You are currently on the new version of our website. Access the old version .
Smart CitiesSmart Cities
  • Article
  • Open Access

16 July 2025

Generative AI-Driven Smart Contract Optimization for Secure and Scalable Smart City Services

,
,
,
,
,
and
1
FAST School of Computing, Karachi 75300, Pakistan
2
Department of Information Systems, King Abdulaziz University, Jeddah 21589, Saudi Arabia
3
Department of Computer Systems Engineering, Mehran University of Engineering and Technology, Jamshoro 76062, Pakistan
4
Information Systems Department, College of Computer and Information Sciences, Imam Mohammad Ibn Saud Islamic University (IMSIU), Riyadh 11432, Saudi Arabia

Highlights

What are the main findings?
  • The integration of generative AI with blockchain improves contract scalability and enhances data security.
  • The proposed framework outperforms both traditional and other AI-optimized smart contract methods.
What is the implication of the main finding?
  • Enables the development of more efficient, secure, and scalable smart contract-based services in smart cities.
  • Supports energy-efficient and low-overhead deployment of decentralized applications using AI-enhanced blockchain frameworks.

Abstract

Smart cities use advanced infrastructure and technology to improve the quality of life for their citizens. Collaborative services in smart cities are making the smart city ecosystem more reliable. These services are required to enhance the operation of interoperable systems, such as smart transportation services that share their data with smart safety services to execute emergency response, surveillance, and criminal prevention measures. However, an important issue in this ecosystem is data security, which involves the protection of sensitive data exchange during the interoperability of heterogeneous smart services. Researchers have addressed these issues through blockchain integration and the implementation of smart contracts, where collaborative applications can enhance both the efficiency and security of the smart city ecosystem. Despite these facts, complexity is an issue in smart contracts since complex coding associated with their deployment might influence the performance and scalability of collaborative applications in interconnected systems. These challenges underscore the need to optimize smart contract code to ensure efficient and scalable solutions in the smart city ecosystem. In this article, we propose a new framework that integrates generative AI with blockchain in order to eliminate the limitations of smart contracts. We make use of models such as GPT-2, GPT-3, and GPT4, which natively can write and optimize code in an efficient manner and support multiple programming languages, including Python 3.12.x and Solidity. To validate our proposed framework, we integrate these models with already existing frameworks for collaborative smart services to optimize smart contract code, reducing resource-intensive processes while maintaining security and efficiency. Our findings demonstrate that GPT-4-based optimized smart contracts outperform other optimized and non-optimized approaches. This integration reduces smart contract execution overhead, enhances security, and improves scalability, paving the way for a more robust and efficient smart contract ecosystem in smart city applications.

1. Introduction

Smart cities use innovative technologies to improve the quality of life in urban areas by integrating the latest technologies. In the case of smart cities, interoperability refers to the fact that smart services can exchange information with each other easily for collaborative tasks [1,2]. The integration of Internet of Things (IoT) devices with interoperable services significantly enhances the level of automation in smart cities, which reduces the need for human intervention [3,4]. Figure 1 visually represents smart cities’ interoperable services, displaying multiple smart services collaborating within the ecosystem. For instance, residents in smart cities optimize their daily routines by integrating smart home and transportation systems, ensuring efficient commutes through synchronized schedules. Such advancements contribute to synchronized and efficient operations across multiple sectors, including transportation, waste management, and public safety, ultimately benefiting smart city residents with a more convenient and sustainable living environment.
Figure 1. Generic representation of smart cities’ interoperable services, highlighting seamless communication and integration between systems.
Despite the numerous benefits of interoperability with smart services to facilitate various collaborative tasks, ensuring data security during interoperability remains a critical concern. In an automated environment that minimizes human intervention, interoperable services in smart cities encounter heightened risk of exploitation by hackers and malicious entities, exploiting vulnerabilities within the smart city ecosystem. Unauthorized access and data manipulation can lead to severe consequences, emphasizing the need to implement robust security measures to protect critical information and infrastructure [5]. For example, in a scenario where a smart transportation system collaborates with emergency response services, the seamless exchange of real-time data between these services is critical for effective incident management. However, without proper security measures, such as encryption protocols and access controls, this data interchange may become vulnerable to cyber threats, potentially compromising the efficiency and safety of the emergency response.
Blockchain technology can greatly enhance the security, transparency, and efficiency of smart cities’ interoperable services. Decentralized management of data, by virtue of smart contracts and the core security features of blockchain-based platforms, avoids unauthorized access and tampering by these technologies [6]. The core features of blockchain are shown in Figure 2. However, the adoption of blockchain technology in smart cities requires careful consideration of scalability, interoperability, and regulatory compliance factors [7].
Figure 2. Core features of blockchain technology.
While the blockchain platform addresses various core security-related challenges involved in the collaboration of smart services within a smart city-based ecosystem through the support of smart contracts, it also raises concerns about the execution time of smart contracts due to unoptimized code. This is because a major challenge lies in developing real-time decentralized applications that require rapid responses [8]. Optimizing smart contract codes through pre-trained generative AI models can improve the performance and efficiency of smart contracts by reducing unnecessary resource utilization and related costs [9].
Generative AI, particularly via pre-trained models, has the potential to significantly resolve the challenges associated with optimizing smart contracts in blockchain systems. Although there are a multitude of other solutions available to enhance the efficiency of smart contracts, including manual code optimization, layer-2 scaling solutions, and sophisticated compilers, generative AI offers a distinctive advantage [10]. It is capable of analyzing, generating, and optimizing smart contract code with precision, thereby reducing superfluous and computationally intensive steps. Additionally, the integration of generative AI with the fundamental security features of blockchain, such as decentralized verification and cryptographic integrity, fortifies the system. This combination not only improves performance but also cultivates a greater level of confidence in blockchain-based solutions, thereby facilitating their widespread adoption across various industries [11].

1.1. Motivation

This research is driven by the promise of smart cities as a means to enhance the lives of their inhabitants through cooperative endeavors on interoperable services using the best infrastructures and communication technologies available [12]. For example, secure interoperable transportation and weather services combined within smart cities enable the supply of real-time weather information for smart transport users to enhance decision-making in their daily transactions and, thereby, overall effectiveness. Collaborative services are networked and interdependent functions that are put in place to attain specific objectives or meet different needs. Smart services in smart cities thus play an essential role in achieving seamless communication and collaboration between a wide array of smart services [13]. They provide a means of exchanging data, resources, and functional interaction within the networked smart city environment towards improved efficiency, effectiveness, and user experience. However, ensuring the secure and safe deployment of these smart and interoperable services in smart cities is quite a challenging task. Researchers have been exploring this direction by using blockchain technology combined with smart contracts, which support secure and decentralized frameworks for exchanging data and interactions among services. With blockchain, all data remain integral, demonstrating transparency and confidence [14].
Smart contracts automate processes and enforce agreed-upon rules without the requirement of intermediaries. Still, the major challenge is actually optimizing smart contracts. Complex smart contracts with intricate code and resource-extensive execution can somehow hinder scaling and performance issues. These considerations necessitate alternative innovative directions to optimize and make smart contracting efficient, safe, and performant within such dynamic and strongly connected ecosystems that a smart city embodies [15].

1.2. Contribution

This research study explores the integration of blockchain and fine-tuned pre-trained GenAI models to enhance the efficiency of the ITS by addressing challenges related to smart contract transaction overhead and computational efficiency. The key contributions of this work are outlined below:
  • The enhancement of an existing framework for interoperable services [16], where the authors proposed an adaptive security framework for interoperable services in smart cities. The authors proposed a solution with the help of the integration of an SDN (software-defined network) along with blockchain and smart contracts.
  • The optimization of smart contracts within the existing solution using fine-tuned pre-trained generative AI models. This aims to reduce computational overhead and improve the efficiency of smart contract code in the proposed framework.
  • Conducting a comprehensive comparative analysis between optimized and non-optimized smart contract implementations. This analysis evaluates the impact of optimization on key performance metrics, such as computational efficiency, execution time, resource utilization, and overall system throughput.
The rest of the paper is organized as follows. Section 2 discusses the background knowledge of the technologies involved in the development of the existing system, along with an overview of the modifications introduced. Section 3 provides a detailed review of the literature supporting the problem statement. Section 4, Section 5 and Section 6 present an in-depth discussion of the existing system and the proposed modifications, including detailed conceptual diagrams. Section 7 and Section 8 focus on the dataset, its creation, and the implementation of use cases. Finally, Section 9, Section 10 and Section 11 present a comprehensive discussion of the results.

2. Background

To implement interoperable services in smart cities, it is important to understand what interoperability means in the smart city domain. Interoperability plays a crucial role in facilitating communication and collaboration among diverse IoT devices and services, ensuring efficient cross-domain data exchange and utilization. Different types of interoperability exist, including syntactic and semantic data interoperability and network interoperability [17]. However, this research work places specific emphasis on the significance of syntactic interoperability.

2.1. Syntactic Interoperability

In the context of interoperable services within smart cities, syntactic interoperability assumes a critical role in guaranteeing accurate understanding and smooth data processing across diverse platforms and devices. This capability is vital for enabling effective communication and collaboration among disparate systems [18]. Interoperable services prioritize the early establishment of a shared standard encompassing data exchange formats, communication protocols, and other essential specifications well before the actual interoperability phase. This proactive approach ensures that participating devices and services are aligned and well-prepared to seamlessly interact, facilitating a unified and harmonious exchange of data and functionalities [19,20]. Figure 3 illustrates the typical interoperability architecture among smart services in smart cities. Various smart services collaborate and interoperate with each other. For example, this collaboration involves integrating smart transport and smart home to provide real-time information about the school bus location to users within the smart home environment.
Figure 3. Syntactic interoperability between smart services.

2.2. Security Challenges in Syntactic Interoperability

Syntactic interoperability establishes the foundation for seamless data exchange among disparate devices and services in smart cities. It also introduces a range of significant security challenges that demand meticulous consideration. As data traverses various platforms and systems, ensuring the confidentiality, integrity, and authenticity of information becomes imperative. Here are some potential security issues with syntactic interoperability:
  • Data Integrity [21]: Within the context of smart cities and interoperable services, ensuring data integrity is more important to ensure unchanged and spotless data exchange during interoperability with various other services. In the case of improper security measures, data is susceptible to manipulation, and this results in an erroneous outcome or possibly adverse effects. Implementing robust security measures to counteract risks from data manipulation is among the major challenges.
  • Authentication and Authorization [22]: Syntactic interoperability involves the challenge of enabling diverse systems with different access permissions to understand each other’s data. This is a challenge that requires the implementation of robust security measures, including stringent authentication and authorization systems. These are measures that prevent unauthorized access and possible misuse of sensitive data.
  • Interoperability with Legacy Systems [23]: It is a difficult task to integrate modern interoperable services with existing legacy systems. Legacy systems are outdated technologies that were developed before the introduction of contemporary interoperability standards. Strategic planning is essential to achieving smooth communication and data exchange between these legacy systems and the new interoperable services.
  • Data Privacy [24]: Dealing with smart services based on the Internet of Things raises serious privacy concerns. The increasing gathering and use of personal and sensitive data raises concerns about data privacy and people’s ability to govern their information. To guarantee privacy, there must be strong data protection measures, explicit consent methods, and open data management procedures.

