415 research outputs found

    SUTMS - Unified Threat Management Framework for Home Networks

    Get PDF
    Home networks were initially designed for web browsing and non-business critical applications. As infrastructure improved, internet broadband costs decreased, and home internet usage transferred to e-commerce and business-critical applications. Today’s home computers host personnel identifiable information and financial data and act as a bridge to corporate networks via remote access technologies like VPN. The expansion of remote work and the transition to cloud computing have broadened the attack surface for potential threats. Home networks have become the extension of critical networks and services, hackers can get access to corporate data by compromising devices attacked to broad- band routers. All these challenges depict the importance of home-based Unified Threat Management (UTM) systems. There is a need of unified threat management framework that is developed specifically for home and small networks to address emerging security challenges. In this research, the proposed Smart Unified Threat Management (SUTMS) framework serves as a comprehensive solution for implementing home network security, incorporating firewall, anti-bot, intrusion detection, and anomaly detection engines into a unified system. SUTMS is able to provide 99.99% accuracy with 56.83% memory improvements. IPS stands out as the most resource-intensive UTM service, SUTMS successfully reduces the performance overhead of IDS by integrating it with the flow detection mod- ule. The artifact employs flow analysis to identify network anomalies and categorizes encrypted traffic according to its abnormalities. SUTMS can be scaled by introducing optional functions, i.e., routing and smart logging (utilizing Apriori algorithms). The research also tackles one of the limitations identified by SUTMS through the introduction of a second artifact called Secure Centralized Management System (SCMS). SCMS is a lightweight asset management platform with built-in security intelligence that can seamlessly integrate with a cloud for real-time updates

    Particle Swarm Optimization for Interference Mitigation of Wireless Body Area Network: A Systematic Review

    Get PDF
    Wireless body area networks (WBAN) has now become an important technology in supporting services in the health sector and several other fields. Various surveys and research have been carried out massively on the use of swarm intelligent (SI) algorithms in various fields in the last ten years, but the use of SI in wireless body area networks (WBAN) in the last five years has not seen any significant progress. The aim of this research is to clarify and convince as well as to propose a answer to this problem, we have identified opportunities and topic trends using the particle swarm optimization (PSO) procedure as one of the swarm intelligence for optimizing wireless body area network interference mitigation performance. In this research, we analyzes primary studies collected using predefined exploration strings on online databases with the help of Publish or Perish and by the preferred reporting items for systematic reviews and meta-analysis (PRISMA) way. Articles were carefully selected for further analysis. It was found that very few researchers included optimization methods for swarm intelligence, especially PSO, in mitigating wireless body area network interference, whether for intra, inter, or cross-WBAN interference. This paper contributes to identifying the gap in using PSO for WBAN interference and also offers opportunities for using PSO both standalone and hybrid with other methods to further research on mitigating WBAN interference

    Energy Efficient Multi-hop routing scheme using Taylor based Gravitational Search Algorithm in Wireless Sensor Networks

    Get PDF
    A group of small sensors can participate in the wireless network infrastructure and make appropriate transmission and communication sensor networks. There are numerous uses for drones, including military, medical, agricultural, and atmospheric monitoring. The power sources available to nodes in WSNs are restricted. Furthermore, because of this, a diverse method of energy availability is required, primarily for communication over a vast distance, for which Multi-Hop (MH) systems are used. Obtaining the optimum routing path between nodes is still a significant problem, even when multi-hop systems reduce the cost of energy needed by every node along the way. As a result, the number of transmissions must be kept to a minimum to provide effective routing and extend the system\u27s lifetime. To solve the energy problem in WSN, Taylor based Gravitational Search Algorithm (TBGSA) is proposed, which combines the Taylor series with a Gravitational search algorithm to discover the best hops for multi-hop routing. Initially, the sensor nodes are categorised as groups or clusters and the maximum capable node can access the cluster head the next action is switching between multiple nodes via a multi-hop manner. Initially, the best (CH) Cluster Head is chosen using the Artificial Bee Colony (ABC) algorithm, and then the data is transmitted utilizing multi-hop routing. The comparison result shows out the extension of networks longevity of the proposed method with the existing EBMRS, MOGA, and DMEERP methods. The network lifetime of the proposed method increased by 13.2%, 21.9% and 29.2% better than DMEERP, MOGA, and EBMRS respectively

    Machine Learning Centered Energy Optimization In Cloud Computing: A Review

    Get PDF
    The rapid growth of cloud computing has led to a significant increase in energy consumption, which is a major concern for the environment and economy. To address this issue, researchers have proposed various techniques to improve the energy efficiency of cloud computing, including the use of machine learning (ML) algorithms. This research provides a comprehensive review of energy efficiency in cloud computing using ML techniques and extensively compares different ML approaches in terms of the learning model adopted, ML tools used, model strengths and limitations, datasets used, evaluation metrics and performance. The review categorizes existing approaches into Virtual Machine (VM) selection, VM placement, VM migration, and consolidation methods. This review highlights that among the array of ML models, Deep Reinforcement Learning, TensorFlow as a platform, and CloudSim for dataset generation are the most widely adopted in the literature and emerge as the best choices for constructing ML-driven models that optimize energy consumption in cloud computing

