IOUT (Internet of Underwater Things) relies on underwater acoustic sensors, which have limited resources such as battery power and bandwidth. The exchange of data among these sensors faces challenges like propagation ...
详细信息
IOUT (Internet of Underwater Things) relies on underwater acoustic sensors, which have limited resources such as battery power and bandwidth. The exchange of data among these sensors faces challenges like propagation delay, node displacement, and environmental errors, making network maintenance difficult. The objective of this study is to address the energy efficiency and performance issues in IOUT networks by proposing and evaluating an energy-efficient routing protocol called Efficient Cost Wakeup Routing Protocol (ECWRP). To achieve the objective, the study focuses on two key parameters: Cost and Duty Cycle. The Duty Cycle parameter helps in reducing undesirable impacts during underwater communications, improving the performance of the routing protocol. The Cost parameter is utilized to select the most efficient path for data transmission, considering factors such as transmitting power levels. The protocol is applied to a multi-hop mesh-based network. The proposed ECWRP routing protocol is assessed through simulations, demonstrating its superior efficiency compared to the Ride algorithm. By eliminating unnecessary handshaking and optimizing route selection, ECWRP significantly enhances energy efficiency and overall performance within the IoUT network. The study's findings on the enhanced energy efficiency and performance improvements achieved by the ECWRP protocol hold promising implications for the design and optimization of IoUT networks, paving the way for more sustainable and effective communication systems in underwater environments. In conclusion, the study demonstrates the effectiveness of the Efficient Cost Wakeup Routing Protocol (ECWRP) in enhancing energy efficiency and performance in multi-hop mesh-based IoUT networks. The protocol's utilization of the Duty Cycle parameter reduces undesirable impacts, while the Cost parameter enables the selection of the most efficient path for data transmission. The results confirm the superiority of the ECWRP protoc
This paper examines the complexity of vulnerability, risk perception, and adaptation strategies in the context of climate change, with a focus on the coastal region of São Paulo, Brazil. By employing an interdisc...
详细信息
Due to the unpredictable growth of data in various fields, rapid clustering of big data is seriously needed in order to identify the hidden structure of data and discover the relationships between objects. Among clust...
详细信息
The incredible progress in technologies has drastically increased the usage of Web *** share their credentials like userid and password or use their smart cards to get authenticated by the application *** cards are ha...
详细信息
The incredible progress in technologies has drastically increased the usage of Web *** share their credentials like userid and password or use their smart cards to get authenticated by the application *** cards are handy to use,but they are susceptible to stolen smart card attacks and few other notable security *** prefer to use Web applications that guarantee for security against several security attacks,especially insider attacks,which is *** of several existing schemes prove the security pitfalls of the protocols from preventing security attacks,specifically insider *** paper introduces LAPUP:a novel lightweight authentication protocol using physically unclonable function(PUF)to prevent security attacks,principally insider *** PUFs are used to generate the security keys,challenge-response pair(CRP)and hardware signature for designing the *** transmitted messages are shared as hash values and encrypted by the keys generated by *** messages are devoid of all possible attacks executed by any attacker,including insider *** is also free from stolen verifier attacks,as the databases are secured by using the hardware signature generated by *** analysis of the protocol exhibits the strength of LAPUP in preventing insider attacks and its resistance against several other security *** evaluation results of the communication and computation costs of LAPUP clearly shows that it achieves better performance than existing protocols,despite providing enhanced security.
With the popularity of the Internet of Vehicles(IoV),a large amount of data is being generated every *** to securely share data between the IoV operator and various value-added service providers becomes one of the cri...
详细信息
With the popularity of the Internet of Vehicles(IoV),a large amount of data is being generated every *** to securely share data between the IoV operator and various value-added service providers becomes one of the critical *** to its flexible and efficient fine-grained access control feature,Ciphertext-Policy Attribute-Based Encryption(CP-ABE)is suitable for data sharing in ***,there are many flaws in most existing CP-ABE schemes,such as attribute privacy leakage and key *** paper proposes a Traceable and Revocable CP-ABE-based Data Sharing with Partially hidden policy for IoV(TRE-DSP).A partially hidden access structure is adopted to hide sensitive user attribute values,and attribute categories are sent along with the ciphertext to effectively avoid privacy *** addition,key tracking and malicious user revocation are introduced with broadcast encryption to prevent key *** the main computation task is outsourced to the cloud,the burden of the user side is relatively *** of security and performance demonstrates that TRE-DSP is more secure and practical for data sharing in IoV.
Gene expression profiling for cancer diagnosis requires the identification of optimal and non-redundant gene subsets from microarray data. We present a multi-objective particle swarm optimization (PSO) approach that b...
