Blockchain Assisted Data Edge Verification With Consensus Algorithm For Machine Learning Assisted IoT
Blockchain Assisted Data Edge Verification With Consensus Algorithm For Machine Learning Assisted IoT
ABSTRACT Internet of Things (IoT) devices are becoming increasingly ubiquitous in daily life. They are
utilized in various sectors like healthcare, manufacturing, and transportation. The main challenges related
to IoT devices are the potential for faults to occur and their reliability. In classical IoT fault detection, the
client device must upload raw information to the central server for the training model, which can reveal
sensitive business information. Blockchain (BC) technology and a fault detection algorithm are applied to
overcome these challenges. Generally, the fusion of BC technology and fault detection algorithms can give
a secure and more reliable IoT ecosystem. Therefore, this study develops a new Blockchain Assisted Data
Edge Verification with Consensus Algorithm for Machine Learning (BDEV-CAML) technique for IoT Fault
Detection purposes. The presented BDEV-CAML technique integrates the benefits of blockchain, IoT, and
ML models to enhance the IoT network’s trustworthiness, efficacy, and security. In BC technology, IoT
devices that possess a significant level of decentralized decision-making capability can attain a consensus
on the efficiency of intrablock transactions. For fault detection in the IoT network, the deep directional
gated recurrent unit (DBiGRU) model is used. Finally, the African vulture optimization algorithm (AVOA)
technique is utilized for the optimal hyperparameter tuning of the DBiGRU model, which helps in improving
the fault detection rate. A detailed set of experiments were carried out to highlight the enhanced performance
of the BDEV-CAML algorithm. The comprehensive experimental results stated the improved performance
of the BDEV-CAML technique over other existing models with maximum accuracy of 99.6%.
INDEX TERMS Blockchain, Internet of Things, consensus algorithm, fault detection, deep learning,
hyperparameter tuning.
for predicting possible solutions and describe fault in preserve and stored in the block. The stored information is now avail-
tasks. Xia et al. [19] presents a novel hypergraph convolu- able within the distributed network, with a participant node to
tion network (HGCN) based model to forecast MRR from authenticate the transaction. Every node in BC is connected
the CMP procedure. A major contributions contains: (1) a and assists the transaction and crypto code. An additional
generic hypergraph method for representing the interactions feature in BC technology is the mathematical algorithm that
of difficult tools; and (2) a temporal enabled forecast method is extremely powerful in these networks. It is responsible for
for learning the difficult data correlation and high order rep- blocking authentication to minor nodes without affecting the
resentation dependent upon the hypergraph. In [20], a vertical data; for that reason, BC is transparent and secure. There
federated learning (FL) method, privacy-preserving boosting exist recommendation systems based on BC and knowledge
tree was established to collaborative fault analysis of indus- discovery technology and many research requirements for
trial practitioners but maintained anonymity. tackling security challenges. This procedure must implement
Xia et al. [21] examines a residual-HGCN (Res-HGCN) the incorporation of IoT and BC. Likewise, the security
technique which holistically drive in tools structure and oper- challenges, which the research workers state, make the BC
ational processes as a hypergraph procedure as data-driven a better choice. BC’s main characteristics are programma-
method allowing for reaction amongst equipment’s mecha- bility, trust, security, and so on. A BC comprises a private
nisms. Keung et al. [22] introduces the execution of devel- BC, a consortium BC, or a public BC. The public BC is
oping ARP for IIoT and resource synchronisation flexible well-known for digital currency. The primary goal of the con-
robotic and facility control scheme for addressing this chal- sortium BC is to integrate the service trading and stakeholder
lenge. In [23], the authors propose for addressing the value entity.
construction of exploiting the IIoT-driven resource synchro-
nization and sharing-based robotic mobile fulfillment system B. IoT NETWORK MODEL AND DISTRIBUTED
(RMFS) for enhancing the entire operational efficiency and LEDGER DEPLOYMENT
effectiveness in the data transmission and synchronization of If the edge gateway fails, IoT using single-edge gateways
resources. is prone to single-point failure since the whole IoT will be
The number of parameters of DL methods increases disconnected. Multiple-edge gateways decrease the delay and
quickly because of the continuous deepening of the method distance of communication of information and prevent energy
that give rise to model overfitting. Meanwhile, various hyper- loss based on the fast consumption of the IoT node nearby
parameters have a huge impact on the ability of the CNN the edge gateway. In the presented method, multiple edge
method. To be specific, the hyperparameters like learning rate gateways are the edge server and are applied to authenticate
selection, epoch count, and batch size are vital to get produc- the information received from the BC [12]. The edge node
tive results. As the trial and error method for hyperparame- process the received statistics and encapsulate the processed
ter tuning is a erroneous and tedious process, metaheuristic information, timestamp, and other transaction data into the
methods are adopted. Hence, the authors have used AVOA block that can be represented as the data block. Data authen-
method for the parameter selection of the DBiGRU approach tication can be accomplished by transporting these blocks.
in this study. Each edge gateway retains a synchronized and shared dis-
tributed ledge. Every transaction between the edge gateways
is stored in the ledger, like data exchange or asset records.
