首页 > 最新文献

International Journal of Pervasive Computing and Communications最新文献

英文 中文
Big data challenges and opportunities in Internet of Vehicles: a systematic review 车联网中的大数据挑战与机遇:系统性综述
IF 2.6 Q1 Computer Science Pub Date : 2024-02-29 DOI: 10.1108/ijpcc-09-2023-0250
Atefeh Hemmati, Mani Zarei, A. Rahmani
PurposeBig data challenges and opportunities on the Internet of Vehicles (IoV) have emerged as a transformative paradigm to change intelligent transportation systems. With the growth of data-driven applications and the advances in data analysis techniques, the potential for data-adaptive innovation in IoV applications becomes an outstanding development in future IoV. Therefore, this paper aims to focus on big data in IoV and to provide an analysis of the current state of research.Design/methodology/approachThis review paper uses a systematic literature review methodology. It conducts a thorough search of academic databases to identify relevant scientific articles. By reviewing and analyzing the primary articles found in the big data in the IoV domain, 45 research articles from 2019 to 2023 were selected for detailed analysis.FindingsThis paper discovers the main applications, use cases and primary contexts considered for big data in IoV. Next, it documents challenges, opportunities, future research directions and open issues.Research limitations/implicationsThis paper is based on academic articles published from 2019 to 2023. Therefore, scientific outputs published before 2019 are omitted.Originality/valueThis paper provides a thorough analysis of big data in IoV and considers distinct research questions corresponding to big data challenges and opportunities in IoV. It also provides valuable insights for researchers and practitioners in evolving this field by examining the existing fields and future directions for big data in the IoV ecosystem.
目的 大数据在车联网(IoV)中带来的挑战和机遇已成为改变智能交通系统的转型范式。随着数据驱动型应用的发展和数据分析技术的进步,车联网应用中的数据适应性创新潜力成为未来车联网的一个突出发展方向。因此,本文旨在关注物联网中的大数据,并对研究现状进行分析。它对学术数据库进行了全面搜索,以确定相关的科学文章。通过审查和分析在物联网大数据领域发现的主要文章,选取了2019年至2023年的45篇研究文章进行详细分析。接下来,它记录了挑战、机遇、未来研究方向和开放性问题。研究限制/影响本文基于 2019 年至 2023 年发表的学术文章。原创性/价值本文对物联网中的大数据进行了深入分析,并考虑了与物联网中的大数据挑战和机遇相对应的独特研究问题。它还通过研究物联网生态系统中大数据的现有领域和未来方向,为该领域的研究人员和从业人员提供了有价值的见解。
{"title":"Big data challenges and opportunities in Internet of Vehicles: a systematic review","authors":"Atefeh Hemmati, Mani Zarei, A. Rahmani","doi":"10.1108/ijpcc-09-2023-0250","DOIUrl":"https://doi.org/10.1108/ijpcc-09-2023-0250","url":null,"abstract":"\u0000Purpose\u0000Big data challenges and opportunities on the Internet of Vehicles (IoV) have emerged as a transformative paradigm to change intelligent transportation systems. With the growth of data-driven applications and the advances in data analysis techniques, the potential for data-adaptive innovation in IoV applications becomes an outstanding development in future IoV. Therefore, this paper aims to focus on big data in IoV and to provide an analysis of the current state of research.\u0000\u0000\u0000Design/methodology/approach\u0000This review paper uses a systematic literature review methodology. It conducts a thorough search of academic databases to identify relevant scientific articles. By reviewing and analyzing the primary articles found in the big data in the IoV domain, 45 research articles from 2019 to 2023 were selected for detailed analysis.\u0000\u0000\u0000Findings\u0000This paper discovers the main applications, use cases and primary contexts considered for big data in IoV. Next, it documents challenges, opportunities, future research directions and open issues.\u0000\u0000\u0000Research limitations/implications\u0000This paper is based on academic articles published from 2019 to 2023. Therefore, scientific outputs published before 2019 are omitted.\u0000\u0000\u0000Originality/value\u0000This paper provides a thorough analysis of big data in IoV and considers distinct research questions corresponding to big data challenges and opportunities in IoV. It also provides valuable insights for researchers and practitioners in evolving this field by examining the existing fields and future directions for big data in the IoV ecosystem.\u0000","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140410351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cooperative optimization techniques in distributed MAC protocols – a survey 分布式MAC协议中的协同优化技术综述
Q1 Computer Science Pub Date : 2023-10-11 DOI: 10.1108/ijpcc-07-2022-0256
Radha Subramanyam, Y. Adline Jancy, P. Nagabushanam
Purpose Cross-layer approach in media access control (MAC) layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data transmissions in wireless sensor network (WSN) and Internet of Things (IoT) applications. Choosing the correct objective function in Nash equilibrium for game theory will address fairness index and resource allocation to the nodes. Game theory optimization for distributed may increase the network performance. The purpose of this study is to survey the various operations that can be carried out using distributive and adaptive MAC protocol. Hill climbing distributed MAC does not need a central coordination system and location-based transmission with neighbor awareness reduces transmission power. Design/methodology/approach Distributed MAC in wireless networks is used to address the challenges like network lifetime, reduced energy consumption and for improving delay performance. In this paper, a survey is made on various cooperative communications in MAC protocols, optimization techniques used to improve MAC performance in various applications and mathematical approaches involved in game theory optimization for MAC protocol. Findings Spatial reuse of channel improved by 3%–29%, and multichannel improves throughput by 8% using distributed MAC protocol. Nash equilibrium is found to perform well, which focuses on energy utility in the network by individual players. Fuzzy logic improves channel selection by 17% and secondary users’ involvement by 8%. Cross-layer approach in MAC layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data transmissions in WSN and IoT applications. Cross-layer and cooperative communication give energy savings of 27% and reduces hop distance by 4.7%. Choosing the correct objective function in Nash equilibrium for game theory will address fairness index and resource allocation to the nodes. Research limitations/implications Other optimization techniques can be applied for WSN to analyze the performance. Practical implications Game theory optimization for distributed may increase the network performance. Optimal cuckoo search improves throughput by 90% and reduces delay by 91%. Stochastic approaches detect 80% attacks even in 90% malicious nodes. Social implications Channel allocations in centralized or static manner must be based on traffic demands whether dynamic traffic or fluctuated traffic. Usage of multimedia devices also increased which in turn increased the demand for high throughput. Cochannel interference keep on changing or mitigations occur which can be handled by proper resource allocations. Network survival is by efficient usage of valid patis in the network by avoiding transmission failures and time slots’ effective usage. Originality/value Literature survey is carried out to find the methods which give better performance.
