Your browser doesn't support javascript.
loading
Show: 20 | 50 | 100
Results 1 - 13 de 13
Filter
Add more filters










Publication year range
1.
Heliyon ; 10(9): e29965, 2024 May 15.
Article in English | MEDLINE | ID: mdl-38698990

ABSTRACT

The proliferation of the Internet of Things (IoT) devices has led to a surge in Internet traffic characterized by variabilities in Quality of Service (QoS) demands. Managing these devices and traffic effectively proves challenging, particularly within conventional IoT network architectures lacking centralized management. However, the advent of Software-Defined Networking (SDN) presents intriguing opportunities for network management, capable of addressing challenges in traditional IoT architectures. SDN's ability to provide centralized network management through a programmable controller, separate from data forwarding elements, has led researchers to incorporate SDN features with IoT (SDIoT) and Wireless Sensor Networks (SDWSN) ecosystems. However, despite the SDN support, these networks encounter challenges related to load-imbalance routing issues, as the SDN controller may be constrained while certain access points serving end users become overloaded. In response to these challenges, various load-balancing routing solutions have been proposed, each with distinct objectives. However, a comprehensive study that classifies and analyzes these solutions based on their weaknesses and postmortem challenges is currently lacking. This paper fills this gap by providing an in-depth classification of existing solutions. The study categorizes the problems addressed by different schemes and summarizes their findings. Furthermore, it discusses the shortcomings of current studies, and postmortem challenges associated with integrating SDN with IoT, and suggests future research directions.

2.
Heliyon ; 10(9): e29916, 2024 May 15.
Article in English | MEDLINE | ID: mdl-38698997

ABSTRACT

With the rapid development of Internet of Things (IoT) technology, Terminal Devices (TDs) are more inclined to offload computing tasks to higher-performance computing servers, thereby solving the problems of insufficient computing capacity and rapid battery consumption of TD. The emergence of Multi-access Edge Computing (MEC) technology provides new opportunities for IoT task offloading. It allows TDs to access computing networks through multiple communication technologies and supports more mobility of terminal devices. Review studies on IoT task offloading and MEC have been extensive, but none of them focus on IoT task offloading in MEC. To fill this gap, this paper provides a comprehensive and in-depth understanding of the algorithms and mechanisms of multiple IoT task offloading in the MEC network. For each paper, the main problems solved by the mechanism, technical classification, evaluation methods, and supported parameters are extracted and analyzed. Furthermore, shortcomings of current research and future research trends are discussed. This review will help potential and new researchers quickly understand the panorama of IoT task offloading approaches in MEC and find appropriate research paths.

3.
PeerJ Comput Sci ; 9: e1639, 2023.
Article in English | MEDLINE | ID: mdl-38077556

ABSTRACT

The correction of grammatical errors in natural language processing is a crucial task as it aims to enhance the accuracy and intelligibility of written language. However, developing a grammatical error correction (GEC) framework for low-resource languages presents significant challenges due to the lack of available training data. This article proposes a novel GEC framework for low-resource languages, using Arabic as a case study. To generate more training data, we propose a semi-supervised confusion method called the equal distribution of synthetic errors (EDSE), which generates a wide range of parallel training data. Additionally, this article addresses two limitations of the classical seq2seq GEC model, which are unbalanced outputs due to the unidirectional decoder and exposure bias during inference. To overcome these limitations, we apply a knowledge distillation technique from neural machine translation. This method utilizes two decoders, a forward decoder right-to-left and a backward decoder left-to-right, and measures their agreement using Kullback-Leibler divergence as a regularization term. The experimental results on two benchmarks demonstrate that our proposed framework outperforms the Transformer baseline and two widely used bidirectional decoding techniques, namely asynchronous and synchronous bidirectional decoding. Furthermore, the proposed framework reported the highest F1 score, and generating synthetic data using the equal distribution technique for syntactic errors resulted in a significant improvement in performance. These findings demonstrate the effectiveness of the proposed framework for improving grammatical error correction for low-resource languages, particularly for the Arabic language.

