Conference PaperPDF Available

Integrated Internet of Things with Blockchains for Vendor-Management Inventory System

Authors:
Integrated Internet of Things with Blockchains
for Vendor-Management Inventory System
Nageswara Rao Atyam1, Ramesh Babu P2, P.Ponmurugan3, L. Sahaya Senthamil4, P. John
Augustine5, A. Govindarajan6
1Assistant Professor, Department of Electrical and Electronics Engineering, CMR Institute of Technology,
Bengaluru. India.
2Associate Professor, Department of Computer Science, College of Engineering & Technology,
Wollega University, Nekemte, Ethiopia.
3Associate Professor, Department of EEE, Sengunthar Engineering College, Tiruchengode, Tamil Nadu, India.
4Professor, Department of Electrical and Electronics Engineering, PSNA College of Engineering and Technology,
Dindigul, Tamil Nadu, India.
5Associate Professor, Department of Computer Science and Engineering, Sri Eshwar College of Engineering,
Coimbatore, Tamil Nadu, India.
6Associate Professor, KL Busines s School, Koneru Lakshmaiah Educational Foundation, KL University, Green
Fields,Vaddeswaram, Guntur, Andhra Pradesh, India.
nageswararaoaty am@gmail.com1, rameshbabup81@gmail.com2, murugan.pmsm@gmail.com3, elsahayam@gmail.com4,
pjohnaugustine@gmail.com5, agrajan1972@gmail.com6
Abstract In recent era, the supply chain
management is becoming a complex valued
network that offers a major competitive
advantage over logistics and supply chain
management. Despite its advantages, the
complexity is becoming a challenge that should
provide verification of sources, maintaining
product visibility and monitoring while moving
via s upply chains. The adoption of Internet of
Things (IoT) can support all these movements that
tends to track and monitor the activities of the
products moving in the chain network. Such
optimization enables the operations to get
optimized that includes manufacturing,
warehousing and transportation. In addition, the
transparency of the s upply chains can be
maintained via blockchain and when combined
with IoT, it increases the effectiveness and efficacy
of the supply chain
Keywords: Internet of Things, BlockChains,
Inventory System, Supply Chain
1. Introduction
Vendor-managed inventory (VMI) is a highly
prevalent management strategy for the supply chain
(SC) in order to improve SC performance while
establishing mutual benefits between a vendor and a
retailer. The key concept underlying VMI is that the
seller is allowed to s upervise a retailer's inventory, so
that the seller can follow the retailer's agreed stock,
monitor and fill in. VMI is an enhanced inventory
management approach that enables both retailer and
vendor to check the availability and movement of
goods across the entire SC in a seamless and accurate
way. In the Wal-Mart relationship with Procter &
Gamble, VMI was initially introduced as a key
feature and has become widely adopted by numerous
sectors since then [1].
Proceedings of the Sixth International Conference on Computing Methodologies and Communication (ICCMC 2022)
IEEE Xplore Part Number: CFP22K25-ART; ISBN: 978-1-6654-1028-1
978-1-6654-1028-1/22/$31.00 ©2022 IEEE 86
2022 6th International Conference on Computing Methodologies and Communication (ICCMC) | 978-1-6654-1028-1/22/$31.00 ©2022 IEEE | DOI: 10.1109/ICCMC53470.2022.9753843
Authorized licensed use limited to: VIT University. Downloaded on April 25,2022 at 04:57:19 UTC from IEEE Xplore. Restrictions apply.
The implementation of VMI techniques could have
considerable advantages for all the SC network
participants [2]. For suppliers, VMI provides the
visibility needed for improved demand forecas ts and,
hence, better stock management. VMI provides
merchants with a more effective order process ing
framework while decreasing operating and
administrative costs. In addition, VMI can offer
major benefits to upstream SC members. For
example, producers can more precisely forecast how
much they can create and so accomplish better
ordering and delivery. For the SC VMI in general,
inventory overvolume and inventory shortages have
been minimized, retail interactions are enhanced, and
the end-us er experience is improved.
Although VMI has been a popular strategy for
improving SC performance, not all deployments of
VMI are effective. There are several problems and
requirements for deploying a VMI model
successfully [36]. Formalized paraphraseSC
complexity and the difficulties of sharing knowledge
and opportunistic behavior among key SC
participants are of particular concern. Other key VMI
implementation obstacles may concern the security
risks associated with system integration and the costs
associated with the administration of SC
intermediates and the VMI processes concerned.
2. Background
The use of such technologies like IoT, AI, blockchain
transforms modern SC networks into entire digital
ecos ystems, facilitating the collaboration of inclusive,
trustworthy, integrated, and long-lasting corporate
solutions [11] and [12].
Blockchain Technology
Among the most recent developments in blockchain
technology is the concept of smart contracts [15],
which enable the capacity to do calculations within
the blockchain, thereby acting as a decentralised
virtual computer that can be accessed by anyone. The
use of blockchain technology is expected to
transform SC management in a number of ways [13]-
[17]. The characteristics of blockchain and smart
contracts described above could be applied to a wide
range of challenges in the field of SC management.
Internet of Things (IoT)
Modern SC networks are being reshaped by the
Internet of Things revolution, which has far-reaching
ramifications and offers significant economic
opportunities. It is believed that the IoT will be helps
to bridge the gap between various characteristics of
modern SC networks, application of multiple
applications, and real-time services. Using Internet of
Things -enabled infrastructures, any item can be
connected to the Internet, facilitating the interchange
of information among a large number of devices
[21]-[23].
