Pub Date : 2024-08-29DOI: 10.1007/s12083-024-01785-w
Yueyue He, Koji Inoue
Crowdfunding refers to the online collection of certain capital from a vast number of individuals or groups that each contribute a relatively small amount. Recently, the credibility of crowdfunding platforms has been undermined by fraudulent projects, inadequate fund management, and other forms of disorder. The decentralization and anti-tampering features of blockchain provide the possibility to solve the above problems, and many studies have proposed blockchain-based crowdfunding schemes. However, the existing state-of-the-art methods do not provide user authentication, transaction auditing, and identity management in a privacy-preserving way. Accordingly, this paper presents a novel blockchain-based crowdfunding system called CrowdChain. Initially, the distributed identity and BLS signature are employed to establish a user authentication mechanism, enabling CrowdChain to withstand Sybil attacks while preserving the non-linkability of user identities. Secondly, the physically unclonable function (PUF) is used to generate keys associated with digital identities that are not stored in external devices to resist physical attacks. Subsequently, a crowdfunding mechanism is constructed utilizing zero-knowledge proofs to facilitate streamlined auditing procedures while safeguarding the confidentiality of transactions. Additionally, the formal security analysis proves the security of the CrowdChain scheme. The system prototype is implemented on the Hyperledger Fabric. Empirical evidence indicates the viable efficiency of CrowdChain.
{"title":"CrowdChain: A privacy-preserving crowdfunding system based on blockchain and PUF","authors":"Yueyue He, Koji Inoue","doi":"10.1007/s12083-024-01785-w","DOIUrl":"https://doi.org/10.1007/s12083-024-01785-w","url":null,"abstract":"<p>Crowdfunding refers to the online collection of certain capital from a vast number of individuals or groups that each contribute a relatively small amount. Recently, the credibility of crowdfunding platforms has been undermined by fraudulent projects, inadequate fund management, and other forms of disorder. The decentralization and anti-tampering features of blockchain provide the possibility to solve the above problems, and many studies have proposed blockchain-based crowdfunding schemes. However, the existing state-of-the-art methods do not provide user authentication, transaction auditing, and identity management in a privacy-preserving way. Accordingly, this paper presents a novel blockchain-based crowdfunding system called CrowdChain. Initially, the distributed identity and BLS signature are employed to establish a user authentication mechanism, enabling CrowdChain to withstand Sybil attacks while preserving the non-linkability of user identities. Secondly, the physically unclonable function (PUF) is used to generate keys associated with digital identities that are not stored in external devices to resist physical attacks. Subsequently, a crowdfunding mechanism is constructed utilizing zero-knowledge proofs to facilitate streamlined auditing procedures while safeguarding the confidentiality of transactions. Additionally, the formal security analysis proves the security of the CrowdChain scheme. The system prototype is implemented on the Hyperledger Fabric. Empirical evidence indicates the viable efficiency of CrowdChain.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"69 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142204993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ensuring effective and reliable communication within underwater sensor networks (UWSNs) is a formidable challenge due to their unique characteristics, which include offshore exploration, underwater surveillance and monitoring. UWSNs have proven to be a promising approach in various fields, including research investigations, surveillance operations and underwater disaster response. To advance this field, numerous researchers have dedicated themselves to developing new protocols tailored to UWSNs or refining existing protocols, all with the goal of improving research. One important aspect that continues to attract the attention of researchers is the reliability factor in the underwater environment, leading to constant efforts to improve the overall efficiency of the network and optimize energy consumption. In this work, a machine learning based node reliability calculation algorithm (MRNQ) has been proposed, which takes into account numerous parameters such as the success rate, transmission time, node efficiency, and the network efficiency. The proposed approach outperforms CSLT and TMHCV across key metrics with notable percentage improvements. It achieves a 5.16% higher packet delivery rate, a 22.06% reduction in packet drop rates, a 42.4% extension in network lifetime, and a 0.87676% improvement in malicious node detection.
