首页 > 最新文献

Transactions on Emerging Telecommunications Technologies最新文献

英文 中文
A secure routing protocol using trust-based clustering and bionic intelligence algorithm for UAV-assisted vehicular ad hoc networks 使用基于信任的聚类和仿生智能算法的无人机辅助车载特设网络安全路由协议
IF 3.6 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-04-24 DOI: 10.1002/ett.4977
Divya Babu, Terli Sankara Rao

Vehicular ad hoc networks (VANET) are one of the advanced technologies for distributing dynamic vehicular information across the globe. The VANET is extensively used in many applications, especially road safety applications and intelligent transport systems (ITS). However, direct communication causes high bandwidth (BW) requirement and power consumption. Hence, this article introduces a clustering-based mechanism to communicate vehicles with infrastructures. The cluster head (CH) is formed based on certain rules, and nodes or vehicles are combined. But, maintaining stability remains challenging for the traditional clustering mechanism. Moreover, the developed technique must examine the malicious and reduce the risk of fake information sharing. This research emphasizes a trust-based clustering mechanism to select the CH based on a vehicle's knowledge, reputation, and experience. In addition to this, the backup head is also analyzed to promote trust in each vehicle. After clustering, secure routing is undertaken. For this, a bionic remora optimization algorithm (BROA) is proposed, and it considers the hop Count Field as well as the transmission range of vehicles to select the best routes. The performance measures such as end-to-end delay ratio, packet delivery ratio (PDR), throughput, trust values, energy consumption are analyzed and compared with existing techniques. In an experimental scenario, the proposed technique has an end-to-end delay of 3.8 ms, PDR of 98%, trust value of .4 and .06 for wormhole and Sybil attack, energy of and throughput of 78.7 kbps are attained. The outcome results prove the efficacy of a proposed method.

车载特设网络(VANET)是在全球范围内分发动态车辆信息的先进技术之一。VANET 广泛应用于许多领域,尤其是道路安全应用和智能交通系统(ITS)。然而,直接通信会导致高带宽(BW)要求和高功耗。因此,本文介绍了一种基于聚类的机制,用于车辆与基础设施之间的通信。簇头(CH)根据一定的规则形成,节点或车辆组合在一起。但是,对于传统的聚类机制来说,保持稳定性仍然是一个挑战。此外,开发的技术必须检查恶意行为,降低虚假信息共享的风险。本研究强调基于信任的聚类机制,根据车辆的知识、声誉和经验选择 CH。除此以外,还分析了备份头,以促进对每辆车的信任。聚类之后,进行安全路由选择。为此,提出了一种仿生雷莫拉优化算法(BROA),它考虑了车辆的跳数场和传输范围,以选择最佳路由。分析了端到端延迟比、数据包交付比(PDR)、吞吐量、信任值、能耗等性能指标,并与现有技术进行了比较。在实验场景中,拟议技术的端到端延迟为 3.8 毫秒,数据包交付率为 98%,针对虫洞和 Sybil 攻击的信任值分别为 .4 和 .06,能耗和吞吐量分别为 78.7 kbps。结果证明了建议方法的有效性。
{"title":"A secure routing protocol using trust-based clustering and bionic intelligence algorithm for UAV-assisted vehicular ad hoc networks","authors":"Divya Babu,&nbsp;Terli Sankara Rao","doi":"10.1002/ett.4977","DOIUrl":"https://doi.org/10.1002/ett.4977","url":null,"abstract":"<p>Vehicular ad hoc networks (VANET) are one of the advanced technologies for distributing dynamic vehicular information across the globe. The VANET is extensively used in many applications, especially road safety applications and intelligent transport systems (ITS). However, direct communication causes high bandwidth (BW) requirement and power consumption. Hence, this article introduces a clustering-based mechanism to communicate vehicles with infrastructures. The cluster head (CH) is formed based on certain rules, and nodes or vehicles are combined. But, maintaining stability remains challenging for the traditional clustering mechanism. Moreover, the developed technique must examine the malicious and reduce the risk of fake information sharing. This research emphasizes a trust-based clustering mechanism to select the CH based on a vehicle's knowledge, reputation, and experience. In addition to this, the backup head is also analyzed to promote trust in each vehicle. After clustering, secure routing is undertaken. For this, a bionic remora optimization algorithm (BROA) is proposed, and it considers the hop Count Field as well as the transmission range of vehicles to select the best routes. The performance measures such as end-to-end delay ratio, packet delivery ratio (PDR), throughput, trust values, energy consumption are analyzed and compared with existing techniques. In an experimental scenario, the proposed technique has an end-to-end delay of 3.8 ms, PDR of 98%, trust value of .4 and .06 for wormhole and Sybil attack, energy of and throughput of 78.7 kbps are attained. The outcome results prove the efficacy of a proposed method.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 5","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140641766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Correction to “Multi-objective metaheuristic optimization-based clustering with network slicing technique for internet of things-enabled wireless sensor networks in 5G systems” 对 "基于多目标元搜索优化的聚类与网络切片技术,用于 5G 系统中的物联网无线传感器网络 "的更正
IF 3.6 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-04-23 DOI: 10.1002/ett.4982

Sheena BG, Snehalatha N. Multi-objective metaheuristic optimization-based clustering with network slicing technique for internet of things-enabled wireless sensor networks in 5G systems. Trans Emerg Telecommun Technol. 2022;1:e4626.

The institution location name “KATTANKULATHUR” was missing in the correspondence section.

The correct correspondence address is below.

