首页 > 最新文献

Peer-To-Peer Networking and Applications最新文献

英文 中文
Dcaro: Dynamic cluster formation and AUV-aided routing optimization for energy-efficient UASNs Dcaro:针对高能效 UASN 的动态集群形成和 AUV 辅助路由优化
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-12 DOI: 10.1007/s12083-024-01756-1
Kammula Sunil Kumar, Deepak Singh, Veena Anand

In Underwater Acoustic Sensor Networks (UASNs), optimizing energy efficiency and minimizing void occurrences in routing is paramount. Due to the energy constraints of sensor nodes, low-power transmission is essential for conserving energy. Previous research highlighted the effectiveness of clustering and routing to enhance energy efficacy in UASNs. Therefore, the clustering and routing processes can be considered as optimization problems that are nondeterministic polynomial-time (NP) hard. These challenges can be tackled through the application of machine learning algorithms and meta-heuristics. In this context, K-means clustering is employed to partition the network into clusters, designating the centroid as an ideal Cluster Head (CH) location. This ensures a one-hop proximity between the CH and cluster members, reducing transmitting power and enhancing network energy efficiency. Subsequently, a potential CH is selected using a marine predator optimization (MPA) algorithm based on the derived multi-objective fitness function. The MPA algorithm not only determines the optimal CH but also moves the elected CH to the K-means centroid location. Consequently, Autonomous Underwater Vehicles (AUVs) are utilized to collect and route packets from the CH to the Base Station (BS), minimizing the occurrence of void nodes and avoiding obstacle collisions. An optimal routing path for AUV is established through a way-point-based navigation scheme to achieve high packet reliability. Additionally, the proposed method (DCARo) dynamically determines the optimal number of clusters using the elbow method, ensuring scalability according to network size. Extensive simulations affirm the superiority of the DCARo across various performance metrics.

在水下声学传感器网络(UASN)中,优化能源效率和尽量减少路由过程中的空洞是至关重要的。由于传感器节点的能量限制,低功耗传输对节约能量至关重要。以往的研究强调了聚类和路由选择对提高 UASN 能源效率的有效性。因此,聚类和路由过程可视为非确定性多项式时间(NP)困难的优化问题。这些难题可以通过应用机器学习算法和元启发式来解决。在这种情况下,我们采用 K-means 聚类将网络划分为若干个簇,并将中心点指定为理想的簇头(CH)位置。这确保了 CH 和簇成员之间的一跳距离,降低了发射功率,提高了网络能效。随后,利用海洋捕食者优化(MPA)算法,根据推导出的多目标适合度函数选择潜在的 CH。MPA 算法不仅能确定最佳 CH,还能将选出的 CH 移至 K-means 中心点位置。因此,利用自主水下航行器(AUV)收集和路由从 CH 到基站(BS)的数据包,最大限度地减少无效节点的出现并避免障碍物碰撞。通过基于航点的导航方案为 AUV 建立最佳路由路径,以实现高数据包可靠性。此外,所提出的方法(DCARo)使用肘法动态确定最佳簇数,确保了根据网络规模的可扩展性。广泛的模拟证实了 DCARo 在各种性能指标上的优越性。
{"title":"Dcaro: Dynamic cluster formation and AUV-aided routing optimization for energy-efficient UASNs","authors":"Kammula Sunil Kumar, Deepak Singh, Veena Anand","doi":"10.1007/s12083-024-01756-1","DOIUrl":"https://doi.org/10.1007/s12083-024-01756-1","url":null,"abstract":"<p>In Underwater Acoustic Sensor Networks (UASNs), optimizing energy efficiency and minimizing void occurrences in routing is paramount. Due to the energy constraints of sensor nodes, low-power transmission is essential for conserving energy. Previous research highlighted the effectiveness of clustering and routing to enhance energy efficacy in UASNs. Therefore, the clustering and routing processes can be considered as optimization problems that are nondeterministic polynomial-time (NP) hard. These challenges can be tackled through the application of machine learning algorithms and meta-heuristics. In this context, K-means clustering is employed to partition the network into clusters, designating the centroid as an ideal Cluster Head (CH) location. This ensures a one-hop proximity between the CH and cluster members, reducing transmitting power and enhancing network energy efficiency. Subsequently, a potential CH is selected using a marine predator optimization (MPA) algorithm based on the derived multi-objective fitness function. The MPA algorithm not only determines the optimal CH but also moves the elected CH to the K-means centroid location. Consequently, Autonomous Underwater Vehicles (AUVs) are utilized to collect and route packets from the CH to the Base Station (BS), minimizing the occurrence of void nodes and avoiding obstacle collisions. An optimal routing path for AUV is established through a way-point-based navigation scheme to achieve high packet reliability. Additionally, the proposed method (DCARo) dynamically determines the optimal number of clusters using the elbow method, ensuring scalability according to network size. Extensive simulations affirm the superiority of the DCARo across various performance metrics.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"247 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141615048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Online budget-limited pricing incentives for remote mobile sensing 针对远程移动传感的在线预算有限定价激励机制
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-05 DOI: 10.1007/s12083-024-01755-2
Jiajun Sun

Mobile crowdsensing (MCS) receives extensive interest due to enabling many novel applications at lower cost. However in pricing incentive scenes of MCS, utility from mobile users presents complex distributions due to mobility, changes of abilities and resource consumption such as device’s energy and memory, especially for submodular MCS with more general distributions. However, existing works only focus on homogeneous and heterogeneous MCS, whether multi-request pricing scene or single-request pricing scene. To the end, in this paper, we investigate online pricing issues for submodular MCS. Moreover, we apply a multiple-stage budget-limited process and robust mean estimators to design budget-limited pricing incentive for submodular MCS. Extensive simulations demonstrate that our mechanisms outweigh existing benchmarks.