III. THE PROPOSED MODEL
Due to the computing power, limited storage capacity, energy,
In this study, we have designed a novel BDEV-CAML algo-
etc., the distributed ledger is positioned on edge gateways and
rithm to identify faults in the IoT environment effectively.
is retained by the edge gateway. The information transferred
The BDEV-CAML technique integrated the advantages of the
in IoT is stored in the ledger with decentralised features,
blockchain, IoT, and ML concepts for boosting the IoT net-
guaranteeing that the information is tamper-proof.
work’s trustworthiness, efficacy, and security. In the context
Data Consensus Algorithm: In BC technology, nodes
of intrablock transactions, IoT devices with strong decentral-
equipped with extensive decentralized decision-making abil-
ized decision-making abilities can agree on the effectiveness.
ities could attain a consensus on the efficiency of intrablock
Fig. 1 represents the overall procedure of the BDEV-CAML
transactions. To guarantee consensus amongst edge gateways,
approach.
the conventional BC technique depends mainly on the com-
puting power of distributed edge gateway. With compara-
A. BLOCKCHAIN TECHNOLOGY tively poor computation power, this doesn’t apply to IoT.
Blockchain (BC) technology is the eminent domain for safety Consequently, the study developed a data consensus model
and trust, which can be applied to any relevant topic to of IoT. The hash function is performed for transforming
keep data and information private [24]. Likewise, it is a the information into respective hash values once the edge
groundbreaking technology for distributed and decentralized gateway receives the information [12]. Every evaluated hash
computing frameworks that support the data with encrypted value corresponds to the data point, and the new information
blocks in the chain. Digital data related to time, date amount, could not be recovered through hashing. The edge gateway
transactions, and so on are enlarged in the transaction process receives the information store, the destination edge gateway,
and other related data in the block. The data block is transmit- ht−1 and xt , which can be evaluated by Eq. (4). Consequently,
ted to each edge gateway for authentication and waits for the a candidate vector, h̃t , is generated using tanh function where
authentication outcomes. The information is authenticated by the output of reset gate, rt , only influence ht−1 . Moreover,
checking the ledger once the edge gateway receives the infor- the update gate controls the influence of the preceding state,
mation from other edge gateways. The edge gateway waits for ht−1 , and candidate vector, h, on state vector, ht , evaluated by
confirmation and then gives feedback on the authentication Eqs. (6) & (7).
outcome (correct or incorrect). The received information is
rt = σ Wr · ht−1′ xt + br
(4)
processed based on the authentication result from diverse
edge gateways accountable for confirmation. Based on BC h̃t = tanh (Wh · [rt Oht−1 , xt ] + bh ) (5)
technology, if the majority of the confirmed edge gateway ut = σ Wu · ht−1′ xt + bu
(6)
passes authentication (the confirmation outcome is true), the
ht = (1 − ut ) ht−1 + ut h̃t (7)
information is labelled as correct otherwise, they are labelled
as incorrect. Lastly, the processed information is transmitted where ht−1 and ht epitomize prior cell state and existing cell
to the management system to detect faults. state; h̃t represents a candidate activation vector; rt and ut
characterize the output of reset and update gates, correspond-
C. FAULT DETECTION USING DBIGRU MODEL ingly; and br , bh , and bu denote bias vectors; Wr , Wh , and
For fault detection in the IoT network, the AVOA with Wu characterize weight matrixes, ⊙ signifies the Hadamard
DBiGRU technique is utilized. Unlike the standard uni- product.
directional RNNs, Bi-directional network includes two
single hidden RNN layers (the backward and forward lay- D. HYPERPARAMETER TUNING USING AVOA
ers) in its framework [25]. Every layer is interconnected Finally, the AVOA technique is utilized for the opti-
with input and output layers, correspondingly. The bidi- mal hyperparameter tuning of the DBiGRU model, which
rectional model enables its network to learn the tourist helps improve the fault detection rate. The hyperparameters
volume sequence from the future and past directions. involved are learning rate, batch size, and number of epochs.