B. Gracelin Sheena, Department of Computational Intelligence, SRM Institute of Science and Technology, Kattankulathur-603203, Chennai, Tamil Nadu, India. Email: [email protected], Email: [email protected]

We apologize for this error.

Sheena BG, Snehalatha N. 基于多目标元启发式优化的聚类与网络切片技术,用于 5G 系统中的物联网无线传感器网络。Trans Emerg Telecommun Technol.2022;1:e4626.The institution location name "KATTANKULATHUR" was missing in the correspondence section.The correct correspondence address is below.B. Gracelin Sheena, Department of Computational Intelligence, SRM Institute of Science and Technology, Kattankulathur-603203, Chennai, Tamil Nadu, India.Email:[email protected], Email:[email protected]我们对此错误深表歉意。
{"title":"Correction to “Multi-objective metaheuristic optimization-based clustering with network slicing technique for internet of things-enabled wireless sensor networks in 5G systems”","authors":"","doi":"10.1002/ett.4982","DOIUrl":"https://doi.org/10.1002/ett.4982","url":null,"abstract":"<p>Sheena BG, Snehalatha N. Multi-objective metaheuristic optimization-based clustering with network slicing technique for internet of things-enabled wireless sensor networks in 5G systems. <i>Trans Emerg Telecommun Technol</i>. 2022;1:e4626.</p><p>The institution location name “KATTANKULATHUR” was missing in the correspondence section.</p><p>The correct correspondence address is below.</p><p>B. Gracelin Sheena, Department of Computational Intelligence, SRM Institute of Science and Technology, Kattankulathur-603203, Chennai, Tamil Nadu, India. Email: <span>[email protected]</span>, Email: <span>[email protected]</span></p><p>We apologize for this error.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 5","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/ett.4982","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140639536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Crossover Boosted Grey Wolf Optimizer-based framework for leader election and resource allocation in Intrusion Detection Systems for MANETs 基于交叉助推灰狼优化器的城域网入侵检测系统领导者选举和资源分配框架
IF 3.6 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-04-22 DOI: 10.1002/ett.4974
Saravanan Selvaraj, Manikandan Nanjappan, Mythili Nagalingam, Uma Maheswari Balasubramanian

Mobile Ad hoc Networks (MANETs) is a self-organizing networks without having a fixed infrastructure for making them susceptible to security threats. Intrusion Detection Systems (IDS) promotes security in MANETs by identifying malicious activities. Leader election is a fundamental aspect of IDS deployment, impacting resource allocation and system efficiency. This article presents a novel approach, the Crossover Boosted Grey Wolf Optimizer (CBGWO), for leader election and resource allocation in MANET-based IDS. The proposed CBGWO algorithm integrates the Grey Wolf Optimizer (GWO) with innovative crossover operators that have an ability to enhance the capabilities of exploration and exploitation in the optimization process. The leader election problem is solved through applying multi-objective optimization by considering energy consumption, reputation, and communication overhead. Objective functions are defined to maximize energy efficiency while maintaining a balanced distribution of leadership roles. Extensive simulations are conducted, varying network densities and the percentage of selfish nodes. Results demonstrate the effectiveness of the CBGWO-based model in balancing energy consumption, prolonging network lifespan, and enhancing intrusion detection by comparing different state-of-the-art models such as PCA-FELM, CTAA-MPSO, FLS-RE, LEACH, DCAIDS, WOA-GA, and VOELA. The proposed model achieved an energy consumption of 4.31 J, network lifetime of 560.482 ms, and average intrusion detection latency of 0.12 s, respectively. The proposed model outperforms than existing random and connectivity-based leader election methods that is evaluated by taking main consideration of energy efficiency and network survivability. This research contributes to the field by introducing a robust algorithm for leader election in MANET-based IDS, addressing challenges posed by network dynamics and resource constraints. The CBGWO-based approach showcases its potential to achieve effective leader election and efficient resource allocation, thereby enhancing the security and sustainability of MANETs.

