首页 > 最新文献

Journal of High Speed Networks最新文献

英文 中文
A lightweight IoT firmware vulnerability detection scheme based on homology detection 一种基于同源性检测的轻量级物联网固件漏洞检测方案
IF 0.9 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-11-03 DOI: 10.3233/jhs-222027
Donglan Liu, Haotong Zhang, Rui Wang, Fang Zhang, Lili Sun, Xin Liu, L. Ma
In recent years, with the rapid development of IoT technology, hundreds of millions of IoT devices have been manufactured and applied, and the subsequent IoT attacks have become more and more severe. The complex and diverse architecture of IoT devices, coupled with the lack of security development specifications by IoT device manufacturers, and the widespread misuse and abuse of code, lead to the proliferation of IoT vulnerabilities. The conventional IoT vulnerability detection scheme is expensive to operate, and the implementation technology is complex, which is difficult to be fully promoted. This paper proposes a lightweight IoT firmware vulnerability detection scheme based on homology detection. The processing is converted into a feature vector, which effectively reduces the platform dependence. Combined with the database technology, the storage and retrieval efficiency is increased, and the same-origin vulnerability detection is realized by calculating the cosine similarity of the vector. The experimental results show that this scheme can effectively identify the vulnerabilities in firmware.
近年来,随着物联网技术的飞速发展,数以亿计的物联网设备被制造和应用,随之而来的物联网攻击也越来越严重。物联网设备复杂多样的架构,加上物联网设备制造商缺乏安全开发规范,以及代码的普遍误用和滥用,导致物联网漏洞泛滥。传统的物联网漏洞检测方案操作成本高,实施技术复杂,难以全面推广。提出了一种基于同源性检测的轻量级物联网固件漏洞检测方案。将处理过程转化为特征向量,有效降低了平台依赖性。结合数据库技术,提高了存储检索效率,并通过计算向量的余弦相似度实现同源漏洞检测。实验结果表明,该方案能够有效地识别固件中的漏洞。
{"title":"A lightweight IoT firmware vulnerability detection scheme based on homology detection","authors":"Donglan Liu, Haotong Zhang, Rui Wang, Fang Zhang, Lili Sun, Xin Liu, L. Ma","doi":"10.3233/jhs-222027","DOIUrl":"https://doi.org/10.3233/jhs-222027","url":null,"abstract":"In recent years, with the rapid development of IoT technology, hundreds of millions of IoT devices have been manufactured and applied, and the subsequent IoT attacks have become more and more severe. The complex and diverse architecture of IoT devices, coupled with the lack of security development specifications by IoT device manufacturers, and the widespread misuse and abuse of code, lead to the proliferation of IoT vulnerabilities. The conventional IoT vulnerability detection scheme is expensive to operate, and the implementation technology is complex, which is difficult to be fully promoted. This paper proposes a lightweight IoT firmware vulnerability detection scheme based on homology detection. The processing is converted into a feature vector, which effectively reduces the platform dependence. Combined with the database technology, the storage and retrieval efficiency is increased, and the same-origin vulnerability detection is realized by calculating the cosine similarity of the vector. The experimental results show that this scheme can effectively identify the vulnerabilities in firmware.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"48 1","pages":"287-297"},"PeriodicalIF":0.9,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77284251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved energy-efficient routing architecture for traffic management system using a hybrid meta-heuristic algorithm in Internet of vehicles 基于混合元启发式算法的车联网交通管理系统节能路由结构改进
IF 0.9 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-11-03 DOI: 10.3233/jhs-222003
Xiao-qiang Shao
Today, Internet of Vehicles (IoV) applications communicate with smart devices and deploy Intelligent Transportation Systems (ITS) to recognize traffic congestion problems. One of the main challenges of smart cities and IoV platforms is data routing methods for smart traffic congestion problems to navigate the individual information of data transmission as a critical issue in the ITS. Providing a way to extend the Quality of Service (QoS) variables and energy efficiency methods for directing data transmission in routing-based traffic management systems within the IoV environment is an important issue since the energy consumption of IoV devices is a critical issue in low-power saving storage. This paper presents a hybrid Genetic Algorithm and Social Spider Optimization (GA-SSO) algorithm for an energy-aware routing schema for optimizing traffic congestion and smart devices in the IoV environment. After conducting some studies and comparisons, the exactness and prevalence of the proposed schema were received. Experimental results confirmed that the GA-SSO algorithm calculation decides optimal and ideal arrangement for energy-aware routing schema demonstrate by essentially making strides the execution of QoS variables can oversee information blockage comes from data transmission between IoV nodes.
