- Ahmed, Ejaz, Yaqoob, Ibrar, Gani, Abdullah, Imran, Muhammad, Guizani, Mohsen
- Authors: Ahmed, Ejaz , Yaqoob, Ibrar , Gani, Abdullah , Imran, Muhammad , Guizani, Mohsen
- Date: 2016
- Type: Text , Journal article
- Relation: IEEE Wireless Communications Vol. 23, no. 5 (2016), p. 10-16
- Full Text: false
- Reviewed:
- Description: The rapid advancements in communication technologies and the explosive growth of the Internet of Things have enabled the physical world to invisibly interweave with actuators, sensors, and other computational elements while maintaining continuous network connectivity. The continuously connected physical world with computational elements forms a smart environment. A smart environment aims to support and enhance the abilities of its dwellers in executing their tasks, such as navigating through unfamiliar space and moving heavy objects for the elderly, to name a few. Researchers have conducted a number of efforts to use IoT to facilitate our lives and to investigate the effect of IoT-based smart environments on human life. This article surveys the state-of-the-art research efforts to enable IoT-based smart environments. We categorize and classify the literature by devising a taxonomy based on communication enablers, network types, technologies, local area wireless standards, objectives, and characteristics. Moreover, the article highlights the unprecedented opportunities brought about by IoT-based smart environments and their effect on human life. Some reported case studies from different enterprises are also presented. Finally, we discuss open research challenges for enabling IoT-based smart environments. © 2016 IEEE.
Value-based caching in information-centric wireless body area networks
- Al-Turjman, Fadi, Imran, Muhammad, Vasilakos, Athanasios
- Authors: Al-Turjman, Fadi , Imran, Muhammad , Vasilakos, Athanasios
- Date: 2017
- Type: Text , Journal article
- Relation: Sensors (Switzerland) Vol. 17, no. 1 (2017), p.
- Full Text:
- Reviewed:
- Description: We propose a resilient cache replacement approach based on a Value of sensed Information (VoI) policy. To resolve and fetch content when the origin is not available due to isolated in-network nodes (fragmentation) and harsh operational conditions, we exploit a content caching approach. Our approach depends on four functional parameters in sensory Wireless Body Area Networks (WBANs). These four parameters are: age of data based on periodic request, popularity of on-demand requests, communication interference cost, and the duration for which the sensor node is required to operate in active mode to capture the sensed readings. These parameters are considered together to assign a value to the cached data to retain the most valuable information in the cache for prolonged time periods. The higher the value, the longer the duration for which the data will be retained in the cache. This caching strategy provides significant availability for most valuable and difficult to retrieve data in the WBANs. Extensive simulations are performed to compare the proposed scheme against other significant caching schemes in the literature while varying critical aspects in WBANs (e.g., data popularity, cache size, publisher load, connectivity-degree, and severe probabilities of node failures). These simulation results indicate that the proposed VoI-based approach is a valid tool for the retrieval of cached content in disruptive and challenging scenarios, such as the one experienced in WBANs, since it allows the retrieval of content for a long period even while experiencing severe in-network node failures. © 2017 by the authors; licensee MDPI, Basel, Switzerland.
- Authors: Al-Turjman, Fadi , Imran, Muhammad , Vasilakos, Athanasios
- Date: 2017
- Type: Text , Journal article
- Relation: Sensors (Switzerland) Vol. 17, no. 1 (2017), p.
- Full Text:
- Reviewed:
- Description: We propose a resilient cache replacement approach based on a Value of sensed Information (VoI) policy. To resolve and fetch content when the origin is not available due to isolated in-network nodes (fragmentation) and harsh operational conditions, we exploit a content caching approach. Our approach depends on four functional parameters in sensory Wireless Body Area Networks (WBANs). These four parameters are: age of data based on periodic request, popularity of on-demand requests, communication interference cost, and the duration for which the sensor node is required to operate in active mode to capture the sensed readings. These parameters are considered together to assign a value to the cached data to retain the most valuable information in the cache for prolonged time periods. The higher the value, the longer the duration for which the data will be retained in the cache. This caching strategy provides significant availability for most valuable and difficult to retrieve data in the WBANs. Extensive simulations are performed to compare the proposed scheme against other significant caching schemes in the literature while varying critical aspects in WBANs (e.g., data popularity, cache size, publisher load, connectivity-degree, and severe probabilities of node failures). These simulation results indicate that the proposed VoI-based approach is a valid tool for the retrieval of cached content in disruptive and challenging scenarios, such as the one experienced in WBANs, since it allows the retrieval of content for a long period even while experiencing severe in-network node failures. © 2017 by the authors; licensee MDPI, Basel, Switzerland.
