434 research outputs found

    Malicious node detection using machine learning and distributed data storage using blockchain in WSNs

    Get PDF
    In the proposed work, blockchain is implemented on the Base Stations (BSs) and Cluster Heads (CHs) to register the nodes using their credentials and also to tackle various security issues. Moreover, a Machine Learning (ML) classifier, termed as Histogram Gradient Boost (HGB), is employed on the BSs to classify the nodes as malicious or legitimate. In case, the node is found to be malicious, its registration is revoked from the network. Whereas, if a node is found to be legitimate, then its data is stored in an Interplanetary File System (IPFS). IPFS stores the data in the form of chunks and generates hash for the data, which is then stored in blockchain. In addition, Verifiable Byzantine Fault Tolerance (VBFT) is used instead of Proof of Work (PoW) to perform consensus and validate transactions. Also, extensive simulations are performed using the Wireless Sensor Network (WSN) dataset, referred as WSN-DS. The proposed model is evaluated both on the original dataset and the balanced dataset. Furthermore, HGB is compared with other existing classifiers, Adaptive Boost (AdaBoost), Gradient Boost (GB), Linear Discriminant Analysis (LDA), Extreme Gradient Boost (XGB) and ridge, using different performance metrics like accuracy, precision, recall, micro-F1 score and macro-F1 score. The performance evaluation of HGB shows that it outperforms GB, AdaBoost, LDA, XGB and Ridge by 2-4%, 8-10%, 12-14%, 3-5% and 14-16%, respectively. Moreover, the results with balanced dataset are better than those with original dataset. Also, VBFT performs 20-30% better than PoW. Overall, the proposed model performs efficiently in terms of malicious node detection and secure data storage. © 2013 IEEE

    Uav-assisted data collection in wireless sensor networks: A comprehensive survey

    Get PDF
    Wireless sensor networks (WSNs) are usually deployed to different areas of interest to sense phenomena, process sensed data, and take actions accordingly. The networks are integrated with many advanced technologies to be able to fulfill their tasks that is becoming more and more complicated. These networks tend to connect to multimedia networks and to process huge data over long distances. Due to the limited resources of static sensor nodes, WSNs need to cooperate with mobile robots such as unmanned ground vehicles (UGVs), or unmanned aerial vehicles (UAVs) in their developments. The mobile devices show their maneuverability, computational and energystorage abilities to support WSNs in multimedia networks. This paper addresses a comprehensive survey of almost scenarios utilizing UAVs and UGVs with strogly emphasising on UAVs for data collection in WSNs. Either UGVs or UAVs can collect data from static sensor nodes in the monitoring fields. UAVs can either work alone to collect data or can cooperate with other UAVs to increase their coverage in their working fields. Different techniques to support the UAVs are addressed in this survey. Communication links, control algorithms, network structures and different mechanisms are provided and compared. Energy consumption or transportation cost for such scenarios are considered. Opening issues and challenges are provided and suggested for the future developments

    The role of Artificial Intelligence and distributed computing in IoT applications

    Get PDF
    [EN]The exchange of ideas between scientists and technicians, from both academic and business areas, is essential in order to ease the development of systems which can meet the demands of today’s society. Technology transfer in this field is still a challenge and, for that reason, this type of contributions are notably considered in this compilation. This book brings in discussions and publications concerning the development of innovative techniques of IoT complex problems. The technical program focuses both on high quality and diversity, with contributions in well-established and evolving areas of research. Specifically, 10 chapters were submitted to this book. The editors particularly encouraged and welcomed contributions on AI and distributed computing in IoT applications.Financed by regional government of Castilla y León and FEDER funds

    The role of Artificial Intelligence and Distributed computing in IoT applications

