1,023 research outputs found
Design Models for Trusted Communications in Vehicle-to-Everything (V2X) Networks
Intelligent transportation system is one of the main systems which has been developed to achieve safe traffic and efficient transportation. It enables the road entities to establish connections with other road entities and infrastructure units using Vehicle-to-Everything (V2X) communications. To improve the driving experience, various applications are implemented to allow for road entities to share the information among each other. Then, based on the received information, the road entity can make its own decision regarding road safety and guide the driver. However, when these packets are dropped for any reason, it could lead to inaccurate decisions due to lack of enough information. Therefore, the packets should be sent through a trusted communication. The trusted communication includes a trusted link and trusted road entity. Before sending packets, the road entity should assess the link quality and choose the trusted link to ensure the packet delivery. Also, evaluating the neighboring node behavior is essential to obtain trusted communications because some misbehavior nodes may drop the received packets.
As a consequence, two main models are designed to achieve trusted V2X communications. First, a multi-metric Quality of Service (QoS)-balancing relay selection algorithm is proposed to elect the trusted link. Analytic Hierarchy Process (AHP) is applied to evaluate the link based on three metrics, which are channel capacity, link stability and end-to-end delay. Second, a recommendation-based trust model is designed for V2X communication to exclude misbehavior nodes. Based on a comparison between trust-based methods, weighted-sum is chosen in the proposed model. The proposed methods ensure trusted communications by reducing the Packet Dropping Rate (PDR) and increasing the end-to-end delivery packet ratio. In addition, the proposed trust model achieves a very low False Negative Rate (FNR) in comparison with an existing model
IoT trust and reputation: a survey and taxonomy
IoT is one of the fastest-growing technologies and it is estimated that more
than a billion devices would be utilized across the globe by the end of 2030.
To maximize the capability of these connected entities, trust and reputation
among IoT entities is essential. Several trust management models have been
proposed in the IoT environment; however, these schemes have not fully
addressed the IoT devices features, such as devices role, device type and its
dynamic behavior in a smart environment. As a result, traditional trust and
reputation models are insufficient to tackle these characteristics and
uncertainty risks while connecting nodes to the network. Whilst continuous
study has been carried out and various articles suggest promising solutions in
constrained environments, research on trust and reputation is still at its
infancy. In this paper, we carry out a comprehensive literature review on
state-of-the-art research on the trust and reputation of IoT devices and
systems. Specifically, we first propose a new structure, namely a new taxonomy,
to organize the trust and reputation models based on the ways trust is managed.
The proposed taxonomy comprises of traditional trust management-based systems
and artificial intelligence-based systems, and combine both the classes which
encourage the existing schemes to adapt these emerging concepts. This
collaboration between the conventional mathematical and the advanced ML models
result in design schemes that are more robust and efficient. Then we drill down
to compare and analyse the methods and applications of these systems based on
community-accepted performance metrics, e.g. scalability, delay,
cooperativeness and efficiency. Finally, built upon the findings of the
analysis, we identify and discuss open research issues and challenges, and
further speculate and point out future research directions.Comment: 20 pages, 5 Figures, 3 tables, Journal of cloud computin
IoT trust and reputation: a survey and taxonomy
IoT is one of the fastest-growing technologies and it is estimated that more
than a billion devices would be utilized across the globe by the end of 2030.
To maximize the capability of these connected entities, trust and reputation
among IoT entities is essential. Several trust management models have been
proposed in the IoT environment; however, these schemes have not fully
addressed the IoT devices features, such as devices role, device type and its
dynamic behavior in a smart environment. As a result, traditional trust and
reputation models are insufficient to tackle these characteristics and
uncertainty risks while connecting nodes to the network. Whilst continuous
study has been carried out and various articles suggest promising solutions in
constrained environments, research on trust and reputation is still at its
infancy. In this paper, we carry out a comprehensive literature review on
state-of-the-art research on the trust and reputation of IoT devices and
systems. Specifically, we first propose a new structure, namely a new taxonomy,
to organize the trust and reputation models based on the ways trust is managed.