The majority of IoT architectures are composed of
three layers: the perception layer, the network layer,
and the application layer [24]. Applications based on
the Internet of Things have become more popular in a
variety of industrial settings [25]-[26]. There is a
plethora of VMI-related material available in the SC
domain [7, 8]. However, as previously said, there are
still a number of obstacles and constraints that must
be overcome in order for it to be successfully
implemented. Furthermore, VMI deployment has so
far been seen through the lens of an operations
management perspective, but concerns of trust,
visibility, and security across SC networks have
received little attention to this point. Furthermore,
Proceedings of the Sixth International Conference on Computing Methodologies and Communication (ICCMC 2022)
IEEE Xplore Part Number: CFP22K25-ART; ISBN: 978-1-6654-1028-1
978-1-6654-1028-1/22/$31.00 ©2022 IEEE 87
Authorized licensed use limited to: VIT University. Downloaded on April 25,2022 at 04:57:19 UTC from IEEE Xplore. Restrictions apply.
only a few papers [9, 10] have looked into the
deployment of blockchain technology in VMI
applications. However, it is important to note that
both research considers only a single pair of SC
participants, but real-world VMI implementations
require several buyers to connect with multiple
vendors.
Only a small number of studies have used the
blockchain in VMI applications [9]. This paper
proposes an innovative interaction framework for
vendor and buyer relationships that is based on smart
contracts and distributed ledger technology. A
usecase VMI scenario is described, along with a
functional smart contract that may be used in the
situation. It is important to note that both research
considers only a single pair of SC participants, but
real-world VMI implementations have several
customers interacting with multiple vendors. A
blockchain-enabled architecture for VMI
implementation is proposed in this study, which takes
into account the restrictions outlined above and
allows for the interaction of numerous vendors with
multiple customers through functional smart
contracts.
3. Proposed Method
Figure 1 depicts a block schematic of the proposed
system, which represents the system under
consideration. An overview of the supply chain
management workflow is shown here, which includes
analysing the availability of products on-farm before
notifying local shops for transportation which is
performed to maintain transparency while reducing
the surplus or deficit quantity of food items.
Over the last few decades , the supply chain has
worked to decrease costs, clear warehouses , and
reduce inventory. Yet, the majority of the difficulties
have arisen as a result of stores running out of
inventory. As a result, it is vital to track the supply of
food from farms to stores in order to avoid a shortage
of certain food items.
In order to conduct this research, it is required to use
Internet of Things (IoT) devices in farms in order to
monitor the availability of items across a number of
farms. The study also incorporates blockchain
technology to transport and supply these items from
farms to local shops, allowing for more efficient
management of customer demand and supply. It is
anticipated that the application of these two
revolutionary technologies will enable the most
efficient management of the food supply chain
between farmers and local shops, ultimately reducing
the amount of food that is in excess or deficit.
The tracking of products helps to increase the
transparency and accuracy of goods as they move
through the local supply chain. The creation of
mobile applications or the embedding of technology
into various mobile applications will benefit users in
that they will be informed about the food items that
are available from a certain company, so enabling
them to make informed decisions . The integration of
IoT with blockchain in the food supply chain
provides greater transparency for businesses in their
interactions with customers.
Proceedings of the Sixth International Conference on Computing Methodologies and Communication (ICCMC 2022)
IEEE Xplore Part Number: CFP22K25-ART; ISBN: 978-1-6654-1028-1
978-1-6654-1028-1/22/$31.00 ©2022 IEEE 88
Authorized licensed use limited to: VIT University. Downloaded on April 25,2022 at 04:57:19 UTC from IEEE Xplore. Restrictions apply.
Figure 1: Proposed Method
The demand for provenance information is increasing
as a result of increased regulatory and consumer
pressure. Improved traceability, on the other hand,
increases value by lowering the high expenses
associated with quality problems, such as recalls,
reputational harm, and income losses from black-or
grey-market items. Blockchain will, in turn, exploit
the information from IoT devices with respect to all
of the conditions and monitored data and provide it to
the local shop owners or customers in order to
determine their specific requirements. The
blockchain embedded with machine learning
technology makes decisions on how to manage the
excess or deficit amount of products if there is a
surplus or deficit of those things.
Using real-time monitoring of goods via a
smartphone application, which allows both local store
owners and users to track the products, the
transparency and accuracy of goods moving through
the local supply chain is increased.
In this study, it is hypothesised that the use of these
two technologies will result in an ideal food supply
chain between farms and local stores between farms
and local shops. It will be successful in maintaining
the price of things, so preventing the over-pricing of
items or the stocking of large amounts of products by
illegal providers.
The application of a cluster algorithm in a group of
nodes is the subject of this investigation. Each cluster
selects one cluster head from among its members.
The cluster heads must be nodes with a maximum
number of neighbors, allowing the cluster heads to be
grouped together to provide the greatest amount of
network coverage possible. If numerous nodes are
next to the same number, the cluster is assigned a
random number from the pool of available numbers.
At the end of the process , the cluster head node with
the greatest number of cluster members is selected.