    Get PDF
    [ES] La serie «El rol de la inteligencia artificial y la computación distribuida en las aplicaciones IoT» contiene publicaciones sobre la teoría y aplicaciones de la computación distribuida y la inteligencia artificial en el Internet de las cosas. Prácticamente todas las disciplinas como la ingeniería, las ciencias naturales, la informática y las ciencias de la información, las TIC, la economía, los negocios, el comercio electrónico, el medio ambiente, la salud y las ciencias de la vida están cubiertas. La lista de temas abarca todas las áreas de los sistemas inteligentes modernos y la informática como: inteligencia computacional, soft computing incluyendo redes neuronales, inteligencia social, inteligencia ambiental, sistemas auto-organizados y adaptativos, computación centrada en el ser humano y centrada en el ser humano, sistemas de recomendación, control inteligente, robótica y mecatrónica, incluida la colaboración entre el ser humano y la máquina, paradigmas basados en el conocimiento, paradigmas de aprendizaje, ética de la máquina, análisis inteligente de datos, gestión del conocimiento, agentes inteligentes, toma de decisiones inteligentes y apoyo, seguridad de la red inteligente, gestión de la confianza, entretenimiento interactivo, inteligencia de la Web y multimedia. Las publicaciones en el marco de «El rol de la inteligencia artificial y la computación distribuida en las aplicaciones IoT» son principalmente las actas de seminarios, simposios y conferencias. Abarcan importantes novedades recientes en la materia, tanto de naturaleza fundacional como aplicable. Un importante rasgo característico de la serie es el corto tiempo de publicación. Esto permite una rápida y amplia difusión de los resultados de las investigaciones[EN] The series «The Role of Artificial Intelligence and Distributed Computing in IoT Applications» contains publications on the theory and applications of distributed computing and artificial intelligence in the Internet of Things. Virtually all disciplines such as engineering, natural sciences, computer and information sciences, ICT, economics, business, e-commerce, environment, health and life sciences are covered. The list of topics covers all areas of modern intelligent systems and computer science: computational intelligence, soft computing including neural networks, social intelligence, ambient intelligence, self-organising and adaptive systems, human-centred and people-centred computing, recommendation systems, intelligent control, robotics and mechatronics including human-machine collaboration, knowledge-based paradigms, learning paradigms, machine ethics, intelligent data analysis, knowledge management, intelligent agents, intelligent decision making and support, intelligent network security, trust management, interactive entertainment, web intelligence, and multimedia. The publications in the framework of «The Role of Artificial Intelligence and Distributed Computing in IoT Applications» are mainly the proceedings of seminars, symposia and conferences. They cover important recent developments in the field, whether of a foundational or applicable character. An important feature of the series is the short publication time. This allows for the rapid and wide dissemination of research results

    Interleaved Honeypot-Framing Model with Secure MAC Policies for Wireless Sensor Networks

    Get PDF
    The Wireless Medium Access Control (WMAC) protocol functions by handling various data frames in order to forward them to neighbor sensor nodes. Under this circumstance, WMAC policies need secure data communication rules and intrusion detection procedures to safeguard the data from attackers. The existing secure Medium Access Control (MAC) policies provide expected and predictable practices against channel attackers. These security policies can be easily breached by any intelligent attacks or malicious actions. The proposed Wireless Interleaved Honeypot-Framing Model (WIHFM) newly implements distributed honeypot-based security mechanisms in each sensor node to act reactively against various attackers. The proposed WIHFM creates an optimal Wireless Sensor Network (WSN) channel model, Wireless Interleaved Honeypot Frames (WIHFs), secure hash-based random frame-interleaving principles, node-centric honeypot engines, and channel-covering techniques. Compared to various existing MAC security policies, the proposed model transforms unpredictable IHFs into legitimate frame sequences against channel attackers. Additionally, introducing WIHFs is a new-fangled approach for distributed WSNs. The successful development of the proposed WIHFM ensures resilient security standards and neighbor-based intrusion alert procedures for protecting MAC frames. Particularly, the proposed wireless honeypot methodology creates a novel idea of using honeypot frame traps against open wireless channel attacks. The development of a novel wireless honeypot traps deals with various challenges such as distributed honeypot management principles (node-centric honeypot, secretly interleaved-framing principles, and interleaving/de-interleaving procedures), dynamic network backbone management principles (On Demand Acyclic Connectivity model), and distributed attack isolation policies. This effort provides an effective wireless attack-trapping solution in dynamic WSNs. The simulation results show the advantage of the proposed WIHFM over the existing techniques such as Secure Zebra MAC (SZ-MAC), Blockchain-Assisted Secure-Routing Mechanism (BASR), and the Trust-Based Node Evaluation (TBNE) procedure. The experimental section confirms the proposed model attains a 10% to 14% superior performance compared to the existing techniques

    A Survey and Future Directions on Clustering: From WSNs to IoT and Modern Networking Paradigms