2.3. Blockchain

Blockchain is a revolutionary technology that has transformed the way we store, secure, and exchange data. It acts as a digital ledger, a decentralized and unchangeable system for recording information that forms the foundation for various digital transactions and interactions. Operating on a distributed network of computers, blockchain ensures transparency, security, and trust without relying on intermediaries [25]. In the dynamic realm of smart cities, seamless interaction and data exchange among diverse services and systems are essential for achieving maximum efficiency and functionality. Blockchain technology has emerged as a powerful tool for enhancing interoperable services within smart cities, offering a multitude of advantages that contribute to their sustainable development and improved quality of life for residents. Here are some key benefits of integrating blockchain into smart cities’ interoperable services [26].
  • Decentralized Network [27]: A blockchain operates within a decentralized network of nodes, with each node maintaining a comprehensive copy of the blockchain ledger, as shown in Figure 4. This distinctive decentralized architecture ensures that no single entity wields absolute control over the blockchain. This, in turn, not only fosters transparency and security but also constitutes a fundamental advantage for enabling interoperable services within the intricate framework of smart cities.
    Figure 4. Transaction record of blockchain network nodes.
  • Consensus Mechanisms [28]: Blockchain consensus mechanisms enable decentralized agreement, bolster security through verification, and ensure tamper-resistant data for interoperable services in smart cities. They enhance efficiency, security, and future-proof urban interactions by fostering trust, strengthening resilience against attacks, and offering scalability options. Selecting the appropriate mechanism is crucial for optimizing smart city services within evolving landscapes.
  • Enforce Verification [29]: Blockchain enforces a verification procedure by necessitating consensus among network participants, thereby enhancing the security of data exchanged across diverse interoperable services. This verification effectively reduces the likelihood of fraudulent or unauthorized transactions.
  • Smart Contracts [30]: Blockchain platforms enable the use of smart contracts, which are self-executing agreements with predefined rules inscribed on the blockchain. This innovation streamlines interoperable services within smart cities by automating the execution and enforcement of contractual obligations. This not only eliminates the need for intermediaries but also accelerates processes, enhances transparency, and reduces costs.
Blockchain technology combined with smart contracts plays an important role in ensuring security against diverse smart services by guaranteeing secure tamper-proof interoperability among various smart services. Smart contracts are used for the automation of procedures and enforcement of trust, enabling the free flow of data exchange and collaboration with adequate protection for sensitive information. The implementation of non-optimized smart contracts significantly degrades the robustness of smart services with a high amount of computational overhead, reduced responsiveness, and reduced scalability of the system.
Generative AI is emerging as a transformative solution to these problems, offering the ability to efficiently optimize smart contract code. In the context of generative AI models, the performance of smart contracts can be increased, execution overhead may be reduced, and a more resilient and responsive smart city ecosystem would be ensured [31].

2.4. Generative Artificial Intelligence

Pre-trained generative AI models are sophisticated machine learning systems that are developed to generate human-like content, such as text, images, and even code. They are trained on enormous datasets covering a wide range of domains, so they learn complex patterns, relationships, and structures in data. Being “pre-trained” means they have already learned an enormous amount of general knowledge, which can then be fine-tuned for specific tasks [32]. This occurs via machine learning models trained on an enormous range of datasets to generate a range of outputs, including text, photos, audio, code, and even designs. Generative artificial intelligence distinguishes itself by being able to adapt and innovate by understanding complex settings and generating contextually relevant results [33,34]. Some of the popular generative AI models for text-to-text generation are listed below:
GPT (Generative Pre-Trained Transformer): GPT is an open-source family of autoregressive language models designed for text generation [35]. OpenAI developed it with its architecture based on the transformer model, using unsupervised learning on large datasets to predict the next word in a sequence. Its models are fine-tuned to a wide range of applications, including creative writing, summarization, question-answering, code optimization, and many more [36]. The following are the variants of the GPT model:
  • GPT-2 was a landmark generative AI model that introduced a transformer-based architecture that could generate coherent and contextually relevant text. With 1.5 billion parameters, GPT-2 showed the power of large-scale unsupervised learning, outperforming other models in text completion, summarization, and basic programming tasks [37].
  • GPT-3 was considerably more extensive than its foundation, GPT-2, scaling up to 175 billion parameters, thus making it one of the most advanced generative AI models of its time. This huge jump in size allowed GPT-3 to generate highly sophisticated and contextually accurate text across a wide range of domains. It showed exceptional versatility, excelling in text generation, creative writing, coding tasks, and even logical reasoning [38].
  • GPT-4 is built upon the foundation of GPT-3 but with substantial advancements in reasoning, contextual understanding, and multi-modal processing. It provides improvements in handling larger contexts and performing complex multi-turn interactions with more coherence and depth. GPT-4 also shows excellence in technical domains, especially in code generation, debugging, and optimization, and expanded support for programming languages such as Python, C++, and Solidity. Its refined architecture and vast training data made it capable of answering more complex questions, making it the preferred choice for tasks that demand advanced reasoning, logical problem-solving, and domain-specific expertise [39].
Bidirectional Encoder (BERT): BERT is a pre-trained language model introduced by Google, focusing on the training of text in both directions, considering left and right context simultaneously [40]. However, vanilla BERT is not well-suited for code generation tasks as it is not designed for sequential token generation. Unlike autoregressive models such as GPT, BERT excels in understanding and encoding input but lacks the architecture necessary for producing syntactically and semantically coherent code outputs [41]. The variants of BERT are as follows:
  • BERT-Base: The base BERT model (Bidirectional Encoder Representations from Transformers), developed by Google, is a pre-trained language model designed to understand natural language using deep bidirectional representations. It consists of 12 transformer encoder layers, 12 self-attention heads, and approximately 110 million parameters. Unlike traditional language models that read text either left-to-right or right-to-left, BERT reads in both directions simultaneously, allowing it to grasp the full context of each word in a sentence. It is trained on two core tasks: Masked Language Modeling (MLM), where random words are hidden and predicted, and Next Sentence Prediction (NSP), which aids in understanding relationships between sentences [40].
  • BERT-Large: The BERT-Large model is an extended version of Google’s Bidirectional Encoder Representations from Transformers (BERT), designed to capture even deeper contextual understanding of language. It consists of 24 transformer encoder layers, 16 attention heads, and has approximately 340 million parameters, significantly more than the base BERT model. Like its smaller counterpart, BERT-Large is trained using a bidirectional approach with Masked Language Modeling (MLM) and Next Sentence Prediction (NSP) as its core training objectives [42].
  • DistilBERT: A lightweight, distilled version of BERT, designed to reduce model size and improve inference speed while retaining most of the original performance [43].
T5 (Text-to-Text Transfer Transformer): A unified framework developed by Google that casts all natural language processing tasks into a text-to-text format, including translation, summarization, and question-answering. Its versatility comes from this uniform format, allowing it to handle a wide range of language understanding and generation tasks with high accuracy [44]. The following are the variations of T5 Transformer:
  • T5-Base: This model contains approximately 220 million parameters and is suitable for general NLP tasks under moderate computational constraints. It balances performance and efficiency.
  • T5-Large: With about 770 million parameters, this version achieves higher accuracy in complex language tasks such as summarization and translation but requires more resources.
  • mT5 (Multilingual T5): Designed for multilingual applications, mT5 is trained in 101 languages and is available in multiple sizes (small to XL), making it highly effective for translation and cross-lingual tasks.
Codex is a specialized AI model developed by OpenAI and trained on both natural language and a large corpus of publicly available source code. It powers tools like GitHub Copilot and is capable of generating syntactically correct code in multiple programming languages. Codex is particularly relevant for smart contract development due to its code generation capabilities and contextual understanding of programming logic [45]. This version is fine-tuned from GPT-3 using a large corpus of public source code. It supports a variety of programming languages, including Python, JavaScript, and Solidity, and powers tools like GitHub Copilot.
Table 1 below highlights the most popular generative AI models, including their key functionalities and notable variants. In this research article, we focus on GPT-based models, specifically GPT-2, GPT-3, and GPT-4, due to their proven effectiveness in code generation tasks, particularly in languages such as Python and Solidity, which aligns closely with our objective of generating smart contracts.
Table 1. Generative AI models, features, and renowned variants.
Table 1. Generative AI models, features, and renowned variants.
ModelFeaturesRenowned Variants
GPT [46]Text generation, completion, summarizationGPT-1, GPT-2, GPT-3, GPT-4
BERT [47]Contextual embeddings, NLUBERT, RoBERTa, DistilBERT
T5 [44]Text-to-text, translation, summarizationT5, mT5
Codex [45]Code generation, multi-language supportCodex (OpenAI), GitHub Copilot

2.5. Generative AI for Smart Contract Optimization

GPT-2, GPT-3, and GPT-4 are transformer-based language models developed by OpenAI. They have shown spectacular capabilities in text generation that looks human-like, as well as supporting a range of NLP tasks. All three models rely on the transformer architecture that uses self-attention mechanisms for capturing long-range dependencies in data, making it suitable for structured content, including programming code, understanding, and generating. In this work, we selected the GPT-2, GPT-3, and GPT-4 models for code optimization in terms of code complexity optimization and code loop optimization.
Each model supports multi-language generation, including Python, C, C++, and Solidity, which makes them ideal for cross-language analysis and optimization tasks. They can generate syntactically and semantically correct code snippets, which are helpful in developing smart contracts that adhere to best practices in terms of code complexity and loop optimization. Specialized models like CodeBERT can handle similar problems, but we used GPT-2 and GPT-3 for the following reasons:
  • Generating Optimized Code: Each model is very good at generating optimal code, making them suitable for the rewriting of loops to reduce complexity and execution cost. For example, they can flatten nested or unbounded loops into more efficient constructs and reshape code to have fewer state changes.
  • Efficiency of Lightweight Variants: With the light variants, GPT-2 and smaller GPT-3 models, we can achieve a good balance between computational efficiency and performance. This is particularly valuable when targeting tasks with limited computational resources or rapid turnaround requirements.
  • Domain Adaptability: The general-purpose code understanding capabilities of GPT models can be fine-tuned using a customized dataset of smart contracts in the Solidity domain, enabling them to detect inefficiencies due to loops and redundant variables. Thus, they are tuned toward the exact issues at play within the domain of gas optimization within blockchain settings.

2.6. Generative AI Integration with Blockchain

Blockchains are rapidly being integrated into the smart city ecosystem to enhance interoperability across different smart city services [48]. However, the integration of this technology is facing severe challenges that relate to efficiency, scalability, and cost. One of the major challenges is that the code associated with blockchain transactions is complex in nature, especially when invoking or deploying smart contracts [49]. The computational complexity and redundancy associated with smart contract code increase code complexity and high execution costs further [50]. These challenges make the process more time-consuming and less cost-efficient. Generative AI promises to optimize the performance of smart contracts, hence reducing redundant code items. This will in turn minimize the complexity of the code and improve the overall efficiency. This will make the blockchain infrastructure much more streamlined, robust, and suitable for smart city ecosystems.
  • Role of Generative AI in Smart Contract Optimization: Fine-tuned generative AI models can be effectively applied to optimize smart contract code, automating the process of improving efficiency. These models analyze existing smart contracts for inefficiencies, such as redundant computations, unnecessary logic, and bloated code. Once identified, AI creates optimized versions of the code that retain the same functionality but impose less computational load on the blockchain network [51].
  • Reduced Computational Overhead: One of the fundamental benefits of embedding AI with blockchain is reducing computational overhead. In traditional blockchain networks, a substantial number of nodes are typically utilized for transaction processing and verification, in turn involving a great deal of computational usage [11].

4. Existing Framework

The existing framework [16], as shown in Figure 5, incorporates a strong security architecture to make it feasible to provide collaborative services in municipal smart cities, especially by the incorporation of software-defined networking, blockchain technology, and smart contracts. It aims to overcome serious challenges in heterogeneous IoT networks, including scalability, security, and trust issues. A three-layered architecture comprises (1) the perception layer, which acquires environmental data; (2) the controller layer, responsible for implementing SDN to manage traffic, verify trust, and ensure secure communication; and (3) the application layer, where decentralized applications are hosted alongside security policies. The key feature of the framework is its use of SDN to simplify IoT network management by separating the data plane for packet forwarding from the control plane for routing decisions, thus allowing scalable and programmable interactions. The proposed security framework for interoperable services in smart city ecosystems integrates MultiChain blockchain to provide decentralized, immutable, and transparent data management, thereby ensuring data integrity and security. It uses a combination of local and global blockchains, where intra-network tasks are handled by the local blockchain and inter-network policies are enforced by the global blockchain. Smart filters are used in MultiChain to validate transactions and data while performing collaborative tasks. Three kinds of smart contracts will be deployed within the framework, namely authenticity contracts for authenticating the legitimacy of IoT devices, trust contracts for managing and updating trust scores of devices, and authorization contracts for access control based on the trust indexes. However, the implementation of smart contract execution in this framework is manual, requiring a responsible entity to write and deploy smart contracts that govern authenticity, trust, and authorization policies.
Figure 5. Existing proposed security framework.
The existing framework uses a single smart contract that performs the automation of security implementation within the framework. This is the smart contract performed in Python that represents the central component that enforces security policies and handles secure interactions in the framework, known as the service security contract. However, the current implementation is non-optimized and results in inefficiencies in execution time, resource use, and computational overhead. Despite these limitations, the smart contract effectively integrates with the security framework, allowing automated decision-making and policy enforcement. Further optimization is required to enhance its performance, reduce processing costs, and improve the overall system efficiency while maintaining robust security mechanisms. Algorithm 1 demonstrates the implementation of a smart contract within the existing security framework for smart city services. It ensures secure authentication, authorization, and trust-based access control when multiple services share data. In this framework, various smart city services, such as transportation, weather, and telecommunication services, exchange information to execute the use case of disaster management, necessitating strict access control mechanisms. The authentication process verifies users based on their address and password before allowing access to any service. If the user is not registered or provides incorrect credentials, access is denied. Once authenticated, the authorization mechanism decides whether the user has permission to access a specific service or dataset. The trust factor also plays a significant role in decision-making: users with a trust level below the required threshold are restricted from accessing sensitive services.
Algorithm 1 Non-Optimized Authentication, Authorization, and Trust Mechanism.
1:
Variables:
2:
    users: Stores user data (address, role, trust level)
3:
    minTrustLevel: Required trust for access
4:
User Authentication
5:
Input: userAddress, password
6:
if userAddress not in users then
7:
   Reject (User not registered)
8:
end if
9:
if password incorrect then
10:
   Reject (Invalid credentials)
11:
end if
12:
Grant access
13:
Authorization and Trust Check
14:
Input: userAddress, requestedAction
15:
if userAddress not in users then
16:
   Reject (User not found)
17:
end if
18:
if users[userAddress].trustLevel < minTrustLevel then
19:
   Reject (Trust level too low)
20:
end if
21:
Approve action