如今,车联网(IoV)应用与智能设备通信,并部署智能交通系统(ITS)来识别交通拥堵问题。智能城市和物联网平台面临的主要挑战之一是智能交通拥堵问题的数据路由方法,以导航数据传输的单个信息,这是ITS的关键问题。提供一种方法来扩展服务质量(QoS)变量和能效方法,以指导基于路由的流量管理系统在物联网环境中的数据传输,这是一个重要的问题,因为物联网设备的能耗是低功耗存储的关键问题。本文提出了一种混合遗传算法和社交蜘蛛优化(GA-SSO)算法,用于优化车联网环境下的交通拥堵和智能设备的能量感知路由模式。在进行了一些研究和比较之后,我们接受了所提出的图式的准确性和普遍性。实验结果证实,GA-SSO算法的计算决定了能量感知路由模式的最优和理想安排,从本质上证明了QoS变量的执行可以监督车联网节点之间数据传输带来的信息阻塞。
{"title":"Improved energy-efficient routing architecture for traffic management system using a hybrid meta-heuristic algorithm in Internet of vehicles","authors":"Xiao-qiang Shao","doi":"10.3233/jhs-222003","DOIUrl":"https://doi.org/10.3233/jhs-222003","url":null,"abstract":"Today, Internet of Vehicles (IoV) applications communicate with smart devices and deploy Intelligent Transportation Systems (ITS) to recognize traffic congestion problems. One of the main challenges of smart cities and IoV platforms is data routing methods for smart traffic congestion problems to navigate the individual information of data transmission as a critical issue in the ITS. Providing a way to extend the Quality of Service (QoS) variables and energy efficiency methods for directing data transmission in routing-based traffic management systems within the IoV environment is an important issue since the energy consumption of IoV devices is a critical issue in low-power saving storage. This paper presents a hybrid Genetic Algorithm and Social Spider Optimization (GA-SSO) algorithm for an energy-aware routing schema for optimizing traffic congestion and smart devices in the IoV environment. After conducting some studies and comparisons, the exactness and prevalence of the proposed schema were received. Experimental results confirmed that the GA-SSO algorithm calculation decides optimal and ideal arrangement for energy-aware routing schema demonstrate by essentially making strides the execution of QoS variables can oversee information blockage comes from data transmission between IoV nodes.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"70 1","pages":"299-308"},"PeriodicalIF":0.9,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74344629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mutual clustered redundancy assisted feature selection for an intrusion detection system 相互聚类冗余辅助入侵检测系统特征选择
IF 0.9 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-08-16 DOI: 10.3233/jhs-220694
T. Veeranna, K. Reddi
Intrusion Detection is very important in computer networks because the widespread of internet makes the computers more prone to several cyber-attacks. With this inspiration, a new paradigm called Intrusion Detection System (IDS) has emerged and attained a huge research interest. However, the major challenge in IDS is the presence of redundant and duplicate information that causes a serious computational problem in network traffic classifications. To solve this problem, in this paper, we propose a novel IDS model based on statistical processing techniques and machine learning algorithms. The machine learning algorithms incudes Fuzzy C-means and Support Vector Machine while the statistical processing techniques includes correlation and Joint Entropy. The main purpose of FCM is to cluster the train data and SVM is to classify the traffic connections. Next, the main purpose of correlation is to discover and remove the duplicate connections from every cluster while the Joint entropy is applied for the discovery and removal of duplicate features from every connection. For experimental validation, totally three standard datasets namely KDD Cup 99, NSL-KDD and Kyoto2006+ are considered and the performance is measured through Detection Rate, Precision, F-Score, and accuracy. A five-fold cross validation is done on every dataset by changing the traffic and the obtained average performance is compared with existing methods.
