首页 > 最新文献

Ad Hoc Networks最新文献

英文 中文
Fuzzy-AHP based optimal RSU deployment (Fuzzy-AHP-ORD) approach using road and traffic analysis in VANET 基于模糊-AHP 的 RSU 优化部署(Fuzzy-AHP-ORD)方法,利用 VANET 中的道路和交通分析
IF 4.8 3区 计算机科学 Q1 Computer Science Pub Date : 2024-05-03 DOI: 10.1016/j.adhoc.2024.103529
Samkit Jain, Vinod Kumar Jain, Subodh Mishra

Vehicular Ad Hoc Network (VANET) is a proven technology in Intelligent Transportation Systems (ITS) that provides various safety and non-safety applications. The Roadside Unit (RSU) is one of the essential components of the VANET, which allows vehicles to disseminate and exchange safety and infotainment information in a broader range. RSUs are also valuable for offloading the internet data traffic of vehicular users from cellular networks. However, due to high deployment and maintenance costs and security overhead, it is essential to optimally deploy these RSUs and place them in prominent places to increase the overall network coverage and efficiency. The existing deployment strategies either analyzed the road network on one or a few topological parameters or vehicular traffic parameters and considered equal or random weights for each parameter. None of them deal with the uncertainty of parameter weightage. Thus, this paper proposes a Fuzzy-Analytic Hierarchy Process-based optimal RSU deployment (Fuzzy-AHP-ORD) approach to finding the highly influential intersection nodes for RSU deployment. The Fuzzy-AHP-ORD considers different static and dynamic parameters concerning road topology and the vehicle’s traffic behavior. The weights of the parameter are calculated through Fuzzy-AHP, then the various intersection nodes of the road networks are ranked using the TOPSIS (Technique for Order of Preference by Similarity to Ideal Solution) based MADM (Multiple Attribute Decision Making) method. The simulation results reveal the effectiveness of the proposed method in comparison to other benchmark methods in terms of coverage ratio, connection time, packet delivery ratio, and delay.

车载 Ad Hoc 网络(VANET)是智能交通系统(ITS)中一项成熟的技术,可提供各种安全和非安全应用。路边装置(RSU)是 VANET 的重要组成部分之一,它允许车辆在更大范围内传播和交换安全与信息娱乐信息。RSU 对于从蜂窝网络卸载车辆用户的互联网数据流量也很有价值。然而,由于部署和维护成本以及安全开销较高,因此必须优化这些 RSU 的部署,并将其放置在显眼的地方,以提高整个网络的覆盖范围和效率。现有的部署策略要么是根据一个或几个拓扑参数或车辆交通参数对道路网络进行分析,要么是考虑每个参数的相等权重或随机权重。它们都没有处理参数权重的不确定性。因此,本文提出了一种基于模糊-层次分析法的 RSU 优化部署(Fuzzy-AHP-ORD)方法,以找到对 RSU 部署具有高度影响力的交叉路口节点。Fuzzy-AHP-ORD 考虑了与道路拓扑和车辆交通行为有关的不同静态和动态参数。通过模糊-AHP 计算出参数的权重,然后使用基于 MADM(多属性决策)方法的 TOPSIS(与理想解相似度排序技术)对路网中的各个交叉口节点进行排序。仿真结果表明,与其他基准方法相比,所提出的方法在覆盖率、连接时间、数据包传送率和延迟方面都很有效。
{"title":"Fuzzy-AHP based optimal RSU deployment (Fuzzy-AHP-ORD) approach using road and traffic analysis in VANET","authors":"Samkit Jain,&nbsp;Vinod Kumar Jain,&nbsp;Subodh Mishra","doi":"10.1016/j.adhoc.2024.103529","DOIUrl":"https://doi.org/10.1016/j.adhoc.2024.103529","url":null,"abstract":"<div><p>Vehicular Ad Hoc Network (VANET) is a proven technology in Intelligent Transportation Systems (ITS) that provides various safety and non-safety applications. The Roadside Unit (RSU) is one of the essential components of the VANET, which allows vehicles to disseminate and exchange safety and infotainment information in a broader range. RSUs are also valuable for offloading the internet data traffic of vehicular users from cellular networks. However, due to high deployment and maintenance costs and security overhead, it is essential to optimally deploy these RSUs and place them in prominent places to increase the overall network coverage and efficiency. The existing deployment strategies either analyzed the road network on one or a few topological parameters or vehicular traffic parameters and considered equal or random weights for each parameter. None of them deal with the uncertainty of parameter weightage. Thus, this paper proposes a Fuzzy-Analytic Hierarchy Process-based optimal RSU deployment (Fuzzy-AHP-ORD) approach to finding the highly influential intersection nodes for RSU deployment. The Fuzzy-AHP-ORD considers different static and dynamic parameters concerning road topology and the vehicle’s traffic behavior. The weights of the parameter are calculated through Fuzzy-AHP, then the various intersection nodes of the road networks are ranked using the TOPSIS (Technique for Order of Preference by Similarity to Ideal Solution) based MADM (Multiple Attribute Decision Making) method. The simulation results reveal the effectiveness of the proposed method in comparison to other benchmark methods in terms of coverage ratio, connection time, packet delivery ratio, and delay.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140878928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HPS: A Hybrid Proactive Scheduler with adaptive channel selection for industrial 6TiSCH networks HPS:针对工业 6TiSCH 网络的具有自适应信道选择功能的混合主动调度程序
IF 4.8 3区 计算机科学 Q1 Computer Science Pub Date : 2024-04-26 DOI: 10.1016/j.adhoc.2024.103527
Abdeldjalil Tabouche, Badis Djamaa, Mustapha Reda Senouci

The Industrial Internet of Things (IIoT) plays a vital role in Industry 4.0, thanks to advanced wireless protocols like IEEE 802.15.4 Time-Slotted Channel Hopping (TSCH) and their incorporation in the IPv6 stack via 6TiSCH. These protocols rely on carefully constructed schedules generated by a Scheduling Function (SF). The Minimal Scheduling Function (MSF) serves as the standard SF established by the 6TiSCH WG, prescribing the management and adaptation of the communication schedule based on traffic patterns. However, MSF has a notable drawback in adapting to traffic variability and burstiness and fails to account for link quality when updating TSCH cells. To address these limitations, this paper introduces the Hybrid Proactive Scheduler with Adaptive Channel Selection (HPS). HPS calculates cell requirements by considering resource utilization, ETX (Expected Transmission Count), and buffer allocation. It incorporates a fast response mechanism for burst traffic, implemented through an autonomous scheduling mechanism. Additionally, HPS utilizes a whitelisting mechanism to select optimal communication channels. The proposed scheme is implemented in Contiki-ng and evaluated in both simulated environments and real-world testbed. Obtained results demonstrate the potential of HPS to significantly enhance reliability and reduce delays compared to state-of-the-art SFs. Specifically, HPS consistently demonstrates reliability levels surpassing 90% across diverse scenarios accompanied with a noticeable gain in latency and power consumption of approximately 70% and 25%, respectively. These findings highlight the effectiveness of HPS in improving network performance and addressing the limitations of existing SFs.

