Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Item Type
      Item Type
      Clear All
      Item Type
  • Subject
      Subject
      Clear All
      Subject
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
48 result(s) for "Mohd Hanapi, Zurina"
Sort by:
Efficient and Secured Mechanisms for Data Link in IoT WSNs: A Literature Review
The Internet of things (IoT) and wireless sensor networks (WSNs) have been rapidly and tremendously developing recently as computing technologies have brought about a significant revolution. Their applications and implementations can be found all around us, either individually or collaboratively. WSN plays a leading role in developing the general flexibility of industrial resources in terms of increasing productivity in the IoT. The critical principle of the IoT is to make existing businesses sufficiently intelligent to recognize the need for significant fault mitigation and short-cycle adaptation to improve effectiveness and financial profits. This article presents efficiently applied security protocols at the data link layer for WSN and IoT-based frameworks. It outlines the importance of WSN–IoT applications as well as the architecture of WSN in the IoT. Our primary aim is to highlight the research issues and limitations of WSNs related to the IoT. The fundamental goal of this work is to emphasize a suggested architecture linked to WSN–IoT to enhance energy and power consumption, mobility, information transmission, QoS, and security, as well as to present practical solutions to data link layer difficulties for the future using machine learning. Moreover, we present data link layer protocol issues, attacks, limitations, and research gaps for WSN frameworks based on the recent work conducted on the data link layer concerning WSN applications. Current significant issues and challenges pertain to flow control, quality of service (QoS), security, and performance. In the context of the literature, less work has been undertaken concerning the data link layer in WSN and its relation to improved network performance.
A survey of Sybil attack countermeasures in IoT-based wireless sensor networks
Wireless sensor networks (WSN) have been among the most prevalent wireless innovations over the years exciting new Internet of Things (IoT) applications. IoT based WSN integrated with Internet Protocol IP allows any physical objects with sensors to be connected ubiquitously and send real-time data to the server connected to the Internet gate. Security in WSN remains an ongoing research trend that falls under the IoT paradigm. A WSN node deployed in a hostile environment is likely to open security attacks such as Sybil attack due to its distributed architecture and network contention implemented in the routing protocol. In a Sybil attack, an adversary illegally advertises several false identities or a single identity that may occur at several locations called Sybil nodes. Therefore, in this paper, we give a survey of the most up-to-date assured methods to defend from the Sybil attack. The Sybil attack countermeasures includes encryption, trust, received signal indicator (RSSI), encryption and artificial intelligence. Specifically, we survey different methods, along with their advantages and disadvantages, to mitigate the Sybil attack. We discussed the lesson learned and the future avenues of study and open issues in WSN security analysis.
FuGeF: A Resource Bound Secure Forwarding Protocol for Wireless Sensor Networks
Resource bound security solutions have facilitated the mitigation of spatio-temporal attacks by altering protocol semantics to provide minimal security while maintaining an acceptable level of performance. The Dynamic Window Secured Implicit Geographic Forwarding (DWSIGF) routing protocol for Wireless Sensor Network (WSN) has been proposed to achieve a minimal selection of malicious nodes by introducing a dynamic collection window period to the protocol’s semantics. However, its selection scheme suffers substantial packet losses due to the utilization of a single distance based parameter for node selection. In this paper, we propose a Fuzzy-based Geographic Forwarding protocol (FuGeF) to minimize packet loss, while maintaining performance. The FuGeF utilizes a new form of dynamism and introduces three selection parameters: remaining energy, connectivity cost, and progressive distance, as well as a Fuzzy Logic System (FLS) for node selection. These introduced mechanisms ensure the appropriate selection of a non-malicious node. Extensive simulation experiments have been conducted to evaluate the performance of the proposed FuGeF protocol as compared to DWSIGF variants. The simulation results show that the proposed FuGeF outperforms the two DWSIGF variants (DWSIGF-P and DWSIGF-R) in terms of packet delivery.
