Skip to main content
Top
Published in: Wireless Personal Communications 3/2021

12-03-2021

BDN-GWMNN: Internet of Things (IoT) Enabled Secure Smart City Applications

Authors: Subhashini Peneti, M. Sunil Kumar, Suresh Kallam, Rizwan Patan, Vidhyacharan Bhaskar, Manikandan Ramachandran

Published in: Wireless Personal Communications | Issue 3/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Nowadays, next-generation networks such as the Internet of Things (IoT) and 6G are played a vital role in providing an intelligent environment. The development of technologies helps to create smart city applications like the healthcare system, smart industry, and smart water plan, etc. Any user accesses the developed applications; at the time, security, privacy, and confidentiality arechallenging to manage. So, this paper introduces the blockchain-defined networks with a grey wolf optimized modular neural network approach for managing the smart environment security. During this process, construction, translation, and application layers are created, in which user authenticated based blocks are designed to handle the security and privacy property. Then the optimized neural network is applied to maintain the latency and computational resource utilization in IoT enabled smart applications. Then the efficiency of the system is evaluated using simulation results, in which system ensures low latency, high security (99.12%) compared to the multi-layer perceptron, and deep learning networks.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
3.
go back to reference Tsihrintzis, G. A., & Virvou, M. (2020). Advances in Core Computer Science-Based Technologies. In Advances in Core Computer Science-Based Technologies (pp. 1–6). Cham: Springer. Tsihrintzis, G. A., & Virvou, M. (2020). Advances in Core Computer Science-Based Technologies. In Advances in Core Computer Science-Based Technologies (pp. 1–6). Cham: Springer.
4.
go back to reference Ali, M. S., Vecchio, M., Pincheira, M., Dolui, K., Antonelli, F., & Rehmani, M. H. (2019). Applications of blockchains in the Internet of Things: A comprehensive survey. IEEE Communications Surveys & Tutorials, 21(2), 1676–1717.CrossRef Ali, M. S., Vecchio, M., Pincheira, M., Dolui, K., Antonelli, F., & Rehmani, M. H. (2019). Applications of blockchains in the Internet of Things: A comprehensive survey. IEEE Communications Surveys & Tutorials, 21(2), 1676–1717.CrossRef
5.
go back to reference Sheron, P. F., Sridhar, K. P., Baskar, S., & Shakeel, P. M. (2019). A decentralized scalable security framework for end-to‐end authentication of future IoT communication. Transactions on Emerging Telecommunications Technologies, e3815.https://doi.org/10.1002/ett.3815. Sheron, P. F., Sridhar, K. P., Baskar, S., & Shakeel, P. M. (2019). A decentralized scalable security framework for end-to‐end authentication of future IoT communication. Transactions on Emerging Telecommunications Technologies, e3815.https://​doi.​org/​10.​1002/​ett.​3815.
6.
go back to reference Ge, M., Hong, J. B., Walter Guttmann, and Dong Seong Kim. (2017) “A framework for automating security analysis of the internet of things.“ Journal of Network and Computer Applications 83 (2017): 12–27. Ge, M., Hong, J. B., Walter Guttmann, and Dong Seong Kim. (2017) “A framework for automating security analysis of the internet of things.“ Journal of Network and Computer Applications 83 (2017): 12–27.
7.
8.
