Sort by
Intelligent multi-agent model for energy-efficient communication in wireless sensor networks

The research addresses energy consumption, latency, and network reliability challenges in wireless sensor network communication, especially in military security applications. A multi-agent context-aware model employing the belief-desire-intention (BDI) reasoning mechanism is proposed. This model utilizes a semantic knowledge-based intelligent reasoning network to monitor suspicious activities within a prohibited zone, generating alerts. Additionally, a BDI intelligent multi-level data transmission routing algorithm is proposed to optimize energy consumption constraints and enhance energy-awareness among nodes. The energy optimization analysis involves the Energy Percent Dataset, showcasing the efficiency of four wireless sensor network techniques (E-FEERP, GTEB, HHO-UCRA, EEIMWSN) in maintaining high energy levels. E-FEERP consistently exhibits superior energy efficiency (93 to 98%), emphasizing its effectiveness. The Energy Consumption Dataset provides insights into the joule measurements of energy consumption for each technique, highlighting their diverse energy efficiency characteristics. Latency measurements are presented for four techniques within a fixed transmission range of 5000 m. E-FEERP demonstrates latency ranging from 3.0 to 4.0 s, while multi-hop latency values range from 2.7 to 2.9 s. These values provide valuable insights into the performance characteristics of each technique under specified conditions. The Packet Delivery Ratio (PDR) dataset reveals the consistent performance of the techniques in maintaining successful packet delivery within the specified transmission range. E-FEERP achieves PDR values between 89.5 and 92.3%, demonstrating its reliability. The Packet Received Data further illustrates the efficiency of each technique in receiving transmitted packets. Moreover the network lifetime results show E-FEERP consistently improving from 2550 s to round 925. GTEB and HHO-UCRA exhibit fluctuations around 3100 and 3600 s, indicating variable performance. In contrast, EEIMWSN consistently improves from round 1250 to 4500 s.

Open Access Just Published
Relevant
FEDDBN-IDS: federated deep belief network-based wireless network intrusion detection system

Over the last 20 years, Wi-Fi technology has advanced to the point where most modern devices are small and rely on Wi-Fi to access the internet. Wi-Fi network security is severely questioned since there is no physical barrier separating a wireless network from a wired network, and the security procedures in place are defenseless against a wide range of threats. This study set out to assess federated learning, a new technique, as a possible remedy for privacy issues and the high expense of data collecting in network attack detection. To detect and identify cyber threats, especially in Wi-Fi networks, the research presents FEDDBN-IDS, a revolutionary intrusion detection system (IDS) that makes use of deep belief networks (DBNs) inside a federated deep learning (FDL) framework. Every device has a pre-trained DBN with stacking restricted Boltzmann machines (RBM) to learn low-dimensional characteristics from unlabelled local and private data. Later, these models are combined by a central server using federated learning (FL) to create a global model. The whole model is then enhanced by the central server with fully linked SoftMax layers to form a supervised neural network, which is then trained using publicly accessible labeled AWID datasets. Our federated technique produces a high degree of classification accuracy, ranging from 88% to 98%, according to the results of our studies.

Open Access
Relevant
Cancelable templates for secure face verification based on deep learning and random projections

Recently, biometric recognition has become a significant field of research. The concept of cancelable biometrics (CB) has been introduced to address security concerns related to the handling of sensitive data. In this paper, we address unconstrained face verification by proposing a deep cancelable framework called BiometricNet+ that employs random projections (RP) to conceal face images and compressive sensing (CS) to reconstruct measurements in the original domain. Our lightweight design enforces the properties of unlinkability, revocability, and non-invertibility of the templates while preserving face recognition accuracy. We compare facial features by learning a regularized metric: at training time, we jointly learn facial features and the metric such that matching and non-matching pairs are mapped onto latent target distributions; then, for biometric verification, features are randomly projected via random matrices changed at every enrollment and query and reconstructed before the latent space mapping is computed. We assess the face recognition accuracy of our framework on challenging datasets such as LFW, CALFW, CPLFW, AgeDB, YTF, CFP, and RFW, showing notable improvements over state-of-the-art techniques while meeting the criteria for secure cancelable template design. Since our method requires no fine-tuning of the learned features, it can be applied to pre-trained networks to increase sensitive data protection.

