首页 > 最新文献

Transactions on Emerging Telecommunications Technologies最新文献

英文 中文
Data Fusion Algorithm for Meteorological Equipment Security Based on 5G Base Station Network Security 基于5G基站网络安全的气象设备安全数据融合算法
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-10-15 DOI: 10.1002/ett.70278
Yang Dong, Yingkui Yang, Chao Li, Hongliang Han

Aiming at the problems of low data collection security, poor fusion efficiency, and weak dynamic guarantee capability of meteorological equipment in complex communication environments, this paper proposes a multisource meteorological data fusion algorithm system based on the 5th generation mobile communication technology (5G) base station network security framework. The system combines the security architecture of 5G networks, including SUPI/5G AKA authentication and AES-256 end-to-end encryption mechanism, to ensure secure access to sensor nodes, and achieves differentiated quality of service (QoS) guarantees through network slicing technology to meet the needs of multisource heterogeneity and real-time performance of meteorological data. An improved distributed Kalman filter algorithm is deployed at the edge computing node, and the noise covariance matrix is dynamically adjusted through sliding window historical residual analysis, and a smoothing factor is applied to improve the convergence speed. The Dempster–Shafer (D-S) evidence theory is further integrated to construct a data credibility assessment model, and the system's robustness is enhanced by combining the abnormal data dynamic isolation mechanism. The experiment builds a 5G meteorological sensor network environment based on the NS-3 simulation platform, and uses the GHCN historical climate data set for testing. The original meteorological data, such as temperature, humidity, wind speed, and their corresponding metadata, is input, and high-precision meteorological information is output after secure processing and efficient fusion for monitoring and prediction. The results show that the RMSE of temperature and wind speed of this method is 0.82°C and 0.35 m/s, respectively, at the scale of 100 nodes, which is 48.8% and 28.6% lower than that of the Centralized Kalman Filter, and 36.9% and 14.6% lower than that of the distributed Kalman filter with fixed noise covariance. The QoS hierarchical scheduling strategy based on 5G network slicing effectively ensures the transmission stability of key data, and the high-priority packet loss rate is 0.67%. The AES-256 encryption mechanism significantly enhances the anti-attack capability, albeit with a slight increase in transmission delay, and reduces the success rate of a man-in-the-middle attack from 35% to 2%. The results show that the fusion algorithm system proposed in this paper effectively solves the problems of difficult secure access to meteorological data in an open wireless environment, low fusion efficiency, and poor dynamic response, and provides a practical technical path for building a high-reliability, low-latency intelligent meteorological monitoring system.

针对气象设备在复杂通信环境下数据采集安全性低、融合效率差、动态保障能力弱等问题,提出了一种基于第五代移动通信技术(5G)基站网络安全框架的多源气象数据融合算法体系。系统结合SUPI/5G AKA认证和AES-256端到端加密机制等5G网络安全架构,确保传感器节点安全访问,并通过网络切片技术实现差异化服务质量(QoS)保障,满足气象数据多源异构和实时性的需求。在边缘计算节点部署改进的分布式卡尔曼滤波算法,通过滑动窗口历史残差分析对噪声协方差矩阵进行动态调整,并引入平滑因子提高收敛速度。进一步整合Dempster-Shafer (D-S)证据理论构建数据可信度评估模型,并结合异常数据动态隔离机制增强系统的鲁棒性。实验搭建了基于NS-3仿真平台的5G气象传感器网络环境,并使用GHCN历史气候数据集进行测试。输入温度、湿度、风速等原始气象数据及其元数据,经过安全处理和高效融合,输出高精度气象信息,用于监测和预测。结果表明,该方法在100节点尺度下的温度和风速RMSE分别为0.82°C和0.35 m/s,比集中式卡尔曼滤波降低48.8%和28.6%,比固定噪声协方差的分布式卡尔曼滤波降低36.9%和14.6%。基于5G网络切片的QoS分层调度策略有效保证了关键数据的传输稳定性,高优先级丢包率为0.67%。AES-256加密机制显著增强了抗攻击能力,尽管传输延迟略有增加,并将中间人攻击的成功率从35%降低到2%。结果表明,本文提出的融合算法系统有效解决了开放无线环境下气象数据安全访问困难、融合效率低、动态响应差等问题,为构建高可靠性、低时延的智能气象监测系统提供了一条实用的技术路径。
{"title":"Data Fusion Algorithm for Meteorological Equipment Security Based on 5G Base Station Network Security","authors":"Yang Dong,&nbsp;Yingkui Yang,&nbsp;Chao Li,&nbsp;Hongliang Han","doi":"10.1002/ett.70278","DOIUrl":"https://doi.org/10.1002/ett.70278","url":null,"abstract":"<div>\u0000 \u0000 <p>Aiming at the problems of low data collection security, poor fusion efficiency, and weak dynamic guarantee capability of meteorological equipment in complex communication environments, this paper proposes a multisource meteorological data fusion algorithm system based on the 5th generation mobile communication technology (5G) base station network security framework. The system combines the security architecture of 5G networks, including SUPI/5G AKA authentication and AES-256 end-to-end encryption mechanism, to ensure secure access to sensor nodes, and achieves differentiated quality of service (QoS) guarantees through network slicing technology to meet the needs of multisource heterogeneity and real-time performance of meteorological data. An improved distributed Kalman filter algorithm is deployed at the edge computing node, and the noise covariance matrix is dynamically adjusted through sliding window historical residual analysis, and a smoothing factor is applied to improve the convergence speed. The Dempster–Shafer (D-S) evidence theory is further integrated to construct a data credibility assessment model, and the system's robustness is enhanced by combining the abnormal data dynamic isolation mechanism. The experiment builds a 5G meteorological sensor network environment based on the NS-3 simulation platform, and uses the GHCN historical climate data set for testing. The original meteorological data, such as temperature, humidity, wind speed, and their corresponding metadata, is input, and high-precision meteorological information is output after secure processing and efficient fusion for monitoring and prediction. The results show that the RMSE of temperature and wind speed of this method is 0.82°C and 0.35 m/s, respectively, at the scale of 100 nodes, which is 48.8% and 28.6% lower than that of the Centralized Kalman Filter, and 36.9% and 14.6% lower than that of the distributed Kalman filter with fixed noise covariance. The QoS hierarchical scheduling strategy based on 5G network slicing effectively ensures the transmission stability of key data, and the high-priority packet loss rate is 0.67%. The AES-256 encryption mechanism significantly enhances the anti-attack capability, albeit with a slight increase in transmission delay, and reduces the success rate of a man-in-the-middle attack from 35% to 2%. The results show that the fusion algorithm system proposed in this paper effectively solves the problems of difficult secure access to meteorological data in an open wireless environment, low fusion efficiency, and poor dynamic response, and provides a practical technical path for building a high-reliability, low-latency intelligent meteorological monitoring system.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145317255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Optimization Enabled Ensemble Deep Learning Model for Heart Disease Detection 一种新的优化集成深度学习模型用于心脏病检测
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-10-10 DOI: 10.1002/ett.70273
Vidya C. A., V. Baby Shalini

