Song Han, Aijia Li, Xiaotong Jiang, Xinbin Li, Zhixin Liu, Lei Yan, Tongwei Zhang
In this article, a joint relay selection, power control and time allocation problem is studied to maximize the energy efficiency for the cooperative underwater acoustic communication networks. The joint optimization problem is full of challenges due to the strong coupling of multiple resources and the uncertain characteristics of the underwater acoustic communication scenario. To address this issue, the worst-case method is employed to transform an original uncertain problem into a deterministic problem. Furthermore, we propose the block coordinate descent-based method to decouple the strongly coupling multi-resource allocation problem into three relatively independent sub-problems. The coupling of multiple resources is completely decoupled, thereby greatly reducing the solving difficulty. In addition, given that the sub-problems with the fractional objective function are still non-convex and hard to solve, the Dinkelbach-based method is proposed to transform the fractional objective function into a subtractive form. At last, the relay selection sub-problem is transformed into a integer programming problem, and the time allocation sub-problem is transformed into a linear programming problem, whose optimal solutions can be obtained by some well-established solution methods. The power allocation problem is transformed into a convex optimization problem, which can be solved by the Lagrangian dual method. Finally, in the proposed iteration structure, the three sub-problems are alternatingly solved until convergence. Simulation results are presented to demonstrate the efficiency and robustness of the proposed algorithm.
{"title":"Robust joint multiple resources allocation algorithm for cooperative underwater acoustic communication networks","authors":"Song Han, Aijia Li, Xiaotong Jiang, Xinbin Li, Zhixin Liu, Lei Yan, Tongwei Zhang","doi":"10.1002/ett.5038","DOIUrl":"https://doi.org/10.1002/ett.5038","url":null,"abstract":"<p>In this article, a joint relay selection, power control and time allocation problem is studied to maximize the energy efficiency for the cooperative underwater acoustic communication networks. The joint optimization problem is full of challenges due to the strong coupling of multiple resources and the uncertain characteristics of the underwater acoustic communication scenario. To address this issue, the worst-case method is employed to transform an original uncertain problem into a deterministic problem. Furthermore, we propose the block coordinate descent-based method to decouple the strongly coupling multi-resource allocation problem into three relatively independent sub-problems. The coupling of multiple resources is completely decoupled, thereby greatly reducing the solving difficulty. In addition, given that the sub-problems with the fractional objective function are still non-convex and hard to solve, the Dinkelbach-based method is proposed to transform the fractional objective function into a subtractive form. At last, the relay selection sub-problem is transformed into a integer programming problem, and the time allocation sub-problem is transformed into a linear programming problem, whose optimal solutions can be obtained by some well-established solution methods. The power allocation problem is transformed into a convex optimization problem, which can be solved by the Lagrangian dual method. Finally, in the proposed iteration structure, the three sub-problems are alternatingly solved until convergence. Simulation results are presented to demonstrate the efficiency and robustness of the proposed algorithm.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142359827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In recent years, the advancements in wireless technologies and sensor networks have promoted the Mobile Internet of Things (MIoT) paradigm. However, the unique characteristics of MIoT networks expose them to significant security vulnerabilities and threats, necessitating robust cybersecurity measures, including effective attack detection and mitigation techniques. Among these strategies, Artificial Intelligence (AI), and particularly Machine Learning- (ML) based approaches, emerge as a pivotal method for bolstering MIoT security. In this paper, we present a comprehensive literature survey regarding the utilization of ML for enhancing security in MIoT. Through an exhaustive review of existing research articles, we analyze the diverse array of ML-based approaches employed to safeguard MIoT ecosystems and provide a holistic understanding of the current landscape, elucidating the strengths and limitations of prevailing methodologies. We propose a structured taxonomy to categorize recent works in this domain, by distinguishing approaches based on Shallow Supervised Learning (SSL), Shallow Unsupervised Learning (SUL), Deep Learning (DL), and Reinforcement Learning (RL). By delineating existing challenges and potential future directions for cybersecurity in MIoT, we aim to stimulate discourse and inspire novel approaches towards more resilient and secure MIoT ecosystems.
