Multimodal biometric systems offer several advantages over unimodal systems, including a lower error rate, greater accuracy and broader coverage of residents. However, the multimodal systems need to store multiple biometric traits associated with each user, which brings a higher need for integrity and privacy. This study describes a deep learning (DL) model for a feature-level coalition that utilizes the biographical data of the user's face and iris to create a secure multimodal template. To create a reliable, unique multimodal shareable latent image, a deep hashing (linearization) approach is used for the fusion architecture. Furthermore, a hybrid secure architecture that fuses secure sketching techniques with erasable biometric features and integrates them into a complete security framework is used in this work. The efficiency of the recommended method is demonstrated using the face and iris images from the multimodal database. The proposed method provides the ability to delete templates and better protect the biometric data. This method works with the “WVU” multimodal data store and the “hashing” method for “image retrieval.” The proposed improved VGG16 achieves a data accuracy of 99.85. The paper also provides information on the techniques for structuring modalities such as iris and face using deep hashing, multimodal fusion and biometric security techniques. However, further studies are needed to extend the proposed framework to other unrestricted biometric aspects.
{"title":"FT-HT: A Fine-Tuned VGG16-Based and Hashing Framework for Secure Multimodal Biometric System","authors":"Seema Rani, Neeraj Mohan, Priyanka Kaushal","doi":"10.1002/ett.70142","DOIUrl":"https://doi.org/10.1002/ett.70142","url":null,"abstract":"<div>\u0000 \u0000 <p>Multimodal biometric systems offer several advantages over unimodal systems, including a lower error rate, greater accuracy and broader coverage of residents. However, the multimodal systems need to store multiple biometric traits associated with each user, which brings a higher need for integrity and privacy. This study describes a deep learning (DL) model for a feature-level coalition that utilizes the biographical data of the user's face and iris to create a secure multimodal template. To create a reliable, unique multimodal shareable latent image, a deep hashing (linearization) approach is used for the fusion architecture. Furthermore, a hybrid secure architecture that fuses secure sketching techniques with erasable biometric features and integrates them into a complete security framework is used in this work. The efficiency of the recommended method is demonstrated using the face and iris images from the multimodal database. The proposed method provides the ability to delete templates and better protect the biometric data. This method works with the “WVU” multimodal data store and the “hashing” method for “image retrieval.” The proposed improved VGG16 achieves a data accuracy of 99.85. The paper also provides information on the techniques for structuring modalities such as iris and face using deep hashing, multimodal fusion and biometric security techniques. However, further studies are needed to extend the proposed framework to other unrestricted biometric aspects.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 5","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143865804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Juan Li, Xiaoyan Zhou, Xuerong Cui, Meiqi Ji, Lei Li, Bin Jiang, Shibao Li, Jianhang Liu
Delay estimation aims to determine the distance between the signal source and the receiver by measuring the signal's arriving time, which is crucial for underwater positioning. Traditional delay estimation algorithms, such as Generalized Cross-Correlation (GCC), often perform poorly in low signal-to-noise ratio (SNR) or multipath channels. In response to this issue, this paper proposes an algorithm based on adaptive Singular Value Decomposition Reconstruction (SVDR). This method initially requires obtaining the cross-power spectrum between the transmitted and received signals. Subsequently, the inter-correlation results at different frequency bands are assembled into a Frequency-Sliding Generalized Cross-Correlation (FSGCC) matrix. Then, Singular Value Decomposition Reconstruction (SVDR) is applied to extract crucial delay information from the matrix, aiming to alleviate the impact of noise and multipath effects on delay estimation. However, the selection of singular values during the reconstruction process directly influences the degree of noise reduction in the signal. Therefore, this manuscript further calculates the matrix represented by each singular value obtained from the SVD operation. The similarity between each matrix and the low-noise FSGCC matrix is computed to select the most suitable singular values to retain. Through simulation experiments, this algorithm can overcome the influence of the multipath effects and achieve better delay estimation results compared to traditional GCC and SVD algorithms, and validates its effectiveness in low SNR multipath underwater acoustic channels.
