scispace - formally typeset
Search or ask a question

Showing papers in "Wireless Communications and Mobile Computing in 2023"


Journal ArticleDOI
TL;DR: In this article , a survey article categorizes and briefly analyzes a range of current routing methods utilized in WBANs, which are influenced by network structure, energy, quality of service (QoS), node temperature, human position, node transmission range, and other factors.
Abstract: The wireless body area network (WBAN) is a branch of the wireless sensor network (WSN) intended for tracking essential patients’ physiological signals and transferring this knowledge to the coordinator. During the routing of data, WBANs encounter critical routing problems like WSNs. Moreover, the particular constraints of WBANs make it more challenging that they need to be addressed. This survey article categorizes and briefly analyzes a range of current routing methods utilized in WBANs. The routing protocol is essential to the creation of any efficient and reliable wireless body area network due to a limited size of battery in the body sensor nodes. A comparison study of numerous routing protocols has been made in this paper, which is helpful in selecting the optimal routing protocol for the application being targeted. The article describes the WBAN architecture and addresses numerous challenges in the context of successful WBAN routing. In this paper, several existing WBAN routing methods are presented which are influenced by network structure, energy, quality of service (QoS), node temperature, human position, node transmission range, and other factors. The protocols, including cross-layered, cluster-based, QoS-aware, postural movement-based, temperature-aware, postural movement-based, and routing protocols, are given in an expressive taxonomy. Different routing protocols that have already been developed for WBANs are compared with more advanced protocols. The pros and cons of each protocol are looked at based on factors like delay, packet delivery ratio, and energy use. The researchers can utilize this survey paper as a reference for studying various routing protocols particularly in the medical and healthcare systems.

2 citations


Journal ArticleDOI
TL;DR: In this article , a one-to-many D2D communication system model is established in cellular networks, where the interference between CUs and DUs is correlated with their distance from one another.
Abstract: Device-to-device (D2D) communication with direct terminal connection is a promising candidate for 5G communication, which increases the capacity of cellular networks and spectral efficiency. Introducing D2D communication to cellular users (CUs) will increase system capacity, and CUs will provide reusable channel resources for D2D users (DUs). However, the sharing of channel resources between CUs and DUs will lead to cofrequency interference and affect the communication quality of user terminals. As a means of improving spectrum utilization and solving cofrequency interference problems, a one-to-many D2D communication system model is established in cellular networks. Through model analysis, the interference between CUs and DUs is correlated with their distance from one another. Considering the different interference of CUs to DUs at different distances, an algorithm for resource allocation based on distance grouping is proposed. With this algorithm, DUs will reuse channel resources of CUs within a reasonable distance in the group, and interference between DUs and CUs will be minimized. The improved particle swarm optimization algorithm is used to solve the optimal power, to achieve the maximum transmission rate of the system. Simulated results show that the algorithm will significantly improve system throughput and performance while also lowering the computational complexity of the algorithm, enabling the whole system to have better communication quality.

2 citations


Journal ArticleDOI
TL;DR: In this paper , the authors formulated a 6-s simulation towards big data, detailed information about characteristics, a taxonomy of tools, and discussed various processing paradigms to make decisions smoothly.
Abstract: In the current digital era, data is budding tremendously from various sources like banks, businesses, education, entertainment, etc. Due to its significant consequence, it became a prominent proceeding for numerous research areas like the semantic web, machine learning, computational intelligence, and data mining. For knowledge extraction, several corporate sectors depend on tweets, blogs, and social data to get adequate analysis. It helps them predict the customer’s tastes and preferences, optimize the usage of resources. In some cases, the same data creates complications that lead to a problem named as big data. To solve this, so many researchers have given various solutions. Based on literature analysis formulated 6-s simulation towards big data, detailed information about characteristics, a taxonomy of tools, and discussed various processing paradigms. No one tool can truly fit for all solutions, so this paper helps to make decisions smoothly by providing enough information and discussing major privacy issues and future directions.

