Article
Chemistry, Multidisciplinary
Hassan Kurdi, Vijey Thayananthan
Summary: This paper proposes a MQTT architecture with multi-tier brokers based on fog computing and introduces a lightweight mutual authentication scheme. The results indicate that the scheme can significantly reduce storage and communication overheads, while the system is able to resist against various cyberattacks and provide scalability.
APPLIED SCIENCES-BASEL
(2022)
Article
Computer Science, Information Systems
Roayat Ismail Abdelfatah, Esraa Abdelkhalek Baka, Mohamed E. Nasr
Summary: This paper proposes a parallel hash algorithm based on chaotic functions, mixing multiple chaotic functions and changing the structure of the coupling lattice to generate hash values of different lengths. Simulation analysis shows that the algorithm is efficient, simple and fast compared to some recent hash algorithms based on chaotic maps.
Article
Computer Science, Information Systems
Hung-Yu Chien
Summary: This paper proposes a 2-level composite hashing mechanism to address the issue of anonymous authentication in IoT devices, achieving high efficiency and strong anonymity, with many advantages in terms of security and applicability.
Article
Computer Science, Information Systems
Muhammad Yazid, F. Fahmi, Erwin Sutanto, Rachmad Setiawan, Muhammad Aripriharta, Muhammad Aziz
Summary: This article proposes a new authentication method, based on parallel hash chains, for low-power and low-cost IoT devices. The method generates encryption keys continuously on both the device and server, eliminating the need to transmit secret keys. It only requires two transmission handshakes for authentication and data transmission, reduces hardware requirements, and provides mutual authentication. It also offers device anonymity, message authentication, database integrity verification, resistance to transmission loss, and adaptability to network disturbances.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Environmental Sciences
Dingjie Xu, Na Ren, Changqing Zhu
Summary: This paper proposes a remote-sensing image integrity authentication method based on blockchain and perceptual hash, which can effectively verify the integrity of images and tampering location with strong robustness and sensitivity.
Article
Computer Science, Hardware & Architecture
Guohua Tian, Jianghong Wei, Miroslaw Kutylowski, Willy Susilo, Xinyi Huang, Xiaofeng Chen
Summary: This paper introduces the concept of verifiable redactable blockchain (VRBC) and proposes a novel authentication data structure and an efficient VRBC scheme to achieve efficient validity verification and consistent blockchain ledger. Optimized strategies are introduced and the scheme is extended to transaction-level and permissionless VRBC. Finally, the feasibility of the proposed scheme is demonstrated through security analysis and performance evaluation.
IEEE TRANSACTIONS ON COMPUTERS
(2023)
Article
Automation & Control Systems
Michele Amoretti, Riccardo Pecori, Yanina Protskaya, Luca Veltri, Francesco Zanichelli
Summary: This article proposes a novel communication framework based on MQTT broker bridging for dynamic interoperability and information flow control in industrial IoT scenarios. Through implementation and evaluation on a small-scale IIoT testbed, it is proven to have linear time complexity and minimal overhead compared to standard MQTT brokers.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2021)
Article
Computer Science, Information Systems
Manasha Saqib, Bhat Jasra, Ayaz Hassan Moon
Summary: IoT is a vast heterogeneous network that provides digital services for smart city applications. Ensuring communication security is crucial when accessing these services remotely. Both entity and message authentication are important for this purpose. While mutual authentication between subscribers and gateway nodes has received attention, there is still a need to improve mutual authentication between gateway nodes and IoT sensor nodes.
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES
(2022)
Article
Engineering, Multidisciplinary
David C. C. Mazur, Rob A. A. Entzminger, John A. A. Kay, Corey A. A. Peterson
Summary: As IoT continues to advance, infrastructure within facilities needs to keep up with the increasing number of intelligent devices. Message queuing telemetry transport is a method that can help preserve network bandwidth and provide reliable data sources for control and reporting strategies in process industries.
IEEE TRANSACTIONS ON INDUSTRY APPLICATIONS
(2022)
Article
Automation & Control Systems
A. Ramachandran, P. Ramadevi, Ahmed Alkhayyat, Yousif Kerrar Yousif
Summary: Nowadays, cloud-based applications are widely used for global data collection and storage. However, the security of shared data has become a challenge. This research paper proposes a blockchain-based data integrity authentication technique to ensure efficient and secure user authentication in cloud computing. The proposed methodology utilizes cuckoo filter and Merkle Hash Tree (MHT) to enhance the authentication process and has been validated using various performance metrics.