    An optimal scheduling method in iot-fog-cloud network using combination of aquila optimizer and african vultures optimization

    Get PDF
    Today, fog and cloud computing environments can be used to further develop the Internet of Things (IoT). In such environments, task scheduling is very efficient for executing user requests, and the optimal scheduling of IoT task requests increases the productivity of the IoT-fog-cloud system. In this paper, a hybrid meta-heuristic (MH) algorithm is developed to schedule the IoT requests in IoT-fog-cloud networks using the Aquila Optimizer (AO) and African Vultures Optimization Algorithm (AVOA) called AO_AVOA. In AO_AVOA, the exploration phase of AVOA is improved by using AO operators to obtain the best solution during the process of finding the optimal scheduling solution. A comparison between AO_AVOA and methods of AVOA, AO, Firefly Algorithm (FA), particle swarm optimization (PSO), and Harris Hawks Optimization (HHO) according to performance metrics such as makespan and throughput shows the high ability of AO_AVOA to solve the scheduling problem in IoT-fog-cloud networks. © 2023 by the authors

    Security and Privacy for Modern Wireless Communication Systems

    Get PDF
    The aim of this reprint focuses on the latest protocol research, software/hardware development and implementation, and system architecture design in addressing emerging security and privacy issues for modern wireless communication networks. Relevant topics include, but are not limited to, the following: deep-learning-based security and privacy design; covert communications; information-theoretical foundations for advanced security and privacy techniques; lightweight cryptography for power constrained networks; physical layer key generation; prototypes and testbeds for security and privacy solutions; encryption and decryption algorithm for low-latency constrained networks; security protocols for modern wireless communication networks; network intrusion detection; physical layer design with security consideration; anonymity in data transmission; vulnerabilities in security and privacy in modern wireless communication networks; challenges of security and privacy in node–edge–cloud computation; security and privacy design for low-power wide-area IoT networks; security and privacy design for vehicle networks; security and privacy design for underwater communications networks

    Cost Optimization Approach for MANET using Particle Swarm Optimization

    Get PDF
    This paper present the approach require to increase the QoS of MANET network using particle swarm optimization algorithm. To improve data communication between two nodes we propose an efficient algorithm for AODV protocol using PSO where instead of suppling all default parameter with default value of AODV protocol we try to provide selective parameters with optimum value so that overall requirement of control packet get decrease that in turn result in to increase quality of service parameters of MANET. For the enhancement of reliability and reduction of cost, node speed control mechanism is implemented using PSO, The given method which is use for simulation, reduces the overall loss of data and also make transmission effective. We have also tested the performance of network by changing data rates and the speed of the node

    A Recent Connected Vehicle - IoT Automotive Application Based on Communication Technology

    Get PDF
    Realizing the full potential of vehicle communications depends in large part on the infrastructure of vehicular networks. As more cars are connected to the Internet and one another, new technological advancements are being driven by a multidisciplinary approach. As transportation networks become more complicated, academic, and automotive researchers collaborate to offer their thoughts and answers. They also imagine various applications to enhance mobility and the driving experience. Due to the requirement for low latency, faster throughput, and increased reliability, wireless access technologies and an appropriate (potentially dedicated) infrastructure present substantial hurdles to communication systems. This article provides a comprehensive overview of the wireless access technologies, deployment, and connected car infrastructures that enable vehicular connectivity. The challenges, issues, services, and maintenance of connected vehicles that rely on infrastructure-based vehicular communications are also identified in this paper

    Metaheuristics Techniques for Cluster Head Selection in WSN: A Survey

    Get PDF
    In recent years, Wireless sensor communication is growing expeditiously on the capability to gather information, communicate and transmit data effectively. Clustering is the main objective of improving the network lifespan in Wireless sensor network. It includes selecting the cluster head for each cluster in addition to grouping the nodes into clusters. The cluster head gathers data from the normal nodes in the cluster, and the gathered information is then transmitted to the base station. However, there are many reasons in effect opposing unsteady cluster head selection and dead nodes. The technique for selecting a cluster head takes into factors to consider including residual energy, neighbors’ nodes, and the distance between the base station to the regular nodes. In this study, we thoroughly investigated by number of methods of selecting a cluster head and constructing a cluster. Additionally, a quick performance assessment of the techniques' performance is given together with the methods' criteria, advantages, and future directions

    LIPIcs, Volume 261, ICALP 2023, Complete Volume

    Get PDF
    LIPIcs, Volume 261, ICALP 2023, Complete Volum
    • …
    corecore