Efficient design for smart environment using Raspberry Pi with Blockchain and IoT (BRIoT)
Conference paper
Ponugumati, S., Ali, K., Lasebae, A., Zahoor, Z., Kiyani, A., Khoshkholghi, A. and Maddu, L. 2023. Efficient design for smart environment using Raspberry Pi with Blockchain and IoT (BRIoT). CCGridW: 4th Workshop on Secure IoT, Edge and Cloud Systems (SioTEC) 2023. Bangalore, India 01 - 04 May 2023 IEEE. pp. 75-80 https://doi.org/10.1109/CCGridW59191.2023.00026
Type | Conference paper |
---|---|
Title | Efficient design for smart environment using Raspberry Pi with Blockchain and IoT (BRIoT) |
Authors | Ponugumati, S., Ali, K., Lasebae, A., Zahoor, Z., Kiyani, A., Khoshkholghi, A. and Maddu, L. |
Abstract | Internet of Things (IoT) is reshaping digital world day by day by integrating several technologies to provide smart services. However, intrinsic features of IoT resulting in a number of challenges, such as decentralization, poor interoperability, privacy, confidentiality, and security vulnerabilities. Several security techniques like encryption, third-party software’s are in use currently to protect users data. Blockchain was initially established for digital crypto currencies with a Proof of Work (PoW) consensus process and the advantage of smart contracts, which enabled distributed trust without the involvement of a third party. Its distributed trust concept paved the way for many other developments, such as the development of new consensus mechanisms such as Proof of Stake (PoS) and Proof of Authority (PoA), which aided in the adoption of Blockchain with low computation machines into sectors such as smart industry and smart transportation. Blockchain implementation in IoT can address the security issue, here we proposed a design using Raspberry Pi as edge node (BRIoT). |
Keywords | Internet of Things (IoT); Blockchain; Edge Computing; Raspberry Pi |
Middlesex University Theme | Creativity, Culture & Enterprise |
Conference | CCGridW: 4th Workshop on Secure IoT, Edge and Cloud Systems (SioTEC) 2023 |
Page range | 75-80 |
Proceedings Title | 2023 IEEE/ACM 23rd International Symposium on Cluster, Cloud and Internet Computing Workshops (CCGridW) |
ISBN | |
Electronic | 9798350302080 |
Paperback | 9798350302097 |
Publisher | IEEE |
Publication dates | |
01 May 2023 | |
Online | 19 Jul 2023 |
Publication process dates | |
Deposited | 29 Mar 2023 |
Accepted | 07 Mar 2023 |
Output status | Published |
Accepted author manuscript | |
Copyright Statement | © 2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. |
Digital Object Identifier (DOI) | https://doi.org/10.1109/CCGridW59191.2023.00026 |
Web address (URL) of conference proceedings | https://ieeexplore.ieee.org/xpl/conhome/10171437/proceeding |
Language | English |
https://repository.mdx.ac.uk/item/8q52z
Download files
103
total views69
total downloads7
views this month4
downloads this month
Export as
Related outputs
Energy efficiency optimisation of joint computational task offloading and resource allocation using particle swarm optimisation approach in vehicular edge networks
Alam, A., Shah, P., Trestian, R., Ali, K. and Mapp, G. 2024. Energy efficiency optimisation of joint computational task offloading and resource allocation using particle swarm optimisation approach in vehicular edge networks. Sensors. 24 (10). https://doi.org/10.3390/s24103001Dissecting the hype: a study of WallStreetBets’ sentiment and network correlation on financial markets
Wang, K, Wong, B, Khoshkholghi, A., Shah, P., Naha, R, Mahanti, A and Kim, J 2024. Dissecting the hype: a study of WallStreetBets’ sentiment and network correlation on financial markets. 38th International Conference on Advanced Information Networking and Applications. Kitakyushu, Japan 17 - 19 Apr 2024 Springer. pp. 263-273 https://doi.org/10.1007/978-3-031-57853-3_22A novel bio-inspired bat node scheduling algorithm for dependable safety-critical wireless sensor network systems
Al-Nader, I., Lasebae, A., Raheem, R. and Ngondi, G. 2024. A novel bio-inspired bat node scheduling algorithm for dependable safety-critical wireless sensor network systems. Sensors. 24 (6). https://doi.org/10.3390/s24061928A novel scheduling algorithm for improved performance of multi-objective safety-critical WSN using spatial self-organizing feature map
Al-Nader, I., Lasebae, A. and Raheem, R. 2024. A novel scheduling algorithm for improved performance of multi-objective safety-critical WSN using spatial self-organizing feature map. Electronics. 13 (1). https://doi.org/10.3390/electronics13010019Information fusion-based cybersecurity threat detection for intelligent transportation system
Chowdhury, A., Naha, R., Kaisar, S., Khoshkholghi, A., Ali, K. and Galletta, A. 2023. Information fusion-based cybersecurity threat detection for intelligent transportation system. CCGridW: 4th Workshop on Secure IoT, Edge and Cloud Systems (SioTEC) 2023. Bangalore, India 01 - 04 May 2023 Bangalore, India IEEE. pp. 96-103 https://doi.org/10.1109/CCGridW59191.2023.00029Analyzing land cover and land use changes using remote sensing techniques: a temporal analysis of climate change detection with Google Earth engine
Afzal, M., Ali, K., Kasi, M., Rehman, M., Khoshkholghi, A., Haq, B. and Shah, S. 2023. Analyzing land cover and land use changes using remote sensing techniques: a temporal analysis of climate change detection with Google Earth engine. IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications. Exeter, United Kingdom 01 - 03 Nov 2023Joint energy and spectral optimization in Heterogeneous Vehicular Network
Alam, A., Ali, K., Trestian, R., Shah, P. and Mapp, G. 2023. Joint energy and spectral optimization in Heterogeneous Vehicular Network. Computer Networks. 238. https://doi.org/10.1016/j.comnet.2023.110111A novel scheduling algorithm for improved performance of multi-objective safety-critical wireless sensor networks using long short-term memory
Al-Nader, I., Lasebae, A., Raheem, R. and Khoshkholghi, A. 2023. A novel scheduling algorithm for improved performance of multi-objective safety-critical wireless sensor networks using long short-term memory. Electronics. 12 (23). https://doi.org/10.3390/electronics12234766Leveraging oversampling techniques in machine learning models for multi-class malware detection in smart home applications
Chowdhury, A., Isalm, M., Kaisar, S., Naha, R., Khoshkholghi, A., Aiash, M. and Khoda, M.E. 2023. Leveraging oversampling techniques in machine learning models for multi-class malware detection in smart home applications. IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications. Exeter, United Kingdom 01 - 03 Nov 2023 IEEE. pp. 2216-2221A new perceptron based neural-network algorithm to enhance the scheduling performance of safety-critical WSNs of increased dependability
Al-Nader, I, Lasebae, A. and Raheem, R. 2023. A new perceptron based neural-network algorithm to enhance the scheduling performance of safety-critical WSNs of increased dependability. 8th World Conference on Information Systems for Business Management. Bangkok, Thailand 07 - 08 Sep 2023 Springer.Using Hidden Markov Chain for improving the dependability of safety-critical WSNs
Al-Nader, I., Lasebae, A. and Raheem, R. 2023. Using Hidden Markov Chain for improving the dependability of safety-critical WSNs. Barolli, L. (ed.) 37th International Conference on Advanced Information Networking and Applications. Federal University of Juiz de Fora, Brazil 29 - 31 Mar 2023 Cham, Switzerland. Springer. pp. 460–472 https://doi.org/10.1007/978-3-031-29056-5_40Performance and cryptographic evaluation of security protocols in distributed networks using applied pi calculus and Markov Chain
Edris, E., Aiash, M., Khoshkholghi, A., Naha, R., Chowdhury, A. and Loo, J. 2023. Performance and cryptographic evaluation of security protocols in distributed networks using applied pi calculus and Markov Chain. Internet of Things. 24. https://doi.org/10.1016/j.iot.2023.100913IoT-based emergency vehicle services in intelligent transportation system
Chowdhury, A., Kaisar, S., Khoda, M., Naha, R., Khoshkholghi, A. and Aiash, M. 2023. IoT-based emergency vehicle services in intelligent transportation system. Sensors. 23 (11). https://doi.org/10.3390/s23115324Federated learning for performance prediction in multi-operator environments
Lan, X., Taghia, J., Moradi, F., Khoshkholghi, A., Listo Zec, E., Mogren, O., Mahmoodi, T. and Johnsson, A. 2023. Federated learning for performance prediction in multi-operator environments. ITU Journal on Future and Evolving Technologies. 4 (1), pp. 166-177. https://doi.org/10.52953/PFYZ9165Continuous user authentication featuring behavioural biometrics
Kiyani, A. 2021. Continuous user authentication featuring behavioural biometrics. PhD thesis Middlesex University Science and TechnologyNovel group handover mechanism for cooperative and coordinated mobile femtocells technology in railway environment
Raheem, R., Lasebae, A. and Raheem, A. 2022. Novel group handover mechanism for cooperative and coordinated mobile femtocells technology in railway environment. Array. 15. https://doi.org/10.1016/j.array.2022.100223Cooperative and coordinated Mobile Femtocells technology in high-speed vehicular environments: mobility and interference management
