Pub Date : 2024-04-17DOI: 10.1007/s11276-024-03722-4
Sunanda Bose, Akash Chowdhury, Nandini Mukherjee
In IoT paradigm, Sensor-Cloud Infrastructure provides sensor nodes that sense various environmental parameters, generates the data and sends the same to the desired destination, say a cloud server through a common gateway. Sensor nodes with different data streaming specifications, can generate huge amount of traffic, if streams data simultaneously towards the destination, according to a random schedule. This can lead to higher bandwidth requirements in the wireless medium and increase the amount of data to be received at the gateway in any time slot. This further increases the channel capacity required at the access link to transmit the received data from gateway to the server. An optimal schedule of the sensor nodes will lead to minimization of instantaneous aggregated traffic in both the wireless medium and the access link. Thus leading to minimization of required bandwidth at the wireless medium and channel capacity at the access link. This would further increase the resource utilization of minimize the service provisioning cost of the sensor-cloud infrastructure. A straight forward optimization of the problem of minimizing the instantaneous aggregated traffic load generated from n sensor nodes require an exponential time to find the optimal schedule. Thus, in this paper, an ILP formulation and a polynomial-time heuristic algorithm is presented.
在物联网范例中,传感器-云基础设施提供传感器节点,这些节点可感知各种环境参数,生成数据并通过普通网关将数据发送到所需的目的地,例如云服务器。具有不同数据流规格的传感器节点,如果按照随机时间表同时向目的地发送数据流,就会产生巨大的流量。这可能会导致无线介质的带宽要求更高,并增加网关在任何时隙内接收的数据量。这进一步增加了接入链路将接收到的数据从网关传输到服务器所需的信道容量。传感器节点的最佳调度将导致无线介质和接入链路中的瞬时聚合流量最小化。从而使无线介质所需的带宽和接入链路的信道容量最小化。这将进一步提高资源利用率,最大限度地降低传感器云基础设施的服务供应成本。要直接优化 n 个传感器节点产生的瞬时聚合流量负载最小化问题,需要指数级的时间才能找到最佳时间表。因此,本文提出了一个 ILP 公式和一种多项式时间启发式算法。
{"title":"Scheduling periodic sensors for instantaneous aggregated traffic minimization","authors":"Sunanda Bose, Akash Chowdhury, Nandini Mukherjee","doi":"10.1007/s11276-024-03722-4","DOIUrl":"https://doi.org/10.1007/s11276-024-03722-4","url":null,"abstract":"<p>In IoT paradigm, Sensor-Cloud Infrastructure provides sensor nodes that sense various environmental parameters, generates the data and sends the same to the desired destination, say a cloud server through a common gateway. Sensor nodes with different data streaming specifications, can generate huge amount of traffic, if streams data simultaneously towards the destination, according to a random schedule. This can lead to higher bandwidth requirements in the wireless medium and increase the amount of data to be received at the gateway in any time slot. This further increases the channel capacity required at the access link to transmit the received data from gateway to the server. An optimal schedule of the sensor nodes will lead to minimization of instantaneous aggregated traffic in both the wireless medium and the access link. Thus leading to minimization of required bandwidth at the wireless medium and channel capacity at the access link. This would further increase the resource utilization of minimize the service provisioning cost of the sensor-cloud infrastructure. A straight forward optimization of the problem of minimizing the instantaneous aggregated traffic load generated from n sensor nodes require an exponential time to find the optimal schedule. Thus, in this paper, an ILP formulation and a polynomial-time heuristic algorithm is presented.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"144 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140612752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-13DOI: 10.1007/s11276-024-03730-4
Ting Yang, Jiabao Sun, Amin Mohajer
The Industrial Internet of Things (IIoT) envisions enhanced surveillance and control for industrial applications through diverse IoT devices. However, the increasing heterogeneity of deployed end devices poses challenges to current practices, hampering overall performance as device numbers escalate. To tackle this issue, we introduce an innovative distributed power control algorithm leveraging the wireless channel's nature to approximate the centralized maximum-weight scheduling algorithm. Employing ubiquitous multi-protocol mobile devices as intermediaries, we propose a concurrent dual-hop/multi-hop backhauling strategy, improving interoperability and facilitating data relay, translation, and forwarding from end IoT devices. Our focus is directed towards addressing large-scale network stability and queue management challenges. We formulate a long-term time-averaged optimization problem, incorporating considerations of end-to-end rate control, routing, link scheduling, and resource allocation to guarantee essential network-wide throughput. Furthermore, we present a real-time decomposition-based approximation algorithm that ensures adaptive resource allocation, queue stability, and meeting Quality of Service (QoS) constraints with the highest energy efficiency. Comprehensive numerical results verify significant energy efficiency improvements across diverse traffic models, maintaining throughput requirements for both uniform and hotspot User Equipment (UE) distribution patterns. This work offers a comprehensive solution to enhance IIoT performance and address evolving challenges in industrial applications.
