首页 > 最新文献

Transactions on Emerging Telecommunications Technologies最新文献

英文 中文
A Blockchain Framework for Ensuring Medical Data Security in Internet of Medical Things 医疗物联网下医疗数据安全保障区块链框架
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-10-16 DOI: 10.1002/ett.70271
Siddharth Chhinal, Bipal Khanal, Manvendra Singh, Md. Sarfaraj Alam Ansari

The rapid evolution of the Internet of Things (IoT) has led to the growth of the Internet of Medical Things (IoMT), encompassing interconnected medical devices, wearable sensors, and healthcare systems. IoMT extends the capabilities of IoT into the healthcare sector, representing a promising technology for the future of healthcare. The underlying technology has transformed the healthcare landscape by continuously collecting patient data in real time and providing a remote monitoring and diagnostic system. However, IoMT introduces significant challenges in data security, privacy, and system reliability due to centralized data storage models, which can create a single point of failure and raise concerns about privacy and security. To address these challenges, this research proposes a blockchain-based framework to enhance data security and privacy by decentralizing data storage and managing device authentication using smart contracts. Given the sensitive nature of medical data and the potential repercussions of security breaches, each medical device has a unique digital identity represented by a blockchain-based smart contract, supporting the multi-device mapping required for managing multiple diseases in healthcare diagnosis and treatment. This approach enhances healthcare security and efficiency. A proof-of-work mechanism ensures secure transaction validation and experimental results demonstrate that the proposed framework significantly improves data integrity and security while optimizing system performance, as measured by gas consumption and latency. The assessment demonstrates the feasibility of employing blockchain technology to enhance the security and privacy of the IoMT healthcare system, providing a robust solution to existing security challenges and protecting patient data.

物联网(IoT)的快速发展带动了医疗物联网(IoMT)的发展,包括互联医疗设备、可穿戴传感器和医疗保健系统。IoMT将物联网的功能扩展到医疗保健领域,代表了医疗保健未来的一项有前途的技术。底层技术通过持续实时收集患者数据并提供远程监控和诊断系统,改变了医疗保健领域。然而,由于集中的数据存储模型,IoMT在数据安全性、隐私性和系统可靠性方面带来了重大挑战,这可能会造成单点故障,并引起对隐私和安全性的担忧。为了应对这些挑战,本研究提出了一个基于区块链的框架,通过分散数据存储和使用智能合约管理设备身份验证来增强数据安全和隐私。鉴于医疗数据的敏感性和安全漏洞的潜在影响,每个医疗设备都有一个独特的数字身份,由基于区块链的智能合约代表,支持在医疗诊断和治疗中管理多种疾病所需的多设备映射。这种方法提高了医疗保健安全性和效率。工作证明机制确保了安全的交易验证,实验结果表明,所提出的框架显着提高了数据完整性和安全性,同时优化了系统性能(通过气体消耗和延迟来衡量)。该评估证明了采用区块链技术增强IoMT医疗保健系统的安全性和隐私性的可行性,为现有的安全挑战提供了一个强大的解决方案,并保护了患者数据。
{"title":"A Blockchain Framework for Ensuring Medical Data Security in Internet of Medical Things","authors":"Siddharth Chhinal,&nbsp;Bipal Khanal,&nbsp;Manvendra Singh,&nbsp;Md. Sarfaraj Alam Ansari","doi":"10.1002/ett.70271","DOIUrl":"https://doi.org/10.1002/ett.70271","url":null,"abstract":"<div>\u0000 \u0000 <p>The rapid evolution of the Internet of Things (IoT) has led to the growth of the Internet of Medical Things (IoMT), encompassing interconnected medical devices, wearable sensors, and healthcare systems. IoMT extends the capabilities of IoT into the healthcare sector, representing a promising technology for the future of healthcare. The underlying technology has transformed the healthcare landscape by continuously collecting patient data in real time and providing a remote monitoring and diagnostic system. However, IoMT introduces significant challenges in data security, privacy, and system reliability due to centralized data storage models, which can create a single point of failure and raise concerns about privacy and security. To address these challenges, this research proposes a blockchain-based framework to enhance data security and privacy by decentralizing data storage and managing device authentication using smart contracts. Given the sensitive nature of medical data and the potential repercussions of security breaches, each medical device has a unique digital identity represented by a blockchain-based smart contract, supporting the multi-device mapping required for managing multiple diseases in healthcare diagnosis and treatment. This approach enhances healthcare security and efficiency. A proof-of-work mechanism ensures secure transaction validation and experimental results demonstrate that the proposed framework significantly improves data integrity and security while optimizing system performance, as measured by gas consumption and latency. The assessment demonstrates the feasibility of employing blockchain technology to enhance the security and privacy of the IoMT healthcare system, providing a robust solution to existing security challenges and protecting patient data.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145317415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-Based Anomaly Detection in Vehicular Ad-Hoc Networks Using Deep Reinforcement Learning 基于区块链的基于深度强化学习的车载Ad-Hoc网络异常检测
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-10-15 DOI: 10.1002/ett.70282
A. Phani Sheetal, Mohammed I. Khalaf, Abdelhamid Zaidi, Ashit Kumar Dutta, Mohammad Shabbir Alam, Kottala Sri Yogi, Nirupma Pathak, Abror Abdullayev, V. B. Murali Krishna

Utilizing blockchain in vehicular ad-hoc networks (VANETs) can proficiently resolve concerns pertaining to data security and privacy. The limited throughput of blockchain obstructs its extensive implementation in VANETs. Current studies on enhancing blockchain throughput frequently encounter the issue of action space proliferation, leading to inadequate scalability. This research presents a strategy for optimizing blockchain performance on VANETs using deep reinforcement learning (DRL). The suggested method enhances blockchain throughput by selecting block producers and consensus methods, and by modifying block size and intervals, while maintaining decentralization, low latency, and security in VANET-based blockchain systems. Furthermore, to augment network security, an anomaly detection mechanism is incorporated, utilizing machine learning techniques to identify and mitigate potential attacks aimed at VANETs. The proposed system enhances throughput and fortifies resilience against malicious operations by identifying anomalous patterns in network behavior. The method uses the BDQ framework to meticulously partition the action space, tackling the action space explosion issue that occurs with conventional DRL techniques in blockchain throughput optimization. Simulation results indicate that the suggested solution significantly improves the throughput and security of the VANET-based blockchain system.

