Wireless communication tower placement arises in many real-world applications. This paper investigates a new emerging wireless communication tower placement problem, namely, continuous space wireless communication tower placement. Unlike existing wireless communication tower placement problems, which are discrete computational problems, this new wireless communication tower placement problem is a continuous space computational problem. In this paper, we formulate the new wireless communication tower placement problem and propose a hybrid simulated annealing algorithm that can take advantage of the powerful exploration capacity of simulated annealing and the strong exploitation capacity of a local optimization procedure. We also demonstrate through experiments the effectiveness of this hybridization technique and the good performance and scalability of the hybrid simulated annulling in this paper.
{"title":"Continuous Space Wireless Communication Tower Placement by Hybrid Simulated Annealing","authors":"Maolin Tang, Wei Li","doi":"10.3390/fi16040117","DOIUrl":"https://doi.org/10.3390/fi16040117","url":null,"abstract":"Wireless communication tower placement arises in many real-world applications. This paper investigates a new emerging wireless communication tower placement problem, namely, continuous space wireless communication tower placement. Unlike existing wireless communication tower placement problems, which are discrete computational problems, this new wireless communication tower placement problem is a continuous space computational problem. In this paper, we formulate the new wireless communication tower placement problem and propose a hybrid simulated annealing algorithm that can take advantage of the powerful exploration capacity of simulated annealing and the strong exploitation capacity of a local optimization procedure. We also demonstrate through experiments the effectiveness of this hybridization technique and the good performance and scalability of the hybrid simulated annulling in this paper.","PeriodicalId":509567,"journal":{"name":"Future Internet","volume":"48 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140367975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Accurate perception is crucial for autonomous vehicles (AVs) to navigate safely, especially in adverse weather and lighting conditions where single-sensor networks (e.g., cameras or radar) struggle with reduced maneuverability and unrecognizable targets. Deep Camera-Radar fusion neural networks offer a promising solution for reliable AV perception under any weather and lighting conditions. Cameras provide rich semantic information, while radars act like an X-ray vision, piercing through fog and darkness. This work proposes a novel, efficient Camera-Radar fusion network called NeXtFusion for robust AV perception with an improvement in object detection accuracy and tracking. Our proposed approach of utilizing an attention module enhances crucial feature representation for object detection while minimizing information loss from multi-modal data. Extensive experiments on the challenging nuScenes dataset demonstrate NeXtFusion’s superior performance in detecting small and distant objects compared to other methods. Notably, NeXtFusion achieves the highest mAP score (0.473) on the nuScenes validation set, outperforming competitors like OFT (35.1% improvement) and MonoDIS (9.5% improvement). Additionally, NeXtFusion demonstrates strong performance in other metrics like mATE (0.449) and mAOE (0.534), highlighting its overall effectiveness in 3D object detection. Furthermore, visualizations of nuScenes data processed by NeXtFusion further demonstrate its capability to handle diverse real-world scenarios. These results suggest that NeXtFusion is a promising deep fusion network for improving AV perception and safety for autonomous driving.