工业物联网(IIoT)在工业 4.0 中发挥着至关重要的作用,这要归功于 IEEE 802.15.4 时隙信道跳频(TSCH)等先进的无线协议,以及通过 6TiSCH 将其纳入 IPv6 协议栈。这些协议依赖于由调度功能(SF)生成的精心构建的调度。最小调度功能(MSF)是 6TiSCH 工作组制定的标准 SF,规定了基于流量模式的通信调度管理和调整。然而,MSF 在适应流量变化和突发方面存在明显缺陷,并且在更新 TSCH 小区时未能考虑链路质量。为了解决这些局限性,本文引入了具有自适应信道选择功能的混合主动调度器(HPS)。HPS 通过考虑资源利用率、ETX(预期传输数)和缓冲区分配来计算小区需求。它通过自主调度机制为突发流量提供快速响应机制。此外,HPS 还利用白名单机制来选择最佳通信信道。提议的方案在 Contiki-ng 中实施,并在模拟环境和实际测试平台中进行了评估。结果表明,与最先进的 SF 相比,HPS 具有显著提高可靠性和减少延迟的潜力。具体来说,HPS 在不同场景下的可靠性水平始终超过 90%,同时延迟和功耗分别明显减少了约 70% 和 25%。这些发现凸显了 HPS 在提高网络性能和解决现有 SF 的局限性方面的有效性。
{"title":"HPS: A Hybrid Proactive Scheduler with adaptive channel selection for industrial 6TiSCH networks","authors":"Abdeldjalil Tabouche,&nbsp;Badis Djamaa,&nbsp;Mustapha Reda Senouci","doi":"10.1016/j.adhoc.2024.103527","DOIUrl":"https://doi.org/10.1016/j.adhoc.2024.103527","url":null,"abstract":"<div><p>The Industrial Internet of Things (IIoT) plays a vital role in Industry 4.0, thanks to advanced wireless protocols like IEEE 802.15.4 Time-Slotted Channel Hopping (TSCH) and their incorporation in the IPv6 stack via 6TiSCH. These protocols rely on carefully constructed schedules generated by a Scheduling Function (SF). The Minimal Scheduling Function (MSF) serves as the standard SF established by the 6TiSCH WG, prescribing the management and adaptation of the communication schedule based on traffic patterns. However, MSF has a notable drawback in adapting to traffic variability and burstiness and fails to account for link quality when updating TSCH cells. To address these limitations, this paper introduces the Hybrid Proactive Scheduler with Adaptive Channel Selection (HPS). HPS calculates cell requirements by considering resource utilization, ETX (Expected Transmission Count), and buffer allocation. It incorporates a fast response mechanism for burst traffic, implemented through an autonomous scheduling mechanism. Additionally, HPS utilizes a whitelisting mechanism to select optimal communication channels. The proposed scheme is implemented in Contiki-ng and evaluated in both simulated environments and real-world testbed. Obtained results demonstrate the potential of HPS to significantly enhance reliability and reduce delays compared to state-of-the-art SFs. Specifically, HPS consistently demonstrates reliability levels surpassing 90% across diverse scenarios accompanied with a noticeable gain in latency and power consumption of approximately 70% and 25%, respectively. These findings highlight the effectiveness of HPS in improving network performance and addressing the limitations of existing SFs.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140822619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AI-powered malware detection with Differential Privacy for zero trust security in Internet of Things networks 利用差分隐私技术进行人工智能驱动的恶意软件检测,实现物联网网络的零信任安全
IF 4.8 3区 计算机科学 Q1 Computer Science Pub Date : 2024-04-25 DOI: 10.1016/j.adhoc.2024.103523
Faria Nawshin , Devrim Unal , Mohammad Hammoudeh , Ponnuthurai N. Suganthan

The widespread usage of Android-powered devices in the Internet of Things (IoT) makes them susceptible to evolving cybersecurity threats. Most healthcare devices in IoT networks, such as smart watches, smart thermometers, biosensors, and more, are powered by the Android operating system, where preserving the privacy of user-sensitive data is of utmost importance. Detecting Android malware is thus vital for protecting sensitive information and ensuring the reliability of IoT networks. This article focuses on AI-enabled Android malware detection for improving zero trust security in IoT networks, which requires Android applications to be verified and authenticated before providing access to network resources. The zero trust security model requires strict identity verification for every entity trying to access resources on a private network, regardless of whether they are inside or outside the network perimeter. Our proposed solution, DP-RFECV-FNN, an innovative approach to Android malware detection that employs Differential Privacy (DP) within a Feedforward Neural Network (FNN) designed for IoT networks under the zero trust model. By integrating DP, we ensure the confidentiality of data during the detection process, setting a new standard for privacy in cybersecurity solutions. By combining the strengths of DP and zero trust security with the powerful learning capacity of the FNN, DP-RFECV-FNN demonstrates the ability to identify both known and novel malware types and achieves higher accuracy while maintaining strict privacy controls compared with recent papers. DP-RFECV-FNN achieves an accuracy ranging from 97.78% to 99.21% while utilizing static features and 93.49% to 94.36% for dynamic features of Android applications to detect whether it is malware or benign. These results are achieved under varying privacy budgets, ranging from ϵ=0.1 to ϵ=1.0. Furthermore, our proposed feature selection pipeline enables us to outperform the state-of-the-art by significantly reducing the number of selected features and training time while improving accuracy. To the best of our knowledge, this is the first work to categorize Android malware based on both static and dynamic features through a privacy-preserving neural network model.