近年来,无线技术和传感器网络的进步推动了移动物联网(MIoT)模式的发展。然而,MIoT 网络的独特性使其面临着巨大的安全漏洞和威胁,因此有必要采取强有力的网络安全措施,包括有效的攻击检测和缓解技术。在这些策略中,人工智能(AI),特别是基于机器学习(ML)的方法,成为加强 MIoT 安全的关键方法。在本文中,我们将对有关利用 ML 增强 MIoT 安全性的文献进行全面调查。通过对现有研究文章的详尽评述,我们分析了为保护 MIoT 生态系统而采用的各种基于 ML 的方法,并提供了对当前格局的整体理解,阐明了现有方法的优势和局限性。我们提出了一种结构化分类法,通过区分基于浅层监督学习(SSL)、浅层无监督学习(SUL)、深度学习(DL)和强化学习(RL)的方法,对该领域的最新研究成果进行分类。通过划分 MIoT 网络安全的现有挑战和潜在未来方向,我们旨在激发讨论,启发新方法,以实现更具弹性和更安全的 MIoT 生态系统。
{"title":"Machine learning solutions for mobile internet of things security: A literature review and research agenda","authors":"Hadjer Messabih, Chaker Abdelaziz Kerrache, Youssra Cheriguene, Marica Amadeo, Farhan Ahmad","doi":"10.1002/ett.5041","DOIUrl":"https://doi.org/10.1002/ett.5041","url":null,"abstract":"<p>In recent years, the advancements in wireless technologies and sensor networks have promoted the Mobile Internet of Things (MIoT) paradigm. However, the unique characteristics of MIoT networks expose them to significant security vulnerabilities and threats, necessitating robust cybersecurity measures, including effective attack detection and mitigation techniques. Among these strategies, Artificial Intelligence (AI), and particularly Machine Learning- (ML) based approaches, emerge as a pivotal method for bolstering MIoT security. In this paper, we present a comprehensive literature survey regarding the utilization of ML for enhancing security in MIoT. Through an exhaustive review of existing research articles, we analyze the diverse array of ML-based approaches employed to safeguard MIoT ecosystems and provide a holistic understanding of the current landscape, elucidating the strengths and limitations of prevailing methodologies. We propose a structured taxonomy to categorize recent works in this domain, by distinguishing approaches based on Shallow Supervised Learning (SSL), Shallow Unsupervised Learning (SUL), Deep Learning (DL), and Reinforcement Learning (RL). By delineating existing challenges and potential future directions for cybersecurity in MIoT, we aim to stimulate discourse and inspire novel approaches towards more resilient and secure MIoT ecosystems.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142320612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Guaranteeing the anonymity of the vehicle and the integrity of the transmitted message are two indispensable conditions in vehicular ad-hoc network. Anonymous signature can achieve the two function. However, existing anonymous signature schemes constructed based on traditional cryptosystems cannot withstand quantum attacks. In addition, in some cases, the schemes need to satisfy the non-transferability of signatures to solve the problem of signature misuse due to publicly verified signatures. In order to resist quantum attacks and address the problem of signature misuse, this article proposes a lattice-based chameleon signcryption scheme, which aims to protect vehicle identity and data security. The scheme is resistant to quantum attacks and satisfies signature non-transferability, signer rejectability and non-repudiation. Especially, we prove that the proposed scheme is secure in the Standard Model based on the error learning problem and the classical lattice small integer solution problem.
