11,320 research outputs found

    Prevention of cyberattacks in WSN and packet drop by CI framework and information processing protocol using AI and Big Data

    Full text link
    As the reliance on wireless sensor networks (WSNs) rises in numerous sectors, cyberattack prevention and data transmission integrity become essential problems. This study provides a complete framework to handle these difficulties by integrating a cognitive intelligence (CI) framework, an information processing protocol, and sophisticated artificial intelligence (AI) and big data analytics approaches. The CI architecture is intended to improve WSN security by dynamically reacting to an evolving threat scenario. It employs artificial intelligence algorithms to continuously monitor and analyze network behavior, identifying and mitigating any intrusions in real time. Anomaly detection algorithms are also included in the framework to identify packet drop instances caused by attacks or network congestion. To support the CI architecture, an information processing protocol focusing on efficient and secure data transfer within the WSN is introduced. To protect data integrity and prevent unwanted access, this protocol includes encryption and authentication techniques. Furthermore, it enhances the routing process with the use of AI and big data approaches, providing reliable and timely packet delivery. Extensive simulations and tests are carried out to assess the efficiency of the suggested framework. The findings show that it is capable of detecting and preventing several forms of assaults, including as denial-of-service (DoS) attacks, node compromise, and data tampering. Furthermore, the framework is highly resilient to packet drop occurrences, which improves the WSN's overall reliability and performanc

    Dynamical strategies for obstacle avoidance during Dictyostelium discoideum aggregation: a Multi-agent system model

    Get PDF
    Chemotaxis, the movement of an organism in response to chemical stimuli, is a typical feature of many microbiological systems. In particular, the social amoeba \textit{Disctyostelium discoideum} is widely used as a model organism, but it is not still clear how it behaves in heterogeneous environments. A few models focusing on mechanical features have already addressed the question; however, we suggest that phenomenological models focusing on the population dynamics may provide new meaningful data. Consequently, by means of a specific Multi-agent system model, we study the dynamical features emerging from complex social interactions among individuals belonging to amoeba colonies.\\ After defining an appropriate metric to quantitatively estimate the gathering process, we find that: a) obstacles play the role of local topological perturbation, as they alter the flux of chemical signals; b) physical obstacles (blocking the cellular motion and the chemical flux) and purely chemical obstacles (only interfering with chemical flux) elicit similar dynamical behaviors; c) a minimal program for robustly gathering simulated cells does not involve mechanisms for obstacle sensing and avoidance; d) fluctuations of the dynamics concur in preventing multiple stable clusters. Comparing those findings with previous results, we speculate about the fact that chemotactic cells can avoid obstacles by simply following the altered chemical gradient. Social interactions are sufficient to guarantee the aggregation of the whole colony past numerous obstacles

    Why (and How) Networks Should Run Themselves

    Full text link
    The proliferation of networked devices, systems, and applications that we depend on every day makes managing networks more important than ever. The increasing security, availability, and performance demands of these applications suggest that these increasingly difficult network management problems be solved in real time, across a complex web of interacting protocols and systems. Alas, just as the importance of network management has increased, the network has grown so complex that it is seemingly unmanageable. In this new era, network management requires a fundamentally new approach. Instead of optimizations based on closed-form analysis of individual protocols, network operators need data-driven, machine-learning-based models of end-to-end and application performance based on high-level policy goals and a holistic view of the underlying components. Instead of anomaly detection algorithms that operate on offline analysis of network traces, operators need classification and detection algorithms that can make real-time, closed-loop decisions. Networks should learn to drive themselves. This paper explores this concept, discussing how we might attain this ambitious goal by more closely coupling measurement with real-time control and by relying on learning for inference and prediction about a networked application or system, as opposed to closed-form analysis of individual protocols

    Building strategic resilience in food supply chain

    Get PDF
    Purpose – The purpose of this paper is to consider the concept of strategic business resilience in order to postulate innovative mechanisms to drive business performance in the food supply chain. Design/methodology/approach – The research included a literature review and the development of a resilience model that can be adopted in the food supply chain at both a strategic and an operational level. Findings – Conflicts of interest exist for organisations that are seeking to strategically and effectively manage the pluralistic nature of internal and external supply chain risks. The model derived in this research can be used in the food supply chain to drive supply chain agility, organisational stability and longevity, and as a result continuous improvement. Originality/value – This research is of academic value and of value to policy makers and practitioners in the food supply chai

    Random Linear Network Coding for 5G Mobile Video Delivery

    Get PDF
    An exponential increase in mobile video delivery will continue with the demand for higher resolution, multi-view and large-scale multicast video services. Novel fifth generation (5G) 3GPP New Radio (NR) standard will bring a number of new opportunities for optimizing video delivery across both 5G core and radio access networks. One of the promising approaches for video quality adaptation, throughput enhancement and erasure protection is the use of packet-level random linear network coding (RLNC). In this review paper, we discuss the integration of RLNC into the 5G NR standard, building upon the ideas and opportunities identified in 4G LTE. We explicitly identify and discuss in detail novel 5G NR features that provide support for RLNC-based video delivery in 5G, thus pointing out to the promising avenues for future research.Comment: Invited paper for Special Issue "Network and Rateless Coding for Video Streaming" - MDPI Informatio

    Enhancing Security and Energy Efficiency in Wireless Sensor Network Routing with IOT Challenges: A Thorough Review

    Get PDF
    Wireless sensor networks (WSNs) have emerged as a crucial component in the field of networking due to their cost-effectiveness, efficiency, and compact size, making them invaluable for various applications. However, as the reliance on WSN-dependent applications continues to grow, these networks grapple with inherent limitations such as memory and computational constraints. Therefore, effective solutions require immediate attention, especially in the age of the Internet of Things (IoT), which largely relies on the effectiveness of WSNs. This study undertakes a comprehensive review of research conducted between 2018 and 2020, categorizing it into six main domains: 1) Providing an overview of WSN applications, management, and security considerations. 2) Focusing on routing and energy-saving techniques. 3) Reviewing the development of methods for information gathering, emphasizing data integrity and privacy. 4) Emphasizing connectivity and positioning techniques. 5) Examining studies that explore the integration of IoT technology into WSNs with an eye on secure data transmission. 6) Highlighting research efforts aimed at energy efficiency. The study addresses the motivation behind employing WSN applications in IoT technologies, as well as the challenges, obstructions, and solutions related to their application and development. It underscores that energy consumption remains a paramount issue in WSNs, with untapped potential for improving energy efficiency while ensuring robust security. Furthermore, it identifies existing approaches' weaknesses, rendering them inadequate for achieving energy-efficient routing in secure WSNs. This review sheds light on the critical challenges and opportunities in the field, contributing to a deeper understanding of WSNs and their role in secure IoT applications
    • …
    corecore