目的在介质访问控制(MAC)层中采用跨层方法解决干扰和干扰问题。混合分布式MAC可用于无线传感器网络(WSN)和物联网(IoT)应用中的同步语音、数据传输。选择正确的博弈论纳什均衡目标函数将解决节点的公平指数和资源分配问题。分布式的博弈论优化可以提高网络性能。本研究的目的是调查使用分布式和自适应MAC协议可以执行的各种操作。爬山式分布式MAC不需要中央协调系统,具有邻居感知的基于位置的传输降低了传输功率。无线网络中的分布式MAC用于解决网络寿命、降低能耗和提高延迟性能等挑战。本文综述了MAC协议中的各种协作通信、各种应用中用于提高MAC性能的优化技术以及MAC协议博弈论优化所涉及的数学方法。使用分布式MAC协议时,信道空间复用提高了3% ~ 29%,多信道吞吐量提高了8%。纳什均衡关注的是个体参与者在网络中的能量效用。模糊逻辑提高了17%的频道选择和8%的二次用户参与。MAC层的跨层方法将解决干扰和干扰问题。混合分布式MAC可用于WSN和物联网应用中的同步语音、数据传输。跨层协作通信节能27%,跳距减少4.7%。选择正确的博弈论纳什均衡目标函数将解决节点的公平指数和资源分配问题。研究局限/启示其他优化技术可以应用于WSN的性能分析。实际意义分布式的博弈论优化可以提高网络性能。最优布谷鸟搜索提高吞吐量90%,减少延迟91%。随机方法在90%的恶意节点中检测到80%的攻击。社会影响以集中或静态方式分配通道必须以流量需求为基础,无论是动态流量还是波动流量。多媒体设备的使用也增加了,这反过来又增加了对高吞吐量的需求。共信道干扰不断变化或发生缓解,这可以通过适当的资源分配来处理。网络生存是通过有效利用网络中的有效资源,避免传输失败和有效利用时隙来实现的。通过对文献的调查,找到更好的方法。
{"title":"Cooperative optimization techniques in distributed MAC protocols – a survey","authors":"Radha Subramanyam, Y. Adline Jancy, P. Nagabushanam","doi":"10.1108/ijpcc-07-2022-0256","DOIUrl":"https://doi.org/10.1108/ijpcc-07-2022-0256","url":null,"abstract":"Purpose Cross-layer approach in media access control (MAC) layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data transmissions in wireless sensor network (WSN) and Internet of Things (IoT) applications. Choosing the correct objective function in Nash equilibrium for game theory will address fairness index and resource allocation to the nodes. Game theory optimization for distributed may increase the network performance. The purpose of this study is to survey the various operations that can be carried out using distributive and adaptive MAC protocol. Hill climbing distributed MAC does not need a central coordination system and location-based transmission with neighbor awareness reduces transmission power. Design/methodology/approach Distributed MAC in wireless networks is used to address the challenges like network lifetime, reduced energy consumption and for improving delay performance. In this paper, a survey is made on various cooperative communications in MAC protocols, optimization techniques used to improve MAC performance in various applications and mathematical approaches involved in game theory optimization for MAC protocol. Findings Spatial reuse of channel improved by 3%–29%, and multichannel improves throughput by 8% using distributed MAC protocol. Nash equilibrium is found to perform well, which focuses on energy utility in the network by individual players. Fuzzy logic improves channel selection by 17% and secondary users’ involvement by 8%. Cross-layer approach in MAC layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data transmissions in WSN and IoT applications. Cross-layer and cooperative communication give energy savings of 27% and reduces hop distance by 4.7%. Choosing the correct objective function in Nash equilibrium for game theory will address fairness index and resource allocation to the nodes. Research limitations/implications Other optimization techniques can be applied for WSN to analyze the performance. Practical implications Game theory optimization for distributed may increase the network performance. Optimal cuckoo search improves throughput by 90% and reduces delay by 91%. Stochastic approaches detect 80% attacks even in 90% malicious nodes. Social implications Channel allocations in centralized or static manner must be based on traffic demands whether dynamic traffic or fluctuated traffic. Usage of multimedia devices also increased which in turn increased the demand for high throughput. Cochannel interference keep on changing or mitigations occur which can be handled by proper resource allocations. Network survival is by efficient usage of valid patis in the network by avoiding transmission failures and time slots’ effective usage. Originality/value Literature survey is carried out to find the methods which give better performance.","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136059078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Novel communication system for buried water pipe monitoring using acoustic signal propagation along the pipe 基于声信号沿管道传播的新型地埋水管监测通信系统
Q1 Computer Science Pub Date : 2023-10-06 DOI: 10.1108/ijpcc-05-2022-0179
Omotayo Farai, Nicole Metje, Carl Anthony, Ali Sadeghioon, David Chapman
Purpose Wireless sensor networks (WSN), as a solution for buried water pipe monitoring, face a new set of challenges compared to traditional application for above-ground infrastructure monitoring. One of the main challenges for underground WSN deployment is the limited range (less than 3 m) at which reliable wireless underground communication can be achieved using radio signal propagation through the soil. To overcome this challenge, the purpose of this paper is to investigate a new approach for wireless underground communication using acoustic signal propagation along a buried water pipe. Design/methodology/approach An acoustic communication system was developed based on the requirements of low cost (tens of pounds at most), low power supply capacity (in the order of 1 W-h) and miniature (centimetre scale) size for a wireless communication node. The developed system was further tested along a buried steel pipe in poorly graded SAND and a buried medium density polyethylene (MDPE) pipe in well graded SAND. Findings With predicted acoustic attenuation of 1.3 dB/m and 2.1 dB/m along the buried steel and MDPE pipes, respectively, reliable acoustic communication is possible up to 17 m for the buried steel pipe and 11 m for the buried MDPE pipe. Research limitations/implications Although an important first step, more research is needed to validate the acoustic communication system along a wider water distribution pipe network. Originality/value This paper shows the possibility of achieving reliable wireless underground communication along a buried water pipe (especially non-metallic material ones) using low-frequency acoustic propagation along the pipe wall.
