With the evolution of the fifth-generation (5G) wireless network, the Internet of Things (IoT) has become a revolutionary technique that enables a diverse number of features and applications. It can ...able a diverse amount of devices to be connected in order to create a single communication architecture. As it has significantly expanded in recent years, it is fundamental to study this trending technology in detail and take a close look at its applications in the different domains. It represents an enabler of new communication possibilities between people and things. The main asset of this concept is its significant influence through the creation of a new world dimension. The key features required for employing a large-scale IoT are low-cost sensors, high-speed and error-tolerant data communications, smart computations, and numerous applications. This research work is presented in four main sections, including a general overview of IoT technology, a summary of previous correlated surveys, a review regarding the main IoT applications, and a section on the challenges of IoT. The purpose of this study is to fully cover the applications of IoT, including healthcare, environmental, commercial, industrial, smart cities, and infrastructural applications. This work explains the concept of IoT and defines and summarizes its main technologies and uses, offering a next-generation protocol as a solution to the challenges. IoT challenges were investigated to enhance research and development in the fields. The contribution and weaknesses of each research work cited are covered, highlighting eventual possible research questions and open matters for IoT applications to ensure a full analysis coverage of the discussed papers.
The Internet of Medical Things (IoMT) mobile devices such as ambulance, medical done, and emergency mobile medical equipment face severe signal distortions due to interference, end-to-end packet ...loss, handoff delays, and lower throughputs during mobility. Network mobility basic support protocol (NBSP) has been proposed using the IP-based Wi-Fi solution to solve these issues. However, the weak signal, extra signaling overhead, and higherdelays were identified during handover due to patients' excessive requisites, resulting in radio link failure. Therefore, this article proposes a novel resource-efficient flow-enabled distributed mobility anchoring (FDMA) framework enhancing the functionalities of the centralized network entities and mobility entities.The performance of the proposed FDMA framework is evaluated and compared with the standard NBSP and proxy NEMO (PNEMO) scheme in terms of the variable number of cell residence time and mobile routers, where the proposed framework outperformed NBSP and PNEMO schemes for IoMT Mobile devices in 5G network.
The importance of image security in the field of medical imaging is challenging. Several research works have been conducted to secure medical healthcare images. Encryption, not risking loss of data, ...is the right solution for image confidentiality. Due to data size limitations, redundancy, and capacity, traditional encryption techniques cannot be applied directly to e-health data, especially when patient data are transferred over the open channels. Therefore, patients may lose the privacy of data contents since images are different from the text because of their two particular factors of loss of data and confidentiality. Researchers have identified such security threats and have proposed several image encryption techniques to mitigate the security problem. However, the study has found that the existing proposed techniques still face application-specific several security problems. Therefore, this paper presents an efficient, lightweight encryption algorithm to develop a secure image encryption technique for the healthcare industry. The proposed lightweight encryption technique employs two permutation techniques to secure medical images. The proposed technique is analyzed, evaluated, and then compared to conventionally encrypted ones in security and execution time. Numerous test images have been used to determine the performance of the proposed algorithm. Several experiments show that the proposed algorithm for image cryptosystems provides better efficiency than conventional techniques.
The recent advancements of Internet of Things (IoT) embedded systems, wireless networks, and biosensors those have assisted in the rapid development of implanting wearable sensors are reviewed here. ...The applications of the internet of medical things (IoMT) that has gained major attention as an ecosystem of connected clinical systems, computing systems, and medical sensors geared towards improving the quality of healthcare services are also reviewed here. The 5G based AI technology can revolute the perception of healthcare and lifestyle. In light of the importance of IoT platforms and 5G networks, the purpose of this proposed research work is to identify threats that could undermine the integrity, privacy, and security of IoMT systems. Also, the novel blockchain‐based approaches that can help in improving the confidentiality of IoMT network. It has been discovered that IoMT is vulnerable to various types of attacks, including denial of service (DoS), malware, and eavesdropping attack. In addition, IoMT is exposed to various vulnerabilities, such as security, privacy, and confidentiality. Despite multiple security threats, there are novel cryptographic techniques, such as access control, identity authentication, and data encryption that can help in improving the security and reliability of IoMT devices.
