2,962 research outputs found

    A Trust Management Framework for Vehicular Ad Hoc Networks

    Get PDF
    The inception of Vehicular Ad Hoc Networks (VANETs) provides an opportunity for road users and public infrastructure to share information that improves the operation of roads and the driver experience. However, such systems can be vulnerable to malicious external entities and legitimate users. Trust management is used to address attacks from legitimate users in accordance with a user’s trust score. Trust models evaluate messages to assign rewards or punishments. This can be used to influence a driver’s future behaviour or, in extremis, block the driver. With receiver-side schemes, various methods are used to evaluate trust including, reputation computation, neighbour recommendations, and storing historical information. However, they incur overhead and add a delay when deciding whether to accept or reject messages. In this thesis, we propose a novel Tamper-Proof Device (TPD) based trust framework for managing trust of multiple drivers at the sender side vehicle that updates trust, stores, and protects information from malicious tampering. The TPD also regulates, rewards, and punishes each specific driver, as required. Furthermore, the trust score determines the classes of message that a driver can access. Dissemination of feedback is only required when there is an attack (conflicting information). A Road-Side Unit (RSU) rules on a dispute, using either the sum of products of trust and feedback or official vehicle data if available. These “untrue attacks” are resolved by an RSU using collaboration, and then providing a fixed amount of reward and punishment, as appropriate. Repeated attacks are addressed by incremental punishments and potentially driver access-blocking when conditions are met. The lack of sophistication in this fixed RSU assessment scheme is then addressed by a novel fuzzy logic-based RSU approach. This determines a fairer level of reward and punishment based on the severity of incident, driver past behaviour, and RSU confidence. The fuzzy RSU controller assesses judgements in such a way as to encourage drivers to improve their behaviour. Although any driver can lie in any situation, we believe that trustworthy drivers are more likely to remain so, and vice versa. We capture this behaviour in a Markov chain model for the sender and reporter driver behaviours where a driver’s truthfulness is influenced by their trust score and trust state. For each trust state, the driver’s likelihood of lying or honesty is set by a probability distribution which is different for each state. This framework is analysed in Veins using various classes of vehicles under different traffic conditions. Results confirm that the framework operates effectively in the presence of untrue and inconsistent attacks. The correct functioning is confirmed with the system appropriately classifying incidents when clarifier vehicles send truthful feedback. The framework is also evaluated against a centralized reputation scheme and the results demonstrate that it outperforms the reputation approach in terms of reduced communication overhead and shorter response time. Next, we perform a set of experiments to evaluate the performance of the fuzzy assessment in Veins. The fuzzy and fixed RSU assessment schemes are compared, and the results show that the fuzzy scheme provides better overall driver behaviour. The Markov chain driver behaviour model is also examined when changing the initial trust score of all drivers

    Adaptive Data-driven Optimization using Transfer Learning for Resilient, Energy-efficient, Resource-aware, and Secure Network Slicing in 5G-Advanced and 6G Wireless Systems

    Get PDF
    Title from PDF of title page, viewed January 31, 2023Dissertation advisor: Cory BeardVitaIncludes bibliographical references (pages 134-141)Dissertation (Ph.D)--Department of Computer Science and Electrical Engineering. University of Missouri--Kansas City, 20225G–Advanced is the next step in the evolution of the fifth–generation (5G) technology. It will introduce a new level of expanded capabilities beyond connections and enables a broader range of advanced applications and use cases. 5G–Advanced will support modern applications with greater mobility and high dependability. Artificial intelligence and Machine Learning will enhance network performance with spectral efficiency and energy savings enhancements. This research established a framework to optimally control and manage an appropriate selection of network slices for incoming requests from diverse applications and services in Beyond 5G networks. The developed DeepSlice model is used to optimize the network and individual slice load efficiency across isolated slices and manage slice lifecycle in case of failure. The DeepSlice framework can predict the unknown connections by utilizing the learning from a developed deep-learning neural network model. The research also addresses threats to the performance, availability, and robustness of B5G networks by proactively preventing and resolving threats. The study proposed a Secure5G framework for authentication, authorization, trust, and control for a network slicing architecture in 5G systems. The developed model prevents the 5G infrastructure from Distributed Denial of Service by analyzing incoming connections and learning from the developed model. The research demonstrates the preventive measure against volume attacks, flooding attacks, and masking (spoofing) attacks. This research builds the framework towards the zero trust objective (never trust, always verify, and verify continuously) that improves resilience. Another fundamental difficulty for wireless network systems is providing a desirable user experience in various network conditions, such as those with varying network loads and bandwidth fluctuations. Mobile Network Operators have long battled unforeseen network traffic events. This research proposed ADAPTIVE6G to tackle the network load estimation problem using knowledge-inspired Transfer Learning by utilizing radio network Key Performance Indicators from network slices to understand and learn network load estimation problems. These algorithms enable Mobile Network Operators to optimally coordinate their computational tasks in stochastic and time-varying network states. Energy efficiency is another significant KPI in tracking the sustainability of network slicing. Increasing traffic demands in 5G dramatically increase the energy consumption of mobile networks. This increase is unsustainable in terms of dollar cost and environmental impact. This research proposed an innovative ECO6G model to attain sustainability and energy efficiency. Research findings suggested that the developed model can reduce network energy costs without negatively impacting performance or end customer experience against the classical Machine Learning and Statistical driven models. The proposed model is validated against the industry-standardized energy efficiency definition, and operational expenditure savings are derived, showing significant cost savings to MNOs.Introduction -- A deep neural network framework towards a resilient, efficient, and secure network slicing in Beyond 5G Networks -- Adaptive resource management techniques for network slicing in Beyond 5G networks using transfer learning -- Energy and cost analysis for network slicing deployment in Beyond 5G networks -- Conclusion and future scop

