Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 20 de 27
Filtrar
1.
Sensors (Basel) ; 23(22)2023 Nov 08.
Artigo em Inglês | MEDLINE | ID: mdl-38005421

RESUMO

Machine learning, powered by cloud servers, has found application in medical diagnosis, enhancing the capabilities of smart healthcare services. Research literature demonstrates that the support vector machine (SVM) consistently demonstrates remarkable accuracy in medical diagnosis. Nonetheless, safeguarding patients' health data privacy and preserving the intellectual property of diagnosis models is of paramount importance. This concern arises from the common practice of outsourcing these models to third-party cloud servers that may not be entirely trustworthy. Few studies in the literature have delved into addressing these issues within SVM-based diagnosis systems. These studies, however, typically demand substantial communication and computational resources and may fail to conceal classification results and protect model intellectual property. This paper aims to tackle these limitations within a multi-class SVM medical diagnosis system. To achieve this, we have introduced modifications to an inner product encryption cryptosystem and incorporated it into our medical diagnosis framework. Notably, our cryptosystem proves to be more efficient than the Paillier and multi-party computation cryptography methods employed in previous research. Although we focus on a medical application in this paper, our approach can also be used for other applications that need the evaluation of machine learning models in a privacy-preserving way such as electricity theft detection in the smart grid, electric vehicle charging coordination, and vehicular social networks. To assess the performance and security of our approach, we conducted comprehensive analyses and experiments. Our findings demonstrate that our proposed method successfully fulfills our security and privacy objectives while maintaining high classification accuracy and minimizing communication and computational overhead.


Assuntos
Privacidade , Máquina de Vetores de Suporte , Humanos , Segurança Computacional , Confidencialidade , Aprendizado de Máquina
2.
Ad Hoc Netw ; 111: 102324, 2021 Feb 01.
Artigo em Inglês | MEDLINE | ID: mdl-33071687

RESUMO

Unmanned Aerial Vehicles (UAV) have revolutionized the aircraft industry in this decade. UAVs are now capable of carrying out remote sensing, remote monitoring, courier delivery, and a lot more. A lot of research is happening on making UAVs more robust using energy harvesting techniques to have a better battery lifetime, network performance and to secure against attackers. UAV networks are many times used for unmanned missions. There have been many attacks on civilian, military, and industrial targets that were carried out using remotely controlled or automated UAVs. This continued misuse has led to research in preventing unauthorized UAVs from causing damage to life and property. In this paper, we present a literature review of UAVs, UAV attacks, and their prevention using anti-UAV techniques. We first discuss the different types of UAVs, the regulatory laws for UAV activities, their use cases, recreational, and military UAV incidents. After understanding their operation, various techniques for monitoring and preventing UAV attacks are described along with case studies.

3.
Sensors (Basel) ; 20(1)2020 Jan 03.
Artigo em Inglês | MEDLINE | ID: mdl-31947860

RESUMO

Cyber-physical systems (CPS) is a setup that controls and monitors the physical world around us. The advancement of these systems needs to incorporate an unequivocal spotlight on making these systems efficient. Blockchains and their inherent combination of consensus algorithms, distributed data storage, and secure protocols can be utilized to build robustness and reliability in these systems. Blockchain is the underlying technology behind bitcoins and it provides a decentralized framework to validate transactions and ensure that they cannot be modified. By distributing the role of information validation across the network peers, blockchain eliminates the risks associated with a centralized architecture. It is the most secure validation mechanism that is efficient and enables the provision of financial services, thereby giving users more freedom and power. This upcoming technology provides internet users with the capability to create value and authenticate digital information. It has the capability to revolutionize a diverse set of business applications, ranging from sharing economy to data management and prediction markets. In this paper, we present a holistic survey of various applications of CPS where blockchain has been utilized. Smart grids, health-care systems, and industrial production processes are some of the many applications that can benefit from the blockchain technology and will be discussed in the paper.