4.
Sensors (Basel) ; 23(14)2023 Jul 21.
Article in English | MEDLINE | ID: mdl-37514868

ABSTRACT

Cyberattacks in the modern world are sophisticated and can be undetected in a dispersed setting. In a distributed setting, DoS and DDoS attacks cause resource unavailability. This has motivated the scientific community to suggest effective approaches in distributed contexts as a means of mitigating such attacks. Syn Flood is the most common sort of DDoS assault, up from 76% to 81% in Q2, according to Kaspersky's Q3 report. Direct and indirect approaches are also available for launching DDoS attacks. While in a DDoS attack, controlled traffic is transmitted indirectly through zombies to reflectors to compromise the target host, in a direct attack, controlled traffic is sent directly to zombies in order to assault the victim host. Reflectors are uncompromised systems that only send replies in response to a request. To mitigate such assaults, traffic shaping and pushback methods are utilised. The SYN Flood Attack Detection and Mitigation Technique (SFaDMT) is an adaptive heuristic-based method we employ to identify DDoS SYN flood assaults. This study suggested an effective strategy to identify and resist the SYN assault. A decision support mechanism served as the foundation for the suggested (SFaDMT) approach. The suggested model was simulated, analysed, and compared to the most recent method using the OMNET simulator. The outcome demonstrates how the suggested fix improved detection.

5.
Sensors (Basel) ; 23(10)2023 May 15.
Article in English | MEDLINE | ID: mdl-37430683

ABSTRACT

A significant majority of the population in India makes their living through agriculture. Different illnesses that develop due to changing weather patterns and are caused by pathogenic organisms impact the yields of diverse plant species. The present article analyzed some of the existing techniques in terms of data sources, pre-processing techniques, feature extraction techniques, data augmentation techniques, models utilized for detecting and classifying diseases that affect the plant, how the quality of images was enhanced, how overfitting of the model was reduced, and accuracy. The research papers for this study were selected using various keywords from peer-reviewed publications from various databases published between 2010 and 2022. A total of 182 papers were identified and reviewed for their direct relevance to plant disease detection and classification, of which 75 papers were selected for this review after exclusion based on the title, abstract, conclusion, and full text. Researchers will find this work to be a useful resource in recognizing the potential of various existing techniques through data-driven approaches while identifying plant diseases by enhancing system performance and accuracy.


Subject(s)
Agriculture , Plant Diseases , Humans , Databases, Factual , India , Research Personnel
6.
PeerJ Comput Sci ; 9: e1698, 2023.
Article in English | MEDLINE | ID: mdl-38192471

ABSTRACT

Software-defined networking (SDN) is a networking architecture with improved efficiency achieved by moving networking decisions from the data plane to provide them critically at the control plane. In a traditional SDN, typically, a single controller is used. However, the complexity of modern networks due to their size and high traffic volume with varied quality of service requirements have introduced high control message communications overhead on the controller. Similarly, the solution found using multiple distributed controllers brings forth the 'controller placement problem' (CPP). Incorporating switch roles in the CPP modelling during network partitioning for controller placement has not been adequately considered by any existing CPP techniques. This article proposes the controller placement algorithm with network partition based on critical switch awareness (CPCSA). CPCSA identifies critical switch in the software defined wide area network (SDWAN) and then partition the network based on the criticality. Subsequently, a controller is assigned to each partition to improve control messages communication overhead, loss, throughput, and flow setup delay. The CPSCSA experimented with real network topologies obtained from the Internet Topology Zoo. Results show that CPCSA has achieved an aggregate reduction in the controller's overhead by 73%, loss by 51%, and latency by 16% while improving throughput by 16% compared to the benchmark algorithms.

7.
PeerJ Comput Sci ; 9: e1771, 2023.
Article in English | MEDLINE | ID: mdl-38192478

ABSTRACT

The Internet of Things has a bootloader and applications responsible for initializing the device's hardware and loading the operating system or firmware. Ensuring the security of the bootloader is crucial to protect against malicious firmware or software being loaded onto the device. One way to increase the security of the bootloader is to use digital signature verification to ensure that only authorized firmware can be loaded onto the device. Additionally, implementing secure boot processes, such as a chain of trust, can prevent unauthorized access to the device's firmware and protect against tampering during the boot process. This research is based on the firmware bootloader and application dataflow taint analysis and security assessment of IoT devices as the most critical step in ensuring the security and integrity of these devices. This process helps identify vulnerabilities and potential attack vectors that attackers could exploit and provides a foundation for developing effective remediation strategies.