It is essential that a node serving as a cluster head is
kept up to date and has sufficient capacity to handle
blocks and transactions efficiently. The blockchain is
managed by cluster heads, which is why the Overlay
Block Manager was created. Transactions and
transaction blocks must be generated, confirmed, and
API
Blockchain
Supply chain
management
Consensus
Algorithm for
Stock Prediction
and Availability
IoT sensors
Data
preprocessing
Proceedings of the Sixth International Conference on Computing Methodologies and Communication (ICCMC 2022)
IEEE Xplore Part Number: CFP22K25-ART; ISBN: 978-1-6654-1028-1
978-1-6654-1028-1/22/$31.00 ©2022 IEEE 89
Authorized licensed use limited to: VIT University. Downloaded on April 25,2022 at 04:57:19 UTC from IEEE Xplore. Restrictions apply.
saved in order for blockchain administration to be
effective. It's important to remember that the
blockchain is an untrustworthy system in which there
is no trust in its nodes.
As a result, the members of the cluster keep an eye
on the actions of their Overlay Block Manager. The
cluster members desire a new Overlay Block
Manager where a transaction is not forwarded to
another Overlay Block Manager if there is any
misconduct on the part of one of the cluster members.
According to the findings of the investigation,
measures for dealing with errors such as those that
were made are in place.
The blockchain records all of the interactions that
occurred during the transaction.When compared to
transactions transmitted, data packets can be routed
over an overlay network in the most optimal paths,
which can be found here. For transaction data
packets, the Overlay Block Manager identity of the
recipient is necessary in order for the Overlay Block
Manager to route the packet to the correct
destination. This decreases the amount of time spent
exchanging data. The transaction that corresponds to
the information sent between overlay nodes includes
the signed data has h generated by the transaction
generator, which helps to assure data integrity.
Each transaction is saved in LSB chains, which are
linked together. The IoT data is saved off-chain in
order to reduce the number of overhead packets and
the amount of blockchain capacity required. Each
Overlay Block Manager retains the trusted rate of the
other Overlay Block Manager, as well as the time
stamp for the final Overlay Block Manager block, for
the duration of the session.
a. Transactions and blocks
For overlay node transfers, digital signatures,
asymmetrical encryption, and cryptographic
encryption are all used to protect the data. A
transaction containing m of n signatures, with n m
and n and m being s ignature numbers, is valid if and
only if n m and n and m are valid. The following is a
diagram of the transaction structure:
PTIDTID || PKoutputsignmetadata
TID- transaction identifier
PTID- previous transaction pointer.
With the use of an overlay node, the two transactions
that will be audited are linked together. The public
key is preceded by the contract generator, which is
signed using the public key. The signed transaction
identifier (TID) is used to s ign a transaction. For
transactions, the public key and the other nodes (n-1)
are displayed before the result field is displayed. It is
important to note that only m signatures are required
for the transaction to be deemed genuine. The output
field contains the hash of the public key that will be
utilised by the generator for the next transaction in
the chain.
The following node-generated transactions mus t be
evaluated since each new transaction is modified by
the public key without the transaction details being
included in the modification process. The fields
shown above are critical in ensuring that a transaction
is considered genuine. Therefore, new fields may be
defined based on the application's requirements and
requirements.
A block is made up of several transactions, and it is
feasible to hold up to Tmaxtransactions in a single
block of transactions. A single block with a Tmaxvalue
Proceedings of the Sixth International Conference on Computing Methodologies and Communication (ICCMC 2022)
IEEE Xplore Part Number: CFP22K25-ART; ISBN: 978-1-6654-1028-1
978-1-6654-1028-1/22/$31.00 ©2022 IEEE 90
Authorized licensed use limited to: VIT University. Downloaded on April 25,2022 at 04:57:19 UTC from IEEE Xplore. Restrictions apply.
greater than Tmaxfor more transactions has an impact
on the blockchain output in that particular block. The
two most important components of each block are the
block headers and the transactions. The following is
found in the block header:
PBID || BID || BGeneratorBverifier s
BID- block content hash.
PBID- previous block hash.
Attempting to modify an already-stored transaction
results in the block hash being inconsistent with the
next block, so making the attack more visible.
However, the contract will not be valid in
transactions until all m of n nodes involved in the
transaction have signed the contract and the
transaction has completed. Following that, the
transaction will be disbursed among the parties
involved. In order to remedy the iss ue, a list of public
keys that are capable of gaining access to members of
the cluster has been kept. This list primarily consists
of a simplified access control list for Overlay Block
Manager.
If a key in the list of public keys for a particular
transaction corresponds to a key in the Overlay Block
Manager's list of public keys , the Overlay Block
Manager will tell the members of its cluster about the
transaction. In order to protect the participant from
hos tile Overlay Block Managers who can track
transactions back to an individual member of the
cluster who is broadcasting different trans actions,
radio transactions are transmitted within the cluster to
protect the participant from hostile Overlay Block
Managers who can track transactions back to an
individual member of the cluster who is broadcas ting
different transactions.
If one of the public keys in the incoming Y operation
corresponds to a key list item, the Overlay Block
Manager can route the transaction to the cluster
member who previously uploaded the key to the
public keys list, allowing the transaction to be
completed more efficiently. The account will be
handed to any other Overlay Block Manager who
wishes to use it. Already-pending transactions are
saved in each Overlay Block Manager transaction
pool, while transactions that are currently in progress
are deleted. When the operating pool reaches
Tmaximum, the Overlay Block Manager process is
invoked, which initiates the method of creating a new
block using a distributed time-based consensus
algorithm, as described above.
b. Consensus ML algorithm
The report recommends a cons ensus algorithm based
on time ML consensus as the foundation. There is a
protection against malicious block generators th at
create new blocks on a regular basis. Before
constructing a new block, each overlay block
manager must wait for a random amount of time,
referred to as the period of waiting, in order to
maintain randomization amongst block generators.