    Get PDF
    Many Internet of Things (IoT) networks are created as an overlay over traditional ad-hoc networks such as Zigbee. Moreover, IoT networks can resemble ad-hoc networks over networks that support device-to-device (D2D) communication, e.g., D2D-enabled cellular networks and WiFi-Direct. In these ad-hoc types of IoT networks, efficient topology management is a crucial requirement, and in particular in massive scale deployments. Traditionally, clustering has been recognized as a common approach for topology management in ad-hoc networks, e.g., in Wireless Sensor Networks (WSNs). Topology management in WSNs and ad-hoc IoT networks has many design commonalities as both need to transfer data to the destination hop by hop. Thus, WSN clustering techniques can presumably be applied for topology management in ad-hoc IoT networks. This requires a comprehensive study on WSN clustering techniques and investigating their applicability to ad-hoc IoT networks. In this article, we conduct a survey of this field based on the objectives for clustering, such as reducing energy consumption and load balancing, as well as the network properties relevant for efficient clustering in IoT, such as network heterogeneity and mobility. Beyond that, we investigate the advantages and challenges of clustering when IoT is integrated with modern computing and communication technologies such as Blockchain, Fog/Edge computing, and 5G. This survey provides useful insights into research on IoT clustering, allows broader understanding of its design challenges for IoT networks, and sheds light on its future applications in modern technologies integrated with IoT.acceptedVersio

    Implement DNN technology by using wireless sensor network system based on IOT applications

    Get PDF
    The smart Internet of Things-based system suggested in this research intends to increase network and application accuracy by controlling and monitoring the network. This is a deep learning network. The invisible layer's structure permits it to learn more. Improved quality of service supplied by each sensor node thanks to element-modified deep learning and network buffer capacity management. A customized deep learning technique can be used to train a system that can focus better on tasks. The researchers were able to implement wireless sensor calculations with 98.68 percent precision and the fastest execution time. With a sensor-based system and a short execution time, this article detects and classifies the proxy with 99.21 percent accuracy. However, we were able to accurately detect and classify intrusions and real-time proxy types in this study, which is a significant improvement over previous research

    An overview of VANET vehicular networks

    Full text link
    Today, with the development of intercity and metropolitan roadways and with various cars moving in various directions, there is a greater need than ever for a network to coordinate commutes. Nowadays, people spend a lot of time in their vehicles. Smart automobiles have developed to make that time safer, more effective, more fun, pollution-free, and affordable. However, maintaining the optimum use of resources and addressing rising needs continues to be a challenge given the popularity of vehicle users and the growing diversity of requests for various services. As a result, VANET will require modernized working practices in the future. Modern intelligent transportation management and driver assistance systems are created using cutting-edge communication technology. Vehicular Ad-hoc networks promise to increase transportation effectiveness, accident prevention, and pedestrian comfort by allowing automobiles and road infrastructure to communicate entertainment and traffic information. By constructing thorough frameworks, workflow patterns, and update procedures, including block-chain, artificial intelligence, and SDN (Software Defined Networking), this paper addresses VANET-related technologies, future advances, and related challenges. An overview of the VANET upgrade solution is given in this document in order to handle potential future problems

    A survey of IoT security based on a layered architecture of sensing and data analysis

    Get PDF
    The Internet of Things (IoT) is leading today’s digital transformation. Relying on a combination of technologies, protocols, and devices such as wireless sensors and newly developed wearable and implanted sensors, IoT is changing every aspect of daily life, especially recent applications in digital healthcare. IoT incorporates various kinds of hardware, communication protocols, and services. This IoT diversity can be viewed as a double-edged sword that provides comfort to users but can lead also to a large number of security threats and attacks. In this survey paper, a new compacted and optimized architecture for IoT is proposed based on five layers. Likewise, we propose a new classification of security threats and attacks based on new IoT architecture. The IoT architecture involves a physical perception layer, a network and protocol layer, a transport layer, an application layer, and a data and cloud services layer. First, the physical sensing layer incorporates the basic hardware used by IoT. Second, we highlight the various network and protocol technologies employed by IoT, and review the security threats and solutions. Transport protocols are exhibited and the security threats against them are discussed while providing common solutions. Then, the application layer involves application protocols and lightweight encryption algorithms for IoT. Finally, in the data and cloud services layer, the main important security features of IoT cloud platforms are addressed, involving confidentiality, integrity, authorization, authentication, and encryption protocols. The paper is concluded by presenting the open research issues and future directions towards securing IoT, including the lack of standardized lightweight encryption algorithms, the use of machine-learning algorithms to enhance security and the related challenges, the use of Blockchain to address security challenges in IoT, and the implications of IoT deployment in 5G and beyond
    • …
    corecore