In terms of security and privacy,mobile ad-hoc network(MANET)continues to be in demand for additional debate and *** more MANET applications become data-oriented,implementing a secure and reliable data transfer protoc...
详细信息
In terms of security and privacy,mobile ad-hoc network(MANET)continues to be in demand for additional debate and *** more MANET applications become data-oriented,implementing a secure and reliable data transfer protocol becomes a major concern in the ***,MANET’s lack of infrastructure,unpredictable topology,and restricted resources,as well as the lack of a previously permitted trust relationship among connected nodes,contribute to the attack detection burden.A novel detection approach is presented in this paper to classify passive and active black-hole *** proposed approach is based on the dipper throated optimization(DTO)algorithm,which presents a plausible path out of multiple paths for statistics transmission to boost MANETs’quality of service.A group of selected packet features will then be weighed by the DTO-based multi-layer perceptron(DTO-MLP),and these features are collected from nodes using the Low Energy Adaptive Clustering Hierarchical(LEACH)clustering *** is a powerful classifier and the DTO weight optimization method has a significant impact on improving the classification process by strengthening the weights of key features while suppressing the weights ofminor *** hybridmethod is primarily designed to combat active black-hole *** the LEACH clustering phase,however,can also detect passive black-hole *** effect of mobility variation on detection error and routing overhead is explored and evaluated using the suggested *** diverse mobility situations,the results demonstrate up to 97%detection accuracy and faster execution ***,the suggested approach uses an adjustable threshold value to make a correct conclusion regarding whether a node is malicious or benign.
Current methods in mapping the availability of WiFi networks, such as crowdsourcing platforms (e.g. Project BASS and CoverageMap) and dedicated wardriving, face limitations in terms of data recency, volume, and cost-e...
详细信息
ISBN:
(数字)9798331521219
ISBN:
(纸本)9798331521226
Current methods in mapping the availability of WiFi networks, such as crowdsourcing platforms (e.g. Project BASS and CoverageMap) and dedicated wardriving, face limitations in terms of data recency, volume, and cost-effectiveness. Due to the downsides of both these methods, opportunistic wardriving is proposed which utilizes public utility vehicles (PUVs). This study investigates the feasibility of PUVs as potential wardriving vehicles for opportunistic coverage mapping. This method is cost-efficient and removes the problem of data recency because of its continuous daily trips. The findings suggest that opportunistic wardriving with PUVs is viable for wardriving with its capability to detect a high volume of access points (APs). Multiple runs within the University of the Philippines Diliman campus showed the PUVs’ effectiveness in detecting a significant number of APs, with higher success rates at closer distances. Comparatively, warwalking detected fewer APs, but there was a significant overlap between the methods. The study also highlighted significant differences in detected AP types, with wardriving finding more mobile hotspots and miscellaneous devices than warwalking. Overall, the results underline the effectiveness of PUVs in providing extensive WiFi coverage data and further enhancements to the detection system could optimize the approach.
Reliable internet access is a key enabler for economic growth. Although the Philippine government launched initiatives to improve connectivity, connection speeds remained below the global average, especially for mobil...
详细信息
ISBN:
(数字)9798331517816
ISBN:
(纸本)9798331517823
Reliable internet access is a key enabler for economic growth. Although the Philippine government launched initiatives to improve connectivity, connection speeds remained below the global average, especially for mobile networks. This paper presents Hotspotter, a system that aims to aid implementers and stakeholders in quantifying and addressing network coverage issues. Hotspotter is an incentivized crowdsensing system that collects, maps, and visualizes WiFi and cellular data to pinpoint hotspots and dead zones for the effective deployment and relocation of WiFi access points. A mobile application for Android was developed to facilitate data collection on geolocation, nearby WiFi access points, and connected cellular networks. The user interface visualizes the aggregated data in a hexagon-grid map. Fieldwork was conducted in two sitios of Barangay San Lorenzo, Norzagaray, Bulacan to stress-test the Hotspotter system in a Geographically Isolated and Disadvantaged Area (GIDA). It was found that 2G and 4G had the widest coverage and strongest signals overall, with modal signal strengths of 4.0 and 3.0, respectively. Being at the cutting edge, 5G was not yet supported. In the end, the mobile application’s passive sensing, collecting, and caching of data successfully operated even in the most isolated areas without an internet connection.
Fuzzy data processing enables data enrichment and increases data interpretation in industrial environments. In the cloud-based IoT data ingestion pipelines, fuzzy data processing can be implemented in several location...
详细信息
In today's world, smart factories are a coexisting element of smarticizing cities. Smart manufacturing of today relies on the automation of many component tasks of the production process. Automated guided vehicles...
详细信息
The insurance process is done manually in India. The insurance client has to depend on an insurance agent from buying to the claim firing process which leads to wrong entry, fraudulent claims, and cost overhead on the...
详细信息
Applications of internet-of-things(IoT)are increasingly being used in many facets of our daily life,which results in an enormous volume of *** computing and fog computing,two of the most common technologies used in Io...
详细信息
Applications of internet-of-things(IoT)are increasingly being used in many facets of our daily life,which results in an enormous volume of *** computing and fog computing,two of the most common technologies used in IoT applications,have led to major security *** are on the rise as a result of the usage of these technologies since present security measures are *** artificial intelligence(AI)based security solutions,such as intrusion detection systems(IDS),have been proposed in recent *** technologies that require data preprocessing and machine learning algorithm-performance augmentation require the use of feature selection(FS)techniques to increase classification accuracy by minimizing the number of features *** the other hand,metaheuristic optimization algorithms have been widely used in feature selection in recent *** this paper,we proposed a hybrid optimization algorithm for feature selection in *** proposed algorithm is based on grey wolf(GW),and dipper throated optimization(DTO)algorithms and is referred to as *** proposed algorithm has a better balance between the exploration and exploitation steps of the optimization process and thus could achieve better *** the employed IoT-IDS dataset,the performance of the proposed GWDTO algorithm was assessed using a set of evaluation metrics and compared to other optimization approaches in 2678 CMC,2023,vol.74,no.2 the literature to validate its *** addition,a statistical analysis is performed to assess the stability and effectiveness of the proposed *** results confirmed the superiority of the proposed approach in boosting the classification accuracy of the intrusion in IoT-based networks.
On March 11 and 12, 2024, the Spring Symposium of the GI Fachgruppe Datenbanken took place in Jena. The overarching theme of the meeting was research data management beyond isolated repositories, and it explicitly aim...
详细信息
To evaluate novel solutions for edge computing systems, suitable distribution models for simulation are essential. The extensive use of deep learning (DL) in video analytics has altered traffic patterns on edge and cl...
ISBN:
(纸本)9798331534202
To evaluate novel solutions for edge computing systems, suitable distribution models for simulation are essential. The extensive use of deep learning (DL) in video analytics has altered traffic patterns on edge and cloud servers, necessitating innovative models. Queuing models are used to simulate the performance and stability of edge-enabled systems, particularly video streaming applications. This paper demonstrates that traditional Markovian M/M/s and general distribution G/G/s queuing models must be revamped for accurate simulation. We examined these queuing models by characterizing the real data with discrete and continuous distributions for arrival rates to homogenous servers in AI-based video analytics edge systems. Based on achieved results, traditional methods for finding general distributions are inadequate, and an automation method for finding empirical distribution is needed. Therefore, we introduce a novel approach using a generative adversarial network (WGAN) to generate artificial data to automate the process of estimating empirical distribution for modeling these applications.
Kubernetes provides several functions that can help service providers to deal with the management of complex container-based applications. However, most of these functions need a time-consuming and costly customizatio...
详细信息
暂无评论