移动特设网络(MANET)是一种自组织网络,没有固定的基础设施,因此容易受到安全威胁。入侵检测系统(IDS)通过识别恶意活动来提高城域网的安全性。领导者选举是 IDS 部署的一个基本方面,会影响资源分配和系统效率。本文提出了一种新方法--交叉提升灰狼优化器(CBGWO),用于基于城域网的 IDS 中的领导者选举和资源分配。所提出的 CBGWO 算法集成了灰狼优化器(GWO)和创新的交叉算子,能够增强优化过程中的探索和利用能力。考虑到能耗、声誉和通信开销,领导者选举问题通过应用多目标优化来解决。目标函数的定义是在保持领导角色均衡分配的同时,最大限度地提高能效。通过改变网络密度和自私节点的比例,进行了大量模拟。结果表明,通过比较 PCA-FELM、CTAA-MPSO、FLS-RE、LEACH、DCAIDS、WOA-GA 和 VOELA 等不同的先进模型,基于 CBGWO 的模型在平衡能耗、延长网络寿命和增强入侵检测方面非常有效。所提模型的能耗为 4.31 J,网络寿命为 560.482 ms,平均入侵检测延迟为 0.12 s。在主要考虑能效和网络生存能力的情况下,所提出的模型优于现有的随机和基于连接性的领导者选举方法。这项研究为基于城域网的 IDS 引入了一种稳健的领导者选举算法,解决了网络动态和资源限制带来的挑战,为该领域做出了贡献。基于 CBGWO 的方法展示了其实现有效领导者选举和高效资源分配的潜力,从而提高了城域网的安全性和可持续性。
{"title":"Crossover Boosted Grey Wolf Optimizer-based framework for leader election and resource allocation in Intrusion Detection Systems for MANETs","authors":"Saravanan Selvaraj,&nbsp;Manikandan Nanjappan,&nbsp;Mythili Nagalingam,&nbsp;Uma Maheswari Balasubramanian","doi":"10.1002/ett.4974","DOIUrl":"https://doi.org/10.1002/ett.4974","url":null,"abstract":"<p>Mobile Ad hoc Networks (MANETs) is a self-organizing networks without having a fixed infrastructure for making them susceptible to security threats. Intrusion Detection Systems (IDS) promotes security in MANETs by identifying malicious activities. Leader election is a fundamental aspect of IDS deployment, impacting resource allocation and system efficiency. This article presents a novel approach, the Crossover Boosted Grey Wolf Optimizer (CBGWO), for leader election and resource allocation in MANET-based IDS. The proposed CBGWO algorithm integrates the Grey Wolf Optimizer (GWO) with innovative crossover operators that have an ability to enhance the capabilities of exploration and exploitation in the optimization process. The leader election problem is solved through applying multi-objective optimization by considering energy consumption, reputation, and communication overhead. Objective functions are defined to maximize energy efficiency while maintaining a balanced distribution of leadership roles. Extensive simulations are conducted, varying network densities and the percentage of selfish nodes. Results demonstrate the effectiveness of the CBGWO-based model in balancing energy consumption, prolonging network lifespan, and enhancing intrusion detection by comparing different state-of-the-art models such as PCA-FELM, CTAA-MPSO, FLS-RE, LEACH, DCAIDS, WOA-GA, and VOELA. The proposed model achieved an energy consumption of 4.31 J, network lifetime of 560.482 ms, and average intrusion detection latency of 0.12 s, respectively. The proposed model outperforms than existing random and connectivity-based leader election methods that is evaluated by taking main consideration of energy efficiency and network survivability. This research contributes to the field by introducing a robust algorithm for leader election in MANET-based IDS, addressing challenges posed by network dynamics and resource constraints. The CBGWO-based approach showcases its potential to achieve effective leader election and efficient resource allocation, thereby enhancing the security and sustainability of MANETs.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 5","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140633840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An anonymous and efficient certificateless signature scheme based on blockchain in NDN-IoT environments NDN-IoT 环境中基于区块链的匿名高效无证书签名方案
IF 3.6 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-04-18 DOI: 10.1002/ett.4979
Cong Wang, Xu Deng, Maode Ma, Qiang Li, Hongpeng Bai, Yanan Zhang

The Named Data Networking (NDN) architecture, known for its caching strategies and name-based routing, is an exemplary paradigm for content distribution across Internet of Things (IoT) devices. In the environment of NDN-IoT, there is an urgent demand for a lightweight signature authentication scheme suitable for terminal devices to ensure the integrity of Data packets and the legitimacy of their sources. Many researchers opt for employing certificateless public key cryptography measures to enhance the security of communication among terminal devices in NDN-IoT. However, among the array of proposed solutions, issues such as lack of resistance against signer identity exposure, susceptibility to man-in-the-middle attacks, and replay attacks persist. Some researchers advocate for partitioning the devices in NDN-IoT into different zones, yet there remains a deficiency in the design of packet exchange mechanisms across distinct zones. To address these issues, this paper proposes a novel blockchain-based certificate-less signature scheme in the NDN-IoT environment that integrates key features such as distributed legitimate producer management, inter-domain interaction mechanisms, anonymous identity protection, and blockchain storage optimization. The overarching goal is to provide robust security services for resource-constrained devices within the NDN infrastructure while ensuring authenticity and integrity of data packets while alleviating the burden of certificate management on end devices. Compared to similar existing solutions, our proposed method incurs only 34% of the computational overhead required for Data packet signature verification, while maintaining equivalent cache occupancy and achieving higher security performance.

命名数据网络(NDN)架构以其缓存策略和基于名称的路由而闻名,是物联网(IoT)设备内容分发的典范。在 NDN-IoT 环境中,迫切需要一种适用于终端设备的轻量级签名验证方案,以确保数据包的完整性及其来源的合法性。许多研究人员选择采用无证书公钥加密措施来增强 NDN-IoT 中终端设备间通信的安全性。然而,在提出的一系列解决方案中,仍存在无法抵御签名者身份暴露、易受中间人攻击和重放攻击等问题。一些研究人员主张将 NDN-IoT 中的设备划分为不同区域,但在跨不同区域的数据包交换机制设计方面仍存在不足。为解决这些问题,本文在 NDN-IoT 环境中提出了一种基于区块链的新型无证书签名方案,该方案集成了分布式合法生产者管理、域间交互机制、匿名身份保护和区块链存储优化等关键功能。其总体目标是在 NDN 基础设施内为资源受限的设备提供稳健的安全服务,同时确保数据包的真实性和完整性,并减轻终端设备的证书管理负担。与现有的类似解决方案相比,我们提出的方法只产生了数据包签名验证所需计算开销的 34%,同时保持了同等的缓存占用率,实现了更高的安全性能。
{"title":"An anonymous and efficient certificateless signature scheme based on blockchain in NDN-IoT environments","authors":"Cong Wang,&nbsp;Xu Deng,&nbsp;Maode Ma,&nbsp;Qiang Li,&nbsp;Hongpeng Bai,&nbsp;Yanan Zhang","doi":"10.1002/ett.4979","DOIUrl":"https://doi.org/10.1002/ett.4979","url":null,"abstract":"<p>The Named Data Networking (NDN) architecture, known for its caching strategies and name-based routing, is an exemplary paradigm for content distribution across Internet of Things (IoT) devices. In the environment of NDN-IoT, there is an urgent demand for a lightweight signature authentication scheme suitable for terminal devices to ensure the integrity of Data packets and the legitimacy of their sources. Many researchers opt for employing certificateless public key cryptography measures to enhance the security of communication among terminal devices in NDN-IoT. However, among the array of proposed solutions, issues such as lack of resistance against signer identity exposure, susceptibility to man-in-the-middle attacks, and replay attacks persist. Some researchers advocate for partitioning the devices in NDN-IoT into different zones, yet there remains a deficiency in the design of packet exchange mechanisms across distinct zones. To address these issues, this paper proposes a novel blockchain-based certificate-less signature scheme in the NDN-IoT environment that integrates key features such as distributed legitimate producer management, inter-domain interaction mechanisms, anonymous identity protection, and blockchain storage optimization. The overarching goal is to provide robust security services for resource-constrained devices within the NDN infrastructure while ensuring authenticity and integrity of data packets while alleviating the burden of certificate management on end devices. Compared to similar existing solutions, our proposed method incurs only 34% of the computational overhead required for Data packet signature verification, while maintaining equivalent cache occupancy and achieving higher security performance.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 4","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140619731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An energy-aware software fault detection system based on hierarchical rule approach for enhancing quality of service in internet of things-enabled wireless sensor network 基于分层规则方法的能量感知软件故障检测系统,用于提高物联网无线传感器网络的服务质量
IF 3.6 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-04-16 DOI: 10.1002/ett.4971
Lavina Balraj, Aruchamy Prasanth