Proposed Modification in Existing Framework

In the existing framework, the local blockchain layer, the service security protocol operates in two different modes:
  • Administrative Mode: Designed for distributed administrative nodes. These nodes are responsible for enforcing authentication, authorization, and trust rules to govern decentralized applications. The rules for decentralized applications are uploaded manually.
  • Non-Administrative Mode: Designed for decentralized applications. These nodes integrate the rules enforced by administrative nodes into their applications and also perform security verification to ensure the decentralized applications function securely and efficiently.
The administrative nodes are based on a static smart contract deployment with non-optimized code, which limits flexibility and adaptability in a dynamic smart city environment. In this regard, we propose a generative AI approach where the generation of smart contracts becomes dynamic and tailored to the evolving needs of multiple interoperable services. Services such as transportation, weather monitoring, and telecommunications can define their authentication, authorization, and trust requirements. The generative AI model then processes these inputs and automatically generates an optimized smart contract, ensuring efficiency, scalability, and security. This approach not only reduces human effort in contract development but also improves adaptability, allowing real-time customization of security policies based on service-specific needs.
Figure 6 shows the modification of the existing framework service security protocol mechanism. The new system uses Generative AI models such as GPT-2, GPT-3, and GPT4 to produce optimized Python-based smart contracts or Solidity code with real-time needs from multiple interoperable services. These services, like transportation, weather monitoring, and telecommunications, define authentication, authorization, and trust specifications, and the AI models are structured into a JSON-based format for processing. Several rounds of refinement iterations in the framework occur so that the smart contracts generated by the framework will be efficient, scalable, and adaptable to particular security needs with minimum manual effort in the dynamic environment of a smart city.  
Figure 6. Modifications of service security protocol.
  • Generative AI Integration: The updated framework uses GPT-2, GPT-3, and GPT-4 models to automate the creation of smart contracts. The process starts with fine-tuning these models using relevant datasets, enabling them to generate optimized Python and Solidity smart contracts tailored to the system’s requirements. This approach eliminates the need for manual coding and minimizes human errors, ensuring higher accuracy and faster execution.
  • Requirement Gathering and Code Generation: Security requirements, such as authentication, authorization, and trust evaluation, are captured through a structured prompt-based input. This data is converted into JSON format and serves as the foundation for generating optimized security code. The modular structure of the generated code ensures adaptability and compatibility with various IoT- and blockchain-based systems.
  • Execution Testing and Error Feedback: A critical addition to the framework is the Execution Testing module. The generated smart contract undergoes rigorous testing, including compilation checks and functionality tests. If errors are detected, the system sends feedback to the AI models, which regenerate the smart contract by addressing the identified issues. This iterative loop ensures that the final output is error-free and ready for deployment.
  • Enhanced Deployment: Once validated, the optimized smart contract is deployed either to a local blockchain or a global blockchain environment, depending on the system’s operational scope. This deployment process is streamlined and secure, ensuring that the smart contracts function as intended in real-world scenarios.
  • Continuous Improvement: The framework emphasizes ongoing monitoring and feedback. After deployment, the system collects performance metrics and potential issues, feeding them back into the AI models for future refinements. This closed-loop approach ensures that the framework evolves dynamically to meet emerging security challenges.

5. Dataset Discussion

We developed a custom dataset specifically tailored for fine-tuning generative AI models like GPT-2, GPT-3, and GPT-4 to optimize smart contracts by reducing execution complexity and transaction costs. The dataset is designed to address key inefficiencies in smart contract code, particularly focusing on loop optimization and redundant variable reduction as these are among the critical contributors to the increased execution costs of smart contracts based on Python and Solidity code.

5.1. Dataset Pipeline for Optimizing Smart Contracts with GenAI

We developed a custom dataset specifically tailored for fine-tuning generative AI models such as GPT-2, GPT-3, and GPT-4, aimed at optimizing smart contracts by reducing execution complexity and transaction costs. The dataset addresses key inefficiencies in smart contract code, particularly focusing on loop structures and redundant variable usage, which are critical contributors to increased computational cost in both Python- and Solidity-based implementations.
To construct the dataset, we began with a baseline access control contract written in both Python and Solidity. Using generative AI models, we programmatically generated 500 syntactic and semantic variants for each language. These variations were designed to introduce code smells, redundant computations, and gas-expensive patterns while preserving the core logic of the contract, thereby capturing a range of inefficient coding patterns. Our dataset is represented as shown in Equation (1):
X = x 1 y 1 x 2 y 2 x N y N
where
  • x i : Code snippet (input).
  • y i : Label, where y i = 1 for optimized code and y i = 0 for non-optimized code.
  • N: Total number of examples in the dataset.
To ensure the optimized variants are both computationally efficient and maintainable, we applied transformations that minimize redundant operations, eliminate unnecessary variable assignments, and enhance loop efficiency. These optimizations were validated using existing online tools such as PyLint [82] for Python and Solc [83] for Solidity. These tools facilitate static code analysis and refinement by detecting inefficient patterns and applying consistent automated improvements. Table 4 summarizes the optimization tools used publicly in optimization pipeline.
Table 4. Python and Solidity code optimization tools.
Table 4. Python and Solidity code optimization tools.
ToolDescriptionFocus
Python Optimization Tools
PyLint [84]Static code analyzer for PythonCode quality, Execution speed
PyBADS [85]Auto code formatter for better readabilityReadability
Solidity Optimization Tools
Solc [86]Solidity compiler with automatic optimization passesGas efficiency, Bytecode optimization
Slither [81]Static analysis framework for Solidity smart contractsVulnerability detection, Code quality
Mythril [80]Security analysis tool using symbolic executionSecurity analysis, Loop inefficiencies

5.2. Example Dataset

The dataset represented as follows:
D = for i in range ( n ) : print ( i ) 1 for i in range ( n ) : temp = i ; print ( temp ) 0 result = [ f ( i ) for i in range ( n ) ] 1 for i in range ( n ) : result . append ( f ( i ) ) 0
In this dataset, a label of ‘1’ denotes optimized code, whereas a label of ‘0’ signifies non-optimized code. The optimizations primarily focus on
  • Loop Efficiency: Using list comprehensions or direct function calls to reduce unnecessary iterations and memory overhead.
  • Variable Minimization: Eliminating redundant variable assignments that increase memory usage and reduce readability.
  • Computational Complexity Reduction: Ensuring that each code snippet executes with minimal operations while maintaining functionality.
Algorithm 2 demonstrates the implementation of a smart contract labeling pipeline that automates the classification of source code as either “Optimized” or “Not Optimized.” The process begins by reading each row from a CSV file containing code snippets and their corresponding programming language (Python or Solidity). Depending on the language, the pipeline performs static analysis using appropriate tools: PyLint for Python and Solc with Slither for Solidity.
Algorithm 2 Data Labeling Pipeline for Smart Contract Optimization.
1:
Input: CSV file with columns [code, language]
2:
Output: JSON file with labeled dataset [code, metrics, label]
3:
Step 1: Read Source Data
4:
for each row in CSV do
5:
   Extract code and language
6:
   Step 2: Language-Specific Analysis
7:
   if language == “python” then
8:
     Save code to a temporary .py file
9:
     Run PyLint to extract score, warnings, and errors
10:
   if score ≥ 8.5 warnings ≤ 2 errors == 0 then
11:
        label ← “Optimized”
12:
     else
13:
        label ← “Not Optimized”
14:
     end if
15:
  else if language == “solidity” then
16:
     Save code to a temporary .sol file
17:
     Run Solc to check for successful compilation
18:
     Run Slither to count security warnings
19:
     if compiled and Slither warnings == 0 then
20:
        label ← “Optimized”
21:
     else
22:
        label ← “Not Optimized”
23:
     end if
24:
   end if
25:
   Store code, language, extracted metrics, and assigned label
26:
end for
27:
Step 3: Export Labeled Data
28:
Save all labeled entries to a JSON file
For Python code, the pipeline evaluates code quality based on PyLint’s score, warning count, and error count. If the score is above a predefined threshold (e.g., 8.5), warnings are minimal, and no errors are detected, the code is labeled as optimized. Similarly, for Solidity code, successful compilation via Solc and zero security warnings from Slither are used as criteria for labeling the code as optimized. Each code sample is then annotated with extracted metrics and its corresponding label, and the final labeled dataset is exported in JSON format for downstream tasks, such as fine-tuning generative AI models or model evaluation. The default thresholds and annotation logic used in the labeling process are summarized in Table 5. These criteria are used to ensure consistency and objectivity when categorizing smart contract code as either optimized or not optimized.
Table 5. Threshold criteria and annotation rules for code labeling.

5.3. Fine-Tuning Generative AI Models for Smart Contract Optimization

We fine-tuned the existing GPT-2, GPT-3, and GPT-4 models, focusing on optimization in smart contracts. Although these models are known for generating optimized code, we have tuned them according to our specific environment requirements. Algorithm 3 shows the implementation of the fine-tuned process. GPT-2, GPT-3, and GPT-4 fine-tuning for smart contract optimization is a multi-step process to improve the code in various regards.
Algorithm 3 Fine-Tuning GPT-2/GPT-3/GPT-4 for Smart Contract Optimization.
1:
Input: Pre-trained model M, dataset D, learning rate η , batch size B, epochs E
2:
Output: Fine-tuned model M * optimized for efficient loops and variable usage
3:
Step 1: Data Preparation
4:
Construct dataset D with labeled examples of optimized and non-optimized smart contract code
5:
Tokenize D using the model’s tokenizer
6:
Step 2: Model Initialization
7:
Load pre-trained model M
8:
Step 3: Define Loss Function
9:
Use loss function L to penalize redundant variables and inefficient loops
10:
Step 4: Fine-Tuning
11:
for epoch e = 1 to E do
12:
   for each batch b B  do
13:
     Compute loss L and update model parameters via gradient descent
14:
   end for
15:
end for
16:
Step 5: Evaluation
17:
Validate M * on a test set to assess loop efficiency and variable minimization
18:
Step 6: Deployment
19:
Deploy M * into the smart contract orchestration environment
The first part involves preparing the dataset with labels representing both optimized and non-optimized smart contract code, leaning toward efficient loop structures and elimination of redundant variable usage. The tokenized dataset is then used in a pre-trained model that acts as the base for fine-tuning. A custom loss function is designed that penalizes redundant variables and inefficient loops to make sure the model learns how to generate optimized code. In training, the model iterates through the dataset in batches and computes loss while adjusting parameters via gradient descent. The process repeats for multiple epochs to improve the ability of the model to generate efficient smart contract code. After being trained, it is tested upon a validation set to see whether the loop has been improved along with the number of variables that have been reduced. The model is saved with fine-tuning and is utilized for producing optimal smart contract code in real-world applications. The model is allowed to consistently provide high-quality and performance-optimized code with minimized computational overhead and redundancy.

