20 research outputs found
Recommended from our members
A microbial inspired routing protocol for VANETs
We present a bio-inspired unicast routing protocol for vehicular Ad Hoc Networks which uses the cellular attractor selection mechanism to select next hops. The proposed unicast routing protocol based on attractor selecting (URAS) is an opportunistic routing protocol, which is able to change itself adaptively to the complex and dynamic environment by routing feedback packets. We further employ a multi-attribute decision-making strategy, the Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS), to reduce the number of redundant candidates for next-hop selection, so as to enhance the performance of attractor selection mechanism. Once the routing path is found, URAS maintains the current path or finds another better path adaptively based on the performance of current path, that is, it can self-evolution until the best routing path is found. Our simulation study compares the proposed solution with the state-of-the-art schemes, and shows the robustness and effectiveness of the proposed routing protocol and the significant performance improvement, in terms of packet delivery, end-to-end delay, and congestion, over the conventional method
On Detection of Sybil Attack in Large-Scale VANETs Using Spider-Monkey Technique
Sybil security threat in vehicular ad hoc networks (VANETs) has attracted much attention in recent times. The attacker introduces malicious nodes with multiple identities. As the roadside unit fails to synchronize its clock with legitimate vehicles, unintended vehicles are identified, and therefore erroneous messages will be sent to them. This paper proposes a novel biologically inspired spider-monkey time synchronization technique for large-scale VANETs to boost packet delivery time synchronization at minimized energy consumption. The proposed technique is based on the metaheuristic stimulated framework approach by the natural spider-monkey behavior. An artificial spider-monkey technique is used to examine the Sybil attacking strategies on VANETs to predict the number of vehicular collisions in a densely deployed challenge zone. Furthermore, this paper proposes the pseudocode algorithm randomly distributed for energy-efficient time synchronization in two-way packet delivery scenarios to evaluate the clock offset and the propagation delay in transmitting the packet beacon message to destination vehicles correctly. The performances of the proposed technique are compared with existing protocols. It performs better over long transmission distances for the detection of Sybil in dynamic VANETs' system in terms of measurement precision, intrusion detection rate, and energy efficiency
Improvement in Quality of Service Against Doppelganger Attacks for Connected Network
Because they are in a high-risk location, remote sensors are vulnerable to malicious ambushes. A doppelganger attack, in which a malicious hub impersonates a legitimate network junction and then attempts to take control of the entire network, is one of the deadliest types of ambushes. Because remote sensor networks are portable, hub doppelganger ambushes are particularly ineffective in astute wellness contexts. Keeping the framework safe from hostile hubs is critical because the information in intelligent health frameworks is so sensitive. This paper developed a new Steering Convention for Vitality Effective Systems (SC-VFS) technique for detecting doppelganger attacks in IoT-based intelligent health applications such as a green corridor for transplant pushback. This method's main advantage is that it improves vitality proficiency, a critical constraint in WSN frameworks. To emphasize the suggested scheme's execution, latency, remaining vitality, throughput, vitality effectiveness, and blunder rate are all used. To see how proper the underutilized technique is compared to the existing Half Breed Multi-Level Clustering (HMLC) computation. The suggested approach yields latency of 0.63ms and 0.6ms, respectively, when using dead hubs and keeping a strategic distance from doppelganger assault. Furthermore, during the 2500 cycles, the suggested system achieves the highest remaining vitality of 49.5J
The Relationship Between Technology Adoption Determinants and the Intention to Use Software-Defined Networking
AbstractThe advent of distributed cloud computing and the exponential growth and demands of the internet of things and big data have strained traditional network technologies\u27 capabilities and have given rise to software-defined networking\u27s (SDN\u27s) revolutionary approach. Some information technology (IT) cloud services leaders who do not intend to adopt SDN technology may be unable to meet increasing performance and flexibility demands and may risk financial loss compared to those who adopt SDN technology. Grounded in the unified theory of acceptance and use of technology (UTAUT), the purpose of this quantitative correlational study was to examine the relationship between IT cloud system integrators\u27 perceptions of performance expectancy, effort expectancy, social influence, facilitating conditions, and their intention