Anik Islam - Academia.edu (original) (raw)
Papers by Anik Islam
I hereby declare that I am the sole author of this thesis. This is a true copy of the thesis, inc... more I hereby declare that I am the sole author of this thesis. This is a true copy of the thesis, including any required final revisions, as accepted by my examiners. I understand that my thesis may be made electronically available to the public.
2021 International Conference on Information and Communication Technology Convergence (ICTC)
Finally, result analysis has been demonstrated the feasibility of the proposed scheme.
According to the International Association of Public Transport (UITP), the current high speed of ... more According to the International Association of Public Transport (UITP), the current high speed of urbanization will equally bring rise in the challenges related to urban mobility in future. Thus, updating real-time traffic and road information is quite essential for limiting road accidents, enhance public and traffic safety. Most of the past research works in Intelligent Transportation Systems (ITS) provided advanced solutions for monitoring road traffic automatically. However, most of these systems overall efficiency depends on deployment of equipment such as actuators and sensors which can be costly. Beside cost factor, it's coverage and performance might also be limited on cities which lacks proper and infrastructures to adapt with them. The rise of the Internet of Things (IoT) paradigm offers the promise to support innovative applications and services for smart cities and can even help those lagging cities to smarter and street safer. With this core point, this paper proposes...
Natural disasters visited countries every year more or less and left devastating situations behin... more Natural disasters visited countries every year more or less and left devastating situations behind, which affect both the economy and health. However, instantaneous actions can lessen casualties in the affected areas. Unmanned any vehicle (UxV) is a concept where unmanned vehicles come together and perform missions cooperatively. UxV can assist in rehabilitating the affected area. Multi-access edge computing (MEC) can assist UxVs in real-time. However, disaster might jeopardize MEC structure. Home edge computing (HEC) is a paradigm that stays closer to the end devices and enables an offline computation environment. HEC can fill up the gap and assist in maintaining the mission. Besides, networks and data are surrounded by security and privacy issues. This paper introduces a blockchain-based HEC assisted disaster rehabilitation and recovery scheme to restore everyday life using UxV. A proof of concept is considered for proving the feasibility.
Voting is a very important issue which can be beneficial in term of choosing the right leader in ... more Voting is a very important issue which can be beneficial in term of choosing the right leader in an election. A good leader can bring prosperity to a country and also can lead the country in the right direction every time. However, elections are surrounds with ballot forgery, coercion and multiple voting issues. Moreover, while giving votes, a person has to wait in a long queue and it is a very time consuming process. Blockchain is a distributed database in which data are shared with the participant of the node and each participant holds the same copy of the data. Blockchain has properties like distributed, pseudonymous, data integrity etc. In the paper, a fully decentralized evoting system based on blockchain technology is proposed. This protocol utilizes smart contract into the evoting system to deal with security issues, accuracy and voters privacy during the vote. The protocol results in a transparent, non editable and independently verifiable procedure that discards all the int...
2020 International Conference on Information and Communication Technology Convergence (ICTC), 2020
As the unmanned aerial vehicle (UAV) can play a vital role to collect information remotely in a m... more As the unmanned aerial vehicle (UAV) can play a vital role to collect information remotely in a military battlefield, researchers have shown great interest to reveal the domain of internet of battlefield Things (IoBT). In a rescue mission on a battlefield, UAV can collect data from different regions to identify the casualty of a soldier. One of the major challenges in IoBT is to identify the soldier in a complex environment. Image processing algorithm can be helpful if proper methodology can be applied to identify the victims. However, due to the limited hardware resources of a UAV, processing task can be handover to the nearby edge computing server for offloading the task as every second is very crucial in a battlefield. Furthermore, to avoid any third-party interaction in the network and to store the data securely, blockchain can help to create a trusted network as it forms a distributed ledger among the participants. This paper proposes a UAV assisted casualty detection scheme ba...