On connectivity of wireless sensor networks with directional antennas
- Wang, Qiu, Dai, Hong-Ning, Zheng, Zibin, Imran, Muhammad, Vasilakos, Athanasios
- Authors: Wang, Qiu , Dai, Hong-Ning , Zheng, Zibin , Imran, Muhammad , Vasilakos, Athanasios
- Date: 2017
- Type: Text , Journal article
- Relation: Sensors (Switzerland) Vol. 17, no. 1 (2017), p.
- Full Text:
- Reviewed:
- Description: In this paper, we investigate the network connectivity of wireless sensor networks with directional antennas. In particular, we establish a general framework to analyze the network connectivity while considering various antenna models and the channel randomness. Since existing directional antenna models have their pros and cons in the accuracy of reflecting realistic antennas and the computational complexity, we propose a new analytical directional antenna model called the iris model to balance the accuracy against the complexity. We conduct extensive simulations to evaluate the analytical framework. Our results show that our proposed analytical model on the network connectivity is accurate, and our iris antenna model can provide a better approximation to realistic directional antennas than other existing antenna models. © 2017 by the authors; licensee MDPI, Basel, Switzerland.
- Authors: Wang, Qiu , Dai, Hong-Ning , Zheng, Zibin , Imran, Muhammad , Vasilakos, Athanasios
- Date: 2017
- Type: Text , Journal article
- Relation: Sensors (Switzerland) Vol. 17, no. 1 (2017), p.
- Full Text:
- Reviewed:
- Description: In this paper, we investigate the network connectivity of wireless sensor networks with directional antennas. In particular, we establish a general framework to analyze the network connectivity while considering various antenna models and the channel randomness. Since existing directional antenna models have their pros and cons in the accuracy of reflecting realistic antennas and the computational complexity, we propose a new analytical directional antenna model called the iris model to balance the accuracy against the complexity. We conduct extensive simulations to evaluate the analytical framework. Our results show that our proposed analytical model on the network connectivity is accurate, and our iris antenna model can provide a better approximation to realistic directional antennas than other existing antenna models. © 2017 by the authors; licensee MDPI, Basel, Switzerland.
Handover based IMS registration scheme for next generation mobile networks
- Tahira, Shireen, Sher, Muhammad, Ullah, Ata, Imran, Muhammad, Vasilakos, Athanasios
- Authors: Tahira, Shireen , Sher, Muhammad , Ullah, Ata , Imran, Muhammad , Vasilakos, Athanasios
- Date: 2017
- Type: Text , Journal article
- Relation: Wireless Communications and Mobile Computing Vol. 2017, no. (2017), p.
- Full Text:
- Reviewed:
- Description: Next generation mobile networks aim to provide faster speed and more capacity along with energy efficiency to support video streaming and massive data sharing in social and communication networks. In these networks, user equipment has to register with IPMultimedia Subsystem (IMS) which promises quality of service to the mobile users that frequently move across different access networks. After each handover caused due to mobility, IMS provides IPSec Security Association establishment and authentication phases. The main issue is that unnecessary reregistration after every handover results in latency and communication overhead. To tackle these issues, this paper presents a lightweight Fast IMS Mobility (FIM) registration scheme that avoids unnecessary conventional registration phases such as security associations, authentication, and authorization. FIM maintains a flag to avoid deregistration and sends a subsequent message to provide necessary parameters to IMS servers after mobility. It also handles the change of IP address for user equipment and transferring the security associations from old to new servers.We have validated the performance of FIM by developing a testbed consisting of IMS servers and user equipment. The experimental results demonstrate the performance supremacy of FIM. It reduces media disruption time, number of messages, and packet loss up to 67%, 100%, and 61%, respectively, as compared to preliminaries. © 2017 Shireen Tahira et al.
- Authors: Tahira, Shireen , Sher, Muhammad , Ullah, Ata , Imran, Muhammad , Vasilakos, Athanasios
- Date: 2017
- Type: Text , Journal article
- Relation: Wireless Communications and Mobile Computing Vol. 2017, no. (2017), p.
