首页 > 最新文献

Transactions on Emerging Telecommunications Technologies最新文献

英文 中文
Ensemble Feature Engineering and Deep Learning for Botnet Attacks Detection in the Internet of Things
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-03-06 DOI: 10.1002/ett.70099
Mir Aman Sheheryar, Sparsh Sharma

The Internet of Things (IoT) has revolutionized how people involve with technological innovations. However, this development has also brought up significant security concerns. The increasing number of IoT attacks poses a serious risk to individuals and businesses equally. In response, this article introduces an ensemble feature engineering method for effective feature selection, based on a systematic behavioral analysis by means of artificial intelligence. This method identifies and highlights the most relevant features from IoT botnet dataset, facilitating accurate detection of both malicious and benign traffic. To detect IoT botnet attacks, the ensemble feature engineering method incorporates distinct approaches, including a genetic algorithm-based genetic approach, filter selection methods such as mutual information, LASSO regularization, and forward-backward search. A merger approach then combines these results, addressing redundancy and irrelevance. As well, a wrapper algorithm called recursive feature removal is applied to further refine the feature selection process. The effectiveness of the selected feature set is validated by means of deep learning algorithms (CNN, RNN, LSTM, and GRU) rooted in artificial intelligence, and applied to the IoT-Botnet 2020 dataset. Results demonstrate encouraging performance, with precision between 97.88% and 98.99%, recall scores between 99.10% and 99.95%, detection accuracy between 98.05% and 99.21%, and an F1-score ranging from 98.45% to 99.82%. Moreover, the ensemble feature engineering approach achieved precision of 98.26%, recall score of 99.68%, detection accuracy of 98.49%, F1-measure of 99.00%, an AUC-ROC of 82.37% and specificity of 98.38%. These outcomes highlight the method's robust performance in identifying both malicious and benign IoT botnet traffic.

{"title":"Ensemble Feature Engineering and Deep Learning for Botnet Attacks Detection in the Internet of Things","authors":"Mir Aman Sheheryar,&nbsp;Sparsh Sharma","doi":"10.1002/ett.70099","DOIUrl":"https://doi.org/10.1002/ett.70099","url":null,"abstract":"<div>\u0000 \u0000 <p>The Internet of Things (IoT) has revolutionized how people involve with technological innovations. However, this development has also brought up significant security concerns. The increasing number of IoT attacks poses a serious risk to individuals and businesses equally. In response, this article introduces an ensemble feature engineering method for effective feature selection, based on a systematic behavioral analysis by means of artificial intelligence. This method identifies and highlights the most relevant features from IoT botnet dataset, facilitating accurate detection of both malicious and benign traffic. To detect IoT botnet attacks, the ensemble feature engineering method incorporates distinct approaches, including a genetic algorithm-based genetic approach, filter selection methods such as mutual information, LASSO regularization, and forward-backward search. A merger approach then combines these results, addressing redundancy and irrelevance. As well, a wrapper algorithm called recursive feature removal is applied to further refine the feature selection process. The effectiveness of the selected feature set is validated by means of deep learning algorithms (CNN, RNN, LSTM, and GRU) rooted in artificial intelligence, and applied to the IoT-Botnet 2020 dataset. Results demonstrate encouraging performance, with precision between 97.88% and 98.99%, recall scores between 99.10% and 99.95%, detection accuracy between 98.05% and 99.21%, and an F1-score ranging from 98.45% to 99.82%. Moreover, the ensemble feature engineering approach achieved precision of 98.26%, recall score of 99.68%, detection accuracy of 98.49%, F1-measure of 99.00%, an AUC-ROC of 82.37% and specificity of 98.38%. These outcomes highlight the method's robust performance in identifying both malicious and benign IoT botnet traffic.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 3","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143564838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Enhanced Encryption Scheme for IoT-Based Wireless Sensor Network Using DNA Enclosed Fully Homomorphic Approach
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-03-06 DOI: 10.1002/ett.70075
Alka Prasad Sawlikar, Devashri Shrikant Raich, Bireshwar Swapan Ganguly, Lowlesh Nandkishor Yadav