在车载自组织网络(vanet)中使用区块链可以有效地解决与数据安全和隐私相关的问题。b区块链的有限吞吐量阻碍了其在vanet中的广泛实施。目前关于提高区块链吞吐量的研究经常遇到动作空间扩散的问题,导致可扩展性不足。本研究提出了一种利用深度强化学习(DRL)优化vanet上区块链性能的策略。建议的方法通过选择区块生产者和共识方法,以及修改区块大小和间隔来提高区块链吞吐量,同时在基于vanet的区块链系统中保持去中心化、低延迟和安全性。此外,为了增强网络安全性,采用了异常检测机制,利用机器学习技术识别和减轻针对VANETs的潜在攻击。该系统通过识别网络行为中的异常模式,提高了吞吐量并增强了抵御恶意操作的弹性。该方法使用BDQ框架对动作空间进行精细划分,解决了传统DRL技术在区块链吞吐量优化中出现的动作空间爆炸问题。仿真结果表明,该方案显著提高了基于vanet的区块链系统的吞吐量和安全性。
{"title":"Blockchain-Based Anomaly Detection in Vehicular Ad-Hoc Networks Using Deep Reinforcement Learning","authors":"A. Phani Sheetal,&nbsp;Mohammed I. Khalaf,&nbsp;Abdelhamid Zaidi,&nbsp;Ashit Kumar Dutta,&nbsp;Mohammad Shabbir Alam,&nbsp;Kottala Sri Yogi,&nbsp;Nirupma Pathak,&nbsp;Abror Abdullayev,&nbsp;V. B. Murali Krishna","doi":"10.1002/ett.70282","DOIUrl":"https://doi.org/10.1002/ett.70282","url":null,"abstract":"<div>\u0000 \u0000 <p>Utilizing blockchain in vehicular ad-hoc networks (VANETs) can proficiently resolve concerns pertaining to data security and privacy. The limited throughput of blockchain obstructs its extensive implementation in VANETs. Current studies on enhancing blockchain throughput frequently encounter the issue of action space proliferation, leading to inadequate scalability. This research presents a strategy for optimizing blockchain performance on VANETs using deep reinforcement learning (DRL). The suggested method enhances blockchain throughput by selecting block producers and consensus methods, and by modifying block size and intervals, while maintaining decentralization, low latency, and security in VANET-based blockchain systems. Furthermore, to augment network security, an anomaly detection mechanism is incorporated, utilizing machine learning techniques to identify and mitigate potential attacks aimed at VANETs. The proposed system enhances throughput and fortifies resilience against malicious operations by identifying anomalous patterns in network behavior. The method uses the BDQ framework to meticulously partition the action space, tackling the action space explosion issue that occurs with conventional DRL techniques in blockchain throughput optimization. Simulation results indicate that the suggested solution significantly improves the throughput and security of the VANET-based blockchain system.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145316957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Beetle-Optimized Hybrid Ensemble for Multi-Attack Classification in VANETs 基于甲虫优化的VANETs多攻击分类混合集成
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-10-15 DOI: 10.1002/ett.70281
G. SaravanaKumar, Ponugoti Kalpana, G. Vishnu Murthy, Thippa Reddy Gadekallu, Amina Salhi, Mohammad Tabrez Quasim

Smart connected, and autonomous vehicles represent a revolutionary advancement in transportation by incorporating cutting-edge technologies like Internet of Things (IoT), Artificial Intelligence (AI), and 5G/6G wireless communication. These technologies enhance efficiency, reliability, and sustainability in modern vehicular networks. However, the rapid expansion of intelligent vehicles has also led to rising cyber risks, introducing new forms of attacks that threaten security, privacy, and safety. Even minor anomalies in vehicular units may cause severe consequences, including fatalities. To resolve these issues, this study proposes an effective Intrusion Detection System (IDS) using Siamese Gated Memory Networks. The model learns traffic behaviors and generates proximity scores, which are processed through dense feedforward layers for classifying multiple vehicular threats. To further optimize detection, a Modified Beetle Optimization (MBO) technique is integrated into the feedforward layers. The approach is trained and examined on benchmark datasets, comprising NSL-KDD 2019, UNSW-NB-15, and VeReMi, using key metrics like precision, specificity, accuracy, F1 score, and recall. Recommended experimental analysis demonstrates superior performance examined with conventional techniques, achieving 0.993 accuracy, 0.991 precision, 0.99 recall, and 0.992 F1 score. The findings validate the robustness of hybrid Siamese networks with ensemble meta-heuristic optimization in securing Intelligent Transportation Systems.

