Article
Computer Science, Information Systems
Kale Navnath Dattatraya, K. Raghava Rao
Summary: This paper discusses the importance of optimal cluster head selection in wireless sensor networks, proposes a new Fitness based Glowworm swarm with Fruitfly Algorithm (FGF), and compares it with other traditional methods, demonstrating the superiority of the algorithm.
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES
(2022)
Article
Computer Science, Information Systems
Tian-Fu Lee, Der-Chyuan Lou, Chien-Hung Chang
Summary: Authenticated key agreement for Internet of Drones (IoD) allows mobile users to securely and efficiently access a group of drones for various services such as supply transportation, surveillance data transmission, and communication provision. Previous studies developed lightweight protocols to address security issues, but this investigation reveals the weaknesses of a previous protocol and proposes an enhanced protocol with dynamic identities and message freshness. The enhanced protocol is formally proven secure and outperforms related protocols by 28.4%.
INTERNET OF THINGS
(2023)
Article
Multidisciplinary Sciences
Ganesh Jayaraman, V. R. Sarma Dhulipala
Summary: A fuzzy-based energy-efficient cluster head selection algorithm is proposed in this paper to prolong the network lifetime of wireless sensor networks (WSN). The k-means algorithm is used to efficiently form clusters and select cluster heads based on a fuzzy logic system. Simulation results demonstrate the effectiveness of the proposed algorithm over existing ones.
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING
(2022)
Article
Computer Science, Information Systems
Pankaj Kumar, Prabhleen Singh, Sam Darshi, Samar Shailendra
Summary: This paper proposes the use of drones as relay nodes in Network Coded Cooperation (NCC) to enhance diversity and improve throughput in upcoming wireless networks. Analytical and simulation methods are used to quantify network performance and parameters, including the impact of drone height on system performance. Valuable insights are gained for deploying nodes in a deterministic fashion for NCC.
IEEE TRANSACTIONS ON MOBILE COMPUTING
(2021)
Article
Computer Science, Information Systems
Nikumani Choudhury, Rakesh Matam, Mithun Mukherjee, Jaime Lloret, Ezhil Kalaimannan
Summary: The IEEE 802.15.4 standard specifies two network topologies: 1) star and 2) cluster tree. The role of a cluster head (CH) is to aggregate data from all devices in the cluster and then transmit it to the overall personal area network (PAN) coordinator. In order to prolong network lifetime, a rotation scheme is proposed to address the limitations of existing approaches, showing improvements in network performance.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Automation & Control Systems
Anuj Kumar Singh, Mohammed Alshehri, Shashi Bhushan, Manoj Kumar, Osama Alfarraj, Kamal Raj Pardarshani
Summary: This research discusses the introduction of an authentication mechanism in wireless sensor networks to address potential security issues. A more energy-efficient and efficient security model is proposed, choosing the optimal energy-efficient cryptography algorithm to protect data.
INTELLIGENT AUTOMATION AND SOFT COMPUTING
(2021)
Article
Computer Science, Hardware & Architecture
Hongyu Yang, Xugao Zhang, Fang Cheng
Summary: This paper proposed a malicious node detection model based on reputation, utilizing the Enhanced LEACH routing protocol. The model efficiently identifies malicious nodes in wireless sensor networks through evaluating and comparing information in data packets, ultimately achieving a lower false alarm rate.
MOBILE NETWORKS & APPLICATIONS
(2021)
Article
Chemistry, Analytical
Aiyun Zheng, Zhen Zhang, Weimin Liu, Jiaxin Liu, Yao Xiao, Chen Li
Summary: This article proposes a dual cluster head optimization method, which utilizes fuzzy c-means clustering algorithm and multi-objective particle swarm optimization to determine two cluster heads. The trajectory of the mobile sink is assessed using an improved ant colony algorithm. Comparisons with other algorithms show that this method can improve the network's lifetime and data transmission efficiency.