The rapid proliferation of Internet of Things (IoT) devices has revolutionized wireless sensor networks (WSNs), enabling real-time monitoring across various applications. However, this growth introduces critical security challenges, including data breaches, time consumption, and memory overhead, which limit the efficiency and scalability of the existing encryption models. To address these issues, this paper proposes a novel DNA-enclosed Fully Homomorphic Encryption (HD-FHE) scheme integrated with improved elliptic curve cryptography (IECC). The proposed approach leverages dual-layer encryption by combining the strengths of deoxyribonucleic acid (DNA) computing and homomorphic encryption to secure data processing without decryption. The IECC further enhances key generation efficiency and reduces resource consumption. The experimental results demonstrate significant improvements in encryption (1.675 ms for 3 KB) and decryption (1.582 ms for 3 KB) times, alongside high throughput (2.275 ms for 7 KB), outperforming the existing models. These results highlight the robustness of the proposed method in minimizing vulnerabilities to Chosen Plaintext Attack (CPA) and Chosen Ciphertext Attack (CCA) while ensuring scalability in dynamic IoT environments. This work provides a significant contribution to IoT-based WSN security by achieving a balance between performance and protection, paving the way for secure and efficient data transmission in next-generation networks.

{"title":"An Enhanced Encryption Scheme for IoT-Based Wireless Sensor Network Using DNA Enclosed Fully Homomorphic Approach","authors":"Alka Prasad Sawlikar,&nbsp;Devashri Shrikant Raich,&nbsp;Bireshwar Swapan Ganguly,&nbsp;Lowlesh Nandkishor Yadav","doi":"10.1002/ett.70075","DOIUrl":"https://doi.org/10.1002/ett.70075","url":null,"abstract":"<div>\u0000 \u0000 <p>The rapid proliferation of Internet of Things (IoT) devices has revolutionized wireless sensor networks (WSNs), enabling real-time monitoring across various applications. However, this growth introduces critical security challenges, including data breaches, time consumption, and memory overhead, which limit the efficiency and scalability of the existing encryption models. To address these issues, this paper proposes a novel DNA-enclosed Fully Homomorphic Encryption (HD-FHE) scheme integrated with improved elliptic curve cryptography (IECC). The proposed approach leverages dual-layer encryption by combining the strengths of deoxyribonucleic acid (DNA) computing and homomorphic encryption to secure data processing without decryption. The IECC further enhances key generation efficiency and reduces resource consumption. The experimental results demonstrate significant improvements in encryption (1.675 ms for 3 KB) and decryption (1.582 ms for 3 KB) times, alongside high throughput (2.275 ms for 7 KB), outperforming the existing models. These results highlight the robustness of the proposed method in minimizing vulnerabilities to Chosen Plaintext Attack (CPA) and Chosen Ciphertext Attack (CCA) while ensuring scalability in dynamic IoT environments. This work provides a significant contribution to IoT-based WSN security by achieving a balance between performance and protection, paving the way for secure and efficient data transmission in next-generation networks.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 3","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143554842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Channel Estimation for Reconfigurable Intelligent Surface-Assisted Cell-Free Communications
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-03-06 DOI: 10.1002/ett.70096
Chenfei Xie, Songjie Yang, Zhongpei Zhang

Recent advancements in reconfigurable intelligent surface (RIS)-assisted cell-free systems have primarily focused on improving coverage and reducing network costs. However, much of the existing literature assumes perfect knowledge of channel state information (CSI), which poses significant challenges in practical implementations. This study investigates the channel estimation problem in RIS-assisted cell-free systems, highlighting two key observations: (1) a shared channel exists between the base station (BS) and the RIS across all users, and (2) a similar common channel exists between the RIS and the users across all BSs. Building on these insights, the paper addresses the challenges of cascaded and two-timescale channel estimation. Specifically, two novel methods are introduced: (1) a 3D-MMV-based compressive sensing technique for efficient cascaded channel estimation, and (2) a pilot reduction strategy that leverages multi-BS cooperation to enhance channel estimation performance. These methods aim to improve the accuracy and efficiency of channel estimation in RIS-assisted cell-free systems while minimizing pilot overhead.