{"title":"Underwater Delay Estimation Based on Adaptive Singular Value Decomposition Reconstruction Under Low SNR and Multipath Conditions","authors":"Juan Li, Xiaoyan Zhou, Xuerong Cui, Meiqi Ji, Lei Li, Bin Jiang, Shibao Li, Jianhang Liu","doi":"10.1002/ett.70145","DOIUrl":"https://doi.org/10.1002/ett.70145","url":null,"abstract":"<div>\u0000 \u0000 <p>Delay estimation aims to determine the distance between the signal source and the receiver by measuring the signal's arriving time, which is crucial for underwater positioning. Traditional delay estimation algorithms, such as Generalized Cross-Correlation (GCC), often perform poorly in low signal-to-noise ratio (SNR) or multipath channels. In response to this issue, this paper proposes an algorithm based on adaptive Singular Value Decomposition Reconstruction (SVDR). This method initially requires obtaining the cross-power spectrum between the transmitted and received signals. Subsequently, the inter-correlation results at different frequency bands are assembled into a Frequency-Sliding Generalized Cross-Correlation (FSGCC) matrix. Then, Singular Value Decomposition Reconstruction (SVDR) is applied to extract crucial delay information from the matrix, aiming to alleviate the impact of noise and multipath effects on delay estimation. However, the selection of singular values during the reconstruction process directly influences the degree of noise reduction in the signal. Therefore, this manuscript further calculates the matrix represented by each singular value obtained from the SVD operation. The similarity between each matrix and the low-noise FSGCC matrix is computed to select the most suitable singular values to retain. Through simulation experiments, this algorithm can overcome the influence of the multipath effects and achieve better delay estimation results compared to traditional GCC and SVD algorithms, and validates its effectiveness in low SNR multipath underwater acoustic channels.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 5","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143865803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Recently, Mobile Ad-hoc Networks (MANETs) have created great interest in wireless communication. Several vulnerabilities are present in these networks. Thus, the pre-existing techniques offered numerous solutions. However, improvement is still required for augmenting the Detection Rate (DR). In this research approach, a Frechet Distribution-based Ensemble Deep Learning FD-EDL with hybrid optimization for an Intrusion Detection System (IDS) in MANET is proposed for augmenting the DR. Primarily, the trust value is computed. After the trust evaluation, the cluster formation and the Cluster Head (CH) selection are done utilizing the Diagonal with Cosine Similarity based K-Means (DCS-KM) algorithm. Then, by utilizing the Ad-hoc On-demand Distance Vector (AODV) algorithm, the path is generated for data transmission. For avoiding packet loss, the split and share strategy is designed in the generated path. Next, by utilizing the Polynomial Structured with Nullified Coupled Markov Chain (PSNCMC) model, noise interference is estimated and mitigated. Subsequently, the data is aggregated. The features are extracted from the aggregated data, and by utilizing Gazelle with Weighted Entropy Functional Red Panda Optimization (G-WEFRPO), the significant features are chosen. Next, for detecting intrusion in the MANET environment, the chosen features are inputted to the classifier. Based on performance metrics, the proposed method's performance is analogized with the baseline techniques in experimental analysis. The proposed system obtains a higher DR than conventional models. Hence, it is highly beneficial for IDS in MANET.
{"title":"A FD-EDL and Novel Clustering-Based Intrusion Detection System Using G-WEFRPO in MANET Environment","authors":"Rajeeve Dharmaraj, P. Ganesh Kumar","doi":"10.1002/ett.70127","DOIUrl":"https://doi.org/10.1002/ett.70127","url":null,"abstract":"<div>\u0000 \u0000 <p>Recently, Mobile Ad-hoc Networks (MANETs) have created great interest in wireless communication. Several vulnerabilities are present in these networks. Thus, the pre-existing techniques offered numerous solutions. However, improvement is still required for augmenting the Detection Rate (DR). In this research approach, a Frechet Distribution-based Ensemble Deep Learning FD-EDL with hybrid optimization for an Intrusion Detection System (IDS) in MANET is proposed for augmenting the DR. Primarily, the trust value is computed. After the trust evaluation, the cluster formation and the Cluster Head (CH) selection are done utilizing the Diagonal with Cosine Similarity based K-Means (DCS-KM) algorithm. Then, by