Background

Cardiovascular diseases continue to represent one of the predominant causes of global mortality. Reducing mortality rates requires prompt detection of these conditions. The development of complex predictive models is required because traditional methods for the detection of heart disease frequently show limitations in accuracy and robustness.

Objective

This study presents an enhanced ensemble method based on deep learning for heart disease detection, which uses a novel training algorithm, Accelerated Sparrow Search Algorithm (ASSA), to increase detection precision.

Methods

Data pre-processing, feature selection, and ensemble-based classification are the three main stages of the suggested framework. To address data inconsistencies, min-max normalization is used as part of the data pre-processing. The feature selection stage uses a hybrid approach that combines information gain and wrapper techniques to extract features as best as possible. Recurrent Neural Network (RNN), Deep Residual Network (DRN), and Deep Belief Network (DBN) are all integrated in the final classification phase. The parameters of the networks are carefully refined using the ASSA optimization technique.

Results

The experimental analysis confirms that the ASSA-refined ensemble approach outperforms conventional methods in terms of precision, sensitivity, and specificity. The model attained an accuracy of 95%, sensitivity of 97%, and specificity of 94%, thereby underscoring its superior efficacy in the detection of heart disease.

Conclusion

Compared to existing methods, the suggested ensemble approach is supported by ASSA optimization, and deep learning shows improved capabilities for heart disease detection.

背景:心血管疾病仍然是全球死亡的主要原因之一。降低死亡率需要及时发现这些疾病。开发复杂的预测模型是必要的,因为传统的心脏病检测方法往往在准确性和鲁棒性方面存在局限性。目的提出一种基于深度学习的增强集成心脏病检测方法,该方法采用一种新的训练算法加速麻雀搜索算法(ASSA)来提高检测精度。方法数据预处理、特征选择和基于集成的分类是该框架的三个主要阶段。为了解决数据不一致的问题,最小-最大归一化被用作数据预处理的一部分。特征选择阶段使用信息增益和包装技术相结合的混合方法来尽可能地提取特征。在最后的分类阶段,循环神经网络(RNN)、深度残差网络(DRN)和深度信念网络(DBN)都被整合在一起。使用ASSA优化技术对网络的参数进行了仔细的细化。结果实验分析证实,assa改进的集合方法在精度、灵敏度和特异性方面优于传统方法。该模型的准确率为95%,灵敏度为97%,特异性为94%,从而强调了其在心脏病检测方面的优越疗效。结论与现有方法相比,建议的集成方法得到ASSA优化的支持,深度学习在心脏病检测方面表现出更高的能力。
{"title":"A Novel Optimization Enabled Ensemble Deep Learning Model for Heart Disease Detection","authors":"Vidya C. A.,&nbsp;V. Baby Shalini","doi":"10.1002/ett.70273","DOIUrl":"https://doi.org/10.1002/ett.70273","url":null,"abstract":"<div>\u0000 \u0000 \u0000 <section>\u0000 \u0000 <h3> Background</h3>\u0000 \u0000 <p>Cardiovascular diseases continue to represent one of the predominant causes of global mortality. Reducing mortality rates requires prompt detection of these conditions. The development of complex predictive models is required because traditional methods for the detection of heart disease frequently show limitations in accuracy and robustness.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Objective</h3>\u0000 \u0000 <p>This study presents an enhanced ensemble method based on deep learning for heart disease detection, which uses a novel training algorithm, Accelerated Sparrow Search Algorithm (ASSA), to increase detection precision.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Methods</h3>\u0000 \u0000 <p>Data pre-processing, feature selection, and ensemble-based classification are the three main stages of the suggested framework. To address data inconsistencies, min-max normalization is used as part of the data pre-processing. The feature selection stage uses a hybrid approach that combines information gain and wrapper techniques to extract features as best as possible. Recurrent Neural Network (RNN), Deep Residual Network (DRN), and Deep Belief Network (DBN) are all integrated in the final classification phase. The parameters of the networks are carefully refined using the ASSA optimization technique.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Results</h3>\u0000 \u0000 <p>The experimental analysis confirms that the ASSA-refined ensemble approach outperforms conventional methods in terms of precision, sensitivity, and specificity. The model attained an accuracy of 95%, sensitivity of 97%, and specificity of 94%, thereby underscoring its superior efficacy in the detection of heart disease.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Conclusion</h3>\u0000 \u0000 <p>Compared to existing methods, the suggested ensemble approach is supported by ASSA optimization, and deep learning shows improved capabilities for heart disease detection.</p>\u0000 </section>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145272288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Threat Detection Framework for IoT Devices Using Adaptive Dilated Conv-Gated Recurrent Units With Spatial and Temporal Attention-Based Residual Autoencoder 基于时空注意力残差自编码器的物联网设备自适应扩展卷积循环单元威胁检测框架
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-10-10 DOI: 10.1002/ett.70274
Ujwal Ramesh Shirode, Kapil Netaji Vhatkar, Prakash V. Sontakke, Aarti S. Pawar, Dipmala Salunke

Purpose

Internet of Things (IoT) network is equipped with sensors, actuators, and act as communication capabilities. It enables device to collect, distribute, and share data using centralized techniques. This system offers real-time monitoring, automation, and data-driven intelligence, which are critical in many industries, such as healthcare, agriculture, smart cities, and manufacturing. A key factor in maximizing the stability of intercommunicated IoT systems and it has the capability to perform threat identification in sensor systems. Since, the proliferation of IoT has been improved in different sectors, their vulnerability also increased by generating various malicious activities and cyber-attacks. Automatic identification of these threats should be performed to avoid the risks in the network and so, a deep learning-aided threat detection model is proposed with neural systems to analyze anomalies in information and complex patterns to recognize potential security risks.