- Full Text:
- Reviewed:
- Description: Next generation mobile networks aim to provide faster speed and more capacity along with energy efficiency to support video streaming and massive data sharing in social and communication networks. In these networks, user equipment has to register with IPMultimedia Subsystem (IMS) which promises quality of service to the mobile users that frequently move across different access networks. After each handover caused due to mobility, IMS provides IPSec Security Association establishment and authentication phases. The main issue is that unnecessary reregistration after every handover results in latency and communication overhead. To tackle these issues, this paper presents a lightweight Fast IMS Mobility (FIM) registration scheme that avoids unnecessary conventional registration phases such as security associations, authentication, and authorization. FIM maintains a flag to avoid deregistration and sends a subsequent message to provide necessary parameters to IMS servers after mobility. It also handles the change of IP address for user equipment and transferring the security associations from old to new servers.We have validated the performance of FIM by developing a testbed consisting of IMS servers and user equipment. The experimental results demonstrate the performance supremacy of FIM. It reduces media disruption time, number of messages, and packet loss up to 67%, 100%, and 61%, respectively, as compared to preliminaries. © 2017 Shireen Tahira et al.
A quantitative risk assessment model involving frequency and threat degree under line-of-business services for infrastructure of emerging sensor networks
- Jing, Xu, Hu, Hanwen, Yang, Huijun, Au, Man, Li, Shuqin, Xiong, Naixue, Imran, Muhammad, Vasilakos, Athanasios
- Authors: Jing, Xu , Hu, Hanwen , Yang, Huijun , Au, Man , Li, Shuqin , Xiong, Naixue , Imran, Muhammad , Vasilakos, Athanasios
- Date: 2017
- Type: Text , Journal article
- Relation: Sensors (Switzerland) Vol. 17, no. 3 (2017), p.
- Full Text:
- Reviewed:
- Description: The prospect of Line-of-Business Services (LoBSs) for infrastructure of Emerging Sensor Networks (ESNs) is exciting. Access control remains a top challenge in this scenario as the service provider’s server contains a lot of valuable resources. LoBSs’ users are very diverse as they may come from a wide range of locations with vastly different characteristics. Cost of joining could be low and in many cases, intruders are eligible users conducting malicious actions. As a result, user access should be adjusted dynamically. Assessing LoBSs’ risk dynamically based on both frequency and threat degree of malicious operations is therefore necessary. In this paper, we proposed a Quantitative Risk Assessment Model (QRAM) involving frequency and threat degree based on value at risk. To quantify the threat degree as an elementary intrusion effort, we amend the influence coefficient of risk indexes in the network security situation assessment model. To quantify threat frequency as intrusion trace effort, we make use of multiple behavior information fusion. Under the influence of intrusion trace, we adapt the historical simulation method of value at risk to dynamically access LoBSs’ risk. Simulation based on existing data is used to select appropriate parameters for QRAM. Our simulation results show that the duration influence on elementary intrusion effort is reasonable when the normalized parameter is 1000. Likewise, the time window of intrusion trace and the weight between objective risk and subjective risk can be set to 10 s and 0.5, respectively. While our focus is to develop QRAM for assessing the risk of LoBSs for infrastructure of ESNs dynamically involving frequency and threat degree, we believe it is also appropriate for other scenarios in cloud computing. © 2017 by the authors. Licensee MDPI, Basel, Switzerland.
- Authors: Jing, Xu , Hu, Hanwen , Yang, Huijun , Au, Man , Li, Shuqin , Xiong, Naixue , Imran, Muhammad , Vasilakos, Athanasios
- Date: 2017
- Type: Text , Journal article
- Relation: Sensors (Switzerland) Vol. 17, no. 3 (2017), p.
- Full Text:
- Reviewed:
- Description: The prospect of Line-of-Business Services (LoBSs) for infrastructure of Emerging Sensor Networks (ESNs) is exciting. Access control remains a top challenge in this scenario as the service provider’s server contains a lot of valuable resources. LoBSs’ users are very diverse as they may come from a wide range of locations with vastly different characteristics. Cost of joining could be low and in many cases, intruders are eligible users conducting malicious actions. As a result, user access should be adjusted dynamically. Assessing LoBSs’ risk dynamically based on both frequency and threat degree of malicious operations is therefore necessary. In this paper, we proposed a Quantitative Risk Assessment Model (QRAM) involving frequency and threat degree based on value at risk. To quantify the threat degree as an elementary intrusion effort, we amend the influence coefficient of risk indexes in the network security situation assessment model. To quantify threat frequency as intrusion trace effort, we make use of multiple behavior information fusion. Under the influence of intrusion trace, we adapt the historical simulation method of value at risk to dynamically access LoBSs’ risk. Simulation based on existing data is used to select appropriate parameters for QRAM. Our simulation results show that the duration influence on elementary intrusion effort is reasonable when the normalized parameter is 1000. Likewise, the time window of intrusion trace and the weight between objective risk and subjective risk can be set to 10 s and 0.5, respectively. While our focus is to develop QRAM for assessing the risk of LoBSs for infrastructure of ESNs dynamically involving frequency and threat degree, we believe it is also appropriate for other scenarios in cloud computing. © 2017 by the authors. Licensee MDPI, Basel, Switzerland.