智能互联和自动驾驶汽车结合了物联网(IoT)、人工智能(AI)、5G/6G无线通信等尖端技术,代表了交通领域的革命性进步。这些技术提高了现代车辆网络的效率、可靠性和可持续性。然而,智能汽车的快速扩张也导致了网络风险的上升,引入了威胁安全、隐私和安全的新形式的攻击。即使是车辆单元的轻微异常也可能造成严重后果,包括死亡。为了解决这些问题,本研究提出了一种使用连体门控记忆网路的入侵侦测系统(IDS)。该模型学习交通行为并生成接近度评分,通过密集前馈层对接近度评分进行处理,对多个车辆威胁进行分类。为了进一步优化检测,将改进的甲虫优化(MBO)技术集成到前馈层中。该方法在包括NSL-KDD 2019、UNSW-NB-15和VeReMi在内的基准数据集上进行了训练和测试,使用了精度、特异性、准确性、F1分数和召回率等关键指标。推荐的实验分析结果表明,采用常规方法检验,准确率为0.993,精密度为0.991,召回率为0.99,F1得分为0.992。研究结果验证了集成元启发式优化的混合Siamese网络在保护智能交通系统中的鲁棒性。
{"title":"Beetle-Optimized Hybrid Ensemble for Multi-Attack Classification in VANETs","authors":"G. SaravanaKumar,&nbsp;Ponugoti Kalpana,&nbsp;G. Vishnu Murthy,&nbsp;Thippa Reddy Gadekallu,&nbsp;Amina Salhi,&nbsp;Mohammad Tabrez Quasim","doi":"10.1002/ett.70281","DOIUrl":"https://doi.org/10.1002/ett.70281","url":null,"abstract":"<div>\u0000 \u0000 <p>Smart connected, and autonomous vehicles represent a revolutionary advancement in transportation by incorporating cutting-edge technologies like Internet of Things (IoT), Artificial Intelligence (AI), and 5G/6G wireless communication. These technologies enhance efficiency, reliability, and sustainability in modern vehicular networks. However, the rapid expansion of intelligent vehicles has also led to rising cyber risks, introducing new forms of attacks that threaten security, privacy, and safety. Even minor anomalies in vehicular units may cause severe consequences, including fatalities. To resolve these issues, this study proposes an effective Intrusion Detection System (IDS) using Siamese Gated Memory Networks. The model learns traffic behaviors and generates proximity scores, which are processed through dense feedforward layers for classifying multiple vehicular threats. To further optimize detection, a Modified Beetle Optimization (MBO) technique is integrated into the feedforward layers. The approach is trained and examined on benchmark datasets, comprising NSL-KDD 2019, UNSW-NB-15, and VeReMi, using key metrics like precision, specificity, accuracy, F1 score, and recall. Recommended experimental analysis demonstrates superior performance examined with conventional techniques, achieving 0.993 accuracy, 0.991 precision, 0.99 recall, and 0.992 F1 score. The findings validate the robustness of hybrid Siamese networks with ensemble meta-heuristic optimization in securing Intelligent Transportation Systems.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145317093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Explainable Machine Learning Framework for Real-Time Multi-Attack Threat Detection in Edge-Enabled VANET Environments 边缘VANET环境中实时多攻击威胁检测的可解释机器学习框架
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-10-15 DOI: 10.1002/ett.70283
Randa Allafi, Amnah Alshahrani, Munya A. Arasi, Hussain Alshahrani, Mohammed A. AlAqil, Rana Alabdan, Ibrahim Zalah, Rowida Mohammed Alharbi

Due to the shortage of explainable, resource-efficient solutions and the lack of unified multi-attack detection abilities, existing vehicular ad hoc networks (VANET) security frameworks fail to meet the critical requirements of real-time vehicular environments. Most traditional models rely heavily on centralized processing, making them unsuitable for dynamic, latency-sensitive distributed VANET architectures. These limitations create a serious threat to the safety and reliability of vehicular communication systems. To address these challenges, this study proposes an explainable machine learning framework for real-time multi-attack threat detection (EXMAT) in edge-enabled VANET environments. The framework is designed specifically for edge-enabled VANET platforms. EXMAT combines the novel XGBoost classifier with custom-engineered behavioral features and post hoc explainability to provide accurate decisions directly at the vehicular edge. The novelty of the model lies in its combined feature space, which fuses behavioral dynamics, communication patterns, and lightweight Boolean anomaly flags. The simulation of the model is performed under the VeReMi dataset. To strengthen the dataset for precise analysis of the threat, we synthetically extended it with complex attack patterns. Experimental results show that the proposed model achieves an overall classification accuracy of 95.78% with an almost perfect F1-score for standard behavior samples of 99.98% and 94.36% for replay attacks. These results highlight EXMAT's ability to be applied in real-time vehicular networks, enhancing traffic safety and security against unknown cyberattacks.

由于缺乏可解释的、资源高效的解决方案以及缺乏统一的多攻击检测能力,现有的车载自组网(VANET)安全框架无法满足实时车载环境的关键要求。大多数传统模型严重依赖于集中式处理,这使得它们不适合动态的、对延迟敏感的分布式VANET体系结构。这些限制对车载通信系统的安全性和可靠性造成了严重威胁。为了应对这些挑战,本研究提出了一个可解释的机器学习框架,用于边缘VANET环境中的实时多攻击威胁检测(EXMAT)。该框架是专门为启用边缘的VANET平台设计的。EXMAT将新颖的XGBoost分类器与定制设计的行为特征和事后解释性相结合,直接在车辆边缘提供准确的决策。该模型的新颖之处在于它的组合特征空间,它融合了行为动态、通信模式和轻量级布尔异常标志。在VeReMi数据集下对模型进行了仿真。为了加强数据集的准确性,我们对其进行了复杂攻击模式的综合扩展。实验结果表明,该模型的总体分类准确率为95.78%,对标准行为样本的分类准确率为99.98%,对重放攻击的分类准确率为94.36%。这些结果突出了EXMAT在实时车辆网络中的应用能力,增强了交通安全和抵御未知网络攻击的能力。
{"title":"Explainable Machine Learning Framework for Real-Time Multi-Attack Threat Detection in Edge-Enabled VANET Environments","authors":"Randa Allafi,&nbsp;Amnah Alshahrani,&nbsp;Munya A. Arasi,&nbsp;Hussain Alshahrani,&nbsp;Mohammed A. AlAqil,&nbsp;Rana Alabdan,&nbsp;Ibrahim Zalah,&nbsp;Rowida Mohammed Alharbi","doi":"10.1002/ett.70283","DOIUrl":"https://doi.org/10.1002/ett.70283","url":null,"abstract":"<div>\u0000 \u0000 <p>Due to the shortage of explainable, resource-efficient solutions and the lack of unified multi-attack detection abilities, existing vehicular ad hoc networks (VANET) security frameworks fail to meet the critical requirements of real-time vehicular environments. Most traditional models rely heavily on centralized processing, making them unsuitable for dynamic, latency-sensitive distributed VANET architectures. These limitations create a serious threat to the safety and reliability of vehicular communication systems. To address these challenges, this study proposes an explainable machine learning framework for real-time multi-attack threat detection (EXMAT) in edge-enabled VANET environments. The framework is designed specifically for edge-enabled VANET platforms. EXMAT combines the novel XGBoost classifier with custom-engineered behavioral features and post hoc explainability to provide accurate decisions directly at the vehicular edge. The novelty of the model lies in its combined feature space, which fuses behavioral dynamics, communication patterns, and lightweight Boolean anomaly flags. The simulation of the model is performed under the VeReMi dataset. To strengthen the dataset for precise analysis of the threat, we synthetically extended it with complex attack patterns. Experimental results show that the proposed model achieves an overall classification accuracy of 95.78% with an almost perfect F1-score for standard behavior samples of 99.98% and 94.36% for replay attacks. These results highlight EXMAT's ability to be applied in real-time vehicular networks, enhancing traffic safety and security against unknown cyberattacks.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145317094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Fusion Algorithm for Meteorological Equipment Security Based on 5G Base Station Network Security 基于5G基站网络安全的气象设备安全数据融合算法
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-10-15 DOI: 10.1002/ett.70278
Yang Dong, Yingkui Yang, Chao Li, Hongliang Han