5.4. Performance Metrics for Evaluating Pre-Trained Generative AI Models

The main performance metrics to assess generation quality in generative AI models include BLEU score, precision, recall, and F1-score, among others.
  • BLEU scores measure the quality of code generated relative to a reference code by correlating n-gram overlap and accuracy. High BLEU scores imply higher similarity to expected structures and codes. The basic equation according to [87] for BLEU score is presented in Equation (2):
    BLEU = BP · exp n = 1 N w n · log p n
    where
    BP = 1 if c > r e ( 1 r / c ) if c r
    The BLEU score is a metric used to evaluate the quality of generated code (or text) by comparing it with a reference output. It calculates the geometric mean of modified n-gram precision ( p n ) across different n-gram lengths (typically up to 4), weighted equally by w n . To prevent short outputs from scoring artificially high, a brevity penalty (BP) is applied based on the ratio of candidate length (c) to reference length (r). A higher BLEU score indicates greater similarity to the reference code in terms of structure and content.
  • Precision measures the accuracy of positive predictions. It tells us what proportion of the items labeled as positive by the model are actually correct. High precision means that, when the model predicts a positive class (e.g., a correct code snippet, a bug, or a class label), it is usually correct. Equation (3) presents the formula for calculating precision [88]:
    Precision = T r u e P o s i t i v e ( T P ) T P + F a l s e P o s i t i v e ( F P )
  • Recall, also known as sensitivity or true positive rate, is the model’s ability to capture all the positive instances. It computes the ratio of true positives to the sum of true positives and false negatives. Equation (4) presents the formula for calculating recall [88]:
    Precision = T r u e P o s i t i v e ( T P ) T P + F a l s e N e g a t i v e ( F N )
  • The F1-score is the harmonic average of precision and recall, where both false positives and false negatives are considered. It is particularly useful when the class of interest is not uniformly distributed. Equation (5) presents the F1-score calculation formula [88]:
    F 1 - Score = 2 · Precision · Recall Precision + Recall
Table 6 and Table 7 present the performance metrics of our fine-tuned GPT-2, GPT-3, and GPT-4 models, offering a comparative analysis of their effectiveness in generating accurate and well-structured code in both Python and Solidity. The BLEU score, precision, recall, and F1-score for the GPT-2, GPT-3, and GPT-4 comparisons indicate that the performance of these models differs significantly when it comes to code generation. For the performance matrix of Python, we noted that the BLEU score for GPT-4 is 0.81, for GPT-3 0.75, and GPT-2 0.64. This shows that GPT-4 produces syntactically and semantically correct code more than GPT-2 and GPT-3. It indicates that GPT-4 has a better understanding of the programming structures and yields more refined outputs. Additionally, GPT-4 shows higher precision (0.85) than GPT-2 and GPT-3, which means that it produces fewer incorrect or unnecessary code tokens, and therefore more reliable outputs. A similar trend is observed in both the recall and F1-scores, further supporting GPT-4’s superior performance.
Table 6. Python code performance metric comparison of GPT-2, GPT-3, and GPT-4 models.
Table 7. Solidity code performance metric comparison of GPT-2, GPT-3, and GPT-4 models.
From the performance metrics for Solidity, we observed a similar pattern of results as in the Python case, with GPT-4 outperforming GPT-3 and GPT-2. However, the overall performance metrics showed slight degradation across all models. This decline can be attributed to the fact that Solidity is a domain-specific language with stricter syntax rules, limited training data, and a less diverse codebase in comparison to Python, which affects the models’ ability to generate accurate and optimized code.

6. Use-Case Implementation and Experimental Testbed Discussion

To evaluate the practicality and efficacy of the existing adaptive security framework, the authors integrated the collaborative weather emergency response services into the framework. This use case serves as an illustrative scenario, demonstrating the seamless integration of three Python-based client–server services: the smart disaster management service, the smart ambulance service, and the smart weather service. The Python client–server applications utilize standard APIs, namely OpenStreetMap and OpenWeatherMap, to seamlessly integrate the use case into the SDIoT architecture.
  • OpenWeatherMap [89]: The OpenWeatherMap API grants us access to real-time weather data, serving as a critical component for integrating current weather information into our emergency response systems. This data encompasses essential parameters such as temperature, relative humidity, wind speed, and precipitation, which are pivotal for making well-informed and timely decisions during emergency situations. By leveraging this API, we enhance the effectiveness of our emergency response services in smart cities, prioritizing the safety and well-being of residents, especially during adverse weather conditions. Table 8 presents the detailed features and parameters utilized in developing the smart weather service.
    Table 8. OpenWeatherMap features.
    Table 8. OpenWeatherMap features.
    FeaturesParameterDescription
    Current Location [90]Output parameter
    1. Latitude Position
    2. Longitude Position
    1. Provides current locations of weather conditions, such as local drizzle, heavy rain, and urban flooding.
    2. We used Weather.id feature, responsible for providing the current and predicted data of rain and flood conditions.
    Current Air Pollution [89]Output parameter
    1. Air Index
    2. Predictive data Input parameter
    3. Current position
    1. The Air Pollution API offers up-to-date, predictive, and past air pollution data for any requested location.
    2. It also provides the details of specific gases, such as carbon monoxide and nitrogen monoxide in the environment.
  • OpenStreetMap API [91]: The OpenStreetMap API is a valuable resource for geospatial data, offering detailed maps, routes, and location-specific information. As an open-source platform, it allows users to access and contribute to a vast database of geospatial data, including roads, structures, and points of interest. One of the key advantages of the OpenStreetMap API is its ability to provide detailed maps for different regions, featuring comprehensive information on roads, structures, and other features. This functionality is especially beneficial for emergency response services as it enables them to swiftly identify the locations of emergencies and plan the most efficient routes for rapid response. Table 9 presents the detailed features and parameters utilized in developing the smart ambulance service.
    Table 9. OpenStreetMap features.
    Table 9. OpenStreetMap features.
    FeaturesParameterDescription
    Current Location [92]Output parameter
    1. Latitude Position
    2. Longitude Position
    1. Overpass API is a powerful tool that allows users to extract specific data from the OpenStreetMap database.
    Best Route [93]Output parameter
    1. Best Route Input parameter
    2. Current position
    1. The GraphHopper API is a powerful routing engine that utilizes OpenStreetMap data to calculate the most efficient route between two locations.

6.1. Testbed and Experimental Setup

To evaluate the feasibility and effectiveness of existing security frameworks using both optimized and non-optimized Python- and Solidity-based smart contracts, we have successfully established a robust testbed and experimentation environment for an interoperable smart city service network. This setup was implemented in two distinct ways: one based on the original MultiChain-based framework (as used in the base paper) and the other using a replicated Solidity-based version deployed on an Ethereum-compatible environment through Python’s Web3 library. Furthermore, the implementation of the proposed security framework, along with the use case, was simulated using the Cooja Simulator [94]. Cooja (Cooja Simulator) is a powerful tool specifically designed for simulating wireless sensor networks (WSNs) and Internet of Things (IoT) networks. As an open-source tool, Cooja enables the simulation and testing of network protocols, applications, and devices in a virtual environment. It is built on the Contiki operating system, which is tailored to meet the unique requirements of low-power and resource-constrained IoT devices [95]. Cooja supports the simulation of various network protocols commonly used in WSNs and IoT networks, including IPv6, RPL (Routing Protocol for Low-Power and Lossy Networks), 6LoWPAN (IPv6 over Low-Power Wireless Personal Area Networks), and CoAP (Constrained Application Protocol) [96]. This extensive support allows developers to comprehensively evaluate the efficacy and behavior of these protocols under diverse network conditions and scenario types. By integrating the Cooja Simulator into our testbed, we are able to conduct thorough and accurate evaluations of our proposed security framework in a controlled virtual environment [97].
In the existing framework, the authors implemented their solution using MultiChain, a permissioned blockchain platform based on the Bitcoin protocol, primarily leveraging stream-based data handling without native smart contract support. To enable a comparative evaluation, we developed a replicated version of the proposed system using Solidity smart contracts deployed on an Ethereum-compatible network. For this purpose, we utilized the Web3.py [98] library in Python, which offers a robust interface for interacting with Ethereum nodes via JSON-RPC. The smart contracts were compiled using the Solc compiler and deployed to a local blockchain environment, such as Ganache. Web3.py enabled us to invoke contract functions, send transactions, and monitor emitted events directly through Python, facilitating detailed interaction and automation. This comparative setup allowed us to analyze the behavioral and performance differences between the original MultiChain-based implementation and our Solidity-enabled replicated version.

6.2. Testbed Schema

The existing framework relies on the computational capabilities of two essential components within the SDIoT architecture: the MultiChain blockchain platform and the SDN controller. It is important to note that MultiChain is a private (permissioned) blockchain, whereas the comparative blockchain used in our replication is a public Ethereum-compatible blockchain. This distinction allows for a comparative evaluation of privacy, performance, and flexibility across different blockchain infrastructures within smart city environments. These components play integral roles in enabling seamless and secure message transmission between diverse services, ensuring effective interoperability. The MultiChain and Ethereum blockchain platform functions as a tamper-resistant ledger, facilitating secure data exchange and communication across various smart services. Its computational efficiency directly influences the speed and reliability of transaction validation and smart contract execution for seamless interoperable smart services in smart cities for collaborative tasks [99]. Likewise, the SDN controller, a core element of the SDIoT architecture, manages network infrastructure and traffic flows. Its computational prowess significantly impacts network allocation and management efficiency. A dynamic and resilient SDN controller optimizes message flow among services, minimizing latency and guaranteeing timely data transmission [100].
To evaluate the performance of the proposed security framework due to the integration of the Ethereum and MultiChain blockchain platform with SDIoT architectures, we selected the following performance evaluation matrix from existing security governance solutions. The performance evaluation matrix is an essential tool to assess the effectiveness and efficiency of security governance solutions. It provides a comprehensive overview of key performance indicators (KPIs) that are used to measure the performance of security solutions.
  • Throughput/sec: Throughput per second is a metric that quantifies a system’s capability to handle a specific quantity of requests within a one-second interval. In the context of our existing framework, we aim to evaluate the combined throughput of the SDIoT and blockchain components with both optimized and non-optimized smart contract execution. This evaluation involves assessing the number of requests sent from IoT client nodes to the adaptive engines, which facilitate the connection between the local and global blockchains via a client–server architecture. A high throughput per second indicates the capacity of the SDIoT and blockchain components within the proposed security framework to efficiently handle a substantial volume of requests in a short period of time. This leads to improved response times. On the other hand, a lower rate of data processing per unit of time may lead to delays in service delivery and extended response times.
  • Execution of Smart Contract/ms: Optimized and non-optimized smart contract execution per millisecond (ms) has a direct impact on the responsiveness and effectiveness of blockchain-based applications. A high smart contract execution speed indicates that the system can process and execute a large number of smart contracts in a short amount of time, allowing for quicker transaction confirmations and an enhanced user experience. On the other hand, a slow smart contract execution speed can result in delays in transaction processing, longer confirmation times, and potential bottlenecks in the system.
  • Operational Delay/ms: Operational delay, measured in milliseconds (ms), represents the time needed to process a request originating from the global blockchain. This request traverses the local blockchain and subsequently reaches the SDN controller of the interoperable service for the verification of the request’s legitimacy. This assessment parameter holds significant importance in understanding the interaction between the client–server components spanning across the local and global blockchains in both optimized and non-optimized smart contracts.
The testbed we have designed prioritizes two essential processes involved in collaborative message flow, which are crucial for ensuring the interoperability of services in smart cities. These processes include
  • Fetching Smart Contracts from Global Blockchain to Local Blockchain: The global blockchain is responsible for storing the contracts of administrative nodes to enforce security rules for smart service applications. Meanwhile, the local blockchain functions as an administrative node, responsible for executing services and ensuring compliance with predefined security policies.
  • Sending and Receiving Encrypted Messages Between Interoperable Services: This process ensures secure communication across different interoperable services, maintaining data integrity, confidentiality, and authentication in smart city environments.
The investigation is conducted by evaluating these two workflows while executing optimized and non-optimized smart contracts fetched from the blockchain. In the experiment, we gradually increase the number of collaborative service request messages while keeping the number of IoT client nodes constant. The message-sending rates are also incrementally increased at 600 ms, 120 ms, 60 ms, 30 ms, 15 ms, and 5 ms intervals. We implemented the testbed using four physical machines, out of which three machines function as smart interoperable services while the fourth machine serves as the blockchain server, responsible for enforcing security governance on the connected services. The configuration details of each machine are provided in Table 10, which outlines the specifications and settings of the hardware used.
Table 10. Hardware configurations of the four physical machines.

