Donglan Liu, Haotong Zhang, Rui Wang, Fang Zhang, Lili Sun, Xin Liu, L. Ma
In recent years, with the rapid development of IoT technology, hundreds of millions of IoT devices have been manufactured and applied, and the subsequent IoT attacks have become more and more severe. The complex and diverse architecture of IoT devices, coupled with the lack of security development specifications by IoT device manufacturers, and the widespread misuse and abuse of code, lead to the proliferation of IoT vulnerabilities. The conventional IoT vulnerability detection scheme is expensive to operate, and the implementation technology is complex, which is difficult to be fully promoted. This paper proposes a lightweight IoT firmware vulnerability detection scheme based on homology detection. The processing is converted into a feature vector, which effectively reduces the platform dependence. Combined with the database technology, the storage and retrieval efficiency is increased, and the same-origin vulnerability detection is realized by calculating the cosine similarity of the vector. The experimental results show that this scheme can effectively identify the vulnerabilities in firmware.
{"title":"A lightweight IoT firmware vulnerability detection scheme based on homology detection","authors":"Donglan Liu, Haotong Zhang, Rui Wang, Fang Zhang, Lili Sun, Xin Liu, L. Ma","doi":"10.3233/jhs-222027","DOIUrl":"https://doi.org/10.3233/jhs-222027","url":null,"abstract":"In recent years, with the rapid development of IoT technology, hundreds of millions of IoT devices have been manufactured and applied, and the subsequent IoT attacks have become more and more severe. The complex and diverse architecture of IoT devices, coupled with the lack of security development specifications by IoT device manufacturers, and the widespread misuse and abuse of code, lead to the proliferation of IoT vulnerabilities. The conventional IoT vulnerability detection scheme is expensive to operate, and the implementation technology is complex, which is difficult to be fully promoted. This paper proposes a lightweight IoT firmware vulnerability detection scheme based on homology detection. The processing is converted into a feature vector, which effectively reduces the platform dependence. Combined with the database technology, the storage and retrieval efficiency is increased, and the same-origin vulnerability detection is realized by calculating the cosine similarity of the vector. The experimental results show that this scheme can effectively identify the vulnerabilities in firmware.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"48 1","pages":"287-297"},"PeriodicalIF":0.9,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77284251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Today, Internet of Vehicles (IoV) applications communicate with smart devices and deploy Intelligent Transportation Systems (ITS) to recognize traffic congestion problems. One of the main challenges of smart cities and IoV platforms is data routing methods for smart traffic congestion problems to navigate the individual information of data transmission as a critical issue in the ITS. Providing a way to extend the Quality of Service (QoS) variables and energy efficiency methods for directing data transmission in routing-based traffic management systems within the IoV environment is an important issue since the energy consumption of IoV devices is a critical issue in low-power saving storage. This paper presents a hybrid Genetic Algorithm and Social Spider Optimization (GA-SSO) algorithm for an energy-aware routing schema for optimizing traffic congestion and smart devices in the IoV environment. After conducting some studies and comparisons, the exactness and prevalence of the proposed schema were received. Experimental results confirmed that the GA-SSO algorithm calculation decides optimal and ideal arrangement for energy-aware routing schema demonstrate by essentially making strides the execution of QoS variables can oversee information blockage comes from data transmission between IoV nodes.