Open Access
Relevant
Network security threat detection technology based on EPSO-BP algorithm

With the development of Internet technology, the large number of network nodes and dynamic structure makes network security detection more complex, which requires the use of a multi-layer feedforward neural network to build a security threat detection model to improve network security protection. Therefore, the entropy model is adopted to optimize the particle swarm algorithm to decode particles, and then the single-peak and multi-peak functions are used to test and compare the particle entropy and fitness values to optimize the weights and thresholds in the multi-layer feedforward neural network. Finally, Suspicious Network Event Recognition Dataset discovered by data mining is sampled and applied to the entropy model particle swarm optimization for training. The test results show that there are four functions for the optimal mean and standard deviation in this algorithm, with values of 5.712e − 02, 4.805e − 02, 4.914e − 01, 1.066e − 01, 1.577e − 01, 1.343e − 01, and 2.089e + 01, 5.926, respectively. Overall, the algorithm proposed in the study is the best. Finally, the detection rate of attack types is calculated. The multi-layer feedforward neural network algorithm is 83.80%, the particle swarm optimization neural network algorithm is 91.00%, and the entropy model particle swarm optimization algorithm is 95.00%. The experiment shows that the research model has high accuracy in detecting network security threats, which can provide technical support and theoretical assistance for network security protection.

Open Access
Relevant
RFID tag recognition model for Internet of Things for training room management

With the rapid development of the Internet of Things and intelligent technology, the application of Radio Frequency Identification (RFID) technology in training room management is becoming increasingly widespread. An efficient and accurate RFID system can significantly improve the management efficiency and resource utilization of the training room, thereby improving teaching quality and reducing management costs. Although RFID technology has many advantages, there are still some problems in practical applications, such as label collision and recognition of unknown labels. These issues not only affect the performance of the system but may also cause interference with actual teaching and management. This study proposes a grouping-based bit arbitration query tree algorithm and anti-collision technology to solve label collisions and reduce label recognition time in the technology. A new unknown label recognition algorithm is also proposed to improve the recognition efficiency and accuracy of identifying new unknown labels. Related experiments have shown that the recognition accuracy of the algorithm designed this time is 95.86%. Compared with other algorithms, the number of idle time slots is the smallest. When the number of queries is 1000, the algorithm has 1842 queries, and the communication complexity is the best. When the number of unknown tags is 10,000, the actual accuracy rate is 95.642%. Compared with traditional recognition algorithms, the new unknown label recognition algorithm has a smaller frame length in the same label proportion and good recognition performance. On a theoretical level, the research content on RFID technology helps to improve and develop the basic theories of the Internet of Things and intelligent recognition technology and provides solutions and application technologies for equipment management and IoT applications in training rooms. On a practical level, the research results can provide specific guidance for the management of training rooms, help solve equipment management and safety maintenance problems in practical applications, and improve the management efficiency of training rooms.

Open Access
Relevant
Efficient identity security authentication method based on improved R-LWE algorithm in IoT environment

In recent years, various smart devices based on IoT technology, such as smart homes, healthcare, detection, and logistics systems, have emerged. However, as the number of IoT-connected devices increases, securing the IoT is becoming increasingly challenging. To tackle the increasing security challenges caused by the proliferation of IoT devices, this research proposes an innovative method for IoT identity authentication. The method is based on an improved ring-learning with errors (R-LWE) algorithm, which encrypts and decrypts communication between devices and servers effectively using polynomial modular multiplication and modular addition operations. The main innovation of this study is the improvement of the traditional R-LWE algorithm, enhancing its efficiency and security. Experimental results demonstrated that, when compared to number theory-based algorithms and elliptic curve cryptography algorithms at a 256-bit security level, the enhanced algorithm achieves significant advantages. The improved algorithm encrypted 20 data points with an average runtime of only 3.6 ms, compared to 7.3 ms and 7.7 ms for the other algorithms. Similarly, decrypting the same amount of data had an average runtime of 2.9 ms, as opposed to 7.3 ms and 8 ms for the other algorithms. Additionally, the improved R-LWE algorithm had significant advantages in terms of communication and storage costs. Compared to the number theory-based algorithm, the R-LWE algorithm reduced communication and storage costs by 3 °C each, and compared to elliptic curve cryptography, it reduced them by 4 °C each. This achievement not only enhances the efficiency of encryption and decryption but also lowers the overall operational costs of the algorithm. The research has made significant strides in improving the security and efficiency of IoT device identity authentication by enhancing the R-LWE algorithm. This study provides theoretical and practical foundations for the development and application of related technologies, as well as new solutions for IoT security.