Quality of Service Class Identifier (QCI) radio resource allocation algorithm for LTE downlink
The increasing demand for network applications, such as teleconferencing, multimedia messaging and mobile TV, which have diverse requirements, has resulted in the introduction of Long Term Evolution (LTE) by the Third Generation Partnership Project (3GPP). LTE networks implement resource allocation algorithms to distribute radio resource to satisfy the bandwidth and delay requirements of users. However, the scheduling algorithm problem of distributing radio resources to users is not well defined in the LTE standard and thus considerably affects transmission order. Furthermore, the existing radio resource algorithm suffers from performance degradation under prioritised conditions because of the minimum data rate used to determine the transmission order. In this work, a novel downlink resource allocation algorithm that uses quality of service (QoS) requirements and channel conditions to address performance degradation is proposed. The new algorithm is formulated as an optimisation problem where network resources are allocated according to users' priority, whereas the scheduling algorithm decides on the basis of users' channel status to satisfy the demands of QoS. Simulation is used to evaluate the performance of the proposed algorithm, and results demonstrate that it performs better than do all other algorithms according to the measured metrics.
Efficient Secure Routing Mechanisms for the Low-Powered IoT Network: A Literature Review
The Wireless Sensor Network in the Internet of Things (WSN-IoT) has been flourishing as another global breakthrough over the past few years. The WSN-IoT is reforming the way we live today by spreading through all areas of life, including the dangerous demographic aging crisis and the subsequent decline of jobs. For a company to increase revenues and cost-effectiveness growth should be customer-centered and agile within an organization. WSN-IoT networks have simultaneously faced threats, such as sniffing, spoofing, and intruders. However, WSN-IoT networks are often made up of multiple embedded devices (sensors and actuators) with limited resources that are joined via various connections in a low-power and lossy manner. However, to our knowledge, no research has yet been conducted into the security methods. Recently, a Contiki operating system’s partial implementation of Routing Protocol for Low Power & Lossy Network RPL’s security mechanisms was published, allowing us to evaluate RPL’s security methods. This paper presents a critical analysis of security issues in the WSN-IoT and applications of WSN-IoT, along with network management details using machine learning. The paper gives insights into the Internet of Things in Low Power Networks (IoT-LPN) architecture, research challenges of the Internet of Things in Low Power Networks, network attacks in WSN-IoT infrastructures, and the significant WSN-IoT objectives that need to be accompanied by current WSN-IoT frameworks. Several applied WSN-IoT security mechanisms and recent contributions have been considered, and their boundaries have been stated to be a significant research area in the future. Moreover, various low-powered IoT protocols have been further discussed and evaluated, along with their limitations. Finally, a comparative analysis is performed to assess the proposed work’s performance. The study shows that the proposed work covers a wide range of factors, whereas the rest of the research in the literature is limited.
An efficient detection of Sinkhole attacks using machine learning: Impact on energy and security
In the realm of Wireless Sensor Networks (WSNs), the detection and mitigation of sinkhole attacks remain pivotal for ensuring network integrity and efficiency. This paper introduces SFlexCrypt, an innovative approach tailored to address these security challenges while optimizing energy consumption in WSNs. SFlexCrypt stands out by seamlessly integrating advanced machine learning algorithms to achieve high-precision detection and effective mitigation of sinkhole attacks. Employing a dataset from Contiki-Cooja, SFlexCrypt has been rigorously tested, demonstrating a detection accuracy of 100% and a mitigation rate of 97.31%. This remarkable performance not only bolsters network security but also significantly extends network longevity and reduces energy expenditure, crucial factors in the sustainability of WSNs. The study contributes substantially to the field of IoT security, offering a comprehensive and efficient framework for implementing Internet-based security strategies. The results affirm that SFlexCrypt is a robust solution, capable of enhancing the resilience of WSNs against sinkhole attacks while maintaining optimal energy efficiency.
