Your browser doesn't support javascript.
loading
Show: 20 | 50 | 100
Results 1 - 5 de 5
Filter
Add more filters










Database
Language
Publication year range
1.
Entropy (Basel) ; 24(11)2022 Nov 04.
Article in English | MEDLINE | ID: mdl-36359697

ABSTRACT

The exponential growth of the edge-based Internet-of-Things (IoT) services and its ecosystems has recently led to a new type of communication network, the Low Power Wide Area Network (LPWAN). This standard enables low-power, long-range, and low-data-rate communications. Long Range Wide Area Network (LoRaWAN) is a recent standard of LPWAN that incorporates LoRa wireless into a networked infrastructure. Consequently, the consumption of smart End Devices (EDs) is a major challenge due to the highly dense network environment characterised by limited battery life, spectrum coverage, and data collisions. Intelligent and efficient service provisioning is an urgent need of a network to streamline the networks and solve these problems. This paper proposes a Dynamic Reinforcement Learning Resource Allocation (DRLRA) approach to allocate efficient resources such as channel, Spreading Factor (SF), and Transmit Power (Tp) to EDs that ultimately improve the performance in terms of consumption and reliability. The proposed model is extensively simulated and evaluated with the currently implemented algorithms such as Adaptive Data Rate (ADR) and Adaptive Priority-aware Resource Allocation (APRA) using standard and advanced evaluation metrics. The proposed work is properly cross validated to show completely unbiased results.

2.
Sensors (Basel) ; 22(19)2022 Sep 21.
Article in English | MEDLINE | ID: mdl-36236255

ABSTRACT

In this paper, we address the problems of fraud and anomalies in the Bitcoin network. These are common problems in e-banking and online transactions. However, as the financial sector evolves, so do the methods for fraud and anomalies. Moreover, blockchain technology is being introduced as the most secure method integrated into finance. However, along with these advanced technologies, many frauds are also increasing every year. Therefore, we propose a secure fraud detection model based on machine learning and blockchain. There are two machine learning algorithms-XGboost and random forest (RF)-used for transaction classification. The machine learning techniques train the dataset based on the fraudulent and integrated transaction patterns and predict the new incoming transactions. The blockchain technology is integrated with machine learning algorithms to detect fraudulent transactions in the Bitcoin network. In the proposed model, XGboost and random forest (RF) algorithms are used to classify transactions and predict transaction patterns. We also calculate the precision and AUC of the models to measure the accuracy. A security analysis of the proposed smart contract is also performed to show the robustness of our system. In addition, an attacker model is also proposed to protect the proposed system from attacks and vulnerabilities.


Subject(s)
Blockchain , Algorithms , Fraud , Machine Learning , Technology
3.
Sensors (Basel) ; 22(17)2022 Aug 23.
Article in English | MEDLINE | ID: mdl-36080777

ABSTRACT

The exponential growth of intelligent vehicles(IVs) development has resulted in a complex network. As the number of IVs in a network increases, so does the number of connections. As a result, a great deal of data is generated. This complexity leads to insecure communication, traffic congestion, security, and privacy issues in vehicular networks (VNs). In addition, detecting malicious IVs, data integration, and data validation are major issues in VNs that affect network performance. A blockchain-based model for secure communication and malicious IV detection is proposed to address the above issues. In addition, this system also addresses data integration and transaction validation using an encryption scheme for secure communication. A multi-chain concept separates the legitimate and malicious data into two chains: the Integrity chain (I-chain) and Fraud chain (F-chain). This multi-chain mechanism solves the storage problem and reduces the computing power. The integration of blockchain in the proposed model provides privacy, network security, transparency, and immutability. To address the storage issue, the InterPlanetary File System (IPFS) is integrated with Certificate Authority (CA). A reputation mechanism is introduced to detect malicious IVs in the network based on ratings. This reputation mechanism is also used to prevent Sybil attack. The evaluation of the proposed work is based on the cost of smart contracts and computation time. Furthermore, two attacker models are presented to prevent the selfish mining attack and the Sybil attack. Finally, a security analysis of the proposed smart contracts with their security vulnerabilities is also presented.


Subject(s)
Blockchain , Computer Security , Communication , Computer Communication Networks , Privacy
4.
Sensors (Basel) ; 22(7)2022 Mar 30.
Article in English | MEDLINE | ID: mdl-35408272

ABSTRACT

The enhancement of Robustness (R) has gained significant importance in Scale-Free Networks (SFNs) over the past few years. SFNs are resilient to Random Attacks (RAs). However, these networks are prone to Malicious Attacks (MAs). This study aims to construct a robust network against MAs. An Intelligent Rewiring (INTR) mechanism is proposed to optimize the network R against MAs. In this mechanism, edge rewiring is performed between the high and low degree nodes to make a robust network. The Closeness Centrality (CC) measure is utilized to determine the central nodes in the network. Based on the measure, MAs are performed on nodes to damage the network. Therefore, the connections of the neighboring nodes in the network are greatly affected by removing the central nodes. To analyze the network connectivity against the removal of nodes, the performance of CC is found to be more efficient in terms of computational time as compared to Betweenness Centrality (BC) and Eigenvector Centrality (EC). In addition, the Recalculated High Degree based Link Attacks (RHDLA) and the High Degree based Link Attacks (HDLA) are performed to affect the network connectivity. Using the local information of SFN, these attacks damage the vital portion of the network. The INTR outperforms Simulated Annealing (SA) and ROSE in terms of R by 17.8% and 10.7%, respectively. During the rewiring mechanism, the distribution of nodes' degrees remains constant.

5.
Comput Math Methods Med ; 2022: 1124927, 2022.
Article in English | MEDLINE | ID: mdl-35273647

ABSTRACT

Substantial information related to human cerebral conditions can be decoded through various noninvasive evaluating techniques like fMRI. Exploration of the neuronal activity of the human brain can divulge the thoughts of a person like what the subject is perceiving, thinking, or visualizing. Furthermore, deep learning techniques can be used to decode the multifaceted patterns of the brain in response to external stimuli. Existing techniques are capable of exploring and classifying the thoughts of the human subject acquired by the fMRI imaging data. fMRI images are the volumetric imaging scans which are highly dimensional as well as require a lot of time for training when fed as an input in the deep learning network. However, the hassle for more efficient learning of highly dimensional high-level features in less training time and accurate interpretation of the brain voxels with less misclassification error is needed. In this research, we propose an improved CNN technique where features will be functionally aligned. The optimal features will be selected after dimensionality reduction. The highly dimensional feature vector will be transformed into low dimensional space for dimensionality reduction through autoadjusted weights and combination of best activation functions. Furthermore, we solve the problem of increased training time by using Swish activation function, making it denser and increasing efficiency of the model in less training time. Finally, the experimental results are evaluated and compared with other classifiers which demonstrated the supremacy of the proposed model in terms of accuracy.


Subject(s)
Brain Mapping/statistics & numerical data , Brain/diagnostic imaging , Deep Learning , Functional Neuroimaging/statistics & numerical data , Magnetic Resonance Imaging/statistics & numerical data , Computational Biology , Connectome/statistics & numerical data , Databases, Factual , Humans , Imaging, Three-Dimensional/statistics & numerical data , Neural Networks, Computer
SELECTION OF CITATIONS
SEARCH DETAIL
...