在物联网 (IoT) 中广泛使用安卓系统驱动的设备使其容易受到不断变化的网络安全威胁。物联网网络中的大多数医疗保健设备,如智能手表、智能温度计、生物传感器等,都采用了安卓操作系统,因此保护用户敏感数据的隐私至关重要。因此,检测安卓恶意软件对于保护敏感信息和确保物联网网络的可靠性至关重要。本文重点介绍人工智能支持的安卓恶意软件检测,以提高物联网网络的零信任安全性,这就要求安卓应用程序在提供网络资源访问权限之前必须经过验证和认证。零信任安全模型要求对试图访问专用网络资源的每个实体进行严格的身份验证,无论它们是在网络边界内外。我们提出的 DP-RFECV-FNN 解决方案是一种创新的安卓恶意软件检测方法,它在前馈神经网络(FNN)中采用了差分隐私(DP)技术,专为零信任模式下的物联网网络而设计。通过集成 DP,我们确保了检测过程中数据的保密性,为网络安全解决方案中的隐私保护设定了新标准。通过将 DP 和零信任安全的优势与 FNN 强大的学习能力相结合,DP-RFECV-FNN 展示了识别已知和新型恶意软件类型的能力,与近期发表的论文相比,在保持严格隐私控制的同时实现了更高的准确性。DP-RFECV-FNN 利用安卓应用程序的静态特征检测其是恶意软件还是良性软件的准确率为 97.78% 到 99.21%,利用动态特征检测其是恶意软件还是良性软件的准确率为 93.49% 到 94.36%。这些结果是在ϵ=0.1到ϵ=1.0的不同隐私预算下取得的。此外,我们提出的特征选择管道使我们在提高准确率的同时,显著减少了所选特征的数量和训练时间,从而超越了最先进的技术。据我们所知,这是第一项通过隐私保护神经网络模型根据静态和动态特征对安卓恶意软件进行分类的工作。
{"title":"AI-powered malware detection with Differential Privacy for zero trust security in Internet of Things networks","authors":"Faria Nawshin ,&nbsp;Devrim Unal ,&nbsp;Mohammad Hammoudeh ,&nbsp;Ponnuthurai N. Suganthan","doi":"10.1016/j.adhoc.2024.103523","DOIUrl":"10.1016/j.adhoc.2024.103523","url":null,"abstract":"<div><p>The widespread usage of Android-powered devices in the Internet of Things (IoT) makes them susceptible to evolving cybersecurity threats. Most healthcare devices in IoT networks, such as smart watches, smart thermometers, biosensors, and more, are powered by the Android operating system, where preserving the privacy of user-sensitive data is of utmost importance. Detecting Android malware is thus vital for protecting sensitive information and ensuring the reliability of IoT networks. This article focuses on AI-enabled Android malware detection for improving zero trust security in IoT networks, which requires Android applications to be verified and authenticated before providing access to network resources. The zero trust security model requires strict identity verification for every entity trying to access resources on a private network, regardless of whether they are inside or outside the network perimeter. Our proposed solution, DP-RFECV-FNN, an innovative approach to Android malware detection that employs Differential Privacy (DP) within a Feedforward Neural Network (FNN) designed for IoT networks under the zero trust model. By integrating DP, we ensure the confidentiality of data during the detection process, setting a new standard for privacy in cybersecurity solutions. By combining the strengths of DP and zero trust security with the powerful learning capacity of the FNN, DP-RFECV-FNN demonstrates the ability to identify both known and novel malware types and achieves higher accuracy while maintaining strict privacy controls compared with recent papers. DP-RFECV-FNN achieves an accuracy ranging from 97.78% to 99.21% while utilizing static features and 93.49% to 94.36% for dynamic features of Android applications to detect whether it is malware or benign. These results are achieved under varying privacy budgets, ranging from <span><math><mrow><mi>ϵ</mi><mo>=</mo><mn>0</mn><mo>.</mo><mn>1</mn></mrow></math></span> to <span><math><mrow><mi>ϵ</mi><mo>=</mo><mn>1</mn><mo>.</mo><mn>0</mn></mrow></math></span>. Furthermore, our proposed feature selection pipeline enables us to outperform the state-of-the-art by significantly reducing the number of selected features and training time while improving accuracy. To the best of our knowledge, this is the first work to categorize Android malware based on both static and dynamic features through a privacy-preserving neural network model.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1570870524001343/pdfft?md5=cd3edd7d953e2457aeaf29ab8a1ac616&pid=1-s2.0-S1570870524001343-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140766012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EVRP: A novel geometrical based energy efficient eye vision routing protocol for wireless sensor networks based on the k-means algorithm EVRP:基于 k-means 算法的无线传感器网络新型几何节能眼视觉路由协议
IF 4.8 3区 计算机科学 Q1 Computer Science Pub Date : 2024-04-25 DOI: 10.1016/j.adhoc.2024.103528
Mohamed Abdou , Hanan M. Amer , Mohamed M. Abdelsalam , Abeer T. Khalil

The limited energy source used in wireless sensor networks (WSNs) is a crucial aspect when designing a routing protocol. Developing a routing protocol that tries to maximize energy utilization can significantly improve the system's lifetime and balance energy consumption. A novel geometrical-based energy-efficient routing protocol called "EVRP" is presented in this paper. The Cluster generation process is based on the k-means algorithm for nodes grouping. To choose a cluster head (CH) for each cluster, a cost function is calculated for each node considering factors such as remaining energy level for the node, and the mean distance between the node and its neighbors. In the inter-cluster routing phase, a novel geometrical-based routing protocol is introduced considering factors such as the distance to a base station (BS), remaining energy level, and distance between CHs to find the optimal path between BS and CH. The cluster structure is integrated with direct communication in addition to a dynamic clustering mechanism based on the optimum number of CHs and a load balancing mechanism to reduce the load on CHs near BS. The simulation results demonstrate that in different scenarios, the proposed protocol can significantly increase the network lifetime, network throughput, and network stability by 52 %, 45 %, and 30 % respectively compared with the EECRAIFA protocol and by 100 %, 97.6 %, 64.3 % respectively compared with D2CRP protocol.