{"title":"LBCSC: Lattice-based chameleon signcryption scheme for secure and privacy-preserving vehicular communications","authors":"Jianhong Zhang, Xinyan Cui","doi":"10.1002/ett.5040","DOIUrl":"https://doi.org/10.1002/ett.5040","url":null,"abstract":"<p>Guaranteeing the anonymity of the vehicle and the integrity of the transmitted message are two indispensable conditions in vehicular ad-hoc network. Anonymous signature can achieve the two function. However, existing anonymous signature schemes constructed based on traditional cryptosystems cannot withstand quantum attacks. In addition, in some cases, the schemes need to satisfy the non-transferability of signatures to solve the problem of signature misuse due to publicly verified signatures. In order to resist quantum attacks and address the problem of signature misuse, this article proposes a lattice-based chameleon signcryption scheme, which aims to protect vehicle identity and data security. The scheme is resistant to quantum attacks and satisfies signature non-transferability, signer rejectability and non-repudiation. Especially, we prove that the proposed scheme is secure in the Standard Model based on the error learning problem and the classical lattice small integer solution problem.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142273097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wireless sensor networks have sensing functions which made up of small sensor nodes that are processing and communication capabilities. However, the traditional approach of designating a single sensor node as the cluster head often leads to a faster depletion of its energy resources than another node. So, periodic reassignment of the cluster head role among different sensor nodes is crucial to extend operational lifetime and ensure sustained performance. Therefore, this research proposes an Enhanced Agglomerative Hierarchy Algorithm based on the Low Energy Adaptive Clustering Hierarchy (EAHALEACH) protocol, coupled with an enhanced time-controlled optimization algorithm, to enhance energy efficiency by selecting the optimal cluster head from a candidate pool. The proposed method enhances energy efficiency by optimally selecting cluster heads, which reduces energy consumption and extends the lifespan of the network. Additionally, a lightweight energy-aware cluster head rotation algorithm is introduced to efficiently rotate the cluster head role within the sensor node network, minimizing unnecessary data transmissions and extending the network lifetime. A hybrid approach combining Carrier Sense and Time Division Multiple Access (CSTDMA) optimizes packet forwarding by dynamically allocating time slots, reducing collisions and contention to improve packet forwarding efficiency. Comparative analysis with existing techniques demonstrates that the hybrid clustering-based LEACH protocol achieves superior performance in terms of throughput 4600 bps by 2000 rounds, energy consumption 50 J, latency as 1 ms and network lifetime in 1000th node attains 3500 s. These advancements contribute to prolonged operational efficiency and sustained performance in wireless sensor network deployments.
无线传感器网络具有传感功能,由具有处理和通信能力的小型传感器节点组成。然而,指定单个传感器节点作为簇头的传统方法往往会导致其能源耗尽速度快于其他节点。因此,在不同的传感器节点之间定期重新分配簇头角色对于延长运行寿命和确保持续性能至关重要。因此,本研究提出了一种基于低能耗自适应聚类层次结构(EAHALEACH)协议的增强聚类层次结构算法,并结合一种增强的时间控制优化算法,通过从候选池中选择最佳簇头来提高能效。所提出的方法通过优化选择簇头提高了能效,从而降低了能耗,延长了网络的寿命。此外,还引入了一种轻量级能量感知簇头轮换算法,在传感器节点网络内有效轮换簇头角色,最大限度地减少不必要的数据传输,延长网络寿命。载波感应和时分多址(CSTDMA)相结合的混合方法通过动态分配时隙、减少碰撞和争用来优化数据包转发,从而提高数据包转发效率。与现有技术的对比分析表明,基于混合聚类的 LEACH 协议在 2000 轮吞吐量 4600 bps、能耗 50 J、延迟 1 ms 以及第 1000 个节点的网络寿命达到 3500 s 等方面表现出色。这些进步有助于提高无线传感器网络部署的运行效率和持续性能。
{"title":"Delay sensitive and energy adaptive clustering hierarchy protocol using enhanced agglomerative hierarchy algorithm with time-controlled jellyfish optimization","authors":"Atul Kumar Agnihotri, Vishal Awasthi","doi":"10.1002/ett.5039","DOIUrl":"https://doi.org/10.1002/ett.5039","url":null,"abstract":"<p>Wireless sensor networks have sensing functions which made up of small sensor nodes that are processing and communication capabilities. However, the traditional approach of designating a single sensor node as the cluster head often leads to a faster depletion of its energy resources than another node. So, periodic reassignment of the cluster head role among different sensor nodes is crucial to extend operational lifetime and ensure sustained performance. Therefore, this research proposes an Enhanced Agglomerative Hierarchy Algorithm based on the Low Energy Adaptive Clustering Hierarchy (EAHALEACH) protocol, coupled with an enhanced time-controlled optimization algorithm, to enhance energy efficiency by selecting the optimal cluster head from a candidate pool. The proposed method enhances energy efficiency by optimally selecting cluster heads, which reduces