Aiming at the problems of low data collection security, poor fusion efficiency, and weak dynamic guarantee capability of meteorological equipment in complex communication environments, this paper proposes a multisource meteorological data fusion algorithm system based on the 5th generation mobile communication technology (5G) base station network security framework. The system combines the security architecture of 5G networks, including SUPI/5G AKA authentication and AES-256 end-to-end encryption mechanism, to ensure secure access to sensor nodes, and achieves differentiated quality of service (QoS) guarantees through network slicing technology to meet the needs of multisource heterogeneity and real-time performance of meteorological data. An improved distributed Kalman filter algorithm is deployed at the edge computing node, and the noise covariance matrix is dynamically adjusted through sliding window historical residual analysis, and a smoothing factor is applied to improve the convergence speed. The Dempster–Shafer (D-S) evidence theory is further integrated to construct a data credibility assessment model, and the system's robustness is enhanced by combining the abnormal data dynamic isolation mechanism. The experiment builds a 5G meteorological sensor network environment based on the NS-3 simulation platform, and uses the GHCN historical climate data set for testing. The original meteorological data, such as temperature, humidity, wind speed, and their corresponding metadata, is input, and high-precision meteorological information is output after secure processing and efficient fusion for monitoring and prediction. The results show that the RMSE of temperature and wind speed of this method is 0.82°C and 0.35 m/s, respectively, at the scale of 100 nodes, which is 48.8% and 28.6% lower than that of the Centralized Kalman Filter, and 36.9% and 14.6% lower than that of the distributed Kalman filter with fixed noise covariance. The QoS hierarchical scheduling strategy based on 5G network slicing effectively ensures the transmission stability of key data, and the high-priority packet loss rate is 0.67%. The AES-256 encryption mechanism significantly enhances the anti-attack capability, albeit with a slight increase in transmission delay, and reduces the success rate of a man-in-the-middle attack from 35% to 2%. The results show that the fusion algorithm system proposed in this paper effectively solves the problems of difficult secure access to meteorological data in an open wireless environment, low fusion efficiency, and poor dynamic response, and provides a practical technical path for building a high-reliability, low-latency intelligent meteorological monitoring system.

针对气象设备在复杂通信环境下数据采集安全性低、融合效率差、动态保障能力弱等问题,提出了一种基于第五代移动通信技术(5G)基站网络安全框架的多源气象数据融合算法体系。系统结合SUPI/5G AKA认证和AES-256端到端加密机制等5G网络安全架构,确保传感器节点安全访问,并通过网络切片技术实现差异化服务质量(QoS)保障,满足气象数据多源异构和实时性的需求。在边缘计算节点部署改进的分布式卡尔曼滤波算法,通过滑动窗口历史残差分析对噪声协方差矩阵进行动态调整,并引入平滑因子提高收敛速度。进一步整合Dempster-Shafer (D-S)证据理论构建数据可信度评估模型,并结合异常数据动态隔离机制增强系统的鲁棒性。实验搭建了基于NS-3仿真平台的5G气象传感器网络环境,并使用GHCN历史气候数据集进行测试。输入温度、湿度、风速等原始气象数据及其元数据,经过安全处理和高效融合,输出高精度气象信息,用于监测和预测。结果表明,该方法在100节点尺度下的温度和风速RMSE分别为0.82°C和0.35 m/s,比集中式卡尔曼滤波降低48.8%和28.6%,比固定噪声协方差的分布式卡尔曼滤波降低36.9%和14.6%。基于5G网络切片的QoS分层调度策略有效保证了关键数据的传输稳定性,高优先级丢包率为0.67%。AES-256加密机制显著增强了抗攻击能力,尽管传输延迟略有增加,并将中间人攻击的成功率从35%降低到2%。结果表明,本文提出的融合算法系统有效解决了开放无线环境下气象数据安全访问困难、融合效率低、动态响应差等问题,为构建高可靠性、低时延的智能气象监测系统提供了一条实用的技术路径。
{"title":"Data Fusion Algorithm for Meteorological Equipment Security Based on 5G Base Station Network Security","authors":"Yang Dong,&nbsp;Yingkui Yang,&nbsp;Chao Li,&nbsp;Hongliang Han","doi":"10.1002/ett.70278","DOIUrl":"https://doi.org/10.1002/ett.70278","url":null,"abstract":"<div>\u0000 \u0000 <p>Aiming at the problems of low data collection security, poor fusion efficiency, and weak dynamic guarantee capability of meteorological equipment in complex communication environments, this paper proposes a multisource meteorological data fusion algorithm system based on the 5th generation mobile communication technology (5G) base station network security framework. The system combines the security architecture of 5G networks, including SUPI/5G AKA authentication and AES-256 end-to-end encryption mechanism, to ensure secure access to sensor nodes, and achieves differentiated quality of service (QoS) guarantees through network slicing technology to meet the needs of multisource heterogeneity and real-time performance of meteorological data. An improved distributed Kalman filter algorithm is deployed at the edge computing node, and the noise covariance matrix is dynamically adjusted through sliding window historical residual analysis, and a smoothing factor is applied to improve the convergence speed. The Dempster–Shafer (D-S) evidence theory is further integrated to construct a data credibility assessment model, and the system's robustness is enhanced by combining the abnormal data dynamic isolation mechanism. The experiment builds a 5G meteorological sensor network environment based on the NS-3 simulation platform, and uses the GHCN historical climate data set for testing. The original meteorological data, such as temperature, humidity, wind speed, and their corresponding metadata, is input, and high-precision meteorological information is output after secure processing and efficient fusion for monitoring and prediction. The results show that the RMSE of temperature and wind speed of this method is 0.82°C and 0.35 m/s, respectively, at the scale of 100 nodes, which is 48.8% and 28.6% lower than that of the Centralized Kalman Filter, and 36.9% and 14.6% lower than that of the distributed Kalman filter with fixed noise covariance. The QoS hierarchical scheduling strategy based on 5G network slicing effectively ensures the transmission stability of key data, and the high-priority packet loss rate is 0.67%. The AES-256 encryption mechanism significantly enhances the anti-attack capability, albeit with a slight increase in transmission delay, and reduces the success rate of a man-in-the-middle attack from 35% to 2%. The results show that the fusion algorithm system proposed in this paper effectively solves the problems of difficult secure access to meteorological data in an open wireless environment, low fusion efficiency, and poor dynamic response, and provides a practical technical path for building a high-reliability, low-latency intelligent meteorological monitoring system.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145317255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Optimization Enabled Ensemble Deep Learning Model for Heart Disease Detection 一种新的优化集成深度学习模型用于心脏病检测
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-10-10 DOI: 10.1002/ett.70273
Vidya C. A., V. Baby Shalini

Background

Cardiovascular diseases continue to represent one of the predominant causes of global mortality. Reducing mortality rates requires prompt detection of these conditions. The development of complex predictive models is required because traditional methods for the detection of heart disease frequently show limitations in accuracy and robustness.

Objective

This study presents an enhanced ensemble method based on deep learning for heart disease detection, which uses a novel training algorithm, Accelerated Sparrow Search Algorithm (ASSA), to increase detection precision.

Methods

Data pre-processing, feature selection, and ensemble-based classification are the three main stages of the suggested framework. To address data inconsistencies, min-max normalization is used as part of the data pre-processing. The feature selection stage uses a hybrid approach that combines information gain and wrapper techniques to extract features as best as possible. Recurrent Neural Network (RNN), Deep Residual Network (DRN), and Deep Belief Network (DBN) are all integrated in the final classification phase. The parameters of the networks are carefully refined using the ASSA optimization technique.

Results

The experimental analysis confirms that the ASSA-refined ensemble approach outperforms conventional methods in terms of precision, sensitivity, and specificity. The model attained an accuracy of 95%, sensitivity of 97%, and specificity of 94%, thereby underscoring its superior efficacy in the detection of heart disease.

Conclusion

Compared to existing methods, the suggested ensemble approach is supported by ASSA optimization, and deep learning shows improved capabilities for heart disease detection.

背景:心血管疾病仍然是全球死亡的主要原因之一。降低死亡率需要及时发现这些疾病。开发复杂的预测模型是必要的,因为传统的心脏病检测方法往往在准确性和鲁棒性方面存在局限性。目的提出一种基于深度学习的增强集成心脏病检测方法,该方法采用一种新的训练算法加速麻雀搜索算法(ASSA)来提高检测精度。方法数据预处理、特征选择和基于集成的分类是该框架的三个主要阶段。为了解决数据不一致的问题,最小-最大归一化被用作数据预处理的一部分。特征选择阶段使用信息增益和包装技术相结合的混合方法来尽可能地提取特征。在最后的分类阶段,循环神经网络(RNN)、深度残差网络(DRN)和深度信念网络(DBN)都被整合在一起。使用ASSA优化技术对网络的参数进行了仔细的细化。结果实验分析证实,assa改进的集合方法在精度、灵敏度和特异性方面优于传统方法。该模型的准确率为95%,灵敏度为97%,特异性为94%,从而强调了其在心脏病检测方面的优越疗效。结论与现有方法相比,建议的集成方法得到ASSA优化的支持,深度学习在心脏病检测方面表现出更高的能力。
{"title":"A Novel Optimization Enabled Ensemble Deep Learning Model for Heart Disease Detection","authors":"Vidya C. A.,&nbsp;V. Baby Shalini","doi":"10.1002/ett.70273","DOIUrl":"https://doi.org/10.1002/ett.70273","url":null,"abstract":"<div>\u0000 \u0000 \u0000 <section>\u0000 \u0000 <h3> Background</h3>\u0000 \u0000 <p>Cardiovascular diseases continue to represent one of the predominant causes of global mortality. Reducing mortality rates requires prompt detection of these conditions. The development of complex predictive models is required because traditional methods for the detection of heart disease frequently show limitations in accuracy and robustness.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Objective</h3>\u0000 \u0000 <p>This study presents an enhanced ensemble method based on deep learning for heart disease detection, which uses a novel training algorithm, Accelerated Sparrow Search Algorithm (ASSA), to increase detection precision.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Methods</h3>\u0000 \u0000 <p>Data pre-processing, feature selection, and ensemble-based classification are the three main stages of the suggested framework. To address data inconsistencies, min-max normalization is used as part of the data pre-processing. The feature selection stage uses a hybrid approach that combines information gain and wrapper techniques to extract features as best as possible. Recurrent Neural Network (RNN), Deep Residual Network (DRN), and Deep Belief Network (DBN) are all integrated in the final classification phase. The parameters of the networks are carefully refined using the ASSA optimization technique.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Results</h3>\u0000 \u0000 <p>The experimental analysis confirms that the ASSA-refined ensemble approach outperforms conventional methods in terms of precision, sensitivity, and specificity. The model attained an accuracy of 95%, sensitivity of 97%, and specificity of 94%, thereby underscoring its superior efficacy in the detection of heart disease.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Conclusion</h3>\u0000 \u0000 <p>Compared to existing methods, the suggested ensemble approach is supported by ASSA optimization, and deep learning shows improved capabilities for heart disease detection.</p>\u0000 </section>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145272288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Threat Detection Framework for IoT Devices Using Adaptive Dilated Conv-Gated Recurrent Units With Spatial and Temporal Attention-Based Residual Autoencoder 基于时空注意力残差自编码器的物联网设备自适应扩展卷积循环单元威胁检测框架
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-10-10 DOI: 10.1002/ett.70274
Ujwal Ramesh Shirode, Kapil Netaji Vhatkar, Prakash V. Sontakke, Aarti S. Pawar, Dipmala Salunke

Purpose

Internet of Things (IoT) network is equipped with sensors, actuators, and act as communication capabilities. It enables device to collect, distribute, and share data using centralized techniques. This system offers real-time monitoring, automation, and data-driven intelligence, which are critical in many industries, such as healthcare, agriculture, smart cities, and manufacturing. A key factor in maximizing the stability of intercommunicated IoT systems and it has the capability to perform threat identification in sensor systems. Since, the proliferation of IoT has been improved in different sectors, their vulnerability also increased by generating various malicious activities and cyber-attacks. Automatic identification of these threats should be performed to avoid the risks in the network and so, a deep learning-aided threat detection model is proposed with neural systems to analyze anomalies in information and complex patterns to recognize potential security risks.