go back to reference Biswas, K., & Muthukkumarasamy, V. (2016, December). Securing smart cities using blockchain technology. In 2016 IEEE 18th international conference on high performance computing and communications; IEEE 14th international conference on smart city; IEEE 2nd international conference on data science and systems (HPCC/SmartCity/DSS) (pp. 1392–1393). IEEE. Biswas, K., & Muthukkumarasamy, V. (2016, December). Securing smart cities using blockchain technology. In 2016 IEEE 18th international conference on high performance computing and communications; IEEE 14th international conference on smart city; IEEE 2nd international conference on data science and systems (HPCC/SmartCity/DSS) (pp. 1392–1393). IEEE.
9.
go back to reference Singh, S. K., Jeong, Y. S., & Park, J. H. (2020). A Deep Learning-based IoT-oriented Infrastructure for Secure Smart City. Sustainable Cities and Society,Volume, 60, 102252.CrossRef Singh, S. K., Jeong, Y. S., & Park, J. H. (2020). A Deep Learning-based IoT-oriented Infrastructure for Secure Smart City. Sustainable Cities and Society,Volume, 60, 102252.CrossRef
10.
go back to reference Rahman, M. A., Asyharia, A. T., Leong, L. S., Satrya, G. B., Tao, M. H., & Zolkipli, M. F. (2020). Scalable Machine Learning-Based Intrusion Detection System for IoT-Enabled Smart Cities. Sustainable Cities and Society, 61, 102324.CrossRef Rahman, M. A., Asyharia, A. T., Leong, L. S., Satrya, G. B., Tao, M. H., & Zolkipli, M. F. (2020). Scalable Machine Learning-Based Intrusion Detection System for IoT-Enabled Smart Cities. Sustainable Cities and Society, 61, 102324.CrossRef
11.
go back to reference Rahman, M. A., Asyhari, A. T., Kurniawan, I. F., Ali, M. J., Rahman, M. M., & Karim, M. (2020). A scalable hybrid MAC strategy for traffic-differentiated IoT-enabled intra-vehicular networks. Computer Communications.157, PP. 320–328. Rahman, M. A., Asyhari, A. T., Kurniawan, I. F., Ali, M. J., Rahman, M. M., & Karim, M. (2020). A scalable hybrid MAC strategy for traffic-differentiated IoT-enabled intra-vehicular networks. Computer Communications.157, PP. 320–328.
12.
go back to reference Aikins, S. K. (2019). Managing Cybersecurity Risks of SCADA Networks of Critical Infrastructures in the IoT Environment. In Security, Privacy and Trust in the IoT Environment (pp. 3–23). Cham: Springer.CrossRef Aikins, S. K. (2019). Managing Cybersecurity Risks of SCADA Networks of Critical Infrastructures in the IoT Environment. In Security, Privacy and Trust in the IoT Environment (pp. 3–23). Cham: Springer.CrossRef
13.
go back to reference Ziegler, S., Menon, M., & Annichino, P. (2019). IoT Privacy and Security in Smart Cities. In Internet of Things Security and Data Protection (pp. 149–171). Cham: Springer.CrossRef Ziegler, S., Menon, M., & Annichino, P. (2019). IoT Privacy and Security in Smart Cities. In Internet of Things Security and Data Protection (pp. 149–171). Cham: Springer.CrossRef
14.
go back to reference Butt, T. A., & Afzaal, M. (2019). Security and privacy in smart cities: issues and current solutions. In Smart Technologies and Innovation for a Sustainable Future (pp. 317–323). Cham: Springer.CrossRef Butt, T. A., & Afzaal, M. (2019). Security and privacy in smart cities: issues and current solutions. In Smart Technologies and Innovation for a Sustainable Future (pp. 317–323). Cham: Springer.CrossRef
15.
go back to reference Popescul, D., & &Genete, L. D. (2016). Data security in smart cities: challenges and solutions. InformaticaEconomică, 20(1), .PP29–38. Popescul, D., & &Genete, L. D. (2016). Data security in smart cities: challenges and solutions. InformaticaEconomică, 20(1), .PP29–38.
16.
go back to reference Yaqoob, I., Hashem, I. A. T., Mehmood, Y., Gani, A., Mokhtar, S., & Guizani, S. (2017). Enabling communication technologies for smart cities. IEEE Communications Magazine, 55(1), 112–120.CrossRef Yaqoob, I., Hashem, I. A. T., Mehmood, Y., Gani, A., Mokhtar, S., & Guizani, S. (2017). Enabling communication technologies for smart cities. IEEE Communications Magazine, 55(1), 112–120.CrossRef