Open Access
Relevant
Improved RFID mutual authentication protocol against exhaustive attack in the context of big data

The development of big data has epromoted the development of Internet technology, but it has brought more network security and privacy problems. Therefore, how to solve network security problems is the main research direction of current network technology development. In order to deal with the harm of network attacks to personal privacy security, this paper studies and proposes an RFID mutual authentication protocol against exhaustive attacks based on improved Hash function, and proposes a security proof based on BAN logic rules. At the same time, to enhance the computing resources of the improved protocol, this paper proposes an improved authentication query protocol for multi-source RFID tags. In the performance analysis, when the distance between the reader and the tag reaches 10 m, the improved protocol can still be higher than 90%. The application test shows that the improved protocol proposed in the study is capable of resisting exhaustive attacks, its execution time is short, and it is less affected by the number of tags. The above results show that in the context of big data, the improved RFID mutual authentication protocol proposed by the research against network exhaustive attacks has a more significant defense effect, can effectively protect user privacy, and has a greater reference value in network security research.

Open Access
Relevant
IoT devices and data availability optimization by ANN and KNN

Extensive research has been conducted to enhance the availability of IoT devices and data by focusing on the rapid prediction of instantaneous fault rates and temperatures. Temperature plays a crucial role in device availability as it significantly impacts equipment performance and lifespan. It serves as a vital indicator for predicting equipment failure and enables the improvement of availability and efficiency through effective temperature management. In the proposed optimization scheme for IoT device and data availability, the artificial neural network (ANN) algorithm and the K-Nearest Neighbours (KNN) algorithm are utilized to drive a neural network. The preliminary algorithm for availability optimization is chosen, and the target is divided into two parts: data optimization and equipment optimization. Suitable models are constructed for each part, and the KNN-driven neural network algorithm is employed to solve the proposed optimization model. The effectiveness of the proposed scheme is clearly demonstrated by the verification results. When compared to the benchmark method, the availability forward fault-tolerant method, and the heuristic optimization algorithm, the maximum temperature was successfully reduced to 2.0750 °C. Moreover, significant enhancements in the average availability of IoT devices were achieved, with improvements of 27.03%, 15.76%, and 10.85% respectively compared to the aforementioned methods. The instantaneous failure rates were 100%, 87.89%, and 84.4% respectively for the three algorithms. This optimization algorithm proves highly efficient in eliminating fault signals and optimizing the prediction of time-limited satisfaction. Furthermore, it exhibits strategic foresight in the decision-making process.

Open Access
Relevant
Research on privacy and secure storage protection of personalized medical data based on hybrid encryption

AbstractPersonalized medical data privacy and secure storage protection face serious challenges, especially in terms of data security and storage efficiency. Traditional encryption and storage solutions cannot meet the needs of modern medical data protection, which has led to an urgent need for new data protection strategies. Research personalized medical data privacy and secure storage protection based on hybrid encryption, in order to improve the security and efficiency of data storage. A hybrid encryption mechanism was proposed, which uses user attributes as keys for data encryption. The results show that the storage consumption of user attribute keys increases with the number of user attributes, but the consumption of hybrid encryption privacy storage technology is much smaller than that of traditional schemes. In the test, when the number of users increased to 30, the processing time first reached 1200 ms. During the increase in data volume, both test data and real data showed a brief decrease in attack frequency, but after the data volume reached 730–780, the attack frequency increased. It is worth noting that the performance of test data is better than that of real data. Personalized medical data privacy and secure storage protection based on hybrid encryption can not only effectively improve data security and reduce the risk of attack, but also greatly outperform traditional solutions in storage consumption and processing time. It has important practical significance for modern medical data storage protection.

Open Access
Relevant
Node fault diagnosis algorithm for wireless sensor networks based on BN and WSN

Wireless sensor networks, as an emerging information exchange technology, have been widely applied in many fields. However, nodes tend to become damaged in harsh and complex environmental conditions. In order to effectively diagnose node faults, a Bayesian model-based node fault diagnosis model was proposed. Firstly, a comprehensive analysis was conducted into the operative principles of wireless sensor systems, whereby fault-related features were then extrapolated. A Bayesian diagnostic model was constructed using the maximum likelihood method with sufficient sample features, and a joint tree model was introduced for node diagnosis. Due to the insufficient accuracy of Bayesian models in processing small sample data, a constrained maximum entropy method was proposed as the prediction module of the model. The use of small sample data to obtain the initial model parameters leads to improved performance and accuracy of the model. During parameter learning tests, the limited maximum entropy model outperformed the other two learning models on a smaller dataset of 35 with a distance value of 2.65. In node fault diagnosis, the diagnostic time of the three models was compared, and the average diagnostic time of the proposed diagnostic model was 41.2 seconds. In the node diagnosis accuracy test, the proposed model has the highest node fault diagnosis accuracy, with an average diagnosis accuracy of 0.946, which is superior to the other two models. In summary, the node fault diagnosis model based on Bayesian model proposed in this study has important research significance and practical application value in wireless sensor networks. By improving the reliability and maintenance efficiency of the network, this model provides strong support for the development and application of wireless sensor networks.

Open Access
Relevant