移动众感应(MCS)以较低的成本实现了许多新颖的应用,因而受到广泛关注。然而,在 MCS 的定价激励场景中,由于移动性、能力变化以及设备的能量和内存等资源消耗,移动用户的效用呈现出复杂的分布,尤其是对于具有更一般分布的亚模态 MCS。然而,无论是多请求定价场景还是单请求定价场景,现有研究都只关注同质和异质 MCS。为此,我们在本文中研究了亚模态 MCS 的在线定价问题。此外,我们还应用了多阶段预算限制过程和稳健均值估计器,为亚模块 MCS 设计了预算限制定价激励机制。大量的模拟证明,我们的机制优于现有的基准。
{"title":"Online budget-limited pricing incentives for remote mobile sensing","authors":"Jiajun Sun","doi":"10.1007/s12083-024-01755-2","DOIUrl":"https://doi.org/10.1007/s12083-024-01755-2","url":null,"abstract":"<p>Mobile crowdsensing (MCS) receives extensive interest due to enabling many novel applications at lower cost. However in pricing incentive scenes of MCS, utility from mobile users presents complex distributions due to mobility, changes of abilities and resource consumption such as device’s energy and memory, especially for submodular MCS with more general distributions. However, existing works only focus on homogeneous and heterogeneous MCS, whether multi-request pricing scene or single-request pricing scene. To the end, in this paper, we investigate online pricing issues for submodular MCS. Moreover, we apply a multiple-stage budget-limited process and robust mean estimators to design budget-limited pricing incentive for submodular MCS. Extensive simulations demonstrate that our mechanisms outweigh existing benchmarks.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"18 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141552988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An integrated MCDM-based charging scheduling in a WRSN with multiple MCs 具有多个 MC 的 WRSN 中基于 MCDM 的综合充电调度
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-05 DOI: 10.1007/s12083-024-01705-y
Man Gun Ri, Il Gwang Kim, Se Hun Pak, Nam Jun Jong, Song Jo Kim

Recently, a few Multi-Criteria Decision Making (MCDM)-based charging scheduling schemes have been proposed. However, these schemes have still connoted the problems from the viewpoint of assigning weights to multi-criteria and exploiting redundant capability of a Mobile Charger (MC). In this paper, we propose an efficient charging scheduling scheme using an integrated FCNP-TOPSIS to solve the above-mentioned problems. The proposed scheme firstly divides the whole network into sub-areas by using the Fuzzy C-Means (FCM) algorithm so as to evenly distribute charging request load into multiple MCs and assign a MC to each sub-area. Next, each MC draws up a charging schedule into on-demand or semi-on-demand charging scheduling scheme according to the MC’s charging capability and the number of charging Request Nodes (cRNs). In charging scheduling, first the Fuzzy Cognitive Network Process (FCNP) assigns the relative weights to multi-criteria to characterize the cRNs and predict the potential-to-be-Bottlenecked Nodes (pBNs). Then the Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) selects the most suitable next charging location for on-demand charging scheduling and the proactive charging nodes among the predicted pBNs for semi-on-demand charging scheduling. While drawing up the on-demand charging schedule, the partial charging time at each charging location is calculated considering the weights of multi-criteria by FCNP. Extensive simulation experiments have been conducted to show that the proposed scheme greatly improves the charging and network performance at various performance metrics compared to existing schemes. In special, if the number of nodes is 650, the network lifetime of the proposed scheme is 129.4%, 239.8%, 282.5%, 283.2% and 293.6% longer compared to the FAHP-VWA-TOPSIS, FLCSD, AHP-TOPSIS, OPPC, and NJNP schemes, respectively.

