Pub Date : 2024-07-24DOI: 10.1016/j.adhoc.2024.103602
Yuan He, Jun Xie, Guyu Hu, Yaqun Liu, Xijian Luo
In emergency rescue, target search and other mission scenarios with Unmanned Aerial Vehicles (UAVs), the Relay UAVs (RUs) and Mission UAVs (MUs) can collaborate to accomplish tasks in unknown environments. In this paper, we investigate the problem of trajectory planning and power control for the MU and RU collaboration. Firstly, considering the characteristics of multi-hop data transmission between the MU and Ground Control Station, a multi-UAV collaborative coverage model is designed. Meanwhile, a UAV control algorithm named MUTTO is proposed based on multi-agent reinforcement learning. In order to solve the problem of the unknown information about the number and locations of targets, the geographic coverage rate is used to replace the target coverage rate for decision making. Then, the reward functions of two types of UAVs are designed separately for the purpose of better cooperation. By simultaneously planning the trajectory and transmission power of the RU and MU, the mission target coverage rate and network transmission rate are maximized while the energy consumption of the UAV is minimized. Finally, numerical simulations results show that MUTTO can solve the UAV network control problem in an efficient way and has better performance than the benchmark method.
在使用无人飞行器(UAV)执行紧急救援、目标搜索等任务时,中继无人飞行器(RU)和任务无人飞行器(MU)可以协同完成未知环境中的任务。本文研究了 MU 和 RU 协作的轨迹规划和功率控制问题。首先,考虑到 MU 与地面控制站之间多跳数据传输的特点,设计了多无人机协作覆盖模型。同时,提出了基于多代理强化学习的无人机控制算法 MUTTO。为了解决目标数量和位置信息未知的问题,用地理覆盖率代替目标覆盖率进行决策。然后,为了更好地合作,分别设计了两种无人机的奖励函数。通过同时规划 RU 和 MU 的轨迹和发射功率,使任务目标覆盖率和网络传输率最大化,同时使无人机的能耗最小化。最后,数值模拟结果表明,MUTTO 可以高效地解决无人机网络控制问题,其性能优于基准方法。
{"title":"Joint optimization of communication and mission performance for multi-UAV collaboration network: A multi-agent reinforcement learning method","authors":"Yuan He, Jun Xie, Guyu Hu, Yaqun Liu, Xijian Luo","doi":"10.1016/j.adhoc.2024.103602","DOIUrl":"10.1016/j.adhoc.2024.103602","url":null,"abstract":"<div><p>In emergency rescue, target search and other mission scenarios with Unmanned Aerial Vehicles (UAVs), the Relay UAVs (RUs) and Mission UAVs (MUs) can collaborate to accomplish tasks in unknown environments. In this paper, we investigate the problem of trajectory planning and power control for the MU and RU collaboration. Firstly, considering the characteristics of multi-hop data transmission between the MU and Ground Control Station, a multi-UAV collaborative coverage model is designed. Meanwhile, a UAV control algorithm named MUTTO is proposed based on multi-agent reinforcement learning. In order to solve the problem of the unknown information about the number and locations of targets, the geographic coverage rate is used to replace the target coverage rate for decision making. Then, the reward functions of two types of UAVs are designed separately for the purpose of better cooperation. By simultaneously planning the trajectory and transmission power of the RU and MU, the mission target coverage rate and network transmission rate are maximized while the energy consumption of the UAV is minimized. Finally, numerical simulations results show that MUTTO can solve the UAV network control problem in an efficient way and has better performance than the benchmark method.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"164 ","pages":"Article 103602"},"PeriodicalIF":4.4,"publicationDate":"2024-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141840299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-23DOI: 10.1016/j.adhoc.2024.103606
Neeraj Kumar, Rifaqat Ali
Nanotechnology has recently emerged as a pivotal field with wide-ranging implications. Its integration into the 6G-enabled Internet of Things (IoT) has given rise to the 6G-enabled IoNT (Internet of Nano Things) paradigm, impacting sectors such as healthcare, industries, smart homes, aerospace, and defense. This technology offers opportunities to revolutionize existing methodologies and enhance efficiency. Research efforts are now focusing on developing secure, scalable network infrastructures tailored for the healthcare sector at the nanoscale, leading to the concept of the Internet of Nano Medical Things (IoNMT). However, the unique characteristics of nanotechnology pose security challenges, particularly concerning privacy, confidentiality, dependability, latency, and the expensive consequences of blockchain-based storage. Authentication and transparency are vital for ensuring secure data handling in IoNMT networks, necessitating a secure access mechanism resistant to unauthorized interference. To tackle these challenges, this study proposes a smart contract-based authentication protocol developed specifically for 6G-IoNMT networks. The framework aims to manage real-time information with minimal latency through decentralized peer-to-peer cloud servers while addressing security and privacy concerns. Thorough security and privacy assessments, including ROR model evaluations, Scyther tool analysis, and informal security evaluations, validate the protocol’s effectiveness. Moreover, the simulation highlights that this protocol offers superior security and efficiency as well as energy consumption compared to existing protocols.