{"title":"Improved energy-efficient routing architecture for traffic management system using a hybrid meta-heuristic algorithm in Internet of vehicles","authors":"Xiao-qiang Shao","doi":"10.3233/jhs-222003","DOIUrl":"https://doi.org/10.3233/jhs-222003","url":null,"abstract":"Today, Internet of Vehicles (IoV) applications communicate with smart devices and deploy Intelligent Transportation Systems (ITS) to recognize traffic congestion problems. One of the main challenges of smart cities and IoV platforms is data routing methods for smart traffic congestion problems to navigate the individual information of data transmission as a critical issue in the ITS. Providing a way to extend the Quality of Service (QoS) variables and energy efficiency methods for directing data transmission in routing-based traffic management systems within the IoV environment is an important issue since the energy consumption of IoV devices is a critical issue in low-power saving storage. This paper presents a hybrid Genetic Algorithm and Social Spider Optimization (GA-SSO) algorithm for an energy-aware routing schema for optimizing traffic congestion and smart devices in the IoV environment. After conducting some studies and comparisons, the exactness and prevalence of the proposed schema were received. Experimental results confirmed that the GA-SSO algorithm calculation decides optimal and ideal arrangement for energy-aware routing schema demonstrate by essentially making strides the execution of QoS variables can oversee information blockage comes from data transmission between IoV nodes.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"70 1","pages":"299-308"},"PeriodicalIF":0.9,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74344629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Intrusion Detection is very important in computer networks because the widespread of internet makes the computers more prone to several cyber-attacks. With this inspiration, a new paradigm called Intrusion Detection System (IDS) has emerged and attained a huge research interest. However, the major challenge in IDS is the presence of redundant and duplicate information that causes a serious computational problem in network traffic classifications. To solve this problem, in this paper, we propose a novel IDS model based on statistical processing techniques and machine learning algorithms. The machine learning algorithms incudes Fuzzy C-means and Support Vector Machine while the statistical processing techniques includes correlation and Joint Entropy. The main purpose of FCM is to cluster the train data and SVM is to classify the traffic connections. Next, the main purpose of correlation is to discover and remove the duplicate connections from every cluster while the Joint entropy is applied for the discovery and removal of duplicate features from every connection. For experimental validation, totally three standard datasets namely KDD Cup 99, NSL-KDD and Kyoto2006+ are considered and the performance is measured through Detection Rate, Precision, F-Score, and accuracy. A five-fold cross validation is done on every dataset by changing the traffic and the obtained average performance is compared with existing methods.
入侵检测在计算机网络中非常重要,因为互联网的普及使计算机更容易受到各种网络攻击。受此启发,一种新的入侵检测系统(IDS)范式应运而生,并引起了广泛的研究兴趣。然而,IDS的主要挑战是冗余和重复信息的存在,这会在网络流量分类中导致严重的计算问题。为了解决这一问题,本文提出了一种基于统计处理技术和机器学习算法的IDS模型。机器学习算法包括模糊c均值和支持向量机,统计处理技术包括相关性和联合熵。FCM的主要目的是对列车数据进行聚类,而SVM的主要目的是对交通连接进行分类。其次,相关性的主要目的是发现和删除每个集群中的重复连接,而联合熵用于发现和删除每个连接中的重复特征。为了进行实验验证,共考虑了KDD Cup 99、NSL-KDD和Kyoto2006+三个标准数据集,并通过Detection Rate、Precision、F-Score和accuracy来衡量性能。通过改变流量对每个数据集进行五次交叉验证,并将得到的平均性能与现有方法进行比较。
{"title":"Mutual clustered redundancy assisted feature selection for an intrusion detection system","authors":"T. Veeranna, K. Reddi","doi":"10.3233/jhs-220694","DOIUrl":"https://doi.org/10.3233/jhs-220694","url":null,"abstract":"Intrusion Detection is very important in computer networks because the widespread of internet makes the computers more prone to several cyber-attacks. With this inspiration, a new paradigm called Intrusion Detection System (IDS) has emerged and attained a huge research interest. However, the major challenge in IDS is the presence of redundant and duplicate information that causes a serious computational problem in network traffic classifications. To solve this problem, in this paper, we propose a novel IDS model based on statistical processing techniques and machine learning algorithms. The machine learning algorithms incudes Fuzzy C-means and Support Vector Machine while the statistical processing techniques includes correlation and Joint Entropy. The main purpose of FCM is to cluster the train data and SVM is to classify the traffic connections. Next, the main purpose of correlation is to discover and remove the duplicate connections from every cluster while the Joint entropy is applied for the discovery and removal of duplicate features from every connection. For experimental validation, totally three standard datasets namely KDD Cup 99, NSL-KDD and Kyoto2006+ are considered and the performance is measured through Detection Rate, Precision, F-Score, and accuracy. A five-fold cross validation is done on every dataset by changing the traffic and the obtained average performance is compared with existing methods.