首页 > 最新文献

International Journal of Distributed Sensor Networks最新文献

英文 中文
GLBR: A novel global load balancing routing scheme based on intelligent computing in partially disconnected wireless sensor networks GLBR:一种新的基于智能计算的部分断开无线传感器网络全局负载平衡路由方案
IF 2.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-04-01 DOI: 10.1177/15501329221090458
Zeyu Sun, G. Liao, Cao Zeng, Lan Lan, Guozeng Zhao
Load balancing is of great significance to extend the longevity of wireless sensor networks, due to the inherent imbalanced energy overhead in such networks. However, existing solutions cannot balance the load distribution in partially disconnected wireless sensor networks. For example, if a network is partitioned into several segments with different area sizes, some areas have much more traffic load than other areas. In this article, we propose a load-balanced routing scheme, which aims to balance energy consumption within each segment and among different segments. First, we adopt unequal transmission distances to build initial routing for intrasegment load balancing. Second, we adopt the genetic algorithm to build extra routing between different segments for intersegment load balancing. The unique character of our work is twofold. On one hand, we investigate partitioned wireless sensor networks where there are several isolated segments. On the other hand, we pursue load balancing from a global perspective rather than from a local one. Some simulations verify the effectiveness and the advantages of our scheme in terms of extra deployment cost, system longevity, and load balancing degree.
由于无线传感器网络固有的不平衡能量开销,负载平衡对延长无线传感器网络的寿命具有重要意义。然而,现有的解决方案无法平衡部分断开的无线传感器网络中的负载分布。例如,如果一个网络被划分为具有不同区域大小的几个段,则某些区域的流量负载比其他区域大得多。在本文中,我们提出了一种负载平衡路由方案,旨在平衡每个分段内和不同分段之间的能量消耗。首先,我们采用不相等的传输距离来建立用于段内负载平衡的初始路由。其次,我们采用遗传算法在不同的分段之间建立额外的路由,以实现分段间的负载平衡。我们工作的独特性是双重的。一方面,我们研究了有几个隔离段的分区无线传感器网络。另一方面,我们从全局的角度而不是从本地的角度来追求负载平衡。一些仿真验证了我们的方案在额外部署成本、系统寿命和负载平衡程度方面的有效性和优势。
{"title":"GLBR: A novel global load balancing routing scheme based on intelligent computing in partially disconnected wireless sensor networks","authors":"Zeyu Sun, G. Liao, Cao Zeng, Lan Lan, Guozeng Zhao","doi":"10.1177/15501329221090458","DOIUrl":"https://doi.org/10.1177/15501329221090458","url":null,"abstract":"Load balancing is of great significance to extend the longevity of wireless sensor networks, due to the inherent imbalanced energy overhead in such networks. However, existing solutions cannot balance the load distribution in partially disconnected wireless sensor networks. For example, if a network is partitioned into several segments with different area sizes, some areas have much more traffic load than other areas. In this article, we propose a load-balanced routing scheme, which aims to balance energy consumption within each segment and among different segments. First, we adopt unequal transmission distances to build initial routing for intrasegment load balancing. Second, we adopt the genetic algorithm to build extra routing between different segments for intersegment load balancing. The unique character of our work is twofold. On one hand, we investigate partitioned wireless sensor networks where there are several isolated segments. On the other hand, we pursue load balancing from a global perspective rather than from a local one. Some simulations verify the effectiveness and the advantages of our scheme in terms of extra deployment cost, system longevity, and load balancing degree.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42341092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Monitoring of clinical signs of intravenous infusion patients with ZigBee wireless technology ZigBee无线技术对静脉输液患者临床体征的监测
IF 2.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-04-01 DOI: 10.1177/15501329221091505
Xiaobo Zhu, Yunlong Ye
At present, intravenous infusion in clinical medicine is a very important treatment method in medical care, and it is the main work content of medical staff to ensure the safety and effectiveness of intravenous infusion process. The monitoring system of infusion patient’s physical signs is integrated with sensor technology, bio-electronic technology, and computer network technology. By means of sensor detection, program control and data processing, the automatic detection and control of intravenous infusion process and real-time monitoring of the pulse information are realized. The monitoring equipment has been unable to adapt to the rapid development of medical technology. In this article, based on ZigBee module, automatic control of drip rate, abnormal alarm, real-time liquid crystal display of infusion progress, and other functions are realized without manual intervention. At the same time, the hardware part of the lower computer combines the detection of ECG and pulse to design a multi-parameter monitoring system of vital signs, and realizes the parameter synchronization management requirements of the monitoring terminal based on the local area network. The test proves that the research content in this article is higher than the traditional clinical management mode in terms of monitoring data consistency and data synchronization management accuracy, which can not only reduce the labor intensity of nursing staff, improve work efficiency, but also greatly reduce the potential risks in the nursing process, which is the future application trend of clinical medical nursing work.
