Fig 5 - uploaded by Bhabendu Kumar Mohanta
Content may be subject to copyright.
6LoWPAN Architecture

6LoWPAN Architecture

Source publication
Conference Paper
Full-text available
In the era of the Internet of Things(IoT) smart devices are connected with wire or wireless way. The IoT devices are capable of sensing the environment and has the ability to transmit that information to the next level. The application area of IoT is Smart city, Smart transportation, Healthcare sector, Agriculture, Monitoring environment. Each of t...

Context in source publication

Context 1
... CoAP CoAP (Constrained Application Protocol) is one of the latest application layer communication protocol used for M2M (machine-to-machine) application and mainly Fig. 4 Fig. 5 which fits the IPv6 packet transmission in low power and lossy network with node have limited processing capabilites [10]. The operating bandwidth is 2.4GHz and data transmission rate is 250Kbps. IPv6 offers around 5 * 1028 addresses for each individual in the world however with the growing rate of IoT devices soon these address space ...

Similar publications

Article
Full-text available
In this paper, we demonstrate the realistic test of a 2.4 GHz multi-hop wireless network for mountainous forest and watercourse environments. A multi-hop network using IEEE 802.15.4 XBee3 micro-modules and a communication protocol among nodes were developed. A wireless node deployment solution was introduced for practical testing. The proposed syst...
Article
Full-text available
Due to the massive use of wireless Internet of Things (IoT), the advent of multimedia-big-data in recent decades poses numerous obstacles for successful contact with the virtual era. Mobile Adhoc Network-based IoT (MANET IoT) framework is increasingly common in this regard owing to its increased communication protocols and economic efficiency. MANE...
Conference Paper
Full-text available
In recent years, security has become one of the major concerns in IoT. As a result, a variety of emerging technologies and new standards have been developed over the past few years to effectively increase the security capabilities of the IoT systems. At the same time, performance still remains as another fundamental aspect of IoT. Current IoT syste...
Article
Full-text available
Health monitoring systems are improving with the development of the internet of things. This paper proposes a secure architecture consisting of a four-layer internet of things enabled health monitoring system that collects patient data and classifies them into different medical categories. While collecting patient information from their wearable sm...