A Multicriteria Decision-Making Framework for Access Point Selection in Hybrid LiFi/WiFi Networks Using Integrated AHP–VIKOR Technique
Since light fidelity (LiFi) and wireless fidelity (WiFi) do not interfere with one another, a LiFi/WiFi hybrid network may provide superior performance to existing wireless options. With many users and constant changes, a network can easily become overloaded, leading to slowdowns and fluctuations in data transfer speeds. Access point assignment (APA) is required with the increase of users, which can negatively impact the system performance and quality-of-service (QoS) due to mobility and line-of-sight (LOS) blockage. Many variables could influence the APA process; these variables are considered as criteria, such as the network capacity, the degree of blockage, the speed of the connected user, etc. Unlike conditional APA methods, recent studies have considered treating these variables as “evaluation criteria”. Considering these criteria can offer better and more accurate results, eventually enhancing the APA process and QoS. However, the variety of these criteria, the conflict amongst them, their weights (importance), and priority have not been addressed so far. Moreover, treating the criteria equally might result in inaccurate outcomes. Therefore, to solve this issue, it is essential to investigate the impact of each criterion on the APA process. In this work, a multicriteria decision-making (MCDM) problem is formulated to determine a network-level selection for each user over a period of time The decision problem is modeled as a hierarchy that fragments a problem into a hierarchy of simple and small subproblems, and the selection of the AP network among various alternatives is a considered as an MCDM problem. Based on the previous works, we are not aware of any previous research attempts using MCDM methods in the LiFi research area for network selection. Therefore, this work proposes an access point assignment framework using an MCDM approach for users in a hybrid LiFi/WiFi network. The experiment was conducted based on four phases: Five criteria were identified and evaluated with eleven APs (alternatives). The outcome of this phase was used to build the decision matrix and an MCDM was developed and built based on user mobility and blockages with various scenarios using all the criteria; The analytic hierarchy process (AHP) was employed to identify the criterion of the subjective weights of each criterion and to determine the degree of importance supported by experts’ judgement. Determining the weights in the AHP process considered various investigations, including the consistency ratio (CR) and the AHP consensus indicator, which is calculated using the rank-based maximum likelihood method (RGMM) and Shannon entropy techniques. The VIekriteri-Jumsko KOmpromisno Rangiranje (VIKOR) method is adopted in the selection of the optimal AP for the proper selection of whether a LiFi or WiFi AP must serve the users. The integrated AHP–VIKOR was effective for solving the APA and was the best solution based on using weighted criteria simultaneously. Moreover, the ranking outcomes of the developed integrated AHP–VIKOR approach were evaluated using sensitivity analysis. The result of this work takes the APA for hybrid LiFi networks to a new perspective.
Locust Inspired Algorithm for Cloudlet Scheduling in Cloud Computing Environments
Cloud computing is an emerging paradigm that offers flexible and seamless services for users based on their needs, including user budget savings. However, the involvement of a vast number of cloud users has made the scheduling of users’ tasks (i.e., cloudlets) a challenging issue in selecting suitable data centres, servers (hosts), and virtual machines (VMs). Cloudlet scheduling is an NP-complete problem that can be solved using various meta-heuristic algorithms, which are quite popular due to their effectiveness. Massive user tasks and rapid growth in cloud resources have become increasingly complex challenges; therefore, an efficient algorithm is necessary for allocating cloudlets efficiently to attain better execution times, resource utilisation, and waiting times. This paper proposes a cloudlet scheduling, locust inspired algorithm to reduce the average makespan and waiting time and to boost VM and server utilisation. The CloudSim toolkit was used to evaluate our algorithm’s efficiency, and the obtained results revealed that our algorithm outperforms other state-of-the-art nature-inspired algorithms, improving the average makespan, waiting time, and resource utilisation.
A Review on LiFi Network Research: Open Issues, Applications and Future Directions
This paper extensively reviews and analyses Light Fidelity (LiFi), a new technology that uses light to transmit data as a high-speed wireless connection system from a wide spectrum of domains. An in-depth analysis and classifications of pertinent research areas for LiFi networks are presented in this paper. The various aspects constituting this paper include a detailed literature review, proposed classifications, and statistics, which further is deliberated to encompass applications, system architecture, system components, advantages, and disadvantages. LiFi and other technologies are compared, multi-user access techniques used in LiFi networks are investigated and open issues are addressed in detail. The paper is concluded with a comprehensive taxonomy of literature comparison that has served as the basis of the proposed open issues and research trends.
Deep Insight into IoT-Enabled Agriculture and Network Protocols
In recent years, research has combined the connection of agricultural equipment to increase crop growth rates and lower planting costs by refining the entire planting process. IT-enabled agriculture has beneficial effects on this industry and is yet a source of debate in academic circles. Trending network technologies like WSN and IoT have never been easy to develop and use in agriculture. The growth rate was not increased using outdated, conventional methods and technologies. Additionally, the rapid population expansion cannot meet human demands and expectations. Survey Methodology. The existence of IoT in agriculture was investigated and reported in this review. The paper describes the different IoT-agriculture network protocols. This study clarifies how the Internet affects agriculture and its underlying mechanisms. It also discusses how the growth rate is boosted when both sectors work together. This study intends to explore a platform that offers an infrastructure to link devices using the network protocol used in agriculture. In this study, several contemporary network difficulties relating to agriculture are also covered. Conclusion. The results of this study can be used as a guide for creating particular network protocols for the agriculture industry.