The concept of smart city architecture requires a comprehensive solution that can combine real-time response applications for cyber-physical systems. However, the architecture faces challenges that can obstruct the operations in terms of systems, processes, and data flow as far as the breach risk is concerned. Though the field has been researched with the existence of centralized and distributed architectures to support smart cities. Research gaps regarding security concerns, platform assistance, and resource management continue to persist. This research article presents a novel blockchain-based architecture that proposes expansion in the non-fungible tokens (NFTs) to cater to the expansion of IoT-enabled smart assets. It enables NFTs to employ fog computing for all users and smart devices connected to a fog node in a cyber-physical system. The proposed expansion suggested in Non-Fungible Tokens (NFTs) for IoT assets representation in a cyber-physical system, provides devices and user identification and authentication functionality. The proposed NFT architecture has been designed to provide a smart city solution for cyber-physical systems that ensures robust security features (such as CIA) by introducing new attributes and functions for Owner, User, Fog, and IoT device/s authentication. The validation and rigor of the security services, efficiency, and latency have been achieved by deployments on private and public ledgers. The efficiency, and cost-effectiveness of the suggested functions and components have been evaluated in terms of evaluation cost and time complexity which resulted in promising results, obtained and validated on a testnet. The evaluation cost for the devised mint component was approximately 81%, and devised approve() was approximately 23% more efficient than other solutions.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC10643660PMC
http://dx.doi.org/10.1038/s41598-023-45212-1DOI Listing

Publication Analysis

Top Keywords

iot assets
8
smart cities
8
smart city
8
cyber-physical systems
8
non-fungible tokens
8
tokens nfts
8
cyber-physical system
8
evaluation cost
8
smart
6
architecture
5

Similar Publications

Developing a digital management system for museum collections using RFID and enhanced GIS technology.

PeerJ Comput Sci

November 2024

Department of Space and Lifestyle Design, Graduate School of Techno Design, Kookmin University, Seoul, Republic of South Korea.

Article Synopsis
  • The integration of RFID technology with deep learning has transformed IoT, particularly benefiting museums in managing their collections more effectively.
  • Traditional tracking methods are insufficient for providing real-time updates and maintaining optimal conditions, putting pressure on museum staff responsible for extensive collections.
  • This study introduces an advanced electronic management system that combines RFID and GIS, using an enhanced LANDMARC algorithm to improve the accuracy of collection tracking and environmental monitoring, while also optimizing staff management and inspection processes.
View Article and Find Full Text PDF

In the face of constantly changing cyber threats, a variety of actions, tools, and regulations must be considered to safeguard information assets and guarantee the confidentiality, reliability, and availability of digital resources. The purpose of this research is to create an artificial intelligence (AI)-driven system to enhance sustainability for cyber threat detection in Internet of Things (IoT) environments. This study proposes a modern technique named Artificial Fish Swarm-driven Weight-normalized Adaboost (AF-WAdaBoost) for optimizing accuracy and sustainability in identifying attacks, thus contributing to heightening security in IoT environments.

View Article and Find Full Text PDF

Internet of Things (IoT) devices are much closer to users than personal computers used in traditional computing environments. Due to prevalence of IoT devices, even if they are compromised and used in attacks, it is difficult to detect and respond to them. Currently, there has been extensive research on threat modeling for cyberattacks.

View Article and Find Full Text PDF

The Internet of Things technology allows you to transfer data to any asset through communication networks such as the Internet or intranet. One of the most important problems is security, which includes confidentiality, authenticity validation, and completeness. Among security problems, the most important ones are ensuring authenticity and protecting privacy.

View Article and Find Full Text PDF

Recent advances in low-power wireless-capable system-on-chips (SoCs) have accelerated diverse Internet of Things (IoT) applications, encompassing wearables, asset monitoring, and more. Concurrently, the field of neuroimaging has experienced escalating demand for lightweight, untethered, low-power systems capable of imaging in small animals. This article explores the feasibility of using a low-power asset monitoring system as the basis of a new architecture for fluorescence and hemodynamic contrast-based wireless functional imaging.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!