首页 > 最新文献

International Journal of Pervasive Computing and Communications最新文献

英文 中文
Optimized security algorithm for connected vehicular network 互联车辆网络的优化安全算法
IF 2.6 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-01-02 DOI: 10.1108/ijpcc-12-2021-0300
Deepak Choudhary
PurposeAs the number of devices that connect to the Internet of Things (IoT) has grown, privacy and security issues have come up. Because IoT devices collect so much sensitive information, like user names, locations, phone numbers and even how they usually use energy, it is very important to protect users' privacy and security. IoT technology will be hard to use on the client side because IoT-enabled devices do not have clear privacy and security controls.Design/methodology/approachIoT technology would be harder to use on the client side if the IoT did not offer enough well-defined ways to protect users’ privacy and security. The goal of this research is to protect people's privacy in the IoT by using the oppositional artificial flora optimization (EGPKC-OAFA) algorithm to generate the best keys for the ElGamal public key cryptosystem (EGPKC). The EGPKC-OAFA approach puts the most weight on the IEEE 802.15.4 standard for MAC, which is the most important part of the standard. The security field is part of the MAC header of this standard. In addition, the MAC header includes EGPKC, which makes it possible to make authentication keys as quickly as possible.FindingsWith the proliferation of IoT devices, privacy and security have become major concerns in the academic world. Security and privacy are of the utmost importance due to the large amount of personally identifiable information acquired by IoT devices, such as name, location, phone numbers and energy use. Client-side deployment of IoT technologies will be hampered by the absence of well-defined privacy and security solutions afforded by the IoT. The purpose of this research is to present the EGPKC with optimum key generation using the EGPKC-OAFA algorithm for the purpose of protecting individual privacy within the context of the IoT. The EGPKC-OAFA approach is concerned with the MAC standard defined by the IEEE 802.15.4 standard, which includes the security field in its MAC header. Also, the MAC header incorporates EGPKC, which enables the fastest possible authentication key generation. In addition, the best methodology award goes to the OAFA strategy, which successfully implements the optimum EGPKC selection strategy by combining opposition-based (OBL) and standard AFA ideas. The EGPKC-OAFA method has been proved to effectively analyze performance in a number of simulations, with the results of various functions being identified.Originality/valueIn light of the growing prevalence of the IoT, an increasing number of people are becoming anxious about the protection and confidentiality of the personal data that they save online. This is especially true in light of the fact that more and more things are becoming connected to the internet. The IoT is capable of gathering personally identifiable information such as names, addresses and phone numbers, as well as the quantity of energy that is used. It will be challenging for customers to adopt IoT technology because of worries about the
目的随着连接物联网(IoT)的设备数量的增长,隐私和安全问题也随之而来。由于物联网设备收集了如此多的敏感信息,如用户名、位置、电话号码,甚至他们通常如何使用能源,因此保护用户的隐私和安全非常重要。物联网技术将很难在客户端使用,因为支持物联网的设备没有明确的隐私和安全控制。如果物联网不能提供足够明确的方式来保护用户的隐私和安全,那么设计/方法/方法物联网技术将更难在客户端使用。本研究的目标是通过使用对立人工菌群优化(EGPKC-OAFA)算法为ElGamal公钥密码系统(EGPKC)生成最佳密钥,来保护人们在物联网中的隐私。EGPKC-OAFA方法最重视MAC的IEEE 802.15.4标准,这是该标准最重要的部分。安全字段是本标准MAC报头的一部分。此外,MAC报头包括EGPKC,这使得可以尽快生成身份验证密钥。发现随着物联网设备的普及,隐私和安全已成为学术界的主要关注点。由于物联网设备获取了大量个人身份信息,如姓名、位置、电话号码和能源使用情况,因此安全和隐私至关重要。物联网技术的客户端部署将因缺乏物联网提供的明确的隐私和安全解决方案而受到阻碍。本研究的目的是使用EGPKC-OAFA算法为EGPKC提供最佳密钥生成,以保护物联网背景下的个人隐私。EGPKC-OAFA方法涉及由IEEE 802.15.4标准定义的MAC标准,该标准在其MAC报头中包括安全字段。此外,MAC标头包含EGPKC,它可以实现尽可能快的身份验证密钥生成。此外,最佳方法论奖授予OAFA策略,该策略通过结合基于反对派的(OBL)和标准AFA思想,成功地实现了最佳EGPKC选择策略。EGPKC-OAFA方法已在大量模拟中被证明可以有效地分析性能,并确定了各种函数的结果。独创性/价值鉴于物联网的日益普及,越来越多的人对他们在线保存的个人数据的保护和保密感到焦虑。鉴于越来越多的东西与互联网相连,这一点尤其正确。物联网能够收集个人身份信息,如姓名、地址和电话号码,以及使用的能源量。由于担心用户生成的数据的安全性和隐私性,客户采用物联网技术将是一项挑战。在这项工作中,EGPKC与对抗性人工菌群配对,从而提高了EGPKC为物联网(EGPKC-OAFA)提供的隐私安全性。作为IEEE 802.15.4标准一部分的MAC安全字段是EGPKC-OAFA协议高度关注的领域之一。认证密钥生成协议密钥协议(也称为EGPKCA)用于MAC报头。该协议的缩写是EGPKCA。OAFA技术,也称为OBL和AFA的组合,是选择EGPKC最成功的方法。这种方法的首字母缩写为OAFA。通过各种模拟表明,EGPKC-OAFA技术是进行性能分析的一种非常有用的工具。
{"title":"Optimized security algorithm for connected vehicular network","authors":"Deepak Choudhary","doi":"10.1108/ijpcc-12-2021-0300","DOIUrl":"https://doi.org/10.1108/ijpcc-12-2021-0300","url":null,"abstract":"\u0000Purpose\u0000As the number of devices that connect to the Internet of Things (IoT) has grown, privacy and security issues have come up. Because IoT devices collect so much sensitive information, like user names, locations, phone numbers and even how they usually use energy, it is very important to protect users' privacy and security. IoT technology will be hard to use on the client side because IoT-enabled devices do not have clear privacy and security controls.\u0000\u0000\u0000Design/methodology/approach\u0000IoT technology would be harder to use on the client side if the IoT did not offer enough well-defined ways to protect users’ privacy and security. The goal of this research is to protect people's privacy in the IoT by using the oppositional artificial flora optimization (EGPKC-OAFA) algorithm to generate the best keys for the ElGamal public key cryptosystem (EGPKC). The EGPKC-OAFA approach puts the most weight on the IEEE 802.15.4 standard for MAC, which is the most important part of the standard. The security field is part of the MAC header of this standard. In addition, the MAC header includes EGPKC, which makes it possible to make authentication keys as quickly as possible.