入侵检测在计算机网络中非常重要,因为互联网的普及使计算机更容易受到各种网络攻击。受此启发,一种新的入侵检测系统(IDS)范式应运而生,并引起了广泛的研究兴趣。然而,IDS的主要挑战是冗余和重复信息的存在,这会在网络流量分类中导致严重的计算问题。为了解决这一问题,本文提出了一种基于统计处理技术和机器学习算法的IDS模型。机器学习算法包括模糊c均值和支持向量机,统计处理技术包括相关性和联合熵。FCM的主要目的是对列车数据进行聚类,而SVM的主要目的是对交通连接进行分类。其次,相关性的主要目的是发现和删除每个集群中的重复连接,而联合熵用于发现和删除每个连接中的重复特征。为了进行实验验证,共考虑了KDD Cup 99、NSL-KDD和Kyoto2006+三个标准数据集,并通过Detection Rate、Precision、F-Score和accuracy来衡量性能。通过改变流量对每个数据集进行五次交叉验证,并将得到的平均性能与现有方法进行比较。
{"title":"Mutual clustered redundancy assisted feature selection for an intrusion detection system","authors":"T. Veeranna, K. Reddi","doi":"10.3233/jhs-220694","DOIUrl":"https://doi.org/10.3233/jhs-220694","url":null,"abstract":"Intrusion Detection is very important in computer networks because the widespread of internet makes the computers more prone to several cyber-attacks. With this inspiration, a new paradigm called Intrusion Detection System (IDS) has emerged and attained a huge research interest. However, the major challenge in IDS is the presence of redundant and duplicate information that causes a serious computational problem in network traffic classifications. To solve this problem, in this paper, we propose a novel IDS model based on statistical processing techniques and machine learning algorithms. The machine learning algorithms incudes Fuzzy C-means and Support Vector Machine while the statistical processing techniques includes correlation and Joint Entropy. The main purpose of FCM is to cluster the train data and SVM is to classify the traffic connections. Next, the main purpose of correlation is to discover and remove the duplicate connections from every cluster while the Joint entropy is applied for the discovery and removal of duplicate features from every connection. For experimental validation, totally three standard datasets namely KDD Cup 99, NSL-KDD and Kyoto2006+ are considered and the performance is measured through Detection Rate, Precision, F-Score, and accuracy. A five-fold cross validation is done on every dataset by changing the traffic and the obtained average performance is compared with existing methods.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"504 1","pages":"257-273"},"PeriodicalIF":0.9,"publicationDate":"2022-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83516387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation and evaluation of a fuzzy-based system for determining stress feeling level in VANETs: Effect of driving experience and history on driver stress 基于模糊的压力感觉水平确定系统的实现与评价:驾驶经验和历史对驾驶员压力的影响
IF 0.9 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-08-11 DOI: 10.3233/jhs-220693
Kevin Bylykbashi, Ermioni Qafzezi, Phudit Ampririt, Makoto Ikeda, Keita Matsuo, L. Barolli
Drivers are held responsible for the vast majority of traffic accidents. While most of the errors that cause these accidents are involuntary, a significant number of them are caused by irresponsible driving behaviors, which must be utterly preventable. Irresponsible driving, in addition, is often associated with the stress drivers experience while driving. We have previously implemented an intelligent system based on fuzzy logic for determining driver’s stress in Vehicular Ad hoc Networks (VANETs), called Fuzzy-based System for Determining the Stress Feeling Level (FSDSFL), considering the driver’s impatience, the behavior of other drivers, and the traffic condition as input parameters. In this work, we present an Improved FSDSFL (IFSDSFL) system, which considers the driving experience and history as an additional input. We show through simulations the effect that driving experience and history and the other parameters have on the determination of the stress feeling level and demonstrate some actions that can be performed when the stress exceeds certain levels.
司机应为绝大多数交通事故负责。虽然导致这些事故的大多数错误都是无意识的,但其中很大一部分是由不负责任的驾驶行为造成的,这是完全可以预防的。此外,不负责任的驾驶往往与司机在驾驶时感受到的压力有关。我们之前已经实现了一个基于模糊逻辑的智能系统,用于在车辆自组织网络(VANETs)中确定驾驶员的压力,称为基于模糊的压力感觉水平确定系统(FSDSFL),考虑驾驶员的不耐烦,其他驾驶员的行为以及交通状况作为输入参数。在这项工作中,我们提出了一种改进的FSDSFL (IFSDSFL)系统,该系统将驾驶经验和历史作为额外的输入。我们通过模拟展示了驾驶经验和历史以及其他参数对确定压力感觉水平的影响,并演示了当压力超过一定水平时可以执行的一些操作。