1 citations


Journal ArticleDOI
TL;DR: Li et al. as mentioned in this paper proposed a Bulletproof alliance chain technology service transaction privacy protection mechanism, which uses digital certificates as access mechanisms and stores them on the chain to ensure that the identity of technical service transactions is trusted.
Abstract: In view of the problem that the transaction privacy in the current blockchain technology service is easy to be leaked, a bulletproof alliance chain technology service transaction privacy protection mechanism is proposed. Firstly, this paper uses digital certificates as access mechanisms and stores them on the chain to ensure that the identity of technical service transactions is trusted. Secondly, the transaction data of the technical service user is hidden in the Pedersen commitment, and the Bulletproof is used to build the scope proof. Enable the verifier to conduct confidential verification of the legitimacy of the transaction without obtaining the sensitive information of the transaction, so as to ensure that the user’s transaction privacy is not disclosed. Finally, the security and privacy of the proposed privacy protection scheme are analyzed, and the comparison with other zero-knowledge proof schemes shows that the scheme has the advantages of strong privacy, scalability, and low storage cost.

1 citations


Journal ArticleDOI
TL;DR: In this paper , the authors propose a method to solve the problem of the problem: the one-dimensional graph. .> . . . ]]
Abstract:

1 citations


Journal ArticleDOI
TL;DR: In this paper , the authors proposed a method to solve the problem of the problem: the one-dimensional graph. .>

Abstract:

1 citations


Journal ArticleDOI
TL;DR: Wang et al. as discussed by the authors proposed an improved sparrow search algorithm and used it to optimize support vector machine (SVM) parameters to improve the efficiency and stability of outlier detection.
Abstract: The high dimensionality and massive amount of data in open environments make the existing low-dimensional outlier detection methods time-consuming. The support vector machine (SVM) is a commonly used outlier detection method. However, the SVM still faces the problem of difficulty in obtaining optimal parameters quickly and effectively, resulting in low detection efficiency, poor stability, and difficulty in applying to open environment datasets. In order to improve the efficiency and stability of outlier detection, this paper proposes an improved sparrow search algorithm and uses it to optimize SVM parameters. First, the traditional sparrow search algorithm is improved by using improved backtracking learning and variable logarithmic spirals. Then, the improved sparrow search method is used to optimize SVM parameters, and the optimized support vector machine is applied to the field of outlier detection. Simulation experimental results show that the proposed method is significantly better than the compared classification algorithms in multiple evaluation indicators, with better detection efficiency, stability, and generalization ability.

1 citations


Journal ArticleDOI
TL;DR: In this article , a pillar-based 3D point cloud object detection algorithm with multi-attention mechanism is proposed, which includes three attention mechanisms SOCA, SOPA, and SAPI.
Abstract: Object detection in point clouds is a critical component in most autonomous driving systems. In this paper, in order to improve the effectiveness of image feature extraction and the accuracy of detection of point clouds, a pillar-based 3D point cloud object detection algorithm with multiattention mechanism is proposed, which includes three attention mechanisms SOCA, SOPA, and SAPI. The results show that the recognition accuracy of the optimized algorithm for cars, pedestrians, and cyclists on KITTI dataset is significantly improved on the detection benchmarks of BEV and 3D. Despite using only LiDAR, our algorithm outperforms PointPillars, which is one of the state-of-the-art algorithms for 3D object detection, with respect to both 3D and BEV view KITTI benchmarks while maintaining a relatively competitive speed.

1 citations


Journal ArticleDOI
TL;DR: In this article , a protocol for post-quantum privacy-preserving PDP and uses it to develop a scheme based on smart contracts is proposed. But the protocol is not secure and efficient and it cannot satisfy the demand for public verification while preserving user privacy.
Abstract: Provable data possession (PDP) is a crucial means of protecting the integrity of data in the domain of cloud storage. In the post-quantum era, the PDP scheme that uses lattices relies too heavily on the third-party auditor (TPA), which is not entirely trustworthy and is easily affected by a single point of failure. Moreover, the scheme often leads to the leakage of private user data while attempting to satisfy the demand for public verification. In response to the above problems, this paper designs a protocol for post-quantum privacy-preserving PDP and uses it to develop a scheme based on smart contracts. The proposed scheme has the characteristics of being post quantum and can satisfy the demand for public verification while preserving user privacy. The property of noninteraction of the protocol can reduce transaction fees incurred owing to the frequent operation of the blockchain, and the smart contract with a deposit mechanism can ensure fair payments to all parties. The results of a theoretical analysis and experiments show that the proposed scheme is highly secure and efficient.