{"title":"Channel Estimation for Reconfigurable Intelligent Surface-Assisted Cell-Free Communications","authors":"Chenfei Xie,&nbsp;Songjie Yang,&nbsp;Zhongpei Zhang","doi":"10.1002/ett.70096","DOIUrl":"https://doi.org/10.1002/ett.70096","url":null,"abstract":"<div>\u0000 \u0000 <p>Recent advancements in reconfigurable intelligent surface (RIS)-assisted cell-free systems have primarily focused on improving coverage and reducing network costs. However, much of the existing literature assumes perfect knowledge of channel state information (CSI), which poses significant challenges in practical implementations. This study investigates the channel estimation problem in RIS-assisted cell-free systems, highlighting two key observations: (1) a shared channel exists between the base station (BS) and the RIS across all users, and (2) a similar common channel exists between the RIS and the users across all BSs. Building on these insights, the paper addresses the challenges of cascaded and two-timescale channel estimation. Specifically, two novel methods are introduced: (1) a 3D-MMV-based compressive sensing technique for efficient cascaded channel estimation, and (2) a pilot reduction strategy that leverages multi-BS cooperation to enhance channel estimation performance. These methods aim to improve the accuracy and efficiency of channel estimation in RIS-assisted cell-free systems while minimizing pilot overhead.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 3","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143554848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure 5G Coordinating Spectrum Sharing System With Cooperation Transmitter and Receiver Pairs
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-03-06 DOI: 10.1002/ett.70080
Ayat M. Al-Rjoob, Ahmad A. Ababnah, Mamoun F. Al-Mistarihi

In this paper, we propose a 6-node system consisting of two transmitter-receiver pairs sharing the same spectrum, an eavesdropper, and a relay, all operating in a half-duplex. The eavesdropper is mainly interested in communication between one of the transmitter-receiver pairs, which we call the primary. Communication along with the second pair called the secondary, is performed in two hops/time slots with the aid of the relay. The main idea of our study is to investigate the secrecy performance of the primary pair when jamming is performed by the secondary relay-assisted path. In particular, in the first time slot, the secondary destination acts as a jammer relative to the eavesdropper by injecting artificial noise known to the primary pair. During the second time slot, the secondary transmitter acts as a jammer while the relay forwards data to the secondary destination. In effect, this allows for cooperation among the nodes both in transmitting primary and secondary data while reducing the eavesdropper's ability to listen in on the primary link communication. For the proposed protocol, we derive closed-form expressions of the intercept probability. We also obtain a closed-form expression of the outage probability along with the secondary communication link. Moreover, we study the effect of transmit power allocation on intercept and outage probabilities along with the different links. Theoretical and simulation results are given to prove that the proposed protocol can provide better security for the primary link and acquire acceptable secondary outage probability.

{"title":"Secure 5G Coordinating Spectrum Sharing System With Cooperation Transmitter and Receiver Pairs","authors":"Ayat M. Al-Rjoob,&nbsp;Ahmad A. Ababnah,&nbsp;Mamoun F. Al-Mistarihi","doi":"10.1002/ett.70080","DOIUrl":"https://doi.org/10.1002/ett.70080","url":null,"abstract":"<div>\u0000 \u0000 <p>In this paper, we propose a 6-node system consisting of two transmitter-receiver pairs sharing the same spectrum, an eavesdropper, and a relay, all operating in a half-duplex. The eavesdropper is mainly interested in communication between one of the transmitter-receiver pairs, which we call the primary. Communication along with the second pair called the secondary, is performed in two hops/time slots with the aid of the relay. The main idea of our study is to investigate the secrecy performance of the primary pair when jamming is performed by the secondary relay-assisted path. In particular, in the first time slot, the secondary destination acts as a jammer relative to the eavesdropper by injecting artificial noise known to the primary pair. During the second time slot, the secondary transmitter acts as a jammer while the relay forwards data to the secondary destination. In effect, this allows for cooperation among the nodes both in transmitting primary and secondary data while reducing the eavesdropper's ability to listen in on the primary link communication. For the proposed protocol, we derive closed-form expressions of the intercept probability. We also obtain a closed-form expression of the outage probability along with the secondary communication link. Moreover, we study the effect of transmit power allocation on intercept and outage probabilities along with the different links. Theoretical and simulation results are given to prove that the proposed protocol can provide better security for the primary link and acquire acceptable secondary outage probability.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 3","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143554885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Multi-cluster Security Framework for Healthcare IoT: The Synergy of Redundant Byzantine Fault Tolerance with Extensions and Coati-Based Network
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-03-06 DOI: 10.1002/ett.70098
Rohit Beniwal, Vinod Kumar, Vishal Sharma