energy consumption and extends the lifespan of the network. Additionally, a lightweight energy-aware cluster head rotation algorithm is introduced to efficiently rotate the cluster head role within the sensor node network, minimizing unnecessary data transmissions and extending the network lifetime. A hybrid approach combining Carrier Sense and Time Division Multiple Access (CSTDMA) optimizes packet forwarding by dynamically allocating time slots, reducing collisions and contention to improve packet forwarding efficiency. Comparative analysis with existing techniques demonstrates that the hybrid clustering-based LEACH protocol achieves superior performance in terms of throughput 4600 bps by 2000 rounds, energy consumption 50 J, latency as 1 ms and network lifetime in 1000th node attains 3500 s. These advancements contribute to prolonged operational efficiency and sustained performance in wireless sensor network deployments.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142244971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Saeed Ullah Jan, Anwar Ghani, Abdulrahman Alzahrani, Muhammad Usman Tariq, Fahad Algarni, Husnain Abbas Naqvi
The Internet of Things (IoT) is a transformative technology that has found applications in diverse domains, including automation, logistics, grid, transportation, healthcare, and more. In these domains, IoT systems generate a significant amount of data, which can be stored in a cloud. However, cloud computing may not be practical in certain delay-sensitive IoT applications with complex operations. To address this, fog and edge computing paradigms have been introduced, but they rely on a reliable internet connection for proper functioning. The dew computing paradigm, a novel concept, allows the execution of various applications in the IoT environment, with or without internet connectivity. However, ensuring data confidentiality and integrity during transmission and storage in such an environment remains a significant challenge. Therefore, a fail-safe and highly effective security mechanism is yet to be proposed. This study introduces a protocol that utilizes the elliptic curve cryptography and secure hash algorithm to design a secure key agreement and lightweight protocol (SKALP). SKALP security is formally analyzed using BAN (Burrows-Abadi-Needham) logic, ROM (Random Oracle Model), RoR (Real-Or-Random) model, and ProVerif (Protocol Verifier) simulation while informally discussing it to evaluate its resistance against well-known attacks. Additionally, the performance analysis of SKALP considers the costs associated with communication and computation. The findings from the comparative analysis indicate that the SKALP demonstrates a higher level of superiority than its competitors.
{"title":"SKALP: Secure key agreement and lightweight protocol for dew-assisted IoT enabled edge computing","authors":"Saeed Ullah Jan, Anwar Ghani, Abdulrahman Alzahrani, Muhammad Usman Tariq, Fahad Algarni, Husnain Abbas Naqvi","doi":"10.1002/ett.5035","DOIUrl":"https://doi.org/10.1002/ett.5035","url":null,"abstract":"<p>The Internet of Things (IoT) is a transformative technology that has found applications in diverse domains, including automation, logistics, grid, transportation, healthcare, and more. In these domains, IoT systems generate a significant amount of data, which can be stored in a cloud. However, cloud computing may not be practical in certain delay-sensitive IoT applications with complex operations. To address this, fog and edge computing paradigms have been introduced, but they rely on a reliable internet connection for proper functioning. The dew computing paradigm, a novel concept, allows the execution of various applications in the IoT environment, with or without internet connectivity. However, ensuring data confidentiality and integrity during transmission and storage in such an environment remains a significant challenge. Therefore, a fail-safe and highly effective security mechanism is yet to be proposed. This study introduces a protocol that utilizes the elliptic curve cryptography and secure hash algorithm to design a secure key agreement and lightweight protocol (SKALP). SKALP security is formally analyzed using BAN (Burrows-Abadi-Needham) logic, ROM (Random Oracle Model), RoR (Real-Or-Random) model, and ProVerif (Protocol Verifier) simulation while informally discussing it to evaluate its resistance against well-known attacks. Additionally, the performance analysis of SKALP considers the costs associated with communication and computation. The findings from the comparative analysis indicate that the SKALP demonstrates a higher level of superiority than its competitors.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 9","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142169856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}