{"title":"Implementation and evaluation of a fuzzy-based system for determining stress feeling level in VANETs: Effect of driving experience and history on driver stress","authors":"Kevin Bylykbashi, Ermioni Qafzezi, Phudit Ampririt, Makoto Ikeda, Keita Matsuo, L. Barolli","doi":"10.3233/jhs-220693","DOIUrl":"https://doi.org/10.3233/jhs-220693","url":null,"abstract":"Drivers are held responsible for the vast majority of traffic accidents. While most of the errors that cause these accidents are involuntary, a significant number of them are caused by irresponsible driving behaviors, which must be utterly preventable. Irresponsible driving, in addition, is often associated with the stress drivers experience while driving. We have previously implemented an intelligent system based on fuzzy logic for determining driver’s stress in Vehicular Ad hoc Networks (VANETs), called Fuzzy-based System for Determining the Stress Feeling Level (FSDSFL), considering the driver’s impatience, the behavior of other drivers, and the traffic condition as input parameters. In this work, we present an Improved FSDSFL (IFSDSFL) system, which considers the driving experience and history as an additional input. We show through simulations the effect that driving experience and history and the other parameters have on the determination of the stress feeling level and demonstrate some actions that can be performed when the stress exceeds certain levels.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"1 1","pages":"243-255"},"PeriodicalIF":0.9,"publicationDate":"2022-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76843698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of ultra-long-distance optical transport networks based on high-order remotely pumped amplifier 基于高阶远程泵浦放大器的超长距离光传输网络设计
IF 0.9 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-07-29 DOI: 10.3233/jhs-220688
R. Chi, Lei Li, Sang Gui, Fei Wang, Zijian Mao, Xiaohan Sun, Ning Cao
In order to further increase the span length of the Optical Transport Network (OTN) transmission system, a combination of Raman amplifier and remotely optical pumped amplifier (ROPA) configuration scheme is recommended. Optimal EDF length, optimal ROPA position and OTN span limitation are obtained through simulations. A field-trial with 8*10 Gb/s in 380 km span system is carried out with the amplifier configuration of Raman amplifier plus first-order and second-order remotely pumped amplifier. By adding a second-order remote pump laser, the transmission limit is increased from 77.5 dB to 80.7 dB. Through detailed analysis of the system, it is concluded that the second-order remote pump can effectively transfer the pump power to the first-order remote pump wavelength, which greatly increases the pump power at the gain module, thereby increasing the gain of the RGU and reduce its noise. Moreover, the introduction of the second-order remote pump effectively weakened the self-excited effect and overcomes the shortcomings of the low pump power threshold of the first-order remote pump.
为了进一步增加OTN传输系统的跨长,建议采用拉曼放大器与远程光泵浦放大器(ROPA)相结合的配置方案。通过仿真得到了最优EDF长度、最优ROPA位置和OTN跨度限制。采用拉曼放大器+一阶和二阶远程泵浦放大器的放大器配置,在380 km的系统中进行了8* 10gb /s的现场试验。通过增加二阶远端泵浦激光器,将传输极限从77.5 dB提高到80.7 dB。通过对系统的详细分析,得出二阶远程泵浦可以有效地将泵浦功率传递到一阶远程泵浦波长,从而大大增加增益模块处的泵浦功率,从而提高RGU的增益并降低其噪声。此外,二阶远程泵的引入有效地削弱了自激效应,克服了一阶远程泵泵功率阈值低的缺点。
{"title":"Design of ultra-long-distance optical transport networks based on high-order remotely pumped amplifier","authors":"R. Chi, Lei Li, Sang Gui, Fei Wang, Zijian Mao, Xiaohan Sun, Ning Cao","doi":"10.3233/jhs-220688","DOIUrl":"https://doi.org/10.3233/jhs-220688","url":null,"abstract":"In order to further increase the span length of the Optical Transport Network (OTN) transmission system, a combination of Raman amplifier and remotely optical pumped amplifier (ROPA) configuration scheme is recommended. Optimal EDF length, optimal ROPA position and OTN span limitation are obtained through simulations. A field-trial with 8*10 Gb/s in 380 km span system is carried out with the amplifier configuration of Raman amplifier plus first-order and second-order remotely pumped amplifier. By adding a second-order remote pump laser, the transmission limit is increased from 77.5 dB to 80.7 dB. Through detailed analysis of the system, it is concluded that the second-order remote pump can effectively transfer the pump power to the first-order remote pump wavelength, which greatly increases the pump power at the gain module, thereby increasing the gain of the RGU and reduce its noise. Moreover, the introduction of the second-order remote pump effectively weakened the self-excited effect and overcomes the shortcomings of the low pump power threshold of the first-order remote pump.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"125 1","pages":"157-165"},"PeriodicalIF":0.9,"publicationDate":"2022-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78465500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An energy-efficient quorum-based locking protocol by omitting meaningless methods on object replicas 一种节能的基于群体的锁定协议,在对象副本上省略了无意义的方法
IF 0.9 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-07-25 DOI: 10.3233/jhs-220690
T. Enokido, Dilawaer Duolikun, M. Takizawa
In current information systems, a huge number of IoT (Internet of Things) devices are interconnected with various kinds of networks like WiFi and 5G networks. A large volume of data is gathered into servers from a huge number of IoT devices and is manipulated to provide application services. Gathered data is encapsulated along with methods to manipulate the data as an object like a database system. In object-based systems, each application is composed of multiple objects. In addition, each object is replicated on multiple physical servers in order to increase availability, reliability, and performance of an application service. On the other hand, replicas of each object is required to be mutually consistent in presence of multiple transactions. Here, a larger amount of electric energy and computation resources are consumed in physical servers than non-replication approaches to serialize conflicting transactions on multiple replicas. Many algorithms to synchronize conflicting transactions are so far proposed like 2PL (Two-Phase Locking) and TO (Timestamp Ordering). However, the electric energy consumption is not considered. In this paper, an EEQBL-OMM (Energy-Efficient Quorum-Based Locking with Omitting Meaningless Method) protocol is newly proposed to reduce not only the average execution time of each transaction but also the total electric energy consumption of servers by omitting the execution of meaningless methods on replicas of each object. Evaluation results show the total electric energy consumption of servers, the average execution time of each transaction, and the number of aborted instances of transactions in the EEQBL-OMM protocol can be on average reduced to 79%, 62%, and 80% of the ECLBQS (Energy Consumption Laxity-Based Quorum Selection) protocol which is proposed in our previous studies in a homogeneous set of servers, respectively. In addition, the evaluation results show the total electric energy consumption of servers, the average execution time of each transaction, and the number of aborted instances of transactions in the EEQBL-OMM protocol can be on average reduced to 73%, 50%, and 67% of the ECLBQS protocol in a heterogeneous set of servers, respectively. The evaluation results also show at most 48% and 51% of the total number of methods can be omitted as meaningless methods in a homogeneous set and heterogeneous set of servers, respectively, in the EEQBL-OMM protocol.
在当前的信息系统中,大量的物联网设备与各种网络互联,如WiFi和5G网络。大量数据从大量物联网设备中收集到服务器中,并被操纵以提供应用服务。收集到的数据连同操作数据的方法一起被封装为一个对象,就像数据库系统一样。在基于对象的系统中,每个应用程序由多个对象组成。此外,每个对象在多个物理服务器上进行复制,以提高应用程序服务的可用性、可靠性和性能。另一方面,在存在多个事务的情况下,每个对象的副本需要相互一致。在这里,与非复制方法相比,在物理服务器中消耗更多的电能和计算资源来序列化多个副本上的冲突事务。目前提出了许多同步冲突事务的算法,如2PL(两阶段锁定)和to(时间戳排序)。但是,没有考虑电能消耗。本文提出了一种EEQBL-OMM (efficient Quorum-Based Locking with省去无意义方法)协议,该协议不仅减少了每个事务的平均执行时间,而且通过在每个对象的副本上省去无意义方法的执行,减少了服务器的总电能消耗。评估结果显示,EEQBL-OMM协议中服务器的总电能消耗、每个事务的平均执行时间和事务终止实例的数量平均可以分别减少到我们之前在同质服务器集研究中提出的ECLBQS (energy consumption Laxity-Based Quorum Selection)协议的79%、62%和80%。此外,评估结果显示,在异构服务器集中,EEQBL-OMM协议的服务器总电能消耗、每个事务的平均执行时间和事务中止实例的数量可以分别平均降低到ECLBQS协议的73%、50%和67%。评估结果还显示,在EEQBL-OMM协议中,在同构服务器集和异构服务器集中,最多有48%和51%的方法可以作为无意义的方法被省略。
{"title":"An energy-efficient quorum-based locking protocol by omitting meaningless methods on object replicas","authors":"T. Enokido, Dilawaer Duolikun, M. Takizawa","doi":"10.3233/jhs-220690","DOIUrl":"https://doi.org/10.3233/jhs-220690","url":null,"abstract":"In current information systems, a huge number of IoT (Internet of Things) devices are interconnected with various kinds of networks like WiFi and 5G networks. A large volume of data is gathered into servers from a huge number of IoT devices and is manipulated to provide application services. Gathered data is encapsulated along with methods to manipulate the data as an object like a database system. In object-based systems, each application is composed of multiple objects. In addition, each object is replicated on multiple physical servers in order to increase availability, reliability, and performance of an application service. On the other hand, replicas of each object is required to be mutually consistent in presence of multiple transactions. Here, a larger amount of electric energy and computation resources are consumed in physical servers than non-replication approaches to serialize conflicting transactions on multiple replicas. Many algorithms to synchronize conflicting transactions are so far proposed like 2PL (Two-Phase Locking) and TO (Timestamp Ordering). However, the electric energy consumption is not considered. In this paper, an EEQBL-OMM (Energy-Efficient Quorum-Based Locking with Omitting Meaningless Method) protocol is newly proposed to reduce not only the average execution time of each transaction but also the total electric energy consumption of servers by omitting the execution of meaningless methods on replicas of each object. Evaluation results show the total electric energy consumption of servers, the average execution time of each transaction, and the number of aborted instances of transactions in the EEQBL-OMM protocol can be on average reduced to 79%, 62%, and 80% of the ECLBQS (Energy Consumption Laxity-Based Quorum Selection) protocol which is proposed in our previous studies in a homogeneous set of servers, respectively. In addition, the evaluation results show the total electric energy consumption of servers, the average execution time of each transaction, and the number of aborted instances of transactions in the EEQBL-OMM protocol can be on average reduced to 73%, 50%, and 67% of the ECLBQS protocol in a heterogeneous set of servers, respectively. The evaluation results also show at most 48% and 51% of the total number of methods can be omitted as meaningless methods in a homogeneous set and heterogeneous set of servers, respectively, in the EEQBL-OMM protocol.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"60 1","pages":"181-203"},"PeriodicalIF":0.9,"publicationDate":"2022-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84873070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cross-layer greedy forwarding algorithm for VANET VANET的跨层贪婪转发算法
IF 0.9 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-07-25 DOI: 10.3233/jhs-220689
Yassine Hammouche, S. Merniz
In recent years, vehicular communication systems have taken an important place in Intelligent Transport Systems (ITS). These systems are designed on self-organizing networks, known as Vehicular Ad hoc NETworks (VANETs). Their objective is to struggle against road safety problems and road traffic congestion by integrating information and communication technologies in road infrastructures and vehicles. VANET differs from other types of ad hoc networks by high mobility and very dynamic topology. Consequently, the design of an efficient VANET routing protocol becomes a challenging task. Many routing schemes with QoS (Quality of Service) have been proposed in the literature for VANET, to satisfy the performances required by the different applications running upon such networks. Cross-layer designs, which make it possible to exchange and share information between the different layers of the network, have shown to be efficient in VANETs. This paper proposes an improved version of the geographic Greedy algorithm as a cross-layer routing protocol for VANETs. The cooperation between the network layer and the lower layers involves three cyber-physical parameters: Speed, position and Signal-to-Noise Ratio (SNR). The simulation results over the Network Simulator-3 (NS3) demonstrated the effectiveness of the proposed solution in terms of end-to-end delay, throughput and packet delivery ratio.
近年来,车载通信系统在智能交通系统(ITS)中占有重要地位。这些系统是在自组织网络上设计的,称为车辆自组织网络(VANETs)。其目标是通过将信息和通信技术纳入道路基础设施和车辆,努力解决道路安全问题和道路交通拥挤问题。VANET与其他类型的自组织网络的不同之处在于高移动性和非常动态的拓扑结构。因此,设计一种高效的VANET路由协议成为一项具有挑战性的任务。为了满足运行在VANET网络上的不同应用对性能的要求,文献中已经提出了许多具有QoS(服务质量)的路由方案。跨层设计使得在网络的不同层之间交换和共享信息成为可能,在VANETs中被证明是有效的。本文提出了一种改进版本的地理贪婪算法作为VANETs的跨层路由协议。网络层与下层之间的协作涉及三个网络物理参数:速度、位置和信噪比。在Network Simulator-3 (NS3)上的仿真结果证明了该方案在端到端延迟、吞吐量和分组传输比方面的有效性。
{"title":"Cross-layer greedy forwarding algorithm for VANET","authors":"Yassine Hammouche, S. Merniz","doi":"10.3233/jhs-220689","DOIUrl":"https://doi.org/10.3233/jhs-220689","url":null,"abstract":"In recent years, vehicular communication systems have taken an important place in Intelligent Transport Systems (ITS). These systems are designed on self-organizing networks, known as Vehicular Ad hoc NETworks (VANETs). Their objective is to struggle against road safety problems and road traffic congestion by integrating information and communication technologies in road infrastructures and vehicles. VANET differs from other types of ad hoc networks by high mobility and very dynamic topology. Consequently, the design of an efficient VANET routing protocol becomes a challenging task. Many routing schemes with QoS (Quality of Service) have been proposed in the literature for VANET, to satisfy the performances required by the different applications running upon such networks. Cross-layer designs, which make it possible to exchange and share information between the different layers of the network, have shown to be efficient in VANETs. This paper proposes an improved version of the geographic Greedy algorithm as a cross-layer routing protocol for VANETs. The cooperation between the network layer and the lower layers involves three cyber-physical parameters: Speed, position and Signal-to-Noise Ratio (SNR). The simulation results over the Network Simulator-3 (NS3) demonstrated the effectiveness of the proposed solution in terms of end-to-end delay, throughput and packet delivery ratio.