2020 International Conference on Information and Communication Technology Convergence (ICTC), 2020
MR-Block: A Blockchain-Assisted Secure Content Sharing Scheme for Multi-User Mixed-Reality Applic... more MR-Block: A Blockchain-Assisted Secure Content Sharing Scheme for Multi-User Mixed-Reality Applications in Internet of Military Things
Journal of Information and Communication Convergence Engineering, 2019
In this study, we present a new scheme for smart education utilizing the concept of a blockchain ... more In this study, we present a new scheme for smart education utilizing the concept of a blockchain for question sharing. A two-phase encryption technique for encrypting question papers (QSPs) is proposed. In the first phase, QSPs are encrypted using a timestamp, and in the second phase, previously encrypted QSPs are encrypted again using a timestamp, salt hash, and hash from the previous QSPs. These encrypted QSPs are stored in a blockchain along with a smart contract that helps the user to unlock the selected QSP. An algorithm is also proposed for selecting a QSP for the exam that randomly picks a QSP. Moreover, a timestamp-based lock is imposed on the scheme so that no one can decrypt the QSP before the allowed time. Security analysis is conducted to demonstrate the feasibility of the proposed scheme against different attacks. Finally, the effectiveness of the proposed scheme is demonstrated through implementation, and the superiority of the proposed scheme over existing schemes is ...
The 7th International Conference on Information and Communication Technology, 2019
Mixed Reality (MR) applications are becoming very popular in different sectors such as communicat... more Mixed Reality (MR) applications are becoming very popular in different sectors such as communication, education and entertainment for its extensive application areas and also for the wide adoption of mobile and especially wearable devices. Due to weak computational efficiency and short battery life of these devices, MR applications performance can be hampered. Offloading the MR application burden to the cloud server can be a solution to this problem but this approach also creates high communication latency. Mobile Edge Computing (MEC) is an emerging technology which brings cloud close to the user proximity at the base station and utilizes radio access network for maintaining communication with the users. This paper presents a MEC based MR application for assisting blind and visually impaired people. In the proposed scheme, the computational task is offloaded to the nearest MEC server in order to prolong the battery life of the MR devices. Finally, experimental results based on laten...
1st International Conference on Machine Learning, Image Processing, Network Security and Data Sciences, 2019
With the advancement of technology, devices, which are considered non-traditional in terms of int... more With the advancement of technology, devices, which are considered non-traditional in terms of internet capabilities, are now being embedded in microprocessors to communicate and these devices are known as IoT devices. This technology has enabled household devices to have the ability to communicate with the internet and a network comprising of such device can create a home IoT network. Such IoT devices are resource constrained and lack high-level security protocols. Thus, security becomes a major issue for such network systems. One way to secure the networks is through reliable authentication protocols and data transfer mechanism. As the household devices are controllable by the users remotely, they are accessed over the internet. Therefore, there should also be a method to make the communication over the internet between IoT devices and the users more secured. This paper proposes a two-phase authentication protocol for authentication purposes and a VPN based secure channel creation ...
IEEE, 2018
Non-orthogonal multiple access (NOMA) with successive interference cancellation receiver is consi... more Non-orthogonal multiple access (NOMA) with successive interference cancellation receiver is considered as one of the most potent multiple access techniques to be adopted in future wireless communication networks. Data security in NOMA transmission scheme is of much attention drawing issue. Blockchain is a distributed peer-to-peer network enables a way of protecting information from unauthorized access, tempering etc. By utilizing encryption techniques of blockchain, a secured data communication scheme using blockchain in NOMA is proposed in this paper. A two-phase encryption technique with key generation using different parameter is proposed. In the first-phase data is encrypted by imposing users' public key and in the second phase, a private key of the base station (BS) is engaged for encryption. Finally, the superiority of the proposed scheme over existing scheme is proven through a comparative study based on the different features.