Secure authentication for remote patient monitoring withwireless medical sensor networks
- Hayajneh, Taier, Mohd, Bassam, Imran, Muhammad, Almashaqbeh, Ghada, Vasilakos, Athanasios
- Authors: Hayajneh, Taier , Mohd, Bassam , Imran, Muhammad , Almashaqbeh, Ghada , Vasilakos, Athanasios
- Date: 2016
- Type: Text , Journal article
- Relation: Sensors (Switzerland) Vol. 16, no. 4 (2016), p.
- Full Text:
- Reviewed:
- Description: There is broad consensus that remote health monitoring will benefit all stakeholders in the healthcare system and that it has the potential to save billions of dollars. Among the major concerns that are preventing the patients from widely adopting this technology are data privacy and security. Wireless Medical Sensor Networks (MSNs) are the building blocks for remote health monitoring systems. This paper helps to identify the most challenging security issues in the existing authentication protocols for remote patient monitoring and presents a lightweight public-key-based authentication protocol for MSNs. In MSNs, the nodes are classified into sensors that report measurements about the human body and actuators that receive commands from the medical staff and perform actions. Authenticating these commands is a critical security issue, as any alteration may lead to serious consequences. The proposed protocol is based on the Rabin authentication algorithm, which is modified in this paper to improve its signature signing process, making it suitable for delay-sensitive MSN applications. To prove the efficiency of the Rabin algorithm, we implemented the algorithm with different hardware settings using Tmote Sky motes and also programmed the algorithm on an FPGA to evaluate its design and performance. Furthermore, the proposed protocol is implemented and tested using the MIRACL (Multiprecision Integer and Rational Arithmetic C/C++) library. The results show that secure, direct, instant and authenticated commands can be delivered from the medical staff to the MSN nodes. © 2016 by the authors; licensee MDPI, Basel, Switzerland.
- Authors: Hayajneh, Taier , Mohd, Bassam , Imran, Muhammad , Almashaqbeh, Ghada , Vasilakos, Athanasios
- Date: 2016
- Type: Text , Journal article
- Relation: Sensors (Switzerland) Vol. 16, no. 4 (2016), p.
- Full Text:
- Reviewed:
- Description: There is broad consensus that remote health monitoring will benefit all stakeholders in the healthcare system and that it has the potential to save billions of dollars. Among the major concerns that are preventing the patients from widely adopting this technology are data privacy and security. Wireless Medical Sensor Networks (MSNs) are the building blocks for remote health monitoring systems. This paper helps to identify the most challenging security issues in the existing authentication protocols for remote patient monitoring and presents a lightweight public-key-based authentication protocol for MSNs. In MSNs, the nodes are classified into sensors that report measurements about the human body and actuators that receive commands from the medical staff and perform actions. Authenticating these commands is a critical security issue, as any alteration may lead to serious consequences. The proposed protocol is based on the Rabin authentication algorithm, which is modified in this paper to improve its signature signing process, making it suitable for delay-sensitive MSN applications. To prove the efficiency of the Rabin algorithm, we implemented the algorithm with different hardware settings using Tmote Sky motes and also programmed the algorithm on an FPGA to evaluate its design and performance. Furthermore, the proposed protocol is implemented and tested using the MIRACL (Multiprecision Integer and Rational Arithmetic C/C++) library. The results show that secure, direct, instant and authenticated commands can be delivered from the medical staff to the MSN nodes. © 2016 by the authors; licensee MDPI, Basel, Switzerland.
Mobile ad hoc cloud : a survey
- Yaqoob, Ibra, Ahmed, Ejaz, Gani, Abdullah, Mokhtar, Salimah, Imran, Muhammad, Guizani, Sghaier
- Authors: Yaqoob, Ibra , Ahmed, Ejaz , Gani, Abdullah , Mokhtar, Salimah , Imran, Muhammad , Guizani, Sghaier
- Date: 2016
- Type: Text , Journal article
- Relation: Wireless Communications and Mobile Computing Vol. 16, no. 16 (2016), p. 2572-2589
- Full Text: false
- Reviewed:
- Description: The unabated flurry of research activities to augment various mobile devices in terms of compute-intensive task execution by leveraging heterogeneous resources of available devices in the local vicinity has created a new research domain called mobile ad hoc cloud (MAC) or mobile cloud. It is a new type of mobile cloud computing (MCC). MAC is deemed to be a candidate blueprint for future compute-intensive applications with the aim of delivering high functionalities and rich impressive experience to mobile users. However, MAC is yet in its infancy, and a comprehensive survey of the domain is still lacking. In this paper, we survey the state-of-the-art research efforts carried out in the MAC domain. We analyze several problems inhibiting the adoption of MAC and review corresponding solutions by devising a taxonomy. Moreover, MAC roots are analyzed and taxonomized as architectural components, applications, objectives, characteristics, execution model, scheduling type, formation technologies, and node types. The similarities and differences among existing proposed solutions by highlighting the advantages and disadvantages are also investigated. We also compare the literature based on objectives. Furthermore, our study advocates that the problems stem from the intrinsic characteristics of MAC by identifying several new principles. Lastly, several open research challenges such as incentives, heterogeneity-ware task allocation, mobility, minimal data exchange, and security and privacy are presented as future research directions. Copyright © 2016 John Wiley & Sons, Ltd. Copyright © 2016 John Wiley & Sons, Ltd.
Mobile crowd sensing for traffic prediction in internet of vehicles
- Wan, Jiafu, Liu, Jianqi, Shao, Zehui, Vasilakos, Athanasios, Imran, Muhammad, Zhou, Keliang
- Authors: Wan, Jiafu , Liu, Jianqi , Shao, Zehui , Vasilakos, Athanasios , Imran, Muhammad , Zhou, Keliang
- Date: 2016
- Type: Text , Journal article
- Relation: Sensors (Switzerland) Vol. 16, no. 1 (2016), p.
- Full Text:
- Reviewed:
- Description: The advances in wireless communication techniques, mobile cloud computing, automotive and intelligent terminal technology are driving the evolution of vehicle ad hoc networks into the Internet of Vehicles (IoV) paradigm. This leads to a change in the vehicle routing problem from a calculation based on static data towards real-time traffic prediction. In this paper, we first address the taxonomy of cloud-assisted IoV from the viewpoint of the service relationship between cloud computing and IoV. Then, we review the traditional traffic prediction approached used by both Vehicle to Infrastructure (V2I) and Vehicle to Vehicle (V2V) communications. On this basis, we propose a mobile crowd sensing technology to support the creation of dynamic route choices for drivers wishing to avoid congestion. Experiments were carried out to verify the proposed approaches. Finally, we discuss the outlook of reliable traffic prediction. © 2016 by the authors, licensee MDPI, Basel, Switzerland.
- Authors: Wan, Jiafu , Liu, Jianqi , Shao, Zehui , Vasilakos, Athanasios , Imran, Muhammad , Zhou, Keliang
- Date: 2016
- Type: Text , Journal article
- Relation: Sensors (Switzerland) Vol. 16, no. 1 (2016), p.
- Full Text:
- Reviewed:
- Description: The advances in wireless communication techniques, mobile cloud computing, automotive and intelligent terminal technology are driving the evolution of vehicle ad hoc networks into the Internet of Vehicles (IoV) paradigm. This leads to a change in the vehicle routing problem from a calculation based on static data towards real-time traffic prediction. In this paper, we first address the taxonomy of cloud-assisted IoV from the viewpoint of the service relationship between cloud computing and IoV. Then, we review the traditional traffic prediction approached used by both Vehicle to Infrastructure (V2I) and Vehicle to Vehicle (V2V) communications. On this basis, we propose a mobile crowd sensing technology to support the creation of dynamic route choices for drivers wishing to avoid congestion. Experiments were carried out to verify the proposed approaches. Finally, we discuss the outlook of reliable traffic prediction. © 2016 by the authors, licensee MDPI, Basel, Switzerland.
Efficient data gathering in 3D linear underwater wireless sensor networks using sink mobility
- Akbar, Mariam, Javaid, Nadeem, Khan, Ayesha, Imran, Muhammad, Shoaib, Muhammad, Vasilakos, Athanasios
- Authors: Akbar, Mariam , Javaid, Nadeem , Khan, Ayesha , Imran, Muhammad , Shoaib, Muhammad , Vasilakos, Athanasios
- Date: 2016
- Type: Text , Journal article
- Relation: Sensors (Switzerland) Vol. 16, no. 3 (2016), p.