在设计路由协议时,无线传感器网络(WSN)中使用的有限能源是一个至关重要的方面。开发一种能最大限度地利用能量的路由协议,能显著提高系统的寿命并平衡能量消耗。本文提出了一种名为 "EVRP "的基于几何的新型节能路由协议。簇的生成过程基于节点分组的 k-means 算法。为了给每个簇选择一个簇头(CH),会为每个节点计算一个成本函数,考虑的因素包括节点的剩余能量水平以及节点与其邻居之间的平均距离。在簇间路由阶段,引入了一种新颖的基于几何的路由协议,考虑了到基站(BS)的距离、剩余能量水平和 CH 之间的距离等因素,以找到 BS 和 CH 之间的最佳路径。除了基于最佳 CH 数量的动态聚类机制和减轻 BS 附近 CH 负荷的负载平衡机制外,簇结构还与直接通信相结合。仿真结果表明,在不同场景下,与 EECRAIFA 协议相比,所提出的协议能显著提高网络寿命、网络吞吐量和网络稳定性,分别提高 52%、45% 和 30%;与 D2CRP 协议相比,能显著提高网络寿命、网络吞吐量和网络稳定性,分别提高 100%、97.6% 和 64.3%。
{"title":"EVRP: A novel geometrical based energy efficient eye vision routing protocol for wireless sensor networks based on the k-means algorithm","authors":"Mohamed Abdou ,&nbsp;Hanan M. Amer ,&nbsp;Mohamed M. Abdelsalam ,&nbsp;Abeer T. Khalil","doi":"10.1016/j.adhoc.2024.103528","DOIUrl":"10.1016/j.adhoc.2024.103528","url":null,"abstract":"<div><p>The limited energy source used in wireless sensor networks (WSNs) is a crucial aspect when designing a routing protocol. Developing a routing protocol that tries to maximize energy utilization can significantly improve the system's lifetime and balance energy consumption. A novel geometrical-based energy-efficient routing protocol called \"EVRP\" is presented in this paper. The Cluster generation process is based on the k-means algorithm for nodes grouping. To choose a cluster head (CH) for each cluster, a cost function is calculated for each node considering factors such as remaining energy level for the node, and the mean distance between the node and its neighbors. In the inter-cluster routing phase, a novel geometrical-based routing protocol is introduced considering factors such as the distance to a base station (BS), remaining energy level, and distance between CHs to find the optimal path between BS and CH. The cluster structure is integrated with direct communication in addition to a dynamic clustering mechanism based on the optimum number of CHs and a load balancing mechanism to reduce the load on CHs near BS. The simulation results demonstrate that in different scenarios, the proposed protocol can significantly increase the network lifetime, network throughput, and network stability by 52 %, 45 %, and 30 % respectively compared with the EECRAIFA protocol and by 100 %, 97.6 %, 64.3 % respectively compared with D2CRP protocol.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140785157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoVCipher: A low-latency lightweight block cipher for internet of vehicles IoVCipher:用于车联网的低延迟轻量级区块密码
IF 4.8 3区 计算机科学 Q1 Computer Science Pub Date : 2024-04-24 DOI: 10.1016/j.adhoc.2024.103524
Xiantong Huang , Lang Li , Hong Zhang , Jinling Yang , Juanli Kuang

The data security of CAN bus system is receiving increasing attention with the rapid development of Internet of Vehicles (IoV). However, traditional ciphers are not the best choice due to the limitations of computation, real-time, and resources of Electronic Control Units in vehicles. Thus, this paper proposes a lightweight block cipher IoVCipher to protect the security of IoV. It is designed focus on the latency and area in round-based architectures (both encryption and decryption) to meet this resource-constrained environments. For this purpose, two S-boxes with low latency and tiny area are constructed in this paper, one involution and one non-involution. Considering the decryption latency, a low latency subkey generation method is designed. In addition, this paper proposes a new extended MISTY structure that makes the encryption and decryption of hardware implementations similar. In comparison to other low-latency lightweight block ciphers such as PRINCE, QARMA, MANTIS and LLLWBC, IoVCipher achieves an effective balance between latency and area in the round-based architecture, and IoVCipher has low latency, low area, and low energy in the fully unrolled architecture. Finally, IoVCipher is implemented on a real-time speed acquisition and encryption testbed to simulate encrypted transmission of real-time speed in a CAN bus environment.

随着车联网(IoV)的快速发展,CAN 总线系统的数据安全性日益受到关注。然而,由于车辆电子控制单元的计算能力、实时性和资源的限制,传统的密码并不是最佳选择。因此,本文提出了一种轻量级区块密码 IoVCipher 来保护 IoV 的安全。它的设计重点是基于回合架构的延迟和面积(包括加密和解密),以满足这种资源受限的环境。为此,本文构建了两个具有低延迟和小面积的 S-box,一个是内卷,另一个是非内卷。考虑到解密延迟,本文设计了一种低延迟子密钥生成方法。此外,本文还提出了一种新的扩展 MISTY 结构,使硬件实现的加密和解密相似。与 PRINCE、QARMA、MANTIS 和 LLLWBC 等其他低延迟轻量级块密码相比,IoVCipher 在基于轮的架构中实现了延迟和面积的有效平衡,在完全展开的架构中,IoVCipher 具有低延迟、低面积和低能耗的特点。最后,IoVCipher 在实时速度采集和加密测试平台上实现,模拟 CAN 总线环境下的实时速度加密传输。
{"title":"IoVCipher: A low-latency lightweight block cipher for internet of vehicles","authors":"Xiantong Huang ,&nbsp;Lang Li ,&nbsp;Hong Zhang ,&nbsp;Jinling Yang ,&nbsp;Juanli Kuang","doi":"10.1016/j.adhoc.2024.103524","DOIUrl":"https://doi.org/10.1016/j.adhoc.2024.103524","url":null,"abstract":"<div><p>The data security of CAN bus system is receiving increasing attention with the rapid development of Internet of Vehicles (IoV). However, traditional ciphers are not the best choice due to the limitations of computation, real-time, and resources of Electronic Control Units in vehicles. Thus, this paper proposes a lightweight block cipher IoVCipher to protect the security of IoV. It is designed focus on the latency and area in round-based architectures (both encryption and decryption) to meet this resource-constrained environments. For this purpose, two S-boxes with low latency and tiny area are constructed in this paper, one involution and one non-involution. Considering the decryption latency, a low latency subkey generation method is designed. In addition, this paper proposes a new extended MISTY structure that makes the encryption and decryption of hardware implementations similar. In comparison to other low-latency lightweight block ciphers such as PRINCE, QARMA, MANTIS and LLLWBC, IoVCipher achieves an effective balance between latency and area in the round-based architecture, and IoVCipher has low latency, low area, and low energy in the fully unrolled architecture. Finally, IoVCipher is implemented on a real-time speed acquisition and encryption testbed to simulate encrypted transmission of real-time speed in a CAN bus environment.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140650289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TICPS: A trustworthy collaborative intrusion detection framework for industrial cyber–physical systems TICPS:工业网络物理系统可信协作入侵检测框架
IF 4.8 3区 计算机科学 Q1 Computer Science Pub Date : 2024-04-21 DOI: 10.1016/j.adhoc.2024.103517
Lingzi Zhu , Bo Zhao , Weidong Li , Yixuan Wang , Yang An

The networking of industrial cyber–physical systems (CPS) introduces increased security vulnerabilities, necessitating advanced intrusion detection systems (IDS). Many current studies aiming to enhance IDS capabilities leverage Federated Learning (FL) technology for collaborative intrusion detection. However, devices deployed in an industrial setting in a distributed manner are vulnerable to cyber and poisoning attacks. Compromised clients can create malicious parameters to disrupt intrusion detection models, making them ineffective in identifying attacks. Nevertheless, existing FL-based intrusion detection methods exhibit suboptimal performance in detecting malicious clients and resisting poisoning attacks. To address these issues, we propose TICPS, a collaborative intrusion detection framework based on a trustworthy model update strategy to detect cyber threats from industrial CPS. The framework enables multiple industrial CPS to collaboratively construct an intrusion detection model and evaluate the security of each industrial CPS node using an update evaluation mechanism, ensuring effective intrusion detection even in the presence of poisoning. Extensive experiments on real-world industrial CPS datasets demonstrate that TICPS can effectively detect various types of cyber threats targeting industrial CPS. In particular, the framework achieves an intrusion detection accuracy of 94% even when the proportion of malicious agents reaches 80% under three typical poisoning attacks.

工业网络物理系统(CPS)的联网增加了安全漏洞,因此需要先进的入侵检测系统(IDS)。目前,许多旨在增强 IDS 功能的研究都利用了联盟学习(FL)技术来进行协同入侵检测。然而,以分布式方式部署在工业环境中的设备很容易受到网络攻击和中毒攻击。受攻击的客户端可以创建恶意参数来破坏入侵检测模型,使其无法有效识别攻击。然而,现有的基于 FL 的入侵检测方法在检测恶意客户端和抵御中毒攻击方面表现不佳。为了解决这些问题,我们提出了基于可信模型更新策略的协同入侵检测框架 TICPS,以检测来自工业 CPS 的网络威胁。该框架可使多个工业 CPS 协作构建入侵检测模型,并利用更新评估机制评估每个工业 CPS 节点的安全性,从而确保即使在存在中毒的情况下也能进行有效的入侵检测。在实际工业 CPS 数据集上进行的大量实验证明,TICPS 可以有效检测到针对工业 CPS 的各类网络威胁。特别是,在三种典型的中毒攻击下,即使恶意代理的比例达到 80%,该框架的入侵检测准确率也能达到 94%。
{"title":"TICPS: A trustworthy collaborative intrusion detection framework for industrial cyber–physical systems","authors":"Lingzi Zhu ,&nbsp;Bo Zhao ,&nbsp;Weidong Li ,&nbsp;Yixuan Wang ,&nbsp;Yang An","doi":"10.1016/j.adhoc.2024.103517","DOIUrl":"https://doi.org/10.1016/j.adhoc.2024.103517","url":null,"abstract":"<div><p>The networking of industrial cyber–physical systems (CPS) introduces increased security vulnerabilities, necessitating advanced intrusion detection systems (IDS). Many current studies aiming to enhance IDS capabilities leverage Federated Learning (FL) technology for collaborative intrusion detection. However, devices deployed in an industrial setting in a distributed manner are vulnerable to cyber and poisoning attacks. Compromised clients can create malicious parameters to disrupt intrusion detection models, making them ineffective in identifying attacks. Nevertheless, existing FL-based intrusion detection methods exhibit suboptimal performance in detecting malicious clients and resisting poisoning attacks. To address these issues, we propose TICPS, a collaborative intrusion detection framework based on a trustworthy model update strategy to detect cyber threats from industrial CPS. The framework enables multiple industrial CPS to collaboratively construct an intrusion detection model and evaluate the security of each industrial CPS node using an update evaluation mechanism, ensuring effective intrusion detection even in the presence of poisoning. Extensive experiments on real-world industrial CPS datasets demonstrate that TICPS can effectively detect various types of cyber threats targeting industrial CPS. In particular, the framework achieves an intrusion detection accuracy of 94% even when the proportion of malicious agents reaches 80% under three typical poisoning attacks.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140650288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-objective path planning for multi-UAV connectivity and area coverage 多目标路径规划,实现多无人机连接和区域覆盖
IF 4.8 3区 计算机科学 Q1 Computer Science Pub Date : 2024-04-21 DOI: 10.1016/j.adhoc.2024.103520
İslam Güven, Evşen Yanmaz

In this paper, we assume that a team of drones equipped with sensing and networking capabilities explore an unknown area via onboard sensors for surveillance, monitoring, target search or data collection purposes and deliver the sensed data to a ground control station (GCS) over multi-hop links. We propose a multi-drone path planner that jointly optimizes area coverage time and connectivity among the drones. We propose a novel connectivity metric that includes not only percentage connectivity of the drones to GCS, but also the maximum duration of consecutive time that the drones are disconnected from the GCS. To solve this optimization formulation, we propose a multi-objective evolutionary algorithm with novel operations. We use our solver to test single, two and many objective path planning problems and compare our Pareto-optimal solutions to benchmark weighted-sum based solutions. We show that as opposed to the single solution that weighted-sum methods provide based on prior information from the user, the proposed evolutionary multi-objective optimizers can provide a diverse set of solutions that cover a range of mission time and connectivity performance illustrating the trade-off between these conflicting objectives. The end-user can then choose the best path solution based on the mission priorities during operation.

在本文中,我们假设一队配备传感和网络功能的无人机通过机载传感器探索一个未知区域,以达到监视、监测、目标搜索或数据收集的目的,并通过多跳链路将传感数据传送到地面控制站(GCS)。我们提出了一种多无人机路径规划器,可共同优化区域覆盖时间和无人机之间的连通性。我们提出了一种新的连接性指标,其中不仅包括无人机与地面控制站的连接百分比,还包括无人机与地面控制站断开连接的最长连续时间。为了解决这一优化方案,我们提出了一种具有新颖操作的多目标进化算法。我们使用我们的求解器测试了单目标、双目标和多目标路径规划问题,并将我们的帕累托最优解与基于加权求和的基准解进行了比较。我们的研究表明,与加权求和方法根据用户的先验信息提供的单一解决方案不同,所提出的进化多目标优化器可以提供一系列不同的解决方案,这些解决方案涵盖了任务时间和连接性能的范围,说明了这些相互冲突的目标之间的权衡。然后,终端用户可以在运行过程中根据任务优先级选择最佳路径解决方案。
{"title":"Multi-objective path planning for multi-UAV connectivity and area coverage","authors":"İslam Güven,&nbsp;Evşen Yanmaz","doi":"10.1016/j.adhoc.2024.103520","DOIUrl":"https://doi.org/10.1016/j.adhoc.2024.103520","url":null,"abstract":"<div><p>In this paper, we assume that a team of drones equipped with sensing and networking capabilities explore an unknown area via onboard sensors for surveillance, monitoring, target search or data collection purposes and deliver the sensed data to a ground control station (GCS) over multi-hop links. We propose a multi-drone path planner that jointly optimizes area coverage time and connectivity among the drones. We propose a novel connectivity metric that includes not only percentage connectivity of the drones to GCS, but also the maximum duration of consecutive time that the drones are disconnected from the GCS. To solve this optimization formulation, we propose a multi-objective evolutionary algorithm with novel operations. We use our solver to test single, two and many objective path planning problems and compare our Pareto-optimal solutions to benchmark weighted-sum based solutions. We show that as opposed to the single solution that weighted-sum methods provide based on prior information from the user, the proposed evolutionary multi-objective optimizers can provide a diverse set of solutions that cover a range of mission time and connectivity performance illustrating the trade-off between these conflicting objectives. The end-user can then choose the best path solution based on the mission priorities during operation.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140816242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Voronoi diagrams and tree structures in HRP-EE: Enhancing IoT network lifespan with WSNs HRP-EE 中的 Voronoi 图和树结构:利用 WSN 增强物联网网络寿命
IF 4.8 3区 计算机科学 Q1 Computer Science Pub Date : 2024-04-20 DOI: 10.1016/j.adhoc.2024.103518
Van-Hau Nguyen, Nguyen Duy Tan

Within the domain of the Internet of Things (IoT), wireless sensor networks (WSNs) play a pivotal role, facilitating advancements in sectors such as smart urban infrastructures, intelligent healthcare systems, and residential automation. Despite their versatility, WSNs grapple with challenges like limited energy reserves and constrained computational capacities, making energy conservation a paramount concern for IoT deployments underpinned by WSNs. This study introduces the Hybrid Routing Protocol for Efficient Energy (HRP-EE) designed to enhance the operational efficiency of WSNs. The HRP-EE protocol unfolds over three meticulous stages: the selection of cluster heads, the formation of clusters, and the establishment of routing pathways. Initially, the protocol evaluates nodes based on their residual energy and their Euclidean distance to the central sink (or gateway) device to designate apt cluster heads. Subsequently, these chosen cluster heads are integrated into the Voronoi diagram as central nodes to orchestrate cluster architectures. In the terminal stage, an innovative hybrid algorithm is instituted. This algorithm amalgamates the principles of the Minimum Spanning Tree for structuring intra-cluster communication trees and Dijkstra’s algorithm to ascertain the most efficient paths for inter-cluster data transmission from cluster heads to the sink device. The primary objective of this protocol is the judicious utilization of the sensor nodes’ energy, thereby optimizing the overall network longevity. To assess the proficiency of HRP-EE, we executed a series of simulations using NS2. Comparative analyses reveal that HRP-EE outperforms existing protocols such as LEACH-VA, PEGCP, and TBC, delivering superior energy efficiency, extended network lifespan, and enhanced throughput across both homogeneous and heterogeneous network architectures.

在物联网(IoT)领域,无线传感器网络(WSN)发挥着举足轻重的作用,促进了智能城市基础设施、智能医疗系统和住宅自动化等领域的进步。尽管 WSN 具有多功能性,但它也面临着能源储备有限、计算能力受限等挑战,因此节能是 WSN 物联网部署的首要问题。本研究介绍了旨在提高 WSN 运行效率的高效能源混合路由协议(HRP-EE)。HRP-EE 协议分为三个细致的阶段:簇头的选择、簇的形成和路由路径的建立。起初,该协议根据节点的剩余能量及其与中心 sink(或网关)设备的欧氏距离对节点进行评估,以指定合适的簇头。随后,这些选定的簇头作为中心节点被集成到沃罗诺图中,以协调簇群架构。在最后阶段,采用了一种创新的混合算法。该算法融合了最小生成树(Minimum Spanning Tree)的原理,用于构建簇内通信树,以及迪克斯特拉算法(Dijkstra's algorithm)的原理,以确定从簇头到汇接设备的簇间数据传输的最有效路径。该协议的主要目标是合理利用传感器节点的能量,从而优化整个网络的寿命。为了评估 HRP-EE 的能力,我们使用 NS2 进行了一系列模拟。对比分析表明,HRP-EE 优于 LEACH-VA、PEGCP 和 TBC 等现有协议,在同构和异构网络架构中都能提供卓越的能效、延长网络寿命并提高吞吐量。
{"title":"Voronoi diagrams and tree structures in HRP-EE: Enhancing IoT network lifespan with WSNs","authors":"Van-Hau Nguyen,&nbsp;Nguyen Duy Tan","doi":"10.1016/j.adhoc.2024.103518","DOIUrl":"10.1016/j.adhoc.2024.103518","url":null,"abstract":"<div><p>Within the domain of the Internet of Things (IoT), wireless sensor networks (WSNs) play a pivotal role, facilitating advancements in sectors such as smart urban infrastructures, intelligent healthcare systems, and residential automation. Despite their versatility, WSNs grapple with challenges like limited energy reserves and constrained computational capacities, making energy conservation a paramount concern for IoT deployments underpinned by WSNs. This study introduces the Hybrid Routing Protocol for Efficient Energy (HRP-EE) designed to enhance the operational efficiency of WSNs. The HRP-EE protocol unfolds over three meticulous stages: the selection of cluster heads, the formation of clusters, and the establishment of routing pathways. Initially, the protocol evaluates nodes based on their residual energy and their Euclidean distance to the central sink (or gateway) device to designate apt cluster heads. Subsequently, these chosen cluster heads are integrated into the Voronoi diagram as central nodes to orchestrate cluster architectures. In the terminal stage, an innovative hybrid algorithm is instituted. This algorithm amalgamates the principles of the Minimum Spanning Tree for structuring intra-cluster communication trees and Dijkstra’s algorithm to ascertain the most efficient paths for inter-cluster data transmission from cluster heads to the sink device. The primary objective of this protocol is the judicious utilization of the sensor nodes’ energy, thereby optimizing the overall network longevity. To assess the proficiency of HRP-EE, we executed a series of simulations using NS2. Comparative analyses reveal that HRP-EE outperforms existing protocols such as LEACH-VA, PEGCP, and TBC, delivering superior energy efficiency, extended network lifespan, and enhanced throughput across both homogeneous and heterogeneous network architectures.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140775630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimizing UAV-UGV coalition operations: A hybrid clustering and multi-agent reinforcement learning approach for path planning in obstructed environment 优化 UAV-UGV 联军行动:用于障碍环境中路径规划的混合聚类和多代理强化学习方法
IF 4.8 3区 计算机科学 Q1 Computer Science Pub Date : 2024-04-17 DOI: 10.1016/j.adhoc.2024.103519
Shamyo Brotee , Farhan Kabir , Md. Abdur Razzaque , Palash Roy , Md. Mamun-Or-Rashid , Md. Rafiul Hassan , Mohammad Mehedi Hassan

One of the most critical applications undertaken by Unmanned Aerial Vehicles (UAVs) and Unmanned Ground Vehicles (UGVs) is reaching predefined targets by following the most time-efficient routes while avoiding collisions. Unfortunately, UAVs are hampered by limited battery life, and UGVs face challenges in reachability due to obstacles and elevation variations, which is why a coalition of UAVs and UGVs can be highly effective. Existing literature primarily focuses on one-to-one coalitions, which constrains the efficiency of reaching targets. In this work, we introduce a novel approach for a UAV-UGV coalition with a variable number of vehicles, employing a modified mean-shift clustering algorithm (MEANCRFT) to segment targets into multiple zones. This approach of assigning targets to various circular zones based on density and range significantly reduces the time required to reach these targets. Moreover, introducing variability in the number of UAVs and UGVs in a coalition enhances task efficiency by enabling simultaneous multi-target engagement. In our approach, each vehicle of the coalitions is trained using two advanced deep reinforcement learning algorithms in two separate experiments, namely Multi-agent Deep Deterministic Policy Gradient (MADDPG) and Multi-agent Proximal Policy Optimization (MAPPO). The results of our experimental evaluation demonstrate that the proposed MEANCRFT-MADDPG method substantially surpasses current state-of-the-art techniques, nearly doubling efficiency in terms of target navigation time and task completion rate.

无人驾驶飞行器(UAV)和无人驾驶地面飞行器(UGV)最关键的应用之一是按照最省时的路线到达预定目标,同时避免碰撞。遗憾的是,UAV 受限于有限的电池寿命,而 UGV 则面临着障碍物和海拔高度变化带来的可到达性挑战,这就是为什么 UAV 和 UGV 的联合能够发挥巨大作用。现有文献主要关注一对一联盟,这限制了到达目标的效率。在这项工作中,我们为车辆数量可变的无人机-无人潜航器联盟引入了一种新方法,即采用改进的均值移动聚类算法(MEANCRFT)将目标划分为多个区域。这种根据密度和距离将目标分配到不同圆形区域的方法大大缩短了到达这些目标所需的时间。此外,引入联盟中 UAV 和 UGV 数量的可变性,可同时与多目标交战,从而提高任务效率。在我们的方法中,联盟中的每个飞行器都在两个独立的实验中使用两种先进的深度强化学习算法进行训练,即多代理深度确定性策略梯度(MADDPG)和多代理近端策略优化(MAPPO)。我们的实验评估结果表明,所提出的 MEANCRFT-MADDPG 方法大大超越了目前最先进的技术,在目标导航时间和任务完成率方面的效率几乎翻了一番。
{"title":"Optimizing UAV-UGV coalition operations: A hybrid clustering and multi-agent reinforcement learning approach for path planning in obstructed environment","authors":"Shamyo Brotee ,&nbsp;Farhan Kabir ,&nbsp;Md. Abdur Razzaque ,&nbsp;Palash Roy ,&nbsp;Md. Mamun-Or-Rashid ,&nbsp;Md. Rafiul Hassan ,&nbsp;Mohammad Mehedi Hassan","doi":"10.1016/j.adhoc.2024.103519","DOIUrl":"https://doi.org/10.1016/j.adhoc.2024.103519","url":null,"abstract":"<div><p>One of the most critical applications undertaken by Unmanned Aerial Vehicles (UAVs) and Unmanned Ground Vehicles (UGVs) is reaching predefined targets by following the most time-efficient routes while avoiding collisions. Unfortunately, UAVs are hampered by limited battery life, and UGVs face challenges in reachability due to obstacles and elevation variations, which is why a coalition of UAVs and UGVs can be highly effective. Existing literature primarily focuses on one-to-one coalitions, which constrains the efficiency of reaching targets. In this work, we introduce a novel approach for a UAV-UGV coalition with a variable number of vehicles, employing a modified mean-shift clustering algorithm (MEANCRFT) to segment targets into multiple zones. This approach of assigning targets to various circular zones based on density and range significantly reduces the time required to reach these targets. Moreover, introducing variability in the number of UAVs and UGVs in a coalition enhances task efficiency by enabling simultaneous multi-target engagement. In our approach, each vehicle of the coalitions is trained using two advanced deep reinforcement learning algorithms in two separate experiments, namely Multi-agent Deep Deterministic Policy Gradient (MADDPG) and Multi-agent Proximal Policy Optimization (MAPPO). The results of our experimental evaluation demonstrate that the proposed MEANCRFT-MADDPG method substantially surpasses current state-of-the-art techniques, nearly doubling efficiency in terms of target navigation time and task completion rate.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140631556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy-security oriented chaotic compressed sensing data collection in edge-assisted mobile crowd sensing 边缘辅助移动人群感知中以隐私安全为导向的混沌压缩感知数据采集
IF 4.8 3区 计算机科学 Q1 Computer Science Pub Date : 2024-04-17 DOI: 10.1016/j.adhoc.2024.103507
Yanming Fu , Bocheng Huang , Lin Li , Jiayuan Chen , Wei Wei

