41 research outputs found

    Blockchain-enabled Reliable Osmotic Computing for Cloud of Things: Applications and Challenges

    Get PDF
    Cloud of Things (CoT) refers to an IoT solution consuming the cloud services of a single cloud vendor. In this paper, we have introduced the concept of a MultiCoT1 solution which refers to the collaborative execution of an IoT solution by multiple cloud vendors. Cloudlets and ad-hoc clouds are the extensions of centralized cloud services, closer to the user, in the form of fog and edge computing layers respectively and the Osmotic Computing (OC) serves as a glue by accomplishing the seamless compute sharing across these layers. The OC can also be integrated within a MultiCoT solution for extending it across three computational layers of cloud, fog and edge. However, this can only be achieved after establishing enough trust among all the vendors that are working in collaboration to simultaneously serve a particular MultiCoT solution. Blockchain has been already proven for establishing trust and supporting reliable interactions among independently operating entities. Hence, it can be used for establishing trust among the multiple cloud vendors serving a single MultiCoT solution. In this paper, we have presented the importance of using the proactive Blockchain-enabled Osmotic Manager (B-OM) for improving the reliability of OC. We have also highlighted the blockchain features that can improve the reliability of OC by establishing trust among the independently operating vendors of a MultiCoT solution, followed by the challenges associated with the integration of blockchain and OC along with the future research directions for achieving the proposed integration. © 2020 IEEE.Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works

    Detection of Android Malware in the Internet of Things through the K-Nearest Neighbor Algorithm

    Get PDF
    Predicting attacks in Android malware devices using machine learning for recommender systems-based IoT can be a challenging task. However, it is possible to use various machine-learning techniques to achieve this goal. An internet-based framework is used to predict and recommend Android malware on IoT devices. As the prevalence of Android devices grows, the malware creates new viruses on a regular basis, posing a threat to the central system’s security and the privacy of the users. The suggested system uses static analysis to predict the malware in Android apps used by consumer devices. The training of the presented system is used to predict and recommend malicious devices to block them from transmitting the data to the cloud server. By taking into account various machine-learning methods, feature selection is performed and the K-Nearest Neighbor (KNN) machine-learning model is proposed. Testing was carried out on more than 10,000 Android applications to check malicious nodes and recommend that the cloud server block them. The developed model contemplated all four machine-learning algorithms in parallel, i.e., naive Bayes, decision tree, support vector machine, and the K-Nearest Neighbor approach and static analysis as a feature subset selection algorithm, and it achieved the highest prediction rate of 93% to predict the malware in real-world applications of consumer devices to minimize the utilization of energy. The experimental results show that KNN achieves 93%, 95%, 90%, and 92% accuracy, precision, recall and f1 measures, respectively

    Analyzing fibrous tissue pattern in fibrous dysplasia bone images using deep R-CNN networks for segmentation

    Get PDF
    Predictive health monitoring systems help to detect human health threats in the early stage. Evolving deep learning techniques in medical image analysis results in efficient feedback in quick time. Fibrous dysplasia (FD) is a genetic disorder, triggered by the mutation in Guanine Nucleotide binding protein with alpha stimulatory activities in the human bone genesis. It slowly occupies the bone marrow and converts the bone cell into fibrous tissues. It weakens the bone structure and leads to permanent disability. This paper proposes the study of FD bone image analyzing techniques with deep networks. Also, the linear regression model is annotated for predicting the bone abnormality levels with observed coefficients. Modern image processing begins with various image filters. It describes the edges, shades, texture values of the receptive field. Different types of segmentation and edge detection mechanisms are applied to locate the tumor, lesion, and fibrous tissues in the bone image. Extract the fibrous region in the bone image using the region-based convolutional neural network algorithm. The segmented results are compared with their accuracy metrics. The segmentation loss is reduced by each iteration. The overall loss is 0.24% and the accuracy is 99%, segmenting the masked region produces 98% of accuracy, and building the bounding boxes is 99% of accuracy

    A survey of security and privacy issues in the Internet of Things from the layered context

    Get PDF
    © 2020 John Wiley & Sons, Ltd. Internet of Things (IoT) is a novel paradigm, which not only facilitates a large number of devices to be ubiquitously connected over the Internet but also provides a mechanism to remotely control these devices. The IoT is pervasive and is almost an integral part of our daily life. These connected devices often obtain user's personal data and store it online. The security of collected data is a big concern in recent times. As devices are becoming increasingly connected, privacy and security issues become more and more critical and these need to be addressed on an urgent basis. IoT implementations and devices are eminently prone to threats that could compromise the security and privacy of the consumers, which, in turn, could influence its practical deployment. In recent past, some research has been carried out to secure IoT devices with an intention to alleviate the security concerns of users. There have been research on blockchain technologies to tackle the privacy and security issues of the collected data in IoT. The purpose of this paper is to highlight the security and privacy issues in IoT systems. To this effect, the paper examines the security issues at each layer in the IoT protocol stack, identifies the under-lying challenges and key security requirements and provides a brief overview of existing security solutions to safeguard the IoT from the layered context

    A comprehensive review on medical diagnosis using machine learning

    Get PDF
    The unavailability of sufficient information for proper diagnosis, incomplete or miscommunication between patient and the clinician, or among the healthcare professionals, delay or incorrect diagnosis, the fatigue of clinician, or even the high diagnostic complexity in limited time can lead to diagnostic errors. Diagnostic errors have adverse effects on the treatment of a patient. Unnecessary treatments increase the medical bills and deteriorate the health of a patient. Such diagnostic errors that harm the patient in various ways could be minimized using machine learning. Machine learning algorithms could be used to diagnose various diseases with high accuracy. The use of machine learning could assist the doctors in making decisions on time, and could also be used as a second opinion or supporting tool. This study aims to provide a comprehensive review of research articles published from the year 2015 to mid of the year 2020 that have used machine learning for diagnosis of various diseases. We present the various machine learning algorithms used over the years to diagnose various diseases. The results of this study show the distribution of machine learningmethods by medical disciplines. Based on our review, we present future research directions that could be used to conduct further research

    Author classification using transfer learning and predicting stars in co-author networks

    Get PDF
    © 2020 John Wiley & Sons Ltd The vast amount of data is key challenge to mine a new scholar that is plausible to be star in the upcoming period. The enormous amount of unstructured data raise every year is infeasible for traditional learning; consequently, we need a high quality of preprocessing technique to expand the performance of traditional learning. We have persuaded a novel approach, Authors classification algorithm using Transfer Learning (ACTL) to learn new task on target area to mine the external knowledge from the source domain. Comprehensive experimental outcomes on real-world networks showed that ACTL, Node-based Influence Predicting Stars, Corresponding Authors Mutual Influence based on Predicting Stars, and Specific Topic Domain-based Predicting Stars enhanced the node classification accuracy as well as predicting rising stars to compared with contemporary baseline methods

    On Detection of Sybil Attack in Large-Scale VANETs Using Spider-Monkey Technique

    Get PDF
    Sybil security threat in vehicular ad hoc networks (VANETs) has attracted much attention in recent times. The attacker introduces malicious nodes with multiple identities. As the roadside unit fails to synchronize its clock with legitimate vehicles, unintended vehicles are identified, and therefore erroneous messages will be sent to them. This paper proposes a novel biologically inspired spider-monkey time synchronization technique for large-scale VANETs to boost packet delivery time synchronization at minimized energy consumption. The proposed technique is based on the metaheuristic stimulated framework approach by the natural spider-monkey behavior. An artificial spider-monkey technique is used to examine the Sybil attacking strategies on VANETs to predict the number of vehicular collisions in a densely deployed challenge zone. Furthermore, this paper proposes the pseudocode algorithm randomly distributed for energy-efficient time synchronization in two-way packet delivery scenarios to evaluate the clock offset and the propagation delay in transmitting the packet beacon message to destination vehicles correctly. The performances of the proposed technique are compared with existing protocols. It performs better over long transmission distances for the detection of Sybil in dynamic VANETs' system in terms of measurement precision, intrusion detection rate, and energy efficiency

    A review on classification of imbalanced data for wireless sensor networks

    Get PDF
    © The Author(s) 2020. Classification of imbalanced data is a vastly explored issue of the last and present decade and still keeps the same importance because data are an essential term today and it becomes crucial when data are distributed into several classes. The term imbalance refers to uneven distribution of data into classes that severely affects the performance of traditional classifiers, that is, classifiers become biased toward the class having larger amount of data. The data generated from wireless sensor networks will have several imbalances. This review article is a decent analysis of imbalance issue for wireless sensor networks and other application domains, which will help the community to understand WHAT, WHY, and WHEN of imbalance in data and its remedies

    Robust Navigational Control of a Two-Wheeled Self-Balancing Robot in a Sensed Environment

    Get PDF
    This research presents an improved mobile inverted pendulum robot called Two-wheeled Self-balancing robot (TWSBR) using a Proportional-Derivative Proportional-Integral (PD-PI) robust control design based on 32-bit microcontroller in a sensed environment (SE). The robot keeps itself balance with two wheels and a PD-PI controller based on the Kalman filter algorithm during the navigation process and is able to stabilize while avoiding acute and dynamic obstacles in the sensed environment. The Proportional (P) control is used to implement turn control for obstacle avoidance in SE with ultrasonic waves. Finally, in a SE, the robot can communicate with any of the Internet of Things (IoT) devices (mobile phone or Personal Computer) which have a Java-based transmission application installed and through Bluetooth technology connectivity for wireless control. The simulation results prove the efficiency of the proposed PD-PI controller in path planning, and balancing challenges of the TWSBR under several environmental disturbances. This shows an improved control system as compared to the existing improved Adaptive Fuzzy Controller

    Providing End-to-End Security Using Quantum Walks in IoT Networks

    Get PDF
    Internet of Things acts an essential role in our everyday lives and it definitely has the potential to grow on the importance and revolutionize our future. However, the present communication technologies have several security related issues which is required to provide secure end to end connectivity among services. Moreover, due to recent, rapid growth of quantum technologies, most common security mechanisms considered secure today may be soon imperilled. Thus, the modern security mechanisms during their construction also require the power of quantum technologies to resist various potential attacks from quantum computers. Because of its characteristics, quantum walks (QW) is considered as a universal quantum computation paradigm that can be accepted as an excellent key generator. In this regard, in this paper a new lightweight image encryption scheme based on QW for secure data transfer in the internet of things platforms and wireless networking with edge computing is proposed. The introduced approach utilises the power of nonlinear dynamic behaviour of QW to construct permutation boxes and generates pseudo-random numbers for encrypting the plain image after dividing it into blocks. The results of the conducted simulation and numerical analyses confirm that the presented encryption algorithm is effective. The encrypted images have randomness properties, no useful data about the ciphered image can be obtained via analysing the correlation of adjacent pixels. Moreover, the entropy value is close to 8, the number of the pixel change rate is greater than 99.61%, and there is high sensitivity of the key parameters with large key space to resist various attack
    corecore