1 citations


Journal ArticleDOI
Rong Li, Wei Zhang, Lifa Wu, Yu-Lian Tang, Xing Xie 
TL;DR: Zhang et al. as mentioned in this paper designed a smart home privacy analysis system based on ZigBee-encrypted traffic, called ZPA, which can extract ZigBee data features based on the device's operating mode and time window and use state-of-the-art machine-learning models to identify the type and status of smart home devices that could leak users' private information.
Abstract: Currently, the ZigBee protocol is widely used in smart homes and provides convenience to people. However, smart home devices often carry a large amount of real physical world information, which may result in information leakage problems. In this paper, to reveal the privacy security issues existing in ZigBee-based smart home networks, we design a smart home privacy analysis system based on ZigBee-encrypted traffic, called ZPA. ZPA can extract ZigBee data features based on the device’s operating mode and time window and use state-of-the-art machine-learning models to identify the type and status of smart home devices that could leak users’ private information. Through the analysis of 20 different devices from 5 manufacturers, the results show that even if the ZigBee traffic is protected by encryption, the accuracy of the proposed method in device type identification and state inference can reach approximately 93% and 98%, respectively. The types and statuses of devices in smart homes will reveal the user’s activity information to a certain extent. The privacy security of ZigBee-based smart devices still needs to be further strengthened.

1 citations


Journal ArticleDOI
TL;DR: In this paper , the authors proposed a novel fusion localization scheme based on fuzzy logic, which aims to achieve ideal localization accuracy by consuming as little energy as possible, where energy-efficient inertial measurement unit (IMU) sensors are routinely called to provide the displacement of a smartphone user in the manner of PDR, whereas a fuzzy inference system is employed to adaptively schedule energy-hungry WiFi scans to fulfill WiFi fingerprint localization according to a coarse metric for fusion localization errors and the remaining energy of the smartphone.
Abstract: Fusing WiFi fingerprint localization and pedestrian dead reckoning (PDR) on smartphones is attractive because of their obvious complementarity in localization accuracy and energy consumption. Although fusion localization algorithms tend to improve localization accuracy, extra hardware and software involved will result in extra computations, such that energy consumption is inevitably increased. Thus, in this study, we propose a novel fusion localization scheme based on fuzzy logic, which aims to achieve ideal localization accuracy by consuming as little energy as possible. Specifically, energy-efficient inertial measurement unit (IMU) sensors are routinely called to provide the displacement of a smartphone user in the manner of PDR, whereas a fuzzy inference system is employed to adaptively schedule energy-hungry WiFi scans to fulfill WiFi fingerprint localization according to a coarse metric for fusion localization errors and the remaining energy of the smartphone, so as to achieve a trade-off between localization accuracy and energy consumption. Moreover, in order to mitigate the effect of drift errors induced by PDR, straight trajectories of the user are further identified using a series of WiFi localization results to calibrate heading estimates of PDR. Extensive experimental results demonstrate that the proposed scheme achieves the same accuracy as the complementary filter, but consumes 38.02% energy than the complementary filter, confirming that the proposed scheme can effectively balance the localization accuracy and energy consumption.

Journal ArticleDOI
TL;DR: In this paper , a two-way relay channel in a cooperative relaying NOMA system is investigated, where two users exchange data with the assistance of a relaying, and the exact expressions of outage probability (OP) and system throughput (ST) are derived.
Abstract: Spectrum and energy efficiency with simultaneous wireless information and power transfer (SWIPT) to prolong the lifetime of power-constrained wireless devices in cooperative relaying nonorthogonal multiple access (CR-NOMA) has received great attention in the last decade. This paper investigates a two-way relay channel in a CR-NOMA system where two users exchange data with the assistance of a relay. Power-splitting relaying (PSR) and time-switching relaying (TSR) protocols are employed at the relay to harvest RF energy and process information from two users. We firstly derive the exact expressions of outage probability (OP) and system throughput (ST). The impacts of signal quality, energy coefficients, the distance of the nodes, and the data rate of two users on these performance metrics are then evaluated through several system settings to reflect practical network scenarios. It is shown that the OP and ST of the TSR are superior to that of the PSR protocol. Specifically, numerical results indicate that a higher throughput of up to 8% can be achieved with the TSR when compared to the PSR. It is further revealed that the OP and ST of the PSR are strongly affected by energy harvesting (EH) coefficients, while the performance obtained with the TSR is nearly independent of the EH capability at the relay.

