform wastes network bandwidth and may cause network congestion and even privacy leakage. To ensure Io… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 35 publications
0
6
0
Order By: Relevance
“…In the point‐to‐point (P2P) communication traffic method, packet loss happens at node and communication link levels in the network, and limitations of the hub and the correspondence channel of a remote medium interact with one another. The restrictions of network nodes are the size of the queue, buffer, reception rate, storage, and processing, as traffic volume increases, the likelihood of a collision in the node rises 22 . In order to minimize impact, this barrier makes an effort to concentrate on the hub that is just getting started and has lower traffic loads.…”
Section: Proposed Methodologymentioning
confidence: 99%
See 2 more Smart Citations
“…In the point‐to‐point (P2P) communication traffic method, packet loss happens at node and communication link levels in the network, and limitations of the hub and the correspondence channel of a remote medium interact with one another. The restrictions of network nodes are the size of the queue, buffer, reception rate, storage, and processing, as traffic volume increases, the likelihood of a collision in the node rises 22 . In order to minimize impact, this barrier makes an effort to concentrate on the hub that is just getting started and has lower traffic loads.…”
Section: Proposed Methodologymentioning
confidence: 99%
“…The restrictions of network nodes are the size of the queue, buffer, reception rate, storage, and processing, as traffic volume increases, the likelihood of a collision in the node rises. 22 In order to minimize impact, this barrier makes an effort to concentrate on the hub that is just getting started and has lower traffic loads. A combination of the neighbors' local load, as well as packet traffic load by Equation (22), is used in this work to define the candidate node's traffic load.…”
Section: Distributed Energy-efficient Delay Aware Routing Protocol-ba...mentioning
confidence: 99%
See 1 more Smart Citation
“…Device application standards for smart home device consider the differences in privacy data in different devices. According to different types of devices and various characteristics of business scenarios, the norms restrain the implementation of edge computing, blockchain, and other technologies [33] and guide the realization of personal protection requirements. For example, cloud computing may include cloud privacy security, terminal privacy collection, and guarantee capacity certification [34].…”
Section: Wireless Communications and Mobile Computingmentioning
confidence: 99%
“…In China, the edge computing alliance ECC is working hard to promote the integration of three technologies, that is, the integration of OICT (Operational, Information, and Communication Technology). The computing objects of edge computing are mainly in four fields, namely the device field, the network field, the data field and the application field (Dong et al, 2022), (Song et al, 2022).…”
Section: Related Workmentioning
confidence: 99%