-
1
A Secure and Scalable Sidechain Model for Fog Computing in Healthcare Systems
Published 2022“…This work will suggest a scalable and secure model for fog and cloud computing in healthcare systems that depend on sidechains and the clustering of the available fog nodes. …”
Get full text
Get full text
Get full text
masterThesis -
2
A lightweight blockchain and fog-enabled secure remote patient monitoring system
Published 2023“…Moreover, the augmentation of Fog computing improved the responsiveness of the remote patient monitoring system by 40%.…”
Get full text
Get full text
Get full text
Get full text
article -
3
Industrial Internet of Things enabled technologies, challenges, and future directions
Published 2023“…IIoT applications use the intelligence of things to solve industrial problems like supply chain mismanagement, data privacy risks, a weak cloud strategy, cost containment, and others. For instance, fog computing reduces parking, platform, fuel, and CO2 emissions. …”
Get full text
Get full text
Get full text
article -
4
Industrial Internet of Things enabled technologies, challenges, and future directions
Published 2023“…IIoT applications use the intelligence of things to solve industrial problems like supply chain mismanagement, data privacy risks, a weak cloud strategy, cost containment, and others. For instance, fog computing reduces parking, platform, fuel, and CO<sub>2</sub> emissions. …”
-
5
Leveraging a novel NFT-enabled blockchain architecture for the authentication of IoT assets in smart cities
Published 2023“…It enables NFTs to employ fog computing for all users and smart devices connected to a fog node in a cyber-physical system. …”
-
6
Fire detection and anti-fire system to enhance food security: A concept of smart agriculture systems-based IoT and embedded systems with machine-to-machine protocol
Published 2025“…The proposed system has four technology levels: 1) the edge network layer, 2) the fog network layer, 3) the cloud computing layer, and 4) the data representation layer. …”
Get full text
Get full text
Get full text
article -
7
NFTs for the Unassailable Authentication of IoT Devices in Cyber-Physical Systems: An Implementation Study
Published 2025“…The code is structured with functions for Wi-Fi setup, TCP API requests, and secure communication challenges. Integration involves compiling and flashing the code onto ESP32 devices, verifying EOA generation, and mapping devices, fog nodes, and users through smart contract interactions. …”