Of late, the Internet of Things (IoT) has progressed in its pervasiveness across the globe for diverse applications. Wireless Sensor Network (WSN) is one of the prominent technologies employed in IoT environments where multiple tiny sensor nodes are distributed to sense real-time observations about unforeseeable areas for control and managerial purposes. Owing to the presence of sensors in inaccessible regions and their battery restrictions, different types of software faults occur in IoT-enabled WSNs (IWSNs). These faults create uncertainty in data reading which causes serious damage to the sensor network. Hence, the IWSN necessitates an effective fault-detection methodology to continue optimal activity despite the existence of software faults. This work proposes a novel Energy-Aware Hierarchical Rule-based Software Fault Detection (HRSFD) model to identify various software faults with minimum energy depletion in the IWSN environment. Primarily, the proposed model extracts antecedent attributes from the characteristics of the sensed data. Its abnormal values can be identified based on the obtained antecedent attributes. Subsequently, the category of the software fault is determined by applying a hierarchical rule strategy. Finally, from the simulation results, it is apparent that the fault detection accuracy rate of the proposed HRSFD model attains 99.12% for dense networks. The lifetime of the network is also prolonged by 18% as compared to the existing state-of-the-art models.

近来,物联网(IoT)在全球范围内的广泛应用取得了进展。无线传感器网络(WSN)是物联网环境中采用的重要技术之一,在这种环境中,多个微小的传感器节点分布在不可预见的区域,对这些区域进行实时观测,以达到控制和管理的目的。由于传感器存在于难以接近的区域,加上其电池的限制,物联网 WSN(IWSN)中会出现不同类型的软件故障。这些故障会造成数据读取的不确定性,从而对传感器网络造成严重破坏。因此,IWSN 需要一种有效的故障检测方法,以便在存在软件故障的情况下继续开展最佳活动。本研究提出了一种新颖的能量感知分层规则软件故障检测(HRSFD)模型,可在 IWSN 环境中以最小的能量消耗识别各种软件故障。首先,该模型从感知数据的特征中提取先验属性。根据所获得的前因属性,可以识别出异常值。随后,通过应用分层规则策略确定软件故障的类别。最后,从仿真结果可以看出,对于密集网络,所提出的 HRSFD 模型的故障检测准确率达到 99.12%。与现有的先进模型相比,网络的寿命也延长了 18%。
{"title":"An energy-aware software fault detection system based on hierarchical rule approach for enhancing quality of service in internet of things-enabled wireless sensor network","authors":"Lavina Balraj,&nbsp;Aruchamy Prasanth","doi":"10.1002/ett.4971","DOIUrl":"https://doi.org/10.1002/ett.4971","url":null,"abstract":"<p>Of late, the Internet of Things (IoT) has progressed in its pervasiveness across the globe for diverse applications. Wireless Sensor Network (WSN) is one of the prominent technologies employed in IoT environments where multiple tiny sensor nodes are distributed to sense real-time observations about unforeseeable areas for control and managerial purposes. Owing to the presence of sensors in inaccessible regions and their battery restrictions, different types of software faults occur in IoT-enabled WSNs (IWSNs). These faults create uncertainty in data reading which causes serious damage to the sensor network. Hence, the IWSN necessitates an effective fault-detection methodology to continue optimal activity despite the existence of software faults. This work proposes a novel Energy-Aware Hierarchical Rule-based Software Fault Detection (HRSFD) model to identify various software faults with minimum energy depletion in the IWSN environment. Primarily, the proposed model extracts antecedent attributes from the characteristics of the sensed data. Its abnormal values can be identified based on the obtained antecedent attributes. Subsequently, the category of the software fault is determined by applying a hierarchical rule strategy. Finally, from the simulation results, it is apparent that the fault detection accuracy rate of the proposed HRSFD model attains 99.12% for dense networks. The lifetime of the network is also prolonged by 18% as compared to the existing state-of-the-art models.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 4","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140559524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generalized index and mode modulated OFDM with improved spectral and energy efficiency 提高频谱和能效的广义指数和模式调制 OFDM
IF 3.6 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-04-15 DOI: 10.1002/ett.4973
Ipsita Sengupta, Shounak Dasgupta, Abhirup Das Barman

