4.7 Article

The security of Internet of drones

期刊

COMPUTER COMMUNICATIONS
卷 148, 期 -, 页码 208-214

出版社

ELSEVIER
DOI: 10.1016/j.comcom.2019.09.018

关键词

Drones; Wireless network; CNN; Cluster head; Network security interruption probability

资金

  1. National Natural Science Foundation of China [61902203]
  2. Natural Science Foundation of Shandong Province [ZR2017QF015]

向作者/读者索取更多资源

In order to study the security of Internet of drones (IoD), convolutional neural network (CNN) algorithm was compared with autonomous IoD. Moreover, wireless communication technology was used to analyze and design a more optimized model for system security performance. The model constructed was simulated, and relevant data were collected to verify its security performance. The results show that the clustering algorithm based on node energy has the best performance in the performance analysis of IoD. When the number of nodes is appropriate, it can avoid wasting bandwidth resources and overloading, and the number of switching between clusters is less than other algorithms. Therefore, EWCA algorithm can be used to improve the lifetime of the whole network and enhances the availability of IoD. When analyzing the security performance based on the system security interruption probability, it is found that the lower the security interruption rate is when the energy acquisition coefficient alpha is close to 0.5, the longer the IoD is used for information transmission, and the better the security performance is. The greater the signal-to-noise ratio is, the better the network security performance is, and the network performance is the best when the number of nodes tends to be 10. Therefore, through the research, it is found that the model built increases the security of IoD. Although there are some shortcomings in the experimental process, it still provides experimental basis for the later development of IoD.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Information Systems

QoE-Aware Efficient Content Distribution Scheme For Satellite-Terrestrial Networks

Dingde Jiang, Feng Wang, Zhihan Lv, Shahid Mumtaz, Saba Al-Rubaye, Antonios Tsourdos, Octavia Dobre

Summary: This article proposes a user-oriented content distribution scheme for satellite-terrestrial networks (STN) to improve content distribution efficiency. The scheme includes algorithms for network division, caching satellite deployment, cache node selection, and content updating mechanism. Simulation results demonstrate that the scheme can reduce propagation delay and network load under different network conditions and has stability and self-adaptability.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2023)

Article Computer Science, Information Systems

Infrared-visible person re-identification via Dual-Channel attention mechanism

Zhihan Lv, Songhao Zhu, Dongsheng Wang, Zhiwei Liang

Summary: This research proposes a dual-path network and attention mechanism to learn discriminative feature representations, and a modified Batch Norm Neck module to fuse cross-modality feature representations to improve identity recognition accuracy. Experimental results demonstrate that the proposed method significantly improves the performance of infrared-visible person re-identification on two public datasets.

MULTIMEDIA TOOLS AND APPLICATIONS (2023)

Article Energy & Fuels

Digital twins for secure thermal energy storage in building

Zhihan Lv, Chen Cheng, Haibin Lv

Summary: The purpose of this study is to investigate the role of safe and optimal scheduling of thermal energy storage systems in intelligent buildings in promoting sustainable economic development under Digital Twins (DTs) technology. Phase Change Material (PCM) is introduced in the building structure, and the DTs technology is applied for real-time analysis. The PCM wall structure and thermal network DTs model are designed for intelligent buildings, and a thermal energy storage and dispatch model is constructed based on DTs. The model achieves lower economic costs, environmental costs, and energy costs, as well as a better energy-saving effect compared to existing models, serving as a reference for digital energy storage and comprehensive energy utilization in intelligent buildings.

APPLIED ENERGY (2023)

Article Computer Science, Artificial Intelligence

Innovative soft computing-enabled cloud optimization for next-generation IoT in digital twins

Hailin Feng, Liang Qiao, Zhihan Lv

Summary: The research aims to reduce network resource pressure, improve service quality and optimize network performance in cloud centers and edge nodes. A edge-cloud collaboration framework based on IoT is designed, using raspberry pi cards as working nodes. The framework consists of three layers, including edge RP, monitoring & scheduling RP, and CC. The task delay in the edge-cloud collaboration mode is the least among different working modes, and real-time object detection can be achieved.

