首页 > 最新文献

Internet Technology Letters最新文献

英文 中文
Beyond passwords: A multi‐factor authentication approach for robust digital security 超越密码:多因素身份验证法实现稳健的数字安全
IF 0.9 Q4 TELECOMMUNICATIONS Pub Date : 2024-07-17 DOI: 10.1002/itl2.555
Keerthan Simha.R, Raghavan H K, Akshatha Prabhu, Pallavi Joshi
Multi‐Factor Authentication (MFA) strengthens digital security by necessitating users to verify their identity. It uses various authentication methods like adding an extra layer of protection beyond conventional passwords. Proposed method introduces a novel MFA system that integrates multiple authentication layers, starting with two phase Graphical password with the traditional email‐password and progressing to facial recognition using Convolutional Neural Networks (CNN) and Quick response (QR) code authentication. To prove the robustness of our method, we are considering some test cases and few performance metrics like delay, accuracy, etc. The results are derived for False positive rates, complexity. The success rate is observed to be more than 93% for the proposed model.
多因素身份验证(MFA)通过要求用户验证身份来加强数字安全。它使用各种认证方法,如在传统密码之外增加一个额外的保护层。所提出的方法引入了一种新颖的多因素身份验证系统,该系统整合了多个身份验证层,从传统电子邮件密码的两阶段图形密码开始,到使用卷积神经网络(CNN)的面部识别和快速反应(QR)代码身份验证。为了证明我们方法的鲁棒性,我们考虑了一些测试案例和一些性能指标,如延迟、准确性等。结果是假阳性率和复杂性。据观察,所提模型的成功率超过 93%。
{"title":"Beyond passwords: A multi‐factor authentication approach for robust digital security","authors":"Keerthan Simha.R, Raghavan H K, Akshatha Prabhu, Pallavi Joshi","doi":"10.1002/itl2.555","DOIUrl":"https://doi.org/10.1002/itl2.555","url":null,"abstract":"Multi‐Factor Authentication (MFA) strengthens digital security by necessitating users to verify their identity. It uses various authentication methods like adding an extra layer of protection beyond conventional passwords. Proposed method introduces a novel MFA system that integrates multiple authentication layers, starting with two phase Graphical password with the traditional email‐password and progressing to facial recognition using Convolutional Neural Networks (CNN) and Quick response (QR) code authentication. To prove the robustness of our method, we are considering some test cases and few performance metrics like delay, accuracy, etc. The results are derived for False positive rates, complexity. The success rate is observed to be more than 93% for the proposed model.","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2024-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141830414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A framework of survivability model virtualized wireless sensor networks for IOT‐assisted wireless sensor network 面向物联网辅助无线传感器网络的生存力模型虚拟化无线传感器网络框架
IF 0.9 Q4 TELECOMMUNICATIONS Pub Date : 2024-07-15 DOI: 10.1002/itl2.552
Bere Sachin Sukhadeo, Sarika Dilip Dhurgude, Y. Sinkar, Shashikant V. Athawale
Using traditional non‐virtualized Wireless Sensor Networks (WSNs) efficiently is difficult due to the embedded applications, which make the sensor nodes inaccessible to other applications. The proposed study considered both the node‐level and network‐level virtualization of wireless sensor networks to examine dynamic virtual network embedding. WSNs can leverage their shared sensing capabilities through network virtualization. Infrastructure providers earn more revenue by mapping more virtual network embedding (VNE) onto their substrate networks. VNE must therefore improve its acceptance ratio. The proposed RLE‐SVNE is demonstrated to be more efficient than state‐of‐the‐art in respect to acceptance, recovery, failure recovery delay, and revenue cost through simulation results. It compares the RLF‐SVNE method with C‐SVNE and N‐SVNE to demonstrate its superiority.
传统的非虚拟化无线传感器网络(WSN)由于嵌入式应用而难以有效使用,这使得其他应用无法访问传感器节点。拟议的研究考虑了无线传感器网络的节点级和网络级虚拟化,以研究动态虚拟网络嵌入。WSN 可通过网络虚拟化利用其共享传感能力。基础设施提供商通过将更多虚拟网络嵌入(VNE)映射到其基底网络上,赚取更多收入。因此,虚拟网络嵌入必须提高其接受率。通过仿真结果表明,拟议的 RLE-SVNE 在接受率、恢复率、故障恢复延迟和收入成本方面比最先进的技术更有效。它将 RLF-SVNE 方法与 C-SVNE 和 N-SVNE 进行了比较,以证明其优越性。
{"title":"A framework of survivability model virtualized wireless sensor networks for IOT‐assisted wireless sensor network","authors":"Bere Sachin Sukhadeo, Sarika Dilip Dhurgude, Y. Sinkar, Shashikant V. Athawale","doi":"10.1002/itl2.552","DOIUrl":"https://doi.org/10.1002/itl2.552","url":null,"abstract":"Using traditional non‐virtualized Wireless Sensor Networks (WSNs) efficiently is difficult due to the embedded applications, which make the sensor nodes inaccessible to other applications. The proposed study considered both the node‐level and network‐level virtualization of wireless sensor networks to examine dynamic virtual network embedding. WSNs can leverage their shared sensing capabilities through network virtualization. Infrastructure providers earn more revenue by mapping more virtual network embedding (VNE) onto their substrate networks. VNE must therefore improve its acceptance ratio. The proposed RLE‐SVNE is demonstrated to be more efficient than state‐of‐the‐art in respect to acceptance, recovery, failure recovery delay, and revenue cost through simulation results. It compares the RLF‐SVNE method with C‐SVNE and N‐SVNE to demonstrate its superiority.","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2024-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141644713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Abnormal behavior monitoring enhanced smart university stadium under the background of “Internet plus” "互联网+"背景下加强高校智慧体育场馆异常行为监测
IF 0.9 Q4 TELECOMMUNICATIONS Pub Date : 2024-07-08 DOI: 10.1002/itl2.560
Yan Li, Xiao Meng, Xiaochen Zhang
With the rapid development of the Internet of Things and 5G technology, smart university gymnasiums have become more and more important. However, it has become increasingly difficult for university gymnasium management, especially to detect abnormal behavior with dense crowds under limited venue space. To handle this issue, this paper designs an Artificial Intelligence Internet of Things (AIoT) abnormal behavior detection system which consists of the 5G camera, 5G transmission network and cloud platform. The 5G camera captures and transmits the video to the cloud platform by exploiting the 5G wireless sensor network. In the cloud platform, a hybrid variational autoencoder backbone which exploits the pre‐trained VGG16 and Transformer model is deployed to detect abnormal behaviors. Moreover, by introducing adversarial training mechanisms, the robustness of the proposed model is effectively improved. The experimental results on our self‐built gymnasium abnormal behavior dataset show that the proposed model can correctly identify most of the abnormal behaviors in the gymnasium compared to other models.
随着物联网和 5G 技术的快速发展,智能化大学体育馆变得越来越重要。然而,高校体育馆的管理变得越来越困难,特别是在有限的场地空间内,如何检测密集人群的异常行为。针对这一问题,本文设计了一种人工智能物联网(AIoT)异常行为检测系统,该系统由 5G 摄像头、5G 传输网络和云平台组成。5G 摄像头利用 5G 无线传感器网络捕捉视频并传输到云平台。在云平台中,利用预先训练好的 VGG16 和 Transformer 模型,部署混合变异自动编码器骨干来检测异常行为。此外,通过引入对抗训练机制,有效提高了所提模型的鲁棒性。在自建的体育馆异常行为数据集上的实验结果表明,与其他模型相比,所提出的模型能正确识别体育馆中的大部分异常行为。
{"title":"Abnormal behavior monitoring enhanced smart university stadium under the background of “Internet plus”","authors":"Yan Li, Xiao Meng, Xiaochen Zhang","doi":"10.1002/itl2.560","DOIUrl":"https://doi.org/10.1002/itl2.560","url":null,"abstract":"With the rapid development of the Internet of Things and 5G technology, smart university gymnasiums have become more and more important. However, it has become increasingly difficult for university gymnasium management, especially to detect abnormal behavior with dense crowds under limited venue space. To handle this issue, this paper designs an Artificial Intelligence Internet of Things (AIoT) abnormal behavior detection system which consists of the 5G camera, 5G transmission network and cloud platform. The 5G camera captures and transmits the video to the cloud platform by exploiting the 5G wireless sensor network. In the cloud platform, a hybrid variational autoencoder backbone which exploits the pre‐trained VGG16 and Transformer model is deployed to detect abnormal behaviors. Moreover, by introducing adversarial training mechanisms, the robustness of the proposed model is effectively improved. The experimental results on our self‐built gymnasium abnormal behavior dataset show that the proposed model can correctly identify most of the abnormal behaviors in the gymnasium compared to other models.","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2024-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141667033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic multipath routing for energy‐efficient and reliable communication in 6G networks with MIMO 在具有多输入多输出(MIMO)的 6G 网络中实现高能效和可靠通信的动态多路径路由选择
IF 0.9 Q4 TELECOMMUNICATIONS Pub Date : 2024-07-07 DOI: 10.1002/itl2.559
C. Annadurai, I. Nelson, K. Nirmala Devi, G. Thavasi Raja
In the era of 6G networks, Multiple Input Multiple Output (MIMO) technology offers unprecedented opportunities for high‐throughput and low‐latency communication. Existing communication frameworks, however, have difficulty optimizing both energy efficiency and reliability at the same time. In most cases, conventional routing protocols fail to meet the needs of MIMO systems, making them inefficient and prone to reliability problems due to their inability to dynamically adapt to different network conditions. This research addresses the intricate interplay between energy efficiency and reliability within the context of 6G networks with MIMO. The motivation for this research arises from the imperative to unlock the full potential of 6G networks with MIMO for achieving energy‐efficient and reliable communication. With the advancement of communication technology, seamless connectivity, minimal energy consumption, and robust reliability become increasingly critical. Currently, solutions cannot adapt dynamically to the diverse and dynamic conditions of a 6G environment. Through this research, we aim to bridge this gap, enhancing 6G network performance and sustainability with unprecedented gains in energy efficiency and reliability. We have developed the Dynamic Multipath Routing (DMR) algorithm by harnessing the advanced features of MIMO technology. The DMR algorithm strategically chooses paths to minimize the effects of fading, interference, and channel impairments, creating a resilient communication network. This improvement is essential for meeting the demanding connectivity needs of various 6G applications, covering ultra‐reliable low‐latency communication and massive machine‐type communication.
在 6G 网络时代,多输入多输出(MIMO)技术为高吞吐量和低延迟通信提供了前所未有的机遇。然而,现有的通信框架难以同时优化能效和可靠性。在大多数情况下,传统的路由协议无法满足 MIMO 系统的需求,使其效率低下,并且由于无法动态适应不同的网络条件而容易出现可靠性问题。本研究探讨了采用 MIMO 的 6G 网络中能效与可靠性之间错综复杂的相互作用。这项研究的动机来自于充分释放采用 MIMO 的 6G 网络的潜力,以实现高能效和高可靠性通信的迫切需要。随着通信技术的发展,无缝连接、最低能耗和稳健可靠性变得越来越重要。目前,解决方案无法动态适应 6G 环境中的各种动态条件。通过这项研究,我们旨在弥合这一差距,以前所未有的能效和可靠性提升来增强 6G 网络的性能和可持续性。我们利用多输入多输出(MIMO)技术的先进特性,开发了动态多路径路由(DMR)算法。DMR 算法战略性地选择路径,最大限度地减少衰减、干扰和信道损伤的影响,从而创建一个弹性通信网络。这一改进对于满足各种 6G 应用(包括超可靠低延迟通信和大规模机器型通信)的连接需求至关重要。
{"title":"Dynamic multipath routing for energy‐efficient and reliable communication in 6G networks with MIMO","authors":"C. Annadurai, I. Nelson, K. Nirmala Devi, G. Thavasi Raja","doi":"10.1002/itl2.559","DOIUrl":"https://doi.org/10.1002/itl2.559","url":null,"abstract":"In the era of 6G networks, Multiple Input Multiple Output (MIMO) technology offers unprecedented opportunities for high‐throughput and low‐latency communication. Existing communication frameworks, however, have difficulty optimizing both energy efficiency and reliability at the same time. In most cases, conventional routing protocols fail to meet the needs of MIMO systems, making them inefficient and prone to reliability problems due to their inability to dynamically adapt to different network conditions. This research addresses the intricate interplay between energy efficiency and reliability within the context of 6G networks with MIMO. The motivation for this research arises from the imperative to unlock the full potential of 6G networks with MIMO for achieving energy‐efficient and reliable communication. With the advancement of communication technology, seamless connectivity, minimal energy consumption, and robust reliability become increasingly critical. Currently, solutions cannot adapt dynamically to the diverse and dynamic conditions of a 6G environment. Through this research, we aim to bridge this gap, enhancing 6G network performance and sustainability with unprecedented gains in energy efficiency and reliability. We have developed the Dynamic Multipath Routing (DMR) algorithm by harnessing the advanced features of MIMO technology. The DMR algorithm strategically chooses paths to minimize the effects of fading, interference, and channel impairments, creating a resilient communication network. This improvement is essential for meeting the demanding connectivity needs of various 6G applications, covering ultra‐reliable low‐latency communication and massive machine‐type communication.","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2024-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141670645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Plant disease detection using machine learning techniques based on internet of things (IoT) sensor network 利用基于物联网传感器网络的机器学习技术检测植物病害
IF 0.9 Q4 TELECOMMUNICATIONS Pub Date : 2024-07-01 DOI: 10.1002/itl2.546
Bere Sachin Sukhadeo, Y. Sinkar, Sarika Dilip Dhurgude, Shashikant V. Athawale
In recent years, smart agriculture has grown rapidly. A crop disease is generally caused by pests, insects, or pathogens and reduces the productivity of the crop by adversely affecting its yield. There is a severe loss of crops across the country due to various crop diseases, and one reason is not being able to detect the disease in its early stages keeps them from finding a solution. An Internet of Things (IOT) sensor network is used to detect and classify diseases in leaves in this paper. Precision agriculture uses machine learning techniques to increase crop growth, control the cultivation process, and enhance crop productivity with less human involvement. IOT sensor networks are being used in precision agriculture using machine learning techniques. A result of the proposed method shows an overall accuracy of 88%.
近年来,智慧农业发展迅速。农作物病害一般由害虫、昆虫或病原体引起,会对农作物的产量产生不利影响,从而降低农作物的产量。由于各种农作物病害,全国各地的农作物损失严重,其中一个原因就是无法在病害早期发现,使他们无法找到解决办法。本文利用物联网(IOT)传感器网络对叶片中的病害进行检测和分类。精准农业利用机器学习技术来提高作物生长、控制种植过程,并在减少人工参与的情况下提高作物产量。物联网传感器网络正在利用机器学习技术用于精准农业。所提方法的结果显示,总体准确率为 88%。
{"title":"Plant disease detection using machine learning techniques based on internet of things (IoT) sensor network","authors":"Bere Sachin Sukhadeo, Y. Sinkar, Sarika Dilip Dhurgude, Shashikant V. Athawale","doi":"10.1002/itl2.546","DOIUrl":"https://doi.org/10.1002/itl2.546","url":null,"abstract":"In recent years, smart agriculture has grown rapidly. A crop disease is generally caused by pests, insects, or pathogens and reduces the productivity of the crop by adversely affecting its yield. There is a severe loss of crops across the country due to various crop diseases, and one reason is not being able to detect the disease in its early stages keeps them from finding a solution. An Internet of Things (IOT) sensor network is used to detect and classify diseases in leaves in this paper. Precision agriculture uses machine learning techniques to increase crop growth, control the cultivation process, and enhance crop productivity with less human involvement. IOT sensor networks are being used in precision agriculture using machine learning techniques. A result of the proposed method shows an overall accuracy of 88%.","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141714422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integrating optical security management with optical‐layer controller architecture for enhanced network security 将光安全管理与光层控制器架构相结合,增强网络安全
IF 0.9 Q4 TELECOMMUNICATIONS Pub Date : 2024-07-01 DOI: 10.1002/itl2.558
Himanshi Babbar, S. Rani
To guarantee the availability, confidentiality, and integrity of data transferred over optical channels—especially in the context of fifth‐generation (5G) communication infrastructure—optical network security management is essential. This paper provides an overview of security management for optical networks, emphasizing the importance of this practice in today's communication infrastructure and the difficulties presented by ever changing cyberthreats. The architecture of optical security management is shown, with special attention to how well it integrates with current optical‐layer controllers and how it facilitates the coordination of security operations among optical networks. The study also looks at use cases for optical network security management in 5G networks, such as safe data transfer, defense against cyberattacks, maintaining privacy in 5G apps, network slicing security, and resistance to physical assaults. Such instances highlight the adaptability and significance of optical network security management in bolstering 5G networks' security, privacy, and resilience across a range of businesses and applications.
为了保证通过光通道传输的数据的可用性、保密性和完整性,特别是在第五代(5G)通信基础设施的背景下,光网络安全管理至关重要。本文概述了光网络的安全管理,强调了这一做法在当今通信基础设施中的重要性以及不断变化的网络威胁所带来的困难。本文介绍了光安全管理的架构,特别关注它与当前光层控制器的集成程度,以及它如何促进光网络之间安全操作的协调。研究还探讨了光网络安全管理在 5G 网络中的用例,如安全数据传输、防御网络攻击、维护 5G 应用中的隐私、网络切片安全以及抵御物理攻击。这些案例凸显了光网络安全管理在增强 5G 网络的安全性、私密性和弹性方面的适应性和重要性,适用于各种业务和应用。
{"title":"Integrating optical security management with optical‐layer controller architecture for enhanced network security","authors":"Himanshi Babbar, S. Rani","doi":"10.1002/itl2.558","DOIUrl":"https://doi.org/10.1002/itl2.558","url":null,"abstract":"To guarantee the availability, confidentiality, and integrity of data transferred over optical channels—especially in the context of fifth‐generation (5G) communication infrastructure—optical network security management is essential. This paper provides an overview of security management for optical networks, emphasizing the importance of this practice in today's communication infrastructure and the difficulties presented by ever changing cyberthreats. The architecture of optical security management is shown, with special attention to how well it integrates with current optical‐layer controllers and how it facilitates the coordination of security operations among optical networks. The study also looks at use cases for optical network security management in 5G networks, such as safe data transfer, defense against cyberattacks, maintaining privacy in 5G apps, network slicing security, and resistance to physical assaults. Such instances highlight the adaptability and significance of optical network security management in bolstering 5G networks' security, privacy, and resilience across a range of businesses and applications.","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141696805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient security and privacy approach for internet of vehicles in vehicular networks for smart cities 智能城市车联网的高效安全和隐私保护方法
Pub Date : 2024-06-12 DOI: 10.1002/itl2.554
Elham Kariri
Intelligent sensing plays a crucial role in making vehicles safe and trouble‐free. The purpose of this paper is to introduce Vehicular Sensor Networks (VSNs) in a vehicular IoT‐based smart city paradigm, focusing on security. Furthermore, we discuss the robustness and reliability of VSN. In this design, Ad hoc On‐Demand Distance Vector (AODV) routing‐based Internet of Vehicles is integrated with a privacy‐aware secure ant colony optimization for smart cities in which suspicious vehicles are prevented from disseminating messages. IoV real‐time communication emphasizes data security. A comparison of experimental results shows that the proposed approach outperforms existing approaches. Smart city communication networks can be optimized using the proposed model.
智能传感在确保车辆安全无故障方面发挥着至关重要的作用。本文旨在介绍基于车辆物联网的智慧城市范例中的车载传感器网络(VSN),重点关注安全性。此外,我们还讨论了 VSN 的鲁棒性和可靠性。在这一设计中,基于特设按需距离矢量(AODV)路由的车联网与智能城市的隐私感知安全蚁群优化相结合,防止可疑车辆传播信息。IoV 实时通信强调数据安全。实验结果比较表明,所提出的方法优于现有方法。智能城市通信网络可以利用提出的模型进行优化。
{"title":"An efficient security and privacy approach for internet of vehicles in vehicular networks for smart cities","authors":"Elham Kariri","doi":"10.1002/itl2.554","DOIUrl":"https://doi.org/10.1002/itl2.554","url":null,"abstract":"Intelligent sensing plays a crucial role in making vehicles safe and trouble‐free. The purpose of this paper is to introduce Vehicular Sensor Networks (VSNs) in a vehicular IoT‐based smart city paradigm, focusing on security. Furthermore, we discuss the robustness and reliability of VSN. In this design, Ad hoc On‐Demand Distance Vector (AODV) routing‐based Internet of Vehicles is integrated with a privacy‐aware secure ant colony optimization for smart cities in which suspicious vehicles are prevented from disseminating messages. IoV real‐time communication emphasizes data security. A comparison of experimental results shows that the proposed approach outperforms existing approaches. Smart city communication networks can be optimized using the proposed model.","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141353691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Leveraging 5G and cloud computing for outlier detection in IoT environments: A KNN approach 利用 5G 和云计算检测物联网环境中的异常值:KNN 方法
Pub Date : 2024-06-12 DOI: 10.1002/itl2.550
S. A. Sahaaya Arul Mary, H. Anwar Basha, G. Mohanraj, R. Kiruthikaa, N. Saranya
Internet of Things (IoT) becomes a prominent sensing paradigm between the devices. Its evolution in the global digital increases extensively in various domains. For IoT application's sensors are the primary source for generating data. These collected data are subject to the identification and detection of outliers/anomalies. The massive volume of data generation makes anomaly detection a complex and challenging task. The anomalies affect the data accuracy and data quality. In this paper, the k‐NN classifier is proposed for enhancing classification accuracy. K‐NN follows a non‐parametric strategy and is one of the known classification algorithms. In the proposed system, k‐NN is utilized to perform classification or regression with estimations of their k nearest neighbors. The proposed system consists of three major processes such as data preprocessing, classification, visualization. This study explores the utilization of 5G connectivity and cloud computing infrastructure for outlier detection in IoT data streams. Leveraging the K‐Nearest Neighbors (KNN) classifier, our methodology focuses on efficiently identifying anomalies in IoT data. By integrating 5G connectivity for real‐time data transmission and cloud‐based machine learning for scalable analysis, we demonstrate a robust framework for outlier detection in IoT environments. The Experimental work with the proposed method is carried out using training and observation is tabulated with respective classes. As a result, on the three metrics, the proposed k‐NN proves its efficiency is far better than the others, with an average of 98.4% of accuracy.
物联网(IoT)已成为设备之间的一种重要传感模式。它在全球数字领域的发展广泛涉及各个领域。对于物联网应用来说,传感器是产生数据的主要来源。这些收集到的数据需要对异常值/异常现象进行识别和检测。海量数据的产生使得异常检测成为一项复杂而具有挑战性的任务。异常会影响数据的准确性和数据质量。本文提出 k-NN 分类器来提高分类准确性。K-NN 采用非参数策略,是已知的分类算法之一。在提议的系统中,K-NN 利用其 k 个近邻的估计值来执行分类或回归。拟议的系统由数据预处理、分类和可视化等三个主要过程组成。本研究探讨了如何利用 5G 连接和云计算基础设施来检测物联网数据流中的离群点。利用 K-Nearest Neighbors(KNN)分类器,我们的方法侧重于高效识别物联网数据中的异常点。通过整合用于实时数据传输的 5G 连接和用于可扩展分析的基于云的机器学习,我们展示了一个用于物联网环境中异常值检测的强大框架。我们利用训练和观察结果对所提出的方法进行了实验,并将观察结果与相应的类别进行了对比。结果表明,在三个指标上,拟议的 k-NN 的效率远远高于其他方法,平均准确率达到 98.4%。
{"title":"Leveraging 5G and cloud computing for outlier detection in IoT environments: A KNN approach","authors":"S. A. Sahaaya Arul Mary, H. Anwar Basha, G. Mohanraj, R. Kiruthikaa, N. Saranya","doi":"10.1002/itl2.550","DOIUrl":"https://doi.org/10.1002/itl2.550","url":null,"abstract":"Internet of Things (IoT) becomes a prominent sensing paradigm between the devices. Its evolution in the global digital increases extensively in various domains. For IoT application's sensors are the primary source for generating data. These collected data are subject to the identification and detection of outliers/anomalies. The massive volume of data generation makes anomaly detection a complex and challenging task. The anomalies affect the data accuracy and data quality. In this paper, the k‐NN classifier is proposed for enhancing classification accuracy. K‐NN follows a non‐parametric strategy and is one of the known classification algorithms. In the proposed system, k‐NN is utilized to perform classification or regression with estimations of their k nearest neighbors. The proposed system consists of three major processes such as data preprocessing, classification, visualization. This study explores the utilization of 5G connectivity and cloud computing infrastructure for outlier detection in IoT data streams. Leveraging the K‐Nearest Neighbors (KNN) classifier, our methodology focuses on efficiently identifying anomalies in IoT data. By integrating 5G connectivity for real‐time data transmission and cloud‐based machine learning for scalable analysis, we demonstrate a robust framework for outlier detection in IoT environments. The Experimental work with the proposed method is carried out using training and observation is tabulated with respective classes. As a result, on the three metrics, the proposed k‐NN proves its efficiency is far better than the others, with an average of 98.4% of accuracy.","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141351287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimizing live video streaming: Integrating 5G, IoT, and cloud computing with machine learning 优化实时视频流:将 5G、物联网和云计算与机器学习相结合
Pub Date : 2024-06-07 DOI: 10.1002/itl2.556
L. Srinivasan, Humaira Nishat, S. Shargunam, Deepak Kumar Nayak, K. Janani
In this research, we optimize live video broadcast performance by incorporating advanced technologies such as 5G, the Internet of Things (IoT), and cloud computing. Our approach utilizes the Random Forest classifier to categorize data, achieving a 99% precision rate. A comparative study demonstrates that our proposed technique outperforms RCNN and Mask‐RCNN methods in optimizing video streaming efficacy. We show that our method efficiently enhances video streaming quality by integrating machine learning technologies. The combination of 5G, IoT, and cloud computing creates a robust environment for delivering optimized Live video streaming to users. This research underscores the importance of leveraging cutting‐edge technology to address optimization challenges in modern video streaming systems, focusing on the real‐time optimization of video streams in contemporary technological environments.
在这项研究中,我们结合了 5G、物联网(IoT)和云计算等先进技术,优化了视频直播性能。我们的方法利用随机森林分类器对数据进行分类,准确率达到 99%。对比研究表明,我们提出的技术在优化视频流效果方面优于 RCNN 和 Mask-RCNN 方法。我们的研究表明,我们的方法通过整合机器学习技术有效地提高了视频流的质量。5G、物联网和云计算的结合为向用户提供优化的实时视频流创造了一个强大的环境。这项研究强调了利用前沿技术解决现代视频流系统优化难题的重要性,重点关注当代技术环境下视频流的实时优化。
{"title":"Optimizing live video streaming: Integrating 5G, IoT, and cloud computing with machine learning","authors":"L. Srinivasan, Humaira Nishat, S. Shargunam, Deepak Kumar Nayak, K. Janani","doi":"10.1002/itl2.556","DOIUrl":"https://doi.org/10.1002/itl2.556","url":null,"abstract":"In this research, we optimize live video broadcast performance by incorporating advanced technologies such as 5G, the Internet of Things (IoT), and cloud computing. Our approach utilizes the Random Forest classifier to categorize data, achieving a 99% precision rate. A comparative study demonstrates that our proposed technique outperforms RCNN and Mask‐RCNN methods in optimizing video streaming efficacy. We show that our method efficiently enhances video streaming quality by integrating machine learning technologies. The combination of 5G, IoT, and cloud computing creates a robust environment for delivering optimized Live video streaming to users. This research underscores the importance of leveraging cutting‐edge technology to address optimization challenges in modern video streaming systems, focusing on the real‐time optimization of video streams in contemporary technological environments.","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141375194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy‐efficient clustering algorithm using distributed fuzzy‐logic to prolong the survivability of wireless sensor networks 利用分布式模糊逻辑的节能聚类算法延长无线传感器网络的生存能力
Pub Date : 2024-06-05 DOI: 10.1002/itl2.549
Lulwah M. Alkwai, Kusum Yadav
Energy efficiency is critical for prolonging the survivability of wireless sensor networks (WSNs), and clustering algorithms play a significant role in achieving this goal. An application‐specific wireless sensor network requires adapted methods and techniques to meet its requirements. A vast amount of research has been done on optimizing energy consumption and enhancing network lifetime of sensor nodes. To increase the lifetime of WSNs, we present and evaluate an energy‐efficient clustering algorithm based on distributed fuzzy logic (EECADFL). High reliability, low error rates during clustering, and its ability to perform well in large‐scale networks with many nodes are some of the main benefits of this method. In wireless sensor networks, simulation results showed that the scheme provided better lifetime performance while limiting dead nodes and improving cluster head selection.
能源效率对于延长无线传感器网络(WSN)的生存能力至关重要,而聚类算法在实现这一目标方面发挥着重要作用。针对特定应用的无线传感器网络需要采用相应的方法和技术来满足其要求。在优化能耗和提高传感器节点的网络寿命方面,已经开展了大量研究。为了延长 WSN 的使用寿命,我们提出并评估了一种基于分布式模糊逻辑(EECADFL)的高能效聚类算法。高可靠性、聚类过程中的低错误率以及在节点众多的大规模网络中的良好表现是这种方法的主要优点。在无线传感器网络中,仿真结果表明,该方案在限制死节点和改进簇头选择的同时,提供了更好的寿命性能。
{"title":"Energy‐efficient clustering algorithm using distributed fuzzy‐logic to prolong the survivability of wireless sensor networks","authors":"Lulwah M. Alkwai, Kusum Yadav","doi":"10.1002/itl2.549","DOIUrl":"https://doi.org/10.1002/itl2.549","url":null,"abstract":"Energy efficiency is critical for prolonging the survivability of wireless sensor networks (WSNs), and clustering algorithms play a significant role in achieving this goal. An application‐specific wireless sensor network requires adapted methods and techniques to meet its requirements. A vast amount of research has been done on optimizing energy consumption and enhancing network lifetime of sensor nodes. To increase the lifetime of WSNs, we present and evaluate an energy‐efficient clustering algorithm based on distributed fuzzy logic (EECADFL). High reliability, low error rates during clustering, and its ability to perform well in large‐scale networks with many nodes are some of the main benefits of this method. In wireless sensor networks, simulation results showed that the scheme provided better lifetime performance while limiting dead nodes and improving cluster head selection.","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141383080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Internet Technology Letters
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1