{"title":"MRNQ: Machine learning-based reliable node quester for reliable communication in underwater acoustic sensor networks","authors":"Yogita Singh, Navneet Singh Aulakh, Inderdeep K. Aulakh, Shyama Barna Bhattacharjee, Sudesh Kumari, Sunita Rani, Gaurav Sharma, Savita Khurana, Shilpi Harnal, Nitin Goyal","doi":"10.1007/s12083-024-01772-1","DOIUrl":"https://doi.org/10.1007/s12083-024-01772-1","url":null,"abstract":"<p>Ensuring effective and reliable communication within underwater sensor networks (UWSNs) is a formidable challenge due to their unique characteristics, which include offshore exploration, underwater surveillance and monitoring. UWSNs have proven to be a promising approach in various fields, including research investigations, surveillance operations and underwater disaster response. To advance this field, numerous researchers have dedicated themselves to developing new protocols tailored to UWSNs or refining existing protocols, all with the goal of improving research. One important aspect that continues to attract the attention of researchers is the reliability factor in the underwater environment, leading to constant efforts to improve the overall efficiency of the network and optimize energy consumption. In this work, a machine learning based node reliability calculation algorithm (MRNQ) has been proposed, which takes into account numerous parameters such as the success rate, transmission time, node efficiency, and the network efficiency. The proposed approach outperforms CSLT and TMHCV across key metrics with notable percentage improvements. It achieves a 5.16% higher packet delivery rate, a 22.06% reduction in packet drop rates, a 42.4% extension in network lifetime, and a 0.87676% improvement in malicious node detection.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"2 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142204990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-27DOI: 10.1007/s12083-024-01788-7
Ming Yi, Qinglin Xie, Peng Long, Yuhang Wu, Quan Chen, Fanlong Zhang, Wenchao Xu
Beaconing is a fundamental task in IoT networks, where each node tries to locally broadcast a packet to all its neighbors. Unfortunately, the problem of Minimum Latency Beaconing Schedule (MLBS), which tries to obtain the fastest and collision-free schedule, is not well studied when the IoT devices employ the duty-cycled working mode. The existing works have rigid assumptions that there exists a single channel and can only work in a centralized fashion. Aiming at making the work more practical and general, in this paper, we investigate the first distributed method for the MLBS problem in Multi-channel asynchronous Duty-cycled IoT networks (MLBSMD problem). The MLBSMD problem is first formulated and proved to be NP-hard. To avoid collisions locally, several special structures are designed which can work in (varvec{O}(varvec{Delta }^{2})) time, where (varvec{Delta }) denotes the maximum node degree in the network. Then, a distributed beaconing scheduling method that can compute a low-latency and collision-free schedule is proposed with a theoretical bound, taking the active time slots of each node into account. Finally, the extensive simulation results demonstrate the effectiveness of the proposed algorithm in terms of latency.
{"title":"Distributed and latency-aware beaconing for asynchronous duty-cycled IoT networks","authors":"Ming Yi, Qinglin Xie, Peng Long, Yuhang Wu, Quan Chen, Fanlong Zhang, Wenchao Xu","doi":"10.1007/s12083-024-01788-7","DOIUrl":"https://doi.org/10.1007/s12083-024-01788-7","url":null,"abstract":"<p>Beaconing is a fundamental task in IoT networks, where each node tries to locally broadcast a packet to all its neighbors. Unfortunately, the problem of Minimum Latency Beaconing Schedule (MLBS), which tries to obtain the fastest and collision-free schedule, is not well studied when the IoT devices employ the duty-cycled working mode. The existing works have rigid assumptions that there exists a single channel and can only work in a centralized fashion. Aiming at making the work more practical and general, in this paper, we investigate the first distributed method for the MLBS problem in Multi-channel asynchronous Duty-cycled IoT networks (MLBSMD problem). The MLBSMD problem is first formulated and proved to be NP-hard. To avoid collisions locally, several special structures are designed which can work in <span>(varvec{O}(varvec{Delta }^{2}))</span> time, where <span>(varvec{Delta })</span> denotes the maximum node degree in the network. Then, a distributed beaconing scheduling method that can compute a low-latency and collision-free schedule is proposed with a theoretical bound, taking the active time slots of each node into account. Finally, the extensive simulation results demonstrate the effectiveness of the proposed algorithm in terms of latency.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"61 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142204991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-22DOI: 10.1007/s12083-024-01763-2
Abdelaziz Alshaikh Qasem, Mahmoud H. Qutqut, Fatima Alhaj, Asem Kitana
