scispace - formally typeset
Search or ask a question

Showing papers in "Wireless Communications and Mobile Computing in 2022"


Journal ArticleDOI
TL;DR: The proposed Energetic and Valuable Path Compendium Routing (EVPC) technique for obtaining energy saving enrichment in mobile ad hoc network process by separating the network into groups and chosen as heads within the groups by using path compendium technique also referred as arbitrary group head chosen depends on communication scheme.
Abstract: In the mobile ad hoc network (MANET), nodes are unenergetic nodes; also, it does not provide valuable routing, since it has the limited size for routing information storage for every node, and node multiple path takes more energy for small size of information sharing from sender node to destination node. It maximizes energy consumption and end-to-end delay and reduces network lifetime. In the proposed Energetic and Valuable Path Compendium Routing (EVPC) technique for obtaining energy saving enrichment in mobile ad hoc network process by separating the network into groups and chosen as heads within the groups by using path compendium technique also referred as arbitrary group head chosen depends on communication scheme. Path compendium is known to play an essential task to contain the issues of routing scalability in the network communication process. Through the increasing amount of nodes linked to the network surroundings, emerges the requirement to improve the communication table dimension to hold the improved nodes. To overcome this path compendium, a transmitter scheme is applied. The frustration free communication dimension extension algorithm is used by overriding set of paths and altering advertising node to energetic node with shortest distance path. The frustration free communication dimension extension procedure offers more effectiveness in enhancing the different metrics and principally minimizes the energy consumption by 25% and end-to-end delay by 15% and improves the network lifetime by 35%.

106 citations


Journal ArticleDOI
TL;DR: A power-efficient universal asynchronous receiver transmitter (UART) is implemented on 28 nm Artix-7 field-programmable gate array (FPGA) to reduce the power utilization of UART with the FPGA device in industries.
Abstract: In the present scheme of the world, the problem of shortage of power is seen across the world which can be a vulnerability to various communication securities. The scope of proposed research is that it is a step towards completing green communication technology concepts. In order to improve energy efficiency in communication networks, we designed UART using different nanometers of FPGA, which consumes the least amount of energy. This shortage is happening because of expanding of industries across the world and the rapid growth of the population. Therefore, to save the power for our upcoming generation, the globe is moving towards the concept and ideas of green communication and power-/energy-efficient gadget. In this work, a power-efficient universal asynchronous receiver transmitter (UART) is implemented on 28 nm Artix-7 field-programmable gate array (FPGA). The objective of this work is to reduce the power utilization of UART with the FPGA device in industries. To do this, the same authors have used voltage scaling techniques and compared the results with the existing FPGA works.

77 citations


Journal ArticleDOI
TL;DR: This paper uses deep reinforcement learning to solve the optimization problem in the path planning and management of unmanned ships, and takes the waiting time at the corner of the path as the optimization goal to minimize the total travel time of unmanned ship passing through the path.
Abstract: Unmanned ship navigates on the water in an autonomous or semiautonomous way, which can be widely used in maritime transportation, intelligence collection, maritime training and testing, reconnaissance, and evidence collection. In this paper, we use deep reinforcement learning to solve the optimization problem in the path planning and management of unmanned ships. Specifically, we take the waiting time (phase and duration) at the corner of the path as the optimization goal to minimize the total travel time of unmanned ships passing through the path. We propose a new reward function, which considers the environment and control delay of unmanned ships at the same time, which can reduce the coordination time between unmanned ships at the same time. In the simulation experiment, through the quantitative and qualitative results of deep reinforcement learning of unmanned ship navigation and path angle waiting, the effectiveness of our solution is verified.

62 citations


Journal ArticleDOI
TL;DR: A vision of the Internet of Things that will be the main force driving the comprehensive digital revolution in the future is provided and the challenges of existing common communication technologies in IoT systems are indicated and future research directions of IoT are indicated.
Abstract: Communication technologies are developing very rapidly and achieving many breakthrough results. The advent of 5th generation mobile communication networks, the so-called 5G, has become one of the most exciting and challenging topics in the wireless study area. The power of 5G enables it to connect to hundreds of billions of devices with extreme-high throughput and extreme-low latency. The 5G realizing a true digital society where everything can be connected via the Internet, well known as the Internet of Things (IoT). IoT is a technology of technologies where humans, devices, software, solutions, and platforms can connect based on the Internet. The formation of IoT technology leads to the birth of a series of applications and solutions serving humanity, such as smart cities, smart agriculture, smart retail, intelligent transportation systems, and IoT ecosystems. Although IoT is considered a revolution in the evolution of the Internet, it still faces a series of challenges such as saving energy, security, performance, and QoS support. In this study, we provide a vision of the Internet of Things that will be the main force driving the comprehensive digital revolution in the future. The communication technologies in the IoT system are discussed comprehensively and in detail. Furthermore, we also indicated indepth challenges of existing common communication technologies in IoT systems and future research directions of IoT. We hope the results of this work can provide a vital guide for future studies on communication technologies for IoT in 5G.