Domestic violence is a silent crisis in the developing and underdeveloped countries, though devel... more Domestic violence is a silent crisis in the developing and underdeveloped countries, though developed countries also remain drowned in the curse of it. In developed countries, victims can easily report and ask help on the contrary in developing and underdeveloped countries victims hardly report the crimes and when it's noticed by the authority it's become too late to save or support the victim. If this kind of problems can be identified at the very beginning of the event and proper actions can be taken, it'll not only help the victim but also reduce the domestic violence crimes. This paper proposed a smart system which can extract victim's situation and provide help according to it. Among of the developing and underdeveloped countries Bangladesh has been chosen though the rate of reporting of domestic violence is low, the extreme report collected by authorities is too high. Case studies collected by different NGO's relating to domestic violence have been studied ...
Voting is a very important issue that can be beneficial in terms of choosing the right leader in ... more Voting is a very important issue that can be beneficial in terms of choosing the right leader in an election. A good leader can bring prosperity to a country and also can lead the country in the right direction every time. However, elections are surrounded by ballot forgery, coercion, and multiple voting issues. Moreover, while giving votes, a person has to wait in a long queue and it is a very time-consuming process. Blockchain is a distributed database in which data are shared with the participant of the node and each participant holds the same copy of the data. Blockchain has properties like transparency, pseudonymity, and data integrity. In this paper, a fully decentralized e-voting system based on blockchain technology is proposed. This protocol utilizes smart contracts in the e-voting system to deal with security issues, accuracy, and voters’ privacy during the vote. The protocol results in a transparent, non-editable, and independently verifiable procedure. The protocol disca...
Communications in Computer and Information Science
Proceedings of the International Conference on Computing Advancements
Trespassing in the marine area is a very critical issue. As a result, countries are losing revenu... more Trespassing in the marine area is a very critical issue. As a result, countries are losing revenue as well as it's a threat against the sovereignty of the country. As sea area is large, it's not always possible to monitor every part in real-time. Unmanned aerial vehicle (UAV) is a promising technology that can assist to alleviate this issue. However, communication between the control center and a UAV encircles with cyber threats as well as data in the surveillance may experience unauthorised modification. This paper represents a blockchain-empowered smart surveillance architecture in which UAV performs surveillance and uses a two-phase authentication process to verify the marine vehicles. The experimental result manifests that the proposed scheme is faster and consumes less energy than the existing authentication algorithms. CCS CONCEPTS • Computing methodologies → Distributed computing methodologies; • Computer systems organization → Peer-to-peer architectures; • Security and privacy → Mobile and wireless security; Privacy protections.
IC-BCT 2019
In order to stay up to date with world issues and cutting-edge technologies, the newspaper plays ... more In order to stay up to date with world issues and cutting-edge technologies, the newspaper plays a crucial role. However, collecting news is not a very easy task. Currently, news publishers are collecting news from their correspondents through social networks, email, phone call, fax etc. and sometimes they buy news from the agencies. However, the existing news sharing networks may not provide security for data integrity and any third party may obstruct the regular flow of news sharing. Moreover, the existing news schemes are very vulnerable in case of disclosing the identity. Therefore, a universal platform is needed in the era of globalization where anyone can share and trade news from anywhere in the world securely, without the interference of third-party, and without disclosing the identity of an individual. Recently, blockchain has gained popularity because of its security mechanism over data, identity, etc. Blockchain enables a distributed way of managing transactions where each participant of the network holds the same copy of the transactions. Therefore, with the help of pseudonymity, fault-tolerance, immutability and the distributed structure of blockchain, a scheme (termed as NEWSTRADCOIN) is presented in this paper in which not only news can be shared securely but also anyone can earn money by selling news. The proposed NEWSTRADCOIN can provide a universal platform where publishers can directly obtain news from news-gatherers in a secure way by maintaining data integrity, without experiencing the interference of a third-party, and without disclosing the identity of the news gatherer and publishers.