7. Experiment 1: General Workflow of Fetching Smart Contracts from Global Blockchain

The general process of setting up the system starts with obtaining the smart contract from the global blockchain to the local blockchain, as shown in Figure 7. In the base paper, the global blockchain functions as a decentralized distributed administrative node, and the local blockchain of the same platform functions as a decentralized distributed application called DApps. In our Ethereum-based replication, we simulate the global and local blockchains by defining two separate wallet addresses, effectively representing distinct administrative and decentralized application layers within the same network. A decentralized application (DApp) functions as the local blockchain, in charge of running commands through smart contracts retrieved from the global blockchain. This fetching process ensures that either an optimized or non-optimized smart contract is securely transferred from the global blockchain to the local blockchain, enabling seamless execution of interoperable services in smart city environments. The following are the general steps used in the workflow of fetching both smart contracts (optimized and non-optimized) from the global blockchain to the local blockchain for both Python and Solidity cases.
Figure 7. Smart contract fetching.
  • In the first step, SDN controller creates the request to fetch the optimized and non-optimized smart contracts from the global blockchain for both Python and Solidity cases by encrypting the request message with the public key of the local blockchain and signing the message with its secret key, as shown in Equation (6).
    R e q M s g E n c = R e q ( O p t / N o n O p t ) s k p b
  • In the second step, this request is forwarded to the module request contract. This module is responsible for verifying the received message by decrypting the message with its private key of the local blockchain and verifying the signature of the SDN controller, as shown Equation (7).
    R e q M s g D e c = R e q ( O p t / N o n O p t ) s k p r
    After decrypting the message, it signs the message again with its private key and encrypts the message with the public key of the global blockchain, as shown Equation (8), and forwards the fetch request of smart contract to the global blockchain.
    R e q M s g D e c = R e q ( O p t / N o n O p t ) s k p b
  • In the next steps, the received request message is first decrypted from the private key of the global blockchain, the signature of the private key of the local blockchain is verified, and then the contract is forwarded to the local blockchain by embedding the security features in the message, as shown in the Equation (9).
    R e s p M s g E n c = S C ( O p t / N o n O p t ) s k p b
  • In the final step, the local blockchain decrypts the received smart contract using its private key and verifies the global blockchain’s signature. Once verified, the retrieved smart contract is updated in the local blockchain datastream through transaction, also called smart contract execution process.

7.1. Result Discussion of Non-Optimized Smart Contract Fetching

The performance metrics for fetching non-optimized smart contracts from the global blockchain measured in terms of throughput, operational delay, and service security execution time for both the Python and Solidity cases are presented in Table 11 and Table 12, respectively.
Table 11. Fetching non-optimized smart contracts from global blockchain in Python case.
Table 12. Fetching non-optimized smart contracts from global blockchain in Solidity case.
In both cases, we observed that the system initially demonstrates improved efficiency as the number of smart contract fetching requests increases. However, beyond a certain threshold, network congestion and resource limitations lead to performance degradation. The throughput trends in both cases follow a similar pattern, with the Python implementation consistently outperforming the Solidity case. In the Python case, throughput increases steadily with the number of requests, peaking at 3000 requests with 35.55 requests/s. However, at 5000 requests, throughput drops to 21.06 requests/s, indicating that the blockchain system begins to experience saturation. In the Solidity case, the throughput also rises with increased requests but remains comparatively lower. It reaches its peak at 3000 requests with 28.27 requests/s before dropping to 17.65 requests/s at 5000 requests. This comparatively lower performance is due to the additional overhead in the Ethereum environment, such as gas computation, transaction signing, and ABI encoding/decoding, which collectively increase latency and reduce throughput under heavy load. Figure 8 shows the comparative throughput of request/sec in both cases.
Figure 8. Comparative throughput request of non-optimized code in Python and Solidity cases during smart contract fetching operation.
Likewise, when the volume of requests increases, operational delay occurs in both Python and Solidity. In the Python case, latency starts at 625 ms with 100 requests and drops significantly to 26.44 ms at 3000 requests, demonstrating peak system performance at this level. However, for 5000 requests, operational delay rises again to 60.47 ms, indicating system bottlenecks under higher load. A similar trend is observed in the Solidity case, although with generally higher latency. It starts at 712.00 ms for 100 requests and decreases to 41.03 ms at 3000 requests. When the request count reaches 5000, latency increases again to 79.22 ms, reinforcing the observation that Ethereum-based environments face greater overhead due to gas computation and more intensive transaction processing. The service security execution time, which accounts for cryptographic authentication and verification, also follows this pattern. In the Python implementation, execution time begins at 0.85 ms (100 requests), drops to 0.21 ms at 3000 requests due to efficient batch processing and parallel execution, and then spikes to 1.64 ms at 5000 requests, likely caused by increased cryptographic load and resource contention. In the Solidity case, the execution time starts higher at 1.04 ms for 100 requests and reduces to 0.35 ms at 3000 requests before rising again to 1.97 ms at 5000 requests. This suggests that the Ethereum-based implementation is more sensitive to scaling pressure, possibly due to gas cost computation and transaction state handling within the EVM. Figure 9 shows the comparative results of non-optimized smart contract fetching in both Python and Solidity cases. These findings clearly indicate that the system performs optimally up to 3000 concurrent requests in both cases. Beyond this threshold, the decline in throughput and increase in operational delay and security execution time highlight blockchain congestion, cryptographic load, or transaction queue delays, all of which negatively impact system efficiency.
Figure 9. Comparative operational delay and service security execution time for non-optimized code in Python and Solidity cases during smart contract fetching operation.

7.2. Result Discussion of Optimized Smart Contract Fetching

To further assess the system’s scalability and efficiency, we evaluated the performance of fetching optimized smart contracts in both the Python and Solidity implementations. For optimization, we utilized fine-tuned generative AI models, including GPT-2, GPT-3, and GPT-4, to enhance the smart contract code by reducing redundant logic, minimizing loop iterations, and improving data handling.
Table 13, Table 14, Table 15, Table 16, Table 17 and Table 18 present the results of fetching optimized smart contracts generated using fine-tuned GPT-2, GPT-3, and GPT-4 models from the global blockchain to the local blockchain in both the MultiChain-based Python implementation and the Ethereum-based Solidity implementation.
Table 13. Fetching GPT-2-optimized smart contracts from global blockchain in Python case.
Table 14. Fetching GPT-3-optimized smart contracts from global blockchain in Python case.
Table 15. Fetching GPT-4-optimized smart contracts from global blockchain in Python case.
Table 16. Fetching GPT-2-optimized smart contracts from global blockchain in Solidity case.
Table 17. Fetching GPT-3-optimized smart contracts from global blockchain in Solidity case.
Table 18. Fetching GPT-4-optimized smart contracts from global blockchain in Solidity case.
The findings indicate that optimized contracts significantly outperform their non-optimized smart contract counterparts across all evaluated parameters. Figure 10 shows the results of the comparative analysis between Python- and Solidity-based smart contract implementations. It illustrates the throughput performance of both optimized and non-optimized smart contracts across increasing request volumes. The results highlight that, while optimization significantly improves performance in both cases, the Python implementation consistently achieves higher throughput due to its lightweight execution environment and reduced overhead compared to the Solidity-based (EVM) setup. Furthermore, the analysis also reveals that operational delay and service security execution time are considerably reduced in the optimized contracts (GPT-2, GPT-3, and GPT-4) compared to the non-optimized version. This improvement demonstrates that generative AI-based code refinement not only boosts throughput but also enhances system responsiveness and cryptographic efficiency in both blockchain environments. Figure 11 presents the comparative results of operational delay and smart contract security execution time across GPT-2, GPT-3, and GPT-4, clearly demonstrating consistent performance improvements in both Python and Solidity environments. For each GPT variant, the Python-based implementation outperforms Solidity, primarily due to its lightweight off-chain processing and absence of gas-related computational overhead.
Figure 10. Comparative throughput of optimized and non-optimized smart contracts in Python and Solidity cases during fetching process.
Figure 11. Comparative operational delay and service security execution time of optimized smart contracts in Python and Solidity cases.

8. Experiment 2: General Workflow of Sending and Receiving Messages Between Interoperable Services

In disaster management, seamless and secure communication between different services is critical for real-time response and coordination. Figure 12 shows the workflow of the interaction of interoperable services in the context of disaster management services. During emergencies, an IoT-enabled disaster management service securely transmits encrypted alerts to other decentralized interoperable services to ensure timely public notifications. The following are the steps involved in the interaction of interoperable services.
Figure 12. Sending and receiving of encrypted messages between interoperable services.
  • In the first step, IoT sensor nodes of the disaster management service send messages to the SDN controller. After verifying the legitimacy of the IoT nodes, the SDN controller forwards the request message to the service security execution unit. At this stage, optimized or non-optimized smart contracts are used to verify authentication, authorization, and access control rules between interoperable services at each end. The request message, including the sensor values, is then encrypted using the public key of the local blockchain and digitally signed with the SDN controller’s secret key, as shown in Equation (10).
    M s g E n c = R e q ( O p t / N o n O p t | | S e n s o r ) s k p b
  • In the second step, the forwarded message is verified at the receiving end of the global blockchain, which is responsible for validating the incoming message. This is completed by decrypting the message using the global blockchain’s private key and verifying the digital signature of the SDN controller, as shown in Equation (11).
    M s g D e c = R e q ( O p t / N o n O p t | | S e n s o r ) s k p r
    After decrypting the message, the global blockchain signs the message again using its private key and encrypts it with the public key of the local blockchain, as shown in Equation (12). The encrypted message is then forwarded to the local blockchain service security execution unit to verify the authenticity of interoperable message.
    M s g D e c = R e q ( O p t / N o n O p t | | S e n s o r ) s k p b
  • In the next steps, the received request message is decrypted first from the private key of the local blockchain, and then the signature of the public key of the global blockchain is verified, as shown in Equation (13). The message then forwards to the service security execution unit.
    Response Enc = ( Contract ( Opt / Non Opt ) s k p b
  • In the final step, the disaster management service publishes the message to the decentralized system after completing all security verifications through the service security contract execution unit. The decentralized disaster management service is open to receiving the request message from any interoperable service. The receiving interoperable service first verifies the security attributes embedded in the smart contract by following the same verification steps performed by interoperable service 1.

8.1. Result Discussion of Sending and Receiving Through Non-Optimized Smart Contract

Table 19 and Table 20 display the performance metrics of Workflow-2 for the non-optimized smart contracts in both Python and Solidity cases. In this workflow, Interoperable Service-A sends a request message containing data to Interoperable Service-B, which is responsible for publishing the received data to its local blockchain datastream. The comparative throughput pattern results for this end-to-end message exchange operation clearly indicate that the Python-based implementation consistently outperforms the Solidity-based implementation in terms of throughput across all request volumes. These findings validate that, while both platforms handle the end-to-end encrypted message exchange workflow adequately, the Python implementation on MultiChain delivers better efficiency and scalability for large-scale interoperable service communication.
Table 19. Sending and receiving of encrypted messages between interoperable services through non-optimized smart contracts in Python case.
Table 20. Sending and receiving of encrypted messages between interoperable services through non-optimized smart contracts in Solidity case.