Network intrusion detection systems (NIDSs) have evolved into a significant subject in cybersecurity research, mainly due to the growth of cyberattacks and intelligence, which also led to the usage of machine learning (ML) to advance and enhance NIDSs. A NIDS is the first line of defense in any environment, and it detects external and internal attacks. Recently, intrusion mechanisms have become more sophisticated and challenging to detect. Researchers have applied techniques such as ML to detect intruders and secure networks. This paper proposes a novel approach called SRFE (Stepwise Recursive Feature Elimination) to improve the performance and efficiency of predictive models for NIDSs. Our approach depends primarily on recursive feature elimination, which operates on a simple yet effective principle. We experimented with four classification algorithms, namely Support Vector Machine (SVM), Naive Bayes (NB), J48, and Random Forest (RF), on the most widely used dataset in the cybersecurity domain (NSL-KDD). The approach is mainly built on the features’ significance ranking using the Information Gain (IG) method. We conduct multiple experiments according to three scenarios. Each scenario contains various rounds, and in each round, we train the classifiers to eliminate the three lowest-ranked features stepwise. Our experiments show that the RF and J48 classifiers outperform other binary classifiers with an accuracy of 99.80% and 99.66%, respectively. Furthermore, both classifiers obtained the best results in the multiclass classification task; J48 achieved an accuracy of 99.53% in round number seven, and the RF achieved 99.69% in the fifth round.
{"title":"SRFE: A stepwise recursive feature elimination approach for network intrusion detection systems","authors":"Abdelaziz Alshaikh Qasem, Mahmoud H. Qutqut, Fatima Alhaj, Asem Kitana","doi":"10.1007/s12083-024-01763-2","DOIUrl":"https://doi.org/10.1007/s12083-024-01763-2","url":null,"abstract":"<p>Network intrusion detection systems (NIDSs) have evolved into a significant subject in cybersecurity research, mainly due to the growth of cyberattacks and intelligence, which also led to the usage of machine learning (ML) to advance and enhance NIDSs. A NIDS is the first line of defense in any environment, and it detects external and internal attacks. Recently, intrusion mechanisms have become more sophisticated and challenging to detect. Researchers have applied techniques such as ML to detect intruders and secure networks. This paper proposes a novel approach called SRFE (Stepwise Recursive Feature Elimination) to improve the performance and efficiency of predictive models for NIDSs. Our approach depends primarily on recursive feature elimination, which operates on a simple yet effective principle. We experimented with four classification algorithms, namely Support Vector Machine (SVM), Naive Bayes (NB), J48, and Random Forest (RF), on the most widely used dataset in the cybersecurity domain (NSL-KDD). The approach is mainly built on the features’ significance ranking using the Information Gain (IG) method. We conduct multiple experiments according to three scenarios. Each scenario contains various rounds, and in each round, we train the classifiers to eliminate the three lowest-ranked features stepwise. Our experiments show that the RF and J48 classifiers outperform other binary classifiers with an accuracy of 99.80% and 99.66%, respectively. Furthermore, both classifiers obtained the best results in the multiclass classification task; J48 achieved an accuracy of 99.53% in round number seven, and the RF achieved 99.69% in the fifth round.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"22 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142204992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-21DOI: 10.1007/s12083-024-01768-x
Manoj Kumar Pulligilla, C. Vanmathi
The Intelligent Transport System (ITS) is very prominent due to its connection with the Internet of Things (IoT), which enhances passenger security and comfort. The Vehicular Ad-hoc Network (VANET) is a component of ITS. It manages the techniques used for routing and privacy in autonomous cars. The increasing number of autonomous cars has exceeded the capacity of current wireless networks for transmission. It is expected that the proposed 6G wireless network can meet VANET criteria. Very little research has investigated the privacy concerns of VANETs in 6G networking connections. This work presents a method for dealing with authentic and privacy concerns for automobiles in VANETs. Our solution strengthens the vehicle's connectivity system by detecting malicious attacks like replay attacks, DoS attacks, and impersonification attacks. The proposed system uses batch authentication to reduce traffic and workload on the network. The proposed system employs both ID-based authentication and deep learning methods. Where the role of ID-based authentication is to check for access in the network, deep learning takes on the role of identifying all the malicious packets in the system. Our result also shows that the proposed system can identify malicious packets with an accuracy of 98.25% and works successfully in 6G networking communication.