4.
Sensors (Basel) ; 20(20)2020 Oct 19.
Artigo em Inglês | MEDLINE | ID: mdl-33086691

RESUMO

With the emergence of vehicular Internet-of-Things (IoT) applications, it is a significant challenge for vehicular IoT systems to obtain higher throughput in vehicle-to-cloud multipath transmission. Network Coding (NC) has been recognized as a promising paradigm for improving vehicular wireless network throughput by reducing packet loss in transmission. However, existing researches on NC do not consider the influence of the rapid quality change of wireless links on NC schemes, which poses a great challenge to dynamically adjust the coding rate according to the variation of link quality in vehicle-to-cloud multipath transmission in order to avoid consuming unnecessary bandwidth resources and to increase network throughput. Therefore, we propose an Adaptive Network Coding (ANC) scheme brought by the novel integration of the Hidden Markov Model (HMM) into the NC scheme to efficiently adjust the coding rate according to the estimated packet loss rate (PLR). The ANC scheme conquers the rapid change of wireless link quality to obtain the utmost throughput and reduce the packet loss in transmission. In terms of the throughput performance, the simulations and real experiment results show that the ANC scheme outperforms state-of-the-art NC schemes for vehicular wireless multipath transmission in vehicular IoT systems.

5.
Sensors (Basel) ; 20(21)2020 Nov 04.
Artigo em Inglês | MEDLINE | ID: mdl-33158266

RESUMO

Wi-Fi uploading is considered an effective method for offloading the traffic of cellular networks generated by the data uploading process of mobile crowd sensing applications. However, previously proposed Wi-Fi uploading schemes mainly focus on optimizing one performance objective: the offloaded cellular traffic or the reduced uploading cost. In this paper, we propose an Intelligent Data Uploading Selection Mechanism (IDUSM) to realize a trade-off between the offloaded traffic of cellular networks and participants' uploading cost considering the differences among participants' data plans and direct and indirect opportunistic transmissions. The mechanism first helps the source participant choose an appropriate data uploading manner based on the proposed probability prediction model, and then optimizes its performance objective for the chosen data uploading manner. In IDUSM, our proposed probability prediction model precisely predicts a participant's mobility from spatial and temporal aspects, and we decrease data redundancy produced in the Wi-Fi offloading process to reduce waste of participants' limited resources (e.g., storage, battery). Simulation results show that the offloading efficiency of our proposed IDUSM is (56.54×10-7), and the value is the highest among the other three Wi-Fi offloading mechanisms. Meanwhile, the offloading ratio and uploading cost of IDUSM are respectively 52.1% and (6.79×103). Compared with other three Wi-Fi offloading mechanisms, it realized a trade-off between the offloading ratio and the uploading cost.

6.
Sensors (Basel) ; 20(18)2020 Sep 13.
Artigo em Inglês | MEDLINE | ID: mdl-32933114

RESUMO

Cognitive radio (CR) is a critical technique to solve the conflict between the explosive growth of traffic and severe spectrum scarcity. Reasonable radio resource allocation with CR can effectively achieve spectrum sharing and co-channel interference (CCI) mitigation. In this paper, we propose a joint channel selection and power adaptation scheme for the underlay cognitive radio network (CRN), maximizing the data rate of all secondary users (SUs) while guaranteeing the quality of service (QoS) of primary users (PUs). To exploit the underlying topology of CRNs, we model the communication network as dynamic graphs, and the random walk is used to imitate the users' movements. Considering the lack of accurate channel state information (CSI), we use the user distance distribution contained in the graph to estimate CSI. Moreover, the graph convolutional network (GCN) is employed to extract the crucial interference features. Further, an end-to-end learning model is designed to implement the following resource allocation task to avoid the split with mismatched features and tasks. Finally, the deep reinforcement learning (DRL) framework is adopted for model learning, to explore the optimal resource allocation strategy. The simulation results verify the feasibility and convergence of the proposed scheme, and prove that its performance is significantly improved.