Journal ArticleDOI
TL;DR: In this article , the authors proposed a method to solve the problem of the problem: the one-dimensional graph. .>

Abstract:

Journal ArticleDOI
TL;DR: Wang et al. as discussed by the authors proposed an intelligent recognition algorithm for ferrography wear particle based on convolutional block attention module (CBAM) and YOLOv5.
Abstract: The intelligent recognition technology for ferrography images is one of the important methods for diagnosis fault and state detection of machines. In allusion to these questions for the influences of wear particle images’ blurring, background intricacy, wear particle overlapping and lack of light, and others which lead to be the reason for the difficulty of achieving accurate identification, missed detection, and false detection, an intelligent recognition algorithm for ferrography wear particle based on convolutional block attention module (CBAM) and YOLOv5 is proposed. Firstly, it needs enhancement to improve contrast for ferrography wear particle images and lower background interference by adaptive histogram homogenization algorithm. Then, under the framework of YOLOv5 algorithm, the depthwise separable convolution is added to improve the detection speed of the network, and the detection accuracy of the entire network is improved by optimizing the loss function. Moreover, increase weight ratio on wear particle in images by adding a convolution block CBAM model and increase feature representative capability in detection network with YOLOv5 algorithm detection network, which can improve detection accuracy for wear particle. Finally, compare the algorithm with the three classical homologous series object detection algorithm. The experimental results show that the detection accuracy of the model can reach 96.7%, and the detection speed is 32 FPS for the images with a resolution of 1280 × 720 . It can be developed and applied to the fault diagnosis and condition monitoring of mechanical equipment.

Journal ArticleDOI
TL;DR: In this paper , the authors describe IoT device testbeds to collect network traffic in a local area network and cyberspace including beyond 5G/6G network traffic traces at different layers.
Abstract: WiFi and private 5G networks, commonly referred to as P5G, provide Internet of Things (IoT) devices the ability to communicate at fast speeds, with low latency and with a high capacity. Will they coexist and share the burden of delivering a connection to devices at home, on the road, in the workplace, and at a park or a stadium? Or will one replace the other to manage the increase in endpoints and traffic in the enterprise, campus, and manufacturing environments? In this research, we describe IoT device testbeds to collect network traffic in a local area network and cyberspace including beyond 5G/6G network traffic traces at different layers. We also describe research problems and challenges, such as traffic classification and traffic prediction by the traffic traces of devices. An AI-enabled hierarchical learning architecture for the problems above using sources like network packets, frames, and signals from the traffic traces with machine learning models is also presented.

Journal ArticleDOI
TL;DR: In this article , a Dependent Task Offloading Strategy (DTOS) based on deep reinforcement learning is proposed with minimizing the weighted sum of delay and energy consumption of network services as the optimization objective.
Abstract: In mobile edge computing, there are usually relevant dependencies between different tasks, and traditional algorithms are inefficient in solving dependent task-offloading problems and neglect the impact of the dynamic change of the channel on the offloading strategy. To solve the offloading problem of dependent tasks in a dynamic network environment, this paper establishes the dependent task model as a directed acyclic graph. A Dependent Task-Offloading Strategy (DTOS) based on deep reinforcement learning is proposed with minimizing the weighted sum of delay and energy consumption of network services as the optimization objective. DTOS transforms the dependent task offloading into an optimal policy problem under Markov decision processes. Multiple parallel deep neural networks (DNNs) are used to generate offloading decisions, cache the optimal decisions for each round, and then optimize the DNN parameters using priority experience replay mechanism to extract valuable experiences. DTOS introduces a penalty mechanism to obtain the optimal task-offloading decisions, which is triggered if the service energy consumption or service delay exceeds the threshold. The experimental results show that the algorithm produces better offloading decisions than existing algorithms, can effectively reduce the delay and energy consumption of network services, and can self-adapt to the changing network environment.