8.2. Result Discussion of Sending and Receiving Through Optimized Smart Contracts

Table 21, Table 22, Table 23, Table 24, Table 25 and Table 26 present the performance metrics of the optimized smart contracts during end-to-end message sending. These tables provide a detailed comparison of throughput, operational delay, and service security execution time across different GPT-optimized models (GPT-2, GPT-3, and GPT-4) implemented in both Python and Solidity environments. Figure 13 shows the comparative throughput of optimized smart contracts in the Python and Solidity cases during the message sending process. This result indicates a similar throughput pattern as observed in the previous experiment, where performance improved with increasing request volumes up to a saturation point. Once again, we find clear evidence that the Python-based implementation consistently outperforms the Solidity version, delivering higher throughput and demonstrating better scalability under increased load. Figure 14 presents a detailed comparison of operational delay and service security execution time for GPT-optimized smart contracts implemented in Python and Solidity during end-to-end message exchange between interoperable services.
Table 21. Sending and receiving of encrypted messages between interoperable services through GPT-2-optimized smart contracts in Python case.
Table 22. Sending and receiving of encrypted messages between interoperable services through GPT-3-optimized smart contracts in Python case.
Table 23. Sending and receiving of encrypted messages between interoperable services through GPT-4-optimized smart contracts in Python case.
Table 24. Sending and receiving of encrypted messages between interoperable services through GPT-2-optimized smart contracts in Solidity case.
Table 25. Sending and receiving of encrypted messages between interoperable services through GPT-3-optimized smart contracts in Solidity case.
Table 26. Sending and receiving of encrypted messages between interoperable services through GPT-4-optimized smart contracts in Solidity case.
Figure 13. Comparative throughput of optimized smart contracts in Python and Solidity cases during message sending.
Figure 14. Comparative operational delay and service security execution time for optimized smart contracts in Python and Solidity cases during message sending.
The operational delay, defined as the time taken from message dispatch to contract execution, was consistently lower in the Python implementation across all request levels. For instance, in the GPT-4 scenario at 3000 requests, the operational delay in Python reached as low as 52.18 ms, while the Solidity counterpart recorded 55.21 ms, indicating a performance gap that becomes more pronounced under higher loads. This trend confirms that the Python-based environment, built on MultiChain, handles concurrent execution and resource allocation more efficiently than the EVM-based Solidity environment, which incurs additional overhead due to gas calculation and transaction packaging. Similarly, the service security execution time, which accounts for cryptographic operations such as encryption, decryption, and signature verification, also showed better efficiency in the Python setup. In optimized GPT-4 contracts, the execution time in Python dropped to 0.62 ms at 3000 requests, whereas, in Solidity, it stood at 0.70 ms. This performance advantage is primarily due to the lightweight cryptographic libraries and faster function bindings available in Python, which reduce processing time significantly compared to Solidity’s on-chain computation model.

9. Formal Verification After Post-Optimization

In this section, we focus on formal verification after the optimization of smart contracts using PyPy for Python [101] and Slither for Solidity [102]. The optimization process was applied to both Python and Solidity implementations to enhance performance, and the resulting throughput was compared against the unoptimized versions. Table 27 illustrates the percentage improvements in throughput, which was measured by fetching optimized smart contracts from a global blockchain and comparing them to their non-optimized counterparts. The table includes data for both Python and Solidity, utilizing PyPy and Slither, respectively, for the optimizations.
Table 27. Percentage improvements in throughput using GPT-2, GPT-3, and GPT-4 for PyPy and Slither.
The horizontal axis of the table represents different request loads, ranging from 100 to 5000 requests. The vertical axis lists three optimization methods based on GPT models: GPT-2, GPT-3, and GPT-4. The percentage values indicate the improvement in throughput (in requests per second) achieved after optimization. The key observations from the data include the following: GPT-4 consistently outperforms both GPT-3 and GPT-2, showcasing its superior optimization capabilities. The improvement becomes more significant as the request load increases, especially for higher loads of 3000 and 5000 requests. For Python (PyPy), there is a notable performance boost at higher loads, with up to a 69.69% improvement achieved with GPT-4. Solidity (Slither) shows even greater gains, achieving up to an 87.56% improvement with GPT-4 when handling high request volumes. This analysis was specifically conducted for Experiment 1, which focused on contract fetching. Based on the results from this experiment, we anticipate similar improvements in throughput when applied to other experiments, such as those involving the sending of messages to interoperable services. This section highlights that the application of LLM-based optimization, particularly through GPT models, substantially improves smart contract execution performance in both interpreted (Python) and compiled (Solidity) environments.

10. Discussion on Customized Consensus Mechanism Performance

The core contribution of this research lies in the integration of generative AI models (GPT-2, GPT-3, and GPT-4) with a smart contract optimization and deployment pipeline tailored for smart city environments. Our experiments demonstrate that fine-tuning these models on domain-specific code patterns results in significant improvements in smart contract efficiency, particularly by reducing redundant variables, optimizing loop structures, and minimizing gas-expensive operations. These optimizations are critical in environments where transaction cost, execution latency, and scalability are tightly constrained.
While these improvements are largely independent of the underlying blockchain consensus mechanism, their applicability and real-world impact are closely linked to how consensus is enforced. In typical smart city deployments, balancing decentralization and performance is essential. Traditional MultiChain networks use a permissioned consensus model that favors performance but lacks broader decentralization.
To address this, we implemented a customized consensus mechanism at the application layer, enabling decentralized policy-driven governance without modifying the underlying blockchain protocol. In the Python-based implementation, we extended MultiChain’s logic using smart contracts that incorporate context-aware policies such as trust scores, role-based approval, and SLA validations, thus ensuring collaborative, traceable, and partially decentralized transaction approvals.
For Solidity-based environments, we leveraged Ethereum-compatible testnets to implement embedded consensus logic directly within the contracts. These smart contracts support multi-party agreement schemes, quorum voting, and dynamic role evaluation to simulate decentralized control at the application layer. This design ensures that our optimization framework is not locked into a single blockchain infrastructure and remains adaptable across both private and public deployments.
By combining generative AI-based optimization with a customizable consensus overlay, our framework bridges a critical gap: it not only automates the enhancement of smart contract quality but also ensures that optimized code can operate reliably under varying consensus models. This is particularly important in smart city ecosystems, where interoperability between municipal services, scalability under high loads, and policy-driven compliance are essential.

11. Conclusions

Interoperability between interoperable services plays a pivotal role in establishing seamless and efficient smart city services. It enables smooth interaction among diverse technologies and platforms, facilitating integrated urban solutions. However, this level of interoperability introduces significant security challenges that necessitate robust governance frameworks. Key security aspects such as authentication, authorization, and access control are fundamental to ensuring the integrity and confidentiality of smart city interactions. As various services exchange data, it is imperative to enforce strict access control mechanisms, ensuring that only authorized entities can participate in the ecosystem. Effective security governance must incorporate robust authentication protocols, granular permission management, and dynamic access control strategies. To address these challenges, the existing security framework leverages blockchain and smart contracts, providing a decentralized and tamper-resistant solution. This approach ensures trust, transparency, and the automated enforcement of security policies. Moreover, the solution is adaptive in nature, dynamically adjusting to evolving security threats and operational requirements. The evaluation reveals that the SDN controller and the blockchain memory pool are critical components in ensuring the scalability of the proposed security framework. The SDN controller enables centralized network management and control, facilitating seamless communication and coordination between smart services. In contrast, the blockchain memory pool serves as a distributed and tamper-resistant ledger, ensuring the integrity and immutability of security-related transactions and data. However, the cryptographic overhead introduced by smart contracts in the existing security framework for secure collaborative task exchange increases code complexity. Additionally, the manual process of smart contract deployment further complicates implementation. This highlights the need for automated smart contract deployment using generative AI, which can optimize contract efficiency, reduce human errors, and enhance the overall security and adaptability of the system. In the existing framework, we change the mechanism of smart contract deployment along with the optimization of smart contracts by integrating fine-tuned generative AI models. Our evaluation demonstrates that integrating generative AI with blockchain significantly reduces smart contract execution overhead, improves security, and improves scalability, making it a viable solution for future smart city applications.
Our results demonstrate that the optimized versions of code generated through GPT-4 for Python and Solidity significantly outperform other baseline approaches. Furthermore, the evaluation shows that public blockchains, such as Ethereum, perform worse in our use case compared to private blockchain configurations. In particular, MultiChain (used as our private blockchain) showed better scalability and lower execution overhead. However, a key limitation of our study is that the system has not been verified in a real-world deployment environment, which may cause deviations in actual performance results. As part of future work, we intend to incorporate adversarial testing using tools like Echidna to validate the security and robustness of the generated smart contracts against malicious inputs and unexpected behaviors.

Author Contributions

Conceptualization, S.M. and M.F.S.; methodology, software, and analysis, S.M.; validation and investigation, all authors; resources, R.B.A. and Z.U.; writing—original draft, S.M.; writing—review and editing, S.S. and M.J.; supervision and project administration, M.F.S. and T.J.S.K.; funding acquisition, T.J.S.K. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

This will be available upon request to the corresponding authors.