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"504 1","pages":"257-273"},"PeriodicalIF":0.9,"publicationDate":"2022-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83516387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kevin Bylykbashi, Ermioni Qafzezi, Phudit Ampririt, Makoto Ikeda, Keita Matsuo, L. Barolli
Drivers are held responsible for the vast majority of traffic accidents. While most of the errors that cause these accidents are involuntary, a significant number of them are caused by irresponsible driving behaviors, which must be utterly preventable. Irresponsible driving, in addition, is often associated with the stress drivers experience while driving. We have previously implemented an intelligent system based on fuzzy logic for determining driver’s stress in Vehicular Ad hoc Networks (VANETs), called Fuzzy-based System for Determining the Stress Feeling Level (FSDSFL), considering the driver’s impatience, the behavior of other drivers, and the traffic condition as input parameters. In this work, we present an Improved FSDSFL (IFSDSFL) system, which considers the driving experience and history as an additional input. We show through simulations the effect that driving experience and history and the other parameters have on the determination of the stress feeling level and demonstrate some actions that can be performed when the stress exceeds certain levels.
{"title":"Implementation and evaluation of a fuzzy-based system for determining stress feeling level in VANETs: Effect of driving experience and history on driver stress","authors":"Kevin Bylykbashi, Ermioni Qafzezi, Phudit Ampririt, Makoto Ikeda, Keita Matsuo, L. Barolli","doi":"10.3233/jhs-220693","DOIUrl":"https://doi.org/10.3233/jhs-220693","url":null,"abstract":"Drivers are held responsible for the vast majority of traffic accidents. While most of the errors that cause these accidents are involuntary, a significant number of them are caused by irresponsible driving behaviors, which must be utterly preventable. Irresponsible driving, in addition, is often associated with the stress drivers experience while driving. We have previously implemented an intelligent system based on fuzzy logic for determining driver’s stress in Vehicular Ad hoc Networks (VANETs), called Fuzzy-based System for Determining the Stress Feeling Level (FSDSFL), considering the driver’s impatience, the behavior of other drivers, and the traffic condition as input parameters. In this work, we present an Improved FSDSFL (IFSDSFL) system, which considers the driving experience and history as an additional input. We show through simulations the effect that driving experience and history and the other parameters have on the determination of the stress feeling level and demonstrate some actions that can be performed when the stress exceeds certain levels.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"1 1","pages":"243-255"},"PeriodicalIF":0.9,"publicationDate":"2022-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76843698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Chi, Lei Li, Sang Gui, Fei Wang, Zijian Mao, Xiaohan Sun, Ning Cao
In order to further increase the span length of the Optical Transport Network (OTN) transmission system, a combination of Raman amplifier and remotely optical pumped amplifier (ROPA) configuration scheme is recommended. Optimal EDF length, optimal ROPA position and OTN span limitation are obtained through simulations. A field-trial with 8*10 Gb/s in 380 km span system is carried out with the amplifier configuration of Raman amplifier plus first-order and second-order remotely pumped amplifier. By adding a second-order remote pump laser, the transmission limit is increased from 77.5 dB to 80.7 dB. Through detailed analysis of the system, it is concluded that the second-order remote pump can effectively transfer the pump power to the first-order remote pump wavelength, which greatly increases the pump power at the gain module, thereby increasing the gain of the RGU and reduce its noise. Moreover, the introduction of the second-order remote pump effectively weakened the self-excited effect and overcomes the shortcomings of the low pump power threshold of the first-order remote pump.