Methods

Here, a deep learning-assisted threat detection approach is designed in the IoT environment for significantly recognizing the threat activities in an efficient manner. At first, the prescribed data are gathered in the benchmark Internet sources such as IoT Intrusion Detection, APA-DDoS Dataset, Kddcup99.csv, RT-IoT2022, and MQTT-IoT-IDS2020 then, the gathered data is given to the feature extraction model, where the deep features within the data are extracted by employing the spatial and temporal attention-based residual autoencoder (ST-ARAe) model. Further, the features extracted from the ST-ARAe are given to the adaptive dilated conv-GRU (ADC-GRU) framework to detect the threat on IoT devices. Furthermore, the threat detection technique's performance is enhanced by tuning the network parameters on the ADC-GRU by utilizing Random Function Enhanced Clouded Leopard Optimization (RFE-CLO). Additionally, a set of tests is executed to reveal the effectiveness of the proposed approach. At last, the entire performance is evaluated and compared with several conventional methods to generate better outcomes in an efficient manner.

Results

Here, the proposed approach has attained 96% accuracy, 97% precision, 98% sensitivity, and 97% specificity in Dataset 3 when the system considers batch size as 48.

Conclusion

Thus, the proposed ADC-GRU threat detection approach significantly proved that the superior detection performance than the conventional methods.

物联网(IoT)网络配备传感器、执行器,并充当通信功能。它使设备能够使用集中技术收集、分发和共享数据。该系统提供实时监控、自动化和数据驱动的智能,这在许多行业(如医疗保健、农业、智能城市和制造业)中至关重要。最大限度地提高互联物联网系统稳定性的关键因素,它具有在传感器系统中执行威胁识别的能力。由于物联网在不同领域的扩散有所改善,因此通过产生各种恶意活动和网络攻击,其脆弱性也增加了。为了避免网络中的风险,需要对这些威胁进行自动识别,因此,提出了一种基于神经系统的深度学习辅助威胁检测模型,通过分析信息中的异常和复杂模式来识别潜在的安全风险。方法在物联网环境下,设计了一种深度学习辅助的威胁检测方法,以有效地识别威胁活动。首先,在物联网入侵检测、APA-DDoS数据集、Kddcup99.csv、RT-IoT2022、MQTT-IoT-IDS2020等互联网基准数据源中收集规定的数据,然后将收集到的数据提供给特征提取模型,利用基于时空注意力的残差自编码器(ST-ARAe)模型提取数据中的深层特征。此外,从ST-ARAe中提取的特征被赋予自适应扩展卷积gru (ADC-GRU)框架,以检测物联网设备上的威胁。此外,利用随机函数增强云豹优化(RFE-CLO)对ADC-GRU上的网络参数进行调优,提高了威胁检测技术的性能。此外,还执行了一组测试来揭示所提出方法的有效性。最后,对整个性能进行了评估,并与几种常规方法进行了比较,以有效地产生更好的结果。在数据集3中,当系统考虑批大小为48时,所提出的方法达到了96%的准确度,97%的精密度,98%的灵敏度和97%的特异性。由此可见,本文提出的ADC-GRU威胁检测方法明显优于传统方法的检测性能。
{"title":"Threat Detection Framework for IoT Devices Using Adaptive Dilated Conv-Gated Recurrent Units With Spatial and Temporal Attention-Based Residual Autoencoder","authors":"Ujwal Ramesh Shirode,&nbsp;Kapil Netaji Vhatkar,&nbsp;Prakash V. Sontakke,&nbsp;Aarti S. Pawar,&nbsp;Dipmala Salunke","doi":"10.1002/ett.70274","DOIUrl":"https://doi.org/10.1002/ett.70274","url":null,"abstract":"<div>\u0000 \u0000 \u0000 <section>\u0000 \u0000 <h3> Purpose</h3>\u0000 \u0000 <p>Internet of Things (IoT) network is equipped with sensors, actuators, and act as communication capabilities. It enables device to collect, distribute, and share data using centralized techniques. This system offers real-time monitoring, automation, and data-driven intelligence, which are critical in many industries, such as healthcare, agriculture, smart cities, and manufacturing. A key factor in maximizing the stability of intercommunicated IoT systems and it has the capability to perform threat identification in sensor systems. Since, the proliferation of IoT has been improved in different sectors, their vulnerability also increased by generating various malicious activities and cyber-attacks. Automatic identification of these threats should be performed to avoid the risks in the network and so, a deep learning-aided threat detection model is proposed with neural systems to analyze anomalies in information and complex patterns to recognize potential security risks.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Methods</h3>\u0000 \u0000 <p>Here, a deep learning-assisted threat detection approach is designed in the IoT environment for significantly recognizing the threat activities in an efficient manner. At first, the prescribed data are gathered in the benchmark Internet sources such as IoT Intrusion Detection, APA-DDoS Dataset, Kddcup99.csv, RT-IoT2022, and MQTT-IoT-IDS2020 then, the gathered data is given to the feature extraction model, where the deep features within the data are extracted by employing the spatial and temporal attention-based residual autoencoder (ST-ARAe) model. Further, the features extracted from the ST-ARAe are given to the adaptive dilated conv-GRU (ADC-GRU) framework to detect the threat on IoT devices. Furthermore, the threat detection technique's performance is enhanced by tuning the network parameters on the ADC-GRU by utilizing Random Function Enhanced Clouded Leopard Optimization (RFE-CLO). Additionally, a set of tests is executed to reveal the effectiveness of the proposed approach. At last, the entire performance is evaluated and compared with several conventional methods to generate better outcomes in an efficient manner.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Results</h3>\u0000 \u0000 <p>Here, the proposed approach has attained 96% accuracy, 97% precision, 98% sensitivity, and 97% specificity in Dataset 3 when the system considers batch size as 48.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Conclusion</h3>\u0000 \u0000 <p>Thus, the proposed ADC-GRU threat detection approach significantly proved that the superior detection performance than the conventional methods.</p>\u0000 </section>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145272287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AI-Driven Traffic Flow Prediction and Anomaly Detection in Smart Cities: A Multi-Agent Approach 智能城市中人工智能驱动的交通流量预测和异常检测:一种多智能体方法
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-10-10 DOI: 10.1002/ett.70279
Mohammad Shabaz, Kola Narasimha Raju