{"title":"A smart contract-based 6G-enabled authentication scheme for securing Internet of Nano Medical Things network","authors":"Neeraj Kumar, Rifaqat Ali","doi":"10.1016/j.adhoc.2024.103606","DOIUrl":"10.1016/j.adhoc.2024.103606","url":null,"abstract":"<div><p>Nanotechnology has recently emerged as a pivotal field with wide-ranging implications. Its integration into the 6G-enabled Internet of Things (IoT) has given rise to the 6G-enabled IoNT (Internet of Nano Things) paradigm, impacting sectors such as healthcare, industries, smart homes, aerospace, and defense. This technology offers opportunities to revolutionize existing methodologies and enhance efficiency. Research efforts are now focusing on developing secure, scalable network infrastructures tailored for the healthcare sector at the nanoscale, leading to the concept of the Internet of Nano Medical Things (IoNMT). However, the unique characteristics of nanotechnology pose security challenges, particularly concerning privacy, confidentiality, dependability, latency, and the expensive consequences of blockchain-based storage. Authentication and transparency are vital for ensuring secure data handling in IoNMT networks, necessitating a secure access mechanism resistant to unauthorized interference. To tackle these challenges, this study proposes a smart contract-based authentication protocol developed specifically for 6G-IoNMT networks. The framework aims to manage real-time information with minimal latency through decentralized peer-to-peer cloud servers while addressing security and privacy concerns. Thorough security and privacy assessments, including ROR model evaluations, Scyther tool analysis, and informal security evaluations, validate the protocol’s effectiveness. Moreover, the simulation highlights that this protocol offers superior security and efficiency as well as energy consumption compared to existing protocols.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"163 ","pages":"Article 103606"},"PeriodicalIF":4.4,"publicationDate":"2024-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141853704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-23DOI: 10.1016/j.adhoc.2024.103605
Haoran Wang , Jinglin Li , Wendong Xiao
Wireless power transfer (WPT) provides a promising technology for energy replenishment of wireless rechargeable sensor networks (WRSNs), where wireless chargers can be deployed at fixed locations for charging nodes simultaneously within their effective charging range. Optimal charger placement (OCP) for sustainable operations of WRSN with cheaper charging cost is a challenging and difficult problem due to its NP-completeness in nature. This paper proposes a novel reinforcement learning (RL) based approach for OCP, where the problem is firstly formulated as a charging cluster determination problem with a fixed clustering radius and then tackled by the reinforcement learning-based charging cluster determination (RL-CCD) algorithm. Specifically, nodes are coarsely clustered by the K-Means++ algorithm, with chargers placed at the cluster center. Meanwhile, RL is applied to explore the potential locations of the cluster centers to adjust the center locations and reduce the number of clusters, using the number of nodes in the cluster and the summation of distances between the cluster center and nodes as the reward. Moreover, an experience-strengthening mechanism is introduced to learn the current optimal charging experience. Extensive simulations show that RL-CCD significantly outperforms existing algorithms.
{"title":"Reinforcement learning-based charging cluster determination algorithm for optimal charger placement in wireless rechargeable sensor networks","authors":"Haoran Wang , Jinglin Li , Wendong Xiao","doi":"10.1016/j.adhoc.2024.103605","DOIUrl":"10.1016/j.adhoc.2024.103605","url":null,"abstract":"<div><p>Wireless power transfer (WPT) provides a promising technology for energy replenishment of wireless rechargeable sensor networks (WRSNs), where wireless chargers can be deployed at fixed locations for charging nodes simultaneously within their effective charging range. Optimal charger placement (OCP) for sustainable operations of WRSN with cheaper charging cost is a challenging and difficult problem due to its NP-completeness in nature. This paper proposes a novel reinforcement learning (RL) based approach for OCP, where the problem is firstly formulated as a charging cluster determination problem with a fixed clustering radius and then tackled by the reinforcement learning-based charging cluster determination (RL-CCD) algorithm. Specifically, nodes are coarsely clustered by the K-Means++ algorithm, with chargers placed at the cluster center. Meanwhile, RL is applied to explore the potential locations of the cluster centers to adjust the center locations and reduce the number of clusters, using the number of nodes in the cluster and the summation of distances between the cluster center and nodes as the reward. Moreover, an experience-strengthening mechanism is introduced to learn the current optimal charging experience. Extensive simulations show that RL-CCD significantly outperforms existing algorithms.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"164 ","pages":"Article 103605"},"PeriodicalIF":4.4,"publicationDate":"2024-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141842640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-22DOI: 10.1016/j.adhoc.2024.103607
Kranthi Kumar Singamaneni , Ghulam Muhammad
The fast advancement of quantum computing poses a substantial challenge to the privacy and security of critical scientific research data. This is because the standard cryptography methods, which have been proven effective in classical computers, are rendered less secure in the face of quantum computing approaches. Previously, numerous endeavors have been made to safeguard confidential information through the utilization of different standards and quantum cryptographic methods. However, there remains a research void with several challenges and limitations, including excessive computational burden, vulnerability to various attacks, and limited hardware compatibility for implementation. We propose a modern hybrid cryptographical approach to secure sensitive data from various attacks and vulnerabilities to address the existing limitations. The suggested standard integrates traditional cryptographic standards with quantum-resistant standards to boost sensitive scientific data privacy and security and address various classical cyber-attacks and critical quantum attacks. For the context of scientific data privacy and security, our work depicts a hybrid standard structure by performing a systematic exploration of current encipherment model challenges and issues such as the investigation of various susceptibilities of mathematical cryptographic models. In this work, we apply lattice-based coding as the outer layer and Advanced Encryption Standard (AES) as the inner layer to improve security and efficacy. The proposed security theorem launches the operational veracity of lattice-based coding in the face of quantum attacks, while a complete investigation of the proposed algorithm efficacy vitrines the enhanced security and scalability of the anticipated hybrid standard transversely diverse input sensitive data volumes. Furthermore, this proposed work offers the security confidence score of the hybrid model by the amalgamation of AES and lattice-based cryptography (LBC), hence guaranteeing strength next to both quantum and traditional computing weaknesses. The investigational results prove the improved efficiency of the proposed hybrid model in contrast to traditional and past quantum-resistant models.