{"title":"Queue stability and dynamic throughput maximization in multi-agent heterogeneous wireless networks","authors":"Ting Yang, Jiabao Sun, Amin Mohajer","doi":"10.1007/s11276-024-03730-4","DOIUrl":"https://doi.org/10.1007/s11276-024-03730-4","url":null,"abstract":"<p>The Industrial Internet of Things (IIoT) envisions enhanced surveillance and control for industrial applications through diverse IoT devices. However, the increasing heterogeneity of deployed end devices poses challenges to current practices, hampering overall performance as device numbers escalate. To tackle this issue, we introduce an innovative distributed power control algorithm leveraging the wireless channel's nature to approximate the centralized maximum-weight scheduling algorithm. Employing ubiquitous multi-protocol mobile devices as intermediaries, we propose a concurrent dual-hop/multi-hop backhauling strategy, improving interoperability and facilitating data relay, translation, and forwarding from end IoT devices. Our focus is directed towards addressing large-scale network stability and queue management challenges. We formulate a long-term time-averaged optimization problem, incorporating considerations of end-to-end rate control, routing, link scheduling, and resource allocation to guarantee essential network-wide throughput. Furthermore, we present a real-time decomposition-based approximation algorithm that ensures adaptive resource allocation, queue stability, and meeting Quality of Service (QoS) constraints with the highest energy efficiency. Comprehensive numerical results verify significant energy efficiency improvements across diverse traffic models, maintaining throughput requirements for both uniform and hotspot User Equipment (UE) distribution patterns. This work offers a comprehensive solution to enhance IIoT performance and address evolving challenges in industrial applications.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"159 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140586812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-13DOI: 10.1007/s11276-024-03728-y
N. R. Rejin Paul, P. Purnendu Shekhar, Charanjeet Singh, P. Rajesh Kumar
Internet of Things (IoT) devices are an essential part of several aspects of daily life for people. They are utilized in a variety of contexts, including industrial monitoring, environmental sensing, and so on. But, secure communication is the major challenge in the IoT environment. Therefore, a decentralized Blockchain-based Key Management protocol using Levy Flight-Equilibrium Optimization and Self-Attention-based Improved Faster Region-based Convolutional Neural Network (BlkKM) method is proposed to determine stable security in tamper-resistant hardware machine that can protect sensitive secret data in the healthcare field i.e., stored cryptographic keys. The keys are categorized as Key Encryption Keys (KEKs) and Data Encryption Keys (DEKs). The number of the keys is decreased by using Levy Flight- Equilibrium Optimization (LF-EO) as organizing nodes with logical sets. Also, Self-Attention-based Improved Faster Region-based Convolutional Neural Network (SA-based IFRCNN) is used for reordering a set of logical nodes to minimize the number of sets after a node exits the network. Additionally, the system makes use of smart contracts for access control as well as proxy encryption to data encryption. The proposed method is compared with existing techniques to validate the security enhancement performance. The evaluation is performed based on throughput, end-to-end delay, storage overheads, and energy consumption. The experimentation results revealed that the proposed method improved the throughput to 220.52bps and diminished the utilization of energy. A greater degree of memory usage is also decreased by using this technique.