INTELLIGENT AUTOMATION AND SOFT COMPUTING
(2023)
Article
Computer Science, Information Systems
Ridha Soua, Maria Rita Palattella, Andre Stemper, Thomas Engel
Summary: This paper proposes a hybrid IoT-satellite network architecture for handling IoT traffic by aggregating MQTT topics, and designs an MQTT message filter aggregator (MQTT-MFA). Extensive simulations demonstrate that this approach significantly reduces TCP/IP overhead and the number of bytes required for transmission.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Hardware & Architecture
Hassan N. Noura, Raphael Couturier, Ola Salman, Kamel Mazouzi
Summary: This paper introduces a new Message Authentication Algorithm (MAA) called DKEMA, which is designed to leverage the capabilities of GPUs for improved performance. Experimental results demonstrate that DKEMA performs well on Tesla V100 and A100 GPUs, achieving high randomness and collision tolerance. Additionally, DKEMA outperforms existing algorithms in terms of performance.
JOURNAL OF SUPERCOMPUTING
(2022)
Article
Chemistry, Analytical
Heriberto J. Jara Ochoa, Raul Pena, Yoel Ledo Mezquita, Enrique Gonzalez, Sergio Camacho-Leon
Summary: This study proposes the design and validation of a cost-efficient platform system for remote real-time monitoring, using NodeMCU module to conduct experiments on HTTP and MQTT and comparing their power consumption. The results show that using MQTT protocol with QoS 0 and 1 can save 6.03% and 8.33% of energy respectively, and prolong the battery life.
Article
Telecommunications
M. Al-Shabi
Summary: This article presents how to provide high-level security and reduce the delay in emergency message dissemination in the VANET-Cloud environment. The authors propose a hash-based credential authentication scheme and a firm aware clustering scheme, and utilize ANN and FT algorithms to accelerate data retrieval and emergency message dissemination. The proposed methods are evaluated using simulation tools.
WIRELESS PERSONAL COMMUNICATIONS
(2023)
Article
Computer Science, Hardware & Architecture
Trupil Limbasiya, Debasis Das, Sajal K. Das
Summary: The Internet of Vehicles (IoV) is an emerging paradigm focusing on the interconnectedness of vehicles with infrastructure, sensors, and mobile devices. This paper introduces a novel secure and energy-efficient message communication system, MComIoV, utilizing a one-way hash function and elliptic curve cryptography (ECC). Implementation and testing on Raspberry Pi 3B+ showed efficiency in computation time, storage cost, communication overhead, and energy consumption.
IEEE-ACM TRANSACTIONS ON NETWORKING
(2021)
Article
Computer Science, Artificial Intelligence
Tiejun Wang, Kaijun Wu, Tiaotiao Du, Xiaochun Cheng
Summary: This article proposes an adaptive weighted dynamic differential evolution (AWDDE) algorithm for emergency material allocation and scheduling problems. The algorithm utilizes strategies such as chaotic mapping, weighted mutation operator, and disturbance operator to improve the global optimization ability and convergence speed.
COMPUTATIONAL INTELLIGENCE
(2022)
Article
Telecommunications
Ajay Kumar, Kumar Abhishek, Pranav Nerurkar, Muhammad Rukunuddin Ghalib, Achyut Shankar, Xiaochun Cheng
Summary: This paper proposes a secure smart contracts framework based on blockchain to address the issues in the Cloud-Based Manufacturing industry, and its efficacy is demonstrated in a case study.
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES
(2022)
Article
Telecommunications
Xiao Zhang, Jiqiang Liu, Zhongjie Ba, Yaodong Tao, Xiaochun Cheng
Summary: MobiScan is a dynamic and invisible screen-to-camera communication system that ensures data security, real-time communication, and flexible capture angle. It addresses the issues of poor data security, high computational overhead, and limited capture angle faced by existing systems.
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES
(2022)
Article
Engineering, Civil
Shanmei Li, Xiaochun Cheng, Xuedong Huang, Sattam Ai Otaibi, Hongyong Wang
Summary: In this paper, a cooperative conflict detection and resolution method is innovatively developed in the UAV Internet of Things environment considering UAV relative motion relationships and UAV priorities. By using improved communication technologies and a safety assessment method, real-time and reactive conflict-free paths for UAVs are generated, improving the effectiveness of CD&R.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
(2023)
Article
Computer Science, Artificial Intelligence
Yangyang Bao, Weidong Qiu, Xiaochun Cheng
Summary: Medical cyber-physical systems enable real-time health monitoring and flexible diagnostic services. However, security threats pose concerns for data security and user privacy. This article proposes an energy-saving and privacy-preserving data sharing scheme to address these challenges.
Article
Environmental Sciences
Yukun Liu, Bowen Wan, Daming Shi, Xiaochun Cheng
Summary: With the breakthrough in supervised learning, more works are focusing on end-to-end learning for denoising. However, obtaining labels to support this approach is challenging. Unsupervised denoisers have emerged, but they require the noise model to be determined in advance, limiting practical use.
Editorial Material
Chemistry, Multidisciplinary
Xiaochun Cheng, Ding-Zhu Du, Arun Kumar Sangaiah, Rongxing Lu
APPLIED SCIENCES-BASEL
(2023)
Article
Computer Science, Information Systems
P. L. S. Jayalaxmi, Rahul Saha, Gulshan Kumar, Mamoun Alazab, Mauro Conti, Xiaochun Cheng
Summary: The heterogeneous nature of the IIoT poses challenges to the development of effective IDS. The existing solutions are non-usable due to the lack of a comprehensive feature mapping method. This paper proposes PIGNUS, a comprehensive IDS framework that combines efficient feature mapping and cascading model.
COMPUTERS & SECURITY
(2023)
Article
Engineering, Electrical & Electronic
Rong Ma, Haifeng Tian, Xiaochun Cheng, Yi Xiao, Qingxiao Xu, Xianchuan Yu
Summary: In the past decades, identifying the working conditions of oil wells required expensive and slow artificial inspections. However, using machine learning to diagnose working conditions through dynamometer cards identification has significant economic and environmental benefits for oil production. In this study, we collected dynamometer cards from the well-known Shengli Oil Field in China and created a dataset. We analyzed the properties of dynamometers under different working conditions and proposed the Oil-Net 1-D/2-D identification models based on time-series and computer vision approaches. Experimental results showed that Oil-Net 1-D/2-D significantly improves identification accuracy compared to other machine learning and time-series classification methods. This study provides important guidance for the development of learning-based intelligent diagnosis systems for oil well working conditions.
IEEE SENSORS JOURNAL
(2023)
Article
Engineering, Civil
Yangyang Bao, Weidong Qiu, Xiaochun Cheng, Jianfei Sun
Summary: The Internet of Vehicles (IoV) has revolutionized the driving experience and urban traffic management. This paper proposes an efficient access control scheme and an indirect revocation mechanism to address data leakage and personal privacy concerns in the publicly accessible IoV environment. Through detailed comparisons and simulation evaluations, the superiority of the proposed solutions in terms of functionality and performance is demonstrated.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
(2023)
Article
Engineering, Civil
Jianfei Sun, Guowen Xu, Tianwei Zhang, Xiaochun Cheng, Xingshuo Han, Mingjian Tang
Summary: This paper proposes the first privacy-preserving data share mechanism with flexible cross-domain authorization for efficient and secure communication across autonomous vehicle platoons. The mechanism uses a new ciphertext conversion technique to achieve high-fidelity data communication and has been proven to be secure against various attacks. The theoretical evaluation and extensive experiments demonstrate its practicality in terms of functionality, storage, and computation overheads.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
(2023)
Article
Multidisciplinary Sciences
Turki Aljrees, Xiaochun Cheng, Mian Muhammad Ahmed, Muhammad Umer, Rizwan Majeed, Khaled Alnowaiser, Nihal Abuzinadah, Imran Ashraf
Summary: The proliferation of fake news has severe effects on society and individuals, hence the need for automated systems to make timely judgments. This study employs principal component analysis and chi-square methods to reduce feature dimensions and combines convolutional neural network and long short-term memory model to build FakeNET. Experimental results show that PCA achieves a higher accuracy.
Article
Mathematics
Hexiu Lin, Yukun Liu, Daming Shi, Xiaochun Cheng
Summary: This paper proposes a simple and efficient semi-supervised few-shot learning model to address the embeddings mismatch problem caused by inconsistent data distributions between the novel and base datasets. The model emphasizes pseudo-labeling guided contrastive learning and develops a novel local factor clustering module to obtain pseudo-labels from unlabeled samples.
Article
Engineering, Civil
Jianfei Sun, Junyi Tao, Hao Zhang, Yanan Zhao, Liming Nie, Xiaochun Cheng, Tianwei Zhang
Summary: As autonomous driving, 5G, and IoT technologies become increasingly prevalent, the Internet of autonomous vehicle (IoAV) technology is recognized as a disruptive technique capable of changing the way people travel and improving the travel experience. However, existing efforts rarely address the secrecy, authenticity, and flexible one-to-many communication between autonomous vehicles. This paper proposes a tamper-resistant broadcasting (TRBS) scheme that overcomes the inefficiencies and insecurity of existing identity-based broadcast signcryption solutions, providing secure and efficient communication and information dissemination between autonomous vehicles.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
(2023)
Article
Telecommunications
Ajay Kumar, K. Abhishek, M. R. Ghalib, A. Shankar, X. Cheng
Summary: Internet of Things (IoT) security refers to the act of securing IoT devices and networks. This study proposes Intrusion Detection Systems (IDSs) and Network-based Intrusion Prevention Systems (NBIPSs) to protect cloud servers and IoT systems from illegal access. The proposed NBIPS inspects network activity streams to identify and counteract misuse instances, providing an additional layer of investigation to safeguard the network system.
DIGITAL COMMUNICATIONS AND NETWORKS
(2022)