Recently developed trends in wireless communication encounter extremely high surge in data traffic, which makes it inevitable to employ energy efficient techniques to reduce detrimental consequence of carbon emission over society. This concern has motivated us to upgrade our previous work on index and mode modulated orthogonal frequency division multiplexing (IMM-OFDM) for achieving dual benefits in terms of spectral and energy efficiency. In this paper, we have proposed a generalized index and mode modulated OFDM scheme with variable number of subcarrier activation. Novelty of this generalized scheme is its capability to act as a unified model for classic OFDM and three other benchmark index modulated OFDM schemes along with our previously proposed IMM-OFDM scheme. This new scheme outperforms those five descendent schemes in terms of energy efficiency and error performance as indicated by simulation results. Spectral efficiency improvement in this scheme is achieved through optimum sets of active subcarrier number, which are determined to gain most optimized trade-off between spectral and energy efficiency with least detector complexity. This generalized parent scheme can replace individual models of its five descendent schemes and consequently can be considered to be one of the most promising candidates for next generation mobile communication system.

近年来,无线通信的发展趋势是数据流量激增,这就必然要采用节能技术来减少碳排放对社会造成的不利影响。这种担忧促使我们对之前的索引和模式调制正交频分复用(IMM-OFDM)工作进行升级,以实现频谱和能效方面的双重效益。在本文中,我们提出了一种具有可变子载波激活数的广义索引和模式调制 OFDM 方案。这种广义方案的新颖之处在于,它可以作为经典 OFDM 方案和其他三种基准指数调制 OFDM 方案以及我们之前提出的 IMM-OFDM 方案的统一模型。仿真结果表明,这一新方案在能效和误差性能方面优于上述五种后继方案。该方案通过优化有源子载波数组实现了频谱效率的提高,这些有源子载波数组可在频谱效率和能效之间获得最佳权衡,且检测器复杂度最低。这种广义的母方案可以取代其五个子方案的个别模型,因此可被视为下一代移动通信系统最有前途的候选方案之一。
{"title":"Generalized index and mode modulated OFDM with improved spectral and energy efficiency","authors":"Ipsita Sengupta,&nbsp;Shounak Dasgupta,&nbsp;Abhirup Das Barman","doi":"10.1002/ett.4973","DOIUrl":"https://doi.org/10.1002/ett.4973","url":null,"abstract":"<p>Recently developed trends in wireless communication encounter extremely high surge in data traffic, which makes it inevitable to employ energy efficient techniques to reduce detrimental consequence of carbon emission over society. This concern has motivated us to upgrade our previous work on index and mode modulated orthogonal frequency division multiplexing (IMM-OFDM) for achieving dual benefits in terms of spectral and energy efficiency. In this paper, we have proposed a generalized index and mode modulated OFDM scheme with variable number of subcarrier activation. Novelty of this generalized scheme is its capability to act as a unified model for classic OFDM and three other benchmark index modulated OFDM schemes along with our previously proposed IMM-OFDM scheme. This new scheme outperforms those five descendent schemes in terms of energy efficiency and error performance as indicated by simulation results. Spectral efficiency improvement in this scheme is achieved through optimum sets of active subcarrier number, which are determined to gain most optimized trade-off between spectral and energy efficiency with least detector complexity. This generalized parent scheme can replace individual models of its five descendent schemes and consequently can be considered to be one of the most promising candidates for next generation mobile communication system.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 4","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140553074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent load balancing in data center software-defined networks 数据中心软件定义网络中的智能负载平衡
IF 3.6 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-04-15 DOI: 10.1002/ett.4967
Ezekia Gilliard, Jinshuo Liu, Ahmed Abubakar Aliyu, Deng Juan, Huang Jing, Meng Wang

In response to the increasing demand for efficient resource utilization in data center networks (DCNs), the development of intelligent load-balancing algorithms has become crucial. This article introduces the dual double deep Q network (DDQN) algorithm, designed for software-defined networking (SDN) environments within data centers. By leveraging deep reinforcement learning, DDQN addresses the challenges posed by dynamic traffic patterns, diverse flow requirements, and the coexistence of elephant and mice flows. Our algorithm adopts a comprehensive SDN approach, evaluating the network's status by analyzing switch load and bandwidth utilization. Using convolutional neural networks for elephant and mice flows in DCN, our algorithm enables adaptive learning and training tailored to the specific demands of elephant flows. Employing a double deep Q network architecture (DDQN), DDQN optimizes paths for both elephant and mice flows independently. Real-time adaptation mechanisms make routing decisions based on the robust learning capabilities of DDQN, enhancing network utilization and reducing packet loss by generating optimal forwarding paths according to the current network state and traffic patterns. Simulations conducted in a Mininet environment with RYU as the controller, utilizing a fat-tree data center topology, validate the efficacy of DDQN. The results demonstrate its effectiveness in achieving higher throughput, lower latency, and superior load balancing compared to traditional algorithms like equal-cost multipath and Hedera.

