Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Item TypeItem Type
-
SubjectSubject
-
YearFrom:-To:
-
More FiltersMore FiltersSourceLanguage
Done
Filters
Reset
67,236
result(s) for
"Deep learning method"
Sort by:
Digital signature scheme for information non-repudiation in blockchain: a state of the art review
2020
Blockchain, as one of the most promising technology, has attracted tremendous attention. The interesting characteristics of blockchain are decentralized ledger and strong security, while non-repudiation is the important property of information security in blockchain. A digital signature scheme is an effective approach to achieve non-repudiation. In this paper, the characteristics of blockchain and the digital signature to guarantee information non-repudiation are firstly discussed. Secondly, the typical digital signature schemes in blockchain are classified and analyzed, and then the state-of-the-art digital signatures are investigated and compared in terms of application fields, methods, security, and performance. Lastly, the conclusions are given, and some future works are suggested to stir research efforts in this field. Our works will facilitate to design efficient and secure digital signature algorithms in blockchain.
Journal Article
Intrusion detection in internet of things using supervised machine learning based on application and transport layer features using UNSW-NB15 data-set
by
Haider, Syed Ali
,
Riaz Qaiser
,
Zeeshan Muhammad
in
Accuracy
,
Algorithms
,
Artificial neural networks
2021
Internet of Things (IoT) devices are well-connected; they generate and consume data which involves transmission of data back and forth among various devices. Ensuring security of the data is a critical challenge as far as IoT is concerned. Since IoT devices are inherently low-power and do not require a lot of compute power, a Network Intrusion Detection System is typically employed to detect and remove malicious packets from entering the network. In the same context, we propose feature clusters in terms of Flow, Message Queuing Telemetry Transport (MQTT) and Transmission Control Protocol (TCP) by using features in UNSW-NB15 data-set. We eliminate problems like over-fitting, curse of dimensionality and imbalance in the data-set. We apply supervised Machine Learning (ML) algorithms, i.e., Random Forest (RF), Support Vector Machine and Artificial Neural Networks on the clusters. Using RF, we, respectively, achieve 98.67% and 97.37% of accuracy in binary and multi-class classification. In clusters based techniques, we achieved 96.96%, 91.4% and 97.54% of classification accuracy by using RF on Flow & MQTT features, TCP features and top features from both clusters. Moreover, we show that the proposed feature clusters provide higher accuracy and requires lesser training time as compared to other state-of-the-art supervised ML-based approaches.
Journal Article
A parallel WOA with two communication strategies applied in DV-Hop localization method
2020
Wireless sensor network (WSN) can effectively help us monitor the surrounding environment and prevent the occurrence of some natural disasters earlier, but we can only get the information of the surrounding environment correctly if we know the locations of nodes. How to know the exact positions of nodes is a strict challenge in WSN. Intelligent computing algorithms have been developed in recent years. They easily solve complex optimization problems, especially for those that cannot be modeled mathematically. This paper proposes a novel algorithm, named parallel whale optimization algorithm (PWOA). It contains two information exchange strategies between groups, and it significantly enhances global search ability and population diversity of the original whale optimization algorithm (WOA). Also, the algorithm is adopted to optimize the localization of WSN. Twenty-three mathematical optimization functions are accustomed to verifying the efficiency and effectiveness of the novel approach. Compared with some existing intelligent computing algorithms, the proposed PWOA may reach better results.
Journal Article
Identifying correctness data scheme for aggregating data in cluster heads of wireless sensor network based on naive Bayes classification
by
Chu Shu-Chuan
,
Thi-Kien, Dao
,
Pan Jeng-Shyang
in
Classification
,
Clusters
,
Communications systems
2020
Wireless sensor network (WSN) has been paid more attention by scholars due to the practical communication of a system of devices to transfer information gathered from a monitored field through wireless links. Precise and accurate data of aggregating messages from sensor nodes is a vital demand for a success WSN application. This paper proposes a new scheme of identifying the correctness data scheme for aggregating data in cluster heads in hierarchical WSN based on naive Bayes classification. The collecting environmental information includes temperature, humidity, sound, and pollution levels, from sensor nodes to cluster heads that classify data fault and aggregate and transfer them to the base station. The collecting data is classified based on the classifier to aggregate in the cluster head of WSN. Compared with some existing methods, the proposed method offers an effective way of forwarding the correct data in WSN applications.
Journal Article
Network resource optimization with reinforcement learning for low power wide area networks
by
Park Gyubong
,
Lee, Wooyeob
,
Inwhee, Joe
in
Deep learning
,
Energy transmission
,
Internet of Things
2020
As the 4th industrial revolution using information becomes an issue, wireless communication technologies such as the Internet of Things have been spotlighted. Therefore, much research is needed to satisfy the technological demands for the future society. A LPWA (low power wide area) in the wireless communication environment enables low-power, long-distance communication to meet various application requirements that conventional wireless communications have been difficult to meet. We propose a method to consume the minimum transmission power relative to the maximum data rate with the target of LoRaWAN among LPWA networks. Reinforcement learning is adopted to find the appropriate parameter values for the minimum transmission power. With deep reinforcement learning, we address the LoRaWAN problem with the goal of optimizing the distribution of network resources such as spreading factor, transmission power, and channel. By creating a number of deep reinforcement learning agents that match the terminal nodes in the network server, the optimal transmission parameters are provided to the terminal nodes. The simulation results show that the proposed method is about 15% better than the existing ADR (adaptive data rate) MAX of LoRaWAN in terms of throughput relative to energy transmission.