{"title":"NeXtFusion: Attention-Based Camera-Radar Fusion Network for Improved Three-Dimensional Object Detection and Tracking","authors":"Priyank Kalgaonkar, Mohamed El-Sharkawy","doi":"10.3390/fi16040114","DOIUrl":"https://doi.org/10.3390/fi16040114","url":null,"abstract":"Accurate perception is crucial for autonomous vehicles (AVs) to navigate safely, especially in adverse weather and lighting conditions where single-sensor networks (e.g., cameras or radar) struggle with reduced maneuverability and unrecognizable targets. Deep Camera-Radar fusion neural networks offer a promising solution for reliable AV perception under any weather and lighting conditions. Cameras provide rich semantic information, while radars act like an X-ray vision, piercing through fog and darkness. This work proposes a novel, efficient Camera-Radar fusion network called NeXtFusion for robust AV perception with an improvement in object detection accuracy and tracking. Our proposed approach of utilizing an attention module enhances crucial feature representation for object detection while minimizing information loss from multi-modal data. Extensive experiments on the challenging nuScenes dataset demonstrate NeXtFusion’s superior performance in detecting small and distant objects compared to other methods. Notably, NeXtFusion achieves the highest mAP score (0.473) on the nuScenes validation set, outperforming competitors like OFT (35.1% improvement) and MonoDIS (9.5% improvement). Additionally, NeXtFusion demonstrates strong performance in other metrics like mATE (0.449) and mAOE (0.534), highlighting its overall effectiveness in 3D object detection. Furthermore, visualizations of nuScenes data processed by NeXtFusion further demonstrate its capability to handle diverse real-world scenarios. These results suggest that NeXtFusion is a promising deep fusion network for improving AV perception and safety for autonomous driving.","PeriodicalId":509567,"journal":{"name":"Future Internet","volume":"40 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140372148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
To address the challenge of balancing privacy protection with regulatory oversight in blockchain transactions, we propose a regulatable privacy protection scheme for blockchain transactions. Our scheme utilizes probabilistic public-key encryption to obscure the true identities of blockchain transaction participants. By integrating commitment schemes and zero-knowledge proof techniques with deep learning graph neural network technology, it provides privacy protection and regulatory analysis of blockchain transaction data. This approach not only prevents the leakage of sensitive transaction information, but also achieves regulatory capabilities at both macro and micro levels, ensuring the verification of the legality of transactions. By adopting an identity-based encryption system, regulatory bodies can conduct personalized supervision of blockchain transactions without storing users’ actual identities and key data, significantly reducing storage computation and key management burdens. Our scheme is independent of any particular consensus mechanism and can be applied to current blockchain technologies. Simulation experiments and complexity analysis demonstrate the practicality of the scheme.
{"title":"Research on Blockchain Transaction Privacy Protection Methods Based on Deep Learning","authors":"Jun Li, Chenyang Zhang, Jianyi Zhang, Yanhua Shao","doi":"10.3390/fi16040113","DOIUrl":"https://doi.org/10.3390/fi16040113","url":null,"abstract":"To address the challenge of balancing privacy protection with regulatory oversight in blockchain transactions, we propose a regulatable privacy protection scheme for blockchain transactions. Our scheme utilizes probabilistic public-key encryption to obscure the true identities of blockchain transaction participants. By integrating commitment schemes and zero-knowledge proof techniques with deep learning graph neural network technology, it provides privacy protection and regulatory analysis of blockchain transaction data. This approach not only prevents the leakage of sensitive transaction information, but also achieves regulatory capabilities at both macro and micro levels, ensuring the verification of the legality of transactions. By adopting an identity-based encryption system, regulatory bodies can conduct personalized supervision of blockchain transactions without storing users’ actual identities and key data, significantly reducing storage computation and key management burdens. Our scheme is independent of any particular consensus mechanism and can be applied to current blockchain technologies. Simulation experiments and complexity analysis demonstrate the practicality of the scheme.","PeriodicalId":509567,"journal":{"name":"Future Internet","volume":"137 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140369467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Véronique Georlette, Anne-Carole Honfoga, M. Dossou, V. Moeyaert
In the dynamic landscape of 6G and smart cities, visible light communication (VLC) assumes critical significance for Internet of Things (IoT) applications spanning diverse sectors. The escalating demand for bandwidth and data underscores the need for innovative solutions, positioning VLC as a complementary technology within the electromagnetic spectrum. This paper focuses on the relevance of VLC in the 6G paradigm, shedding light on its applicability across smart cities and industries. The paper highlights the growing efficiency of lighting LEDs in infrastructure, facilitating the seamless integration of VLC. The study then emphasizes VLC’s robustness in outdoor settings, demonstrating effective communication up to 10 m. This resilience positions VLC as a key player in addressing the very last meter of wireless communication, offering a seamless solution for IoT connectivity. By introducing a freely available open-source simulator combined with an alternative waveform, UFMC, the study empowers researchers to dimension applications effectively, showcasing VLC’s potential to improve wireless communication in the evolving landscape of 6G and smart cities.
{"title":"Exploring Universal Filtered Multi Carrier Waveform for Last Meter Connectivity in 6G: A Street-Lighting-Driven Approach with Enhanced Simulator for IoT Application Dimensioning","authors":"Véronique Georlette, Anne-Carole Honfoga, M. Dossou, V. Moeyaert","doi":"10.3390/fi16040112","DOIUrl":"https://doi.org/10.3390/fi16040112","url":null,"abstract":"In the dynamic landscape of 6G and smart cities, visible light communication (VLC) assumes critical significance for Internet of Things (IoT) applications spanning diverse sectors. The escalating demand for bandwidth and data underscores the need for innovative solutions, positioning VLC as a complementary technology within the electromagnetic spectrum. This paper focuses on the relevance of VLC in the 6G paradigm, shedding light on its applicability across smart cities and industries. The paper highlights the growing efficiency of lighting LEDs in infrastructure, facilitating the seamless integration of VLC. The study then emphasizes VLC’s robustness in outdoor settings, demonstrating effective communication up to 10 m. This resilience positions VLC as a key player in addressing the very last meter of wireless communication, offering a seamless solution for IoT connectivity. By introducing a freely available open-source simulator combined with an alternative waveform, UFMC, the study empowers researchers to dimension applications effectively, showcasing VLC’s potential to improve wireless communication in the evolving landscape of 6G and smart cities.","PeriodicalId":509567,"journal":{"name":"Future Internet","volume":"9 7","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140378712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The significance of V2X (Vehicle-to-Everything) technology in the context of highly automated and autonomous vehicles can hardly be overestimated. While V2X is not considered a standalone technology for achieving high automation, it is recognized as a safety-redundant component in automated driving systems. This article aims to systematically assess the requirements towards V2X input data to highly automated and autonomous systems that can individually, or in combination with other sensors, enable certain levels of autonomy. It addresses the assessment of V2X input data requirements for different levels of autonomy defined by SAE International, regulatory challenges, scalability issues in hybrid environments, and the potential impact of Internet of Things (IoT)-based information in non-automotive technical fields. A method is proposed for assessing the applicability of V2X at various levels of automation based on system complexity. The findings provide valuable insights for the development, deployment and regulation of V2X-enabled automated systems, ultimately contributing to enhanced road safety and efficient mobility.
{"title":"A Method for Mapping V2X Communication Requirements to Highly Automated and Autonomous Vehicle Functions","authors":"Árpád Takács, T. Haidegger","doi":"10.3390/fi16040108","DOIUrl":"https://doi.org/10.3390/fi16040108","url":null,"abstract":"The significance of V2X (Vehicle-to-Everything) technology in the context of highly automated and autonomous vehicles can hardly be overestimated. While V2X is not considered a standalone technology for achieving high automation, it is recognized as a safety-redundant component in automated driving systems. This article aims to systematically assess the requirements towards V2X input data to highly automated and autonomous systems that can individually, or in combination with other sensors, enable certain levels of autonomy. It addresses the assessment of V2X input data requirements for different levels of autonomy defined by SAE International, regulatory challenges, scalability issues in hybrid environments, and the potential impact of Internet of Things (IoT)-based information in non-automotive technical fields. A method is proposed for assessing the applicability of V2X at various levels of automation based on system complexity. The findings provide valuable insights for the development, deployment and regulation of V2X-enabled automated systems, ultimately contributing to enhanced road safety and efficient mobility.","PeriodicalId":509567,"journal":{"name":"Future Internet","volume":" 721","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140382887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This study presents a newly developed edge computing platform designed to enhance connectivity between edge devices and the cloud in the agricultural sector. Addressing the challenge of synchronizing a central database across 850 remote farm locations in various countries, the focus lies on maintaining data integrity and consistency for effective farm management. The incorporation of a new edge device into existing setups has significantly improved computational capabilities for tasks like data synchronization and machine learning. This research highlights the critical role of cloud computing in managing large data volumes, with Amazon Web Services hosting the databases. This paper showcases an integrated architecture combining edge devices, networks, and cloud computing, forming a seamless continuum of services from cloud to edge. This approach proves effective in managing the significant data volumes generated in remote agricultural areas. This paper also introduces the PAIR Mechanism, which is a solution developed in response to the unique challenges of agricultural data management, emphasizing resilience and simplicity in data synchronization between cloud and edge databases. The PAIR Mechanism’s potential for robust data management in IoT and cloud environments is explored, offering a novel perspective on synchronization challenges in edge computing.
{"title":"A Novel Edge Platform Streamlining Connectivity between Modern Edge Devices and the Cloud","authors":"A. Carvalho, Daniel Riordan, Joseph Walsh","doi":"10.3390/fi16040111","DOIUrl":"https://doi.org/10.3390/fi16040111","url":null,"abstract":"This study presents a newly developed edge computing platform designed to enhance connectivity between edge devices and the cloud in the agricultural sector. Addressing the challenge of synchronizing a central database across 850 remote farm locations in various countries, the focus lies on maintaining data integrity and consistency for effective farm management. The incorporation of a new edge device into existing setups has significantly improved computational capabilities for tasks like data synchronization and machine learning. This research highlights the critical role of cloud computing in managing large data volumes, with Amazon Web Services hosting the databases. This paper showcases an integrated architecture combining edge devices, networks, and cloud computing, forming a seamless continuum of services from cloud to edge. This approach proves effective in managing the significant data volumes generated in remote agricultural areas. This paper also introduces the PAIR Mechanism, which is a solution developed in response to the unique challenges of agricultural data management, emphasizing resilience and simplicity in data synchronization between cloud and edge databases. The PAIR Mechanism’s potential for robust data management in IoT and cloud environments is explored, offering a novel perspective on synchronization challenges in edge computing.","PeriodicalId":509567,"journal":{"name":"Future Internet","volume":" 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140382367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fahad Alqahtani, Mohammed Almutairi, Frederick T. Sheldon
This study provides a comprehensive review and comparative analysis of existing Information Flow Tracking (IFT) tools which underscores the imperative for mitigating data leakage in complex cloud systems. Traditional methods impose significant overhead on Cloud Service Providers (CSPs) and management activities, prompting the exploration of alternatives such as IFT. By augmenting consumer data subsets with security tags and deploying a network of monitors, IFT facilitates the detection and prevention of data leaks among cloud tenants. The research here has focused on preventing misuse, such as the exfiltration and/or extrusion of sensitive data in the cloud as well as the role of anonymization. The CloudMonitor framework was envisioned and developed to study and design mechanisms for transparent and efficient IFT (eIFT). The framework enables the experimentation, analysis, and validation of innovative methods for providing greater control to cloud service consumers (CSCs) over their data. Moreover, eIFT enables enhanced visibility to assess data conveyances by third-party services toward avoiding security risks (e.g., data exfiltration). Our implementation and validation of the framework uses both a centralized and dynamic IFT approach to achieve these goals. We measured the balance between dynamism and granularity of the data being tracked versus efficiency. To establish a security and performance baseline for better defense in depth, this work focuses primarily on unique Dynamic IFT tracking capabilities using e.g., Infrastructure as a Service (IaaS). Consumers and service providers can negotiate specific security enforcement standards using our framework. Thus, this study orchestrates and assesses, using a series of real-world experiments, how distinct monitoring capabilities combine to provide a comparatively higher level of security. Input/output performance was evaluated for execution time and resource utilization using several experiments. The results show that the performance is unaffected by the magnitude of the input/output data that is tracked. In other words, as the volume of data increases, we notice that the execution time grows linearly. However, this increase occurs at a rate that is notably slower than what would be anticipated in a strictly proportional relationship. The system achieves an average CPU and memory consumption overhead profile of 8% and 37% while completing less than one second for all of the validation test runs. The results establish a performance efficiency baseline for a better measure and understanding of the cost of preserving confidentiality, integrity, and availability (CIA) for cloud Consumers and Providers (C&P). Consumers can scrutinize the benefits (i.e., security) and tradeoffs (memory usage, bandwidth, CPU usage, and throughput) and the cost of ensuring CIA can be established, monitored, and controlled. This work provides the primary use-cases, formula for enforcing the rules of data isolation, data t
本研究对现有的信息流跟踪(IFT)工具进行了全面回顾和比较分析,强调了在复杂的云系统中减少数据泄漏的必要性。传统方法给云服务提供商(CSP)和管理活动带来了巨大的开销,促使人们探索 IFT 等替代方法。通过用安全标签增强消费者数据子集并部署监控器网络,IFT 可帮助检测和防止云租户之间的数据泄漏。这里的研究重点是防止滥用,例如云中敏感数据的外泄和/或挤出,以及匿名化的作用。CloudMonitor 框架旨在研究和设计透明、高效的 IFT(eIFT)机制。通过该框架,可以对创新方法进行实验、分析和验证,从而为云服务消费者(CSC)提供更大的数据控制权。此外,eIFT 还能增强可视性,以评估第三方服务的数据传输,从而避免安全风险(如数据外泄)。我们对该框架的实施和验证采用了集中式和动态 IFT 方法来实现这些目标。我们衡量了被跟踪数据的动态性和粒度与效率之间的平衡。为了建立一个安全和性能基线,以实现更好的纵深防御,这项工作主要侧重于使用基础设施即服务(IaaS)等独特的动态 IFT 跟踪功能。消费者和服务提供商可以使用我们的框架协商特定的安全执行标准。因此,本研究通过一系列真实世界的实验来协调和评估不同的监控功能如何结合起来提供相对更高的安全级别。通过多项实验对输入/输出性能的执行时间和资源利用率进行了评估。结果表明,性能不受跟踪的输入/输出数据量的影响。换句话说,随着数据量的增加,我们注意到执行时间呈线性增长。不过,这种增长速度明显慢于严格的比例关系。在所有验证测试运行中,系统平均 CPU 和内存消耗开销分别为 8%和 37%,而完成时间却不到一秒。这些结果为更好地衡量和理解云消费者和提供商(C&P)保护机密性、完整性和可用性(CIA)的成本建立了性能效率基准。消费者可以仔细检查各种优势(即安全性)和权衡(内存使用率、带宽、CPU 使用率和吞吐量),以及确保建立、监测和控制 CIA 的成本。这项工作提供了主要用例、执行数据隔离规则的公式、数据跟踪策略框架,以及使用 CloudMonitor 框架管理机密数据流和防止数据泄漏的基础。
{"title":"Cloud Security Using Fine-Grained Efficient Information Flow Tracking","authors":"Fahad Alqahtani, Mohammed Almutairi, Frederick T. Sheldon","doi":"10.3390/fi16040110","DOIUrl":"https://doi.org/10.3390/fi16040110","url":null,"abstract":"This study provides a comprehensive review and comparative analysis of existing Information Flow Tracking (IFT) tools which underscores the imperative for mitigating data leakage in complex cloud systems. Traditional methods impose significant overhead on Cloud Service Providers (CSPs) and management activities, prompting the exploration of alternatives such as IFT. By augmenting consumer data subsets with security tags and deploying a network of monitors, IFT facilitates the detection and prevention of data leaks among cloud tenants. The research here has focused on preventing misuse, such as the exfiltration and/or extrusion of sensitive data in the cloud as well as the role of anonymization. The CloudMonitor framework was envisioned and developed to study and design mechanisms for transparent and efficient IFT (eIFT). The framework enables the experimentation, analysis, and validation of innovative methods for providing greater control to cloud service consumers (CSCs) over their data. Moreover, eIFT enables enhanced visibility to assess data conveyances by third-party services toward avoiding security risks (e.g., data exfiltration). Our implementation and validation of the framework uses both a centralized and dynamic IFT approach to achieve these goals. We measured the balance between dynamism and granularity of the data being tracked versus efficiency. To establish a security and performance baseline for better defense in depth, this work focuses primarily on unique Dynamic IFT tracking capabilities using e.g., Infrastructure as a Service (IaaS). Consumers and service providers can negotiate specific security enforcement standards using our framework. Thus, this study orchestrates and assesses, using a series of real-world experiments, how distinct monitoring capabilities combine to provide a comparatively higher level of security. Input/output performance was evaluated for execution time and resource utilization using several experiments. The results show that the performance is unaffected by the magnitude of the input/output data that is tracked. In other words, as the volume of data increases, we notice that the execution time grows linearly. However, this increase occurs at a rate that is notably slower than what would be anticipated in a strictly proportional relationship. The system achieves an average CPU and memory consumption overhead profile of 8% and 37% while completing less than one second for all of the validation test runs. The results establish a performance efficiency baseline for a better measure and understanding of the cost of preserving confidentiality, integrity, and availability (CIA) for cloud Consumers and Providers (C&P). Consumers can scrutinize the benefits (i.e., security) and tradeoffs (memory usage, bandwidth, CPU usage, and throughput) and the cost of ensuring CIA can be established, monitored, and controlled. This work provides the primary use-cases, formula for enforcing the rules of data isolation, data t","PeriodicalId":509567,"journal":{"name":"Future Internet","volume":" 87","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140384761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In satellite networks, existing congestion resolution methods do not consider the predictability and stability of paths, leading to frequent path switches and high maintenance costs. In this regard, we propose a novel congestion resolution approach, named MOLM, which introduces a continuous neighbor set during path updates. This set includes nodes capable of establishing sustainable connections with the predecessors and successors of congested nodes. Combined with a multi-objective simulated annealing framework, MOLM iteratively derives an optimal selection from this set to replace congested nodes. Additionally, we employ a Fast Reroute mechanism based on backup paths (FRR-BP) to address node failures. The simulation results indicate that the optimal node endows the new path with optimal path stability and path latency.
{"title":"MOLM: Alleviating Congestion through Multi-Objective Simulated Annealing-Based Load Balancing Routing in LEO Satellite Networks","authors":"Yihu Zhou, Haiming Chen, Zhibin Dou","doi":"10.3390/fi16040109","DOIUrl":"https://doi.org/10.3390/fi16040109","url":null,"abstract":"In satellite networks, existing congestion resolution methods do not consider the predictability and stability of paths, leading to frequent path switches and high maintenance costs. In this regard, we propose a novel congestion resolution approach, named MOLM, which introduces a continuous neighbor set during path updates. This set includes nodes capable of establishing sustainable connections with the predecessors and successors of congested nodes. Combined with a multi-objective simulated annealing framework, MOLM iteratively derives an optimal selection from this set to replace congested nodes. Additionally, we employ a Fast Reroute mechanism based on backup paths (FRR-BP) to address node failures. The simulation results indicate that the optimal node endows the new path with optimal path stability and path latency.","PeriodicalId":509567,"journal":{"name":"Future Internet","volume":"113 50","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140381498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ihtisham Khalid, Vasilis Maglogiannis, D. Naudts, A. Shahid, Ingrid Moerman
Cooperative communications advancements in Vehicular-to-Everything (V2X) are bolstering the autonomous driving paradigm. V2X nodes are connected through communication technology, such as a short-range communication mode (Dedicated Short Range Communication (DSRC) and Cellular-V2X) or a long-range communication mode (Uu). Conventional vehicular networks employ static wireless vehicular communication technology without considering the traffic load on any individual V2X communication technology and the traffic dynamics in the vicinity of the V2X node, and are hence inefficient. In this study, we investigate hybrid V2X communication and propose an autonomous and intelligent technology selection algorithm using a decision tree. The algorithm uses the information from the received Cooperative Intelligent Transport Systems (C-ITS) Cooperative Awareness Messages (CAMs) to collect statistics such as inter vehicular distance, one-way end-to-end latency and CAM density. These statistics are then used as input for the decision tree for selecting the appropriate technology (DSRC, C-V2X PC5 or 5G) for the subsequent scheduled C-ITS message transmission. The assessment of the intelligent hybrid V2X algorithm’s performance in our V2X test setup demonstrates enhancements in one-way end-to-end latency, reliability, and packet delivery rate when contrasted with the conventional utilization of static technology.
{"title":"Optimizing Hybrid V2X Communication: An Intelligent Technology Selection Algorithm Using 5G, C-V2X PC5 and DSRC","authors":"Ihtisham Khalid, Vasilis Maglogiannis, D. Naudts, A. Shahid, Ingrid Moerman","doi":"10.3390/fi16040107","DOIUrl":"https://doi.org/10.3390/fi16040107","url":null,"abstract":"Cooperative communications advancements in Vehicular-to-Everything (V2X) are bolstering the autonomous driving paradigm. V2X nodes are connected through communication technology, such as a short-range communication mode (Dedicated Short Range Communication (DSRC) and Cellular-V2X) or a long-range communication mode (Uu). Conventional vehicular networks employ static wireless vehicular communication technology without considering the traffic load on any individual V2X communication technology and the traffic dynamics in the vicinity of the V2X node, and are hence inefficient. In this study, we investigate hybrid V2X communication and propose an autonomous and intelligent technology selection algorithm using a decision tree. The algorithm uses the information from the received Cooperative Intelligent Transport Systems (C-ITS) Cooperative Awareness Messages (CAMs) to collect statistics such as inter vehicular distance, one-way end-to-end latency and CAM density. These statistics are then used as input for the decision tree for selecting the appropriate technology (DSRC, C-V2X PC5 or 5G) for the subsequent scheduled C-ITS message transmission. The assessment of the intelligent hybrid V2X algorithm’s performance in our V2X test setup demonstrates enhancements in one-way end-to-end latency, reliability, and packet delivery rate when contrasted with the conventional utilization of static technology.","PeriodicalId":509567,"journal":{"name":"Future Internet","volume":" 43","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140386451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The hype of the Internet of Things as an enabler for intelligent applications and related promise for ushering accessibility, efficiency, and quality of service is met with hindering security and data privacy concerns. It follows that such IoT systems, which are empowered by artificial intelligence, need to be investigated with cognisance of security threats and mitigation schemes that are tailored to their specific constraints and requirements. In this work, we present a comprehensive review of security threats in IoT and emerging countermeasures with a particular focus on malware and man-in-the-middle attacks. Next, we elaborate on two use cases: the Internet of Energy Things and the Internet of Medical Things. Innovative artificial intelligence methods for automating energy theft detection and stress levels are first detailed, followed by an examination of contextual security threats and privacy breach concerns. An artificial immune system is employed to mitigate the risk of malware attacks, differential privacy is proposed for data protection, and federated learning is harnessed to reduce data exposure.
{"title":"Security Threats and Promising Solutions Arising from the Intersection of AI and IoT: A Study of IoMT and IoET Applications","authors":"Hadeel Alrubayyi, Moudy Sharaf Alshareef, Zunaira Nadeem, A. Abdelmoniem, Mona Jaber","doi":"10.3390/fi16030085","DOIUrl":"https://doi.org/10.3390/fi16030085","url":null,"abstract":"The hype of the Internet of Things as an enabler for intelligent applications and related promise for ushering accessibility, efficiency, and quality of service is met with hindering security and data privacy concerns. It follows that such IoT systems, which are empowered by artificial intelligence, need to be investigated with cognisance of security threats and mitigation schemes that are tailored to their specific constraints and requirements. In this work, we present a comprehensive review of security threats in IoT and emerging countermeasures with a particular focus on malware and man-in-the-middle attacks. Next, we elaborate on two use cases: the Internet of Energy Things and the Internet of Medical Things. Innovative artificial intelligence methods for automating energy theft detection and stress levels are first detailed, followed by an examination of contextual security threats and privacy breach concerns. An artificial immune system is employed to mitigate the risk of malware attacks, differential privacy is proposed for data protection, and federated learning is harnessed to reduce data exposure.","PeriodicalId":509567,"journal":{"name":"Future Internet","volume":"37 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140415851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}