In order to prevent overlay block managers from
claiming that there is a little waiting time, the next
MOs track the rate at which an overlay block
management produces new blocks at the start of the
wait. If the number of blocks surpas ses the limit set
by the programmers at Blockchain for the
framework, the overlay block managers reduce the
built-in block of the neighbouring block. Considering
that each overlay block manager has a unique waiting
Proceedings of the Sixth International Conference on Computing Methodologies and Communication (ICCMC 2022)
IEEE Xplore Part Number: CFP22K25-ART; ISBN: 978-1-6654-1028-1
978-1-6654-1028-1/22/$31.00 ©2022 IEEE 91
Authorized licensed use limited to: VIT University. Downloaded on April 25,2022 at 04:57:19 UTC from IEEE Xplore. Restrictions apply.
time, it is possible to generate an entirely new
overlay block manager block that contains a few or
all of the transactions in the overlay block manager's
Transaction Pool that is now in development.
In this instance, the overlay block management has
the ability to delete the transactions from its pool,
which were previously saved on the blockchain by
another overlay block manager. The notion that
overlay block managers must wait at random also
restricts the number of redundant blocks that can be
generated at the same time as a single redundant
block. The maximum waiting duration on the overlay
network is two times as long as the maximum waiting
period on the main network. It is possible to connect
all other overlay nodes to the block chain after a new
block has been produced.
At the same time, numerous nodes will construct a
block and send it to the network, resulting in the
creation of a fork in the blockchain network. There
are two pathways that are segregated within this
blockchain. It is necessary to utilise this concept in
order to manage the fork in the majority of current
blockchains.
The amount of time that the overlay block manager
can spend creating blocks is limited. Because of this,
only one block can be created in a consens us-based
interval in order to avoid the possibility of hostile
overlay block managers generating many blocks with
fraudulent transactions, referred to as an
accompanying attack with a restricted time. Remote
management has the ability to adjust the length of the
contract. The total value for consensus time is 10
minutes, which corresponds to the period between
Bitcoin mining operations. According to each overlay
block management, the frequency of blocks produced
by the other overlay block managers is being tracked.
4. Results and Discuss ions
The findings of the data protection analysis in the
suggested model are presented in this section. The
study is assessed in the context of five different
attacks: Different metrics like delay, over-control,
data reliability, block reliability, data integrity, and
residual energy are estimated for the study. The
findings are assessed with s everal privacy
attacks, including machine learning and deep
learning, against all of the parameters between the
suggested approaches. Total supply completed by the
method data is illustrated in Figure 2 where the
proposed data is accurate. This was because each
block is assessed at all times by the suggested
method.
Proceedings of the Sixth International Conference on Computing Methodologies and Communication (ICCMC 2022)
IEEE Xplore Part Number: CFP22K25-ART; ISBN: 978-1-6654-1028-1
978-1-6654-1028-1/22/$31.00 ©2022 IEEE 92
Authorized licensed use limited to: VIT University. Downloaded on April 25,2022 at 04:57:19 UTC from IEEE Xplore. Restrictions apply.
Figure 2. Total Supplies Completed
Figure 3 displays the overall comparison of the
overload prediction by the blockchain of s everal
control messages and by the block mobility. The
findings show that the suggested technique has low
overhead control, because the control messages
transmitted by blocks are tiny and when the mobility
is slow, the overhead lowers.
0
200000
400000
600000
800000
1000000
1200000
200000 400000 600000 800000 1000000
Total Supplies Completed
Total data packets during transactions
ML DL without BC BC Proposed
Proceedings of the Sixth International Conference on Computing Methodologies and Communication (ICCMC 2022)
IEEE Xplore Part Number: CFP22K25-ART; ISBN: 978-1-6654-1028-1
978-1-6654-1028-1/22/$31.00 ©2022 IEEE 93
Authorized licensed use limited to: VIT University. Downloaded on April 25,2022 at 04:57:19 UTC from IEEE Xplore. Restrictions apply.
Figure 3. Control overhead
Figure 4 shows the results of the mean final delay of
several assaults on the suggested model. Becaus e of
reduced overhead control, improved block reliability,
and confidence in the high results, the results are
achieved.
0
1000000
2000000
3000000
4000000
5000000
6000000
7000000
200000 400000 600000 800000 1000000
Prediction overload
Total data packets
ML
Proceedings of the Sixth International Conference on Computing Methodologies and Communication (ICCMC 2022)
IEEE Xplore Part Number: CFP22K25-ART; ISBN: 978-1-6654-1028-1
978-1-6654-1028-1/22/$31.00 ©2022 IEEE 94
Authorized licensed use limited to: VIT University. Downloaded on April 25,2022 at 04:57:19 UTC from IEEE Xplore. Restrictions apply.
Figure 4. End to End delay
The residual energy reveals that the proposed method
has been compared between various privacy attacks
in Figure 5. The outcome is that, even if there is a
data protection assault on the system, the method
provided obtains more residual energy.