{"title":"A novel integrated quantum-resistant cryptography for secure scientific data exchange in ad hoc networks","authors":"Kranthi Kumar Singamaneni , Ghulam Muhammad","doi":"10.1016/j.adhoc.2024.103607","DOIUrl":"10.1016/j.adhoc.2024.103607","url":null,"abstract":"<div><p>The fast advancement of quantum computing poses a substantial challenge to the privacy and security of critical scientific research data. This is because the standard cryptography methods, which have been proven effective in classical computers, are rendered less secure in the face of quantum computing approaches. Previously, numerous endeavors have been made to safeguard confidential information through the utilization of different standards and quantum cryptographic methods. However, there remains a research void with several challenges and limitations, including excessive computational burden, vulnerability to various attacks, and limited hardware compatibility for implementation. We propose a modern hybrid cryptographical approach to secure sensitive data from various attacks and vulnerabilities to address the existing limitations. The suggested standard integrates traditional cryptographic standards with quantum-resistant standards to boost sensitive scientific data privacy and security and address various classical cyber-attacks and critical quantum attacks. For the context of scientific data privacy and security, our work depicts a hybrid standard structure by performing a systematic exploration of current encipherment model challenges and issues such as the investigation of various susceptibilities of mathematical cryptographic models. In this work, we apply lattice-based coding as the outer layer and Advanced Encryption Standard (AES) as the inner layer to improve security and efficacy. The proposed security theorem launches the operational veracity of lattice-based coding in the face of quantum attacks, while a complete investigation of the proposed algorithm efficacy vitrines the enhanced security and scalability of the anticipated hybrid standard transversely diverse input sensitive data volumes. Furthermore, this proposed work offers the security confidence score of the hybrid model by the amalgamation of AES and lattice-based cryptography (LBC), hence guaranteeing strength next to both quantum and traditional computing weaknesses. The investigational results prove the improved efficiency of the proposed hybrid model in contrast to traditional and past quantum-resistant models.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"164 ","pages":"Article 103607"},"PeriodicalIF":4.4,"publicationDate":"2024-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141848909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-20DOI: 10.1016/j.adhoc.2024.103603
Santiago García-Gil, Juan Manuel Murillo, Jaime Galán-Jiménez
Latency is a critical aspect for a broad spectrum of applications that relies on the internet, such as, voice over IP (VoIP) or teleconferencing, and the lack of ultra-fast and highly reliable communications is prominent in rural areas even in mature economies. Our proposal focuses on optimizing the deployment of microservice-oriented architectures (MSA) in computing and routing enabled unmanned aerial vehicles (UAVs). For that matter, an information system which gathers all the information of the flying ad hoc network (FANET) is developed. From there, we propose multiple approaches, based on integer linear programming (ILP) and heuristics, to tackle the minimization of end-to-end latency by deploying multiple instances of microservices in the UAVs that are close to the users that make use of them. Extensive experiments based on network emulation prove the performance of our ILP formulation of the problem and address the optimality gap between the ILP-based approach and the heuristics ones, which are highly scalable and usable in real-time for large-scale scenarios.
对于依赖互联网的各种应用(如 IP 语音(VoIP)或电话会议)来说,延迟是一个至关重要的方面,即使在成熟经济体的农村地区,缺乏超高速和高可靠性通信的问题也很突出。我们的建议侧重于优化微服务导向架构(MSA)在支持计算和路由的无人驾驶飞行器(UAV)中的部署。为此,我们开发了一个信息系统,用于收集飞行临时网络(FANET)的所有信息。在此基础上,我们提出了基于整数线性规划(ILP)和启发式的多种方法,通过在无人飞行器中部署多个微服务实例来最大限度地减少端到端延迟,因为无人飞行器离使用它们的用户很近。基于网络模拟的大量实验证明了我们对问题的 ILP 表述的性能,并解决了基于 ILP 的方法与启发式方法之间的优化差距,这种方法具有高度可扩展性,可实时用于大规模场景。
{"title":"Enabling Ultra Reliable Low Latency Communications in rural areas using UAV swarms","authors":"Santiago García-Gil, Juan Manuel Murillo, Jaime Galán-Jiménez","doi":"10.1016/j.adhoc.2024.103603","DOIUrl":"10.1016/j.adhoc.2024.103603","url":null,"abstract":"<div><p>Latency is a critical aspect for a broad spectrum of applications that relies on the internet, such as, voice over IP (VoIP) or teleconferencing, and the lack of ultra-fast and highly reliable communications is prominent in rural areas even in mature economies. Our proposal focuses on optimizing the deployment of microservice-oriented architectures (MSA) in computing and routing enabled unmanned aerial vehicles (UAVs). For that matter, an information system which gathers all the information of the flying ad hoc network (FANET) is developed. From there, we propose multiple approaches, based on integer linear programming (ILP) and heuristics, to tackle the minimization of end-to-end latency by deploying multiple instances of microservices in the UAVs that are close to the users that make use of them. Extensive experiments based on network emulation prove the performance of our ILP formulation of the problem and address the optimality gap between the ILP-based approach and the heuristics ones, which are highly scalable and usable in real-time for large-scale scenarios.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"163 ","pages":"Article 103603"},"PeriodicalIF":4.4,"publicationDate":"2024-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1570870524002142/pdfft?md5=954d5bdc1eb5189baec918aa54fbcb74&pid=1-s2.0-S1570870524002142-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141849786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-19DOI: 10.1016/j.adhoc.2024.103601
Celeste Campo, Carlos Garcia-Rubio, Andrea Jimenez-Berenguel, Marta Moure-Garrido, Florina Almenares, Daniel Díaz-Sanchez
In the digital era, our lives are intrinsically linked to the daily use of mobile applications. As a consequence, we generate and transmit a large amount of personal data that puts our privacy in danger. Despite having encrypted communications, the DNS traffic is usually not encrypted, and it is possible to extract valuable information from the traffic generated by mobile applications. This study focuses on the analysis of the DNS traffic behavior found in mobile application traces, developing a methodology capable of identifying mobile applications based on the domains they query. With this methodology, we were able to identify apps with 98% accuracy. Furthermore, we have validated the effectiveness of the characterization obtained with one dataset by identifying traces from other independent datasets. The evaluation showed that the methodology provides successful results in identifying mobile applications.