详细信息
The ubiquity of handheld devices and easy access to the Internet help users get easy and quick updates from social media. Generally, people share information with their friends and groups without inspecting the posts...
详细信息
The Internet of Things (IoT) integrates diverse devices into the Internet infrastructure, including sensors, meters, and wearable devices. Designing efficient IoT networks with these heterogeneous devices requires the...
详细信息
The Internet of Things (IoT) integrates diverse devices into the Internet infrastructure, including sensors, meters, and wearable devices. Designing efficient IoT networks with these heterogeneous devices requires the selection of appropriate routing protocols, which is crucial for maintaining high Quality of Service (QoS). The Internet engineering Task Force’s Routing Over Low Power and Lossy Networks (IETF ROLL) working group developed the IPv6 Routing Protocol for Low Power and Lossy Networks (RPL) to meet these needs. While the initial RPL standard focused on single-metric route selection, ongoing research explores enhancing RPL by incorporating multiple routing metrics and developing new Objective Functions (OFs). This paper introduces a novel Objective Function (OF), the Reliable and Secure Objective Function (RSOF), designed to enhance the reliability and trustworthiness of parent selection at both the node and link levels within IoT and RPL routing protocols. The RSOF employs an adaptive parent node selection mechanism that incorporates multiple metrics, including Residual Energy (RE), Expected Transmission Count (ETX), Extended RPL Node Trustworthiness (ERNT), and a novel metric that measures node failure rate (NFR). In this mechanism, nodes with a high NFR are excluded from the parent selection process to improve network reliability and stability. The proposed RSOF was evaluated using random and grid topologies in the Cooja Simulator, with tests conducted across small, medium, and large-scale networks to examine the impact of varying node densities. The simulation results indicate a significant improvement in network performance, particularly in terms of average latency, packet acknowledgment ratio (PAR), packet delivery ratio (PDR), and Control Message Overhead (CMO), compared to the standard Minimum Rank with Hysteresis Objective Function (MRHOF).
Industrial cyber-physical systems closely integrate physical processes with cyberspace, enabling real-time exchange of various information about system dynamics, sensor outputs, and control decisions. The connection b...
详细信息
Industrial cyber-physical systems closely integrate physical processes with cyberspace, enabling real-time exchange of various information about system dynamics, sensor outputs, and control decisions. The connection between cyberspace and physical processes results in the exposure of industrial production information to unprecedented security risks. It is imperative to develop suitable strategies to ensure cyber security while meeting basic performance *** the perspective of control engineering, this review presents the most up-to-date results for privacy-preserving filtering,control, and optimization in industrial cyber-physical systems. Fashionable privacy-preserving strategies and mainstream evaluation metrics are first presented in a systematic manner for performance evaluation and engineering *** discussion discloses the impact of typical filtering algorithms on filtering performance, specifically for privacy-preserving Kalman filtering. Then, the latest development of industrial control is systematically investigated from consensus control of multi-agent systems, platoon control of autonomous vehicles as well as hierarchical control of power systems. The focus thereafter is on the latest privacy-preserving optimization algorithms in the framework of consensus and their applications in distributed economic dispatch issues and energy management of networked power systems. In the end, several topics for potential future research are highlighted.
Transparent organic light-emitting diode(TrOLED)displays represent cutting-edge technology posed to significantly enhance user *** study addresses two pivotal challenges in TrOLED ***,we focus on the innovation of tra...
详细信息
Transparent organic light-emitting diode(TrOLED)displays represent cutting-edge technology posed to significantly enhance user *** study addresses two pivotal challenges in TrOLED ***,we focus on the innovation of transparent cathodes,a fundamental component in TrOLEDs,by introducing a ZnO/Yb:Ag *** cathode employs a combination of seed layer and metal doping techniques to achieve a highly uniform surface morphology and a low surface energy *** optimized Yb:Ag cathode on ZnO,with a mere thickness of 15 nm,exhibits remarkable properties:an extremely low surface roughness of 0.52 nm,sheet resistance of 11.6Ω γ^(-1),an optical transmittance of 86.7%at 510 nm,and tunable work function(here,optimized to be 3.86 eV),ensuring superior electron injection ***,we propose a novel TrOLED pixel structure that features selective bidirectional viewing,allowing different types of information to be selectively displayed on each side while preserving overall transparency and minimizing pixel *** design innovation distinguishes itself from conventional TrOLEDs that display images on only one *** bidirectional TrOLED design not only enhances openness and esthetic appeal but also holds promise for diverse applications across various user environments.
暂无评论