最近,人们提出了一些基于多标准决策(MCDM)的充电调度方案。然而,这些方案仍存在多标准权重分配和利用移动充电器(MC)冗余能力的问题。本文提出了一种利用集成 FCNP-TOPSIS 的高效充电调度方案来解决上述问题。该方案首先利用模糊 C-Means 算法将整个网络划分为多个子区域,以便将充电请求负载平均分配给多个 MC,并为每个子区域分配一个 MC。接下来,每个 MC 根据 MC 的充电能力和充电请求节点(cRN)的数量制定充电计划,分为按需或半按需充电调度方案。在充电调度过程中,首先采用模糊认知网络过程(FCNP)对多标准进行相对权重分配,以确定 cRN 的特征并预测潜在瓶颈节点(pBN)。然后,通过与理想解相似的排序偏好技术(TOPSIS)为按需充电调度选择最合适的下一个充电地点,并为半按需充电调度从预测的 pBN 中选择主动充电节点。在制定按需充电计划时,通过 FCNP 计算每个充电地点的部分充电时间,并考虑多标准的权重。广泛的仿真实验表明,与现有方案相比,拟议方案在各种性能指标上大大提高了充电和网络性能。具体而言,如果节点数为 650 个,与 FAHP-VWA-TOPSIS、FLCSD、AHP-TOPSIS、OPPC 和 NJNP 方案相比,拟议方案的网络寿命分别延长了 129.4%、239.8%、282.5%、283.2% 和 293.6%。
{"title":"An integrated MCDM-based charging scheduling in a WRSN with multiple MCs","authors":"Man Gun Ri, Il Gwang Kim, Se Hun Pak, Nam Jun Jong, Song Jo Kim","doi":"10.1007/s12083-024-01705-y","DOIUrl":"https://doi.org/10.1007/s12083-024-01705-y","url":null,"abstract":"<p>Recently, a few Multi-Criteria Decision Making (MCDM)-based charging scheduling schemes have been proposed. However, these schemes have still connoted the problems from the viewpoint of assigning weights to multi-criteria and exploiting redundant capability of a Mobile Charger (MC). In this paper, we propose an efficient charging scheduling scheme using an integrated FCNP-TOPSIS to solve the above-mentioned problems. The proposed scheme firstly divides the whole network into sub-areas by using the Fuzzy C-Means (FCM) algorithm so as to evenly distribute charging request load into multiple MCs and assign a MC to each sub-area. Next, each MC draws up a charging schedule into on-demand or semi-on-demand charging scheduling scheme according to the MC’s charging capability and the number of charging Request Nodes (cRNs). In charging scheduling, first the Fuzzy Cognitive Network Process (FCNP) assigns the relative weights to multi-criteria to characterize the cRNs and predict the potential-to-be-Bottlenecked Nodes (pBNs). Then the Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) selects the most suitable next charging location for on-demand charging scheduling and the proactive charging nodes among the predicted pBNs for semi-on-demand charging scheduling. While drawing up the on-demand charging schedule, the partial charging time at each charging location is calculated considering the weights of multi-criteria by FCNP. Extensive simulation experiments have been conducted to show that the proposed scheme greatly improves the charging and network performance at various performance metrics compared to existing schemes. In special, if the number of nodes is 650, the network lifetime of the proposed scheme is 129.4%, 239.8%, 282.5%, 283.2% and 293.6% longer compared to the FAHP-VWA-TOPSIS, FLCSD, AHP-TOPSIS, OPPC, and NJNP schemes, respectively.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"13 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141551127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MS-EAR: A mobile sink based energy aware routing technique for SDN enabled WSNs MS-EAR:针对支持 SDN 的 WSN 的基于移动汇的能量感知路由技术
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-05 DOI: 10.1007/s12083-024-01757-0
Vikas Tyagi, Samayveer Singh

The paradigm of sensor networks involves connecting wireless electronic devices through small sensor nodes to gather and sense surrounding information. As these networks have limited resources, it is crucial to optimize their usage to enhance network performance. To achieve this, software-defined network technology is integrated into wireless sensor networks to efficiently utilize network resources. Furthermore, optimized clustering and energy-aware routing techniques are employed to evenly distribute network traffic and enable energy-efficient data transmission in SDN-enabled WSNs. However, the issue of hotspots or energy holes consistently persists in cluster-based routing protocols. This research aims to develop an energy-aware routing protocol incorporating a mobile sink, aiming to achieve energy consumption equilibrium and extend the network's lifespan. To address these concerns and ensure the longer sustainability of SDN-enabled WSNs, a novel approach called mobile sink-based energy-aware routing is proposed for energy-efficient data delivery. It utilizes optimized sink mobility to resolve the hotspot issue based on a proposed fitness function and centroid point approach. The fitness function considers essential parameters such as energy, control node density, and distances from control nodes. The flow rules are also generated based on the rank-based tree topology for multi-hop data transmission. The proposed approach is executed with an ONOS controller to implement SDN policies, and the performance of the heterogeneous network is evaluated through simulation using the ns-3 simulator. Furthermore, the proposed MS-EAR demonstrates significant improvements in the network lifespan compared to existing techniques such as GM-WOA, GMPSO, and FJAPSO, with increases of (18.0mathbf{%},47.5mathbf{%}) and (94.0mathbf{%}), respectively. It also outperforms the current state-of-the-art by considering various performance metrics, including stability period, number of alive nodes, network residual energy, packets transmitted to the control server, and average delay.