Backward and forward layers in the network read input The AVOA is motivated by the navigational and foraging
series x(x1 , x2 , x3 , . . . , xn−1 , xn ) from two opposite direc- behaviours of African vultures [26]. The biological nature of
tions, in which x forward = (x1 , x2 , x3 , . . . , xn−1 , xn ) and vultures with reference to competing and searching for food is
x backward = (xn , xn−1 , . . . xt . . . , x2 , x1 ), then attain a considered in four distinct phases. Consider N vultures in the
forward hidden state h⃗t (h⃗1 , h⃗2 , . . . , h⃗n−1 , h⃗n ) and back- environment representing the population n = {1, 2, . . . , N }.
← ← ← ← ←
ward hidden state h t ( h 1 , h 2 , . . . , h n−1 , h n ), correspond- Next, calculate the fitness function of every location position.
ingly (Eqs. (1) and (2)). Consequently, backwards and for- Where pn is the probability of choosing the 1st or 2nd group
ward series are concentrated and produce the final output that can be evaluated by
series y(y1 , y2 , . . . yt . . . , yn−1 , yn ) that can be evaluated by Fn
the following expression. pn = PN (8)
n=1 Fn
h⃗t = f wx h⃗ · xt + Wh⃗h⃗ · h⃗ + bh⃗ (1) In Eq. (8), Fn denotes the fitness function of the nth loca-
←
tion. Next, the construction of the 1st and 2nd groups in every
h t = f W ← ← ·xt + W←← · ht+1 + b← (2) iteration can be attained using Eq. (9):
xh hh h
←
yt = wyh⃗ · h⃗t + w
(
← · h t + by (3) first group, pn = L1
yh R (it) = (9)
← second group, pn = L2
where b← , and by denotes the respective bias vector, h⃗t , h t
h The satiated vulture with adequate energy can be moved
denote forward and backward propagation, correspondingly;
f represents a nonlinear activation function (viz., sigmoid to longer distances for searching food, while the hungry one
function); and wx h⃗ , Wh⃗h⃗ , W ← , W←← , W←← , and W ← char- cannot. Where the ranges of L1 and L2 are 0 ≤ L1 , L2 ≤ 1 and
xh hh hy xh L1 + L2 = 1. The rate of being hungry or satiated defines the
acterize the respective weight coefficient.
movement from the exploration stage to the exploitation stage
GRU cell was employed for adding to the abovementioned
that can be formulated by using Eq. (10) and (11):
bi-directional network that is a variant of LSTM cell and
called an improved version of RNN cell. Though GRU was it
A = (2 × rand1 + 1) × x × 1 − +y (10)
barely used for tourist volume prediction, it accomplished the ITmax
desired forecast effects the same as LSTM in other time-series 5 5
it it
forecasts. GRU simplifies the gating model from the 3 LSTM y = h × sinz × + cos × −1
2 ITmax 2 ITmax
gates: forget, input, and output. A standard GRU cell com-
(11)
prises reset and update gates to decrease the computational
cost. Fig. 2 signifies the structure of GRU. The reset gate where x, h, and rand1 denote the random integer differs from
defines what data the existing step could be accessed from −1 to 1, −2 to 2, and 0 to 1, correspondingly; A represents
the vulture with the highest energy, z describes the prospect TABLE 1. Precision rate analysis of BDEV-CAML approach with other
systems under varying classes.
of entering the exploration phase; it and ITmax denote the cur-
rent and maximal iteration, correspondingly. The exploration
phase defines the process of finding food by the African
vultures where the parameter p1 , 0 ≤ p1 ≤ 1 determines the
selection of strategy thus,
(
(6) , p1 ≥ rand2
P (it + 1) = (12)
(8) , p1 < rand2
P (it + 1) = R (it) − D (it) × A (13)
D (it) = |q × R (it) − P (it)| (14)
Here P(it + l) indicate the vultures’ location vector in the Bestvu1ture1 (it) × P (it)
following iteration. A and R(it) are attained, correspondingly B1 = Bestvulture1 (it) − ×A
Bestvu1ture1 (it) × P(it)2
q = 2 × rand3 , where rand3 indicates a random integer
(24)
ranging from zero to one.