The rapid integration of Internet of Things (IoT) devices into healthcare systems has revolutionized medical care delivery but has also introduced significant security challenges. Ensuring secure communication, privacy preservation, and system resilience in resource-constrained healthcare IoT networks is critical, given the sensitivity of the data involved and the potential for malicious attacks. This research addresses these concerns by proposing a Multi-cluster Security Framework for Healthcare IoT, designed to overcome existing limitations in security and scalability. The framework combines Redundant Byzantine Fault Tolerance with Extensions (RB-BFT X) and CoatiNet, leveraging lightweight cryptographic techniques, role-based access control, and dynamic routing algorithms. RB-BFT X enhances intra-cluster security through fault tolerance and anomaly detection, while CoatiNet optimizes inter-cluster communication using adaptive routing and self-recovery mechanisms inspired by coatis' natural behavior. Experimental results demonstrate the framework's efficacy, achieving a high detection rate of 98.20%, minimal latency, and stable throughput under various adversarial conditions. Compared to existing methods, it outperforms in maintaining network lifetime and reducing false positives, even with increased malicious activity. These findings have significant implications for enhancing the security and efficiency of healthcare IoT networks. The proposed methodology ensures robust data protection, efficient communication, and adaptability to evolving threats, contributing to safer and more reliable healthcare systems.

{"title":"A Multi-cluster Security Framework for Healthcare IoT: The Synergy of Redundant Byzantine Fault Tolerance with Extensions and Coati-Based Network","authors":"Rohit Beniwal,&nbsp;Vinod Kumar,&nbsp;Vishal Sharma","doi":"10.1002/ett.70098","DOIUrl":"https://doi.org/10.1002/ett.70098","url":null,"abstract":"<div>\u0000 \u0000 <p>The rapid integration of Internet of Things (IoT) devices into healthcare systems has revolutionized medical care delivery but has also introduced significant security challenges. Ensuring secure communication, privacy preservation, and system resilience in resource-constrained healthcare IoT networks is critical, given the sensitivity of the data involved and the potential for malicious attacks. This research addresses these concerns by proposing a Multi-cluster Security Framework for Healthcare IoT, designed to overcome existing limitations in security and scalability. The framework combines Redundant Byzantine Fault Tolerance with Extensions (RB-BFT X) and CoatiNet, leveraging lightweight cryptographic techniques, role-based access control, and dynamic routing algorithms. RB-BFT X enhances intra-cluster security through fault tolerance and anomaly detection, while CoatiNet optimizes inter-cluster communication using adaptive routing and self-recovery mechanisms inspired by coatis' natural behavior. Experimental results demonstrate the framework's efficacy, achieving a high detection rate of 98.20%, minimal latency, and stable throughput under various adversarial conditions. Compared to existing methods, it outperforms in maintaining network lifetime and reducing false positives, even with increased malicious activity. These findings have significant implications for enhancing the security and efficiency of healthcare IoT networks. The proposed methodology ensures robust data protection, efficient communication, and adaptability to evolving threats, contributing to safer and more reliable healthcare systems.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 3","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143554914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Feasibility Analysis for Deployment of Free Space Optical Links in Urban Coastal Environments
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-03-05 DOI: 10.1002/ett.70097
Lakshmi Priya Isanaka, Meenakshi Murugappa