APPLIED SOFT COMPUTING (2023)

Article Construction & Building Technology

A novel occupant-centric stratum ventilation system using computer vision: Occupant detection, thermal comfort, air quality, and energy savings

Bin Yang, Yihang Liu, Pengju Liu, Faming Wang, Xiaogang Cheng, Zhihan Lv

Summary: This study used a deep learning-based computer vision method for indoor occupancy detection and proposed an occupant-centric control strategy based on the monitored occupant number to regulate supply air parameters and outdoor air volume for energy saving purposes. The results showed that compared to the traditional control strategy, the proposed strategy improved comfort by 43%-73%, maintained acceptable air quality, kept CO2 concentration below 700 ppm, and saved energy by 2.3%-8.1%. It was also found that the lower the occupancy, the greater the improvement in comfort and energy savings.

BUILDING AND ENVIRONMENT (2023)

Article Computer Science, Information Systems

Dual-Channel Neural Network for Atrial Fibrillation Detection From a Single Lead ECG Wave

Bo Fang, Junxin Chen, Yu Liu, Wei Wang, Ke Wang, Amit Kumar Singh, Zhihan Lv

Summary: With the advancement of wearable devices, collecting single lead ECG waves continuously has become more comfortable. This paper proposes a dual-channel neural network for atrial fibrillation (AF) detection from a single lead ECG wave. The method includes data preprocessing and a dual-channel neural network. A two-stage denoising procedure is utilized to handle the high noise and disturbance commonly present in ECG wave data collected by wearables. The results on the 2017 PhysioNet/CinC Challenge database confirm the effectiveness of the proposed method for AF detection, with F1 values of 0.83, 0.90, and 0.75 for AF rhythm, normal rhythm, and other rhythms, respectively. The method also outperforms some state-of-the-art counterparts.

IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS (2023)

Article Computer Science, Information Systems

Wi-Breath: A WiFi-Based Contactless and Real-Time Respiration Monitoring Scheme for Remote Healthcare

Nan Bao, Jiajun Du, Chengyang Wu, Duo Hong, Junxin Chen, Robert Nowak, Zhihan Lv

Summary: This paper presents a contactless and real-time respiration monitoring system, called Wi-Breath, based on off-the-shelf WiFi devices. The system monitors respiration using both the amplitude and phase difference of WiFi channel state information (CSI). A signal selection method based on a support vector machine (SVM) algorithm is proposed to improve the accuracy of respiration detection. Experimental results show that Wi-Breath achieves an accuracy of 91.2% and reduces the average error by 17.0% compared to state-of-the-art counterparts.

IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS (2023)

Article Engineering, Civil

MSND: Modified Standard Normal Deviate Incident Detection Algorithm for Connected Autonomous and Human-Driven Vehicles in Mixed Traffic

Ilgin Gokasar, Alperen Timurogullari, Sarp Semih Ozkan, Muhammet Deveci, Zhihan Lv

Summary: This paper proposes a modified standard normal deviation (MSND) incident detection algorithm that uses connected autonomous vehicles (CAVs) as data sources and evaluates its efficacy using SUMO Traffic Simulation Software. The results show that the proposed method outperforms other incident detection algorithms in terms of detection rate and integrates well with the Variable Speed Limits (VSL) traffic management method to reduce average density in critical regions.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2023)

Article Engineering, Civil

Task Scheduling of Real-Time Traffic Information Processing Based on Digital Twins

Yang Liu, Ang Yang, Qingcheng Zeng, Yuhui Sun, Jing Gao, Zhihan Lv

Summary: The Intelligent Transportation System based on Digital Twins provides accurate data sources for traffic control. This study focuses on real-time information processing and task scheduling problems in the Internet of Vehicles (IoV) system based on Virtual Reality. Different algorithms are used to improve task quality, and a privacy protection algorithm is designed for the traffic information transmission system.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2023)

Article Economics

Resilience towarded Digital Twins to improve the adaptability of transportation systems

Hailin Feng, Haibin Lv, Zhihan Lv

Summary: This study investigates the role of resilience of Digital Twins in the applicability of transportation systems. The research on Digital Twins technology in various aspects of transportation has achieved success, but there is still room for optimization. The study analyzes the application of Digital Twins in intelligent transportation systems and how changes in traveler behavior reflect the impact of uncertain events on the traffic network. Furthermore, an IoV system based on Digital Twins and blockchain is established to solve data redundancy and computational volume issues in in-vehicle data sharing.

TRANSPORTATION RESEARCH PART A-POLICY AND PRACTICE (2023)

Article Automation & Control Systems

Edge-Cloud-Based Wearable Computing for Automation Empowered Virtual Rehabilitation

Zhihan Lv, Amit Kumar Singh

Summary: This study aims to improve rehabilitative care by optimizing the medical automation monitoring system enabled by wearable computing through edge cloud and IoT technology. It analyzes recent research on edge cloud and wearable computing devices, and contrasts data fusion techniques in wearable sensors. An edge cloud model is constructed to track patients' vital signs in real time and assess their health status and rehabilitation progress. A wearable device information monitoring system is established to provide effective rehabilitation treatment for stroke patients.

IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING (2023)

Proceedings Paper Computer Science, Artificial Intelligence

Virtual Reality Based Human -Computer Interaction System for Metaverse

Zhihan Lv

Summary: This work evaluates the performance and effect of a Human-Computer Interaction (HCI) system in the Metaverse, with real-time interaction and immersion. It introduces the Metaverse with HCI functions such as 3D face reconstruction, handshake and hug, and multi-user synchronous editing environment, with all information stored in the blockchain. The HCI functions are evaluated, demonstrating an overall correct rate of 95.45% for the subjects. Users' social acceptance of VR interactive systems, action interaction usability, user emotions, and user satisfaction all receive high scores. This work contributes to the evaluation and optimization of HCI systems in the Metaverse.

2023 IEEE CONFERENCE ON VIRTUAL REALITY AND 3D USER INTERFACES ABSTRACTS AND WORKSHOPS, VRW (2023)

Article Computer Science, Cybernetics

Do Sentence-Level Sentiment Interactions Matter? Sentiment Mixed Heterogeneous Network for Fake News Detection

Hao Zhang, Zonglin Li, Sanya Liu, Tao Huang, Zhouwei Ni, Jian Zhang, Zhihan Lv

Summary: With the proliferation of fake news, detecting and classifying them accurately is crucial to prevent social panic and group polarization. This study proposes a graph attention network-based model that incorporates sentiment analysis, external knowledge comparison, and emotion interaction to extract features from long-form news for fake news classification. The model outperforms existing methods and achieves state-of-the-art accuracy on various datasets.

IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS (2023)

Article Telecommunications

Energy-efficient task allocation for reliable parallel computation of cluster-based wireless sensor network in edge computing

Jiabao Wen, Jiachen Yang, Tianying Wang, Yang Li, Zhihan Lv

Summary: In order to efficiently complete a complex computation task, it is necessary to decompose the task into subcomputation tasks that run parallel in edge computing. Wireless Sensor Network (WSN) is an example of parallel computation. A task allocation strategy is needed to reduce energy consumption and balance the load of the network, which is crucial for achieving highly reliable parallel computation in WSN.

DIGITAL COMMUNICATIONS AND NETWORKS (2023)

Article Computer Science, Artificial Intelligence

Short-time wind speed prediction based on Legendre multi-wavelet neural network

Xiaoyang Zheng, Dongqing Jia, Zhihan Lv, Chengyou Luo, Junli Zhao, Zeyu Ye

Summary: Wind energy is an important part of the power system and accurate wind speed forecasting is essential for its stable and safe utilization. This paper proposes a Legendre multiwavelet-based neural network model, which combines the properties of Legendre multi-wavelets and the self-learning capability of neural networks. The model achieves optimal performance and high prediction accuracy, especially in multi-step prediction.

