Pub Date : 2024-07-31DOI: 10.1007/s12083-024-01764-1
Mahyar Sadrishojaei
Many drones work together in an ad hoc manner to form flying ad hoc networks. While these networks have opened up new possibilities for a wide range of applications like the commercial, and residential, they have also presented several problems, including high-speed nodes, limited density, and abrupt dynamic topology. Therefore, routing is a complex problem in such networks. The optimized link state routing protocol served as an inspiration for this plan. This article proposes a delay-conscious routing protocol for flying ad hoc networks and offers a new method for calculating the link lifespan among two unmanned aerial vehicles based on factors such as their distance apart, relative speed, and the direction in which they travel. An approach is presented in which the emperor penguin colony algorithm is used to select multi-point relay nodes. A node's ability to serve as a multi-point relay node is based on its remaining energy, link lifespan, neighboring degree, and eagerness. In sum up, the suggested approach generates paths between nodes taking energy and lifespan into account. The performance evaluation of the proposed routing is done against ML-OLSR and MP-OLSR. At a minimum, a 15% and 32% increase in latency and energy consumption were achieved by implementing the proposed technique.
许多无人机以临时方式共同组成飞行临时网络。虽然这些网络为商业和住宅等广泛应用提供了新的可能性,但也带来了一些问题,包括高速节点、有限的密度和突然的动态拓扑。因此,在这类网络中,路由选择是一个复杂的问题。优化链路状态路由协议为本计划提供了灵感。本文提出了一种适用于飞行 ad hoc 网络的具有延迟意识的路由协议,并提供了一种根据两架无人飞行器之间的距离、相对速度和行进方向等因素计算其链路寿命的新方法。本文介绍了一种使用帝企鹅殖民地算法选择多点中继节点的方法。节点作为多点中继节点的能力取决于其剩余能量、链路寿命、邻接度和热心程度。总之,建议的方法在生成节点间路径时考虑了能量和寿命。建议路由的性能评估是对照 ML-OLSR 和 MP-OLSR 进行的。通过实施所建议的技术,延迟和能耗至少分别增加了 15% 和 32%。
{"title":"A delay aware routing approach for FANET based on emperor penguins colony algorithm","authors":"Mahyar Sadrishojaei","doi":"10.1007/s12083-024-01764-1","DOIUrl":"https://doi.org/10.1007/s12083-024-01764-1","url":null,"abstract":"<p>Many drones work together in an ad hoc manner to form flying ad hoc networks. While these networks have opened up new possibilities for a wide range of applications like the commercial, and residential, they have also presented several problems, including high-speed nodes, limited density, and abrupt dynamic topology. Therefore, routing is a complex problem in such networks. The optimized link state routing protocol served as an inspiration for this plan. This article proposes a delay-conscious routing protocol for flying ad hoc networks and offers a new method for calculating the link lifespan among two unmanned aerial vehicles based on factors such as their distance apart, relative speed, and the direction in which they travel. An approach is presented in which the emperor penguin colony algorithm is used to select multi-point relay nodes. A node's ability to serve as a multi-point relay node is based on its remaining energy, link lifespan, neighboring degree, and eagerness. In sum up, the suggested approach generates paths between nodes taking energy and lifespan into account. The performance evaluation of the proposed routing is done against ML-OLSR and MP-OLSR. At a minimum, a 15% and 32% increase in latency and energy consumption were achieved by implementing the proposed technique.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"17 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141863839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-30DOI: 10.1007/s12083-024-01766-z
Zengwei Lyu, Pengfei Li, Zhenchun Wei, Yuqi Fan, Juan Xu, Lei Shi
Mobile Edge Computing (MEC) is a new computing paradigm that has shown great potential. How to extract the cooperative topological relationship between MEC servers to realize jointly computing is the key problem to solve the bottleneck of MEC computational capability. In previous studies, multi-MEC servers are regarded as unit computing nodes with the same cooperation relationship to jointly schedule offloading tasks, without considering the hierarchical and clustered topology of the server collaborative work. As a result, in the scenario of unbalanced distribution of computing resources, it is difficult to obtain the optimal joint scheduling strategy for offloading tasks according to the cooperation relationship and resource differences among MEC servers. Therefore, this paper considers introducing the topological relationship of group cooperation among multi-MEC servers to optimize the joint scheduling strategy, and proposes a Multi-Agent Hierarchical Graph Attention Soft Actor-Critic algorithm (MHSAC). Firstly, based on the differences in their own resources and the demands of the tasks they undertake, MEC servers are divided into series clusters. Then, a Hierarchical Graph Attention Network (HGAT) is used to model each agent to extract the physical communication topology information of the MEC server and the group topology information of multi-edge cooperation. The multi-agent soft Actor-Critic algorithm is used to obtain the offloading scheduling decision of multi-edge cooperation. Experiments show that the MHSAC algorithm that considering the topological relationship of multi-edge group cooperation can optimize load distribution under low latency and resource-limited requirements, achieving optimal load balancing values and task drop rates.