Methods

Here, a deep learning-assisted threat detection approach is designed in the IoT environment for significantly recognizing the threat activities in an efficient manner. At first, the prescribed data are gathered in the benchmark Internet sources such as IoT Intrusion Detection, APA-DDoS Dataset, Kddcup99.csv, RT-IoT2022, and MQTT-IoT-IDS2020 then, the gathered data is given to the feature extraction model, where the deep features within the data are extracted by employing the spatial and temporal attention-based residual autoencoder (ST-ARAe) model. Further, the features extracted from the ST-ARAe are given to the adaptive dilated conv-GRU (ADC-GRU) framework to detect the threat on IoT devices. Furthermore, the threat detection technique's performance is enhanced by tuning the network parameters on the ADC-GRU by utilizing Random Function Enhanced Clouded Leopard Optimization (RFE-CLO). Additionally, a set of tests is executed to reveal the effectiveness of the proposed approach. At last, the entire performance is evaluated and compared with several conventional methods to generate better outcomes in an efficient manner.

Results

Here, the proposed approach has attained 96% accuracy, 97% precision, 98% sensitivity, and 97% specificity in Dataset 3 when the system considers batch size as 48.

Conclusion

Thus, the proposed ADC-GRU threat detection approach significantly proved that the superior detection performance than the conventional methods.

物联网(IoT)网络配备传感器、执行器,并充当通信功能。它使设备能够使用集中技术收集、分发和共享数据。该系统提供实时监控、自动化和数据驱动的智能,这在许多行业(如医疗保健、农业、智能城市和制造业)中至关重要。最大限度地提高互联物联网系统稳定性的关键因素,它具有在传感器系统中执行威胁识别的能力。由于物联网在不同领域的扩散有所改善,因此通过产生各种恶意活动和网络攻击,其脆弱性也增加了。为了避免网络中的风险,需要对这些威胁进行自动识别,因此,提出了一种基于神经系统的深度学习辅助威胁检测模型,通过分析信息中的异常和复杂模式来识别潜在的安全风险。方法在物联网环境下,设计了一种深度学习辅助的威胁检测方法,以有效地识别威胁活动。首先,在物联网入侵检测、APA-DDoS数据集、Kddcup99.csv、RT-IoT2022、MQTT-IoT-IDS2020等互联网基准数据源中收集规定的数据,然后将收集到的数据提供给特征提取模型,利用基于时空注意力的残差自编码器(ST-ARAe)模型提取数据中的深层特征。此外,从ST-ARAe中提取的特征被赋予自适应扩展卷积gru (ADC-GRU)框架,以检测物联网设备上的威胁。此外,利用随机函数增强云豹优化(RFE-CLO)对ADC-GRU上的网络参数进行调优,提高了威胁检测技术的性能。此外,还执行了一组测试来揭示所提出方法的有效性。最后,对整个性能进行了评估,并与几种常规方法进行了比较,以有效地产生更好的结果。在数据集3中,当系统考虑批大小为48时,所提出的方法达到了96%的准确度,97%的精密度,98%的灵敏度和97%的特异性。由此可见,本文提出的ADC-GRU威胁检测方法明显优于传统方法的检测性能。
{"title":"Threat Detection Framework for IoT Devices Using Adaptive Dilated Conv-Gated Recurrent Units With Spatial and Temporal Attention-Based Residual Autoencoder","authors":"Ujwal Ramesh Shirode,&nbsp;Kapil Netaji Vhatkar,&nbsp;Prakash V. Sontakke,&nbsp;Aarti S. Pawar,&nbsp;Dipmala Salunke","doi":"10.1002/ett.70274","DOIUrl":"https://doi.org/10.1002/ett.70274","url":null,"abstract":"<div>\u0000 \u0000 \u0000 <section>\u0000 \u0000 <h3> Purpose</h3>\u0000 \u0000 <p>Internet of Things (IoT) network is equipped with sensors, actuators, and act as communication capabilities. It enables device to collect, distribute, and share data using centralized techniques. This system offers real-time monitoring, automation, and data-driven intelligence, which are critical in many industries, such as healthcare, agriculture, smart cities, and manufacturing. A key factor in maximizing the stability of intercommunicated IoT systems and it has the capability to perform threat identification in sensor systems. Since, the proliferation of IoT has been improved in different sectors, their vulnerability also increased by generating various malicious activities and cyber-attacks. Automatic identification of these threats should be performed to avoid the risks in the network and so, a deep learning-aided threat detection model is proposed with neural systems to analyze anomalies in information and complex patterns to recognize potential security risks.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Methods</h3>\u0000 \u0000 <p>Here, a deep learning-assisted threat detection approach is designed in the IoT environment for significantly recognizing the threat activities in an efficient manner. At first, the prescribed data are gathered in the benchmark Internet sources such as IoT Intrusion Detection, APA-DDoS Dataset, Kddcup99.csv, RT-IoT2022, and MQTT-IoT-IDS2020 then, the gathered data is given to the feature extraction model, where the deep features within the data are extracted by employing the spatial and temporal attention-based residual autoencoder (ST-ARAe) model. Further, the features extracted from the ST-ARAe are given to the adaptive dilated conv-GRU (ADC-GRU) framework to detect the threat on IoT devices. Furthermore, the threat detection technique's performance is enhanced by tuning the network parameters on the ADC-GRU by utilizing Random Function Enhanced Clouded Leopard Optimization (RFE-CLO). Additionally, a set of tests is executed to reveal the effectiveness of the proposed approach. At last, the entire performance is evaluated and compared with several conventional methods to generate better outcomes in an efficient manner.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Results</h3>\u0000 \u0000 <p>Here, the proposed approach has attained 96% accuracy, 97% precision, 98% sensitivity, and 97% specificity in Dataset 3 when the system considers batch size as 48.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Conclusion</h3>\u0000 \u0000 <p>Thus, the proposed ADC-GRU threat detection approach significantly proved that the superior detection performance than the conventional methods.</p>\u0000 </section>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145272287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AI-Driven Traffic Flow Prediction and Anomaly Detection in Smart Cities: A Multi-Agent Approach 智能城市中人工智能驱动的交通流量预测和异常检测:一种多智能体方法
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-10-10 DOI: 10.1002/ett.70279
Mohammad Shabaz, Kola Narasimha Raju