2019 7th International Conference on Information and Communication Technology (ICoICT)
Unmanned aerial vehicle (UAV) is an emerging technology that becomes popular not only in military... more Unmanned aerial vehicle (UAV) is an emerging technology that becomes popular not only in military operation but also in civil applications. Internet of things (IoT) is another popular technology which brings automation in our daily life. Like other areas, IoT also exposes its potential in healthcare. Using IoT sensors, it becomes easy to monitor the health of a user remotely. UAV consolidated with mobile edge computing (MEC) can provide real-time services in outdoor health monitoring. However, communication among them surrounds with cyber threats and data integrity issue. Blockchain is a data structure in which data are shared among peers. In this paper, a blockchain based secure outdoor health monitoring scheme using UAV is proposed for a smart city. In the proposed scheme, health data (HD) are accumulated from users wearable sensors and these HD are transmitted to the nearest MEC server via UAV. Prior to transmitting to MEC, HD experience encryption in order to provide protection against cyber threats. Moreover, after arriving at MEC, HD are diagnosed and if any abnormalities are found in the user's health, MEC server notifies the user and the nearest hospitals. When the processing is completed, HD are stored in blockchain with the consent of validators. Finally, simulation results and experimental set up are discussed in order to manifest the feasibility of the proposed scheme.
IEEE Wireless Communications
Contagious disease pandemics present a significant threat worldwide in terms of both human health... more Contagious disease pandemics present a significant threat worldwide in terms of both human health and economic damage. New diseases emerge annually and place enormous burdens on many countries. Additionally, using humans to handle pandemic situations increases the chances of disease spreading. Therefore, various technologies that do not directly involve humans should be employed to handle pandemic situations. The Internet of Drones (IoDT), artificial intelligence (AI), and blockchain are emerging technologies that have revolutionized the modern world. This paper presents a blockchain-based AIempowered pandemic situation supervision scheme in which a swarm of drones embedded with AI is engaged to autonomously monitor pandemic outbreaks, thereby keeping human involvement as low as possible. A use case based on a recent pandemic (i.e., COVID-19) is discussed. Two types of drone swarms are used to handle multiple tasks (e.g., checking face masks and imposing lockdowns). A lightweight blockchain is considered to handle situations in remote areas with poor network connectivity. Additionally, a two-phase lightweight security mechanism is adopted to validate the entities in the proposed scheme. A proof of concept is established using an experimental environment setup and dataset training. An analysis of the experimental results demonstrates the feasibility of the proposed scheme.
Journal of Economic Surveys
I hereby declare that I am the sole author of this thesis. This is a true copy of the thesis, inc... more I hereby declare that I am the sole author of this thesis. This is a true copy of the thesis, including any required final revisions, as accepted by my examiners. I understand that my thesis may be made electronically available to the public.
2021 International Conference on Information and Communication Technology Convergence (ICTC)
Finally, result analysis has been demonstrated the feasibility of the proposed scheme.
According to the International Association of Public Transport (UITP), the current high speed of ... more According to the International Association of Public Transport (UITP), the current high speed of urbanization will equally bring rise in the challenges related to urban mobility in future. Thus, updating real-time traffic and road information is quite essential for limiting road accidents, enhance public and traffic safety. Most of the past research works in Intelligent Transportation Systems (ITS) provided advanced solutions for monitoring road traffic automatically. However, most of these systems overall efficiency depends on deployment of equipment such as actuators and sensors which can be costly. Beside cost factor, it's coverage and performance might also be limited on cities which lacks proper and infrastructures to adapt with them. The rise of the Internet of Things (IoT) paradigm offers the promise to support innovative applications and services for smart cities and can even help those lagging cities to smarter and street safer. With this core point, this paper proposes...
Natural disasters visited countries every year more or less and left devastating situations behin... more Natural disasters visited countries every year more or less and left devastating situations behind, which affect both the economy and health. However, instantaneous actions can lessen casualties in the affected areas. Unmanned any vehicle (UxV) is a concept where unmanned vehicles come together and perform missions cooperatively. UxV can assist in rehabilitating the affected area. Multi-access edge computing (MEC) can assist UxVs in real-time. However, disaster might jeopardize MEC structure. Home edge computing (HEC) is a paradigm that stays closer to the end devices and enables an offline computation environment. HEC can fill up the gap and assist in maintaining the mission. Besides, networks and data are surrounded by security and privacy issues. This paper introduces a blockchain-based HEC assisted disaster rehabilitation and recovery scheme to restore everyday life using UxV. A proof of concept is considered for proving the feasibility.