Acknowledgments

The authors would like to thank the FAST National University and collaborating institutions for their support and resources throughout this research.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Rathore, M.M.; Paul, A.; Rho, S.; Khan, M.; Vimal, S.; Shah, S.A. Smart traffic control: Identifying driving-violations using fog devices with vehicular cameras in smart cities. Sustain. Cities Soc. 2021, 71, 102986. [Google Scholar] [CrossRef]
  2. Rathore, M.M.; Attique Shah, S.; Awad, A.; Shukla, D.; Vimal, S.; Paul, A. A cyber-physical system and graph-based approach for transportation management in smart cities. Sustainability 2021, 13, 7606. [Google Scholar] [CrossRef]
  3. Zeid, A.; Sundaram, S.; Moghaddam, M.; Kamarthi, S.; Marion, T. Interoperability in smart manufacturing: Research challenges. Machines 2019, 7, 21. [Google Scholar] [CrossRef]
  4. Arthurs, P.; Gillam, L.; Krause, P.; Wang, N.; Halder, K.; Mouzakitis, A. A taxonomy and survey of edge cloud computing for intelligent transportation systems and connected vehicles. IEEE Trans. Intell. Transp. Syst. 2021, 23, 6206–6221. [Google Scholar] [CrossRef]
  5. Bello, O.; Zeadally, S. Toward efficient smartification of the Internet of Things (IoT) services. Future Gener. Comput. Syst. 2019, 92, 663–673. [Google Scholar] [CrossRef]
  6. Yuan, Y.; Wang, F.Y. Towards blockchain-based intelligent transportation systems. In Proceedings of the 2016 IEEE 19th International Conference on Intelligent Transportation Systems (ITSC), Rio de Janeiro, Brazil, 1–4 November 2016; pp. 2663–2668. [Google Scholar]
  7. Xie, J.; Tang, H.; Huang, T.; Yu, F.R.; Xie, R.; Liu, J.; Liu, Y. A survey of blockchain technology applied to smart cities: Research issues and challenges. IEEE Commun. Surv. Tutor. 2019, 21, 2794–2830. [Google Scholar] [CrossRef]
  8. Kiani, R.; Sheng, V.S. Ethereum Smart Contract Vulnerability Detection and Machine Learning-Driven Solutions: A Systematic Literature Review. Electronics 2024, 13, 2295. [Google Scholar] [CrossRef]
  9. Nguyen, C.T.; Liu, Y.; Du, H.; Hoang, D.T.; Niyato, D.; Nguyen, D.N.; Mao, S. Generative ai-enabled blockchain networks: Fundamentals, applications, and case study. IEEE Netw. 2024, 39, 232–241. [Google Scholar] [CrossRef]
  10. Chatterjee, S.; Ramamurthy, B. Efficacy of Various Large Language Models in Generating Smart Contracts. arXiv 2024, arXiv:2407.11019. [Google Scholar]
  11. Zhao, J.; Chen, X.; Yang, G.; Shen, Y. Automatic smart contract comment generation via large language models and in-context learning. Inf. Softw. Technol. 2024, 168, 107405. [Google Scholar] [CrossRef]
  12. Yin, C.; Xiong, Z.; Chen, H.; Wang, J.; Cooper, D.; David, B. A literature survey on smart cities. Sci. China. Inf. Sci. 2015, 58, 1–18. [Google Scholar] [CrossRef]
  13. Roels, G.; Karmarkar, U.S.; Carr, S. Contracting for collaborative services. Manag. Sci. 2010, 56, 849–863. [Google Scholar] [CrossRef]
  14. Siddiqui, S.; Hameed, S.; Shah, S.A.; Arshad, J.; Ahmed, Y.; Draheim, D. A smart-contract-based adaptive security governance architecture for smart city service interoperations. Sustain. Cities Soc. 2024, 113, 105717. [Google Scholar] [CrossRef]
  15. Li, D.; Liu, S.; Wang, B.; Yu, C.; Zheng, P.; Li, W. Trustworthy AI for human-centric smart manufacturing: A survey. J. Manuf. Syst. 2025, 78, 308–327. [Google Scholar] [CrossRef]
  16. Siddiqui, S.; Hameed, S.; Shah, S.A.; Khan, A.K.; Aneiba, A. Smart contract-based security architecture for collaborative services in municipal smart cities. J. Syst. Archit. 2023, 135, 102802. [Google Scholar] [CrossRef]
  17. Koo, J.; Kim, Y.G. Interoperability requirements for a smart city. In Proceedings of the 36th Annual ACM Symposium on Applied Computing, Avila, Spain, 8–12 April 2021; pp. 690–698. [Google Scholar]
  18. Resende, C.; Moreira, W.; Almeida, L. NextGenGW: A software-based architecture targeting IoT interoperability. In Proceedings of the 2022 IEEE 27th International Conference on Emerging Technologies and Factory Automation (ETFA), Stuttgart, Germany, 6–9 September 2022; pp. 1–4. [Google Scholar]
  19. Žarko, I.P.; Mueller, S.; Płociennik, M.; Rajtar, T.; Jacoby, M.; Pardi, M.; Insolvibile, G.; Glykantzis, V.; Antonić, A.; Kušek, M.; et al. The symbIoTe solution for semantic and syntactic interoperability of cloud-based IoT platforms. In Proceedings of the 2019 Global IoT Summit (GIoTS), Aarhus, Denmark, 17–21 June 2019; pp. 1–6. [Google Scholar]
  20. Umberfield, E.E.; Staes, C.J.; Morgan, T.P.; Grout, R.W.; Mamlin, B.W.; Dixon, B.E. Syntactic interoperability and the role of syntactic standards in health information exchange. In Health Information Exchange; Elsevier: Amsterdam, The Netherlands, 2023; pp. 217–236. [Google Scholar]
  21. Tržec, K.; Kušek, M.; Žarko, I.P. Building an Interoperable IoT Ecosystem for Data-Driven Agriculture. In Proceedings of the 2022 International Conference on Smart Systems and Technologies (SST), Osijek, Croatia, 19–21 October 2022; pp. 341–347. [Google Scholar]
  22. Kharche, S.; Dere, P. Interoperability issues and challenges in 6G networks. J. Mob. Multimed. 2022, 18, 1445–1470. [Google Scholar] [CrossRef]
  23. Higuera, J.; Polo, J. Interoperability in wireless sensor networks based on IEEE 1451 standard. In Wireless Sensor Networks and Energy Efficiency: Protocols, Routing and Management; IGI Global: Hershey, PA, USA, 2012; pp. 47–69. [Google Scholar]
  24. Albouq, S.S.; Abi Sen, A.A.; Almashf, N.; Yamin, M.; Alshanqiti, A.; Bahbouh, N.M. A survey of interoperability challenges and solutions for dealing with them in IoT environment. IEEE Access 2022, 10, 36416–36428. [Google Scholar] [CrossRef]
  25. Zheng, Z.; Xie, S.; Dai, H.N.; Chen, X.; Wang, H. Blockchain challenges and opportunities: A survey. Int. J. Web Grid Serv. 2018, 14, 352–375. [Google Scholar] [CrossRef]
  26. Wang, G.; Nixon, M. Intertrust: Towards an efficient blockchain interoperability architecture with trusted services. In Proceedings of the 2021 IEEE International Conference on Blockchain (Blockchain), Melbourne, Australia, 6–8 December 2021; pp. 150–159. [Google Scholar]
  27. Tasatanattakool, P.; Techapanupreeda, C. Blockchain: Challenges and applications. In Proceedings of the 2018 International Conference on Information Networking (ICOIN), Chiang Mai, Thailand, 10–12 January 2018; pp. 473–475. [Google Scholar]
  28. Bach, L.M.; Mihaljevic, B.; Zagar, M. Comparative analysis of blockchain consensus algorithms. In Proceedings of the 2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), Opatija, Croatia, 21–25 May 2018; pp. 1545–1550. [Google Scholar]
  29. Marijan, D.; Lal, C. Blockchain verification and validation: Techniques, challenges, and research directions. Comput. Sci. Rev. 2022, 45, 100492. [Google Scholar] [CrossRef]
  30. Idelberger, F.; Governatori, G.; Riveret, R.; Sartor, G. Evaluation of logic-based smart contracts for blockchain systems. In Proceedings of the Rule Technologies. Research, Tools, and Applications: 10th International Symposium, RuleML 2016, Stony Brook, NY, USA, 6–9 July 2016; Proceedings 10. Springer: Berlin/Heidelberg, Germany, 2016; pp. 167–183. [Google Scholar]
  31. Khoramnejad, F.; Hossain, E. Generative AI for the Optimization of Next-Generation Wireless Networks: Basics, State-of-the-Art, and Open Challenges. arXiv 2024, arXiv:2405.17454. [Google Scholar] [CrossRef]
  32. Epstein, Z.; Hertzmann, A.; Investigators of Human Creativity; Akten, M.; Farid, H.; Fjeld, J.; Frank, M.R.; Groh, M.; Herman, L.; Leach, N.; et al. Art and the science of generative AI. Science 2023, 380, 1110–1111. [Google Scholar] [CrossRef] [PubMed]
  33. Brynjolfsson, E.; Li, D.; Raymond, L.R. Generative AI at Work; Technical Report; National Bureau of Economic Research: Cambridge, MA, USA, 2023. [Google Scholar]
  34. Mongoli, A. The Use of LLMs in the Legal Field: Optimizing Contract Management with Generative Artificial Intelligence. Ph.D. Thesis, Politecnico di Torino, Turin, Italy, 2024. [Google Scholar]
  35. Euchner, J. Generative ai. Res.-Technol. Manag. 2023, 66, 71–74. [Google Scholar] [CrossRef]
  36. Fosso Wamba, S.; Guthrie, C.; Queiroz, M.M.; Minner, S. ChatGPT and generative artificial intelligence: An exploratory study of key benefits and challenges in operations and supply chain management. Int. J. Prod. Res. 2024, 62, 5676–5696. [Google Scholar] [CrossRef]
  37. Choi, B.K.; Sohn, D.H.; Hong, J. Analysis and Comparison of PPP ZTD using Empirical Models GPT, GPT2, and GPT3. J. Position. Navig. Timing 2025, 14, 21–28. [Google Scholar]
  38. Prathigadapa, S.; Daud, S.B.M. A Review of Virtual Tutoring Systems and Student Performance Analysis Using GPT-3. J. Learn. Dev. 2025, 12, 168–181. [Google Scholar] [CrossRef]
  39. Bellini, V.; Bignami, E.G. Generative Pre-trained Transformer 4 (GPT-4) in clinical settings. Lancet Digit. Health 2025, 7, e6–e7. [Google Scholar] [CrossRef] [PubMed]
  40. Gardazi, N.M.; Daud, A.; Malik, M.K.; Bukhari, A.; Alsahfi, T.; Alshemaimri, B. BERT applications in natural language processing: A review. Artif. Intell. Rev. 2025, 58, 166. [Google Scholar] [CrossRef]
  41. Matarazzo, A.; Torlone, R. A Survey on Large Language Models with some Insights on their Capabilities and Limitations. arXiv 2025, arXiv:2501.04040. [Google Scholar]
  42. Lai, Z.; Wu, T.; Fei, X.; Ling, Q. BERT4ST: Fine-tuning pre-trained large language model for wind power forecasting. Energy Convers. Manag. 2024, 307, 118331. [Google Scholar] [CrossRef]
  43. Siino, M. Badrock at semeval-2024 task 8: Distilbert to detect multigenerator, multidomain and multilingual black-box machine-generated text. In Proceedings of the 18th International Workshop on Semantic Evaluation (SemEval-2024), Mexico City, Mexico, 10 January 2024; pp. 239–245. [Google Scholar]
  44. Mastropaolo, A.; Scalabrino, S.; Cooper, N.; Palacio, D.N.; Poshyvanyk, D.; Oliveto, R.; Bavota, G. Studying the usage of text-to-text transfer transformer to support code-related tasks. In Proceedings of the 2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE), Madrid, Spain, 22–30 May 2021; pp. 336–347. [Google Scholar]
  45. Becker, B.A.; Denny, P.; Finnie-Ansley, J.; Luxton-Reilly, A.; Prather, J.; Santos, E.A. Programming is hard-or at least it used to be: Educational opportunities and challenges of ai code generation. In Proceedings of the 54th ACM Technical Symposium on Computer Science Education V. 1, Toronto, ON, Canada, 15–18 March 2023; pp. 500–506. [Google Scholar]
  46. Liu, Y.; Le-Cong, T.; Widyasari, R.; Tantithamthavorn, C.; Li, L.; Le, X.B.D.; Lo, D. Refining chatgpt-generated code: Characterizing and mitigating code quality issues. ACM Trans. Softw. Eng. Methodol. 2024, 33, 1–26. [Google Scholar] [CrossRef]
  47. Ciniselli, M.; Cooper, N.; Pascarella, L.; Poshyvanyk, D.; Di Penta, M.; Bavota, G. An empirical study on the usage of bert models for code completion. In Proceedings of the 2021 IEEE/ACM 18th International Conference on Mining Software Repositories (MSR), Madrid, Spain, 17–19 May 2021; pp. 108–119. [Google Scholar]
  48. Das, D.; Banerjee, S.; Chatterjee, P.; Biswas, M.; Biswas, U.; Alnumay, W. Design and development of an intelligent transportation management system using blockchain and smart contracts. Clust. Comput. 2022, 25, 1899–1913. [Google Scholar] [CrossRef]
  49. Kirli, D.; Couraud, B.; Robu, V.; Salgado-Bravo, M.; Norbu, S.; Andoni, M.; Antonopoulos, I.; Negrete-Pincetic, M.; Flynn, D.; Kiprakis, A. Smart contracts in energy systems: A systematic review of fundamental approaches and implementations. Renew. Sustain. Energy Rev. 2022, 158, 112013. [Google Scholar] [CrossRef]
  50. Porkodi, S.; Kesavaraja, D. Escalating Gas Cost Optimization in Smart Contract. Wirel. Pers. Commun. 2024, 136, 35–59. [Google Scholar] [CrossRef]
  51. Hemamalini, V.; Mishra, A.K.; Tyagi, A.K.; Kakulapati, V. Artificial intelligence–blockchain-enabled–internet of things-based cloud applications for next-generation society. Autom. Secur. Comput. Next-Gener. Syst. 2024, 65–82. [Google Scholar] [CrossRef]
