Security is the important problem in wireless sensor networks. the nodes are deployed in environment without any security measures. One of the important attacks in wireless sensor networks is node replication attack. ...
详细信息
Due to the flexibility and scalability, the increasing number of mobile edge computing applications involves Mobile Edge Servers (MES). MES introduces the new challenge of online resource scheduling to serve different...
详细信息
ISBN:
(纸本)9781665400626
Due to the flexibility and scalability, the increasing number of mobile edge computing applications involves Mobile Edge Servers (MES). MES introduces the new challenge of online resource scheduling to serve different requests under limited energy to offer similar functionalities of the immobile edge servers. the previous studies consider the case of the identical server, which has poor scalability and is hard to apply to real-world applications. this work proposes a novel model named the distributed k-server problem that formulates the MES resource scheduling to address the heterogeneity issues in both servers and requests. We design an algorithm named DWFA based on the efficient network flow-based Work Function Algorithm (WFA) to the classic k-server problem as an immediate solution to the proposed problem. DWFA inherits the competitiveness of WFA but has high computational complexity. To further increase scalability via the computing power of MES, we parallelise DWFA to design a distributed algorithm named FD-WFA as a distributed execution of DWFA, which significantly reduces the computational complexity and increases the practicality. Extensive simulations have been conducted to verify the theoretical results and show the advantages of FD-WFA over the benchmarks.
IoT, an word form for the internet of things. Within the recent era of rising Science and Technology nearly most of the items are automated. Operating within the smart and auto switched method. In one click or in one ...
详细信息
Multi-agent collaboration enhances situational awareness in intelligence, surveillance, and reconnaissance (ISR) missions. Ad hoc networks of unmanned aerial vehicles (UAVs) allow for real-time data sharing, but they ...
详细信息
ISBN:
(纸本)9798400714986
Multi-agent collaboration enhances situational awareness in intelligence, surveillance, and reconnaissance (ISR) missions. Ad hoc networks of unmanned aerial vehicles (UAVs) allow for real-time data sharing, but they face security challenges due to their decentralized nature, making them vulnerable to cyber-physical attacks. this paper introduces a trust-based framework for assured sensor fusion in distributed multi-agent networks, utilizing a hidden Markov model (HMM)-based approach to estimate the trustworthiness of agents and their provided information in a decentralized fashion. Trust-informed data fusion prioritizes fusing data from reliable sources, enhancing resilience and accuracy in contested environments. To evaluate the assured sensor fusion under attacks on system/mission sensing, we present a novel multi-agent aerial dataset built from the Unreal Engine simulator. We demonstrate through case studies improved ISR performance and an ability to detect malicious actors in adversarial settings.
Hydrogen fuel cell vehicles have concerns about clean, pollution-free, high energy utilization, and the fast fuel refueling, and they have become a hot spot in the development of new energy vehicles. Inspired by this,...
详细信息
the proceedings contain 31 papers. the special focus in this conference is on computing Science, Communication and Security. the topics include: Osmotic computing-Based Task Offloading: A Fuzzy Logic-Based Approach;Tr...
ISBN:
(纸本)9783031751691
the proceedings contain 31 papers. the special focus in this conference is on computing Science, Communication and Security. the topics include: Osmotic computing-Based Task Offloading: A Fuzzy Logic-Based Approach;Traveler’s Demand Reactive Dynamic Online Bus Routing [TraDeR-DOBR] to Improvize Comfort Perception in Intelligent Public Transport System;High-Speed FSO System for Future Generation Networks for Long Reach;Mitigating PAPR Challenges in Massive MIMO systems for CR-IoT Networks: A Graeco-Latin Square Approach;performance Analysis of IoT Network over 5G Communication;ioT-Based Convolutional Neural Networks in a Farm Pest Detection Using Transfer Learning;Performance Comparison of NOMA Vehicular Communications Under Shadow Fading;Detecting distributed Denial of Service (DDoS) Attacks in a Multi-controller SDN Environment Utilizing Machine Learning;Comprehensive Study of Short Channel Effects (SCEs) in MOSFET and FinFET Devices;A Machine Learning (ML)-Inspired Method for Intrusion Detection in IoT Devices Networks;an Anomaly—Misuse Hybrid System for Efficient Intrusion Detection in Clustered Wireless sensor Network Using Neural Network;detection and Prevention of Black Hole Attack and Sybil Attack in Vehicular Ad Hoc Networks;cognitive Ad Hoc Trust Routing for Enhanced Quality of Service;routing in IoT Network Using NetSim Simulator;A Novel Approach of SHA-3-512bits Using Keccak Technique Based on Sponge Function Implementation on FPGA;cooperative Spectrum Sensing in Cognitive Radio Network Using Adaptive Walruses Optimization Algorithm;Catalan’s Conjecture and Elliptic Curve Cryptography (CCECC) Algorithm for Enhancing Data Security During Data Transmission in MANET;monitoring the Concentration of Air Pollutants and Its Health Hazards Using Machine Learning Models;containment of Compromised Nodes in a distributed Environment;a Novel Approach to Solve Network Security, Cryptography Problems Using Genetic Algorithm.
the aim of this work is to investigate on DC microgrids and to find all the advantages and disadvantages of this type of configuration, in particular to find a solution for the problem of protection devices. In this p...
详细信息
ISBN:
(纸本)9781665436137
the aim of this work is to investigate on DC microgrids and to find all the advantages and disadvantages of this type of configuration, in particular to find a solution for the problem of protection devices. In this paper, different types of circuit breaker devices are analyzed in order to find a possible solution to the main criticality of this distribution system. Two different configuration of Solid-State Circuit Breaker (SSCB) are analyzed and simulated in a DC microgrid using Simulink/Matlab.
Mobile devices generate numerous non-divisible and delay-sensitive tasks in 5G system, which bring a huge amount of network traffic. As Mobile edge computing can effectively alleviate computational pressure of termina...
详细信息
Internet of things (IoT) has been emerging day-to-day because of multiple technologies like embedded systems, machine learning, real-time analytics, and commodity sensors. IoT contributes more to smart home applicatio...
详细信息
Withthe continuous increase of photovoltaic (PV) penetration rate in the grid, the frequency modulation capability decreases and inertia is insufficient. In order to reduce the adverse effects of high permeability of...
详细信息
暂无评论