Pub Date : 2024-03-07DOI: 10.1007/s11276-024-03688-3
Abstract
Intelligent reflecting surface (IRS) has emerged as a viable technology to enhance the spectral efficiency of wireless communication systems by intelligently controlling wireless signal propagation. In wireless communication governed by the IRS, the acquisition of channel state information (CSI) is essential for designing the optimal beamforming. However, acquiring the CSI is difficult as the IRS does not have radio frequency chains to transmit/receive signals and the capability to process the signals is also limited. The cascaded channel linking the base station (BS) and a user through the IRS does not necessarily adhere to a specific channel distribution. Conventional and deep learning-based techniques for channel estimation face challenges: the pilot overhead and compromised estimation accuracy due to assumptions of prior channel distribution and noisy signal. To overcome these issues a novel generative cascaded channel estimation (GCCE) model based on a generative adversarial network (GAN) is proposed to estimate the cascaded channel. The GGCE model reduces the reliance on pilot signals, effectively minimizing pilot overhead, by deriving CSI from received signal data. To enhance the estimation accuracy, the channel correlation information is provided as a conditioning factor for the GCCE model. Additionally, a denoising network is integrated into the GCCE framework to effectively remove noise from the received signal. These integrations collectively enhance the estimation accuracy of the GCCE model compared to the initial GAN setup. Experimental results illustrate the superiority of the proposed GCCE model over conventional and deep learning techniques when provided with the same pilot count.
{"title":"Generative channel estimation for intelligent reflecting surface-aided wireless communication","authors":"","doi":"10.1007/s11276-024-03688-3","DOIUrl":"https://doi.org/10.1007/s11276-024-03688-3","url":null,"abstract":"<h3>Abstract</h3> <p>Intelligent reflecting surface (IRS) has emerged as a viable technology to enhance the spectral efficiency of wireless communication systems by intelligently controlling wireless signal propagation. In wireless communication governed by the IRS, the acquisition of channel state information (CSI) is essential for designing the optimal beamforming. However, acquiring the CSI is difficult as the IRS does not have radio frequency chains to transmit/receive signals and the capability to process the signals is also limited. The cascaded channel linking the base station (BS) and a user through the IRS does not necessarily adhere to a specific channel distribution. Conventional and deep learning-based techniques for channel estimation face challenges: the pilot overhead and compromised estimation accuracy due to assumptions of prior channel distribution and noisy signal. To overcome these issues a novel generative cascaded channel estimation (GCCE) model based on a generative adversarial network (GAN) is proposed to estimate the cascaded channel. The GGCE model reduces the reliance on pilot signals, effectively minimizing pilot overhead, by deriving CSI from received signal data. To enhance the estimation accuracy, the channel correlation information is provided as a conditioning factor for the GCCE model. Additionally, a denoising network is integrated into the GCCE framework to effectively remove noise from the received signal. These integrations collectively enhance the estimation accuracy of the GCCE model compared to the initial GAN setup. Experimental results illustrate the superiority of the proposed GCCE model over conventional and deep learning techniques when provided with the same pilot count.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"62 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140057510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wireless medical sensor network (WMSN) is an application of the Internet of Things (IoT) that plays a very important role in today’s era for the healthcare industry, especially after the COVID-19 pandemic. To maintain the security and privacy of the real-time health information of the users or patients, the proper mutual authentication and key agreement (AKA) is the foremost necessity. In this context, Shadi Nashwan proposed an end-to-end authentication scheme for a healthcare IoT system i.e. WMSN, and claimed that their scheme could resist so many existing possible threats and could maintain a low computational cost too. Unfortunately, during this research, it is found that their scheme can be threatened by eavesdropping and jamming/desynchronization attacks and have many computational flaws, as well. Moreover, they also assumed that the gateway node (GWN) is always trustworthy, but in reality, it is not always feasible, as the GWN may act as a local server. Hence, in this article, a new AKA scheme has been proposed using the user’s physiological information like ECG data in order to make the WMSN more secure and reliable. In addition, the proposed scheme can resist many well-known threats like GWN spoofing attack, key escrow problem and can guard against GWN stolen database problem, also. To proof the superiority of the proposed scheme, the informal and formal security analysis have been performed using automated validation of internet security protocols and applications (i.e. AVISPA) and Burrows–Abadi–Needham (BAN) logic, respectively. Based on the comparative study with existing schemes concerning security features, computational and communicational cost, and storage requirement; the proposed scheme can perform better than the existing schemes and well suitable for practical implementations.
{"title":"An anonymous mutual authentication and key agreement scheme in WMSN using physiological data","authors":"Shanvendra Rai, Rituparna Paul, Subhasish Banerjee, Preetisudha Meher","doi":"10.1007/s11276-024-03690-9","DOIUrl":"https://doi.org/10.1007/s11276-024-03690-9","url":null,"abstract":"<p>Wireless medical sensor network (WMSN) is an application of the Internet of Things (IoT) that plays a very important role in today’s era for the healthcare industry, especially after the COVID-19 pandemic. To maintain the security and privacy of the real-time health information of the users or patients, the proper mutual authentication and key agreement (AKA) is the foremost necessity. In this context, Shadi Nashwan proposed an end-to-end authentication scheme for a healthcare IoT system i.e. WMSN, and claimed that their scheme could resist so many existing possible threats and could maintain a low computational cost too. Unfortunately, during this research, it is found that their scheme can be threatened by eavesdropping and jamming/desynchronization attacks and have many computational flaws, as well. Moreover, they also assumed that the gateway node (GWN) is always trustworthy, but in reality, it is not always feasible, as the GWN may act as a local server. Hence, in this article, a new AKA scheme has been proposed using the user’s physiological information like ECG data in order to make the WMSN more secure and reliable. In addition, the proposed scheme can resist many well-known threats like GWN spoofing attack, key escrow problem and can guard against GWN stolen database problem, also. To proof the superiority of the proposed scheme, the informal and formal security analysis have been performed using automated validation of internet security protocols and applications (i.e. AVISPA) and Burrows–Abadi–Needham (BAN) logic, respectively. Based on the comparative study with existing schemes concerning security features, computational and communicational cost, and storage requirement; the proposed scheme can perform better than the existing schemes and well suitable for practical implementations.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"31 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140045386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-06DOI: 10.1007/s11276-024-03700-w
The detection of fraudulent URLs that lead to malicious websites using addresses similar to those of legitimate websites is a key form of defense against phishing attacks. Currently, in the case of Internet of Things devices is especially relevant, because they usually have access to the Internet, although in many cases they are vulnerable to these phishing attacks. This paper offers an overview of the most relevant techniques for the accurate detection of fraudulent URLs, from the most widely used machine learning and deep learning algorithms, to the application, as a proof of concept, of classification models based on quantum machine learning. Starting from an essential data preparation phase, special attention is paid to the initial comparison of several traditional machine learning models, evaluating them with different datasets and obtaining interesting results that achieve true positive rates greater than 90%. After that first approach, the study moves on to the application of quantum machine learning, analysing the specificities of this recent field and assessing the possibilities it offers for the detection of malicious URLs. Given the limited available literature specifically on the detection of malicious URLs and other cybersecurity issues through quantum machine learning, the research presented here represents a relevant novelty on the combination of both concepts in the form of quantum machine learning algorithms for cybersecurity. Indeed, after the analysis of several algorithms, encouraging results have been obtained that open the door to further research on the application of quantum computing in the field of cybersecurity.
{"title":"Detection of malicious URLs using machine learning","authors":"","doi":"10.1007/s11276-024-03700-w","DOIUrl":"https://doi.org/10.1007/s11276-024-03700-w","url":null,"abstract":"<p>The detection of fraudulent URLs that lead to malicious websites using addresses similar to those of legitimate websites is a key form of defense against phishing attacks. Currently, in the case of Internet of Things devices is especially relevant, because they usually have access to the Internet, although in many cases they are vulnerable to these phishing attacks. This paper offers an overview of the most relevant techniques for the accurate detection of fraudulent URLs, from the most widely used machine learning and deep learning algorithms, to the application, as a proof of concept, of classification models based on quantum machine learning. Starting from an essential data preparation phase, special attention is paid to the initial comparison of several traditional machine learning models, evaluating them with different datasets and obtaining interesting results that achieve true positive rates greater than 90%. After that first approach, the study moves on to the application of quantum machine learning, analysing the specificities of this recent field and assessing the possibilities it offers for the detection of malicious URLs. Given the limited available literature specifically on the detection of malicious URLs and other cybersecurity issues through quantum machine learning, the research presented here represents a relevant novelty on the combination of both concepts in the form of quantum machine learning algorithms for cybersecurity. Indeed, after the analysis of several algorithms, encouraging results have been obtained that open the door to further research on the application of quantum computing in the field of cybersecurity.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"27 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140045564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-05DOI: 10.1007/s11276-024-03686-5
Madhav Singh, Laxmi Shrivastava
Multi-path and multi-hop routing are multi-objective optimization problems involving multiple constraints that need to be addressed in the current scenario in wireless sensor networks. The routing process is challenging due to the constrained energy resources and transmission bandwidth. The conventional strategies possess shortcomings, like, as high computing complexity, extensive problem-solving time, complexity in achieving optimal values, and ease of falling into local solutions. Hence, the aim is to propose a hybrid metaheuristic algorithm, known as a multi-objective optimized multi-path and multi-hop routing algorithm (MMMRA). It incorporates the chimp optimization algorithm (COA) for determining the optimal multi-path route based on multi-objective function and ant colony optimization for determining the optimal multi-hop routing. The proposed MMMRA is implemented using NS-2 and to evaluate the performance, nine various scenarios are considered. The MMMRA is validated using different performance measures and compared with other benchmark algorithms. The simulation results indicate that the MMMRA exhibits percentage improvement in terms of residual energy by 1.63%, 4.96%, 6.89%, 7.51%, and 9.67% over IPSMT, BIM2RT, SCP, PSOBS, and RDICMR algorithms respectively. Moreover, the HND and FND of the MMMRA algorithm perform better in all three scenarios (center, corner, and outside positions of sink node), especially when the sink node is placed at the center position, the HND of MMRA shows a percentage improvement by 24% and 12.73% over IPSO–GWO, and COA–HGS algorithms respectively. Similarly, the FND of MMRA shows percentage improvement by 21.05% and 9.5% over IPSO–GWO, and COA–HGS algorithms respectively.
{"title":"Multi-objective optimized multi-path and multi-hop routing based on hybrid optimization algorithm in wireless sensor networks","authors":"Madhav Singh, Laxmi Shrivastava","doi":"10.1007/s11276-024-03686-5","DOIUrl":"https://doi.org/10.1007/s11276-024-03686-5","url":null,"abstract":"<p>Multi-path and multi-hop routing are multi-objective optimization problems involving multiple constraints that need to be addressed in the current scenario in wireless sensor networks. The routing process is challenging due to the constrained energy resources and transmission bandwidth. The conventional strategies possess shortcomings, like, as high computing complexity, extensive problem-solving time, complexity in achieving optimal values, and ease of falling into local solutions. Hence, the aim is to propose a hybrid metaheuristic algorithm, known as a multi-objective optimized multi-path and multi-hop routing algorithm (MMMRA). It incorporates the chimp optimization algorithm (COA) for determining the optimal multi-path route based on multi-objective function and ant colony optimization for determining the optimal multi-hop routing. The proposed MMMRA is implemented using NS-2 and to evaluate the performance, nine various scenarios are considered. The MMMRA is validated using different performance measures and compared with other benchmark algorithms. The simulation results indicate that the MMMRA exhibits percentage improvement in terms of residual energy by 1.63%, 4.96%, 6.89%, 7.51%, and 9.67% over IPSMT, BIM2RT, SCP, PSOBS, and RDICMR algorithms respectively. Moreover, the HND and FND of the MMMRA algorithm perform better in all three scenarios (center, corner, and outside positions of sink node), especially when the sink node is placed at the center position, the HND of MMRA shows a percentage improvement by 24% and 12.73% over IPSO–GWO, and COA–HGS algorithms respectively. Similarly, the FND of MMRA shows percentage improvement by 21.05% and 9.5% over IPSO–GWO, and COA–HGS algorithms respectively.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"30 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140035535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-01DOI: 10.1007/s11276-024-03677-6
Shu-Chuan Chu, Xu Yuan, Jeng-Shyang Pan, Tsu-Yang Wu, Fengting Yan
The meta-heuristic algorithms require a lot of fitness calculations to get good enough solutions, which constitutes an obstacle to solving computationally complex practical problems. Recently, it has been found that surrogate-assisted meta-heuristic algorithms show potential in solving expensive complex optimization problems. This paper proposes an efficient surrogate-assisted Taguchi salp swarm algorithm (SATSSA) to solve expensive complex optimization problems. The SATSSA uses a combination of the local surrogate-assisted model (LSAM), global surrogate-assisted model (GSAM), and k-means clustering surrogate-assisted model (KCSAM) to fit the fitness function. To enhance the prediction ability of the model, an improved salp swarm algorithm with the Taguchi method (TSSA) is proposed to update and predict the model. GSAM is mainly used to capture the entire landscape of the search space. KCSAM is designed to capture part of the search space to improve the exploration capability of the algorithm. LSAM is used to capture the contours around the optimal individual. The proposed SATSSA is compared with other four excellent algorithms on 30D, 50D, and 100D benchmark functions. In addition, SATSSA is also applied to intrusion detection. Simulation results show that SATSSA is effective in improving detection rate and reducing false alarm rate.
{"title":"An efficient surrogate-assisted Taguchi salp swarm algorithm and its application for intrusion detection","authors":"Shu-Chuan Chu, Xu Yuan, Jeng-Shyang Pan, Tsu-Yang Wu, Fengting Yan","doi":"10.1007/s11276-024-03677-6","DOIUrl":"https://doi.org/10.1007/s11276-024-03677-6","url":null,"abstract":"<p>The meta-heuristic algorithms require a lot of fitness calculations to get good enough solutions, which constitutes an obstacle to solving computationally complex practical problems. Recently, it has been found that surrogate-assisted meta-heuristic algorithms show potential in solving expensive complex optimization problems. This paper proposes an efficient surrogate-assisted Taguchi salp swarm algorithm (SATSSA) to solve expensive complex optimization problems. The SATSSA uses a combination of the local surrogate-assisted model (LSAM), global surrogate-assisted model (GSAM), and k-means clustering surrogate-assisted model (KCSAM) to fit the fitness function. To enhance the prediction ability of the model, an improved salp swarm algorithm with the Taguchi method (TSSA) is proposed to update and predict the model. GSAM is mainly used to capture the entire landscape of the search space. KCSAM is designed to capture part of the search space to improve the exploration capability of the algorithm. LSAM is used to capture the contours around the optimal individual. The proposed SATSSA is compared with other four excellent algorithms on 30D, 50D, and 100D benchmark functions. In addition, SATSSA is also applied to intrusion detection. Simulation results show that SATSSA is effective in improving detection rate and reducing false alarm rate.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"33 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140020087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-01DOI: 10.1007/s11276-024-03691-8
Juteng Fu, Xiang Ma, Hang Yu, Keren Dai
The dynamic management of sensor nodes and advanced information fusion are necessary technologies to enhance the comprehensive performance of sensor networks. This paper presents a cascaded sensor dynamic activation and information fusion algorithm to simultaneously optimize the energy and sensing performance of wireless sensing networks. The proposed algorithm dynamically activates nodes that are most suitable for the current sensing task through a joint event-driven and state ranking activation algorithm that achieves a better sensing performance with lower energy costs. In addition, it further utilizes the sensing information of all the activated nodes with maximum efficiency, through an improved distributed Kalman information fusion, which achieves an extra improvement in sensing accuracy as measured by the minimum variance. Finally, the superiority of the proposed cascaded algorithm is verified by a simulation comparison, achieving almost zero dead nodes in terms of energy, and a 62.1% decrease in average error in terms of sensing.
{"title":"Distributed energy-efficient wireless sensing and information fusion via event-driven and state-rank activation","authors":"Juteng Fu, Xiang Ma, Hang Yu, Keren Dai","doi":"10.1007/s11276-024-03691-8","DOIUrl":"https://doi.org/10.1007/s11276-024-03691-8","url":null,"abstract":"<p>The dynamic management of sensor nodes and advanced information fusion are necessary technologies to enhance the comprehensive performance of sensor networks. This paper presents a cascaded sensor dynamic activation and information fusion algorithm to simultaneously optimize the energy and sensing performance of wireless sensing networks. The proposed algorithm dynamically activates nodes that are most suitable for the current sensing task through a joint event-driven and state ranking activation algorithm that achieves a better sensing performance with lower energy costs. In addition, it further utilizes the sensing information of all the activated nodes with maximum efficiency, through an improved distributed Kalman information fusion, which achieves an extra improvement in sensing accuracy as measured by the minimum variance. Finally, the superiority of the proposed cascaded algorithm is verified by a simulation comparison, achieving almost zero dead nodes in terms of energy, and a 62.1% decrease in average error in terms of sensing.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"18 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140007767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-29DOI: 10.1007/s11276-024-03661-0
Abstract
Heterogeneous networks are needed to meet user demands as wireless network demand rises. Network mobility management is crucial. Mobility management challenges are related to handover solutions to decrease call/packet losses in such networks. The handover is one of the most critical parts of mobility management in the Long-Term Evolution of Advanced (LTE-A) system, which relies on handover procedures to improve quality, coverage, and service in the existing network. The LTE-A future wireless communication networks consist of various femtocells, microcells, and macrocells. Therefore, designing the appropriate mechanism to perform handovers among different cells is a challenging research problem. We propose a novel handover mechanism called multi-objective handover using swarm intelligence algorithm (MH-SIA) for the future wireless communication system. MH-SIA is made of two novel features multi-objective handover and SIA for handover process optimization. The multi-objective trust parameters of each User's Equipment are computed to perform the handover decision-making and target cell selection using the SIA. The computed trust parameters are utilized as the modified fitness function in Differential Evolution (DE) optimization technique. Due to the fast convergence of DE, it performs computationally efficient handover operations. The multi-objective trust parameters are utilized in handover decision-making and target cell selection to improve network performances with minimum handover latency. The experimental result of MH-SIA reveals the efficient performance compared to underlying methods.
摘要 随着无线网络需求的增加,需要异构网络来满足用户需求。网络移动性管理至关重要。移动性管理面临的挑战与减少此类网络中呼叫/数据包丢失的切换解决方案有关。在高级长期演进(LTE-A)系统中,切换是移动性管理中最关键的部分之一,它依赖于切换程序来提高现有网络的质量、覆盖范围和服务。LTE-A 未来的无线通信网络由各种毫微微蜂窝、微微蜂窝和宏蜂窝组成。因此,设计适当的机制来执行不同小区之间的切换是一个具有挑战性的研究问题。我们为未来的无线通信系统提出了一种名为 "多目标切换群智能算法(MH-SIA)"的新型切换机制。MH-SIA 由多目标切换和用于切换过程优化的 SIA 两项新功能组成。通过计算每个用户设备的多目标信任参数,利用 SIA 进行切换决策和目标小区选择。计算出的信任参数被用作差分进化(DE)优化技术中的修正适应度函数。由于差分进化的快速收敛性,它能执行计算效率高的切换操作。多目标信任参数被用于切换决策和目标小区选择,从而以最小的切换延迟提高网络性能。MH-SIA 的实验结果表明,与基础方法相比,它具有高效的性能。
{"title":"MH-SIA: multi-objective handover using swarm intelligence algorithm for future wireless communication system","authors":"","doi":"10.1007/s11276-024-03661-0","DOIUrl":"https://doi.org/10.1007/s11276-024-03661-0","url":null,"abstract":"<h3>Abstract</h3> <p>Heterogeneous networks are needed to meet user demands as wireless network demand rises. Network mobility management is crucial. Mobility management challenges are related to handover solutions to decrease call/packet losses in such networks. The handover is one of the most critical parts of mobility management in the Long-Term Evolution of Advanced (LTE-A) system, which relies on handover procedures to improve quality, coverage, and service in the existing network. The LTE-A future wireless communication networks consist of various femtocells, microcells, and macrocells. Therefore, designing the appropriate mechanism to perform handovers among different cells is a challenging research problem. We propose a novel handover mechanism called multi-objective handover using swarm intelligence algorithm (MH-SIA) for the future wireless communication system. MH-SIA is made of two novel features multi-objective handover and SIA for handover process optimization. The multi-objective trust parameters of each User's Equipment are computed to perform the handover decision-making and target cell selection using the SIA. The computed trust parameters are utilized as the modified fitness function in Differential Evolution (DE) optimization technique. Due to the fast convergence of DE, it performs computationally efficient handover operations. The multi-objective trust parameters are utilized in handover decision-making and target cell selection to improve network performances with minimum handover latency. The experimental result of MH-SIA reveals the efficient performance compared to underlying methods.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"25 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140007769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-29DOI: 10.1007/s11276-024-03692-7
Abstract
Graph databases have received increased interests as many applications are handled as graph problems. Shortest distance queries are one of the fundamental operations and have been studied for recent years. To ensure the data and query privacy, researchers have introduced some secure graph encryption schemes which support the shortest distance queries on a large-scale graph database. Unfortunately, most of them only provide an approximate result by pre-computing and storing a distance oracle. To provide the exact shortest path, our solution employs a distributed two-trapdoor public-key crypto-system to perform addition and comparison operations over ciphertexts. The detailed security analysis indicates that our scheme achieves semantically secure under DDH assumption and the experiments are performed on various real-world database and random database. The experimental result shows the feasibility of our scheme.
{"title":"Secure shortest distance queries over encrypted graph in cloud computing","authors":"","doi":"10.1007/s11276-024-03692-7","DOIUrl":"https://doi.org/10.1007/s11276-024-03692-7","url":null,"abstract":"<h3>Abstract</h3> <p>Graph databases have received increased interests as many applications are handled as graph problems. Shortest distance queries are one of the fundamental operations and have been studied for recent years. To ensure the data and query privacy, researchers have introduced some secure graph encryption schemes which support the shortest distance queries on a large-scale graph database. Unfortunately, most of them only provide an approximate result by pre-computing and storing a distance oracle. To provide the exact shortest path, our solution employs a distributed two-trapdoor public-key crypto-system to perform addition and comparison operations over ciphertexts. The detailed security analysis indicates that our scheme achieves semantically secure under DDH assumption and the experiments are performed on various real-world database and random database. The experimental result shows the feasibility of our scheme.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"18 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140007717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-29DOI: 10.1007/s11276-024-03697-2
Abstract
An industry-wide paradigm change has been sparked by the growth of Internet of Things (IoT)-based Wireless Sensor Networks (WSNs), which has made reliable and effective routing methods necessary. This thorough analysis looks at how Machine Learning (ML) techniques may be used to solve the problems that come with WSN routing. A summary of standard routing algorithms and an examination of their shortcomings comprise the first portion of the paper. The integration of ML approaches, such as reinforcement learning and supervised and unsupervised learning, is then explored in order to improve WSN routing efficiency. The article examines the difficulties and factors related to ML-based routing, including data quality, energy efficiency, scalability, and security. Applications and case studies show how ML is really used in WSN routing, offering insights into effective tactics and lessons discovered. Evaluation metrics and performance assessments are included in a separate section that uses simulation and experimental data to compare ML-based and conventional techniques. Looking forward, the study describes new breakthroughs in ML for WSNs and points out unresolved issues, providing a guide for future research paths. The important results and their consequences are outlined in the conclusion, which also highlights how ML has the potential to revolutionize WSN routing in the future.