Optical Wireless Communication (OWC) is a highly congruous communication system for the emerging Fifth Generation (5G) and Sixth Generation (6G) communication environments. The authors have discussed the efficacy of a terrestrial Free Space Optics (FSO) link in the coastal urban environments. Performance metrics such as received signal power and Link Margin (LM) are determined and hence used to judge the effectuation of the FSO model under consideration. Fog-Evoked Signal Degradation (FESD) is the indispensable contributor to atmospheric attenuation. Various models have been taken into account for the computation of FESD considering four consecutive months (November to February) for six consecutive years from 2018 to 2023. Mathematical analysis has been carried out from the real-time measured visibility data and wind speed values. Also, the altitude of the location has been considered for computing the scattering and Turbulence-Induced Attenuation (TIA). The LM is derived uniquely for summer and winter seasons to determine the feasibility for the establishment of the FSO link. For the purpose of the performance analysis, all three of the optical window wavelengths 850, 1300, and 1550 nm have been taken into account. Both the simulation results and mathematical estimates are used to compute the effective maximum achievable link range, link availability, and minimum visibility requirement for the specific geographic location under consideration.

{"title":"Feasibility Analysis for Deployment of Free Space Optical Links in Urban Coastal Environments","authors":"Lakshmi Priya Isanaka,&nbsp;Meenakshi Murugappa","doi":"10.1002/ett.70097","DOIUrl":"https://doi.org/10.1002/ett.70097","url":null,"abstract":"<div>\u0000 \u0000 <p>Optical Wireless Communication (OWC) is a highly congruous communication system for the emerging Fifth Generation (5G) and Sixth Generation (6G) communication environments. The authors have discussed the efficacy of a terrestrial Free Space Optics (FSO) link in the coastal urban environments. Performance metrics such as received signal power and Link Margin (LM) are determined and hence used to judge the effectuation of the FSO model under consideration. Fog-Evoked Signal Degradation (FESD) is the indispensable contributor to atmospheric attenuation. Various models have been taken into account for the computation of FESD considering four consecutive months (November to February) for six consecutive years from 2018 to 2023. Mathematical analysis has been carried out from the real-time measured visibility data and wind speed values. Also, the altitude of the location has been considered for computing the scattering and Turbulence-Induced Attenuation (TIA). The LM is derived uniquely for summer and winter seasons to determine the feasibility for the establishment of the FSO link. For the purpose of the performance analysis, all three of the optical window wavelengths 850, 1300, and 1550 nm have been taken into account. Both the simulation results and mathematical estimates are used to compute the effective maximum achievable link range, link availability, and minimum visibility requirement for the specific geographic location under consideration.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 3","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143554413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Eye Blinking Feature Processing Using Convolutional Generative Adversarial Network for Deep Fake Video Detection
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-03-05 DOI: 10.1002/ett.70083
Dipesh Ramulal Agrawal, Farha Haneef

Deepfake video detection is one of the new technologies to detect Deepfakes from video or images. Deepfake videos are majorly used for illegal actions like spreading wrong information and videos online. Hence, deepfake video detection techniques are used to detect videos as real. Several deepfake detection methods have been introduced to detect Deepfakes from videos, but some techniques have limitations and low accuracy in predicting the video as real or fake. This paper introduces advanced deepfake detection techniques, such as converting the video into frames, pre-processing the frames, and using feature extraction and classification techniques. Pre-processing of frames using the sequential adaptive bilateral wiener filtering (SABiW) removes the noise from frames and detects the face using the 2D Haar discrete wavelet transform (2D-Haar). Then, the features are extracted from a pre-processed image with a depthwise separable residual network (DSRes). Finally, the video is classified using the Convolutional attention advanced generative adversarial network (Con-GAN) model as a deepfake video or original video. The Mud ring optimization algorithm is used to detect the weight coefficients of the network. Then, the overall performance of the proposed model is compared with other existing models to describe their superiority. The proposed method uses four datasets, which are FaceForensics++, Celeb DF v2, WildDeepfake, and DFDC. The performance of the proposed model provides a high accuracy rate of 98.91% and a precision of 98.32%. The proposed model provides better performance and efficient detection by detecting Deepfakes.