utilizing the Ad-hoc On-demand Distance Vector (AODV) algorithm, the path is generated for data transmission. For avoiding packet loss, the split and share strategy is designed in the generated path. Next, by utilizing the Polynomial Structured with Nullified Coupled Markov Chain (PSNCMC) model, noise interference is estimated and mitigated. Subsequently, the data is aggregated. The features are extracted from the aggregated data, and by utilizing Gazelle with Weighted Entropy Functional Red Panda Optimization (G-WEFRPO), the significant features are chosen. Next, for detecting intrusion in the MANET environment, the chosen features are inputted to the classifier. Based on performance metrics, the proposed method's performance is analogized with the baseline techniques in experimental analysis. The proposed system obtains a higher DR than conventional models. Hence, it is highly beneficial for IDS in MANET.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 5","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143871762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sunil Prajapat, Mohammad S. Obaidat, Vivek Bharmaik, Garima Thakur, Pankaj Kumar
As quantum technology advances, classical digital signatures exhibit vulnerabilities in preserving security properties during the transmission of information. Working toward a reliable communication protocol, we introduce a proxy blind signature scheme to teleport a single particle qubit state with a message to the receiver, employing a three qubit GHZ entangled state. The blindness property is utilized to secure the message information from the proxy signer. A trusted party, Trent, is introduced to supervise the communication process. Alice blinds the original message and sends the Bell measurements with her entangled particle to proxy signer Charlie. After receiving measurements from Alice and Charlie, Bob verifies the proxy blind signature and performs appropriate unitary operations on his particle. Thereafter, Trent verifies the security of the quantum teleportation setup by matching the output data with the original data sent by Alice. Security analysis results prove that the proposed scheme fulfils the basic security necessities, including undeniability, unforgeability, blindness, verifiability, and traceability.
{"title":"Quantum Safe Proxy Blind Signature Protocol Based on 3D Entangled GHZ-Type States","authors":"Sunil Prajapat, Mohammad S. Obaidat, Vivek Bharmaik, Garima Thakur, Pankaj Kumar","doi":"10.1002/ett.70140","DOIUrl":"https://doi.org/10.1002/ett.70140","url":null,"abstract":"<div>\u0000 \u0000 <p>As quantum technology advances, classical digital signatures exhibit vulnerabilities in preserving security properties during the transmission of information. Working toward a reliable communication protocol, we introduce a proxy blind signature scheme to teleport a single particle qubit state with a message to the receiver, employing a three qubit GHZ entangled state. The blindness property is utilized to secure the message information from the proxy signer. A trusted party, Trent, is introduced to supervise the communication process. Alice blinds the original message and sends the Bell measurements with her entangled particle to proxy signer Charlie. After receiving measurements from Alice and Charlie, Bob verifies the proxy blind signature and performs appropriate unitary operations on his particle. Thereafter, Trent verifies the security of the quantum teleportation setup by matching the output data with the original data sent by Alice. Security analysis results prove that the proposed scheme fulfils the basic security necessities, including undeniability, unforgeability, blindness, verifiability, and traceability.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 5","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143865801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Phishing is a tactical technique practiced by cyber-criminals, wherein the target systems are approached, made vulnerable, and exploited. A Phisher who does the act of phishing is always creative, calculative, and persistent. This potentially leads to the increase in the success rate of phishing and the individuals who are technically expertise even falls in phishing campaigns. This article discusses about the various web-based phishing techniques used by the modern day cyber criminals. Various mitigation techniques related to the state of the art machine learning and deep learning techniques are also studied. The article also extensively discusses about the features utilized for the detection. Additionally, a qualitative and quantitative comparison of different studies for mitigating the web phishing attacks is also examined.
