Trading app analyzer using implanted sensing technique in IoT via blockchain-based networks

نویسندگان

چکیده

Handheld devices equipped with sophisticated sensors enabling data collection as well remote monitoring would lay the groundwork for one low-cost trading approach. This data, example, could be linked to contaminants and greenhouse emissions then used assess limitations of current regulatory requirements. On a larger scale, IoT trade method relies on centralised third-party organisation regulate among producers users, which is ineffective unsafe. These decentralised solutions based block chain technology, other hand, allow exchange while guaranteeing integrity, confidentiality, anonymity. However, leading lack understanding process efficiency between retailers buyers, there significant gap in assessing procedures IoT. We propose paradigm IoT-based known Internet Things blockchain network, that intended environmental influenced through knowledge gap. can examine efficacy transmission three fundamental protocol connections respect delay power usage. protocols model analysis serve baseline solution.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Intrusion Detection in IOT based Networks Using Double Discriminant Analysis

Intrusion detection is one of the main challenges in wireless systems especially in Internet of things (IOT) based networks. There are various attack types such as probe, denial of service, remote to local and user to root. In addition to known attacks and malicious behaviors, there are various unknown attacks that some of them have similar behavior with respect to each other or mimic the norma...

متن کامل

CIoTA: Collaborative IoT Anomaly Detection via Blockchain

Due to their rapid growth and deployment, Internet of things (IoT) devices have become a central aspect of our daily lives. However, they tend to have many vulnerabilities which can be exploited by an attacker. Unsupervised techniques, such as anomaly detection, can help us secure the IoT devices. However, an anomaly detection model must be trained for a long time in order to capture all benign...

متن کامل

fault location in power distribution networks using matching algorithm

چکیده رساله/پایان نامه : تاکنون روش‏های متعددی در ارتباط با مکان یابی خطا در شبکه انتقال ارائه شده است. استفاده مستقیم از این روش‏ها در شبکه توزیع به دلایلی همچون وجود انشعاب‏های متعدد، غیر یکنواختی فیدرها (خطوط کابلی، خطوط هوایی، سطح مقطع متفاوت انشعاب ها و تنه اصلی فیدر)، نامتعادلی (عدم جابجا شدگی خطوط، بارهای تک‏فاز و سه فاز)، ثابت نبودن بار و اندازه گیری مقادیر ولتاژ و جریان فقط در ابتدای...

Game Theory Based Spectrum Sensing Technique Using Cognitive Radio Networks

In Cognitive Radio Networks, though energy detection technique is simple with short sensing time, its performance is poor under low Signal to Noise Ratio (SNR) conditions. Hence in this paper, we propose to design an optimized adaptive spectrum sensing technique Using Game Theory Model for Cognitive Radio Networks. Initially, the secondary users decide the sensing technique to be applied based ...

متن کامل

Market Design for Trading with Blockchain Technology

An intrinsic feature of blockchain technology is the so-called distributed ledger, which involves maintaining a decentralized record of all transactions for a security. A distributed ledger allows anyone with access to it to identify asset holdings by (anonymous) identifiers. In this paper, we argue that the mapping between identifiers and end-investors should be a market design choice. We capt...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Health Sciences (IJHS)

سال: 2022

ISSN: ['2550-6978', '2550-696X']

DOI: https://doi.org/10.53730/ijhs.v6ns5.11142