{"title":"A multi-edge jointly offloading method considering group cooperation topology features in edge computing networks","authors":"Zengwei Lyu, Pengfei Li, Zhenchun Wei, Yuqi Fan, Juan Xu, Lei Shi","doi":"10.1007/s12083-024-01766-z","DOIUrl":"https://doi.org/10.1007/s12083-024-01766-z","url":null,"abstract":"<p>Mobile Edge Computing (MEC) is a new computing paradigm that has shown great potential. How to extract the cooperative topological relationship between MEC servers to realize jointly computing is the key problem to solve the bottleneck of MEC computational capability. In previous studies, multi-MEC servers are regarded as unit computing nodes with the same cooperation relationship to jointly schedule offloading tasks, without considering the hierarchical and clustered topology of the server collaborative work. As a result, in the scenario of unbalanced distribution of computing resources, it is difficult to obtain the optimal joint scheduling strategy for offloading tasks according to the cooperation relationship and resource differences among MEC servers. Therefore, this paper considers introducing the topological relationship of group cooperation among multi-MEC servers to optimize the joint scheduling strategy, and proposes a Multi-Agent Hierarchical Graph Attention Soft Actor-Critic algorithm (MHSAC). Firstly, based on the differences in their own resources and the demands of the tasks they undertake, MEC servers are divided into series clusters. Then, a Hierarchical Graph Attention Network (HGAT) is used to model each agent to extract the physical communication topology information of the MEC server and the group topology information of multi-edge cooperation. The multi-agent soft Actor-Critic algorithm is used to obtain the offloading scheduling decision of multi-edge cooperation. Experiments show that the MHSAC algorithm that considering the topological relationship of multi-edge group cooperation can optimize load distribution under low latency and resource-limited requirements, achieving optimal load balancing values and task drop rates.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"194 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141864006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-27DOI: 10.1007/s12083-024-01762-3
Haonan Wang, Jingyu Wang, Lixin Liu, Yu Lu
As blockchain technology advances, cross-chain asset transfer has become a critical issue in achieving interoperability between different blockchain networks. However, existing cross-chain solutions often require high trust requirements and complex communication protocols, which hinder usability and flexibility. To address these issues, this work introduces the temporary relay, a novel cross-chain asset transfer model without continuous blockchain network presence and frequent inter-chain communication. Technically, the temporary relay uses non-interactive zero-knowledge proofs to verify transactions and protect privacy while ensuring blockchain immutability and traceability after the temporary relay is shut down. We detail the construction of the temporary relay and analyze the security of the circuits constructed by the zero-knowledge proofs. Prototype implementation on the Substrate blockchain platform and experimental evaluation demonstrate the feasibility of the temporary relay. Furthermore, the verification time of zero-knowledge proofs in our model is short.
