439 research outputs found

    SUTMS - Unified Threat Management Framework for Home Networks

    Get PDF
    Home networks were initially designed for web browsing and non-business critical applications. As infrastructure improved, internet broadband costs decreased, and home internet usage transferred to e-commerce and business-critical applications. Today’s home computers host personnel identifiable information and financial data and act as a bridge to corporate networks via remote access technologies like VPN. The expansion of remote work and the transition to cloud computing have broadened the attack surface for potential threats. Home networks have become the extension of critical networks and services, hackers can get access to corporate data by compromising devices attacked to broad- band routers. All these challenges depict the importance of home-based Unified Threat Management (UTM) systems. There is a need of unified threat management framework that is developed specifically for home and small networks to address emerging security challenges. In this research, the proposed Smart Unified Threat Management (SUTMS) framework serves as a comprehensive solution for implementing home network security, incorporating firewall, anti-bot, intrusion detection, and anomaly detection engines into a unified system. SUTMS is able to provide 99.99% accuracy with 56.83% memory improvements. IPS stands out as the most resource-intensive UTM service, SUTMS successfully reduces the performance overhead of IDS by integrating it with the flow detection mod- ule. The artifact employs flow analysis to identify network anomalies and categorizes encrypted traffic according to its abnormalities. SUTMS can be scaled by introducing optional functions, i.e., routing and smart logging (utilizing Apriori algorithms). The research also tackles one of the limitations identified by SUTMS through the introduction of a second artifact called Secure Centralized Management System (SCMS). SCMS is a lightweight asset management platform with built-in security intelligence that can seamlessly integrate with a cloud for real-time updates

    Energy Efficient Multi-hop routing scheme using Taylor based Gravitational Search Algorithm in Wireless Sensor Networks

    Get PDF
    A group of small sensors can participate in the wireless network infrastructure and make appropriate transmission and communication sensor networks. There are numerous uses for drones, including military, medical, agricultural, and atmospheric monitoring. The power sources available to nodes in WSNs are restricted. Furthermore, because of this, a diverse method of energy availability is required, primarily for communication over a vast distance, for which Multi-Hop (MH) systems are used. Obtaining the optimum routing path between nodes is still a significant problem, even when multi-hop systems reduce the cost of energy needed by every node along the way. As a result, the number of transmissions must be kept to a minimum to provide effective routing and extend the system\u27s lifetime. To solve the energy problem in WSN, Taylor based Gravitational Search Algorithm (TBGSA) is proposed, which combines the Taylor series with a Gravitational search algorithm to discover the best hops for multi-hop routing. Initially, the sensor nodes are categorised as groups or clusters and the maximum capable node can access the cluster head the next action is switching between multiple nodes via a multi-hop manner. Initially, the best (CH) Cluster Head is chosen using the Artificial Bee Colony (ABC) algorithm, and then the data is transmitted utilizing multi-hop routing. The comparison result shows out the extension of networks longevity of the proposed method with the existing EBMRS, MOGA, and DMEERP methods. The network lifetime of the proposed method increased by 13.2%, 21.9% and 29.2% better than DMEERP, MOGA, and EBMRS respectively

    Spread Spectrum based QoS aware Energy Efficient Clustering Algorithm for Wireless Sensor Networks

    Get PDF
    Wireless sensor networks (WSNs) are composed of small, resource-constrained sensor nodes that form self-organizing, infrastructure-less, and ad-hoc networks. Many energy-efficient protocols have been developed in the network layer to extend the lifetime and scalability of these networks, but they often do not consider the Quality of Service (QoS) requirements of the data flow, such as delay, data rate, reliability, and throughput. In clustering, the probabilistic and randomized approach for cluster head selection can lead to varying numbers of cluster heads in different rounds of data gathering. This paper presents a new algorithm called "Spread Spectrum based QoS aware Energy Efficient Clustering for Wireless sensor Networks" that uses spread spectrum to limit the formation of clusters and optimize the number of cluster heads in WSNs, improving energy efficiency and QoS for diverse data flows. Simulation results show that the proposed algorithm outperforms classical algorithms in terms of energy efficiency and QoS

    Machine Learning Centered Energy Optimization In Cloud Computing: A Review

    Get PDF
    The rapid growth of cloud computing has led to a significant increase in energy consumption, which is a major concern for the environment and economy. To address this issue, researchers have proposed various techniques to improve the energy efficiency of cloud computing, including the use of machine learning (ML) algorithms. This research provides a comprehensive review of energy efficiency in cloud computing using ML techniques and extensively compares different ML approaches in terms of the learning model adopted, ML tools used, model strengths and limitations, datasets used, evaluation metrics and performance. The review categorizes existing approaches into Virtual Machine (VM) selection, VM placement, VM migration, and consolidation methods. This review highlights that among the array of ML models, Deep Reinforcement Learning, TensorFlow as a platform, and CloudSim for dataset generation are the most widely adopted in the literature and emerge as the best choices for constructing ML-driven models that optimize energy consumption in cloud computing

    An optimal scheduling method in iot-fog-cloud network using combination of aquila optimizer and african vultures optimization