- Full Text:
- Reviewed:
- Description: Due to the unpleasant and unpredictable underwater environment, designing an energy-efficient routing protocol for underwater wireless sensor networks (UWSNs) demands more accuracy and extra computations. In the proposed scheme, we introduce a mobile sink (MS), i.e., an autonomous underwater vehicle (AUV), and also courier nodes (CNs), to minimize the energy consumption of nodes. MS and CNs stop at specific stops for data gathering; later on, CNs forward the received data to the MS for further transmission. By the mobility of CNs and MS, the overall energy consumption of nodes is minimized. We perform simulations to investigate the performance of the proposed scheme and compare it to preexisting techniques. Simulation results are compared in terms of network lifetime, throughput, path loss, transmission loss and packet drop ratio. The results show that the proposed technique performs better in terms of network lifetime, throughput, path loss and scalability. © 2016 by the authors; licensee MDPI, Basel, Switzerland.
- Authors: Akbar, Mariam , Javaid, Nadeem , Khan, Ayesha , Imran, Muhammad , Shoaib, Muhammad , Vasilakos, Athanasios
- Date: 2016
- Type: Text , Journal article
- Relation: Sensors (Switzerland) Vol. 16, no. 3 (2016), p.
- Full Text:
- Reviewed:
- Description: Due to the unpleasant and unpredictable underwater environment, designing an energy-efficient routing protocol for underwater wireless sensor networks (UWSNs) demands more accuracy and extra computations. In the proposed scheme, we introduce a mobile sink (MS), i.e., an autonomous underwater vehicle (AUV), and also courier nodes (CNs), to minimize the energy consumption of nodes. MS and CNs stop at specific stops for data gathering; later on, CNs forward the received data to the MS for further transmission. By the mobility of CNs and MS, the overall energy consumption of nodes is minimized. We perform simulations to investigate the performance of the proposed scheme and compare it to preexisting techniques. Simulation results are compared in terms of network lifetime, throughput, path loss, transmission loss and packet drop ratio. The results show that the proposed technique performs better in terms of network lifetime, throughput, path loss and scalability. © 2016 by the authors; licensee MDPI, Basel, Switzerland.
An effective data-collection scheme with AUV path planning in underwater wireless sensor networks
- Khan, Wahab, Hua, Wang, Anwar, Muhammad, Alharbi, Abdullah, Imran, Muhammad, Khan, Javed
- Authors: Khan, Wahab , Hua, Wang , Anwar, Muhammad , Alharbi, Abdullah , Imran, Muhammad , Khan, Javed
- Date: 2022
- Type: Text , Journal article
- Relation: Wireless Communications and Mobile Computing Vol. 2022, no. (2022), p.
- Full Text:
- Reviewed:
- Description: Data collection in underwater wireless sensor networks (UWSNs) using autonomous underwater vehicles (AUVs) is a more robust solution than traditional approaches, instead of transmitting data from each node to a destination node. However, the design of delay-aware and energy-efficient path planning for AUVs is one of the most crucial problems in collecting data for UWSNs. To reduce network delay and increase network lifetime, we proposed a novel reliable AUV-based data-collection routing protocol for UWSNs. The proposed protocol employs a route planning mechanism to collect data using AUVs. The sink node directs AUVs for data collection from sensor nodes to reduce energy consumption. First, sensor nodes are organized into clusters for better scalability, and then, these clusters are arranged into groups to assign an AUV to each group. Second, the traveling path for each AUV is crafted based on the Markov decision process (MDP) for the reliable collection of data. The simulation results affirm the effectiveness and efficiency of the proposed technique in terms of throughput, energy efficiency, delay, and reliability. © 2022 Wahab Khan et al.
- Authors: Khan, Wahab , Hua, Wang , Anwar, Muhammad , Alharbi, Abdullah , Imran, Muhammad , Khan, Javed
- Date: 2022
- Type: Text , Journal article
- Relation: Wireless Communications and Mobile Computing Vol. 2022, no. (2022), p.
- Full Text:
- Reviewed:
- Description: Data collection in underwater wireless sensor networks (UWSNs) using autonomous underwater vehicles (AUVs) is a more robust solution than traditional approaches, instead of transmitting data from each node to a destination node. However, the design of delay-aware and energy-efficient path planning for AUVs is one of the most crucial problems in collecting data for UWSNs. To reduce network delay and increase network lifetime, we proposed a novel reliable AUV-based data-collection routing protocol for UWSNs. The proposed protocol employs a route planning mechanism to collect data using AUVs. The sink node directs AUVs for data collection from sensor nodes to reduce energy consumption. First, sensor nodes are organized into clusters for better scalability, and then, these clusters are arranged into groups to assign an AUV to each group. Second, the traveling path for each AUV is crafted based on the Markov decision process (MDP) for the reliable collection of data. The simulation results affirm the effectiveness and efficiency of the proposed technique in terms of throughput, energy efficiency, delay, and reliability. © 2022 Wahab Khan et al.
Securing smart healthcare cyber-physical systems against blackhole and greyhole attacks using a blockchain-enabled gini index framework
- Javed, Mannan, Tariq, Noshina, Ashraf, Muhammad, Khan, Farrukh, Asim, Muhammad, Imran, Muhammad
- Authors: Javed, Mannan , Tariq, Noshina , Ashraf, Muhammad , Khan, Farrukh , Asim, Muhammad , Imran, Muhammad
- Date: 2023
- Type: Text , Journal article
- Relation: Sensors Vol. 23, no. 23 (2023), p.
- Full Text:
- Reviewed:
- Description: The increasing reliance on cyber-physical systems (CPSs) in critical domains such as healthcare, smart grids, and intelligent transportation systems necessitates robust security measures to protect against cyber threats. Among these threats, blackhole and greyhole attacks pose significant risks to the availability and integrity of CPSs. The current detection and mitigation approaches often struggle to accurately differentiate between legitimate and malicious behavior, leading to ineffective protection. This paper introduces Gini-index and blockchain-based Blackhole/Greyhole RPL (GBG-RPL), a novel technique designed for efficient detection and mitigation of blackhole and greyhole attacks in smart health monitoring CPSs. GBG-RPL leverages the analytical prowess of the Gini index and the security advantages of blockchain technology to protect these systems against sophisticated threats. This research not only focuses on identifying anomalous activities but also proposes a resilient framework that ensures the integrity and reliability of the monitored data. GBG-RPL achieves notable improvements as compared to another state-of-the-art technique referred to as BCPS-RPL, including a 7.18% reduction in packet loss ratio, an 11.97% enhancement in residual energy utilization, and a 19.27% decrease in energy consumption. Its security features are also very effective, boasting a 10.65% improvement in attack-detection rate and an 18.88% faster average attack-detection time. GBG-RPL optimizes network management by exhibiting a 21.65% reduction in message overhead and a 28.34% decrease in end-to-end delay, thus showing its potential for enhanced reliability, efficiency, and security. © 2023 by the authors.
- Authors: Javed, Mannan , Tariq, Noshina , Ashraf, Muhammad , Khan, Farrukh , Asim, Muhammad , Imran, Muhammad
- Date: 2023
- Type: Text , Journal article
- Relation: Sensors Vol. 23, no. 23 (2023), p.
- Full Text:
- Reviewed:
- Description: The increasing reliance on cyber-physical systems (CPSs) in critical domains such as healthcare, smart grids, and intelligent transportation systems necessitates robust security measures to protect against cyber threats. Among these threats, blackhole and greyhole attacks pose significant risks to the availability and integrity of CPSs. The current detection and mitigation approaches often struggle to accurately differentiate between legitimate and malicious behavior, leading to ineffective protection. This paper introduces Gini-index and blockchain-based Blackhole/Greyhole RPL (GBG-RPL), a novel technique designed for efficient detection and mitigation of blackhole and greyhole attacks in smart health monitoring CPSs. GBG-RPL leverages the analytical prowess of the Gini index and the security advantages of blockchain technology to protect these systems against sophisticated threats. This research not only focuses on identifying anomalous activities but also proposes a resilient framework that ensures the integrity and reliability of the monitored data. GBG-RPL achieves notable improvements as compared to another state-of-the-art technique referred to as BCPS-RPL, including a 7.18% reduction in packet loss ratio, an 11.97% enhancement in residual energy utilization, and a 19.27% decrease in energy consumption. Its security features are also very effective, boasting a 10.65% improvement in attack-detection rate and an 18.88% faster average attack-detection time. GBG-RPL optimizes network management by exhibiting a 21.65% reduction in message overhead and a 28.34% decrease in end-to-end delay, thus showing its potential for enhanced reliability, efficiency, and security. © 2023 by the authors.