物联网(IoT)设备是人们日常生活中不可或缺的一部分。它们被用于各种场合,包括工业监控、环境传感等。但是,安全通信是物联网环境中的主要挑战。因此,本文提出了一种基于区块链的去中心化密钥管理协议,该协议采用列维飞行平衡优化和基于自注意力的改进型快速区域卷积神经网络(BlkKM)方法,以确定防篡改硬件机器的稳定安全性,从而保护医疗保健领域的敏感机密数据,即存储的加密密钥。密钥分为密钥加密密钥(KEK)和数据加密密钥(DEK)。使用 Levy Flight- Equilibrium Optimization(LF-EO)作为逻辑集的组织节点,可以减少密钥的数量。此外,还使用基于自注意的改进型快速区域卷积神经网络(SA-based IFRCNN)对逻辑节点集重新排序,以尽量减少节点退出网络后的节点集数量。此外,该系统还利用智能合约进行访问控制,并使用代理加密技术进行数据加密。我们将所提出的方法与现有技术进行了比较,以验证其安全增强性能。评估基于吞吐量、端到端延迟、存储开销和能耗。实验结果表明,所提出的方法将吞吐量提高到了 220.52bps,并降低了能量消耗。通过使用这种技术,还在更大程度上减少了内存的使用。
{"title":"SAIF-Cnet: self-attention improved faster convolutional neural network for decentralized blockchain-based key management protocol","authors":"N. R. Rejin Paul, P. Purnendu Shekhar, Charanjeet Singh, P. Rajesh Kumar","doi":"10.1007/s11276-024-03728-y","DOIUrl":"https://doi.org/10.1007/s11276-024-03728-y","url":null,"abstract":"<p>Internet of Things (IoT) devices are an essential part of several aspects of daily life for people. They are utilized in a variety of contexts, including industrial monitoring, environmental sensing, and so on. But, secure communication is the major challenge in the IoT environment. Therefore, a decentralized Blockchain-based Key Management protocol using Levy Flight-Equilibrium Optimization and Self-Attention-based Improved Faster Region-based Convolutional Neural Network (BlkKM) method is proposed to determine stable security in tamper-resistant hardware machine that can protect sensitive secret data in the healthcare field i.e., stored cryptographic keys. The keys are categorized as Key Encryption Keys (KEKs) and Data Encryption Keys (DEKs). The number of the keys is decreased by using Levy Flight- Equilibrium Optimization (LF-EO) as organizing nodes with logical sets. Also, Self-Attention-based Improved Faster Region-based Convolutional Neural Network (SA-based IFRCNN) is used for reordering a set of logical nodes to minimize the number of sets after a node exits the network. Additionally, the system makes use of smart contracts for access control as well as proxy encryption to data encryption. The proposed method is compared with existing techniques to validate the security enhancement performance. The evaluation is performed based on throughput, end-to-end delay, storage overheads, and energy consumption. The experimentation results revealed that the proposed method improved the throughput to 220.52bps and diminished the utilization of energy. A greater degree of memory usage is also decreased by using this technique.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"296 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140586818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-12DOI: 10.1007/s11276-024-03731-3
Wenyu Luo, Huajun Cui, Xuefeng Xian, Xiaoming He
The popularity of wireless communication technology and smart devices make emerging tasks tend to be computationally intensive. Unfortunately, mobile devices are often computationally resource-constrained. Mobile edge computing is proposed to offer computing power for these resource-limited devices to solve the computing requirement of their tasks. The unmanned aerial vehicle (UAV) enabled edge networks are flexible and low-cost, so they are considered to provide more flexible computing service for mobile devices. However, UAV-enabled edge networks are limited by the weak wireless propagation environment. To this end, we introduce intelligent reflecting surface (IRS) into the UAV-enabled edge networks in which IRS is used to construct a stronger link between the mobile devices and the UAV for task offloading. We formulate the IRS-aided offloading problem as an optimization problem to optimize the overall delay by jointly optimizing UAV movement, offloading decision, IRS configuration, and UAV’s computation resource. To solve the problem more efficiently, we use the deep reinforcement learning (DRL) model to explore the intelligent action that can minimize the task processing time. Our simulation demonstrates the DRL scheme is more effective compared with the benchmarks.
{"title":"Intelligent reflecting surface-aided computation offloading in UAV-enabled edge networks","authors":"Wenyu Luo, Huajun Cui, Xuefeng Xian, Xiaoming He","doi":"10.1007/s11276-024-03731-3","DOIUrl":"https://doi.org/10.1007/s11276-024-03731-3","url":null,"abstract":"<p>The popularity of wireless communication technology and smart devices make emerging tasks tend to be computationally intensive. Unfortunately, mobile devices are often computationally resource-constrained. Mobile edge computing is proposed to offer computing power for these resource-limited devices to solve the computing requirement of their tasks. The unmanned aerial vehicle (UAV) enabled edge networks are flexible and low-cost, so they are considered to provide more flexible computing service for mobile devices. However, UAV-enabled edge networks are limited by the weak wireless propagation environment. To this end, we introduce intelligent reflecting surface (IRS) into the UAV-enabled edge networks in which IRS is used to construct a stronger link between the mobile devices and the UAV for task offloading. We formulate the IRS-aided offloading problem as an optimization problem to optimize the overall delay by jointly optimizing UAV movement, offloading decision, IRS configuration, and UAV’s computation resource. To solve the problem more efficiently, we use the deep reinforcement learning (DRL) model to explore the intelligent action that can minimize the task processing time. Our simulation demonstrates the DRL scheme is more effective compared with the benchmarks.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"46 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140586734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-10DOI: 10.1007/s11276-024-03729-x
Madhuri Malakar, Judhistir Mahapatro, Timam Ghosh
Software-defined vehicular networks (SDVN) is a promising technology for wireless data transmissions between vehicles. SDVN inherits software-defined networking principles and aims to improve the typical performance of safety and non-safety applications of vehicular adhoc networks. Consequently, enhancing the performance of Intelligent Transportation System (ITS). However, the performance of these ITS applications largely depends on the computational capability of the controller node, which involves creating or destroying a data path from the source vehicle to the destination vehicle and generating flow rules for the requests coming from the data plane elements. As a result, SDVN often suffers from the problems of overburdening the controller node with route requests under heavy traffic generation at vehicles and single-point controller failure. To counter these problems, solutions based on multiple controllers are proposed. In fact, the load-balancing problem remains an important issue. So, routing of data with multiple controllers and load-balancing, both topics in SDVN, go hand in hand. In this paper, we survey this state-of-the-art that discusses the above-mentioned challenges, starting with the SDVN preliminaries. We scrutinize the existing routing methodologies and also discuss load-balancing techniques. Furthermore, we provide real-time applications and services of SDVN, discuss trending research, potential future research directions, and the real-life applicability of SDVN that have not been addressed previously.
{"title":"A survey on routing and load-balancing mechanisms in software-defined vehicular networks","authors":"Madhuri Malakar, Judhistir Mahapatro, Timam Ghosh","doi":"10.1007/s11276-024-03729-x","DOIUrl":"https://doi.org/10.1007/s11276-024-03729-x","url":null,"abstract":"<p>Software-defined vehicular networks (SDVN) is a promising technology for wireless data transmissions between vehicles. SDVN inherits software-defined networking principles and aims to improve the typical performance of safety and non-safety applications of vehicular adhoc networks. Consequently, enhancing the performance of Intelligent Transportation System (ITS). However, the performance of these ITS applications largely depends on the computational capability of the controller node, which involves creating or destroying a data path from the source vehicle to the destination vehicle and generating flow rules for the requests coming from the data plane elements. As a result, SDVN often suffers from the problems of overburdening the controller node with route requests under heavy traffic generation at vehicles and single-point controller failure. To counter these problems, solutions based on multiple controllers are proposed. In fact, the load-balancing problem remains an important issue. So, routing of data with multiple controllers and load-balancing, both topics in SDVN, go hand in hand. In this paper, we survey this state-of-the-art that discusses the above-mentioned challenges, starting with the SDVN preliminaries. We scrutinize the existing routing methodologies and also discuss load-balancing techniques. Furthermore, we provide real-time applications and services of SDVN, discuss trending research, potential future research directions, and the real-life applicability of SDVN that have not been addressed previously.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"45 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140586608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-10DOI: 10.1007/s11276-024-03718-0
Yupeng Wang, Yongli Wang, Can Xu, Xiaoli Wang, Yong Zhang
Forest wildfires often lead to significant casualties and economic losses, making early detection crucial for prevention and control. Internet of Things connected cameras mounted on drone provide wide monitoring coverage and flexibility, while computer vision technology enhances the accuracy and response time of forest wildfire monitoring. However, the small-scale nature of early wildfire targets and the complexity of the forest environment pose significant challenges to accurately and promptly identify fires. To address challenges such as high false-positive rates and inefficiency in existing methods, we propose a Forest Wildfire and Smoke Recognition Network termed FWSRNet. Firstly, we adopt Vision Transformer, which has shown superior performance in recent traditional classification tasks, as the backbone network. Secondly, to enhance the extraction of subtle differential features, we introduce a self-attention mechanism to guide the network in selecting discriminative image patches and calculating their relationships. Next, we employ a contrastive feature learning strategy to eliminate redundant information, making the model more discriminative. Finally, we construct a target loss function for model prediction. Under various proportions of training and testing dataset allocations, the model exhibits recognition accuracies of 94.82, 95.05, 94.90, and 94.80% for forest fires. The average accuracy of 94.89% surpasses five comparative models, demonstrating the potential of this method in IoT-enhanced aerial forest fire recognition.