\u0000\u0000\u0000Findings\u0000With the proliferation of IoT devices, privacy and security have become major concerns in the academic world. Security and privacy are of the utmost importance due to the large amount of personally identifiable information acquired by IoT devices, such as name, location, phone numbers and energy use. Client-side deployment of IoT technologies will be hampered by the absence of well-defined privacy and security solutions afforded by the IoT. The purpose of this research is to present the EGPKC with optimum key generation using the EGPKC-OAFA algorithm for the purpose of protecting individual privacy within the context of the IoT. The EGPKC-OAFA approach is concerned with the MAC standard defined by the IEEE 802.15.4 standard, which includes the security field in its MAC header. Also, the MAC header incorporates EGPKC, which enables the fastest possible authentication key generation. In addition, the best methodology award goes to the OAFA strategy, which successfully implements the optimum EGPKC selection strategy by combining opposition-based (OBL) and standard AFA ideas. The EGPKC-OAFA method has been proved to effectively analyze performance in a number of simulations, with the results of various functions being identified.\u0000\u0000\u0000Originality/value\u0000In light of the growing prevalence of the IoT, an increasing number of people are becoming anxious about the protection and confidentiality of the personal data that they save online. This is especially true in light of the fact that more and more things are becoming connected to the internet. The IoT is capable of gathering personally identifiable information such as names, addresses and phone numbers, as well as the quantity of energy that is used. It will be challenging for customers to adopt IoT technology because of worries about the","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":"1 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2023-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42186331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Review on various detectors in massive MIMO technology: a performance analysis 大规模MIMO技术中各种检测器的综述:性能分析
IF 2.6 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-01-01 DOI: 10.1108/IJPCC-11-2020-0188
M. ManjuV., S. GaneshR.
{"title":"Review on various detectors in massive MIMO technology: a performance analysis","authors":"M. ManjuV., S. GaneshR.","doi":"10.1108/IJPCC-11-2020-0188","DOIUrl":"https://doi.org/10.1108/IJPCC-11-2020-0188","url":null,"abstract":"","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":"19 1","pages":"291-322"},"PeriodicalIF":2.6,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"62802273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection IoT attacks using Lasso regression algorithm with ensemble classifier 使用Lasso回归算法和集成分类器检测物联网攻击
IF 2.6 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2022-12-29 DOI: 10.1108/ijpcc-09-2022-0316
K. Sheelavathy, V. Udaya Rani
PurposeInternet of Things (IoT) is a network, which provides the connection with various physical objects such as smart machines, smart home appliance and so on. The physical objects are allocated with a unique internet address, namely, Internet Protocol, which is used to perform the data broadcasting with the external objects using the internet. The sudden increment in the number of attacks generated by intruders, causes security-related problems in IoT devices while performing the communication. The main purpose of this paper is to develop an effective attack detection to enhance the robustness against the attackers in IoT.Design/methodology/approachIn this research, the lasso regression algorithm is proposed along with ensemble classifier for identifying the IoT attacks. The lasso algorithm is used for the process of feature selection that modeled fewer parameters for the sparse models. The type of regression is analyzed for showing higher levels when certain parts of model selection is needed for parameter elimination. The lasso regression obtains the subset for predictors to lower the prediction error with respect to the quantitative response variable. The lasso does not impose a constraint for modeling the parameters caused the coefficients with some variables shrink as zero. The selected features are classified by using an ensemble classifier, that is important for linear and nonlinear types of data in the dataset, and the models are combined for handling these data types.FindingsThe lasso regression with ensemble classifier–based attack classification comprises distributed denial-of-service and Mirai botnet attacks which achieved an improved accuracy of 99.981% than the conventional deep neural network (DNN) methods.Originality/valueHere, an efficient lasso regression algorithm is developed for extracting the features to perform the network anomaly detection using ensemble classifier.
物联网(internet of Things, IoT)是一个网络,它提供了与智能机器、智能家电等各种物理对象的连接。物理对象被分配一个唯一的互联网地址,即互联网协议,用于通过互联网与外部对象进行数据广播。入侵者产生的攻击数量突然增加,导致物联网设备在执行通信时出现安全相关问题。本文的主要目的是开发一种有效的攻击检测方法,以增强物联网中对攻击者的鲁棒性。设计/方法/方法在本研究中,提出了套索回归算法和集成分类器来识别物联网攻击。lasso算法用于稀疏模型的特征选择过程,对稀疏模型建模的参数较少。当模型选择的某些部分需要用于参数消除时,分析回归类型以显示更高的水平。套索回归得到预测者的子集,以降低相对于定量响应变量的预测误差。套索没有对参数建模施加约束,导致某些变量的系数收缩为零。所选择的特征通过使用集成分类器进行分类,这对于数据集中的线性和非线性类型的数据很重要,并且将模型组合起来处理这些数据类型。使用基于集成分类器的lasso回归方法对分布式拒绝服务攻击和Mirai僵尸网络攻击进行分类,准确率比传统深度神经网络(DNN)方法提高了99.981%。在此基础上,提出了一种高效的套索回归算法,用于提取特征,并使用集成分类器进行网络异常检测。
{"title":"Detection IoT attacks using Lasso regression algorithm with ensemble classifier","authors":"K. Sheelavathy, V. Udaya Rani","doi":"10.1108/ijpcc-09-2022-0316","DOIUrl":"https://doi.org/10.1108/ijpcc-09-2022-0316","url":null,"abstract":"\u0000Purpose\u0000Internet of Things (IoT) is a network, which provides the connection with various physical objects such as smart machines, smart home appliance and so on. The physical objects are allocated with a unique internet address, namely, Internet Protocol, which is used to perform the data broadcasting with the external objects using the internet. The sudden increment in the number of attacks generated by intruders, causes security-related problems in IoT devices while performing the communication. The main purpose of this paper is to develop an effective attack detection to enhance the robustness against the attackers in IoT.\u0000\u0000\u0000Design/methodology/approach\u0000In this research, the lasso regression algorithm is proposed along with ensemble classifier for identifying the IoT attacks. The lasso algorithm is used for the process of feature selection that modeled fewer parameters for the sparse models. The type of regression is analyzed for showing higher levels when certain parts of model selection is needed for parameter elimination. The lasso regression obtains the subset for predictors to lower the prediction error with respect to the quantitative response variable. The lasso does not impose a constraint for modeling the parameters caused the coefficients with some variables shrink as zero. The selected features are classified by using an ensemble classifier, that is important for linear and nonlinear types of data in the dataset, and the models are combined for handling these data types.