{"title":"Eye Blinking Feature Processing Using Convolutional Generative Adversarial Network for Deep Fake Video Detection","authors":"Dipesh Ramulal Agrawal,&nbsp;Farha Haneef","doi":"10.1002/ett.70083","DOIUrl":"https://doi.org/10.1002/ett.70083","url":null,"abstract":"<div>\u0000 \u0000 <p>Deepfake video detection is one of the new technologies to detect Deepfakes from video or images. Deepfake videos are majorly used for illegal actions like spreading wrong information and videos online. Hence, deepfake video detection techniques are used to detect videos as real. Several deepfake detection methods have been introduced to detect Deepfakes from videos, but some techniques have limitations and low accuracy in predicting the video as real or fake. This paper introduces advanced deepfake detection techniques, such as converting the video into frames, pre-processing the frames, and using feature extraction and classification techniques. Pre-processing of frames using the sequential adaptive bilateral wiener filtering (SABiW) removes the noise from frames and detects the face using the 2D Haar discrete wavelet transform (2D-Haar). Then, the features are extracted from a pre-processed image with a depthwise separable residual network (DSRes). Finally, the video is classified using the Convolutional attention advanced generative adversarial network (Con-GAN) model as a deepfake video or original video. The Mud ring optimization algorithm is used to detect the weight coefficients of the network. Then, the overall performance of the proposed model is compared with other existing models to describe their superiority. The proposed method uses four datasets, which are FaceForensics++, Celeb DF v2, WildDeepfake, and DFDC. The performance of the proposed model provides a high accuracy rate of 98.91% and a precision of 98.32%. The proposed model provides better performance and efficient detection by detecting Deepfakes.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 3","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143554416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Effective Approach for Spectral Efficiency Improvement in Massive MIMO Network Using Hybridized Optimization Assisted Optimal Pilot-Based Vector Perturbation Precoding
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-03-05 DOI: 10.1002/ett.70079
K. P. Keerthana, K. Kalirajan

In multi-user Massive Multiple Input Multiple Output (MIMO) systems, acquiring Channel State Information (CSI) at the transmission point is crucial for accurate estimation, but it fails by costs and complexity. The Massive MIMO networks are known for the improved Spectral Efficiency (SE). These systems are equipped with antenna groups at the receiving end and the transmission point. Analyzing Channel State Information (CSI) from faulty channels is maximizing the precoder's complexity. The complexity of determining the optimal disrupting vector improves power transmission but reduces SE. This makes the optimization process more challenging. Therefore, in this work, an Optimal Pilot-Based Vector Perturbation Precoding (OPVP) is introduced to improve the SE of the massive MIMO system. The Hybrid Flamingo Search-based Sparrow Search Optimization Algorithm (HFS-SSOA) is used to optimally select the perturbing vector for efficient reception as well as transmission and is developed by combining the Flamingo Search Algorithm (FSA) and Sparrow Search Algorithm (SSA). In addition, the ideal pilot designs wisely intellects the CSI for providing response to the transmitter. Further, the compressive sensing will be used by OPVP for effectively selecting the low-dimensional CSI. The suggested approach effectively detects the low dimensional CSI by considering the objective functions like computational complexity, transmitting power, and computational overhead which is used to develop the perturbing signal within the constellation bound. Finally, the simulation process is carried out on the developed model to prove its effectiveness.