Electricity theft detection for energy optimization using deep learning models
- Pamir, Javaid, Nadeem, Javed, Muhammad, Houran, Mohamad, Almasoud, Abdullah, Imran, Muhammad
- Authors: Pamir , Javaid, Nadeem , Javed, Muhammad , Houran, Mohamad , Almasoud, Abdullah , Imran, Muhammad
- Date: 2023
- Type: Text , Journal article
- Relation: Energy Science and Engineering Vol. 11, no. 10 (2023), p. 3575-3596
- Full Text:
- Reviewed:
- Description: The rapid increase in nontechnical loss (NTL) has become a principal concern for distribution system operators (DSOs) over the years. Electricity theft makes up a major part of NTL. It causes losses for the DSOs and also deteriorates the quality of electricity. The introduction of advanced metering infrastructure along with the upgradation of the traditional grids to the smart grids (SGs) has helped the electric utilities to collect the electricity consumption (EC) readings of consumers, which further empowers the machine learning (ML) algorithms to be exploited for efficient electricity theft detection (ETD). However, there are still some shortcomings, such as class imbalance, curse of dimensionality, and bypassing the automated tuning of hyperparameters in the existing ML-based theft classification schemes that limit their performances. Therefore, it is essential to develop a novel approach to deal with these problems and efficiently detect electricity theft in SGs. Using the salp swarm algorithm (SSA), gate convolutional autoencoder (GCAE), and cost-sensitive learning and long short-term memory (CSLSTM), an effective ETD model named SSA–GCAE–CSLSTM is proposed in this work. Furthermore, a hybrid GCAE model is developed via the combination of gated recurrent unit and convolutional autoencoder. The proposed model comprises five submodules: (1) data preparation, (2) data balancing, (3) dimensionality reduction, (4) hyperparameters' optimization, and (5) electricity theft classification. The real-time EC data provided by the state grid corporation of China are used for performance evaluations via extensive simulations. The proposed model is compared with two basic models, CSLSTM and GCAE–CSLSTM, along with seven benchmarks, support vector machine, decision tree, extra trees, random forest, adaptive boosting, extreme gradient boosting, and convolutional neural network. The results exhibit that SSA–GCAE–CSLSTM yields 99.45% precision, 95.93% F1 score, 92.25% accuracy, and 71.13% area under the receiver operating characteristic curve score, and surpasses the other models in terms of ETD. © 2023 The Authors. Energy Science & Engineering published by Society of Chemical Industry and John Wiley & Sons Ltd.
- Authors: Pamir , Javaid, Nadeem , Javed, Muhammad , Houran, Mohamad , Almasoud, Abdullah , Imran, Muhammad
- Date: 2023
- Type: Text , Journal article
- Relation: Energy Science and Engineering Vol. 11, no. 10 (2023), p. 3575-3596
- Full Text:
- Reviewed:
- Description: The rapid increase in nontechnical loss (NTL) has become a principal concern for distribution system operators (DSOs) over the years. Electricity theft makes up a major part of NTL. It causes losses for the DSOs and also deteriorates the quality of electricity. The introduction of advanced metering infrastructure along with the upgradation of the traditional grids to the smart grids (SGs) has helped the electric utilities to collect the electricity consumption (EC) readings of consumers, which further empowers the machine learning (ML) algorithms to be exploited for efficient electricity theft detection (ETD). However, there are still some shortcomings, such as class imbalance, curse of dimensionality, and bypassing the automated tuning of hyperparameters in the existing ML-based theft classification schemes that limit their performances. Therefore, it is essential to develop a novel approach to deal with these problems and efficiently detect electricity theft in SGs. Using the salp swarm algorithm (SSA), gate convolutional autoencoder (GCAE), and cost-sensitive learning and long short-term memory (CSLSTM), an effective ETD model named SSA–GCAE–CSLSTM is proposed in this work. Furthermore, a hybrid GCAE model is developed via the combination of gated recurrent unit and convolutional autoencoder. The proposed model comprises five submodules: (1) data preparation, (2) data balancing, (3) dimensionality reduction, (4) hyperparameters' optimization, and (5) electricity theft classification. The real-time EC data provided by the state grid corporation of China are used for performance evaluations via extensive simulations. The proposed model is compared with two basic models, CSLSTM and GCAE–CSLSTM, along with seven benchmarks, support vector machine, decision tree, extra trees, random forest, adaptive boosting, extreme gradient boosting, and convolutional neural network. The results exhibit that SSA–GCAE–CSLSTM yields 99.45% precision, 95.93% F1 score, 92.25% accuracy, and 71.13% area under the receiver operating characteristic curve score, and surpasses the other models in terms of ETD. © 2023 The Authors. Energy Science & Engineering published by Society of Chemical Industry and John Wiley & Sons Ltd.
- «
- ‹
- 1
- ›
- »