{"title":"Design of ultra-long-distance optical transport networks based on high-order remotely pumped amplifier","authors":"R. Chi, Lei Li, Sang Gui, Fei Wang, Zijian Mao, Xiaohan Sun, Ning Cao","doi":"10.3233/jhs-220688","DOIUrl":"https://doi.org/10.3233/jhs-220688","url":null,"abstract":"In order to further increase the span length of the Optical Transport Network (OTN) transmission system, a combination of Raman amplifier and remotely optical pumped amplifier (ROPA) configuration scheme is recommended. Optimal EDF length, optimal ROPA position and OTN span limitation are obtained through simulations. A field-trial with 8*10 Gb/s in 380 km span system is carried out with the amplifier configuration of Raman amplifier plus first-order and second-order remotely pumped amplifier. By adding a second-order remote pump laser, the transmission limit is increased from 77.5 dB to 80.7 dB. Through detailed analysis of the system, it is concluded that the second-order remote pump can effectively transfer the pump power to the first-order remote pump wavelength, which greatly increases the pump power at the gain module, thereby increasing the gain of the RGU and reduce its noise. Moreover, the introduction of the second-order remote pump effectively weakened the self-excited effect and overcomes the shortcomings of the low pump power threshold of the first-order remote pump.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"125 1","pages":"157-165"},"PeriodicalIF":0.9,"publicationDate":"2022-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78465500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In current information systems, a huge number of IoT (Internet of Things) devices are interconnected with various kinds of networks like WiFi and 5G networks. A large volume of data is gathered into servers from a huge number of IoT devices and is manipulated to provide application services. Gathered data is encapsulated along with methods to manipulate the data as an object like a database system. In object-based systems, each application is composed of multiple objects. In addition, each object is replicated on multiple physical servers in order to increase availability, reliability, and performance of an application service. On the other hand, replicas of each object is required to be mutually consistent in presence of multiple transactions. Here, a larger amount of electric energy and computation resources are consumed in physical servers than non-replication approaches to serialize conflicting transactions on multiple replicas. Many algorithms to synchronize conflicting transactions are so far proposed like 2PL (Two-Phase Locking) and TO (Timestamp Ordering). However, the electric energy consumption is not considered. In this paper, an EEQBL-OMM (Energy-Efficient Quorum-Based Locking with Omitting Meaningless Method) protocol is newly proposed to reduce not only the average execution time of each transaction but also the total electric energy consumption of servers by omitting the execution of meaningless methods on replicas of each object. Evaluation results show the total electric energy consumption of servers, the average execution time of each transaction, and the number of aborted instances of transactions in the EEQBL-OMM protocol can be on average reduced to 79%, 62%, and 80% of the ECLBQS (Energy Consumption Laxity-Based Quorum Selection) protocol which is proposed in our previous studies in a homogeneous set of servers, respectively. In addition, the evaluation results show the total electric energy consumption of servers, the average execution time of each transaction, and the number of aborted instances of transactions in the EEQBL-OMM protocol can be on average reduced to 73%, 50%, and 67% of the ECLBQS protocol in a heterogeneous set of servers, respectively. The evaluation results also show at most 48% and 51% of the total number of methods can be omitted as meaningless methods in a homogeneous set and heterogeneous set of servers, respectively, in the EEQBL-OMM protocol.