The proposed taxonomy comprises of traditional trust management-based systems
and artificial intelligence-based systems, and combine both the classes which
encourage the existing schemes to adapt these emerging concepts. This
collaboration between the conventional mathematical and the advanced ML models
result in design schemes that are more robust and efficient. Then we drill down
to compare and analyse the methods and applications of these systems based on
community-accepted performance metrics, e.g. scalability, delay,
cooperativeness and efficiency. Finally, built upon the findings of the
analysis, we identify and discuss open research issues and challenges, and
further speculate and point out future research directions.Comment: 20 pages, 5 Figures, 3 tables, Journal of cloud computin
Integrated Framework for Secure and Energy Efficient Communication System in Heterogeneous Sensory Application
Irrespective of different forms and strategies implementing for securing Wireless Sensor Network (WSN), there are very less strategies that offers cost effective security over heterogeneous network. Therefore, this paper presents an integrated set of different processes that emphasize over secure routing, intellectual and delay-compensated routing, and optimization principle with a sole intention of securing the communication to and from the sensor nodes during data aggregation. The processed system advocates the non-usage of complex cryptography and encourages the usage of probability their and analytical modelling in order to render more practical implementation. The simulated outcome of study shows that proposed system offers reduced delay, more throughputs, and reduced energy consumption in contrast to existing system
A Survey and Future Directions on Clustering: From WSNs to IoT and Modern Networking Paradigms
Many Internet of Things (IoT) networks are created as an overlay over traditional ad-hoc networks such as Zigbee. Moreover, IoT networks can resemble ad-hoc networks over networks that support device-to-device (D2D) communication, e.g., D2D-enabled cellular networks and WiFi-Direct. In these ad-hoc types of IoT networks, efficient topology management is a crucial requirement, and in particular in massive scale deployments. Traditionally, clustering has been recognized as a common approach for topology management in ad-hoc networks, e.g., in Wireless Sensor Networks (WSNs). Topology management in WSNs and ad-hoc IoT networks has many design commonalities as both need to transfer data to the destination hop by hop. Thus, WSN clustering techniques can presumably be applied for topology management in ad-hoc IoT networks. This requires a comprehensive study on WSN clustering techniques and investigating their applicability to ad-hoc IoT networks. In this article, we conduct a survey of this field based on the objectives for clustering, such as reducing energy consumption and load balancing, as well as the network properties relevant for efficient clustering in IoT, such as network heterogeneity and mobility. Beyond that, we investigate the advantages and challenges of clustering when IoT is integrated with modern computing and communication technologies such as Blockchain, Fog/Edge computing, and 5G. This survey provides useful insights into research on IoT clustering, allows broader understanding of its design challenges for IoT networks, and sheds light on its future applications in modern technologies integrated with IoT.acceptedVersio
A Review of Wireless Sensor Networks with Cognitive Radio Techniques and Applications
The advent of Wireless Sensor Networks (WSNs) has inspired various sciences and telecommunication with its applications, there is a growing demand for robust methodologies that can ensure extended lifetime. Sensor nodes are small equipment which may hold less electrical energy and preserve it until they reach the destination of the network. The main concern is supposed to carry out sensor routing process along with transferring information. Choosing the best route for transmission in a sensor node is necessary to reach the destination and conserve energy. Clustering in the network is considered to be an effective method for gathering of data and routing through the nodes in wireless sensor networks. The primary requirement is to extend network lifetime by minimizing the consumption of energy. Further integrating cognitive radio technique into sensor networks, that can make smart choices based on knowledge acquisition, reasoning, and information sharing may support the network's complete purposes amid the presence of several limitations and optimal targets. This examination focuses on routing and clustering using metaheuristic techniques and machine learning because these characteristics have a detrimental impact on cognitive radio wireless sensor node lifetime