Bestvu1ture2 (it) × P (it)
P (it + l) = R (it) − A + rand4 × ((ub − l) × rand5 + lb ) B2 = Bestvulture2 (it) − ×A
Bestvu1ture2 (it) × P(it)2
(15) (25)
Eq. (15), ub and 1b denote the upper and lower boundaries where Best_vulture1(it) and Best_vulture2(it) represent the
of the parameter; correspondingly, Rand4 and Rand5 show optimum vulture of the 1st and 2nd groups, correspondingly,
the random integers within [0, 1]. The exploitation phase has in the existing iteration. The aggressive competition amongst
two distinct stages. The selection of any strategy relies on the vultures is given below:
the variables p2 and p3 . p2 and p3 values lie within [0, 1].
If |F| lies within [1, 0.5], then the exploitation phase enters P(it + 1) = R(it) − |d(it)| × A × Levy(d) (26)
the initial stage that defines two strategies, namely siege fight where d1 signifies the dimension of optimization problem:
and rotating flight:
u×σ
( Levy(x) = 0.01 × ,
(10) , p2 ≥ rand6 1
P (it + 1) = (16) |v| β ′
(11) , p2 < rand6
Y (1 + β) × sin πβ
2 1
In Eq. (16), rand6 denotes a random integer within [0, 1]. σ =( )β (27)
β−1
The solution to Eq. (16) is shown below: Y (1 + 2β) × β × 2 2
P (it + 1) = D (it) × (A + rand7 ) − d (it) (17) Fitness selection is a critical factor in the AVOA method.
D (it) = R (it) − P (it) (18) Solution encoding is used to assess the goodness (aptitude)
of the solution candidate. Then, the accuracy value is the
Next, the rotational flight of the vulture can be modelled
primary condition applied to design a fitness function.
by:
Fitness = max (P) (28)
P (it + l) = R (it) − (M1 + M2 ) (19)
TP
rand8 × P (it)
P= (29)
M1 = R (it) × × cos (P (it)) (20) TP + FP
2π
From the expression, TP characterizes the true positive,
rand9 × P (it)
M2 = R (it) × × sin (P (it)) (21) and FP indicates the false positive value.
2π
where rand8 and rand9 denote two random integers within IV. RESULTS AND DISCUSSION
[0, 1]. if |F| > 0.5, then the exploitation stage enters the next In this section, the experimental outcomes of the BDEV-
stage that describes the two dissimilar approaches of vultures, CAML technique are studied under different measures. The
namely aggressive and accumulation fight and siege to search results are inspected under various types of faults. In Table 1,
for food. Based on the following condition, the selection of and Fig. 3, a comparative precision rate (PR) analysis of the
any strategy can be done: BDEV-CAML technique is given.
( The results indicate that the RF model attains the least
(16) , p3 ≥ rand7
P (it + 1) = (22) efficiency, whereas the PSO-DAWRF and DAWRF models
(19) , p3 < rand7 attain closer results. Nevertheless, the BDEV-CAML tech-
where nique reaches better PR values. For instance, with CPUHog
B1 + B2 fault class, the BDEV-CAML technique obtains increasing
P (it + 1) = (23) PR of 99.55% while the PSO-DAWRF, DAWRF, and RF
2
55374 VOLUME 11, 2023
T. Vaiyapuri et al.: BDEV-CAML Assisted IoT
TABLE 3. Accuracy rate analysis of the BDEV-CAML approach with other TABLE 5. FDA analysis of BDEV-CAML approach with other existing
systems under varying classes. methods [12].
[3] J. Liu, H. Liu, C. Chakraborty, K. Yu, X. Shao, and Z. Ma, ‘‘Cascade [23] K. L. Keung, C. K. M. Lee, and P. Ji, ‘‘Industrial Internet of Things-
learning embedded vision inspection of rail fastener by using a fault detec- driven storage location assignment and order picking in a resource syn-
tion IoT vehicle,’’ IEEE Internet Things J., vol. 10, no. 4, pp. 3006–3017, chronization and sharing-based robotic mobile fulfillment system,’’ Adv.
Feb. 2023. Eng. Informat., vol. 52, Apr. 2022, Art. no. 101540.
[4] T. Mezair, Y. Djenouri, A. Belhadi, G. Srivastava, and J. C.-W. Lin, [24] E. A. Adeniyi, R. O. Ogundokun, S. Misra, J. B. Awotunde, and
‘‘A sustainable deep learning framework for fault detection in 6G indus- K. M. Abiodun, ‘‘Enhanced security and privacy issues in a multi-
try 4.0 heterogeneous data environments,’’ Comput. Commun., vol. 187, tenant environment of green computing using blockchain technology,’’ in
pp. 164–171, Apr. 2022. Blockchain Applications in the Smart Era. Cham, Switzerland: Springer,
[5] M. Ul Mehmood, A. Ulasyar, A. Khattak, K. Imran, H. S. Zad, and S. Nisar, 2022, pp. 65–83.