Citations

... The system achieved a 12.75% improvement in network efficiency by addressing bandwidth, response time, and scalability challenges. Similarly, Satapathy et al. [40] proposed a Hyperledger Fabricbased framework to secure IoT communications, tackling issues like data leakage and unauthorized access while ensuring privacy and data integrity. Veeramakali et al. [41] developed the ODLSB framework, combining blockchain with deep learning for IoT healthcare. ...
... Satapathy et al. [14] outlined IoT application communication protocol identification and the underlying mechanism. The authors present a secure architecture constructed on top of an open Blockchain to handle the issues that are inherent in IoT applications and show how the Blockchain could be used to address them. ...
... The suggested approach improves access control and reciprocal authenticity while lowering communication and computational costs Satapathy et al. [14] IoT and blockchain ...
Chapter
Full-text available
Systems for managing identities, which are frequently employed in practical contexts, are designed to make chores like maintaining credentials and carrying out authentication simpler. In recent years, initiatives have been made to provide blockchain-based identity management (IdM) tools that give users control over their own identities. Blockchain technology is a desirable solution for resolving IoT issues due to its distributed character. Identity authentication is an important element of service design that can effectively handle security issues with the IoT. Two of the most crucial security measures are authentication and authorization, both of which have digital identification as their foundation. Scalability, interoperability, mobility, security, and privacy should all be taken into consideration when developing IdM tools for the IoT. They then contrasted the initiative groups working on this technology by looking at blockchain sovereign identity solutions and IoT digital IdM solutions. In this chapter, the authors discuss Internet-wide digital identity issues and solutions. The authors examine how existing solutions meet IoT criteria including scalability, interoperability, mobility, security, and privacy. The authors also discuss about rising blockchain sovereign identity solutions and include IoT identity technologies. This chapter also discusses some real-life applications in which Blockchain-based Identity Authentication is utilized for IoT systems.
... The concept envisions the blockchain-permissioned supervisory control recording the measurement data from the field devices and providing set points to the local control assets, e.g., the system frequency recovery and load sharing investigated in this study. We consider that the blockchain system allows access only from the devices registered beforehand through certificate authority, securing the data integrity [19], [20]; however, as further discussed in Section III, the stochastic nature of its latency causes challenges that necessitate a reactive measure to avoid performance degradation under the variable latency. To illustrate the proposed reactive solution, Fig. 1 also provides a graphical description of the reactive control layer envisioned in this work. ...
Article
Full-text available
This paper presents a unified multi-timescale control approach for a power system with distributed energy resources to achieve cyber-resilient operation. The proposed concept combines two cyber-resilient control methods: proactive and reactive methods. The proactive method uses a blockchain that ensures measurement and control data can be securely exchanged among grid assets and also derives control set points as a load-sharing supervisory control, with an embedded logic called chaincode. The proactive method ensures data integrity, but it inherits stochastic latency with significant standard deviation due to the nature of the distributed ledgers and security measures, leading to challenges in control. To overcome this trade-off, the reactive approach uses event-driven communication. For this approach, rather than communicating the complete data, a lightweight data packet is communicated in a peer-to-peer fashion. Therefore, it guarantees driving the system into a stable operation in case the proactive operation degrades with insufficient latency. To validate the concept, Hyperleger Fabric blockchain 2.2 is used to characterize the latency and is customized for an inverter control system in this study. Based on the use case, a stability analysis is presented to evaluate the impact of the variable delay and to identify the need for a reactive approach to mitigate the effects of a prolonged delay in the proactive method. A test bed with two hardware inverter prototypes and a custom blockchain programmed with the unified method is developed for validation. A set of hardware experimental results validates the methodology and demonstrates the inverter system operations achieving frequency recovery and load-sharing restoration based on the unified control method.
... In their study [72], the authors examined the concept, relevant research on IoT security and a possible approach to a solution using blockchain. The authors proposed a secure architecture for internet of things applications built on a distributed Blockchain system [73]. ...
... To fulfill consensus between the nodes various consensus algorithms [86] used by Blockchain network .The detailed architecture of blockchain and its application areas are describe by author in paper [87]. In Paper [88,89] author explained the mechanism, work related to security of IOT with Blockchain as solution approach. In Paper [90] authors proposed a framework for applications of IOT which is based on distributed Blockchain. ...
Article
Full-text available