{"title":"An Effective Approach for Spectral Efficiency Improvement in Massive MIMO Network Using Hybridized Optimization Assisted Optimal Pilot-Based Vector Perturbation Precoding","authors":"K. P. Keerthana,&nbsp;K. Kalirajan","doi":"10.1002/ett.70079","DOIUrl":"https://doi.org/10.1002/ett.70079","url":null,"abstract":"<div>\u0000 \u0000 <p>In multi-user Massive Multiple Input Multiple Output (MIMO) systems, acquiring Channel State Information (CSI) at the transmission point is crucial for accurate estimation, but it fails by costs and complexity. The Massive MIMO networks are known for the improved Spectral Efficiency (SE). These systems are equipped with antenna groups at the receiving end and the transmission point. Analyzing Channel State Information (CSI) from faulty channels is maximizing the precoder's complexity. The complexity of determining the optimal disrupting vector improves power transmission but reduces SE. This makes the optimization process more challenging. Therefore, in this work, an Optimal Pilot-Based Vector Perturbation Precoding (OPVP) is introduced to improve the SE of the massive MIMO system. The Hybrid Flamingo Search-based Sparrow Search Optimization Algorithm (HFS-SSOA) is used to optimally select the perturbing vector for efficient reception as well as transmission and is developed by combining the Flamingo Search Algorithm (FSA) and Sparrow Search Algorithm (SSA). In addition, the ideal pilot designs wisely intellects the CSI for providing response to the transmitter. Further, the compressive sensing will be used by OPVP for effectively selecting the low-dimensional CSI. The suggested approach effectively detects the low dimensional CSI by considering the objective functions like computational complexity, transmitting power, and computational overhead which is used to develop the perturbing signal within the constellation bound. Finally, the simulation process is carried out on the developed model to prove its effectiveness.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 3","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143554415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Multiscale Principal Component Analysis Approach to Physical Layer Secret Key Generation in Indoor Environments
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-03-05 DOI: 10.1002/ett.70100
Megha Santhosh Kumar, Ramanathan Ramachandran

With the rise of Industry 5.0, smart cities, and the ever-expanding use of general wireless networks, ensuring seamless communication and robust data security has become a critical challenge. Generating secure secret keys (SKG) through wireless channels is particularly complex in environments where noise and wideband conditions introduce discrepancies and autocorrelation in channel measurements. These issues compromise cross-correlation and randomness, leading to substantial bit disagreements, distinct keys at the transceivers, and unsuccessful SKG. This research begins by outlining the mathematical model of the signal preprocessing technique called multiscale principal component analysis (MSPCA). Subsequently, it explores the performance of key generation when employing the proposed scheme. A holistic system-level framework for creating initial shared keys is presented, encompassing quantization methods such as uniform multilevel quantization (UMQ) and encoding methods such as 3-bit Gray encoding. Monte Carlo-based simulations in an indoor scenario evaluate system efficacy using metrics like Pearson correlation coefficient, bit disagreement rate (BDR), randomness, and complexity. The proposed scheme achieves a BDR lower than 0.01, a correlation coefficient greater than 0.95, and passes all National Institute of Standards and Technology (NIST) randomness tests, establishing it as a viable solution for securing wireless systems. In the context of Industry 5.0 and smart city infrastructures, where seamless communication and robust data security are paramount, the proposed SKG framework offers significant potential. With its ability to ensure secure and reliable communication, this scheme can underpin the development of advanced wireless systems that cater to the high demands of interconnected ecosystems, enhancing resilience and trust in critical applications.