  52. Blasi, S.; Ganzaroli, A.; De Noni, I. Smartening sustainable development in cities: Strengthening the theoretical linkage between smart cities and SDGs. Sustain. Cities Soc. 2022, 80, 103793. [Google Scholar] [CrossRef]
  53. Kutty, A.A.; Kucukvar, M.; Abdella, G.M.; Bulak, M.E.; Onat, N.C. Sustainability performance of European smart cities: A novel DEA approach with double frontiers. Sustain. Cities Soc. 2022, 81, 103777. [Google Scholar] [CrossRef]
  54. Dana, L.P.; Salamzadeh, A.; Hadizadeh, M.; Heydari, G.; Shamsoddin, S. Urban entrepreneurship and sustainable businesses in smart cities: Exploring the role of digital technologies. Sustain. Technol. Entrep. 2022, 1, 100016. [Google Scholar] [CrossRef]
  55. Lee, E.; Seo, Y.D.; Oh, S.R.; Kim, Y.G. A Survey on Standards for Interoperability and Security in the Internet of Things. IEEE Commun. Surv. Tutor. 2021, 23, 1020–1047. [Google Scholar] [CrossRef]
  56. Abidi, S.; Essafi, M.; Guegan, C.G.; Fakhri, M.; Witti, H.; Ghezala, H.H.B. A web service security governance approach based on dedicated micro-services. Procedia Comput. Sci. 2019, 159, 372–386. [Google Scholar] [CrossRef]
  57. Wimmer, M.A.; Boneva, R.; Di Giacomo, D. Interoperability governance: A definition and insights from case studies in Europe. In Proceedings of the 19th Annual International Conference on Digital Government Research: Governance in the Data Age, Delft, The Netherlands, 30 May–1 June 2018; pp. 1–11. [Google Scholar]
  58. Srikanth, G.U.; Geetha, R.; Prabhu, S. An efficient Key Agreement and Authentication Scheme (KAAS) with enhanced security control for IIoT systems. Int. J. Inf. Technol. 2023, 15, 1221–1230. [Google Scholar] [CrossRef]
  59. Kumar, P.; Lin, Y.; Bai, G.; Paverd, A.; Dong, J.S.; Martin, A. Smart grid metering networks: A survey on security, privacy and open research issues. IEEE Commun. Surv. Tutor. 2019, 21, 2886–2927. [Google Scholar] [CrossRef]
  60. Harbi, Y.; Aliouat, Z.; Refoufi, A.; Harous, S.; Bentaleb, A. Enhanced authentication and key management scheme for securing data transmission in the internet of things. Ad. Hoc. Netw. 2019, 94, 101948. [Google Scholar] [CrossRef]
  61. Weerasinghe, N.; Mishra, R.; Porambage, P.; Liyanage, M.; Ylianttila, M. Proof-of-Monitoring (PoM): A Novel Consensus Mechanism for Blockchain-based Secure Service Level Agreement Management. IEEE Trans. Netw. Serv. Manag. 2023, 20, 2783–2803. [Google Scholar] [CrossRef]
  62. Song, R.; Song, Y.; Liu, Z.; Tang, M.; Zhou, K. GaiaWorld: A Novel Blockchain System Based on Competitive PoS Consensus Mechanism. Comput. Mater. Contin. 2019, 60, 6053. [Google Scholar] [CrossRef]
  63. Hossain, M.T.; Badsha, S.; Shen, H. Porch: A novel consensus mechanism for blockchain-enabled future scada systems in smart grids and industry 4.0. In Proceedings of the 2020 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), Vancouver, British, 9–12 September 2020; pp. 1–7. [Google Scholar]
  64. Gao, F.; Zhu, L.; Shen, M.; Sharif, K.; Wan, Z.; Ren, K. A blockchain-based privacy-preserving payment mechanism for vehicle-to-grid networks. IEEE Netw. 2018, 32, 184–192. [Google Scholar] [CrossRef]
  65. Liu, T.; Sabrina, F.; Jang-Jaccard, J.; Xu, W.; Wei, Y. Artificial intelligence-enabled DDoS detection for blockchain-based smart transport systems. Sensors 2022, 22, 32. [Google Scholar] [CrossRef] [PubMed]
  66. Chaudhary, R.; Jindal, A.; Aujla, G.S.; Aggarwal, S.; Kumar, N.; Choo, K.K.R. BEST: Blockchain-based secure energy trading in SDN-enabled intelligent transportation system. Comput. Secur. 2019, 85, 288–299. [Google Scholar] [CrossRef]
  67. Maskey, S.R.; Badsha, S.; Sengupta, S.; Khalil, I. Bits: Blockchain based intelligent transportation system with outlier detection for smart city. In Proceedings of the 2020 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), Austin, TX, USA, 23–27 March 2020; pp. 1–6. [Google Scholar]
  68. Rasheed, D.H.; Tambe, S.B. Advancing Energy Efficiency with Smart Grids and IoT-Based Solutions for a Sustainable Future. ESTIDAMAA 2024, 2024, 36–42. [Google Scholar] [CrossRef] [PubMed]
  69. Al-Rubaye, R.H.K.; Türkben, A.K. Using artificial intelligence to evaluating detection of cybersecurity threats in ad hoc networks. Babylon. J. Netw. 2024, 2024, 45–56. [Google Scholar] [CrossRef]
  70. Du, X.; Gao, Y.; Wu, C.H.; Wang, R.; Bi, D. Blockchain-based intelligent transportation: A sustainable GCU application system. J. Adv. Transp. 2020, 2020, 5036792. [Google Scholar] [CrossRef]
  71. Sahal, R.; Alsamhi, S.H.; Brown, K.N.; O’shea, D.; McCarthy, C.; Guizani, M. Blockchain-empowered digital twins collaboration: Smart transportation use case. Machines 2021, 9, 193. [Google Scholar] [CrossRef]
  72. Abbas, K.; Tawalbeh, L.A.; Rafiq, A.; Muthanna, A.; Elgendy, I.A.; Abd El-Latif, A.A. Convergence of blockchain and IoT for secure transportation systems in smart cities. Secur. Commun. Netw. 2021, 2021, 1–13. [Google Scholar] [CrossRef]
  73. Makhdoom, I.; Zhou, I.; Abolhasan, M.; Lipman, J.; Ni, W. PrivySharing: A blockchain-based framework for privacy-preserving and secure data sharing in smart cities. Comput. Secur. 2020, 88, 101653. [Google Scholar] [CrossRef]
  74. Johar, S.; Ahmad, N.; Durrani, A.; Ali, G. Proof of pseudonym: Blockchain-based privacy preserving protocol for intelligent transport system. IEEE Access 2021, 9, 163625–163639. [Google Scholar] [CrossRef]
  75. Williams, S. Generative Contracts. Ariz. State Law J. Forthcom. 2024. Available online: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4582753 (accessed on 5 July 2025).
  76. Gupta, R.; Tanwar, S.; Al-Turjman, F.; Italiya, P.; Nauman, A.; Kim, S.W. Smart contract privacy protection using AI in cyber-physical systems: Tools, techniques and challenges. IEEE Access 2020, 8, 24746–24772. [Google Scholar] [CrossRef]
  77. Du, H.; Li, Z.; Niyato, D.; Kang, J.; Xiong, Z.; Huang, H.; Mao, S.; Generative AI-aided optimization for AI-generated content (AIGC) services in edge networks. CoRR 2023. Available online: https://openreview.net/forum?id=XWCUsaQGSa (accessed on 5 July 2025).
  78. Hildenbrandt, E.; Saxena, M.; Rodrigues, N.; Zhu, X.; Daian, P.; Guth, D.; Moore, B.; Park, D.; Zhang, Y.; Stefanescu, A.; et al. Kevm: A complete formal semantics of the ethereum virtual machine. In Proceedings of the 2018 IEEE 31st Computer Security Foundations Symposium (CSF), Oxford, UK, 9–12 July 2018; pp. 204–217. [Google Scholar]
  79. Paulin-Mohring, C. Inductive definitions in the system Coq rules and properties. In Proceedings of the International Conference on Typed Lambda Calculi and Applications; Springer: Berlin/Heidelberg, Germany, 1993; pp. 328–345. [Google Scholar]
  80. Sharma, N.; Sharma, S. A survey of Mythril, a smart contract security analysis tool for EVM bytecode. Indian J. Nat. Sci. 2022, 13, 39–41. [Google Scholar]
  81. Feist, J.; Grieco, G.; Groce, A. Slither: A static analysis framework for smart contracts. In Proceedings of the 2019 IEEE/ACM 2nd International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB), Montreal, QC, Canada, 27 May 2019; pp. 8–15. [Google Scholar]
  82. Thakoersingh, R. Automated Detection and Correction of Python Code Style Violations. 2024. Available online: https://repository.tudelft.nl/record/uuid:f3ed0af1-0b05-4abf-8146-9182a4ecfd25 (accessed on 5 July 2025).
  83. Godboley, S.; Krishna, P.R. Sol-Repairer: Solidity Smart Contract Dead Code Repairer. In Proceedings of the 18th Innovations in Software Engineering Conference, Kurukshetra, India, 20–22 February 2025; pp. 1–9. [Google Scholar]
  84. Liawatimena, S.; Warnars, H.L.H.S.; Trisetyarso, A.; Abdurahman, E.; Soewito, B.; Wibowo, A.; Gaol, F.L.; Abbas, B.S. Django web framework software metrics measurement using radon and pylint. In Proceedings of the 2018 Indonesian Association for Pattern Recognition International Conference (INAPR), Jakarta, Indonesia, 7–8 September 2018; pp. 218–222. [Google Scholar]
  85. Singh, G.S.; Acerbi, L. PyBADS: Fast and robust black-box optimization in Python. arXiv 2023, arXiv:2306.15576. [Google Scholar] [CrossRef]
  86. Hajdu, Á.; Jovanović, D. Solc-verify: A modular verifier for solidity smart contracts. In Proceedings of the Working Conference on Verified Software: Theories, Tools, and Experiments; Springer: Berlin/Heidelberg, Germany, 2019; pp. 161–179. [Google Scholar]
  87. Papineni, K.; Roukos, S.; Ward, T.; Zhu, W.J. BLEU: A method for automatic evaluation of machine translation. In Proceedings of the 40th Annual Meeting of the Association for Computational Linguistics. Association for Computational Linguistics, Philadelphia, PA, USA, 6–12 July 2002; pp. 311–318. [Google Scholar]
  88. Sokolova, M.; Lapalme, G. A systematic analysis of performance measures for classification tasks. Inf. Process. Manag. 2009, 45, 427–437. [Google Scholar] [CrossRef]
  89. Wadhwa, J.; Suthar, A.; Joon, D.; Kaur, P. Enhanced Weather Forecasting with Hybrid Model of K Means and DBSCAN. In Proceedings of the 2024 Second International Conference on Advanced Computing & Communication Technologies (ICACCTech), Sonipat, India, 16–17 November 2024; pp. 298–303. [Google Scholar]
  90. Ye, X.; Li, S.; Das, S.; Du, J. Enhancing routes selection with real-time weather data integration in spatial decision support systems. Spat. Inf. Res. 2024, 32, 373–381. [Google Scholar] [CrossRef]
  91. Wang, Z.; Zheng, J.; Han, C.; Lu, B.; Yu, D.; Yang, J.; Han, L. A comprehensive assessment approach for multiscale regional economic development: Fusion modeling of nighttime lights and OpenStreetMap data. Geogr. Sustain. 2025, 6, 100230. [Google Scholar] [CrossRef]
  92. Wang, Z.; Zheng, J.; Han, C.; Lu, B.; Yu, D.; Yang, J.; Han, L. Exploring the potential of OpenStreetMap Data in regional economic development evaluation modeling. Remote Sens. 2024, 16, 239. [Google Scholar] [CrossRef]
  93. Mandourah, A.; Hochmair, H.H. Analysing the use of OpenAerialMap images for OpenStreetMap edits. Geo-Spat. Inf. Sci. 2024, 1–16. Available online: https://www.tandfonline.com/doi/full/10.1080/10095020.2024.2341747 (accessed on 5 July 2025). [CrossRef]
  94. Dunkels, A.; Gronvall, B.; Voigt, T. Contiki-a lightweight and flexible operating system for tiny networked sensors. In Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks, Tampa, FL, USA, 16–18 November 2004; pp. 455–462. [Google Scholar]
  95. Hameed, S.; Shah, S.A.; Saeed, Q.S.; Siddiqui, S.; Ali, I.; Vedeshin, A.; Draheim, D. A scalable key and trust management solution for IoT sensors using SDN and blockchain technology. IEEE Sens. J. 2021, 21, 8716–8733. [Google Scholar] [CrossRef]
  96. Khoury, D.; Haddad, S.; Sondi, P.; Abou Haidar, G.; Semaan, D.; Sayah, J. Performance Evaluation and Analysis of LightCert4IoT using Cooja-Contiki Simulator. IEEE Access 2024, 12, 122350–122362. [Google Scholar] [CrossRef]
  97. Durmaz, C.; Challenger, M.; Dagdeviren, O.; Kardas, G. Modelling contiki-based IoT systems. In Proceedings of the 6th Symposium on Languages, Applications and Technologies (SLATE 2017). Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik, Vila do Conde, Portugal, 26–27 June 2017. [Google Scholar]
  98. Wan, S.; Lin, H.; Gan, W.; Chen, J.; Yu, P.S. Web3: The next internet revolution. IEEE Internet Things J. 2024, 11, 34811–34825. [Google Scholar] [CrossRef]
  99. Prajapat, M.; Barwar, N. Performance analysis of energy dissipation in WSNs using multi-chain PEGASIS. Int. J. Comput. Sci. Inf. Technol 2014, 5, 8033–8036. [Google Scholar]
  100. Zhu, L.; Karim, M.M.; Sharif, K.; Xu, C.; Li, F.; Du, X.; Guizani, M. SDN controllers: A comprehensive analysis and performance evaluation study. ACM Comput. Surv. (CSUR) 2020, 53, 1–40. [Google Scholar] [CrossRef]
  101. Zhang, Q.; Xu, L.; Xu, B. Python meets JIT compilers: A simple implementation and a comparative evaluation. Softw. Pract. Exp. 2024, 54, 225–256. [Google Scholar] [CrossRef]
  102. Kushwaha, S.S.; Joshi, S.; Singh, D.; Kaur, M.; Lee, H.-N. Systematic review of security vulnerabilities in ethereum blockchain smart contract. IEEE Access 2022, 10, 6605–6621. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.