47 citations


Journal ArticleDOI
TL;DR: In this article , the authors summarized the development history and status quo of intelligent stratified water injection technology at home and abroad and pointed out that there are technical bottlenecks and development limitations in the development of water injection technologies at present.
Abstract: As the driving energy to deal with the decrease of interlayer pressure caused by continuous oil production, the layered water injection technology has the characteristics of inhibiting the decrease of oil production and slowing down the increase of oil/gas ratio. In engineering, water injection technology is often used to improve the properties of crude oil, such as excessive viscosity, weak liquidity, and depleted storage, to avoid the formation of dead oil. Injecting appropriate amount of water into different production horizons can effectively maintain the formation water injection pressure, improve the sustainable development speed of the oilfield, ensure the oil production and effectively control the production cost. It is of great value to petroleum engineering and has been widely concerned by the industrial and academic circles at home and abroad. With the continuous development of oilfields over the years, most oilfields have become high-water-cut oilfields. Through the existing layered water injection technology, there are defects such as high labor cost, low operating efficiency, and long commissioning cycle. The ratio of water injection cost to constant increase gradually decreases, and the technical shortcomings become more and more obvious, which is difficult to meet production needs. It is urgent to study and optimize water injection technology scheme to meet oilfield production and technology iteration. In recent years, electronic technology, communication technology, automatic control technology, and other advanced production technology applied to geological exploration, logging technology fields such as engineering, oilfield development is towards integration and intelligent direction, which makes the advanced control and real-time communication intelligent power precision, and the layered water injection technology is possible. This paper summarizes the development history and status quo of oil recovery stratified water injection technology at home and abroad and points out that there are technical bottlenecks and development limitations in the development of water injection technology at present. Focusing on the current hot spots of intelligent oil recovery stratified water injection technology, the advantages and disadvantages of various intelligent water injection technology are compared and analyzed. It provides a certain theoretical reference value for the theoretical research and engineering application of intelligent stratified water injection technology to the equipment design and production of oilfield production and oil recovery technology research institutes and technology and equipment manufacturers.

41 citations


Journal ArticleDOI
TL;DR: In this article , the authors present a rigorous review of blockchain implementations with the cyber security perception and energy data protections in smart grids, and describe the major security issues of smart grid scenarios that big data and blockchain can solve.
Abstract: The smart grid idea was implemented as a modern interpretation of the traditional power grid to find out the most efficient way to combine renewable energy and storage technologies. Throughout this way, big data and the Internet always provide a revolutionary solution for ensuring that electrical energy linked intelligent grid, also known as the energy Internet. The blockchain has some significant features, making it an applicable technology for smart grid standards to solve the security issues and trust challenges. This study will present a rigorous review of blockchain implementations with the cyber security perception and energy data protections in smart grids. As a result, we describe the major security issues of smart grid scenarios that big data and blockchain can solve. Then, we identify a variety of recent blockchain-based research works published in various literature and discuss security concerns on smart grid systems. We also discuss numerous similar practical designs, experiments, and items that have recently been developed. Finally, we go through some of the most important research problems and possible directions for using blockchain to address smart grid security concerns.

35 citations


Journal ArticleDOI
TL;DR: In this paper , a deep learning network was trained to choose essential information from speech spectrograms for the classification layer, performing gender detection, achieving an accuracy of 98.57% better than the traditional ML approaches.
Abstract: Several speaker recognition algorithms failed to get the best results because of the wildly varying datasets and feature sets for classification. Gender information helps reduce this effort since categorizing the classes based on gender may help lessen the impact of gender variability on the retrieved features. This study attempted to construct a perfect classification model for language-independent gender identification utilizing the Common Voice dataset (Mozilla). Most previous studies are doing manual extracting characteristics and feeding them into a machine learning model for categorization. Deep neural networks (DNN) were the most effective strategy in our research. Nonetheless, the main goal was to take advantage of the wealth of information included in voice data without requiring significant manual intervention. We trained the deep learning network to choose essential information from speech spectrograms for the classification layer, performing gender detection. The pretrained ResNet 50 fine-tuned gender data successfully achieved an accuracy of 98.57% better than the traditional ML approaches and the previous works reported with the same dataset. Furthermore, the model performs well on additional datasets, demonstrating the approach’s generalization capacity.

35 citations


Journal ArticleDOI
TL;DR: A Strategic Security System (SSS) to discover replica nodes in static and dynamic distributed WSNs, mainly focused on enhancing detection accuracy, time delay, and communication overhead is proposed.
Abstract: Wireless sensor network (WSN) is an emerging technology used in emergency scenarios. There are a number of possible threats to WSNs because they use unsupervised IP addresses. Securing networks with unattended sensors is a real challenge nowadays. Sensor nodes lack power and storage, making them incompatible with normal security checks. It will be vital to make advancements in sensor network architecture and protocol design. There will be more vulnerability to attack if there is a lack of security. Especially, one key attack is node replication which induces the sensor node to acts as an original node, collecting data from the network and sending it to the attacker. In dynamic WSN, detecting an assault is difficult to find replica nodes. Therefore, this paper proposes a Strategic Security System (SSS) to discover replica nodes in static and dynamic distributed WSNs. It is mainly focused on enhancing detection accuracy, time delay, and communication overhead. The present system includes Single Stage Memory Random Walk with Network Division (SSRWND) and a Random-walk-based approach to detect clone attacks (RAWL). The proposed system has less memory and better detection accuracy.