Article
Computer Science, Artificial Intelligence
Muhammad Waqas, Shanshan Tu, Zahid Halim, Sadaqat Ur Rehman, Ghulam Abbas, Ziaul Haq Abbas
Summary: This article surveys the methodological studies of using artificial intelligence (AI) to solve the challenges in network and communication security. It presents a taxonomy of security threats and reviews the potential of AI solutions. The article is the first comprehensive survey on AI solutions for all types of security threats, and also discusses lessons learned and future directions.
ARTIFICIAL INTELLIGENCE REVIEW
(2022)
Article
Computer Science, Information Systems
Mohammed Ahmed Jubair, Salama A. A. Mostafa, Dilovan Asaad Zebari, Hussein Muhee Hariz, Nejood Faisal Abdulsattar, Mustafa Hamid Hassan, Ali Hashim Abbas, Fatima Hashim Abbas, Areej Alasiry, M. Turki-Hadj Alouane
Summary: Nowadays, VANET plays a crucial role in the development of advanced intelligent transportation systems. However, due to the high mobility and rapid topology changes, VANET is prone to link failures, security vulnerabilities, and data loss. To address these issues, this research proposes a new routing protocol called QoS+, which combines QoS-aware CH selection and hybrid cryptography. The QoS+ protocol aims to improve network firmness, connectivity, security, and privacy. Evaluation using a VANET simulator shows that the QoS+ protocol outperforms existing protocols in terms of message success rate, routing load, throughput, efficiency, and end-to-end delay. It also achieves superior performance in terms of CH efficiency, cluster member efficiency, and average cluster number.
Article
Computer Science, Information Systems
Haider Ali, Umair Ullah Tariq, Mubashir Hussain, Liu Lu, John Panneerselvam, Xiaojun Zhai
Summary: Wireless sensor networks play a vital role in surveillance, healthcare, and industrial automation, with a prime concern being the enhancement of energy efficiency. Clustering is widely adopted to increase network lifetime and reduce energy consumption. The proposed ARSH-FATI-CHS algorithm dynamically switches between exploration and exploitation during runtime, significantly improving network lifetime by approximately 25% compared to state-of-the-art PSO.
IEEE SYSTEMS JOURNAL
(2021)
Article
Chemistry, Analytical
Syed Kamran Haider, Aimin Jiang, Ahmad Almogren, Ateeq Ur Rehman, Abbas Ahmed, Wali Ullah Khan, Habib Hamam
Summary: The paper introduces an energy-efficient clustering and cluster head selection technique based on the midpoint technique. By considering residual energy and distance among nodes, it achieves uniform distribution of sensors and extends the lifetime of wireless sensor networks.
Article
Computer Science, Information Systems
Duraimurugan Samiayya, S. Radhika, A. Chandrasekar
Summary: This paper proposes a novel 'Hybrid Snake Whale Optimization (HSWO) Algorithm' to select optimal cluster heads in order to improve the network's lifetime and energy utilization.
PEER-TO-PEER NETWORKING AND APPLICATIONS
(2023)
Article
Energy & Fuels
S. Nagaraj, Atul B. Kathole, Leena Arya, Neha Tyagi, S. B. Goyal, Anand Singh Rajawat, Maria Simona Raboaca, Traian Candin Mihaltan, Chaman Verma, George Suciu
Summary: The use of wireless and IoT devices is growing rapidly, leading to the integration of mobile apps into low-cost, low-power platforms. To address security issues, we propose a secure encryption algorithm called SERPPA for network security and energy consumption.
Article
Computer Science, Theory & Methods
Inkyu Bang, Taehoon Kim, Han Seung Jang, Dan Keun Sung
Summary: Cellular networks have evolved and LTE systems face increased security threats, particularly regarding user device tracking. The paper proposes an opportunistic uplink power control scheme to minimize successful user tracking by an unknown adversary. This scheme effectively degrades an adversary's inference ability and maximizes the average inference error probability, leading to almost 100% inference error over multiple time slots.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
(2022)
Article
Computer Science, Information Systems
Dingde Jiang, Feng Wang, Zhihan Lv, Shahid Mumtaz, Saba Al-Rubaye, Antonios Tsourdos, Octavia Dobre
Summary: This article proposes a user-oriented content distribution scheme for satellite-terrestrial networks (STN) to improve content distribution efficiency. The scheme includes algorithms for network division, caching satellite deployment, cache node selection, and content updating mechanism. Simulation results demonstrate that the scheme can reduce propagation delay and network load under different network conditions and has stability and self-adaptability.
IEEE TRANSACTIONS ON MOBILE COMPUTING
(2023)
Article
Computer Science, Information Systems
Zhihan Lv, Songhao Zhu, Dongsheng Wang, Zhiwei Liang
Summary: This research proposes a dual-path network and attention mechanism to learn discriminative feature representations, and a modified Batch Norm Neck module to fuse cross-modality feature representations to improve identity recognition accuracy. Experimental results demonstrate that the proposed method significantly improves the performance of infrared-visible person re-identification on two public datasets.
MULTIMEDIA TOOLS AND APPLICATIONS
(2023)
Article
Energy & Fuels
Zhihan Lv, Chen Cheng, Haibin Lv
Summary: The purpose of this study is to investigate the role of safe and optimal scheduling of thermal energy storage systems in intelligent buildings in promoting sustainable economic development under Digital Twins (DTs) technology. Phase Change Material (PCM) is introduced in the building structure, and the DTs technology is applied for real-time analysis. The PCM wall structure and thermal network DTs model are designed for intelligent buildings, and a thermal energy storage and dispatch model is constructed based on DTs. The model achieves lower economic costs, environmental costs, and energy costs, as well as a better energy-saving effect compared to existing models, serving as a reference for digital energy storage and comprehensive energy utilization in intelligent buildings.
Article
Computer Science, Artificial Intelligence
Hailin Feng, Liang Qiao, Zhihan Lv
Summary: The research aims to reduce network resource pressure, improve service quality and optimize network performance in cloud centers and edge nodes. A edge-cloud collaboration framework based on IoT is designed, using raspberry pi cards as working nodes. The framework consists of three layers, including edge RP, monitoring & scheduling RP, and CC. The task delay in the edge-cloud collaboration mode is the least among different working modes, and real-time object detection can be achieved.
APPLIED SOFT COMPUTING
(2023)
Article
Construction & Building Technology
Bin Yang, Yihang Liu, Pengju Liu, Faming Wang, Xiaogang Cheng, Zhihan Lv
Summary: This study used a deep learning-based computer vision method for indoor occupancy detection and proposed an occupant-centric control strategy based on the monitored occupant number to regulate supply air parameters and outdoor air volume for energy saving purposes. The results showed that compared to the traditional control strategy, the proposed strategy improved comfort by 43%-73%, maintained acceptable air quality, kept CO2 concentration below 700 ppm, and saved energy by 2.3%-8.1%. It was also found that the lower the occupancy, the greater the improvement in comfort and energy savings.
BUILDING AND ENVIRONMENT
(2023)
Article
Computer Science, Information Systems
Bo Fang, Junxin Chen, Yu Liu, Wei Wang, Ke Wang, Amit Kumar Singh, Zhihan Lv
Summary: With the advancement of wearable devices, collecting single lead ECG waves continuously has become more comfortable. This paper proposes a dual-channel neural network for atrial fibrillation (AF) detection from a single lead ECG wave. The method includes data preprocessing and a dual-channel neural network. A two-stage denoising procedure is utilized to handle the high noise and disturbance commonly present in ECG wave data collected by wearables. The results on the 2017 PhysioNet/CinC Challenge database confirm the effectiveness of the proposed method for AF detection, with F1 values of 0.83, 0.90, and 0.75 for AF rhythm, normal rhythm, and other rhythms, respectively. The method also outperforms some state-of-the-art counterparts.
IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS
(2023)
Article
Computer Science, Information Systems
Nan Bao, Jiajun Du, Chengyang Wu, Duo Hong, Junxin Chen, Robert Nowak, Zhihan Lv
Summary: This paper presents a contactless and real-time respiration monitoring system, called Wi-Breath, based on off-the-shelf WiFi devices. The system monitors respiration using both the amplitude and phase difference of WiFi channel state information (CSI). A signal selection method based on a support vector machine (SVM) algorithm is proposed to improve the accuracy of respiration detection. Experimental results show that Wi-Breath achieves an accuracy of 91.2% and reduces the average error by 17.0% compared to state-of-the-art counterparts.
IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS
(2023)
Article
Engineering, Civil
Ilgin Gokasar, Alperen Timurogullari, Sarp Semih Ozkan, Muhammet Deveci, Zhihan Lv
Summary: This paper proposes a modified standard normal deviation (MSND) incident detection algorithm that uses connected autonomous vehicles (CAVs) as data sources and evaluates its efficacy using SUMO Traffic Simulation Software. The results show that the proposed method outperforms other incident detection algorithms in terms of detection rate and integrates well with the Variable Speed Limits (VSL) traffic management method to reduce average density in critical regions.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
(2023)
Article
Engineering, Civil
Yang Liu, Ang Yang, Qingcheng Zeng, Yuhui Sun, Jing Gao, Zhihan Lv
Summary: The Intelligent Transportation System based on Digital Twins provides accurate data sources for traffic control. This study focuses on real-time information processing and task scheduling problems in the Internet of Vehicles (IoV) system based on Virtual Reality. Different algorithms are used to improve task quality, and a privacy protection algorithm is designed for the traffic information transmission system.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
(2023)
Article
Economics
Hailin Feng, Haibin Lv, Zhihan Lv
Summary: This study investigates the role of resilience of Digital Twins in the applicability of transportation systems. The research on Digital Twins technology in various aspects of transportation has achieved success, but there is still room for optimization. The study analyzes the application of Digital Twins in intelligent transportation systems and how changes in traveler behavior reflect the impact of uncertain events on the traffic network. Furthermore, an IoV system based on Digital Twins and blockchain is established to solve data redundancy and computational volume issues in in-vehicle data sharing.
TRANSPORTATION RESEARCH PART A-POLICY AND PRACTICE
(2023)
Article
Automation & Control Systems
Zhihan Lv, Amit Kumar Singh
Summary: This study aims to improve rehabilitative care by optimizing the medical automation monitoring system enabled by wearable computing through edge cloud and IoT technology. It analyzes recent research on edge cloud and wearable computing devices, and contrasts data fusion techniques in wearable sensors. An edge cloud model is constructed to track patients' vital signs in real time and assess their health status and rehabilitation progress. A wearable device information monitoring system is established to provide effective rehabilitation treatment for stroke patients.
IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING
(2023)
Proceedings Paper
Computer Science, Artificial Intelligence
Zhihan Lv
Summary: This work evaluates the performance and effect of a Human-Computer Interaction (HCI) system in the Metaverse, with real-time interaction and immersion. It introduces the Metaverse with HCI functions such as 3D face reconstruction, handshake and hug, and multi-user synchronous editing environment, with all information stored in the blockchain. The HCI functions are evaluated, demonstrating an overall correct rate of 95.45% for the subjects. Users' social acceptance of VR interactive systems, action interaction usability, user emotions, and user satisfaction all receive high scores. This work contributes to the evaluation and optimization of HCI systems in the Metaverse.
2023 IEEE CONFERENCE ON VIRTUAL REALITY AND 3D USER INTERFACES ABSTRACTS AND WORKSHOPS, VRW
(2023)
Article
Computer Science, Cybernetics
Hao Zhang, Zonglin Li, Sanya Liu, Tao Huang, Zhouwei Ni, Jian Zhang, Zhihan Lv
Summary: With the proliferation of fake news, detecting and classifying them accurately is crucial to prevent social panic and group polarization. This study proposes a graph attention network-based model that incorporates sentiment analysis, external knowledge comparison, and emotion interaction to extract features from long-form news for fake news classification. The model outperforms existing methods and achieves state-of-the-art accuracy on various datasets.
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS
(2023)
Article
Telecommunications
Jiabao Wen, Jiachen Yang, Tianying Wang, Yang Li, Zhihan Lv
Summary: In order to efficiently complete a complex computation task, it is necessary to decompose the task into subcomputation tasks that run parallel in edge computing. Wireless Sensor Network (WSN) is an example of parallel computation. A task allocation strategy is needed to reduce energy consumption and balance the load of the network, which is crucial for achieving highly reliable parallel computation in WSN.
DIGITAL COMMUNICATIONS AND NETWORKS
(2023)
Article
Computer Science, Artificial Intelligence
Xiaoyang Zheng, Dongqing Jia, Zhihan Lv, Chengyou Luo, Junli Zhao, Zeyu Ye
Summary: Wind energy is an important part of the power system and accurate wind speed forecasting is essential for its stable and safe utilization. This paper proposes a Legendre multiwavelet-based neural network model, which combines the properties of Legendre multi-wavelets and the self-learning capability of neural networks. The model achieves optimal performance and high prediction accuracy, especially in multi-step prediction.
CAAI TRANSACTIONS ON INTELLIGENCE TECHNOLOGY
(2023)
Review
Computer Science, Information Systems
Euclides Carlos Pinto Neto, Sajjad Dadkhah, Somayeh Sadeghi, Heather Molyneaux, Ali A. Ghorbani
Summary: The Internet of Things (IoT) has the potential to revolutionize medical treatment in healthcare, but it also faces security threats. Advanced analytics can enhance IoT security, but generating realistic datasets is complex. This research conducts a review of Machine Learning (ML) solutions for IoT security in healthcare, focusing on existing datasets, resources, applications, and challenges, to highlight the current landscape and future requirements.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Duncan Deveaux, Takamasa Higuchi, Seyhan Ucar, Jerome Harri, Onur Altintas
Summary: This paper investigates the ability to predict the risk patterns of vehicles in a roundabout and suggests that constraining knowledge transfer to roundabouts with a similar context can significantly improve accuracy.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Lingjun Zhao, Qinglin Yang, Huakun Huang, Longtao Guo, Shan Jiang
Summary: Metaverse seamlessly integrates the real and virtual worlds, and intelligent wireless sensing technology can serve as an intelligent, flexible, non-contact way to access the metaverse and accelerate the establishment of a bridge between the real physical world and the metaverse. However, there are still challenges and open issues in this field.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Jing Xiong, Hong Zhu
Summary: With the rapid growth of data in the era of IoT, the challenge of data privacy protection arises. This article proposes a federated learning approach that uses collaborative training to obtain a global model without direct exposure to local datasets. By utilizing dynamic masking and adaptive differential privacy methods, the approach reduces communication overhead and improves the converge performance of the model.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Carlos Rubio Garcia, Simon Rommel, Sofiane Takarabt, Juan Jose Vegas Olmos, Sylvain Guilley, Philippe Nguyen, Idelfonso Tafur Monroy
Summary: The reliance on asymmetric public key cryptography and symmetric encryption for cyber-security in current telecommunication networks is threatened by quantum computing technology. Quantum Key Distribution and post-quantum cryptography provide resistance to quantum attacks. This paper proposes two novel hybrid solutions integrating QKD and PQC into TLS for quantum-resistant key exchange.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Annisa Sarah, Gianfranco Nencioni
Summary: This article explores the concept of a Slice Broker, an intermediate entity that purchases resources from Infrastructure Providers to offer customized network slices to users. The article proposes a cost-minimization problem and compares it with alternative problems to demonstrate its effectiveness and cost-saving capabilities.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Sumana Maiti, Sudip Misra, Ayan Mondal
Summary: The broadcast proxy re-encryption methods extend traditional proxy re-encryption mechanisms and propose a scheme called MBP for IoT applications. MBP calculates a single re-encryption key for all user groups and uses multi-channel broadcast encryption to reduce security element size. However, it increases computation time for receiver IoT devices. The use of Rubinstein-Stahl bargaining game approach addresses this issue and MBP is secure against selective group chosen-ciphertext attack in the random oracle model.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Pankaj Kumar, Hari Om