无线传感器网络(WSN)作为地埋水管监测的解决方案,与传统的地面基础设施监测应用相比,面临着一系列新的挑战。地下WSN部署的主要挑战之一是利用无线电信号通过土壤传播来实现可靠的地下无线通信的有限范围(小于3米)。为了克服这一挑战,本文的目的是研究一种利用声信号沿埋地水管传播的地下无线通信新方法。设计/方法/方法基于无线通信节点的低成本(最多几十磅)、低供电能力(1 W-h左右)和小型化(厘米级)的要求,开发了一种声学通信系统。该系统在分级差的砂土中进行了埋地钢管和分级好的砂土中进行了埋地中密度聚乙烯(MDPE)管的进一步测试。结果预测沿埋地钢管和埋地MDPE管道的声衰减分别为1.3 dB/m和2.1 dB/m,埋地钢管和埋地MDPE管道在17 m和11 m处可以实现可靠的声通信。虽然这是重要的第一步,但需要更多的研究来验证沿着更广泛的配水管网的声学通信系统。本文展示了利用沿管壁的低频声波传播实现沿埋地水管(特别是非金属材料水管)可靠的地下无线通信的可能性。
{"title":"Novel communication system for buried water pipe monitoring using acoustic signal propagation along the pipe","authors":"Omotayo Farai, Nicole Metje, Carl Anthony, Ali Sadeghioon, David Chapman","doi":"10.1108/ijpcc-05-2022-0179","DOIUrl":"https://doi.org/10.1108/ijpcc-05-2022-0179","url":null,"abstract":"Purpose Wireless sensor networks (WSN), as a solution for buried water pipe monitoring, face a new set of challenges compared to traditional application for above-ground infrastructure monitoring. One of the main challenges for underground WSN deployment is the limited range (less than 3 m) at which reliable wireless underground communication can be achieved using radio signal propagation through the soil. To overcome this challenge, the purpose of this paper is to investigate a new approach for wireless underground communication using acoustic signal propagation along a buried water pipe. Design/methodology/approach An acoustic communication system was developed based on the requirements of low cost (tens of pounds at most), low power supply capacity (in the order of 1 W-h) and miniature (centimetre scale) size for a wireless communication node. The developed system was further tested along a buried steel pipe in poorly graded SAND and a buried medium density polyethylene (MDPE) pipe in well graded SAND. Findings With predicted acoustic attenuation of 1.3 dB/m and 2.1 dB/m along the buried steel and MDPE pipes, respectively, reliable acoustic communication is possible up to 17 m for the buried steel pipe and 11 m for the buried MDPE pipe. Research limitations/implications Although an important first step, more research is needed to validate the acoustic communication system along a wider water distribution pipe network. Originality/value This paper shows the possibility of achieving reliable wireless underground communication along a buried water pipe (especially non-metallic material ones) using low-frequency acoustic propagation along the pipe wall.","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135304277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new predictive approach for the MAC layer misbehavior in IEEE 802.11 networks IEEE 802.11网络中MAC层错误行为的一种新的预测方法
IF 2.6 Q1 Computer Science Pub Date : 2023-07-03 DOI: 10.1108/ijpcc-08-2022-0303
Mohammed-Alamine El Houssaini, A. Nabou, Abdelali Hadir, Souad El Houssaini, Jamal el Kafi
PurposeAd hoc mobile networks are commonplace in every aspect of our everyday life. They become essential in many industries and have uses in logistics, science and the military. However, because they operate mostly in open spaces, they are exposed to a variety of dangers. The purpose of this study is to introduce a novel method for detecting the MAC layer misbehavior.Design/methodology/approachThe proposed novel approach is based on exponential smoothing for throughput prediction to address this MAC layer misbehavior. The real and expected throughput are processed using an exponential smoothing algorithm to identify this attack, and if these metrics exhibit a trending pattern, an alarm is then sent.FindingsThe effect of the IEEE 802.11 MAC layer misbehavior on throughput was examined using the NS-2 network simulator, as well as the approval of our novel strategy. The authors have found that a smoothing factor value that is near to 0 provides a very accurate throughput forecast that takes into consideration the recent history of the updated values of the real value. As for the smoothing factor values that are near to 1, they are used to identify MAC layer misbehavior.Originality/valueAccording to the authors’ modest knowledge, this new scheme has not been proposed in the state of the art for the detection of greedy behavior in mobile ad hoc networks.
目的自组织移动网络在我们日常生活的各个方面都很常见。它们在许多行业中都是必不可少的,在物流、科学和军事中都有用途。然而,由于他们大多在开放空间活动,他们面临着各种各样的危险。本研究的目的是提出一种检测MAC层错误行为的新方法。设计/方法/方法提出的新方法是基于指数平滑吞吐量预测来解决这种MAC层错误行为。使用指数平滑算法来处理实际吞吐量和预期吞吐量,以识别这种攻击,如果这些指标显示出趋势模式,则发送警报。使用NS-2网络模拟器测试了IEEE 802.11 MAC层错误行为对吞吐量的影响,并批准了我们的新策略。作者发现,接近于0的平滑因子值提供了一个非常准确的吞吐量预测,它考虑了实际值的更新值的最近历史。对于趋近于1的平滑因子值,用来识别MAC层的错误行为。原创性/价值据作者所知,目前还没有针对移动自组织网络中贪婪行为的检测提出新的方案。
{"title":"A new predictive approach for the MAC layer misbehavior in IEEE 802.11 networks","authors":"Mohammed-Alamine El Houssaini, A. Nabou, Abdelali Hadir, Souad El Houssaini, Jamal el Kafi","doi":"10.1108/ijpcc-08-2022-0303","DOIUrl":"https://doi.org/10.1108/ijpcc-08-2022-0303","url":null,"abstract":"\u0000Purpose\u0000Ad hoc mobile networks are commonplace in every aspect of our everyday life. They become essential in many industries and have uses in logistics, science and the military. However, because they operate mostly in open spaces, they are exposed to a variety of dangers. The purpose of this study is to introduce a novel method for detecting the MAC layer misbehavior.\u0000\u0000\u0000Design/methodology/approach\u0000The proposed novel approach is based on exponential smoothing for throughput prediction to address this MAC layer misbehavior. The real and expected throughput are processed using an exponential smoothing algorithm to identify this attack, and if these metrics exhibit a trending pattern, an alarm is then sent.\u0000\u0000\u0000Findings\u0000The effect of the IEEE 802.11 MAC layer misbehavior on throughput was examined using the NS-2 network simulator, as well as the approval of our novel strategy. The authors have found that a smoothing factor value that is near to 0 provides a very accurate throughput forecast that takes into consideration the recent history of the updated values of the real value. As for the smoothing factor values that are near to 1, they are used to identify MAC layer misbehavior.\u0000\u0000\u0000Originality/value\u0000According to the authors’ modest knowledge, this new scheme has not been proposed in the state of the art for the detection of greedy behavior in mobile ad hoc networks.\u0000","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2023-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46858289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Clustering based EO with MRF technique for effective load balancing in cloud computing 基于MRF技术的聚类EO在云计算中的有效负载平衡