CAAI TRANSACTIONS ON INTELLIGENCE TECHNOLOGY (2023)

Review Computer Science, Information Systems

A review of Machine Learning (ML)-based IoT security in healthcare: A dataset perspective

Euclides Carlos Pinto Neto, Sajjad Dadkhah, Somayeh Sadeghi, Heather Molyneaux, Ali A. Ghorbani

Summary: The Internet of Things (IoT) has the potential to revolutionize medical treatment in healthcare, but it also faces security threats. Advanced analytics can enhance IoT security, but generating realistic datasets is complex. This research conducts a review of Machine Learning (ML) solutions for IoT security in healthcare, focusing on existing datasets, resources, applications, and challenges, to highlight the current landscape and future requirements.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

Role of context in determining transfer of risk knowledge in roundabouts

Duncan Deveaux, Takamasa Higuchi, Seyhan Ucar, Jerome Harri, Onur Altintas

Summary: This paper investigates the ability to predict the risk patterns of vehicles in a roundabout and suggests that constraining knowledge transfer to roundabouts with a similar context can significantly improve accuracy.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

Intelligent wireless sensing driven metaverse: A survey

Lingjun Zhao, Qinglin Yang, Huakun Huang, Longtao Guo, Shan Jiang

Summary: Metaverse seamlessly integrates the real and virtual worlds, and intelligent wireless sensing technology can serve as an intelligent, flexible, non-contact way to access the metaverse and accelerate the establishment of a bridge between the real physical world and the metaverse. However, there are still challenges and open issues in this field.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

PrivMaskFL: A private masking approach for heterogeneous federated learning in IoT

Jing Xiong, Hong Zhu

Summary: With the rapid growth of data in the era of IoT, the challenge of data privacy protection arises. This article proposes a federated learning approach that uses collaborative training to obtain a global model without direct exposure to local datasets. By utilizing dynamic masking and adaptive differential privacy methods, the approach reduces communication overhead and improves the converge performance of the model.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

Quantum-resistant Transport Layer Security

Carlos Rubio Garcia, Simon Rommel, Sofiane Takarabt, Juan Jose Vegas Olmos, Sylvain Guilley, Philippe Nguyen, Idelfonso Tafur Monroy

Summary: The reliance on asymmetric public key cryptography and symmetric encryption for cyber-security in current telecommunication networks is threatened by quantum computing technology. Quantum Key Distribution and post-quantum cryptography provide resistance to quantum attacks. This paper proposes two novel hybrid solutions integrating QKD and PQC into TLS for quantum-resistant key exchange.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

Resource allocation for cost minimization of a slice broker in a 5G-MEC scenario

Annisa Sarah, Gianfranco Nencioni

Summary: This article explores the concept of a Slice Broker, an intermediate entity that purchases resources from Infrastructure Providers to offer customized network slices to users. The article proposes a cost-minimization problem and compares it with alternative problems to demonstrate its effectiveness and cost-saving capabilities.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

MBP: Multi-channel broadcast proxy re-encryption for cloud-based IoT devices

Sumana Maiti, Sudip Misra, Ayan Mondal

Summary: The broadcast proxy re-encryption methods extend traditional proxy re-encryption mechanisms and propose a scheme called MBP for IoT applications. MBP calculates a single re-encryption key for all user groups and uses multi-channel broadcast encryption to reduce security element size. However, it increases computation time for receiver IoT devices. The use of Rubinstein-Stahl bargaining game approach addresses this issue and MBP is secure against selective group chosen-ciphertext attack in the random oracle model.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

NextGenV2V: Authenticated V2V communication for next generation vehicular network using (2, n)-threshold scheme

