Article
Computer Science, Information Systems
Masood Ahmad, Fasee Ullah, Ishtiaq Wahid, Atif Khan, M. Irfan Uddin, Abdullah Alharbi, Wael Alosaimi
Summary: The paper proposes a scheme in which some IoE objects in Ue-IoE are responsible for route computation, and simulation results show that the proposed protocol outperforms existing protocols in terms of energy consumption, message overhead, throughput, and delay.
CMC-COMPUTERS MATERIALS & CONTINUA
(2021)
Article
Computer Science, Hardware & Architecture
Deepa Devassy, J. Immanuel Johnraja, Getzi Jeba Leelipushpam Paulraj
Summary: Wireless sensor networks are crucial in IoT applications and their lifespan depends on battery life. Clustering is a technique to increase network lifespan, and cluster head selection is vital. This study proposes a fusion cluster head selection algorithm combining LEACH protocol and dragonfly algorithm, which effectively extends network lifespan.
JOURNAL OF SUPERCOMPUTING
(2022)
Article
Computer Science, Hardware & Architecture
Neeraj Chandnani, Chandrakant N. Khairnar
Summary: In this research, a trust-based secure data aggregation method and an energy-efficient secure routing protocol called ANTPSOAODV were proposed for IoT WSNs. The proposed protocol achieves secure data aggregation by detecting nodes' behavior, calculating their trust values, and implementing a data gathering method. Additionally, the protocol includes the segmentation of the network into outer and inner zones, cluster creation based on vicinity, secure data transmission using secret sharing, and analysis of the data link to minimize routing disturbance. Performance evaluation showed that ANTPSOAODV outperforms existing protocols in terms of Quality-of-Service parameters in IoT WSNs.
MOBILE NETWORKS & APPLICATIONS
(2022)
Article
Computer Science, Information Systems
Muhammad Yeasir Arafat, Sangman Moh
Summary: This article presents bio-inspired localization (BIL) and clustering (BIC) schemes in UAV networks for wildfire detection and monitoring, which significantly outperform conventional schemes in terms of various performance metrics. The proposed algorithms enhance localization accuracy, clustering efficiency, and data transmission efficiency.
Article
Computer Science, Interdisciplinary Applications
Sami Mnasri, Malek Alrashidi
Summary: This study investigates and resolves the indoor routing problem of IoT devices using a new hybrid ant-genetic algorithm. The algorithm is evaluated through numerical and statistical tests, as well as simulation and experimental real prototyping, to demonstrate its efficiency compared with existing methods.
SIMULATION MODELLING PRACTICE AND THEORY
(2022)
Article
Computer Science, Hardware & Architecture
Lian Tong, Lan Yang, Xin Zhao, Li Liu
Summary: The growth of IoT devices has led to an increased use of SDNs. SDN promotes IoT device growth, enhances network resource sharing, and improves the reliability of IoT services. However, these interconnected systems also pose an energy consumption challenge. This article explores strategies to decrease energy consumption in IoT-based SDNs and proposes a fuzzy-based routing approach using the BQIGSA algorithm. The simulation results show that this approach outperforms current methods in terms of energy usage, delay rate, and data delivery rate.
SUSTAINABLE COMPUTING-INFORMATICS & SYSTEMS
(2023)
Article
Computer Science, Information Systems
Deepak Mehta, Sharad Saxena
Summary: This paper introduces a hierarchical routing protocol Fuzzy Multi-criteria Clustering and Bio-inspired Energy-efficient Routing (FMCB-ER) for improving the network lifetime of Wireless Sensors Network (WSN). The approach utilizes grid-based clustering technique and adaptive Fuzzy Multi-Criteria Decision-Making method, followed by Emperor Penguin Optimization for optimizing data transmission routes. Compared with existing routing methods, the proposed approach shows better performance in terms of energy consumption and network lifetime.