Blockchain-Based and Fuzzy Logic-Enabled False Data Discovery for the Intelligent Autonomous Vehicular System
Since the beginning of this decade, several incidents report that false data
injection attacks targeting intelligent connected vehicles cause huge
industrial damage and loss of lives. Data Theft, Flooding, Fuzzing, Hijacking,
Malware Spoofing and Advanced Persistent Threats have been immensely growing
attack that leads to end-user conflict by abolishing trust on autonomous
vehicle. Looking after those sensitive data that contributes to measure the
localisation factors of the vehicle, conventional centralised techniques can be
misused to update the legitimate vehicular status maliciously. As investigated,
the existing centralized false data detection approach based on state and
likelihood estimation has a reprehensible trade-off in terms of accuracy,
trust, cost, and efficiency. Blockchain with Fuzzy-logic Intelligence has shown
its potential to solve localisation issues, trust and false data detection
challenges encountered by today's autonomous vehicular system. The proposed
Blockchain-based fuzzy solution demonstrates a novel false data detection and
reputation preservation technique. The illustrated proposed model filters false
and anomalous data based on the vehicles' rules and behaviours. Besides
improving the detection accuracy and eliminating the single point of failure,
the contributions include appropriating fuzzy AI functions within the Road-side
Unit node before authorizing status data by a Blockchain network. Finally,
thorough experimental evaluation validates the effectiveness of the proposed
model.Comment: 11 pages, 11 figures, 4 tables AsiaCCS conference 202
A Survey on Trust Computation in the Internet of Things
Internet of Things defines a large number of diverse entities and services which interconnect with each other and individually or cooperatively operate depending on context, conditions and environments, produce a huge personal and sensitive data. In this scenario, the satisfaction of privacy, security and trust plays a critical role in the success of the Internet of Things. Trust here can be considered as a key property to establish trustworthy and seamless connectivity among entities and to guarantee secure services and applications. The aim of this study is to provide a survey on various trust computation strategies and identify future trends in the field. We discuss trust computation methods under several aspects and provide comparison of the approaches based on trust features, performance, advantages, weaknesses and limitations of each strategy. Finally the research discuss on the gap of the trust literature and raise some research directions in trust computation in the Internet of Things
Algorithms based on spider daddy long legs for finding the optimal route in securing mobile ad hoc networks
Mobile ad hoc networks (MANETs) are wireless networks that are subject to severe attacks, such as the black hole attack. One of the goals in the research is to find a method to prevent black hole attacks without decreasing network throughput or
increasing routing overhead. The routing mechanism in define uses route requests (RREQs; for discovering routes) and route replies (RREPs; for receiving paths). However, this mechanism is vulnerable to attacks by malicious black hole nodes. The mechanism is developed to find the shortest secure path and to reduce overhead using
the information that is available in the routing tables as an input to propose a more complex nature-inspired algorithm. The new method is called the Daddy Long-Legs Algorithm (PGO-DLLA), which modifies the standard AODV and optimizes the
routing process. This method avoids dependency exclusively on the hop counts and destination sequence numbers (DSNs) that are exploited by malicious nodes in the standard AODV protocol. The experiment by performance metrics End-to-End delay
and packet delivery ratio are compared in order to determine the best effort traffic. The results showed the PGO-DLLA improvement of the shortest and secure routing from black hole attack in MANET. In addition, the results indicate better performance
than the related works algorithm with respect to all metrics excluding throughput which AntNet is best in routing when the pause time be more than 40 seconds. PGODLLA is able to improve the route discovery against the black hole attacks in AODV.
Experiments in this thesis have shown that PGO-DLLA is able to reduce the normalized routing load, end-to-end delay, and packet loss and has a good throughput and packet delivery ratio when compared with the standard AODV protocol, BAODV protocol, and the current related protocols that enhance the routing security of the AODV protocols
- …