在当前的信息系统中,大量的物联网设备与各种网络互联,如WiFi和5G网络。大量数据从大量物联网设备中收集到服务器中,并被操纵以提供应用服务。收集到的数据连同操作数据的方法一起被封装为一个对象,就像数据库系统一样。在基于对象的系统中,每个应用程序由多个对象组成。此外,每个对象在多个物理服务器上进行复制,以提高应用程序服务的可用性、可靠性和性能。另一方面,在存在多个事务的情况下,每个对象的副本需要相互一致。在这里,与非复制方法相比,在物理服务器中消耗更多的电能和计算资源来序列化多个副本上的冲突事务。目前提出了许多同步冲突事务的算法,如2PL(两阶段锁定)和to(时间戳排序)。但是,没有考虑电能消耗。本文提出了一种EEQBL-OMM (efficient Quorum-Based Locking with省去无意义方法)协议,该协议不仅减少了每个事务的平均执行时间,而且通过在每个对象的副本上省去无意义方法的执行,减少了服务器的总电能消耗。评估结果显示,EEQBL-OMM协议中服务器的总电能消耗、每个事务的平均执行时间和事务终止实例的数量平均可以分别减少到我们之前在同质服务器集研究中提出的ECLBQS (energy consumption Laxity-Based Quorum Selection)协议的79%、62%和80%。此外,评估结果显示,在异构服务器集中,EEQBL-OMM协议的服务器总电能消耗、每个事务的平均执行时间和事务中止实例的数量可以分别平均降低到ECLBQS协议的73%、50%和67%。评估结果还显示,在EEQBL-OMM协议中,在同构服务器集和异构服务器集中,最多有48%和51%的方法可以作为无意义的方法被省略。
{"title":"An energy-efficient quorum-based locking protocol by omitting meaningless methods on object replicas","authors":"T. Enokido, Dilawaer Duolikun, M. Takizawa","doi":"10.3233/jhs-220690","DOIUrl":"https://doi.org/10.3233/jhs-220690","url":null,"abstract":"In current information systems, a huge number of IoT (Internet of Things) devices are interconnected with various kinds of networks like WiFi and 5G networks. A large volume of data is gathered into servers from a huge number of IoT devices and is manipulated to provide application services. Gathered data is encapsulated along with methods to manipulate the data as an object like a database system. In object-based systems, each application is composed of multiple objects. In addition, each object is replicated on multiple physical servers in order to increase availability, reliability, and performance of an application service. On the other hand, replicas of each object is required to be mutually consistent in presence of multiple transactions. Here, a larger amount of electric energy and computation resources are consumed in physical servers than non-replication approaches to serialize conflicting transactions on multiple replicas. Many algorithms to synchronize conflicting transactions are so far proposed like 2PL (Two-Phase Locking) and TO (Timestamp Ordering). However, the electric energy consumption is not considered. In this paper, an EEQBL-OMM (Energy-Efficient Quorum-Based Locking with Omitting Meaningless Method) protocol is newly proposed to reduce not only the average execution time of each transaction but also the total electric energy consumption of servers by omitting the execution of meaningless methods on replicas of each object. Evaluation results show the total electric energy consumption of servers, the average execution time of each transaction, and the number of aborted instances of transactions in the EEQBL-OMM protocol can be on average reduced to 79%, 62%, and 80% of the ECLBQS (Energy Consumption Laxity-Based Quorum Selection) protocol which is proposed in our previous studies in a homogeneous set of servers, respectively. In addition, the evaluation results show the total electric energy consumption of servers, the average execution time of each transaction, and the number of aborted instances of transactions in the EEQBL-OMM protocol can be on average reduced to 73%, 50%, and 67% of the ECLBQS protocol in a heterogeneous set of servers, respectively. The evaluation results also show at most 48% and 51% of the total number of methods can be omitted as meaningless methods in a homogeneous set and heterogeneous set of servers, respectively, in the EEQBL-OMM protocol.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"60 1","pages":"181-203"},"PeriodicalIF":0.9,"publicationDate":"2022-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84873070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In recent years, vehicular communication systems have taken an important place in Intelligent Transport Systems (ITS). These systems are designed on self-organizing networks, known as Vehicular Ad hoc NETworks (VANETs). Their objective is to struggle against road safety problems and road traffic congestion by integrating information and communication technologies in road infrastructures and vehicles. VANET differs from other types of ad hoc networks by high mobility and very dynamic topology. Consequently, the design of an efficient VANET routing protocol becomes a challenging task. Many routing schemes with QoS (Quality of Service) have been proposed in the literature for VANET, to satisfy the performances required by the different applications running upon such networks. Cross-layer designs, which make it possible to exchange and share information between the different layers of the network, have shown to be efficient in VANETs. This paper proposes an improved version of the geographic Greedy algorithm as a cross-layer routing protocol for VANETs. The cooperation between the network layer and the lower layers involves three cyber-physical parameters: Speed, position and Signal-to-Noise Ratio (SNR). The simulation results over the Network Simulator-3 (NS3) demonstrated the effectiveness of the proposed solution in terms of end-to-end delay, throughput and packet delivery ratio.