MULTIMEDIA TOOLS AND APPLICATIONS
(2022)
Article
Computer Science, Information Systems
Radwa Attia, Abeer Hassaan, Rawya Rizk
Summary: The paper proposes an Advanced Greedy Hybrid Bio-Inspired (AGHBI) routing protocol with a greedy forwarding system to enhance the performance of IoV. By utilizing a modified hybrid routing scheme with the help of bee colony optimization, the highest quality of service route is selected and maintained with minimum overflow. Simulation results show that the protocol effectively improves packet delivery ratio and delay, while maintaining acceptable overhead and hops count among all vehicles in both V2V and V2I environments.
Article
Computer Science, Theory & Methods
Satyaki Roy, Preetam Ghosh, Nirnay Ghosh, Sajal K. Das
Summary: The emergence of the edge computing network paradigm has improved network performance but faces optimization challenges related to the topological robustness of biological networks. The study of transcriptional regulatory networks as biological networks provides inspiration for the design of intelligent networking protocols and architectures.
ACM COMPUTING SURVEYS
(2021)
Article
Mathematics
Hernan Peraza-Vazquez, Adrian Pena-Delgado, Prakash Ranjan, Chetan Barde, Arvind Choubey, Ana Beatriz Morales-Cepeda
Summary: This paper proposes a new meta-heuristic algorithm called JSOA, which mimics the hunting behavior of jumping spiders and solves global optimization problems with a fine balance between exploitation and exploration.
Article
Engineering, Multidisciplinary
Hoda Zamani, Mohammad H. Nadimi-Shahraki, Amir H. Gandomi
Summary: This paper presents a novel bio-inspired algorithm called SMO, which mimics the behaviors of starlings during their stunning murmuration, to solve complex engineering optimization problems. The SMO introduces dynamic multi-flock construction and three new search strategies, achieving competitive results in solution quality and convergence rate compared to other state-of-the-art algorithms.
COMPUTER METHODS IN APPLIED MECHANICS AND ENGINEERING
(2022)
Article
Computer Science, Information Systems
Yasmine Harbi, Allaoua Refoufi, Zibouda Aliouat, Saad Harous
Summary: This paper discusses the use of bio-inspired security schemes to achieve privacy protection in the IoT, replacing traditional cryptographic techniques that are susceptible to security attacks. Research shows that this improved scheme is more secure and efficient than current related methods.
PEER-TO-PEER NETWORKING AND APPLICATIONS
(2022)
Article
Telecommunications
Nitin Singh Rajput
Summary: This research paper proposes a framework to guarantee Quality-of-Service for vehicular networks. It aims to stimulate cooperation among vehicles and strengthen the robustness of the network while ensuring security. The framework consists of three modules: Quality-of-Service assurance, cooperation stimulation, and security.
VEHICULAR COMMUNICATIONS
(2022)
Article
Telecommunications
Sharad Saxena, Deepak Mehta
Summary: This research proposed a WSN network design based on a hierarchical structure and energy efficient routing method. Clusters are formed using fuzzy multi-criteria decision approach and the Penguin Search Optimization Algorithm is used for strategic planning, showing better performance compared to existing techniques.
WIRELESS PERSONAL COMMUNICATIONS
(2021)
Article
Telecommunications
Deepak Kumar Sharma, Jahanavi Mishra, Aeshit Singh, Raghav Govil, Krishna Kant Singh, Akansha Singh
Summary: IoT smart devices are a combination of microprocessors, sensors, power source and transceiver modules that can effectively sense, communicate and transfer data. Energy efficiency is crucial for the network performance of these devices in distributed IoT networks. The architecture and modular nature of cloud environment pose challenges in load balancing. This paper introduces a technique that combines fuzzy logic with nature-inspired algorithms to balance the load in a network of IoT devices. The performances of these algorithms are compared with a brute force approach based on energy efficiency, network lifetime maximization, node failure rate and packet delivery ratio.