{"title":"A Multiscale Principal Component Analysis Approach to Physical Layer Secret Key Generation in Indoor Environments","authors":"Megha Santhosh Kumar,&nbsp;Ramanathan Ramachandran","doi":"10.1002/ett.70100","DOIUrl":"https://doi.org/10.1002/ett.70100","url":null,"abstract":"<div>\u0000 \u0000 <p>With the rise of Industry 5.0, smart cities, and the ever-expanding use of general wireless networks, ensuring seamless communication and robust data security has become a critical challenge. Generating secure secret keys (SKG) through wireless channels is particularly complex in environments where noise and wideband conditions introduce discrepancies and autocorrelation in channel measurements. These issues compromise cross-correlation and randomness, leading to substantial bit disagreements, distinct keys at the transceivers, and unsuccessful SKG. This research begins by outlining the mathematical model of the signal preprocessing technique called multiscale principal component analysis (MSPCA). Subsequently, it explores the performance of key generation when employing the proposed scheme. A holistic system-level framework for creating initial shared keys is presented, encompassing quantization methods such as uniform multilevel quantization (UMQ) and encoding methods such as 3-bit Gray encoding. Monte Carlo-based simulations in an indoor scenario evaluate system efficacy using metrics like Pearson correlation coefficient, bit disagreement rate (BDR), randomness, and complexity. The proposed scheme achieves a BDR lower than 0.01, a correlation coefficient greater than 0.95, and passes all National Institute of Standards and Technology (NIST) randomness tests, establishing it as a viable solution for securing wireless systems. In the context of Industry 5.0 and smart city infrastructures, where seamless communication and robust data security are paramount, the proposed SKG framework offers significant potential. With its ability to ensure secure and reliable communication, this scheme can underpin the development of advanced wireless systems that cater to the high demands of interconnected ecosystems, enhancing resilience and trust in critical applications.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 3","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143554417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring the Transformative Impact of Blockchain Technology on Healthcare: Security, Challenges, Benefits, and Future Outlook
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-03-05 DOI: 10.1002/ett.70087
Anita Thakur, Virender Ranga, Ritu Agarwal

This study aims to methodically explore the diverse applications of blockchain technology (BT) within the healthcare domain. Additionally, it seeks to analyze the inherent challenges of integrating BT into healthcare systems. Furthermore, this study elucidates blockchain's advantageous contributions to the healthcare domain. The suggested research thoroughly reviews the literature from various databases, using predetermined criteria, such as exclusion and inclusion, to identify pertinent studies. It also demonstrates the properties of blockchain and its functionality for the patient, healthcare providers, or overall healthcare infrastructure to assist the healthcare industry in a contemporary direction. The substantial advantages of BT within the medical field are notable. However, it is vital to acknowledge the security vulnerabilities by employing a blockchain-centered strategy to mitigate these challenges, allowing for the creation of a robust and streamlined system and framework. The importance of this study is that as this investigation navigates the convergence of healthcare and BT, it not only delineates the multifaceted applications of BT but also meticulously examines the associated security challenges. The findings of this study chart a course toward a technologically advanced, secure, and efficient healthcare ecosystem, improving patient outcomes and reshaping the future of healthcare delivery worldwide.

{"title":"Exploring the Transformative Impact of Blockchain Technology on Healthcare: Security, Challenges, Benefits, and Future Outlook","authors":"Anita Thakur,&nbsp;Virender Ranga,&nbsp;Ritu Agarwal","doi":"10.1002/ett.70087","DOIUrl":"https://doi.org/10.1002/ett.70087","url":null,"abstract":"<div>\u0000 \u0000 <p>This study aims to methodically explore the diverse applications of blockchain technology (BT) within the healthcare domain. Additionally, it seeks to analyze the inherent challenges of integrating BT into healthcare systems. Furthermore, this study elucidates blockchain's advantageous contributions to the healthcare domain. The suggested research thoroughly reviews the literature from various databases, using predetermined criteria, such as exclusion and inclusion, to identify pertinent studies. It also demonstrates the properties of blockchain and its functionality for the patient, healthcare providers, or overall healthcare infrastructure to assist the healthcare industry in a contemporary direction. The substantial advantages of BT within the medical field are notable. However, it is vital to acknowledge the security vulnerabilities by employing a blockchain-centered strategy to mitigate these challenges, allowing for the creation of a robust and streamlined system and framework. The importance of this study is that as this investigation navigates the convergence of healthcare and BT, it not only delineates the multifaceted applications of BT but also meticulously examines the associated security challenges. The findings of this study chart a course toward a technologically advanced, secure, and efficient healthcare ecosystem, improving patient outcomes and reshaping the future of healthcare delivery worldwide.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 3","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143554410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Transactions on Emerging Telecommunications Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1