In smart cities, AI-driven traffic flow prediction and anomaly detection play a crucial role in optimizing urban mobility and reducing congestion. Traditional traffic management systems (TMS) often struggle with real-time adaptability, leading to inefficiencies in traffic prediction and failure to detect anomalies accurately. To address these limitations, we propose the Traffic Flow Prediction using Multi-Agent Approach (TFP-MAA) framework, which leverages multiple intelligent agents to analyze real-time traffic data, predict congestion patterns, and detect anomalies with high precision. The framework integrates deep learning models with a decentralized multi-agent system to enhance prediction accuracy and response efficiency. The proposed method enables adaptive decision-making for traffic authorities by providing real-time congestion forecasts and identifying unusual traffic patterns, such as accidents or roadblocks. This enhances proactive traffic management and reduces delays. Experimental results demonstrate that TFP-MAA significantly outperforms existing models in terms of accuracy (94.7%), response time (96.2%), and anomaly detection efficiency (95.9%). The findings suggest that integrating multi-agent AI systems into smart city infrastructure can lead to improved traffic flow (97.5%), reduced congestion (28.6%), and enhanced road safety.

在智慧城市中,人工智能驱动的交通流量预测和异常检测在优化城市交通和减少拥堵方面发挥着至关重要的作用。传统的交通管理系统(TMS)往往缺乏实时适应性,导致交通预测效率低下,无法准确检测异常。为了解决这些限制,我们提出了使用多智能体方法的交通流预测(TFP-MAA)框架,该框架利用多个智能体来分析实时交通数据,预测拥堵模式,并高精度地检测异常。该框架将深度学习模型与分散的多智能体系统相结合,以提高预测精度和响应效率。该方法通过提供实时拥堵预测和识别异常交通模式(如事故或路障),为交通管理部门提供自适应决策。这加强了主动交通管理,减少了延误。实验结果表明,TFP-MAA在准确率(94.7%)、响应时间(96.2%)和异常检测效率(95.9%)方面均显著优于现有模型。研究结果表明,将多智能体人工智能系统集成到智慧城市基础设施中可以改善交通流量(97.5%),减少拥堵(28.6%),并增强道路安全。
{"title":"AI-Driven Traffic Flow Prediction and Anomaly Detection in Smart Cities: A Multi-Agent Approach","authors":"Mohammad Shabaz,&nbsp;Kola Narasimha Raju","doi":"10.1002/ett.70279","DOIUrl":"https://doi.org/10.1002/ett.70279","url":null,"abstract":"<div>\u0000 \u0000 <p>In smart cities, AI-driven traffic flow prediction and anomaly detection play a crucial role in optimizing urban mobility and reducing congestion. Traditional traffic management systems (TMS) often struggle with real-time adaptability, leading to inefficiencies in traffic prediction and failure to detect anomalies accurately. To address these limitations, we propose the Traffic Flow Prediction using Multi-Agent Approach (TFP-MAA) framework, which leverages multiple intelligent agents to analyze real-time traffic data, predict congestion patterns, and detect anomalies with high precision. The framework integrates deep learning models with a decentralized multi-agent system to enhance prediction accuracy and response efficiency. The proposed method enables adaptive decision-making for traffic authorities by providing real-time congestion forecasts and identifying unusual traffic patterns, such as accidents or roadblocks. This enhances proactive traffic management and reduces delays. Experimental results demonstrate that TFP-MAA significantly outperforms existing models in terms of accuracy (94.7%), response time (96.2%), and anomaly detection efficiency (95.9%). The findings suggest that integrating multi-agent AI systems into smart city infrastructure can lead to improved traffic flow (97.5%), reduced congestion (28.6%), and enhanced road safety.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145272289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HFFO-ACRP: Hybrid Fruit Fly Optimization-Ant Colony Routing Protocol HFFO-ACRP:杂交果蝇优化-蚁群路由协议
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-10-08 DOI: 10.1002/ett.70269
Lijun Hao, Chunbo Ma, Jun Ao

As a key technology in ocean exploration, underwater wireless sensor networks (UWSNs) are persistently constrained by challenges stemming from limited node energy, namely short network lifespan and low transmission efficiency. Existing routing protocols often fall into local optima due to their inability to effectively balance global exploration and local exploitation. To address these issues, this study proposes a hybrid optimization routing protocol, HFFO-ACRP (hybrid fruit fly optimization-ant colony routing protocol). Its core innovation lies in a synergistic division of labor: the fruit fly optimization algorithm (FOA) performs a global search to generate initial routes by integrating path length, node density, and residual energy. Subsequently, the ant colony optimization (ACO) algorithm conducts local optimization to refine these paths, considering data priority and node energy efficiency. Finally, a unique bidirectional feedback mechanism enables the two algorithms to mutually enhance their search breadth and precision, collectively improving the accuracy and efficiency of route selection. Experimental results demonstrate that, compared to representative protocols, the proposed protocol extends the network lifespan by 9.69%, 16.21%, and 18.68%, respectively, and significantly increases the residual network energy in the later stages of operation. This hybrid strategy provides an efficient and robust routing solution for resolving the critical energy consumption and longevity bottlenecks in UWSNs.

作为海洋探测的关键技术,水下无线传感器网络一直受到节点能量有限的挑战,即网络寿命短、传输效率低。现有的路由协议由于不能有效地平衡全局探索和局部开发,常常陷入局部最优状态。为了解决这些问题,本研究提出了一种混合优化路由协议HFFO-ACRP (hybrid fruit fly optimization-ant colony routing protocol)。其核心创新点在于协同分工:果蝇优化算法(FOA)通过综合路径长度、节点密度和剩余能量进行全局搜索,生成初始路径。随后,蚁群优化算法(ant colony optimization, ACO)在考虑数据优先级和节点能量效率的情况下,对这些路径进行局部优化。最后,独特的双向反馈机制使两种算法能够相互增强搜索广度和精度,共同提高路径选择的准确性和效率。实验结果表明,与代表性协议相比,所提协议的网络寿命分别延长了9.69%、16.21%和18.68%,并显著提高了网络后期的剩余能量。这种混合策略为解决uwsn的关键能耗和寿命瓶颈提供了一种高效、鲁棒的路由解决方案。
{"title":"HFFO-ACRP: Hybrid Fruit Fly Optimization-Ant Colony Routing Protocol","authors":"Lijun Hao,&nbsp;Chunbo Ma,&nbsp;Jun Ao","doi":"10.1002/ett.70269","DOIUrl":"https://doi.org/10.1002/ett.70269","url":null,"abstract":"<div>\u0000 \u0000 <p>As a key technology in ocean exploration, underwater wireless sensor networks (UWSNs) are persistently constrained by challenges stemming from limited node energy, namely short network lifespan and low transmission efficiency. Existing routing protocols often fall into local optima due to their inability to effectively balance global exploration and local exploitation. To address these issues, this study proposes a hybrid optimization routing protocol, HFFO-ACRP (hybrid fruit fly optimization-ant colony routing protocol). Its core innovation lies in a synergistic division of labor: the fruit fly optimization algorithm (FOA) performs a global search to generate initial routes by integrating path length, node density, and residual energy. Subsequently, the ant colony optimization (ACO) algorithm conducts local optimization to refine these paths, considering data priority and node energy efficiency. Finally, a unique bidirectional feedback mechanism enables the two algorithms to mutually enhance their search breadth and precision, collectively improving the accuracy and efficiency of route selection. Experimental results demonstrate that, compared to representative protocols, the proposed protocol extends the network lifespan by 9.69%, 16.21%, and 18.68%, respectively, and significantly increases the residual network energy in the later stages of operation. This hybrid strategy provides an efficient and robust routing solution for resolving the critical energy consumption and longevity bottlenecks in UWSNs.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145271934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Optimization of a Blockchain-Enabled Decentralized Security Framework for Anomaly Detection in VANETs VANETs中基于区块链的去中心化异常检测安全框架的设计与优化
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-10-07 DOI: 10.1002/ett.70275
Haoyang Tan, Qiang Zhang, Mingxian Li, Xinxing Liu, Lei Hu

Vehicular ad-hoc networks (VANETs) are critical to intelligent transportation systems yet inherently vulnerable to security threats, including data falsification, message tampering, and denial-of-service attacks. Traditional centralized security mechanisms exhibit limitations in scalability, trustworthiness, and resilience against single points of failure. To address these challenges, this study proposes a blockchain-enabled decentralized framework integrating machine learning for anomaly detection in VANETs. The proposed model employs a multi-layer blockchain architecture to establish transparent and immutable trust among participating nodes, with smart contracts automating security policies, intrusion response, and vehicle reputation management. Machine learning algorithms are incorporated to analyze spatiotemporal traffic patterns, detect abnormal behaviors such as malicious message injection and position spoofing, and differentiate legitimate nodes from intruders. Furthermore, simulation results demonstrate that the proposed framework achieves dual optimization objectives: (1) consensus efficiency improvements reducing verification latency by ≥ 40% through Practical Byzantine Fault Tolerance enhancements; and (2) detection accuracy enhancements reaching 94.2% precision in identifying sophisticated attacks—while maintaining efficient scalability for large-scale VANET environments. This research highlights the synergy of blockchain and machine learning in building a secure, decentralized, and intelligent vehicular network infrastructure, contributing to the safe deployment of next-generation intelligent transportation systems.

车载自组织网络(vanet)对智能交通系统至关重要,但它本身就容易受到安全威胁,包括数据伪造、消息篡改和拒绝服务攻击。传统的集中式安全机制在可伸缩性、可信度和针对单点故障的弹性方面存在局限性。为了应对这些挑战,本研究提出了一个支持区块链的去中心化框架,该框架集成了用于VANETs异常检测的机器学习。该模型采用多层区块链架构,在参与节点之间建立透明且不可变的信任,并使用智能合约自动执行安全策略、入侵响应和车辆声誉管理。结合机器学习算法来分析时空流量模式,检测恶意消息注入和位置欺骗等异常行为,并区分合法节点和入侵者。此外,仿真结果表明,所提出的框架实现了双重优化目标:(1)通过增强实际拜占庭容错,共识效率提高,验证延迟降低≥40%;(2)检测精度提高,在识别复杂攻击时达到94.2%的精度,同时保持大规模VANET环境的高效可扩展性。这项研究强调了区块链和机器学习在构建安全、分散和智能的车辆网络基础设施方面的协同作用,有助于下一代智能交通系统的安全部署。
{"title":"Design and Optimization of a Blockchain-Enabled Decentralized Security Framework for Anomaly Detection in VANETs","authors":"Haoyang Tan,&nbsp;Qiang Zhang,&nbsp;Mingxian Li,&nbsp;Xinxing Liu,&nbsp;Lei Hu","doi":"10.1002/ett.70275","DOIUrl":"https://doi.org/10.1002/ett.70275","url":null,"abstract":"<div>\u0000 \u0000 <p>Vehicular ad-hoc networks (VANETs) are critical to intelligent transportation systems yet inherently vulnerable to security threats, including data falsification, message tampering, and denial-of-service attacks. Traditional centralized security mechanisms exhibit limitations in scalability, trustworthiness, and resilience against single points of failure. To address these challenges, this study proposes a blockchain-enabled decentralized framework integrating machine learning for anomaly detection in VANETs. The proposed model employs a multi-layer blockchain architecture to establish transparent and immutable trust among participating nodes, with smart contracts automating security policies, intrusion response, and vehicle reputation management. Machine learning algorithms are incorporated to analyze spatiotemporal traffic patterns, detect abnormal behaviors such as malicious message injection and position spoofing, and differentiate legitimate nodes from intruders. Furthermore, simulation results demonstrate that the proposed framework achieves dual optimization objectives: (1) consensus efficiency improvements reducing verification latency by ≥ 40% through Practical Byzantine Fault Tolerance enhancements; and (2) detection accuracy enhancements reaching 94.2% precision in identifying sophisticated attacks—while maintaining efficient scalability for large-scale VANET environments. This research highlights the synergy of blockchain and machine learning in building a secure, decentralized, and intelligent vehicular network infrastructure, contributing to the safe deployment of next-generation intelligent transportation systems.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145272116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ResA-D2PySepCo: Cyber-Attack Detection in Fog Based IoT Network Using Pyramidal Dilated Separable Residual Convolutional With Effective Optimization Algorithm ResA-D2PySepCo:基于雾的物联网网络中网络攻击检测的金字塔扩张可分离残差卷积有效优化算法
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-10-06 DOI: 10.1002/ett.70268
Kotari Suresh, M. Humera Khanam