As we know IOT is the technology which is most frequently used in number of areas and application since last 10 to 12 years. Using IOT many smart things are communicated via wired and wireless medium and also process, compute and monitor various scenarios in real time. These smart things are different in nature and also having low storage, low power and low processing speed. There are many securities and privacy issues found in traditional system, the existing protocols used in traditional system was not up to mark for IOT. In this review paper, firstly the author explained brief about IOT and its applications. The main security problem ARC (Availability, Reliability and confidentially) and layer-wise problem also identified. After that authors study two main technology ML and block chain for finding privacy issue in Internet of Things. In the last section of this review paper the security problems are rectified and solved by machine learning and block chain and research challenges also mention.
... At the same time, many studies have found that blockchain has many innovative applications in the field of IoT and sensor networks. For instance, Satapathy et al. [4] proposed a secure architecture based on open blockchain, which can solve some of the challenges in IoT applications, like issues with confidentiality and privacy of data; Mrinal et al. [5] proposed a blockchain-based wireless sensor network for secure vehicle tracking, reducing the need for an Internet connection and eliminating the use of continuous GPS tracking; that is, it can effectively protect the privacy of commuters and the security of collected data. erefore, blockchain is known as a new generation of secure information technology. ...
... e initial credit value of each node is 1. When node i becomes an accounting node for the first time, its credit value is equal to the initial credit value plus the C(x i ) calculated by (4). Moreover, when node i is selected as the accounting node again, its credit value is the sum of the newly calculated credit value and the previously obtained. ...
... In contrast, for nodes with malicious behaviour, it will be subtracted after calculating the corresponding credit value, as shown in (6). For the initial malicious nodes, its credit value is the initial credit value minus C(x i ) calculated by (4), that is, the credit value obtained after work. But for the malicious nodes in the consensus process, the credit value subtracts the new credit value from the previous credit value. ...
Article
Full-text available
Nowadays, blockchain is known as a new generation of secure information technologies for realizing business and industrial sustainability, and consensus algorithm is the key technology of blockchain. In order to solve the problem of “oligarchy” nodes and excessive punishment for nodes in existing credit consensus algorithms, a novel semifragile consensus algorithm based on the credit space for consortium blockchain is proposed in this paper. Firstly, the accounting node selection mechanism based on credit space is proposed. The credit value of the node is calculated according to a novel credit evaluation model, and then the credit space of the node is allocated according to the size of the credit value. Afterward, a random algorithm is used to select the accounting node in the credit space. This mechanism effectively inhibits the generation of “oligarchy” nodes and maintains the enthusiasm of nodes. Secondly, this paper proposes a semifragile hierarchical punishment mechanism, which punishes the malicious nodes with severe measures and gives the nonmalicious nodes the opportunity to continue participating in the consensus. So, this semifragile punishment mechanism solves the problem of excessive punishment of nodes. Experimental simulation results demonstrate that the proposed consensus algorithm has randomness while maintaining the credit incentive among nodes. In addition, the node’s punishment mechanism is more reasonable. This algorithm has better security and can be well applied to consortium blockchain scenarios.
... There are a large number of stakeholders at every point in the agriculture industry ranging from farmers to consumers, involved and makes agricultural supply chain management one of the most challenging tasks for humans. It is very important for all the involved persons to have proper data and secure at every moment for better productivity and sustainability [4][9] [15]. ...
... The work in [2][3] uses basic functionalities of IoT and aims to monitor products such as soil pH content, moisture content etc. while using technologies such as cloud computing for data storage. The authors in [4] has discussed the IoUT (Internet of Underground Things) where sensors are partially or completely buried in soil for monitoring. Second approach towards smart farming was Intelligent irrigation based on IoT. ...
Conference Paper
Full-text available
Nowadays, smart applications are increasing day by day to improve the standard of agriculture in villages. A modern day agriculture is characterised by the presence of numerous smart Information and Communication Technology (ICT)-enabled services such as automated agriculture monitoring, data privacy, among others. Such agriculture monitoring employ multitudes of Internet of Things (IoT) devices to collect and share data between trusted users by means of a centralized intermediary for monitoring and control of the myriad automatic activities. However, a centralized intermediary is plagued by issues such as single point of failure, risk of data loss, man-in-the-middle attack and so forth. Blockchain based smart contracts for automated control in smart agriculture provides a decentralized and secure alternative. With the increasing population across the world, the demand for high-quality products which are fresh as well as healthy is increasing significantly and therefore in a very limited time, the farming and food production have to increase yield significantly. In the coming future, we need to produce double of what we are producing now. There is much research done in the field of smart farming but they don't tackle issues such as storing of data on a central server, complete details of the products from beginning to end which could satisfy a customer as well as stakeholders. In this paper, we presented a novel Blockchain based solutions for secure and smart monitoring of agriculture lands.