0
1000000
2000000
3000000
4000000
5000000
6000000
7000000
8000000
200000 400000 600000 800000 1000000
End to end delay (ms) 103
Total Packets
ML DL without BC BC Proposed
Proceedings of the Sixth International Conference on Computing Methodologies and Communication (ICCMC 2022)
IEEE Xplore Part Number: CFP22K25-ART; ISBN: 978-1-6654-1028-1
978-1-6654-1028-1/22/$31.00 ©2022 IEEE 95
Authorized licensed use limited to: VIT University. Downloaded on April 25,2022 at 04:57:19 UTC from IEEE Xplore. Restrictions apply.
Figure 5. Residual energy
Figure 6. Block reliability
0
200000
400000
600000
800000
1000000
1200000
100000 200000 300000 400000 500000
Residual Energy (J)
Packets Transmitted
ML DL without BC
0
100000
200000
300000
400000
500000
600000
700000
800000
900000
1000000
200000 400000 600000 800000 1000000
Block Reliability (blocks/sec)
Number of packets
ML DL without BC BC Proposed
Proceedings of the Sixth International Conference on Computing Methodologies and Communication (ICCMC 2022)
IEEE Xplore Part Number: CFP22K25-ART; ISBN: 978-1-6654-1028-1
978-1-6654-1028-1/22/$31.00 ©2022 IEEE 96
Authorized licensed use limited to: VIT University. Downloaded on April 25,2022 at 04:57:19 UTC from IEEE Xplore. Restrictions apply.
In Figure 6, the dependability of blocks w.r.t to block
number is shown, and the findings reveal that all
attacks are more reliable than the proposed method.
When the data is moved between blocks, Figure 7
displays the integrity of the data. The results reveal
that the approach propos ed achieves excellent data
integrity by encrypting and decrypting all privacy
assaults using the manner proposed.
Figure 7. Data Integrity
5. Conclusions
The integration of blockchain technology and IoT can
open up new potential to improve the integrity of the
supply chain and increase operational performance.
At the same time, new challenges may arise from
technologies. For instance, a blockchain offers the
advantage of immutability, a key attribute.
Immutability can, however, be considered a n egative
trait for several reasons, which are the drivers of the
current interest in constructing blockchains.
Therefore, further academic research is needed to
study, explain and strictly predict various application
scenarios. This includes applying academic theories
to obtain more insight into why certain events are
present.
The increased complexity of IoT infrastructure leads
the blockchain to manage increasing volumes of data
requiring great scalability. Beyond geographical
borders, this research implies that research in several
segments has to be operationalized, developed and
adapted by other researchers to various research
contexts.
0
500000
1000000
1500000
2000000
2500000
3000000
3500000
4000000
4500000
5000000
100000 200000 300000 400000 500000
Packet Integrity (Packets/sec)
Number of Transmitted packets
ML DL without BC BC Proposed
Proceedings of the Sixth International Conference on Computing Methodologies and Communication (ICCMC 2022)
IEEE Xplore Part Number: CFP22K25-ART; ISBN: 978-1-6654-1028-1
978-1-6654-1028-1/22/$31.00 ©2022 IEEE 97
Authorized licensed use limited to: VIT University. Downloaded on April 25,2022 at 04:57:19 UTC from IEEE Xplore. Restrictions apply.
References
[1] Reyna, A., Martín, C., Chen, J., Soler, E., & Díaz, M.
(2018). On blockchain and its integration with IoT.
Challenges and opportunit ies. Future generation
com puter systems, 88, 173-190.
[2] Huh, S., Cho, S., & Kim, S. (2017, February).
Managing IoT devices using blockchain platform.
In 2017 19th international conference on advan ced
com mun ication techn ology (ICACT) (pp. 464-467).
IEEE.
[3] Kumar, A. S., Jule, L. T ., Ramaswamy, K.,
Sountharrajan, S., & Gandomi, A. H. (2021). Analysis
of false data detection rate in generative adversarial
networks using recurrent neural network. In Generative
Adversarial Networks for Image-to-Image T ranslation
(pp. 289-312). Academic Press.
[4] Dorri, A., Kanhere, S. S., & Jurdak, R. (2017, April).
Towards an optimized blockchain for IoT. In 2017
IEEE/ACM Secon d In ternational Conference on
Internet-of-Thing s Design an d Im plemen tation
(IoTDI) (pp. 173 -178). IEEE.
[5] Samaniego, M., Jamsrandorj, U., & Det ers, R. (2016,
December). Blockchain as a Service for IoT . In 2016
IEEE international conference o n in ternet of things
(iThings) and IEEE green com puting and
com munications (GreenCom) and IEEE cyber, physical
and social computing (CPSCom) and IEEE smart data
(Sm artData) (pp. 433-436). IEEE.
[6] Natarajan, Y., Srihari, K., Dhiman, G., Chandragandhi,
S., Gheisari, M., Liu, Y., ... & Alharbi, H. F. (2021). An
IoT and machine learningbased routing protocol for
reconfigurable engineering application. IET
Communications.
[7] Khan, M. A., & Salah, K. (2018). IoT security: Review,
blockchain solutions, and open challenges. Future
generation com puter systems, 82, 395-411.
[8] Novo, O. (2018). Blockchain meet s IoT: An
archit ect ure for scalable access management in
IoT . IEEE Internet of Things Journal, 5(2), 1184-1195.
[9] Karthikeyan, T., Praghash, K., & Reddy, K. H. (2021).
Binary Flower Pollination (BFP) Approach to Handle
the Dynamic Net working Conditions t o Deliver
Unint errupted Connectivity. Wireless Personal
Communications, 1-20.
[10] Minoli, D., & Occhiogrosso, B. (2018). Blockchain
mechanisms for IoT security. Internet o f Things, 1, 1-
13.