Cyberattack detection systems are critical in protecting the Internet of Things (IoT) network from attacks. Cyber-attack detection is critical in fog-based IoT systems to protect against a wide range of threats, such as illegal access, data breaches, and service disruptions. Present cyber-attack detection models have limitations, such as a high false alarm rate (FAR) and limited detection accuracy. Therefore, it is essential to create reliable cyberattack detection systems that can raise the accuracy of detection and lower the rate of false alarms. This paper presents a deep learning (DL)-based classifier model with an effective feature extraction mechanism for detecting cyber-attacks in a fog-based IoT system. Before initiating the process, data augmentation has been done to balance the dataset. Initially, the input data are collected from the public source dataset; the collected data are passed into the pre-processing stage to rescale the data properly, which is performed by Z-Score normalization. The optimal set of features from the pre-processed data is extracted by a meta-heuristic technique, namely the Hybrid white shark sea lion optimization algorithm (Hy-WS2LO). After selecting optimal features, the data is fed into a classifier model to detect cyber-attacks in a fog-based IoT environment. An effective Residual attention-based dilated pyramidal depth-wise separable convolution (ResA-D2PySepCo) is used for identifying cyber-attacks in fog-based IoT networks. The proposed model can obtain an accuracy of 98.87% and 99.74% for ToN IoT and CICIDS 2018 datasets.

网络攻击检测系统对于保护物联网(IoT)网络免受攻击至关重要。网络攻击检测在基于雾的物联网系统中至关重要,可以防止各种威胁,如非法访问、数据泄露和服务中断。现有的网络攻击检测模型存在虚警率高、检测精度低等缺陷。因此,必须创建可靠的网络攻击检测系统,以提高检测的准确性并降低误报率。本文提出了一种基于深度学习(DL)的分类器模型,该模型具有有效的特征提取机制,用于检测基于雾的物联网系统中的网络攻击。在启动该流程之前,已经完成了数据扩充以平衡数据集。最初,从公共源数据集收集输入数据;将收集到的数据传递到预处理阶段,以适当地重新缩放数据,这是通过Z-Score归一化执行的。通过一种元启发式技术,即混合白鲨海狮优化算法(Hy-WS2LO),从预处理数据中提取最优特征集。在选择最佳特征后,将数据输入分类器模型,以检测基于雾的物联网环境中的网络攻击。一种有效的基于剩余注意力的扩展金字塔深度可分离卷积(ResA-D2PySepCo)用于识别基于雾的物联网网络中的网络攻击。该模型在ToN IoT和CICIDS 2018数据集上的准确率分别为98.87%和99.74%。
{"title":"ResA-D2PySepCo: Cyber-Attack Detection in Fog Based IoT Network Using Pyramidal Dilated Separable Residual Convolutional With Effective Optimization Algorithm","authors":"Kotari Suresh,&nbsp;M. Humera Khanam","doi":"10.1002/ett.70268","DOIUrl":"https://doi.org/10.1002/ett.70268","url":null,"abstract":"<div>\u0000 \u0000 <p>Cyberattack detection systems are critical in protecting the Internet of Things (IoT) network from attacks. Cyber-attack detection is critical in fog-based IoT systems to protect against a wide range of threats, such as illegal access, data breaches, and service disruptions. Present cyber-attack detection models have limitations, such as a high false alarm rate (FAR) and limited detection accuracy. Therefore, it is essential to create reliable cyberattack detection systems that can raise the accuracy of detection and lower the rate of false alarms. This paper presents a deep learning (DL)-based classifier model with an effective feature extraction mechanism for detecting cyber-attacks in a fog-based IoT system. Before initiating the process, data augmentation has been done to balance the dataset. Initially, the input data are collected from the public source dataset; the collected data are passed into the pre-processing stage to rescale the data properly, which is performed by <i>Z</i>-Score normalization. The optimal set of features from the pre-processed data is extracted by a meta-heuristic technique, namely the Hybrid white shark sea lion optimization algorithm (Hy-WS<sup>2</sup>LO). After selecting optimal features, the data is fed into a classifier model to detect cyber-attacks in a fog-based IoT environment. An effective Residual attention-based dilated pyramidal depth-wise separable convolution (ResA-D<sup>2</sup>PySepCo) is used for identifying cyber-attacks in fog-based IoT networks. The proposed model can obtain an accuracy of 98.87% and 99.74% for ToN IoT and CICIDS 2018 datasets.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145271780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of Hybrid Explainable Artificial Intelligence With Swin Vision Transformer Intrusion Detection for Securing VANETs From Attacks 用于保护vanet免受攻击的混合可解释人工智能与Swin视觉变压器入侵检测的发展
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-10-06 DOI: 10.1002/ett.70280
Bharathiraja N, M. S. Minu, Richa Vijay, M. Rajalakshmi, Pellakuri Vidyullatha, K. Balamurugan