{"title":"An energy efficient access control for secured intelligent transportation system for 6G networking in VANET","authors":"Manoj Kumar Pulligilla, C. Vanmathi","doi":"10.1007/s12083-024-01768-x","DOIUrl":"https://doi.org/10.1007/s12083-024-01768-x","url":null,"abstract":"<p>The Intelligent Transport System (ITS) is very prominent due to its connection with the Internet of Things (IoT), which enhances passenger security and comfort. The Vehicular Ad-hoc Network (VANET) is a component of ITS. It manages the techniques used for routing and privacy in autonomous cars. The increasing number of autonomous cars has exceeded the capacity of current wireless networks for transmission. It is expected that the proposed 6G wireless network can meet VANET criteria. Very little research has investigated the privacy concerns of VANETs in 6G networking connections. This work presents a method for dealing with authentic and privacy concerns for automobiles in VANETs. Our solution strengthens the vehicle's connectivity system by detecting malicious attacks like replay attacks, DoS attacks, and impersonification attacks. The proposed system uses batch authentication to reduce traffic and workload on the network. The proposed system employs both ID-based authentication and deep learning methods. Where the role of ID-based authentication is to check for access in the network, deep learning takes on the role of identifying all the malicious packets in the system. Our result also shows that the proposed system can identify malicious packets with an accuracy of 98.25% and works successfully in 6G networking communication.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"44 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142205012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-16DOI: 10.1007/s12083-024-01777-w
Jiale Chen, Haoxiang Luo
With the continuous development of information technology, drones have become the supporting technology for sustainable smart cities. Currently, the blockchain that guarantees the information security of the unmanned aerial vehicle (UAV) network has become the focus of academic attention. However, due to the small size of the drone, and its limited storage and battery capacity, it is difficult to support the sustainable work of the UAV blockchain network. Therefore, this paper proposes the concept of sustainable blockchain (SusChain) and empowers the UAV blockchain network to better apply it to sustainable smart cities. In particular, we have introduced and improved the Ultra-Low Storage Overhead-Practical Byzantine Fault Tolerance (ULS-PBFT) consensus in the UAV blockchain network, making it a sharding scheme with extremely low storage overhead and energy consumption. Meanwhile, we design a reptation-and-matching-based UAV clustering scheme to ensure that each shard and SusChain have a high consensus success rate. The simulation results show that SusChain has a significant advantage in the key indicators of sustainability. In specific cases, it has a 9–227%, 11–58%, and 27–56% improvement effect in consensus security, consensus delay, and energy consumption, compared to other sharding schemes.
{"title":"SusChain: a sustainable sharding scheme for UAV blockchain networks","authors":"Jiale Chen, Haoxiang Luo","doi":"10.1007/s12083-024-01777-w","DOIUrl":"https://doi.org/10.1007/s12083-024-01777-w","url":null,"abstract":"<p>With the continuous development of information technology, drones have become the supporting technology for sustainable smart cities. Currently, the blockchain that guarantees the information security of the unmanned aerial vehicle (UAV) network has become the focus of academic attention. However, due to the small size of the drone, and its limited storage and battery capacity, it is difficult to support the sustainable work of the UAV blockchain network. Therefore, this paper proposes the concept of sustainable blockchain (SusChain) and empowers the UAV blockchain network to better apply it to sustainable smart cities. In particular, we have introduced and improved the Ultra-Low Storage Overhead-Practical Byzantine Fault Tolerance (ULS-PBFT) consensus in the UAV blockchain network, making it a sharding scheme with extremely low storage overhead and energy consumption. Meanwhile, we design a reptation-and-matching-based UAV clustering scheme to ensure that each shard and SusChain have a high consensus success rate. The simulation results show that SusChain has a significant advantage in the key indicators of sustainability. In specific cases, it has a 9–227%, 11–58%, and 27–56% improvement effect in consensus security, consensus delay, and energy consumption, compared to other sharding schemes.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"45 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142205014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-14DOI: 10.1007/s12083-024-01781-0
Prity Rani, Rohit Kumar Sachan, Sonal Kukreja