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"30 1","pages":"167-179"},"PeriodicalIF":0.9,"publicationDate":"2022-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76359455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Computing resource allocation scheme based on edge computing under augmented reality application 增强现实应用下基于边缘计算的计算资源分配方案
IF 0.9 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-07-25 DOI: 10.3233/jhs-220687
Yuxia Yuan, Zengyong Xu
Edge computing can place computing, storage, bandwidth, application and other resources on the edge of the network to reduce transmission delay, and bandwidth limitation for users. Therefore, task scheduling and resource allocation in edge computing have become a new research focus. In view of the dynamic nature of computing resources in edge computing and the computing power limitation of a single computing resource, this paper proposes a computing resource allocation scheme based on edge computing under augmented reality (AR) application. On the premise of ensuring the completion time of sub-tasks and the revenue of computing service devices, the method transforms the computing resource allocation problem in edge computing into the many-to-many matching problem between sub-tasks and computing service devices. The performance of the proposed scheme is analyzed through experiments, and the results show that the resource allocation time is relatively stable, and it is better than other state-of-the-art algorithms in terms of the edge calculation, task delay, and task violation rate.
边缘计算可以将计算、存储、带宽、应用等资源放在网络的边缘,为用户减少传输延迟和带宽限制。因此,边缘计算中的任务调度和资源分配成为新的研究热点。针对边缘计算中计算资源的动态性和单个计算资源计算能力的局限性,提出了一种增强现实(AR)应用下基于边缘计算的计算资源分配方案。该方法在保证子任务完成时间和计算服务设备收益的前提下,将边缘计算中的计算资源分配问题转化为子任务与计算服务设备之间的多对多匹配问题。通过实验对该方案的性能进行了分析,结果表明,该方案的资源分配时间相对稳定,并且在边缘计算、任务延迟和任务违反率方面都优于其他先进算法。
{"title":"Computing resource allocation scheme based on edge computing under augmented reality application","authors":"Yuxia Yuan, Zengyong Xu","doi":"10.3233/jhs-220687","DOIUrl":"https://doi.org/10.3233/jhs-220687","url":null,"abstract":"Edge computing can place computing, storage, bandwidth, application and other resources on the edge of the network to reduce transmission delay, and bandwidth limitation for users. Therefore, task scheduling and resource allocation in edge computing have become a new research focus. In view of the dynamic nature of computing resources in edge computing and the computing power limitation of a single computing resource, this paper proposes a computing resource allocation scheme based on edge computing under augmented reality (AR) application. On the premise of ensuring the completion time of sub-tasks and the revenue of computing service devices, the method transforms the computing resource allocation problem in edge computing into the many-to-many matching problem between sub-tasks and computing service devices. The performance of the proposed scheme is analyzed through experiments, and the results show that the resource allocation time is relatively stable, and it is better than other state-of-the-art algorithms in terms of the edge calculation, task delay, and task violation rate.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"10 1","pages":"143-156"},"PeriodicalIF":0.9,"publicationDate":"2022-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88125665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Intrusion detection model based on coordinative immune and random antibody forest 基于协调免疫和随机抗体森林的入侵检测模型
IF 0.9 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-07-22 DOI: 10.3233/jhs-220691
Ling Zhang, Jian-Wei Zhang, X. Xin, Kai-Lai Zhou
This study aimed to deal with the problems that current intrusion detections have poor classification ability toward small sets of samples. A new intrusion detection model based on coordinative immune and random antibody forest (CIRAFID) is proposed. The vaccination mechanism of coordinative immune algorithm is designed to increase the fitness of poor antibodies, a kind of random antibody detection forest model is given to detect anomalies, and to classify attacks. The experimental results show: the proposed model has higher detection rate, classification accuracy, classification ability and lower false positives rate.