‘‘Cloud based IoT solution for fault detection and localization in power [25] M. Lu and Q. Xie, ‘‘A novel approach for spatially controllable high-
distribution systems,’’ Energies, vol. 13, no. 11, p. 2686, May 2020. frequency forecasts of park visitation integrating attention-based deep
[6] S. U. Jan, Y. D. Lee, and I. S. Koo, ‘‘A distributed sensor-fault detection learning methods and location-based services,’’ ISPRS Int. J. Geo-
and diagnosis framework using machine learning,’’ Inf. Sci., vol. 547, Information, vol. 12, no. 3, p. 98, Feb. 2023.
pp. 777–796, Feb. 2021. [26] S. R. Nayak, R. K. Khadanga, S. Panda, P. R. Sahu, S. Padhy, and
[7] H. Zhang, R. Li, and C. Shi, ‘‘Deep learning technology of Internet of T. S. Ustun, ‘‘Participation of renewable energy sources in the frequency
Things blockchain in distribution network faults,’’ J. Intell. Syst., vol. 31, regulation issues of a five-area hybrid power system utilizing a sine cosine-
no. 1, pp. 965–978, Aug. 2022. adopted African vulture optimization algorithm,’’ Energies, vol. 16, no. 2,
p. 926, Jan. 2023.
[8] A. H. Sodhro, A. Lakhan, S. Pirbhulal, T. M. Groenli, and H. Abie, ‘‘A
lightweight security scheme for failure detection in microservices IoT-edge
networks,’’ in Sensing Technology. Cham, Switzerland: Springer 2022,
pp. 397–409.
[9] Y. Jiahao, X. Jiang, S. Wang, K. Jiang, and X. Yu, ‘‘SVM-BiLSTM: A fault
detection method for the gas station IoT system based on deep learning,’’
IEEE Access, vol. 8, pp. 203712–203723, 2020. THAVAVEL VAIYAPURI (Member, IEEE) is cur-
[10] M. Dzaferagic, N. Marchetti, and I. Macaluso, ‘‘Fault detection and clas- rently an Assistant Professor with the College
sification in industrial IoT in case of missing sensor data,’’ IEEE Internet of Computer Engineering and Sciences, Prince
Things J., vol. 9, no. 11, pp. 8892–8900, Jun. 2022. Sattam bin Abdulaziz University. With nearly
[11] M. Trivedi, R. Kakkar, R. Gupta, S. Agrawal, S. Tanwar, V.-C. Niculescu, 20 years of research and teaching experience, she
M. S. Raboaca, F. Alqahtani, A. Saad, and A. Tolba, ‘‘Blockchain and deep has published more than 50 research papers in
learning-based fault detection framework for electric vehicles,’’ Mathemat- impacted journals and international conferences.
ics, vol. 10, no. 19, p. 3626, Oct. 2022. Her research interests include data science, secu-
[12] W. Zhang, J. Wang, G. Han, S. Huang, Y. Feng, and L. Shu, ‘‘A data set rity, computer vision, and high-performance com-
accuracy weighted random forest algorithm for IoT fault detection based puting. She is a member of the IEEE Computer
on edge computing and blockchain,’’ IEEE Internet Things J., vol. 8, no. 4,
Society. She is a fellow of HEA, U.K.
pp. 2354–2363, Feb. 2021.
[13] A. Belhadi, Y. Djenouri, G. Srivastava, A. Jolfaei, and J. C.-W. Lin,
‘‘Privacy reinforcement learning for faults detection in the smart grid,’’ Ad
Hoc Netw., vol. 119, Aug. 2021, Art. no. 102541.