    Get PDF
    Today, fog and cloud computing environments can be used to further develop the Internet of Things (IoT). In such environments, task scheduling is very efficient for executing user requests, and the optimal scheduling of IoT task requests increases the productivity of the IoT-fog-cloud system. In this paper, a hybrid meta-heuristic (MH) algorithm is developed to schedule the IoT requests in IoT-fog-cloud networks using the Aquila Optimizer (AO) and African Vultures Optimization Algorithm (AVOA) called AO_AVOA. In AO_AVOA, the exploration phase of AVOA is improved by using AO operators to obtain the best solution during the process of finding the optimal scheduling solution. A comparison between AO_AVOA and methods of AVOA, AO, Firefly Algorithm (FA), particle swarm optimization (PSO), and Harris Hawks Optimization (HHO) according to performance metrics such as makespan and throughput shows the high ability of AO_AVOA to solve the scheduling problem in IoT-fog-cloud networks. © 2023 by the authors

    Security and Privacy for Modern Wireless Communication Systems

    Get PDF
    The aim of this reprint focuses on the latest protocol research, software/hardware development and implementation, and system architecture design in addressing emerging security and privacy issues for modern wireless communication networks. Relevant topics include, but are not limited to, the following: deep-learning-based security and privacy design; covert communications; information-theoretical foundations for advanced security and privacy techniques; lightweight cryptography for power constrained networks; physical layer key generation; prototypes and testbeds for security and privacy solutions; encryption and decryption algorithm for low-latency constrained networks; security protocols for modern wireless communication networks; network intrusion detection; physical layer design with security consideration; anonymity in data transmission; vulnerabilities in security and privacy in modern wireless communication networks; challenges of security and privacy in node–edge–cloud computation; security and privacy design for low-power wide-area IoT networks; security and privacy design for vehicle networks; security and privacy design for underwater communications networks

    Cost Optimization Approach for MANET using Particle Swarm Optimization

    Get PDF
    This paper present the approach require to increase the QoS of MANET network using particle swarm optimization algorithm. To improve data communication between two nodes we propose an efficient algorithm for AODV protocol using PSO where instead of suppling all default parameter with default value of AODV protocol we try to provide selective parameters with optimum value so that overall requirement of control packet get decrease that in turn result in to increase quality of service parameters of MANET. For the enhancement of reliability and reduction of cost, node speed control mechanism is implemented using PSO, The given method which is use for simulation, reduces the overall loss of data and also make transmission effective. We have also tested the performance of network by changing data rates and the speed of the node

    Secure Clustering and Routing using Adaptive Decision and Levy Flight based Artificial Hummingbird Algorithm for Wireless Sensor Networks

    Get PDF
    Wireless Sensor Network (WSN) receives huge attention from various remote monitoring applications because of its self configuration, ease of maintenance and scalability features. But, the sensors of the WSNs vulnerable to malicious attackers due to the energy constraint, open deployment and lack of centralized administration. Therefore, the secure routing is established for achieving the secure and reliable data broadcasting in the WSN. In this paper, an Adaptive Decision and Levy Flight based Artificial Hummingbird Algorithm (ADLFAHA) is proposed for performing an effective secure routing under the blackhole and Denial of Service (DoS) attacks. The ADLFAHA is developed to perform Secure Cluster Head (SCH) selection and secure path identification according to the trust, energy, load and communication cost. An adaptive decision strategy and levy flight incorporated in the ADLFAHA is used to enhance exploration and achieves global optimization capacity that helps to enhance the searching process. Moreover, the developed ADLFAHA helps to avoid the congestion among the nodes by balancing the load in network. The ADLFAHA is analyzed using End to End Delay (EED), throughput, Packet Delivery Ratio (PDR) and overhead. The existing researches such as Firebug Optimized Modified Bee Colony (FOMBC) and Lightweight Secure Routing (LSR) are used to compare the ADLFAHA. The PDR of the ADLFAHA for the simulation time of 100 s is 98.21 that is high than the FOMBC and LSR

    Metaheuristics Techniques for Cluster Head Selection in WSN: A Survey

    Get PDF
    In recent years, Wireless sensor communication is growing expeditiously on the capability to gather information, communicate and transmit data effectively. Clustering is the main objective of improving the network lifespan in Wireless sensor network. It includes selecting the cluster head for each cluster in addition to grouping the nodes into clusters. The cluster head gathers data from the normal nodes in the cluster, and the gathered information is then transmitted to the base station. However, there are many reasons in effect opposing unsteady cluster head selection and dead nodes. The technique for selecting a cluster head takes into factors to consider including residual energy, neighbors’ nodes, and the distance between the base station to the regular nodes. In this study, we thoroughly investigated by number of methods of selecting a cluster head and constructing a cluster. Additionally, a quick performance assessment of the techniques' performance is given together with the methods' criteria, advantages, and future directions

    LIPIcs, Volume 261, ICALP 2023, Complete Volume

    Get PDF
    LIPIcs, Volume 261, ICALP 2023, Complete Volum
    • …
    corecore