Search results

1 – 10 of 45
Article
Publication date: 2 January 2023

Deepak Choudhary

As the number of devices that connect to the Internet of Things (IoT) has grown, privacy and security issues have come up. Because IoT devices collect so much sensitive…

Abstract

Purpose

As the number of devices that connect to the Internet of Things (IoT) has grown, privacy and security issues have come up. Because IoT devices collect so much sensitive information, like user names, locations, phone numbers and even how they usually use energy, it is very important to protect users' privacy and security. IoT technology will be hard to use on the client side because IoT-enabled devices do not have clear privacy and security controls.

Design/methodology/approach

IoT technology would be harder to use on the client side if the IoT did not offer enough well-defined ways to protect users’ privacy and security. The goal of this research is to protect people's privacy in the IoT by using the oppositional artificial flora optimization (EGPKC-OAFA) algorithm to generate the best keys for the ElGamal public key cryptosystem (EGPKC). The EGPKC-OAFA approach puts the most weight on the IEEE 802.15.4 standard for MAC, which is the most important part of the standard. The security field is part of the MAC header of this standard. In addition, the MAC header includes EGPKC, which makes it possible to make authentication keys as quickly as possible.

Findings

With the proliferation of IoT devices, privacy and security have become major concerns in the academic world. Security and privacy are of the utmost importance due to the large amount of personally identifiable information acquired by IoT devices, such as name, location, phone numbers and energy use. Client-side deployment of IoT technologies will be hampered by the absence of well-defined privacy and security solutions afforded by the IoT. The purpose of this research is to present the EGPKC with optimum key generation using the EGPKC-OAFA algorithm for the purpose of protecting individual privacy within the context of the IoT. The EGPKC-OAFA approach is concerned with the MAC standard defined by the IEEE 802.15.4 standard, which includes the security field in its MAC header. Also, the MAC header incorporates EGPKC, which enables the fastest possible authentication key generation. In addition, the best methodology award goes to the OAFA strategy, which successfully implements the optimum EGPKC selection strategy by combining opposition-based (OBL) and standard AFA ideas. The EGPKC-OAFA method has been proved to effectively analyze performance in a number of simulations, with the results of various functions being identified.

Originality/value

In light of the growing prevalence of the IoT, an increasing number of people are becoming anxious about the protection and confidentiality of the personal data that they save online. This is especially true in light of the fact that more and more things are becoming connected to the internet. The IoT is capable of gathering personally identifiable information such as names, addresses and phone numbers, as well as the quantity of energy that is used. It will be challenging for customers to adopt IoT technology because of worries about the security and privacy of the data generated by users. In this work, the EGPKC is paired with adversarial artificial flora, which leads in an increase to the privacy security provided by EGPKC for the IoT (EGPKC-OAFA). The MAC security field that is part of the IEEE 802.15.4 standard is one of the areas that the EGPKC-OAFA protocol places a high focus on. The Authentication Key Generation Protocol Key Agreement, also known as EGPKCA, is used in MAC headers. The abbreviation for this protocol is EGPKCA. The OAFA technique, also known as the combination of OBL and AFA, is the most successful method for selecting EGPKCs. This method is recognized by its acronym, OAFA. It has been shown via a variety of simulations that the EGPKC-OAFA technique is a very useful instrument for carrying out performance analysis.

Details

International Journal of Pervasive Computing and Communications, vol. 19 no. 5
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 6 September 2023

Shreyanshu Parhi, Shashank Kumar, Kanchan Joshi, Milind Akarte, Rakesh D. Raut and Balkrishna Eknath Narkhede

The advent of Internet of Things, cloud computing and advanced computing has endowed smart manufacturing environments with resilience, reconfigurability and intelligence…

Abstract

Purpose

The advent of Internet of Things, cloud computing and advanced computing has endowed smart manufacturing environments with resilience, reconfigurability and intelligence, resulting in the emergence of novel capabilities. These capabilities have significantly reshaped the manufacturing ecosystem, enabling it to effectively navigate uncertainties. The purpose of this study is to assess the operational transformations resulting from the implementation of smart manufacturing, which distinguish it from conventional systems.

Design/methodology/approach

A list of qualitative and quantitative smart manufacturing performance metrics (SMPMs) are initially suggested and categorized into strategic, tactical and operational levels. The SMPMs resemble the capabilities of smart manufacturing systems to manage disruptions due to uncertainties. Then, industry and academia experts validate the SMPMs through the utilization of the Delphi method, enabling the ranking of the SMPMs.

Findings

The proposition of the SMPMs serves as a metric to assess the digital transformation capabilities of smart manufacturing systems. In addition, the ranking of the proposed SMPMs shows a degree of relevance of the measures in smart manufacturing deployment and managing the disruptions caused due to the COVID-19 pandemic

Research limitations/implications

The findings benefit managers, consultants, policymakers and researchers in making appropriate decisions for deploying and operationalizing smart manufacturing systems by focusing on critical SMPMs.

Originality/value

The research provides a metric to assess the operational transformations during the deployment of smart manufacturing systems. Also, it states the role of the metric in managing the potential disruptions that can alter the performance of the business due to the COVID-19 pandemic.

Details

Journal of Global Operations and Strategic Sourcing, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2398-5364

Keywords

Open Access
Article
Publication date: 18 April 2023

Patience Mpofu, Solomon Hopewell Kembo, Marlvern Chimbwanda, Saulo Jacques, Nevil Chitiyo and Kudakwashe Zvarevashe

In response to food supply constraints resulting from coronavirus disease 2019 (COVID-19) restrictions, in the year 2020, the project developed automated household Aquaponics…

Abstract

Purpose

In response to food supply constraints resulting from coronavirus disease 2019 (COVID-19) restrictions, in the year 2020, the project developed automated household Aquaponics units to guarantee food self-sufficiency. However, the automated aquaponics solution did not fully comply with data privacy and portability best practices to protect the data of household owners. The purpose of this study is to develop a data privacy and portability layer on top of the previously developed automated Aquaponics units.

Design/methodology/approach

Design Science Research (DSR) is the research method implemented in this study.

Findings

General Data Protection and Privacy Regulations (GDPR)-inspired principles empowering data subjects including data minimisation, purpose limitation, storage limitation as well as integrity and confidentiality can be implemented in a federated learning (FL) architecture using Pinecone Matrix home servers and edge devices.

Research limitations/implications

The literature reviewed for this study demonstrates that the GDPR right to data portability can have a positive impact on data protection by giving individuals more control over their own data. This is achieved by allowing data subjects to obtain their personal information from a data controller in a format that makes it simple to reuse it in another context and to transmit this information freely to any other data controller of their choice. Data portability is not strictly governed or enforced by data protection laws in the developing world, such as Zimbabwe's Data Protection Act of 2021.

Practical implications

Privacy requirements can be implemented in end-point technology such as smartphones, microcontrollers and single board computer clusters enabling data subjects to be incentivised whilst unlocking the value of their own data in the process fostering competition among data controllers and processors.

Originality/value

The use of end-to-end encryption with Matrix Pinecone on edge endpoints and fog servers, as well as the practical implementation of data portability, are currently not adequately covered in the literature. The study acts as a springboard for a future conversation on the topic.

Details

International Journal of Industrial Engineering and Operations Management, vol. 5 no. 2
Type: Research Article
ISSN: 2690-6090

Keywords

Book part
Publication date: 25 October 2023

Zhenyu Shan, Anwar ul Haq, Usman Javed Butt, Farooq Habib, Arshad Jamal and Murtaza Farooq Khan

This study aims to identify blockchain-related innovation trends that can improve trust networks in a smart city's transport and supply chain networks. Trust networks are crucial…

Abstract

This study aims to identify blockchain-related innovation trends that can improve trust networks in a smart city's transport and supply chain networks. Trust networks are crucial in building and maintaining the trust of citizens in smart cities. By promoting transparency and accountability, facilitating collaboration and innovation, enhancing citizen participation and protecting privacy and security, trust networks can help to ensure that smart cities are developed and implemented in a responsible and sustainable way. A systematic literature review identifies 60 conceptual and empirical studies. This research focuses on the current problems and developing procurement and supply chain strategy and the potential benefits of using blockchain in these areas. It suggests ways for the smart city's transport and supply chain networks to utilise blockchain to improve operations and supply chain strategy and identifies innovation trends related to blockchain. The study also includes a systematic literature review and Blockchain Transformation and Influence model as the basis to enhance trust networks in the supply chain.

Details

Technology and Talent Strategies for Sustainable Smart Cities
Type: Book
ISBN: 978-1-83753-023-6

Keywords

Book part
Publication date: 19 July 2023

Samrat Ray, Elena Viktorovna Korchagina, Rohini U. Nikam and Roop Kishore Singhal

This chapter proposes a new architecture to address challenges to security and the privacy in e-healthcare under Industry 5.0. With the growing needs for high-quality medical…

Abstract

This chapter proposes a new architecture to address challenges to security and the privacy in e-healthcare under Industry 5.0. With the growing needs for high-quality medical treatment and the continuously growing costs of treating global medical problems, systems and web-based medical care are regarded as innovative solutions. In particular, the new progress in Internet of Things (IoT) has led to the development of Internet of Medical Things (IoMT). The patient history data is handled and processed remotely in real-time rather than visiting any clinic and then having that data transferred for subsequent use to third parties, such as data that gets saved in the cloud. This patient data faced security threats and it is observed as major limitations of using such systems in Industry 5.0. This chapter analyzes the security and secrecy challenges, together with the necessities, the danger involved and proposed secured blockchain-based framework which is capable of future research scope in Industry 5.0. The study has described an Eye Hospital case study that stores the eye donors’ details. With such critical scenario, this study addresses healthcare scenario with poverty-led agenda and social developmental features.

Details

Inclusive Developments Through Socio-economic Indicators: New Theoretical and Empirical Insights
Type: Book
ISBN: 978-1-80455-554-5

Keywords

Open Access
Article
Publication date: 31 July 2020

Ado Adamou Abba Ari, Olga Kengni Ngangmo, Chafiq Titouna, Ousmane Thiare, Kolyang, Alidou Mohamadou and Abdelhak Mourad Gueroui

The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the…

5866

Abstract

The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the ubiquitous computing world. This integration has become imperative because the important amount of data generated by IoT devices needs the CC as a storage and processing infrastructure. Unfortunately, security issues in CoT remain more critical since users and IoT devices continue to share computing as well as networking resources remotely. Moreover, preserving data privacy in such an environment is also a critical concern. Therefore, the CoT is continuously growing up security and privacy issues. This paper focused on security and privacy considerations by analyzing some potential challenges and risks that need to be resolved. To achieve that, the CoT architecture and existing applications have been investigated. Furthermore, a number of security as well as privacy concerns and issues as well as open challenges, are discussed in this work.

Details

Applied Computing and Informatics, vol. 20 no. 1/2
Type: Research Article
ISSN: 2634-1964

Keywords

Content available
Book part
Publication date: 25 October 2023

Sumesh Singh Dadwal

As the size of the population is growing and the capacity of the planet Earth is limited, human beings are searching for sustainable and technology-enabled solutions to support…

Abstract

As the size of the population is growing and the capacity of the planet Earth is limited, human beings are searching for sustainable and technology-enabled solutions to support society, ecology and economy. One of the solutions has been developing smart sustainable cities. Smart sustainable cities are cities as systems, where their infrastructure, different subsystems and different functional domains are virtually connected to the information and communication technologies (ICT) and internet via sensors and devices and the Internet of Things (IoT), to collect and process real-time Big Data and make efficient, effective and sustainable solutions for a democratic and liveable city for its various stakeholders. This chapter explores the concepts and practices of sustainable smart cities across the globe and explores the use of technologies such as IoT, Blockchain technology and Cloud computing, etc. their challenges and then presents a view on business models for sustainable smart cities.

Article
Publication date: 18 August 2022

Raja Wasim Ahmad, Walaa Al Khader, Raja Jayaraman, Khaled Salah, Jiju Antony and Vikas Swarnakar

The purpose of this research is to study and analyze the literature that integrates Lean Six Sigma (LSS) approach with blockchain technology in different sectors for improved…

Abstract

Purpose

The purpose of this research is to study and analyze the literature that integrates Lean Six Sigma (LSS) approach with blockchain technology in different sectors for improved quality management.

Design/methodology/approach

This study presents a scoping review on the application of integrated LSS and blockchain technology in the manufacturing and healthcare sector. Further, the authors examined existing blockchain-based solutions on a variety of dimensions, including application area, technical approach, methodology, application scenario, various blockchain platforms, purpose, and monitoring parameters. The authors study LSS approaches in detail, as well as the key benefits that blockchain technology can enable. Finally, the authors discuss significant research problems to be addressed in order to develop a highly efficient, resilient, and secure quality management framework using blockchain technology.

Findings

It has been observed that the adoption of blockchain technology for quality management and assurance is influenced by several factors such as transaction execution speed, throughput, latency. Also, prior blockchain-based solutions have neglected to leverage the benefits of LSS methodologies for effective quality management.

Originality/value

This is the first study to explores the influence of blockchain technology on quality management and assurance in manufacturing and healthcare industry. Furthermore, prior research has not examined how integrating the LSS methodology with blockchain technology can aid in the control of product quality management.

Details

The TQM Journal, vol. 35 no. 7
Type: Research Article
ISSN: 1754-2731

Keywords

Open Access
Book part
Publication date: 16 August 2023

Meropi Tzanetakis and Nigel South

This chapter explores the disruptive potential of the Internet to transform illicit drug markets while also challenging stereotypical depictions and superficial understandings of…

Abstract

This chapter explores the disruptive potential of the Internet to transform illicit drug markets while also challenging stereotypical depictions and superficial understandings of supply and demand. It argues that the digital transformation of illicit drug markets combines, on one hand, a reconfiguration of the scope and impact of how sellers, buyers, and other actors interact within and upon digitally mediated retail drug markets and, on the other hand, continuing trends in the embeddedness of market structures in cultural, economic, political, and legal realms. We develop conceptual ideas for studying the architecture of digital drug markets by drawing on interdisciplinary approaches to digitalisation, markets, and drugs. To understand the functioning of online drug markets, we first need to understand digitalisation. Thus, we draw on scholarship on the digital transformation of society and, second, put forward an understanding of markets that considers how personal relations and social structures enhance and restrict market exchange. Thus, we draw on economic sociology. Third, we build on and extend social science research on illicit drug markets which points out that drug markets exhibit significant variations over time and across jurisdictions. The introduction aims to provide a research agenda that can help us to explore ongoing digital transformations of illicit drug markets. It expands and deepens scholarship on the technological, structural, economic, and cultural factors underlying the resilience and growth of digital drug markets. It also goes beyond a concern with just one type of digital drug market into wider forms of digital environments.

Details

Digital Transformations of Illicit Drug Markets: Reconfiguration and Continuity
Type: Book
ISBN: 978-1-80043-866-8

Keywords

Article
Publication date: 12 March 2024

Elena Isabel Vazquez Melendez, Paul Bergey and Brett Smith

This study aims to examine the blockchain landscape in supply chain management by drawing insights from academic and industry literature. It identifies the key drivers…

155

Abstract

Purpose

This study aims to examine the blockchain landscape in supply chain management by drawing insights from academic and industry literature. It identifies the key drivers, categorizes the products involved and highlights the business values achieved by early adopters of blockchain technology within the supply chain domain. Additionally, it explores fingerprinting techniques to establish a robust connection between physical products and the blockchain ledger.

Design/methodology/approach

The authors combined the interpretive sensemaking systematic literature review to offer insights into how organizations interpreted their business challenges and adopted blockchain technology in their specific supply chain context; content analysis (using Leximancer automated text mining software) for concept mapping visualization, facilitating the identification of key themes, trends and relationships, and qualitative thematic analysis (NVivo) for data organization, coding and enhancing the depth and efficiency of analysis.

Findings

The findings highlight the transformative potential of blockchain technology and offer valuable insights into its implementation in optimizing supply chain operations. Furthermore, it emphasizes the importance of product provenance information to consumers, with blockchain technology offering certainty and increasing customer loyalty toward brands that prioritize transparency.

Research limitations/implications

This research has several limitations that should be acknowledged. First, there is a possibility that some relevant investigations may have been missed or omitted, which could impact the findings. In addition, the limited availability of literature on blockchain adoption in supply chains may restrict the scope of the conclusions. The evolving nature of blockchain adoption in supply chains also poses a limitation. As the technology is in its infancy, the authors expect that a rapidly emerging body of literature will provide more extensive evidence-based general conclusions in the future. Another limitation is the lack of information contrasting academic and industry research, which could have provided more balanced insights into the technology’s advancement. The authors attributed this limitation to the narrow collaborations between academia and industry in the field of blockchain for supply chain management.

Practical implications

Practitioners recognize the potential of blockchain in addressing industry-specific challenges, such as ensuring transparency and data provenance. Understanding the benefits achieved by early adopters can serve as a starting point for companies considering blockchain adoption. Blockchain technology can verify product origin, enable truthful certifications and comply with established standards, reinforcing trust among stakeholders and customers. Thus, implementing blockchain solutions can enhance brand reputation and consumer confidence by ensuring product authenticity and quality. Based on the results, companies can align their strategies and initiatives with their needs and expectations.

Social implications

In essence, the integration of blockchain technology within supply chain provenance initiatives not only influences economic aspects but also brings substantial social impacts by reinforcing consumer trust, encouraging sustainable and ethical practices, combating product counterfeiting, empowering stakeholders and contributing to a more responsible, transparent and progressive socioeconomic environment.

Originality/value

This study consolidates current knowledge on blockchain’s capacity and identifies the specific drivers and business values associated with early blockchain adoption in supply chain provenance. Furthermore, it underscores the critical role of product fingerprinting techniques in supporting blockchain for supply chain provenance, facilitating more robust and efficient supply chain operations.

Details

Supply Chain Management: An International Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-8546

Keywords

1 – 10 of 45