7.
Sensors (Basel) ; 20(21)2020 Nov 08.
Artigo em Inglês | MEDLINE | ID: mdl-33171680

RESUMO

Recently, underwater wireless sensor networks (UWSNs) have been considered as a powerful technique for many applications. However, acoustic communications in UWSNs bring in huge QoS issues for time-critical applications. Additionally, excessive control packets and multiple copies during the data transmission process exacerbate this challenge. Faced with these problems, we propose a reliable low-latency and energy-efficient transmission protocol for dense 3D underwater wireless sensor networks to improve the QoS of UWSNs. The proposed protocol exploits fewer control packets and reduces data-packet copies effectively through the co-design of routing and media access control (MAC) protocols. The co-design method is divided into two steps. First, the number of handshakes in the MAC process will be greatly reduced via our forwarding-set routing strategy under the guarantee of reliability. Second, with the help of information from the MAC process, network-update messages can be used to replace control packages through mobility prediction when choosing a route. Simulation results show that the proposed protocol has a considerably higher reliability, and lower latency and energy consumption in comparison with existing transmission protocols for a dense underwater wireless sensor network.

8.
Sensors (Basel) ; 19(6)2019 Mar 13.
Artigo em Inglês | MEDLINE | ID: mdl-30871229

RESUMO

The explosive number of vehicles has given rise to a series of traffic problems, such as traffic congestion, road safety, and fuel waste. Collecting vehicles' speed information is an effective way to monitor the traffic conditions and avoid vehicles' congestion, however it may threaten vehicles' location and trajectory privacy. Motivated by the fact that traffic monitoring does not need to know each individual vehicle's speed and the average speed would be sufficient, we propose a privacy-preserving traffic monitoring (PPTM) scheme to aggregate vehicles' speeds at different locations. In PPTM, the roadside unit (RSU) collects vehicles' speed information at multiple road segments, and further cooperates with a service provider to calculate the average speed information for every road segment. To preserve vehicles' privacy, both homomorphic Paillier cryptosystem and super-increasing sequence are adopted. A comprehensive security analysis indicates that the proposed PPTM can preserve vehicles' identities, speeds, locations, and trajectories privacy from being disclosed. In addition, extensive simulations are conducted to validate the effectiveness and efficiency of the proposed PPTM scheme.

9.
Sensors (Basel) ; 19(4)2019 Feb 17.
Artigo em Inglês | MEDLINE | ID: mdl-30781563

RESUMO

In recent years, with the development of the marine industry, the ship navigation environment has become more complicated. Some artificial intelligence technologies, such as computer vision, can recognize, track and count sailing ships to ensure maritime security and facilitate management for Smart Ocean systems. Aiming at the scaling problem and boundary effect problem of traditional correlation filtering methods, we propose a self-selective correlation filtering method based on box regression (BRCF). The proposed method mainly includes: (1) A self-selective model with a negative samples mining method which effectively reduces the boundary effect in strengthening the classification ability of the classifier at the same time; (2) a bounding box regression method combined with a key points matching method for the scale prediction, leading to a fast and efficient calculation. The experimental results show that the proposed method can effectively deal with the problem of ship size changes and background interference. The success rates and precisions were over 8 % higher than Discriminative Scale Space Tracking (DSST) on the marine traffic dataset of our laboratory. In terms of processing speed, the proposed method is higher than DSST by nearly 22 frames per second (FPS).

10.
Sensors (Basel) ; 19(21)2019 Oct 31.
Artigo em Inglês | MEDLINE | ID: mdl-31683703

RESUMO

As one of the main applications of the Internet of things (IoT), the vehicular ad-hoc network (VANET) is the core of the intelligent transportation system (ITS). Air-ground integrated vehicular networks (AGIVNs) assisted by unmanned aerial vehicles (UAVs) have the advantages of wide coverage and flexible configuration, which outperform the ground-based VANET in terms of communication quality. However, the complex electromagnetic interference (EMI) severely degrades the communication performance of UAV sensors. Therefore, it is meaningful and challenging to design an efficient anti-interference scheme for UAV data links in AGIVNs. In this paper, we propose an anti-interference scheme, named as Mary-MCM, for UAV data links in AGIVNs based on multi-ary (M-ary) spread spectrum and multi-carrier modulation (MCM). Specifically, the Mary-MCM disperses the interference power by expanding the signal spectrum, such that the anti-interference ability of AGIVNs is enhanced. Besides, by using MCM and multiple-input multiple-output (MIMO) technologies, the Mary-MCM improves the spectrum utilization effectively while ensuring system performance. The simulation results verify that the Mary-MCM achieves excellent anti-interference performance under different EMI combinations.