摘要 基于物联网(IoT)的无线传感器网络(WSN)的发展引发了整个行业的范式变革,这使得可靠而有效的路由选择方法变得十分必要。本文将深入分析如何利用机器学习(ML)技术解决 WSN 路由问题。本文的第一部分总结了标准路由算法并分析了其缺点。然后探讨了如何整合强化学习、监督和非监督学习等 ML 方法,以提高 WSN 路由效率。文章探讨了与基于 ML 的路由相关的困难和因素,包括数据质量、能效、可扩展性和安全性。应用和案例研究展示了如何在 WSN 路由中真正使用 ML,深入探讨了有效的策略和发现的经验教训。评估指标和性能评估包含在一个单独的章节中,该章节使用模拟和实验数据来比较基于 ML 的技术和传统技术。展望未来,本研究描述了 WSN 在 ML 方面的新突破,并指出了尚未解决的问题,为未来的研究路径提供了指导。结论部分概述了重要成果及其后果,还强调了 ML 有可能在未来彻底改变 WSN 路由。
{"title":"Exploring machine learning solutions for overcoming challenges in IoT-based wireless sensor network routing: a comprehensive review","authors":"","doi":"10.1007/s11276-024-03697-2","DOIUrl":"https://doi.org/10.1007/s11276-024-03697-2","url":null,"abstract":"<h3>Abstract</h3> <p>An industry-wide paradigm change has been sparked by the growth of Internet of Things (IoT)-based Wireless Sensor Networks (WSNs), which has made reliable and effective routing methods necessary. This thorough analysis looks at how Machine Learning (ML) techniques may be used to solve the problems that come with WSN routing. A summary of standard routing algorithms and an examination of their shortcomings comprise the first portion of the paper. The integration of ML approaches, such as reinforcement learning and supervised and unsupervised learning, is then explored in order to improve WSN routing efficiency. The article examines the difficulties and factors related to ML-based routing, including data quality, energy efficiency, scalability, and security. Applications and case studies show how ML is really used in WSN routing, offering insights into effective tactics and lessons discovered. Evaluation metrics and performance assessments are included in a separate section that uses simulation and experimental data to compare ML-based and conventional techniques. Looking forward, the study describes new breakthroughs in ML for WSNs and points out unresolved issues, providing a guide for future research paths. The important results and their consequences are outlined in the conclusion, which also highlights how ML has the potential to revolutionize WSN routing in the future.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"232 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140007718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-28DOI: 10.1007/s11276-024-03687-4
Abstract
Trust management has been shown to be an effective technique for protecting networks from malicious nodes and ensuring wireless sensor network (WSN) security. A number of trust systems have been proposed, but most of them are not adaptative to the current state of network security and the intensity of the attacks to which they are subjected, especially in the case of collaborative attacks. They employ fixed trust metrics derived from expert opinion rather than the objective method based on the network’s current security level. Furthermore, they are complex trust systems designed for a specific application with a high attack probability. Thus, even with a low attack rate, they consume a lot of energy. This paper proposes an adaptive trust system that considers both the network’s risk level and the trust values of sensor nodes at the same time. To match the situation in the network, the proposed system employs various trust policies. In risky situations where the WSN environment remains untrustworthy, the proposed system adjusts its trust metrics based on the network attack intensity. When the attacks are eliminated and the misbehavior rate is low, the system switches to an energy efficient policy and adjusts its trust metrics to conserve sensor node energy. Simulation results show that a zero-tolerance policy achieves 95% of the detection rate and conserves 50% of nodes’ energy under the presence of 35% of malicious nodes in the network. Energy efficient policy achieves 90% of detection rate and conserves 95% of nodes’ energy under the existence of 10% of malicious nodes in the network. Normal policy achieves up to 90% of detection rate between 15 and 25% of malicious nodes while conserving 70% and 80% of energy under these percentages.
{"title":"An adaptive trust system for misbehavior detection in wireless sensor networks","authors":"","doi":"10.1007/s11276-024-03687-4","DOIUrl":"https://doi.org/10.1007/s11276-024-03687-4","url":null,"abstract":"<h3>Abstract</h3> <p>Trust management has been shown to be an effective technique for protecting networks from malicious nodes and ensuring wireless sensor network (WSN) security. A number of trust systems have been proposed, but most of them are not adaptative to the current state of network security and the intensity of the attacks to which they are subjected, especially in the case of collaborative attacks. They employ fixed trust metrics derived from expert opinion rather than the objective method based on the network’s current security level. Furthermore, they are complex trust systems designed for a specific application with a high attack probability. Thus, even with a low attack rate, they consume a lot of energy. This paper proposes an adaptive trust system that considers both the network’s risk level and the trust values of sensor nodes at the same time. To match the situation in the network, the proposed system employs various trust policies. In risky situations where the WSN environment remains untrustworthy, the proposed system adjusts its trust metrics based on the network attack intensity. When the attacks are eliminated and the misbehavior rate is low, the system switches to an energy efficient policy and adjusts its trust metrics to conserve sensor node energy. Simulation results show that a zero-tolerance policy achieves 95% of the detection rate and conserves 50% of nodes’ energy under the presence of 35% of malicious nodes in the network. Energy efficient policy achieves 90% of detection rate and conserves 95% of nodes’ energy under the existence of 10% of malicious nodes in the network. Normal policy achieves up to 90% of detection rate between 15 and 25% of malicious nodes while conserving 70% and 80% of energy under these percentages.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"8 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140007716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}