首页 > 最新文献

International Journal of Pervasive Computing and Communications最新文献

英文 中文
Novel approach of detecting the black hole attack for vehicular ad-hoc networks based on capability indicators 基于能力指标的车辆自组织网络黑洞攻击检测新方法
IF 2.6 Q1 Computer Science Pub Date : 2022-09-27 DOI: 10.1108/ijpcc-02-2022-0062
Souad El Houssaini, Mohammed-Alamine El Houssaini, Jamal el Kafi
PurposeIn vehicular ad hoc networks (VANETs), the information transmitted is broadcast in a free access environment. Therefore, VANETs are vulnerable against attacks that can directly perturb the performance of the networks and then provoke big fall of capability. Black hole attack is an example such attack, where the attacker node pretends that having the shortest path to the destination node and then drops the packets. This paper aims to present a new method to detect the black hole attack in real-time in a VANET network.Design/methodology/approachThis method is based on capability indicators that are widely used in industrial production processes. If the different capability indicators are greater than 1.33 and the stability ratio (Sr) is greater than 75%, the network is stable and the vehicles are communicating in an environment without the black hole attack. When the malicious nodes representing the black hole attacks are activated one by one, the fall of capability becomes more visible and the network is unstable, out of control and unmanaged, due to the presence of the attacks. The simulations were conducted using NS-3 for the network simulation and simulation of urban mobility for generating the mobility model.FindingsThe proposed mechanism does not impose significant overheads or extensive modifications in the standard Institute of Electrical and Electronics Engineers 802.11p or in the routing protocols. In addition, it can be implemented at any receiving node which allows identifying malicious nodes in real-time. The simulation results demonstrated the effectiveness of proposed scheme to detect the impact of the attack very early, especially with the use of the short-term capability indicators (Cp, Cpk and Cpm) of each performance metrics (throughput and packet loss ratio), which are more efficient at detecting quickly and very early the small deviations over a very short time. This study also calculated another indicator of network stability which is Sr, which allows to make a final decision if the network is under control and that the vehicles are communicating in an environment without the black hole attack.Originality/valueAccording to the best of the authors’ knowledge, the method, using capability indicators for detecting the black hole attack in VANETs, has not been presented previously in the literature.
目的在车载自组织网络(VANET)中,传输的信息在自由接入环境中进行广播。因此,VANET很容易受到攻击,这些攻击会直接干扰网络的性能,然后导致能力大幅下降。黑洞攻击就是这种攻击的一个例子,攻击者节点假装到目的节点的路径最短,然后丢弃数据包。本文旨在提出一种在VANET网络中实时检测黑洞攻击的新方法。设计/方法论/方法该方法基于工业生产过程中广泛使用的能力指标。如果不同的能力指标大于1.33,稳定性比(Sr)大于75%,则网络是稳定的,车辆在没有黑洞攻击的环境中通信。当代表黑洞攻击的恶意节点被逐一激活时,由于攻击的存在,功能的下降变得更加明显,网络不稳定、失控和未被管理。模拟使用NS-3进行网络模拟,并模拟城市流动性以生成流动性模型。发现所提出的机制不会对标准电气和电子工程师协会802.11p或路由协议造成重大开销或大量修改。此外,它可以在任何接收节点实现,这允许实时识别恶意节点。仿真结果证明了所提出的方案在很早检测攻击影响方面的有效性,特别是使用了每个性能指标(吞吐量和丢包率)的短期能力指标(Cp、Cpk和Cpm),它们在很短的时间内更有效地快速、很早地检测小偏差。这项研究还计算了网络稳定性的另一个指标Sr,它可以在网络受到控制以及车辆在没有黑洞攻击的环境中通信的情况下做出最终决定。独创性/价值据作者所知,使用能力指标检测VANET中黑洞攻击的方法以前从未在文献中提出过。
{"title":"Novel approach of detecting the black hole attack for vehicular ad-hoc networks based on capability indicators","authors":"Souad El Houssaini, Mohammed-Alamine El Houssaini, Jamal el Kafi","doi":"10.1108/ijpcc-02-2022-0062","DOIUrl":"https://doi.org/10.1108/ijpcc-02-2022-0062","url":null,"abstract":"\u0000Purpose\u0000In vehicular ad hoc networks (VANETs), the information transmitted is broadcast in a free access environment. Therefore, VANETs are vulnerable against attacks that can directly perturb the performance of the networks and then provoke big fall of capability. Black hole attack is an example such attack, where the attacker node pretends that having the shortest path to the destination node and then drops the packets. This paper aims to present a new method to detect the black hole attack in real-time in a VANET network.\u0000\u0000\u0000Design/methodology/approach\u0000This method is based on capability indicators that are widely used in industrial production processes. If the different capability indicators are greater than 1.33 and the stability ratio (Sr) is greater than 75%, the network is stable and the vehicles are communicating in an environment without the black hole attack. When the malicious nodes representing the black hole attacks are activated one by one, the fall of capability becomes more visible and the network is unstable, out of control and unmanaged, due to the presence of the attacks. The simulations were conducted using NS-3 for the network simulation and simulation of urban mobility for generating the mobility model.\u0000\u0000\u0000Findings\u0000The proposed mechanism does not impose significant overheads or extensive modifications in the standard Institute of Electrical and Electronics Engineers 802.11p or in the routing protocols. In addition, it can be implemented at any receiving node which allows identifying malicious nodes in real-time. The simulation results demonstrated the effectiveness of proposed scheme to detect the impact of the attack very early, especially with the use of the short-term capability indicators (Cp, Cpk and Cpm) of each performance metrics (throughput and packet loss ratio), which are more efficient at detecting quickly and very early the small deviations over a very short time. This study also calculated another indicator of network stability which is Sr, which allows to make a final decision if the network is under control and that the vehicles are communicating in an environment without the black hole attack.\u0000\u0000\u0000Originality/value\u0000According to the best of the authors’ knowledge, the method, using capability indicators for detecting the black hole attack in VANETs, has not been presented previously in the literature.\u0000","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2022-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42647794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance analysis of a cloud-based network analytics system with multiple-source data aggregation 基于云的多源数据聚合网络分析系统的性能分析
IF 2.6 Q1 Computer Science Pub Date : 2022-09-26 DOI: 10.1108/ijpcc-06-2022-0244
T. P. Fowdur, Lavesh Babooram
PurposeThe purpose of this paper is geared towards the capture and analysis of network traffic using an array ofmachine learning (ML) and deep learning (DL) techniques to classify network traffic into different classes and predict network traffic parameters.Design/methodology/approachThe classifier models include k-nearest neighbour (KNN), multilayer perceptron (MLP) and support vector machine (SVM), while the regression models studied are multiple linear regression (MLR) as well as MLP. The analytics were performed on both a local server and a servlet hosted on the international business machines cloud. Moreover, the local server could aggregate data from multiple devices on the network and perform collaborative ML to predict network parameters. With optimised hyperparameters, analytical models were incorporated in the cloud hosted Java servlets that operate on a client–server basis where the back-end communicates with Cloudant databases.FindingsRegarding classification, it was found that KNN performs significantly better than MLP and SVM with a comparative precision gain of approximately 7%, when classifying both Wi-Fi and long term evolution (LTE) traffic.Originality/valueCollaborative regression models using traffic collected from two devices were experimented and resulted in an increased average accuracy of 0.50% for all variables, with a multivariate MLP model.