17.
go back to reference Le-Dang, Q., & Le-Ngoc, T. (2018). Internet of Things (IoT) Infrastructures for Smart Cities. In Handbook of Smart Cities (pp. 1–30). Cham: Springer. Le-Dang, Q., & Le-Ngoc, T. (2018). Internet of Things (IoT) Infrastructures for Smart Cities. In Handbook of Smart Cities (pp. 1–30). Cham: Springer.
18.
go back to reference Raj, S. N., & Sherly, E. (2020). “Blockchain-Based Shared Security Architecture. In “In Cognitive Informatics and Soft Computing (pp. 29–35). Singapore: Springer.CrossRef Raj, S. N., & Sherly, E. (2020). “Blockchain-Based Shared Security Architecture. In “In Cognitive Informatics and Soft Computing (pp. 29–35). Singapore: Springer.CrossRef
19.
go back to reference Wang, Z. H., & Wang, J. (2019, October). An IOT Data Collection Mechanism Based on Cloud-Edge Coordinated Deep Learning. In China Conference on Wireless Sensor Networks (pp. 76–89). Springer, Singapore. Wang, Z. H., & Wang, J. (2019, October). An IOT Data Collection Mechanism Based on Cloud-Edge Coordinated Deep Learning. In China Conference on Wireless Sensor Networks (pp. 76–89). Springer, Singapore.
20.
go back to reference de Morais, C. M., Sadok, D., & Kelner, J. (2019). An IoT sensor and scenario survey for data researchers. Journal of the Brazilian Computer Society, 25(4), 1–17. de Morais, C. M., Sadok, D., & Kelner, J. (2019). An IoT sensor and scenario survey for data researchers. Journal of the Brazilian Computer Society, 25(4), 1–17.
21.
go back to reference Parizi, R. M., Dehghantanha, A., Azmoodeh, A., & Choo, K. K. R. (2020). Blockchain in Cybersecurity Realm: An Overview. In Blockchain Cybersecurity, Trust and Privacy,79 (pp. 1–5). Cham: Springer. Parizi, R. M., Dehghantanha, A., Azmoodeh, A., & Choo, K. K. R. (2020). Blockchain in Cybersecurity Realm: An Overview. In Blockchain Cybersecurity, Trust and Privacy,79 (pp. 1–5). Cham: Springer.
22.
go back to reference Chen, K. (2015). Deep and modular neural networks. In Springer Handbook of Computational Intelligence (pp. 473–494). Berlin: Springer.CrossRef Chen, K. (2015). Deep and modular neural networks. In Springer Handbook of Computational Intelligence (pp. 473–494). Berlin: Springer.CrossRef
23.
go back to reference Tanaka, G., Yamane, T., Nakano, D., Nakane, R., & Katayama, Y. (2015, July). Regularity and randomness in modular network structures for neural associative memories. In 2015 International Joint Conference on Neural Networks (IJCNN) (pp. 1–7). IEEE. Tanaka, G., Yamane, T., Nakano, D., Nakane, R., & Katayama, Y. (2015, July). Regularity and randomness in modular network structures for neural associative memories. In 2015 International Joint Conference on Neural Networks (IJCNN) (pp. 1–7). IEEE.
24.
go back to reference Emary, E., Zawbaa, H. M., & Grosan, C. (2017). Experienced gray wolf optimization through reinforcement learning and neural networks. IEEE transactions on neural networks and learning systems, 29(3), 681–694.MathSciNetCrossRef Emary, E., Zawbaa, H. M., & Grosan, C. (2017). Experienced gray wolf optimization through reinforcement learning and neural networks. IEEE transactions on neural networks and learning systems, 29(3), 681–694.MathSciNetCrossRef
Metadata
Title
BDN-GWMNN: Internet of Things (IoT) Enabled Secure Smart City Applications
Authors
Subhashini Peneti
M. Sunil Kumar
Suresh Kallam
Rizwan Patan
Vidhyacharan Bhaskar
Manikandan Ramachandran
Publication date
12-03-2021
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 3/2021
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-021-08339-w

Other articles of this Issue 3/2021

Wireless Personal Communications 3/2021 Go to the issue

OriginalPaper

Personal Cloud P2P