11.
Sensors (Basel) ; 19(5)2019 Mar 08.
Artigo em Inglês | MEDLINE | ID: mdl-30857140

RESUMO

Intelligent medical service system integrates wireless internet of things (WIoT), including medical sensors, wireless communications, and middleware techniques, so as to collect and analyze patients' data to examine their physical conditions by many personal health devices (PHDs) in real time. However, large amount of malicious codes on the Android system can compromise consumers' privacy, and further threat the hospital management or even the patients' health. Furthermore, this sensor-rich system keeps generating large amounts of data and saturates the middleware system. To address these challenges, we propose a fog computing security and privacy protection solution. Specifically, first, we design the security and privacy protection framework based on the fog computing to improve tele-health and tele-medicine infrastructure. Then, we propose a context-based privacy leakage detection method based on the combination of dynamic and static information. Experimental results show that the proposed method can achieve higher detection accuracy and lower energy consumption compared with other state-of-art methods.


Assuntos
Internet , Tecnologia de Sensoriamento Remoto/métodos , Tecnologia sem Fio , Segurança Computacional
12.
Sensors (Basel) ; 19(4)2019 Feb 25.
Artigo em Inglês | MEDLINE | ID: mdl-30823597

RESUMO

Many IoT (Internet of Things) systems run Android systems or Android-like systems. With the continuous development of machine learning algorithms, the learning-based Android malware detection system for IoT devices has gradually increased. However, these learning-based detection models are often vulnerable to adversarial samples. An automated testing framework is needed to help these learning-based malware detection systems for IoT devices perform security analysis. The current methods of generating adversarial samples mostly require training parameters of models and most of the methods are aimed at image data. To solve this problem, we propose a testing framework for learning-based Android malware detection systems (TLAMD) for IoT Devices. The key challenge is how to construct a suitable fitness function to generate an effective adversarial sample without affecting the features of the application. By introducing genetic algorithms and some technical improvements, our test framework can generate adversarial samples for the IoT Android application with a success rate of nearly 100% and can perform black-box testing on the system.

13.
Sensors (Basel) ; 18(8)2018 Aug 19.
Artigo em Inglês | MEDLINE | ID: mdl-30126251

RESUMO

High-precision and fast relative positioning of a large number of mobile sensor nodes (MSNs) is crucial for smart industrial wireless sensor networks (SIWSNs). However, positioning multiple targets simultaneously in three-dimensional (3D) space has been less explored. In this paper, we propose a new approach, called Angle-of-Arrival (AOA) based Three-dimensional Multi-target Localization (ATML). The approach utilizes two anchor nodes (ANs) with antenna arrays to receive the spread spectrum signals broadcast by MSNs. We design a multi-target single-input-multiple-output (MT-SIMO) signal transmission scheme and a simple iterative maximum likelihood estimator (MLE) to estimate the 2D AOAs of multiple MSNs simultaneously. We further adopt the skew line theorem of 3D geometry to mitigate the AOA estimation errors in determining locations. We have conducted extensive simulations and also developed a testbed of the proposed ATML. The numerical and field experiment results have verified that the proposed ATML can locate multiple MSNs simultaneously with high accuracy and efficiency by exploiting the spread spectrum gain and antenna array gain. The ATML scheme does not require extra hardware or synchronization among nodes, and has good capability in mitigating interference and multipath effect in complicated industrial environments.