WIRELESS PERSONAL COMMUNICATIONS
(2023)
Article
Engineering, Electrical & Electronic
Nader Ajmi, Amina Msolli, Abdelhamid Helali, Pascal Lorenz, Ridha Mghaieth
Summary: This paper introduces a novel CEO-MAC protocol to address the issues of energy consumption and network monitoring in smart environments, which is simulated using NS2 software and compared with existing models like TDL, CMISO, and PCL-IDA protocols.
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS
(2022)
Article
Computer Science, Hardware & Architecture
Basudeb Bera, Anusha Vangala, Ashok Kumar Das, Pascal Lorenz, Muhammad Khurram Khan
Summary: In Intelligent Precision Agriculture, IoT devices and drones are used for monitoring agricultural environment but face security vulnerabilities due to insecure communication. A new authentication and key management scheme called AKMS-AgriIoT has been proposed with private blockchain solution for better security and functionality, supported by a detailed security analysis and comparative study.
COMPUTER STANDARDS & INTERFACES
(2022)
Article
Engineering, Mechanical
Merah Lahcene, Chaib Noureddine, Pascal Lorenz, Ali-Pacha Adda
Summary: This paper proposes a robust chaos-based stream cipher (CBSC) that addresses the challenges in chaos-based cryptography. The CBSC includes modules such as a synchronization circuit, a perturbation block, an encryption scheme, and a control parameters' generator, providing efficient encryption and statistical properties, as well as good security features.
NONLINEAR DYNAMICS
(2023)
Article
Computer Science, Information Systems
Sofiane Hamrioui, Jaime Lloret, Pascal Lorenz, Joel J. P. C. Rodrigues
Summary: The Internet of Things (IoT) is essential for communication in various sectors, but it faces challenges in terms of autonomy and self-configuration. In this article, a new cross-layer approach, 2SAEC-IoT, is proposed to improve data communication in IoT applications by considering different communication parameters and tolerating failures.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Hardware & Architecture
Mustafa Al Samara, Ismail Bennis, Abdelhafid Abouaissa, Pascal Lorenz
Summary: This paper proposes a centralised outlier detection and classification approach for Wireless Sensor Networks (WSNs), which can distinguish between errors due to a faulty sensor and those due to an event. The approach considers the spatial-temporal correlation between neighbouring sensor nodes and sensors' data values. Through a comparison study with two works from the literature, simulation results show that the proposed approach outperforms the studied techniques in terms of several metrics such as Detection Rate (DR), False Alarm Rate (FAR), Accuracy rate (ACC), F1_score and Area Under the Curve (AUC).
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2023)
Article
Telecommunications
Tahir Ali Shah, Insaf Ullah, Muhammad Asghar Khan, Pascal Lorenz, Nisreen Innab
Summary: Wireless communication networks have greatly improved users' productivity at work and in their daily lives by overcoming the constraints of wired networks and reducing wire maintenance costs. Combining wireless communication with the Internet of Things (IoT) enables applications in smart cities, traffic, farming, drones, etc. However, unauthorized users can cause serious damage through open communication in wireless networks, making authentication through digital signatures crucial.
JOURNAL OF SENSOR AND ACTUATOR NETWORKS
(2023)
Article
Computer Science, Software Engineering
Mehdi Rouissat, Mohammed Belkheir, Hicham Sid Ahmed Belkhira, Sofiane Boukli Hacene, Pascal Lorenz, Merahi Bouziani
Summary: The present work proposes a new technique to mitigate version number attacks targeting RPL-based IoT networks. The technique effectively reduces control overhead, improves energy efficiency, packet delivery ratio, and latency. The proposed solution has been implemented and simulated, showing significant improvements compared to the network under attack.
