Machine-to-machine (M2M) communication networks consist of resource-constrained autonomous devices, also known as autonomous Internet of things (IoTs) or machine-type communication devices (MTCDs) which act as a backb...
详细信息
Machine-to-machine (M2M) communication networks consist of resource-constrained autonomous devices, also known as autonomous Internet of things (IoTs) or machine-type communication devices (MTCDs) which act as a backbone for Industrial IoT, smart cities, and other autonomous systems. Due to the limited computing and memory capacity, these devices cannot maintain strong security if conventional security methods are applied such as heavy encryption. This article proposed a novel lightweight mutual authentication scheme including elliptic curve cryptography (ECC) driven end-to-end encryption through curve25519 such as (i): efficient end-to-end encrypted communication with pre-calculation strategy using curve25519;and (ii): elliptic curve Diffie-Hellman (ECDH) based mutual authentication technique through a novel lightweight hash function. The proposed scheme attempts to efficiently counter all known perception layer security threats. Moreover, the pre-calculated key generation strategy resulted in cost-effective encryption with 192-bit curve security. It showed comparative efficiency in key strength, and curve strength compared with similar authentication schemes in terms of computational and memory cost, communication performance and encryption robustness.
This project aimed to implement a prototype capable of real-time monitoring and control of various parameters in information management setting with Internet of Things (IoT). Research methodology involved designing an...
详细信息
Measuring clock skew of devices over a network fully relies on the offsets, the differences between sending and receiving times. Offsets that shape a thick line are the most ideal one as their slope is directly the cl...
详细信息
Many international manufacturers of infant incubators use IoT technology, presenting tough competition for local manufacturers. This research examines methods to fulfill parents’ need to monitor their babies directly...
详细信息
Maintaining grid stability amid widespread electric vehicle (EV) adoption is vital for sustainable transportation. Traditional optimization methods and Reinforcement Learning (RL) approaches often struggle with the hi...
详细信息
Expert systems (ES) rely heavily on effective control mechanisms to navigate complex problem-solving tasks. These mechanisms govern how ES utilizes knowledge and data to make decisions and execute actions. Optimizing ...
详细信息
作者:
Cai, XiaojuanZhang, HaiboAhmed, Chuadhry MujeebKoide, HiroshiKyushu University
Faculty of Information Science and Electrical Engineering Department of Information Science and Technology Fukuoka819-0395 Japan Kyushu Institute of Technology
Faculty of Computer Science and Systems Engineering Department of Artificial Intelligence Fukuoka Iizuka820-8502 Japan Newcastle University
School of Computing Secure and Resilient Systems Group Newcastle upon TyneNE1 7RU United Kingdom Kyushu University
Section of Cyber Security for Information Systems Research Institute for Information Technology Fukuoka819-0395 Japan
Advanced Persistent Threats (APTs) involve attackers maintaining a long-term presence on victim systems, leading to the stealthy exfiltration of sensitive data during network transfers. Despite existing methods to det...
详细信息
The rise of deep-fake technology has sparked concerns as it blurs the distinction between fake media by harnessing Generative Adversarial Networks (GANs). This has raised issues surrounding privacy and security in the...
详细信息
The rise of deep-fake technology has sparked concerns as it blurs the distinction between fake media by harnessing Generative Adversarial Networks (GANs). This has raised issues surrounding privacy and security in the realm. This has led to a decrease in trust during online interactions;thus, emphasizing the importance of creating reliable methods for detection purposes. Our research introduces a model for detecting deepfakes by utilizing an Enhanced EfficientNet B0 structure in conjunction with Temporal Convolutional Neural Networks (TempCNNs). This approach aims to tackle the challenges presented by the evolving sophistication of deep-fake techniques. The system dissects video inputs into frames to extract features comprehensively by using Multi Test Convolutional Networks (MTCNN). This method ensures face detection and alignment by focusing on facial regions. To enhance the model’s adaptability, to different scenarios and datasets we implement data augmentation techniques such as CutMix, MixUp and Random Erasing. These strategies help the model maintain its strength, against distortions found in deepfake content. The backbone of EfficientNet B0 utilizes Mobile Inverted Bottleneck Convolutions (MBConv) and Squeeze and Excitation (SE) blocks to enhance feature extraction by adjusting channels to highlight details effectively. A Feature Pyramid Network (FPN) facilitates the fusion of scale features capturing intricate details as well, as broader context. When tested on the FFIW 10 K dataset, which comprises 10,000 videos evenly split between manipulated content, the model attained a training accuracy of 91.5 % and a testing accuracy of 92.45 %, after 40 epochs. The findings showcase the model’s proficiency, in identifying videos with precision and tackling the issue of class imbalances found in datasets – a valuable contribution, to advancing dependable deepfake detection solutions. Furthermore, the model achieves an impressive balance between accuracy and computati
作者:
Liu, YifanXu, JianzhongZhu, YiyangTian, ZhaoxuanZhao, ChengyongLi, Gen
State Key Laboratory of Alternate Electrical Power System with Renewable Energy Sources China
Energy Technology and Computer Science Section Department of Engineering Technology and Didactics Ballerup2750 Denmark
With the increasing integration of renewable energy into power systems, electromagnetic transient (EMT) simulation has become indispensable for accurate system analysis. However, the complexity of wind turbine (WT) mo...
详细信息
Photobiomodulation (PBM) has emerged as a promising method for enhancing wound healing. However, a standardized therapeutic protocol has not yet been established. This study aimed to determine the optimal irradiation ...
详细信息
暂无评论