8.
Sensors (Basel) ; 22(19)2022 Sep 22.
Article in English | MEDLINE | ID: mdl-36236298

ABSTRACT

Internet availability and its integration with smart technologies have favored everyday objects and things and offered new areas, such as the Internet of Things (IoT). IoT refers to a concept where smart devices or things are connected and create a network. This new area has suffered from big data handling and security issues. There is a need to design a data analytics model by using new 5G technologies, architecture, and a security model. Reliable data communication in the presence of legitimate nodes is always one of the challenges in these networks. Malicious nodes are generating inaccurate information and breach the user's security. In this paper, a data analytics model and self-organizing architecture for IoT networks are proposed to understand the different layers of technologies and processes. The proposed model is designed for smart environmental monitoring systems. This paper also proposes a security model based on an authentication, detection, and prediction mechanism for IoT networks. The proposed model enhances security and protects the network from DoS and DDoS attacks. The proposed model evaluates in terms of accuracy, sensitivity, and specificity by using machine learning algorithms.


Subject(s)
Data Science , Internet of Things , Algorithms , Communication , Computer Communication Networks
9.
Sensors (Basel) ; 22(18)2022 Sep 17.
Article in English | MEDLINE | ID: mdl-36146400

ABSTRACT

In IoT networks, the de facto Routing Protocol for Low Power and Lossy Networks (RPL) is vulnerable to various attacks. Routing attacks in RPL-based IoT are becoming critical with the increase in the number of IoT applications and devices globally. To address routing attacks in RPL-based IoT, several security solutions have been proposed in literature, such as machine learning techniques, intrusion detection systems, and trust-based approaches. Studies show that trust-based security for IoT is feasible due to its simple integration and resource-constrained nature of smart devices. Existing trust-based solutions have insufficient consideration of nodes' mobility and are not evaluated for dynamic scenarios to satisfy the requirements of smart applications. This research work addresses the Rank and Blackhole attacks in RPL considering the static as well as mobile nodes in IoT. The proposed Security, Mobility, and Trust-based model (SMTrust) relies on carefully chosen trust factors and metrics, including mobility-based metrics. The evaluation of the proposed model through simulation experiments shows that SMTrust performs better than the existing trust-based methods for securing RPL. The improvisation in terms of topology stability is 46%, reduction in packet loss rate is 45%, and 35% increase in throughput, with only 2.3% increase in average power consumption.

10.
Sensors (Basel) ; 22(16)2022 Aug 16.
Article in English | MEDLINE | ID: mdl-36015890

ABSTRACT

Unmanned Aerial Vehicle (UAV) deployment and placement are largely dependent upon the available energy, feasible scenario, and secure network. The feasible placement of UAV nodes to cover the cellular networks need optimal altitude. The under or over-estimation of nodes' air timing leads to of resource waste or inefficiency of the mission. Multiple factors influence the estimation of air timing, but the majority of the literature concentrates only on flying time. Some other factors also degrade network performance, such as unauthorized access to UAV nodes. In this paper, the UAV coverage issue is considered, and a Coverage Area Decision Model for UAV-BS is proposed. The proposed solution is designed for cellular network coverage by using UAV nodes that are controlled and managed for reallocation, which will be able to change position per requirements. The proposed solution is evaluated and tested in simulation in terms of its performance. The proposed solution achieved better results in terms of placement in the network. The simulation results indicated high performance in terms of high packet delivery, less delay, less overhead, and better malicious node detection.


Subject(s)
Aircraft , Unmanned Aerial Devices , Altitude , Computer Simulation
11.
Sensors (Basel) ; 21(24)2021 Dec 15.
Article in English | MEDLINE | ID: mdl-34960483

ABSTRACT

Cloud ERP is a type of enterprise resource planning (ERP) system that runs on the vendor's cloud platform instead of an on-premises network, enabling companies to connect through the Internet. The goal of this study was to rank and prioritise the factors driving cloud ERP adoption by organisations and to identify the critical issues in terms of security, usability, and vendors that impact adoption of cloud ERP systems. The assessment of critical success factors (CSFs) in on-premises ERP adoption and implementation has been well documented; however, no previous research has been carried out on CSFs in cloud ERP adoption. Therefore, the contribution of this research is to provide research and practice with the identification and analysis of 16 CSFs through a systematic literature review, where 73 publications on cloud ERP adoption were assessed from a range of different conferences and journals, using inclusion and exclusion criteria. Drawing from the literature, we found security, usability, and vendors were the top three most widely cited critical issues for the adoption of cloud-based ERP; hence, the second contribution of this study was an integrative model constructed with 12 drivers based on the security, usability, and vendor characteristics that may have greater influence as the top critical issues in the adoption of cloud ERP systems. We also identified critical gaps in current research, such as the inconclusiveness of findings related to security critical issues, usability critical issues, and vendor critical issues, by highlighting the most important drivers influencing those issues in cloud ERP adoption and the lack of discussion on the nature of the criticality of those CSFs. This research will aid in the development of new strategies or the revision of existing strategies and polices aimed at effectively integrating cloud ERP into cloud computing infrastructure. It will also allow cloud ERP suppliers to determine organisations' and business owners' expectations and implement appropriate tactics. A better understanding of the CSFs will narrow the field of failure and assist practitioners and managers in increasing their chances of success.


Subject(s)
Cloud Computing , Commerce
12.
Sensors (Basel) ; 21(17)2021 Aug 25.
Article in English | MEDLINE | ID: mdl-34502608

ABSTRACT

The use of unmanned aerial vehicles or drones are a valuable technique in coping with issues related to life in the general public's daily routines. Given the growing number of drones in low-altitude airspace, linking drones to form the Internet of drones (IoD) is a highly desirable trend to improve the safety as well as the quality of flight. However, there remain security, privacy, and communication issues related to IoD. In this paper, we discuss the key requirements of security, privacy, and communication and we present a taxonomy of IoD based on the most relevant considerations. Furthermore, we present the most commonly used commercial case studies and address the latest advancements and solutions proposed for the IoD environments. Lastly, we discuss the challenges and future research directions of IoD.


Subject(s)
Internet , Privacy
13.
Sensors (Basel) ; 21(15)2021 Jul 31.
Article in English | MEDLINE | ID: mdl-34372449

ABSTRACT

Wireless Sensor Networks (WSNs) have gained great significance from researchers and industry due to their wide applications. Energy and resource conservation challenges are facing the WSNs. Nevertheless, clustering techniques offer many solutions to address the WSN issues, such as energy efficiency, service redundancy, routing delay, scalability, and making WSNs more efficient. Unfortunately, the WSNs are still immature, and suffering in several aspects. This paper aims to solve some of the downsides in existing routing protocols for WSNs; a Lightweight and Efficient Dynamic Cluster Head Election routing protocol (LEDCHE-WSN) is proposed. The proposed routing algorithm comprises two integrated methods, electing the optimum cluster head, and organizing the re-clustering process dynamically. Furthermore, the proposed protocol improves on others present in the literature by combining the random and periodic electing method in the same round, and the random method starts first at the beginning of each round/cycle. Moreover, both random and periodic electing methods are preceded by checking the remaining power to skip the dead nodes and continue in the same way periodically with the rest of the nodes in the round. Additionally, the proposed protocol is distinguished by deleting dead nodes from the network topology list during the re-clustering process to address the black holes and routing delay problems. Finally, the proposed algorithm's mathematical modeling and analysis are introduced. The experimental results reveal the proposed protocol outperforms the LEACH protocol by approximately 32% and the FBCFP protocol by 8%, in terms of power consumption and network lifetime. In terms of Mean Package Delay, LEDCHE-WSN improves the LEACH protocol by 42% and the FBCFP protocol by 15%, and regarding Loss Ratio, it improves the LEACH protocol by approximately 46% and FBCFP protocol by 25%.

SELECTION OF CITATIONS
SEARCH DETAIL