An IoT-Enabled Intelligent and Secure Manufacturing Model Using Blockchain in Hybrid Cloud Communication System

Author:

Bhattacharyya Sudipto1ORCID,Athithan Senthil2ORCID,Pal Souvik34ORCID,Sarkar Bikramjit5ORCID,Akila D.6ORCID,Chowdhury Subrata7ORCID,Chandran Karthik8ORCID,Gurusamy Saravanakumar9ORCID

Affiliation:

1. Department of Computer Science and Engineering, Global Institute of Management and Technology, Krishnagar, India

2. Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram, Andhra Pradesh, India

3. Department of Computer Science and Engineering, Sister Nivedita University, Kolkata, India

4. Sambalpur University, Sambalpur, India

5. Department of Computer Science and Engineering, JIS College of Engineering, Kalyani, India

6. Department of Computer Applications, Saveetha College of Liberal Arts and Sciences, SIMATS Deemed University, Chennai, India

7. Department of Computer Science and Engineering, Sreenivasa Institute of Technology and Management Studies, Chittoor, Andra Pradesh, India

8. Department of Robotics and Automation, Jyothi Engineering College, Thrissur, Kerala, India

9. Department of Electrical and Electronics Technology, Federal TVET Institute, Addis Ababa, Ethiopia

Abstract

The smart manufacturing system can become a linked network with the help of the Internet of Things (IoT). Devices connected to the IoT are susceptible to various attacks and assaults. An effective protection plan is needed to ensure that the billions of IoT nodes are protected from these hazards. The security mechanisms on IoT devices are ineffective due to resource limitations. As a result, the academic community has recently paid attention to the cloud-, fog-, and edge-based IoT systems. A robust cloud provider is in the cloud or fog to perform computationally demanding activities, including safety, data analysis, decision-making process, and monitoring. Hash identities and upgraded Rivest–Shamir–Adleman (RSA) have been used to secure the IoT device’s data. A four-prime integer of 512 bits makes up the proposed security algorithm. A hash signature is used to provide device authentication. An effective clustering method for sensing devices based on the node level, separation from the clusters, remaining energy, and fitness has been presented for long network life. The suggested swarm-based method determines the sensor nodes’ fitness. A deep neural network- (DNN-) based resource scheduling algorithm (DNN-RSM) is meant to reduce the delay and communications overhead for IoT components in the hybrid cloud system. For optimum resource allocation, all queries originating from the cluster head are categorised using DNN based on their storage, processing, and bandwidth needs. The suggested structure delivers better outcomes, particularly regarding energy use, delay, and safety level. The results of the simulation provide credence to the concept that the proposed strategy is superior to the current system. The suggested scheme includes stringent security, decreased energy usage, decreased latency, and efficient resource utilization.

Publisher

Hindawi Limited

Subject

Computer Networks and Communications,Information Systems

Cited by 3 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3