Your browser doesn't support javascript.
loading
Show: 20 | 50 | 100
Results 1 - 7 de 7
Filter
Add more filters










Database
Language
Publication year range
2.
Cluster Comput ; 25(6): 4601-4615, 2022.
Article in English | MEDLINE | ID: mdl-35999895

ABSTRACT

Nowadays, several malicious applications target computers and mobile users. So, malware detection plays a vital role on the internet so that the device is secure without any malicious activity affecting or gathering the useful content of the user. Researches indicate that the vulnerability of adversarial attacks is more in deep neural networks. When there is a malicious sample in a family, there will not be many changes in the variants, but there will be more signatures. So, a deep learning model, DenseNet was used for detection. The adversarial samples are created by other types of noise, including the Gaussian noise. We added this noise to a subset of malware samples and observed that for Malimg, the modified samples were precisely identified by the DenseNet, and the attack cannot be done. But for BIG2015, we found that there was some marginal decrease in the performance of the classifier, which shows that the model performs well. Further, experiments on the Fast Gradient Sign Method (FGSM) were conducted, and it was observed that a significant decrease in classification accuracy was detected for both datasets. We understand that deep learning models should be robust to adversarial attacks.

3.
Comput Intell Neurosci ; 2022: 7061617, 2022.
Article in English | MEDLINE | ID: mdl-35341173

ABSTRACT

In underwater acoustic sensor networks (UASNs), the reliable transfer of data from the source nodes located underwater to the destination nodes at the surface through the network of intermediate nodes is a significant challenge due to various unique characteristics of UASN such as continuous mobility of sensor nodes, increased propagation delay, restriction in energy, and heightened interference. Recently, the location-based opportunistic routing protocols seem to show potential by providing commendable quality of service (QoS) in the underwater environment. This study initially reviews all the latest location-based opportunistic routing protocols proposed for UASNs and discusses its possible limitations and challenges. Most of the existing works focus either on improving the QoS or on energy efficiency, and the few hybrid protocols that focus on both parameters are too complex with increased overhead and lack techniques to overcome communication voids. Further, this study proposes and discusses an easy-to-implement energy-efficient location-based opportunistic routing protocol (EELORP) that can work efficiently for various applications of UASN-assisted Internet of Underwater Things (IoUTs) platforms with reduced delay. We simulate the protocol in Aqua-Sim, and the results obtained show better performance than existing protocols in terms of QoS and energy efficiency.

4.
IEEE J Biomed Health Inform ; 26(5): 1969-1976, 2022 05.
Article in English | MEDLINE | ID: mdl-34357873

ABSTRACT

The seamless integration of medical sensors and the Internet of Things (IoT) in smart healthcare has leveraged an intelligent Internet of Medical Things (IoMT) framework to detect the criticality of the patients. However, due to the limited storage capacity and computation power of the local IoT devices, patient's health data needs to transfer to remote computing devices for analysis, which can easily result in privacy leakage due to lack of control over the patient's health data and the vulnerability of the network for various types of attacks. Motivated by this, in this paper, an Empirical Intelligent Agent (EIA) based on a unique Swarm-Neural Network (Swarm-NN) method is proposed to identify attackers in the edge-centric IoMT framework. The major outcome of the proposed strategy is to identify the attacks during data transmission through a network and analyze the health data efficiently at the edge of the network with higher accuracy. The proposed Swarm-NN strategy is evaluated with a real-time secured dataset, namely the ToN-IoT dataset that collected Telemetry, Operating systems, and Network data for IoT applications and compares the performance over the standard classification models using various performance metrics. The test results demonstrate that the proposed Swarm-NN strategy achieves 99.5% accuracy over the ToN-IoT dataset.