目前临床医学中静脉输液是医疗护理中非常重要的一种治疗方法,保证静脉输液过程的安全、有效是医务人员的主要工作内容。输液患者体征监测系统集成了传感器技术、生物电子技术和计算机网络技术。通过传感器检测、程序控制和数据处理,实现了静脉输液过程的自动检测和控制以及脉搏信息的实时监测。监护设备已经不能适应医疗技术的快速发展。本文基于ZigBee模块,实现了自动控制滴速、异常报警、实时液晶显示输液进度等功能,无需人工干预。同时,下位机硬件部分结合心电和脉搏检测,设计了多参数生命体征监测系统,实现了基于局域网的监测终端参数同步管理要求。试验证明,本文的研究内容在监测数据一致性和数据同步管理准确性方面都高于传统的临床管理模式,不仅可以降低护理人员的劳动强度,提高工作效率,还可以大大降低护理过程中的潜在风险,是临床医学护理工作未来的应用趋势。
{"title":"Monitoring of clinical signs of intravenous infusion patients with ZigBee wireless technology","authors":"Xiaobo Zhu, Yunlong Ye","doi":"10.1177/15501329221091505","DOIUrl":"https://doi.org/10.1177/15501329221091505","url":null,"abstract":"At present, intravenous infusion in clinical medicine is a very important treatment method in medical care, and it is the main work content of medical staff to ensure the safety and effectiveness of intravenous infusion process. The monitoring system of infusion patient’s physical signs is integrated with sensor technology, bio-electronic technology, and computer network technology. By means of sensor detection, program control and data processing, the automatic detection and control of intravenous infusion process and real-time monitoring of the pulse information are realized. The monitoring equipment has been unable to adapt to the rapid development of medical technology. In this article, based on ZigBee module, automatic control of drip rate, abnormal alarm, real-time liquid crystal display of infusion progress, and other functions are realized without manual intervention. At the same time, the hardware part of the lower computer combines the detection of ECG and pulse to design a multi-parameter monitoring system of vital signs, and realizes the parameter synchronization management requirements of the monitoring terminal based on the local area network. The test proves that the research content in this article is higher than the traditional clinical management mode in terms of monitoring data consistency and data synchronization management accuracy, which can not only reduce the labor intensity of nursing staff, improve work efficiency, but also greatly reduce the potential risks in the nursing process, which is the future application trend of clinical medical nursing work.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41494960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Distributed consensus problem with caching on federated learning framework 联邦学习框架上缓存的分布式一致性问题
IF 2.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-04-01 DOI: 10.1177/15501329221092932
Xin Yan, Yiming Qin, Xiao Hu, Xiaoling Xiao
Federated learning framework facilitates more applications of deep learning algorithms on the existing network architectures, where the model parameters are aggregated in a centralized manner. However, some of federated learning participants are often inaccessible, such as in a power shortage or dormant state. That will force us to explore the possibility that the parameter aggregation is operated in an ad hoc manner, which is based on consensus computing. On the contrary, since caching mechanism is indispensable to any federated learning mobile node, it is necessary to investigate the connection between it and consensus computing. In this article, we first propose a novel federated learning paradigm, which supports an ad hoc operation mode for federated learning participants. Second, a discrete-time dynamic equation and its control law are formulated to satisfy the demands from federated learning framework, with a quantized caching scheme designed to mask the uncertainties from both asynchronous updates and measurement noises. Then, the consensus conditions and the convergence of the consensus protocol are deduced analytically, and a quantized caching strategy to optimize the convergence speed is provided. Our major contribution is to give the basic theories of distributed consensus problem for federated learning framework, and the theoretical results are validated by numerical simulations.
联邦学习框架促进了深度学习算法在现有网络体系结构上的更多应用,其中模型参数以集中的方式聚合。然而,一些联邦学习参与者经常无法访问,例如在电力短缺或休眠状态下。这将迫使我们探索以一种基于共识计算的特殊方式操作参数聚合的可能性。相反,由于缓存机制对于任何联合学习移动节点都是必不可少的,因此有必要研究它与共识计算之间的联系。在本文中,我们首先提出了一种新的联邦学习范式,它支持联邦学习参与者的特别操作模式。其次,根据联邦学习框架的要求,建立离散时间动态方程及其控制律,并采用量化缓存方案来掩盖异步更新和测量噪声带来的不确定性。然后,解析推导了共识协议的一致性条件和收敛性,并给出了优化收敛速度的量化缓存策略。我们的主要贡献是给出了联邦学习框架分布式共识问题的基本理论,并通过数值模拟对理论结果进行了验证。
{"title":"Distributed consensus problem with caching on federated learning framework","authors":"Xin Yan, Yiming Qin, Xiao Hu, Xiaoling Xiao","doi":"10.1177/15501329221092932","DOIUrl":"https://doi.org/10.1177/15501329221092932","url":null,"abstract":"Federated learning framework facilitates more applications of deep learning algorithms on the existing network architectures, where the model parameters are aggregated in a centralized manner. However, some of federated learning participants are often inaccessible, such as in a power shortage or dormant state. That will force us to explore the possibility that the parameter aggregation is operated in an ad hoc manner, which is based on consensus computing. On the contrary, since caching mechanism is indispensable to any federated learning mobile node, it is necessary to investigate the connection between it and consensus computing. In this article, we first propose a novel federated learning paradigm, which supports an ad hoc operation mode for federated learning participants. Second, a discrete-time dynamic equation and its control law are formulated to satisfy the demands from federated learning framework, with a quantized caching scheme designed to mask the uncertainties from both asynchronous updates and measurement noises. Then, the consensus conditions and the convergence of the consensus protocol are deduced analytically, and a quantized caching strategy to optimize the convergence speed is provided. Our major contribution is to give the basic theories of distributed consensus problem for federated learning framework, and the theoretical results are validated by numerical simulations.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48346434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lattice-based provable data possession in the standard model for cloud-based smart grid data management systems 基于云的智能电网数据管理系统标准模型中基于格的可证明数据占有
IF 2.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-04-01 DOI: 10.1177/15501329221092940
Cai-xue Zhou, Lihua Wang, Lingmin Wang
The smart grid is considered to be the next-generation electric power network. In a smart grid, there are massive data to be processed, so cloud computing is introduced into it to form a cloud-based smart grid data management system. However, with data no longer being stored locally, how to ensure the integrity of data stored in the cloud in the smart grid has become an urgent problem awaiting solution. Provable data possession has been proposed to solve this problem. With the development of quantum computer technology, quantum attacks-resistant cryptographic schemes are gradually entering people’s horizons. Lattice cryptography can resist quantum attacks. In this article, a lattice-based provable data possession scheme is proposed for cloud-based smart grid data management systems. The scheme is proved unforgeable under the small integer solution hard assumption in the standard model. Compared with other two efficient lattice-based provable data possession schemes in the standard model, our scheme also shows efficiency.
智能电网被认为是下一代电力网络。在智能电网中,有大量的数据需要处理,因此将云计算引入其中,形成了一个基于云的智能电网数据管理系统。然而,随着数据不再存储在本地,如何确保智能电网中存储在云中的数据的完整性已成为亟待解决的问题。为了解决这个问题,已经提出了可证明的数据占有。随着量子计算机技术的发展,抗量子攻击的密码方案正逐渐进入人们的视野。晶格密码术可以抵抗量子攻击。本文针对基于云的智能电网数据管理系统,提出了一种基于网格的可证明数据占有方案。在标准模型的小整数解硬假设下,证明了该方案是不可伪造的。与标准模型中其他两种有效的基于格的可证明数据拥有方案相比,我们的方案也显示出了有效性。
{"title":"Lattice-based provable data possession in the standard model for cloud-based smart grid data management systems","authors":"Cai-xue Zhou, Lihua Wang, Lingmin Wang","doi":"10.1177/15501329221092940","DOIUrl":"https://doi.org/10.1177/15501329221092940","url":null,"abstract":"The smart grid is considered to be the next-generation electric power network. In a smart grid, there are massive data to be processed, so cloud computing is introduced into it to form a cloud-based smart grid data management system. However, with data no longer being stored locally, how to ensure the integrity of data stored in the cloud in the smart grid has become an urgent problem awaiting solution. Provable data possession has been proposed to solve this problem. With the development of quantum computer technology, quantum attacks-resistant cryptographic schemes are gradually entering people’s horizons. Lattice cryptography can resist quantum attacks. In this article, a lattice-based provable data possession scheme is proposed for cloud-based smart grid data management systems. The scheme is proved unforgeable under the small integer solution hard assumption in the standard model. Compared with other two efficient lattice-based provable data possession schemes in the standard model, our scheme also shows efficiency.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43346102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Load frequency control under false data inject attacks based on multi-agent system method in multi-area power systems 基于多智能体系统的多区域电力系统虚假数据注入攻击下负荷频率控制
IF 2.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-04-01 DOI: 10.1177/15501329221090469
Tengfei Weng, Yan Xie, Guorong Chen, Qi Han, Yuan Tian, Liping Feng, Yangjun Pei
This article considers the load frequency control of multi-area power system-based multi-agent system method under false data injection attacks. The research can provide better solutions for multi-area power system load frequency control under false data injection attacks. First, an event-triggered mechanism is introduced to decide which data should be transmitted in the controller to save the limited network bandwidth. Besides, a model of cyberattacks is built using the Bernoulli random variables. Then, conditions are given for maintaining the system asymptotic stability under attack. Finally, simulations are performed to demonstrate the validity of the theory proposed in this article.
研究了在虚假数据注入攻击下,基于多智能体系统的多区域电力系统负荷频率控制方法。该方法可以为多区域电力系统在虚假数据注入攻击下的负荷频率控制提供更好的解决方案。首先,引入事件触发机制来决定哪些数据应该在控制器中传输,以节省有限的网络带宽。此外,利用伯努利随机变量建立了网络攻击模型。然后,给出了在攻击下保持系统渐近稳定的条件。最后,通过仿真验证了本文所提理论的有效性。
{"title":"Load frequency control under false data inject attacks based on multi-agent system method in multi-area power systems","authors":"Tengfei Weng, Yan Xie, Guorong Chen, Qi Han, Yuan Tian, Liping Feng, Yangjun Pei","doi":"10.1177/15501329221090469","DOIUrl":"https://doi.org/10.1177/15501329221090469","url":null,"abstract":"This article considers the load frequency control of multi-area power system-based multi-agent system method under false data injection attacks. The research can provide better solutions for multi-area power system load frequency control under false data injection attacks. First, an event-triggered mechanism is introduced to decide which data should be transmitted in the controller to save the limited network bandwidth. Besides, a model of cyberattacks is built using the Bernoulli random variables. Then, conditions are given for maintaining the system asymptotic stability under attack. Finally, simulations are performed to demonstrate the validity of the theory proposed in this article.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46551462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An efficient XOR-based visual cryptography scheme with lossless reconfigurable algorithms 一种高效的基于XOR的无损可重构视觉密码方案
IF 2.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-04-01 DOI: 10.1177/15501329221084223
Huan Wang, Zhongyuan Jiang, Qing Qian, Hong Wang
This article proposes an efficient XOR-based visual cryptography scheme with lossless reconfigurable algorithms, which includes an encryption and a decryption schemes for gray-scale and color secret images. The encryption scheme aims to encrypt secret images by mapping them to several shared images that do not suffer any pixel expansion problem and do not reveal any information of the secret images by considering a random column selection algorithm based on the 0-mapping and 1-mapping matrices, where the two matrices are dynamically generated in the encryption scheme. Moreover, the proposed decryption scheme can reconstruct the secret images with only a series of XOR operations. The reconstructed images do not suffer any contrast distortion and pixel expansion problems comparing with their original secret images. Finally, the proposed two schemes are illustrated with the practical examples.
本文提出了一种高效的基于XOR的视觉密码方案,该方案具有无损可重构算法,包括灰度和彩色秘密图像的加密和解密方案。该加密方案旨在通过考虑基于0-映射和1-映射矩阵的随机列选择算法,将秘密图像映射到不存在任何像素扩展问题并且不泄露秘密图像的任何信息的几个共享图像来加密秘密图像,其中这两个矩阵在加密方案中动态生成。此外,所提出的解密方案只需一系列XOR运算就可以重建秘密图像。与它们的原始秘密图像相比,重建的图像不遭受任何对比度失真和像素扩展问题。最后,通过实例对提出的两种方案进行了说明。
{"title":"An efficient XOR-based visual cryptography scheme with lossless reconfigurable algorithms","authors":"Huan Wang, Zhongyuan Jiang, Qing Qian, Hong Wang","doi":"10.1177/15501329221084223","DOIUrl":"https://doi.org/10.1177/15501329221084223","url":null,"abstract":"This article proposes an efficient XOR-based visual cryptography scheme with lossless reconfigurable algorithms, which includes an encryption and a decryption schemes for gray-scale and color secret images. The encryption scheme aims to encrypt secret images by mapping them to several shared images that do not suffer any pixel expansion problem and do not reveal any information of the secret images by considering a random column selection algorithm based on the 0-mapping and 1-mapping matrices, where the two matrices are dynamically generated in the encryption scheme. Moreover, the proposed decryption scheme can reconstruct the secret images with only a series of XOR operations. The reconstructed images do not suffer any contrast distortion and pixel expansion problems comparing with their original secret images. Finally, the proposed two schemes are illustrated with the practical examples.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49166971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Artificial intelligence analysis in cyber domain: A review 网络领域人工智能分析综述
IF 2.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-04-01 DOI: 10.1177/15501329221084882
Liguo Zhao, D. Zhu, Wasswa Shafik, S. Matinkhah, Zubair Ahmad, Lule Sharif, Alisa Craig
The application of Big Data Analytics is identified through the Cyber Research Alliance for cybersecurity as the foremost preference for future studies and advancement in the field of cybersecurity. In this study, we develop a repeatable procedure for detecting cyber-attacks in an accurate, scalable, and timely manner. An in-depth learning algorithm is utilized for training a neural network for detecting suspicious user activities. The proposed system architecture was implemented with the help of Splunk Enterprise Edition 6.42. A data set of average feature counts has been executed through a Splunk search command in 1-min intervals. All the data sets consisted of a minute trait total derived from a sparkling file. The attack patterns that were not anonymized or were indicative of the vulnerability of cyber-attack were denoted with yellow. The rule-based method dispensed a low quantity of irregular illustrations in contrast with the Partitioning Around Medoids method. The results in this study demonstrated that using a proportional collection of instances trained with the deep learning algorithm, a classified data set can accurately detect suspicious behavior. This method permits for the allocation of multiple log source types through a sliding time window and provides a scalable solution, which is a much-needed function.
网络安全研究联盟将大数据分析的应用确定为网络安全领域未来研究和发展的首要选择。在本研究中,我们开发了一种可重复的程序,以准确、可扩展和及时的方式检测网络攻击。利用深度学习算法训练用于检测可疑用户活动的神经网络。提出的系统架构在Splunk Enterprise Edition 6.42的帮助下实现。通过Splunk搜索命令每隔1分钟执行一个平均特征计数的数据集。所有的数据集都由一个微小的特征总数组成,这些特征总数来自一个闪闪发光的文件。未匿名化或表明存在网络攻击脆弱性的攻击模式用黄色表示。与围绕介质划分方法相比,基于规则的方法分配了少量的不规则插图。本研究的结果表明,使用深度学习算法训练的实例的比例集合,分类数据集可以准确地检测可疑行为。该方法允许通过滑动时间窗口分配多种日志源类型,并提供可扩展的解决方案,这是一个急需的功能。
{"title":"Artificial intelligence analysis in cyber domain: A review","authors":"Liguo Zhao, D. Zhu, Wasswa Shafik, S. Matinkhah, Zubair Ahmad, Lule Sharif, Alisa Craig","doi":"10.1177/15501329221084882","DOIUrl":"https://doi.org/10.1177/15501329221084882","url":null,"abstract":"The application of Big Data Analytics is identified through the Cyber Research Alliance for cybersecurity as the foremost preference for future studies and advancement in the field of cybersecurity. In this study, we develop a repeatable procedure for detecting cyber-attacks in an accurate, scalable, and timely manner. An in-depth learning algorithm is utilized for training a neural network for detecting suspicious user activities. The proposed system architecture was implemented with the help of Splunk Enterprise Edition 6.42. A data set of average feature counts has been executed through a Splunk search command in 1-min intervals. All the data sets consisted of a minute trait total derived from a sparkling file. The attack patterns that were not anonymized or were indicative of the vulnerability of cyber-attack were denoted with yellow. The rule-based method dispensed a low quantity of irregular illustrations in contrast with the Partitioning Around Medoids method. The results in this study demonstrated that using a proportional collection of instances trained with the deep learning algorithm, a classified data set can accurately detect suspicious behavior. This method permits for the allocation of multiple log source types through a sliding time window and provides a scalable solution, which is a much-needed function.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47198515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Fast and computationally efficient generative adversarial network algorithm for unmanned aerial vehicle–based network coverage optimization 基于无人机网络覆盖优化的快速高效生成对抗网络算法
IF 2.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-03-01 DOI: 10.1177/15501477221075544
Marek Ruzicka, Marcel Volosin, J. Gazda, T. Maksymyuk, Longzhe Han, M. Dohler
The challenge of dynamic traffic demand in mobile networks is tackled by moving cells based on unmanned aerial vehicles. Considering the tremendous potential of unmanned aerial vehicles in the future, we propose a new heuristic algorithm for coverage optimization. The proposed algorithm is implemented based on a conditional generative adversarial neural network, with a unique multilayer sum-pooling loss function. To assess the performance of the proposed approach, we compare it with the optimal core-set algorithm and quasi-optimal spiral algorithm. Simulation results show that the proposed approach converges to the quasi-optimal solution with a negligible difference from the global optimum while maintaining a quadratic complexity regardless of the number of users.
移动网络中动态流量需求的挑战是通过基于无人机的移动单元来解决的。考虑到无人机在未来的巨大潜力,我们提出了一种新的覆盖优化启发式算法。所提出的算法是基于条件生成对抗性神经网络实现的,该网络具有独特的多层和池损失函数。为了评估所提出的方法的性能,我们将其与最优核心集算法和拟最优螺旋算法进行了比较。仿真结果表明,无论用户数量如何,该方法都能收敛到与全局最优解相差可忽略的拟最优解,同时保持二次复杂度。
{"title":"Fast and computationally efficient generative adversarial network algorithm for unmanned aerial vehicle–based network coverage optimization","authors":"Marek Ruzicka, Marcel Volosin, J. Gazda, T. Maksymyuk, Longzhe Han, M. Dohler","doi":"10.1177/15501477221075544","DOIUrl":"https://doi.org/10.1177/15501477221075544","url":null,"abstract":"The challenge of dynamic traffic demand in mobile networks is tackled by moving cells based on unmanned aerial vehicles. Considering the tremendous potential of unmanned aerial vehicles in the future, we propose a new heuristic algorithm for coverage optimization. The proposed algorithm is implemented based on a conditional generative adversarial neural network, with a unique multilayer sum-pooling loss function. To assess the performance of the proposed approach, we compare it with the optimal core-set algorithm and quasi-optimal spiral algorithm. Simulation results show that the proposed approach converges to the quasi-optimal solution with a negligible difference from the global optimum while maintaining a quadratic complexity regardless of the number of users.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48823921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An intrusion detection mechanism for IPv6-based wireless sensor networks 基于ipv6的无线传感器网络入侵检测机制
IF 2.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-03-01 DOI: 10.1177/15501329221077922
Min Wei, Chunmeng Rong, Erxiong Liang, Yuan Zhuang
With the advancement of IPv6 technology, many nodes in wireless sensor networks realize seamless connections with the Internet via IPv6 addresses. Security issues are a significant obstacle to the widespread adoption of IPv6 technology. Resource-constrained IPv6 nodes face dual attacks: local and Internet-based. Moreover, constructing an active cyber defense system for IPv6-based wireless sensor networks is difficult. In this article, we propose a K-nearest neighbor-based intrusion detection mechanism and design a secure network framework. This mechanism trains an intrusion detection algorithm using a feature data set to create a normal profile. The intrusion detection algorithm uses the normal profile to perform real-time detection of network traffic data to achieve rapid detections connecting many devices in a wireless sensor network. In addition, we develop a test platform to verify this mechanism. Experimental results show that this mechanism is appropriate for IPv6-based wireless sensor networks and achieves a low false-positive rate and good intrusion detection accuracy at an acceptable resource cost.
随着IPv6技术的进步,无线传感器网络中的许多节点通过IPv6地址实现了与互联网的无缝连接。安全问题是广泛采用IPv6技术的一个重要障碍。资源受限的IPv6节点面临本地攻击和基于internet的双重攻击。此外,针对基于ipv6的无线传感器网络,构建主动网络防御系统是一个难点。本文提出了一种基于k近邻的入侵检测机制,并设计了一个安全的网络框架。该机制使用特征数据集训练入侵检测算法来创建正常配置文件。入侵检测算法采用正常配置文件对网络流量数据进行实时检测,实现无线传感器网络中多设备连接的快速检测。此外,我们还开发了一个测试平台来验证该机制。实验结果表明,该机制适用于基于ipv6的无线传感器网络,在可接受的资源成本下实现了低误报率和良好的入侵检测精度。
{"title":"An intrusion detection mechanism for IPv6-based wireless sensor networks","authors":"Min Wei, Chunmeng Rong, Erxiong Liang, Yuan Zhuang","doi":"10.1177/15501329221077922","DOIUrl":"https://doi.org/10.1177/15501329221077922","url":null,"abstract":"With the advancement of IPv6 technology, many nodes in wireless sensor networks realize seamless connections with the Internet via IPv6 addresses. Security issues are a significant obstacle to the widespread adoption of IPv6 technology. Resource-constrained IPv6 nodes face dual attacks: local and Internet-based. Moreover, constructing an active cyber defense system for IPv6-based wireless sensor networks is difficult. In this article, we propose a K-nearest neighbor-based intrusion detection mechanism and design a secure network framework. This mechanism trains an intrusion detection algorithm using a feature data set to create a normal profile. The intrusion detection algorithm uses the normal profile to perform real-time detection of network traffic data to achieve rapid detections connecting many devices in a wireless sensor network. In addition, we develop a test platform to verify this mechanism. Experimental results show that this mechanism is appropriate for IPv6-based wireless sensor networks and achieves a low false-positive rate and good intrusion detection accuracy at an acceptable resource cost.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43772315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Light-weighted vehicle detection network based on improved YOLOv3-tiny 基于改进YOLOv3-tiny的轻型车辆检测网络
IF 2.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-03-01 DOI: 10.1177/15501329221080665
Pingshu Ge, Lie Guo, Danni He, Liang Huang
Vehicle detection is one of the most challenging research works on environment perception for intelligent vehicle. The commonly used object detection network is too large and can only be realized in real-time on a high-performance server. Based on YOLOv3-tiny, the feature extraction was realized using light-weighted networks such as DarkNet-19 and ResNet-18 to improve accuracy. The K-means algorithm was used to cluster nine anchor boxes to achieve multi-scale prediction, especially for small targets. For automotive applicable scenarios, the proposed vehicle detection network was executed in an embedded device. The KITTI data sets were trained and tested. Experimental results show that the average accuracy is improved by 14.09% compared with the traditional YOLOv3-tiny, reaching 93.66%, and can reach 13 fps on the embedded device.
车辆检测是智能车辆环境感知领域最具挑战性的研究工作之一。常用的目标检测网络过于庞大,只能在高性能服务器上实时实现。在YOLOv3-tiny的基础上,利用DarkNet-19和ResNet-18等轻量级网络实现特征提取,提高准确率。采用K-means算法对9个锚盒进行聚类,实现对小目标的多尺度预测。针对汽车应用场景,提出的车辆检测网络在嵌入式设备中执行。对KITTI数据集进行了训练和测试。实验结果表明,与传统的YOLOv3-tiny相比,平均精度提高了14.09%,达到93.66%,在嵌入式设备上可以达到13 fps。
{"title":"Light-weighted vehicle detection network based on improved YOLOv3-tiny","authors":"Pingshu Ge, Lie Guo, Danni He, Liang Huang","doi":"10.1177/15501329221080665","DOIUrl":"https://doi.org/10.1177/15501329221080665","url":null,"abstract":"Vehicle detection is one of the most challenging research works on environment perception for intelligent vehicle. The commonly used object detection network is too large and can only be realized in real-time on a high-performance server. Based on YOLOv3-tiny, the feature extraction was realized using light-weighted networks such as DarkNet-19 and ResNet-18 to improve accuracy. The K-means algorithm was used to cluster nine anchor boxes to achieve multi-scale prediction, especially for small targets. For automotive applicable scenarios, the proposed vehicle detection network was executed in an embedded device. The KITTI data sets were trained and tested. Experimental results show that the average accuracy is improved by 14.09% compared with the traditional YOLOv3-tiny, reaching 93.66%, and can reach 13 fps on the embedded device.","PeriodicalId":50327,"journal":{"name":"International Journal of Distributed Sensor Networks","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41637973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
International Journal of Distributed Sensor Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1