Voting is a very important issue which can be beneficial in term of choosing the right leader in ... more Voting is a very important issue which can be beneficial in term of choosing the right leader in an election. A good leader can bring prosperity to a country and also can lead the country in the right direction every time. However, elections are surrounds with ballot forgery, coercion and multiple voting issues. Moreover, while giving votes, a person has to wait in a long queue and it is a very time consuming process. Blockchain is a distributed database in which data are shared with the participant of the node and each participant holds the same copy of the data. Blockchain has properties like distributed, pseudonymous, data integrity etc. In the paper, a fully decentralized evoting system based on blockchain technology is proposed. This protocol utilizes smart contract into the evoting system to deal with security issues, accuracy and voters privacy during the vote. The protocol results in a transparent, non editable and independently verifiable procedure that discards all the int...
2020 International Conference on Information and Communication Technology Convergence (ICTC), 2020
As the unmanned aerial vehicle (UAV) can play a vital role to collect information remotely in a m... more As the unmanned aerial vehicle (UAV) can play a vital role to collect information remotely in a military battlefield, researchers have shown great interest to reveal the domain of internet of battlefield Things (IoBT). In a rescue mission on a battlefield, UAV can collect data from different regions to identify the casualty of a soldier. One of the major challenges in IoBT is to identify the soldier in a complex environment. Image processing algorithm can be helpful if proper methodology can be applied to identify the victims. However, due to the limited hardware resources of a UAV, processing task can be handover to the nearby edge computing server for offloading the task as every second is very crucial in a battlefield. Furthermore, to avoid any third-party interaction in the network and to store the data securely, blockchain can help to create a trusted network as it forms a distributed ledger among the participants. This paper proposes a UAV assisted casualty detection scheme ba...
2020 International Conference on Information and Communication Technology Convergence (ICTC), 2020
MR-Block: A Blockchain-Assisted Secure Content Sharing Scheme for Multi-User Mixed-Reality Applic... more MR-Block: A Blockchain-Assisted Secure Content Sharing Scheme for Multi-User Mixed-Reality Applications in Internet of Military Things
Journal of Information and Communication Convergence Engineering, 2019
In this study, we present a new scheme for smart education utilizing the concept of a blockchain ... more In this study, we present a new scheme for smart education utilizing the concept of a blockchain for question sharing. A two-phase encryption technique for encrypting question papers (QSPs) is proposed. In the first phase, QSPs are encrypted using a timestamp, and in the second phase, previously encrypted QSPs are encrypted again using a timestamp, salt hash, and hash from the previous QSPs. These encrypted QSPs are stored in a blockchain along with a smart contract that helps the user to unlock the selected QSP. An algorithm is also proposed for selecting a QSP for the exam that randomly picks a QSP. Moreover, a timestamp-based lock is imposed on the scheme so that no one can decrypt the QSP before the allowed time. Security analysis is conducted to demonstrate the feasibility of the proposed scheme against different attacks. Finally, the effectiveness of the proposed scheme is demonstrated through implementation, and the superiority of the proposed scheme over existing schemes is ...
The 7th International Conference on Information and Communication Technology, 2019
Mixed Reality (MR) applications are becoming very popular in different sectors such as communicat... more Mixed Reality (MR) applications are becoming very popular in different sectors such as communication, education and entertainment for its extensive application areas and also for the wide adoption of mobile and especially wearable devices. Due to weak computational efficiency and short battery life of these devices, MR applications performance can be hampered. Offloading the MR application burden to the cloud server can be a solution to this problem but this approach also creates high communication latency. Mobile Edge Computing (MEC) is an emerging technology which brings cloud close to the user proximity at the base station and utilizes radio access network for maintaining communication with the users. This paper presents a MEC based MR application for assisting blind and visually impaired people. In the proposed scheme, the computational task is offloaded to the nearest MEC server in order to prolong the battery life of the MR devices. Finally, experimental results based on laten...
