In the Big Data age, where huge volumes of information are leveraged for analysis and innovation, the paramount importance of protecting privacy and enhancing security has become a critical imperative. The complex lan...
详细信息
Machine-to-machine (M2M) communication plays a fundamental role in autonomous IoT (Internet of Things)-based infrastructure, a vital part of the fourth industrial revolution. Machine-type communication devices(MTCDs) ...
详细信息
Machine-to-machine (M2M) communication plays a fundamental role in autonomous IoT (Internet of Things)-based infrastructure, a vital part of the fourth industrial revolution. Machine-type communication devices(MTCDs) regularly share extensive data without human intervention while making all types of decisions. Thesedecisions may involve controlling sensitive ventilation systems maintaining uniform temperature, live heartbeatmonitoring, and several different alert systems. Many of these devices simultaneously share data to form anautomated system. The data shared between machine-type communication devices (MTCDs) is prone to risk dueto limited computational power, internal memory, and energy capacity. Therefore, securing the data and devicesbecomes challenging due to factors such as dynamic operational environments, remoteness, harsh conditions,and areas where human physical access is difficult. One of the crucial parts of securing MTCDs and data isauthentication, where each devicemust be verified before data transmission. SeveralM2Mauthentication schemeshave been proposed in the literature, however, the literature lacks a comprehensive overview of current M2Mauthentication techniques and the challenges associated with them. To utilize a suitable authentication schemefor specific scenarios, it is important to understand the challenges associated with it. Therefore, this article fillsthis gap by reviewing the state-of-the-art research on authentication schemes in MTCDs specifically concerningapplication categories, security provisions, and performance efficiency.
Software-related security aspects are a growing and legitimate concern,especially with 5G data available just at our *** conduct research in this field,periodic comparative analysis is needed with the new techniques c...
详细信息
Software-related security aspects are a growing and legitimate concern,especially with 5G data available just at our *** conduct research in this field,periodic comparative analysis is needed with the new techniques coming up *** purpose of this study is to review the recent developments in the field of security integration in the software development lifecycle(SDLC)by analyzing the articles published in the last two decades and to propose a way *** review follows Kitchenham’s review *** review has been divided into three main stages including planning,execution,and *** the selected 100 articles,it becomes evident that need of a collaborative approach is necessary for addressing critical software security risks(CSSRs)through effective risk management/estimation *** risks using a numeric scale enables a comprehensive understanding of their severity,facilitating focused resource allocation and mitigation *** a comprehensive understanding of potential vulnerabilities and proactive mitigation efforts facilitated by protection poker,organizations can prioritize resources effectively to ensure the successful outcome of projects and initiatives in today’s dynamic threat *** review reveals that threat analysis and security testing are needed to develop automated tools for the *** estimation of effort required to prioritize potential security risks is a big challenge in software *** accuracy of effort estimation can be further improved by exploring new techniques,particularly those involving deep *** is also imperative to validate these effort estimation methods to ensure all potential security threats are *** challenge is selecting the right model for each specific security *** achieve a comprehensive evaluation,researchers should use well-known benchmark checklists.
—Unmanned aerial vehicles (UAVs) have emerged as the potential aerial base stations (BSs) to improve terrestrial communications. However, the limited onboard energy and antenna power of a UAV restrict its communicati...
详细信息
Mobile devices and social networks provide communication opportunities among the young generation,which increases vulnerability and cybercrimes activities.A recent survey reports that cyberbullying and cyberstalking c...
详细信息
Mobile devices and social networks provide communication opportunities among the young generation,which increases vulnerability and cybercrimes activities.A recent survey reports that cyberbullying and cyberstalking constitute a developing issue among *** paper focuses on cyberbullying detection in mobile phone text by retrieving with the help of an oxygen forensics *** describe the data collection using forensics technique and a corpus of suspicious activities like cyberbullying annotation from mobile phones and carry out a sequence of binary classification experiments to determine cyberbullying *** use forensics techniques,Machine Learning(ML),and Deep Learning(DL)algorithms to exploit suspicious patterns to help the forensics investigation where every evidence contributes to the *** on a real-time dataset reveal better results for the detection of cyberbullying *** Random Forest in ML approach produces 87%of accuracy without SMOTE technique,whereas the value of F1Score produces a good result with SMOTE *** LSTM has 92%of validation accuracy in the DL algorithm compared with Dense and BiLSTM algorithms.
We propose and experimentally demonstrate a spatial-light-modulator (SLM) based optical wireless communication (OWC) system using non-orthogonal multiple access realizing four-layer of successive interference cancella...
详细信息
Private Information Retrieval (PIR) is a fundamental problem in the broader fields of security and privacy. In recent years, the problem has garnered significant attention from the research community, leading to achie...
详细信息
Rolling bearings are the main components of rotating machines which are mostly damaged. Therefore, correct and quick fault diagnosis of rolling bearings is very necessary for maintenance. Nowadays, machine learning ha...
详细信息
Renewable resource droughts, defined as significantly reduced wind and solar power generation periods, present challenges to power system reliability and stability. This study proposes two strategies and suggests thei...
详细信息
VANETs are highly attractive and is used in maximum of the applications of cross-regional communication. To increase the coverage of the vehicular network, Unmanned Arial Vehicles (UAVs) are introduced, and they get c...
详细信息
VANETs are highly attractive and is used in maximum of the applications of cross-regional communication. To increase the coverage of the vehicular network, Unmanned Arial Vehicles (UAVs) are introduced, and they get connected with the satellite networks to perform heterogeneous communication. With the help of this connectivity, the communication quality of ground level to air medium is increased. Currently the vehicle usage is highly increased and as a results of communication link failure, improper resource allocation are arises whither abruptly assumes a stability about a network with that increases an energy consumption and communication delay in the heterogeneous networks. In these conditions, thus study is idea of Resource Allocation and Edge computing for Dual Hop Communication (RAEDH) in introduced in satellite assisted UAVs enabled VANETs. The major sections of the approach are UAV assisted mobile computing, resource allocation among the vehicles and the UAVs, and dual communication among the vehicles and the *** these methods the input resources are properly allocated and that reduces the power utility and communication delay. Initially, the vehicular network is established, incorporating trusted components like TA, RSU, and CRS. Subsequently, mobile edge computing reduces energy consumption through computation offloading and optimized UAV trajectory selection. Resource allocation, facilitated by whale optimization, ensures effective utilization across vehicles. The implementation of this method is done in NS3, and the scenario is analyzed using two parameters like number of vehicles and its speed. The output parameters that remain thought-out over a performance examination stay throughput, end-to-end delay, energy efficiency, packet loss, packet delivery ratio, and routing overhead, and as well those results are compared with the earlier methods. Finally, dual-hop transmission between vehicles and UAVs enhances delivery ratio and throughput. From
暂无评论