传感器网络的模式包括通过小型传感器节点连接无线电子设备,以收集和感知周围的信息。由于这些网络的资源有限,因此优化使用资源以提高网络性能至关重要。为此,在无线传感器网络中集成了软件定义网络技术,以有效利用网络资源。此外,在支持 SDN 的 WSN 中还采用了优化的聚类和能量感知路由技术,以均匀分配网络流量,实现高能效的数据传输。然而,基于集群的路由协议始终存在热点或能量漏洞问题。本研究旨在开发一种包含移动汇的能量感知路由协议,以实现能量消耗平衡并延长网络寿命。为了解决这些问题并确保支持 SDN 的 WSN 更长的可持续性,我们提出了一种名为基于移动汇的能量感知路由的新方法,以实现高能效的数据传输。它利用优化的水槽移动性来解决热点问题,其基础是提出的适配函数和中心点方法。适配函数考虑了能量、控制节点密度和与控制节点的距离等基本参数。流量规则也是根据多跳数据传输的基于等级的树状拓扑生成的。通过使用 ns-3 模拟器进行仿真,评估了异构网络的性能。此外,与GM-WOA、GMPSO和FJAPSO等现有技术相比,所提出的MS-EAR在网络寿命方面有显著改善,分别增加了(18.0/mathbf/{%},47.5/mathbf/{%})和(94.0/mathbf/{%})。考虑到各种性能指标,包括稳定期、存活节点数、网络剩余能量、向控制服务器发送的数据包以及平均延迟,它的表现也优于目前最先进的技术。
{"title":"MS-EAR: A mobile sink based energy aware routing technique for SDN enabled WSNs","authors":"Vikas Tyagi, Samayveer Singh","doi":"10.1007/s12083-024-01757-0","DOIUrl":"https://doi.org/10.1007/s12083-024-01757-0","url":null,"abstract":"<p>The paradigm of sensor networks involves connecting wireless electronic devices through small sensor nodes to gather and sense surrounding information. As these networks have limited resources, it is crucial to optimize their usage to enhance network performance. To achieve this, software-defined network technology is integrated into wireless sensor networks to efficiently utilize network resources. Furthermore, optimized clustering and energy-aware routing techniques are employed to evenly distribute network traffic and enable energy-efficient data transmission in SDN-enabled WSNs. However, the issue of hotspots or energy holes consistently persists in cluster-based routing protocols. This research aims to develop an energy-aware routing protocol incorporating a mobile sink, aiming to achieve energy consumption equilibrium and extend the network's lifespan. To address these concerns and ensure the longer sustainability of SDN-enabled WSNs, a novel approach called mobile sink-based energy-aware routing is proposed for energy-efficient data delivery. It utilizes optimized sink mobility to resolve the hotspot issue based on a proposed fitness function and centroid point approach. The fitness function considers essential parameters such as energy, control node density, and distances from control nodes. The flow rules are also generated based on the rank-based tree topology for multi-hop data transmission. The proposed approach is executed with an ONOS controller to implement SDN policies, and the performance of the heterogeneous network is evaluated through simulation using the ns-3 simulator. Furthermore, the proposed MS-EAR demonstrates significant improvements in the network lifespan compared to existing techniques such as GM-WOA, GMPSO, and FJAPSO, with increases of <span>(18.0mathbf{%},47.5mathbf{%})</span> and <span>(94.0mathbf{%})</span>, respectively. It also outperforms the current state-of-the-art by considering various performance metrics, including stability period, number of alive nodes, network residual energy, packets transmitted to the control server, and average delay.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"39 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141552990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure communication routing and attack detection in UAV networks using Gannet Walruses optimization algorithm and Sheppard Convolutional Spinal Network 使用 Gannet Walruses 优化算法和 Sheppard 卷积脊髓网络实现无人机网络的安全通信路由和攻击检测
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-03 DOI: 10.1007/s12083-024-01753-4
Yuvaraj Renu, Velliangiri Sarveshwaran

Unmanned Aerial vehicles (UAV) are high-speed moving machines that attained rapid growth in various activities and are considered an integral component in the Satellite-Air -Ground-Sea (SAGS) incorporated network. However, UAVs are affected by communication delays and malicious attacks. Therefore, an adequate and secure communication routing and attack detection model is necessary for UAV communication networks. This research described a novel approach for initiating secure communication in UAV networks namely Gannet Walruses Optimization Algorithm + Sheppard Convolutional Spinal Network (GWOA + ShCSpinalNet). Initially, the UAV network is simulated, and the data packets are transmitted among the nodes using optimal routing paths. An optimal routing path is computed using the Gannet Walruses Optimization Algorithm (GWOA) by considering some multi-objective functions through the Deep Recurrent Neural Network (DRNN). The developed GWAO integrates Gannet Optimization (GOA) and Walruses Optimization (WaOA). The data communication is done through monitoring agents. The newly devised Sheppard Convolutional Spinal Network (ShCSpinalNet) is utilized as a decision-making agent for malicious attack detection. The attributes considered for decision-making are round trip time, packet delivery ratio, the strength of the signal, the size of the packet, and the number of incoming packets. Once the SpinalNet categorizes the normal and attacked nodes the defense agent is implemented for attack migration. The ShCSpinalNet is devised by the combination of the Sheppard Convolutional Neural Network and Spinal Network. The GWOA + ShCSpinalNet accomplishes a diminished delay of 0.614 s, an increased detection rate of 0.930%, an energy of 0.439 J, and a Packet Delivery Ratio (PDR) of 0.749.

无人驾驶飞行器(UAV)是一种高速移动的机器,在各种活动中发展迅速,被认为是卫星-空中-地面-海洋(SAGS)综合网络中不可或缺的组成部分。然而,无人机受到通信延迟和恶意攻击的影响。因此,有必要为无人机通信网络建立适当、安全的通信路由和攻击检测模型。本研究介绍了一种在无人机网络中启动安全通信的新方法,即 Gannet Walruses 优化算法 + Sheppard 卷积脊髓网络(GWOA + ShCSpinalNet)。首先,模拟无人机网络,利用最优路由路径在节点间传输数据包。通过深度循环神经网络(DRNN)考虑一些多目标函数,使用 Gannet Walruses 优化算法(GWOA)计算出最佳路由路径。所开发的 GWAO 集成了 Gannet 优化算法(GOA)和 Walruses 优化算法(WaOA)。数据通信通过监控代理完成。新设计的 Sheppard 卷积脊髓网络(ShCSpinalNet)被用作恶意攻击检测的决策代理。决策所考虑的属性包括往返时间、数据包传送率、信号强度、数据包大小和传入数据包数量。一旦 SpinalNet 对正常节点和受攻击节点进行了分类,防御代理就会实施攻击迁移。ShCSpinalNet 由 Sheppard 卷积神经网络和 Spinal 网络组合而成。GWOA + ShCSpinalNet 的延迟减少了 0.614 秒,检测率提高了 0.930%,能耗降低了 0.439 J,数据包交付率 (PDR) 提高了 0.749。
{"title":"Secure communication routing and attack detection in UAV networks using Gannet Walruses optimization algorithm and Sheppard Convolutional Spinal Network","authors":"Yuvaraj Renu, Velliangiri Sarveshwaran","doi":"10.1007/s12083-024-01753-4","DOIUrl":"https://doi.org/10.1007/s12083-024-01753-4","url":null,"abstract":"<p>Unmanned Aerial vehicles (UAV) are high-speed moving machines that attained rapid growth in various activities and are considered an integral component in the Satellite-Air -Ground-Sea (SAGS) incorporated network. However, UAVs are affected by communication delays and malicious attacks. Therefore, an adequate and secure communication routing and attack detection model is necessary for UAV communication networks. This research described a novel approach for initiating secure communication in UAV networks namely Gannet Walruses Optimization Algorithm + Sheppard Convolutional Spinal Network (GWOA + ShCSpinalNet). Initially, the UAV network is simulated, and the data packets are transmitted among the nodes using optimal routing paths. An optimal routing path is computed using the Gannet Walruses Optimization Algorithm (GWOA) by considering some multi-objective functions through the Deep Recurrent Neural Network (DRNN). The developed GWAO integrates Gannet Optimization (GOA) and Walruses Optimization (WaOA). The data communication is done through monitoring agents. The newly devised Sheppard Convolutional Spinal Network<b> (</b>ShCSpinalNet) is utilized as a decision-making agent for malicious attack detection. The attributes considered for decision-making are round trip time, packet delivery ratio, the strength of the signal, the size of the packet, and the number of incoming packets. Once the SpinalNet categorizes the normal and attacked nodes the defense agent is implemented for attack migration. The ShCSpinalNet is devised by the combination of the Sheppard Convolutional Neural Network and Spinal Network. The GWOA + ShCSpinalNet accomplishes a diminished delay of 0.614 s, an increased detection rate of 0.930%, an energy of 0.439 J, and a Packet Delivery Ratio (PDR) of 0.749.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"42 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141516099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure multi-asks/bids with verifiable equality retrieval for double auction in smart grid 为智能电网中的双重拍卖提供可验证平等检索的安全多任务/竞标
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-01 DOI: 10.1007/s12083-024-01744-5
Kai Zhang, Ludan Lu, Jian Zhao, Lifei Wei, Jianting Ning

Double auction provides a cost-effective manner for sellers/buyers in smart grid. Due to concerns about information leakage, the asks/bids from sellers/buyers are sealed, making it challenging to select potential winners. To address this problem, the concept of public key encryption with equality test is deployed in double auction, since it is able to perform information retrieval over secure asks/bids. However, previous solutions suffer from the following two limitations: (i) unable to check inconsistent secure asks/bids due to the lack of tester-verifiable mechanism; (ii) incurring high matching time costs caused by one-to-one secure asks/bids. Therefore, we propose the VerDA, a secure double auction retrieval system with verifiable equality retrieval towards multiple secure asks/bids. Technically, to achieve the property of consistency over secure asks/bids, we develop the tester-verifiable technology by combining the decryption module and test module. To improve the efficiency of retrieval, we introduce secure multi-asks/bids testing function by augmenting the number of inputs in a same retrieval process. Moreover, we implement VerDA based on the PJM dataset in real cloud environment, where the experimental results show practical performance with encryption and test costs amounting to only 57.4% and 18.7% compared to state-of-the-art solution.

双重拍卖为智能电网中的卖方/买方提供了一种具有成本效益的方式。由于担心信息泄露,卖方/买方的要求/出价都是密封的,这给选择潜在赢家带来了挑战。为了解决这个问题,在双重拍卖中采用了带有等价测试的公钥加密概念,因为它能够对安全的请求/出价进行信息检索。然而,以往的解决方案存在以下两个局限性:(i) 由于缺乏测试者可验证机制,无法检查不一致的安全请求/出价;(ii) 一对一的安全请求/出价导致匹配时间成本较高。因此,我们提出了VerDA--一种面向多个安全请求/出价的可验证相等检索的安全双重拍卖检索系统。在技术上,为了实现安全问/标的一致性,我们结合解密模块和测试模块开发了测试者可验证技术。为了提高检索效率,我们通过增加同一检索过程中的输入数量,引入了安全多任务/投标测试功能。此外,我们在真实云环境中基于 PJM 数据集实现了 VerDA,实验结果表明,与最先进的解决方案相比,其加密和测试成本仅为 57.4% 和 18.7%,性能非常实用。
{"title":"Secure multi-asks/bids with verifiable equality retrieval for double auction in smart grid","authors":"Kai Zhang, Ludan Lu, Jian Zhao, Lifei Wei, Jianting Ning","doi":"10.1007/s12083-024-01744-5","DOIUrl":"https://doi.org/10.1007/s12083-024-01744-5","url":null,"abstract":"<p>Double auction provides a cost-effective manner for sellers/buyers in smart grid. Due to concerns about information leakage, the asks/bids from sellers/buyers are sealed, making it challenging to select potential winners. To address this problem, the concept of public key encryption with equality test is deployed in double auction, since it is able to perform information retrieval over secure asks/bids. However, previous solutions suffer from the following two limitations: (i) unable to check inconsistent secure asks/bids due to the lack of tester-verifiable mechanism; (ii) incurring high matching time costs caused by one-to-one secure asks/bids. Therefore, we propose the VerDA, a secure double auction retrieval system with verifiable equality retrieval towards multiple secure asks/bids. Technically, to achieve the property of consistency over secure asks/bids, we develop the tester-verifiable technology by combining the decryption module and test module. To improve the efficiency of retrieval, we introduce secure multi-asks/bids testing function by augmenting the number of inputs in a same retrieval process. Moreover, we implement VerDA based on the PJM dataset in real cloud environment, where the experimental results show practical performance with encryption and test costs amounting to only 57.4% and 18.7% compared to state-of-the-art solution.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"161 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141504183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Incentive minimization using energy and buffer efficient routing protocol over Blockchain enabled DTN 在支持区块链的 DTN 上使用能源和缓冲区效率高的路由协议,最大限度减少奖励
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-28 DOI: 10.1007/s12083-024-01737-4
Nabanita Das, Souvik Basu, Sipra Das Bit

Delay tolerant networks (DTNs) are a kind of sporadically connected mobile networks in which the network is intermittent, and end-to-end path is hard to establish. However, as devices in DTNs may often have limited energy and buffer, the network performance will be inevitably affected, especially in our application domain, i.e. the post-disaster scenario. Thus, to start with, we present an appropriate energy and buffer efficient routing protocol (EBRout) for efficient message transmission over a smartphone based DTN. Due to limited battery and storage capacity in mobile devices, a major problem in DTNs is to convince forwarder nodes to participate in forwarding messages. Thus, for improving cooperation among the nodes, an incentivizing scheme is proposed which works in two steps. As the first step, we propose an optimization model to find the minimum incentive. Next, we propose a blockchain-based incentive allocation model that uses Ethereum platform built on top of a DTN-Blockchain integrated environment. The use of blockchain helps to create an immutable and globally accessible record for incentive allocation. The performance of the entire scheme is estimated through extensive simulation in ONE simulator, Python PuLP and Ethereum platform. Performance analyses indicate that the average incentive paid using our proposed optimization model is much lower than the average incentive paid without using the optimization model. Also, the results substantiate the efficiency of the proposed scheme over the competing schemes, in terms of delivery ratio, energy and message overhead without negotiating the blockchain performance in terms of processing time and gas consumption.

容错网络(DTN)是一种零星连接的移动网络,网络时断时续,端到端路径难以建立。然而,由于 DTN 中的设备通常能量和缓冲都有限,网络性能将不可避免地受到影响,尤其是在我们的应用领域,即灾后场景中。因此,我们首先提出了一种适当的能量和缓冲区高效路由协议(EBRout),用于在基于智能手机的 DTN 上高效传输信息。由于移动设备的电池和存储容量有限,DTN 的一个主要问题是如何说服转发节点参与信息转发。因此,为了提高节点间的合作,我们提出了一种分两步进行的激励方案。第一步,我们提出了一个优化模型来寻找最小激励。接下来,我们提出了一种基于区块链的激励分配模型,该模型使用建立在 DTN 区块链集成环境之上的以太坊平台。区块链的使用有助于为激励分配创建不可变且全球可访问的记录。通过在 ONE 模拟器、Python PuLP 和以太坊平台上进行大量模拟,对整个方案的性能进行了估算。性能分析表明,使用我们提出的优化模型所支付的平均奖励远低于不使用优化模型所支付的平均奖励。此外,结果还证明,在不影响区块链在处理时间和气体消耗方面的性能的情况下,拟议方案在交付率、能源和信息开销方面的效率优于其他竞争方案。
{"title":"Incentive minimization using energy and buffer efficient routing protocol over Blockchain enabled DTN","authors":"Nabanita Das, Souvik Basu, Sipra Das Bit","doi":"10.1007/s12083-024-01737-4","DOIUrl":"https://doi.org/10.1007/s12083-024-01737-4","url":null,"abstract":"<p>Delay tolerant networks (DTNs) are a kind of sporadically connected mobile networks in which the network is intermittent, and end-to-end path is hard to establish. However, as devices in DTNs may often have limited energy and buffer, the network performance will be inevitably affected, especially in our application domain, i.e. the post-disaster scenario. Thus, to start with, we present an appropriate energy and buffer efficient routing protocol (EBRout) for efficient message transmission over a smartphone based DTN. Due to limited battery and storage capacity in mobile devices, a major problem in DTNs is to convince forwarder nodes to participate in forwarding messages. Thus, for improving cooperation among the nodes, an incentivizing scheme is proposed which works in two steps. As the first step, we propose an optimization model to find the minimum incentive. Next, we propose a blockchain-based incentive allocation model that uses Ethereum platform built on top of a DTN-Blockchain integrated environment. The use of blockchain helps to create an immutable and globally accessible record for incentive allocation. The performance of the entire scheme is estimated through extensive simulation in ONE simulator, Python PuLP and Ethereum platform. Performance analyses indicate that the average incentive paid using our proposed optimization model is much lower than the average incentive paid without using the optimization model. Also, the results substantiate the efficiency of the proposed scheme over the competing schemes, in terms of delivery ratio, energy and message overhead without negotiating the blockchain performance in terms of processing time and gas consumption.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"159 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141504230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A smart contract vulnerability detection method based on deep learning with opcode sequences 基于深度学习与操作码序列的智能合约漏洞检测方法
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-27 DOI: 10.1007/s12083-024-01750-7
Peiqiang Li, Guojun Wang, Xiaofei Xing, Jinyao Zhu, Wanyi Gu, Guangxin Zhai

Ethereum is a blockchain network that allows developers to create smart contracts and programs that run on the blockchain. Smart contracts contain logic to transfer assets based on pre-defined conditions. With over 100,000 new smart contracts being deployed every day, the potential for coding errors is high, making the contracts vulnerable to exploits. A key limitation is that once deployed, smart contracts are immutable and cannot be updated, even if flaws are found. This inflexibility puts funds at risk of theft and loss. The rapid pace of deployment outpaces security audits, increasing vulnerabilities that put users’ cryptocurrency at risk. To reduce the risk caused by smart contract vulnerabilities, we applied deep learning techniques. To develop a deep learning model capable of detecting vulnerabilities, we first created a dataset by replaying real transactions on the Ethereum Mainnet, collecting opcode sequences from real Ethereum contracts, and labeling them using the SODA plugin. We pre-processed this opcode data by removing duplicates, normalizing sequence lengths, simplifying opcodes into representative groups, and converting sequences into numerical vectors to ultimately obtain an optimal representation of the data. We then trained and evaluated three different neural network architectures on this dataset. Our best-performing model achieved an average accuracy of 88% in detecting seven types of vulnerabilities. Further analysis showed that the model was effective at identifying potential problems in smart contracts, which was an important capability for securing funds and executing logic in live contracts.

以太坊是一个区块链网络,允许开发人员创建在区块链上运行的智能合约和程序。智能合约包含根据预定义条件转移资产的逻辑。每天都有超过 10 万份新的智能合约被部署,编码错误的可能性很高,使得合约容易被利用。一个关键的限制是,智能合约一旦部署,就不可更改,即使发现了缺陷也无法更新。这种不灵活性使资金面临被盗和损失的风险。部署速度之快超过了安全审计的速度,增加了漏洞,使用户的加密货币面临风险。为了降低智能合约漏洞带来的风险,我们应用了深度学习技术。为了开发能够检测漏洞的深度学习模型,我们首先通过重放以太坊主网上的真实交易创建了一个数据集,从真实的以太坊合约中收集操作码序列,并使用 SODA 插件对其进行标记。我们对这些操作码数据进行了预处理,包括删除重复数据、对序列长度进行归一化处理、将操作码简化为具有代表性的组别,以及将序列转换为数字向量,以最终获得最佳的数据表示。然后,我们在该数据集上训练并评估了三种不同的神经网络架构。我们性能最好的模型在检测七种类型的漏洞方面达到了 88% 的平均准确率。进一步的分析表明,该模型能有效识别智能合约中的潜在问题,而这正是确保资金安全和执行实时合约逻辑的重要能力。
{"title":"A smart contract vulnerability detection method based on deep learning with opcode sequences","authors":"Peiqiang Li, Guojun Wang, Xiaofei Xing, Jinyao Zhu, Wanyi Gu, Guangxin Zhai","doi":"10.1007/s12083-024-01750-7","DOIUrl":"https://doi.org/10.1007/s12083-024-01750-7","url":null,"abstract":"<p>Ethereum is a blockchain network that allows developers to create smart contracts and programs that run on the blockchain. Smart contracts contain logic to transfer assets based on pre-defined conditions. With over 100,000 new smart contracts being deployed every day, the potential for coding errors is high, making the contracts vulnerable to exploits. A key limitation is that once deployed, smart contracts are immutable and cannot be updated, even if flaws are found. This inflexibility puts funds at risk of theft and loss. The rapid pace of deployment outpaces security audits, increasing vulnerabilities that put users’ cryptocurrency at risk. To reduce the risk caused by smart contract vulnerabilities, we applied deep learning techniques. To develop a deep learning model capable of detecting vulnerabilities, we first created a dataset by replaying real transactions on the Ethereum Mainnet, collecting opcode sequences from real Ethereum contracts, and labeling them using the SODA plugin. We pre-processed this opcode data by removing duplicates, normalizing sequence lengths, simplifying opcodes into representative groups, and converting sequences into numerical vectors to ultimately obtain an optimal representation of the data. We then trained and evaluated three different neural network architectures on this dataset. Our best-performing model achieved an average accuracy of 88% in detecting seven types of vulnerabilities. Further analysis showed that the model was effective at identifying potential problems in smart contracts, which was an important capability for securing funds and executing logic in live contracts.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"29 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141504231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Verifiable privacy-preserving cox regression from multi-key fully homomorphic encryption 通过多密钥全同态加密实现可验证的隐私保护考克斯回归
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-26 DOI: 10.1007/s12083-024-01740-9
Wenju Xu, Xin Li, Yunxuan Su, Baocang Wang, Wei Zhao

While it is well known that privacy-preserving cox regression generally consists of a semi-honest cloud service provider (CSP) who performs curious-but-honest computations on ciphertexts to train the cox model. No one can verify the behaviors of CSP when he performs computations dishonestly in reality. Focusing on this problem, we propose a verifiable privacy-preserving cox regression algorithm tailored with the semi-malicious CSP, where all his behaviors are recorded on a witness tape fulfilling the requirement of transparency. To be specific, a multi-key fully homomorphic encryption (FHE) is used to protect the information of different data owners. The verifiability of our proposed multi-key homomorphic message authenticator (HMAC) ensures CSP sends correct results back to data owners. Furthermore, the compactness of FHE and succinctness of HMAC both under multi keys make the cox regression scheme more feasible. The efficiency of our proposed cox regression scheme is also proved by both theoretical analyses and experimental evaluations. After 21 iterations, it costs no more than 10 min to evaluate our cox regression scheme.

众所周知,保护隐私的考克斯回归一般由一个半诚实的云服务提供商(CSP)组成,该提供商会对密文进行好奇但诚实的计算,以训练考克斯模型。当 CSP 在现实中不诚实地执行计算时,没有人能验证他的行为。针对这一问题,我们提出了一种为半恶意 CSP 量身定制的可验证的保护隐私的考克斯回归算法,在该算法中,CSP 的所有行为都被记录在满足透明度要求的证人磁带上。具体来说,我们使用多密钥全同态加密(FHE)来保护不同数据所有者的信息。我们提出的多密钥同态信息验证器(HMAC)的可验证性确保了 CSP 向数据所有者发送正确的结果。此外,在多密钥情况下,FHE 的紧凑性和 HMAC 的简洁性使考克斯回归方案更加可行。我们提出的考克斯回归方案的效率也通过理论分析和实验评估得到了证明。经过 21 次迭代后,评估我们的考克斯回归方案所需的时间不超过 10 分钟。
{"title":"Verifiable privacy-preserving cox regression from multi-key fully homomorphic encryption","authors":"Wenju Xu, Xin Li, Yunxuan Su, Baocang Wang, Wei Zhao","doi":"10.1007/s12083-024-01740-9","DOIUrl":"https://doi.org/10.1007/s12083-024-01740-9","url":null,"abstract":"<p>While it is well known that privacy-preserving cox regression generally consists of a semi-honest cloud service provider (CSP) who performs curious-but-honest computations on ciphertexts to train the cox model. No one can verify the behaviors of CSP when he performs computations dishonestly in reality. Focusing on this problem, we propose a verifiable privacy-preserving cox regression algorithm tailored with the semi-malicious CSP, where all his behaviors are recorded on a witness tape fulfilling the requirement of transparency. To be specific, a multi-key fully homomorphic encryption (FHE) is used to protect the information of different data owners. The verifiability of our proposed multi-key homomorphic message authenticator (HMAC) ensures CSP sends correct results back to data owners. Furthermore, the compactness of FHE and succinctness of HMAC both under multi keys make the cox regression scheme more feasible. The efficiency of our proposed cox regression scheme is also proved by both theoretical analyses and experimental evaluations. After 21 iterations, it costs no more than 10 min to evaluate our cox regression scheme.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"41 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141532540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resilient enhancements of routing protocols in MANET 城域网路由协议的弹性增强
IF 4.2 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-26 DOI: 10.1007/s12083-024-01746-3
Maros Baumgartner, Jan Papaj, Natalia Kurkina, Lubomir Dobos, Anton Cizmar

Resilient of routing processes is one of the biggest challenges for data transmission in mobile networks without infrastructure. Communication under current routing protocols is through a communication path that, although the shortest, may not perform satisfactorily in terms of resilient. Routing and communication within such a path may take place using nodes that are malicious or inappropriate in the communication process due to malicious or poor technical state. This paper presents a new algorithm for various uses of mobile ad hoc networks not only in edge networks with infrastructure but also with the possibility of being used in the cloud solutions. We have modified decentralized blockchain technology and artificial intelligence using deep learning methods that have been implemented in routing processes. The objective of this algorithm was to select the most resilient communication path from the source to the destination node. Such a communication path selection consisted of selecting the nodes that were most suitable in terms of resilience, where the selection nodes was provided through a network and technical parameters. The key quality of service metrics, throughput, total delay, number of delivered signaling and data packets and the ratio between them were used to evaluate the proposed resilient routing algorithm. Modified resilient routing protocols achieved improvement in all the analyzed parameters compared to the original routing protocols. The improvement in these parameters led to an increase in the resilience of the routing process based on the actual data obtained from each node in the network and previous communications.

在没有基础设施的移动网络中,路由过程的弹性是数据传输面临的最大挑战之一。在当前路由协议下,通信是通过通信路径进行的,虽然该路径最短,但在弹性方面可能无法令人满意。在这样的路径上进行路由和通信时,可能会使用恶意节点或因恶意或技术状态不佳而在通信过程中不适当的节点。本文提出了一种新算法,适用于移动特设网络的各种用途,不仅适用于带有基础设施的边缘网络,还可能用于云解决方案。我们对去中心化的区块链技术和人工智能进行了修改,使用深度学习方法在路由过程中实施。该算法的目标是选择从源节点到目的节点最具弹性的通信路径。这种通信路径选择包括选择在弹性方面最合适的节点,而选择节点是通过网络和技术参数提供的。关键的服务质量指标、吞吐量、总延迟、交付的信令和数据包数量以及它们之间的比率被用来评估所提出的弹性路由算法。与原始路由协议相比,修改后的弹性路由协议在所有分析参数上都有所改进。这些参数的改善提高了路由过程的弹性,其依据是从网络中每个节点获得的实际数据和以前的通信。
{"title":"Resilient enhancements of routing protocols in MANET","authors":"Maros Baumgartner, Jan Papaj, Natalia Kurkina, Lubomir Dobos, Anton Cizmar","doi":"10.1007/s12083-024-01746-3","DOIUrl":"https://doi.org/10.1007/s12083-024-01746-3","url":null,"abstract":"<p>Resilient of routing processes is one of the biggest challenges for data transmission in mobile networks without infrastructure. Communication under current routing protocols is through a communication path that, although the shortest, may not perform satisfactorily in terms of resilient. Routing and communication within such a path may take place using nodes that are malicious or inappropriate in the communication process due to malicious or poor technical state. This paper presents a new algorithm for various uses of mobile ad hoc networks not only in edge networks with infrastructure but also with the possibility of being used in the cloud solutions. We have modified decentralized blockchain technology and artificial intelligence using deep learning methods that have been implemented in routing processes. The objective of this algorithm was to select the most resilient communication path from the source to the destination node. Such a communication path selection consisted of selecting the nodes that were most suitable in terms of resilience, where the selection nodes was provided through a network and technical parameters. The key quality of service metrics, throughput, total delay, number of delivered signaling and data packets and the ratio between them were used to evaluate the proposed resilient routing algorithm. Modified resilient routing protocols achieved improvement in all the analyzed parameters compared to the original routing protocols. The improvement in these parameters led to an increase in the resilience of the routing process based on the actual data obtained from each node in the network and previous communications.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"177 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141516097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Peer-To-Peer Networking and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1