{"title":"Temporary relay: A more flexible way to cross chains","authors":"Haonan Wang, Jingyu Wang, Lixin Liu, Yu Lu","doi":"10.1007/s12083-024-01762-3","DOIUrl":"https://doi.org/10.1007/s12083-024-01762-3","url":null,"abstract":"<p>As blockchain technology advances, cross-chain asset transfer has become a critical issue in achieving interoperability between different blockchain networks. However, existing cross-chain solutions often require high trust requirements and complex communication protocols, which hinder usability and flexibility. To address these issues, this work introduces the temporary relay, a novel cross-chain asset transfer model without continuous blockchain network presence and frequent inter-chain communication. Technically, the temporary relay uses non-interactive zero-knowledge proofs to verify transactions and protect privacy while ensuring blockchain immutability and traceability after the temporary relay is shut down. We detail the construction of the temporary relay and analyze the security of the circuits constructed by the zero-knowledge proofs. Prototype implementation on the Substrate blockchain platform and experimental evaluation demonstrate the feasibility of the temporary relay. Furthermore, the verification time of zero-knowledge proofs in our model is short.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"93 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141770176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Homomorphic encryption (HE) is an innovative privacy protection technique supporting homomorphic addition and multiplication. It has been widely applied in the applications of peer-to-peer networks, such as secure data sharing and privacy-preserving search. Existing HE schemes can be roughly categorized into partially HE and fully HE (FHE). The former is computationally efficient but only supports either additive or multiplicative homomorphic operations. The latter can simultaneously support both additive and multiplicative operations, but the corresponding computational costs are intensive. Recently, some works leverage trusted execution environment (TEE) to optimize the efficiency of FHE. However, they suffer from the limitations of ciphertext expansion and the strong trust assumption for TEE. To address these limitations, we present a new fully homomorphic encryption scheme named Paillier FHE (PFHE) by employing TEE to extend the additive Paillier HE to support multiplicative operations and further optimizing the computational efficiency, where TEE is assumed to be semi-honest to avoid the strong trust assumption. Specifically, we first design a Paillier multiplication protocol (PMUL) to achieve the ciphertext multiplication without bootstrapping. Based on the protocol, we utilize the packing technique to design a Paillier inner product protocol (PVMUL) and a Paillier matrix multiplication protocol (PMMUL) to support the inner product and matrix multiplication operations efficiently. Moreover, we provide the detailed security analysis for our protocols. We compare our PFHE with typical fully homomorphic encryption libraries by experiments, and at the same security level, our scheme demonstrates significant advantages.
同态加密(HE)是一种创新的隐私保护技术,支持同态加法和乘法。它已广泛应用于点对点网络,如安全数据共享和隐私保护搜索。现有的 HE 方案可大致分为部分 HE 和完全 HE(FHE)。前者计算效率高,但只支持加法或乘法同态操作。后者可以同时支持加法和乘法运算,但相应的计算成本很高。最近,一些研究利用可信执行环境(TEE)来优化 FHE 的效率。然而,它们受到密文扩展和 TEE 强信任假设的限制。为了解决这些局限性,我们提出了一种名为 Paillier FHE(PFHE)的新型全同态加密方案,利用 TEE 将加法 Paillier HE 扩展为支持乘法运算,并进一步优化计算效率,同时假定 TEE 为半诚信,以避免强信任假设。具体来说,我们首先设计了一个 Paillier 乘法协议(PMUL),以实现无需引导的密文乘法。在该协议的基础上,我们利用打包技术设计了 Paillier 内积协议(PVMUL)和 Paillier 矩阵乘法协议(PMMUL),以高效支持内积和矩阵乘法操作。此外,我们还对协议进行了详细的安全性分析。我们通过实验将我们的 PFHE 与典型的全同态加密库进行了比较,在相同的安全等级下,我们的方案具有显著的优势。
{"title":"Enhancing paillier to fully homomorphic encryption with semi-honest TEE","authors":"Yunyi Fang, Xiaopeng Yang, Hui Zhu, Wei Xu, Yandong Zheng, Xingdong Liu, Dong Zhang","doi":"10.1007/s12083-024-01752-5","DOIUrl":"https://doi.org/10.1007/s12083-024-01752-5","url":null,"abstract":"<p>Homomorphic encryption (HE) is an innovative privacy protection technique supporting homomorphic addition and multiplication. It has been widely applied in the applications of peer-to-peer networks, such as secure data sharing and privacy-preserving search. Existing HE schemes can be roughly categorized into partially HE and fully HE (FHE). The former is computationally efficient but only supports either additive or multiplicative homomorphic operations. The latter can simultaneously support both additive and multiplicative operations, but the corresponding computational costs are intensive. Recently, some works leverage trusted execution environment (TEE) to optimize the efficiency of FHE. However, they suffer from the limitations of ciphertext expansion and the strong trust assumption for TEE. To address these limitations, we present a new fully homomorphic encryption scheme named Paillier FHE (PFHE) by employing TEE to extend the additive Paillier HE to support multiplicative operations and further optimizing the computational efficiency, where TEE is assumed to be semi-honest to avoid the strong trust assumption. Specifically, we first design a Paillier multiplication protocol (PMUL) to achieve the ciphertext multiplication without bootstrapping. Based on the protocol, we utilize the packing technique to design a Paillier inner product protocol (PVMUL) and a Paillier matrix multiplication protocol (PMMUL) to support the inner product and matrix multiplication operations efficiently. Moreover, we provide the detailed security analysis for our protocols. We compare our PFHE with typical fully homomorphic encryption libraries by experiments, and at the same security level, our scheme demonstrates significant advantages.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"37 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141770175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-25DOI: 10.1007/s12083-024-01769-w
Xiaodong Yang, Lizhen Wei, Songyu Li, Xiaoni Du, Caifen Wang
To enhance the security of medical data, the government and healthcare institutions must collect and analyze vast amounts of information, enabling the prompt detection of irregular patterns and timely issuance of accurate warnings. This is crucial for preventing and containing potential threats to medical data security. However, securely sharing and converting these data poses a significant challenge, particularly in open wireless access networks within healthcare settings. Proxy re-signature (PRS) offers not only signature conversion capabilities but also anonymity, safeguarding data reliability and authenticity. Nonetheless, current proxy re-signature techniques overlook the potential for algorithm substitution attacks (ASA). Therefore, we introduce a novel proxy re-signature scheme, leveraging cryptographic reverse firewall (CRF) technology, tailored specifically for the medical domain. Furthermore, we conducted rigorous security analysis and simulation experiments to validate the practical effectiveness of our scheme. This approach addresses the need for secure data sharing among various entities, including medical institutions, management centers, and research facilities, ensuring the integrity and confidentiality of critical medical information.
{"title":"Proxy re-signature scheme with cryptographic reverse firewall for medical data security","authors":"Xiaodong Yang, Lizhen Wei, Songyu Li, Xiaoni Du, Caifen Wang","doi":"10.1007/s12083-024-01769-w","DOIUrl":"https://doi.org/10.1007/s12083-024-01769-w","url":null,"abstract":"<p>To enhance the security of medical data, the government and healthcare institutions must collect and analyze vast amounts of information, enabling the prompt detection of irregular patterns and timely issuance of accurate warnings. This is crucial for preventing and containing potential threats to medical data security. However, securely sharing and converting these data poses a significant challenge, particularly in open wireless access networks within healthcare settings. Proxy re-signature (PRS) offers not only signature conversion capabilities but also anonymity, safeguarding data reliability and authenticity. Nonetheless, current proxy re-signature techniques overlook the potential for algorithm substitution attacks (ASA). Therefore, we introduce a novel proxy re-signature scheme, leveraging cryptographic reverse firewall (CRF) technology, tailored specifically for the medical domain. Furthermore, we conducted rigorous security analysis and simulation experiments to validate the practical effectiveness of our scheme. This approach addresses the need for secure data sharing among various entities, including medical institutions, management centers, and research facilities, ensuring the integrity and confidentiality of critical medical information.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"15 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141770177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-21DOI: 10.1007/s12083-024-01765-0
Chunyan Liu, Tao Feng
The surging interest in digitalization has revitalized research for digital business model. Mobile Internet of Things (IoT) terminals will reach billions and become an important infrastructure for a digital and intelligent society. In the digital business model of IoT terminals, the electronic seal of commercial contracts are especially investigated to provide the same level security as guaranteed by the traditional seal. However, the existing electronic seal is only applicable to the centralized network applications, which severely relies on the certificate authority. In this paper, we propose a blockchain-based multi-signature smart contract electronic seal scheme. The key of our design is to deploy a smart contract for business parties on Ethereum for secure electronic seal towards mobile IoT terminals. Unlike the traditional seal, this electronic seal is verified and managed collectively by all mining nodes. Combining it with optimizations in terms of a multi-signature algorithm encoded in the smart contract, our design achieves complete digital contract functionality for all business participants of terminals. As an example, we demonstrate an implementation on the Goerli testnet of the Ethereum network with the smart contract deployment. The security analysis and evaluation demonstrate that our design is secure in its multi-signature implementation and can be used in practice.
{"title":"Blockchain based multi-signature smart contract electronic seal orienting mobile IoT terminals","authors":"Chunyan Liu, Tao Feng","doi":"10.1007/s12083-024-01765-0","DOIUrl":"https://doi.org/10.1007/s12083-024-01765-0","url":null,"abstract":"<p>The surging interest in digitalization has revitalized research for digital business model. Mobile Internet of Things (IoT) terminals will reach billions and become an important infrastructure for a digital and intelligent society. In the digital business model of IoT terminals, the electronic seal of commercial contracts are especially investigated to provide the same level security as guaranteed by the traditional seal. However, the existing electronic seal is only applicable to the centralized network applications, which severely relies on the certificate authority. In this paper, we propose a blockchain-based multi-signature smart contract electronic seal scheme. The key of our design is to deploy a smart contract for business parties on Ethereum for secure electronic seal towards mobile IoT terminals. Unlike the traditional seal, this electronic seal is verified and managed collectively by all mining nodes. Combining it with optimizations in terms of a multi-signature algorithm encoded in the smart contract, our design achieves complete digital contract functionality for all business participants of terminals. As an example, we demonstrate an implementation on the Goerli testnet of the Ethereum network with the smart contract deployment. The security analysis and evaluation demonstrate that our design is secure in its multi-signature implementation and can be used in practice.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"25 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141744726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-20DOI: 10.1007/s12083-024-01760-5
S. Shiny, M. Marsaline Beno
The demand-side management (DSM) research field has expanded due to rising energy consumption. In the traditional electrical grid, unknown energy usage results in high costs. This paper introduces a reinforcement learning-based self-adaptive learning-black widow optimization (RL-SAL-BWO) approach for dynamic load scheduling and power allocation, aimed at improving energy efficiency and reducing costs and energy consumption. The proposed strategy utilizes pricing signals and real-time load profiles to estimate the changing energy consumption within residential buildings. To optimize energy allocation across different appliances, this algorithm considers both energy efficiency and load characteristics. The RL agent, comprising action space, reward function, and Q-value function, is utilized for decision-making on power allocation and load scheduling. The SAL algorithm automatically adjusts the exploration rate and learning rate which leads to enhanced efficiency. By exploring the solution space, the BWO improves the learning process. Through the integration of RL, SAL, and BWO techniques, energy efficiency is increased, energy consumption is reduced, and electricity costs are lowered. The smart grid is utilized for estimating changes in energy consumption. The purpose of this is to estimate changes in energy consumption, aiding in informed decisions about energy management and infrastructure planning. The proposed approach is implemented using MATLAB R2021b software, followed by the evaluation and calculation of performance metrics. The findings demonstrate that the proposed strategy significantly enhances energy efficiency by 18.5%, reduces energy consumption by 31.91%, and decreases electricity costs by 40.66%. Furthermore, the computation time reduction of the proposed approach is 13.7 s.
{"title":"Dynamic load scheduling and power allocation for energy efficiency and cost reduction in smart grids: An RL-SAL-BWO approach","authors":"S. Shiny, M. Marsaline Beno","doi":"10.1007/s12083-024-01760-5","DOIUrl":"https://doi.org/10.1007/s12083-024-01760-5","url":null,"abstract":"<p>The demand-side management (DSM) research field has expanded due to rising energy consumption. In the traditional electrical grid, unknown energy usage results in high costs. This paper introduces a reinforcement learning-based self-adaptive learning-black widow optimization (RL-SAL-BWO) approach for dynamic load scheduling and power allocation, aimed at improving energy efficiency and reducing costs and energy consumption. The proposed strategy utilizes pricing signals and real-time load profiles to estimate the changing energy consumption within residential buildings. To optimize energy allocation across different appliances, this algorithm considers both energy efficiency and load characteristics. The RL agent, comprising action space, reward function, and Q-value function, is utilized for decision-making on power allocation and load scheduling. The SAL algorithm automatically adjusts the exploration rate and learning rate which leads to enhanced efficiency. By exploring the solution space, the BWO improves the learning process. Through the integration of RL, SAL, and BWO techniques, energy efficiency is increased, energy consumption is reduced, and electricity costs are lowered. The smart grid is utilized for estimating changes in energy consumption. The purpose of this is to estimate changes in energy consumption, aiding in informed decisions about energy management and infrastructure planning. The proposed approach is implemented using MATLAB R2021b software, followed by the evaluation and calculation of performance metrics. The findings demonstrate that the proposed strategy significantly enhances energy efficiency by 18.5%, reduces energy consumption by 31.91%, and decreases electricity costs by 40.66%. Furthermore, the computation time reduction of the proposed approach is 13.7 s.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"15 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141744616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-19DOI: 10.1007/s12083-024-01747-2
K Rajkumar, B Paramasivan
Recent developments in low power sensors have prompted the creation of Visual Sensor Network (VSN). Coverage, availability, network life duration, and energy usage are important issues that arise in VSN. However several energy-efficient protocols have been developed, but those protocols have transmission collisions and energy loss due to increased data redundancy. In order to overcome these challenges, an Energy Efficient Routing based Sleep Scheduling Mechanism (EERSSM) is developed. Camera nodes are randomly deployed in the Visual Sensor Network, and the data is received from the network through a relay node. Energy, distance, and node stability are taken into account while identifying the relay node. The next step is to use a Similarity Graph guided Neural Network (SGGNN) to determine whether neighboring nodes detect similar data. If similar information is detected, a similarity measure is computed. When the value of the similarity measure exceeds the threshold, the node goes into the sleep stage while the other nodes are in the wakeup stage. A decision tree is used to calculate the sleep cycle depending on a few factors. The decision tree has a number of hyperparameters, and those parameters are tuned using Golden Eagle Optimization (GEO). When the update cycle is over, the node awakens and joins in the transmission procedure. This proposed energy efficient routing algorithm is tested with several metrics that attain better performance, like 14.42 J average residual energy, 93% packet delivery ratio, 9.3% throughput value, and 770 s network lifetime. Thus, the techniques used in the proposed approach are the better choice for solving the availability, energy consumption, and network lifetime issues in VSN.
{"title":"Energy Efficient Routing Mechanism Based on Similarity Guided Graph Neural Network and Decision Tree with Golden Eagle Optimization in VSN","authors":"K Rajkumar, B Paramasivan","doi":"10.1007/s12083-024-01747-2","DOIUrl":"https://doi.org/10.1007/s12083-024-01747-2","url":null,"abstract":"<p>Recent developments in low power sensors have prompted the creation of Visual Sensor Network (VSN). Coverage, availability, network life duration, and energy usage are important issues that arise in VSN. However several energy-efficient protocols have been developed, but those protocols have transmission collisions and energy loss due to increased data redundancy. In order to overcome these challenges, an Energy Efficient Routing based Sleep Scheduling Mechanism (EERSSM) is developed. Camera nodes are randomly deployed in the Visual Sensor Network, and the data is received from the network through a relay node. Energy, distance, and node stability are taken into account while identifying the relay node. The next step is to use a Similarity Graph guided Neural Network (SGGNN) to determine whether neighboring nodes detect similar data. If similar information is detected, a similarity measure is computed. When the value of the similarity measure exceeds the threshold, the node goes into the sleep stage while the other nodes are in the wakeup stage. A decision tree is used to calculate the sleep cycle depending on a few factors. The decision tree has a number of hyperparameters, and those parameters are tuned using Golden Eagle Optimization (GEO). When the update cycle is over, the node awakens and joins in the transmission procedure. This proposed energy efficient routing algorithm is tested with several metrics that attain better performance, like 14.42 J average residual energy, 93% packet delivery ratio, 9.3% throughput value, and 770 s network lifetime. Thus, the techniques used in the proposed approach are the better choice for solving the availability, energy consumption, and network lifetime issues in VSN.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"10 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141744617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the continual evolution of network technologies, the Internet of Things (IoT) has permeated various sectors of society. However, over the past decade, the annual discovery of cyberattacks has shown an exponential surge, inflicting severe damage to economic development. Aiming at the high false alarm rate, poor classification performance and overfitting problems in current intrusion detection systems, this paper proposes an efficient hierarchical intrusion detection model named ET-DCANET. Initially, the extreme random tree algorithm is employed for feature selection to meticulously curate the optimal feature subset. Subsequently, the dilated convolution and dual attention mechanism (including channel attention and spatial attention) are introduced, and a strategy of gradual transition from coarse-grained learning to fine-grained learning is proposed by gradually narrowing the expansion rate of cavity convolution, and the DCNN and dual attention modules are progressively refined to effectively utilize the synergy of DCNN and Attention to extract spatial and temporal features. This gradual transition from coarse-grained learning to fine-grained learning helps to better balance global and local information when dealing with complex data, and improves the performance and generalization ability of the model. To confront the class imbalance issue within the dataset, a novel loss function, EQLv2, is introduced as a substitute for the conventional cross-entropy (CE) loss. This innovation directs the model's focus toward minority class samples, ultimately enhancing the overall performance of the model. The proposed model shows excellent intrusion detection on the NSL-KDD, UNSW-NB15, and X-IIoTID datasets with accuracy rates of 99.68%, 98.50%, and 99.85%, respectively.
{"title":"A hierarchical hybrid intrusion detection model for industrial internet of things","authors":"Zhendong Wang, Xin Yang, Zhiyuan Zeng, Daojing He, Sammy Chan","doi":"10.1007/s12083-024-01749-0","DOIUrl":"https://doi.org/10.1007/s12083-024-01749-0","url":null,"abstract":"<p>With the continual evolution of network technologies, the Internet of Things (IoT) has permeated various sectors of society. However, over the past decade, the annual discovery of cyberattacks has shown an exponential surge, inflicting severe damage to economic development. Aiming at the high false alarm rate, poor classification performance and overfitting problems in current intrusion detection systems, this paper proposes an efficient hierarchical intrusion detection model named ET-DCANET. Initially, the extreme random tree algorithm is employed for feature selection to meticulously curate the optimal feature subset. Subsequently, the dilated convolution and dual attention mechanism (including channel attention and spatial attention) are introduced, and a strategy of gradual transition from coarse-grained learning to fine-grained learning is proposed by gradually narrowing the expansion rate of cavity convolution, and the DCNN and dual attention modules are progressively refined to effectively utilize the synergy of DCNN and Attention to extract spatial and temporal features. This gradual transition from coarse-grained learning to fine-grained learning helps to better balance global and local information when dealing with complex data, and improves the performance and generalization ability of the model. To confront the class imbalance issue within the dataset, a novel loss function, EQLv2, is introduced as a substitute for the conventional cross-entropy (CE) loss. This innovation directs the model's focus toward minority class samples, ultimately enhancing the overall performance of the model. The proposed model shows excellent intrusion detection on the NSL-KDD, UNSW-NB15, and X-IIoTID datasets with accuracy rates of 99.68%, 98.50%, and 99.85%, respectively.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"13 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141744615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-12DOI: 10.1007/s12083-024-01758-z
Rupinder Kaur, Sonia Goyal
Underwater Wireless Sensor Networks (UWSNs) must recognize sensor nodes and estimate their locations. A reliable underwater data forwarding relay is difficult to find in the acoustic communication environment. Underwater sensor node localization research has yet to accomplish accuracy, propagation error, restricted coverage, and QoS. A novel solution for static and dynamic UWSNs called the Reward-based distance vector Hop Localization (RDVHL) protocol is proposed. The reward for each underwater sensor node is computed periodically using the different reward measures in RDVHL. RDVHL first divides the deployed UWSNs dynamically into several clusters. Then Anchor Nodes (AN) are localized for each cluster using the reward measures periodically. After localizing the AN, they broadcast the localization information to the ordinary sensor nodes. The ordinary nodes are localized during the route formation for reliable data transmission using periodically computed reward scores. The correct localization of the sensor nodes enables the fast transmission of the underwater data from the source to the intended sink nodes. The proposed reward-based approach achieves accurate sensor node localization and reduces void communication and collisions in the acoustic communication channels. The RDVHL protocol outperforms the state-of-the-art in average throughput, average latency, average accuracy, and average energy consumption. RDVHL throughput increases by 12.54%. The average energy consumption drops 12.82%, localization inaccuracy drops 29.44%, and communication latency drops 3.72%.
{"title":"Flexible localization protocol for underwater wireless sensor networks using hybrid reward evaluation scheme","authors":"Rupinder Kaur, Sonia Goyal","doi":"10.1007/s12083-024-01758-z","DOIUrl":"https://doi.org/10.1007/s12083-024-01758-z","url":null,"abstract":"<p>Underwater Wireless Sensor Networks (UWSNs) must recognize sensor nodes and estimate their locations. A reliable underwater data forwarding relay is difficult to find in the acoustic communication environment. Underwater sensor node localization research has yet to accomplish accuracy, propagation error, restricted coverage, and QoS. A novel solution for static and dynamic UWSNs called the Reward-based distance vector Hop Localization (RDVHL) protocol is proposed. The reward for each underwater sensor node is computed periodically using the different reward measures in RDVHL. RDVHL first divides the deployed UWSNs dynamically into several clusters. Then Anchor Nodes (AN) are localized for each cluster using the reward measures periodically. After localizing the AN, they broadcast the localization information to the ordinary sensor nodes. The ordinary nodes are localized during the route formation for reliable data transmission using periodically computed reward scores. The correct localization of the sensor nodes enables the fast transmission of the underwater data from the source to the intended sink nodes. The proposed reward-based approach achieves accurate sensor node localization and reduces void communication and collisions in the acoustic communication channels. The RDVHL protocol outperforms the state-of-the-art in average throughput, average latency, average accuracy, and average energy consumption. RDVHL throughput increases by 12.54%. The average energy consumption drops 12.82%, localization inaccuracy drops 29.44%, and communication latency drops 3.72%.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"61 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141614248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}