{"title":"A Concise Survey on Modern Web-Based Phishing Techniques and Advanced Mitigation Strategies","authors":"Dhanavanthini Panneerselvam, Sibi Chakkaravarthy Sethuraman, Ajith Jubilson Emerson, Tarun Kumar Kanakam","doi":"10.1002/ett.70119","DOIUrl":"https://doi.org/10.1002/ett.70119","url":null,"abstract":"<div>\u0000 \u0000 <p>Phishing is a tactical technique practiced by cyber-criminals, wherein the target systems are approached, made vulnerable, and exploited. A Phisher who does the act of phishing is always creative, calculative, and persistent. This potentially leads to the increase in the success rate of phishing and the individuals who are technically expertise even falls in phishing campaigns. This article discusses about the various web-based phishing techniques used by the modern day cyber criminals. Various mitigation techniques related to the state of the art machine learning and deep learning techniques are also studied. The article also extensively discusses about the features utilized for the detection. Additionally, a qualitative and quantitative comparison of different studies for mitigating the web phishing attacks is also examined.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 4","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143865552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The rise of digital technology and Artificial Intelligence (AI) has led to the increased use of smart robots in various sectors. However, security and trust are significant concerns about deploying robots in critical infrastructures. Therefore, a secure and reliable robotic command control system is essential for successful robot integration. None of the prevailing systems focused on attack prediction during cloud-based robot control and data processing. Hence, this paper proposes a secure model called RCA-assisted attack detection and robotic command verification using LADA-C-RNN and S-Fuzzy. The robot controller is initially registered using the user ID and password in the cloud application. During login, the SCTDA is used to verify the robot controller's authority. Then, the robot controller's task is subjected to the attack detection phase. In the attack detection phase, the dataset is initially gathered and preprocessed. Thereafter, the temporal pattern analysis is done, followed by feature extraction. Subsequently, the optimal features are selected via GMJFOA. Then, the selected features are inputted to the LADA-C-RNN, which performs attack detection. Next, the normal data is fed into the traffic prioritization. Then, the prioritized tasks are inputted to the robot command data verification, thus increasing the security level. Finally, the proposed approach had minimum latency with 98.42% accuracy.
{"title":"Robotic Cloud Automation-Enabled Attack Detection and Secure Robotic Command Verification Using LADA-C-RNN and S-Fuzzy","authors":"Basava Ramanjaneyulu Gudivaka, Rajya Lakshmi Gudivaka, Raj Kumar Gudivaka, Dinesh Kumar Reddy Basani, Sri Harsha Grandhi, Faheem Khan","doi":"10.1002/ett.70115","DOIUrl":"https://doi.org/10.1002/ett.70115","url":null,"abstract":"<div>\u0000 \u0000 <p>The rise of digital technology and Artificial Intelligence (AI) has led to the increased use of smart robots in various sectors. However, security and trust are significant concerns about deploying robots in critical infrastructures. Therefore, a secure and reliable robotic command control system is essential for successful robot integration. None of the prevailing systems focused on attack prediction during cloud-based robot control and data processing. Hence, this paper proposes a secure model called RCA-assisted attack detection and robotic command verification using LADA-C-RNN and S-Fuzzy. The robot controller is initially registered using the user ID and password in the cloud application. During login, the SCTDA is used to verify the robot controller's authority. Then, the robot controller's task is subjected to the attack detection phase. In the attack detection phase, the dataset is initially gathered and preprocessed. Thereafter, the temporal pattern analysis is done, followed by feature extraction. Subsequently, the optimal features are selected via GMJFOA. Then, the selected features are inputted to the LADA-C-RNN, which performs attack detection. Next, the normal data is fed into the traffic prioritization. Then, the prioritized tasks are inputted to the robot command data verification, thus increasing the security level. Finally, the proposed approach had minimum latency with 98.42% accuracy.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 4","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143865974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Social networking is a significant notion that has emerged for effective communication among multiple users. Social media services are in high demand among users all around the world. Privacy is important on social networking sites, and privacy concerns are particularly sensitive. Social media has numerous applications, and ensuring multiparty privacy (MP) among various users is a critical requirement. Massive research has been undertaken to manage secured MP across network users. However, certain issues still come up, like authentication, co-ownership of data by third parties, surveillance, and data misuse. The privacy preferences of a certain user are the priority by which the user can adjust or edit their network settings. Conflicts between users can be avoided, high security for personal data can be achieved, and highly confidential information can be maintained with the help of user preferences. Some security flaws in social media allow for the misuse of private information and the emergence of user conflicts. Therefore, privacy preservation techniques are developed and put into practice in order to address privacy concerns and provide improved security during data transfer. These techniques serve as technical assistance in recognizing and resolving disputes inside the MP management. For the construction of privacy preservation methods, real-world empirical data, user-centered MP controls, privacy-improved party analysis, hypothetical privacy support, and privacy assurance in the case of multiparty agreement are required.