Blockchain technology and non-fungible tokens have gained significant attention and widespread adoption due to their unique characteristics and potential for innovation in numerous industries, including education. In recent years, there has been a significant increase in digital learning resources such as multimedia-rich learning content, audio content, and online course content. The advancement of these learning resources has introduced several copyright challenges, such as copyright ownership, fair use of resources, licensing agreements, open educational resources and Creative Commons licenses, digital piracy, and international considerations. Copyright infringement in educational learning resources poses a significant concern that impacts content creators hugely and raises concerns regarding the quality and reliability of the content. This work proposes a copyright protection framework named EduCopyRight-Chain for educational resources using the Ethereum blockchain and non-fungible tokens to overcome concerning challenges. This work also presents a sharding approach within the proposed framework to enhance scalability. Additionally, this work proposes wallet generation, network joining, educational resource tokenization, and a verification approach by utilizing blockchain and non-fungible tokens. The proposed framework uses a Proof-of-Authority consensus mechanism to validate transactions over the peer-to-peer network, and an inter-planetary file system is used for the decentralized storage of associated records. This framework uses Remix IDE, MetaMask wallet, and the Sepolia test network. We use the BlockSim simulation toolkit to conduct experiments to evaluate the performance of the proposed framework in terms of throughput, latency, response time, and standard deviation. The proposed framework achieves an average throughput of 354.26 TPS, a latency of 62.2 milliseconds, a response time of 124.1 milliseconds, and a standard deviation of 144.2 milliseconds. This work also conducts a comparative analysis to assess security features and limitations between the proposed framework and related work. Our observation reveals that the proposed EduCopyRight-Chain framework has better features.
{"title":"EduCopyRight-Chain: an educational resources copyright protection system utilizing permissionless blockchain and non-fungible tokens","authors":"Prity Rani, Rohit Kumar Sachan, Sonal Kukreja","doi":"10.1007/s12083-024-01781-0","DOIUrl":"https://doi.org/10.1007/s12083-024-01781-0","url":null,"abstract":"<p>Blockchain technology and non-fungible tokens have gained significant attention and widespread adoption due to their unique characteristics and potential for innovation in numerous industries, including education. In recent years, there has been a significant increase in digital learning resources such as multimedia-rich learning content, audio content, and online course content. The advancement of these learning resources has introduced several copyright challenges, such as copyright ownership, fair use of resources, licensing agreements, open educational resources and Creative Commons licenses, digital piracy, and international considerations. Copyright infringement in educational learning resources poses a significant concern that impacts content creators hugely and raises concerns regarding the quality and reliability of the content. This work proposes a copyright protection framework named EduCopyRight-Chain for educational resources using the Ethereum blockchain and non-fungible tokens to overcome concerning challenges. This work also presents a sharding approach within the proposed framework to enhance scalability. Additionally, this work proposes wallet generation, network joining, educational resource tokenization, and a verification approach by utilizing blockchain and non-fungible tokens. The proposed framework uses a Proof-of-Authority consensus mechanism to validate transactions over the peer-to-peer network, and an inter-planetary file system is used for the decentralized storage of associated records. This framework uses Remix IDE, MetaMask wallet, and the Sepolia test network. We use the BlockSim simulation toolkit to conduct experiments to evaluate the performance of the proposed framework in terms of throughput, latency, response time, and standard deviation. The proposed framework achieves an average throughput of 354.26 TPS, a latency of 62.2 milliseconds, a response time of 124.1 milliseconds, and a standard deviation of 144.2 milliseconds. This work also conducts a comparative analysis to assess security features and limitations between the proposed framework and related work. Our observation reveals that the proposed EduCopyRight-Chain framework has better features.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"22 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142205015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-13DOI: 10.1007/s12083-024-01771-2
Jueyu Zhu, Jifang Rong, Zhi Gong, Ying Liu, Wenjun Li, Fayez Alqahtani, Amr Tolba, Jinbin Hu
With the widespread implementation of artificial intelligence techniques and self-driving systems in smart cars, providing excellent coverage of wireless sensor networks is critical for stable and effective tasks. Coverage control is an essential task for the design of wireless sensor networks. However, considering the influence of network resources and coverage features, several normal optimization methods are hard to carry out, yet heuristic iterative algorithms could generate an estimated ideal feasible solution for this issue. We present an artificial bee colony algorithm based on random dual strategies, called RDABC. Specifically, RDABC modifies the optimization direction through alternating between dual search techniques with the goal to find further excellent feasible solution. At the same time, through incorporating cross-mutation strategy to improve variety, and increase the algorithm’s optimization efficiency. According to simulation experiments, RDABC outperforms four well-known algorithms in terms of coverage optimization. As a whole, RDABC optimizes the location and deployment of wireless sensors, enhances the overall performance and stability of intelligent transportation systems, and simplifies vehicle monitoring and traffic sign tasks.
{"title":"Deployment optimization in wireless sensor networks using advanced artificial bee colony algorithm","authors":"Jueyu Zhu, Jifang Rong, Zhi Gong, Ying Liu, Wenjun Li, Fayez Alqahtani, Amr Tolba, Jinbin Hu","doi":"10.1007/s12083-024-01771-2","DOIUrl":"https://doi.org/10.1007/s12083-024-01771-2","url":null,"abstract":"<p>With the widespread implementation of artificial intelligence techniques and self-driving systems in smart cars, providing excellent coverage of wireless sensor networks is critical for stable and effective tasks. Coverage control is an essential task for the design of wireless sensor networks. However, considering the influence of network resources and coverage features, several normal optimization methods are hard to carry out, yet heuristic iterative algorithms could generate an estimated ideal feasible solution for this issue. We present an artificial bee colony algorithm based on random dual strategies, called RDABC. Specifically, RDABC modifies the optimization direction through alternating between dual search techniques with the goal to find further excellent feasible solution. At the same time, through incorporating cross-mutation strategy to improve variety, and increase the algorithm’s optimization efficiency. According to simulation experiments, RDABC outperforms four well-known algorithms in terms of coverage optimization. As a whole, RDABC optimizes the location and deployment of wireless sensors, enhances the overall performance and stability of intelligent transportation systems, and simplifies vehicle monitoring and traffic sign tasks.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"27 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142205013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-03DOI: 10.1007/s12083-024-01720-z
Babita Majhi, Prastavana
There has been a significant rise in the ways the internet caters to day-to-day usage in everyday lives. Significant presence in connecting IoTs, helping via online education, entertaining through online games, taking business decisions, and many more. Therefore, all these activities generate an abundance of data and require its management as well. There is a need to secure these networks from malicious attackers to prevent any harmful acts. Network security is still an attractive topic to conduct research on. In this paper, the Net Flow-based dataset NF-UNSWNB15-v2 has been considered for the experimentation and tried to resolve problems in building IDS. Problems like handling a large number of features have been addressed by utilizing FOX optimization with a V-shaped transfer function for binarization purposes and selecting the optimal features. Further classifying it using Light-GBM and evaluating the results for the binary and multi-class classifications. The proposed model selects minimum number of features for both binary and multi-class classification as compared to the other existing methods. Further evaluating on various parameters, the proposed approach performs satisfactorily and improvement in detection rate for various attacks like DoS, Exploits, Fuzzers etc. has been observed.
互联网在日常生活中的日常使用方式大幅增加。在连接物联网、通过在线教育提供帮助、通过在线游戏提供娱乐、做出商业决策等方面都有显著的表现。因此,所有这些活动都会产生大量数据,也需要对其进行管理。有必要确保这些网络免受恶意攻击,以防止任何有害行为。网络安全仍然是一个具有吸引力的研究课题。本文在实验中考虑了基于网流的数据集 NF-UNSWNB15-v2,并试图解决在构建 IDS 时遇到的问题。通过利用 FOX 优化和 V 型传递函数进行二值化,并选择最佳特征,解决了处理大量特征等问题。使用 Light-GBM 对其进行进一步分类,并评估二元分类和多类分类的结果。与其他现有方法相比,所提出的模型能为二元分类和多类分类选择最少的特征。在对各种参数进行进一步评估后,发现所提出的方法性能令人满意,并提高了对 DoS、Exploits、Fuzzers 等各种攻击的检测率。
{"title":"A feature selection model using binary FOX optimization and v-shaped transfer function for network IDS","authors":"Babita Majhi, Prastavana","doi":"10.1007/s12083-024-01720-z","DOIUrl":"https://doi.org/10.1007/s12083-024-01720-z","url":null,"abstract":"<p>There has been a significant rise in the ways the internet caters to day-to-day usage in everyday lives. Significant presence in connecting IoTs, helping via online education, entertaining through online games, taking business decisions, and many more. Therefore, all these activities generate an abundance of data and require its management as well. There is a need to secure these networks from malicious attackers to prevent any harmful acts. Network security is still an attractive topic to conduct research on. In this paper, the Net Flow-based dataset NF-UNSWNB15-v2 has been considered for the experimentation and tried to resolve problems in building IDS. Problems like handling a large number of features have been addressed by utilizing FOX optimization with a V-shaped transfer function for binarization purposes and selecting the optimal features. Further classifying it using Light-GBM and evaluating the results for the binary and multi-class classifications. The proposed model selects minimum number of features for both binary and multi-class classification as compared to the other existing methods. Further evaluating on various parameters, the proposed approach performs satisfactorily and improvement in detection rate for various attacks like DoS, Exploits, Fuzzers etc. has been observed.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"8 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141883697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-31DOI: 10.1007/s12083-024-01767-y
Venkata Bhikshapathi Chenam, Kondepati Dhana Sree, Syed Taqi Ali
Cloud-based telemedicine uses powerful data processing technology to improve remote healthcare services. This helps make healthcare more accessible, efficient, and beneficial for both patients and healthcare providers. However, the security and privacy of patients sensitive data, especially when outsourcing to the cloud, remain significant concerns. To address this issue, patient data is stored in encrypted format on the cloud server. A searchable encryption mechanism is employed to enable efficient search on the encrypted data without compromising information confidentiality. While most searchable encryption schemes support conjunctive field keyword search in both single receiver and multi-receiver scenarios, they often result in partial information leakage related to the searched keywords. Additionally, a new scheme based on the Lagrange polynomial concept was developed to support conjunctive field-free search in a single receiver scenario. However, it is unsuitable for multi-receiver scenarios and suffers from certification management challenges. To overcome these limitations, we propose an innovative approach called "Multi-receiver Certificateless Public-key Searchable Encryption: Field-free Subset Conjunctive and Disjunctive." Our scheme is constructed upon reciprocal maps and leverages Lagrange polynomials as a fundamental tool. It offers several advantages, including cipher-index indistinguishability against chosen keyword attacks, utilizing the hardness of the decisional linear Diffie-Hellman assumption. Theoretical and experimental analyses demonstrate that our proposed scheme achieves comparable performance to existing works in terms of computational efficiency and communication overhead.
{"title":"A multi-receiver certificateless public-key searchable encryption: Field-free subset conjunctive and disjunctive","authors":"Venkata Bhikshapathi Chenam, Kondepati Dhana Sree, Syed Taqi Ali","doi":"10.1007/s12083-024-01767-y","DOIUrl":"https://doi.org/10.1007/s12083-024-01767-y","url":null,"abstract":"<p>Cloud-based telemedicine uses powerful data processing technology to improve remote healthcare services. This helps make healthcare more accessible, efficient, and beneficial for both patients and healthcare providers. However, the security and privacy of patients sensitive data, especially when outsourcing to the cloud, remain significant concerns. To address this issue, patient data is stored in encrypted format on the cloud server. A searchable encryption mechanism is employed to enable efficient search on the encrypted data without compromising information confidentiality. While most searchable encryption schemes support conjunctive field keyword search in both single receiver and multi-receiver scenarios, they often result in partial information leakage related to the searched keywords. Additionally, a new scheme based on the Lagrange polynomial concept was developed to support conjunctive field-free search in a single receiver scenario. However, it is unsuitable for multi-receiver scenarios and suffers from certification management challenges. To overcome these limitations, we propose an innovative approach called \"Multi-receiver Certificateless Public-key Searchable Encryption: Field-free Subset Conjunctive and Disjunctive.\" Our scheme is constructed upon reciprocal maps and leverages Lagrange polynomials as a fundamental tool. It offers several advantages, including cipher-index indistinguishability against chosen keyword attacks, utilizing the hardness of the decisional linear Diffie-Hellman assumption. Theoretical and experimental analyses demonstrate that our proposed scheme achieves comparable performance to existing works in terms of computational efficiency and communication overhead.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"119 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141863846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}