Subject(s)
Internet of Things , Data Collection , Delivery of Health Care , Humans , Neural Networks, Computer , Privacy
5.
Future Gener Comput Syst ; 122: 40-51, 2021 Sep.
Article in English | MEDLINE | ID: mdl-34393306

ABSTRACT

In the densely populated Internet of Things (IoT) applications, sensing range of the nodes might overlap frequently. In these applications, the nodes gather highly correlated and redundant data in their vicinity. Processing these data depletes the energy of nodes and their upstream transmission towards remote datacentres, in the fog infrastructure, may result in an unbalanced load at the network gateways and edge servers. Due to heterogeneity of edge servers, few of them might be overwhelmed while others may remain less-utilized. As a result, time-critical and delay-sensitive applications may experience excessive delays, packet loss, and degradation in their Quality of Service (QoS). To ensure QoS of IoT applications, in this paper, we eliminate correlation in the gathered data via a lightweight data fusion approach. The buffer of each node is partitioned into strata that broadcast only non-correlated data to edge servers via the network gateways. Furthermore, we propose a dynamic service migration technique to reconfigure the load across various edge servers. We assume this as an optimization problem and use two meta-heuristic algorithms, along with a migration approach, to maintain an optimal Gateway-Edge configuration in the network. These algorithms monitor the load at each server, and once it surpasses a threshold value (which is dynamically computed with a simple machine learning method), an exhaustive search is performed for an optimal and balanced periodic reconfiguration. The experimental results of our approach justify its efficiency for large-scale and densely populated IoT applications.

6.
Big Data ; 9(4): 289-302, 2021 08.
Article in English | MEDLINE | ID: mdl-34085838

ABSTRACT

An exponential progression in the miniaturization of communicating devices has proliferated the generation of a large volume of data termed as "big data." The technological advancements in the micro-electro/mechanical system has made it possible to design the low-cost, low-power consuming artificial intelligence (AI)-based wireless sensor nodes to gather the big data belonging to various attributes from their surroundings. These nodes help in the early detection and prediction for the occurrence of landslides, which are among the catastrophic hazards. A profusion of research has focused on exploiting the potential of sensors for continuous monitoring and detecting the landslides at the earliest. However, the limited energy resources of sensor nodes give rise to the huge challenge for the network longevity pertaining to landslide detection. To address this concern, in this article, we propose an optimized routing and big data gathering system for landslide detection using (AI)-based wireless sensor network (WSN) (ORLAW). Since we propose a distributed routing mechanism, AI has a major role to play in the intelligent detection of landslides that too without the intervention of an external entity. We use the Dynamic Salp Swarm Algorithm for the cluster head selection in ORLAW. Two data collecting sinks are deployed on the opposite sides of the network, which is assumed to be a mountainous area. It is discerned from the simulation examination that ORLAW elongates the reliability period by 23.9% compared with the recently proposed cluster-based intelligent routing protocol, and also outperforms many others in the perspective of energy efficient management of big data.


Subject(s)
Internet of Things , Landslides , Artificial Intelligence , Big Data , Computer Communication Networks , Reproducibility of Results , Wireless Technology
7.
IEEE Trans Industr Inform ; 17(8): 5829-5839, 2021 Aug.
Article in English | MEDLINE | ID: mdl-33981186

ABSTRACT

Industry 5.0 is the digitalization, automation and data exchange of industrial processes that involve artificial intelligence, Industrial Internet of Things (IIoT), and Industrial Cyber-Physical Systems (I-CPS). In healthcare, I-CPS enables the intelligent wearable devices to gather data from the real-world and transmit to the virtual world for decision-making. I-CPS makes our lives comfortable with the emergence of innovative healthcare applications. Similar to any other IIoT paradigm, I-CPS capable healthcare applications face numerous challenging issues. The resource-constrained nature of wearable devices and their inability to support complex security mechanisms provide an ideal platform to malevolent entities for launching attacks. To preserve the privacy of wearable devices and their data in an I-CPS environment, we propose a lightweight mutual authentication scheme. Our scheme is based on client-server interaction model that uses symmetric encryption for establishing secured sessions among the communicating entities. After mutual authentication, the privacy risk associated with a patient data is predicted using an AI-enabled Hidden Markov Model (HMM). We analyzed the robustness and security of our scheme using BurrowsAbadiNeedham (BAN) logic. This analysis shows that the use of lightweight security primitives for the exchange of session keys makes the proposed scheme highly resilient in terms of security, efficiency, and robustness. Finally, the proposed scheme incurs nominal overhead in terms of processing, communication and storage and is capable to combat a wide range of adversarial threats.

SELECTION OF CITATIONS
SEARCH DETAIL
...