With 5G and beyond promises to realize massive machine-type communications, a wide range of applications have driven interest in complex heterogeneous networked systems, including multi-agent optimization, large-scale...
详细信息
ISBN:
(纸本)9798350371000;9798350370997
With 5G and beyond promises to realize massive machine-type communications, a wide range of applications have driven interest in complex heterogeneous networked systems, including multi-agent optimization, large-scale distributed learning, 5G service provisioning, etc. This trend highlights the essence of seamless control, management, and security mechanisms to be in place for the next-generation networked cyber-physical systems (CPS). In this paper, we interpret trust as a relation among networked collaborating entities that can set forth a measure for evaluating the status of network components and secure the execution of the collaborative protocol. In this paper, we will first elaborate on the importance of trust as a metric and then present a mathematical framework for trust computation and aggregation within a network. We consider two use-case examples where trust can be incorporated into the next-generation networked CPS and improve the security of decision-making, i.e. i) federated learning (FL), and ii) network resource provisioning. Finally, we explain the challenges associated with aggregating the trust evidence and briefly explain our ideas to tackle them.
作者:
A.E.M.EljialyMohammed Yousuf UddinSultan AhmadDepartment of Information Systems
College of Computer Engineering and SciencesPrince Sattam Bin Abdulaziz UniversityAlkharjSaudi Arabia Department of Computer Science
College of Computer Engineering and SciencesPrince Sattam Bin Abdulaziz UniversityAlkharjSaudi Arabiaand also with University Center for Research and Development(UCRD)Department of Computer Science and EngineeringChandigarh UniversityPunjabIndia
Intrusion detection systems (IDSs) are deployed to detect anomalies in real time. They classify a network’s incoming traffic as benign or anomalous (attack). An efficient and robust IDS in software-defined networks i...
详细信息
Intrusion detection systems (IDSs) are deployed to detect anomalies in real time. They classify a network’s incoming traffic as benign or anomalous (attack). An efficient and robust IDS in software-defined networks is an inevitable component of network security. The main challenges of such an IDS are achieving zero or extremely low false positive rates and high detection rates. Internet of Things (IoT) networks run by using devices with minimal resources. This situation makes deploying traditional IDSs in IoT networks unfeasible. Machine learning (ML) techniques are extensively applied to build robust IDSs. Many researchers have utilized different ML methods and techniques to address the above challenges. The development of an efficient IDS starts with a good feature selection process to avoid overfitting the ML model. This work proposes a multiple feature selection process followed by classification. In this study, the Software-defined networking (SDN) dataset is used to train and test the proposed model. This model applies multiple feature selection techniques to select high-scoring features from a set of features. Highly relevant features for anomaly detection are selected on the basis of their scores to generate the candidate dataset. Multiple classification algorithms are applied to the candidate dataset to build models. The proposed model exhibits considerable improvement in the detection of attacks with high accuracy and low false positive rates, even with a few features selected.
Two-level totem-pole power factor correction(PFC)converters in critical conduction mode(CRM)suffer from the wide regulation range of switching ***,in highfrequency applications,the number of switching times increases,...
详细信息
Two-level totem-pole power factor correction(PFC)converters in critical conduction mode(CRM)suffer from the wide regulation range of switching ***,in highfrequency applications,the number of switching times increases,resulting in significant switching *** solve these issues,this paper proposes an improved modulation strategy for the single-phase three-level neutral-point-clamped(NPC)converter in CRM with *** optimizing the discharging strategy and switching state sequence,the switching frequency and its variation range have been efficiently *** detailed performance analysis is also presented regarding the switching frequency,the average switching times,and the effect of voltage gain.A 2 k W prototype is built to verify the effectiveness of the proposed modulation strategy and analysis *** with the totem-pole PFC converter,the switching frequency regulation range of the three-level PFC converter is reduced by 36.48%and the average switching times is reduced by 45.10%.The experimental result also shows a 1.2%higher efficiency for the three-level PFC converter in the full load range.