Journal Article
MSCR: multidimensional secure clustered routing scheme in hierarchical wireless sensor networks
For hierarchical wireless sensor network (WSN), the clustered routing protocol can effectively deal with large-scale application requirements, thereby, how to efficiently elect the secure cluster heads becomes very critical. Unfortunately, many current studies only focus on improving security while neglecting energy efficiency and transmission performance. In this paper, a lightweight trust management scheme (LTMS) is proposed based on binomial distribution for defending against the internal attacks. Simultaneously, distance domain, energy domain, security domain and environment domain are considered and introduced to propose a multidimensional secure clustered routing (MSCR) scheme by using dynamic dimension weight in hierarchical WSNs. The simulation results show that LTMS can effectively prevent a malicious node from being elected as a cluster head, and MSCR can achieve a balance between security, transmission performance and energy efficiency under the requirements of environmental applications.
Journal Article
Analysis framework of network security situational awareness and comparison of implementation methods
by
Guang-qiu Huang
,
Chun-zi, Wang
,
Ying-chao, Li
in
Engineering personnel
,
Industrial development
,
Network security
2019
Information technology has penetrated into all aspects of politics, economy, and culture of the whole society. The information revolution has changed the way of communication all over the world, promoted the giant development of human society, and also drawn unprecedented attention to network security issues. Studies, focusing on network security, have experienced four main stages: idealized design for ensuring security, auxiliary examination and passive defense, active analysis and strategy formulation, and overall perception and trend prediction. Under the background of the new strategic command for the digital control that all countries are scrambled for, the discussion of network security situational awareness presents new characteristics both in the academic study and industrialization. In this regard, a thorough investigation has been made in the present paper into the literature of network security situational awareness. Firstly, the research status both at home and abroad is introduced, and then, the logical analysis framework is put forward concerning the network security situational awareness from the perspective of the data value chain. The whole process is composed of five successive stages: factor acquisition, model representation, measurement establishment, solution analysis, and situation prediction. Subsequently, the role of each stage and the mainstream methods are elaborated, and the application results on the experimental objects and the horizontal comparison between the methods are explained. In an attempt to provide a panoramic recognition of network security situational awareness, and auxiliary ideas for the industrialization of network security, this paper aims to provide some references for the scientific research and engineering personnel in this field.
Journal Article
Web intrusion detection system combined with feature analysis and SVM optimization
2020
The current network traffic is large, and the network attacks have multiple types. Therefore, anomaly detection model combined with machine learning is developing rapidly. Frequent occurrences of Web Application Firewall (WAF) bypass attacks and the redundancy of the data characteristics in Hypertext Transfer Protocol (HTTP) protocol make it difficult to extract data characteristics. In this paper, an integrated web intrusion detection system combined with feature analysis and support vector machine (SVM) optimization is proposed. By using expert’s knowledge, the characteristics of the common Web attacks are analyzed. The related data characteristics are selected by the analysis of the HTTP protocol. In the classification learning, the mature and robust support vector machine algorithm is utilized and the grid search method is used for the parameter optimization. Consequently, a better detection capability on Web attacks can be obtained. By using the HTTP DATASET CSIC 2010 data set, experiments have been carried out to compare the detection capability of different kernel functions. The results show that the proposed system performs good in the detection capability and can detect the WAF bypass attacks effectively.
Journal Article
A 3D mobile positioning method based on deep learning for hospital applications
2020
In this study, a 3D positioning method is proposed for hospital applications, such as navigation within a hospital building. It employs deep learning algorithms to analyze the received signal strength from cellular networks and Wi-Fi access points in order to estimate the positions of mobile stations. A two-stage deep learning procedure (level classification and location determination) is constructed to obtain the exact position information (building level, longitude, and latitude) in multiple-level buildings. To evaluate the performance of the proposed method, an experiment was conducted in the hospital of Xi’an Polytechnic University. In total, 36,985 records, 42 sampling location points, 28 different cellular networks, and 289 different Wi-Fi access points were considered. A deep learning neural network was trained for the first stage of level classification. Three deep learning neural networks were trained to obtain the distinct location coordinates (longitude and latitude) for three different building levels. To compare the efficacy of heterogeneous networks, three kinds of neural networks with different inputs (only cellular, only Wi-Fi APs, and a conjunction of cellular and Wi-Fi APs) were implemented. The accuracy of level classification was shown to be 100% for only Wi-Fi APs as an input. The average distance error of the location determination for different floors was 0.28 m for only Wi-Fi APs and for the conjunction of Wi-Fi APs and cellular networks in the second stage.
Journal Article
A deep learning-aided temporal spectral ChannelNet for IEEE 802.11p-based channel estimation in vehicular communications
2020
In vehicular communications using IEEE 802.11p, estimating channel frequency response (CFR) is a remarkably challenging task. The challenge for channel estimation (CE) lies in tracking variations of CFR due to the extremely fast time-varying characteristic of channel and low density pilot. To tackle such problem, inspired by image super-resolution (ISR) techniques, a deep learning-based temporal spectral channel network (TS-ChannelNet) is proposed. Following the process of ISR, an average decision-directed estimation with time truncation (ADD-TT) is first presented to extend pilot values into tentative CFR, thus tracking coarsely variations. Then, to make tentative CFR values accurate, a super resolution convolutional long short-term memory (SR-ConvLSTM) is utilized to track channel extreme variations by extracting sufficiently temporal spectral correlation of data symbols. Three representative vehicular environments are investigated to demonstrate the performance of our proposed TS-ChannelNet in terms of normalized mean square error (NMSE) and bit error rate (BER). The proposed method has an evident performance gain over existing methods, reaching about 84.5% improvements at some high signal-noise-ratio (SNR) regions.
Journal Article