... All transaction data will be recorded on all blockchain networks whose procedure is not centralized on a single party. This technology will record all transactions on each node so that it is difficult for irresponsible individuals to modify [20]. Each block has a block header and a transaction block. ...
Article
Full-text available
The misuse of health data stored in the Electronic Health Record (EHR) system can be uncontrolled. For example, mishandling of privacy and data security related to Corona Virus Disease-19 (COVID-19), containing patient diagnosis and vaccine certificate in Indonesia. We propose a system framework design by utilizing the InterPlanetary File System (IPFS) and Blockchain technology to overcome this problem. The IPFS environment supports a large data storage with a distributed network powered by Ethereum blockchain. The combination of this technology allows data stored in the EHR to be secure and available at any time. All data are secured with a blockchain cryptographic algorithm and can only be accessed using a user's private key. System testing evaluates the mechanism and process of storing and accessing data from 346 computers connected to the IPFS network and Blockchain by considering several parameters, such as gas unit, CPU load, network latency, and bandwidth used. The obtained results show that 135205 gas units are used in each transaction based on the tests. The average execution speed ranges from 12.98 to 14.08 GHz, 26 KB/s is used for incoming, and 4 KB/s is for outgoing bandwidth. Our contribution is in designing a blockchain-based decentralized EHR system by maximizing the use of private keys as an access right to maintain the integrity of COVID-19 diagnosis and certificate data. We also provide alternative storage using a distributed IPFS to maintain data availability at all times as a solution to the problem of traditional cloud storage, which often ignores data availability. Doi: 10.28991/esj-2021-SP1-013 Full Text: PDF
... All transaction data will be recorded on all blockchain networks whose procedure is not centralized on a single party. This technology will record all transactions on each node so that it is difficult for irresponsible individuals to modify [20]. Each block has a block header and a transaction block. ...
Article
Full-text available
The misuse of health data stored in the Electronic Health Record (EHR) system can be uncontrolled. For example, mishandling of privacy and data security related to Corona Virus Disease-19 (COVID-19), containing patient diagnosis and vaccine certificate in Indonesia. We propose a system framework design by utilizing the InterPlanetary File System (IPFS) and Blockchain technology to overcome this problem. The IPFS environment supports a large data storage with a distributed network powered by Ethereum blockchain. The combination of this technology allows data stored in the EHR to be secure and available at any time. All data are secured with a blockchain cryptographic algorithm and can only be accessed using a user's private key. System testing evaluates the mechanism and process of storing and accessing data from 346 computers connected to the IPFS network and Blockchain by considering several parameters, such as gas unit, CPU load, network latency, and bandwidth used. The obtained results show that 135205 gas units are used in each transaction based on the tests. The average execution speed ranges from 12.98 to 14.08 GHz, 26 KB/s is used for incoming, and 4 KB/s is for outgoing bandwidth. Our contribution is in designing a blockchain-based decentralized EHR system by maximizing the use of private keys as an access right to maintain the integrity of COVID-19 diagnosis and certificate data. We also provide alternative storage using a distributed IPFS to maintain data availability at all times as a solution to the problem of traditional cloud storage, which often ignores data availability.
... Using this afterward many security architecture like security architecture in smart city [67], Platform for IIoT [68] and, trust based transaction model is proposed by the authors. Again, in the papers [69][70][71] a fresh approach of how blockchain can be used in IoT security perspective is discussed and also a distributed blockchain methodology is also proposed. Different approach for solving privacy preservation and authentication issues have been proposed by authors in [72][73][74]. ...
Chapter
In this chapter, we develop a mathematical model for alcohol-related health risks incorporating fuzziness in uncertainties associated with individual risk behavior and induced death rate. In the study, fuzzy numbers (sets) are defined as the degree of peer influence of susceptible individuals into drinking. Using the next generation matrix operator (NGM), we derive the fuzzy reproduction number and characterize the existence of equilibrium states and their stability properties. The study reveals that perceived most influential individuals tend to increase the force of influence. The model has the potential to reveal inherent risk behaviors or cultural beliefs which are critical in the development of alcoholism management strategies.KeywordsFuzzy modelsHealth risksAlcoholismCultural beliefsFuzzy risk reproduction number