Human activity recognition systems using wearable sensors is an important issue in pervasive computing, which applies to various domains related to healthcare, context aware and pervasive computing, sports, surveillan...
详细信息
Purpose: The rapid spread of COVID-19 has resulted in significant harm and impacted tens of millions of people globally. In order to prevent the transmission of the virus, individuals often wear masks as a protective ...
详细信息
For a 5G wireless communication system,a convolutional deep neural network(CNN)is employed to synthesize a robust channel state estimator(CSE).The proposed CSE extracts channel information from transmit-and-receive pa...
详细信息
For a 5G wireless communication system,a convolutional deep neural network(CNN)is employed to synthesize a robust channel state estimator(CSE).The proposed CSE extracts channel information from transmit-and-receive pairs through offline training to estimate the channel state ***,it utilizes pilots to offer more helpful information about the communication *** proposedCNN-CSE performance is compared with previously published results for Bidirectional/long short-term memory(BiLSTM/LSTM)NNs-based *** CNN-CSE achieves outstanding performance using sufficient pilots only and loses its functionality at limited pilots compared with BiLSTM and LSTM-based *** three different loss function-based classification layers and the Adam optimization algorithm,a comparative study was conducted to assess the performance of the presented DNNs-based *** BiLSTM-CSE outperforms LSTM,CNN,conventional least squares(LS),and minimum mean square error(MMSE)*** addition,the computational and learning time complexities for DNN-CSEs are *** estimators are promising for 5G and future communication systems because they can analyze large amounts of data,discover statistical dependencies,learn correlations between features,and generalize the gotten knowledge.
Space/air communications have been envisioned as an essential part of the next-generation mobile communication networks for providing highquality global connectivity. However, the inherent broadcasting nature of wirel...
详细信息
Space/air communications have been envisioned as an essential part of the next-generation mobile communication networks for providing highquality global connectivity. However, the inherent broadcasting nature of wireless propagation environment and the broad coverage pose severe threats to the protection of private data. Emerging covert communications provides a promising solution to achieve robust communication security. Aiming at facilitating the practical implementation of covert communications in space/air networks, we present a tutorial overview of its potentials, scenarios, and key technologies. Specifically, first, the commonly used covertness constraint model, covert performance metrics, and potential application scenarios are briefly introduced. Then, several efficient methods that introduce uncertainty into the covert system are thoroughly summarized, followed by several critical enabling technologies, including joint resource allocation and deployment/trajectory design, multi-antenna and beamforming techniques, reconfigurable intelligent surface(RIS), and artificial intelligence algorithms. Finally, we highlight some open issues for future investigation.
In order to forecast the run time of the jobs that were submitted, this research provides two linear regression prediction models that include continuous and categorical factors. A continuous predictor is built using ...
详细信息
Wireless nodes are one of the main components in different applications that are offered in a smart *** wireless nodes are responsible to execute multiple tasks with different priority *** the wireless nodes have limi...
详细信息
Wireless nodes are one of the main components in different applications that are offered in a smart *** wireless nodes are responsible to execute multiple tasks with different priority *** the wireless nodes have limited processing capacity,they offload their tasks to cloud servers if the number of tasks exceeds their task processing *** these tasks from remotely placed cloud servers causes a significant delay which is not required in sensitive task *** execution delay is reduced by placing fog computing nodes near these application nodes.A fog node has limited processing capacity and is sometimes unable to execute all the requested *** this work,an optimal task offloading scheme that comprises two algorithms is proposed for the fog nodes to optimally execute the time-sensitive offloaded *** first algorithm describes the task processing criteria for local computation of tasks at the fog nodes and remote computation at the cloud *** second algorithm allows fog nodes to optimally scrutinize the most sensitive tasks within their task *** results show that the proposed task execution scheme significantly reduces the execution time and most of the time-sensitive tasks are executed.
This paper investigated the predictive capabilities of three decision tree models for IoT botnet attack prediction using packet information while minimizing the number of predictors. The study employed three decision ...
详细信息
暂无评论