Vehicular Ad-hoc Networks (VANETs) are a cornerstone of Intelligent Transportation Systems (ITS), enabling efficient vehicle-to-vehicle and vehicle-to-infrastructure communication. However, their open and dynamic nature makes them highly susceptible to security threats such as Distributed Denial of Service (DDoS) attacks and the injection of false data by malicious nodes. Existing security mechanisms often fall short in addressing these challenges due to the real-time and mobile characteristics of VANETs. This paper proposes a Hybrid Explainable Artificial Intelligence (XAI) framework integrated with a Swin Vision Transformer for robust intrusion detection in VANET environments. The proposed model leverages the Swin Transformer's hierarchical feature extraction capabilities and the interpretability of XAI to accurately classify network nodes based on behavioral and transmission characteristics. Key features such as packet transmission duration, communication regularity, and node status are analyzed to detect anomalies and differentiate between benign and malicious nodes. The inclusion of explainability allows for transparent decision-making, facilitating trust and understanding in critical automotive applications. Simulation results validate the model's effectiveness in detecting a wide range of attack vectors while maintaining high accuracy and low false-positive rates. This study contributes to the development of adaptive, intelligent, and trustworthy security solutions for next-generation vehicular networks operating in complex urban traffic scenarios.

车辆自组织网络(VANETs)是智能交通系统(ITS)的基石,可实现高效的车对车和车对基础设施通信。然而,它们的开放和动态特性使它们极易受到安全威胁的影响,例如分布式拒绝服务(DDoS)攻击和恶意节点注入虚假数据。由于vanet的实时性和移动性,现有的安全机制往往无法应对这些挑战。本文提出了一种混合可解释人工智能(XAI)框架,结合Swin视觉变压器,用于VANET环境下的鲁棒入侵检测。该模型利用Swin Transformer的分层特征提取能力和XAI的可解释性,根据行为和传输特征对网络节点进行准确分类。通过分析报文传输时间、通信规则、节点状态等关键特征,发现异常,区分良性和恶意节点。包含可解释性允许透明的决策,促进关键汽车应用中的信任和理解。仿真结果验证了该模型在检测大范围攻击向量的同时保持较高的准确率和较低的误报率的有效性。本研究有助于开发在复杂城市交通场景下运行的下一代车辆网络的自适应、智能和可信赖的安全解决方案。
{"title":"Development of Hybrid Explainable Artificial Intelligence With Swin Vision Transformer Intrusion Detection for Securing VANETs From Attacks","authors":"Bharathiraja N,&nbsp;M. S. Minu,&nbsp;Richa Vijay,&nbsp;M. Rajalakshmi,&nbsp;Pellakuri Vidyullatha,&nbsp;K. Balamurugan","doi":"10.1002/ett.70280","DOIUrl":"https://doi.org/10.1002/ett.70280","url":null,"abstract":"<div>\u0000 \u0000 <p>Vehicular Ad-hoc Networks (VANETs) are a cornerstone of Intelligent Transportation Systems (ITS), enabling efficient vehicle-to-vehicle and vehicle-to-infrastructure communication. However, their open and dynamic nature makes them highly susceptible to security threats such as Distributed Denial of Service (DDoS) attacks and the injection of false data by malicious nodes. Existing security mechanisms often fall short in addressing these challenges due to the real-time and mobile characteristics of VANETs. This paper proposes a Hybrid Explainable Artificial Intelligence (XAI) framework integrated with a Swin Vision Transformer for robust intrusion detection in VANET environments. The proposed model leverages the Swin Transformer's hierarchical feature extraction capabilities and the interpretability of XAI to accurately classify network nodes based on behavioral and transmission characteristics. Key features such as packet transmission duration, communication regularity, and node status are analyzed to detect anomalies and differentiate between benign and malicious nodes. The inclusion of explainability allows for transparent decision-making, facilitating trust and understanding in critical automotive applications. Simulation results validate the model's effectiveness in detecting a wide range of attack vectors while maintaining high accuracy and low false-positive rates. This study contributes to the development of adaptive, intelligent, and trustworthy security solutions for next-generation vehicular networks operating in complex urban traffic scenarios.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145271779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EKMRS: Elliptic Key Modified Rivest Shamir Adleman Scheme for Secure Data Sharing and Authentication in Smart City Applications EKMRS:椭圆密钥改进的智慧城市应用中安全数据共享和认证的Rivest Shamir Adleman方案
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-10-05 DOI: 10.1002/ett.70265
Sheenam Naaz, Suraiya Parveen, Safdar Tanweer, Ihtiram Raza Khan

In the modern era, blockchain technology integrated with the Internet of Things (IoT) has emerged as a powerful segment for secured and translucent smart city applications. Initially, authentication forms the stepping stone for defense in different types of information systems; earlier approaches used in the context of single-side centralization were found faint and uncertain, with the enlarged single-point failure owing to external vulnerabilities. With the incorporation of an advanced authentication scheme, this research proposes the Elliptic Key-modified Rivest Shamir Adleman (EKMRS) scheme to overcome the tackles in existing techniques, thereby improving the security of applications. Moreover, the risks involved in identity fraud can be effectively minimized by blockchain technology that assures that public keys are verified using a decentralized consensus technique and stored securely. This combination not only secures communication channels but also includes a decentralized ledger for identity verification with tamper-proof evidence. The EKMRS utilizes the Elliptic Curve Digital Signature Algorithm that enhances the scalability enlargement and robust solution for a smart city environment, ensuring strong authentication. The experimental results demonstrate the effectiveness of the EKMRS scheme by offering significant improvements in terms of metrics, achieving 0.029 ms for decryption time, an encryption time of 0.39 ms, and an information loss of 0.13 with the students mark sheet dataset over the other recognized approaches.

在当今时代,区块链技术与物联网(IoT)相结合,已成为安全透明智慧城市应用的强大细分市场。最初,在不同类型的信息系统中,认证是防御的垫脚石;在单面集中化背景下使用的早期方法被发现模糊和不确定,由于外部脆弱性而扩大了单点故障。结合一种先进的认证方案,本文提出了改进椭圆密钥的Rivest Shamir Adleman (EKMRS)方案,克服了现有技术中的漏洞,从而提高了应用程序的安全性。此外,区块链技术可以有效地降低身份欺诈所涉及的风险,该技术确保使用分散的共识技术验证公钥并安全存储。这种组合不仅保护了通信渠道,而且还包括一个分散的分类账,用于身份验证和防篡改证据。EKMRS采用椭圆曲线数字签名算法,增强了智慧城市环境下的可扩展性和鲁棒性,确保了强认证。实验结果证明了EKMRS方案的有效性,在指标方面提供了显着的改进,与其他识别方法相比,解密时间为0.029 ms,加密时间为0.39 ms,学生标记表数据集的信息损失为0.13。
{"title":"EKMRS: Elliptic Key Modified Rivest Shamir Adleman Scheme for Secure Data Sharing and Authentication in Smart City Applications","authors":"Sheenam Naaz,&nbsp;Suraiya Parveen,&nbsp;Safdar Tanweer,&nbsp;Ihtiram Raza Khan","doi":"10.1002/ett.70265","DOIUrl":"https://doi.org/10.1002/ett.70265","url":null,"abstract":"<div>\u0000 \u0000 <p>In the modern era, blockchain technology integrated with the Internet of Things (IoT) has emerged as a powerful segment for secured and translucent smart city applications. Initially, authentication forms the stepping stone for defense in different types of information systems; earlier approaches used in the context of single-side centralization were found faint and uncertain, with the enlarged single-point failure owing to external vulnerabilities. With the incorporation of an advanced authentication scheme, this research proposes the Elliptic Key-modified Rivest Shamir Adleman (EKMRS) scheme to overcome the tackles in existing techniques, thereby improving the security of applications. Moreover, the risks involved in identity fraud can be effectively minimized by blockchain technology that assures that public keys are verified using a decentralized consensus technique and stored securely. This combination not only secures communication channels but also includes a decentralized ledger for identity verification with tamper-proof evidence. The EKMRS utilizes the Elliptic Curve Digital Signature Algorithm that enhances the scalability enlargement and robust solution for a smart city environment, ensuring strong authentication. The experimental results demonstrate the effectiveness of the EKMRS scheme by offering significant improvements in terms of metrics, achieving 0.029 ms for decryption time, an encryption time of 0.39 ms, and an information loss of 0.13 with the students mark sheet dataset over the other recognized approaches.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145271917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Misbehavior Detection With Collective Perception in V2X Networks: A Survey 基于V2X网络集体感知的不当行为检测研究
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-10-05 DOI: 10.1002/ett.70267
Mehmet Fatih Yuce, Mehmet Ali Erturk, Muhammed Ali Aydin

Recent years have seen tremendous progress in Autonomous Vehicle (AV) technology. Today, certain locations provide various levels of autonomy. Constrained environments, such as airports and golf clubs, may allow fully autonomous driving (AD). Meanwhile, many public roads have started providing Vehicle-to-Everything (V2X) capabilities, enabling AVs with driver intervention (DI). Yet, for future scenarios without DI, low-latency technologies, robust protocols, and secure communication mechanisms will be essential. However, dependence on computer algorithms introduces security concerns. A breach in an AV can result in serious injuries or even death. This issue requires next-generation vehicles to implement robust security solutions to prevent malicious attacks. This study discusses state-of-the-art security technologies, protocols, and organizations relevant to autonomous driving (AD) and autonomous vehicles (AVs). First, the paper explores concepts like V2X, Intrusion Detection Systems (IDS), and collaborative security measures. Then, it will discuss the state-of-the-art security studies from the perspective of misbehavior detection and collective perception. This survey fills a void in the literature (at the time of the writing). It is also a comprehensive V2X security guide on misbehavior detection, collective perception, and related technologies.

近年来,自动驾驶汽车(AV)技术取得了巨大进展。如今,某些地方提供了不同程度的自主权。机场和高尔夫俱乐部等受限环境可能允许完全自动驾驶(AD)。与此同时,许多公共道路已经开始提供车联网(V2X)功能,使自动驾驶汽车具备驾驶员干预(DI)功能。然而,对于没有DI的未来场景,低延迟技术、健壮的协议和安全的通信机制将是必不可少的。然而,对计算机算法的依赖会带来安全问题。AV的裂口可能导致严重的伤害甚至死亡。这个问题需要下一代车辆实现强大的安全解决方案来防止恶意攻击。本研究讨论了与自动驾驶(AD)和自动驾驶汽车(AVs)相关的最新安全技术、协议和组织。首先,本文探讨了V2X、入侵检测系统(IDS)和协作安全措施等概念。然后,它将从不当行为检测和集体感知的角度讨论最新的安全研究。这一调查填补了文献(写作时)的空白。它也是关于错误行为检测、集体感知和相关技术的综合V2X安全指南。
{"title":"Misbehavior Detection With Collective Perception in V2X Networks: A Survey","authors":"Mehmet Fatih Yuce,&nbsp;Mehmet Ali Erturk,&nbsp;Muhammed Ali Aydin","doi":"10.1002/ett.70267","DOIUrl":"https://doi.org/10.1002/ett.70267","url":null,"abstract":"<div>\u0000 \u0000 <p>Recent years have seen tremendous progress in Autonomous Vehicle (AV) technology. Today, certain locations provide various levels of autonomy. Constrained environments, such as airports and golf clubs, may allow fully autonomous driving (AD). Meanwhile, many public roads have started providing Vehicle-to-Everything (V2X) capabilities, enabling AVs with driver intervention (DI). Yet, for future scenarios without DI, low-latency technologies, robust protocols, and secure communication mechanisms will be essential. However, dependence on computer algorithms introduces security concerns. A breach in an AV can result in serious injuries or even death. This issue requires next-generation vehicles to implement robust security solutions to prevent malicious attacks. This study discusses state-of-the-art security technologies, protocols, and organizations relevant to autonomous driving (AD) and autonomous vehicles (AVs). First, the paper explores concepts like V2X, Intrusion Detection Systems (IDS), and collaborative security measures. Then, it will discuss the state-of-the-art security studies from the perspective of misbehavior detection and collective perception. This survey fills a void in the literature (at the time of the writing). It is also a comprehensive V2X security guide on misbehavior detection, collective perception, and related technologies.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145271918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Transactions on Emerging Telecommunications Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1