\u0000\u0000\u0000Findings\u0000The lasso regression with ensemble classifier–based attack classification comprises distributed denial-of-service and Mirai botnet attacks which achieved an improved accuracy of 99.981% than the conventional deep neural network (DNN) methods.\u0000\u0000\u0000Originality/value\u0000Here, an efficient lasso regression algorithm is developed for extracting the features to perform the network anomaly detection using ensemble classifier.\u0000","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":" ","pages":""},"PeriodicalIF":2.6,"publicationDate":"2022-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48085826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Embedding and Siamese deep neural network-based malware detection in Internet of Things 物联网中的嵌入和暹罗深度神经网络恶意软件检测
IF 2.6 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2022-11-07 DOI: 10.1108/ijpcc-06-2022-0236
T. S. Lakshmi, M. Govindarajan, Asadi Srinivasulu
PurposeA proper understanding of malware characteristics is necessary to protect massive data generated because of the advances in Internet of Things (IoT), big data and the cloud. Because of the encryption techniques used by the attackers, network security experts struggle to develop an efficient malware detection technique. Though few machine learning-based techniques are used by researchers for malware detection, large amounts of data must be processed and detection accuracy needs to be improved for efficient malware detection. Deep learning-based methods have gained significant momentum in recent years for the accurate detection of malware. The purpose of this paper is to create an efficient malware detection system for the IoT using Siamese deep neural networks.Design/methodology/approachIn this work, a novel Siamese deep neural network system with an embedding vector is proposed. Siamese systems have generated significant interest because of their capacity to pick up a significant portion of the input. The proposed method is efficient in malware detection in the IoT because it learns from a few records to improve forecasts. The goal is to determine the evolution of malware similarity in emerging domains of technology.FindingsThe cloud platform is used to perform experiments on the Malimg data set. ResNet50 was pretrained as a component of the subsystem that established embedding. Each system reviews a set of input documents to determine whether they belong to the same family. The results of the experiments show that the proposed method outperforms existing techniques in terms of accuracy and efficiency.Originality/valueThe proposed work generates an embedding for each input. Each system examined a collection of data files to determine whether they belonged to the same family. Cosine proximity is also used to estimate the vector similarity in a high-dimensional area.
目的正确理解恶意软件的特征对于保护因物联网、大数据和云技术的进步而产生的大量数据是必要的。由于攻击者使用的加密技术,网络安全专家很难开发出有效的恶意软件检测技术。尽管研究人员很少使用基于机器学习的技术进行恶意软件检测,但必须处理大量数据,并且需要提高检测精度才能有效检测恶意软件。近年来,基于深度学习的方法在准确检测恶意软件方面取得了显著进展。本文的目的是使用暹罗深度神经网络为物联网创建一个高效的恶意软件检测系统。设计/方法论/方法在这项工作中,提出了一种新的带有嵌入向量的暹罗深度神经网络系统。暹罗系统已经引起了人们的极大兴趣,因为它们能够接收很大一部分输入。所提出的方法在物联网中的恶意软件检测中是有效的,因为它从一些记录中学习以改进预测。目标是确定新兴技术领域中恶意软件相似性的演变。Findings云平台用于对Malimg数据集进行实验。ResNet50作为建立嵌入的子系统的一个组件进行了预训练。每个系统都会查看一组输入文档,以确定它们是否属于同一个族。实验结果表明,该方法在精度和效率方面优于现有技术。创意/价值建议的作品为每个输入生成一个嵌入。每个系统都检查了一组数据文件,以确定它们是否属于同一个族。余弦邻近度也用于估计高维区域中的向量相似性。
{"title":"Embedding and Siamese deep neural network-based malware detection in Internet of Things","authors":"T. S. Lakshmi, M. Govindarajan, Asadi Srinivasulu","doi":"10.1108/ijpcc-06-2022-0236","DOIUrl":"https://doi.org/10.1108/ijpcc-06-2022-0236","url":null,"abstract":"\u0000Purpose\u0000A proper understanding of malware characteristics is necessary to protect massive data generated because of the advances in Internet of Things (IoT), big data and the cloud. Because of the encryption techniques used by the attackers, network security experts struggle to develop an efficient malware detection technique. Though few machine learning-based techniques are used by researchers for malware detection, large amounts of data must be processed and detection accuracy needs to be improved for efficient malware detection. Deep learning-based methods have gained significant momentum in recent years for the accurate detection of malware. The purpose of this paper is to create an efficient malware detection system for the IoT using Siamese deep neural networks.\u0000\u0000\u0000Design/methodology/approach\u0000In this work, a novel Siamese deep neural network system with an embedding vector is proposed. Siamese systems have generated significant interest because of their capacity to pick up a significant portion of the input. The proposed method is efficient in malware detection in the IoT because it learns from a few records to improve forecasts. The goal is to determine the evolution of malware similarity in emerging domains of technology.\u0000\u0000\u0000Findings\u0000The cloud platform is used to perform experiments on the Malimg data set. ResNet50 was pretrained as a component of the subsystem that established embedding. Each system reviews a set of input documents to determine whether they belong to the same family. The results of the experiments show that the proposed method outperforms existing techniques in terms of accuracy and efficiency.\u0000\u0000\u0000Originality/value\u0000The proposed work generates an embedding for each input. Each system examined a collection of data files to determine whether they belonged to the same family. Cosine proximity is also used to estimate the vector similarity in a high-dimensional area.\u0000","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":" ","pages":""},"PeriodicalIF":2.6,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41616960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving GPU performance in multimedia applications through FPGA based adaptive DMA controller 通过FPGA自适应DMA控制器提高多媒体应用中GPU的性能
IF 2.6 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2022-10-17 DOI: 10.1108/ijpcc-06-2022-0241
S. B, K. E.
PurposeDeep learning techniques are unavoidable in a variety of domains such as health care, computer vision, cyber-security and so on. These algorithms demand high data transfers but require bottlenecks in achieving the high speed and low latency synchronization while being implemented in the real hardware architectures. Though direct memory access controller (DMAC) has gained a brighter light of research for achieving bulk data transfers, existing direct memory access (DMA) systems continue to face the challenges of achieving high-speed communication. The purpose of this study is to develop an adaptive-configured DMA architecture for bulk data transfer with high throughput and less time-delayed computation.Design/methodology/approachThe proposed methodology consists of a heterogeneous computing system integrated with specialized hardware and software. For the hardware, the authors propose an field programmable gate array (FPGA)-based DMAC, which transfers the data to the graphics processing unit (GPU) using PCI-Express. The workload characterization technique is designed using Python software and is implementable for the advanced risk machine Cortex architecture with a suitable communication interface. This module offloads the input streams of data to the FPGA and initiates the FPGA for the control flow of data to the GPU that can achieve efficient processing.FindingsThis paper presents an evaluation of a configurable workload-based DMA controller for collecting the data from the input devices and concurrently applying it to the GPU architecture, bypassing the hardware and software extraneous copies and bottlenecks via PCI Express. It also investigates the usage of adaptive DMA memory buffer allocation and workload characterization techniques. The proposed DMA architecture is compared with the other existing DMA architectures in which the performance of the proposed DMAC outperforms traditional DMA by achieving 96% throughput and 50% less latency synchronization.Originality/valueThe proposed gated recurrent unit has produced 95.6% accuracy in characterization of the workloads into heavy, medium and normal. The proposed model has outperformed the other algorithms and proves its strength for workload characterization.
目的深度学习技术在医疗保健、计算机视觉、网络安全等领域是不可避免的。这些算法需要高数据传输,但在实际硬件架构中实现时,在实现高速和低延迟同步方面需要瓶颈。尽管直接存储器存取控制器(DMAC)在实现大容量数据传输方面获得了更光明的研究前景,但现有的直接存储器存取(DMA)系统仍然面临着实现高速通信的挑战。本研究的目的是开发一种自适应配置的DMA架构,用于具有高吞吐量和较少时延计算的批量数据传输。设计/方法论/方法论所提出的方法论由集成了专用硬件和软件的异构计算系统组成。在硬件方面,作者提出了一种基于现场可编程门阵列(FPGA)的DMAC,它使用PCI Express将数据传输到图形处理单元(GPU)。工作负载表征技术是使用Python软件设计的,并且可以在具有适当通信接口的高级风险机器Cortex架构中实现。该模块将输入数据流卸载到FPGA,并启动FPGA以控制到GPU的数据流,从而实现高效处理。发现本文对一种基于可配置工作负载的DMA控制器进行了评估,该控制器用于从输入设备收集数据,并同时将其应用于GPU架构,通过PCI Express绕过硬件和软件无关的副本和瓶颈。它还研究了自适应DMA内存缓冲区分配和工作负载表征技术的使用。将所提出的DMA架构与其他现有DMA架构进行比较,其中所提出的DMAC的性能优于传统DMA,实现了96%的吞吐量和50%的延迟同步。独创性/价值所提出的门控递归单元在将工作量分为重、中和正常时的准确率为95.6%。所提出的模型优于其他算法,并证明了其在工作负载表征方面的优势。
{"title":"Improving GPU performance in multimedia applications through FPGA based adaptive DMA controller","authors":"S. B, K. E.","doi":"10.1108/ijpcc-06-2022-0241","DOIUrl":"https://doi.org/10.1108/ijpcc-06-2022-0241","url":null,"abstract":"\u0000Purpose\u0000Deep learning techniques are unavoidable in a variety of domains such as health care, computer vision, cyber-security and so on. These algorithms demand high data transfers but require bottlenecks in achieving the high speed and low latency synchronization while being implemented in the real hardware architectures. Though direct memory access controller (DMAC) has gained a brighter light of research for achieving bulk data transfers, existing direct memory access (DMA) systems continue to face the challenges of achieving high-speed communication. The purpose of this study is to develop an adaptive-configured DMA architecture for bulk data transfer with high throughput and less time-delayed computation.\u0000\u0000\u0000Design/methodology/approach\u0000The proposed methodology consists of a heterogeneous computing system integrated with specialized hardware and software. For the hardware, the authors propose an field programmable gate array (FPGA)-based DMAC, which transfers the data to the graphics processing unit (GPU) using PCI-Express. The workload characterization technique is designed using Python software and is implementable for the advanced risk machine Cortex architecture with a suitable communication interface. This module offloads the input streams of data to the FPGA and initiates the FPGA for the control flow of data to the GPU that can achieve efficient processing.\u0000\u0000\u0000Findings\u0000This paper presents an evaluation of a configurable workload-based DMA controller for collecting the data from the input devices and concurrently applying it to the GPU architecture, bypassing the hardware and software extraneous copies and bottlenecks via PCI Express. It also investigates the usage of adaptive DMA memory buffer allocation and workload characterization techniques. The proposed DMA architecture is compared with the other existing DMA architectures in which the performance of the proposed DMAC outperforms traditional DMA by achieving 96% throughput and 50% less latency synchronization.\u0000\u0000\u0000Originality/value\u0000The proposed gated recurrent unit has produced 95.6% accuracy in characterization of the workloads into heavy, medium and normal. The proposed model has outperformed the other algorithms and proves its strength for workload characterization.\u0000","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":" ","pages":""},"PeriodicalIF":2.6,"publicationDate":"2022-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46957573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ElGamal algorithm with hyperchaotic sequence to enhance security of cloud data 基于超混沌序列的ElGamal算法增强云数据的安全性
IF 2.6 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2022-10-13 DOI: 10.1108/ijpcc-06-2022-0240
Aruna Kumari Koppaka, V. N. Lakshmi
PurposeIn the cloud-computing environment, privacy preservation and enabling security to the cloud data is a crucial and demanding task. In both the commercial and academic world, the privacy of important and sensitive data needs to be safeguarded from unauthorized users to improve its security. Therefore, several key generations, encryption and decryption algorithms are developed for data privacy preservation in the cloud environment. Still, the outsourced data remains with the problems like minimum data security, time consumption and increased computational complexity. The purpose of this research study is to develop an effective cryptosystem algorithm to secure the outsourced data with minimum computational complexity.Design/methodology/approachA new cryptosystem algorithm is proposed in this paper to address the above-mentioned concerns. The introduced cryptosystem algorithm has combined the ElGamal algorithm and hyperchaotic sequence, which effectively encrypts the outsourced data and diminishes the computational complexity of the system.FindingsIn the resulting section, the proposed improved ElGamal cryptosystem (IEC) algorithm performance is validated using the performance metrics like encryption time, execution time, decryption time and key generation comparison time. The IEC algorithm approximately reduced 0.08–1.786 ms of encryption and decryption time compared to the existing model: secure data deletion and verification.Originality/valueThe IEC algorithm significantly enhances the data security in cloud environments by increasing the power of key pairs. In this manuscript, the conventional ElGamal algorithm is integrated with the pseudorandom sequences for a pseudorandom key generation for improving the outsourced cloud data security.
目的在云计算环境下,对云数据进行隐私保护和安全保护是一项至关重要且要求很高的任务。无论是在商业领域还是学术界,都需要保护重要敏感数据的隐私,防止未经授权的用户使用,以提高其安全性。因此,针对云环境下的数据隐私保护,开发了几种密钥生成、加密和解密算法。尽管如此,外包数据仍然存在数据安全性最低、耗时和计算复杂性增加等问题。本研究的目的是开发一种有效的密码系统算法,以最小的计算复杂度来保护外包数据。设计/方法/方法本文提出了一种新的密码系统算法来解决上述问题。该算法将ElGamal算法与超混沌序列相结合,有效地对外包数据进行加密,降低了系统的计算复杂度。在结果部分中,使用诸如加密时间、执行时间、解密时间和密钥生成比较时间等性能指标验证了所提出的改进的ElGamal密码系统(IEC)算法的性能。与现有模型相比,IEC算法大约减少了0.08-1.786 ms的加密和解密时间:安全的数据删除和验证。原创性/价值IEC算法通过增加密钥对的能力显著提高了云环境中的数据安全性。本文将传统的ElGamal算法与伪随机序列相结合,生成伪随机密钥,以提高外包云数据的安全性。
{"title":"ElGamal algorithm with hyperchaotic sequence to enhance security of cloud data","authors":"Aruna Kumari Koppaka, V. N. Lakshmi","doi":"10.1108/ijpcc-06-2022-0240","DOIUrl":"https://doi.org/10.1108/ijpcc-06-2022-0240","url":null,"abstract":"\u0000Purpose\u0000In the cloud-computing environment, privacy preservation and enabling security to the cloud data is a crucial and demanding task. In both the commercial and academic world, the privacy of important and sensitive data needs to be safeguarded from unauthorized users to improve its security. Therefore, several key generations, encryption and decryption algorithms are developed for data privacy preservation in the cloud environment. Still, the outsourced data remains with the problems like minimum data security, time consumption and increased computational complexity. The purpose of this research study is to develop an effective cryptosystem algorithm to secure the outsourced data with minimum computational complexity.\u0000\u0000\u0000Design/methodology/approach\u0000A new cryptosystem algorithm is proposed in this paper to address the above-mentioned concerns. The introduced cryptosystem algorithm has combined the ElGamal algorithm and hyperchaotic sequence, which effectively encrypts the outsourced data and diminishes the computational complexity of the system.\u0000\u0000\u0000Findings\u0000In the resulting section, the proposed improved ElGamal cryptosystem (IEC) algorithm performance is validated using the performance metrics like encryption time, execution time, decryption time and key generation comparison time. The IEC algorithm approximately reduced 0.08–1.786 ms of encryption and decryption time compared to the existing model: secure data deletion and verification.\u0000\u0000\u0000Originality/value\u0000The IEC algorithm significantly enhances the data security in cloud environments by increasing the power of key pairs. In this manuscript, the conventional ElGamal algorithm is integrated with the pseudorandom sequences for a pseudorandom key generation for improving the outsourced cloud data security.\u0000","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":" ","pages":""},"PeriodicalIF":2.6,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42526360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Source location privacy preservation in IoT-enabled event-driven WSNs 物联网事件驱动的无线传感器网络中的源位置隐私保护
IF 2.6 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2022-10-10 DOI: 10.1108/ijpcc-05-2022-0214
Nidhi Sharma, Ravindara Bhatt
PurposePrivacy preservation is a significant concern in Internet of Things (IoT)-enabled event-driven wireless sensor networks (WSNs). Low energy utilization in the event-driven system is essential if events do not happen. When events occur, IoT-enabled sensor network is required to deal with enormous traffic from the concentration of demand data delivery. This paper aims to explore an effective framework for safeguarding privacy at source in event-driven WSNs.Design/methodology/approachThis paper discusses three algorithms in IoT-enabled event-driven WSNs: source location privacy for event detection (SLP_ED), chessboard alteration pattern (SLP_ED_CBA) and grid-based source location privacy (GB_SLP). Performance evaluation is done using simulation results and security analysis of the proposed scheme.FindingsThe sensors observe bound events or sensitive items within the network area in the field of interest. The open wireless channel lets an opponent search traffic designs, trace back and reach the start node or the event-detecting node. SLP_ED and SLP_ED_CBA provide better safety level results than dynamic shortest path scheme and energy-efficient source location privacy protection schemes. This paper discusses security analysis for the GB_SLP. Comparative analysis shows that the proposed scheme is more efficient on safety level than existing techniques.Originality/valueThe authors develop the privacy protection scheme in IoT-enabled event-driven WSNs. There are two categories of occurrences: nominal events and critical events. The choice of the route from source to sink relies on the two types of events: nominal or critical; the privacy level required for an event; and the energy consumption needed for the event. In addition, phantom node selection scheme is designed for source location privacy.
在支持物联网(IoT)的事件驱动无线传感器网络(wsn)中,隐私保护是一个重要问题。如果事件不发生,事件驱动系统中的低能量利用率是必不可少的。当事件发生时,需要启用物联网的传感器网络来处理来自需求数据交付集中的巨大流量。本文旨在探索一种有效的事件驱动wsn源隐私保护框架。本文讨论了物联网事件驱动wsn中的三种算法:用于事件检测的源位置隐私(SLP_ED)、棋盘改变模式(SLP_ED_CBA)和基于网格的源位置隐私(GB_SLP)。利用仿真结果对该方案进行了性能评估和安全性分析。传感器在感兴趣的领域观察网络区域内的绑定事件或敏感项目。开放的无线信道允许对手搜索流量设计,跟踪并到达开始节点或事件检测节点。SLP_ED和SLP_ED_CBA提供了比动态最短路径方案和节能源位置隐私保护方案更好的安全级别结果。本文讨论了GB_SLP的安全性分析。对比分析表明,该方案在安全水平上优于现有方案。原创性/价值作者在支持物联网的事件驱动wsn中开发了隐私保护方案。事件有两类:名义事件和关键事件。从源到接收的路由选择依赖于两种类型的事件:名义事件或关键事件;事件所需的隐私级别;以及活动所需的能量消耗。此外,为了保证源位置的隐私性,设计了虚拟节点选择方案。
{"title":"Source location privacy preservation in IoT-enabled event-driven WSNs","authors":"Nidhi Sharma, Ravindara Bhatt","doi":"10.1108/ijpcc-05-2022-0214","DOIUrl":"https://doi.org/10.1108/ijpcc-05-2022-0214","url":null,"abstract":"\u0000Purpose\u0000Privacy preservation is a significant concern in Internet of Things (IoT)-enabled event-driven wireless sensor networks (WSNs). Low energy utilization in the event-driven system is essential if events do not happen. When events occur, IoT-enabled sensor network is required to deal with enormous traffic from the concentration of demand data delivery. This paper aims to explore an effective framework for safeguarding privacy at source in event-driven WSNs.\u0000\u0000\u0000Design/methodology/approach\u0000This paper discusses three algorithms in IoT-enabled event-driven WSNs: source location privacy for event detection (SLP_ED), chessboard alteration pattern (SLP_ED_CBA) and grid-based source location privacy (GB_SLP). Performance evaluation is done using simulation results and security analysis of the proposed scheme.\u0000\u0000\u0000Findings\u0000The sensors observe bound events or sensitive items within the network area in the field of interest. The open wireless channel lets an opponent search traffic designs, trace back and reach the start node or the event-detecting node. SLP_ED and SLP_ED_CBA provide better safety level results than dynamic shortest path scheme and energy-efficient source location privacy protection schemes. This paper discusses security analysis for the GB_SLP. Comparative analysis shows that the proposed scheme is more efficient on safety level than existing techniques.\u0000\u0000\u0000Originality/value\u0000The authors develop the privacy protection scheme in IoT-enabled event-driven WSNs. There are two categories of occurrences: nominal events and critical events. The choice of the route from source to sink relies on the two types of events: nominal or critical; the privacy level required for an event; and the energy consumption needed for the event. In addition, phantom node selection scheme is designed for source location privacy.\u0000","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":" ","pages":""},"PeriodicalIF":2.6,"publicationDate":"2022-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48589771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A load-balanced hybrid heuristic for allocation of batch of tasks in cloud computing environment 一种云计算环境下任务批量分配的负载平衡混合启发式算法
IF 2.6 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2022-10-05 DOI: 10.1108/ijpcc-06-2022-0220
Sophiya Shiekh, Mohammad Shahid, Manas Sambare, R. Haidri, D. Yadav
PurposeCloud computing gives several on-demand infrastructural services by dynamically pooling heterogeneous resources to cater to users’ applications. The task scheduling needs to be done optimally to achieve proficient results in a cloud computing environment. While satisfying the user’s requirements in a cloud environment, scheduling has been proven an NP-hard problem. Therefore, it leaves scope to develop new allocation models for the problem. The aim of the study is to develop load balancing method to maximize the resource utilization in cloud environment.Design/methodology/approachIn this paper, the parallelized task allocation with load balancing (PTAL) hybrid heuristic is proposed for jobs coming from various users. These jobs are allocated on the resources one by one in a parallelized manner as they arrive in the cloud system. The novel algorithm works in three phases: parallelization, task allocation and task reallocation. The proposed model is designed for efficient task allocation, reallocation of resources and adequate load balancing to achieve better quality of service (QoS) results.FindingsThe acquired empirical results show that PTAL performs better than other scheduling strategies under various cases for different QoS parameters under study.Originality/valueThe outcome has been examined for the real data set to evaluate it with different state-of-the-art heuristics having comparable objective parameters.
PurposeCloud计算通过动态汇集异构资源来满足用户的应用程序,从而提供多种按需基础设施服务。需要优化任务调度,以在云计算环境中获得熟练的结果。在云环境中满足用户需求的同时,调度已被证明是一个NP难题。因此,它为开发新的分配模型留下了空间。本研究的目的是开发负载平衡方法,以最大限度地提高云环境中的资源利用率。设计/方法论/方法本文针对来自不同用户的作业,提出了负载平衡并行任务分配(PTAL)混合启发式算法。这些作业在到达云系统时以并行方式逐个分配到资源上。该算法分为三个阶段:并行化、任务分配和任务重新分配。所提出的模型旨在实现高效的任务分配、资源的重新分配和充分的负载平衡,以获得更好的服务质量(QoS)结果。实验结果表明,在不同的QoS参数下,PTAL在各种情况下都比其他调度策略表现得更好。原创性/价值已经对真实数据集的结果进行了检查,以使用具有可比目标参数的不同最先进的启发式方法对其进行评估。
{"title":"A load-balanced hybrid heuristic for allocation of batch of tasks in cloud computing environment","authors":"Sophiya Shiekh, Mohammad Shahid, Manas Sambare, R. Haidri, D. Yadav","doi":"10.1108/ijpcc-06-2022-0220","DOIUrl":"https://doi.org/10.1108/ijpcc-06-2022-0220","url":null,"abstract":"\u0000Purpose\u0000Cloud computing gives several on-demand infrastructural services by dynamically pooling heterogeneous resources to cater to users’ applications. The task scheduling needs to be done optimally to achieve proficient results in a cloud computing environment. While satisfying the user’s requirements in a cloud environment, scheduling has been proven an NP-hard problem. Therefore, it leaves scope to develop new allocation models for the problem. The aim of the study is to develop load balancing method to maximize the resource utilization in cloud environment.\u0000\u0000\u0000Design/methodology/approach\u0000In this paper, the parallelized task allocation with load balancing (PTAL) hybrid heuristic is proposed for jobs coming from various users. These jobs are allocated on the resources one by one in a parallelized manner as they arrive in the cloud system. The novel algorithm works in three phases: parallelization, task allocation and task reallocation. The proposed model is designed for efficient task allocation, reallocation of resources and adequate load balancing to achieve better quality of service (QoS) results.\u0000\u0000\u0000Findings\u0000The acquired empirical results show that PTAL performs better than other scheduling strategies under various cases for different QoS parameters under study.\u0000\u0000\u0000Originality/value\u0000The outcome has been examined for the real data set to evaluate it with different state-of-the-art heuristics having comparable objective parameters.\u0000","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":" ","pages":""},"PeriodicalIF":2.6,"publicationDate":"2022-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46539485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enhanced cipher text-policy attribute-based encryption and serialization on media cloud data 媒体云数据增强的基于密文策略属性的加密和序列化
IF 2.6 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2022-10-05 DOI: 10.1108/ijpcc-06-2022-0223
M. R., H. M. T. Gadiyar, Sharath S. M., M. Bharathrajkumar, S. K
PurposeThere are various system techniques or models which are used for access control by performing cryptographic operations and characterizing to provide an efficient cloud and in Internet of Things (IoT) access control. Particularly in cloud computing environment, there is a large-scale distribution of these traditional symmetric cryptographic techniques. These symmetric cryptographic techniques use the same key for encryption and decryption processes. However, during the execution of these phases, they are under the problems of key distribution and management. The purpose of this study is to provide efficient key management and key distribution in cloud computing environment.Design/methodology/approachThis paper uses the Cipher text-Policy Attribute-Based Encryption (CP-ABE) technique with proper access control policy which is used to provide the data owner’s control and share the data through encryption process in Cloud and IoT environment. The data are shared with the the help of cloud storage, even in presence of authorized users. The main method used in this research is Enhanced CP-ABE Serialization (E-CP-ABES) approach.FindingsThe results are measured by means of encryption, completion and decryption time that showed better results when compared with the existing CP-ABE technique. The comparative analysis has showed that the proposed E-CP-ABES has obtained better results of 2373 ms for completion time for 256 key lengths, whereas the existing CP-ABE has obtained 3129 ms of completion time. In addition to this, the existing Advanced Encryption Standard (AES) scheme showed 3449 ms of completion time.Originality/valueThe proposed research work uses an E-CP-ABES access control technique that verifies the hidden attributes having a very sensitive dataset constraint and provides solution to the key management problem and access control mechanism existing in IOT and cloud computing environment. The novelty of the research is that the proposed E-CP-ABES incorporates extensible, partially hidden constraint policy by using a process known as serialization procedure and it serializes to a byte stream. Redundant residue number system is considered to remove errors that occur during the processing of bits or data obtained from the serialization. The data stream is recovered using the Deserialization process.
目的通过执行加密操作和特征来提供有效的云和物联网(IoT)访问控制,有各种系统技术或模型用于访问控制。特别是在云计算环境中,这些传统的对称加密技术大规模分布。这些对称加密技术对加密和解密过程使用相同的密钥。然而,在这些阶段的执行过程中,它们都面临着密钥分配和管理的问题。本研究的目的在于提供云端运算环境下有效的密钥管理与密钥分配。设计/方法/方法本文采用Cipher - text-Policy Attribute-Based Encryption (CP-ABE)技术,采用适当的访问控制策略,在云和物联网环境中通过加密过程提供数据所有者的控制和共享数据。数据在云存储的帮助下共享,甚至在授权用户在场的情况下也是如此。本研究采用的主要方法是增强型CP-ABE串行化(e -CP-ABE)方法。结果通过加密时间、完成时间和解密时间来衡量,与现有的CP-ABE技术相比,结果更好。对比分析表明,本文提出的e -CP-ABE在256个密钥长度下完成时间为2373 ms,而现有的CP-ABE完成时间为3129 ms。除此之外,现有的高级加密标准(AES)方案的完成时间为3449毫秒。本研究采用E-CP-ABES访问控制技术,验证具有非常敏感的数据集约束的隐藏属性,解决物联网和云计算环境中存在的密钥管理问题和访问控制机制。该研究的新颖之处在于,所提出的E-CP-ABES通过使用一个称为序列化过程的过程结合了可扩展的、部分隐藏的约束策略,并将其序列化为字节流。冗余余数系统被认为是为了消除在处理串行化中获得的位或数据时发生的错误。使用反序列化过程恢复数据流。
{"title":"Enhanced cipher text-policy attribute-based encryption and serialization on media cloud data","authors":"M. R., H. M. T. Gadiyar, Sharath S. M., M. Bharathrajkumar, S. K","doi":"10.1108/ijpcc-06-2022-0223","DOIUrl":"https://doi.org/10.1108/ijpcc-06-2022-0223","url":null,"abstract":"\u0000Purpose\u0000There are various system techniques or models which are used for access control by performing cryptographic operations and characterizing to provide an efficient cloud and in Internet of Things (IoT) access control. Particularly in cloud computing environment, there is a large-scale distribution of these traditional symmetric cryptographic techniques. These symmetric cryptographic techniques use the same key for encryption and decryption processes. However, during the execution of these phases, they are under the problems of key distribution and management. The purpose of this study is to provide efficient key management and key distribution in cloud computing environment.\u0000\u0000\u0000Design/methodology/approach\u0000This paper uses the Cipher text-Policy Attribute-Based Encryption (CP-ABE) technique with proper access control policy which is used to provide the data owner’s control and share the data through encryption process in Cloud and IoT environment. The data are shared with the the help of cloud storage, even in presence of authorized users. The main method used in this research is Enhanced CP-ABE Serialization (E-CP-ABES) approach.\u0000\u0000\u0000Findings\u0000The results are measured by means of encryption, completion and decryption time that showed better results when compared with the existing CP-ABE technique. The comparative analysis has showed that the proposed E-CP-ABES has obtained better results of 2373 ms for completion time for 256 key lengths, whereas the existing CP-ABE has obtained 3129 ms of completion time. In addition to this, the existing Advanced Encryption Standard (AES) scheme showed 3449 ms of completion time.\u0000\u0000\u0000Originality/value\u0000The proposed research work uses an E-CP-ABES access control technique that verifies the hidden attributes having a very sensitive dataset constraint and provides solution to the key management problem and access control mechanism existing in IOT and cloud computing environment. The novelty of the research is that the proposed E-CP-ABES incorporates extensible, partially hidden constraint policy by using a process known as serialization procedure and it serializes to a byte stream. Redundant residue number system is considered to remove errors that occur during the processing of bits or data obtained from the serialization. The data stream is recovered using the Deserialization process.\u0000","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":" ","pages":""},"PeriodicalIF":2.6,"publicationDate":"2022-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44979570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Novel approach of detecting the black hole attack for vehicular ad-hoc networks based on capability indicators 基于能力指标的车辆自组织网络黑洞攻击检测新方法
IF 2.6 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2022-09-27 DOI: 10.1108/ijpcc-02-2022-0062
Souad El Houssaini, Mohammed-Alamine El Houssaini, Jamal el Kafi
PurposeIn vehicular ad hoc networks (VANETs), the information transmitted is broadcast in a free access environment. Therefore, VANETs are vulnerable against attacks that can directly perturb the performance of the networks and then provoke big fall of capability. Black hole attack is an example such attack, where the attacker node pretends that having the shortest path to the destination node and then drops the packets. This paper aims to present a new method to detect the black hole attack in real-time in a VANET network.Design/methodology/approachThis method is based on capability indicators that are widely used in industrial production processes. If the different capability indicators are greater than 1.33 and the stability ratio (Sr) is greater than 75%, the network is stable and the vehicles are communicating in an environment without the black hole attack. When the malicious nodes representing the black hole attacks are activated one by one, the fall of capability becomes more visible and the network is unstable, out of control and unmanaged, due to the presence of the attacks. The simulations were conducted using NS-3 for the network simulation and simulation of urban mobility for generating the mobility model.FindingsThe proposed mechanism does not impose significant overheads or extensive modifications in the standard Institute of Electrical and Electronics Engineers 802.11p or in the routing protocols. In addition, it can be implemented at any receiving node which allows identifying malicious nodes in real-time. The simulation results demonstrated the effectiveness of proposed scheme to detect the impact of the attack very early, especially with the use of the short-term capability indicators (Cp, Cpk and Cpm) of each performance metrics (throughput and packet loss ratio), which are more efficient at detecting quickly and very early the small deviations over a very short time. This study also calculated another indicator of network stability which is Sr, which allows to make a final decision if the network is under control and that the vehicles are communicating in an environment without the black hole attack.Originality/valueAccording to the best of the authors’ knowledge, the method, using capability indicators for detecting the black hole attack in VANETs, has not been presented previously in the literature.
目的在车载自组织网络(VANET)中,传输的信息在自由接入环境中进行广播。因此,VANET很容易受到攻击,这些攻击会直接干扰网络的性能,然后导致能力大幅下降。黑洞攻击就是这种攻击的一个例子,攻击者节点假装到目的节点的路径最短,然后丢弃数据包。本文旨在提出一种在VANET网络中实时检测黑洞攻击的新方法。设计/方法论/方法该方法基于工业生产过程中广泛使用的能力指标。如果不同的能力指标大于1.33,稳定性比(Sr)大于75%,则网络是稳定的,车辆在没有黑洞攻击的环境中通信。当代表黑洞攻击的恶意节点被逐一激活时,由于攻击的存在,功能的下降变得更加明显,网络不稳定、失控和未被管理。模拟使用NS-3进行网络模拟,并模拟城市流动性以生成流动性模型。发现所提出的机制不会对标准电气和电子工程师协会802.11p或路由协议造成重大开销或大量修改。此外,它可以在任何接收节点实现,这允许实时识别恶意节点。仿真结果证明了所提出的方案在很早检测攻击影响方面的有效性,特别是使用了每个性能指标(吞吐量和丢包率)的短期能力指标(Cp、Cpk和Cpm),它们在很短的时间内更有效地快速、很早地检测小偏差。这项研究还计算了网络稳定性的另一个指标Sr,它可以在网络受到控制以及车辆在没有黑洞攻击的环境中通信的情况下做出最终决定。独创性/价值据作者所知,使用能力指标检测VANET中黑洞攻击的方法以前从未在文献中提出过。
{"title":"Novel approach of detecting the black hole attack for vehicular ad-hoc networks based on capability indicators","authors":"Souad El Houssaini, Mohammed-Alamine El Houssaini, Jamal el Kafi","doi":"10.1108/ijpcc-02-2022-0062","DOIUrl":"https://doi.org/10.1108/ijpcc-02-2022-0062","url":null,"abstract":"\u0000Purpose\u0000In vehicular ad hoc networks (VANETs), the information transmitted is broadcast in a free access environment. Therefore, VANETs are vulnerable against attacks that can directly perturb the performance of the networks and then provoke big fall of capability. Black hole attack is an example such attack, where the attacker node pretends that having the shortest path to the destination node and then drops the packets. This paper aims to present a new method to detect the black hole attack in real-time in a VANET network.\u0000\u0000\u0000Design/methodology/approach\u0000This method is based on capability indicators that are widely used in industrial production processes. If the different capability indicators are greater than 1.33 and the stability ratio (Sr) is greater than 75%, the network is stable and the vehicles are communicating in an environment without the black hole attack. When the malicious nodes representing the black hole attacks are activated one by one, the fall of capability becomes more visible and the network is unstable, out of control and unmanaged, due to the presence of the attacks. The simulations were conducted using NS-3 for the network simulation and simulation of urban mobility for generating the mobility model.\u0000\u0000\u0000Findings\u0000The proposed mechanism does not impose significant overheads or extensive modifications in the standard Institute of Electrical and Electronics Engineers 802.11p or in the routing protocols. In addition, it can be implemented at any receiving node which allows identifying malicious nodes in real-time. The simulation results demonstrated the effectiveness of proposed scheme to detect the impact of the attack very early, especially with the use of the short-term capability indicators (Cp, Cpk and Cpm) of each performance metrics (throughput and packet loss ratio), which are more efficient at detecting quickly and very early the small deviations over a very short time. This study also calculated another indicator of network stability which is Sr, which allows to make a final decision if the network is under control and that the vehicles are communicating in an environment without the black hole attack.\u0000\u0000\u0000Originality/value\u0000According to the best of the authors’ knowledge, the method, using capability indicators for detecting the black hole attack in VANETs, has not been presented previously in the literature.\u0000","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":" ","pages":""},"PeriodicalIF":2.6,"publicationDate":"2022-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42647794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Pervasive Computing and Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1