Raheem, R., Lasebae, A., Petridis, M. and Raheem, A. 2021. Cooperative and coordinated Mobile Femtocells technology in high-speed vehicular environments: mobility and interference management. Barolli, L., Woungang, I. and Enokido, T. (ed.) 35th International Conference on Advanced Information Networking and Applications (AINA-2021). Ryerson University, Toronto, Canada (Held Online) 12 - 14 May 2021 Springer. https://doi.org/10.1007/978-3-030-75100-5_56Challenges, applications and future of wireless sensors in Internet of Things: a review
Jamshed, M., Ali, K., Abbasi, Q., Imran, M. and Ur-Rehman, M. 2022. Challenges, applications and future of wireless sensors in Internet of Things: a review. IEEE sensors journal. https://doi.org/10.1109/JSEN.2022.3148128Adaptability of automated information systems by the development sector in developing countries: a case study
Ahmed, B., Haq, B., Ali, K. and Iqbal, M. 2021. Adaptability of automated information systems by the development sector in developing countries: a case study. International Conference on Computing, Electronic and Electrical Engineering (ICE Cube). Quetta, Pakistan 26 - 27 Oct 2021 IEEE. https://doi.org/10.1109/ICECube53880.2021.9628254Robust continuous user authentication system using long short term memory network for healthcare
Tanveer, A., Lasebae, A., Ali, K., Alkhayyat, A., Ur-Rehman, M., Haq, B. and Naeem, B. 2021. Robust continuous user authentication system using long short term memory network for healthcare. Ur-Rehman, M. and Zoha, A. (ed.) 16th EAI International Conference on Body Area Networks. Glasgow, UK (Online) 25 - 26 Oct 2021 Cham Springer. https://doi.org/10.1007/978-3-030-95593-9_22Review and implementation of resilient public safety networks: 5G, IoT and emerging technologies
Ali, K., Nguyen, H., Vien, Q., Shah, P., Raza, M., Paranthaman, V., Er-Rahmadi, B., Awais, M., Islam, S. and Rodrigues, J. 2021. Review and implementation of resilient public safety networks: 5G, IoT and emerging technologies. IEEE network. 35 (2), pp. 18-25. https://doi.org/10.1109/MNET.011.2000418Heuristic edge server placement in Industrial Internet of Things and cellular networks
Kasi, S., Kasi, M., Ali, K., Raza, M., Afzal, H., Lasebae, A., Naeem, B., Islam, S. and Rodrigues, J. 2021. Heuristic edge server placement in Industrial Internet of Things and cellular networks. IEEE Internet of Things Journal. 8 (13), pp. 10308-10317. https://doi.org/10.1109/JIOT.2020.3041805Continuous user authentication featuring keystroke dynamics based on robust recurrent confidence model and ensemble learning approach
Kiyani, A., Lasebae, A., Ali, K., Ur-Rehman, M. and Haq, B. 2020. Continuous user authentication featuring keystroke dynamics based on robust recurrent confidence model and ensemble learning approach. IEEE Access. 8, pp. 156177-156189. https://doi.org/10.1109/ACCESS.2020.3019467Deployment of drone-based small cells for public safety communication system
Ali, K., Nguyen, H., Vien, Q., Shah, P. and Raza, M. 2020. Deployment of drone-based small cells for public safety communication system. IEEE Systems Journal. 14 (2), pp. 2882-2891. https://doi.org/10.1109/JSYST.2019.2959668Architecture design for disaster resilient management network using D2D technology
Ali, K. 2019. Architecture design for disaster resilient management network using D2D technology. PhD thesis Middlesex University School of Science and TechnologyIntrusion detection and classification with autoencoded deep neural network
Rezvy, S., Petridis, M., Lasebae, A. and Zebin, T. 2019. Intrusion detection and classification with autoencoded deep neural network. Lanet, J. and Toma, C. (ed.) SecITC 2018: International Conference on Security for Information Technology and Communications. Bucharest, Romania 08 - 09 Nov 2018 Switzerland Springer Nature. https://doi.org/10.1007/978-3-030-12942-2_12![](/~17/aqs/default-thumbnail.png)
TAEO-A thermal aware & energy optimized routing protocol for wireless body area networks
Javed, M., Ahmed, G., Mahmood, D., Raza, M., Ali, K. and Ur-Rehman, M. 2019. TAEO-A thermal aware & energy optimized routing protocol for wireless body area networks. Sensors. 19 (15), pp. 1-14. https://doi.org/10.3390/s19153275An efficient deep learning model for intrusion classification and prediction in 5G and IoT networks
Rezvy, S., Luo, Y., Petridis, M., Lasebae, A. and Zebin, T. 2019. An efficient deep learning model for intrusion classification and prediction in 5G and IoT networks. 2019 53rd Annual Conference on Information Sciences and Systems (CISS). Baltimore, MD, USA, USA 20 - 22 Mar 2019 IEEE. pp. 1-6 https://doi.org/10.1109/CISS.2019.8693059The impacts of internal threats towards routing protocol for low power and lossy network performance
Le, A., Loo, J., Luo, Y. and Lasebae, A. 2013. The impacts of internal threats towards routing protocol for low power and lossy network performance. 2013 IEEE Symposium on Computers and Communications (ISCC). https://doi.org/10.1109/ISCC.2013.6755045![](/~17/aqs/default-thumbnail.png)