https://publications.eai.eu/index.php/sc/issue/feedEAI Endorsed Transactions on Smart Cities2023-05-25T09:38:04+00:00EAI Publications Departmentpublications@eai.euOpen Journal Systems<p>EAI Endorsed Transactions on Smart Cities is open access, peer-reviewed scholarly journal focused on applications for Smart Cities with leverage on big-data applications, ICT devices used in the factory of the future, HPC, industrial processes, energy efficiency systems, social platforms, and more. The journal publishes research articles, review articles, commentaries, editorials, technical articles, and short communications with a quarterly frequency (four issues per year). Authors are not charged for article submission and processing.</p>https://publications.eai.eu/index.php/sc/article/view/2067Design a framework for IoT- Identification, Authentication and Anomaly detection using Deep Learning: A Review2023-01-17T09:03:36+00:00Aimen Shoukataimen.shoukat007@gmail.comMuhammad Abul Hassanabulhassan900@gmail.comMuhammad Rizwanmuhammad.rizwan.1@warwick.ac.ukMuhammad Imadimadk28@gmail.comFarhatullahfarhatkhan8398@gmail.comSyed Haider Aliengrsyedhaiderali@yahoo.comSana Ullahsunnykhan3304@gmail.com<p class="ICST-abstracttext"><span lang="EN-GB">The Internet of Things (IoT) connects billions of smart gadgets so that they may communicate with one another without the need for human intervention. With an expected 50 billion devices by the end of 2020, it is one of the fastest-growing industries in computer history. On the one hand, IoT technologies are critical in increasing a variety of real-world smart applications that can help people live better lives. The cross-cutting nature of IoT systems, on the other hand, has presented new security concerns due to the diverse components involved in their deployment. For IoT devices and their inherent weaknesses, security techniques such as encryption, authentication, permissions, network monitoring, \& application security are ineffective. To properly protect the IoT ecosystem, existing security solutions need to be strengthened. Machine learning and deep learning (ML/DL) have come a long way in recent years, and machine intelligence has gone from being a laboratory curiosity to being used in a variety of significant applications. The ability to intelligently monitor IoT devices is an important defense against new or negligible assaults. ML/DL are effective data exploration techniques for learning about 'normal' and 'bad' behavior in IoT devices and systems. Following a comprehensive literature analysis on Machine Learning methods as well as the importance of IoT security within the framework of different sorts of potential attacks, multiple DL algorithms have been evaluated in terms of detecting attacks as well as anomaly detection in this work. We propose a taxonomy of authorization and authentication systems in the Internet of Things based on the review, with a focus on DL-based schemes. The authentication security threats and problems for IoT are thoroughly examined using the taxonomy supplied. This article provides an overview of projects that involve the use of deep learning to efficiently and automatically provide IoT applications.</span></p>2023-01-17T00:00:00+00:00Copyright (c) 2023 Aimen Shoukat, Muhammad Abul Hassan, Muhammad Rizwan, Muhammad Imad, Farhatullah, Syed Haider Ali, Sana Ullahhttps://publications.eai.eu/index.php/sc/article/view/2789IoT-based Hybrid Wireless Network for Tourist Boat Tracking towards Smart Cities2023-03-23T10:43:26+00:00Tuyen Truongtptuyen@ctu.edu.vnPhong Vu Truong xxx@gmail.comViet Quoc Tranxxx@gmail.com<p class="ICST-abstracttext"><span lang="EN-GB">Moving and transporting by canoe and boat on rivers and canals is a cultural feature of the Mekong Delta and plays an important role in the economy and society. However, the management and use of equipment to support the monitoring of waterway transport vehicles in this area has yet to receive adequate investment and attention. Given the complicated evolution of the COVID-19 epidemic, it is critical to strengthen oversight of inland waterway management, as well as freight and passenger transportation. This paper presents the design and implementation of an IoT-based support system for managing and monitoring passenger ships and tourism activities in smart cities. This study proposes a hybrid wireless communication network solution that takes advantage of the strengths of LoRa and Zigbee wireless communication technologies, as well as telecommunication networks, to ensure that the system has a wide operating range of several kilometers, low power consumption, and can be deployed in areas where telecommunications are not available. Aside from tracking the journey and managing information about vehicles, drivers, and passengers, the system also aids in the collection of environmental parameters along river routes according to the travel route. An experimental evaluation of the system's operation was carried out for the tourist boat route between two famous tourist sites, Ninh Kieu Key and Cai Rang floating market in Can Tho city, Vietnam.</span></p>2023-03-23T00:00:00+00:00Copyright (c) 2023 Tuyen Truong, Phong Vu Truong , Viet Quoc Tranhttps://publications.eai.eu/index.php/sc/article/view/2825An Intelligent Machine Learning based Intrusion Detection System (IDS) for Smart cities networks2023-05-25T09:38:04+00:00Muhammad Yaseen Ayubmryaseenayub@gmail.comUsman Haiderusmanhaider@ieee.orgAli Haidersp17-bse-018@ciit-attock.edu.pkMuhammad Tehmasib Ali Tashfeenalitashfeen@gmail.comHina Shoukatfa18-bcs-053@cuiatk.edu.pkAbdul Basitabdulbasitmujahid925@gmail.com<p>INTRODUCTION: Internet of Things (IoT) along with Cloud based systems are opening a new domain of development. They have several applications from smart homes, Smart farming, Smart cities, smart grid etc. Due to IoT sensors operating in such close proximity to humans and critical infrastructure, there arises privacy and security issues. Securing an IoT network is very essential and is a hot research topic. Different types of Intrusion Detection Systems (IDS) have been developed to detect and prevent an unauthorized intrusion into the network.</p><p>OBJECTIVES: The paper presents a Machine Learning based light, fast and reliable Intrusion Detection System (IDS).</p><p>METHODS: Multiple Supervised machine learning algorithms are applied and their results are compared. Algorithms applied include Linear Discriminant analysis, Quadratic Discriminant Analysis, XG Boost, KNN and Decision Tree.</p><p>RESULTS: Simulation results showed that KNN Algorithm gives us the highest accuracy, followed by XG Boost and Decision Tree which are not far behind.</p><p>CONCLUSION: A fast, secure and intelligent IDS is developed using machine learning algorithms. The resulting IDS can be used in various types of networks especially in IoT based networks.</p>2023-03-23T00:00:00+00:00Copyright (c) 2023 Muhammad Ayub, Usman Haider, Ali Haider, Muhammad Tehmasib Ali Tashfeen, Hina Shoukat, Abdul Basithttps://publications.eai.eu/index.php/sc/article/view/2827Investigation of Blockchain for COVID-19: A Systematic Review, Applications and Possible Challenges2023-03-23T10:43:22+00:00Shah Hussain Badshahonlinesoftteach@gmail.comMuhammad ImadImadk28@gmail.comMuhammad Abul Hassanmuhammadabul.hassan@unitn.itNaimullahNaimnan.15@gmail.comShabir khanmshabirkhan1993@gamil.comFarhatullahfarhatkhan8398@gmail.comSana Ullahsunnykhan3304@gmail.comSyed Haider Aliengrsyedhaiderali@yahoo.com<p class="ICST-abstracttext"><span lang="EN-GB">Smart city is emerging application in which many Internet of Things (IoT) devices are embedded to perform overall monitoring and perform processing automatically. In smart city the authenticity is key problem and many users in the in smart city has faced challenges during COVID-19. The COVID-19 epidemic, a deadly virus, first appeared in the globe in 2019. The World Health Organization (WHO) states that it is almost certainly feasible to contain this virus in its early phases if some precautions are taken. To contain the infection, most nations declared emergencies both inside and outside their borders and prohibited travel. Artificial intelligence and blockchain are being used in smart city applications to monitor the general condition in the nation and reduce the mortality rate. Blockchain has also made it possible to safeguard patient medical histories and provide epidemic tracking. AI also offers the ideal, wanted answer for correctly identifying the signs. The primary goal of this study is to fully investigate blockchain technology and artificial intelligence (AI) in relation to COVID-19. A case study that was recently developed to identify and networked pathogens acquired important knowledge and data. Additionally, AI that can handle massive quantities of medical data and perform difficult jobs will be able to reduce the likelihood of intricacy in data analysis. Lastly, we highlight the present difficulties and suggest potential paths for addressing the 19 diseases in future circumstances.</span></p>2023-03-23T00:00:00+00:00Copyright (c) 2023 Shah Hussain Badshah, Muhammad Imad, Muhammad Abul Hassan, Naimullah, Shabir khan, Farhatullah, Sana Ullah, Syed Haider Alihttps://publications.eai.eu/index.php/sc/article/view/2845An Efficient Substitution Box design with a chaotic logistic map and Linear Congruential Generator for secure communication in Smart cities 2023-03-23T10:43:19+00:00Muhammad Asim Hashmimahashmi@ele.qau.edu.pkNoshina Tariqnoshina.tariq@mail.au.edu.pk<p>The study provides a unique method for creating an efficient substitution box (S-box) for advanced encryption standards using a Chaotic Logistic Map (CLM) and a Linear Congruential Generator (LCG) (AES) for secure communications in a smart city. The Pseudo-Random Number Generator (PRNG), which is further examined, is constructed using an extensive search of reasonable possibilities for the initial seed and set parameters. Using statistical testing, the performance analysis of the new S-box is assessed. Additionally, the resilience of differential, as well as linear cryptanalysis, is shown. It is derived using other features, including nonlinearity, the Bit Independence Criterion (BIC), and the Strict Avalanche Criterion (SAC). The suggested S-box has good potential and is usable for symmetric key cryptography, according to the features of the new S-cryptographic box.</p>2023-03-23T00:00:00+00:00Copyright (c) 2023 Muhammad Asim Hashmi, Noshina Tariqhttps://publications.eai.eu/index.php/sc/article/view/3389Editorial: Welcome to the first issue of Volume 7 of the EAI Endorsed Transactions on Smart Cities2023-05-25T09:05:55+00:00Mohammad Derawixxx@gmail.com2023-03-30T00:00:00+00:00Copyright (c) 2023 Mohammad Derawi