14.
Sensors (Basel) ; 18(12)2018 Dec 19.
Artigo em Inglês | MEDLINE | ID: mdl-30572635

RESUMO

Throughout the past decade, vehicular networks have attracted a great deal of interest in various fields. The increasing number of vehicles has led to challenges in traffic regulation. Vehicle-type detection is an important research topic that has found various applications in numerous fields. Its main purpose is to extract the different features of vehicles from videos or pictures captured by traffic surveillance so as to identify the types of vehicles, and then provide reference information for traffic monitoring and control. In this paper, we propose a step-forward vehicle-detection and -classification method using a saliency map and the convolutional neural-network (CNN) technique. Specifically, compressed-sensing (CS) theory is applied to generate the saliency map to label the vehicles in an image, and the CNN scheme is then used to classify them. We applied the concept of the saliency map to search the image for target vehicles: this step is based on the use of the saliency map to minimize redundant areas. CS was used to measure the image of interest and obtain its saliency in the measurement domain. Because the data in the measurement domain are much smaller than those in the pixel domain, saliency maps can be generated at a low computation cost and faster speed. Then, based on the saliency map, we identified the target vehicles and classified them into different types using the CNN. The experimental results show that our method is able to speed up the window-calibrating stages of CNN-based image classification. Moreover, our proposed method has better overall performance in vehicle-type detection compared with other methods. It has very broad prospects for practical applications in vehicular networks.

15.
Sensors (Basel) ; 18(3)2018 Mar 18.
Artigo em Inglês | MEDLINE | ID: mdl-29562628

RESUMO

Wireless sensor networks (WSNs) involve more mobile elements with their widespread development in industries. Exploiting mobility present in WSNs for data collection can effectively improve the network performance. However, when the sink (i.e., data collector) path is fixed and the movement is uncontrollable, existing schemes fail to guarantee delay requirements while achieving high energy efficiency. This paper proposes a delay-aware energy-efficient routing algorithm for WSNs with a path-fixed mobile sink, named DERM, which can strike a desirable balance between the delivery latency and energy conservation. We characterize the object of DERM as realizing the energy-optimal anycast to time-varying destination regions, and introduce a location-based forwarding technique tailored for this problem. To reduce the control overhead, a lightweight sink location calibration method is devised, which cooperates with the rough estimation based on the mobility pattern to determine the sink location. We also design a fault-tolerant mechanism called track routing to tackle location errors for ensuring reliable and on-time data delivery. We comprehensively evaluate DERM by comparing it with two canonical routing schemes and a baseline solution presented in this work. Extensive evaluation results demonstrate that DERM can provide considerable energy savings while meeting the delay constraint and maintaining a high delivery ratio.

16.
Sensors (Basel) ; 18(11)2018 Nov 15.
Artigo em Inglês | MEDLINE | ID: mdl-30445723

RESUMO

Information Centric Network (ICN) is expected to be the favorable deployable future Internet paradigm. ICN intends to replace the current IP-based model with the name-based content-centric model, as it aims at providing better security, scalability, and content distribution. However, it is a challenging task to conceive how ICN can be linked with the other most emerging paradigm, i.e., Vehicular Ad hoc Network (VANET). In this article, we present an overview of the ICN-based VANET approach in line with its contributions and research challenges.In addition, the connectivity issues of vehicular ICN model is presented with some other emerging paradigms, such as Software Defined Network (SDN), Cloud, and Edge computing. Moreover, some ICN-based VANET research opportunities, in terms of security, mobility, routing, naming, caching, and fifth generation (5G) communications, are also covered at the end of the paper.

17.
Sensors (Basel) ; 16(12)2016 Nov 29.
Artigo em Inglês | MEDLINE | ID: mdl-27916841

RESUMO

Emerging sensor networks (ESNs) are an inevitable trend with the development of the Internet of Things (IoT), and intend to connect almost every intelligent device. Therefore, it is critical to study resource allocation in such an environment, due to the concern of efficiency, especially when resources are limited. By viewing ESNs as multi-agent environments, we model them with an agent-based modelling (ABM) method and deal with resource allocation problems with market models, after describing users' patterns. Reinforcement learning methods are introduced to estimate users' patterns and verify the outcomes in our market models. Experimental results show the efficiency of our methods, which are also capable of guiding topology management.