为满足数据中心网络(DCN)对高效资源利用日益增长的需求,开发智能负载平衡算法变得至关重要。本文介绍了专为数据中心内软件定义网络(SDN)环境设计的双倍深度 Q 网络(DDQN)算法。通过利用深度强化学习,DDQN 解决了动态流量模式、多样化流量需求以及大象流和小鼠流共存所带来的挑战。我们的算法采用全面的 SDN 方法,通过分析交换机负载和带宽利用率来评估网络状态。我们的算法针对 DCN 中的大象流和小鼠流使用卷积神经网络,可根据大象流的特定需求进行自适应学习和训练。DDQN 采用双深度 Q 网络架构(DDQN),可独立优化大象流和小鼠流的路径。实时适应机制基于 DDQN 的强大学习能力做出路由决策,根据当前网络状态和流量模式生成最佳转发路径,从而提高网络利用率并减少数据包丢失。在以 RYU 为控制器的 Mininet 环境中,利用胖树数据中心拓扑进行了仿真,验证了 DDQN 的功效。结果表明,与等成本多路径和 Hedera 等传统算法相比,DDQN 能有效实现更高的吞吐量、更低的延迟和出色的负载平衡。
{"title":"Intelligent load balancing in data center software-defined networks","authors":"Ezekia Gilliard,&nbsp;Jinshuo Liu,&nbsp;Ahmed Abubakar Aliyu,&nbsp;Deng Juan,&nbsp;Huang Jing,&nbsp;Meng Wang","doi":"10.1002/ett.4967","DOIUrl":"https://doi.org/10.1002/ett.4967","url":null,"abstract":"<p>In response to the increasing demand for efficient resource utilization in data center networks (DCNs), the development of intelligent load-balancing algorithms has become crucial. This article introduces the dual double deep Q network (DDQN) algorithm, designed for software-defined networking (SDN) environments within data centers. By leveraging deep reinforcement learning, DDQN addresses the challenges posed by dynamic traffic patterns, diverse flow requirements, and the coexistence of elephant and mice flows. Our algorithm adopts a comprehensive SDN approach, evaluating the network's status by analyzing switch load and bandwidth utilization. Using convolutional neural networks for elephant and mice flows in DCN, our algorithm enables adaptive learning and training tailored to the specific demands of elephant flows. Employing a double deep Q network architecture (DDQN), DDQN optimizes paths for both elephant and mice flows independently. Real-time adaptation mechanisms make routing decisions based on the robust learning capabilities of DDQN, enhancing network utilization and reducing packet loss by generating optimal forwarding paths according to the current network state and traffic patterns. Simulations conducted in a Mininet environment with RYU as the controller, utilizing a fat-tree data center topology, validate the efficacy of DDQN. The results demonstrate its effectiveness in achieving higher throughput, lower latency, and superior load balancing compared to traditional algorithms like equal-cost multipath and Hedera.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 4","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140553148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bayesian detection with feedback for cooperative spectrum sensing in cognitive UAV networks 带反馈的贝叶斯检测用于认知无人机网络中的合作频谱感知
IF 3.6 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-04-15 DOI: 10.1002/ett.4972
Jun Wu, Mingkun Su, Lei Qiao, Weiwei Cao

Unmanned aerial vehicles (UAVs) are becoming a popular research topic in applications that do not require human intervention. A variety of applications and devices coexist in the environment where UAVs operate, resulting in a serious spectrum shortage. Therefore, cognitive radio (CR) is a promising solution for opportunistic access to underutilized spectrum bands by the primary user (PU) through cooperative spectrum sensing (CSS) technique. However, the flexible location of UAVs makes CSS inefficient and even difficult to be implemented. In view of this, a cognitive UAV network model consisting of a pair of UAVs which follows a circular flight trajectory to participate in CSS is proposed in a spectrum sensing frame structure. According to the local energy detection, we further propose an optimization problem about the stopping time in a quickest detection paradigm and conduct out Bayesian detection method with feedback to minimize the sensing delay and the false alarm probability by optimizing the stopping time. Moreover, we theoretically derive the optimal threshold pair and prove the optimal stopping time by means of Markov process. At last, a series of numerical simulations are shown to corroborate the proposed Bayesian detection method with feedback, in terms of the false alarm probability, the sensing delay, and achievable throughput. In contrast to the classic Neyman-Pearson and Bayesian detection methods, the advantage of Bayesian detection method with feedback sensing is presented.

在无需人工干预的应用领域,无人飞行器(UAV)正成为一个热门研究课题。在无人飞行器运行的环境中,各种应用和设备并存,导致频谱严重短缺。因此,认知无线电(CR)是一种很有前途的解决方案,可通过合作频谱感知(CSS)技术让主用户(PU)伺机访问未充分利用的频段。然而,无人机灵活的位置使 CSS 效率低下,甚至难以实施。有鉴于此,我们提出了一种认知无人机网络模型,该模型由一对无人机组成,这对无人机按照圆形飞行轨迹参与频谱感知框架结构中的 CSS。根据本地能量检测,我们进一步提出了最快检测范式中的停止时间优化问题,并通过优化停止时间来最小化感知延迟和误报概率,从而进行带反馈的贝叶斯检测方法。此外,我们还从理论上推导出了最佳阈值对,并通过马尔可夫过程证明了最佳停止时间。最后,我们通过一系列数值模拟,从误报概率、感应延迟和可实现吞吐量等方面证实了所提出的带反馈的贝叶斯检测方法。与经典的奈曼-皮尔逊(Neyman-Pearson)检测方法和贝叶斯检测方法相比,带反馈感应的贝叶斯检测方法的优势显而易见。
{"title":"Bayesian detection with feedback for cooperative spectrum sensing in cognitive UAV networks","authors":"Jun Wu,&nbsp;Mingkun Su,&nbsp;Lei Qiao,&nbsp;Weiwei Cao","doi":"10.1002/ett.4972","DOIUrl":"https://doi.org/10.1002/ett.4972","url":null,"abstract":"<p>Unmanned aerial vehicles (UAVs) are becoming a popular research topic in applications that do not require human intervention. A variety of applications and devices coexist in the environment where UAVs operate, resulting in a serious spectrum shortage. Therefore, cognitive radio (CR) is a promising solution for opportunistic access to underutilized spectrum bands by the primary user (PU) through cooperative spectrum sensing (CSS) technique. However, the flexible location of UAVs makes CSS inefficient and even difficult to be implemented. In view of this, a cognitive UAV network model consisting of a pair of UAVs which follows a circular flight trajectory to participate in CSS is proposed in a spectrum sensing frame structure. According to the local energy detection, we further propose an optimization problem about the stopping time in a quickest detection paradigm and conduct out Bayesian detection method with feedback to minimize the sensing delay and the false alarm probability by optimizing the stopping time. Moreover, we theoretically derive the optimal threshold pair and prove the optimal stopping time by means of Markov process. At last, a series of numerical simulations are shown to corroborate the proposed Bayesian detection method with feedback, in terms of the false alarm probability, the sensing delay, and achievable throughput. In contrast to the classic Neyman-Pearson and Bayesian detection methods, the advantage of Bayesian detection method with feedback sensing is presented.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 4","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140553138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance analysis of energy harvesting-enabled relay networks in κ-μ fading channels κ-μ衰减信道中的能量收集中继网络性能分析
IF 3.6 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-04-15 DOI: 10.1002/ett.4976
Raghwendra K. Singh, Soumendu Das, Dharmendra Dixit, Nagendra Kumar

