scispace - formally typeset
Book ChapterDOI

A quantum-inspired hybrid intelligent position monitoring system in wireless networks

Reads0
Chats0
TLDR
This work devise a quantum-inspired PMS algorithm incorporating fuzzy logic and quantum computational theory to achieve computational intelligence in the problem of a mobile object’s position confidentiality in wireless networks.
Abstract
Position monitoring systems (PMSs) that offer considerable convenience in our daily lives have been thoroughly studied in the past. A PMS has complete control of the position-related information, and it initiates the problem of a roaming user’s position confidentiality. We study the problem of a mobile object’s position confidentiality in wireless networks. Confidentiality-preserved authentication in position-based roaming services is intended for the provision of legal access to wireless network services. Unfortunately, existing PMSs have practical inadequacies such as position cheating, higher communication cost, fake record generation, and forwarding. We propose a novel quantum-inspired hybrid intelligent PMS in wireless networks with the aim of conserving confidentiality of an individual in real-time position-based services. We devise a quantum-inspired PMS algorithm incorporating fuzzy logic and quantum computational theory to achieve computational intelligence in the problem of a mobile object’s position confidentiality. To the best of our knowledge this is the first work in the PMS literature to integrate the concept of quantum-inspired computation, and hence the proposed PMS algorithm is also the first quantum-inspired hybrid intelligent PMS algorithm for solving the position confidentiality problem with the anonymity concept. The simulation results and case studies prove that the proposed quantum-inspired PMS can conserve confidentiality of the roaming user with reduced communication cost.

read more

Citations
More filters
Journal ArticleDOI

Enforcing Position-Based Confidentiality With Machine Learning Paradigm Through Mobile Edge Computing in Real-Time Industrial Informatics

TL;DR: A method for conserving position confidentiality of roaming PBSs users using machine learning techniques is proposed and it is confirmed that the proposed method achieved above 90% of the position confidentiality in PBSs.
Journal ArticleDOI

Energy-Aware Green Adversary Model for Cyberphysical Security in Industrial System

TL;DR: An energy-aware green adversary model that runs on real-time anticipatory position-based query scheduling in order to minimize the communication and computation cost for each query, thus, facilitating energy consumption minimization.
Journal ArticleDOI

Search space-based multi-objective optimization evolutionary algorithm

TL;DR: The proposed SSMOEA algorithm is good and competitive in comparison to the existing EMO algorithms from the viewpoint of finding a scattered and estimated solution set in multi-objective optimization problems and can achieve a good trade-off between search space convergence and search space diversity in the appropriate experimental setup.
Journal ArticleDOI

ESCAPE: Effective Scalable Clustering Approach for Parallel Execution of Continuous Position-Based Queries in Position Monitoring Applications

TL;DR: An algorithm which proposes the use of search space areas for clustering and introduces a parallel framework for parallel processing of CPQ data sets which will recognize solid clusters in the wireless search space area is presented.
Journal ArticleDOI

PCCA: Position Confidentiality Conserving Algorithm for Content-Protection in e-Governance Services and Applications

TL;DR: PCCA, a novel position confidentiality conserving algorithm for content protection in e-Governance is proposed by means of rule-based approach from computational intelligence and users current position information and evaluation demonstrates that PCCA can efficiently conserve roaming users position confidentiality while accomplishing better performance, guaranteed position confidentiality, and better quality of service in e.Governance.
References
More filters

Quantum Computation and Quantum Information

TL;DR: This chapter discusses quantum information theory, public-key cryptography and the RSA cryptosystem, and the proof of Lieb's theorem.
Book

Genetic Algorithms + Data Structures = Evolution Programs

TL;DR: GAs and Evolution Programs for Various Discrete Problems, a Hierarchy of Evolution Programs and Heuristics, and Conclusions.
Journal ArticleDOI

A computational approach to fuzzy quantifiers in natural languages

TL;DR: The computational approach to fuzzy quantifiers which is described in this paper may be viewed as a derivative of fuzzy logic and test-score semantics.
Proceedings ArticleDOI

The new Casper: query processing for location services without compromising privacy

TL;DR: Zhang et al. as mentioned in this paper presented Casper1, a new framework in which mobile and stationary users can entertain location-based services without revealing their location information, which consists of two main components, the location anonymizer and the privacy-aware query processor.
Book

Facility location : applications and theory

TL;DR: The Weber Problem, a study of location problems in the public sector, and an Efficient Genetic Algorithm for the p-Median Problem, provide insights into the design of location models.
Related Papers (5)