[11] Natarajan, Y., Kannan, S., Selvaraj, C., & Mohanty, S.
N. (2021). Forecasting Energy Generation In Large
Photovoltaic Plants Using Radial Belief Neural
Network. Sustainable Computing: Informat ics and
Systems, 100578.
[12] Panarello, A., Tapas, N., Merlino, G., Longo, F., &
Puliafit o, A. (2018). Blockchain and iot integrat ion: A
systematic survey. Sensors, 18(8), 2575.
[13] Dorri, A., Kanhere, S. S., Jurdak, R., & Gauravaram, P.
(2017, March). Blockchain for IoT security and
privacy: The case study of a smart home. In 2017 IEEE
international conference on pervasive com puting a nd
com munications workshops (PerCom workshops) (pp.
618-623). IEEE.
[14] Wang, Q., Zhu, X., Ni, Y., Gu, L., & Zhu, H. (2020).
Blockchain for the IoT and industrial IoT : A
review. In ternet of Thing s, 10, 100081.
[15] Kshetri, N. (2017). Can blockchain strengthen the
internet of t hings?. IT professional, 19(4), 68-72.
[16] Kousik, N. V., Sivaram, M., Yuvaraj, N., &
Mahaveerakannan, R. (2021). Improved Density-Based
Learning to Cluster for User Web Log in Data Mining.
In Invent ive Computation and Informat ion
Technologies (pp. 813-830). Springer, Singapore.
[17] Sara, S. B. V., Anand, M., Priscila, S. S., Yuvaraj, N.,
Manikandan, R., & Ramkumar, M. (2021). Design of
autonomous production using deep neural network for
complex job. Materials T oday: Proceedings.
[18] Dedeoglu, V., Jurdak, R., Dorri, A., Lunardi, R. C.,
Michelin, R. A., Zorzo, A. F., & Kanhere, S. S. (2020).
Blockchain technologies for iot . In Advanced
Applications of Blockch ain Technology (pp. 55-89).
Springer, Singapore.
[19] Kumar, N. M., & Mallick, P. K. (2018). Blockchain
technology for security issues and challenges in
IoT . Procedia Com puter Science, 132, 1815-1823.
[20] Dwivedi, A. D., Srivastava, G., Dhar, S., & Singh, R.
(2019). A decentralized privacy-preserving healthcare
blockchain for IoT. S ensors, 19(2), 326.
[21] Alam, T. (2019). Blockchain and its Role in the Internet
of Things (IoT). Tan weer Alam ." Blockchain and its
Role in th e Internet of Thin gs (IoT).", In ternational
Journal of Scientific Research in Com puter Science,
Engineering and In formation Technolog y, 5(1).
Proceedings of the Sixth International Conference on Computing Methodologies and Communication (ICCMC 2022)
IEEE Xplore Part Number: CFP22K25-ART; ISBN: 978-1-6654-1028-1
978-1-6654-1028-1/22/$31.00 ©2022 IEEE 98
Authorized licensed use limited to: VIT University. Downloaded on April 25,2022 at 04:57:19 UTC from IEEE Xplore. Restrictions apply.
[22] Wu, M., Wang, K., Cai, X., Guo, S., Guo, M., & Rong,
C. (2019). A comprehensive survey of blockchain:
From theory to IoT applications and beyond. IEEE
Internet of Things Journal, 6(5), 8114-8154.
[23] Kannan, S., & Dhiman, G. (2021). T ask scheduling in
cloud using aco. Recent Advances in Computer Science
and Communications, 13, 1-6.
[24] Raja, R. A., Kart hikeyan, T., & Kousik, N. V. (2020).
Improved Privacy Preservation Framework for Cloud-
Based Internet of Things. In Int ernet of Things (pp.
165-174). CRC Press.
[25] Raja, R. A., & Kousik, N. V. (2021). Analyses on
Artificial Int elligence Framework to Detect Crime
Pat tern. Intelligent Data Analyt ics for T error T hreat
Prediction: Architectures, Methodologies, Techniques
and Applications, 119-132.
[26] Karthick, S., Rajakumari, P. A., & Raja, R. A. (2021).
Ensemble Similarity Clustering Frame work for
Categorical Dataset Clustering Using Swarm
Int elligence. In Intelligent Computing and Applications
(pp. 549-557). Springer, Singapore.
Proceedings of the Sixth International Conference on Computing Methodologies and Communication (ICCMC 2022)
IEEE Xplore Part Number: CFP22K25-ART; ISBN: 978-1-6654-1028-1
978-1-6654-1028-1/22/$31.00 ©2022 IEEE 99
Authorized licensed use limited to: VIT University. Downloaded on April 25,2022 at 04:57:19 UTC from IEEE Xplore. Restrictions apply.
... As per literature [19], a host VMM is implemented like a process that functions on host OS in usual manner [19]. Different sorts of guest OS demand the virtualization on varying VMs so that every VM can function with individual OS under VMM supervision [24]. There is no demand for a native VMM to have host virtualization and it directly runs on VMs. ...
... Likewise, a native VMM [23,24] can be considered as a unique OS [9] since it enables multi-programming across varying sorts of hybrid cloud VMs. ...