In this paper, we investigate the performance of an energy harvesting (EH)-enabled multiple relay network operating over generalized - fading channels. Our approach involves utilizing a partial relay selection strategy and employing an amplify and forward relay protocol for efficient EH from RF signals. Additionally, we integrate a selection combining scheme at the receiver to combine both direct and relaying path signals. In our research, we first obtain the exact closed-form expression of the cumulative distribution function (CDF) for the system under investigation. Subsequently, we derive expressions for the outage probability (OP) and the moment generating function (MGF) using the derived CDF expression. Furthermore, with the assistance of a CDF-based approach, we derive closed-form expressions for the average symbol error rate (ASER) for coherent quadrature amplitude modulation (QAM) schemes, including rectangular QAM (RQAM) and hexagonal QAM (HQAM). We also analyze the ASER expression for non-coherent frequency shift keying (NCFSK), leveraging the derived MGF expression. To gain valuable insights into the performance of EH-enabled multiple relay networks, we assess the asymptotic expression of the OP. The outcomes indicate how the behavior of the system is affected by various factors such as time switching ratio, channel fading components, number of relays, and the distance between nodes. To corroborate the accuracy of the analytical findings, Monte Carlo simulations are executed.

本文研究了在广义衰落信道上运行的支持能量收集(EH)的多中继网络的性能。我们的方法包括利用部分中继选择策略,并采用放大和转发中继协议,从射频信号中获得高效的能量收集。此外,我们还在接收器上集成了一个选择组合方案,以组合直接信号和中继路径信号。在研究中,我们首先获得了所研究系统的累积分布函数(CDF)的精确闭式表达式。随后,我们利用得出的 CDF 表达式推导出中断概率 (OP) 和时刻生成函数 (MGF) 的表达式。此外,借助基于 CDF 的方法,我们还推导出了相干正交振幅调制 (QAM) 方案(包括矩形 QAM (RQAM) 和六角 QAM (HQAM))的平均符号错误率 (ASER) 的闭式表达式。我们还利用推导出的 MGF 表达式,分析了非相干频移键控(NCFSK)的 ASER 表达式。为了深入了解启用 EH 的多中继网络的性能,我们评估了 OP 的渐近表达式。结果表明了系统行为如何受到时间切换比、信道衰落成分、中继数量和节点间距离等各种因素的影响。为了证实分析结果的准确性,我们进行了蒙特卡罗模拟。
{"title":"Performance analysis of energy harvesting-enabled relay networks in κ-μ fading channels","authors":"Raghwendra K. Singh,&nbsp;Soumendu Das,&nbsp;Dharmendra Dixit,&nbsp;Nagendra Kumar","doi":"10.1002/ett.4976","DOIUrl":"https://doi.org/10.1002/ett.4976","url":null,"abstract":"<p>In this paper, we investigate the performance of an energy harvesting (EH)-enabled multiple relay network operating over generalized - fading channels. Our approach involves utilizing a partial relay selection strategy and employing an amplify and forward relay protocol for efficient EH from RF signals. Additionally, we integrate a selection combining scheme at the receiver to combine both direct and relaying path signals. In our research, we first obtain the exact closed-form expression of the cumulative distribution function (CDF) for the system under investigation. Subsequently, we derive expressions for the outage probability (OP) and the moment generating function (MGF) using the derived CDF expression. Furthermore, with the assistance of a CDF-based approach, we derive closed-form expressions for the average symbol error rate (ASER) for coherent quadrature amplitude modulation (QAM) schemes, including rectangular QAM (RQAM) and hexagonal QAM (HQAM). We also analyze the ASER expression for non-coherent frequency shift keying (NCFSK), leveraging the derived MGF expression. To gain valuable insights into the performance of EH-enabled multiple relay networks, we assess the asymptotic expression of the OP. The outcomes indicate how the behavior of the system is affected by various factors such as time switching ratio, channel fading components, number of relays, and the distance between nodes. To corroborate the accuracy of the analytical findings, Monte Carlo simulations are executed.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 4","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140553140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A profiled side-channel attack detection using deep learning model with capsule auto-encoder network 利用带有胶囊自动编码器网络的深度学习模型进行侧信道攻击检测
IF 3.6 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-04-15 DOI: 10.1002/ett.4975
Raja Maheswari, Marudhamuthu Krishnamurthy