Smart city is a collective term for technologies and concepts that are directed toward making cities efficient, technologically more advanced, greener and more socially inclusive. These concepts ...include technical, economic and social innovations. This term has been tossed around by various actors in politics, business, administration and urban planning since the 2000s to establish tech-based changes and innovations in urban areas. The idea of the smart city is used in conjunction with the utilization of digital technologies and at the same time represents a reaction to the economic, social and political challenges that post-industrial societies are confronted with at the start of the new millennium. The key focus is on dealing with challenges faced by urban society, such as environmental pollution, demographic change, population growth, healthcare, the financial crisis or scarcity of resources. In a broader sense, the term also includes non-technical innovations that make urban life more sustainable. So far, the idea of using IoT-based sensor networks for healthcare applications is a promising one with the potential of minimizing inefficiencies in the existing infrastructure. A machine learning approach is key to successful implementation of the IoT-powered wireless sensor networks for this purpose since there is large amount of data to be handled intelligently. Throughout this paper, it will be discussed in detail how AI-powered IoT and WSNs are applied in the healthcare sector. This research will be a baseline study for understanding the role of the IoT in smart cities, in particular in the healthcare sector, for future research works.
Traditional parallel computing for power management systems has prime challenges such as execution time, computational complexity, and efficiency like process time and delays in power system ...condition monitoring, particularly consumer power consumption, weather data, and power generation for detecting and predicting data mining in the centralized parallel processing and diagnosis. Due to these constraints, data management has become a critical research consideration and bottleneck. To cope with these constraints, cloud computing-based methodologies have been introduced for managing data efficiently in power management systems. This paper reviews the concept of cloud computing architecture that can meet the multi-level real-time requirements to improve monitoring and performance which is designed for different application scenarios for power system monitoring. Then, cloud computing solutions are discussed under the background of big data, and emerging parallel programming models such as Hadoop, Spark, and Storm are briefly described to analyze the advancement, constraints, and innovations. The key performance metrics of cloud computing applications such as core data sampling, modeling, and analyzing the competitiveness of big data was modeled by applying related hypotheses. Finally, it introduces a new design concept with cloud computing and eventually some recommendations focusing on cloud computing infrastructure, and methods for managing real-time big data in the power management system that solve the data mining challenges.
The price gouging or price hike is a worldwide issue, and it is related to inflation. Because of rising prices, people in various countries cannot afford nutritious food or proper treatment. ...Sometimes shops, restaurants, and transportation service providers charge more than the prescribed product price from buyers. In addition, unauthorized VAT or Tax is taken on products that the government exempts. Another reason for price hikes is bribery, and it occurs in transporting and delivering goods. This article introduces a blockchain-based Internet of Things model to monitor product price hikes and corruption from the Industry 4.0 and blockchain 5.0 point of view. Industries produce and package different products. Wholesalers and retailers purchase products from industrial companies. The primary goal of this article is to propose a blockchain mechanism for monitoring price hikes and corruption where the government can monitor buying and selling between buyers and industrial companies. Here, we have established blockchain-integrated remote database model where blockchain relates to a relational database management system that uses remote database access protocol and Cloud server. This article presents the brief evolution of blockchain and industry generations. Finally, this article provides a next generation blockchain model. An intelligent government connected with Industry 4.0 monitors price hikes and corruption.
The smart grid idea was implemented as a modern interpretation of the traditional power grid to find out the most efficient way to combine renewable energy and storage technologies. Throughout this ...way, big data and the Internet always provide a revolutionary solution for ensuring that electrical energy linked intelligent grid, also known as the energy Internet. The blockchain has some significant features, making it an applicable technology for smart grid standards to solve the security issues and trust challenges. This study will present a rigorous review of blockchain implementations with the cyber security perception and energy data protections in smart grids. As a result, we describe the major security issues of smart grid scenarios that big data and blockchain can solve. Then, we identify a variety of recent blockchain-based research works published in various literature and discuss security concerns on smart grid systems. We also discuss numerous similar practical designs, experiments, and items that have recently been developed. Finally, we go through some of the most important research problems and possible directions for using blockchain to address smart grid security concerns.