33 citations


Journal ArticleDOI
TL;DR: The simulated results show that the PLAEOR-MCND achieves 120 sec of NLife and 20 J of EC than the state-of-the-art protocols.
Abstract: During data transmission, a decentralised Mobile Ad Hoc Network (MANET) might result in high Energy Consumption (EC) and a short Network Lifetime (NLife). To address these difficulties, an on-demand Power and Load-Aware multipath node-disjoint source routing is presented based on the Enhanced Opportunistic Routing (PLAEOR) protocol. This unique protocol aims at using power, load, and latency to manage routing costs depending on control packet flooding from the destination node. However, the exchange of control packets from the target to all nodes may impact network efficiency. As a result, the PLAEOR is designed with a Multichannel Cooperative Neighbor Discovery (MCND) protocol to locate the nearby cooperative nodes for each node in the routing path during control packet transmission. Furthermore, when the packet rate of CBR is 20 packets/sec, the simulated results show that the PLAEOR-MCND achieves 120 sec of NLife and 20 J of EC than the state-of-the-art protocols.

30 citations


Journal ArticleDOI
TL;DR: The proposed fuzzy dynamic trust-based RPL (FDT-RPL) protocol improves the overall security of data transmission and has been implemented for a smart healthcare system, and the performance is analyzed by comparing it with traditional approaches.
Abstract: The Internet of Things (IoT) has impacted various aspects of life, but its profound effects on the health sector are particularly striking because of its cutting-edge nature. Mobile computing characteristics enable IoT to play a more important role when used with mobile computing. A significant part of the benefits of IoT in healthcare can be attributed to mobile health, which is greatly enhanced by mobile computing. Wearables transmit large amounts of data to IoT devices through sensors, actuators, and transceivers. Threats, attacks, and vulnerabilities abound for data on the Internet of Things. Therefore, addressing IoT-related security, privacy, and vulnerability issues call for a robust security solution. This paper proposes a secure and scalable healthcare data transmission framework in IoT based on an optimized routing protocol. Initially, the health data is collected from various IoT devices like wearable devices and sensors. The raw data is preprocessed via data cleaning and data reduction techniques. K-nearest neighbor (KNN) imputation is performed and principal component analysis (PCA) is employed for dimension reduction of the data. Utilizing modified local binary patterns (MLBP), the features are extracted from the preprocessed data. By combining the fuzzy dynamic trust-based RPL algorithm with the butter ant optimization (BAO) algorithm for low-power and lossy networks, the proposed fuzzy dynamic trust-based RPL (FDT-RPL) protocol improves the overall security of data transmission. The algorithm has been implemented for a smart healthcare system, and the performance is analyzed by comparing it with traditional approaches. The proposed routing protocol provided a secure and scalable healthcare data transmission.

26 citations


Journal ArticleDOI
TL;DR: The DRL-IDS intrusion detection system is built on a feature selection method based on LightGBM, which efficiently selects the most attractive feature set from industrial Internet of Things data; when paired with deep learning algorithms, it effectively detects intrusions.
Abstract: The Industrial Internet of Things has grown significantly in recent years. While implementing industrial digitalization, automation, and intelligence introduced a slew of cyber risks, the complex and varied industrial Internet of Things environment provided a new attack surface for network attackers. As a result, conventional intrusion detection technology cannot satisfy the network threat discovery requirements in today’s Industrial Internet of Things environment. In this research, the authors have used reinforcement learning rather than supervised and unsupervised learning, because it could very well improve the decision-making ability of the learning process by integrating abstract thinking of complete understanding, using deep knowledge to perform simple and nonlinear transformations of large-scale original input data into higher-level abstract expressions, and using learning algorithm or learning based on feedback signals, in the lack of guiding knowledge, which is based on the trial-and-error learning model, from the interaction with the environment to find the best good solution. In this respect, this article presents a near-end strategy optimization method for the Industrial Internet of Things intrusion detection system based on a deep reinforcement learning algorithm. This method combines deep learning’s observation capability with reinforcement learning’s decision-making capability to enable efficient detection of different kinds of cyberassaults on the Industrial Internet of Things. In this manuscript, the DRL-IDS intrusion detection system is built on a feature selection method based on LightGBM, which efficiently selects the most attractive feature set from industrial Internet of Things data; when paired with deep learning algorithms, it effectively detects intrusions. To begin, the application is based on GBM’s feature selection algorithm, which extracts the most compelling feature set from Industrial Internet of Things data; then, in conjunction with the deep learning algorithm, the hidden layer of the multilayer perception network is used as the shared network structure for the value network and strategic network in the PPO2 algorithm; and finally, the intrusion detection model is constructed using the PPO2 algorithm and ReLU (R). Numerous tests conducted on a publicly available data set of the Industrial Internet of Things demonstrate that the suggested intrusion detection system detects 99 percent of different kinds of network assaults on the Industrial Internet of Things. Additionally, the accuracy rate is 0.9%. The accuracy, precision, recall rate, F1 score, and other performance indicators are superior to those of the existing intrusion detection system, which is based on deep learning models such as LSTM, CNN, and RNN, as well as deep reinforcement learning models such as DDQN and DQN.