{"title":"Critical Review of Different Approaches of Multiparty Privacy Protection Methods and Effectiveness on Social Media","authors":"P. Jayaprabha, K. Paulose Jacob","doi":"10.1002/ett.70130","DOIUrl":"https://doi.org/10.1002/ett.70130","url":null,"abstract":"<div>\u0000 \u0000 <p>Social networking is a significant notion that has emerged for effective communication among multiple users. Social media services are in high demand among users all around the world. Privacy is important on social networking sites, and privacy concerns are particularly sensitive. Social media has numerous applications, and ensuring multiparty privacy (MP) among various users is a critical requirement. Massive research has been undertaken to manage secured MP across network users. However, certain issues still come up, like authentication, co-ownership of data by third parties, surveillance, and data misuse. The privacy preferences of a certain user are the priority by which the user can adjust or edit their network settings. Conflicts between users can be avoided, high security for personal data can be achieved, and highly confidential information can be maintained with the help of user preferences. Some security flaws in social media allow for the misuse of private information and the emergence of user conflicts. Therefore, privacy preservation techniques are developed and put into practice in order to address privacy concerns and provide improved security during data transfer. These techniques serve as technical assistance in recognizing and resolving disputes inside the MP management. For the construction of privacy preservation methods, real-world empirical data, user-centered MP controls, privacy-improved party analysis, hypothetical privacy support, and privacy assurance in the case of multiparty agreement are required.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 4","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143857115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
More vertical service areas than only data processing, storing, and communication are promised by fog-cloud computing. Due to its great efficiency and scalability, distributed deep learning (DDL) across fog-cloud computing environments is a widely used application among them. With training limited to sharing parameters, DDL can offer more privacy protection than centralized deep learning. Nevertheless, DDL still faces two significant security obstacles when it comes to fog-cloud computing are How to ensure that users' identities are not stolen by outside enemies, and How to prevent users' privacy from being disclosed to other internal participants in the process of training. In this manuscript, Interference Tolerant Fast Convergence Zeroing Neural Network for Security and Privacy Preservation with Reptile Search Optimization Algorithm in Fog-Cloud Computing environment (SPP-ITFCZNN-RSOA-FCC) is proposed. ITFCZNN is proposed for security and privacy preservation, Then Reptile Search Optimization Algorithm (RSOA) is proposed to optimize the ITFCZNN, and Effective Lightweight Homomorphic Cryptographic Algorithm (ELHCA) is used to encrypt and decrypt the local gradients. The proposed SPP-ITFCZNN-RSOA-FCC system attains a better security balance, efficiency, and functionality than existing efforts. The proposed SPP-ITFCZNN-RSOA-FCC is implemented using Python. The performance metrics like accuracy, resource overhead, computation overhead, and communication overhead are considered. The performance of the SPP-ITFCZNN-RSOA-FCC approach attains 29.16%, 20.14%, and 18.93% high accuracy, and 11.03%, 26.04%, and 23.51% lower Resource overhead compared with existing methods including FedSDM: Federated learning dependent smart decision making component for ECG data at internet of things incorporated Edge-Fog-Cloud computing (SPP-FSDM-FCC), A collaborative computation with offloading in dew-enabled vehicular fog computing to compute-intensive with latency-sensitive dependence-aware tasks: Federated deep Q-learning method (SPP-FDQL-FCC), and a fog-edge-enabled intrusion identification scheme for smart grids (SPP-FSVM-FCC) respectively.
雾云计算承诺提供比数据处理、存储和通信更多的垂直服务领域。分布式深度学习(distributed deep learning, DDL)由于其在雾云计算环境中的高效和可扩展性,成为其中应用最为广泛的一种。由于训练仅限于共享参数,DDL可以提供比集中式深度学习更多的隐私保护。然而,在雾云计算方面,DDL仍然面临着两个重大的安全障碍:如何确保用户的身份不被外部敌人窃取,以及如何防止用户的隐私在培训过程中泄露给其他内部参与者。本文提出了一种雾云环境下基于爬虫类搜索优化算法的容干扰快速收敛归零神经网络(SPP-ITFCZNN-RSOA-FCC)。采用爬行搜索优化算法(RSOA)对ITFCZNN进行优化,并采用有效轻量级同态加密算法(ELHCA)对局部梯度进行加解密。所提出的SPP-ITFCZNN-RSOA-FCC系统比现有的系统具有更好的安全平衡、效率和功能。提出的SPP-ITFCZNN-RSOA-FCC是使用Python实现的。考虑了准确性、资源开销、计算开销和通信开销等性能指标。SPP-ITFCZNN-RSOA-FCC方法的准确率分别为29.16%、20.14%和18.93%,与现有方法(包括FedSDM)相比,资源开销分别降低了11.03%、26.04%和23.51%。基于联邦学习的物联网心电数据智能决策组件结合了边缘-雾-云计算(SPP-FSDM-FCC),一种将基于露水的车载雾计算中的协同计算转移到对延迟敏感的计算密集型依赖感知任务:联邦深度q -学习方法(SPP-FDQL-FCC)和基于雾边缘的智能电网入侵识别方案(SPP-FSVM-FCC)。
{"title":"Security and Privacy Preservation via Interference Tolerant Fast Convergence Zeroing Neural Network With Reptile Search Optimization Algorithm in Fog-Cloud Computing","authors":"Pakkarisamy Janakiraman Sathish Kumar, Neha Verma, Shivani Gupta, Rajendran Jothilakshmi","doi":"10.1002/ett.70114","DOIUrl":"https://doi.org/10.1002/ett.70114","url":null,"abstract":"<div>\u0000 \u0000 <p>More vertical service areas than only data processing, storing, and communication are promised by fog-cloud computing. Due to its great efficiency and scalability, distributed deep learning (DDL) across fog-cloud computing environments is a widely used application among them. With training limited to sharing parameters, DDL can offer more privacy protection than centralized deep learning. Nevertheless, DDL still faces two significant security obstacles when it comes to fog-cloud computing are How to ensure that users' identities are not stolen by outside enemies, and How to prevent users' privacy from being disclosed to other internal participants in the process of training. In this manuscript, Interference Tolerant Fast Convergence Zeroing Neural Network for Security and Privacy Preservation with Reptile Search Optimization Algorithm in Fog-Cloud Computing environment (SPP-ITFCZNN-RSOA-FCC) is proposed. ITFCZNN is proposed for security and privacy preservation, Then Reptile Search Optimization Algorithm (RSOA) is proposed to optimize the ITFCZNN, and Effective Lightweight Homomorphic Cryptographic Algorithm (ELHCA) is used to encrypt and decrypt the local gradients. The proposed SPP-ITFCZNN-RSOA-FCC system attains a better security balance, efficiency, and functionality than existing efforts. The proposed SPP-ITFCZNN-RSOA-FCC is implemented using Python. The performance metrics like accuracy, resource overhead, computation overhead, and communication overhead are considered. The performance of the SPP-ITFCZNN-RSOA-FCC approach attains 29.16%, 20.14%, and 18.93% high accuracy, and 11.03%, 26.04%, and 23.51% lower Resource overhead compared with existing methods including FedSDM: Federated learning dependent smart decision making component for ECG data at internet of things incorporated Edge-Fog-Cloud computing (SPP-FSDM-FCC), A collaborative computation with offloading in dew-enabled vehicular fog computing to compute-intensive with latency-sensitive dependence-aware tasks: Federated deep Q-learning method (SPP-FDQL-FCC), and a fog-edge-enabled intrusion identification scheme for smart grids (SPP-FSVM-FCC) respectively.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 4","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143857114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fatima Al-Quayed, Noshina Tariq, Mamoona Humayun, Farrukh Aslam Khan, Muhammad Attique Khan, Thanaa S. Alnusairi
The Internet of Vehicles (IoV) is a critical component of the smart city. Various nodes exchange sensitive data for urban mobility, such as identification, position, messages, speed, and traffic statistics. Along with developing smart cities come threats to privacy and security through networks. Security is of the highest priority, considering various security-privacy risks from the wellness, safety, and confidentiality of men and women inside the vehicle. This survey presents a detailed analysis of state-of-the-art and evolving security challenges to IoV systems. It handles security challenges, such as data integrity and privacy. It also includes a critical review of the literature to identify gaps in current security mechanisms. It uses complete mathematical modeling and case studies to show the practical effectiveness of the proposed solutions. It aims to guide future development and implementation of more secure, efficient, and resilient IoV systems, particularly in smart city environments. It also introduces a novel Intrusion Detection System (IDS) with Artificial Intelligence (AI), smart contracts, and blockchain technology. These smart contracts ensure instant security with the utmost level of vulnerability through blockchain technology. In addition, we proposed a hybrid multi-layered framework using Fog to conserve the resources at the vehicle level. We used mathematical proof to assess this framework. Merging blockchain, smart contracts, and AI into IoVs could increase human security by removing significant vulnerabilities.