to use SDN technology. The participants (n = 167) were cloud system integrators who were at least 18 years old with a minimum of three months\u27 experience and used SDN technology in the United States. Data were collected using the UTAUT authors\u27 validated survey instrument. The multiple regression findings were significant, F(4, 162) = 40.44, p \u3c .001, R2 = .50. In the final model, social influence (Ă = .236, t = 2.662, p \u3c .01) and facilitating conditions (Ă = .327, t = 5.018, p \u3c .001) were statistically significant; performance expectancy and effort expectancy were not statistically significant. A recommendation is for IT managers to champion SDN adoption by ensuring the availability of support resources and promoting its use in the organization\u27s goals. The implications for positive social change include the potential to enhance cloud security, quality of experience, and improved reliability, strengthening safety control systems
Survey on 6G Frontiers: Trends, Applications, Requirements, Technologies and Future Research
Emerging applications such as Internet of Everything, Holographic Telepresence, collaborative robots, and space and deep-sea tourism are already highlighting the limitations of existing fifth-generation (5G) mobile networks. These limitations are in terms of data-rate, latency, reliability, availability, processing, connection density and global coverage, spanning over ground, underwater and space. The sixth-generation (6G) of mobile networks are expected to burgeon in the coming decade to address these limitations. The development of 6G vision, applications, technologies and standards has already become a popular research theme in academia and the industry. In this paper, we provide a comprehensive survey of the current developments towards 6G. We highlight the societal and technological trends that initiate the drive towards 6G. Emerging applications to realize the demands raised by 6G driving trends are discussed subsequently. We also elaborate the requirements that are necessary to realize the 6G applications. Then we present the key enabling technologies in detail. We also outline current research projects and activities including standardization efforts towards the development of 6G. Finally, we summarize lessons learned from state-of-the-art research and discuss technical challenges that would shed a new light on future research directions towards 6G
State of the Art and Future Perspectives in Smart and Sustainable Urban Development
This book contributes to the conceptual and practical knowledge pools in order to improve the research and practice on smart and sustainable urban development by presenting an informed understanding of the subject to scholars, policymakers, and practitioners. This book presents contributionsâin the form of research articles, literature reviews, case reports, and short communicationsâoffering insights into the smart and sustainable urban development by conducting in-depth conceptual debates, detailed case study descriptions, thorough empirical investigations, systematic literature reviews, or forecasting analyses. This way, the book forms a repository of relevant information, material, and knowledge to support research, policymaking, practice, and the transferability of experiences to address urbanization and other planetary challenges
Applications
Volume 3 describes how resource-aware machine learning methods and techniques are used to successfully solve real-world problems. The book provides numerous specific application examples: in health and medicine for risk modelling, diagnosis, and treatment selection for diseases in electronics, steel production and milling for quality control during manufacturing processes in traffic, logistics for smart cities and for mobile communications
RFID Technology in Intelligent Tracking Systems in Construction Waste Logistics Using Optimisation Techniques
Construction waste disposal is an urgent issue
for protecting our environment. This paper proposes a
waste management system and illustrates the work
process using plasterboard waste as an example, which
creates a hazardous gas when land filled with household
waste, and for which the recycling rate is less than 10%
in the UK. The proposed system integrates RFID
technology, Rule-Based Reasoning, Ant Colony
optimization and knowledge technology for auditing
and tracking plasterboard waste, guiding the operation
staff, arranging vehicles, schedule planning, and also
provides evidence to verify its disposal. It h relies on
RFID equipment for collecting logistical data and uses
digital imaging equipment to give further evidence; the
reasoning core in the third layer is responsible for
generating schedules and route plans and guidance, and
the last layer delivers the result to inform users. The
paper firstly introduces the current plasterboard
disposal situation and addresses the logistical problem
that is now the main barrier to a higher recycling rate,
followed by discussion of the proposed system in terms
of both system level structure and process structure.
And finally, an example scenario will be given to
illustrate the systemâs utilization