[14] H. Huang, S. Ding, L. Zhao, H. Huang, L. Chen, H. Gao, and S. H. Ahmed,
‘‘Real-time fault detection for IIoT facilities using GBRBM-based DNN,’’
IEEE Internet Things J., vol. 7, no. 7, pp. 5713–5722, Jul. 2020. K. SHANKAR (Senior Member, IEEE) received
[15] S. Lavanya, A. Prasanth, S. Jayachitra, and A. Shenbagarajan, ‘‘A tuned the Ph.D. degree in computer science from
classification approach for efficient heterogeneous fault diagnosis in Alagappa University, Karaikudi, India. He is cur-
IoT-enabled WSN applications,’’ Measurement, vol. 183, Oct. 2021, rently a Postdoctoral Fellow with the Big Data
Art. no. 109771. and Machine Learning Laboratory, South Ural
[16] S. Mittra, A. Aprameya, and B. K. Mohanta, ‘‘Smart grid power theft and State University, Russia, and an Adjunct Fac-
fault detection using IoT and blockchain,’’ in Proc. Int. Conf. Advance- ulty of the Department of Computer Science
ments Electr., Electron., Commun., Comput. Autom. (ICAECA), Oct. 2021, and Engineering, Saveetha School of Engineering,
pp. 1–5. Saveetha Institute of Medical and Technical Sci-
[17] Z. Zhang, C. Guan, H. Chen, X. Yang, W. Gong, and A. Yang, ‘‘Adaptive ences, Chennai, India. He has authored/coauthored
privacy-preserving federated learning for fault diagnosis in Internet of over 150 ISI journal articles (with a total impact factor of more than 350) and
Ships,’’ IEEE Internet Things J., vol. 9, no. 9, pp. 6844–6854, May 2022. more than 100 Scopus-indexed articles. Besides, he has authored/edited six
[18] L. Xia, Y. Liang, J. Leng, and P. Zheng, ‘‘Maintenance planning recom- international books published by recognized publishers, such as Springer and
mendation of complex industrial equipment based on knowledge graph CRC. His current research interests include healthcare applications, secret
and graph neural network,’’ Rel. Eng. Syst. Saf., vol. 232, Apr. 2023, image sharing schemes, digital image security, cryptography, the Internet of
Art. no. 109068. Things, and optimization algorithms.
[19] L. Xia, P. Zheng, X. Huang, and C. Liu, ‘‘A novel hypergraph convo-
lution network-based approach for predicting the material removal rate
in chemical mechanical planarization,’’ J. Intell. Manuf., vol. 33, no. 8,
pp. 2295–2306, Dec. 2022.
[20] L. Xia, P. Zheng, J. Li, W. Tang, and X. Zhang, ‘‘Privacy-preserving gradi-
ent boosting tree: Vertical federated learning for collaborative bearing fault
diagnosis,’’ IET Collaborative Intell. Manuf., vol. 4, no. 3, pp. 208–219, SURENDRAN RAJENDRAN (Member, IEEE)
Sep. 2022. received the Ph.D. degree in computer science and
[21] L. Xia, Y. Liang, P. Zheng, and X. Huang, ‘‘Residual-hypergraph convolu- engineering from Sathyabama University, in 2014.
tion network: A model-based and data-driven integrated approach for fault He is currently a Professor with the Department
diagnosis in complex equipment,’’ IEEE Trans. Instrum. Meas., vol. 72, of Computer Science and Engineering, Saveetha
pp. 1–11, 2023. School of Engineering, Saveetha Institute of Med-
[22] K. L. Keung, Y. Y. Chan, K. K. H. Ng, S. L. Mak, C. H. Li, Y. Qin, and ical and Technical Sciences, India. His research
C. W. Yu, ‘‘Edge intelligence and agnostic robotic paradigm in resource interests include cloud computing, the Internet of
synchronisation and sharing in flexible robotic and facility control sys- Things, deep learning, artificial intelligence, and
tem,’’ Adv. Eng. Informat., vol. 52, Apr. 2022, Art. no. 101530. big data.
SACHIN KUMAR (Senior Member, IEEE) HYUNIL KIM received the B.S. degree in applied
received the Ph.D. degree in data mining/machine mathematics and the M.S. and Ph.D. degrees
learning from the Indian Institute of Technology in information security from Kongju National
Roorkee, in 2017. He is currently with the Depart- University, South Korea, in 2014, 2016, and
ment of Computer Science, South Ural State Uni- 2019, respectively. Also, he was a Postdoctoral
versity, Chelyabinsk, Russia. He is also the Head Researcher at the Daegu Gyeongbuk Institute of
of the Data Mining and Virtualization Labora- Science and Technology (DGIST), Daegu, South
tory and a leading Researcher with the Big Data Korea. He is currently a Research Professor with
and Machine Learning Research Laboratory. His Kongju National University. His research interests
research interests include intelligent transportation include AI security with federated learning, decen-
systems, machine learning, data mining, the IoT, and health informatics. tralized identifiers, and blockchain.
He also served as a reviewer for various reputed international journals.