在数字时代,我们的生活与移动应用程序的日常使用密不可分。因此,我们产生并传输了大量个人数据,这些数据会危及我们的隐私。尽管有加密通信,但 DNS 流量通常没有加密,因此有可能从移动应用程序产生的流量中提取有价值的信息。本研究的重点是分析移动应用跟踪中发现的 DNS 流量行为,并开发出一种能够根据移动应用查询的域名来识别移动应用的方法。利用这种方法,我们能够以 98% 的准确率识别应用程序。此外,我们还通过识别其他独立数据集的痕迹,验证了通过一个数据集获得的特征描述的有效性。评估结果表明,该方法在识别移动应用程序方面取得了成功。
{"title":"Inferring mobile applications usage from DNS traffic","authors":"Celeste Campo, Carlos Garcia-Rubio, Andrea Jimenez-Berenguel, Marta Moure-Garrido, Florina Almenares, Daniel Díaz-Sanchez","doi":"10.1016/j.adhoc.2024.103601","DOIUrl":"10.1016/j.adhoc.2024.103601","url":null,"abstract":"<div><p>In the digital era, our lives are intrinsically linked to the daily use of mobile applications. As a consequence, we generate and transmit a large amount of personal data that puts our privacy in danger. Despite having encrypted communications, the DNS traffic is usually not encrypted, and it is possible to extract valuable information from the traffic generated by mobile applications. This study focuses on the analysis of the DNS traffic behavior found in mobile application traces, developing a methodology capable of identifying mobile applications based on the domains they query. With this methodology, we were able to identify apps with 98% accuracy. Furthermore, we have validated the effectiveness of the characterization obtained with one dataset by identifying traces from other independent datasets. The evaluation showed that the methodology provides successful results in identifying mobile applications.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"163 ","pages":"Article 103601"},"PeriodicalIF":4.4,"publicationDate":"2024-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1570870524002129/pdfft?md5=b9892553e1c370ae53ebbd8a9ac2a96c&pid=1-s2.0-S1570870524002129-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141849779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-16DOI: 10.1016/j.adhoc.2024.103600
Xian Guo, Xiangrong Lu, Yongbo Jiang, Junli Fang, Di Zhang
Ensuring secure authentication between participating entities in VANETs has emerged as a critical challenge. Most of existing schemes mainly consider authentication issue in single administrative domain and suffer from various limitations that include privacy-preserving and malicious entity tracking. This paper proposes a double-layer blockchain-assisted conditional privacy-preserving cross-domain authentication scheme (DBCPCA) that leverages blockchain technology and certificate-less signatures to address these challenges. In DBCPCA, the upper-layer blockchain is used in cross-domain authentication by sharing inter-domain information among multiple different administrative domains. The lower-layer blockchain is employed in intra-domain authentication. In DBCPCA, we also introduce an anonymity mechanism to protect the real identity of a vehicle while enabling the system to trace a malicious vehicle, thereby addressing conditional privacy-preserving concerns. In addition, a security analysis of the proposed scheme demonstrates that it can meet our specified security objectives. Finally, we make a detailed experimental comparison with the most relative solutions such as BCPPA and BCGS. The results show that the DBCPCA scheme reduces the time cost by at least 66.68 % compared to the BCPPA scheme during the signature generation phase. During the signature verification phase, the DBCPCA scheme reduces the time cost by at least 62.39 % compared to the BCGS scheme.