As a data-centric network, the Mobile Crowd Sensing (MCS) collects and uploads sensing data through intelligent terminal devices carried by workers. However, due to resource limitations, the confidentiality, integrity and communication cost issues of sensing data have not been well coordinated and resolved in the actual MCS data collection process. In this regard, this paper proposes an edge computing-assisted MCS Chaotic Compressed Sensing Secure Data Collection scheme (CCS-SDC), which supports the secure collection of sensing data and saves communication cost. In CCS-SDC, workers first use the encryption algorithm based on chaos theory to encrypt the collected sensing data, and then adopt the hash location algorithm based on chaos theory to calculate the corresponding hash verification code of the sensing data. After receiving the encrypted sensing data transmitted by the worker, the edge server recomputes the hash verification code of the encrypted sensing data and verifies the integrity of the data, which can locate the changed sensing task data to a certain extent. Then the sensing data is compressed and sampled based on the generated chaos measurement matrix to reduce the amount of data transmission and further enhance the confidentiality of the sensing data. In addition, the same hash positioning algorithm is used between the edge server and the sensing platform to protect data integrity. For the changed data located by integrity verification, in addition to choosing to let workers re-sense and submit, the sensing platform can also choose to discard the changed sensing data under appropriate circumstances, and still reconstruct and decrypt the remaining data through the proposed algorithm to obtain effective original sensing data. The experimental evaluation results on real data sets show that CCS-SDC achieves the best effects, not only achieving lower sensing data communication cost than other related schemes, but also better protecting the confidentiality and integrity of sensing data, which is very useful for resource-constrained MCS data collection scenarios.

作为一种以数据为中心的网络,移动人群感知(MCS)通过工作人员携带的智能终端设备收集和上传感知数据。然而,由于资源的限制,在实际的 MCS 数据收集过程中,感知数据的保密性、完整性和通信成本问题并没有得到很好的协调和解决。为此,本文提出了一种边缘计算辅助的 MCS 混沌压缩传感安全数据采集方案(CCS-SDC),既支持传感数据的安全采集,又节省了通信成本。在 CCS-SDC 中,工作人员首先使用基于混沌理论的加密算法对收集到的传感数据进行加密,然后采用基于混沌理论的哈希定位算法计算传感数据对应的哈希验证码。边缘服务器接收到工作者传输的加密感知数据后,重新计算加密感知数据的哈希验证码,并验证数据的完整性,这样就能在一定程度上定位变化后的感知任务数据。然后根据生成的混沌测量矩阵对传感数据进行压缩和采样,以减少数据传输量,进一步提高传感数据的保密性。此外,边缘服务器和传感平台之间采用相同的哈希定位算法来保护数据完整性。对于通过完整性验证定位到的变更数据,除了选择让工作人员重新感测并提交外,感测平台还可以在适当的情况下选择丢弃变更后的感测数据,仍然通过提出的算法对剩余数据进行重构和解密,从而获得有效的原始感测数据。在真实数据集上的实验评估结果表明,CCS-SDC 的效果最佳,不仅实现了比其他相关方案更低的感知数据通信成本,而且更好地保护了感知数据的机密性和完整性,对于资源受限的 MCS 数据采集场景非常有用。
{"title":"Privacy-security oriented chaotic compressed sensing data collection in edge-assisted mobile crowd sensing","authors":"Yanming Fu ,&nbsp;Bocheng Huang ,&nbsp;Lin Li ,&nbsp;Jiayuan Chen ,&nbsp;Wei Wei","doi":"10.1016/j.adhoc.2024.103507","DOIUrl":"https://doi.org/10.1016/j.adhoc.2024.103507","url":null,"abstract":"<div><p>As a data-centric network, the Mobile Crowd Sensing (MCS) collects and uploads sensing data through intelligent terminal devices carried by workers. However, due to resource limitations, the confidentiality, integrity and communication cost issues of sensing data have not been well coordinated and resolved in the actual MCS data collection process. In this regard, this paper proposes an edge computing-assisted MCS Chaotic Compressed Sensing Secure Data Collection scheme (CCS-SDC), which supports the secure collection of sensing data and saves communication cost. In CCS-SDC, workers first use the encryption algorithm based on chaos theory to encrypt the collected sensing data, and then adopt the hash location algorithm based on chaos theory to calculate the corresponding hash verification code of the sensing data. After receiving the encrypted sensing data transmitted by the worker, the edge server recomputes the hash verification code of the encrypted sensing data and verifies the integrity of the data, which can locate the changed sensing task data to a certain extent. Then the sensing data is compressed and sampled based on the generated chaos measurement matrix to reduce the amount of data transmission and further enhance the confidentiality of the sensing data. In addition, the same hash positioning algorithm is used between the edge server and the sensing platform to protect data integrity. For the changed data located by integrity verification, in addition to choosing to let workers re-sense and submit, the sensing platform can also choose to discard the changed sensing data under appropriate circumstances, and still reconstruct and decrypt the remaining data through the proposed algorithm to obtain effective original sensing data. The experimental evaluation results on real data sets show that CCS-SDC achieves the best effects, not only achieving lower sensing data communication cost than other related schemes, but also better protecting the confidentiality and integrity of sensing data, which is very useful for resource-constrained MCS data collection scenarios.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140620889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Ad Hoc Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1