{"title":"Cross-layer greedy forwarding algorithm for VANET","authors":"Yassine Hammouche, S. Merniz","doi":"10.3233/jhs-220689","DOIUrl":"https://doi.org/10.3233/jhs-220689","url":null,"abstract":"In recent years, vehicular communication systems have taken an important place in Intelligent Transport Systems (ITS). These systems are designed on self-organizing networks, known as Vehicular Ad hoc NETworks (VANETs). Their objective is to struggle against road safety problems and road traffic congestion by integrating information and communication technologies in road infrastructures and vehicles. VANET differs from other types of ad hoc networks by high mobility and very dynamic topology. Consequently, the design of an efficient VANET routing protocol becomes a challenging task. Many routing schemes with QoS (Quality of Service) have been proposed in the literature for VANET, to satisfy the performances required by the different applications running upon such networks. Cross-layer designs, which make it possible to exchange and share information between the different layers of the network, have shown to be efficient in VANETs. This paper proposes an improved version of the geographic Greedy algorithm as a cross-layer routing protocol for VANETs. The cooperation between the network layer and the lower layers involves three cyber-physical parameters: Speed, position and Signal-to-Noise Ratio (SNR). The simulation results over the Network Simulator-3 (NS3) demonstrated the effectiveness of the proposed solution in terms of end-to-end delay, throughput and packet delivery ratio.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"30 1","pages":"167-179"},"PeriodicalIF":0.9,"publicationDate":"2022-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76359455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Edge computing can place computing, storage, bandwidth, application and other resources on the edge of the network to reduce transmission delay, and bandwidth limitation for users. Therefore, task scheduling and resource allocation in edge computing have become a new research focus. In view of the dynamic nature of computing resources in edge computing and the computing power limitation of a single computing resource, this paper proposes a computing resource allocation scheme based on edge computing under augmented reality (AR) application. On the premise of ensuring the completion time of sub-tasks and the revenue of computing service devices, the method transforms the computing resource allocation problem in edge computing into the many-to-many matching problem between sub-tasks and computing service devices. The performance of the proposed scheme is analyzed through experiments, and the results show that the resource allocation time is relatively stable, and it is better than other state-of-the-art algorithms in terms of the edge calculation, task delay, and task violation rate.
{"title":"Computing resource allocation scheme based on edge computing under augmented reality application","authors":"Yuxia Yuan, Zengyong Xu","doi":"10.3233/jhs-220687","DOIUrl":"https://doi.org/10.3233/jhs-220687","url":null,"abstract":"Edge computing can place computing, storage, bandwidth, application and other resources on the edge of the network to reduce transmission delay, and bandwidth limitation for users. Therefore, task scheduling and resource allocation in edge computing have become a new research focus. In view of the dynamic nature of computing resources in edge computing and the computing power limitation of a single computing resource, this paper proposes a computing resource allocation scheme based on edge computing under augmented reality (AR) application. On the premise of ensuring the completion time of sub-tasks and the revenue of computing service devices, the method transforms the computing resource allocation problem in edge computing into the many-to-many matching problem between sub-tasks and computing service devices. The performance of the proposed scheme is analyzed through experiments, and the results show that the resource allocation time is relatively stable, and it is better than other state-of-the-art algorithms in terms of the edge calculation, task delay, and task violation rate.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"10 1","pages":"143-156"},"PeriodicalIF":0.9,"publicationDate":"2022-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88125665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This study aimed to deal with the problems that current intrusion detections have poor classification ability toward small sets of samples. A new intrusion detection model based on coordinative immune and random antibody forest (CIRAFID) is proposed. The vaccination mechanism of coordinative immune algorithm is designed to increase the fitness of poor antibodies, a kind of random antibody detection forest model is given to detect anomalies, and to classify attacks. The experimental results show: the proposed model has higher detection rate, classification accuracy, classification ability and lower false positives rate.