Side-channel analysis (SCA) is a type of cryptanalytic attack that uses unintended ‘side-channel’ leakage through the real-world execution of the cryptographic algorithm to crack a secret key of an embedded system. These side-channel errors can be discovered through tracking the energy usage of the device performing the technique, electromagnetic radiations while the encryption process, execution time, cache hits/misses, and others. Nowadays, deep learning-based detection techniques are considered as emerging techniques that have been proposed for attack detection. Deep learning architectures have the ability to learn autonomously and concentrate on difficult features, in contrast to machine learning models. In light of these factors, the work's motive is thought to be the proposal of a deep learning-based attack detection method. Many methods are used to decrease these assaults, however, the majority of them are inefficient and time-demanding. In order to address these challenges, this study employs a novel deep learning-based methodology. Pre-processing, feature extraction, and SCA classification are the three stages of the approach proposed in this work. First, pre-processing is used to remove unnecessary information and improve the quality of the input using data cleaning and min-max normalization. The previously processed data are then fed as input into the proposed hybrid deep learning architecture. A Deep Residual Capsule Auto-Encoder (DR_CAE) model is introduced in the proposed study. The deep residual neural network-50 (DRNN-50) is utilized to extract relevant features in this case, while the side channel analysis is done by using capsule auto-encoder (CAE). The parameters of the proposed model are adjusted using the modified white shark optimization (MWSO) technique to improve its performance. In the results section, the proposed model is compared to various existing models in terms of accuracy, precision, recall, F-measures, time, and so on. The proposed framework has an accuracy of 98.802%, F-measures of 98.801%, kappa coefficient of 97.6%, the precision value of 98.81%, and recall value of 98.80%.

侧信道分析(SCA)是一种密码分析攻击,它通过在现实世界中执行密码算法,利用意外的 "侧信道 "泄漏来破解嵌入式系统的密钥。这些侧信道错误可以通过跟踪执行该技术的设备的能耗、加密过程中的电磁辐射、执行时间、缓存命中/遗漏等情况来发现。如今,基于深度学习的检测技术被认为是新兴的攻击检测技术。与机器学习模型相比,深度学习架构具有自主学习和专注于困难特征的能力。鉴于这些因素,这项工作的动机被认为是提出一种基于深度学习的攻击检测方法。目前有许多方法可用于减少这些攻击,但大多数方法效率低下且耗时较长。为了应对这些挑战,本研究采用了一种新颖的基于深度学习的方法。预处理、特征提取和 SCA 分类是本研究提出的方法的三个阶段。首先,预处理用于去除不必要的信息,并通过数据清理和最小-最大归一化来提高输入的质量。然后,将先前处理过的数据作为输入输入到所提出的混合深度学习架构中。研究中引入了深度残差胶囊自动编码器(DR_CAE)模型。在这种情况下,利用深度残差神经网络-50(DRNN-50)来提取相关特征,而侧信道分析则通过胶囊自动编码器(CAE)来完成。为了提高模型的性能,使用了改良白鲨优化(MWSO)技术来调整模型的参数。在结果部分,从准确度、精确度、召回率、F-度量、时间等方面对所提出的模型与现有的各种模型进行了比较。提出的框架准确率为 98.802%,F-measures 为 98.801%,kappa 系数为 97.6%,精确率为 98.81%,召回率为 98.80%。
{"title":"A profiled side-channel attack detection using deep learning model with capsule auto-encoder network","authors":"Raja Maheswari,&nbsp;Marudhamuthu Krishnamurthy","doi":"10.1002/ett.4975","DOIUrl":"https://doi.org/10.1002/ett.4975","url":null,"abstract":"<p>Side-channel analysis (SCA) is a type of cryptanalytic attack that uses unintended ‘side-channel’ leakage through the real-world execution of the cryptographic algorithm to crack a secret key of an embedded system. These side-channel errors can be discovered through tracking the energy usage of the device performing the technique, electromagnetic radiations while the encryption process, execution time, cache hits/misses, and others. Nowadays, deep learning-based detection techniques are considered as emerging techniques that have been proposed for attack detection. Deep learning architectures have the ability to learn autonomously and concentrate on difficult features, in contrast to machine learning models. In light of these factors, the work's motive is thought to be the proposal of a deep learning-based attack detection method. Many methods are used to decrease these assaults, however, the majority of them are inefficient and time-demanding. In order to address these challenges, this study employs a novel deep learning-based methodology. Pre-processing, feature extraction, and SCA classification are the three stages of the approach proposed in this work. First, pre-processing is used to remove unnecessary information and improve the quality of the input using data cleaning and min-max normalization. The previously processed data are then fed as input into the proposed hybrid deep learning architecture. A Deep Residual Capsule Auto-Encoder (DR_CAE) model is introduced in the proposed study. The deep residual neural network-50 (DRNN-50) is utilized to extract relevant features in this case, while the side channel analysis is done by using capsule auto-encoder (CAE). The parameters of the proposed model are adjusted using the modified white shark optimization (MWSO) technique to improve its performance. In the results section, the proposed model is compared to various existing models in terms of accuracy, precision, recall, F-measures, time, and so on. The proposed framework has an accuracy of 98.802%, F-measures of 98.801%, kappa coefficient of 97.6%, the precision value of 98.81%, and recall value of 98.80%.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 4","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140553139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Transactions on Emerging Telecommunications Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1