6 research outputs found
A review of Energy Hole mitigating techniques in multi-hop many to one communication and its significance in IoT oriented Smart City infrastructure
A huge increase in the percentage of the world's urban population poses resource management, especially energy management challenges in smart cities. In this paper, the growing challenges of energy management in smart cities have been explored and the significance of elimination of energy holes in converge cast communication has been discussed. The impact of mitigation of energy holes on the network lifetime and energy efficiency has been thoroughly covered. The particular focus of this work has been on energy-efficient practices in two major key enablers of smart cities namely, the Internet of Things (IoT) and Wireless Sensor Networks (WSNs). In addition, this paper presents a robust survey of state-of-the-art energy-efficient routing and clustering methods in WSNs. A niche energy efficiency issue in WSNs routing has been identified as energy holes and a detailed survey and evaluation of various techniques that mitigate the formation of energy holes and achieve balanced energy-efficient routing has been covered
Optimizing Quality of Service of Clustering Protocols in Large-Scale Wireless Sensor Networks with Mobile Data Collector and Machine Learning
The rise of large-scale wireless sensor networks (LSWSNs), containing thousands of sensor nodes (SNs) that spread over large geographic areas, necessitates new Quality of Service (QoS) efficient data collection techniques. Data collection and transmission in LSWSNs are considered the most challenging issues. This study presents a new hybrid protocol called MDC-K that is a combination of the K-means machine learning clustering algorithm and mobile data collector (MDC) to improve the QoS criteria of clustering protocols for LSWSNs. It is based on a new routing model using the clustering approach for LSWSNs. These protocols have the capability to adopt methods that are appropriate for clustering and routing with the best value of QoS criteria. Specifically, the proposed protocol called MDC-K uses machine learning K-means clustering algorithm to reduce energy consumption in cluster head (CH) election phase and to improve the election of CH. In addition, a mobile data collector (MDC) is used as an intermediate between the CH and the base station (BS) to further enhance the QoS criteria of WSN, to minimize time delays during data collection, and to improve the transmission phase of clustering protocol. The obtained simulation results demonstrate that MDC-K improves the energy consumption and QoS metrics compared to LEACH, LEACH-K, MDC maximum residual energy leach, and TEEN protocols
Deep fake detection and classification using error-level analysis and deep learning
Abstract Due to the wide availability of easy-to-access content on social media, along with the advanced tools and inexpensive computing infrastructure, has made it very easy for people to produce deep fakes that can cause to spread disinformation and hoaxes. This rapid advancement can cause panic and chaos as anyone can easily create propaganda using these technologies. Hence, a robust system to differentiate between real and fake content has become crucial in this age of social media. This paper proposes an automated method to classify deep fake images by employing Deep Learning and Machine Learning based methodologies. Traditional Machine Learning (ML) based systems employing handcrafted feature extraction fail to capture more complex patterns that are poorly understood or easily represented using simple features. These systems cannot generalize well to unseen data. Moreover, these systems are sensitive to noise or variations in the data, which can reduce their performance. Hence, these problems can limit their usefulness in real-world applications where the data constantly evolves. The proposed framework initially performs an Error Level Analysis of the image to determine if the image has been modified. This image is then supplied to Convolutional Neural Networks for deep feature extraction. The resultant feature vectors are then classified via Support Vector Machines and K-Nearest Neighbors by performing hyper-parameter optimization. The proposed method achieved the highest accuracy of 89.5% via Residual Network and K-Nearest Neighbor. The results prove the efficiency and robustness of the proposed technique; hence, it can be used to detect deep fake images and reduce the potential threat of slander and propaganda
Efficient handling of ACL policy change in SDN using reactive and proactive flow rule installation
Abstract Software-defined networking (SDN) is a pioneering network paradigm that strategically decouples the control plane from the data and management planes, thereby streamlining network administration. SDN's centralized network management makes configuring access control list (ACL) policies easier, which is important as these policies frequently change due to network application needs and topology modifications. Consequently, this action may trigger modifications at the SDN controller. In response, the controller performs computational tasks to generate updated flow rules in accordance with modified ACL policies and installs flow rules at the data plane. Existing research has investigated reactive flow rules installation that changes in ACL policies result in packet violations and network inefficiencies. Network management becomes difficult due to deleting inconsistent flow rules and computing new flow rules per modified ACL policies. The proposed solution efficiently handles ACL policy change phenomena by automatically detecting ACL policy change and accordingly detecting and deleting inconsistent flow rules along with the caching at the controller and adding new flow rules at the data plane. A comprehensive analysis of both proactive and reactive mechanisms in SDN is carried out to achieve this. To facilitate the evaluation of these mechanisms, the ACL policies are modeled using a 5-tuple structure comprising Source, Destination, Protocol, Ports, and Action. The resulting policies are then translated into a policy implementation file and transmitted to the controller. Subsequently, the controller utilizes the network topology and the ACL policies to calculate the necessary flow rules and caches these flow rules in hash table in addition to installing them at the switches. The proposed solution is simulated in Mininet Emulator using a set of ACL policies, hosts, and switches. The results are presented by varying the ACL policy at different time instances, inter-packet delay and flow timeout value. The simulation results show that the reactive flow rule installation performs better than the proactive mechanism with respect to network throughput, packet violations, successful packet delivery, normalized overhead, policy change detection time and end-to-end delay. The proposed solution, designed to be directly used on SDN controllers that support the Pyretic language, provides a flexible and efficient approach for flow rule installation. The proposed mechanism can be employed to facilitate network administrators in implementing ACL policies. It may also be integrated with network monitoring and debugging tools to analyze the effectiveness of the policy change mechanism