{"title":"DBCPCA:Double-layer blockchain-assisted conditional privacy-preserving cross-domain authentication for VANETs","authors":"Xian Guo, Xiangrong Lu, Yongbo Jiang, Junli Fang, Di Zhang","doi":"10.1016/j.adhoc.2024.103600","DOIUrl":"10.1016/j.adhoc.2024.103600","url":null,"abstract":"<div><p>Ensuring secure authentication between participating entities in VANETs has emerged as a critical challenge. Most of existing schemes mainly consider authentication issue in single administrative domain and suffer from various limitations that include privacy-preserving and malicious entity tracking. This paper proposes a double-layer blockchain-assisted conditional privacy-preserving cross-domain authentication scheme (DBCPCA) that leverages blockchain technology and certificate-less signatures to address these challenges. In DBCPCA, the upper-layer blockchain is used in cross-domain authentication by sharing inter-domain information among multiple different administrative domains. The lower-layer blockchain is employed in intra-domain authentication. In DBCPCA, we also introduce an anonymity mechanism to protect the real identity of a vehicle while enabling the system to trace a malicious vehicle, thereby addressing conditional privacy-preserving concerns. In addition, a security analysis of the proposed scheme demonstrates that it can meet our specified security objectives. Finally, we make a detailed experimental comparison with the most relative solutions such as BCPPA and BCGS. The results show that the DBCPCA scheme reduces the time cost by at least 66.68 % compared to the BCPPA scheme during the signature generation phase. During the signature verification phase, the DBCPCA scheme reduces the time cost by at least 62.39 % compared to the BCGS scheme.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"163 ","pages":"Article 103600"},"PeriodicalIF":4.4,"publicationDate":"2024-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141693143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-16DOI: 10.1016/j.adhoc.2024.103597
Mohamed Selim Korium , Mohamed Saber , Ahmed Mahmoud Ahmed , Arun Narayanan , Pedro H.J. Nardelli
The operations of unmanned aerial vehicles (UAVs) are susceptible to cybersecurity risks, mainly because of their firm reliance on the Global Positioning System (GPS) and radio frequency (RF) sensors. GPS and RF sensors are vulnerable to potential threats, such as spoofing attacks that can cause the UAVs to behave erratically. Since these threats are widespread and potent, it is imperative to develop effective intrusion detection systems. In this paper, we propose an image-based intrusion detection system for detecting GPS spoofing cyberattacks based on a deep learning methodology. We combine convolutional neural networks with Principal Component Analysis (PCA) to reduce the dimensionality of the dataset features, data augmentation to increase the size and diversity of the training dataset, and transfer learning to improve the proposed model’s performance with limited data to design a fast, accurate, and general method. Extensive numerical experiments demonstrate the effectiveness of the proposed solution carried out using benchmark datasets. We achieved an accuracy of 100% within a running time of 120.64 s at 0.3529 ms latency and a detection time of 2.035 s in the case of the training dataset. Further, using this trained model, we achieved an accuracy of 99.25% within a detection time of 2.721 s on an unseen dataset that was unrelated to the one used for training the model. In contrast, other models, such as Inception-v3, showed lower accuracy on unseen datasets. However, Inception-v3 performance improved significantly after Bayesian optimization, with the Tree-structured Parzen Estimator reaching 99.06% accuracy. Our results demonstrate that the proposed image-based intrusion detection method outperforms the existing solutions while providing a general model for detecting cyberattacks included in unseen datasets.