Journal ArticleDOI
TL;DR: In this article , the authors proposed a method to solve the problem of the problem: the one-dimensional graph. .>

Abstract:

Journal ArticleDOI
TL;DR: In this paper , a multi-objective genetic algorithm that integrates network coverage, capacity, and power consumption for optimal eNodeB placement in an operational 4G LTE network is proposed.
Abstract: Cellular mobile communication network planning and optimization involve a complex engineering process that deals with network fundamentals, radio resource elements, and critical decision variables. The continuous evolution of radio access technologies provides new challenges that necessitate efficient radio planning and optimization. Therefore, the planning and optimization algorithms should be highly efficient, advanced, and robust. An important component of 4G LTE network planning is the proper placement of evolved node base stations (eNodeBs) and the configuration of their antenna elements. This contribution proposes a multiobjective genetic algorithm that integrates network coverage, capacity, and power consumption for optimal eNodeB placement in an operational 4G LTE network. The multi-objective-based genetic algorithm optimization has been achieved using the optimization toolbox in MATLAB. By leveraging the proposed method, the effect of different population sizes on the cost of placing the eNodeBs and the percentage coverage of the eNodeBs in a given cell is determined. As a result, the optimal selection technique that minimizes the total network cost without compromising the desired coverage and capacity benchmarks is achieved. The proposed automatic eNodeB antenna placement method can be explored to optimize 4G LTE cellular network planning in related wireless propagation environments.

Journal ArticleDOI
TL;DR: In this paper , a planar, compact pentagonal shaped ultrawideband antenna of microstrip line fed offering triple band-notched characteristics response is proposed and investigated, which can be achieved by creating two inverted U-shaped slots of different size in pentagonal patch, and also electromagnetic band gap structure of hexagonal shape is created near the feed line of UWB antenna.
Abstract: In this paper, a planar, compact pentagonal shaped ultrawideband antenna of microstrip line fed offering triple band-notched characteristics response is proposed and investigated. Triple band-notch response can be achieved by creating two inverted U-shaped slots of different size in pentagonal patch, and also electromagnetic band gap structure of hexagonal shape is created near the feed line of UWB antenna. To implement the proposed antenna, RT/DUROID 5880 substrate of 1.6 mm thickness is used. The designed antenna was successfully simulated, developed, and manufactured. The dimension of the suggested antenna is 36 mm × 33 mm × 1.6 mm and has a bandwidth of 3.1–10.6 GHz with a magnitude of S 11 < − 10 dB , the maximum pass band gain of 4.6 dB and with the exception of the 4.0–4.4 GHz (C-band satellite communication), 5.2–5.8 GHz (WLAN), and 8.0–8.25 GHz (X-band) frequency bands. The suggested antenna has a good return loss, a virtually omnidirectional radiation pattern, and a constant gain throughout operation.

Journal ArticleDOI
TL;DR: In this article , the authors proposed a method to solve the problem of the problem: the one-dimensional graph. .>

Abstract:

Journal ArticleDOI
TL;DR: In this paper , the authors proposed detection and localization against multiple attacks using security localization based on an optimized multilayer perceptron artificial neural network (MLPANN) for WSN DoS attacks.
Abstract: Security enhancement in wireless sensor networks (WSNs) is significant in different applications. The advancement of routing attack localization is a crucial security research scenario. Various routing attacks degrade the network performance by injecting malicious nodes into wireless sensor networks. Sybil attacks are the most prominent ones generating false nodes similar to the station node. This paper proposed detection and localization against multiple attacks using security localization based on an optimized multilayer perceptron artificial neural network (MLPANN). The proposed scheme has two major part localization techniques and machine learning techniques for detection and localization WSN DoS attacks. The proposed system is implemented using MATLAB simulation and processed with the IBM SPSS toolbox and Python. The dataset is classified into training and testing using the multilayer perceptron artificial neural network to detect ten classes of attacks, including denial-of-service (DoS) attacks. Using the UNSW-NB, WSN-DS, NSL-KDD, and CICIDS2018 benchmark datasets, the results reveal that the suggested system improved with an average detection accuracy of 100%, 99.65%, 98.95%, and 99.83% for various DoS attacks. In terms of localization precision, recall, accuracy, and f-score, the suggested system outperforms state-of-the-art alternatives. Finally, simulations are done to assess how well the suggested method for detecting and localizing harmful nodes performs in terms of security. This method provides a close approximation of the unknown node position with low localization error. The simulation findings show that the proposed system is effective for the detection and secure localization of malicious attacks for scalable and hierarchically distributed wireless sensor networks. This achieved a maximum localization error of 0.49% and average localization accuracy of 99.51% using a secure and scalable design and planning approach.