{"title":"Computer vision-driven forest wildfire and smoke recognition via IoT drone cameras","authors":"Yupeng Wang, Yongli Wang, Can Xu, Xiaoli Wang, Yong Zhang","doi":"10.1007/s11276-024-03718-0","DOIUrl":"https://doi.org/10.1007/s11276-024-03718-0","url":null,"abstract":"<p>Forest wildfires often lead to significant casualties and economic losses, making early detection crucial for prevention and control. Internet of Things connected cameras mounted on drone provide wide monitoring coverage and flexibility, while computer vision technology enhances the accuracy and response time of forest wildfire monitoring. However, the small-scale nature of early wildfire targets and the complexity of the forest environment pose significant challenges to accurately and promptly identify fires. To address challenges such as high false-positive rates and inefficiency in existing methods, we propose a Forest Wildfire and Smoke Recognition Network termed FWSRNet. Firstly, we adopt Vision Transformer, which has shown superior performance in recent traditional classification tasks, as the backbone network. Secondly, to enhance the extraction of subtle differential features, we introduce a self-attention mechanism to guide the network in selecting discriminative image patches and calculating their relationships. Next, we employ a contrastive feature learning strategy to eliminate redundant information, making the model more discriminative. Finally, we construct a target loss function for model prediction. Under various proportions of training and testing dataset allocations, the model exhibits recognition accuracies of 94.82, 95.05, 94.90, and 94.80% for forest fires. The average accuracy of 94.89% surpasses five comparative models, demonstrating the potential of this method in IoT-enhanced aerial forest fire recognition.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"32 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140586607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-09DOI: 10.1007/s11276-024-03727-z
Radwan S. Abujassar
The Internet of Things (IoT) consists of non-standardized computer devices that can create wireless network connections to send data. These devices have limited storage, bandwidth, and computing capacities, which may cause network congestion when nodes move or leave their allotted area. IoT networks need congestion control to enhance the efficiency of data transfer. The study examines IoT congestion and proposes using alternate nodes to maintain dataflow and quality of service (QoS). The study presents RAoNC, a novel algorithm designed to improve routing algorithms in network clusters for the purposes of congestion monitoring, avoidance, and mitigation. Congestion management techniques efficiently process network information update query packets and reduce large-header handshaking packets. Improve network performance by reducing congestion, packet loss, and throughput. The proposed method speeds up packet transfer to reduce network node packet transmission delays. The optimization approach minimizes power usage across all network nodes. We assessed the efficacy of our approach by comparative analysis utilizing NS2 simulations and contrasted the suggested algorithm with prior studies. The simulation shows that RAoNC significantly improves congestion performance. We will assess the novel RAoNC algorithm in relation to DCCC6, LEACH, and QU-RPL. The throughput increased by 28.36%, weighted fairness index by 28.2%, end-to-end delay by 48.7%, energy consumption by 31.97%, and the number of missed packets in the buffer decreased by 90.35%.
{"title":"A highly effective algorithm for mitigating and identifying congestion through continuous monitoring of IoT networks, improving energy consumption","authors":"Radwan S. Abujassar","doi":"10.1007/s11276-024-03727-z","DOIUrl":"https://doi.org/10.1007/s11276-024-03727-z","url":null,"abstract":"<p>The Internet of Things (IoT) consists of non-standardized computer devices that can create wireless network connections to send data. These devices have limited storage, bandwidth, and computing capacities, which may cause network congestion when nodes move or leave their allotted area. IoT networks need congestion control to enhance the efficiency of data transfer. The study examines IoT congestion and proposes using alternate nodes to maintain dataflow and quality of service (QoS). The study presents RAoNC, a novel algorithm designed to improve routing algorithms in network clusters for the purposes of congestion monitoring, avoidance, and mitigation. Congestion management techniques efficiently process network information update query packets and reduce large-header handshaking packets. Improve network performance by reducing congestion, packet loss, and throughput. The proposed method speeds up packet transfer to reduce network node packet transmission delays. The optimization approach minimizes power usage across all network nodes. We assessed the efficacy of our approach by comparative analysis utilizing NS2 simulations and contrasted the suggested algorithm with prior studies. The simulation shows that RAoNC significantly improves congestion performance. We will assess the novel RAoNC algorithm in relation to DCCC6, LEACH, and QU-RPL. The throughput increased by 28.36%, weighted fairness index by 28.2%, end-to-end delay by 48.7%, energy consumption by 31.97%, and the number of missed packets in the buffer decreased by 90.35%.\u0000</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"105 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140602342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-08DOI: 10.1007/s11276-024-03732-2
A. D. C. Navin Dhinnesh, T. Sabapathi
Wireless Sensor Networks are essential for monitoring physical objects in smart systems powered by the Internet of Things. It gathers information by detecting the surroundings and transmits it to a central repository. In this study, an unknown domain was explored using multi-objective optimization. This proposed work employs Multi-objective Grey Wolf Optimization to form effective clustering among nodes and also for choosing the cluster head. Based on the multi-objective fitness function, the cluster heads are selected. For every iteration, the cluster heads are changed thereby saving the consumption of energy and also resulting in an increase in network lifespan. The suggested method divides the network into various optimal-sized clusters and chooses the best cluster heads. The performance of the multi-objective exploration is presented. The proposed method`s key contributions are by utilizing MOGWO for efficient clustering and CH selection, ultimately enhancing network performance. It dynamically adjusts CHs, resulting in energy savings and an extended network lifespan. MOGWO takes into account multiple objectives simultaneously. Through network configuration optimization, MOGWO enhances resource utilization, resulting in lower energy consumption, extended network lifetime, and improved overall efficiency.
{"title":"Multi-objective Grey Wolf Optimization based self configuring wireless sensor network","authors":"A. D. C. Navin Dhinnesh, T. Sabapathi","doi":"10.1007/s11276-024-03732-2","DOIUrl":"https://doi.org/10.1007/s11276-024-03732-2","url":null,"abstract":"<p>Wireless Sensor Networks are essential for monitoring physical objects in smart systems powered by the Internet of Things. It gathers information by detecting the surroundings and transmits it to a central repository. In this study, an unknown domain was explored using multi-objective optimization. This proposed work employs Multi-objective Grey Wolf Optimization to form effective clustering among nodes and also for choosing the cluster head. Based on the multi-objective fitness function, the cluster heads are selected. For every iteration, the cluster heads are changed thereby saving the consumption of energy and also resulting in an increase in network lifespan. The suggested method divides the network into various optimal-sized clusters and chooses the best cluster heads. The performance of the multi-objective exploration is presented. The proposed method`s key contributions are by utilizing MOGWO for efficient clustering and CH selection, ultimately enhancing network performance. It dynamically adjusts CHs, resulting in energy savings and an extended network lifespan. MOGWO takes into account multiple objectives simultaneously. Through network configuration optimization, MOGWO enhances resource utilization, resulting in lower energy consumption, extended network lifetime, and improved overall efficiency.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"159 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140586916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-08DOI: 10.1007/s11276-024-03733-1
Abdullah A. Al-Atawi
The Internet of Vehicles (IoV) is currently experiencing significant development, which has involved the introduction of an efficient Access Control Mechanism (ACM). Reliable access control is evolving into mandatory in order to provide security and efficient transmission within the IoV environment as the volume of vehicles equipped with connectivity continues to expand and they become more incorporated into any number of applications. The primary objective of this research is to develop an ACM for the IoV system based on the use of a Genetically Optimized Twin-Delayed Delayed Deep Deterministic Policy Gradient (TD3) algorithm. The TD3 model modifies access policies to be in line with the current scenario using deep reinforcement learning (Deep RL) techniques. This allows vehicles to make access decisions that are intelligent about the environment in which they are performing. To prevent energy loss while the vehicle is in transit into the client system, the model also emphasizes access based on the vehicle's energy consumption (EC). Finally, with the support of the genetic algorithm (GA), the accuracy of the access control model can be improved by optimizing the high-level parameters in a manner in which they improves efficiency. In order to further enhance the model's environmental sustainability and reliability, the recommended model provides an approach that is both profound and efficient for access control in the constantly changing setting of the IoV.