本研究旨在解决当前入侵检测对小样本集分类能力差的问题。提出了一种新的基于协调免疫和随机抗体森林(CIRAFID)的入侵检测模型。设计了协调免疫算法的接种机制,提高了不良抗体的适应度,给出了一种随机抗体检测森林模型,用于检测异常,并对攻击进行分类。实验结果表明:该模型具有较高的检测率、分类精度、分类能力和较低的误报率。
{"title":"Intrusion detection model based on coordinative immune and random antibody forest","authors":"Ling Zhang, Jian-Wei Zhang, X. Xin, Kai-Lai Zhou","doi":"10.3233/jhs-220691","DOIUrl":"https://doi.org/10.3233/jhs-220691","url":null,"abstract":"This study aimed to deal with the problems that current intrusion detections have poor classification ability toward small sets of samples. A new intrusion detection model based on coordinative immune and random antibody forest (CIRAFID) is proposed. The vaccination mechanism of coordinative immune algorithm is designed to increase the fitness of poor antibodies, a kind of random antibody detection forest model is given to detect anomalies, and to classify attacks. The experimental results show: the proposed model has higher detection rate, classification accuracy, classification ability and lower false positives rate.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"4 1","pages":"205-220"},"PeriodicalIF":0.9,"publicationDate":"2022-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84443424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Artificial intelligence mechanisms for management of QoS-aware connectivity in Internet of vehicles 车联网qos感知连接管理的人工智能机制
IF 0.9 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-07-22 DOI: 10.3233/jhs-220692
Alireza Souri
Today, Internet of Things (IoT) has provided intelligent interactions between sensors, smart devices, actuators, and cloud-based applications to ease human life. Currently, IoT-based connectivity management systems use computer-assisted learning methods to increase learning level and better understanding of the curriculums for students in universities, schools and research centers. On the other hand, virtual connectivity management systems are applied to facilitate teaching and learning methods under taken of pandemic effects. Because, data mining methods have important effect to enhancement and navigate IoT-based connectivity management systems, this paper presents a technical analysis on Artificial Intelligence (AI) approaches for connectivity management systems in IoT environments. This paper provides a comprehensive perspective on vehicular communication systems, Internet of Vehicles (IoV) methods and Vehicular Ad Hoc Network (VANET) environments that have evaluated using machine learning, fuzzy logic and intelligent algorithms. Also, applied evaluation metrics to predict and detect efficient connectivity methods, succeed learning models and enhancement of IoT-based connectivity management systems are discussed and analyzed for existing AI approaches. Finally, new research directions and emerging challenges are outlined to improve the performance of advanced IoT-based connectivity management systems.
如今,物联网(IoT)提供了传感器、智能设备、执行器和基于云的应用程序之间的智能交互,以缓解人类的生活。目前,基于物联网的连接管理系统使用计算机辅助学习方法来提高大学、学校和研究中心学生的学习水平和更好地理解课程。另一方面,应用虚拟连接管理系统,以促进在大流行影响下的教学方法。由于数据挖掘方法对增强和导航基于物联网的连接管理系统具有重要作用,本文对物联网环境下连接管理系统的人工智能(AI)方法进行了技术分析。本文提供了车辆通信系统,车辆互联网(IoV)方法和车辆自组织网络(VANET)环境的综合视角,这些环境使用机器学习,模糊逻辑和智能算法进行评估。此外,应用评估指标来预测和检测有效的连接方法,成功的学习模型和基于物联网的连接管理系统的增强,讨论和分析了现有的人工智能方法。最后,概述了新的研究方向和新挑战,以提高先进的基于物联网的连接管理系统的性能。
{"title":"Artificial intelligence mechanisms for management of QoS-aware connectivity in Internet of vehicles","authors":"Alireza Souri","doi":"10.3233/jhs-220692","DOIUrl":"https://doi.org/10.3233/jhs-220692","url":null,"abstract":"Today, Internet of Things (IoT) has provided intelligent interactions between sensors, smart devices, actuators, and cloud-based applications to ease human life. Currently, IoT-based connectivity management systems use computer-assisted learning methods to increase learning level and better understanding of the curriculums for students in universities, schools and research centers. On the other hand, virtual connectivity management systems are applied to facilitate teaching and learning methods under taken of pandemic effects. Because, data mining methods have important effect to enhancement and navigate IoT-based connectivity management systems, this paper presents a technical analysis on Artificial Intelligence (AI) approaches for connectivity management systems in IoT environments. This paper provides a comprehensive perspective on vehicular communication systems, Internet of Vehicles (IoV) methods and Vehicular Ad Hoc Network (VANET) environments that have evaluated using machine learning, fuzzy logic and intelligent algorithms. Also, applied evaluation metrics to predict and detect efficient connectivity methods, succeed learning models and enhancement of IoT-based connectivity management systems are discussed and analyzed for existing AI approaches. Finally, new research directions and emerging challenges are outlined to improve the performance of advanced IoT-based connectivity management systems.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"40 1","pages":"221-230"},"PeriodicalIF":0.9,"publicationDate":"2022-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85310318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
Journal of High Speed Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1