Journal ArticleDOI
TL;DR: In this article , a framework for analyzing self-optimization, self-configuration, and self-healing (SH) functions in 5G networks is presented, which takes into account both detection and compensating operations.
Abstract: To meet users’ expectations for speed and reliability, 5th Generation (5G) networks and other forms of mobile communication of the future will need to be highly efficient, flexible, and nimble. Because of the expected density and complexity of 5G networks, sophisticated network control across all layers is essential. In this context, self-organizing network (SON) is among the essential solutions for managing the next generation of mobile communication networks. Self-optimization, self-configuration, and self-healing (SH) are typical SON functions. This research creates a framework for analyzing SH by exploring the impact of recovery measures taken in precarious stages of health. For this reason, our suggested architecture takes into account both detection and compensating operations. The system is broken down into some faulty states and the “fuzzy c-means” (FCM) approach is used to conduct the classifying. In the compensation process, the network is characterized as the Markov decision model (MDM), and the linear programming (LP) technique is implemented to find the most effective strategy for reaching a goal. Numerical findings acquired from a variety of situations with varying objectives show that the suggested method with optimized operations in the compensation stage exceeds the approach with randomly chosen actions.

Journal ArticleDOI
TL;DR: In this article, the authors proposed secure attack localization and detection in IoT-WSNs to improve security and service delivery using blockchain-based cascade encryption and trust evaluation in a hierarchical design to generate blockchain trust values before beacon nodes broadcast data to the base station.
Abstract: Wireless sensor networks are the core of the Internet of Things and are used in healthcare, locations, the military, and security. Threats to the security of wireless sensor networks built on the Internet of Things (IoT-WSNs) can come from a variety of sources. This study proposes secure attack localization and detection in IoT-WSNs to improve security and service delivery. The technique used blockchain-based cascade encryption and trust evaluation in a hierarchical design to generate blockchain trust values before beacon nodes broadcast data to the base station. Simulation results reveal that cascading encryption and feature assessment measure the trust value of nodes by rewarding each other for service provisioning and trust by removing malicious nodes that reduce localization accuracy and quality of service in the network. Federated machine learning improves data security and transmission by merging raw device data and placing malicious threats in the blockchain. Malicious nodes are classified through federated learning. Federated learning combines hybrid random forest, gradient boost, ensemble learning, K -means clustering, and support vector machine approaches to classify harmful nodes via a feature assessment process. Comparing the proposed system to current ones shows an average detection and classification accuracy of 100% for binary and 99.95% for multiclass. This demonstrates that the suggested approach works well for large-scale IoT-WSNs, both in terms of performance and security, when utilizing heterogeneous wireless senor networks for the providing of secure services.

Journal ArticleDOI
TL;DR: In this article , an improved sparrow search algorithm is proposed to optimize positioning, and the optimization mechanism is retained on the basis of improving the performance of the original algorithm, where the maximum likelihood estimation method is used to calculate the objective function, and then, the estimated function of the mobile station is used as the fitness function to generate the initial population of sparrows.
Abstract: To address the difficulty in calculating the nonlinear equation of time difference of arrival (TDOA) positioning, as well as the problem of measurement error in the hybrid time difference of arrival/angle of arrival (TDOA/AOA) positioning algorithm, an improved sparrow search algorithm is proposed to optimize positioning, and the optimization mechanism is retained on the basis of improving the performance of the original algorithm. The maximum likelihood estimation method is used to calculate the objective function, and then, the estimated function of the mobile station is used as the fitness function to generate the initial population of sparrows. Then, using particle swarm optimization, optimize the sparrow search algorithm and obtain the population’s optimal solution in order to obtain the optimal position. The simulation results show that, when compared to the existing algorithm, increasing the number of base stations increases the average accuracy of the sparrow search algorithm (SSA) positioning method by 18.54% and 4.5%, respectively, and, when compared to the proposed particle swarm optimization (PSO) positioning method, by 13.79% and 11.6% as the radius increases. The SSA hybrid positioning algorithm performs better in terms of positioning accuracy, convergence speed, and robustness.