目的本文的目的是使用机器学习(ML)和深度学习(DL)技术的阵列来捕获和分析网络流量,将网络流量分类为不同的类别并预测网络流量参数。设计/方法/方法分类器模型包括k近邻(KNN)、多层感知器(MLP)和支持向量机(SVM),而所研究的回归模型是多元线性回归(MLR)和MLP。分析是在本地服务器和国际商业机器云上托管的servlet上执行的。此外,本地服务器可以聚合来自网络上多个设备的数据,并执行协作ML来预测网络参数。通过优化的超参数,分析模型被纳入云托管的Java servlet中,这些servlet在客户端-服务器的基础上运行,后端与Cloudant数据库通信。发现关于分类,发现KNN在对Wi-Fi和长期演进(LTE)业务进行分类时,表现明显优于MLP和SVM,相对精度增益约为7%。独创性/价值使用从两个设备收集的流量的协作回归模型进行了实验,并使用多变量MLP模型将所有变量的平均准确度提高了0.50%。
{"title":"Performance analysis of a cloud-based network analytics system with multiple-source data aggregation","authors":"T. P. Fowdur, Lavesh Babooram","doi":"10.1108/ijpcc-06-2022-0244","DOIUrl":"https://doi.org/10.1108/ijpcc-06-2022-0244","url":null,"abstract":"\u0000Purpose\u0000The purpose of this paper is geared towards the capture and analysis of network traffic using an array ofmachine learning (ML) and deep learning (DL) techniques to classify network traffic into different classes and predict network traffic parameters.\u0000\u0000\u0000Design/methodology/approach\u0000The classifier models include k-nearest neighbour (KNN), multilayer perceptron (MLP) and support vector machine (SVM), while the regression models studied are multiple linear regression (MLR) as well as MLP. The analytics were performed on both a local server and a servlet hosted on the international business machines cloud. Moreover, the local server could aggregate data from multiple devices on the network and perform collaborative ML to predict network parameters. With optimised hyperparameters, analytical models were incorporated in the cloud hosted Java servlets that operate on a client–server basis where the back-end communicates with Cloudant databases.\u0000\u0000\u0000Findings\u0000Regarding classification, it was found that KNN performs significantly better than MLP and SVM with a comparative precision gain of approximately 7%, when classifying both Wi-Fi and long term evolution (LTE) traffic.\u0000\u0000\u0000Originality/value\u0000Collaborative regression models using traffic collected from two devices were experimented and resulted in an increased average accuracy of 0.50% for all variables, with a multivariate MLP model.\u0000","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43889779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A secure IoT and edge computing based EV selection model in V2G systems using ant colony optimization algorithm 基于蚁群优化算法的安全物联网和边缘计算的V2G系统电动汽车选择模型
IF 2.6 Q1 Computer Science Pub Date : 2022-09-21 DOI: 10.1108/ijpcc-06-2022-0245
Gopinath Anjinappa, Divakar Bangalore Prabhakar
PurposeThe fluctuations that occurred between the power requirements have shown a higher range of voltage regulations and frequency. The fluctuations are caused because of substantial changes in the energy dissipation. The operational efficiency has been reduced when the power grid is enabled with the help of electric vehicles (EVs) that were created by the power resources. The model showed an active load matching for regulating the power and there occurred a harmonic motion in energy. The main purpose of the proposed research is to handle the energy sources for stabilization which has increased the reliability and improved the power efficiency. This study or paper aims to elaborate the security and privacy challenges present in the vehicle 2 grid (V2G) network and their impact with grid resilience.Design/methodology/approachThe smart framework is proposed which works based on Internet of Things and edge computations that managed to perform an effective V2G operation. Thus, an optimum model for scheduling the charge is designed on each EV to maximize the number of users and selecting the best EV using the proposed ant colony optimization (ACO). At the first, the constructive phase of ACO where the ants in the colony generate the feasible solutions. The constructive phase with local search generates an ACO algorithm that uses the heterogeneous colony of ants and finds effectively the best-known solutions widely to overcome the problem.FindingsThe results obtained by the existing in-circuit serial programming-plug-in electric vehicles model in terms of power usage ranged from 0.94 to 0.96 kWh which was lower when compared to the proposed ACO that showed power usage of 0.995 to 0.939 kWh, respectively, with time. The results showed that the energy aware routed with ACO provided feasible routing solutions for the source node that provided the sensor network at its lifetime and security at the time of authentication.Originality/valueThe proposed ACO is aware of energy routing protocol that has been analyzed and compared with the energy utilization with respect to the sensor area network which uses power resources effectively.
目的:在功率要求之间发生的波动显示出更高的电压调节范围和频率。波动是由于能量耗散的实质性变化引起的。在电力资源创造的电动汽车(ev)的帮助下,电网的运行效率降低了。该模型表现为有源负荷匹配调节功率,且存在能量谐波运动。本文研究的主要目的是对能源进行稳定处理,从而提高了系统的可靠性和效率。本研究或论文旨在阐述车辆2网(V2G)网络中存在的安全和隐私挑战及其对电网弹性的影响。设计/方法/方法提出了基于物联网和边缘计算的智能框架,该框架设法执行有效的V2G操作。在此基础上,设计了每辆电动汽车的最优充电调度模型,以实现用户数量最大化,并利用蚁群算法选择最优电动汽车。首先是蚁群算法的构建阶段,蚁群中的蚂蚁生成可行解。构造阶段与局部搜索生成一种蚁群算法,该算法利用异质蚁群,有效地寻找最知名的解决方案来克服问题。结果现有的在线串行编程插电式电动汽车模型的电量使用结果在0.94 ~ 0.96 kWh之间,与提出的蚁群算法的电量使用结果相比,前者随时间的使用结果分别为0.995 ~ 0.939 kWh。结果表明,基于蚁群算法的能量感知路由为源节点提供了可行的路由方案,保证了传感器网络的生命周期和认证时的安全性。独创性/价值提出的蚁群算法对能量路由协议进行了分析,并与有效利用电力资源的传感器区域网络的能量利用进行了比较。
{"title":"A secure IoT and edge computing based EV selection model in V2G systems using ant colony optimization algorithm","authors":"Gopinath Anjinappa, Divakar Bangalore Prabhakar","doi":"10.1108/ijpcc-06-2022-0245","DOIUrl":"https://doi.org/10.1108/ijpcc-06-2022-0245","url":null,"abstract":"\u0000Purpose\u0000The fluctuations that occurred between the power requirements have shown a higher range of voltage regulations and frequency. The fluctuations are caused because of substantial changes in the energy dissipation. The operational efficiency has been reduced when the power grid is enabled with the help of electric vehicles (EVs) that were created by the power resources. The model showed an active load matching for regulating the power and there occurred a harmonic motion in energy. The main purpose of the proposed research is to handle the energy sources for stabilization which has increased the reliability and improved the power efficiency. This study or paper aims to elaborate the security and privacy challenges present in the vehicle 2 grid (V2G) network and their impact with grid resilience.\u0000\u0000\u0000Design/methodology/approach\u0000The smart framework is proposed which works based on Internet of Things and edge computations that managed to perform an effective V2G operation. Thus, an optimum model for scheduling the charge is designed on each EV to maximize the number of users and selecting the best EV using the proposed ant colony optimization (ACO). At the first, the constructive phase of ACO where the ants in the colony generate the feasible solutions. The constructive phase with local search generates an ACO algorithm that uses the heterogeneous colony of ants and finds effectively the best-known solutions widely to overcome the problem.\u0000\u0000\u0000Findings\u0000The results obtained by the existing in-circuit serial programming-plug-in electric vehicles model in terms of power usage ranged from 0.94 to 0.96 kWh which was lower when compared to the proposed ACO that showed power usage of 0.995 to 0.939 kWh, respectively, with time. The results showed that the energy aware routed with ACO provided feasible routing solutions for the source node that provided the sensor network at its lifetime and security at the time of authentication.\u0000\u0000\u0000Originality/value\u0000The proposed ACO is aware of energy routing protocol that has been analyzed and compared with the energy utilization with respect to the sensor area network which uses power resources effectively.\u0000","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43162379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
LMH-RPL: a load balancing and mobility aware secure hybrid routing protocol for low power lossy network LMH-RPL:用于低功耗网络的负载平衡和移动性感知的安全混合路由协议
IF 2.6 Q1 Computer Science Pub Date : 2022-09-20 DOI: 10.1108/ijpcc-05-2022-0213
R. Cyriac, Saleem Durai M.A.
PurposeRouting protocol for low-power lossy network (RPL) being the de facto routing protocol used by low power lossy networks needs to provide adequate routing service to mobile nodes (MNs) in the network. As RPL is designed to work under constraint power requirements, its route updating frequency is not sufficient for MNs in the network. The purpose of this study is to ensure that MNs enjoy seamless connection throughout the network with minimal handover delay.Design/methodology/approachThis study proposes a load balancing mobility aware secure hybrid – RPL in which static node (SN) identifies route using metrics like expected transmission count, and path delay and parent selection are further refined by working on remaining energy for identifying the primary route and queue availability for secondary route maintenance. MNs identify route with the help of smart timers and by using received signal strength indicator sampling of parent and neighbor nodes. In this work, MNs are also secured against rank attack in RPL.FindingsThis model produces favorable result in terms of packet delivery ratio, delay, energy consumption and number of living nodes in the network when compared with different RPL protocols with mobility support. The proposed model reduces packet retransmission in the network by a large margin by providing load balancing to SNs and seamless connection to MNs.Originality/valueIn this work, a novel algorithm was developed to provide seamless handover for MNs in network. Suitable technique was developed to provide load balancing to SNs in network by maintaining appropriate secondary route.
