Author:
Kunwar Fateh Bahadur,Singh Hitendra Singh,Yadav Rakesh Kumar Yadav
Abstract
Abstract
In order to improve the safety and visibility of supply chain management within the context of 6G networks, this research looks into the complementary use of blockchain and the Industrial Internet of Things (IIoT). Securing supply chain procedures is becoming more important due to the changing technology landscape and the upcoming 6G. The inherent weaknesses of old supply chain systems and the necessity of implementing real-time anomaly detection procedures to counter new threats are the driving forces behind this. The goal of this connection is to take advantage of IIoT's data-driven capabilities for real-time monitoring and blockchain's immutability for secure transactions. The construction of an all-encompassing system architecture is required to do this, which includes integrating blockchain technology, implementing IIoT devices, and orchestrating smart contracts to guarantee the safety of supply chain transactions. In order to find out what's wrong with the 6G environment, the study uses an anomaly detection approach that combines data pretreatment, feature extraction, and training of a machine learning model. The outcomes demonstrate how well the suggested approach works to provide consistent and accurate real-time data, which improves anomaly detection in a 6G-enabled supply chain. Industry practitioners seeking resilient supply chain solutions in the era of 6G can benefit from the study's practical insights as well as from the theoretical contributions to the understanding of blockchain and IIoT integration.
Publisher
Research Square Platform LLC
Reference31 articles.
1. Raja G, Sai SG, Rajakumar BR, Gurumoorthy S, Dev K, Magarini M (2022) Nexus of 6G and Blockchain for Authentication of Aerial and IoT Devices. In Proceedings of the ICC 2022—IEEE International Conference on Communications (pp. 1–6). Seoul, Republic of Korea: IEEE
2. 6G-enabled Edge Intelligence for Ultra-Reliable Low Latency Applications: Vision and Mission;Gupta R;Comput Stand Interfaces,2021
3. Survival Study on Blockchain Based 6G-Enabled Mobile Edge Computation for IoT Automation;Sekaran R;IEEE Access,2020
4. Utilization of blockchain for mitigating the distributed denial of service attacks;Singh R;Secur Priv,2020
5. Blockchain Based Privacy Preserving Framework for Emerging 6G Wireless Communications;Velliangiri S;IEEE Trans Ind Informatics,2022
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献