{"title":"Image-based intrusion detection system for GPS spoofing cyberattacks in unmanned aerial vehicles","authors":"Mohamed Selim Korium , Mohamed Saber , Ahmed Mahmoud Ahmed , Arun Narayanan , Pedro H.J. Nardelli","doi":"10.1016/j.adhoc.2024.103597","DOIUrl":"10.1016/j.adhoc.2024.103597","url":null,"abstract":"<div><p>The operations of unmanned aerial vehicles (UAVs) are susceptible to cybersecurity risks, mainly because of their firm reliance on the Global Positioning System (GPS) and radio frequency (RF) sensors. GPS and RF sensors are vulnerable to potential threats, such as spoofing attacks that can cause the UAVs to behave erratically. Since these threats are widespread and potent, it is imperative to develop effective intrusion detection systems. In this paper, we propose an image-based intrusion detection system for detecting GPS spoofing cyberattacks based on a deep learning methodology. We combine convolutional neural networks with Principal Component Analysis (PCA) to reduce the dimensionality of the dataset features, data augmentation to increase the size and diversity of the training dataset, and transfer learning to improve the proposed model’s performance with limited data to design a fast, accurate, and general method. Extensive numerical experiments demonstrate the effectiveness of the proposed solution carried out using benchmark datasets. We achieved an accuracy of 100% within a running time of 120.64 s at 0.3529 ms latency and a detection time of 2.035 s in the case of the training dataset. Further, using this trained model, we achieved an accuracy of 99.25% within a detection time of 2.721 s on an unseen dataset that was unrelated to the one used for training the model. In contrast, other models, such as Inception-v3, showed lower accuracy on unseen datasets. However, Inception-v3 performance improved significantly after Bayesian optimization, with the Tree-structured Parzen Estimator reaching 99.06% accuracy. Our results demonstrate that the proposed image-based intrusion detection method outperforms the existing solutions while providing a general model for detecting cyberattacks included in unseen datasets.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"163 ","pages":"Article 103597"},"PeriodicalIF":4.4,"publicationDate":"2024-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1570870524002087/pdfft?md5=d30620521269b235094b2feafd0ab331&pid=1-s2.0-S1570870524002087-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141845830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-15DOI: 10.1016/j.adhoc.2024.103598
Samkit Jain, Vinod Kumar Jain, Subodh Mishra
A Roadside Unit (RSU) serves as essential infrastructure in Vehicular Ad Hoc Networks (VANETs) that supports the goals of Intelligent Transportation Systems (ITS) by providing safety services, shared storage, and enhanced internet connectivity to vehicular users, drivers, and pedestrians. Additionally, the efficiency of VANETs, concerning network service utility and latency, depends on the relative positioning of these RSUs within the network topology. Most existing RSU deployment approaches deal with a single objective, either enhancing network service utility or minimizing the latency. For instance, some studies suggest deploying RSUs in high-traffic road segments that enhance network service utility but lead to higher latency. Conversely, some suggest deploying the RSUs in low-traffic road segments that minimize the network latency, but there will be low network service utility. Hence, there exists a trade-off between these two conflicting objectives in VANETs, and none of the studies address both objectives simultaneously. To achieve the balance between these two objectives, this paper proposes a Multi-Objective UAV assisted RSU Deployment (MOURD) scheme that leverages the Unmanned Aerial Vehicles (UAVs) for VANET efficiency. The MOURD scheme statically places RSUs in high-traffic road segments and dynamically dispatches the UAVs in low-traffic road segments to facilitate seamless network coverage and minimize the overall network latency. The simulation results on the road network of Delhi, India, demonstrate the effectiveness of the proposed MOURD scheme compared to other benchmark RSU & UAV deployment approaches. MOURD scheme outperforms on an average of 17.42%, 13.29%, 15.67% and 6.23% in terms of vehicle connection time, packet delivery ratio, throughput, and latency, respectively.