    Securing the Internet of Things: A Study on Machine Learning-Based Solutions for IoT Security and Privacy Challenges

    Get PDF
    The Internet of Things (IoT) is a rapidly growing technology that connects and integrates billions of smart devices, generating vast volumes of data and impacting various aspects of daily life and industrial systems. However, the inherent characteristics of IoT devices, including limited battery life, universal connectivity, resource-constrained design, and mobility, make them highly vulnerable to cybersecurity attacks, which are increasing at an alarming rate. As a result, IoT security and privacy have gained significant research attention, with a particular focus on developing anomaly detection systems. In recent years, machine learning (ML) has made remarkable progress, evolving from a lab novelty to a powerful tool in critical applications. ML has been proposed as a promising solution for addressing IoT security and privacy challenges. In this article, we conducted a study of the existing security and privacy challenges in the IoT environment. Subsequently, we present the latest ML-based models and solutions to address these challenges, summarizing them in a table that highlights the key parameters of each proposed model. Additionally, we thoroughly studied available datasets related to IoT technology. Through this article, readers will gain a detailed understanding of IoT architecture, security attacks, and countermeasures using ML techniques, utilizing available datasets. We also discuss future research directions for ML-based IoT security and privacy. Our aim is to provide valuable insights into the current state of research in this field and contribute to the advancement of IoT security and privacy

    Insights into temperature controls on rockfall occurrence and cliff erosion

    Get PDF
    A variety of environmental triggers have been associated with the occurrence of rockfalls however their role and relative significance remains poorly constrained. This is in part due to the lack of concurrent data on rockfall occurrence and cliff face conditions at temporal resolutions that mirror the variability of environmental conditions, and over durations for large enough numbers of rockfall events to be captured. The aim of this thesis is to fill this data gap, and then to specifically focus on the role of temperature in triggering rockfall that this data illuminates. To achieve this, a long-term multiannual 3D rockfall dataset and contemporaneous Infrared Thermography (IRT) monitoring of cliff surface temperatures has been generated. The approaches used in this thesis are undertaken at East Cliff, Whitby, which is a coastal cliff located in North Yorkshire, UK. The monitored section is ~ 200 m wide and ~65 m high, with a total cliff face area of ~9,592 mÂČ. A method for the automated quantification of rockfall volumes is used to explore data collected between 2017–2019 and 2021, with the resulting inventory including > 8,300 rockfalls from 2017–2019 and > 4,100 rockfalls in 2021, totalling > 12,400 number of rockfalls. The analysis of the inventory demonstrates that during dry conditions, increases in rockfall frequency are coincident with diurnal surface temperature fluctuations, notably at sunrise, noon and sunset in all seasons, leading to a marked diurnal pattern of rockfall. Statistically significant relationships are observed to link cliff temperature and rockfall, highlighting the response of rock slopes to absolute temperatures and changes in temperature. This research also shows that inclement weather constitutes the dominant control over the annual production of rockfalls but also quantifies the period when temperature controls are dominant. Temperature-controlled rockfall activity is shown to have an important erosional role, particularly in periods of iterative erosion dominated by small size rockfalls. As such, this thesis provides for the first high-resolution evidence of temperature controls on rockfall activity, cliff erosion and landform development

    Challenges and Limitation Analysis of an IoT-Dependent System for Deployment in Smart Healthcare Using Communication Standards Features

    Get PDF
    The use of IoT technology is rapidly increasing in healthcare development and smart healthcare system for fitness programs, monitoring, data analysis, etc. To improve the efficiency of monitoring, various studies have been conducted in this field to achieve improved precision. The architecture proposed herein is based on IoT integrated with a cloud system in which power absorption and accuracy are major concerns. We discuss and analyze development in this domain to improve the performance of IoT systems related to health care. Standards of communication for IoT data transmission and reception can help to understand the exact power absorption in different devices to achieve improved performance for healthcare development. We also systematically analyze the use of IoT in healthcare systems using cloud features, as well as the performance and limitations of IoT in this field. Furthermore, we discuss the design of an IoT system for efficient monitoring of various healthcare issues in elderly people and limitations of an existing system in terms of resources, power absorption and security when implemented in different devices as per requirements. Blood pressure and heartbeat monitoring in pregnant women are examples of high-intensity applications of NB-IoT (narrowband IoT), technology that supports widespread communication with a very low data cost and minimum processing complexity and battery lifespan. This article also focuses on analysis of the performance of narrowband IoT in terms of delay and throughput using singleand multinode approaches. We performed analysis using the message queuing telemetry transport protocol (MQTTP), which was found to be efficient compared to the limited application protocol (LAP) in sending information from sensors.Ministerio Español de Ciencia e Innovación under project number PID2020-115570GB-C22 (DemocratAI::UGR)Cåtedra de Empresa Tecnología para las Personas (UGR-Fujitsu
    • 

    corecore