Summary: This paper presents NextGenV2V, a protocol for the next-generation vehicular network that achieves authenticated communication between vehicles using symmetric keys and a (2, n)-threshold scheme. The protocol reduces communication overhead and improves authentication delay, ensuring better security. Comparative analysis demonstrates the suitability of NextGenV2V in next-generation vehicular networks.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Eric Ossongo, Moez Esseghir, Leila Merghem-Boulahia
Summary: The implementation of 5G networks allows for the efficient coexistence of heterogeneous services in a single physical virtualized infrastructure. Virtualization of network functions enables more flexible resource management and customizable services. However, the increasing number of connected objects poses challenges in managing physical and virtual resources, requiring intelligent systems to ensure communication quality.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Suvrima Datta, U. Venkanna
Summary: The Internet of Things (IoT) enables real-time sensing and data transmission to make homes smarter. Effective device-type identification methods are crucial as the number of IoT devices continues to grow. In this paper, a P4-based gateway called PiGateway is proposed to classify and prioritize the type of IoT devices. By utilizing a decision tree model and flow rules, PiGateway enables real-time granular analysis and in-network classification of IoT traffic.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Fahad Razaque Mughal, Jingsha He, Nafei Zhu, Saqib Hussain, Zulfiqar Ali Zardari, Ghulam Ali Mallah, Md. Jalil Piran, Fayaz Ali Dharejo
Summary: This paper explores the relationship between heterogeneous cluster networks and federated learning, as well as the challenges of implementing federated learning in heterogeneous networks and the Internet of Things. The authors propose an Intra-Clustered FL (ICFL) model that optimizes computation and communication to select heterogeneous FL nodes in each cluster, enabling efficient processing of asynchronous data and ensuring data security.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Rajesh Kumar, Deepak Sinwar, Vijander Singh
Summary: This paper investigates the coexistence mechanisms between eMBB and URLLC traffic for resource scheduling in 5G. Through examining different approaches and performance metrics, it provides detailed insights for researchers in the field, and highlights key issues, challenges, and future directions.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Giovanni Nardini, Giovanni Stea
Summary: Digital Twins of Networks (DTNs) are proposed as digital replicas of physical entities, enabling efficient data-driven network management and performance-driven network optimization. DTNs provide simulation services for dynamic reconfiguration and fault anticipation, using discrete-event network simulators as the ideal tools. Challenges include centralized vs. distributed implementation, input gathering from the physical network, security issues and hosting. The possibilities of network simulation for what-if analysis are explored, with the concepts of lockstep and branching analysis defined.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Zhaolin Ma, Jiali You, Haojiang Deng
Summary: This paper presents the Distributed In-Network Name Resolution System (DINNRS), which leverages software-defined networking and Information-Centric Networking (ICN) paradigm to provide high scalability and minimal request delay. Our methods, including an enhanced marked cuckoo filter for fast resolving, achieve significant performance gains in simulation experiments.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Yujie Wang, Ying Wang, Qingqing Liu, Yong Zhang
Summary: This paper proposes a dynamic indoor positioning method based on multi-scale metric learning of the channel state information (CSI). By constructing few-shot learning tasks, this method can achieve dynamic positioning using CSI signals without additional equipment. Experimental results show that compared to commonly used dynamic location and tracking algorithms, the proposed method has higher positioning accuracy and does not accumulate errors.
COMPUTER COMMUNICATIONS
(2024)