In smart cities, AI-driven traffic flow prediction and anomaly detection play a crucial role in optimizing urban mobility and reducing congestion. Traditional traffic management systems (TMS) often struggle with real-time adaptability, leading to inefficiencies in traffic prediction and failure to detect anomalies accurately. To address these limitations, we propose the Traffic Flow Prediction using Multi-Agent Approach (TFP-MAA) framework, which leverages multiple intelligent agents to analyze real-time traffic data, predict congestion patterns, and detect anomalies with high precision. The framework integrates deep learning models with a decentralized multi-agent system to enhance prediction accuracy and response efficiency. The proposed method enables adaptive decision-making for traffic authorities by providing real-time congestion forecasts and identifying unusual traffic patterns, such as accidents or roadblocks. This enhances proactive traffic management and reduces delays. Experimental results demonstrate that TFP-MAA significantly outperforms existing models in terms of accuracy (94.7%), response time (96.2%), and anomaly detection efficiency (95.9%). The findings suggest that integrating multi-agent AI systems into smart city infrastructure can lead to improved traffic flow (97.5%), reduced congestion (28.6%), and enhanced road safety.

在智慧城市中,人工智能驱动的交通流量预测和异常检测在优化城市交通和减少拥堵方面发挥着至关重要的作用。传统的交通管理系统(TMS)往往缺乏实时适应性,导致交通预测效率低下,无法准确检测异常。为了解决这些限制,我们提出了使用多智能体方法的交通流预测(TFP-MAA)框架,该框架利用多个智能体来分析实时交通数据,预测拥堵模式,并高精度地检测异常。该框架将深度学习模型与分散的多智能体系统相结合,以提高预测精度和响应效率。该方法通过提供实时拥堵预测和识别异常交通模式(如事故或路障),为交通管理部门提供自适应决策。这加强了主动交通管理,减少了延误。实验结果表明,TFP-MAA在准确率(94.7%)、响应时间(96.2%)和异常检测效率(95.9%)方面均显著优于现有模型。研究结果表明,将多智能体人工智能系统集成到智慧城市基础设施中可以改善交通流量(97.5%),减少拥堵(28.6%),并增强道路安全。
{"title":"AI-Driven Traffic Flow Prediction and Anomaly Detection in Smart Cities: A Multi-Agent Approach","authors":"Mohammad Shabaz,&nbsp;Kola Narasimha Raju","doi":"10.1002/ett.70279","DOIUrl":"https://doi.org/10.1002/ett.70279","url":null,"abstract":"<div>\u0000 \u0000 <p>In smart cities, AI-driven traffic flow prediction and anomaly detection play a crucial role in optimizing urban mobility and reducing congestion. Traditional traffic management systems (TMS) often struggle with real-time adaptability, leading to inefficiencies in traffic prediction and failure to detect anomalies accurately. To address these limitations, we propose the Traffic Flow Prediction using Multi-Agent Approach (TFP-MAA) framework, which leverages multiple intelligent agents to analyze real-time traffic data, predict congestion patterns, and detect anomalies with high precision. The framework integrates deep learning models with a decentralized multi-agent system to enhance prediction accuracy and response efficiency. The proposed method enables adaptive decision-making for traffic authorities by providing real-time congestion forecasts and identifying unusual traffic patterns, such as accidents or roadblocks. This enhances proactive traffic management and reduces delays. Experimental results demonstrate that TFP-MAA significantly outperforms existing models in terms of accuracy (94.7%), response time (96.2%), and anomaly detection efficiency (95.9%). The findings suggest that integrating multi-agent AI systems into smart city infrastructure can lead to improved traffic flow (97.5%), reduced congestion (28.6%), and enhanced road safety.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145272289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HFFO-ACRP: Hybrid Fruit Fly Optimization-Ant Colony Routing Protocol HFFO-ACRP:杂交果蝇优化-蚁群路由协议
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-10-08 DOI: 10.1002/ett.70269
Lijun Hao, Chunbo Ma, Jun Ao

As a key technology in ocean exploration, underwater wireless sensor networks (UWSNs) are persistently constrained by challenges stemming from limited node energy, namely short network lifespan and low transmission efficiency. Existing routing protocols often fall into local optima due to their inability to effectively balance global exploration and local exploitation. To address these issues, this study proposes a hybrid optimization routing protocol, HFFO-ACRP (hybrid fruit fly optimization-ant colony routing protocol). Its core innovation lies in a synergistic division of labor: the fruit fly optimization algorithm (FOA) performs a global search to generate initial routes by integrating path length, node density, and residual energy. Subsequently, the ant colony optimization (ACO) algorithm conducts local optimization to refine these paths, considering data priority and node energy efficiency. Finally, a unique bidirectional feedback mechanism enables the two algorithms to mutually enhance their search breadth and precision, collectively improving the accuracy and efficiency of route selection. Experimental results demonstrate that, compared to representative protocols, the proposed protocol extends the network lifespan by 9.69%, 16.21%, and 18.68%, respectively, and significantly increases the residual network energy in the later stages of operation. This hybrid strategy provides an efficient and robust routing solution for resolving the critical energy consumption and longevity bottlenecks in UWSNs.

作为海洋探测的关键技术,水下无线传感器网络一直受到节点能量有限的挑战,即网络寿命短、传输效率低。现有的路由协议由于不能有效地平衡全局探索和局部开发,常常陷入局部最优状态。为了解决这些问题,本研究提出了一种混合优化路由协议HFFO-ACRP (hybrid fruit fly optimization-ant colony routing protocol)。其核心创新点在于协同分工:果蝇优化算法(FOA)通过综合路径长度、节点密度和剩余能量进行全局搜索,生成初始路径。随后,蚁群优化算法(ant colony optimization, ACO)在考虑数据优先级和节点能量效率的情况下,对这些路径进行局部优化。最后,独特的双向反馈机制使两种算法能够相互增强搜索广度和精度,共同提高路径选择的准确性和效率。实验结果表明,与代表性协议相比,所提协议的网络寿命分别延长了9.69%、16.21%和18.68%,并显著提高了网络后期的剩余能量。这种混合策略为解决uwsn的关键能耗和寿命瓶颈提供了一种高效、鲁棒的路由解决方案。
{"title":"HFFO-ACRP: Hybrid Fruit Fly Optimization-Ant Colony Routing Protocol","authors":"Lijun Hao,&nbsp;Chunbo Ma,&nbsp;Jun Ao","doi":"10.1002/ett.70269","DOIUrl":"https://doi.org/10.1002/ett.70269","url":null,"abstract":"<div>\u0000 \u0000 <p>As a key technology in ocean exploration, underwater wireless sensor networks (UWSNs) are persistently constrained by challenges stemming from limited node energy, namely short network lifespan and low transmission efficiency. Existing routing protocols often fall into local optima due to their inability to effectively balance global exploration and local exploitation. To address these issues, this study proposes a hybrid optimization routing protocol, HFFO-ACRP (hybrid fruit fly optimization-ant colony routing protocol). Its core innovation lies in a synergistic division of labor: the fruit fly optimization algorithm (FOA) performs a global search to generate initial routes by integrating path length, node density, and residual energy. Subsequently, the ant colony optimization (ACO) algorithm conducts local optimization to refine these paths, considering data priority and node energy efficiency. Finally, a unique bidirectional feedback mechanism enables the two algorithms to mutually enhance their search breadth and precision, collectively improving the accuracy and efficiency of route selection. Experimental results demonstrate that, compared to representative protocols, the proposed protocol extends the network lifespan by 9.69%, 16.21%, and 18.68%, respectively, and significantly increases the residual network energy in the later stages of operation. This hybrid strategy provides an efficient and robust routing solution for resolving the critical energy consumption and longevity bottlenecks in UWSNs.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145271934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Optimization of a Blockchain-Enabled Decentralized Security Framework for Anomaly Detection in VANETs VANETs中基于区块链的去中心化异常检测安全框架的设计与优化
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-10-07 DOI: 10.1002/ett.70275
Haoyang Tan, Qiang Zhang, Mingxian Li, Xinxing Liu, Lei Hu

Vehicular ad-hoc networks (VANETs) are critical to intelligent transportation systems yet inherently vulnerable to security threats, including data falsification, message tampering, and denial-of-service attacks. Traditional centralized security mechanisms exhibit limitations in scalability, trustworthiness, and resilience against single points of failure. To address these challenges, this study proposes a blockchain-enabled decentralized framework integrating machine learning for anomaly detection in VANETs. The proposed model employs a multi-layer blockchain architecture to establish transparent and immutable trust among participating nodes, with smart contracts automating security policies, intrusion response, and vehicle reputation management. Machine learning algorithms are incorporated to analyze spatiotemporal traffic patterns, detect abnormal behaviors such as malicious message injection and position spoofing, and differentiate legitimate nodes from intruders. Furthermore, simulation results demonstrate that the proposed framework achieves dual optimization objectives: (1) consensus efficiency improvements reducing verification latency by ≥ 40% through Practical Byzantine Fault Tolerance enhancements; and (2) detection accuracy enhancements reaching 94.2% precision in identifying sophisticated attacks—while maintaining efficient scalability for large-scale VANET environments. This research highlights the synergy of blockchain and machine learning in building a secure, decentralized, and intelligent vehicular network infrastructure, contributing to the safe deployment of next-generation intelligent transportation systems.

车载自组织网络(vanet)对智能交通系统至关重要,但它本身就容易受到安全威胁,包括数据伪造、消息篡改和拒绝服务攻击。传统的集中式安全机制在可伸缩性、可信度和针对单点故障的弹性方面存在局限性。为了应对这些挑战,本研究提出了一个支持区块链的去中心化框架,该框架集成了用于VANETs异常检测的机器学习。该模型采用多层区块链架构,在参与节点之间建立透明且不可变的信任,并使用智能合约自动执行安全策略、入侵响应和车辆声誉管理。结合机器学习算法来分析时空流量模式,检测恶意消息注入和位置欺骗等异常行为,并区分合法节点和入侵者。此外,仿真结果表明,所提出的框架实现了双重优化目标:(1)通过增强实际拜占庭容错,共识效率提高,验证延迟降低≥40%;(2)检测精度提高,在识别复杂攻击时达到94.2%的精度,同时保持大规模VANET环境的高效可扩展性。这项研究强调了区块链和机器学习在构建安全、分散和智能的车辆网络基础设施方面的协同作用,有助于下一代智能交通系统的安全部署。
{"title":"Design and Optimization of a Blockchain-Enabled Decentralized Security Framework for Anomaly Detection in VANETs","authors":"Haoyang Tan,&nbsp;Qiang Zhang,&nbsp;Mingxian Li,&nbsp;Xinxing Liu,&nbsp;Lei Hu","doi":"10.1002/ett.70275","DOIUrl":"https://doi.org/10.1002/ett.70275","url":null,"abstract":"<div>\u0000 \u0000 <p>Vehicular ad-hoc networks (VANETs) are critical to intelligent transportation systems yet inherently vulnerable to security threats, including data falsification, message tampering, and denial-of-service attacks. Traditional centralized security mechanisms exhibit limitations in scalability, trustworthiness, and resilience against single points of failure. To address these challenges, this study proposes a blockchain-enabled decentralized framework integrating machine learning for anomaly detection in VANETs. The proposed model employs a multi-layer blockchain architecture to establish transparent and immutable trust among participating nodes, with smart contracts automating security policies, intrusion response, and vehicle reputation management. Machine learning algorithms are incorporated to analyze spatiotemporal traffic patterns, detect abnormal behaviors such as malicious message injection and position spoofing, and differentiate legitimate nodes from intruders. Furthermore, simulation results demonstrate that the proposed framework achieves dual optimization objectives: (1) consensus efficiency improvements reducing verification latency by ≥ 40% through Practical Byzantine Fault Tolerance enhancements; and (2) detection accuracy enhancements reaching 94.2% precision in identifying sophisticated attacks—while maintaining efficient scalability for large-scale VANET environments. This research highlights the synergy of blockchain and machine learning in building a secure, decentralized, and intelligent vehicular network infrastructure, contributing to the safe deployment of next-generation intelligent transportation systems.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145272116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Transactions on Emerging Telecommunications Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1