JOURNAL OF UNIVERSAL COMPUTER SCIENCE
(2023)
Article
Engineering, Electrical & Electronic
Prithwi Bagchi, Raj Maheshwari, Basudeb Bera, Ashok Kumar Das, Youngho Park, Pascal Lorenz, David K. Y. Yau
Summary: This paper introduces a lattice-based aggregate signature scheme that ensures security based on the difficulty of the Ring Learning-with-Error problem. It then applies this scheme to secure and transparent data storage in Internet of Drones applications using blockchain technology. Detailed security analysis and comparative study demonstrate the superior security and efficiency of the proposed scheme compared to existing approaches. Testbed experimental results and blockchain simulation show the applicability of the proposed scheme in real-life drone applications.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
(2023)
Article
Computer Science, Information Systems
Zainab Jamroz, Insaf Ullah, Bilal Hassan, Noor Ul Amin, Muhammad Asghar Khan, Pascal Lorenz, Nisreen Innab
Summary: The Internet of Medical Things (IoMT) improves the traditional healthcare system by enabling remote administration, efficient resource utilization, and mobility of medical devices. It simplifies the review of the patient's cloud-based medical history and allows close monitoring of the patient's condition. However, secure communication is crucial due to the privacy of patient medical records.
Proceedings Paper
Telecommunications
Jose Luis Garcia-Navas, Laura Garcia, Jaime Lloret, Oscar Romero, Pascal Lorenz
Summary: This paper proposes a Wireless Sensor Network (WSN) with multiple wireless technologies, and defines a network discovery system and a routing protocol to enable communication and topology construction among devices with different wireless technologies. The study shows that SF 7 achieves the best coverage results for both 433 MHz and 868 MHz devices in Europe, and the use of low-cost devices is not recommended for distances above 1 km.
IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022)
(2022)
Proceedings Paper
Telecommunications
Abdelhak Zier, Abdelhafid Abouaissa, Pascal Lorenz
Summary: The Internet of Things (IoT) has attracted attention from academia, industry, and government researchers, but it faces many challenges. The Future Internet of Things (FIoT) has been discussed as a solution to these challenges. In particular, the routing Quality of Service (QoS) is a critical issue in this type of network. In this paper, the authors propose a new bio-inspired routing protocol called FIRP, which is designed for FIoT environments using the Simple Additive Weight (SAW) Multi-Criteria Decision Making (MCDM) method. Simulation and statistical tests show that this routing algorithm improves energy consumption, routing overhead, and minimizes end-to-end delay.
IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022)
(2022)
Correction
Telecommunications
Tayeb Diab, Marc Gilg, Pascal Lorenz, Frederic Drouhin
WIRELESS PERSONAL COMMUNICATIONS
(2022)
Article
Engineering, Civil
Mauro A. A. da Cruz, Lucas R. Abbade, Pascal Lorenz, Samuel B. Mafra, Joel J. P. C. Rodrigues
Summary: The rapid development and widespread adoption of IoT have resulted in an increase in attacks targeting IoT environments. This paper proposes a solution to detect replication attacks in IoT by analyzing abnormal network traffic through machine learning.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
(2022)
Article
Computer Science, Information Systems
Karam Eddine Bilami, Pascal Lorenz
Summary: This paper discusses the architectures deployed for M2M communications and security challenges, presents a lightweight design based on a private blockchain to secure wireless M2M communications, and the evaluation shows that the proposed scheme performs better in terms of key parameters compared to other protocols.
Review
Telecommunications
Mustafa Al Samara, Ismail Bennis, Abdelhafid Abouaissa, Pascal Lorenz
Summary: This paper presents a comprehensive literature review of outlier detection techniques used in the context of the Internet of Things (IoT). It discusses the fundamentals of outlier detection, existing approaches, evaluation methods, and challenges in designing these techniques. The paper also compares and discusses recent outlier detection techniques, categorizing them into seven main categories. Each category is discussed in terms of available techniques, highlighting their advantages and disadvantages, and presenting related works. A comparative study of these techniques is provided.
JOURNAL OF SENSOR AND ACTUATOR NETWORKS
(2022)