11,320 research outputs found
Prevention of cyberattacks in WSN and packet drop by CI framework and information processing protocol using AI and Big Data
As the reliance on wireless sensor networks (WSNs) rises in numerous sectors,
cyberattack prevention and data transmission integrity become essential
problems. This study provides a complete framework to handle these difficulties
by integrating a cognitive intelligence (CI) framework, an information
processing protocol, and sophisticated artificial intelligence (AI) and big
data analytics approaches. The CI architecture is intended to improve WSN
security by dynamically reacting to an evolving threat scenario. It employs
artificial intelligence algorithms to continuously monitor and analyze network
behavior, identifying and mitigating any intrusions in real time. Anomaly
detection algorithms are also included in the framework to identify packet drop
instances caused by attacks or network congestion. To support the CI
architecture, an information processing protocol focusing on efficient and
secure data transfer within the WSN is introduced. To protect data integrity
and prevent unwanted access, this protocol includes encryption and
authentication techniques. Furthermore, it enhances the routing process with
the use of AI and big data approaches, providing reliable and timely packet
delivery. Extensive simulations and tests are carried out to assess the
efficiency of the suggested framework. The findings show that it is capable of
detecting and preventing several forms of assaults, including as
denial-of-service (DoS) attacks, node compromise, and data tampering.
Furthermore, the framework is highly resilient to packet drop occurrences,
which improves the WSN's overall reliability and performanc
Dynamical strategies for obstacle avoidance during Dictyostelium discoideum aggregation: a Multi-agent system model
Chemotaxis, the movement of an organism in response to chemical stimuli, is a
typical feature of many microbiological systems. In particular, the social
amoeba \textit{Disctyostelium discoideum} is widely used as a model organism,
but it is not still clear how it behaves in heterogeneous environments. A few
models focusing on mechanical features have already addressed the question;
however, we suggest that phenomenological models focusing on the population
dynamics may provide new meaningful data. Consequently, by means of a specific
Multi-agent system model, we study the dynamical features emerging from complex
social interactions among individuals belonging to amoeba colonies.\\ After
defining an appropriate metric to quantitatively estimate the gathering
process, we find that: a) obstacles play the role of local topological
perturbation, as they alter the flux of chemical signals; b) physical obstacles
(blocking the cellular motion and the chemical flux) and purely chemical
obstacles (only interfering with chemical flux) elicit similar dynamical
behaviors; c) a minimal program for robustly gathering simulated cells does not
involve mechanisms for obstacle sensing and avoidance; d) fluctuations of the
dynamics concur in preventing multiple stable clusters. Comparing those
findings with previous results, we speculate about the fact that chemotactic
cells can avoid obstacles by simply following the altered chemical gradient.
Social interactions are sufficient to guarantee the aggregation of the whole
colony past numerous obstacles
Why (and How) Networks Should Run Themselves
The proliferation of networked devices, systems, and applications that we
depend on every day makes managing networks more important than ever. The
increasing security, availability, and performance demands of these
applications suggest that these increasingly difficult network management
problems be solved in real time, across a complex web of interacting protocols
and systems. Alas, just as the importance of network management has increased,
the network has grown so complex that it is seemingly unmanageable. In this new
era, network management requires a fundamentally new approach. Instead of
optimizations based on closed-form analysis of individual protocols, network
operators need data-driven, machine-learning-based models of end-to-end and
application performance based on high-level policy goals and a holistic view of
the underlying components. Instead of anomaly detection algorithms that operate
on offline analysis of network traces, operators need classification and
detection algorithms that can make real-time, closed-loop decisions. Networks
should learn to drive themselves. This paper explores this concept, discussing
how we might attain this ambitious goal by more closely coupling measurement
with real-time control and by relying on learning for inference and prediction
about a networked application or system, as opposed to closed-form analysis of
individual protocols
Building strategic resilience in food supply chain
Purpose
– The purpose of this paper is to consider the concept of strategic business resilience in order to postulate innovative mechanisms to drive business performance in the food supply chain.
Design/methodology/approach
– The research included a literature review and the development of a resilience model that can be adopted in the food supply chain at both a strategic and an operational level.
Findings
– Conflicts of interest exist for organisations that are seeking to strategically and effectively manage the pluralistic nature of internal and external supply chain risks. The model derived in this research can be used in the food supply chain to drive supply chain agility, organisational stability and longevity, and as a result continuous improvement.
Originality/value
– This research is of academic value and of value to policy makers and practitioners in the food supply chai
Random Linear Network Coding for 5G Mobile Video Delivery
An exponential increase in mobile video delivery will continue with the
demand for higher resolution, multi-view and large-scale multicast video
services. Novel fifth generation (5G) 3GPP New Radio (NR) standard will bring a
number of new opportunities for optimizing video delivery across both 5G core
and radio access networks. One of the promising approaches for video quality
adaptation, throughput enhancement and erasure protection is the use of
packet-level random linear network coding (RLNC). In this review paper, we
discuss the integration of RLNC into the 5G NR standard, building upon the
ideas and opportunities identified in 4G LTE. We explicitly identify and
discuss in detail novel 5G NR features that provide support for RLNC-based
video delivery in 5G, thus pointing out to the promising avenues for future
research.Comment: Invited paper for Special Issue "Network and Rateless Coding for
Video Streaming" - MDPI Informatio
Enhancing Security and Energy Efficiency in Wireless Sensor Network Routing with IOT Challenges: A Thorough Review
Wireless sensor networks (WSNs) have emerged as a crucial component in the field of networking due to their cost-effectiveness, efficiency, and compact size, making them invaluable for various applications. However, as the reliance on WSN-dependent applications continues to grow, these networks grapple with inherent limitations such as memory and computational constraints. Therefore, effective solutions require immediate attention, especially in the age of the Internet of Things (IoT), which largely relies on the effectiveness of WSNs. This study undertakes a comprehensive review of research conducted between 2018 and 2020, categorizing it into six main domains: 1) Providing an overview of WSN applications, management, and security considerations. 2) Focusing on routing and energy-saving techniques. 3) Reviewing the development of methods for information gathering, emphasizing data integrity and privacy. 4) Emphasizing connectivity and positioning techniques. 5) Examining studies that explore the integration of IoT technology into WSNs with an eye on secure data transmission. 6) Highlighting research efforts aimed at energy efficiency. The study addresses the motivation behind employing WSN applications in IoT technologies, as well as the challenges, obstructions, and solutions related to their application and development. It underscores that energy consumption remains a paramount issue in WSNs, with untapped potential for improving energy efficiency while ensuring robust security. Furthermore, it identifies existing approaches' weaknesses, rendering them inadequate for achieving energy-efficient routing in secure WSNs. This review sheds light on the critical challenges and opportunities in the field, contributing to a deeper understanding of WSNs and their role in secure IoT applications
- …