Journal ArticleDOI
TL;DR: SecureMed as mentioned in this paper is a framework that uses blockchain-based distributed authentication implemented at the edge cloudlets to enforce privacy protection, which can be used to protect the edge-enabled IoMT from privacy attacks and to ensure end-to-end healthcare service provisioning.
Abstract: The Internet of Medical Things (IoMT) connects a huge amount of smart sensors with the Internet for healthcare service provisioning. IoMT’s privacy-preserving becomes a challenge considering the life-saving data collected and transferred through IoMT. Traditional privacy protection techniques use centralized management strategies, which lead to a single point of failure, lack of trust, state modification, information disclosure, and identity theft. Edge computing enables local computation of IoMT data, which reduces traffic to the cloud and also helps in accomplishing latency-sensitive healthcare applications and services. This paper proposes a novel framework (i.e., SecureMed) that uses blockchain-based distributed authentication implemented at the edge cloudlets to enforce privacy protection. In SecureMed, IoMT devices interact with edge cloudlets using smart contracts. It uses trusted edge nodes to implement an authentication algorithm that uses public/private key matching to authenticate IoMT. Experimental evaluation performed using the Pythereum blockchain shows that SecureMed outperforms the traditional blockchain scheme based on latency, bandwidth consumption, deployment time, scalability, and accuracy. Therefore, it can be used to protect the edge-enabled IoMT from privacy attacks and to ensure end-to-end healthcare service provisioning.

Journal ArticleDOI
TL;DR: Wang et al. as mentioned in this paper proposed a YOLOv7-residual convolutional block attention module, which combines the CNN and residual connections to improve the effective feature extraction.
Abstract: Deep learning (DL) is widely used in ship detection, but there are still some problems in the effective classification, such as inaccurate object feature extraction and inconspicuous feature information in deep layers. To address these problems, we propose a YOLOv7-residual convolutional block attention module (YOLOv7-RCBAM) by combining the convolutional attention mechanism and residual connections to the YOLOv7. First, to accelerate the training speed, the parameters in the backbone network of the pretrained model are frozen by using transfer learning, and the model is fine-tuned for training. Second, to enhance the information relevance of channel dimensional features, an attention mechanism with residual connectivity is adopted. Finally, a feature fusion attention mechanism is introduced to improve the effective feature extraction. The effectiveness of the proposed method is fully validated on the SeaShips dataset. The results show that the YOLOv7-RCBAM model achieves better performance with a 97.59% in mAP and effectively extracts object feature in deep layers. Meanwhile, the YOLOv7-RCBAM model can accurately locate ship in complex environments with darkness and noise with the mAP reaching 96.13% to achieve effective ship classification detection.

Journal ArticleDOI
TL;DR: In this paper , N.nan et al. presented a method to solve the problem of homonymity.http://www.nannan.edu.edu/blog/blogs/

Journal ArticleDOI
TL;DR: In this article , the authors proposed a method to solve the problem of the problem: the one-dimensional graph. .>

Abstract:

Journal ArticleDOI
TL;DR: In this article , a privacy information detection method using a data weighting mechanism was proposed to save time and cost in finding personal information leaks over Web services, which can reduce time by 62.19% when processing 8,000 crawled files, and rollback verification shows that it maintains 90.08% accuracy for finding marked content.
Abstract: Many Internet of Things and information exchange technologies bring convenience, cost-efficiency, and sustainability to smart city solutions. These changes have improved our day-to-day quality of life, with impacts on: (a) lifestyle (e.g., automation and robotic reaction), (b) infrastructure (efficient energy consumption), and (c) data-driven management (data sensing, collection, and investigation). It is common to integrate Web-based interfaces and such solutions for developing platforms. When software and hardware components store, retrieve, and transfer such information, people may suffer from personal data leakage. This paper introduces a privacy information detection method, using a data weighting mechanism to save time and cost in finding personal information leaks over Web services. According to an initial evaluation, the proposed method can reduce time by 62.19% when processing 8,000 crawled files, and roll-back verification shows that it maintains 90.08% accuracy for finding marked content.

Journal ArticleDOI
TL;DR: In this article , the authors propose a method to solve the problem of the problem: the one-dimensional graph. .> . . . ]]
Abstract: