首页 > 最新文献

International Journal of Pervasive Computing and Communications最新文献

英文 中文
Performance analysis of a cloud-based network analytics system with multiple-source data aggregation 基于云的多源数据聚合网络分析系统的性能分析
IF 2.6 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2022-09-26 DOI: 10.1108/ijpcc-06-2022-0244
T. P. Fowdur, Lavesh Babooram
PurposeThe purpose of this paper is geared towards the capture and analysis of network traffic using an array ofmachine learning (ML) and deep learning (DL) techniques to classify network traffic into different classes and predict network traffic parameters.Design/methodology/approachThe classifier models include k-nearest neighbour (KNN), multilayer perceptron (MLP) and support vector machine (SVM), while the regression models studied are multiple linear regression (MLR) as well as MLP. The analytics were performed on both a local server and a servlet hosted on the international business machines cloud. Moreover, the local server could aggregate data from multiple devices on the network and perform collaborative ML to predict network parameters. With optimised hyperparameters, analytical models were incorporated in the cloud hosted Java servlets that operate on a client–server basis where the back-end communicates with Cloudant databases.FindingsRegarding classification, it was found that KNN performs significantly better than MLP and SVM with a comparative precision gain of approximately 7%, when classifying both Wi-Fi and long term evolution (LTE) traffic.Originality/valueCollaborative regression models using traffic collected from two devices were experimented and resulted in an increased average accuracy of 0.50% for all variables, with a multivariate MLP model.
目的本文的目的是使用机器学习(ML)和深度学习(DL)技术的阵列来捕获和分析网络流量,将网络流量分类为不同的类别并预测网络流量参数。设计/方法/方法分类器模型包括k近邻(KNN)、多层感知器(MLP)和支持向量机(SVM),而所研究的回归模型是多元线性回归(MLR)和MLP。分析是在本地服务器和国际商业机器云上托管的servlet上执行的。此外,本地服务器可以聚合来自网络上多个设备的数据,并执行协作ML来预测网络参数。通过优化的超参数,分析模型被纳入云托管的Java servlet中,这些servlet在客户端-服务器的基础上运行,后端与Cloudant数据库通信。发现关于分类,发现KNN在对Wi-Fi和长期演进(LTE)业务进行分类时,表现明显优于MLP和SVM,相对精度增益约为7%。独创性/价值使用从两个设备收集的流量的协作回归模型进行了实验,并使用多变量MLP模型将所有变量的平均准确度提高了0.50%。
{"title":"Performance analysis of a cloud-based network analytics system with multiple-source data aggregation","authors":"T. P. Fowdur, Lavesh Babooram","doi":"10.1108/ijpcc-06-2022-0244","DOIUrl":"https://doi.org/10.1108/ijpcc-06-2022-0244","url":null,"abstract":"\u0000Purpose\u0000The purpose of this paper is geared towards the capture and analysis of network traffic using an array ofmachine learning (ML) and deep learning (DL) techniques to classify network traffic into different classes and predict network traffic parameters.\u0000\u0000\u0000Design/methodology/approach\u0000The classifier models include k-nearest neighbour (KNN), multilayer perceptron (MLP) and support vector machine (SVM), while the regression models studied are multiple linear regression (MLR) as well as MLP. The analytics were performed on both a local server and a servlet hosted on the international business machines cloud. Moreover, the local server could aggregate data from multiple devices on the network and perform collaborative ML to predict network parameters. With optimised hyperparameters, analytical models were incorporated in the cloud hosted Java servlets that operate on a client–server basis where the back-end communicates with Cloudant databases.\u0000\u0000\u0000Findings\u0000Regarding classification, it was found that KNN performs significantly better than MLP and SVM with a comparative precision gain of approximately 7%, when classifying both Wi-Fi and long term evolution (LTE) traffic.\u0000\u0000\u0000Originality/value\u0000Collaborative regression models using traffic collected from two devices were experimented and resulted in an increased average accuracy of 0.50% for all variables, with a multivariate MLP model.\u0000","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":" ","pages":""},"PeriodicalIF":2.6,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43889779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A secure IoT and edge computing based EV selection model in V2G systems using ant colony optimization algorithm 基于蚁群优化算法的安全物联网和边缘计算的V2G系统电动汽车选择模型
IF 2.6 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2022-09-21 DOI: 10.1108/ijpcc-06-2022-0245
Gopinath Anjinappa, Divakar Bangalore Prabhakar
PurposeThe fluctuations that occurred between the power requirements have shown a higher range of voltage regulations and frequency. The fluctuations are caused because of substantial changes in the energy dissipation. The operational efficiency has been reduced when the power grid is enabled with the help of electric vehicles (EVs) that were created by the power resources. The model showed an active load matching for regulating the power and there occurred a harmonic motion in energy. The main purpose of the proposed research is to handle the energy sources for stabilization which has increased the reliability and improved the power efficiency. This study or paper aims to elaborate the security and privacy challenges present in the vehicle 2 grid (V2G) network and their impact with grid resilience.Design/methodology/approachThe smart framework is proposed which works based on Internet of Things and edge computations that managed to perform an effective V2G operation. Thus, an optimum model for scheduling the charge is designed on each EV to maximize the number of users and selecting the best EV using the proposed ant colony optimization (ACO). At the first, the constructive phase of ACO where the ants in the colony generate the feasible solutions. The constructive phase with local search generates an ACO algorithm that uses the heterogeneous colony of ants and finds effectively the best-known solutions widely to overcome the problem.FindingsThe results obtained by the existing in-circuit serial programming-plug-in electric vehicles model in terms of power usage ranged from 0.94 to 0.96 kWh which was lower when compared to the proposed ACO that showed power usage of 0.995 to 0.939 kWh, respectively, with time. The results showed that the energy aware routed with ACO provided feasible routing solutions for the source node that provided the sensor network at its lifetime and security at the time of authentication.Originality/valueThe proposed ACO is aware of energy routing protocol that has been analyzed and compared with the energy utilization with respect to the sensor area network which uses power resources effectively.
目的:在功率要求之间发生的波动显示出更高的电压调节范围和频率。波动是由于能量耗散的实质性变化引起的。在电力资源创造的电动汽车(ev)的帮助下,电网的运行效率降低了。该模型表现为有源负荷匹配调节功率,且存在能量谐波运动。本文研究的主要目的是对能源进行稳定处理,从而提高了系统的可靠性和效率。本研究或论文旨在阐述车辆2网(V2G)网络中存在的安全和隐私挑战及其对电网弹性的影响。设计/方法/方法提出了基于物联网和边缘计算的智能框架,该框架设法执行有效的V2G操作。在此基础上,设计了每辆电动汽车的最优充电调度模型,以实现用户数量最大化,并利用蚁群算法选择最优电动汽车。首先是蚁群算法的构建阶段,蚁群中的蚂蚁生成可行解。构造阶段与局部搜索生成一种蚁群算法,该算法利用异质蚁群,有效地寻找最知名的解决方案来克服问题。结果现有的在线串行编程插电式电动汽车模型的电量使用结果在0.94 ~ 0.96 kWh之间,与提出的蚁群算法的电量使用结果相比,前者随时间的使用结果分别为0.995 ~ 0.939 kWh。结果表明,基于蚁群算法的能量感知路由为源节点提供了可行的路由方案,保证了传感器网络的生命周期和认证时的安全性。独创性/价值提出的蚁群算法对能量路由协议进行了分析,并与有效利用电力资源的传感器区域网络的能量利用进行了比较。
{"title":"A secure IoT and edge computing based EV selection model in V2G systems using ant colony optimization algorithm","authors":"Gopinath Anjinappa, Divakar Bangalore Prabhakar","doi":"10.1108/ijpcc-06-2022-0245","DOIUrl":"https://doi.org/10.1108/ijpcc-06-2022-0245","url":null,"abstract":"\u0000Purpose\u0000The fluctuations that occurred between the power requirements have shown a higher range of voltage regulations and frequency. The fluctuations are caused because of substantial changes in the energy dissipation. The operational efficiency has been reduced when the power grid is enabled with the help of electric vehicles (EVs) that were created by the power resources. The model showed an active load matching for regulating the power and there occurred a harmonic motion in energy. The main purpose of the proposed research is to handle the energy sources for stabilization which has increased the reliability and improved the power efficiency. This study or paper aims to elaborate the security and privacy challenges present in the vehicle 2 grid (V2G) network and their impact with grid resilience.\u0000\u0000\u0000Design/methodology/approach\u0000The smart framework is proposed which works based on Internet of Things and edge computations that managed to perform an effective V2G operation. Thus, an optimum model for scheduling the charge is designed on each EV to maximize the number of users and selecting the best EV using the proposed ant colony optimization (ACO). At the first, the constructive phase of ACO where the ants in the colony generate the feasible solutions. The constructive phase with local search generates an ACO algorithm that uses the heterogeneous colony of ants and finds effectively the best-known solutions widely to overcome the problem.\u0000\u0000\u0000Findings\u0000The results obtained by the existing in-circuit serial programming-plug-in electric vehicles model in terms of power usage ranged from 0.94 to 0.96 kWh which was lower when compared to the proposed ACO that showed power usage of 0.995 to 0.939 kWh, respectively, with time. The results showed that the energy aware routed with ACO provided feasible routing solutions for the source node that provided the sensor network at its lifetime and security at the time of authentication.\u0000\u0000\u0000Originality/value\u0000The proposed ACO is aware of energy routing protocol that has been analyzed and compared with the energy utilization with respect to the sensor area network which uses power resources effectively.\u0000","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":" ","pages":""},"PeriodicalIF":2.6,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43162379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
LMH-RPL: a load balancing and mobility aware secure hybrid routing protocol for low power lossy network LMH-RPL:用于低功耗网络的负载平衡和移动性感知的安全混合路由协议
IF 2.6 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2022-09-20 DOI: 10.1108/ijpcc-05-2022-0213
R. Cyriac, Saleem Durai M.A.
PurposeRouting protocol for low-power lossy network (RPL) being the de facto routing protocol used by low power lossy networks needs to provide adequate routing service to mobile nodes (MNs) in the network. As RPL is designed to work under constraint power requirements, its route updating frequency is not sufficient for MNs in the network. The purpose of this study is to ensure that MNs enjoy seamless connection throughout the network with minimal handover delay.Design/methodology/approachThis study proposes a load balancing mobility aware secure hybrid – RPL in which static node (SN) identifies route using metrics like expected transmission count, and path delay and parent selection are further refined by working on remaining energy for identifying the primary route and queue availability for secondary route maintenance. MNs identify route with the help of smart timers and by using received signal strength indicator sampling of parent and neighbor nodes. In this work, MNs are also secured against rank attack in RPL.FindingsThis model produces favorable result in terms of packet delivery ratio, delay, energy consumption and number of living nodes in the network when compared with different RPL protocols with mobility support. The proposed model reduces packet retransmission in the network by a large margin by providing load balancing to SNs and seamless connection to MNs.Originality/valueIn this work, a novel algorithm was developed to provide seamless handover for MNs in network. Suitable technique was developed to provide load balancing to SNs in network by maintaining appropriate secondary route.
目的低功耗损耗网络路由协议(RPL)是低功耗损耗网络实际使用的路由协议,需要为网络中的移动节点(MNs)提供足够的路由服务。由于RPL被设计为在受限的功率要求下工作,它的路由更新频率对于网络中的MNs来说是不够的。本研究的目的是确保无线网络在整个网络中以最小的切换延迟享受无缝连接。设计/方法/方法本研究提出了一种负载平衡移动感知安全混合RPL,其中静态节点(SN)使用预期传输计数等指标来识别路由,路径延迟和父节点选择通过剩余能量来识别主路由和用于次要路由维护的队列可用性来进一步改进。MNs利用智能定时器和接收到的信号强度指标采样父节点和邻居节点来识别路由。在这项工作中,MNs也可以防止RPL中的秩攻击。结果与不同的支持移动的RPL协议相比,该模型在分组分发率、时延、能耗和网络活节点数等方面都取得了较好的效果。该模型通过向网络节点提供负载均衡和向网络节点提供无缝连接,大大减少了网络中的数据包重传。本文提出了一种新颖的算法来实现网络中mnns的无缝切换。提出了一种适当的技术,通过保持适当的辅助路由来实现网络中SNs的负载均衡。
{"title":"LMH-RPL: a load balancing and mobility aware secure hybrid routing protocol for low power lossy network","authors":"R. Cyriac, Saleem Durai M.A.","doi":"10.1108/ijpcc-05-2022-0213","DOIUrl":"https://doi.org/10.1108/ijpcc-05-2022-0213","url":null,"abstract":"\u0000Purpose\u0000Routing protocol for low-power lossy network (RPL) being the de facto routing protocol used by low power lossy networks needs to provide adequate routing service to mobile nodes (MNs) in the network. As RPL is designed to work under constraint power requirements, its route updating frequency is not sufficient for MNs in the network. The purpose of this study is to ensure that MNs enjoy seamless connection throughout the network with minimal handover delay.\u0000\u0000\u0000Design/methodology/approach\u0000This study proposes a load balancing mobility aware secure hybrid – RPL in which static node (SN) identifies route using metrics like expected transmission count, and path delay and parent selection are further refined by working on remaining energy for identifying the primary route and queue availability for secondary route maintenance. MNs identify route with the help of smart timers and by using received signal strength indicator sampling of parent and neighbor nodes. In this work, MNs are also secured against rank attack in RPL.\u0000\u0000\u0000Findings\u0000This model produces favorable result in terms of packet delivery ratio, delay, energy consumption and number of living nodes in the network when compared with different RPL protocols with mobility support. The proposed model reduces packet retransmission in the network by a large margin by providing load balancing to SNs and seamless connection to MNs.\u0000\u0000\u0000Originality/value\u0000In this work, a novel algorithm was developed to provide seamless handover for MNs in network. Suitable technique was developed to provide load balancing to SNs in network by maintaining appropriate secondary route.\u0000","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":" ","pages":""},"PeriodicalIF":2.6,"publicationDate":"2022-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43017773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An approach for DoS attack detection in cloud computing using sine cosine anti coronavirus optimized deep maxout network 一种基于正弦反冠状病毒优化深度maxout网络的云计算DoS攻击检测方法
IF 2.6 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2022-09-14 DOI: 10.1108/ijpcc-05-2022-0197
M. Boopathi, Meena Chavan, J. J, Sanjay Kumar
PurposeThe Denial of Service (DoS) attack is a category of intrusion that devours various services and resources of the organization by the dispersal of unusable traffic, so that reliable users are not capable of getting benefit from the services. In general, the DoS attackers preserve their independence by collaborating several victim machines and following authentic network traffic, which makes it more complex to detect the attack. Thus, these issues and demerits faced by existing DoS attack recognition schemes in cloud are specified as a major challenge to inventing a new attack recognition method.Design/methodology/approachThis paper aims to detect DoS attack detection scheme, termed as sine cosine anti coronavirus optimization (SCACVO)-driven deep maxout network (DMN). The recorded log file is considered in this method for the attack detection process. Significant features are chosen based on Pearson correlation in the feature selection phase. The over sampling scheme is applied in the data augmentation phase, and then the attack detection is done using DMN. The DMN is trained by the SCACVO algorithm, which is formed by combining sine cosine optimization and anti-corona virus optimization techniques.FindingsThe SCACVO-based DMN offers maximum testing accuracy, true positive rate and true negative rate of 0.9412, 0.9541 and 0.9178, respectively.Originality/valueThe DoS attack detection using the proposed model is accurate and improves the effectiveness of the detection.
目的DoS (Denial of Service)攻击是一种入侵行为,它通过分散不可用的流量来吞噬组织的各种服务和资源,使可靠的用户无法从服务中获益。通常,DoS攻击者通过协作多台受害机器并跟踪真实的网络流量来保持其独立性,这使得检测攻击变得更加复杂。因此,指出了现有云环境下DoS攻击识别方案所面临的问题和缺点,这是发明一种新的攻击识别方法所面临的主要挑战。本文旨在检测DoS攻击的检测方案,称为正弦余弦抗冠状病毒优化(SCACVO)驱动的深度最大输出网络(DMN)。该方法在攻击检测过程中考虑记录的日志文件。在特征选择阶段,基于Pearson相关性选择重要特征。在数据增强阶段采用过采样方案,然后利用DMN进行攻击检测。DMN采用SCACVO算法进行训练,该算法结合了正弦余弦优化和抗冠状病毒优化技术形成。结果基于scacvo的DMN检测准确率最高,真阳性率为0.9412,真阴性率为0.9541,真阴性率为0.9178。原创性/价值利用该模型进行的DoS攻击检测准确,提高了检测的有效性。
{"title":"An approach for DoS attack detection in cloud computing using sine cosine anti coronavirus optimized deep maxout network","authors":"M. Boopathi, Meena Chavan, J. J, Sanjay Kumar","doi":"10.1108/ijpcc-05-2022-0197","DOIUrl":"https://doi.org/10.1108/ijpcc-05-2022-0197","url":null,"abstract":"\u0000Purpose\u0000The Denial of Service (DoS) attack is a category of intrusion that devours various services and resources of the organization by the dispersal of unusable traffic, so that reliable users are not capable of getting benefit from the services. In general, the DoS attackers preserve their independence by collaborating several victim machines and following authentic network traffic, which makes it more complex to detect the attack. Thus, these issues and demerits faced by existing DoS attack recognition schemes in cloud are specified as a major challenge to inventing a new attack recognition method.\u0000\u0000\u0000Design/methodology/approach\u0000This paper aims to detect DoS attack detection scheme, termed as sine cosine anti coronavirus optimization (SCACVO)-driven deep maxout network (DMN). The recorded log file is considered in this method for the attack detection process. Significant features are chosen based on Pearson correlation in the feature selection phase. The over sampling scheme is applied in the data augmentation phase, and then the attack detection is done using DMN. The DMN is trained by the SCACVO algorithm, which is formed by combining sine cosine optimization and anti-corona virus optimization techniques.\u0000\u0000\u0000Findings\u0000The SCACVO-based DMN offers maximum testing accuracy, true positive rate and true negative rate of 0.9412, 0.9541 and 0.9178, respectively.\u0000\u0000\u0000Originality/value\u0000The DoS attack detection using the proposed model is accurate and improves the effectiveness of the detection.\u0000","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":" ","pages":""},"PeriodicalIF":2.6,"publicationDate":"2022-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46641449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Real-time optimal protocol prediction of quantum key distribution using machine learning 基于机器学习的量子密钥分配实时最优协议预测
IF 2.6 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2022-09-01 DOI: 10.1108/ijpcc-05-2022-0200
A. R., Nayana J. S., Rajarshee Mondal
PurposeThe purpose of optimal protocol prediction and the benefits offered by quantum key distribution (QKD), including unbreakable security, there is a growing interest in the practical realization of quantum communication. Realization of the optimal protocol predictor in quantum key distribution is a critical step toward commercialization of QKD.Design/methodology/approachThe proposed work designs a machine learning model such as K-nearest neighbor algorithm, convolutional neural networks, decision tree (DT), support vector machine and random forest (RF) for optimal protocol selector for quantum key distribution network (QKDN).FindingsBecause of the effectiveness of machine learning methods in predicting effective solutions using data, these models will be the best optimal protocol selectors for achieving high efficiency for QKDN. The results show that the best machine learning method for predicting optimal protocol in QKD is the RF algorithm. It also validates the effectiveness of machine learning in optimal protocol selection.Originality/valueThe proposed work was done using algorithms like the local search algorithm or exhaustive traversal, however the major downside of using these algorithms is that it takes a very long time to revert back results, which is unacceptable for commercial systems. Hence, machine learning methods are proposed to see the effectiveness of prediction for achieving high efficiency.
为了实现最优协议预测,以及量子密钥分发(QKD)提供的不可破解的安全性,人们对量子通信的实际实现越来越感兴趣。量子密钥分配中最优协议预测器的实现是实现量子密钥分配商业化的关键一步。设计/方法/方法本文设计了一种机器学习模型,如k近邻算法、卷积神经网络、决策树(DT)、支持向量机和随机森林(RF),用于量子密钥分发网络(QKDN)的最优协议选择器。由于机器学习方法在使用数据预测有效解决方案方面的有效性,这些模型将成为实现QKDN高效率的最佳协议选择器。结果表明,预测QKD中最优协议的最佳机器学习方法是RF算法。验证了机器学习在最优协议选择中的有效性。原创性/价值建议的工作是使用局部搜索算法或穷举遍历等算法完成的,但是使用这些算法的主要缺点是需要很长时间才能恢复结果,这对于商业系统来说是不可接受的。因此,提出了机器学习方法来观察预测的有效性,以实现高效率。
{"title":"Real-time optimal protocol prediction of quantum key distribution using machine learning","authors":"A. R., Nayana J. S., Rajarshee Mondal","doi":"10.1108/ijpcc-05-2022-0200","DOIUrl":"https://doi.org/10.1108/ijpcc-05-2022-0200","url":null,"abstract":"\u0000Purpose\u0000The purpose of optimal protocol prediction and the benefits offered by quantum key distribution (QKD), including unbreakable security, there is a growing interest in the practical realization of quantum communication. Realization of the optimal protocol predictor in quantum key distribution is a critical step toward commercialization of QKD.\u0000\u0000\u0000Design/methodology/approach\u0000The proposed work designs a machine learning model such as K-nearest neighbor algorithm, convolutional neural networks, decision tree (DT), support vector machine and random forest (RF) for optimal protocol selector for quantum key distribution network (QKDN).\u0000\u0000\u0000Findings\u0000Because of the effectiveness of machine learning methods in predicting effective solutions using data, these models will be the best optimal protocol selectors for achieving high efficiency for QKDN. The results show that the best machine learning method for predicting optimal protocol in QKD is the RF algorithm. It also validates the effectiveness of machine learning in optimal protocol selection.\u0000\u0000\u0000Originality/value\u0000The proposed work was done using algorithms like the local search algorithm or exhaustive traversal, however the major downside of using these algorithms is that it takes a very long time to revert back results, which is unacceptable for commercial systems. Hence, machine learning methods are proposed to see the effectiveness of prediction for achieving high efficiency.\u0000","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":" ","pages":""},"PeriodicalIF":2.6,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46475330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced gray wolf optimization for estimation of time difference of arrival in WSNs 增强型灰狼优化算法在无线传感器网络中的到达时间差估计
IF 2.6 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2022-08-30 DOI: 10.1108/ijpcc-05-2022-0181
D. E, S. A.
PurposeIntelligent prediction of node localization in wireless sensor networks (WSNs) is a major concern for researchers. The huge amount of data generated by modern sensor array systems required computationally efficient calibration techniques. This paper aims to improve localization accuracy by identifying obstacles in the optimization process and network scenarios.Design/methodology/approachThe proposed method is used to incorporate distance estimation between nodes and packet transmission hop counts. This estimation is used in the proposed support vector machine (SVM) to find the network path using a time difference of arrival (TDoA)-based SVM. However, if the data set is noisy, SVM is prone to poor optimization, which leads to overlapping of target classes and the pathways through TDoA. The enhanced gray wolf optimization (EGWO) technique is introduced to eliminate overlapping target classes in the SVM.FindingsThe performance and efficacy of the model using existing TDoA methodologies are analyzed. The simulation results show that the proposed TDoA-EGWO achieves a higher rate of detection efficiency of 98% and control overhead of 97.8% and a better packet delivery ratio than other traditional methods.Originality/valueThe proposed method is successful in detecting the unknown position of the sensor node with a detection rate greater than that of other methods.
目的无线传感器网络中节点定位的智能预测是研究人员关注的一个主要问题。现代传感器阵列系统产生的大量数据需要计算高效的校准技术。本文旨在通过识别优化过程和网络场景中的障碍来提高定位精度。设计/方法/方法所提出的方法用于结合节点之间的距离估计和分组传输跳数。该估计用于所提出的支持向量机(SVM)中,以使用基于到达时间差(TDoA)的SVM来找到网络路径。然而,如果数据集是有噪声的,SVM很容易优化不佳,这会导致目标类和通过TDoA的路径重叠。引入了增强型灰狼优化(EGWO)技术来消除SVM.Findings中的重叠目标类。分析了使用现有TDoA方法的模型的性能和有效性。仿真结果表明,与其他传统方法相比,所提出的TDoA-EGWO实现了98%的检测效率和97.8%的控制开销,并具有更好的分组传递率。独创性/价值所提出的方法在检测传感器节点的未知位置方面取得了成功,检测率高于其他方法。
{"title":"Enhanced gray wolf optimization for estimation of time difference of arrival in WSNs","authors":"D. E, S. A.","doi":"10.1108/ijpcc-05-2022-0181","DOIUrl":"https://doi.org/10.1108/ijpcc-05-2022-0181","url":null,"abstract":"Purpose\u0000Intelligent prediction of node localization in wireless sensor networks (WSNs) is a major concern for researchers. The huge amount of data generated by modern sensor array systems required computationally efficient calibration techniques. This paper aims to improve localization accuracy by identifying obstacles in the optimization process and network scenarios.\u0000\u0000\u0000Design/methodology/approach\u0000The proposed method is used to incorporate distance estimation between nodes and packet transmission hop counts. This estimation is used in the proposed support vector machine (SVM) to find the network path using a time difference of arrival (TDoA)-based SVM. However, if the data set is noisy, SVM is prone to poor optimization, which leads to overlapping of target classes and the pathways through TDoA. The enhanced gray wolf optimization (EGWO) technique is introduced to eliminate overlapping target classes in the SVM.\u0000\u0000\u0000Findings\u0000The performance and efficacy of the model using existing TDoA methodologies are analyzed. The simulation results show that the proposed TDoA-EGWO achieves a higher rate of detection efficiency of 98% and control overhead of 97.8% and a better packet delivery ratio than other traditional methods.\u0000\u0000\u0000Originality/value\u0000The proposed method is successful in detecting the unknown position of the sensor node with a detection rate greater than that of other methods.","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":" ","pages":""},"PeriodicalIF":2.6,"publicationDate":"2022-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46316328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Federate learning on Web browsing data with statically and machine learning technique 利用静态学习和机器学习技术对网页浏览数据进行联合学习
IF 2.6 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2022-08-22 DOI: 10.1108/ijpcc-05-2022-0184
R. Bhimanpallewar, S. Khan, K. Joshil Raj, K. Gulati, N. Bhasin, Roop Raj
PurposeFederation analytics approaches are a present area of study that has already progressed beyond the analysis of metrics and counts. It is possible to acquire aggregated information about on-device data by training machine learning models using federated learning techniques without any of the raw data ever having to leave the devices in the issue. Web browser forensics research has been focused on individual Web browsers or architectural analysis of specific log files rather than on broad topics. This paper aims to propose major tools used for Web browser analysis.Design/methodology/approachEach kind of Web browser has its own unique set of features. This allows the user to choose their preferred browsers or to check out many browsers at once. If a forensic examiner has access to just one Web browser's log files, he/she makes it difficult to determine which sites a person has visited. The agent must thus be capable of analyzing all currently available Web browsers on a single workstation and doing an integrated study of various Web browsers.FindingsFederated learning has emerged as a training paradigm in such settings. Web browser forensics research in general has focused on certain browsers or the computational modeling of specific log files. Internet users engage in a wide range of activities using an internet browser, such as searching for information and sending e-mails.Originality/valueIt is also essential that the investigator have access to user activity when conducting an inquiry. This data, which may be used to assess information retrieval activities, is very critical. In this paper, the authors purposed a major tool used for Web browser analysis. This study's proposed algorithm is capable of protecting data privacy effectively in real-world experiments.
目的联合分析方法是目前的一个研究领域,已经超越了指标和计数的分析。可以通过使用联合学习技术训练机器学习模型来获取关于设备上数据的聚合信息,而不需要任何原始数据离开问题中的设备。Web浏览器取证研究主要集中在单个Web浏览器或特定日志文件的体系结构分析上,而不是广泛的主题。本文旨在提出用于Web浏览器分析的主要工具。设计/方法论/方法每种Web浏览器都有自己独特的功能。这允许用户选择他们喜欢的浏览器,或者一次查看多个浏览器。如果法医只能访问一个Web浏览器的日志文件,他/她将很难确定一个人访问过哪些网站。因此,代理必须能够在单个工作站上分析所有当前可用的Web浏览器,并对各种Web浏览器进行集成研究。发现联合学习已成为此类环境中的一种培训模式。Web浏览器取证研究通常集中在某些浏览器或特定日志文件的计算建模上。互联网用户使用互联网浏览器进行广泛的活动,如搜索信息和发送电子邮件。来源/value调查人员在进行调查时也必须能够访问用户活动。这些数据可用于评估信息检索活动,非常关键。在本文中,作者设计了一个用于Web浏览器分析的主要工具。本研究提出的算法能够在真实世界的实验中有效地保护数据隐私。
{"title":"Federate learning on Web browsing data with statically and machine learning technique","authors":"R. Bhimanpallewar, S. Khan, K. Joshil Raj, K. Gulati, N. Bhasin, Roop Raj","doi":"10.1108/ijpcc-05-2022-0184","DOIUrl":"https://doi.org/10.1108/ijpcc-05-2022-0184","url":null,"abstract":"\u0000Purpose\u0000Federation analytics approaches are a present area of study that has already progressed beyond the analysis of metrics and counts. It is possible to acquire aggregated information about on-device data by training machine learning models using federated learning techniques without any of the raw data ever having to leave the devices in the issue. Web browser forensics research has been focused on individual Web browsers or architectural analysis of specific log files rather than on broad topics. This paper aims to propose major tools used for Web browser analysis.\u0000\u0000\u0000Design/methodology/approach\u0000Each kind of Web browser has its own unique set of features. This allows the user to choose their preferred browsers or to check out many browsers at once. If a forensic examiner has access to just one Web browser's log files, he/she makes it difficult to determine which sites a person has visited. The agent must thus be capable of analyzing all currently available Web browsers on a single workstation and doing an integrated study of various Web browsers.\u0000\u0000\u0000Findings\u0000Federated learning has emerged as a training paradigm in such settings. Web browser forensics research in general has focused on certain browsers or the computational modeling of specific log files. Internet users engage in a wide range of activities using an internet browser, such as searching for information and sending e-mails.\u0000\u0000\u0000Originality/value\u0000It is also essential that the investigator have access to user activity when conducting an inquiry. This data, which may be used to assess information retrieval activities, is very critical. In this paper, the authors purposed a major tool used for Web browser analysis. This study's proposed algorithm is capable of protecting data privacy effectively in real-world experiments.\u0000","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":" ","pages":""},"PeriodicalIF":2.6,"publicationDate":"2022-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41697076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AI federated learning based improvised random Forest classifier with error reduction mechanism for skewed data sets 基于AI联合学习的偏斜数据集简易随机森林分类器
IF 2.6 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2022-08-19 DOI: 10.1108/ijpcc-02-2022-0034
A. More, Dipti P Rana
PurposeReferred data set produces reliable information about the network flows and common attacks meeting with real-world criteria. Accordingly, this study aims to focus on the use of imbalanced intrusion detection benchmark knowledge discovery in database (KDD) data set. KDD data set is most preferably used by many researchers for experimentation and analysis. The proposed algorithm improvised random forest classification with error tuning factors (IRFCETF) deals with experimentation on KDD data set and evaluates the performance of a complete set of network traffic features through IRFCETF.Design/methodology/approachIn the current era of applications, the attention of researchers is immersed by a diverse number of existing time applications that deals with imbalanced data classification (ImDC). Real-time application areas, artificial intelligence (AI), Industrial Internet of Things (IIoT), etc. are dealing ImDC undergo with diverted classification performance due to skewed data distribution (SkDD). There are numerous application areas that deal with SkDD. Many of the data applications in AI and IIoT face the diverted data classification rate in SkDD. In recent advancements, there is an exponential expansion in the volume of computer network data and related application developments. Intrusion detection is one of the demanding applications of ImDC. The proposed study focusses on imbalanced intrusion benchmark data set, KDD data set and other benchmark data set with the proposed IRFCETF approach. IRFCETF justifies the enriched classification performance on imbalanced data set over the existing approach. The purpose of this work is to review imbalanced data applications in numerous application areas including AI and IIoT and tuning the performance with respect to principal component analysis. This study also focusses on the out-of-bag error performance-tuning factor.FindingsExperimental results on KDD data set shows that proposed algorithm gives enriched performance. For referred intrusion detection data set, IRFCETF classification accuracy is 99.57% and error rate is 0.43%.Research limitations/implicationsThis research work extended for further improvements in classification techniques with multiple correspondence analysis (MCA); hierarchical MCA can be focussed with the use of classification models for wide range of skewed data sets.Practical implicationsThe metrics enhancement is measurable and helpful in dealing with intrusion detection systems–related imbalanced applications in current application domains such as security, AI and IIoT digitization. Analytical results show improvised metrics of the proposed approach than other traditional machine learning algorithms. Thus, error-tuning parameter creates a measurable impact on classification accuracy is justified with the proposed IRFCETF.Social implicationsProposed algorithm is useful in numerous IIoT applications such as health care, machinery automation etc.Originalit
PurposeReferred数据集生成有关网络流和常见攻击的可靠信息,这些信息符合真实世界的标准。因此,本研究旨在关注数据库(KDD)数据集中不平衡入侵检测基准知识发现的使用。KDD数据集最适合被许多研究人员用于实验和分析。所提出的具有误差调整因子的简易随机森林分类算法(IRFCETF)在KDD数据集上进行了实验,并通过IRFCETF.设计/方法/方法评估了一整套网络流量特征的性能。在当前的应用时代,研究人员的注意力被处理不平衡数据分类(ImDC)的各种现有时间应用程序所吸引。实时应用领域,人工智能(AI)、工业物联网(IIoT)等正在处理ImDC由于数据分布偏斜(SkDD)而导致的分类性能转移的问题。有许多应用领域涉及SkDD。人工智能和IIoT中的许多数据应用都面临着SkDD中转移的数据分类率。近年来,计算机网络数据量和相关应用程序的发展呈指数级增长。入侵检测是ImDC要求很高的应用之一。本研究采用所提出的IRFCETF方法,重点研究了不平衡入侵基准数据集、KDD数据集和其他基准数据集。与现有方法相比,IRFCETF证明了在不平衡数据集上丰富的分类性能。这项工作的目的是审查包括人工智能和IIoT在内的许多应用领域中的不平衡数据应用,并调整主成分分析的性能。本研究还重点研究了袋外误差性能调谐因子。在KDD数据集上的实验结果表明,该算法具有丰富的性能。对于参考的入侵检测数据集,IRFCETF分类准确率为99.57%,错误率为0.43%。研究局限性/含义本研究工作扩展了多重对应分析(MCA)分类技术的进一步改进;分层MCA可以通过对广泛的偏斜数据集使用分类模型来集中。实际意义度量增强是可测量的,有助于处理当前应用领域中与入侵检测系统相关的不平衡应用,如安全、人工智能和IIoT数字化。分析结果表明,与其他传统的机器学习算法相比,所提出的方法具有即兴的度量。因此,所提出的IRFCETF证明了误差调整参数对分类准确性产生的可衡量的影响。社会含义所提出的算法在许多IIoT应用中都很有用,如医疗保健、机械自动化等。原始性/价值这项研究工作涉及分类度量增强方法IRFCETF。所提出的方法为每种情况产生一个测试集分类,并具有减少错误的机制。
{"title":"AI federated learning based improvised random Forest classifier with error reduction mechanism for skewed data sets","authors":"A. More, Dipti P Rana","doi":"10.1108/ijpcc-02-2022-0034","DOIUrl":"https://doi.org/10.1108/ijpcc-02-2022-0034","url":null,"abstract":"\u0000Purpose\u0000Referred data set produces reliable information about the network flows and common attacks meeting with real-world criteria. Accordingly, this study aims to focus on the use of imbalanced intrusion detection benchmark knowledge discovery in database (KDD) data set. KDD data set is most preferably used by many researchers for experimentation and analysis. The proposed algorithm improvised random forest classification with error tuning factors (IRFCETF) deals with experimentation on KDD data set and evaluates the performance of a complete set of network traffic features through IRFCETF.\u0000\u0000\u0000Design/methodology/approach\u0000In the current era of applications, the attention of researchers is immersed by a diverse number of existing time applications that deals with imbalanced data classification (ImDC). Real-time application areas, artificial intelligence (AI), Industrial Internet of Things (IIoT), etc. are dealing ImDC undergo with diverted classification performance due to skewed data distribution (SkDD). There are numerous application areas that deal with SkDD. Many of the data applications in AI and IIoT face the diverted data classification rate in SkDD. In recent advancements, there is an exponential expansion in the volume of computer network data and related application developments. Intrusion detection is one of the demanding applications of ImDC. The proposed study focusses on imbalanced intrusion benchmark data set, KDD data set and other benchmark data set with the proposed IRFCETF approach. IRFCETF justifies the enriched classification performance on imbalanced data set over the existing approach. The purpose of this work is to review imbalanced data applications in numerous application areas including AI and IIoT and tuning the performance with respect to principal component analysis. This study also focusses on the out-of-bag error performance-tuning factor.\u0000\u0000\u0000Findings\u0000Experimental results on KDD data set shows that proposed algorithm gives enriched performance. For referred intrusion detection data set, IRFCETF classification accuracy is 99.57% and error rate is 0.43%.\u0000\u0000\u0000Research limitations/implications\u0000This research work extended for further improvements in classification techniques with multiple correspondence analysis (MCA); hierarchical MCA can be focussed with the use of classification models for wide range of skewed data sets.\u0000\u0000\u0000Practical implications\u0000The metrics enhancement is measurable and helpful in dealing with intrusion detection systems–related imbalanced applications in current application domains such as security, AI and IIoT digitization. Analytical results show improvised metrics of the proposed approach than other traditional machine learning algorithms. Thus, error-tuning parameter creates a measurable impact on classification accuracy is justified with the proposed IRFCETF.\u0000\u0000\u0000Social implications\u0000Proposed algorithm is useful in numerous IIoT applications such as health care, machinery automation etc.\u0000\u0000\u0000Originalit","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":" ","pages":""},"PeriodicalIF":2.6,"publicationDate":"2022-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42555185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT-based multimodal liveness detection using the fusion of ECG and fingerprint 基于物联网的心电指纹融合多模态动态检测
IF 2.6 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2022-08-16 DOI: 10.1108/ijpcc-10-2021-0248
A. Gona, Subramoniam M.
PurposeBiometric scans using fingerprints are widely used for security purposes. Eventually, for authentication purposes, fingerprint scans are not very reliable because they can be faked by obtaining a sample of the fingerprint of the person. There are a few spoof detection techniques available to reduce the incidence of spoofing of the biometric system. Among them, the most commonly used is the binary classification technique that detects real or fake fingerprints based on the fingerprint samples provided during training. However, this technique fails when it is provided with samples formed using other spoofing techniques that are different from the spoofing techniques covered in the training samples. This paper aims to improve the liveness detection accuracy by fusing electrocardiogram (ECG) and fingerprint.Design/methodology/approachIn this paper, to avoid this limitation, an efficient liveness detection algorithm is developed using the fusion of ECG signals captured from the fingertips and fingerprint data in Internet of Things (IoT) environment. The ECG signal will ensure the detection of real fingerprint samples from fake ones.FindingsSingle model fingerprint methods have some disadvantages, such as noisy data and position of the fingerprint. To overcome this, fusion of both ECG and fingerprint is done so that the combined data improves the detection accuracy.Originality/valueSystem security is improved in this approach, and the fingerprint recognition rate is also improved. IoT-based approach is used in this work to reduce the computation burden of data processing systems.
目的使用指纹的生物识别扫描被广泛用于安全目的。最终,出于身份验证的目的,指纹扫描不是很可靠,因为可以通过获取个人指纹样本来伪造指纹扫描。有一些欺骗检测技术可用于减少生物特征系统的欺骗发生率。其中,最常用的是基于训练期间提供的指纹样本来检测真指纹或假指纹的二进制分类技术。然而,当向该技术提供使用与训练样本中所涵盖的欺骗技术不同的其他欺骗技术形成的样本时,该技术失败。本文旨在通过心电图和指纹的融合来提高活体检测的准确性。设计/方法/方法在本文中,为了避免这一限制,在物联网(IoT)环境中,利用指尖采集的心电信号和指纹数据的融合,开发了一种高效的活体检测算法。心电图信号将确保从假指纹样本中检测出真实指纹样本。查找单模型指纹方法有一些缺点,如数据噪声和指纹位置。为了克服这一点,对心电图和指纹进行了融合,从而组合的数据提高了检测精度。独创性/价值系统的安全性在这种方法中得到了提高,指纹识别率也得到了提高。本工作采用基于物联网的方法来减轻数据处理系统的计算负担。
{"title":"IoT-based multimodal liveness detection using the fusion of ECG and fingerprint","authors":"A. Gona, Subramoniam M.","doi":"10.1108/ijpcc-10-2021-0248","DOIUrl":"https://doi.org/10.1108/ijpcc-10-2021-0248","url":null,"abstract":"\u0000Purpose\u0000Biometric scans using fingerprints are widely used for security purposes. Eventually, for authentication purposes, fingerprint scans are not very reliable because they can be faked by obtaining a sample of the fingerprint of the person. There are a few spoof detection techniques available to reduce the incidence of spoofing of the biometric system. Among them, the most commonly used is the binary classification technique that detects real or fake fingerprints based on the fingerprint samples provided during training. However, this technique fails when it is provided with samples formed using other spoofing techniques that are different from the spoofing techniques covered in the training samples. This paper aims to improve the liveness detection accuracy by fusing electrocardiogram (ECG) and fingerprint.\u0000\u0000\u0000Design/methodology/approach\u0000In this paper, to avoid this limitation, an efficient liveness detection algorithm is developed using the fusion of ECG signals captured from the fingertips and fingerprint data in Internet of Things (IoT) environment. The ECG signal will ensure the detection of real fingerprint samples from fake ones.\u0000\u0000\u0000Findings\u0000Single model fingerprint methods have some disadvantages, such as noisy data and position of the fingerprint. To overcome this, fusion of both ECG and fingerprint is done so that the combined data improves the detection accuracy.\u0000\u0000\u0000Originality/value\u0000System security is improved in this approach, and the fingerprint recognition rate is also improved. IoT-based approach is used in this work to reduce the computation burden of data processing systems.\u0000","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":" ","pages":""},"PeriodicalIF":2.6,"publicationDate":"2022-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44441132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel Internet of Things and federated learning-based privacy protection in blockchain technology 一种新型物联网和基于联合学习的区块链技术隐私保护
IF 2.6 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2022-08-10 DOI: 10.1108/ijpcc-03-2022-0123
Shoayee Alotaibi
PurposeBe that as it may, BC is computationally costly, has restricted versatility and brings about critical transmission capacity upward and postpones, those seems not to be fit with Internet of Things (IoT) setting. A lightweight scalable blockchain (LSB) which is improved toward IoT necessities is suggested by the authors and investigates LSB within brilliant house setup like an agent model to enable more extensive IoT apps. Less asset gadgets inside brilliant house advantage via any unified chief which lays out common units for correspondence also cycles generally approaching and active solicitations.Design/methodology/approachFederated learning and blockchain (BC) have drawn in huge consideration due to the unchanging property and the relevant safety measure and protection benefits. FL and IoT safety measures’ difficulties can be conquered possibly by BC.FindingsLSB accomplishes fragmentation through shaping any overlaid web with more asset gadgets mutually deal with a public BC and federated learning which assures complete protection also security.Originality/valueThis overlaid is coordinated as without error bunches and reduces extra efforts, also batch leader will be with answer to handle commonly known BCs. LSB joins some of advancements which also includes computations related to lesser weighing agreement, optimal belief also throughput regulatory body.
目的尽管BC可能计算成本高,通用性有限,并导致关键传输容量上升和延迟,但这些似乎不适合物联网(IoT)设置。作者提出了一种针对物联网必需品进行改进的轻量级可扩展区块链(LSB),并在出色的房屋设置中研究了LSB,如代理模型,以实现更广泛的物联网应用程序。通过任何统一的首席执行官,在辉煌的房子里使用资产较少的小工具,为通信制定共同的单元,也会循环进行普遍的接洽和积极的招揽。设计/方法论/方法联合学习和区块链(BC)由于其不变的特性以及相关的安全措施和保护效益而备受关注。FL和物联网安全措施的困难可能会被BC克服。FindingsLSB通过用更多的资产小工具塑造任何覆盖的网络来实现碎片化。这些小工具与公共BC和联邦学习相互处理,从而确保完全的保护和安全。独创性/价值这种叠加是协调的,没有错误,减少了额外的工作量,批次负责人也将负责处理常见的BC。LSB加入了一些进步,其中还包括与较小称重协议、最优信念以及吞吐量监管机构相关的计算。
{"title":"A novel Internet of Things and federated learning-based privacy protection in blockchain technology","authors":"Shoayee Alotaibi","doi":"10.1108/ijpcc-03-2022-0123","DOIUrl":"https://doi.org/10.1108/ijpcc-03-2022-0123","url":null,"abstract":"\u0000Purpose\u0000Be that as it may, BC is computationally costly, has restricted versatility and brings about critical transmission capacity upward and postpones, those seems not to be fit with Internet of Things (IoT) setting. A lightweight scalable blockchain (LSB) which is improved toward IoT necessities is suggested by the authors and investigates LSB within brilliant house setup like an agent model to enable more extensive IoT apps. Less asset gadgets inside brilliant house advantage via any unified chief which lays out common units for correspondence also cycles generally approaching and active solicitations.\u0000\u0000\u0000Design/methodology/approach\u0000Federated learning and blockchain (BC) have drawn in huge consideration due to the unchanging property and the relevant safety measure and protection benefits. FL and IoT safety measures’ difficulties can be conquered possibly by BC.\u0000\u0000\u0000Findings\u0000LSB accomplishes fragmentation through shaping any overlaid web with more asset gadgets mutually deal with a public BC and federated learning which assures complete protection also security.\u0000\u0000\u0000Originality/value\u0000This overlaid is coordinated as without error bunches and reduces extra efforts, also batch leader will be with answer to handle commonly known BCs. LSB joins some of advancements which also includes computations related to lesser weighing agreement, optimal belief also throughput regulatory body.\u0000","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":" ","pages":""},"PeriodicalIF":2.6,"publicationDate":"2022-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42345909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Pervasive Computing and Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1