Pankaj Kumar, Hari Om

Summary: This paper presents NextGenV2V, a protocol for the next-generation vehicular network that achieves authenticated communication between vehicles using symmetric keys and a (2, n)-threshold scheme. The protocol reduces communication overhead and improves authentication delay, ensuring better security. Comparative analysis demonstrates the suitability of NextGenV2V in next-generation vehicular networks.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

A multi-agent federated reinforcement learning-based optimization of quality of service in various LoRa network slices

Eric Ossongo, Moez Esseghir, Leila Merghem-Boulahia

Summary: The implementation of 5G networks allows for the efficient coexistence of heterogeneous services in a single physical virtualized infrastructure. Virtualization of network functions enables more flexible resource management and customizable services. However, the increasing number of connected objects poses challenges in managing physical and virtual resources, requiring intelligent systems to ensure communication quality.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

PiGateway: Real-time granular analysis of smart home network traffic using P4

Suvrima Datta, U. Venkanna

Summary: The Internet of Things (IoT) enables real-time sensing and data transmission to make homes smarter. Effective device-type identification methods are crucial as the number of IoT devices continues to grow. In this paper, a P4-based gateway called PiGateway is proposed to classify and prioritize the type of IoT devices. By utilizing a decision tree model and flow rules, PiGateway enables real-time granular analysis and in-network classification of IoT traffic.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

Resource management in multi-heterogeneous cluster networks using intelligent intra-clustered federated learning

Fahad Razaque Mughal, Jingsha He, Nafei Zhu, Saqib Hussain, Zulfiqar Ali Zardari, Ghulam Ali Mallah, Md. Jalil Piran, Fayaz Ali Dharejo

Summary: This paper explores the relationship between heterogeneous cluster networks and federated learning, as well as the challenges of implementing federated learning in heterogeneous networks and the Internet of Things. The authors propose an Intra-Clustered FL (ICFL) model that optimizes computation and communication to select heterogeneous FL nodes in each cluster, enabling efficient processing of asynchronous data and ensuring data security.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

QoS aware resource allocation for coexistence mechanisms between eMBB and URLLC: Issues, challenges, and future directions in 5G

Rajesh Kumar, Deepak Sinwar, Vijander Singh

Summary: This paper investigates the coexistence mechanisms between eMBB and URLLC traffic for resource scheduling in 5G. Through examining different approaches and performance metrics, it provides detailed insights for researchers in the field, and highlights key issues, challenges, and future directions.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

Enabling simulation services for digital twins of 5G/B5G mobile networks

Giovanni Nardini, Giovanni Stea

Summary: Digital Twins of Networks (DTNs) are proposed as digital replicas of physical entities, enabling efficient data-driven network management and performance-driven network optimization. DTNs provide simulation services for dynamic reconfiguration and fault anticipation, using discrete-event network simulators as the ideal tools. Challenges include centralized vs. distributed implementation, input gathering from the physical network, security issues and hosting. The possibilities of network simulation for what-if analysis are explored, with the concepts of lockstep and branching analysis defined.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

DINNRS: A Distributed In-Network Name Resolution System for information-centric networks

Zhaolin Ma, Jiali You, Haojiang Deng

Summary: This paper presents the Distributed In-Network Name Resolution System (DINNRS), which leverages software-defined networking and Information-Centric Networking (ICN) paradigm to provide high scalability and minimal request delay. Our methods, including an enhanced marked cuckoo filter for fast resolving, achieve significant performance gains in simulation experiments.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

Dynamic WiFi indoor positioning based on the multi-scale metric learning

Yujie Wang, Ying Wang, Qingqing Liu, Yong Zhang

Summary: This paper proposes a dynamic indoor positioning method based on multi-scale metric learning of the channel state information (CSI). By constructing few-shot learning tasks, this method can achieve dynamic positioning using CSI signals without additional equipment. Experimental results show that compared to commonly used dynamic location and tracking algorithms, the proposed method has higher positioning accuracy and does not accumulate errors.

COMPUTER COMMUNICATIONS (2024)