目的低功耗损耗网络路由协议(RPL)是低功耗损耗网络实际使用的路由协议,需要为网络中的移动节点(MNs)提供足够的路由服务。由于RPL被设计为在受限的功率要求下工作,它的路由更新频率对于网络中的MNs来说是不够的。本研究的目的是确保无线网络在整个网络中以最小的切换延迟享受无缝连接。设计/方法/方法本研究提出了一种负载平衡移动感知安全混合RPL,其中静态节点(SN)使用预期传输计数等指标来识别路由,路径延迟和父节点选择通过剩余能量来识别主路由和用于次要路由维护的队列可用性来进一步改进。MNs利用智能定时器和接收到的信号强度指标采样父节点和邻居节点来识别路由。在这项工作中,MNs也可以防止RPL中的秩攻击。结果与不同的支持移动的RPL协议相比,该模型在分组分发率、时延、能耗和网络活节点数等方面都取得了较好的效果。该模型通过向网络节点提供负载均衡和向网络节点提供无缝连接,大大减少了网络中的数据包重传。本文提出了一种新颖的算法来实现网络中mnns的无缝切换。提出了一种适当的技术,通过保持适当的辅助路由来实现网络中SNs的负载均衡。
{"title":"LMH-RPL: a load balancing and mobility aware secure hybrid routing protocol for low power lossy network","authors":"R. Cyriac, Saleem Durai M.A.","doi":"10.1108/ijpcc-05-2022-0213","DOIUrl":"https://doi.org/10.1108/ijpcc-05-2022-0213","url":null,"abstract":"\u0000Purpose\u0000Routing protocol for low-power lossy network (RPL) being the de facto routing protocol used by low power lossy networks needs to provide adequate routing service to mobile nodes (MNs) in the network. As RPL is designed to work under constraint power requirements, its route updating frequency is not sufficient for MNs in the network. The purpose of this study is to ensure that MNs enjoy seamless connection throughout the network with minimal handover delay.\u0000\u0000\u0000Design/methodology/approach\u0000This study proposes a load balancing mobility aware secure hybrid – RPL in which static node (SN) identifies route using metrics like expected transmission count, and path delay and parent selection are further refined by working on remaining energy for identifying the primary route and queue availability for secondary route maintenance. MNs identify route with the help of smart timers and by using received signal strength indicator sampling of parent and neighbor nodes. In this work, MNs are also secured against rank attack in RPL.\u0000\u0000\u0000Findings\u0000This model produces favorable result in terms of packet delivery ratio, delay, energy consumption and number of living nodes in the network when compared with different RPL protocols with mobility support. The proposed model reduces packet retransmission in the network by a large margin by providing load balancing to SNs and seamless connection to MNs.\u0000\u0000\u0000Originality/value\u0000In this work, a novel algorithm was developed to provide seamless handover for MNs in network. Suitable technique was developed to provide load balancing to SNs in network by maintaining appropriate secondary route.\u0000","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2022-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43017773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An approach for DoS attack detection in cloud computing using sine cosine anti coronavirus optimized deep maxout network 一种基于正弦反冠状病毒优化深度maxout网络的云计算DoS攻击检测方法
IF 2.6 Q1 Computer Science Pub Date : 2022-09-14 DOI: 10.1108/ijpcc-05-2022-0197
M. Boopathi, Meena Chavan, J. J, Sanjay Kumar
PurposeThe Denial of Service (DoS) attack is a category of intrusion that devours various services and resources of the organization by the dispersal of unusable traffic, so that reliable users are not capable of getting benefit from the services. In general, the DoS attackers preserve their independence by collaborating several victim machines and following authentic network traffic, which makes it more complex to detect the attack. Thus, these issues and demerits faced by existing DoS attack recognition schemes in cloud are specified as a major challenge to inventing a new attack recognition method.Design/methodology/approachThis paper aims to detect DoS attack detection scheme, termed as sine cosine anti coronavirus optimization (SCACVO)-driven deep maxout network (DMN). The recorded log file is considered in this method for the attack detection process. Significant features are chosen based on Pearson correlation in the feature selection phase. The over sampling scheme is applied in the data augmentation phase, and then the attack detection is done using DMN. The DMN is trained by the SCACVO algorithm, which is formed by combining sine cosine optimization and anti-corona virus optimization techniques.FindingsThe SCACVO-based DMN offers maximum testing accuracy, true positive rate and true negative rate of 0.9412, 0.9541 and 0.9178, respectively.Originality/valueThe DoS attack detection using the proposed model is accurate and improves the effectiveness of the detection.
目的DoS (Denial of Service)攻击是一种入侵行为,它通过分散不可用的流量来吞噬组织的各种服务和资源,使可靠的用户无法从服务中获益。通常,DoS攻击者通过协作多台受害机器并跟踪真实的网络流量来保持其独立性,这使得检测攻击变得更加复杂。因此,指出了现有云环境下DoS攻击识别方案所面临的问题和缺点,这是发明一种新的攻击识别方法所面临的主要挑战。本文旨在检测DoS攻击的检测方案,称为正弦余弦抗冠状病毒优化(SCACVO)驱动的深度最大输出网络(DMN)。该方法在攻击检测过程中考虑记录的日志文件。在特征选择阶段,基于Pearson相关性选择重要特征。在数据增强阶段采用过采样方案,然后利用DMN进行攻击检测。DMN采用SCACVO算法进行训练,该算法结合了正弦余弦优化和抗冠状病毒优化技术形成。结果基于scacvo的DMN检测准确率最高,真阳性率为0.9412,真阴性率为0.9541,真阴性率为0.9178。原创性/价值利用该模型进行的DoS攻击检测准确,提高了检测的有效性。
{"title":"An approach for DoS attack detection in cloud computing using sine cosine anti coronavirus optimized deep maxout network","authors":"M. Boopathi, Meena Chavan, J. J, Sanjay Kumar","doi":"10.1108/ijpcc-05-2022-0197","DOIUrl":"https://doi.org/10.1108/ijpcc-05-2022-0197","url":null,"abstract":"\u0000Purpose\u0000The Denial of Service (DoS) attack is a category of intrusion that devours various services and resources of the organization by the dispersal of unusable traffic, so that reliable users are not capable of getting benefit from the services. In general, the DoS attackers preserve their independence by collaborating several victim machines and following authentic network traffic, which makes it more complex to detect the attack. Thus, these issues and demerits faced by existing DoS attack recognition schemes in cloud are specified as a major challenge to inventing a new attack recognition method.\u0000\u0000\u0000Design/methodology/approach\u0000This paper aims to detect DoS attack detection scheme, termed as sine cosine anti coronavirus optimization (SCACVO)-driven deep maxout network (DMN). The recorded log file is considered in this method for the attack detection process. Significant features are chosen based on Pearson correlation in the feature selection phase. The over sampling scheme is applied in the data augmentation phase, and then the attack detection is done using DMN. The DMN is trained by the SCACVO algorithm, which is formed by combining sine cosine optimization and anti-corona virus optimization techniques.\u0000\u0000\u0000Findings\u0000The SCACVO-based DMN offers maximum testing accuracy, true positive rate and true negative rate of 0.9412, 0.9541 and 0.9178, respectively.\u0000\u0000\u0000Originality/value\u0000The DoS attack detection using the proposed model is accurate and improves the effectiveness of the detection.\u0000","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2022-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46641449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Real-time optimal protocol prediction of quantum key distribution using machine learning 基于机器学习的量子密钥分配实时最优协议预测
IF 2.6 Q1 Computer Science Pub Date : 2022-09-01 DOI: 10.1108/ijpcc-05-2022-0200
A. R., Nayana J. S., Rajarshee Mondal
PurposeThe purpose of optimal protocol prediction and the benefits offered by quantum key distribution (QKD), including unbreakable security, there is a growing interest in the practical realization of quantum communication. Realization of the optimal protocol predictor in quantum key distribution is a critical step toward commercialization of QKD.Design/methodology/approachThe proposed work designs a machine learning model such as K-nearest neighbor algorithm, convolutional neural networks, decision tree (DT), support vector machine and random forest (RF) for optimal protocol selector for quantum key distribution network (QKDN).FindingsBecause of the effectiveness of machine learning methods in predicting effective solutions using data, these models will be the best optimal protocol selectors for achieving high efficiency for QKDN. The results show that the best machine learning method for predicting optimal protocol in QKD is the RF algorithm. It also validates the effectiveness of machine learning in optimal protocol selection.Originality/valueThe proposed work was done using algorithms like the local search algorithm or exhaustive traversal, however the major downside of using these algorithms is that it takes a very long time to revert back results, which is unacceptable for commercial systems. Hence, machine learning methods are proposed to see the effectiveness of prediction for achieving high efficiency.