IF 2.6 Q1 Computer Science Pub Date : 2023-05-22 DOI: 10.1108/ijpcc-01-2023-0022
H. N., A. Lathigara, Dr Rajanikanth Aluvalu, U. V.
PurposeCloud computing (CC) refers to the usage of virtualization technology to share computing resources through the internet. Task scheduling (TS) is used to assign computational resources to requests that have a high volume of pending processing. CC relies on load balancing to ensure that resources like servers and virtual machines (VMs) running on real servers share the same amount of load. VMs are an important part of virtualization, where physical servers are transformed into VM and act as physical servers during the process. It is possible that a user’s request or data transmission in a cloud data centre may be the reason for the VM to be under or overloaded with data.Design/methodology/approachVMs are an important part of virtualization, where physical servers are transformed into VM and act as physical servers during the process. It is possible that a user’s request or data transmission in a cloud data centre may be the reason for the VM to be under or overloaded with data. With a large number of VM or jobs, this method has a long makespan and is very difficult. A new idea to cloud loads without decreasing implementation time or resource consumption is therefore encouraged. Equilibrium optimization is used to cluster the VM into underloaded and overloaded VMs initially in this research. Underloading VMs is used to improve load balance and resource utilization in the second stage. The hybrid algorithm of BAT and the artificial bee colony (ABC) helps with TS using a multi-objective-based system. The VM manager performs VM migration decisions to provide load balance among physical machines (PMs). When a PM is overburdened and another PM is underburdened, the decision to migrate VMs is made based on the appropriate conditions. Balanced load and reduced energy usage in PMs are achieved in the former case. Manta ray foraging (MRF) is used to migrate VMs, and its decisions are based on a variety of factors.FindingsThe proposed approach provides the best possible scheduling for both VMs and PMs. To complete the task, improved whale optimization algorithm for Cloud TS has 42 s of completion time, enhanced multi-verse optimizer has 48 s, hybrid electro search with a genetic algorithm has 50 s, adaptive benefit factor-based symbiotic organisms search has 38 s and, finally, the proposed model has 30 s, which shows better performance of the proposed model.Originality/valueUser’s request or data transmission in a cloud data centre may cause the VMs to be under or overloaded with data. To identify the load on VM, initially EQ algorithm is used for clustering process. To figure out how well the proposed method works when the system is very busy by implementing hybrid algorithm called BAT–ABC. After the TS process, VM migration is occurred at the final stage, where optimal VM is identified by using MRF algorithm. The experimental analysis is carried out by using various metrics such as execution time, transmission time, makespan for various
目的云计算(CC)是指使用虚拟化技术通过互联网共享计算资源。任务调度(TS)用于将计算资源分配给具有大量待处理的请求。CC依靠负载平衡来确保服务器和运行在真实服务器上的虚拟机(VM)等资源共享相同的负载量。虚拟机是虚拟化的重要组成部分,在虚拟化过程中,物理服务器被转换为虚拟机并充当物理服务器。云数据中心中的用户请求或数据传输可能是VM数据不足或过载的原因。设计/方法论/方法虚拟机是虚拟化的重要组成部分,在虚拟化过程中,物理服务器被转换为虚拟机,并在过程中充当物理服务器。云数据中心中的用户请求或数据传输可能是VM数据不足或过载的原因。对于大量的VM或作业,这种方法的制作时间很长,而且非常困难。因此,鼓励在不减少实现时间或资源消耗的情况下进行云负载的新想法。在本研究中,平衡优化最初用于将虚拟机聚类为欠载和过载虚拟机。在第二阶段中,使用负载不足的VM来提高负载平衡和资源利用率。BAT和人工蜂群(ABC)的混合算法有助于使用基于多目标的系统进行TS。VM管理器执行VM迁移决策,以提供物理机器(PM)之间的负载平衡。当一个PM负担过重而另一个PM负荷不足时,将根据适当的条件做出迁移VM的决定。在前一种情况下实现了PM中的平衡负载和减少的能量使用。蝠鲼觅食(MRF)用于迁移虚拟机,其决策基于多种因素。发现所提出的方法为VM和PM提供了尽可能好的调度。为了完成任务,Cloud TS的改进whale优化算法有42 s的完成时间,增强的多维优化器有48 s、 遗传算法的混合电搜索有50 s、 基于适应性效益因素的共生生物搜索有38个 最后,所提出的模型有30 s、 这表明所提出的模型具有更好的性能。原创性/价值用户在云数据中心的请求或数据传输可能会导致虚拟机数据不足或过载。为了识别虚拟机上的负载,最初使用EQ算法进行聚类处理。通过实现名为BAT–ABC的混合算法,了解所提出的方法在系统非常繁忙时的工作情况。在TS过程之后,VM迁移发生在最后阶段,其中通过使用MRF算法来识别最优VM。实验分析是通过使用各种指标进行的,如执行时间、传输时间、各种迭代的完成时间、资源利用率和负载公平性。对于系统负载,度量给出了负载公平性。如何计算负载公平性取决于每个任务需要多长时间。有人补充说,如果任务需要更少的时间完成,云系统可能能够实现更高的负载公平性。
{"title":"Clustering based EO with MRF technique for effective load balancing in cloud computing","authors":"H. N., A. Lathigara, Dr Rajanikanth Aluvalu, U. V.","doi":"10.1108/ijpcc-01-2023-0022","DOIUrl":"https://doi.org/10.1108/ijpcc-01-2023-0022","url":null,"abstract":"\u0000Purpose\u0000Cloud computing (CC) refers to the usage of virtualization technology to share computing resources through the internet. Task scheduling (TS) is used to assign computational resources to requests that have a high volume of pending processing. CC relies on load balancing to ensure that resources like servers and virtual machines (VMs) running on real servers share the same amount of load. VMs are an important part of virtualization, where physical servers are transformed into VM and act as physical servers during the process. It is possible that a user’s request or data transmission in a cloud data centre may be the reason for the VM to be under or overloaded with data.\u0000\u0000\u0000Design/methodology/approach\u0000VMs are an important part of virtualization, where physical servers are transformed into VM and act as physical servers during the process. It is possible that a user’s request or data transmission in a cloud data centre may be the reason for the VM to be under or overloaded with data. With a large number of VM or jobs, this method has a long makespan and is very difficult. A new idea to cloud loads without decreasing implementation time or resource consumption is therefore encouraged. Equilibrium optimization is used to cluster the VM into underloaded and overloaded VMs initially in this research. Underloading VMs is used to improve load balance and resource utilization in the second stage. The hybrid algorithm of BAT and the artificial bee colony (ABC) helps with TS using a multi-objective-based system. The VM manager performs VM migration decisions to provide load balance among physical machines (PMs). When a PM is overburdened and another PM is underburdened, the decision to migrate VMs is made based on the appropriate conditions. Balanced load and reduced energy usage in PMs are achieved in the former case. Manta ray foraging (MRF) is used to migrate VMs, and its decisions are based on a variety of factors.\u0000\u0000\u0000Findings\u0000The proposed approach provides the best possible scheduling for both VMs and PMs. To complete the task, improved whale optimization algorithm for Cloud TS has 42 s of completion time, enhanced multi-verse optimizer has 48 s, hybrid electro search with a genetic algorithm has 50 s, adaptive benefit factor-based symbiotic organisms search has 38 s and, finally, the proposed model has 30 s, which shows better performance of the proposed model.\u0000\u0000\u0000Originality/value\u0000User’s request or data transmission in a cloud data centre may cause the VMs to be under or overloaded with data. To identify the load on VM, initially EQ algorithm is used for clustering process. To figure out how well the proposed method works when the system is very busy by implementing hybrid algorithm called BAT–ABC. After the TS process, VM migration is occurred at the final stage, where optimal VM is identified by using MRF algorithm. The experimental analysis is carried out by using various metrics such as execution time, transmission time, makespan for various","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2023-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49058611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A lane-based advanced forwarding protocol for internet of vehicles 一种基于车道的车联网高级转发协议
IF 2.6 Q1 Computer Science Pub Date : 2023-05-17 DOI: 10.1108/ijpcc-08-2022-0305
Ishita Seth, Kalpna Guleria, S. Panda
PurposeThe internet of vehicles (IoV) communication has recently become a popular research topic in the automotive industry. The growth in the automotive sector has resulted in significant standards and guidelines that have engaged various researchers and companies. In IoV, routing protocols play a significant role in enhancing communication safety for the transportation system. The high mobility of nodes in IoV and inconsistent network coverage in different areas make routing challenging. This paper aims to provide a lane-based advanced forwarding protocol for internet of vehicles (LAFP-IoV) for efficient data distribution in IoV. The proposed protocol’s main feature is that it can identify the destination zone by using position coordinates and broadcasting the packets toward the direction of destination. The novel suppression technique is used in the broadcast method to reduce the network routing overhead.Design/methodology/approachThe proposed protocol considers the interferences between different road segments, and a novel lane-based forwarding model is presented. The greedy forwarding notion, the broadcasting mechanism, and the suppression approach are used in this protocol to reduce the overhead generated by standard beacon forwarding procedures. The SUMO tool and NS-2 simulator are used for the vehicle's movement pattern and to simulate LAFP-IoV.FindingsThe simulation results show that the proposed LAFP-IoV protocol performs better than its peer protocols. It uses a greedy method for forwarding data packets and a carry-and-forward strategy to recover from the local maximum stage. This protocol's low latency and good PDR make it ideal for congested networks.Originality/valueThe proposed paper provides a unique lane-based forwarding for IoV. The proposed work achieves a higher delivery ratio than its peer protocols. The proposed protocol considers the lanes while forwarding the data packets applicable to the highly dense scenarios.