{"title":"Intrusion detection model based on coordinative immune and random antibody forest","authors":"Ling Zhang, Jian-Wei Zhang, X. Xin, Kai-Lai Zhou","doi":"10.3233/jhs-220691","DOIUrl":"https://doi.org/10.3233/jhs-220691","url":null,"abstract":"This study aimed to deal with the problems that current intrusion detections have poor classification ability toward small sets of samples. A new intrusion detection model based on coordinative immune and random antibody forest (CIRAFID) is proposed. The vaccination mechanism of coordinative immune algorithm is designed to increase the fitness of poor antibodies, a kind of random antibody detection forest model is given to detect anomalies, and to classify attacks. The experimental results show: the proposed model has higher detection rate, classification accuracy, classification ability and lower false positives rate.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"4 1","pages":"205-220"},"PeriodicalIF":0.9,"publicationDate":"2022-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84443424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Today, Internet of Things (IoT) has provided intelligent interactions between sensors, smart devices, actuators, and cloud-based applications to ease human life. Currently, IoT-based connectivity management systems use computer-assisted learning methods to increase learning level and better understanding of the curriculums for students in universities, schools and research centers. On the other hand, virtual connectivity management systems are applied to facilitate teaching and learning methods under taken of pandemic effects. Because, data mining methods have important effect to enhancement and navigate IoT-based connectivity management systems, this paper presents a technical analysis on Artificial Intelligence (AI) approaches for connectivity management systems in IoT environments. This paper provides a comprehensive perspective on vehicular communication systems, Internet of Vehicles (IoV) methods and Vehicular Ad Hoc Network (VANET) environments that have evaluated using machine learning, fuzzy logic and intelligent algorithms. Also, applied evaluation metrics to predict and detect efficient connectivity methods, succeed learning models and enhancement of IoT-based connectivity management systems are discussed and analyzed for existing AI approaches. Finally, new research directions and emerging challenges are outlined to improve the performance of advanced IoT-based connectivity management systems.
{"title":"Artificial intelligence mechanisms for management of QoS-aware connectivity in Internet of vehicles","authors":"Alireza Souri","doi":"10.3233/jhs-220692","DOIUrl":"https://doi.org/10.3233/jhs-220692","url":null,"abstract":"Today, Internet of Things (IoT) has provided intelligent interactions between sensors, smart devices, actuators, and cloud-based applications to ease human life. Currently, IoT-based connectivity management systems use computer-assisted learning methods to increase learning level and better understanding of the curriculums for students in universities, schools and research centers. On the other hand, virtual connectivity management systems are applied to facilitate teaching and learning methods under taken of pandemic effects. Because, data mining methods have important effect to enhancement and navigate IoT-based connectivity management systems, this paper presents a technical analysis on Artificial Intelligence (AI) approaches for connectivity management systems in IoT environments. This paper provides a comprehensive perspective on vehicular communication systems, Internet of Vehicles (IoV) methods and Vehicular Ad Hoc Network (VANET) environments that have evaluated using machine learning, fuzzy logic and intelligent algorithms. Also, applied evaluation metrics to predict and detect efficient connectivity methods, succeed learning models and enhancement of IoT-based connectivity management systems are discussed and analyzed for existing AI approaches. Finally, new research directions and emerging challenges are outlined to improve the performance of advanced IoT-based connectivity management systems.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"40 1","pages":"221-230"},"PeriodicalIF":0.9,"publicationDate":"2022-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85310318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}