Preprint
Full-text available
Hybrid cloud service is a novel phenomenon that is strategized to estimate the failures in network and configure the Virtual Machines (VMs) in a cost-effective and timely manner. Amazon hybrid cloud offers Infrastructure as a Service (IaaS) in which the infrastructure such as servers, storage network, VMs etc can be dynamically accessed by global users either through manual methods or through automated web-based monitoring and management applications or else through console. Hybrid cloud computing model has been developed with an aim to handle big data since the existing algorithms find it challenging to compute the tasks. The novel hybrid cloud computing model is a result of need for an efficient computational asset that can handle huge scale sequencing experiments. In general, failure is an unavoidable phenomenon in large-scale computing systems. However, when hybrid cloud computing servers continuously fail in executing the tasks, it becomes complicated to handle fault tolerance, availability and reliability. This scenario demands the development of a novel approach that can compensate data loss and ensure automated recovery of the lost data. Further, it should also ensure the non-occurrence of such instances in future. The approach proposed, must enhance the availability of the system and performance of the overall network using VMs. This fault tolerance mechanism was tested under different scenarios involving data, application, selection and matching with faults, as per the requirements of the user. The failure detection model should have the capability to reconfigure the VMs in case of a failure. In this study that dealt with hybrid cloud infrastructure, host hypervisor was used to compare and contrast the failed clusters. The proposed prediction-recovery algorithm was able to identify superior components to achieve file delivery. Further, the AWS failure detection method used an estimation algorithm to achieve dynamic allocation of VMs. The occurrence of failure was hypothesized on the basis of failure dynamics. Further, failure prediction outcomes of the proposed model were also investigated.
... under the VMI contract [56]. A number of other major businesses, like Walmart and Procter & Gamble, also employ the VMI-CS mechanism to efficiently manage their inventory. ...
... Any deviation in the values of the critical factors from the standard values calls for specific adjustments of the assets so that the transformation of smaller issues into catastrophic event can be avoided [28]. The data collected through sensors is further screened and analysed using data analytics tools to predict the future performance of the assets [29]. The implementation of such kind of approach could help in minimizing asset breakdown, wastes, and inefficiencies, identifying bottlenecks, and ensuring the highest level of operational performance that wouldn't have been possible to achieve through the traditional maintenance approach [30]. ...
Article
Full-text available
The establishment of enduring connections that adapt to the dynamic environmental conditions are considered as a major trend in today’s research. This paper aims at re-establishing internet connectivity to users under dynamic environmental conditions (natural disasters) by utilizing an energy management approach. The proposed model follows a series of steps that initially harvest energy for the nodes in disaster areas. Once the nodes are energized by harvesting power from a healthy node or drone, an efficient clustering using Binary Flower Pollination algorithm is carried out. The clustering is carried out based on the energy level of each node within the coverage area of a healthy node. Subsequently, a heap sort algorithm is employed to find the shortest path. Finally, the connection is established between the users using a two-zone model that consists of normal, super, and advanced nodes. This proposed method is evaluated against benchmark methods in terms of energy efficiency.
Article
Full-text available
With new telecommunications engineering applications, the cognitive radio (CR) network-based internet of things (IoT) resolves the bandwidth problem and spectrum problem. However, the CR-IoT routing method sometimes presents issues in terms of road finding, spectrum resource diversity and mobility. This study presents an upgradable cross-layer routing protocol based on CR-IoT to improve routing efficiency and optimize data transmission in a reconfigurable network. In this context, the system is developing a distributed controller which is designed with multiple activities, including load balancing, neighbourhood sensing and machine-learning path construction. The proposed approach is based on network traffic and load and various other network metrics including energy efficiency, network capacity and interference, on an average of 2 bps/Hz/W. The trials are carried out with conventional models, demonstrating the residual energy and resource scalability and robustness of the reconfigurable CR-IoT.
Chapter
In this chapter, we aim to scale-up the operation of GAN using recurrent neural network (RNN). The GAN is designed with two deep neural network models, where the first network is called a generator that generates perceptually synthetic samples drawn through real data distribution. The first network recursively learns the network and transforms the noise vectors into samples. The second network is called a discriminator that accesses both real and synthetic samples and provides classification between these two data. The discriminator uses the same RNN to classify the generated and real data samples. The aim of using RNN in the GAN structure is to delimit the error rate using its time series prediction based on its past inputs. It further uses its neighborhood relationship between the samples to generate the target output and error generated. The errors are then propagated in the backward direction over the GAN to update the network weights to estimate the output. The RNN generator, on the other hand, reduces the probability of the RNN discriminator in identifying the false generated samples and increasing the probability of discriminator in identifying correctly the real samples. The objective function in RNN is designed in such a way that its gradient operator for the false samples is quite far from the decision boundary of RNN discriminator, thereby producing the increasing true classification rate. The experiments carried out on the real-world time series dataset show the results of accurate classification (97.01%) with increased false detection rate than benchmark GAN method.
Article
Forecasting the energy generation from the solar power is considered challenging due to inaccuracies in forecasting, reliability issues and substantial economic losses in power systems. Hence, it is necessary to consider wide features from the solar power generation point of view. In this paper, the study uses large features set to feed the deep learning classifier for optimal prediction of energy generation from the photovoltaic (PV) plants. The features selection and prediction modules automates the process of optimal prediction of energy using Radial Belief Neural Network (RBNN). The Restricted Boltzmann Machines (RBM) is used for rule set generation based on the feature extracted and the rule set generation is powered by action-reward based Reinforcement Learning (RL) method. The experiments are conducted with rich set of input features on large PV plants that ranges between 1, 50, 100 and 1000. The performance of the proposed model is compared with various metrics that includes: Root mean squared error (RMSE), normalized root mean squared error (NRMSE), mean bias error (MBE), Mean absolute error (MAE), Maximum absolute error (MaxAE), mean absolute percentage error (MAPE), Kolmogorov–Smirnov test integral (KSI) and OVER metrics, Skewness and kurtosis and variability estimation metrics. The simulation results show that the RBNN offers improved prediction ability with reduced errors than other deep and machine learning classifiers.
Article
Deep Neural Network (DNN) in recent era offers new opportunities to manage the production systems with increasing complexity. In this paper, DNN is trained with discrete event simulation and a process based association to make the job shop an autonomous one. This intelligent system operates well in complex environment with constrained time limits while making optimal decisions. The DNN is henceforth combined with constrained time limits for the process of production control. The system is implemented typically in semiconductor manufacturing industries on complex job shops of a wafer fab case. The DNN is trained in such a way that it operates in complex environment with timing constraints that ships the job in accurate way without flaws in operation. The DNN rewards the selection with reduced time constraint, which tends to operates with most critical batch list. The study therefore shows that the DNN manages well the timing constraints than the standard benchmark technique.
Chapter
The improvements in tuning the website and improving the visitors’ retention are done by deploying the efficient weblog mining and navigational pattern prediction model. This crucial application initially performs data clearing and initialization procedures until the hidden knowledge is extracted as output. To obtain good results, the quality of the input data has to be promisingly good, and hence, more focus should be given to pre-processing and data cleaning operations. Other than this, the major challenge faced is the poor scalability during navigational pattern prediction. In this paper, the scalability of weblog mining is improved by using suitable pre-processing and data cleaning operations. This method uses a tree-based clustering algorithm to mine the relevant items from the datasets and to predict the navigational behavior of the users. The algorithm focus will be mainly on density-based learning to cluster and predict future requests. The proposed method is evaluated over BUS log data, where the data is of greater significance since it contains the log data of all the students in the university. The conducted experiments prove the effectiveness and applicability of weblog mining by using the proposed algorithm.
Chapter
In this paper, an Artificial Intelligence (AI)‐based crime scene detection method is designed to improve the identification of crime scene in real‐time basis. The design focuses entirely on improving the processing speed by suitably analyzing the data at each stage. The study uses a series of operation that includes pre‐processing, feature extraction, classification, crime pattern identification and clustering. The pre‐processing eliminates the unstructured data, feature extraction using an object oriented model, classification using multi‐class multi‐level machine learning (MCML) classifier, crime pattern identification using Genetic Apriori Algorithm (GAA) and finally clustering using consensus clustering. The experimental validation is carried out on unstructured data collected from past criminal records. The performance of the proposed clustering model for crime pattern investigation is compared with time series analysis, support vector machine, artificial neural network. The analysis is carried out against various performance metrics that includes: accuracy, specificity, sensitivity and f‐measure. The performance evaluation shows that the proposed method obtains improved accuracy in finding the crime patterns than the existing methods with higher accuracy of 98.73%.
Chapter
Many attempts are made to resolve the clustering problem over categorical dataset through the process of clustering ensemble. However, the conventional techniques failed to generate proper data portioning to cluster the data due to the presence of incomplete information. Hence, this paper uses a modified cluster ensemble similarity framework to cluster the relevant categorical datasets, and a weight-based similarity approach has been proposed to work with type II full-space and subspace ensembles that involve random-k and fixed-k techniques. The centroid selection is initiated using swarm-based bio-inspired optimization method or swarm-based similarity ensemble clustering (WSE). Finally, Division Reminder Hashing (DRH) technique is used to determine the weights of the cluster using similarity measurement. This technique helped in eliminating the null and duplicate datasets. The measurement for testing includes Adjusted Rand (AR), Normalized Mutual Information (NMI), and Classification Accuracy (CA). The performance of the proposed technique is tested over University of California Irvine (UCI) dataset, and the results proved that the proposed technique provides better clustering using Type-2 and Type-3 ensemble.
Article
Background Cloud computing is a multi-tenant model for computation that offers various features for computing and storage based on user demand. With increasing cloud users, the usage increases that highlights the problem of load balancing with limited resource availability based on dynamic cloud environment. In such cases, task scheduling creates fundamental issue in cloud environment. Introduction Certain problems such as, inefficiencies in load balancing latency, throughput ratio, proper utilization of the cloud resources, better energy consumption and response time have been observed. These drawbacks can be efficiently resolved through the incorporation of efficient load balancing and task scheduling strategies. Method In this paper, we develop an efficient co-operative method to solve the most recent approaches against load balancing and task scheduling have been proposed using Ant Colony Optimization (ACO). These approaches enables in the clear cut identification of the problems associated with the load balancing and task scheduling strategies in the cloud environment. Results The simulation is conducted to find the efficacy of the improved ACO system for load balancing in cloud than the other methods. The result shows that the proposed method obtains reduced execution time, reduced cost and delay. Conclusion A unique strategic approach is developed in this paper, Load Balancing, which works with the ACO in relation to the cloud workload balancing task through the incorporation of the ACO technique. The strategy for determining the applicant nodes is based on which the load balancing approach would essentially depend. By incorporating two different approaches: the maximum minute rules and the forward-backward ant, this reliability task can be established. This method is intended to articulate the initialization of the pheromone and thus upgrade the relevant cloud-based physical properties.