目的车联网(IoV)通信最近成为汽车行业的一个热门研究课题。汽车行业的发展产生了重要的标准和指导方针,吸引了各种研究人员和公司。在IoV中,路由协议在提高运输系统的通信安全方面发挥着重要作用。IoV中节点的高移动性和不同区域的不一致网络覆盖使路由具有挑战性。本文旨在提供一种基于车道的车联网高级转发协议(LAFP-IoV),以实现车联网中的高效数据分发。所提出的协议的主要特点是,它可以通过使用位置坐标来识别目的地区域,并向目的地方向广播数据包。在广播方法中使用了新的抑制技术来减少网络路由开销。设计/方法/途径所提出的协议考虑了不同路段之间的干扰,并提出了一种新的基于车道的转发模型。该协议中使用了贪婪转发概念、广播机制和抑制方法,以减少标准信标转发过程产生的开销。使用SUMO工具和NS-2模拟器对车辆的运动模式进行了仿真,并对LAFP-IoV.Findings进行了仿真。仿真结果表明,所提出的LAFP-IoV协议比其对等协议性能更好。它使用贪婪方法转发数据包,并使用进位转发策略从局部最大阶段恢复。该协议的低延迟和良好的PDR使其成为拥塞网络的理想选择。原创性/价值本文为IoV提供了一种独特的基于通道的转发。所提出的工作实现了比其对等协议更高的交付率。所提出的协议在转发适用于高密度场景的数据包时考虑了通道。
{"title":"A lane-based advanced forwarding protocol for internet of vehicles","authors":"Ishita Seth, Kalpna Guleria, S. Panda","doi":"10.1108/ijpcc-08-2022-0305","DOIUrl":"https://doi.org/10.1108/ijpcc-08-2022-0305","url":null,"abstract":"\u0000Purpose\u0000The internet of vehicles (IoV) communication has recently become a popular research topic in the automotive industry. The growth in the automotive sector has resulted in significant standards and guidelines that have engaged various researchers and companies. In IoV, routing protocols play a significant role in enhancing communication safety for the transportation system. The high mobility of nodes in IoV and inconsistent network coverage in different areas make routing challenging. This paper aims to provide a lane-based advanced forwarding protocol for internet of vehicles (LAFP-IoV) for efficient data distribution in IoV. The proposed protocol’s main feature is that it can identify the destination zone by using position coordinates and broadcasting the packets toward the direction of destination. The novel suppression technique is used in the broadcast method to reduce the network routing overhead.\u0000\u0000\u0000Design/methodology/approach\u0000The proposed protocol considers the interferences between different road segments, and a novel lane-based forwarding model is presented. The greedy forwarding notion, the broadcasting mechanism, and the suppression approach are used in this protocol to reduce the overhead generated by standard beacon forwarding procedures. The SUMO tool and NS-2 simulator are used for the vehicle's movement pattern and to simulate LAFP-IoV.\u0000\u0000\u0000Findings\u0000The simulation results show that the proposed LAFP-IoV protocol performs better than its peer protocols. It uses a greedy method for forwarding data packets and a carry-and-forward strategy to recover from the local maximum stage. This protocol's low latency and good PDR make it ideal for congested networks.\u0000\u0000\u0000Originality/value\u0000The proposed paper provides a unique lane-based forwarding for IoV. The proposed work achieves a higher delivery ratio than its peer protocols. The proposed protocol considers the lanes while forwarding the data packets applicable to the highly dense scenarios.\u0000","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2023-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44325377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Utilization and criticality based fault-tolerant scheduling in multicore mixed critical systems 多核混合关键系统中基于利用率和关键性的容错调度
IF 2.6 Q1 Computer Science Pub Date : 2023-03-07 DOI: 10.1108/ijpcc-06-2022-0248
Preeti Godabole, G. Bhole
PurposeThe main purpose of the paper is timing analysis of mixed critical applications on the multicore system to identify an efficient task scheduling mechanism to achieve three main objectives improving schedulability, achieving reliability and minimizing the number of cores used. The rise in transient faults in embedded systems due to the use of low-cost processors has led to the use of fault-tolerant scheduling and mapping techniques.Design/methodology/approachThe paper opted for a simulation-based study. The simulation of mixed critical applications, like air traffic control systems and synthetic workloads, is carried out using a litmus-real time testbed on an Ubuntu machine. The heuristic algorithms for task allocation based on utilization factors and task criticalities are proposed for partitioned approaches with multiple objectives.FindingsBoth partitioned earliest deadline first (EDF) with the utilization-based heuristic and EDF-virtual deadline (VD) with a criticality-based heuristic for allocation works well, as it schedules the air traffic system with a 98% success ratio (SR) using only three processor cores with transient faults being handled by the active backup of the tasks. With synthetic task loads, the proposed criticality-based heuristic works well with EDF-VD, as the SR is 94%. The validation of the proposed heuristic is done with a global and partitioned approach of scheduling, considering active backups to make the system reliable. There is an improvement in SR by 11% as compared to the global approach and a 17% improvement in comparison with the partitioned fixed-priority approach with only three processor cores being used.Research limitations/implicationsThe simulations of mixed critical tasks are carried out on a real-time kernel based on Linux and are generalizable in Linux-based environments.Practical implicationsThe rise in transient faults in embedded systems due to the use of low-cost processors has led to the use of fault-tolerant scheduling and mapping techniques.Originality/valueThis paper fulfills an identified need to have multi-objective task scheduling in a mixed critical system. The timing analysis helps to identify performance risks and assess alternative architectures used to achieve reliability in terms of transient faults.