18.
J Med Syst ; 39(12): 193, 2015 Dec.
Artigo em Inglês | MEDLINE | ID: mdl-26490151

RESUMO

As players and soldiers preform strenuous exercises and do difficult and tiring duties, they are usually the common victims of muscular fatigue. Keeping this in mind, we propose FAtigue MEasurement (FAME) protocol for soccer players and soldiers using in-vivo sensors for Wireless Body Area Sensor Networks (WBASNs). In FAME, we introduce a composite parameter for fatigue measurement by setting a threshold level for each sensor. Whenever, any sensed data exceeds its threshold level, the players or soldiers are declared to be in a state of fatigue. Moreover, we use a vibration pad for the relaxation of fatigued muscles, and then utilize the vibrational energy by means of vibration detection circuit to recharge the in-vivo sensors. The induction circuit achieves about 68 % link efficiency. Simulation results show better performance of the proposed FAME protocol, in the chosen scenarios, as compared to an existing Wireless Soccer Team Monitoring (WSTM) protocol in terms of the selected metrics.


Assuntos
Redes de Comunicação de Computadores/instrumentação , Fadiga/diagnóstico , Tecnologia de Sensoriamento Remoto/instrumentação , Telemedicina/instrumentação , Tecnologia sem Fio/instrumentação , Algoritmos , Atletas , Humanos , Militares , Futebol/fisiologia
19.
IEEE Trans Pattern Anal Mach Intell ; 46(2): 729-748, 2024 Feb.
Artigo em Inglês | MEDLINE | ID: mdl-37878432

RESUMO

Blockchain data mining has the potential to reveal the operational status and behavioral patterns of anonymous participants in blockchain systems, thus providing valuable insights into system operation and participant behavior. However, traditional blockchain analysis methods suffer from the problems of being unable to handle the data due to its large volume and complex structure. With powerful computing and analysis capabilities, graph learning can solve the current problems through handling each node's features and linkage relationships separately and exploring the implicit properties of data from a graph perspective. This paper systematically reviews the blockchain data mining tasks based on graph learning approaches. First, we investigate the blockchain data acquisition method, integrate the currently available data analysis tools, and divide the sampling method into rule-based and cluster-based techniques. Second, we classify the graph construction into transaction-based blockchain and account-based methods, and comprehensively analyze the existing blockchain feature extraction methods. Third, we compare the existing graph learning algorithms on blockchain and classify them into traditional machine learning-based, graph representation-based, and graph deep learning-based methods. Finally, we propose future research directions and open issues which are promising to address.

20.
Telecommun Syst ; 81(1): 125-173, 2022.
Artigo em Inglês | MEDLINE | ID: mdl-35879968

RESUMO

With rapid advancements in the technology, almost all the devices around are becoming smart and contribute to the Internet of Things (IoT) network. When a new IoT device is added to the network, it is important to verify the authenticity of the device before allowing it to communicate with the network. Hence, access control is a crucial security mechanism that allows only the authenticated node to become the part of the network. An access control mechanism also supports confidentiality, by establishing a session key that accomplishes secure communications in open public channels. Recently, blockchain has been implemented in access control protocols to provide a better security mechanism. The foundation of this survey article is laid on IoT, where a detailed description on IoT, its architecture and applications is provided. Further, various security challenges and issues, security attacks possible in IoT and their countermeasures are also provided. We emphasize on the blockchain technology and its evolution in IoT. A detailed description on existing consensus mechanisms and how blockchain can be used to overpower IoT vulnerabilities is highlighted. Moreover, we provide a comprehensive description on access control protocols. The protocols are classified into certificate-based, certificate-less and blockchain-based access control mechanisms for better understanding. We then elaborate on each use case like smart home, smart grid, health care and smart agriculture while describing access control mechanisms. The detailed description not only explains the implementation of the access mechanism, but also gives a wider vision on IoT applications. Next, a rigorous comparative analysis is performed to showcase the efficiency of all protocols in terms of computation and communication costs. Finally, we discuss open research issues and challenges in a blockchain-envisioned IoT network.

SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA