Pub Date : 2022-07-13DOI: 10.1109/cits55221.2022.9832987
Konstantina Spathi, A. Valkanis, G. Beletsioti, Konstantinos F. Kantelis, Petros Nicopolitidis, Georgios I. Papadimitriou
Over the past few years, Internet of Things (IoT) has become one of the foremost critical innovations of the 21st century. The broad set of applications for IoT gadgets includes consumer, commercial, industrial, and infrastructure spaces. It can also be used for environmental purposes, such as monitoring forest areas and preventing forest fires, which is critical for flora and animal conservation. For this purpose, the proper energy management is crucial, so that it is possible to continuously monitor the forest areas. In this paper, a method for extending the lifetime of devices that surveil such locations is presented. The created system employs technology based on the LoRaWAN protocol, which is a highly promising technology for wide access networks and sensor applications. A learning-automata-based energy efficient model is proposed to increase the device lifetime and therefore, the lifetime of the entire network. The suggested energy-efficient approach is tested using simulation results, which show that it increases device longevity.
{"title":"Learning-Automata-Based Energy Efficient Model for Device Lifetime Enhancement in LoRaWAN Networks","authors":"Konstantina Spathi, A. Valkanis, G. Beletsioti, Konstantinos F. Kantelis, Petros Nicopolitidis, Georgios I. Papadimitriou","doi":"10.1109/cits55221.2022.9832987","DOIUrl":"https://doi.org/10.1109/cits55221.2022.9832987","url":null,"abstract":"Over the past few years, Internet of Things (IoT) has become one of the foremost critical innovations of the 21st century. The broad set of applications for IoT gadgets includes consumer, commercial, industrial, and infrastructure spaces. It can also be used for environmental purposes, such as monitoring forest areas and preventing forest fires, which is critical for flora and animal conservation. For this purpose, the proper energy management is crucial, so that it is possible to continuously monitor the forest areas. In this paper, a method for extending the lifetime of devices that surveil such locations is presented. The created system employs technology based on the LoRaWAN protocol, which is a highly promising technology for wide access networks and sensor applications. A learning-automata-based energy efficient model is proposed to increase the device lifetime and therefore, the lifetime of the entire network. The suggested energy-efficient approach is tested using simulation results, which show that it increases device longevity.","PeriodicalId":136239,"journal":{"name":"2022 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":"364 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116695629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-13DOI: 10.1109/cits55221.2022.9832978
Pronaya Bhattacharya, M. Obaidat, Darshan Savaliya, Sakshi Sanghavi, S. Tanwar, B. Sadoun
Smart healthcare has transitioned towards health-care 5.0, which allows ambient tracking of patients, emotive telemedicine, telesurgery, wellness monitoring, virtual clinics, and personalized care. Thus, the metaverse is a potential tool to leverage digital connectivity via improved healthcare experience in virtual environments. However, despite its potential benefits, patient’s sensitive information is captured, and digital avatars are created that interact with healthcare stakeholders for connected virtual care. As metaverse components are decentralized, blockchain (BC) is a potential solution to induce transparency and immutability in stored transactions on metaverse. For clinical decision support in BC-assisted metaverse enabled, Healthcare 5.0, accurate and interpretable diagnosis is critical. Thus, explainable AI (xAI) forms another critical component that provides trust in the healthcare informatics front. A dual solution of trusted informatics is possible via the interplay of BC and xAI in metaverse-enabled Healthcare 5.0. The article investigates the interplay through a proposed telesurgical scheme between patients, virtual hospitals, and doctors. Next, we discuss the potential challenges and present an experimental use-case of the benefits of our proposed architecture over traditional telesurgery systems.
{"title":"Metaverse assisted Telesurgery in Healthcare 5.0: An interplay of Blockchain and Explainable AI","authors":"Pronaya Bhattacharya, M. Obaidat, Darshan Savaliya, Sakshi Sanghavi, S. Tanwar, B. Sadoun","doi":"10.1109/cits55221.2022.9832978","DOIUrl":"https://doi.org/10.1109/cits55221.2022.9832978","url":null,"abstract":"Smart healthcare has transitioned towards health-care 5.0, which allows ambient tracking of patients, emotive telemedicine, telesurgery, wellness monitoring, virtual clinics, and personalized care. Thus, the metaverse is a potential tool to leverage digital connectivity via improved healthcare experience in virtual environments. However, despite its potential benefits, patient’s sensitive information is captured, and digital avatars are created that interact with healthcare stakeholders for connected virtual care. As metaverse components are decentralized, blockchain (BC) is a potential solution to induce transparency and immutability in stored transactions on metaverse. For clinical decision support in BC-assisted metaverse enabled, Healthcare 5.0, accurate and interpretable diagnosis is critical. Thus, explainable AI (xAI) forms another critical component that provides trust in the healthcare informatics front. A dual solution of trusted informatics is possible via the interplay of BC and xAI in metaverse-enabled Healthcare 5.0. The article investigates the interplay through a proposed telesurgical scheme between patients, virtual hospitals, and doctors. Next, we discuss the potential challenges and present an experimental use-case of the benefits of our proposed architecture over traditional telesurgery systems.","PeriodicalId":136239,"journal":{"name":"2022 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132655831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-13DOI: 10.1109/cits55221.2022.9832984
{"title":"2022 CITS Obituary","authors":"","doi":"10.1109/cits55221.2022.9832984","DOIUrl":"https://doi.org/10.1109/cits55221.2022.9832984","url":null,"abstract":"","PeriodicalId":136239,"journal":{"name":"2022 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123711382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-13DOI: 10.1109/cits55221.2022.9832912
S. Dwivedi, Ruhul Amin, Satyanarayana Vollala
Greener and more energy-efficient transportation options have pushed electric vehicles to the forefront of the global transportation market. Since then, academia and the transportation industry have tried to develop sustainable protocols that ensure dependable, scalable, and secure communication. With this vision, various security researchers have suggested authentication techniques to protect the messages exchanged between entities of the charging system. In its continuation, Kim et al. have proposed a charging system for electric vehicles based on the blockchain. With a close analysis of this protocol, our team has found that their scheme suffers from message substitution attacks, session key disclosure attacks, man-in-the-middle attacks, etc. This article proposes a secure and robust blockchain-based electric vehicle charging system using the ECC cryptosystem and lightweight one-way hash functions. Furthermore, the security of the proposed protocol is being analyzed, and the results confirm that the suggested protocol can withstand significant attacks.
{"title":"Design of Blockchain-based Secure Electric Vehicle Charging System Using ECC","authors":"S. Dwivedi, Ruhul Amin, Satyanarayana Vollala","doi":"10.1109/cits55221.2022.9832912","DOIUrl":"https://doi.org/10.1109/cits55221.2022.9832912","url":null,"abstract":"Greener and more energy-efficient transportation options have pushed electric vehicles to the forefront of the global transportation market. Since then, academia and the transportation industry have tried to develop sustainable protocols that ensure dependable, scalable, and secure communication. With this vision, various security researchers have suggested authentication techniques to protect the messages exchanged between entities of the charging system. In its continuation, Kim et al. have proposed a charging system for electric vehicles based on the blockchain. With a close analysis of this protocol, our team has found that their scheme suffers from message substitution attacks, session key disclosure attacks, man-in-the-middle attacks, etc. This article proposes a secure and robust blockchain-based electric vehicle charging system using the ECC cryptosystem and lightweight one-way hash functions. Furthermore, the security of the proposed protocol is being analyzed, and the results confirm that the suggested protocol can withstand significant attacks.","PeriodicalId":136239,"journal":{"name":"2022 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":"46 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132566067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-13DOI: 10.1109/cits55221.2022.9832914
Yachao Yuan, Christian Gehrmann, Jakob Sternby, Luis Barriga
Data analytics is regarded as an important function of 5G networks. The Network Data Analytics Function (NWDAF) is standardized in 3GPP to enhance 5G network performance by analyzing data from network functions and user equipment. Abnormal behavior detection, which is part of the NWDAF framework, has the potential to be a powerful tool to improve 5G network security. Despite this, only limited research has been conducted in the area so far. This paper explains abnormal behavior detection in NWDAF specified in 3GPP. Furthermore, we extensively review the related work and summarize open problems and provide possible future research directions.
{"title":"Insight of Anomaly Detection with NWDAF in 5G","authors":"Yachao Yuan, Christian Gehrmann, Jakob Sternby, Luis Barriga","doi":"10.1109/cits55221.2022.9832914","DOIUrl":"https://doi.org/10.1109/cits55221.2022.9832914","url":null,"abstract":"Data analytics is regarded as an important function of 5G networks. The Network Data Analytics Function (NWDAF) is standardized in 3GPP to enhance 5G network performance by analyzing data from network functions and user equipment. Abnormal behavior detection, which is part of the NWDAF framework, has the potential to be a powerful tool to improve 5G network security. Despite this, only limited research has been conducted in the area so far. This paper explains abnormal behavior detection in NWDAF specified in 3GPP. Furthermore, we extensively review the related work and summarize open problems and provide possible future research directions.","PeriodicalId":136239,"journal":{"name":"2022 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127107098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-13DOI: 10.1109/cits55221.2022.9832990
Efstratios Karypiadis, Anastasios Nikolakopoulos, Achilleas Marinakis, Vrettos Moulos, T. Varvarigou
During the past years, the issue of effectively balancing incoming big data streams has been under serious research. It still allows for new solutions, even if load balancing is already being addressed by multiple frameworks. This paper proposes a smart agent, named “SCAL-E“ that achieves balancing of big data loads and lives within the Kubernetes Environment. SCAL-E takes advantage of MongoDB’s scaling, replicating & sharding capabilities and decides when to increase or decrease its repository’s sub-components, based on the incoming load. This way, SCAL-E assures of proper resource allocation and gives efficiency to the jobs of big data storing & forwarding.
{"title":"SCAL-E: An Auto Scaling Agent for Optimum Big Data Load Balancing in Kubernetes Environments","authors":"Efstratios Karypiadis, Anastasios Nikolakopoulos, Achilleas Marinakis, Vrettos Moulos, T. Varvarigou","doi":"10.1109/cits55221.2022.9832990","DOIUrl":"https://doi.org/10.1109/cits55221.2022.9832990","url":null,"abstract":"During the past years, the issue of effectively balancing incoming big data streams has been under serious research. It still allows for new solutions, even if load balancing is already being addressed by multiple frameworks. This paper proposes a smart agent, named “SCAL-E“ that achieves balancing of big data loads and lives within the Kubernetes Environment. SCAL-E takes advantage of MongoDB’s scaling, replicating & sharding capabilities and decides when to increase or decrease its repository’s sub-components, based on the incoming load. This way, SCAL-E assures of proper resource allocation and gives efficiency to the jobs of big data storing & forwarding.","PeriodicalId":136239,"journal":{"name":"2022 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126948922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-13DOI: 10.1109/cits55221.2022.9832991
Hongxia Zhu, Jun Yan
With the application of sound event detection in more and more fields, an accurate sound event location and detection system has attracted wide attention. In this paper, we propose a sound event location and detection algorithm based on convolutional recurrent neural network (CRNN). In the offline phase, complete ensemble empirical mode decomposition with adaptive noise (CEEMDAN) algorithm is used to remove the noise of unknown distribution of the collected data set. Then, we extract filter banks (FBANK) features and cross correlation (GCC) features of each channel and fuse them. Finally, the features are input to CRNN which combined with soft attention mechanism to train the model. The CRNN is a multi-task learning framework. For sound category and sound location, it is realized by classification task and regression task respectively. Experimental results show that the algorithm is effective and can provide accurate category estimation and location estimation.
{"title":"A Deep Learning Based Sound Event Location and Detection Algorithm Using Convolutional Recurrent Neural Network","authors":"Hongxia Zhu, Jun Yan","doi":"10.1109/cits55221.2022.9832991","DOIUrl":"https://doi.org/10.1109/cits55221.2022.9832991","url":null,"abstract":"With the application of sound event detection in more and more fields, an accurate sound event location and detection system has attracted wide attention. In this paper, we propose a sound event location and detection algorithm based on convolutional recurrent neural network (CRNN). In the offline phase, complete ensemble empirical mode decomposition with adaptive noise (CEEMDAN) algorithm is used to remove the noise of unknown distribution of the collected data set. Then, we extract filter banks (FBANK) features and cross correlation (GCC) features of each channel and fuse them. Finally, the features are input to CRNN which combined with soft attention mechanism to train the model. The CRNN is a multi-task learning framework. For sound category and sound location, it is realized by classification task and regression task respectively. Experimental results show that the algorithm is effective and can provide accurate category estimation and location estimation.","PeriodicalId":136239,"journal":{"name":"2022 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125131062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-13DOI: 10.1109/cits55221.2022.9832988
H. Saadeh, Maha K. Saadeh, W. Almobaideen, Marwan Al-Tawil
Haematopoietic stem cells (HSC) are differentiated into red blood cells (erythrocytes) through a process called Erythropoiesis. During this process, the genes undergo global gene expression changes to reflect the present developmental stage. Unsupervised clustering aims at highlighting the co-expressed genes that share similar expression profiles. Some clustering algorithms, like the well-known and most commonly used K-means, need the number of clusters as input in order to group the data based on similarity measurements. Determining a sufficient number of clusters is not a straightforward task and might be tricky. Furthermore, the quality of the obtained clusters depends on how many clusters were used. In this study, three cluster validation metrics; Silhouette Score, Calinski Harabaz Index, and DaviesBouldin Score were used to evaluate the clusters obtained from the different clustering algorithms applied. For the data of Erythropoiesis, two clusters were identified as sufficient.
{"title":"Evaluating the Optimal Number of Clusters to Identify Similar Gene Expression Patterns During Erythropoiesis","authors":"H. Saadeh, Maha K. Saadeh, W. Almobaideen, Marwan Al-Tawil","doi":"10.1109/cits55221.2022.9832988","DOIUrl":"https://doi.org/10.1109/cits55221.2022.9832988","url":null,"abstract":"Haematopoietic stem cells (HSC) are differentiated into red blood cells (erythrocytes) through a process called Erythropoiesis. During this process, the genes undergo global gene expression changes to reflect the present developmental stage. Unsupervised clustering aims at highlighting the co-expressed genes that share similar expression profiles. Some clustering algorithms, like the well-known and most commonly used K-means, need the number of clusters as input in order to group the data based on similarity measurements. Determining a sufficient number of clusters is not a straightforward task and might be tricky. Furthermore, the quality of the obtained clusters depends on how many clusters were used. In this study, three cluster validation metrics; Silhouette Score, Calinski Harabaz Index, and DaviesBouldin Score were used to evaluate the clusters obtained from the different clustering algorithms applied. For the data of Erythropoiesis, two clusters were identified as sufficient.","PeriodicalId":136239,"journal":{"name":"2022 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124842870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-13DOI: 10.1109/cits55221.2022.9832995
Pronaya Bhattacharya, A. Verma, M. Obaidat, S. Tanwar, B. Sadoun
In modern smart communities,decentralized ridesharing (RS) via cab aggregator (CA) services allow users to share trips at reduced expenses, and also help in mitigating congestion. The cab user (CU), and cab driver (CD) share sensitive information (credentials, account linkages, and location information) via open channels over CAs distributed server. During trips, in some cases, CDs do not follow an optimal path from source to destination, which leads to increased payments. Thus, inconsistencies occur due to a lack of transparency between CU, CDs, and CAs. Motivated from the same, we propose a scheme, SaFaR, that integrates consortium Solana blockchain (SBC) to assure transparency and transactional scalability between entities. CU and CD information is maintained in offline interplanetary file systems (IPFS) ledgers during the registration process, and the meta-information is stored in SBC. An optimal dynamic route algorithm is proposed based on retrospective priority queue in Dijkstra algorithm (RPQDA) is proposed on GPS-trace points obtained from path setup, that is modelled as a graph. The optimal route is stored on IPFS, so route alterations are not possible. Simulation analysis results have shown that an improvement of 99% storage cost is obtained due to IPFS, and an average improvement of 14.89% is obtained in travelling cost over dynamic and static-route setups.
{"title":"SaFaR: Solana Blockchain-based Optimal Route Selection Scheme for Cab Aggregators","authors":"Pronaya Bhattacharya, A. Verma, M. Obaidat, S. Tanwar, B. Sadoun","doi":"10.1109/cits55221.2022.9832995","DOIUrl":"https://doi.org/10.1109/cits55221.2022.9832995","url":null,"abstract":"In modern smart communities,decentralized ridesharing (RS) via cab aggregator (CA) services allow users to share trips at reduced expenses, and also help in mitigating congestion. The cab user (CU), and cab driver (CD) share sensitive information (credentials, account linkages, and location information) via open channels over CAs distributed server. During trips, in some cases, CDs do not follow an optimal path from source to destination, which leads to increased payments. Thus, inconsistencies occur due to a lack of transparency between CU, CDs, and CAs. Motivated from the same, we propose a scheme, SaFaR, that integrates consortium Solana blockchain (SBC) to assure transparency and transactional scalability between entities. CU and CD information is maintained in offline interplanetary file systems (IPFS) ledgers during the registration process, and the meta-information is stored in SBC. An optimal dynamic route algorithm is proposed based on retrospective priority queue in Dijkstra algorithm (RPQDA) is proposed on GPS-trace points obtained from path setup, that is modelled as a graph. The optimal route is stored on IPFS, so route alterations are not possible. Simulation analysis results have shown that an improvement of 99% storage cost is obtained due to IPFS, and an average improvement of 14.89% is obtained in travelling cost over dynamic and static-route setups.","PeriodicalId":136239,"journal":{"name":"2022 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121376474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-13DOI: 10.1109/cits55221.2022.9832998
Nitin Gupta, M. Obaidat, Deborsi Basu, Uttam Ghosh, K. Hsiao
Swift evolution of novel computing and communication technologies in beyond 5G networks (B5G) opens up the possibilities for advanced techniques to tackle various issues, which can not be solved by the existing frameworks. As the number of devices continuously increases, blockchain can provide a secure platform for communication among all the users in the network. Moreover, along with the security, blockchain requires low computation and also provides fast network response. Furthermore, artificial intelligence enhances the ability of devices to learn and construct knowledge about dynamic wireless environments. Recently, many researchers have shown interest in integration of both the platforms to solve the complex problems of B5G networks. This work reviews the application of both the technologies in various networks related problems recently completed by the authors. Moreover, it also discusses various possible research issues that can be handled by the integration of both platforms.
{"title":"A Comprehensive Study on Artificial Intelligence and Blockchain Driven Beyond 5G Networks","authors":"Nitin Gupta, M. Obaidat, Deborsi Basu, Uttam Ghosh, K. Hsiao","doi":"10.1109/cits55221.2022.9832998","DOIUrl":"https://doi.org/10.1109/cits55221.2022.9832998","url":null,"abstract":"Swift evolution of novel computing and communication technologies in beyond 5G networks (B5G) opens up the possibilities for advanced techniques to tackle various issues, which can not be solved by the existing frameworks. As the number of devices continuously increases, blockchain can provide a secure platform for communication among all the users in the network. Moreover, along with the security, blockchain requires low computation and also provides fast network response. Furthermore, artificial intelligence enhances the ability of devices to learn and construct knowledge about dynamic wireless environments. Recently, many researchers have shown interest in integration of both the platforms to solve the complex problems of B5G networks. This work reviews the application of both the technologies in various networks related problems recently completed by the authors. Moreover, it also discusses various possible research issues that can be handled by the integration of both platforms.","PeriodicalId":136239,"journal":{"name":"2022 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121816309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}