首页 > 最新文献

Int. J. Pervasive Comput. Commun.最新文献

英文 中文
A novel OTP based tripartite authentication scheme 一种新的基于OTP的三方认证方案
Pub Date : 2021-08-19 DOI: 10.1108/ijpcc-04-2021-0097
S. A. Lone, A. H. Mir
PurposeBecause of the continued use of mobile, cloud and the internet of things, the possibility of data breaches is on the increase. A secure authentication and authorization strategy is a must for many of today’s applications. Authentication schemes based on knowledge and tokens, although widely used, lead to most security breaches. While providing various advantages, biometrics are also subject to security threats. Using multiple factors together for authentication provides more certainty about a user’s identity; thus, leading to a more reliable, effective and more difficult for an adversary to intrude. This study aims to propose a novel, secure and highly stable multi-factor one-time password (OTP) authentication solution for mobile environments, which uses all three authentication factors for user authentication.Design/methodology/approachThe proposed authentication scheme is implemented as a challenge-response authentication where three factors (username, device number and fingerprint) are used as a secret key between the client and the server. The current scheme adopts application-based authentication and guarantees data confidentiality and improved security because of the integration of biometrics with other factors and each time new challenge value by the server to client for OTP generation.FindingsThe proposed authentication scheme is implemented on real android-based mobile devices, tested on real users; experimental results show that the proposed authentication scheme attains improved performance. Furthermore, usability evaluation proves that proposed authentication is effective, efficient and convenient for users in mobile environments.Originality/valueThe proposed authentication scheme can be adapted as an effective authentication scheme to accessing critical information using android smartphones.
由于移动、云和物联网的持续使用,数据泄露的可能性正在增加。对于当今的许多应用程序来说,安全的身份验证和授权策略是必须的。基于知识和令牌的身份验证方案虽然被广泛使用,但会导致大多数安全漏洞。生物识别技术在提供各种优势的同时,也面临着安全威胁。同时使用多个因素进行身份验证可以更确定用户的身份;因此,导致更可靠,有效和更难以入侵的对手。本研究旨在提出一种新颖、安全且高度稳定的移动环境多因素一次性密码(OTP)认证解决方案,该方案使用所有三种认证因素进行用户认证。设计/方法/方法所提出的身份验证方案被实现为一个质询-响应身份验证,其中三个因素(用户名、设备号和指纹)被用作客户端和服务器之间的密钥。目前的方案采用基于应用程序的身份验证,由于生物特征与其他因素的融合以及每次服务器向客户端生成新的挑战值,保证了数据的保密性,提高了安全性。所提出的认证方案在真实的基于android的移动设备上实现,并对真实用户进行了测试;实验结果表明,该认证方案取得了较好的性能。此外,可用性评估证明了所提出的认证方法对移动环境下的用户是有效、高效和方便的。原创性/价值提出的认证方案可以作为使用android智能手机访问关键信息的有效认证方案。
{"title":"A novel OTP based tripartite authentication scheme","authors":"S. A. Lone, A. H. Mir","doi":"10.1108/ijpcc-04-2021-0097","DOIUrl":"https://doi.org/10.1108/ijpcc-04-2021-0097","url":null,"abstract":"\u0000Purpose\u0000Because of the continued use of mobile, cloud and the internet of things, the possibility of data breaches is on the increase. A secure authentication and authorization strategy is a must for many of today’s applications. Authentication schemes based on knowledge and tokens, although widely used, lead to most security breaches. While providing various advantages, biometrics are also subject to security threats. Using multiple factors together for authentication provides more certainty about a user’s identity; thus, leading to a more reliable, effective and more difficult for an adversary to intrude. This study aims to propose a novel, secure and highly stable multi-factor one-time password (OTP) authentication solution for mobile environments, which uses all three authentication factors for user authentication.\u0000\u0000\u0000Design/methodology/approach\u0000The proposed authentication scheme is implemented as a challenge-response authentication where three factors (username, device number and fingerprint) are used as a secret key between the client and the server. The current scheme adopts application-based authentication and guarantees data confidentiality and improved security because of the integration of biometrics with other factors and each time new challenge value by the server to client for OTP generation.\u0000\u0000\u0000Findings\u0000The proposed authentication scheme is implemented on real android-based mobile devices, tested on real users; experimental results show that the proposed authentication scheme attains improved performance. Furthermore, usability evaluation proves that proposed authentication is effective, efficient and convenient for users in mobile environments.\u0000\u0000\u0000Originality/value\u0000The proposed authentication scheme can be adapted as an effective authentication scheme to accessing critical information using android smartphones.\u0000","PeriodicalId":210948,"journal":{"name":"Int. J. Pervasive Comput. Commun.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124887837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A survey on various handover technologies in 5G network using the modular handover modules 基于模块化切换模块的5G网络中各种切换技术综述
Pub Date : 2021-08-19 DOI: 10.1108/ijpcc-11-2020-0205
Sanjay Sudhir Kulkarni, A. Bavarva
PurposeFifth-generation (5G) networks play a significant role in handover methods. 5G wireless network is open, flexible and highly heterogeneous along with the overlay coverage and small cell deployments. Handover management is one of the main problems in the heterogeneous network. Also, handover satisfies the needs of ultra-reliable communications along with very high reliability and availability in 5G networks. Handover management deals with every active connection of a user’s device, which moves the connection between the user’s device and the counterparty from one network point to another. Thus, the handover decision determines the best access network and also decides whether the handover is performed or not.Design/methodology/approachThe main intention of this survey is to review several existing handover technologies in 5G. Using the categories of analysis, the existing techniques are divided into different techniques such as authentication-based techniques, blockchain-based techniques, software-defined-based techniques and radio access-based techniques. The survey is made by considering the methods such as used software, categorization of methods and used in the research works. Furthermore, the handover rate is considered for performance evaluation for the handover techniques in 5G. The drawbacks present in the existing review papers are elaborated in research gaps and issues division.FindingsThrough the detailed analysis and discussion, it can be summarized that the widely concerned evaluation metric for the performance evaluation is the handover rate. It is exploited that the handover rate within the range of 91%–99% is achieved by three research papers.Originality/valueA survey on the various handover mechanisms in 5G networks is expected in this study. The research papers used in this survey are gathered from different sources such as Google Scholar and IEEE. Also, this survey suggests a further extension for the handover mechanism in 5G networks by considering various research gaps and issues.
目的第五代(5G)网络在切换方法中发挥着重要作用。5G无线网络具有开放、灵活、高度异构、覆盖和小蜂窝部署等特点。切换管理是异构网络中的主要问题之一。此外,在5G网络中,切换满足了超可靠通信以及非常高的可靠性和可用性的需求。切换管理处理用户设备的每一个活动连接,它将用户设备和对手方之间的连接从一个网络点移动到另一个网络点。因此,切换决策决定了最佳接入网,也决定了是否进行切换。设计/方法/方法本调查的主要目的是回顾5G中几种现有的切换技术。使用分析的类别,现有技术分为不同的技术,如基于身份验证的技术,基于区块链的技术,基于软件定义的技术和基于无线电访问的技术。通过对所使用的软件、方法的分类和在研究工作中使用的方法进行调查。此外,在对5G切换技术进行性能评估时,还考虑了切换速率。在研究差距和问题划分中阐述了现有综述论文存在的不足。通过详细的分析和讨论,可以总结出绩效评估中被广泛关注的评价指标是交接率。利用三篇研究论文,实现了91%-99%范围内的交接率。本研究预计将对5G网络中的各种切换机制进行调查。本调查中使用的研究论文来自不同的来源,如Google Scholar和IEEE。此外,该调查建议通过考虑各种研究差距和问题,进一步扩展5G网络的移交机制。
{"title":"A survey on various handover technologies in 5G network using the modular handover modules","authors":"Sanjay Sudhir Kulkarni, A. Bavarva","doi":"10.1108/ijpcc-11-2020-0205","DOIUrl":"https://doi.org/10.1108/ijpcc-11-2020-0205","url":null,"abstract":"\u0000Purpose\u0000Fifth-generation (5G) networks play a significant role in handover methods. 5G wireless network is open, flexible and highly heterogeneous along with the overlay coverage and small cell deployments. Handover management is one of the main problems in the heterogeneous network. Also, handover satisfies the needs of ultra-reliable communications along with very high reliability and availability in 5G networks. Handover management deals with every active connection of a user’s device, which moves the connection between the user’s device and the counterparty from one network point to another. Thus, the handover decision determines the best access network and also decides whether the handover is performed or not.\u0000\u0000\u0000Design/methodology/approach\u0000The main intention of this survey is to review several existing handover technologies in 5G. Using the categories of analysis, the existing techniques are divided into different techniques such as authentication-based techniques, blockchain-based techniques, software-defined-based techniques and radio access-based techniques. The survey is made by considering the methods such as used software, categorization of methods and used in the research works. Furthermore, the handover rate is considered for performance evaluation for the handover techniques in 5G. The drawbacks present in the existing review papers are elaborated in research gaps and issues division.\u0000\u0000\u0000Findings\u0000Through the detailed analysis and discussion, it can be summarized that the widely concerned evaluation metric for the performance evaluation is the handover rate. It is exploited that the handover rate within the range of 91%–99% is achieved by three research papers.\u0000\u0000\u0000Originality/value\u0000A survey on the various handover mechanisms in 5G networks is expected in this study. The research papers used in this survey are gathered from different sources such as Google Scholar and IEEE. Also, this survey suggests a further extension for the handover mechanism in 5G networks by considering various research gaps and issues.\u0000","PeriodicalId":210948,"journal":{"name":"Int. J. Pervasive Comput. Commun.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134497742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research perspective on energy-efficient protocols in IoT: emerging development of green IoT 物联网节能协议研究展望:绿色物联网的新兴发展
Pub Date : 2021-08-16 DOI: 10.1108/ijpcc-10-2019-0079
Umakant L Tupe, S. Babar, Sonali P. Kadam, P. Mahalle
PurposeInternet of Things (IoT) is an up-and-coming conception that intends to link multiple devices with each other. The aim of this study is to provide a significant analysis of Green IoT. The IoT devices sense, gather and send out significant data from their ambiance. This exchange of huge data among billions of devices demands enormous energy. Green IoT visualizes the concept of minimizing the energy consumption of IoT devices and keeping the environment safe.Design/methodology/approachThis paper attempts to analyze diverse techniques associated with energy-efficient protocols in green IoT pertaining to machine-to-machine (M2M) communication. Here, it reviews 73 research papers and states a significant analysis. Initially, the analysis focuses on different contributions related to green energy constraints, especially energy efficiency, and different hierarchical routing protocols. Moreover, the contributions of different optimization algorithms in different state-of-the-art works are also observed and reviewed. Later the performance measures computed in entire contributions along with the energy constraints are also checked to validate the effectiveness of entire contributions. As the number of contributions to energy-efficient protocols in IoT is low, the research gap will focus on the development of intelligent energy-efficient protocols to build up green IoT.FindingsThe analysis was mainly focused on the green energy constraints and the different robust protocols and also gives information on a few powerful optimization algorithms. The parameters considered by the previous research works for improving the performance were also analyzed in this paper to get an idea for future works. Finally, the paper gives some brief description of the research gaps and challenges for future consideration that helps during the development of an energy-efficient green IoT pertaining to M2M communication.Originality/valueTo the best of the authors’ knowledge, this is the first work that reviews 65 research papers and states the significant analysis of green IoT.
物联网(IoT)是一个新兴的概念,旨在将多个设备相互连接起来。本研究的目的是提供绿色物联网的重要分析。物联网设备从其环境中感知、收集和发送重要数据。数十亿台设备之间的巨大数据交换需要巨大的能量。绿色物联网将最小化物联网设备的能耗和保持环境安全的概念可视化。本文试图分析与绿色物联网中与机器对机器(M2M)通信相关的节能协议相关的各种技术。在这里,它回顾了73篇研究论文,并提出了一个重要的分析。首先,分析侧重于与绿色能源约束相关的不同贡献,特别是能源效率,以及不同的分层路由协议。此外,还观察和回顾了不同优化算法在不同最新工作中的贡献。随后,还检查了在总贡献中计算的性能度量以及能量约束,以验证总贡献的有效性。由于物联网中节能协议的贡献较少,研究缺口将集中在智能节能协议的开发上,以构建绿色物联网。结果主要分析了绿色能源约束和不同鲁棒协议,并给出了一些强大的优化算法。本文还对以往研究工作中为提高性能所考虑的参数进行了分析,为今后的工作提供思路。最后,本文简要描述了研究差距和挑战,以供未来考虑,这有助于开发与M2M通信相关的节能绿色物联网。原创性/价值据作者所知,这是第一部回顾了65篇研究论文并阐述了绿色物联网的重要分析的作品。
{"title":"Research perspective on energy-efficient protocols in IoT: emerging development of green IoT","authors":"Umakant L Tupe, S. Babar, Sonali P. Kadam, P. Mahalle","doi":"10.1108/ijpcc-10-2019-0079","DOIUrl":"https://doi.org/10.1108/ijpcc-10-2019-0079","url":null,"abstract":"\u0000Purpose\u0000Internet of Things (IoT) is an up-and-coming conception that intends to link multiple devices with each other. The aim of this study is to provide a significant analysis of Green IoT. The IoT devices sense, gather and send out significant data from their ambiance. This exchange of huge data among billions of devices demands enormous energy. Green IoT visualizes the concept of minimizing the energy consumption of IoT devices and keeping the environment safe.\u0000\u0000\u0000Design/methodology/approach\u0000This paper attempts to analyze diverse techniques associated with energy-efficient protocols in green IoT pertaining to machine-to-machine (M2M) communication. Here, it reviews 73 research papers and states a significant analysis. Initially, the analysis focuses on different contributions related to green energy constraints, especially energy efficiency, and different hierarchical routing protocols. Moreover, the contributions of different optimization algorithms in different state-of-the-art works are also observed and reviewed. Later the performance measures computed in entire contributions along with the energy constraints are also checked to validate the effectiveness of entire contributions. As the number of contributions to energy-efficient protocols in IoT is low, the research gap will focus on the development of intelligent energy-efficient protocols to build up green IoT.\u0000\u0000\u0000Findings\u0000The analysis was mainly focused on the green energy constraints and the different robust protocols and also gives information on a few powerful optimization algorithms. The parameters considered by the previous research works for improving the performance were also analyzed in this paper to get an idea for future works. Finally, the paper gives some brief description of the research gaps and challenges for future consideration that helps during the development of an energy-efficient green IoT pertaining to M2M communication.\u0000\u0000\u0000Originality/value\u0000To the best of the authors’ knowledge, this is the first work that reviews 65 research papers and states the significant analysis of green IoT.\u0000","PeriodicalId":210948,"journal":{"name":"Int. J. Pervasive Comput. Commun.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130876569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Context-aware assistive driving: an overview of techniques for mitigating the risks of driver in real-time driving environment 上下文感知辅助驾驶:在实时驾驶环境中减轻驾驶员风险的技术概述
Pub Date : 2021-08-16 DOI: 10.1108/ijpcc-11-2020-0192
S. Gite, K. Kotecha, G. Ghinea
PurposeThis study aims to analyze driver risks in the driving environment. A complete analysis of context aware assistive driving techniques. Context awareness in assistive driving by probabilistic modeling techniques. Advanced techniques using Spatio-temporal techniques, computer vision and deep learning techniques.Design/methodology/approachAutonomous vehicles have been aimed to increase driver safety by introducing vehicle control from the driver to Advanced Driver Assistance Systems (ADAS). The core objective of these systems is to cut down on road accidents by helping the user in various ways. Early anticipation of a particular action would give a prior benefit to the driver to successfully handle the dangers on the road. In this paper, the advancements that have taken place in the use of multi-modal machine learning for assistive driving systems are surveyed. The aim is to help elucidate the recent progress and techniques in the field while also identifying the scope for further research and improvement. The authors take an overview of context-aware driver assistance systems that alert drivers in case of maneuvers by taking advantage of multi-modal human processing to better safety and drivability.FindingsThere has been a huge improvement and investment in ADAS being a key concept for road safety. In such applications, data is processed and information is extracted from multiple data sources, thus requiring training of machine learning algorithms in a multi-modal style. The domain is fast gaining traction owing to its applications across multiple disciplines with crucial gains.Research limitations/implicationsThe research is focused on deep learning and computer vision-based techniques to generate a context for assistive driving and it would definitely adopt by the ADAS manufacturers.Social implicationsAs context-aware assistive driving would work in real-time and it would save the lives of many drivers, pedestrians.Originality/valueThis paper provides an understanding of context-aware deep learning frameworks for assistive driving. The research is mainly focused on deep learning and computer vision-based techniques to generate a context for assistive driving. It incorporates the latest state-of-the-art techniques using suitable driving context and the driver is alerted. Many automobile manufacturing companies and researchers would refer to this study for their enhancements.
本研究旨在分析驾驶员在驾驶环境中的风险。上下文感知辅助驾驶技术的完整分析。基于概率建模技术的辅助驾驶环境感知。使用时空技术、计算机视觉和深度学习技术的先进技术。设计/方法/方法自动驾驶汽车旨在通过将车辆控制从驾驶员引入高级驾驶员辅助系统(ADAS)来提高驾驶员的安全性。这些系统的核心目标是通过各种方式帮助用户减少交通事故。对某一特定动作的早期预测将使驾驶员在成功地处理道路上的危险方面占有先机。本文对辅助驾驶系统中使用多模态机器学习的进展进行了调查。目的是帮助阐明该领域的最新进展和技术,同时也确定进一步研究和改进的范围。作者概述了上下文感知驾驶员辅助系统,该系统通过利用多模式人工处理来提高安全性和驾驶性能,从而在机动情况下提醒驾驶员。作为道路安全的关键概念,ADAS已经有了巨大的改进和投资。在这样的应用中,数据被处理,信息被从多个数据源中提取,因此需要以多模态的方式训练机器学习算法。该领域正在迅速获得牵引力,因为它的应用跨越了多个学科,并取得了重大进展。研究局限/启示该研究的重点是深度学习和基于计算机视觉的技术,以生成辅助驾驶的环境,这肯定会被ADAS制造商采用。环境感知辅助驾驶将实时工作,它将挽救许多司机和行人的生命。原创性/价值本文提供了对辅助驾驶的上下文感知深度学习框架的理解。该研究主要集中在深度学习和基于计算机视觉的技术上,以生成辅助驾驶的环境。它结合了最先进的技术,使用合适的驾驶环境,并提醒司机。许多汽车制造公司和研究人员会参考本研究来改进。
{"title":"Context-aware assistive driving: an overview of techniques for mitigating the risks of driver in real-time driving environment","authors":"S. Gite, K. Kotecha, G. Ghinea","doi":"10.1108/ijpcc-11-2020-0192","DOIUrl":"https://doi.org/10.1108/ijpcc-11-2020-0192","url":null,"abstract":"\u0000Purpose\u0000This study aims to analyze driver risks in the driving environment. A complete analysis of context aware assistive driving techniques. Context awareness in assistive driving by probabilistic modeling techniques. Advanced techniques using Spatio-temporal techniques, computer vision and deep learning techniques.\u0000\u0000\u0000Design/methodology/approach\u0000Autonomous vehicles have been aimed to increase driver safety by introducing vehicle control from the driver to Advanced Driver Assistance Systems (ADAS). The core objective of these systems is to cut down on road accidents by helping the user in various ways. Early anticipation of a particular action would give a prior benefit to the driver to successfully handle the dangers on the road. In this paper, the advancements that have taken place in the use of multi-modal machine learning for assistive driving systems are surveyed. The aim is to help elucidate the recent progress and techniques in the field while also identifying the scope for further research and improvement. The authors take an overview of context-aware driver assistance systems that alert drivers in case of maneuvers by taking advantage of multi-modal human processing to better safety and drivability.\u0000\u0000\u0000Findings\u0000There has been a huge improvement and investment in ADAS being a key concept for road safety. In such applications, data is processed and information is extracted from multiple data sources, thus requiring training of machine learning algorithms in a multi-modal style. The domain is fast gaining traction owing to its applications across multiple disciplines with crucial gains.\u0000\u0000\u0000Research limitations/implications\u0000The research is focused on deep learning and computer vision-based techniques to generate a context for assistive driving and it would definitely adopt by the ADAS manufacturers.\u0000\u0000\u0000Social implications\u0000As context-aware assistive driving would work in real-time and it would save the lives of many drivers, pedestrians.\u0000\u0000\u0000Originality/value\u0000This paper provides an understanding of context-aware deep learning frameworks for assistive driving. The research is mainly focused on deep learning and computer vision-based techniques to generate a context for assistive driving. It incorporates the latest state-of-the-art techniques using suitable driving context and the driver is alerted. Many automobile manufacturing companies and researchers would refer to this study for their enhancements.\u0000","PeriodicalId":210948,"journal":{"name":"Int. J. Pervasive Comput. Commun.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115425848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Authentication-based access control approach for enhancing security in pervasive computing environments 一种增强普适计算环境安全性的基于身份验证的访问控制方法
Pub Date : 2021-08-09 DOI: 10.1108/ijpcc-02-2021-0044
R. GnaneshwariG., M. Hema, S. Lingareddy
PurposePervasive computing environment allows the users to access the services anywhere and anytime. Due to the dynamicity, mobility, security, heterogeneity, and openness have become a major challenging task in the Pervasive computing environment. To solve the security issues and to increase the communication reliability, an authentication-based access control approach is developed in this research to ensure the level of security in the Pervasive computing environment.Design/methodology/approachThis paper aims to propose authentication-based access control approach performs the authentication mechanism using the hashing, encryption, and decryption function. The proposed approach effectively achieves the conditional traceability of user credentials to enhance security. Moreover, the performance of the proposed authentication-based access control approach is estimated using the experimental analysis, and performance improvement is proved using the evaluation metrics. It inherent the tradeoff between authentication and access control in the Pervasive computing environment. Here, the service provider requires authorization and authentication for the provision of service, whereas the end-users require unlinkability and untraceability for data transactions.FindingsThe proposed authentication-based access control obtained 0.76, 22.836 GB, and 3.35 sec for detection rate, memory, and time by considering password attack, and 22.772GB and 4.51 sec for memory and time by considering without attack scenario.Originality/valueThe communication between the user and the service provider is progressed using the user public key in such a way that the private key of the user can be generated through the encryption function.
目的普适计算环境允许用户随时随地访问业务。由于普适计算环境的动态性、移动性、安全性、异构性和开放性已成为普适计算环境中的主要挑战。为了解决通信的安全问题,提高通信的可靠性,本研究提出了一种基于身份验证的访问控制方法,以保证普适计算环境下的安全水平。设计/方法/方法本文旨在提出一种基于身份验证的访问控制方法,该方法利用哈希、加密和解密功能来实现身份验证机制。该方法有效地实现了用户凭据的条件可追溯性,提高了安全性。此外,利用实验分析估计了基于身份验证的访问控制方法的性能,并利用评价指标证明了该方法的性能改进。在普适计算环境中,身份验证和访问控制之间的权衡是固有的。在这里,服务提供者需要对服务的提供进行授权和身份验证,而最终用户则需要数据事务的不可链接性和不可追溯性。结果考虑密码攻击时,基于身份验证的访问控制的检测率、内存和时间分别为0.76 GB、22.836 GB和3.35秒;考虑无攻击时,基于身份验证的访问控制的内存和时间分别为22.772GB和4.51秒。原创性/价值用户和服务提供者之间的通信使用用户公钥进行,通过加密功能可以生成用户的私钥。
{"title":"Authentication-based access control approach for enhancing security in pervasive computing environments","authors":"R. GnaneshwariG., M. Hema, S. Lingareddy","doi":"10.1108/ijpcc-02-2021-0044","DOIUrl":"https://doi.org/10.1108/ijpcc-02-2021-0044","url":null,"abstract":"\u0000Purpose\u0000Pervasive computing environment allows the users to access the services anywhere and anytime. Due to the dynamicity, mobility, security, heterogeneity, and openness have become a major challenging task in the Pervasive computing environment. To solve the security issues and to increase the communication reliability, an authentication-based access control approach is developed in this research to ensure the level of security in the Pervasive computing environment.\u0000\u0000\u0000Design/methodology/approach\u0000This paper aims to propose authentication-based access control approach performs the authentication mechanism using the hashing, encryption, and decryption function. The proposed approach effectively achieves the conditional traceability of user credentials to enhance security. Moreover, the performance of the proposed authentication-based access control approach is estimated using the experimental analysis, and performance improvement is proved using the evaluation metrics. It inherent the tradeoff between authentication and access control in the Pervasive computing environment. Here, the service provider requires authorization and authentication for the provision of service, whereas the end-users require unlinkability and untraceability for data transactions.\u0000\u0000\u0000Findings\u0000The proposed authentication-based access control obtained 0.76, 22.836 GB, and 3.35 sec for detection rate, memory, and time by considering password attack, and 22.772GB and 4.51 sec for memory and time by considering without attack scenario.\u0000\u0000\u0000Originality/value\u0000The communication between the user and the service provider is progressed using the user public key in such a way that the private key of the user can be generated through the encryption function.\u0000","PeriodicalId":210948,"journal":{"name":"Int. J. Pervasive Comput. Commun.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134163740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and implementation of pervasive DA based FIR filter and feeder register based multiplier for software definedradio networks 软件无线网络中基于普适数据的FIR滤波器和基于馈线寄存器的乘法器的设计与实现
Pub Date : 2021-08-09 DOI: 10.1108/ijpcc-04-2021-0086
B. M. Kumar, H. Rangaraju
PurposeDigital signal processing (DSP) applications such as finite impulse response (FIR) filter, infinite impulse response and wavelet transformation functions are mainly constructed using multipliers and adders. The performance of any digital applications is dependent on larger size multipliers, area and power dissipation. To optimize power and area, an efficient zero product and feeder register-based multiplier (ZP and FRBM) is proposed. Another challenging task in multipliers is summation of partial products (PP), results in more delay. To address this issue, the modified parallel prefix adder (PPA) is incorporated in multiplier design. In this work, different methods are studied and analyzed for designing FIR filter, optimized with respect to area, power dissipation, speed, throughput, latency and hardware utilization.Design/methodology/approachThe distributed arithmetic (DA)-based reconfigurable FIR design is found to be suitable filter for software-defined radio (SDR) applications. The performance of adder and multipliers in DA-FIR filter restricts the area and power dissipation due to their complexity in terms of generation of sum and carry bits. The hardware implementation time of an adder can be reduced by using PPA which is based on Ling equation. The MDA-RFIR filter is designed for higher filter length (N), i.e. N = 64 with 64 taps and this design is developed using Verilog hardware description language (HDL) and implemented on field-programmable gate array. The design is validated for SDR channel equalizer; both RFIR and SDR are integrated as single system and implemented on Artix-7 development board of part name XC7A100tCSG324.FindingsThe MDA-RFIR for N = 64 is optimized about 33% in terms of area-delay, power-speed product and energy efficiency. The theoretical and practical comparisons have been done, and the practically obtained results are compared with existing DA-RFIR designs in terms of throughput, latency, area-delay, power-speed product and energy efficiency are better about 3.5 times, 31, 45 and 29%, respectively.Originality/valueThe MDA-RFIR for N = 64 is optimized about 33% in terms of area-delay, power-speed product and energy efficiency.
目的数字信号处理(DSP)应用,如有限脉冲响应(FIR)滤波器、无限脉冲响应和小波变换函数,主要使用乘法器和加法器构造。任何数字应用的性能都取决于更大尺寸的乘法器、面积和功耗。为了优化功率和面积,提出了一种高效的基于零积和馈线寄存器的乘法器(ZP和FRBM)。乘法器的另一个挑战是部分乘积的求和(PP),这导致了更多的延迟。为了解决这个问题,在乘法器设计中加入了改进的并行前缀加法器(PPA)。本文对FIR滤波器的不同设计方法进行了研究和分析,并从面积、功耗、速度、吞吐量、延迟和硬件利用率等方面进行了优化。设计/方法/方法基于分布式算法(DA)的可重构FIR设计适合于软件定义无线电(SDR)应用。DA-FIR滤波器中的加法器和乘法器由于产生和位和进位的复杂性,限制了滤波器的面积和功耗。采用基于凌方程的PPA,可以缩短加法器的硬件实现时间。MDA-RFIR滤波器设计用于更高的滤波器长度(N),即N = 64, 64个抽头,该设计使用Verilog硬件描述语言(HDL)开发,并在现场可编程门阵列上实现。该设计在SDR信道均衡器上得到了验证;将RFIR和SDR集成为一个系统,在部件名称为XC7A100tCSG324的Artix-7开发板上实现。发现N = 64时的MDA-RFIR在面积延迟、功率速度积和能效方面优化了约33%。进行了理论和实际比较,实际得到的结果与现有的DA-RFIR设计相比,吞吐量、延迟、面积延迟、功率速度乘积和能效分别提高了3.5倍、31倍、45倍和29%。原创性/价值N = 64的MDA-RFIR在面积延迟、功率速度积和能效方面优化了约33%。
{"title":"Design and implementation of pervasive DA based FIR filter and feeder register based multiplier for software definedradio networks","authors":"B. M. Kumar, H. Rangaraju","doi":"10.1108/ijpcc-04-2021-0086","DOIUrl":"https://doi.org/10.1108/ijpcc-04-2021-0086","url":null,"abstract":"\u0000Purpose\u0000Digital signal processing (DSP) applications such as finite impulse response (FIR) filter, infinite impulse response and wavelet transformation functions are mainly constructed using multipliers and adders. The performance of any digital applications is dependent on larger size multipliers, area and power dissipation. To optimize power and area, an efficient zero product and feeder register-based multiplier (ZP and FRBM) is proposed. Another challenging task in multipliers is summation of partial products (PP), results in more delay. To address this issue, the modified parallel prefix adder (PPA) is incorporated in multiplier design. In this work, different methods are studied and analyzed for designing FIR filter, optimized with respect to area, power dissipation, speed, throughput, latency and hardware utilization.\u0000\u0000\u0000Design/methodology/approach\u0000The distributed arithmetic (DA)-based reconfigurable FIR design is found to be suitable filter for software-defined radio (SDR) applications. The performance of adder and multipliers in DA-FIR filter restricts the area and power dissipation due to their complexity in terms of generation of sum and carry bits. The hardware implementation time of an adder can be reduced by using PPA which is based on Ling equation. The MDA-RFIR filter is designed for higher filter length (N), i.e. N = 64 with 64 taps and this design is developed using Verilog hardware description language (HDL) and implemented on field-programmable gate array. The design is validated for SDR channel equalizer; both RFIR and SDR are integrated as single system and implemented on Artix-7 development board of part name XC7A100tCSG324.\u0000\u0000\u0000Findings\u0000The MDA-RFIR for N = 64 is optimized about 33% in terms of area-delay, power-speed product and energy efficiency. The theoretical and practical comparisons have been done, and the practically obtained results are compared with existing DA-RFIR designs in terms of throughput, latency, area-delay, power-speed product and energy efficiency are better about 3.5 times, 31, 45 and 29%, respectively.\u0000\u0000\u0000Originality/value\u0000The MDA-RFIR for N = 64 is optimized about 33% in terms of area-delay, power-speed product and energy efficiency.\u0000","PeriodicalId":210948,"journal":{"name":"Int. J. Pervasive Comput. Commun.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127087543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimized scheduling techniques focused on powerful heuristics leveraging cloud services soft computing 优化调度技术侧重于利用云服务软计算的强大启发式方法
Pub Date : 2021-08-05 DOI: 10.1108/ijpcc-04-2021-0087
P. Veerendra, T. Rao
PurposeDetermining the roles of multiple CSPs is important because it affects job costs and time off. The primary objective of this work is to ensure an efficient and complex distribution of resources in cloud-based computing. Workflow study of various algorithms such as ant colony optimization (ACO), differential evolution algorithm, genetic algorithm, particle swarm optimization (PSO), hybridization of the above algorithms (ADGP). For research, CSP’s tools are put all over the world.Design/methodology/approachThe main objective of this study is to effectively introduce cloud-based computing in CSPs. The algorithm minimizes resource response time and overall workflow tasks. It seeks to improve load balancing by modifying the algorithm to support load balancing. In the proposed multipurpose scheduling methods, the ADGP algorithm performs better than any other proposed algorithm during the resource response. This algorithm was found to be superior to the selected 200 sources and thousands of tasks. It reduces resource response time by copying service nodes through several sites. As this algorithm moves faster to the best solution, the response time of the resource is reduced compared to other algorithms.FindingsHybrid ACOs perform best when it comes to resource management when workloads are uniformly spread across multiple virtual machines. However, hybrids PSOs are better suited to choosing the best options to minimize costs. Overall, an optimal cloud-based scheduling solution can be successfully simulated using CloudSim in CSP to share resources between end-users to support consumers and users effectively.Originality/valueHybrid ACOs perform best when it comes to resource management when workloads are uniformly spread across multiple virtual machines. However, hybrids PSOs are better suited to choosing the best options to minimize costs. Overall, an optimal cloud-based scheduling solution can be successfully simulated using CloudSim in CSP to share resources between end-users to support consumers and users effectively.
目的确定多个csp的角色很重要,因为它会影响工作成本和休假时间。这项工作的主要目标是确保在基于云的计算中有效和复杂地分配资源。工作流的各种算法研究,如蚁群优化(ACO)、差分进化算法、遗传算法、粒子群优化(PSO)、上述算法的杂交(ADGP)。为了研究,CSP的工具遍布世界各地。设计/方法/途径本研究的主要目的是在csp中有效地引入基于云的计算。该算法最大限度地减少了资源响应时间和整体工作流任务。它试图通过修改算法以支持负载平衡来改进负载平衡。在提出的多目的调度方法中,ADGP算法在资源响应方面的性能优于其他提出的算法。结果表明,该算法优于所选的200个源和数千个任务。它通过在多个站点复制服务节点来减少资源响应时间。由于该算法更快地移动到最佳解决方案,因此与其他算法相比,减少了资源的响应时间。当工作负载均匀分布在多个虚拟机上时,混合型aco在资源管理方面表现最佳。然而,混合动力pso更适合选择最佳方案以最小化成本。总体而言,可以在CSP中使用CloudSim成功模拟基于云的最佳调度解决方案,从而在最终用户之间共享资源,从而有效地支持消费者和用户。当工作负载均匀分布在多个虚拟机上时,hybrid aco在资源管理方面表现最佳。然而,混合动力pso更适合选择最佳方案以最小化成本。总体而言,可以在CSP中使用CloudSim成功模拟基于云的最佳调度解决方案,从而在最终用户之间共享资源,从而有效地支持消费者和用户。
{"title":"Optimized scheduling techniques focused on powerful heuristics leveraging cloud services soft computing","authors":"P. Veerendra, T. Rao","doi":"10.1108/ijpcc-04-2021-0087","DOIUrl":"https://doi.org/10.1108/ijpcc-04-2021-0087","url":null,"abstract":"\u0000Purpose\u0000Determining the roles of multiple CSPs is important because it affects job costs and time off. The primary objective of this work is to ensure an efficient and complex distribution of resources in cloud-based computing. Workflow study of various algorithms such as ant colony optimization (ACO), differential evolution algorithm, genetic algorithm, particle swarm optimization (PSO), hybridization of the above algorithms (ADGP). For research, CSP’s tools are put all over the world.\u0000\u0000\u0000Design/methodology/approach\u0000The main objective of this study is to effectively introduce cloud-based computing in CSPs. The algorithm minimizes resource response time and overall workflow tasks. It seeks to improve load balancing by modifying the algorithm to support load balancing. In the proposed multipurpose scheduling methods, the ADGP algorithm performs better than any other proposed algorithm during the resource response. This algorithm was found to be superior to the selected 200 sources and thousands of tasks. It reduces resource response time by copying service nodes through several sites. As this algorithm moves faster to the best solution, the response time of the resource is reduced compared to other algorithms.\u0000\u0000\u0000Findings\u0000Hybrid ACOs perform best when it comes to resource management when workloads are uniformly spread across multiple virtual machines. However, hybrids PSOs are better suited to choosing the best options to minimize costs. Overall, an optimal cloud-based scheduling solution can be successfully simulated using CloudSim in CSP to share resources between end-users to support consumers and users effectively.\u0000\u0000\u0000Originality/value\u0000Hybrid ACOs perform best when it comes to resource management when workloads are uniformly spread across multiple virtual machines. However, hybrids PSOs are better suited to choosing the best options to minimize costs. Overall, an optimal cloud-based scheduling solution can be successfully simulated using CloudSim in CSP to share resources between end-users to support consumers and users effectively.\u0000","PeriodicalId":210948,"journal":{"name":"Int. J. Pervasive Comput. Commun.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125116806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Improved two factor fuzzy commitment scheme for securing IoT device 改进的物联网设备安全双因素模糊承诺方案
Pub Date : 2021-07-31 DOI: 10.1108/ijpcc-01-2021-0009
T. Yuvarani, R. ArunachalamA.
PurposeGenerally, Internet-of-Things (IoT) is quite small sized with limited resource and low cost that may be vulnerable for physical and cloned attacking. All kind of authentication protocols designed to IoT devices are robust despite which it is prone to attack by hackers. In order to resolve this issue, there are various researches that have introduced the best method for obscuring the cryptographic key. However, the studies have majorly aimed to generate the key dynamically from noise data by Fuzzy Extractor (FE) or Fuzzy Commitment (FC). Hence, these methods have utilized this kind of data with noisy source namely Physical Unclonable Function (PUF) or biometric data. There are several IoT devices that get operated over undermined environment in which biometric data is not available but the technique utilized with biometric data can't be used to undermined IoT devices. Even though, the PUF technique is implemented for the undermined IoT devices this is quite vulnerable over physical attacks inclusive of accidental move and theft.Design/methodology/approachThis paper has proposed an advanced scheme in fuzzy commitment over IoT devices which is said to be Improved Two Factor Fuzzy Commitment Scheme (ITFFCS) and this proposed ITFFCS has used two kind of noisy factors present inside and outside the IoT devices. Though, an intruder has accomplished the IoT devices with an access to the internal noisy source, the intruder can't select an exact key from the available data which have been compared using comparable module as an interest.FindingsMoreover, the proposed ITFFC method results are compared with existing Static Random Accessible Memory (SRAM) PUF in enterprises application which illustrated the proposed ITFFC method with PUF has accomplished better results in parameters such as energy consumption, area utilization, False Acceptance Ratio (FAR) and Failure Rejection Ratio (FRR).Originality/valueThus, the proposed ITFFCS-PUF is comparatively better than existing method in both FAR and FRR with an average of 0.18% and 0.28%.
目的物联网通常规模较小,资源有限,成本较低,容易受到物理攻击和克隆攻击。为物联网设备设计的各种身份验证协议都是健壮的,尽管它很容易受到黑客的攻击。为了解决这一问题,各种研究都提出了最佳的加密密钥模糊方法。然而,这些研究主要是通过模糊提取器(FE)或模糊承诺(FC)从噪声数据中动态生成密钥。因此,这些方法利用了这类有噪声源的数据,即物理不可克隆函数(Physical unclable Function, PUF)或生物特征数据。有几个物联网设备在破坏环境中运行,其中生物特征数据不可用,但生物特征数据所使用的技术不能用于破坏物联网设备。尽管PUF技术是针对被破坏的物联网设备实施的,但在包括意外移动和盗窃在内的物理攻击中,这是非常脆弱的。本文提出了一种先进的物联网设备模糊承诺方案,称为改进的双因素模糊承诺方案(ITFFCS),该方案使用了物联网设备内部和外部存在的两种噪声因素。尽管入侵者已经通过访问内部噪声源完成了物联网设备,但入侵者无法从可用数据中选择精确的密钥,这些数据已使用可比模块作为兴趣进行了比较。结果表明,结合静态随机可访问存储器(SRAM) PUF的ITFFC方法在能耗、面积利用率、误接受率(FAR)和失败率(FRR)等参数方面取得了更好的效果。因此,所提出的ITFFCS-PUF在FAR和FRR方面均优于现有方法,平均为0.18%和0.28%。
{"title":"Improved two factor fuzzy commitment scheme for securing IoT device","authors":"T. Yuvarani, R. ArunachalamA.","doi":"10.1108/ijpcc-01-2021-0009","DOIUrl":"https://doi.org/10.1108/ijpcc-01-2021-0009","url":null,"abstract":"\u0000Purpose\u0000Generally, Internet-of-Things (IoT) is quite small sized with limited resource and low cost that may be vulnerable for physical and cloned attacking. All kind of authentication protocols designed to IoT devices are robust despite which it is prone to attack by hackers. In order to resolve this issue, there are various researches that have introduced the best method for obscuring the cryptographic key. However, the studies have majorly aimed to generate the key dynamically from noise data by Fuzzy Extractor (FE) or Fuzzy Commitment (FC). Hence, these methods have utilized this kind of data with noisy source namely Physical Unclonable Function (PUF) or biometric data. There are several IoT devices that get operated over undermined environment in which biometric data is not available but the technique utilized with biometric data can't be used to undermined IoT devices. Even though, the PUF technique is implemented for the undermined IoT devices this is quite vulnerable over physical attacks inclusive of accidental move and theft.\u0000\u0000\u0000Design/methodology/approach\u0000This paper has proposed an advanced scheme in fuzzy commitment over IoT devices which is said to be Improved Two Factor Fuzzy Commitment Scheme (ITFFCS) and this proposed ITFFCS has used two kind of noisy factors present inside and outside the IoT devices. Though, an intruder has accomplished the IoT devices with an access to the internal noisy source, the intruder can't select an exact key from the available data which have been compared using comparable module as an interest.\u0000\u0000\u0000Findings\u0000Moreover, the proposed ITFFC method results are compared with existing Static Random Accessible Memory (SRAM) PUF in enterprises application which illustrated the proposed ITFFC method with PUF has accomplished better results in parameters such as energy consumption, area utilization, False Acceptance Ratio (FAR) and Failure Rejection Ratio (FRR).\u0000\u0000\u0000Originality/value\u0000Thus, the proposed ITFFCS-PUF is comparatively better than existing method in both FAR and FRR with an average of 0.18% and 0.28%.\u0000","PeriodicalId":210948,"journal":{"name":"Int. J. Pervasive Comput. Commun.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131871707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new imputation-based incomplete data-driven fuzzy modeling for accuracy improvement in ubiquitous computing applications 一种新的基于不完全数据驱动的模糊模型,用于提高普适计算应用的精度
Pub Date : 2021-07-27 DOI: 10.1108/ijpcc-03-2021-0069
S. Goel, M. Tushir
PurposeIn real-world decision-making, high accuracy data analysis is essential in a ubiquitous environment. However, we encounter missing data while collecting user-related data information because of various privacy concerns on account of a user. This paper aims to deal with incomplete data for fuzzy model identification, a new method of parameter estimation of a Takagi–Sugeno model in the presence of missing features.Design/methodology/approachIn this work, authors proposed a three-fold approach for fuzzy model identification in which imputation-based linear interpolation technique is used to estimate missing features of the data, and then fuzzy c-means clustering is used for determining optimal number of rules and for the determination of parameters of membership functions of the fuzzy model. Finally, the optimization of the all antecedent and consequent parameters along with the width of the antecedent (Gaussian) membership function is done by gradient descent algorithm based on the minimization of root mean square error.FindingsThe proposed method is tested on two well-known simulation examples as well as on a real data set, and the performance is compared with some traditional methods. The result analysis and statistical analysis show that the proposed model has achieved a considerable improvement in accuracy in the presence of varying degree of data incompleteness.Originality/valueThe proposed method works well for fuzzy model identification method, a new method of parameter estimation of a Takagi–Sugeno model in the presence of missing features with varying degree of missing data as compared to some well-known methods.
在现实世界的决策中,在无处不在的环境中,高精度的数据分析是必不可少的。然而,由于用户的各种隐私问题,我们在收集用户相关数据信息时遇到了数据丢失的问题。针对模糊模型辨识中数据不完整的问题,提出了一种新的特征缺失情况下Takagi-Sugeno模型参数估计方法。设计/方法/方法在这项工作中,作者提出了一种模糊模型识别的三重方法,其中基于假设的线性插值技术用于估计数据的缺失特征,然后使用模糊c均值聚类来确定最优规则数和模糊模型的隶属函数参数。最后,采用基于均方根误差最小化的梯度下降算法对所有前因式参数以及前因式(高斯)隶属函数宽度进行优化。结果提出的方法在两个著名的仿真实例和一个真实数据集上进行了测试,并与一些传统方法进行了性能比较。结果分析和统计分析表明,在存在不同程度的数据不完整的情况下,所提出的模型在精度上取得了相当大的提高。与一些已知的方法相比,该方法适用于模糊模型识别方法,这是一种新的Takagi-Sugeno模型在存在不同程度缺失数据的缺失特征时的参数估计方法。
{"title":"A new imputation-based incomplete data-driven fuzzy modeling for accuracy improvement in ubiquitous computing applications","authors":"S. Goel, M. Tushir","doi":"10.1108/ijpcc-03-2021-0069","DOIUrl":"https://doi.org/10.1108/ijpcc-03-2021-0069","url":null,"abstract":"\u0000Purpose\u0000In real-world decision-making, high accuracy data analysis is essential in a ubiquitous environment. However, we encounter missing data while collecting user-related data information because of various privacy concerns on account of a user. This paper aims to deal with incomplete data for fuzzy model identification, a new method of parameter estimation of a Takagi–Sugeno model in the presence of missing features.\u0000\u0000\u0000Design/methodology/approach\u0000In this work, authors proposed a three-fold approach for fuzzy model identification in which imputation-based linear interpolation technique is used to estimate missing features of the data, and then fuzzy c-means clustering is used for determining optimal number of rules and for the determination of parameters of membership functions of the fuzzy model. Finally, the optimization of the all antecedent and consequent parameters along with the width of the antecedent (Gaussian) membership function is done by gradient descent algorithm based on the minimization of root mean square error.\u0000\u0000\u0000Findings\u0000The proposed method is tested on two well-known simulation examples as well as on a real data set, and the performance is compared with some traditional methods. The result analysis and statistical analysis show that the proposed model has achieved a considerable improvement in accuracy in the presence of varying degree of data incompleteness.\u0000\u0000\u0000Originality/value\u0000The proposed method works well for fuzzy model identification method, a new method of parameter estimation of a Takagi–Sugeno model in the presence of missing features with varying degree of missing data as compared to some well-known methods.\u0000","PeriodicalId":210948,"journal":{"name":"Int. J. Pervasive Comput. Commun.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125868170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced optimization assisted interference mitigation with vertical beamforming in 3D MIMO-OFDMA for 5G wireless communication network 面向5G无线通信网络的3D MIMO-OFDMA垂直波束成形增强优化辅助干扰抑制
Pub Date : 2021-07-22 DOI: 10.1108/IJPCC-01-2021-0024
Ranjeeta Yadav, Ashutosh Tripathi
PurposeMultiple input multiple-output (MIMO) has emerged as one among the many noteworthy technologies in recent wireless applications because of its powerful ability to improve bandwidth efficiency and performance, i.e. through developing its unique spatial multiplexing capability and spatial diversity gain. For carrying out an enhanced communication in next-generation networks, the MIMO and orthogonal frequency division multiple systems were combined that facilitate the spatial multiplexing on resource blocks (RBs) based on time-frequency. This paper aims to propose a novel approach for maximizing the throughput of cell-edge users and cell-center users.Design/methodology/approachIn this work, the specified multi-objective function is defined as the single objective function, which is solved by the introduction of a new improved algorithm as well. This optimization problem can be resolved by the fine-tuning of certain parameters such as assigned power for RB, cell-center user, cell-edge user and RB allocation. The fine-tuning of parameters is attained by a new improved Lion algorithm (LA), termed as Lion with new cub generation (LA-NCG) model. Finally, the betterment of the presented approach is validated over the existing models in terms of signal to interference plus noise ratio, throughput and so on.FindingsOn examining the outputs, the adopted LA-NCG model for 4BS was 66.67%, 66.67% and 20% superior to existing joint processing coordinated multiple point-based dual decomposition method (JC-DDM), fractional programming (FP) and LA models. In addition, the throughput of conventional JC-DDM, FP and LA models lie at a range of 10, 45 and 35, respectively, at the 100th iteration. However, the presented LA-NCG scheme accomplishes a higher throughput of 58. Similarly, the throughput of the adopted scheme observed for 8BS was 59.68%, 44.19% and 9.68% superior to existing JC-DDM, FP and LA models. Thus, the enhancement of the adopted LA-NCG model has been validated effectively from the attained outcomes.Originality/valueThis paper adopts the latest optimization algorithm called LA-NCG to establish a novel approach for maximizing the throughput of cell-edge users and cell-center users. This is the first that work uses LA-NCG-based optimization that assists in fine-tuning certain parameters such as assigned power for RB, cell-center user, cell-edge user and RB allocation.
多输入多输出(MIMO)由于其独特的空间多路复用能力和空间分集增益,在提高带宽效率和性能方面具有强大的能力,已成为近期无线应用中众多值得关注的技术之一。为了在下一代网络中实现增强通信,将MIMO和正交频分多路系统相结合,促进了基于时频的资源块(RBs)空间复用。本文旨在提出一种使蜂窝边缘用户和蜂窝中心用户的吞吐量最大化的新方法。在本工作中,将指定的多目标函数定义为单目标函数,并引入一种新的改进算法对其进行求解。这个优化问题可以通过微调某些参数来解决,例如为RB分配的功率、小区中心用户、小区边缘用户和RB分配。参数的微调是通过一种新的改进的Lion算法(LA)来实现的,称为Lion with new cub generation (LA- ncg)模型。最后,从信噪比、吞吐量等方面验证了该方法对现有模型的改进。结果表明,采用的LA- ncg模型比现有的联合加工协调多点对偶分解法(JC-DDM)、分数规划法(FP)和LA模型分别高出66.67%、66.67%和20%。此外,传统JC-DDM、FP和LA模型在第100次迭代时的吞吐量分别为10、45和35。然而,提出的LA-NCG方案实现了更高的吞吐量58。与现有的JC-DDM、FP和LA模型相比,所采用方案对8BS的吞吐量分别提高59.68%、44.19%和9.68%。因此,从获得的结果来看,所采用的LA-NCG模型的增强效果得到了有效的验证。独创性/价值本文采用最新的优化算法LA-NCG,建立了一种使蜂窝边缘用户和蜂窝中心用户的吞吐量最大化的新方法。这是第一次使用基于la - ngc的优化,该优化有助于微调某些参数,例如为RB、蜂窝中心用户、蜂窝边缘用户和RB分配功率。
{"title":"Enhanced optimization assisted interference mitigation with vertical beamforming in 3D MIMO-OFDMA for 5G wireless communication network","authors":"Ranjeeta Yadav, Ashutosh Tripathi","doi":"10.1108/IJPCC-01-2021-0024","DOIUrl":"https://doi.org/10.1108/IJPCC-01-2021-0024","url":null,"abstract":"\u0000Purpose\u0000Multiple input multiple-output (MIMO) has emerged as one among the many noteworthy technologies in recent wireless applications because of its powerful ability to improve bandwidth efficiency and performance, i.e. through developing its unique spatial multiplexing capability and spatial diversity gain. For carrying out an enhanced communication in next-generation networks, the MIMO and orthogonal frequency division multiple systems were combined that facilitate the spatial multiplexing on resource blocks (RBs) based on time-frequency. This paper aims to propose a novel approach for maximizing the throughput of cell-edge users and cell-center users.\u0000\u0000\u0000Design/methodology/approach\u0000In this work, the specified multi-objective function is defined as the single objective function, which is solved by the introduction of a new improved algorithm as well. This optimization problem can be resolved by the fine-tuning of certain parameters such as assigned power for RB, cell-center user, cell-edge user and RB allocation. The fine-tuning of parameters is attained by a new improved Lion algorithm (LA), termed as Lion with new cub generation (LA-NCG) model. Finally, the betterment of the presented approach is validated over the existing models in terms of signal to interference plus noise ratio, throughput and so on.\u0000\u0000\u0000Findings\u0000On examining the outputs, the adopted LA-NCG model for 4BS was 66.67%, 66.67% and 20% superior to existing joint processing coordinated multiple point-based dual decomposition method (JC-DDM), fractional programming (FP) and LA models. In addition, the throughput of conventional JC-DDM, FP and LA models lie at a range of 10, 45 and 35, respectively, at the 100th iteration. However, the presented LA-NCG scheme accomplishes a higher throughput of 58. Similarly, the throughput of the adopted scheme observed for 8BS was 59.68%, 44.19% and 9.68% superior to existing JC-DDM, FP and LA models. Thus, the enhancement of the adopted LA-NCG model has been validated effectively from the attained outcomes.\u0000\u0000\u0000Originality/value\u0000This paper adopts the latest optimization algorithm called LA-NCG to establish a novel approach for maximizing the throughput of cell-edge users and cell-center users. This is the first that work uses LA-NCG-based optimization that assists in fine-tuning certain parameters such as assigned power for RB, cell-center user, cell-edge user and RB allocation.\u0000","PeriodicalId":210948,"journal":{"name":"Int. J. Pervasive Comput. Commun.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132244718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
Int. J. Pervasive Comput. Commun.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1