{"title":"Genetically optimized TD3 algorithm for efficient access control in the internet of vehicles","authors":"Abdullah A. Al-Atawi","doi":"10.1007/s11276-024-03733-1","DOIUrl":"https://doi.org/10.1007/s11276-024-03733-1","url":null,"abstract":"<p>The Internet of Vehicles (IoV) is currently experiencing significant development, which has involved the introduction of an efficient Access Control Mechanism (ACM). Reliable access control is evolving into mandatory in order to provide security and efficient transmission within the IoV environment as the volume of vehicles equipped with connectivity continues to expand and they become more incorporated into any number of applications. The primary objective of this research is to develop an ACM for the IoV system based on the use of a Genetically Optimized Twin-Delayed Delayed Deep Deterministic Policy Gradient (TD3) algorithm. The TD3 model modifies access policies to be in line with the current scenario using deep reinforcement learning (Deep RL) techniques. This allows vehicles to make access decisions that are intelligent about the environment in which they are performing. To prevent energy loss while the vehicle is in transit into the client system, the model also emphasizes access based on the vehicle's energy consumption (EC). Finally, with the support of the genetic algorithm (GA), the accuracy of the access control model can be improved by optimizing the high-level parameters in a manner in which they improves efficiency. In order to further enhance the model's environmental sustainability and reliability, the recommended model provides an approach that is both profound and efficient for access control in the constantly changing setting of the IoV.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"159 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140586602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-05DOI: 10.1007/s11276-024-03724-2
Ruitao Hou, Anli Yan, Hongyang Yan, Teng Huang
Deep learning models are vulnerable to backdoor attacks, where an adversary aims to fool the model via data poisoning, such that the victim models perform well on clean samples but behave wrongly on poisoned samples. While researchers have studied backdoor attacks in depth, they have focused on specific attack and defense methods, neglecting the impacts of basic training tricks on the effect of backdoor attacks. Analyzing these influencing factors helps facilitate secure deep learning systems and explore novel defense perspectives. To this end, we provide comprehensive evaluations using a weak clean-label backdoor attack on CIFAR10, focusing on the impacts of a wide range of neglected training tricks on backdoor attacks. Specifically, we concentrate on ten perspectives, e.g., batch size, data augmentation, warmup, and mixup, etc. The results demonstrate that backdoor attacks are sensitive to some training tricks, and optimizing the basic training tricks can significantly improve the effect of backdoor attacks. For example, appropriate warmup settings can enhance the effect of backdoor attacks by 22% and 6% for the two different trigger patterns, respectively. These facts further reveal the vulnerability of deep learning models to backdoor attacks.
{"title":"Bag of tricks for backdoor learning","authors":"Ruitao Hou, Anli Yan, Hongyang Yan, Teng Huang","doi":"10.1007/s11276-024-03724-2","DOIUrl":"https://doi.org/10.1007/s11276-024-03724-2","url":null,"abstract":"<p>Deep learning models are vulnerable to backdoor attacks, where an adversary aims to fool the model via data poisoning, such that the victim models perform well on clean samples but behave wrongly on poisoned samples. While researchers have studied backdoor attacks in depth, they have focused on specific attack and defense methods, neglecting the impacts of basic training tricks on the effect of backdoor attacks. Analyzing these influencing factors helps facilitate secure deep learning systems and explore novel defense perspectives. To this end, we provide comprehensive evaluations using a weak clean-label backdoor attack on CIFAR10, focusing on the impacts of a wide range of neglected training tricks on backdoor attacks. Specifically, we concentrate on ten perspectives, e.g., batch size, data augmentation, warmup, and mixup, etc. The results demonstrate that backdoor attacks are sensitive to some training tricks, and optimizing the basic training tricks can significantly improve the effect of backdoor attacks. For example, appropriate warmup settings can enhance the effect of backdoor attacks by 22% and 6% for the two different trigger patterns, respectively. These facts further reveal the vulnerability of deep learning models to backdoor attacks.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"32 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140586917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}