{"title":"Securing the Road Ahead: A Survey on Internet of Vehicles Security Powered by a Conceptual Blockchain-Based Intrusion Detection System for Smart Cities","authors":"Fatima Al-Quayed, Noshina Tariq, Mamoona Humayun, Farrukh Aslam Khan, Muhammad Attique Khan, Thanaa S. Alnusairi","doi":"10.1002/ett.70133","DOIUrl":"https://doi.org/10.1002/ett.70133","url":null,"abstract":"<p>The Internet of Vehicles (IoV) is a critical component of the smart city. Various nodes exchange sensitive data for urban mobility, such as identification, position, messages, speed, and traffic statistics. Along with developing smart cities come threats to privacy and security through networks. Security is of the highest priority, considering various security-privacy risks from the wellness, safety, and confidentiality of men and women inside the vehicle. This survey presents a detailed analysis of state-of-the-art and evolving security challenges to IoV systems. It handles security challenges, such as data integrity and privacy. It also includes a critical review of the literature to identify gaps in current security mechanisms. It uses complete mathematical modeling and case studies to show the practical effectiveness of the proposed solutions. It aims to guide future development and implementation of more secure, efficient, and resilient IoV systems, particularly in smart city environments. It also introduces a novel Intrusion Detection System (IDS) with Artificial Intelligence (AI), smart contracts, and blockchain technology. These smart contracts ensure instant security with the utmost level of vulnerability through blockchain technology. In addition, we proposed a hybrid multi-layered framework using Fog to conserve the resources at the vehicle level. We used mathematical proof to assess this framework. Merging blockchain, smart contracts, and AI into IoVs could increase human security by removing significant vulnerabilities.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 4","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/ett.70133","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143853029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rapid advancements in mobile communication technologies have led to the progression of telecom scams that not only deplete individual fortunes but also affect social income. Hence, fraudulent call detection gains significance, which not only aims to proactively recognize the frauds, but also alleviate the fraudulent activities to manage external losses. Though the traditional methods, such as rule-based systems and supervised machine learning techniques, actively engage in detecting such fraudulent activities, they fail to adapt to the evolving fraud patterns. Therefore, this research introduces a sheepdog hunt optimization-enabled knowledge-enhanced optimal graph neural network classifier (SDHO-KGNN) approach for detecting fraudulent calls accurately. The effectiveness of the proposed SDHO-KGNN approach is achieved through the combination of the power of graph representation learning with expert insights, which allows the proposed SDHO-KGNN approach to capture complex relationships and patterns within telecom data. Additionally, the integration of the SDHO algorithm enhances model performance by optimizing the discrimination between legitimate and fraudulent calls. Moreover, the SDHO-KGNN classifier captures the intricate call patterns and relationships within dynamic call networks, thereby attaining a better accuracy, precision, and recall of 93.8%, 95.91%, and 95.53% for 90% of the training.
{"title":"SDHO-KGNN: An Effective Knowledge-Enhanced Optimal Graph Neural Network Approach for Fraudulent Call Detection","authors":"Pooja Mithoo, Manoj Kumar","doi":"10.1002/ett.70101","DOIUrl":"https://doi.org/10.1002/ett.70101","url":null,"abstract":"<div>\u0000 \u0000 <p>Rapid advancements in mobile communication technologies have led to the progression of telecom scams that not only deplete individual fortunes but also affect social income. Hence, fraudulent call detection gains significance, which not only aims to proactively recognize the frauds, but also alleviate the fraudulent activities to manage external losses. Though the traditional methods, such as rule-based systems and supervised machine learning techniques, actively engage in detecting such fraudulent activities, they fail to adapt to the evolving fraud patterns. Therefore, this research introduces a sheepdog hunt optimization-enabled knowledge-enhanced optimal graph neural network classifier (SDHO-KGNN) approach for detecting fraudulent calls accurately. The effectiveness of the proposed SDHO-KGNN approach is achieved through the combination of the power of graph representation learning with expert insights, which allows the proposed SDHO-KGNN approach to capture complex relationships and patterns within telecom data. Additionally, the integration of the SDHO algorithm enhances model performance by optimizing the discrimination between legitimate and fraudulent calls. Moreover, the SDHO-KGNN classifier captures the intricate call patterns and relationships within dynamic call networks, thereby attaining a better accuracy, precision, and recall of 93.8%, 95.91%, and 95.53% for 90% of the training.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 4","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143852876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}