109 research outputs found

    Trust-based secure clustering in WSN-based intelligent transportation systems

    Get PDF
    Increasing the number of vehicles on roads leads to congestion and safety problems. Wireless Sensor Network (WSN) is a promising technology providing Intelligent Transportation Systems (ITS) to address these problems. Usually, WSN-based applications, including ITS ones, incur high communication overhead to support efficient connectivity and communication activities. In the ITS environment, clustering would help in addressing the high communication overhead problem. In this paper, we introduce a bio-inspired and trust-based cluster head selection approach for WSN adopted in ITS applications. A trust model is designed and used to compute a trust level for each node and the Bat Optimization Algorithm (BOA) is used to select the cluster heads based on three parameters: residual energy, trust value and the number of neighbors. The simulation results showed that our proposed model is energy efficient (i.e., its power consumption is more efficient than many well-known clustering algorithm such as LEACH, SEP, and DEEC under homogeneous and heterogeneous networks). In addition, the results demonstrated that our proposed model achieved longer network lifetime, i.e., nodes are kept alive longer than what LEACH, SEP and DEEC can achieve. Moreover, the the proposed model showed that the average trust value of selected Cluster Head (CH) is high under different percentage (30% and 50%) of malicious nodes

    Personal identification based on mobile-based keystroke dynamics

    Get PDF
    This paper is addressing the personal identification problem by using mobile-based keystroke dynamics of touch mobile phone. The proposed approach consists of two main phases, namely feature selection and classification. The most important features are selected using Genetic Algorithm (GA). Moreover, Bagging classifier used the selected features to identify persons by matching the features of the unknown person with the labeled features. The outputs of all Bagging classifiers are fused to determine the final decision. In this experiment, a keystroke dynamics database for touch mobile phones is used. The database, which consists of four sets of features, is collected from 51 individuals and consists of 985 samples collected from males and females with different ages. The results of the proposed model conclude that the third subset of features achieved the best accuracy while the second subset achieved the worst accuracy. Moreover, the fusion of all classifiers of all ensembles will improve the accuracy and achieved results better than the individual classifiers and individual ensembles

    Reliable Machine Learning Model for IIoT Botnet Detection

    Get PDF
    Due to the growing number of Internet of Things (IoT) devices, network attacks like denial of service (DoS) and floods are rising for security and reliability issues. As a result of these attacks, IoT devices suffer from denial of service and network disruption. Researchers have implemented different techniques to identify attacks aimed at vulnerable Internet of Things (IoT) devices. In this study, we propose a novel features selection algorithm FGOA-kNN based on a hybrid filter and wrapper selection approaches to select the most relevant features. The novel approach integrated with clustering rank the features and then applies the Grasshopper algorithm (GOA) to minimize the top-ranked features. Moreover, a proposed algorithm, IHHO, selects and adapts the neural network’s hyper parameters to detect botnets efficiently. The proposed Harris Hawks algorithm is enhanced with three improvements to improve the global search process for optimal solutions. To tackle the problem of population diversity, a chaotic map function is utilized for initialization. The escape energy of hawks is updated with a new nonlinear formula to avoid the local minima and better balance between exploration and exploitation. Furthermore, the exploitation phase of HHO is enhanced using a new elite operator ROBL. The proposed model combines unsupervised, clustering, and supervised approaches to detect intrusion behaviors. The N-BaIoT dataset is utilized to validate the proposed model. Many recent techniques were used to assess and compare the proposed model’s performance. The result demonstrates that the proposed model is better than other variations at detecting multiclass botnet attacks

    EfFcient mcdm model for evaluating the performance of commercial banks:A case study

    Get PDF
    Evaluation of commercial banks (CBs) performance has been a significant issue in the financial world and deemed as a multi-criteria decision making (MCDM) model. Numerous research assesses CB performance according to different metrics and standers. As a result of uncertainty in decision-making problems and large economic variations in Egypt, this research proposes a plithogenic based model to evaluate Egyptian commercial banks' performance based on a set of criteria. The proposed model evaluates the top ten Egyptian commercial banks based on three main metrics including financial, customer satisfaction, and qualitative evaluation, and 19 subcriteria. The proportional importance of the selected criteria is evaluated by the Analytic Hierarchy Process (AHP). Furthermore, the Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS), Vlse Kriterijumska Optimizacija Kompro-misno Resenje (VIKOR), and COmplex PRoportional ASsessment (COPRAS) are adopted to rank the top ten Egyptian banks based on their performance, comparatively. The main role of this research is to apply the proposed integrated MCDM framework under the plithogenic environment to measure the performance of the CBs under uncertainty. All results show that CIB has the best performance while Faisal Islamic Bank and Bank Audi have the least performance among the top 10 CBs in Egypt.</p

    Secure and Robust Fragile Watermarking Scheme for Medical Images

    Get PDF
    Over the past decade advances in computer-based communication and health services, the need for image security becomes urgent to address the requirements of both safety and non-safety in medical applications. This paper proposes a new fragile watermarking based scheme for image authentication and self-recovery for medical applications. The proposed scheme locates image tampering as well as recovers the original image. A host image is broken into 4×4 blocks and Singular Value Decomposition (SVD) is applied by inserting the traces of block wise SVD into the Least Significant Bit (LSB) of the image pixels to figure out the transformation in the original image. Two authentication bits namely block authentication and self-recovery bits were used to survive the vector quantization attack. The insertion of self-recovery bits is determined with Arnold transformation, which recovers the original image even after a high tampering rate. SVD-based watermarking information improves the image authentication and provides a way to detect different attacked area. The proposed scheme is tested against different types of attacks such are text removal attack, text insertion attack, and copy and paste attack

    Swarm intelligence–based energy efficient clustering with multihop routing protocol for sustainable wireless sensor networks

    Get PDF
    © The Author(s) 2020. Wireless sensor network is a hot research topic with massive applications in different domains. Generally, wireless sensor network comprises hundreds to thousands of sensor nodes, which communicate with one another by the use of radio signals. Some of the challenges exist in the design of wireless sensor network are restricted computation power, storage, battery and transmission bandwidth. To resolve these issues, clustering and routing processes have been presented. Clustering and routing processes are considered as an optimization problem in wireless sensor network which can be resolved by the use of swarm intelligence–based approaches. This article presents a novel swarm intelligence–based clustering and multihop routing protocol for wireless sensor network. Initially, improved particle swarm optimization technique is applied for choosing the cluster heads and organizes the clusters proficiently. Then, the grey wolf optimization algorithm–based routing process takes place to select the optimal paths in the network. The presented improved particle swarm optimization–grey wolf optimization approach incorporates the benefits of both the clustering and routing processes which leads to maximum energy efficiency and network lifetime. The proposed model is simulated under an extension set of experimentation, and the results are validated under several measures. The obtained experimental outcome demonstrated the superior characteristics of the improved particle swarm optimization–grey wolf optimization technique under all the test cases
    • …
    corecore