为了实现最优协议预测,以及量子密钥分发(QKD)提供的不可破解的安全性,人们对量子通信的实际实现越来越感兴趣。量子密钥分配中最优协议预测器的实现是实现量子密钥分配商业化的关键一步。设计/方法/方法本文设计了一种机器学习模型,如k近邻算法、卷积神经网络、决策树(DT)、支持向量机和随机森林(RF),用于量子密钥分发网络(QKDN)的最优协议选择器。由于机器学习方法在使用数据预测有效解决方案方面的有效性,这些模型将成为实现QKDN高效率的最佳协议选择器。结果表明,预测QKD中最优协议的最佳机器学习方法是RF算法。验证了机器学习在最优协议选择中的有效性。原创性/价值建议的工作是使用局部搜索算法或穷举遍历等算法完成的,但是使用这些算法的主要缺点是需要很长时间才能恢复结果,这对于商业系统来说是不可接受的。因此,提出了机器学习方法来观察预测的有效性,以实现高效率。
{"title":"Real-time optimal protocol prediction of quantum key distribution using machine learning","authors":"A. R., Nayana J. S., Rajarshee Mondal","doi":"10.1108/ijpcc-05-2022-0200","DOIUrl":"https://doi.org/10.1108/ijpcc-05-2022-0200","url":null,"abstract":"\u0000Purpose\u0000The purpose of optimal protocol prediction and the benefits offered by quantum key distribution (QKD), including unbreakable security, there is a growing interest in the practical realization of quantum communication. Realization of the optimal protocol predictor in quantum key distribution is a critical step toward commercialization of QKD.\u0000\u0000\u0000Design/methodology/approach\u0000The proposed work designs a machine learning model such as K-nearest neighbor algorithm, convolutional neural networks, decision tree (DT), support vector machine and random forest (RF) for optimal protocol selector for quantum key distribution network (QKDN).\u0000\u0000\u0000Findings\u0000Because of the effectiveness of machine learning methods in predicting effective solutions using data, these models will be the best optimal protocol selectors for achieving high efficiency for QKDN. The results show that the best machine learning method for predicting optimal protocol in QKD is the RF algorithm. It also validates the effectiveness of machine learning in optimal protocol selection.\u0000\u0000\u0000Originality/value\u0000The proposed work was done using algorithms like the local search algorithm or exhaustive traversal, however the major downside of using these algorithms is that it takes a very long time to revert back results, which is unacceptable for commercial systems. Hence, machine learning methods are proposed to see the effectiveness of prediction for achieving high efficiency.\u0000","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46475330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced gray wolf optimization for estimation of time difference of arrival in WSNs 增强型灰狼优化算法在无线传感器网络中的到达时间差估计
IF 2.6 Q1 Computer Science Pub Date : 2022-08-30 DOI: 10.1108/ijpcc-05-2022-0181
D. E, S. A.
PurposeIntelligent prediction of node localization in wireless sensor networks (WSNs) is a major concern for researchers. The huge amount of data generated by modern sensor array systems required computationally efficient calibration techniques. This paper aims to improve localization accuracy by identifying obstacles in the optimization process and network scenarios.Design/methodology/approachThe proposed method is used to incorporate distance estimation between nodes and packet transmission hop counts. This estimation is used in the proposed support vector machine (SVM) to find the network path using a time difference of arrival (TDoA)-based SVM. However, if the data set is noisy, SVM is prone to poor optimization, which leads to overlapping of target classes and the pathways through TDoA. The enhanced gray wolf optimization (EGWO) technique is introduced to eliminate overlapping target classes in the SVM.FindingsThe performance and efficacy of the model using existing TDoA methodologies are analyzed. The simulation results show that the proposed TDoA-EGWO achieves a higher rate of detection efficiency of 98% and control overhead of 97.8% and a better packet delivery ratio than other traditional methods.Originality/valueThe proposed method is successful in detecting the unknown position of the sensor node with a detection rate greater than that of other methods.
目的无线传感器网络中节点定位的智能预测是研究人员关注的一个主要问题。现代传感器阵列系统产生的大量数据需要计算高效的校准技术。本文旨在通过识别优化过程和网络场景中的障碍来提高定位精度。设计/方法/方法所提出的方法用于结合节点之间的距离估计和分组传输跳数。该估计用于所提出的支持向量机(SVM)中,以使用基于到达时间差(TDoA)的SVM来找到网络路径。然而,如果数据集是有噪声的,SVM很容易优化不佳,这会导致目标类和通过TDoA的路径重叠。引入了增强型灰狼优化(EGWO)技术来消除SVM.Findings中的重叠目标类。分析了使用现有TDoA方法的模型的性能和有效性。仿真结果表明,与其他传统方法相比,所提出的TDoA-EGWO实现了98%的检测效率和97.8%的控制开销,并具有更好的分组传递率。独创性/价值所提出的方法在检测传感器节点的未知位置方面取得了成功,检测率高于其他方法。
{"title":"Enhanced gray wolf optimization for estimation of time difference of arrival in WSNs","authors":"D. E, S. A.","doi":"10.1108/ijpcc-05-2022-0181","DOIUrl":"https://doi.org/10.1108/ijpcc-05-2022-0181","url":null,"abstract":"Purpose\u0000Intelligent prediction of node localization in wireless sensor networks (WSNs) is a major concern for researchers. The huge amount of data generated by modern sensor array systems required computationally efficient calibration techniques. This paper aims to improve localization accuracy by identifying obstacles in the optimization process and network scenarios.\u0000\u0000\u0000Design/methodology/approach\u0000The proposed method is used to incorporate distance estimation between nodes and packet transmission hop counts. This estimation is used in the proposed support vector machine (SVM) to find the network path using a time difference of arrival (TDoA)-based SVM. However, if the data set is noisy, SVM is prone to poor optimization, which leads to overlapping of target classes and the pathways through TDoA. The enhanced gray wolf optimization (EGWO) technique is introduced to eliminate overlapping target classes in the SVM.\u0000\u0000\u0000Findings\u0000The performance and efficacy of the model using existing TDoA methodologies are analyzed. The simulation results show that the proposed TDoA-EGWO achieves a higher rate of detection efficiency of 98% and control overhead of 97.8% and a better packet delivery ratio than other traditional methods.\u0000\u0000\u0000Originality/value\u0000The proposed method is successful in detecting the unknown position of the sensor node with a detection rate greater than that of other methods.","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2022-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46316328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Federate learning on Web browsing data with statically and machine learning technique 利用静态学习和机器学习技术对网页浏览数据进行联合学习
IF 2.6 Q1 Computer Science Pub Date : 2022-08-22 DOI: 10.1108/ijpcc-05-2022-0184
R. Bhimanpallewar, S. Khan, K. Joshil Raj, K. Gulati, N. Bhasin, Roop Raj
PurposeFederation analytics approaches are a present area of study that has already progressed beyond the analysis of metrics and counts. It is possible to acquire aggregated information about on-device data by training machine learning models using federated learning techniques without any of the raw data ever having to leave the devices in the issue. Web browser forensics research has been focused on individual Web browsers or architectural analysis of specific log files rather than on broad topics. This paper aims to propose major tools used for Web browser analysis.Design/methodology/approachEach kind of Web browser has its own unique set of features. This allows the user to choose their preferred browsers or to check out many browsers at once. If a forensic examiner has access to just one Web browser's log files, he/she makes it difficult to determine which sites a person has visited. The agent must thus be capable of analyzing all currently available Web browsers on a single workstation and doing an integrated study of various Web browsers.FindingsFederated learning has emerged as a training paradigm in such settings. Web browser forensics research in general has focused on certain browsers or the computational modeling of specific log files. Internet users engage in a wide range of activities using an internet browser, such as searching for information and sending e-mails.Originality/valueIt is also essential that the investigator have access to user activity when conducting an inquiry. This data, which may be used to assess information retrieval activities, is very critical. In this paper, the authors purposed a major tool used for Web browser analysis. This study's proposed algorithm is capable of protecting data privacy effectively in real-world experiments.
目的联合分析方法是目前的一个研究领域,已经超越了指标和计数的分析。可以通过使用联合学习技术训练机器学习模型来获取关于设备上数据的聚合信息,而不需要任何原始数据离开问题中的设备。Web浏览器取证研究主要集中在单个Web浏览器或特定日志文件的体系结构分析上,而不是广泛的主题。本文旨在提出用于Web浏览器分析的主要工具。设计/方法论/方法每种Web浏览器都有自己独特的功能。这允许用户选择他们喜欢的浏览器,或者一次查看多个浏览器。如果法医只能访问一个Web浏览器的日志文件,他/她将很难确定一个人访问过哪些网站。因此,代理必须能够在单个工作站上分析所有当前可用的Web浏览器,并对各种Web浏览器进行集成研究。发现联合学习已成为此类环境中的一种培训模式。Web浏览器取证研究通常集中在某些浏览器或特定日志文件的计算建模上。互联网用户使用互联网浏览器进行广泛的活动,如搜索信息和发送电子邮件。来源/value调查人员在进行调查时也必须能够访问用户活动。这些数据可用于评估信息检索活动,非常关键。在本文中,作者设计了一个用于Web浏览器分析的主要工具。本研究提出的算法能够在真实世界的实验中有效地保护数据隐私。
{"title":"Federate learning on Web browsing data with statically and machine learning technique","authors":"R. Bhimanpallewar, S. Khan, K. Joshil Raj, K. Gulati, N. Bhasin, Roop Raj","doi":"10.1108/ijpcc-05-2022-0184","DOIUrl":"https://doi.org/10.1108/ijpcc-05-2022-0184","url":null,"abstract":"\u0000Purpose\u0000Federation analytics approaches are a present area of study that has already progressed beyond the analysis of metrics and counts. It is possible to acquire aggregated information about on-device data by training machine learning models using federated learning techniques without any of the raw data ever having to leave the devices in the issue. Web browser forensics research has been focused on individual Web browsers or architectural analysis of specific log files rather than on broad topics. This paper aims to propose major tools used for Web browser analysis.\u0000\u0000\u0000Design/methodology/approach\u0000Each kind of Web browser has its own unique set of features. This allows the user to choose their preferred browsers or to check out many browsers at once. If a forensic examiner has access to just one Web browser's log files, he/she makes it difficult to determine which sites a person has visited. The agent must thus be capable of analyzing all currently available Web browsers on a single workstation and doing an integrated study of various Web browsers.\u0000\u0000\u0000Findings\u0000Federated learning has emerged as a training paradigm in such settings. Web browser forensics research in general has focused on certain browsers or the computational modeling of specific log files. Internet users engage in a wide range of activities using an internet browser, such as searching for information and sending e-mails.\u0000\u0000\u0000Originality/value\u0000It is also essential that the investigator have access to user activity when conducting an inquiry. This data, which may be used to assess information retrieval activities, is very critical. In this paper, the authors purposed a major tool used for Web browser analysis. This study's proposed algorithm is capable of protecting data privacy effectively in real-world experiments.\u0000","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2022-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41697076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AI federated learning based improvised random Forest classifier with error reduction mechanism for skewed data sets 基于AI联合学习的偏斜数据集简易随机森林分类器
IF 2.6 Q1 Computer Science Pub Date : 2022-08-19 DOI: 10.1108/ijpcc-02-2022-0034
A. More, Dipti P Rana
PurposeReferred data set produces reliable information about the network flows and common attacks meeting with real-world criteria. Accordingly, this study aims to focus on the use of imbalanced intrusion detection benchmark knowledge discovery in database (KDD) data set. KDD data set is most preferably used by many researchers for experimentation and analysis. The proposed algorithm improvised random forest classification with error tuning factors (IRFCETF) deals with experimentation on KDD data set and evaluates the performance of a complete set of network traffic features through IRFCETF.Design/methodology/approachIn the current era of applications, the attention of researchers is immersed by a diverse number of existing time applications that deals with imbalanced data classification (ImDC). Real-time application areas, artificial intelligence (AI), Industrial Internet of Things (IIoT), etc. are dealing ImDC undergo with diverted classification performance due to skewed data distribution (SkDD). There are numerous application areas that deal with SkDD. Many of the data applications in AI and IIoT face the diverted data classification rate in SkDD. In recent advancements, there is an exponential expansion in the volume of computer network data and related application developments. Intrusion detection is one of the demanding applications of ImDC. The proposed study focusses on imbalanced intrusion benchmark data set, KDD data set and other benchmark data set with the proposed IRFCETF approach. IRFCETF justifies the enriched classification performance on imbalanced data set over the existing approach. The purpose of this work is to review imbalanced data applications in numerous application areas including AI and IIoT and tuning the performance with respect to principal component analysis. This study also focusses on the out-of-bag error performance-tuning factor.FindingsExperimental results on KDD data set shows that proposed algorithm gives enriched performance. For referred intrusion detection data set, IRFCETF classification accuracy is 99.57% and error rate is 0.43%.Research limitations/implicationsThis research work extended for further improvements in classification techniques with multiple correspondence analysis (MCA); hierarchical MCA can be focussed with the use of classification models for wide range of skewed data sets.Practical implicationsThe metrics enhancement is measurable and helpful in dealing with intrusion detection systems–related imbalanced applications in current application domains such as security, AI and IIoT digitization. Analytical results show improvised metrics of the proposed approach than other traditional machine learning algorithms. Thus, error-tuning parameter creates a measurable impact on classification accuracy is justified with the proposed IRFCETF.Social implicationsProposed algorithm is useful in numerous IIoT applications such as health care, machinery automation etc.Originalit
PurposeReferred数据集生成有关网络流和常见攻击的可靠信息,这些信息符合真实世界的标准。因此,本研究旨在关注数据库(KDD)数据集中不平衡入侵检测基准知识发现的使用。KDD数据集最适合被许多研究人员用于实验和分析。所提出的具有误差调整因子的简易随机森林分类算法(IRFCETF)在KDD数据集上进行了实验,并通过IRFCETF.设计/方法/方法评估了一整套网络流量特征的性能。在当前的应用时代,研究人员的注意力被处理不平衡数据分类(ImDC)的各种现有时间应用程序所吸引。实时应用领域,人工智能(AI)、工业物联网(IIoT)等正在处理ImDC由于数据分布偏斜(SkDD)而导致的分类性能转移的问题。有许多应用领域涉及SkDD。人工智能和IIoT中的许多数据应用都面临着SkDD中转移的数据分类率。近年来,计算机网络数据量和相关应用程序的发展呈指数级增长。入侵检测是ImDC要求很高的应用之一。本研究采用所提出的IRFCETF方法,重点研究了不平衡入侵基准数据集、KDD数据集和其他基准数据集。与现有方法相比,IRFCETF证明了在不平衡数据集上丰富的分类性能。这项工作的目的是审查包括人工智能和IIoT在内的许多应用领域中的不平衡数据应用,并调整主成分分析的性能。本研究还重点研究了袋外误差性能调谐因子。在KDD数据集上的实验结果表明,该算法具有丰富的性能。对于参考的入侵检测数据集,IRFCETF分类准确率为99.57%,错误率为0.43%。研究局限性/含义本研究工作扩展了多重对应分析(MCA)分类技术的进一步改进;分层MCA可以通过对广泛的偏斜数据集使用分类模型来集中。实际意义度量增强是可测量的,有助于处理当前应用领域中与入侵检测系统相关的不平衡应用,如安全、人工智能和IIoT数字化。分析结果表明,与其他传统的机器学习算法相比,所提出的方法具有即兴的度量。因此,所提出的IRFCETF证明了误差调整参数对分类准确性产生的可衡量的影响。社会含义所提出的算法在许多IIoT应用中都很有用,如医疗保健、机械自动化等。原始性/价值这项研究工作涉及分类度量增强方法IRFCETF。所提出的方法为每种情况产生一个测试集分类,并具有减少错误的机制。
{"title":"AI federated learning based improvised random Forest classifier with error reduction mechanism for skewed data sets","authors":"A. More, Dipti P Rana","doi":"10.1108/ijpcc-02-2022-0034","DOIUrl":"https://doi.org/10.1108/ijpcc-02-2022-0034","url":null,"abstract":"\u0000Purpose\u0000Referred data set produces reliable information about the network flows and common attacks meeting with real-world criteria. Accordingly, this study aims to focus on the use of imbalanced intrusion detection benchmark knowledge discovery in database (KDD) data set. KDD data set is most preferably used by many researchers for experimentation and analysis. The proposed algorithm improvised random forest classification with error tuning factors (IRFCETF) deals with experimentation on KDD data set and evaluates the performance of a complete set of network traffic features through IRFCETF.\u0000\u0000\u0000Design/methodology/approach\u0000In the current era of applications, the attention of researchers is immersed by a diverse number of existing time applications that deals with imbalanced data classification (ImDC). Real-time application areas, artificial intelligence (AI), Industrial Internet of Things (IIoT), etc. are dealing ImDC undergo with diverted classification performance due to skewed data distribution (SkDD). There are numerous application areas that deal with SkDD. Many of the data applications in AI and IIoT face the diverted data classification rate in SkDD. In recent advancements, there is an exponential expansion in the volume of computer network data and related application developments. Intrusion detection is one of the demanding applications of ImDC. The proposed study focusses on imbalanced intrusion benchmark data set, KDD data set and other benchmark data set with the proposed IRFCETF approach. IRFCETF justifies the enriched classification performance on imbalanced data set over the existing approach. The purpose of this work is to review imbalanced data applications in numerous application areas including AI and IIoT and tuning the performance with respect to principal component analysis. This study also focusses on the out-of-bag error performance-tuning factor.\u0000\u0000\u0000Findings\u0000Experimental results on KDD data set shows that proposed algorithm gives enriched performance. For referred intrusion detection data set, IRFCETF classification accuracy is 99.57% and error rate is 0.43%.\u0000\u0000\u0000Research limitations/implications\u0000This research work extended for further improvements in classification techniques with multiple correspondence analysis (MCA); hierarchical MCA can be focussed with the use of classification models for wide range of skewed data sets.\u0000\u0000\u0000Practical implications\u0000The metrics enhancement is measurable and helpful in dealing with intrusion detection systems–related imbalanced applications in current application domains such as security, AI and IIoT digitization. Analytical results show improvised metrics of the proposed approach than other traditional machine learning algorithms. Thus, error-tuning parameter creates a measurable impact on classification accuracy is justified with the proposed IRFCETF.\u0000\u0000\u0000Social implications\u0000Proposed algorithm is useful in numerous IIoT applications such as health care, machinery automation etc.\u0000\u0000\u0000Originalit","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2022-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42555185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT-based multimodal liveness detection using the fusion of ECG and fingerprint 基于物联网的心电指纹融合多模态动态检测
IF 2.6 Q1 Computer Science Pub Date : 2022-08-16 DOI: 10.1108/ijpcc-10-2021-0248
A. Gona, Subramoniam M.
PurposeBiometric scans using fingerprints are widely used for security purposes. Eventually, for authentication purposes, fingerprint scans are not very reliable because they can be faked by obtaining a sample of the fingerprint of the person. There are a few spoof detection techniques available to reduce the incidence of spoofing of the biometric system. Among them, the most commonly used is the binary classification technique that detects real or fake fingerprints based on the fingerprint samples provided during training. However, this technique fails when it is provided with samples formed using other spoofing techniques that are different from the spoofing techniques covered in the training samples. This paper aims to improve the liveness detection accuracy by fusing electrocardiogram (ECG) and fingerprint.Design/methodology/approachIn this paper, to avoid this limitation, an efficient liveness detection algorithm is developed using the fusion of ECG signals captured from the fingertips and fingerprint data in Internet of Things (IoT) environment. The ECG signal will ensure the detection of real fingerprint samples from fake ones.FindingsSingle model fingerprint methods have some disadvantages, such as noisy data and position of the fingerprint. To overcome this, fusion of both ECG and fingerprint is done so that the combined data improves the detection accuracy.Originality/valueSystem security is improved in this approach, and the fingerprint recognition rate is also improved. IoT-based approach is used in this work to reduce the computation burden of data processing systems.
目的使用指纹的生物识别扫描被广泛用于安全目的。最终,出于身份验证的目的,指纹扫描不是很可靠,因为可以通过获取个人指纹样本来伪造指纹扫描。有一些欺骗检测技术可用于减少生物特征系统的欺骗发生率。其中,最常用的是基于训练期间提供的指纹样本来检测真指纹或假指纹的二进制分类技术。然而,当向该技术提供使用与训练样本中所涵盖的欺骗技术不同的其他欺骗技术形成的样本时,该技术失败。本文旨在通过心电图和指纹的融合来提高活体检测的准确性。设计/方法/方法在本文中,为了避免这一限制,在物联网(IoT)环境中,利用指尖采集的心电信号和指纹数据的融合,开发了一种高效的活体检测算法。心电图信号将确保从假指纹样本中检测出真实指纹样本。查找单模型指纹方法有一些缺点,如数据噪声和指纹位置。为了克服这一点,对心电图和指纹进行了融合,从而组合的数据提高了检测精度。独创性/价值系统的安全性在这种方法中得到了提高,指纹识别率也得到了提高。本工作采用基于物联网的方法来减轻数据处理系统的计算负担。
{"title":"IoT-based multimodal liveness detection using the fusion of ECG and fingerprint","authors":"A. Gona, Subramoniam M.","doi":"10.1108/ijpcc-10-2021-0248","DOIUrl":"https://doi.org/10.1108/ijpcc-10-2021-0248","url":null,"abstract":"\u0000Purpose\u0000Biometric scans using fingerprints are widely used for security purposes. Eventually, for authentication purposes, fingerprint scans are not very reliable because they can be faked by obtaining a sample of the fingerprint of the person. There are a few spoof detection techniques available to reduce the incidence of spoofing of the biometric system. Among them, the most commonly used is the binary classification technique that detects real or fake fingerprints based on the fingerprint samples provided during training. However, this technique fails when it is provided with samples formed using other spoofing techniques that are different from the spoofing techniques covered in the training samples. This paper aims to improve the liveness detection accuracy by fusing electrocardiogram (ECG) and fingerprint.\u0000\u0000\u0000Design/methodology/approach\u0000In this paper, to avoid this limitation, an efficient liveness detection algorithm is developed using the fusion of ECG signals captured from the fingertips and fingerprint data in Internet of Things (IoT) environment. The ECG signal will ensure the detection of real fingerprint samples from fake ones.\u0000\u0000\u0000Findings\u0000Single model fingerprint methods have some disadvantages, such as noisy data and position of the fingerprint. To overcome this, fusion of both ECG and fingerprint is done so that the combined data improves the detection accuracy.\u0000\u0000\u0000Originality/value\u0000System security is improved in this approach, and the fingerprint recognition rate is also improved. IoT-based approach is used in this work to reduce the computation burden of data processing systems.\u0000","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2022-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44441132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Pervasive Computing and Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1