目的本文的主要目的是对多核系统上的混合关键应用程序进行时序分析,以确定一种有效的任务调度机制,从而实现三个主要目标——提高可调度性、实现可靠性和最小化所使用的核数量。由于使用低成本处理器,嵌入式系统中瞬态故障的增加导致了容错调度和映射技术的使用。设计/方法论/方法本文选择了基于模拟的研究。混合关键应用程序的模拟,如空中交通控制系统和合成工作负载,是使用Ubuntu机器上的石蕊实时测试台进行的。针对多目标分割方法,提出了基于利用因子和任务关键性的启发式任务分配算法。Findings采用基于利用率的启发式算法的分区最早截止日期优先(EDF)和采用基于关键性的启发式算法进行分配的EDF虚拟截止日期(VD)都运行良好,因为它只使用三个处理器核心来调度空中交通系统,其中瞬态故障由任务的主动备份处理,成功率为98%。对于合成任务负载,所提出的基于临界性的启发式算法在EDF-VD中运行良好,因为SR为94%。采用全局和分区的调度方法对所提出的启发式算法进行了验证,考虑了主动备份以使系统可靠。与全局方法相比,SR提高了11%,与仅使用三个处理器核的分区固定优先级方法相比,提高了17%。研究局限性/含义混合关键任务的模拟是在基于Linux的实时内核上进行的,并且可以在基于Linux环境中推广。实际意义由于使用低成本处理器,嵌入式系统中瞬态故障的增加导致了容错调度和映射技术的使用。原创性/价值本文满足了在混合关键系统中进行多目标任务调度的确定需求。时序分析有助于识别性能风险,并评估用于实现瞬态故障可靠性的替代架构。
{"title":"Utilization and criticality based fault-tolerant scheduling in multicore mixed critical systems","authors":"Preeti Godabole, G. Bhole","doi":"10.1108/ijpcc-06-2022-0248","DOIUrl":"https://doi.org/10.1108/ijpcc-06-2022-0248","url":null,"abstract":"\u0000Purpose\u0000The main purpose of the paper is timing analysis of mixed critical applications on the multicore system to identify an efficient task scheduling mechanism to achieve three main objectives improving schedulability, achieving reliability and minimizing the number of cores used. The rise in transient faults in embedded systems due to the use of low-cost processors has led to the use of fault-tolerant scheduling and mapping techniques.\u0000\u0000\u0000Design/methodology/approach\u0000The paper opted for a simulation-based study. The simulation of mixed critical applications, like air traffic control systems and synthetic workloads, is carried out using a litmus-real time testbed on an Ubuntu machine. The heuristic algorithms for task allocation based on utilization factors and task criticalities are proposed for partitioned approaches with multiple objectives.\u0000\u0000\u0000Findings\u0000Both partitioned earliest deadline first (EDF) with the utilization-based heuristic and EDF-virtual deadline (VD) with a criticality-based heuristic for allocation works well, as it schedules the air traffic system with a 98% success ratio (SR) using only three processor cores with transient faults being handled by the active backup of the tasks. With synthetic task loads, the proposed criticality-based heuristic works well with EDF-VD, as the SR is 94%. The validation of the proposed heuristic is done with a global and partitioned approach of scheduling, considering active backups to make the system reliable. There is an improvement in SR by 11% as compared to the global approach and a 17% improvement in comparison with the partitioned fixed-priority approach with only three processor cores being used.\u0000\u0000\u0000Research limitations/implications\u0000The simulations of mixed critical tasks are carried out on a real-time kernel based on Linux and are generalizable in Linux-based environments.\u0000\u0000\u0000Practical implications\u0000The rise in transient faults in embedded systems due to the use of low-cost processors has led to the use of fault-tolerant scheduling and mapping techniques.\u0000\u0000\u0000Originality/value\u0000This paper fulfills an identified need to have multi-objective task scheduling in a mixed critical system. The timing analysis helps to identify performance risks and assess alternative architectures used to achieve reliability in terms of transient faults.\u0000","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2023-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46465511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance analysis of edge, fog and cloud computing paradigms for real-time video quality assessment and phishing detection 用于实时视频质量评估和网络钓鱼检测的边缘、雾和云计算模式的性能分析
IF 2.6 Q1 Computer Science Pub Date : 2023-02-28 DOI: 10.1108/ijpcc-09-2022-0327
T. P. Fowdur, M.A.N. Shaikh Abdoolla, Lokeshwar Doobur
PurposeThe purpose of this paper is to perform a comparative analysis of the delay associated in running two real-time machine learning-based applications, namely, a video quality assessment (VQA) and a phishing detection application by using the edge, fog and cloud computing paradigms.Design/methodology/approachThe VQA algorithm was developed using Android Studio and run on a mobile phone for the edge paradigm. For the fog paradigm, it was hosted on a Java server and for the cloud paradigm on the IBM and Firebase clouds. The phishing detection algorithm was embedded into a browser extension for the edge paradigm. For the fog paradigm, it was hosted on a Node.js server and for the cloud paradigm on Firebase.FindingsFor the VQA algorithm, the edge paradigm had the highest response time while the cloud paradigm had the lowest, as the algorithm was computationally intensive. For the phishing detection algorithm, the edge paradigm had the lowest response time, and the cloud paradigm had the highest, as the algorithm had a low computational complexity. Since the determining factor for the response time was the latency, the edge paradigm provided the smallest delay as all processing were local.Research limitations/implicationsThe main limitation of this work is that the experiments were performed on a small scale due to time and budget constraints.Originality/valueA detailed analysis with real applications has been provided to show how the complexity of an application can determine the best computing paradigm on which it can be deployed.
本文的目的是通过使用边缘、雾和云计算范式,对运行两个基于实时机器学习的应用程序(即视频质量评估(VQA)和网络钓鱼检测应用程序)相关的延迟进行比较分析。设计/方法/方法VQA算法是使用Android Studio开发的,并在移动电话上运行。对于雾范式,它托管在Java服务器上,对于云范式,它托管在IBM和Firebase云上。将网络钓鱼检测算法嵌入到边缘范式的浏览器扩展中。对于雾范式,它托管在Node.js服务器上,对于云范式,它托管在Firebase上。对于VQA算法,边缘范式具有最高的响应时间,而云范式具有最低的响应时间,因为算法是计算密集型的。对于网络钓鱼检测算法,由于算法的计算复杂度较低,边缘范式的响应时间最短,云范式的响应时间最长。由于响应时间的决定因素是延迟,因此边缘范式提供了最小的延迟,因为所有处理都是本地的。研究局限/启示这项工作的主要局限是由于时间和预算的限制,实验是在小规模上进行的。原创性/价值本文提供了对实际应用程序的详细分析,以说明应用程序的复杂性如何决定部署应用程序的最佳计算范式。
{"title":"Performance analysis of edge, fog and cloud computing paradigms for real-time video quality assessment and phishing detection","authors":"T. P. Fowdur, M.A.N. Shaikh Abdoolla, Lokeshwar Doobur","doi":"10.1108/ijpcc-09-2022-0327","DOIUrl":"https://doi.org/10.1108/ijpcc-09-2022-0327","url":null,"abstract":"\u0000Purpose\u0000The purpose of this paper is to perform a comparative analysis of the delay associated in running two real-time machine learning-based applications, namely, a video quality assessment (VQA) and a phishing detection application by using the edge, fog and cloud computing paradigms.\u0000\u0000\u0000Design/methodology/approach\u0000The VQA algorithm was developed using Android Studio and run on a mobile phone for the edge paradigm. For the fog paradigm, it was hosted on a Java server and for the cloud paradigm on the IBM and Firebase clouds. The phishing detection algorithm was embedded into a browser extension for the edge paradigm. For the fog paradigm, it was hosted on a Node.js server and for the cloud paradigm on Firebase.\u0000\u0000\u0000Findings\u0000For the VQA algorithm, the edge paradigm had the highest response time while the cloud paradigm had the lowest, as the algorithm was computationally intensive. For the phishing detection algorithm, the edge paradigm had the lowest response time, and the cloud paradigm had the highest, as the algorithm had a low computational complexity. Since the determining factor for the response time was the latency, the edge paradigm provided the smallest delay as all processing were local.\u0000\u0000\u0000Research limitations/implications\u0000The main limitation of this work is that the experiments were performed on a small scale due to time and budget constraints.\u0000\u0000\u0000Originality/value\u0000A detailed analysis with real applications has been provided to show how the complexity of an application can determine the best computing paradigm on which it can be deployed.\u0000","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2023-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48160098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A systematic study on the challenges, characteristics and security issues in vehicular networks 车载网络的挑战、特点和安全问题的系统研究
IF 2.6 Q1 Computer Science Pub Date : 2023-01-16 DOI: 10.1108/ijpcc-04-2022-0164
F. Lone, H. Verma, K. Sharma
PurposeThe purpose of this study is to extensively explore the vehicular network paradigm, challenges faced by them and provide a reasonable solution for securing these vulnerable networks. Vehicle-to-everything (V2X) communication has brought the long-anticipated goal of safe, convenient and sustainable transportation closer to reality. The connected vehicle (CV) paradigm is critical to the intelligent transportation systems vision. It imagines a society free of a troublesome transportation system burdened by gridlock, fatal accidents and a polluted environment. The authors cannot overstate the importance of CVs in solving long-standing mobility issues and making travel safer and more convenient. It is high time to explore vehicular networks in detail to suggest solutions to the challenges encountered by these highly dynamic networks.Design/methodology/approachThis paper compiles research on various V2X topics, from a comprehensive overview of V2X networks to their unique characteristics and challenges. In doing so, the authors identify multiple issues encountered by V2X communication networks due to their open communication nature and high mobility, especially from a security perspective. Thus, this paper proposes a trust-based model to secure vehicular networks. The proposed approach uses the communicating nodes’ behavior to establish trustworthy relationships. The proposed model only allows trusted nodes to communicate among themselves while isolating malicious nodes to achieve secure communication.FindingsDespite the benefits offered by V2X networks, they have associated challenges. As the number of CVs on the roads increase, so does the attack surface. Connected cars provide numerous safety-critical applications that, if compromised, can result in fatal consequences. While cryptographic mechanisms effectively prevent external attacks, various studies propose trust-based models to complement cryptographic solutions for dealing with internal attacks. While numerous trust-based models have been proposed, there is room for improvement in malicious node detection and complexity. Optimizing the number of nodes considered in trust calculation can reduce the complexity of state-of-the-art solutions. The theoretical analysis of the proposed model exhibits an improvement in trust calculation, better malicious node detection and fewer computations.Originality/valueThe proposed model is the first to add another dimension to trust calculation by incorporating opinions about recommender nodes. The added dimension improves the trust calculation resulting in better performance in thwarting attacks and enhancing security while also reducing the trust calculation complexity.
目的本研究的目的是广泛探索车载网络模式及其面临的挑战,并为保护这些脆弱网络提供合理的解决方案。车对物(V2X)通信使人们期待已久的安全、方便和可持续交通的目标更加接近现实。联网车辆(CV)范式对智能交通系统的愿景至关重要。它想象了一个没有交通堵塞、致命事故和污染环境的麻烦交通系统的社会。简历在解决长期存在的流动性问题和使旅行更安全、更方便方面的重要性怎么强调都不为过。现在是详细探索车辆网络的时候了,以便为这些高度动态的网络所遇到的挑战提出解决方案。设计/方法论/方法本文汇集了关于各种V2X主题的研究,从V2X网络的全面概述到其独特的特点和挑战。在这样做的过程中,作者发现了V2X通信网络由于其开放的通信性质和高移动性而遇到的多个问题,特别是从安全角度来看。因此,本文提出了一种基于信任的车辆网络安全模型。所提出的方法利用通信节点的行为来建立可信任的关系。该模型只允许可信节点之间进行通信,同时隔离恶意节点以实现安全通信。发现尽管V2X网络带来了好处,但它们也带来了相关的挑战。随着道路上CV数量的增加,攻击曲面也会增加。联网汽车提供了许多安全关键的应用程序,如果受到损害,可能会导致致命后果。虽然加密机制有效地防止了外部攻击,但各种研究提出了基于信任的模型来补充处理内部攻击的加密解决方案。尽管已经提出了许多基于信任的模型,但在恶意节点检测和复杂性方面仍有改进的空间。优化信任计算中考虑的节点数量可以降低现有解决方案的复杂性。理论分析表明,该模型在信任计算、恶意节点检测和计算量方面都有所改进。独创性/价值所提出的模型首次通过引入关于推荐节点的意见,为信任计算增加了另一个维度。增加的维度改进了信任计算,从而在挫败攻击和增强安全性方面获得更好的性能,同时降低了信任计算的复杂性。
{"title":"A systematic study on the challenges, characteristics and security issues in vehicular networks","authors":"F. Lone, H. Verma, K. Sharma","doi":"10.1108/ijpcc-04-2022-0164","DOIUrl":"https://doi.org/10.1108/ijpcc-04-2022-0164","url":null,"abstract":"\u0000Purpose\u0000The purpose of this study is to extensively explore the vehicular network paradigm, challenges faced by them and provide a reasonable solution for securing these vulnerable networks. Vehicle-to-everything (V2X) communication has brought the long-anticipated goal of safe, convenient and sustainable transportation closer to reality. The connected vehicle (CV) paradigm is critical to the intelligent transportation systems vision. It imagines a society free of a troublesome transportation system burdened by gridlock, fatal accidents and a polluted environment. The authors cannot overstate the importance of CVs in solving long-standing mobility issues and making travel safer and more convenient. It is high time to explore vehicular networks in detail to suggest solutions to the challenges encountered by these highly dynamic networks.\u0000\u0000\u0000Design/methodology/approach\u0000This paper compiles research on various V2X topics, from a comprehensive overview of V2X networks to their unique characteristics and challenges. In doing so, the authors identify multiple issues encountered by V2X communication networks due to their open communication nature and high mobility, especially from a security perspective. Thus, this paper proposes a trust-based model to secure vehicular networks. The proposed approach uses the communicating nodes’ behavior to establish trustworthy relationships. The proposed model only allows trusted nodes to communicate among themselves while isolating malicious nodes to achieve secure communication.\u0000\u0000\u0000Findings\u0000Despite the benefits offered by V2X networks, they have associated challenges. As the number of CVs on the roads increase, so does the attack surface. Connected cars provide numerous safety-critical applications that, if compromised, can result in fatal consequences. While cryptographic mechanisms effectively prevent external attacks, various studies propose trust-based models to complement cryptographic solutions for dealing with internal attacks. While numerous trust-based models have been proposed, there is room for improvement in malicious node detection and complexity. Optimizing the number of nodes considered in trust calculation can reduce the complexity of state-of-the-art solutions. The theoretical analysis of the proposed model exhibits an improvement in trust calculation, better malicious node detection and fewer computations.\u0000\u0000\u0000Originality/value\u0000The proposed model is the first to add another dimension to trust calculation by incorporating opinions about recommender nodes. The added dimension improves the trust calculation resulting in better performance in thwarting attacks and enhancing security while also reducing the trust calculation complexity.\u0000","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2023-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46843343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Air quality measurement, prediction and warning using transfer learning based IOT system for ambient assisted living 使用基于迁移学习的物联网系统进行环境辅助生活的空气质量测量、预测和预警
IF 2.6 Q1 Computer Science Pub Date : 2023-01-04 DOI: 10.1108/ijpcc-07-2022-0271
S. Sonawani, Kailas Patil
PurposeIndoor air quality monitoring is extremely important in urban, industrial areas. Considering the devastating effect of declining quality of air in major part of the countries like India and China, it is highly recommended to monitor the quality of air which can help people with respiratory diseases, children and elderly people to take necessary precautions and stay safe at their homes. The purpose of this study is to detect air quality and perform predictions which could be part of smart home automation with the use of newer technology.Design/methodology/approachThis study proposes an Internet-of-Things (IoT)-based air quality measurement, warning and prediction system for ambient assisted living. The proposed ambient assisted living system consists of low-cost air quality sensors and ESP32 controller with new generation embedded system architecture. It can detect Indoor Air Quality parameters like CO, PM2.5, NO2, O3, NH3, temperature, pressure, humidity, etc. The low cost sensor data are calibrated using machine learning techniques for performance improvement. The system has a novel prediction model, multiheaded convolutional neural networks-gated recurrent unit which can detect next hour pollution concentration. The model uses a transfer learning (TL) approach for prediction when the system is new and less data available for prediction. Any neighboring site data can be used to transfer knowledge for early predictions for the new system. It can have a mobile-based application which can send warning notifications to users if the Indoor Air Quality parameters exceed the specified threshold values. This is all required to take necessary measures against bad air quality.FindingsThe IoT-based system has implemented the TL framework, and the results of this study showed that the system works efficiently with performance improvement of 55.42% in RMSE scores for prediction at new target system with insufficient data.Originality/valueThis study demonstrates the implementation of an IoT system which uses low-cost sensors and deep learning model for predicting pollution concentration. The system is tackling the issues of the low-cost sensors for better performance. The novel approach of pretrained models and TL work very well at the new system having data insufficiency issues. This study contributes significantly with the usage of low-cost sensors, open-source advanced technology and performance improvement in prediction ability at new systems. Experimental results and findings are disclosed in this study. This will help install multiple new cost-effective monitoring stations in smart city for pollution forecasting.
目的室内空气质量监测在城市和工业区非常重要。考虑到印度和中国等主要国家空气质量下降的破坏性影响,强烈建议监测空气质量,这有助于呼吸系统疾病患者、儿童和老人采取必要的预防措施,并在家中保持安全。这项研究的目的是检测空气质量并进行预测,这可能是使用新技术实现智能家居自动化的一部分。设计/方法论/方法本研究提出了一种基于物联网(IoT)的环境辅助生活空气质量测量、预警和预测系统。所提出的环境辅助生活系统由低成本的空气质量传感器和具有新一代嵌入式系统架构的ESP32控制器组成。它可以检测室内空气质量参数,如CO、PM2.5、NO2、O3、NH3、温度、压力、湿度等。低成本的传感器数据使用机器学习技术进行校准,以提高性能。该系统具有一个新的预测模型,即多头卷积神经网络门控递归单元,可以检测下一小时的污染浓度。当系统是新的并且可用于预测的数据较少时,该模型使用迁移学习(TL)方法进行预测。任何相邻站点数据都可以用于传递用于新系统的早期预测的知识。它可以有一个基于移动的应用程序,如果室内空气质量参数超过指定的阈值,该应用程序可以向用户发送警告通知。这一切都是为了采取必要措施来应对恶劣的空气质量。发现基于物联网的系统已经实现了TL框架,本研究的结果表明,在数据不足的新目标系统中,该系统工作效率高,预测的RMSE分数提高了55.42%。独创性/价值这项研究展示了物联网系统的实现,该系统使用低成本传感器和深度学习模型来预测污染浓度。该系统正在解决低成本传感器的问题,以获得更好的性能。预训练模型和TL的新方法在存在数据不足问题的新系统中工作得很好。这项研究在使用低成本传感器、开源先进技术以及提高新系统预测能力方面做出了重大贡献。本研究公开了实验结果和发现。这将有助于在智能城市中安装多个新的具有成本效益的监测站,用于污染预测。
{"title":"Air quality measurement, prediction and warning using transfer learning based IOT system for ambient assisted living","authors":"S. Sonawani, Kailas Patil","doi":"10.1108/ijpcc-07-2022-0271","DOIUrl":"https://doi.org/10.1108/ijpcc-07-2022-0271","url":null,"abstract":"\u0000Purpose\u0000Indoor air quality monitoring is extremely important in urban, industrial areas. Considering the devastating effect of declining quality of air in major part of the countries like India and China, it is highly recommended to monitor the quality of air which can help people with respiratory diseases, children and elderly people to take necessary precautions and stay safe at their homes. The purpose of this study is to detect air quality and perform predictions which could be part of smart home automation with the use of newer technology.\u0000\u0000\u0000Design/methodology/approach\u0000This study proposes an Internet-of-Things (IoT)-based air quality measurement, warning and prediction system for ambient assisted living. The proposed ambient assisted living system consists of low-cost air quality sensors and ESP32 controller with new generation embedded system architecture. It can detect Indoor Air Quality parameters like CO, PM2.5, NO2, O3, NH3, temperature, pressure, humidity, etc. The low cost sensor data are calibrated using machine learning techniques for performance improvement. The system has a novel prediction model, multiheaded convolutional neural networks-gated recurrent unit which can detect next hour pollution concentration. The model uses a transfer learning (TL) approach for prediction when the system is new and less data available for prediction. Any neighboring site data can be used to transfer knowledge for early predictions for the new system. It can have a mobile-based application which can send warning notifications to users if the Indoor Air Quality parameters exceed the specified threshold values. This is all required to take necessary measures against bad air quality.\u0000\u0000\u0000Findings\u0000The IoT-based system has implemented the TL framework, and the results of this study showed that the system works efficiently with performance improvement of 55.42% in RMSE scores for prediction at new target system with insufficient data.\u0000\u0000\u0000Originality/value\u0000This study demonstrates the implementation of an IoT system which uses low-cost sensors and deep learning model for predicting pollution concentration. The system is tackling the issues of the low-cost sensors for better performance. The novel approach of pretrained models and TL work very well at the new system having data insufficiency issues. This study contributes significantly with the usage of low-cost sensors, open-source advanced technology and performance improvement in prediction ability at new systems. Experimental results and findings are disclosed in this study. This will help install multiple new cost-effective monitoring stations in smart city for pollution forecasting.\u0000","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2023-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47275874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
International Journal of Pervasive Computing and Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1