Journal ArticleDOI
TL;DR: Using enhanced ant colony optimization, this study proposes an efficient heuristic scheduling technique for cloud infrastructure that addresses the issues with nonlinear loads, slow processing complexity, and incomplete shared memory asset knowledge that plagued earlier resource supply implementations.
Abstract: Using enhanced ant colony optimization, this study proposes an efficient heuristic scheduling technique for cloud infrastructure that addresses the issues with nonlinear loads, slow processing complexity, and incomplete shared memory asset knowledge that plagued earlier resource supply implementations. The cloud-based planning architecture has been tailored for dynamic planning. Therefore, to determine the best task allocation method, a contentment factor was developed by integrating these three objectives of the smallest waiting period, the extent of commodity congestion control, and the expense of goal accomplishment. Ultimately, the incentive and retribution component would be used to modify the ant colony calculation perfume-generating criteria that accelerate a solution time. In particular, they leverage an activity contributed of the instability component to enhance the capabilities of such a method, and they include a virtual desktop burden weight component in the operation of regional pheromone revamping to assure virtual computers’ immense. Experiences with the routing protocol should be used to explore or demonstrate the feasibility of our methodology. In comparison with traditional methods, the simulation results show that the proposed methodology has the most rapid generalization capability, and it has the shortest duration of the project, the most distributed demand, and the best utilization of the capabilities of the virtual computer. Consequently, their hypothetical technique of optimizing the supply of resources exceeds world competition.

Journal ArticleDOI
TL;DR: The proposed reliability antecedent packet forwarding (RAF) technique is applied to approve the reliable routing from the source node to the destination node and improves the network lifetime and reduces the packet loss rate.
Abstract: In a mobile ad hoc network, packets are lost by interference occurrence in the communication path because there is no backup information for the previous routing process. The communication failure is not efficiently identified. Node protection rate is reduced by the interference that occurs during communication time. So, the proposed reliability antecedent packet forwarding (RAF) technique is applied to approve the reliable routing from the source node to the destination node. The flooding nodes are avoided by this method; the previous routing information is backed up; this backup information is retrieved if any interference occurred in the communication period. To monitor the packet flow rate of every node, the straddling path recovery algorithm is designed to provide an interference free-routing path. This path has more number of nodes to proceed with communication. These nodes have a higher resource level and also used to back up the forwarded data; since sometimes routing breakdowns occurred, data are lost, which is overcome by using a backup process. It improves the network lifetime and reduces the packet loss rate.

Journal ArticleDOI
TL;DR: Using a deep learning model, an algorithm is developed to enhance the smart home automation system for intruder detection and forestall the occurrence of false alarms.
Abstract: Security of lives and properties is highly important for enhanced quality living. Smart home automation and its application have received much progress towards convenience, comfort, safety, and home security. With the advances in technology and the Internet of Things (IoT), the home environment has witnessed an improved remote control of appliances, monitoring, and home security over the internet. Several home automation systems have been developed to monitor movements in the home and report to the user. Existing home automation systems detect motion and have surveillance for home security. However, the logical aspect of averting unnecessary or fake notifications is still a major area of challenge. Intelligent response and monitoring make smart home automation efficient. This work presents an intelligent home automation system for controlling home appliances, monitoring environmental factors, and detecting movement in the home and its surroundings. A deep learning model is proposed for motion recognition and classification based on the detected movement patterns. Using a deep learning model, an algorithm is developed to enhance the smart home automation system for intruder detection and forestall the occurrence of false alarms. A human detected by the surveillance camera is classified as an intruder or home occupant based on his walking pattern. The proposed method’s prototype was implemented using an ESP32 camera for surveillance, a PIR motion sensor, an ESP8266 development board, a 5 V four-channel relay module, and a DHT11 temperature and humidity sensor. The environmental conditions measured were evaluated using a mathematical model for the response time to effectively show the accuracy of the DHT sensor for weather monitoring and future prediction. An experimental analysis of human motion patterns was performed using the CNN model to evaluate the classification for the detection of humans. The CNN classification model gave an accuracy of 99.8%.

Journal ArticleDOI
TL;DR: The EOBL concept makes it easier to populate the FFO algorithm’s population initialization, which results in an increase in the exploration rate and the results described the sovereignty of the EOFFO-NLWN method associated to existing techniques.
Abstract: Wireless networks include a set of nodes which are connected to one another via wireless links for communication purposes. Wireless sensor networks (WSN) are a type of wireless network, which utilizes sensor nodes to collect and communicate data. Node localization is a challenging problem in WSN which intends to determine the geographical coordinates of the sensors in WSN. It can be considered an optimization problem and can be addressed via metaheuristic algorithms. This study introduces an elite oppositional farmland fertility optimization-based node localization method for radio communication networks, called EOFFO-NLWN technique. It is the goal of the proposed EOFFO-NLWN technique to locate unknown nodes in the network by using anchor nodes as a starting point. As a result of merging the principles of elite oppositional-based learning (EOBL) and the agricultural fertility optimization algorithm (FFO), we have developed the EOFFO-NLWN approach, which is described in detail below. The EOBL concept makes it easier to populate the FFO algorithm’s population initialization, which results in an increase in the exploration rate. Various BNs and CRs were tested, and the findings revealed that the EOFFO-NLWN technique outperformed all other known techniques in all cases. A comprehensive experimental result analysis of the EOFFO-NLWN technique is performed under several measures, and the results described the sovereignty of the EOFFO-NLWN method associated to existing techniques.

Journal ArticleDOI
TL;DR: Proposed enhanced self-organization of data packet (EAOD) mechanism is planned to aggregate the data packet sequencially from network structure to reduce the packet loss rate and increase network lifetime.
Abstract: The mobile nodes are infrequent movement in nature; therefore, its packet transmission is also infrequent. Packet overload occurred for routing process, and data are lossed by receiver node, since hackers hide the normal routing node. Basically, the hidden node problem is created based on the malicious nodes that are planned to hide the vital relay node in the specific routing path. The packet transmission loss occurred for routing; so, it minimizes the packet delivery ratio and network lifetime. Then, proposed enhanced self-organization of data packet (EAOD) mechanism is planned to aggregate the data packet sequencially from network structure. The hacker node present in routing path is easy to separate from network with trusty nodes. In order to secure the regular characteristics of organizer node from being confirmed as misbehaving node, the hidden node detection technique is designed for abnormal routing node identification. This algorithm checks the neighboring nodes that are hacker node, which hide the trust node in the routing path. And that trust nodes are initially found based on strength value of every node and assign path immediately. It increases network lifetime and minimizes the packet loss rate.

Journal ArticleDOI
TL;DR: An enhanced identity-based encryption approach where a secure key is generated using part of an identity bit string in order to avoid leakage of users’ identity even if an adversary or attacker decodes the key or encrypted data is proposed.
Abstract: The demand of cloud computing and 5G networks has increased in the current scenario due to their attractive features and also the security related to the data over the cloud. In the context of cloud security, there is a number of computationally hard methods available. One of the most popular methods used to secure data over the cloud is the identity-based encryption (IBE). It is an access policy that allows only authorized users to access legible data in order to avoid a malicious attack. IBE comprises of four stages, namely, setup, key generation or extract, encryption, and decryption. Key generation is one of the important and time-consuming phases in which a security key is generated. It is a computational and decisional hard problem for generating unbreakable and nonderivable secure keys. This paper proposes an enhanced identity-based encryption approach where a secure key is generated using part of an identity bit string in order to avoid leakage of users’ identity even if an adversary or attacker decodes the key or encrypted data. Experiment results show that the prosed algorithm takes less time in the encryption and decryption as compared to the competitive approach named efficient selective-ID secure identity-based encryption approach. One of the most important features of the proposed approach is that it hides the user’s identity by using the Lagrange coefficient, which consists of a polynomial interpolation function. The security of the system depends on the hardness of computing the bilinear Diffie-Hellman problem.

Journal ArticleDOI
TL;DR: Even at high traffic densities, the automobile ID-based CAM following information method outperforms the typical fixed CAM frequency IEEE 802.11p, according to simulation findings for all back-off figures.
Abstract: This research presents a vehicle ID-based congestion aware message (CAM) for beacon signals on the vehicle environment. At the MAC protocol of the vehicle environment, enhanced vehicle ID-based analysis model is given first. With the automobile ID embedded in their separate CAMs, the model weights the randomized back-off numbers chosen by cars engaging in the back-off procedure. This leads to identifying a car ID-based randomized back-off code, which reduces the likelihood of a collision due to the identical back-off number. A traffic density based-congestion control algorithm (TDCCA) is suggested in this research. The revised mathematical approach surpasses previous work’s overall packet latency because just one-fourth of the congestion window is employed during the experiment. The research includes a congestion management method that adjusts the rate of CAM transmitted over the host controller to improve the efficiency of the model parameters. The method considers various circumstances, from nonsaturated to substantially saturated networks (in terms of congestion probability) and sparsely dispersed and teemed networks (in the form of vehicular intensity). The technique is run across various automobile ID-based back-off values for high-standard results analysis. The simulation outcomes in terms of packet delivery ratio, energy consumption, delay, success rate, and collision ensure the effectiveness of the TDCCA method. Even at high traffic densities, the automobile ID-based CAM following information method outperforms the typical fixed CAM frequency IEEE 802.11p, according to simulation findings for all back-off figures.

Journal ArticleDOI
TL;DR: In this article , the authors used machine learning (ML) to predict the concentration of CO2 inside an office room using real-time measurements of indoor CO2, number of occupants, area per person, outdoor temperature, outer wind speed, relative humidity and air quality index.
Abstract: Air pollution is increasing profusely in Indian cities as well as throughout the world, and it poses a major threat to climate as well as the health of all living things. Air pollution is the reason behind degraded indoor air quality (IAQ) in urban buildings. Carbon dioxide (CO2) is the main contributor to indoor pollution as humans themselves are one of the generating sources of this pollutant. The testing and monitoring of CO2 consume cost and time and require smart sensors. Thus, to solve these limitations, machine learning (ML) has been used to predict the concentration of CO2 inside an office room. This study is based on the data collected through real-time measurements of indoor CO2, number of occupants, area per person, outdoor temperature, outer wind speed, relative humidity, and air quality index used as input parameters. In this study, ten algorithms, namely, artificial neural network (ANN), support vector machine (SVM), decision tree (DT), Gaussian process regression (GPR), linear regression (LR), ensemble learning (EL), optimized GPR, optimized EL, optimized DT, and optimized SVM, were used to predict the concentration of CO2. It has been found that the optimized GPR model performs better than other selected models in terms of prediction accuracy. The result of this study indicated that the optimized GPR model can predict the concentration of CO2 with the highest prediction accuracy having R , RMSE, MAE, NS, and a20-index values of 0.98874, 4.20068 ppm, 3.35098 ppm, 0.9817, and 1, respectively. This study can be utilized by the designers, researchers, healthcare professionals, and smart city developers to analyse the indoor air quality for designing air ventilation systems and monitoring CO2 level inside the buildings.

Journal ArticleDOI
TL;DR: This research work proposed an automatic method to achieve an effective and intelligent waste management system using Internet of things by predicting the possibility of waste things by using random forest algorithm.
Abstract: Internet of Things (IoT) has now become an embryonic technology to elevate the whole sphere into canny cities. Hasty enlargement of smart cities and industries leads to the proliferation of waste generation. Waste can be pigeon-holed as materials-based waste, hazard potential based waste, and origin-based waste. These waste categories must be coped thoroughly to make certain of the ecological finest run-throughs irrespective of the origin or hazard potential or content. Waste management should be incorporated into ecological preparation since it is a grave piece of natural cleanliness. The most important goalmouth of waste management is to maintain the pecuniary growth and snootier excellence of life by plummeting and exterminating adversative repercussions of waste materials on environment and human health. Disposing of unused things is a significant issue, and this ought to be done in the best manner by deflecting waste development and keeping hold of cost, and it involves countless human resources to deal with the waste. These current techniques predominantly focus on cost-effective monitoring of waste management, and results are not imprecise, so that it could not be developed in real time or practically applications such as in educational organizations, hospitals, and smart cities. Internet of things-based waste management system provides a real-time monitoring system for collecting the garbage waste, and it does not control the dispersion of overspill and blowout gases with poor odor. Consequently, it leads to the emission of radiation and toxic gases and affects the environment and social well-being and induces global warming. Motivated by these points, in this research work, we proposed an automatic method to achieve an effective and intelligent waste management system using Internet of things by predicting the possibility of waste things. The wastage capacity, gas level, and metal level can be monitored continuously using IoT based dustbins, which can be placed everywhere in city. Then, our proposed method can be tested by machine learning classification techniques such as linear regression, logistic regression, support vector machine, decision tree, and random forest algorithm. The proposed method is investigated with machine learning classification techniques in terms of accuracy and time analysis. Random forest algorithm gives the accuracy of 92.15% and time consumption of 0.2 milli seconds. From this analysis, our proposed method with random forest algorithm is significantly better compared to other classification techniques.

Journal ArticleDOI
TL;DR: An extensive literature review on IoT is done using the systematic literature review (SLR) technique to identify the major areas of applications, different popular architectures, and their challenges and provides a roadmap to develop strategies for their future research work.
Abstract: We are traversing the growing emerging technology paradigms in today’s advanced technological world. In this present era, the Internet of Things (IoT) is extensively used in all sectors. IoT is the ecosystem of smart devices which contains sensors, smart objects, networking, and processing units. These integrated devices provide better services to the end user. IoT is impacting our environment and is becoming one of the most popular technologies. The leading use of IoT in human life is to track activities anywhere at any time. The utmost utilities achieved by IoT applications are decision-making and monitoring for efficient and effective management. In this paper, an extensive literature review on IoT has been done using the systematic literature review (SLR) technique. The main focus areas include commercial, environmental, healthcare, industrial, and smart cities. The issues related to the IoT are also discussed in detail. The purpose of this review is to identify the major areas of applications, different popular architectures, and their challenges. The various IoT applications are compared in accordance with technical features such as quality of service and environmental evaluation. This study can be utilized by the researchers to understand the concept of IoT and provides a roadmap to develop strategies for their future research work.

Journal ArticleDOI
TL;DR: This article introduces an efficient outsourced data integrity auditing scheme that could synchronously meet the requirements of provable data update and data confidentiality without dependency on a third authority.
Abstract: Cloud storage, an economically attractive service offered by cloud service providers (CSPs), has attracted a large number of tenants. However, because the ownership and management of outsourced data are separated, outsourced data faces a lot of security challenges, for instance, data security, data integrity, data update, and so on. In this article, we primarily investigate the problem of efficient data integrity auditing supporting provable data update in cloud computing environment. Subsequently, on the basis of the Merkel sum hash tree (MSHT), we introduce an efficient outsourced data integrity auditing scheme. Our designed scheme could synchronously meet the requirements of provable data update and data confidentiality without dependency on a third authority. At the same time, the numerical analysis shows that the computing complexity logarithmically grows with the number of outsourced subfiles. Finally, a prototype implementation is developed to simulate our designed scheme and measure its performance. The consequences of experiments present that compared with some previous solutions, our designed scheme has much more attractive practicality and higher efficiency in practical applications.

Journal ArticleDOI
TL;DR: Up to 98% accuracy is achieved in anomaly detection with the proposed model using features like MAC IP and source/destination/IP for training, and the solution outperforms a standard centrally managed system in terms of attack detection accuracy, according to the comparative performance analysis.
Abstract: Using federated learning, which is a distributed machine learning approach, a machine learning model can train on a distributed data set without having to transfer any data between computers. Instead of using a centralised server for training, the model uses data stored locally on the device itself. After that, the server uses this model to create a jointly trained model. Federated learning asserts that privacy is preserved because no data is sent. Botnet attacks are detected using on-device decentralised traffic statistics and a deep autoencoder. This proposed federated learning approach addresses privacy and security concerns about data privacy and security rather than allowing data to be transferred or relocated off the network edge. In order to get the intended results of a previously centralised machine learning technique while also increasing data security, computation will be shifted to the edge layer. Up to 98% accuracy is achieved in anomaly detection with our proposed model using features like MAC IP and source/destination/IP for training. Our solution outperforms a standard centrally managed system in terms of attack detection accuracy, according to our comparative performance analysis.

Journal ArticleDOI
TL;DR: It can be concluded that the MobileNetV2-based transfer learning model would be an alternative to the DCNN model for highly accurate face mask detection.
Abstract: The rapid spreading of Coronavirus disease 2019 (COVID-19) is a major health risk that the whole world is facing for the last two years. One of the main causes of the fast spreading of this virus is the direct contact of people with each other. There are many precautionary measures to reduce the spread of this virus; however, the major one is wearing face masks in public places. Detection of face masks in public places is a real challenge that needs to be addressed to reduce the risk of spreading the virus. To address these challenges, an automated system for face mask detection using deep learning (DL) algorithms has been proposed to control the spreading of this infectious disease effectively. This work applies deep convolution neural network (DCNN) and MobileNetV2-based transfer learning models for effectual face mask detection. We evaluated the performance of these two models on two separate datasets, i.e., our developed dataset by considering real-world scenarios having 2500 images (dataset-1) and the dataset taken from PyImage Search Reader Prajna Bhandary and some random sources (dataset-2). The experimental results demonstrated that MobileNetV2 achieved 98 % and 99 % accuracies on dataset-1 and dataset-2, respectively, whereas DCNN achieved 97 % accuracy on both datasets. Based on our findings, it can be concluded that the MobileNetV2-based transfer learning model would be an alternative to the DCNN model for highly accurate face mask detection.

Journal ArticleDOI
TL;DR: A detailed literature review consisting of three stages based on three research questions (RQ) that highlight the step-by-step evaluation and analysis is provided in this paper , where the majority of these papers focus on assessing the identity issues related to the land registry system and reviewing the existing identity models to find the best possible identity model to resolve the identified identity problems.
Abstract: The land registry system is one of the essential components of any governance model required to ascertain the ownership records uniquely. This paper reviews the existing literature and provides a detailed literature review consisting of 3 stages based on three research questions (RQ) that highlight the step by step evaluation and analysis. We selected 48 primary articles out of 477 extracted from different scientific databases based on criteria and RQ defined in the research method section. The majority of these papers focus on assessing the identity issues related to the land registry system and reviewing the existing identity models to find the best possible identity model to resolve the identified identity problems in the land registry. This paper examines the current land registry model and its shortcomings. It explains the various blockchain types and their characteristics. It further evaluates the usability of blockchain technology in different aspects of the land registry. Identity management is one of such weaknesses in the blockchain-based land registry model that has been assessed in detail. Identity issues of blockchain-based models have been further evaluated on defined criteria. The paper ends with a discussion on possible identity models and their comparative analysis to ascertain the most suitable identity model to resolve the identity issues of land registry systems.

Journal ArticleDOI
TL;DR: A modified data delivery strategy based on stochastic block model and community detection (DDBSC) is proposed that exhibits good performance in terms of overhead, energy consumption, and delivery rate.
Abstract: The nodes in the opportunistic network make up communities according to the relevance between them. Some of the structural characteristics of an opportunistic network can be reflected by the structure of the communities that exist in the network. Therefore, finding community from the network is of great significance for people to better study, use, and transform the network. The overlap of communities is considered to be an important feature of communities. Almost all community discovery algorithms were based on nonoverlapping communities in the past. A node in a nonoverlapping community belongs to only one community. However, there are overlapping and interrelated characteristics between communities, so it is not in line with the actual environment of the network. As a result, the previous algorithms have many shortcomings in the face of practical application scenarios, coupled with the limitation of the computing capacity of mobile devices; data transmission for low delay and the low energy consumption is difficult to meet the requirements. In the study, we formulate the problem of dividing nodes into several communities in the opportunistic social network as how to build communities dynamically according to weight distribution. Then, we propose a modified data delivery strategy based on stochastic block model and community detection (DDBSC). The simulation results show that, compared with other algorithms in the experiments, the strategy proposed in this paper exhibits good performance in terms of overhead, energy consumption, and delivery rate.

Journal ArticleDOI
TL;DR: In this paper , a secure IoT platform for healthcare applications is proposed, in which a cutting-edge encryption algorithm is used to protect the health data and normalization is first used to preprocess the data and remove any irrelevant information.
Abstract: Mobile computing and technology are becoming more common in many parts of private life and public services, and they are playing an increasingly important role in healthcare, not just for sensory devices but also for communication, recording, and display. They are used for more than only sensory devices but also for communications, recording, and display. Numerous medical indications and postoperative days must be monitored carefully. As a result, the most recent development in Internet of Things- (IoT-) based healthcare communication has been embraced. The Internet of Things (IoT), which is employed in a wide range of applications, is a catalyst for the healthcare industry. Healthcare data is complicated, making it difficult to handle and evaluate in order to derive useful information for decision-making. On the other hand, data security is a vital requirement in a healthcare data systems. Determining the need for a smart and secure IoT platform for healthcare applications, we create one in this study. Here, a cutting-edge encryption algorithm is used to protect the health data. Normalization is first used to preprocess the data and remove any irrelevant information. Using principal component analysis and logistic regression, the data’s features are extracted (LR-PCA). To choose the pertinent features, a feature selection process based on genetic algorithms is used. We have put out a brand-new kernel homomorphism. To increase the security of the IoT network, use the two-fish Encryption algorithm (KHTEA). EBSMO (exponential Boolean spider monkey optimization) is used to further boost the encryption process’ effectiveness. Utilizing the MATLAB simulation tool, the proposed system is assessed, and the metrics are contrasted with the accepted practices. Our suggested solution has been shown to be effective in protecting medical healthcare data. The effectiveness of the proposed and existing approaches is assessed using metrics for encryption time, execution time, and security level. The security precautions we suggested for healthcare data worked well.

Journal ArticleDOI
TL;DR: A smart intrusion detection system suited to detect Internet of Things-based attacks is implemented and the autoencoder model, which effectively reduces detection time as well as effectively improves detection precision, has outperformed.
Abstract: The Internet of Things (IoT) cyberattacks of fully integrated servers, applications, and communications networks are increasing at exponential speed. As problems caused by the Internet of Things network remain undetected for longer periods, the efficiency of sensitive devices harms end users, increases cyber threats and identity misuses, increases costs, and affects revenue. For productive safety and security, Internet of Things interface assaults must be observed nearly in real time. In this paper, a smart intrusion detection system suited to detect Internet of Things-based attacks is implemented. In particular, to detect malicious Internet of Things network traffic, a deep learning algorithm has been used. The identity solution ensures the security of operation and supports the Internet of Things connectivity protocols to interoperate. An intrusion detection system (IDS) is one of the popular types of network security technology that is used to secure the network. According to our experimental results, the proposed architecture for intrusion detection will easily recognize real global intruders. The use of a neural network to detect attacks works exceptionally well. In addition, there is an increasing focus on providing user-centric cybersecurity solutions, which necessitate the collection, processing, and analysis of massive amounts of data traffic and network connections in 5G networks. After testing, the autoencoder model, which effectively reduces detection time as well as effectively improves detection precision, has outperformed. Using the proposed technique, 99.76% of accuracy was achieved.

Journal ArticleDOI
TL;DR: By analyzing and comparing the proposed system with the existing system, it is proved that the system proposed was much better than the existing systems.
Abstract: Steganography is a tool which allows the data for transmission by concealing secret information in a tremendously growing network. In this paper, a novel technique quick response method (QRM) is proposed for the purpose of encryption and decryption. Existing system uses side match vector quantization (SMVQ) technique which has some challenges such as security issues and performance issues. To handle the security and performance issues, the proposed system uses two methods, namely, quick response method and shifting method. In the proposed system, encoding part calculates the performance for capacity, PSNR (peak signal-to-noise ratio), MSE (mean square error), and SSIM (structural similarity index method), and the decoding part calculates the performance of MSE (mean square error) and PSNR (peak signal-to-noise ratio). The shifting method is used to increase the data hiding capacity. In this system, the encryption part embeds the secret image using steganography and the decryption part extracts the original image. By analyzing and comparing the proposed system with the existing system, it is proved that the system proposed was much better than the existing systems.

Journal ArticleDOI
TL;DR: The experimental results established that the GWOECN-FR technology outperformed more contemporary approaches in real-time face recognition, and was primarily concerned with reliably and rapidly recognizing faces in input photos.
Abstract: Face recognition (FR) is a technique for recognizing individuals through the use of face photographs. The FR technology is widely applicable in a variety of fields, including security, biometrics, authentication, law enforcement, smart cards, and surveillance. Recent advances in deep learning (DL) models, particularly convolutional neural networks (CNNs), have demonstrated promising results in the field of FR. CNN models that have been pretrained can be utilized to extract characteristics for effective FR. In this regard, this research introduces the GWOECN-FR approach, a unique grey wolf optimization with an enhanced capsule network-based deep transfer learning model for real-time face recognition. The proposed GWOECN-FR approach is primarily concerned with reliably and rapidly recognizing faces in input photos. Additionally, the GWOECN-FR approach is preprocessed in two steps, namely, data augmentation and noise reduction by bilateral filtering (BF). Additionally, for feature vector extraction, an expanded capsule network (ECN) model can be used. Additionally, grey wolf optimization (GWO) combined with a stacked autoencoder (SAE) model is used to identify and classify faces in images. The GWO algorithm is used to optimize the SAE model’s weight and bias settings. The GWOECN-FR technique’s performance is validated using a benchmark dataset, and the results are analyzed in a variety of aspects. The GWOECN-FR approach achieved a TST of 0.03 s on the FEI dataset, whereas the AlexNet-SVM, ResNet-SVM, and AlexNet models achieved TSTs of 0.125 s, 0.0051 s, and 0.0062 s, respectively. The experimental results established that the GWOECN-FR technology outperformed more contemporary approaches.