{"title":"An efficient multi-objective UAV assisted RSU deployment (MOURD) scheme for VANET","authors":"Samkit Jain, Vinod Kumar Jain, Subodh Mishra","doi":"10.1016/j.adhoc.2024.103598","DOIUrl":"10.1016/j.adhoc.2024.103598","url":null,"abstract":"<div><p>A Roadside Unit (RSU) serves as essential infrastructure in Vehicular Ad Hoc Networks (VANETs) that supports the goals of Intelligent Transportation Systems (ITS) by providing safety services, shared storage, and enhanced internet connectivity to vehicular users, drivers, and pedestrians. Additionally, the efficiency of VANETs, concerning network service utility and latency, depends on the relative positioning of these RSUs within the network topology. Most existing RSU deployment approaches deal with a single objective, either enhancing network service utility or minimizing the latency. For instance, some studies suggest deploying RSUs in high-traffic road segments that enhance network service utility but lead to higher latency. Conversely, some suggest deploying the RSUs in low-traffic road segments that minimize the network latency, but there will be low network service utility. Hence, there exists a trade-off between these two conflicting objectives in VANETs, and none of the studies address both objectives simultaneously. To achieve the balance between these two objectives, this paper proposes a Multi-Objective UAV assisted RSU Deployment (MOURD) scheme that leverages the Unmanned Aerial Vehicles (UAVs) for VANET efficiency. The MOURD scheme statically places RSUs in high-traffic road segments and dynamically dispatches the UAVs in low-traffic road segments to facilitate seamless network coverage and minimize the overall network latency. The simulation results on the road network of Delhi, India, demonstrate the effectiveness of the proposed MOURD scheme compared to other benchmark RSU & UAV deployment approaches. MOURD scheme outperforms on an average of 17.42%, 13.29%, 15.67% and 6.23% in terms of vehicle connection time, packet delivery ratio, throughput, and latency, respectively.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"163 ","pages":"Article 103598"},"PeriodicalIF":4.4,"publicationDate":"2024-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141712418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-14DOI: 10.1016/j.adhoc.2024.103596
Feng Li , Junyi Yang , Kwok-Yan Lam , Bowen Shen , Guiyi Wei
With the rapid growth in access demand for Internet of Things (IoT) devices, effective utilization of spectrum resource has become a key challenge to ensure reliable communications. Traditional dynamic spectrum access methods are inefficient when there are too many device accesses, channel reductions, and channel quality deterioration. In this paper, we propose a dynamic spectrum access method based on a fusion algorithm of graph neural network (GNN) and deep Q network (DQN), improving spectrum access efficiency while maintaining a good access success accuracy. Compared with traditional DQN, the computation time can be reduced by over 35%. Our approach first uses GNN to interact with the environment and predict the state of the IoT spectrum environment. Subsequently, automatic learning and optimization of spectrum access policies are achieved by selecting the mobile IoT user’s actions based on these predicted states using the DQN’s target network, experience playback, and reinforcement learning techniques. Simulation results show that the system model based on the proposed method can operate with better efficiency than the conventional method while maintaining a good channel access rate and channel quality.
{"title":"Dynamic spectrum access for Internet-of-Things with joint GNN and DQN","authors":"Feng Li , Junyi Yang , Kwok-Yan Lam , Bowen Shen , Guiyi Wei","doi":"10.1016/j.adhoc.2024.103596","DOIUrl":"10.1016/j.adhoc.2024.103596","url":null,"abstract":"<div><p>With the rapid growth in access demand for Internet of Things (IoT) devices, effective utilization of spectrum resource has become a key challenge to ensure reliable communications. Traditional dynamic spectrum access methods are inefficient when there are too many device accesses, channel reductions, and channel quality deterioration. In this paper, we propose a dynamic spectrum access method based on a fusion algorithm of graph neural network (GNN) and deep Q network (DQN), improving spectrum access efficiency while maintaining a good access success accuracy. Compared with traditional DQN, the computation time can be reduced by over 35%. Our approach first uses GNN to interact with the environment and predict the state of the IoT spectrum environment. Subsequently, automatic learning and optimization of spectrum access policies are achieved by selecting the mobile IoT user’s actions based on these predicted states using the DQN’s target network, experience playback, and reinforcement learning techniques. Simulation results show that the system model based on the proposed method can operate with better efficiency than the conventional method while maintaining a good channel access rate and channel quality.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"163 ","pages":"Article 103596"},"PeriodicalIF":4.4,"publicationDate":"2024-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141636873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}