1st International Conference on Machine Learning, Image Processing, Network Security and Data Sciences, 2019
With the advancement of technology, devices, which are considered non-traditional in terms of int... more With the advancement of technology, devices, which are considered non-traditional in terms of internet capabilities, are now being embedded in microprocessors to communicate and these devices are known as IoT devices. This technology has enabled household devices to have the ability to communicate with the internet and a network comprising of such device can create a home IoT network. Such IoT devices are resource constrained and lack high-level security protocols. Thus, security becomes a major issue for such network systems. One way to secure the networks is through reliable authentication protocols and data transfer mechanism. As the household devices are controllable by the users remotely, they are accessed over the internet. Therefore, there should also be a method to make the communication over the internet between IoT devices and the users more secured. This paper proposes a two-phase authentication protocol for authentication purposes and a VPN based secure channel creation ...
IEEE, 2018
Non-orthogonal multiple access (NOMA) with successive interference cancellation receiver is consi... more Non-orthogonal multiple access (NOMA) with successive interference cancellation receiver is considered as one of the most potent multiple access techniques to be adopted in future wireless communication networks. Data security in NOMA transmission scheme is of much attention drawing issue. Blockchain is a distributed peer-to-peer network enables a way of protecting information from unauthorized access, tempering etc. By utilizing encryption techniques of blockchain, a secured data communication scheme using blockchain in NOMA is proposed in this paper. A two-phase encryption technique with key generation using different parameter is proposed. In the first-phase data is encrypted by imposing users' public key and in the second phase, a private key of the base station (BS) is engaged for encryption. Finally, the superiority of the proposed scheme over existing scheme is proven through a comparative study based on the different features.
Domestic violence is a silent crisis in the developing and underdeveloped countries, though devel... more Domestic violence is a silent crisis in the developing and underdeveloped countries, though developed countries also remain drowned in the curse of it. In developed countries, victims can easily report and ask help on the contrary in developing and underdeveloped countries victims hardly report the crimes and when it's noticed by the authority it's become too late to save or support the victim. If this kind of problems can be identified at the very beginning of the event and proper actions can be taken, it'll not only help the victim but also reduce the domestic violence crimes. This paper proposed a smart system which can extract victim's situation and provide help according to it. Among of the developing and underdeveloped countries Bangladesh has been chosen though the rate of reporting of domestic violence is low, the extreme report collected by authorities is too high. Case studies collected by different NGO's relating to domestic violence have been studied ...
Voting is a very important issue that can be beneficial in terms of choosing the right leader in ... more Voting is a very important issue that can be beneficial in terms of choosing the right leader in an election. A good leader can bring prosperity to a country and also can lead the country in the right direction every time. However, elections are surrounded by ballot forgery, coercion, and multiple voting issues. Moreover, while giving votes, a person has to wait in a long queue and it is a very time-consuming process. Blockchain is a distributed database in which data are shared with the participant of the node and each participant holds the same copy of the data. Blockchain has properties like transparency, pseudonymity, and data integrity. In this paper, a fully decentralized e-voting system based on blockchain technology is proposed. This protocol utilizes smart contracts in the e-voting system to deal with security issues, accuracy, and voters’ privacy during the vote. The protocol results in a transparent, non-editable, and independently verifiable procedure. The protocol disca...
Communications in Computer and Information Science
Proceedings of the International Conference on Computing Advancements
Trespassing in the marine area is a very critical issue. As a result, countries are losing revenu... more Trespassing in the marine area is a very critical issue. As a result, countries are losing revenue as well as it's a threat against the sovereignty of the country. As sea area is large, it's not always possible to monitor every part in real-time. Unmanned aerial vehicle (UAV) is a promising technology that can assist to alleviate this issue. However, communication between the control center and a UAV encircles with cyber threats as well as data in the surveillance may experience unauthorised modification. This paper represents a blockchain-empowered smart surveillance architecture in which UAV performs surveillance and uses a two-phase authentication process to verify the marine vehicles. The experimental result manifests that the proposed scheme is faster and consumes less energy than the existing authentication algorithms. CCS CONCEPTS • Computing methodologies → Distributed computing methodologies; • Computer systems organization → Peer-to-peer architectures; • Security and privacy → Mobile and wireless security; Privacy protections.
IC-BCT 2019
In order to stay up to date with world issues and cutting-edge technologies, the newspaper plays ... more In order to stay up to date with world issues and cutting-edge technologies, the newspaper plays a crucial role. However, collecting news is not a very easy task. Currently, news publishers are collecting news from their correspondents through social networks, email, phone call, fax etc. and sometimes they buy news from the agencies. However, the existing news sharing networks may not provide security for data integrity and any third party may obstruct the regular flow of news sharing. Moreover, the existing news schemes are very vulnerable in case of disclosing the identity. Therefore, a universal platform is needed in the era of globalization where anyone can share and trade news from anywhere in the world securely, without the interference of third-party, and without disclosing the identity of an individual. Recently, blockchain has gained popularity because of its security mechanism over data, identity, etc. Blockchain enables a distributed way of managing transactions where each participant of the network holds the same copy of the transactions. Therefore, with the help of pseudonymity, fault-tolerance, immutability and the distributed structure of blockchain, a scheme (termed as NEWSTRADCOIN) is presented in this paper in which not only news can be shared securely but also anyone can earn money by selling news. The proposed NEWSTRADCOIN can provide a universal platform where publishers can directly obtain news from news-gatherers in a secure way by maintaining data integrity, without experiencing the interference of a third-party, and without disclosing the identity of the news gatherer and publishers.
2019 7th International Conference on Information and Communication Technology (ICoICT)
Unmanned aerial vehicle (UAV) is an emerging technology that becomes popular not only in military... more Unmanned aerial vehicle (UAV) is an emerging technology that becomes popular not only in military operation but also in civil applications. Internet of things (IoT) is another popular technology which brings automation in our daily life. Like other areas, IoT also exposes its potential in healthcare. Using IoT sensors, it becomes easy to monitor the health of a user remotely. UAV consolidated with mobile edge computing (MEC) can provide real-time services in outdoor health monitoring. However, communication among them surrounds with cyber threats and data integrity issue. Blockchain is a data structure in which data are shared among peers. In this paper, a blockchain based secure outdoor health monitoring scheme using UAV is proposed for a smart city. In the proposed scheme, health data (HD) are accumulated from users wearable sensors and these HD are transmitted to the nearest MEC server via UAV. Prior to transmitting to MEC, HD experience encryption in order to provide protection against cyber threats. Moreover, after arriving at MEC, HD are diagnosed and if any abnormalities are found in the user's health, MEC server notifies the user and the nearest hospitals. When the processing is completed, HD are stored in blockchain with the consent of validators. Finally, simulation results and experimental set up are discussed in order to manifest the feasibility of the proposed scheme.
IEEE Wireless Communications
Contagious disease pandemics present a significant threat worldwide in terms of both human health... more Contagious disease pandemics present a significant threat worldwide in terms of both human health and economic damage. New diseases emerge annually and place enormous burdens on many countries. Additionally, using humans to handle pandemic situations increases the chances of disease spreading. Therefore, various technologies that do not directly involve humans should be employed to handle pandemic situations. The Internet of Drones (IoDT), artificial intelligence (AI), and blockchain are emerging technologies that have revolutionized the modern world. This paper presents a blockchain-based AIempowered pandemic situation supervision scheme in which a swarm of drones embedded with AI is engaged to autonomously monitor pandemic outbreaks, thereby keeping human involvement as low as possible. A use case based on a recent pandemic (i.e., COVID-19) is discussed. Two types of drone swarms are used to handle multiple tasks (e.g., checking face masks and imposing lockdowns). A lightweight blockchain is considered to handle situations in remote areas with poor network connectivity. Additionally, a two-phase lightweight security mechanism is adopted to validate the entities in the proposed scheme. A proof of concept is established using an experimental environment setup and dataset training. An analysis of the experimental results demonstrates the feasibility of the proposed scheme.
Journal of Economic Surveys